text
stringlengths 0
118
|
---|
98. U.S. Dep’t of Health, Educ., & Welfare, Records, Computers, and the Rights o f
|
C itizens xxxii (1973).
|
99. Doyle v. Wilson, 529 F. Supp. 1343, 1348 (D. Del. 1982).
|
100. See U.S. General Accounting Office, Social Security: G overnm ent and Com
|
mercial Use o f the Social Security N um ber Is Widespread (Feb. 1999).
|
101. Colin J. Bennett, Regulating Privacy: D ata Protection and Public Policy in Eu
|
rope and the U nited States 47-65 (1992).
|
102. Privacy and H um an Rights 233.
|
103. Id. at 48.
|
104. Roger Clarke, Sm art Card Technical Issues S tarter K it, ch. 3 (April 8, 1998),
|
available at http://www.anu.edu.au/people/Roger.Clarke/DV/SCTISK3.html.
|
Clarke observes, “In the context of information systems, the purpose of identifica
|
tion is more concrete: it is used to link a stream of data with a person.” Roger
|
Clarke, “Human Identification in Information Systems: Management Challenges
|
Notes to Pages 123—125
|
229
|
and Public Policy' Issues,” 7 Inform ation, Technology, and People 6, 8 (1994), available
|
at http://www.anu.edu.au/people/Roger.Clarke/DV/HumanID.html.
|
105. For a history of criminal identification techniques, see Simon A. Cole, Sus
|
pect Identities: A H istory o f Fingerprinting and C rim inal Identification 4-5 (2001).
|
106. See generally'John D. Woodward, Jr., Nicholas M. Orlans, & Peter T. Hig
|
gins, Biometrics: Identity Assurance in the Inform ation A ge (2003) (commenting that
|
reliable identification improves public safety and the safety of business transac
|
tions).
|
107. See Communications Disclaimer Requirements, 11 C.F.R. §110.11 (2005)
|
(requiring disclaimers on “general public political advertising”). The identification
|
requirement was originally part of the Federal Election Campaign Act of 1971,
|
Pub. L. No. 92-225, 86 Stat. 3 (1972) (codified as amended at 2 U.S.C. §§431-456
|
(2000 & Supp. II 2002)), which required identification for any expenditure with
|
the purpose of influencing an election. The Court in Buckley v. Valeo held that the
|
provision can only7 apply' to speech that “expressly advocate [s] the election or defeat
|
of a clearly' identified candidate.” 424 U.S. 1, 79-80 (1976).
|
108. 2 U.S.C. §441d(a)(3) (2000 & Supp. II 2002).
|
109. See Clarke, “Human Identification in Information Systems,” 32-34 (de
|
scribing proponents of this view).
|
110. Article 8 of the convention provides for the protection of “the right to re
|
spect for [an individual’s] private and family life, his home and his correspon
|
dence.” Convention for the Protection of Human Rights and Fundamental Free
|
doms art. 8, Nov. 4, 1950, 213 U.N.T.S. 221.
|
111. B. v. France, 232 ECHR 33, 36, 52 (1992). The science-fiction movie G at-
|
taca also illustrates these points. Vincent, the protagonist, is linked to his high risk
|
of developing heart problems, and this renders him unfit for all but the most me
|
nial jobs. Gattaca (Columbia Pictures 1997).
|
112. Solove, D igital Person, 1.
|
113. Clarke, “Human Identification in Information Systems,” 20.
|
114. Richard Sobel observes, “Identity systems and documents have a long his
|
tory of uses and abuses for social control and discrimination.” Richard Sobel,
|
“The Degradation of Political Identity Under a National Identification System,”
|
8 Boston U niversity Journal o f Science and Technology Law 37, 48 (2002). Indeed,
|
one of the primary reasons that governments created passports and identity cards
|
was to restrict movement, alter patterns of migration, and control the move
|
ments of poor people and others viewed as undesirable. Marc Garcelon, “Colo
|
nizing the Subject: The Genealogy and Legacy of the Soviet Internal Passport,”
|
in D ocum enting Individual Identity 83, 86 (Jane Caplan & John Torpey eds., 2001).
|
115. Sobel, “Degradation of Political Identity,” 49.
|
116. R. E. Smith, Ben Franklin's Web Site, 41, 43.
|
117. McIntyre v. Ohio Elections Comm’n, 514 U.S. 334, 343 n.6 (1995).
|
118. Gary Marx notes that anonymity can “facilitate the flow of information and
|
communication on public issues” and “encourage experimentation and risk taking
|
without facing large consequences, risk of failure, or embarrassment since one’s
|
identity is protected.” Gary T. Marx, “Identity and Anonymity: Some Conceptual
|
Distinctions and Issues for Research,” in D ocumenting Individual Identity, 311, 316,
|
318; see also A. Michael Froomkin, “Flood Control on the Information Ocean:
|
Living with Anonymity, Digital Cash, and Distributed Databases,” 15 Journal o f
|
230
|
Notes to Pages 125-128
|
Law and Communications 395, 408 (1996) (“Not everyone is so courageous as to
|
wish to be known for everything they say, and some timorous speech deserves en
|
couragement”).
|
119. One of the most famous examples of an anonymous whistleblower is Deep
|
Throat, Bob Woodward and Carl Bernstein’s confidential source who helped them
|
unearth the Watergate scandal. See Carl Bernstein & Bob Woodward, A ll the Pres
|
ident's M en 71-73, 130-35 (1974).
|
120. See Julie E. Cohen, “A Right to Read Anonymously: A Closer Look at
|
‘Copyright Management’ in Cyberspace,” 28 Connecticut Law Review 981, 1012-14
|
(1996) (arguing that reader anonymity is an important First Amendment value and
|
that anonymous reading protects people from being associated with the ideas
|
about which they read).
|
121. Talley v. California, 362 U.S. 60, 65 (1960); see also Watchtower Bible &
|
Tract Soc. v. Village of Stratton, 536 U.S. 150, 166-67 (2002) (stating that
|
anonymity protects people who engage in “unpopular causes”); McIntyre v. Ohio
|
Elections Comm’n, 514 U.S. 334, 341-42 (1995) (“The decision in favor of
|
anonymity may be motivated by fear of economic or official retaliation, by concern
|
about social ostracism, or merely by a desire to preserve as much of one’s privacy as
|
possible”).
|
122. Hiibel v. Sixth Judicial District Court, 542 U.S. 177, 189,190-91 (2004).
|
123. Id. at 196 (Stevens, J., dissenting) (quoting id. at 191 (majority opinion)).
|
124. Franz Kafka, “The Burrow,” in The Complete Stories, 325, 326 (Willa Muir
|
and Edwin Muir trans., 1971).
|
125. Jennifer 8 Lee, “Fighting Back when Someone Steals Your Name,” New
|
York Times, Apr. 8, 2001, §3, at 8.
|
126. Solove, D igital Person, 110.
|
127. Janine Benner, Beth Givens, & Ed Mierzwinski, Nowhere to Turn: Victims
|
Speak O ut on Identity Theft pt. E, §§1, 4 (2000), http://www.privacyrights.org/ar/
|
idtheft2000.htm.
|
128. Solove, D igital Peison, 110.
|
129. Tom Zeller, Jr., “An Ominous Milestone: 100 Million Data Leaks,” New
|
York Times, Dec. 18, 2006.
|
130. Lynn M. LoPucki, “Human Identification Theory and the Identity Theft
|
Problem,” 80 Texas Law Review 89, 94 (2001).
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.