Privacy’s-Other-Path
Privacy’s Other Path: Recovering the Law of Confidentiality NEIL M. R ICHARDS *&D ANIEL J. S OLOVE ** The familiar legend of privacy law holds that Samuel Warren and Louis Brandeis “invented” the right to privacy in 1890, and that William Prosser aided its develop- ment by recognizing four privacy torts in 1960. In this […]
Privacy_Government
SOLO 10.DOC 9/3/02 8:49 AM DIGITAL DOSSIERS AND THE DISSIPATION OF FOURTH AMENDMENT PRIVACY DANIEL J. S OLOVE * I. INTRODUCTION …………………………………………………………………… 1084 II. GOVERNMENT INFORMATION GATHERING AND THE PRIVATE SECTOR …………………………………………………………… 1089 A. T HIRD PARTY RECORDS AND THE GOVERNMENT ……………………….. 1089 B. G OVERNMENT -PRIVATE SECTOR INFORMATION FLOWS ………………. 1095 C. T HE […]
Privacy Regulation and Online Advertising
Electronic copy available at: http://ssrn.com/abstract=1600259Electronic copy available at: http://ssrn.com/abstract=1600259Privacy Regulation and Online Advertising Avi Goldfarb and Catherine E. Tucker August 5, 2010 Abstract Advertisers use online customer data to target their marketing appeals. This has heightened consumers’ privacy concerns, leading governments to pass laws designed to protect consumer privacy by restricting the use of […]
People_Can_Be_So_Fake
Penn State Law Review Winter, 2010 Articles *809 PEOPLE CAN BE SO FAKE: A NEW DIMENSION TO PRIVACY AND TECHNOLOGY SCHOLARSHIP M. Ryan Calo [FNa1] Copyright (c) 2010 The Dickensen School of Law of The Pennsylvania State University; M. Ryan Calo This article updates the traditional discussion of privacy and technology, focused since the days […]
On Privacy Liberty in the Digital Revolution
ON PRIVACY: LIBERTY IN THE DIGITAL REVOL UTION Christina M. Gagnier * Cite as 11 J. HIGH TECH . L. 229 (2011) In the dorm room of some college freshman Political Science major at Any College U.S.A is a copy of John Stuart Mill’s On Liberty shoved under the bed. 1 Mill’s On Liberty , […]
Narayanan-Ethical-Considerations-for-Web-based-Censorship-Measurement1
No Encore for Encore? Ethical questions for web -based censorship measurement 1 ARVIND NARAYANAN , BENDERT ZEVENBERGEN Abstract A pair of computer scientists recently developed a clever way to measure Internet filtering and censorship worldwide, including countries such as China and Iran. Their system, named Encore, does this by executing a snippet of code on […]
Model-Privacy-Regime
SOLOVE .DOC 2/2/2006 4:27:56 PM 357 A MODEL REGIME OF PRIVACY PROTECTION Daniel J. Solove* Chris Jay Hoofnagle** A series of major security breaches at companies with sensitive personal information has sparked significant attention to the prob- lems with privacy protection in the United States. Currently, the pri- vacy protections in the United States are […]
Gutting_the_Privacy_Act
Gutting the Privacy Act: Agency use of Systems of Records Notices (SORNs) Wordcount: 13,831 with footnotes “By requiring open rule making with the receipt of comments and an agency statement explaining the exception for certain categories of records, the Congress was trying to avoid creation of a loophole which would permit ent ire agencies to avoid compliance with the Act.” 1 “The agency’s broad interpretation would bring thro ugh the back door a provision expressly omitted from the Act as approved by Congr ess and signed into law.” 2 1 James H. Davidson, The Privacy Act of 1974—Exceptions and Exemptions , 34 F ED . BAR J. 279 (1975), available in L EGISLATIVE HISTORY OF THE PRIVACY ACT OF 1974, S OURCE BOOK ON PRIVACY , 1191, 1193 (1976) [hereinafter Davidson Privacy Act]. 2 Vymetalik v. F.B.I. , 785 F.2d 1090, 1095 (C.A.D.C. 1986). […]
First_Generation_Laws
1 PRIVACY INVASIVE GEO -MASHUPS: PRIVACY 2.0 AND THE LIMITS OF FIRST GENERATION INFORMATI ON PRIVACY LAWS Mark Burdon † ABSTRACT Online technological advances are pioneering the wider distribution of geospatial information for general mapping purposes. The use of popular web – based applications, such as Google Maps, is ensuring that mapping based applications are […]
Jetten-Sharon-Selected-Issues-Concerning-the-Ethical-Use-of-Big-Data
Selected Issues Concerning the Ethical Use of Big Data Health Analytics I. Introduction a. Big Data Generally T he terms Big Data and Big Data analytics originally derive from the terms artificial intelligence, business intelligence , and business analytics ; terms used in the 1950s, 1990s, and 2000s, respectively . 1 Although some argue that […]