Regulating Privacy by Design
Electronic copy available at: http://ssrn.com/abstract=1837862 1 DRAFT: PLEAS E DO NOT CITE WITHOUT AUTHOR’S PERM ISSION REGULATING PRIVACY B Y D ESIGN Ira S. R ubinste in* Privac y o ffic ia ls in Europe a nd the US a re e mb rac ing ―p rivac y b y de sign‖ a s ne […]
Privacy’s-Other-Path
Privacy’s Other Path: Recovering the Law of Confidentiality NEIL M. R ICHARDS *&D ANIEL J. S OLOVE ** The familiar legend of privacy law holds that Samuel Warren and Louis Brandeis “invented” the right to privacy in 1890, and that William Prosser aided its develop- ment by recognizing four privacy torts in 1960. In this […]
Redesigning IP Geolocation Privacy by Design and Online Targeted Advertising
October 2010 Redesigning IP Geolocation: Privacy by Design and Online Targeted Advertising Information and Privacy Commissioner, Ontario, Canada With contributions from: Ann Cavoukian, Ph.D. 416-326-3333 1-800-387-0073 Fax: 416-325-9195 TTY (Teletypewriter): 416-325-7539 Website: www.ipc.on.ca Privacy by Design: www.privacybydesign.ca 2 Bloor Street East Suite 1400 Toronto, Ontario M4W 1A8 Canada Information and Privacy Commissioner, Ontario, Canada Acknowledgements […]
Privacy_Government
SOLO 10.DOC 9/3/02 8:49 AM DIGITAL DOSSIERS AND THE DISSIPATION OF FOURTH AMENDMENT PRIVACY DANIEL J. S OLOVE * I. INTRODUCTION …………………………………………………………………… 1084 II. GOVERNMENT INFORMATION GATHERING AND THE PRIVATE SECTOR …………………………………………………………… 1089 A. T HIRD PARTY RECORDS AND THE GOVERNMENT ……………………….. 1089 B. G OVERNMENT -PRIVATE SECTOR INFORMATION FLOWS ………………. 1095 C. T HE […]
On Privacy Liberty in the Digital Revolution
ON PRIVACY: LIBERTY IN THE DIGITAL REVOL UTION Christina M. Gagnier * Cite as 11 J. HIGH TECH . L. 229 (2011) In the dorm room of some college freshman Political Science major at Any College U.S.A is a copy of John Stuart Mill’s On Liberty shoved under the bed. 1 Mill’s On Liberty , […]
People_Can_Be_So_Fake
Penn State Law Review Winter, 2010 Articles *809 PEOPLE CAN BE SO FAKE: A NEW DIMENSION TO PRIVACY AND TECHNOLOGY SCHOLARSHIP M. Ryan Calo [FNa1] Copyright (c) 2010 The Dickensen School of Law of The Pennsylvania State University; M. Ryan Calo This article updates the traditional discussion of privacy and technology, focused since the days […]
Model-Privacy-Regime
SOLOVE .DOC 2/2/2006 4:27:56 PM 357 A MODEL REGIME OF PRIVACY PROTECTION Daniel J. Solove* Chris Jay Hoofnagle** A series of major security breaches at companies with sensitive personal information has sparked significant attention to the prob- lems with privacy protection in the United States. Currently, the pri- vacy protections in the United States are […]
Narayanan-Ethical-Considerations-for-Web-based-Censorship-Measurement1
No Encore for Encore? Ethical questions for web -based censorship measurement 1 ARVIND NARAYANAN , BENDERT ZEVENBERGEN Abstract A pair of computer scientists recently developed a clever way to measure Internet filtering and censorship worldwide, including countries such as China and Iran. Their system, named Encore, does this by executing a snippet of code on […]
MacCarthy-PLSC-Paper-June-10
1 New Directions in Privacy: Disclosure, Unfairness and Externalities Privacy Law Scholars Conference June 2010 Mark MacCarthy Georgetown University ―…the solution to regulating information flow is not to radically curtail the collection of information, but to regulate uses.‖ 1 I. INTRODUCTION Several developments in 2009 and 2010 underscore d a return of public concerns about […]
Just_Click_Submit_ The_Collection,_Dissemination_and_Tagging_of
J UST C LICK S UBMIT T HE C OLLECTION , D ISSEMINATION AND T AGGING OF P ERSONALLY IDENTIFYING INFORMATION As the twenty-first century bustles forward, the e-commerce becomes an ever more dangerous place. On a daily basis, websites collect vast amounts of pe rsonally identifying information (PII) and mine it in sophisticated databases […]