Privacy's blueprint : the battle to control the design of new technologies / Woodrow Hartzog.
2018
KF1262 .H37 2018 (Map It)
On loan from Cellar, due 20. Dec 2024
Formats
Format | |
---|---|
BibTeX | |
MARCXML | |
TextMARC | |
MARC | |
DublinCore | |
EndNote | |
NLM | |
RefWorks | |
RIS |
Items
Details
Title
Privacy's blueprint : the battle to control the design of new technologies / Woodrow Hartzog.
Published
Cambridge, Massachusetts : Harvard University Press, 2018.
Copyright
©2018
Call Number
KF1262 .H37 2018
ISBN
9780674976009 hardcover alkaline paper
0674976002 hardcover alkaline paper
0674976002 hardcover alkaline paper
Description
x, 366 pages : illustrations ; 25 cm
System Control No.
(OCoLC)1006480637
Summary
Every day, Internet users interact with technologies designed to undermine their privacy. Social media apps, surveillance technologies, and the Internet of things are all built in ways that make it hard to guard personal information. And the law says this is okay because it is up to users to protect themselves--even when the odds are deliberately stacked against them. In Privacy's Blueprint, Woodrow Hartzog pushes back against this state of affairs, arguing that the law should require software and hardware makers to respect privacy in the design of their products. Current legal doctrine treats technology as though it were value-neutral: only the user decides whether it functions for good or ill. But this is not so. As Hartzog explains, popular digital tools are designed to expose people and manipulate users into disclosing personal information. Against the often self-serving optimism of Silicon Valley and the inertia of tech evangelism, Hartzog contends that privacy gains will come from better rules for products, not users. The current model of regulating use fosters exploitation. Privacy's Blueprint aims to correct this by developing the theoretical underpinnings of a new kind of privacy law responsive to the way people actually perceive and use digital technologies. The law can demand encryption. It can prohibit malicious interfaces that deceive users and leave them vulnerable. It can require safeguards against abuses of biometric surveillance. It can, in short, make the technology itself worthy of our trust.-- Provided by publisher.
Bibliography, etc. Note
Includes bibliographical references and index.
Record Appears in
Gift
Purchased from the income of the Silver Fund
Gift

The Arthur W. Diamond Law Library
Purchased from the income of the Silver Fund
Table of Contents
Preface
ix
Introduction: Designing Our Privacy Away
1
pt. ONE
Case for Taking Design Seriously in Privacy Law
1.
Why Design Is Everything
21
2.
Privacy Law's Design Gap
56
pt. TWO
Design Agenda for Privacy Law
3.
Privacy Values in Design
93
4.
Setting Boundaries for Design
120
5.
Tool Kit for Privacy Design
157
pt. THREE
Applying Privacy's Blueprint
6.
Social Media
197
7.
Hide and Seek Technologies
230
8.
Internet of Things
260
Conclusion
276
Notes
281
Acknowledgments
355
Credits
359
Index
361