The_Privacy_Matrix
*Assistant Professor at the Daniels College of Business in the Department of BusinessEthics and Legal Studies, University of Denver.245THE PRIVACY MATRIXCorey Ciocchetti*I. INTRODUCTION………………………………246II. THE PRIVACY MATRIX………………………….249III. E-THREATS AT THE FRONT DOOR (PII COLLECTION) …….251A. Internally-Created “Front Door” E-Threats………..254B. Externally-Created “Front Door” E-Threats……….262C. U.S. Law Operating at the Front Door……………2651.Privacy Policies Must beStandardized and Multilayered……………….2672.Privacy Policies […]
To Track Or Not To Track
1 To Track or “Do Not Track”: Advancing Transparency and =ndividual Control in Online Behavioral Advertising Omer Tene 1 and Jules Polonetsky 2 Table of Contents 1. Introduction ………………………….. ………………………….. ………………………….. ……………………….. 2 2. Online tracking devices ………………………….. ………………………….. ………………………….. ……….. 3 2.1. Cookies ………………………….. ………………………….. ………………………….. ………………………….. 4 2.2. Flash Cookies ………………………….. ………………………….. ………………………….. […]
Workplace Privacy and Monitoring The Quest for Balanced Interests
W ORKPLACE PRIVACY AND M ONITORING : THE Q UEST FOR BALANCED INTERESTS Ariana R. Levinson* I. Introduction We all are aware at this point that we have rapidly advancing technology. It’s advancing faster than it has in previous times, and this creates what Kat hy Stone at the UCLA Schoo l of Law has […]
Toward a Cohesive Interpretation of the Electronic Communications Privacy Act for the Electronic Monitoring of Employees
Draft June 16 , 2011 Forthcoming 114 West Virginia Law R eview * Assistant Professor, University of Louisville, Louis D. Brandeis School of Law; J.D., University of Michigan. The author extends thanks to the many scholars who helped with this piece. The author cannot overstate her appreciation for Nancy Levit ‘s review of earlier drafts. […]
The PII Problem Privacy and a New Concept of Personally Identifiable Information
07/08/11 PII ARTICLE FINAL FPF P LEASE DO NOT CITE OR C IRCULATE WITHOUT PERMISSION Forthcoming NYU LAW REVIEW (2011) THE PII PROBLEM: P R IVACY AND A NEW CONCEPT OF PERSONALLY IDENTIFIABLE INFORMATION by Paul M. Schwartz & Daniel J. Solove 2 T HE PII PROBLEM: PRIVACY AND A NEW CONCEPT OF PERSONALLY IDENTIFIABLE […]
The Failure of Online Social Network Privacy Settings
The Failure of Online Social Network Privacy Settings Michelle Madejski y [email protected] Maritza Johnson maritza [email protected] Steven M. Bellovin [email protected] CUCS-010-11 Abstract Increasingly, people are sharing sensitive personal information via online social networks (OSN). While such networks do permit users to control what they share with whom, access control policies are notoriously dicult to […]
The Case for Online Obscurity
T HE C ASE FOR O NLINE O BSCURITY Woodrow Hartzog * and Fred eric Stutzman ** ABSTRACT: On the Internet, obscure information has a minimal risk of being discovered or understood by unintended recipients. Empirical research demonstrates that I nternet users rely on obscurity perhaps more than anything else to protect their privacy . […]
Social_Network_Theory_of_Privacy
72 U. Chi. L. Rev. 919 University of Chicago Law Review Summer 2005 Article *919 A SOCIAL NETWORKS THEORY OF PRIVACY Lior Jacob Strahilevitz [FNd1] Copyright © 2005 University of Chicago; Lior Jacob Strahilevitz What facts are public and what facts are private? I t is the fundamental, first-principles question in privacy law, and a necessary element in the two most important privacy torts, public disclosure of private facts and intrusion upon secl usion. This paper argues that insights from the literature on social networks and information disse […]
Repairing_Online_Reputation
Repairing Online Reputation: A New Multi-Modal Regulatory Approach Jacqueline D Lipton, Ph.D. * Abstract In today’s interconnected digital society, high pro file examples of online abuses abound. Cyberbullies lau nch attacks on the less powerful, often significantly d amaging victims’ reputations. Outside of reputational dam age, online harassment, bullying and stalking has led to severe emotional distress, loss of employment, physical assault and even death. Recent scholarship has identified this phenomenon b ut has done little more than note that current […]
Relational_Surveillance_Final
1 FREEDOM OF ASSOCIATION IN A NETWORKED WORLD: FIRST AMENDMENT REGULATION OF RELATIONAL SURVEILLANCE Katherine J. Strandburg * Abstract: Recent controversies about the National Security Ag ency’s war- rantless wiretapping of international calls have ov ershadowed equally dis- turbing allegations that the government has acquire d access to a huge da- tabase of domestic call traffic data, revealing inf ormation about times, dates, and numbers called. Although communication c ontent tradition- ally has been the primar y focus of concern about […]