Protecting privacy on the Canadian information highway: Policy developments and regulatory options

被引:0
|
作者
Bennett, CJ
机构
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The debate about the future of the Canadian information highway has revealed that the rules for the protection of personal information are incomplete and incoherent. The federal government has now recognized that this regulatory patchwork will fail to allay the growing concerns of the general public, will not satisfy emerging international standards, and will create enormous costs for businesses that need to transfer personal data from one jurisdiction to another. Slowly beginning to take shape is a Canadian privacy protection policy that emphasizes the use of all instruments within the ''toolkit'' of privacy protection. It recognizes that voluntary action from the bottom up is just as necessary as regulatory action from the top down. It embraces innovations in new privacy-enhancing technologies and instruments from the world of standards-setting and certification. Fundamentally however, the government has recognized that only a comprehensive legislative framework (based on the recently adopted Model Code for the Protection of Personal Information negotiated through the Canadian Standards Association) will provide the necessary protections in the networked and distributed computer environment of the information highway.
引用
收藏
页码:1 / 19
页数:19
相关论文
共 50 条
  • [41] SOME RECENT DEVELOPMENTS IN CANADIAN IMMIGRATION POLICY
    NASH, A
    [J]. CANADIAN GEOGRAPHER-GEOGRAPHE CANADIEN, 1994, 38 (03): : 258 - 261
  • [42] The Dutch policy document on the regulation of the information highway
    Boele-Woelki, K
    [J]. INTERNATIONAL LAW AND THE HAGUE'S 750TH ANNIVERSARY, 1999, : 159 - 163
  • [43] Information Privacy, Cultural Values, and Regulatory Preferences
    Benamati, John H.
    Ozdemir, Zafer D.
    Smith, H. Jeff
    [J]. JOURNAL OF GLOBAL INFORMATION MANAGEMENT, 2021, 29 (03) : 131 - 164
  • [44] VALUES, PERSONAL INFORMATION PRIVACY, AND REGULATORY APPROACHES
    MILBERG, SJ
    BURKE, SJ
    SMITH, HJ
    KALLMAN, EA
    [J]. COMMUNICATIONS OF THE ACM, 1995, 38 (12) : 65 - 74
  • [45] Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing
    Loehr, Hans
    Sadeghi, Ahmad-Reza
    Vishik, Claire
    Winandy, Marcel
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 396 - +
  • [46] CONSENSUAL FOUNDATIONS OF THE POLICY OF PROTECTING THE GENETIC INFORMATION
    Kwiatkowski, Pawel
    [J]. FILOZOFIA, 2018, 73 (01): : 24 - 35
  • [47] FEDERAL INFORMATION POLICY - PROTECTING THE FREE-FLOW OF INFORMATION
    BROWN, GE
    [J]. GOVERNMENT INFORMATION QUARTERLY, 1987, 4 (04) : 349 - 358
  • [48] CANADIAN PHYSICIANS AND EUTHANASIA .5. POLICY OPTIONS
    SAWYER, DM
    WILLIAMS, JR
    LOWY, F
    [J]. CANADIAN MEDICAL ASSOCIATION JOURNAL, 1993, 148 (12) : 2129 - &
  • [49] PROTECTING PERSONAL PRIVACY IN USING GEOGRAPHIC INFORMATION-SYSTEMS
    ONSRUD, HJ
    JOHNSON, JP
    LOPEZ, XR
    [J]. PHOTOGRAMMETRIC ENGINEERING AND REMOTE SENSING, 1994, 60 (09): : 1083 - 1095
  • [50] PROTECTING PRIVACY OF COMPUTERIZED PATIENT INFORMATION MAY LIE IN THE CARDS
    SKOLNICK, AA
    [J]. JAMA-JOURNAL OF THE AMERICAN MEDICAL ASSOCIATION, 1994, 272 (03): : 187 - 189