• Home
  • Blog
  • Southern New Hampshire University Privacy Policies Case Study

Southern New Hampshire University Privacy Policies Case Study

0 comments

A common skill for a cybersecurity analyst is the evaluation of current scholarly articles. Analyzing the findings within those articles develops skills that will help

protect data. Evaluating privacy laws and regulations helps the analyst form baselines for policies within organizations. Choose one of the following articles to

After reading your selected article, address the following critical elements:

I. Analyze the issues within the article related to privacy.

II. Describe the regulations or laws within the article that play a role in the protection of privacy.

III. Explain your opinions on the conclusion of the article. Consider these questions:

                                   – Is the conclusion comprehensive?

                                    – Do you agree with the conclusion?

                                    – Are there areas that could be improved upon?

Privacy, Notice, and Design

particular, the design of built online environments can constrain our ability to understand
and  respond to websites' data use practices or it can enhance agency by giving us control
over  information. This Article is the first comprehensive theoretical and empirical
approach to the design of privacy policies.
     Privacy policies today do not convey information in a way understandable to most
internet users. This is because they are created without the needs of real people in mind.
They  are written by lawyers and for lawyers, and they ignore the way most of us make
disclosure decisions online. They  also ignore the effects of design, aesthetics, and
presentation on our decision-making. This Article argues that in addition to focusing on
content, privacy regulators must also consider the ways that privacy policy design-the
artistic and structural choices that frame and present a company 's privacy terms to the
public-can  manipulate  or coerce users into making  risky privacy choices.

? The Surveillance Gap: The Harms of Extreme Privacy and Data Marginalization

 We live in an age of unprecedented surveillance, enhanced by modem
technology, prompting some to suggest that privacy is dead. Previous scholarship
suggests that no subset of the population feels this phenomenon more than
marginalized communities. Those who rely on public benefits, for example, must
turn over personal information and submit to government surveillance far more
routinely than wealthier citizens who enjoy greater opportunity to protect their
privacy and the ready funds to secure it. This article illuminates the other end of
the spectrum, arguing that many individuals who may value government and
nonprofit services and legal protections fail to enjoy these benefits because they
reside in a "surveillance gap." These people include undocumented immigrants,
day   laborers, homeless persons, and     people   with  felony   conviction
histories suffering collateral consequences of their convictions. Members of these
groups often remain outside of the mainstream data flows and institutional
attachments necessary to flourish in American society. The harms that
surveillance gap residents experience can be severe, such as physical and mental
health injuries and lack of economic stability, as well as data marginalization and
resulting invisibility to policymakers. In short, having too much privacy can be as
injurious as having too little.
    The sources of the surveillance gap range from attempts to contain and control
marginalized groups to data silos to economic exploitation. This article explores
the boundaries of the surveillance gap, evaluates how this emerging concept fits
within existing privacy paradigms and theoretical frameworks, and suggests
possible solutions to enhance the autonomy and dignity of marginalized people
within the surveillance gap.

? Privacy and Cybersecurity Lessons at the Intersection of the Internet of Things and Police Body-Worn Cameras

Prepared for the North Carolina Law Review symposium on
   police body-worn cameras ("BWCs"), this Article shows that
   BWCs can be conceptualized as an example of the Internet of
   Things ("Io T"). By combining the previously separate literatures
   on BWCs and loT, this Article shows how insights from each
   literature apply to the other.

   Part I adopts the loT definition of (1) a sensor connected to the
   Internet that (2) stores and/or processes data remotely, typically
   in the cloud. Applied to BWCs, the camera is a sensor, and the
   video footage and related data are stored outside of the original
   camera, often in the cloud.

   Building on this equivalence of BWCs and loT, Part II examines
   lessons from the substantial IoT literature for BWC privacy and
   cybersecurity. Part I systematically examines leading industry
   standards and Federal Trade Commission guidance that could be
   used to develop applicable criteria for good practice for BWCs.
   Analysis   of  this  literature suggests  three  themes   for
   operationalizing these best practices. First, police departments
   can and should learn from the Io T literature to improve privacy
   and cybersecurity for BWCs. Second, police departments should
   use their bargaining power to demand security and privacy best
 

About the Author

Follow me


{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}