Schwartz_Information Privacy in the Cloud
(1623) ARTICLE INFORMATION PRIVACY IN THE CLOUD PAUL M. SCHWARTZ † INTRODUCTION …………………………………………………………………. 1624 I. T HE USE OF THE CLOUD ……………………………………………….. 1626 A. International Processing of Personal Data……………………………….. 1628 B. Networked Data Processes …………………………………………………. 1630 C. Modular Units and Outsourced Services ………………………………… 1632 II. T HE M ISMATCH WITH INFORMATION PRIVACY LAW ………….. 1634 […]
Schwartz_EU-US Privacy Collision
1966 THE EU-U.S. PRIVACY COLLISION: A TURN TO INSTITUTIONS AND PROCEDURES Pa u l M . S c h w a r t z ∗ I. INTRODUCTION Internet scholarship in the United States generally concentrates on how decisions made in this country about copyright law, network neu- trality, and other policy areas shape cyberspace. 1 In one important as- pect of the evolving Internet, however, a comparative focus is indis- pensable. Legal forces outside the United States have significantly shaped the governance of information privacy, a highly important as- pect of cyberspace, and one involving central issues of civil liberties. The EU has played a major role in international decisions involving information privacy, a role that has been bolstered by the authority of EU member states to block data transfers to third party nations, in- cluding the United States. 2 The European Commission’s release in late January 2012 of its proposed “General Data Protection Regulation” (the Proposed Regula- tion) provides a perfect juncture to assess the ongoing EU-U.S. privacy collision. 3 An intense debate is now occurring about critical areas of information policy, including the rules for lawfulness of personal pro- cessing, the “right to be forgotten,” and the conditions for data flows between the EU and the United States. This Article begins by tracing the rise of the current EU-U.S. pri- vacy status quo. The European Commission’s 1995 Data Protection Directive (the Directive) staked out a number of bold positions, includ- ing a limit on international data transfers to countries that lacked “ad- equate” legal protections for personal information. 4 The impact of the […]
Schwartz & Solove_Reconciling Personal Information in the US and EU
R ECONCILING P ERSONAL INFORMATION IN THE U NITED S TATES AND E UROPEAN U NION B y Paul M. Schwartz * Daniel J. Solove ** May 3, 2013 EXECUTIVE SUMMARY …………………………………………………………………………………………… 3 I. INTRODUCTION ……………………………………………………………………………………………………. 5 II. DEFINING PII ON BOTH SIDES OF THE ATLANTIC …………………………………………. 6 A. THE EU: FRO M THE DIRECTIVE […]
Richards_Data Privacy, Speech, and the Right to Be Forgotten After Sorrell
Data Privacy, Speech, and the Right to Be Forgotten After Sorrell Neil M. Richards Professor of Law Washington University School of Law Adapted from Intellectual Privacy (Oxford University Press 2014) I will be workshopping Chapter Four of Eleven chapters , which is currently titled “Data, ” but I have appended abstracts of the prec eding […]
Kesan et al_Information Privacy and Data Control in Cloud Computing
Electronic copy available at: http://ssrn.com/abstract=2042638 Illinois Program in Law, Behavior and Social Science Research Paper No. LBSS12 -11 Illinois Public Law and Legal Theory Research Paper No. 11 -20 Information Privacy and Data Control in Cloud Computing : Consumers, Privacy Preferences and Market Efficiency Jay P. Kesan * Carol M. Hayes** Masooda N. Bashir*** *Professor, […]
Kerr_The Next Generation Privacy Act
THE$NEXT$GENERATION$PRIVACY$ACT$$Orin$S.$Kerr*$$162$University$of$Pennsylvania$Law$Review$$(forthcoming$2013).$$Abstract($In( 1986,( Congress( enacted( the( Electronic( Communications( Privacy( Act((ECPA)( to( regulate( government( access( to( Internet(communications( and(records.( ( ECPA( is( widely( seen( as( outdated,( and( ECPA( reform( has( become( a( top(priority( of( the( United( States( Congress.( At( the( same( time,(existing(ECPA(reform(proposals(retain( the( structure( of( the( 1986( Act( and( merely( tinker( with( a( few(small( aspects( of( the( statute.( […]
Kang et al_Self-Surveillance Privacy
+ 2(,1 1/,1( Citation: 97 Iowa L. Rev. 809 2011-2012 Content downloaded/printed from HeinOnline (http://heinonline.org) Mon Apr 23 19:15:17 2012 — Your use of this HeinOnline PDF indicates your acceptance of HeinOnline’s Terms and Conditions of the license agreement available at http://heinonline.org/HOL/License — The search text of this PDF is generated from uncorrected OCR text. […]
Hartzog & Stutzman_Obscurity by Design
07 – Hartzog Article.docx (Do Not Delete) 6/17/2013 1:55 PM 385 OBSCURITY BY DESIGN Woodrow Hartzog * and Frederic Stutzman ** Abstract: Design-based solutions to confront technological privacy threats are becoming popular with regulators. However, these promising solutions have left the full potential of design untapped. With respect to online communication technologies, design-based solutions for […]
Glancy_Privacy in Autonomous Vehicles
V olume 52 | N umbe r 4 Ar ticle 3 12-14-2012 , d glanc y@s cu .e du F ollo w thi s and a ddition al w orks at: h tt p://d ig it alc ommon s.l aw .s c u .e du/l aw re v ie w Thi s Symposium i s […]
Bleier & Eisenbeiss_Ads on Private Information
1 Ads on Private Information: Investigating the Targeting Trade -Off in Personalized Online Advertising Abstract In retargeting, online banners are tailored to individual consumers according to their recent shopping behavior. Although this increasingly employed method might make banners more relevant to consumers, they may also perceive it as overly manipulative or privacy intruding. In this […]