text
stringlengths
0
118
vacy and Human Rights, 463-64. Germany’s Basic Law protects the privacy of com­
munications, and the Federal Constitutional Court in 1983 recognized the protec­
tion of a person’s “right to informational self-determination” under Basic Law
(Grundgesetz), art. 10 (1949). See Federal Constitutional Court, decision of Dec.
15, 1983, 1 BvR 209, quoted in Privacy and Human Rights, 480. Although the word
“privacy” does not appear in Japan’s constitution, the Supreme Court has recog­
nized a right to privacy since 1963. Privacy and Human Rights, 620. Likewise, even
though privacy is not mentioned in India’s constitution, the Supreme Court of
India has declared, “The right to privacy has since been widely accepted as implied
in our Constitution.” Distt. Registrar & Collector, Hyderabad & Anr v. Canara
Bank Etc, [2004] INSC 668, available at http://www.commonlii.org/in/cases/
INSC/2004/668.html.
16. Organization for Economic Cooperation and Development (OECD),
Guidelines on the Protection of Privacy and Transborder Flows of Personal Data
(1980).
17. Directive of the European Parliament and the Council of Europe on the
Protection of Individuals witl^ Regard to the Processing of Personal Data and on
the Free Movement of Such Data (1995).
18. Asia-Pacific Economic Cooperation (APEC), Privacy Framework, Nov.
2004.
19. William Prosser, “Privacy,” 48 California Law Review 383 (1960).
Notes to Pages 3-5
201
20. Privacy Act, Pub. L. No. 93-579, 5 U.S.C. §552a; Family Educational Rights
and Privacy Act of 1974, Pub. L. No. 93-380,20 U.S.C. §§1221 note, 1232; Right
to Financial Privacy Act of 1978, Pub. L. No. 95-630, 12 U.S.C. §§3401-3422;
Privacy Protection Act of 1980, Pub. L. No. 96-440, 42 U.S.C. §2000aa; Elec­
tronic Communications Privacy Act of 1986, Pub. L. No. 99-508 and Pub. L. No.
103-414, 18 U.S.C §§2510-2522, 2701-2709; Video Privacy Protection Act of
1988, Pub. L. No. 100-618, 18 U.S.C. §§2710-2711; Driver’s Privacy Protection
Act of 1994, Pub. L. No. 103-322, 18 U.S.C. §§2721-2725.
21. United Nations Universal Declaration of Human Rights, GA Res 217A(III),
UN Doc A/Res/810(1948).
22. European Convention of Human Rights art. 8 (1950).
23. Deborah Nelson, Pursuing Privacy in Cold War America xii-xiii (2002) (“Since
the end of the 1950s, the cry ‘the death of privacy’ has rung out from a wide variety
of sources: journalism, television, film, literature, law enforcement, philosophy,
medical discourse, and more”). A barrage of books warned of the growing threat to
privacy, including Morris Ernst and Alan Schwartz’s Privacy: The Right to Be Let
Alone (1962), Edward Long’s The Intruders (1967), Jerry Martin Rosenberg’s The
Death o f Privacy (1969), Arthur Miller’s The Assault on Privacy (1971), John Curtis
Raines’s Attack on Privacy (1974), and Robert Ellis Smith’s Privacy: How to Protect
What's Left o f It (1979). A number of books in Britain and Germany in the 1970s
likewise examined the issue. Bennett, Regulating Privacy, 46-57 (citing and dis­
cussing the books).
24. Vance Packard, The Naked Society 12 (1964).
25. Myron Brenton, The Privacy Invaders 21,225 (1964).
26. Westin, Privacy and Freedom, 3.
27. Bruno Bettelheim, “The Right to Privacy Is a Myth,” Saturday Evening Post,
July 27, 1968, at 8.
28. Thomas Nagel, “The Shredding of Public Privacy,” Times Literary Supple­
ment, Aug. 14, 1998, at 15.
29. See, e.g., Roger Rosenblatt, “Who Killed Privacy?” New York Times Maga­
zine, Jan. 31, 1994; Robert O’Harrow, Jr., “Privacy Eroding, Bit by Byte,” Wash­
ington Post, Oct. 15, 2004, at El; Craig Mullins, “Data Privacy Policies,”
DBAzine.com Online, Mar. 4, 2006, http://www.dbazine.com/blogs/blog-cm/
craigmullins/blogentry.2006-03-04.7587002706 (“Our privacy is evaporating”);
Jonathan Turley, “ ‘Big Brother’ Bush and Connecting the Data Dots,” Los Angeles
Times, June 24, 2006 (“Privacy is dying in America”); Stephen J. Kobrin, “With
Technology Growing, Our Privacy Is Shrinking,” Philadelphia Inquirer, Jan. 3, 2001
(“Privacy is threatened by the digital age”); Bob Sullivan, “Privacy Lost: Privacy
Under Attack, but Does Anybody Care?” MSNBC, Oct. 17, 2006, http://www
.msnbc.msn.com/id/15221095/ (noting that many say that privacy is “vanishing”
and “slipping away”); Alan Stafford, “Privacy in Peril,” PC World, Sept. 30, 2005;
Joyce Slaton, “Homeland Insecurity: Is Your Privacy in Danger?” SF Gate, Dec.
12, 2002, available at http://www.sfgate.com/cgi-bin/article.cgi?file=/gate/archive/
2002/12/12/csea.DTL; Jennifer Granick, “Computer Privacy in Distress,” Wired
News, Jan. 17, 2007, available at http://www.wired.com/news/columns/0,72510-0
.html.
30. Simson Garfinkel, Database Nation: The Death o f Privacy in the 21st Century
(2001); Charles Sykes, The End o f Privacy (1999); Reg Whitaker, The End of Privacy
202
Notes to Pages 5-9
(2000); Jeffrey Rosen, The Unwanted Gaze: The Destruction of Privacy in America
(2000).
31. Nelson, Pursuing Privacy, xii.
32. Franzen, How to Be Alone, 40.
33. Eric Goldman, “The Privacy Hoax,” Forbes, Oct. 14, 2002.
34. Calvin C. Gotlieb, “Privacy: A Concept Whose Time Has Come and Gone,” in
Computers, Surveillance, and Privacy 156,156 (David Lyon & Elia Zuriek eds. 1996).
35. Richard A. Epstein, “The Legal Regulation of Genetic Discrimination: Old
Responses to New Technology,” 74 Boston University Law Review 1,12 (1994).
36. Richard Posner, The Economics of Justice 271 (1981).
37. Fred H. Cate, Privacy in the Information Age 29 (1997).
38. Amitai Etzioni, “The Myth of Privacy Invasion,” Christian Science Monitor,
Sept. 10,2001, at 9.
39. See Florida Star v. B.J.F., 491 U.S. 524, 527 (1989).
40. See Dietemann v. Time, Inc., 449 F.2d 245, 246 (9th Cir. 1971).
41. “Beyond X-ray Vision: Can Big Brother See Right Through Your Clothes?”
Discover, July 2002, at 24; Guy Gugliotta, “Tech Companies See Market for Detec­
tion: Security Techniques Offer New Precision,” Washington Post, Sept. 28, 2001,
at A8.
42. See Kyllo v. United States, 533 U.S. 27,29 (2001).
43. See Standards for Privacy of Individually Identifiable Health Information, 65
Fed. Reg. 82,461, 82,467 (Dec. 28, 2000) (codified at 45 C.F.R. pts. 160 & 164).
44. See In re GeoCities, 127 F.T.C. 94,97-98 (1999).
45. Jorge Luis Borges, “Everything and Nothing,” in Labyrinths 248, 249
(Donald A. Yates & James E. Irby eds., J.E.I. trans., 1964).
46. J. Thomas McCarthy, The Rights of Publicity and Privacy §5.59 (2d ed. 2005).
47. Lillian R. BeVier, “Information About Individuals in the Hands of Govern­