The PII Problem Privacy and a New Concept of Personally Identifiable Information
[…] data within the record, are ceasing to be limiting factors on the way data or records are stored or retrieved.” 18 Unlike manual systems, such as a telephone book, “computers [could] easily be progra mmed to sort or reorganize data on the basis of any particular index, attribute, or characteristic.” 19 The key point, […]
The Limits of Torts Privacy
[…] is not “lawfully obtained,” the press can be held liable under a second theory. In Bartnicki v. Vopper, a radio DJ broadcast a recording of an intercepted telephone call that had been left in his mailbox by an unknown person. The Court held that even though the journalist knew the conversation had been illegally […]
The Case for Online Obscurity
[…] same principle compelled the Supreme Court of Michigan in Michigan Federation of Teachers v. University of Michigan 75 to conclude that university employee s‘ home addresses and telephone numbers were protected by the Michigan FOIA‘s privacy exemption. The court stated: It is true that home addresses often are publicly available through sources such as […]
Social_Network_Theory_of_Privacy
[…] more persons, she may retain a reasonable expectati on that the recipients of the information will not disseminate it further. The leading California case is the California Supre me Court’s 1999 opinion, Sanders v ABC, Inc. [FN47] Sanders involved the efforts of Stacy Lescht, an A BC investigative journalist, to expose fraud in the telephone psychic industry. To that end, she obtained employment as a telephone psychic and used a hidden video camera to record her conversations with her new […]
Repairing_Online_Reputation
[…] 4. Cybestalking …………………………… ……………………………………………………. B. Comparing Online and Offline Abuses ………. ……………………………………….. II. Redressing Online Wrongs: Gaps in the Existing Legal Framework …………… A. Criminal Law …………………………… ………………………………………………………. 1. Criminal Law versus Civil Law …………….. ……………………………………….. 2. State Criminal Law ……………………… ……………………………………………….. 3. Federal Criminal Law ……………………. ……………………………………………… a. Interstate Communications Act …………… ……………………………………… b. Telephone Harassment Act ……………….. ………………………………………. c. Insterstate Stalking Punishment and Preventio n Act ……………………… d. Computer Fraud and Abuse Act ……………. …………………………………… e. Megan Meier Cyberbullying Prevention Bill … …………………………….. 4. Drafting Effective Criminal Legislation …… ……………………………………… B. Tort Law ………………………………. …………………………………………………………. 1. Online Abuses: Common Challenges for Tort Law …………………………… 2. Defamation …………………………….. ……………………………………………………. […]
Romanosky-Do_Data_Breach_Disclosure_Laws_Reduce_Identity_Theft
[…] categories controlled by the firm are: Taken b y a corrupt business employee: 15 percent, Some oth er way: 7 percent, Misuse of data from an in-store/onsite/mail/ telephone transaction: 7 percent, Stolen from a company that handles your financial data: 6 percent. Identity Theft Data The most comprehensive public source for identity t heft […]
Relational_Surveillance_Final
[…] onal sur veillance and suggests how these guarantees might apply to partic ular forms of analysis of traffic data. Introduction The National Security Agency (the “NSA”) has repor tedly ob- tained a vast database of telephone records from so me of the major * Copyright © 2008 Katherine J. Strandburg, Visiting Associate Professor of Law, New […]
Redesigning IP Geolocation Privacy by Design and Online Targeted Advertising
[…] privacy defaults, appropriate notice, and empowering user-friendly options. Keep it user-centric. Information and Privacy Commissioner of Ontario2 Bloor Street East, Suite 1400 Toronto, Ontario Canada M4W 1A8 Telephone: (416) 326-3333 Fax: (416) 325-9195 E-mail: [email protected] Website: www.ipc.on.ca Bering Media, Inc.107 Atlantic Avenue Suite 303 Toronto, Ontario Canada M6K 1Y2 E-mail: [email protected] The information contained […]
Privacy’s-Other-Path
[…] and medical treatment, information about a person’s sex life or other intimate relationships, financial information, photographs taken at “private” events, infor- mation relating to private letter or telephone communications, the contents of personal diaries, information about involvement in crime, and information relating to children. 293 Moreover, in cases which have held that a “quality […]
Privacy_Government
[…] are increasingly becoming digital biographies. A similar scenario unfolded in 1928, when the Supreme Court held in Olmstead v. United States 13 that wiretapping a person’s home telephone did not run afoul of the Fourth Amendment. The Court rigidly adhered to a conception of privacy that recognized only physical invasions, which did not include […]