text
stringlengths
0
118
18. Frederick Schauer, “Fear, Risk and the First Amendment: Unraveling the
‘Chilling Effect,”’ 58 Boston U niversity Law Review 685, 693 (1978) (emphasis
omitted).
19. Daniel J. Solove, “The First Amendment as Criminal Procedure,” 82 New
York U niversity Law Review 112, 119-23, 154-59 (2007).
20. Robert Merton, Social Theory and Social Structure 375 (1957).
21. Joel R. Reidenberg, “Privacy Wrongs in Search of Remedies,” 54 Hasting?
Law Journal 877, 882-83 (2003).
22. Priscilla M. Regan, Legislating Privacy: Technology, Social Values, and Public
Policy 225 (1995).
23. Privacy Act, 5 U.S.C. §552a.
Notes to Pages 180-192
245
24. Robert Gellman, “Does Privacy Law Work?” in Technology and Privacy: The
New Landscape (Philip E. Agre & Marc Rotenberg eds., 1997).
25. 306 F.3d 170, 180-82 (4th Cir. 2002), cert, granted (June 27, 2003).
26. See Doe v. Chao, 540 U.S. 614 (2004).
27. U.S. West, Inc. v. Fed. Communications Comm’n, 182 F.3d 1224, 1235
(10th Cir. 1999).
28. Solove, D igital Person, 93-101; Daniel J. Solove, “Identity Theft, Privacy,
and the Architecture of Vulnerability,” 54 H astings Law Journal 1227 (2003).
29. Dyer v. Northwest Airlines Corp., 334 F Supp. 2d 1196, 1200 (D.N.D.
2004). Another court reached a similar conclusion. See In re Northwest Airlines
Privacy Litigation, 2004 WL 1278459 (D.Minn. 2004).
30. 293 A.D.2d 598, 599-600 (N.Y. App. Div. 2002).
31. John M. Roberts & Thomas Gregor, “Privacy: A Cultural View,” in Notnos
X III: Privacy 199, 203-14 (J. Roland Pennock & J. W. Chapman eds., 1971).
32. Dan Rosen, “Private Lives and Public Eyes: Privacy in the United States and
Japan,” 6 Florida Journal o f International Law 141, 172-73 (1990).
33. James Whitman, “The Two Western Cultures of Privacy: Dignity Versus
Liberty,” 113 Yale Law Journal 1151, 1160, 1163, 1171, 1204, 1164, 1221 (2004).
34. Joel R. Reidenberg, “Setting Standards for Fair Information Practices in the
U.S. Private Sector,” 80 Iowa Law Review 497, 500 (1995).
35. Francesca Bignami, “European Versus American Liberty: A Comparative
Analysis of Anti-terrorism Data-Mining,” 48 Boston College Law Review 609,
682-86 (2007).
36. See Marc Rotenberg, “Fair Information Practices and the Architecture of
Privacy (What Larry Doesn’t Get),” 2001 Stanford Technology Law Review 1 (2001).
37. Bennett, Regulating Privacy, 96.
38. Board of Education v. Earls, 536 U.S. 822, 828-29 (2002).
39. Id. at 832, 833.
40. Id. at 834.
41. Nat’l Fed’n of Fed. Employees v. Cheney, 884 F.2d 603 (D.C. Cir. 1989)
(sustaining U.S. Army’s drug-testing program).
42. Vemonia School District v. Acton, 515 U.S. 646, 682 (1995).
43. Earls, 536 U.S. at 848 (Ginsburg, J., dissenting).
44. See id. at 833 (majority opinion).
45. John M. Poindexter, “Finding the Face of Terror in Data,” New York Times,
Sept. 10, 2003, at A25.
46. Shane Harris, “TIA Lives On,” N ational Journal, Feb. 23, 2006.
47. GAO Report, D ata M ining: Federal Efforts Cover a W ide Range o f Uses 2 (May
2004).
---
"
48. Jacqueline KJosek, The W ar on Privacy 51 (2007).
49. Leslie Cauley, “NSA Has Massive Database of Americans’ Phone Calls,”
U SA Today, May 11, 2006, at Al; Susan Page, “Lawmakers: NSA Database Incom­
plete,” U SA Today, June 30, 2006, at Al.
50. Cauley, “NSA Has Massive Database.”
51. Daniel J. Solove, Marc Rotenberg, & Paul M. Schwartz, Infom iation Privacy
Law 603-04 (2d ed. 2006).
52. Richard A. Posner, “Our Domestic Intelligence Crisis,” Washington Post,
Dec. 21, 2005, at A31.
246
Notes to Pages 193-196
53. Richard A. Posner, N ot a Suicide Pact: The Constitution in a Tim e o f National
Emergency 97 (2006).
54. Solove, D igital Person, 165-209; see also Daniel J. Solove, “Digital Dossiers
and the Dissipation of Fourth Amendment Privacy,” 75 Southern California Law
Review 1083 (2002).
55. Roger Clarke, “Information Technology and Dataveillance” 3 (1987), http://
www.anu.edu.au/people/Roger.Clarke/DV/CACM88.html.
56. Christopher Slobogin, “Transaction Surveillance by the Government,” 75
Mississippi Law Journal 139 (2005).
57. Solove, “First Amendment as Criminal Procedure,” 112.
58. Solove, D igitalPetson, 27-55.
59. George Orwell, Nineteen Eighty-four (Plume ed. 2003) (originally published
in 1949).
60. Franz Kafka, The Trial 158-59 (Breon Mitchell trans., 1998) (originally pub­
lished in 1937).
61. Solove, D igital Person, 221.
62. Peck v. United Kingdom [2003] ECHR 44 (2003), at *115.
63. Id. at TI153, 59, 62.
Index
Abortion, 36
Abuse, 128; privacy shrouding, 81-82, 97
Accessibility, 188. See also Inaccessibility;
Increased accessibility
Accidental privacy, 20
Accountability, 194; Allen on, 48
Acquisti, Alessandro, 73
Adams, Michelle, 59, 112
Addresses, 69
Adultery, 56-57, 95
Advertising, 157-58
Aesop, 149
L'affaire Rachel, 155
After the Banquet (Mishima), 141
“Age of balancing,” 87
“Age of the Goldfish Bowl,” 4