Access the full text.
Sign up today, get DeepDyve free for 14 days.
P Ohm (2008)
The myth of the superuser. Fear, risk, and harm onlineUC Davis Law Rev, 41
(2010)
Archives and collective memory. More than a metaphor, less than an analogy
Paul Ohm (2009)
Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization
Floora Ruokonen, Miia Vistilä (2012)
Social networking sites and privacy as contextual integrity
(1983)
Obstacles to the access, use and transfer of information from archives: a RAMP study
J. Ausloos (2012)
The 'Right to be Forgotten' - Worth remembering?Comput. Law Secur. Rev., 28
R. Warner (1993)
: Without Consent: The Ethics of Disclosing Personal Information in Public ArchivesThe Library Quarterly
J. Rauhofer (2014)
‘Look to yourselves, that we lose not those things which we have wrought.’ What do the proposed changes to the purpose limitation principle mean for public bodies' rights to access third-party data?International Review of Law, Computers & Technology, 28
M Pasquier, JP Villeneuve (2007)
Organizational barriers to transparency: a typology and analysis of organizational behaviour tending to prevent or restrict access to informationInt Rev Adm Sci, 73
(2010)
The ethical archivist. Society of American Archivists
M. Hedstrom (1986)
NAUGLER, The Archival Appraisal of Machine-Readable Records: A RAMP Study with GuidelinesArchivaria, 22
R. Weber (2011)
The right to be forgotten: more than a pandora's box?, 2
(2000)
How to Proceed ? Presenting the results of a working meeting on Recordkeeping Metadata . Summary
R. Gellman (2017)
Fair Information Practices: A Basic History - Version 2.20Social Science Research Network
M. Hedstrom (2001)
Recordkeeping metadata. Presenting the results of a working meetingArchival Science, 1
(2016)
Anonymisation: managing data protection risk
(2012)
Asiakirjojen seulonnasta ja julkisuudesta tutkimuksen edellytyksiä säätelevinä tekijöinä [ Archival appraisal and access to documents as factors defining conditions of research ]
The ‘ ‘ re - identification ’ ’ of Governer William Weld ’ s medical information . A critical re - examination of health data identification risks and privacy protections , then an now
Iván Székely (2014)
The Right to be Forgotten and the New Archival Paradigm
(2012)
Selvitys henkilörekistereihin sisältyvien tietojen säilyttämisestä ja poistamisesta [ Report about destruction and preservation of personal data ]
(2014)
Digitalization and digitization
Code of practice. Wilmslow, Information Commisioner's Office
(2007)
Organizational barriers to transparency: a typology and analysis
D. Bearman (1992)
COOK, The Archival Appraisal of Records Containing Personal Information: A RAMP Study with GuidelinesArchivaria, 34
G. Greenleaf (2012)
The Influence of European Data Privacy Standards Outside Europe: Implications for Globalisation of Convention 108International Data Privacy Law, 2
JP Hubaux, A Juels (2016)
Privacy is dead, long live privacy. Protecting social norms as confidentiality wanesCommun ACM, 59
A Flinn, H Jones (2009)
Freedom of information. Open access, empty archives?
Privacy is not a rose
J. Mai (2016)
Personal information as communicative actsEthics and Information Technology, 18
Iván Székely (2010)
The Four Paradigms of Archival HistoryJ. Inf. Technol. Res., 3
Maryanne Dever (2012)
The Private in the Public Archive
J Maanen, TB Pentland (1994)
Cops and auditors: the rhetoric of records
(2003)
An integrated approach to records management
T Jacobsen, RL Punzalan, ML Hedstrom (2013)
Invoking “collective memory”: mapping the emergence of a concept in archival scienceArch Sci, 13
Daniel Solove (2013)
Introduction: Privacy Self-Management and the Consent DilemmaHarvard Law Review, 126
H Naugler (1984)
The Archival appraisal of machine-readable records: a RAMP study with guidelines
H. MacNeil (1991)
Defining the Limits of Freedom of inquiry: The Ethics of Disclosing Personal information held in Government ArchivesArchivaria, 32
R. Gellman (2014)
Willis Ware's Lasting Contribution to Privacy: Fair Information PracticesIEEE Security & Privacy, 12
B. Worthy (2010)
More Open but Not More Trusted? The Effect of the Freedom of Information Act 2000 on the United Kingdom Central GovernmentGovernance, 23
DJ Solove, RE Scott (2006)
A taxonomy of privacyUniv Pa Law Rev, 154
Paul Ohm (2007)
The Myth of the Superuser: Fear, Risk, and Harm OnlineEconomics of Networks
ES Danielson (2010)
The ethical archivist
United Nations (1948) Universal declaration of human rights
(2016)
Currents of archival thinking. ABC Clio, Santa Barbara, pp 163–180
J. Schonscheck (1997)
Privacy and Discrete "Social Spheres"Ethics & Behavior, 7
H Nissenbaum (1998)
Protecting privacy in an information age: the problem of privacy in publicLaw Philos, 17
E. Ketelaar (1995)
The right to know, the right to forget? Personal information in public archives
Gordon Hull (2015)
Successful failure: what Foucault can teach us about privacy self-management in a world of Facebook and big dataEthics and Information Technology, 17
J. Glanville (2011)
Privacy is dead! : long live privacy
JB Young (1978)
Privacy
E. Shepherd (2015)
Freedom of Information, Right to Access Information, Open Data: Who is at the Table?The Round Table, 104
S. Bingo (2011)
Of Provenance and Privacy: Using Contextual Integrity to Define Third-Party PrivacyAmerican Archivist
A. Flinn, H. Jones (2009)
The Freedom of Information Act in practice: the historian’s perspective
P. Schwartz, Daniel Solove (2011)
The PII Problem: Privacy and a New Concept of Personally Identifiable InformationNew York University Law Review, 86
(1950)
Skoglar Bergström och gallringen i Svea Hovrätts arkiv [ Skoglar Bergstrom and appraisal of the archives of the Svea Court of Appeal ]
W. Ware (1981)
A Taxonomy for Privacy
Viktor Mayer-Schönberger (2009)
Delete: The Virtue of Forgetting in the Digital Age
S. Xie (2016)
Retention in “the right to be forgotten” scenario: a records management examinationRecords Management Journal, 26
(1994)
Revealing privacy. Debating the understandings of privacy
M Hedstrom (2010)
Currents of archival thinking
Trond Jacobsen, Ricardo Punzalan, M. Hedstrom (2013)
‘ collective memory ’ ’ : mapping the emergence of a concept in archival science
M. Hedstrom (2016)
COMPUTERS, PRIVACY, AND RESEARCH ACCESS TO CONFIDENTIAL INFORMATION
Re-identification risks and myths, superusers and super stories (part II: superusers and super stories
Bert-Jaap Koops (2011)
Forgetting Footprints, Shunning Shadows: A Critical Analysis of the 'Right to Be Forgotten' in Big Data Practice, 8
People feel that their privacy is violated when information about them is passed inappropriately from one context or social sphere to another. This makes records and archives management a focal point of privacy issues, because its goal is to transfer information from one context, place, and point in time to other contexts, places, and points in time. Society has a number of mechanisms (“strategies”) for protecting the privacy of people. The article examines five of them (purpose limitation, privacy self-management and right to be forgotten, destruction, anonymization, and information safe haven approach) and the limits they set to the contextual transfer of information. If the strategies are implemented in society without regard for archival needs, archives have difficulties in fulfilling their functions in society. Therefore, records professionals should make their point of view known when privacy issues are discussed. Records professionals also should be aware of the mutability of the category of personally identifiable information and the changing nature of privacy issues in the digital environment.
Archival Science – Springer Journals
Published: Jul 7, 2017
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.