text
stringlengths 0
118
|
---|
131. Identification via password, however, can enhance security without linking
|
the individual to immutable characteristics such as biometric identifiers.
|
132. See Nock, Costs o f Privacy, 53 (recounting the rise of credit bureaus). For a
|
comprehensive account of the credit reporting system, see Evan Hendricks, Credit
|
Scores and Credit Repoits (2004).
|
133. See Solove, D igital Peison, 111-12, 115-19 (noting that investigation and
|
prosecution of identity-theft cases are not top priorities for law-enforcement agen
|
cies, and that victims are slow to realize that their identity has been stolen).
|
134. Whalen v. Roe, 429 U.S. 589, 599, 605 (1977).
|
135. Fraternal Order of Police, Lodge No. 5 v. City of Philadelphia, 812 F.2d
|
105,118 (3d Cir. 1987).
|
136. U.S. Dep’t of Health, Educ., & Welfare, Records, 41.
|
137. Asia-Pacific Economic Cooperation, Privacy Framework principle 22
|
(2004); Organization for Economic Cooperation and Development (OECD),
|
Notes to Pages 128-130
|
231
|
Guidelines on the Protection of Privacy and Transborder Flows of Personal Data
|
para. 11 (1980); Directive of the European Parliament and the Council of Europe
|
on the Protection of Individuals with Regard to the Processing of Personal Data
|
and on the Free Movement of Such Data art. 17 (1995).
|
138. Convention for the Protection of Individuals with Regard to Automatic
|
Processing of Personal Data, Council of Europe Treaties No. 108, art. 7 (Jan. 28,
|
1981).
|
139. The provisions are Privacy Act, 5 U.S.C. §552a(e) (10); Children’s Online
|
Privacy Protection Act, 15 U.S.C. §6502(b) (1) (D); Gramm-Leach-Bliley Act, 15
|
U.S.C. §§6801(b), 6805(b) (2); Health Insurance Portability and Accountability
|
Act, 42 U.S.C. §1320d-2(d) (2); and Computer Fraud and Abuse Act, 18 U.S.C.
|
§1030. For the Federal Trade Commission’s security regulations, see 16 C.F.R.
|
§314(2005).
|
140. See Daniel J. Solove, “The New Vulnerability: Data Security and Personal
|
Information,” 11-12 (2004), available at http://ssrn.com/abstract=583483 (arguing
|
that the law fails to adequately guard sensitive information, and that a reconceptu
|
alization of the legal duties information keepers owe their customers is necessary).
|
141. See, e.g., Electronic Communications Privacy Act of 1986, 18 U.S.C.
|
§2707(c) (2000) (setting a minimum $1,000 fine per violation); Video Privacy Pro
|
tection Act of 1988, 18 U.S.C. §2710(c) (2000) (setting liquidated damages of
|
$2,500 as the minimum amount). The Privacy Act of 1974 also contains a
|
liquidated-damages provision; however, the Supreme Court interpreted it to apply
|
only when the plaintiff demonstrates actual damages. See Doe v. Chao, 540 U.S.
|
614, 616 (2004) (construing 5 U.S.C. §552a(g) (4) (2000)).
|
142. Pisciotta v. Old National Bankcorp, 499 F.3d 629, 639 (7th Cir. 2007).
|
143. 15 U.S.C. §45.
|
144. In the Matter of Microsoft Corp., No. 012-3240 (Dec. 24, 2002).
|
145. In re Guess.com, Inc., No. 022-3260 (July 30, 2003).
|
146. Arthur R. Miller, The Assault on Privacy: Computers, D ata Banks, and Dossiers
|
34(1971).
|
147. Regan, Legislating Privacy, 86; Robert Gellman, “Does Privacy Law Work?”
|
in Technology and Privacy: The New Landscape 193, 198-99 (Philip E. Agre & Marc
|
Rotenberg eds., 1997).
|
148. See Gary T. Mars, Undercover: Police Surveillance in Am erica 208-11 (1988)
|
(citing instances of government agencies—including the Selective Service and the
|
Internal Revenue Service—using databases supplied by private businesses to inves
|
tigate instances of draft dodging and tax fraud).
|
149. Computer Matching and Privacy Protection Act (CMPPA) of 1988, Pub. L.
|
No. 100-503, 102 Stat. 2507 (codified at 5 U.S.C. §552a (2000)).
|
150. U.S. Dep’t of Health, Educ., & Welfare, Records, 41-42.
|
151. The statutory provisions are Privacy Act, 5 U.S.C. §552a(e) (3) (B);
|
Fair Credit Reporting Act, 15 U.S.C. §168lb; Driver’s Privacy Protection Act,
|
18 U.S.C. §2722(a); Cable Communications Policy Act, 47 U.S.C. §551(e);
|
Gramm-Leach-Bliley Act, 15 U.S.C. §6802(c); Video Privacy Protection Act, 18
|
U.S.C. §2 710(e).
|
152. Federal Election Compaign Act, 2 U.S.C. §438(a)(4); Health Insurance
|
Portability and Accountability Act regulations, 45 C.F.R. §164.508(a).
|
153. EU Data Protection Directive, art. 6.
|
232
|
Notes to Pages 130-136
|
154. Convention for the Protection of Individuals with Regard to Automatic
|
Processing of Personal Data, Council of Europe Treaties No. 108, art. 5b (Jan. 28,
|
1981).
|
155. APEC Privacy Framework, principle 19; OECD Guidelines, para. 9, 10.
|
156. Australian Institute of Private Detectives Ltd v. Privacy Commissioner,
|
[2004] FCA 1440 (5 November 2004) (discussing 17 Clause 2.1 of Schedule 3 to
|
the Privacy Act).
|
157. Information Protection Act, art. 24.1; see Korean Personal Information
|
Dispute Mediation Committee, [2004] KRPIDMC 1, http://www.worldlii.org/kr/
|
cases/KRPIDMC/2004/l.html (assessing damages for a company’s disclosure of a
|
person’s resume on its website); Personal Information Protection and Electronic
|
Documents Act, S.C. 2000 ch. 5 (Can.).
|
158. United Nations Guidelines Concerning Computerized Personal Data
|
Files, adopted by the General Assembly on Dec. 14, 1990.
|
159. Pamela Sankar, “DNA-Typing: Galton’s Eugenic Dream Realized?” in Doc
|
um enting Individual Identity, 21S, 278—79.
|
160. Schwartz, “Privacy and Democracy in Cyberspace,” 1683.
|
161. Dwyer v. American Express Co., 652 N.E.2d 1351, 1354 (111. App. 1995).
|
162. Sheets v. Salt Lake County, 45 F.3d 1383, 1388 (10th Cir. 1995).
|
163. Anderson v. Blake, 469 F.3d 910 (10th Cir. 2006).
|
164. Franz Kafka, The Trial 115 (Breon Mitchell trans., 1998).
|
165. U.S. Dep’t of Health, Educ., & Welfare, Records, 29.
|
166. Id. at 41.
|
167. Constitution of the Argentine Nation, quoted in Donald C. Dowling, Jr.,
|
& Jeremy M. Mittman, “International Privacy Law,” in Proskauer on Privacy 14-1,
|
14-39 (Christopher Wolf ed., 2006).
|
168. Constitution of Brazil art. 5; Federal Law No. 8,078, art. 43, Sept. 11,1990,
|
discussed in Privacy and H um an Rights, 290.
|
169. Ruby v. Canada (Solicitor General), [2000] 3 F.C. 589 [F.C.A.].
|
170. EU Data Protection Directive, art. 12; OECD Guidelines para. 12, 13;
|
APEC Privacy Framework, principles 23, 24.
|
171. See Mobil Oil Corp. v. Rubenfeld, 339 N.Y.S.2d 623, 632 (Civ. Ct. 1972)
|
(defining a fiduciary relationship as one “founded on trust or confidence”).
|
172. Meinhard v. Salmon, 164 N.E. 545, 546 (N.Y. 1928).
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.