Please enter the URL that you'd like to shorten or click here to shorten current:
Australia. House of Representatives. Standing Committee on Legal and Constitutional Affairs Advisory Report on the Privacy Amendment (Private Sector) Bill 2000. Released June 26, 2000.
The Australian Privacy Commissioner's Website - All the relevant legislation to do with privacy and security on the internet, what your rights are and private sector privacy.
Guidelines for Federal and ACT Government World Wide Websites - The purpose of these guidelines is to assist agencies to adopt best privacy practice and comply with the Privacy Act in respect to their websites. When agencies are considering their web strategies and if personal information may be transmitted, published, solicited and collected via the Internet they need to consider the relevant privacy implications. It is the responsibility of agencies to ensure that their website implementation complies with the Privacy Act and addresses the privacy concerns of net users.
Inquiry to probe privacy laws. The Age, December 10, 2004. "Smart cards, genetic testing and other new technologies will come under the spotlight of a parliamentary inquiry. The Senate yesterday passed an Australian Democrats motion to establish an inquiry into Australia's privacy laws..."
Internet Industry Association - Privacy Code Launch Site - "The IIA welcomes comments from the public and industry on our draft Internet Industry Code of Practice which was launched on 16 August by the Federal Attorney General. We request that comments on the draft be emailed to firstname.lastname@example.org by 5 October 2001. Kindly state your name and, where applicable, the organisation on whose behalf you are making comments. (This identifying information will not be passed on to third parties, other than those for whom disclosure is necessary for the review or approval of our Code or as required by law, without your express prior consent)...."
Privacy and The Public Good - Extract from Tom Worthington's new book The Net Traveller. Content includes: Introduction; Need for Commonwealth Privacy Legislation; Relevant International Standards and Obligations ; Appropriateness of National Principles for the Fair Handling of Personal Information; Conclusion.
Privacy breach for govt website, by Kelly Mills. Australia IT, November 29, 2002. "The Department of Family and Community Services has breached the Privacy Act by spamming website competition entrants on behalf of a university..."
Privacy concern over email law, by Alex Wilson. The Australian, August 30, 2004. "A new federal law could allow authorities easy access to private, stored emails without a warrant, according to civil libertarians. The bill, due to be debated in the Senate tomorrow, allows many new government bodies to access private emails, voicemail messages and SMS messages..."
Privacy fears over database, by Michelle Wiese Bockmann. AustralianIT, August 10, 2004. "Secret political databases "suck up" taxpayer money, "invade" privacy, and "skew" democracy, say two former Liberal staff members-turned-political lecturers. The pair has exposed longstanding ALP and Coalition practices to collect and funnel personal information into their own databases, under exemptions to the Privacy Act..."
Privacy special report: All eyes on you. ZDNet Australia, December 20, 2001. "One of the most contentious and debated topics of the information age has been that of privacy..."
Privacy the biggest e-government hurdle, by Jennifer Foreshew. Australian IT, 8 May 2001. "Australia's adoption of e-government could be hampered by unresolved privacy concerns, a legal expert has warned..."
E-mail snooping set to be outlawed in NSW and Victoria, by Sandra Rossi. Computerworld, 29 June 2004. "Victoria is set to follow NSW and introduce legislation to outlaw unauthorised snooping on workplace Internet surfing and e-mail communications..."
Privacy Laws Discussion Paper - Western Australia - Department of the Premier and Cabinet. 27 May 2003. "The State Government is seeking public comment on its proposals for new Privacy legislation to protect personal information held by state and local governments in Western Australia. A public discussion paper has been released outlining key issues associated with the proposed new laws, with public submissions accepted until 30 June, 2003. Interested people can also access a more detailed research paper on the proposed legislation..."
Allaboutcookies.com - everything you ever wanted to know about cookies....
The Cookie Concept, By Viktor Mayer-Schönberger. cookiecentral.com "The WWW is built on a very simple, but powerful premise. All material on the Web is formatted in a general, uniform format called HTML (Hypertext Markup Language), and all information requests and responses conform to a similarly standard protocol. When someone accesses a server on the Web, such as the Library of Congress, the user's Web browser will send an information request to the Library of Congress' computer. This computer is called a Web server. The Web server will respond to the request by transmitting the desired information to the user's computer. There, the user's browser will display the received information on the user's screen..."
The Cookie Conundrum, Greg Harvey. SitePoint Tribune, Issue 193, April 25, 2002. "...The Case for Cookies - So, what are cookies? As we know, cookies are plainly and simply an information store. A cookie can store anything you like within reason. But that's all it can do..."
The Endangered Cookie, By Dave Morgan. Clickz, August 26, 2004. "Once you've moved beyond the OREO Double Stuff phase, the cookies in your life are primarily little text files summoned by your browser. They're placed, or called, by publishers' or advertisers' servers when those browsers visit their pages or contact their servers..."
The E-Privacy Imperative: Hands in the Cookie Jar, By Mark Merkow, CCP, CISSP. Insights - EC Outlook, April 19, 2002. "Following is an excerpt of Chapter 8 from my newest book, The E-Privacy Imperative: Protect Your Customers' Internet Privacy and Ensure Your Company's Survival in the Electronic Age...Hands in the Cookie Jar - At the heart of the privacy matter is what some privacy advocates would call the clandestine manner in which Web site sites are, unbeknownst to the user, collecting personally identifying information through stealth technology called "cookies." It's a deceivingly innocuous term for a relatively unsophisticated piece of technology that allows a Web site to collect information about the user and his browsing behaviors on the Internet...."
House Cuts Cookies From SPY ACT, By Roy Mark. Internet News, February 16, 2005. "With little fuss and no debate, a House subcommittee today amended an anti-spyware bill to clarify that the legislation does not cover third-party cookies..."
Spyware Legislation, Revisited, By Dave Morgan. Clickz, January 27, 2005. "When the first anti-spyware legislation was introduced last year, I was concerned legislators might do more harm than good in drawing up laws that reduced or eliminated spyware. My concern was the bill's language might sweep cookies (define) into the same pile as spyware (define) without acknowledging the fundamental difference between the two. Cookies perform many favorable tasks for users, such as remembering you so you don't have to reregister every time you visit a favorite site. Insidious spyware downloads without user knowledge, enables lots of ad formats consumers simply hate, and often violates privacy ethics and agreements..."
Study: Consumers Delete Cookies at Surprising Rate, By Rob McGann. Clickz, March 14, 2005. "Nearly 40 percent of Internet users delete cookies from their primary computers on at least a monthly basis, according to a study by JupiterResearch. The finding has big implications for advertising and marketing firms that depend on cookies for tracking and targeting..."
Turning up the heat on Web privacy, By Paul Festa. CNET News.com, November 19, 2002. "When Microsoft introduced version 6 of its Internet Explorer browser last year, many Webmasters were puzzled to find that their cookies were being blocked in increasing numbers. The culprit was IE's default implementation of the Platform for Privacy Preferences (P3P), and for that, the irate Webmasters had Lorrie Cranor to thank..."
Undetectable 'son of cookie' system wins grant, By John Lettice. The Register, 7 May 2002. "The developers of a 'son of cookie' web monitoring system have received a Proof of Concept grant from Scottish Enterprise to commercialise the system. Their non-cookie based web monitoring software does not (as indeed the name suggests) rely on cookies, but instead is intended to replace them with something far more powerful..."
Web Beacon Guidelines Released - Effort to be Part of Self-Regulatory Program to Address Privacy Concerns and Build Consumer Trust Online, November 26, 2002 - pdf format (this document requires the use of Adobe Acrobat Reader). "Washington, DC . "New industry guidelines that will help build even greater trust for consumers and businesses who perform on-line Internet transactions were unveiled today by a coalition of companies working through the Network Advertising Initiative (NAI). The guidelines, which will govern the use of web beacons by websites, are designed to address consumer and business privacy concerns..."
Beyond Concern: Understanding Net Users' Attitudes About Online Privacy. AT&T Labs-Research Technical Report TR 99.4., 14 April 1999 - People are concerned about privacy, particularly on the Internet. While many studies have provided evidence of this concern, few have explored the nature of the concern in detail, especially for the online environment. With this study, the authors have tried to better understand the nature of online privacy concerns; they look beyond the fact that people are concerned and attempt to understand how they are concerned. They hope their results will help inform both policy decisions as well as the development of technology tools that can assist Internet users in protecting their privacy.
E-government and the surveillance society? Public Sector Technology and Management, November 9, 2004. "The fight against terrorism, and the data requirements of e-government, raise the issue of finding the right balance between security and privacy, writes Thomas Riley..."
How public opinion polls define and circumscribe online privacy, by Kim Bartel Sheehan. First Monday, v.9, no.7, July 2004. "The advent of new communications technologies and the integration of such technologies into individuals' lives have resulted in major changes to society. Responding to such privacy concerns is of key interest to legislators, policy–makers, and business leaders as these groups seek to balance consumer privacy needs with the realities of this new society. These groups, and others, use public opinion polls and surveys to measure the current climate of opinion among citizens. This study examines the language of 43 opinion polls and surveys dealing with privacy and the Internet to understand how these polls define and assess online privacy. Results suggest that polls treat the complex construction of privacy in an overly simplistic way. Additionally, pollsters present many poll questions in a way that may lead survey respondents to express stronger negative feelings about privacy than really exist..."
The Information Economy - The Information Economy, maintained by Professor Hal R. Varian, Dean of the School of Information Management and Systems at the University of California, Berkeley, includes online information about "the Economics of the Internet, Information Goods, Intellectual Property and Related Issues." This directory includes a vast number of Websites dealing with topics including electronic publishing; intellectual property; government resources; electronic commerce; intranets; policy and law; network economics; and security, encryption, and privacy. Each section of the directory is divided into subtopics and includes succinct annotations and reviews of the sites.
Net Users Try to Elude the Google Grasp, By Jennifer Lee. New York Times, July 25, 2002. "...The gradual erosion of personal privacy is hardly a new trend. For years, privacy advocates have been spinning cautionary tales about the perils of living in the electronic age. But it used to be that only government agencies and businesses had the resources and manpower to track personal information...."
Perceptions of Trust, By Robyn Greenspan. CyberAtlas, February 13, 2004. "Just over half of surveyed consumers discontinued doing business with a company because they were uncomfortable with their privacy protection, a report from Accenture found. The November 2003 survey of 570 individuals that mixed business marketing executives, privacy officers and customer relationship management executives with consumer respondents revealed that each group often has a different perception of privacy policies and trust issues..."
P3P - Platform for Privacy Preferences is a specification that will allow users' Web browsers to automatically understand Web sites' privacy practices. Privacy policies will be embedded in the code of a Web site. Browsers will read the policy, and then, automatically provide certain information to specific sites based on the preferences set by the users. For instance, if the site is an e-commerce site, the browser will automatically provide shipping info. If the site is requesting demographic info, then the browser will know to provide it anonymously. The P3P specification was developed by the W3C P3P Syntax, Harmonization, and Protocol Working Groups, including W3C Member organizations and experts in the field of Web privacy. P3P is based on W3C specifications that have already been established, including HTTP, XML and Resource Description Framework (RDF). http://webopedia.internet.com/TERM/P/P3P.html.
Privacy Leadership Initiative - "was formed by leaders of a number of different companies and associations who believe that individuals should have a say in how and when their personal information can be used to their benefit. The purpose of the PLI is to create a climate of trust which will accelerate acceptance of the Internet and the emerging Information Economy, both online and off-line, as a safe and secure marketplace...."
Privacy Notices Miss the Mark with Consumers. Understandingprivacy.org, December 3, 2001. "New Harris Poll: Consumers Value Privacy Policies; Seek Shorter, Easier to Read Notices..."
Privacy Notices: No Good If No One Reads, by David Hallerman. eMarketer, 7 January 2003. "It is definitely important for any company doing business online to feature a privacy notice, but if potential customers can't understand the jargon used in the policy, it's virtually useless..."
The Privacy Paradox, By International Telecommunication Union. eGov Monitor, 11 July, 2005. "This article from the international Telecommunication Union considers the impact of mobile technologies on society and the challenges and responsibilities of government and the telecommuncation industry to deliver universal access whilst ensuring personal..."
A Report of Research on Privacy for Electronic Government. This report was funded by the Ministry of Public Management, Home Affairs, Posts and Telecommunications of Japan. March 2003. "This is the report of "International Research on Privacy for Electronic Government". The compiled report will show us the latest status of privacy situation and Privacy Enhancing Technologies in international community in the beginning of year 2003. I expect this report would help further improvement in Japan's planning on electronic government and electronic local government. Privacy is a foundation of democracy, thus, privacy has important substantial effects on every part of electronic government that we are heading toward. Then we, law makers to technologists to businesses, all will be asked to ensure privacy protection is embedded in it..."
Top 5 privacy issues for 2005 - Opinion by Larry Ponemon. Computerworld, December 28, 2004. "During the past year, Ponemon Institute has surveyed thousands of individuals on a variety of issues affecting their privacy, from a universal credentialing system to Internet ads that use personal information to target prospective customers. Emerging trends from our research suggest that individuals view their right to privacy as increasingly important and worry about how organizations collect, use and share their personal information. Other concerns include cybercrime, abusive marketing and loss of civil liberties..."
The trails left in Web server logs - and who's seeing them, by Kevin Poulsen. The Register, 6 April 2003. "The privacy advocates and civil libertarians at the 13th annual Computers, Freedom and Privacy conference sometimes seem dwarfed by the enormity of the projects they oppose -- larger-than-life enterprises worthy of a James Bond villain..."
Trustworthy Computing for e-Government - the privacy dimension, By Detlef Eckert, Senior Director, Trustworthy Computing, Microsoft EMEA. eGov monitor Weekly, 14 July 2003. "In the first of my three columns for eGov monitor, I touched on 'The Management of Trust', why I believe that joined-up government can only be built on a secure platform of trusted relationships and what Microsoft is doing to make this possible through its Trustworthy Computing initiative..." (c) KAM Ltd 2003.
25th International Conference of Data Protection & Privacy Commissioners on 9 - 11 September 2003 in Sydney. "The theme of this year's Conference is "Practical Privacy for People, Government and Business"...."
Your tag's showing - a lot, By Graeme Philpson. Sydney Morning Herald, April 27, 2004. "Technology versus privacy. It's more than a battle, it's a war. And it's hotting up. Scott McNealy, the head of Sun Microsystems, famously said a couple of years ago: "You have no privacy - get over it." He overstated the case a little but it is a valid point of view. McNealy's point is that technology has advanced to such a state that all of our actions are tracked electronically, that we may as well give up trying to protect our privacy and enjoy the advantages of technology..."
Last updated: 24 November 2009
Enter your email address to subscribe or unsubscribe from the eGov What's New mailing list.
Please enter email address of the person you wish to send this page to.