text
stringlengths
0
118
131. Identification via password, however, can enhance security without linking
the individual to immutable characteristics such as biometric identifiers.
132. See Nock, Costs o f Privacy, 53 (recounting the rise of credit bureaus). For a
comprehensive account of the credit reporting system, see Evan Hendricks, Credit
Scores and Credit Repoits (2004).
133. See Solove, D igital Peison, 111-12, 115-19 (noting that investigation and
prosecution of identity-theft cases are not top priorities for law-enforcement agen­
cies, and that victims are slow to realize that their identity has been stolen).
134. Whalen v. Roe, 429 U.S. 589, 599, 605 (1977).
135. Fraternal Order of Police, Lodge No. 5 v. City of Philadelphia, 812 F.2d
105,118 (3d Cir. 1987).
136. U.S. Dep’t of Health, Educ., & Welfare, Records, 41.
137. Asia-Pacific Economic Cooperation, Privacy Framework principle 22
(2004); Organization for Economic Cooperation and Development (OECD),
Notes to Pages 128-130
231
Guidelines on the Protection of Privacy and Transborder Flows of Personal Data
para. 11 (1980); Directive of the European Parliament and the Council of Europe
on the Protection of Individuals with Regard to the Processing of Personal Data
and on the Free Movement of Such Data art. 17 (1995).
138. Convention for the Protection of Individuals with Regard to Automatic
Processing of Personal Data, Council of Europe Treaties No. 108, art. 7 (Jan. 28,
1981).
139. The provisions are Privacy Act, 5 U.S.C. §552a(e) (10); Children’s Online
Privacy Protection Act, 15 U.S.C. §6502(b) (1) (D); Gramm-Leach-Bliley Act, 15
U.S.C. §§6801(b), 6805(b) (2); Health Insurance Portability and Accountability
Act, 42 U.S.C. §1320d-2(d) (2); and Computer Fraud and Abuse Act, 18 U.S.C.
§1030. For the Federal Trade Commission’s security regulations, see 16 C.F.R.
§314(2005).
140. See Daniel J. Solove, “The New Vulnerability: Data Security and Personal
Information,” 11-12 (2004), available at http://ssrn.com/abstract=583483 (arguing
that the law fails to adequately guard sensitive information, and that a reconceptu­
alization of the legal duties information keepers owe their customers is necessary).
141. See, e.g., Electronic Communications Privacy Act of 1986, 18 U.S.C.
§2707(c) (2000) (setting a minimum $1,000 fine per violation); Video Privacy Pro­
tection Act of 1988, 18 U.S.C. §2710(c) (2000) (setting liquidated damages of
$2,500 as the minimum amount). The Privacy Act of 1974 also contains a
liquidated-damages provision; however, the Supreme Court interpreted it to apply
only when the plaintiff demonstrates actual damages. See Doe v. Chao, 540 U.S.
614, 616 (2004) (construing 5 U.S.C. §552a(g) (4) (2000)).
142. Pisciotta v. Old National Bankcorp, 499 F.3d 629, 639 (7th Cir. 2007).
143. 15 U.S.C. §45.
144. In the Matter of Microsoft Corp., No. 012-3240 (Dec. 24, 2002).
145. In re Guess.com, Inc., No. 022-3260 (July 30, 2003).
146. Arthur R. Miller, The Assault on Privacy: Computers, D ata Banks, and Dossiers
34(1971).
147. Regan, Legislating Privacy, 86; Robert Gellman, “Does Privacy Law Work?”
in Technology and Privacy: The New Landscape 193, 198-99 (Philip E. Agre & Marc
Rotenberg eds., 1997).
148. See Gary T. Mars, Undercover: Police Surveillance in Am erica 208-11 (1988)
(citing instances of government agencies—including the Selective Service and the
Internal Revenue Service—using databases supplied by private businesses to inves­
tigate instances of draft dodging and tax fraud).
149. Computer Matching and Privacy Protection Act (CMPPA) of 1988, Pub. L.
No. 100-503, 102 Stat. 2507 (codified at 5 U.S.C. §552a (2000)).
150. U.S. Dep’t of Health, Educ., & Welfare, Records, 41-42.
151. The statutory provisions are Privacy Act, 5 U.S.C. §552a(e) (3) (B);
Fair Credit Reporting Act, 15 U.S.C. §168lb; Driver’s Privacy Protection Act,
18 U.S.C. §2722(a); Cable Communications Policy Act, 47 U.S.C. §551(e);
Gramm-Leach-Bliley Act, 15 U.S.C. §6802(c); Video Privacy Protection Act, 18
U.S.C. §2 710(e).
152. Federal Election Compaign Act, 2 U.S.C. §438(a)(4); Health Insurance
Portability and Accountability Act regulations, 45 C.F.R. §164.508(a).
153. EU Data Protection Directive, art. 6.
232
Notes to Pages 130-136
154. Convention for the Protection of Individuals with Regard to Automatic
Processing of Personal Data, Council of Europe Treaties No. 108, art. 5b (Jan. 28,
1981).
155. APEC Privacy Framework, principle 19; OECD Guidelines, para. 9, 10.
156. Australian Institute of Private Detectives Ltd v. Privacy Commissioner,
[2004] FCA 1440 (5 November 2004) (discussing 17 Clause 2.1 of Schedule 3 to
the Privacy Act).
157. Information Protection Act, art. 24.1; see Korean Personal Information
Dispute Mediation Committee, [2004] KRPIDMC 1, http://www.worldlii.org/kr/
cases/KRPIDMC/2004/l.html (assessing damages for a company’s disclosure of a
person’s resume on its website); Personal Information Protection and Electronic
Documents Act, S.C. 2000 ch. 5 (Can.).
158. United Nations Guidelines Concerning Computerized Personal Data
Files, adopted by the General Assembly on Dec. 14, 1990.
159. Pamela Sankar, “DNA-Typing: Galton’s Eugenic Dream Realized?” in Doc­
um enting Individual Identity, 21S, 278—79.
160. Schwartz, “Privacy and Democracy in Cyberspace,” 1683.
161. Dwyer v. American Express Co., 652 N.E.2d 1351, 1354 (111. App. 1995).
162. Sheets v. Salt Lake County, 45 F.3d 1383, 1388 (10th Cir. 1995).
163. Anderson v. Blake, 469 F.3d 910 (10th Cir. 2006).
164. Franz Kafka, The Trial 115 (Breon Mitchell trans., 1998).
165. U.S. Dep’t of Health, Educ., & Welfare, Records, 29.
166. Id. at 41.
167. Constitution of the Argentine Nation, quoted in Donald C. Dowling, Jr.,
& Jeremy M. Mittman, “International Privacy Law,” in Proskauer on Privacy 14-1,
14-39 (Christopher Wolf ed., 2006).
168. Constitution of Brazil art. 5; Federal Law No. 8,078, art. 43, Sept. 11,1990,
discussed in Privacy and H um an Rights, 290.
169. Ruby v. Canada (Solicitor General), [2000] 3 F.C. 589 [F.C.A.].
170. EU Data Protection Directive, art. 12; OECD Guidelines para. 12, 13;
APEC Privacy Framework, principles 23, 24.
171. See Mobil Oil Corp. v. Rubenfeld, 339 N.Y.S.2d 623, 632 (Civ. Ct. 1972)
(defining a fiduciary relationship as one “founded on trust or confidence”).
172. Meinhard v. Salmon, 164 N.E. 545, 546 (N.Y. 1928).