The threats to privacy are well known: the National Security Agency tracks our phone calls; Google records where we go online and how we set our thermostats; Fa
An expert on computer privacy and security shows how we can build privacy into the design of systems from the start. We are tethered to our devices all day, eve
Privacy Law Answer Book answers key questions related to the evolving collection, use, and storage of consumers' personal information. The Q&A-formatted guide m
The problem of privacy-preserving data analysis has a long history spanning multiple disciplines. As electronic data about individuals becomes increasingly deta
Limited legal protections for privacy leave minority communities vulnerable to concrete injuries and violence when their information is exposed. In Privacy at t