The Protection of Personally Identifiable Information

SCRIPT-ed ◽  
2007 ◽  
Vol 4 (4) ◽  
pp. 389-406
Author(s):  
Deliang Liu
Drones ◽  
2021 ◽  
Vol 5 (2) ◽  
pp. 49
Author(s):  
Miloš Stanković ◽  
Mohammad Meraj Mirza ◽  
Umit Karabiyik

Rapid technology advancements, especially in the past decade, have allowed off-the-shelf unmanned aerial vehicles (UAVs) that weigh less than 250 g to become available for recreational use by the general population. Many well-known manufacturers (e.g., DJI) are now focusing on this segment of UAVs, and the new DJI Mini 2 drone is one of many that falls under this category, which enables easy access to be purchased and used without any Part 107 certification and Remote ID registration. The versatility of drones and drone models is appealing for customers, but they pose many challenges to forensic tools and digital forensics investigators due to numerous hardware and software variations. In addition, different devices can be associated and used for controlling these drones (e.g., Android and iOS smartphones). Moreover, according to the Federal Aviation Administration (FAA), the adoption of Remote ID is not going to be required for people without the 107 certifications for this segment at least until 2023, which creates finding personally identifiable information a necessity in these types of investigations. In this research, we conducted a comprehensive investigation of DJI Mini 2 and its data stored across multiple devices (e.g., SD cards and mobile devices) that are associated with the drone. The aim of this paper is to (1) create several criminal-like scenarios, (2) acquire and analyze the created scenarios using leading forensics software (e.g., Cellebrite and Magnet Axiom) that are commonly used by law enforcement agencies, (3) and present findings associated with potential criminal activities.


2020 ◽  
pp. 0032258X2096858
Author(s):  
Alexander E Carter ◽  
Mariea Hoy ◽  
Betsy Byrne DeSimone

Despite law enforcement’s best efforts to use social media as a means of community policing, some engagement tactics may lead citizens to disclose personally identifiable information (PII). We coded 200 tweets with the popular #9PMRoutine that tagged @PascoSheriff (Florida) for participant PII. We found numerous postings of adults’ and children’s PII that are problematic including pictures, health information and security-related comments about their routines or vacations. Implications for law enforcement to protect their communities are discussed as well as opportunities to continue to cultivate their online relationships in a more secure forum. We also provide future research directions.


Author(s):  
Amanda Cox ◽  
Yeslam Al-Saggaf ◽  
Kate McLean

Social networking users are presented with a plethora of profile and privacy settings; most of which are left defaulted. As a result, there is little understanding of the fields that make up the user profile, the privacy settings available to safeguard the user, and the ramifications of not changing the same. Concerns relating to the unprecedented quantities of Personally Identifiable Information being stored need to be addressed. By employing a risk matrix to a social media profile, a user could be alerted to the potential dangers of the information being contained within the profile. By adapting this tool, the risks to the individual user of a social media profile will be minimised.


2021 ◽  
pp. 327-347
Author(s):  
Fred Cate ◽  
Rachel Dockery

This chapter discusses cybersecurity laws. Many measures employed to enhance cybersecurity pose a risk to privacy. In addition, data protection laws focus only on personally identifiable information, while cybersecurity is also concerned with securing economic data such as trade secrets and company databases, government information, and the systems that transmit and process information. As a practical matter, despite the prominence of security obligations in data protection legislation, these were often downplayed or ignored entirely until recent years. Only as cybersecurity threats became more pressing did regulators begin actively enforcing the security obligations found in most data protection laws. More recently, legislative bodies and regulators have begun adopting cybersecurity-specific obligations. However, even these have often mirrored or been combined with privacy protections, sometimes to the detriment of effective cybersecurity. The chapter describes major categories of cybersecurity law, including unfair or deceptive practices legislation, breach notification laws, and data destruction laws. It also considers the new focus on critical infrastructure and information sharing, the China Cybersecurity Law, and the new challenges to data privacy and security law.


Sign in / Sign up

Export Citation Format

Share Document