Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Migration of unmigrated content due to installation of a new plugin

...

(AICA/CICA) Summary of the HIPAA Privacy Rule --[Internet http://www.hhs.gov/ocr/privacy/hipaa/understanding/summary/index.html}

CIPL, 2010) Demonstrating and Measuring Accountability  A Discussion Document  http://www.huntonfiles.com/files/webupload/CIPL_Accountability_Phase_II_Paris_Project.PDF

COE (1980)  Convention for the Protection of Individuals with Regard to Automatic Processing of Personal Data (Council of Europe) http://www.privacy.org/pi/intl_orgs/coe/dp_convention_108.txt

...

HEW U.S. Department of Health Education and Welfare “Records, Computers and the Rights of Citizens” issued by the Secretary's Advisory Committee on Automated Personal Data Systems; Elliot Richardson, Secretary of the Department of Health, Education and Welfare (1973)

HHS U.S. Privacy Protection Study Commission “Protecting Privacy in an Information Society” (ch. 13). http://aspe.hhs.gov/datacncl/1977privacy/toc.htm

ICAM  U.S. Identity Credential and Access Management Trust Framework Provider Adoption Process (TFPAP) For Levels of Assurance 1, 2, and Non-PKI 3, Version 1.0.1, Release Candidate September 4, 2009http://www.idmanagement.gov/documents/TrustFrameworkProviderAdoptionProcess.pd

ISTPA, (2007) Analysis of Privacy Principals, pg. 64, [Online] http://www.istpa.org/ [Accessed Nov, 4 2010]

Landau, S., Le Van Gong, H., and Wilton, R., (2009) Achieving Privacy in a Federated Identity Management System. Financial Cryptography and Data Security 2009, International Financial Cryptography Association 1, 14.

NSTIC*(2010)* U.S. National Strategy for Trusted Identities in Cyberspace http://www.nstic.ideascale.com

OECD:  Rundle, M., et Al ( Bob Blakley, Jeff Broberg, Anthony Nadalin, Dale Olds, Mary Ruddy, Marcelo Thompson Mello Guimarães, and Paul Trevithick)   (2008) At a Crossroads: Personhood and Digital Identity in the Information Society, Published Organisation for Economic Cooperation and Development (OECD)

OECD, (1980) Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, [Online]  http://www.oecd.org/document/18/0,2340,en_2649_34255_1815186_1_1_1_1,00.html [Accessed April 1, 2011]

Privacy International(2010) Avoiding the Privacy Apocalypse, [Internet Video]  , Google Tech Talk, presented by Simon Davies and Gus Hosein

Reding, V, (Nov 4, 2010), European Commission sets out strategy to strengthen EU data protection rules, [Internet] http://europa.eu/rapid/pressReleasesAction.do?reference=IP/10/1462&format=HTML&aged=0&language=EN&guiLanguage=en  [Accessed Nov 4, 2010]

Scott David,  OIX Tool,  Oct 12 FIPP Tool.doc\

The Business Forum for Consumer Privacy, (2009) A Use and Obligation Approach to Protecting Privacy, [Online] http://www.huntonfiles.com/files/webupload/CIPL_Use_and_Obligations_White_Paper.pdf

US. Dep’t of Commerce, (2010) Privacy Green Paper,[Accessed Dec 18, 2010

Additional Reference in Notice Principle – Info RFC “draft-morris-policy-cons-00.txt“ [Internet] http://tools.ietf.org/html/draft-morris-policy-cons-00 [Accessed March 30, 2011]

\