Privacy_Government
SOLO 10.DOC 9/3/02 8:49 AM DIGITAL DOSSIERS AND THE DISSIPATION OF FOURTH AMENDMENT PRIVACY DANIEL J. S OLOVE * I. INTRODUCTION …………………………………………………………………… 1084 II. GOVERNMENT INFORMATION GATHERING AND THE PRIVATE SECTOR …………………………………………………………… 1089 A. T HIRD PARTY RECORDS AND THE GOVERNMENT ……………………….. 1089 B. G OVERNMENT -PRIVATE SECTOR INFORMATION FLOWS ………………. 1095 C. T HE […]
Privacy Regulation and Online Advertising
Electronic copy available at: http://ssrn.com/abstract=1600259Electronic copy available at: http://ssrn.com/abstract=1600259Privacy Regulation and Online Advertising Avi Goldfarb and Catherine E. Tucker August 5, 2010 Abstract Advertisers use online customer data to target their marketing appeals. This has heightened consumers’ privacy concerns, leading governments to pass laws designed to protect consumer privacy by restricting the use of […]
On Privacy Liberty in the Digital Revolution
ON PRIVACY: LIBERTY IN THE DIGITAL REVOL UTION Christina M. Gagnier * Cite as 11 J. HIGH TECH . L. 229 (2011) In the dorm room of some college freshman Political Science major at Any College U.S.A is a copy of John Stuart Mill’s On Liberty shoved under the bed. 1 Mill’s On Liberty , […]
People_Can_Be_So_Fake
Penn State Law Review Winter, 2010 Articles *809 PEOPLE CAN BE SO FAKE: A NEW DIMENSION TO PRIVACY AND TECHNOLOGY SCHOLARSHIP M. Ryan Calo [FNa1] Copyright (c) 2010 The Dickensen School of Law of The Pennsylvania State University; M. Ryan Calo This article updates the traditional discussion of privacy and technology, focused since the days […]
MacCarthy-PLSC-Paper-June-10
1 New Directions in Privacy: Disclosure, Unfairness and Externalities Privacy Law Scholars Conference June 2010 Mark MacCarthy Georgetown University ―…the solution to regulating information flow is not to radically curtail the collection of information, but to regulate uses.‖ 1 I. INTRODUCTION Several developments in 2009 and 2010 underscore d a return of public concerns about […]
Model-Privacy-Regime
SOLOVE .DOC 2/2/2006 4:27:56 PM 357 A MODEL REGIME OF PRIVACY PROTECTION Daniel J. Solove* Chris Jay Hoofnagle** A series of major security breaches at companies with sensitive personal information has sparked significant attention to the prob- lems with privacy protection in the United States. Currently, the pri- vacy protections in the United States are […]
Narayanan-Ethical-Considerations-for-Web-based-Censorship-Measurement1
No Encore for Encore? Ethical questions for web -based censorship measurement 1 ARVIND NARAYANAN , BENDERT ZEVENBERGEN Abstract A pair of computer scientists recently developed a clever way to measure Internet filtering and censorship worldwide, including countries such as China and Iran. Their system, named Encore, does this by executing a snippet of code on […]
Just_Click_Submit_ The_Collection,_Dissemination_and_Tagging_of
J UST C LICK S UBMIT T HE C OLLECTION , D ISSEMINATION AND T AGGING OF P ERSONALLY IDENTIFYING INFORMATION As the twenty-first century bustles forward, the e-commerce becomes an ever more dangerous place. On a daily basis, websites collect vast amounts of pe rsonally identifying information (PII) and mine it in sophisticated databases […]
Identities Evolve Why Federated Identity is Easier Said Than Done
Copyright © 2011 Lockstep Consulting Pty Ltd 1 Lockstep AusCERT 2011 Identities Evolve (1.1).docx Identities Evolve Why federated identity is easier said than done Stephen Wilson Lockstep Consulting Pty Ltd, Australia [email protected] AusCERT 2011 Conference: “Overexposed” May 2011, Gold Coast, Austra lia Abstract Why does digital identity turn out to be such a hard problem? […]
Gutting_the_Privacy_Act
Gutting the Privacy Act: Agency use of Systems of Records Notices (SORNs) Wordcount: 13,831 with footnotes “By requiring open rule making with the receipt of comments and an agency statement explaining the exception for certain categories of records, the Congress was trying to avoid creation of a loophole which would permit ent ire agencies to avoid compliance with the Act.” 1 “The agency’s broad interpretation would bring thro ugh the back door a provision expressly omitted from the Act as approved by Congr ess and signed into law.” 2 1 James H. Davidson, The Privacy Act of 1974—Exceptions and Exemptions , 34 F ED . BAR J. 279 (1975), available in L EGISLATIVE HISTORY OF THE PRIVACY ACT OF 1974, S OURCE BOOK ON PRIVACY , 1191, 1193 (1976) [hereinafter Davidson Privacy Act]. 2 Vymetalik v. F.B.I. , 785 F.2d 1090, 1095 (C.A.D.C. 1986). […]