Skip to main content

Currently Skimming:

Index
Pages 411-430

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 411...
... , Acquisti, Alessandro, 76–77 Ethical Force program, 216–218, Ad blockers, 326 221 Advocates. See Privacy advocates Anchoring vignettes, 86–87, 179–182, Affinity cards, 5 191–192, 202, 211–215, 218–219, African Charter on Human and 228–229, 254–255, 307 People's Rights, 381, 394 Anderson, Margo, 294, 358 Aggregators.
From page 412...
... , Brin, David, 159 Guidelines on the Protection Buckley Amendment. See Family of Personal Information and Educational Rights and Privacy Privacy, 388 Act Assault on Priacy, The, 167 Bureau of Labor Statistics, 111 Assignment of property rights, to individuals, 73–74 C Audits automated, 330 Cable Communications Policy Act, to uncover improper access by law 135–136 enforcement, 7 Cairo Declaration on Human Rights in AUMF.
From page 413...
... , data quality, 43–45, 120, 270, 299 256n.3, 364 personal information, sensitive Code of Fair Information Practices, information, and personally 48–49 identifiable information, 39–43, CoE Convention. See Council of 42n.15 Europe Convention for the privacy and anonymity, 2, 24, Protection of Individuals with 45–48, 59, 62 Regard to Automatic Processing reasonable expectations of privacy, of Personal Data 50–52, 328, 337 Coherence, in the concept of privacy, Conceptual underpinnings of privacy, 14, 62–66, 333–336 55, 57–87 Coke, Sir Edward, 351 an integrating perspective, 84–87 Cold War, America during, 350, economic perspectives on privacy, 360–363 1, 69–78 Collective privacy, 343 philosophical theories of privacy, 1, Columbia University, 241 58–69 sociological approaches, 1, 79–84
From page 414...
... See Child Online Protection Act Confidential Information Protection Corporate policy, formulation of, and Statistical Efficiency Act 171–173 (CIPSEA) , 142–143 Costs Confidentiality, 2 associated with unfavorable an application of cryptography, publicity, 14 107–108 computational, 118, 325, 327 federal laws relevant to, 142–143 Council of Europe Convention for guarantees of, 335 the Protection of Individuals Conformity, 309 with Regard to Automatic Congressional Research Service, Processing of Personal Data 242n.16 (CoE Convention)
From page 415...
... , 152 algorithms for, 6 Disasters, natural, 96 by data aggregators, 271–275 Disclosure limitation, 2, 11, 61 Data quality, 119–120 statistical techniques for, 111–112 false positives and false negatives, Discrimination, 84 43–45 associated with certain medical Data search companies, 102–106 conditions, 11 Data storage, 306 Disease, and pandemic outbreak, communications and, 259–266 37–38 Distribution industries, for content, Databanks in a Free Society: Computers, mass media and, 201–203 Record-keeping and Priacy, 167–168 DMCA. See Digital Millennium Databases Copyright Act aggregating information, 361 DNA analysis, 10–11, 32, 40–41, customer, 201 106–107, 214–215, 269, 317, 320, De-identification of data, 220–221 364 Death of Priacy, The, 167 Do-not-call lists, 201, 326 DeCew, Judith, 63 DOJ.
From page 416...
... See Electronic Communications Data Privacy Act European Commission, 152, 398. Educational and academic research See also Commission of the institutions, 183–188 European Communities personal information collected for European Convention on Human research purposes, 187–188 Rights and Fundamental student information collected Freedoms (ECHR)
From page 417...
... , 135, 167, 243, 282–283, 269–270 283n.23, 288–289 Facebook.com, 344 Foucault, Michel, 81 Fair and Accurate Credit Transactions Fourteenth Amendment, 123, 280n.19 Act, 144 Fourth Amendment, 51, 51n.27, Fair Credit Reporting Act (FCRA) , 134, 122–125, 258n.5, 260–261, 294 144, 188–189, 197, 336, 362 France, 368 Fair information practices, 15, 48–50, Free Speech Movement, 132 167, 334, 395 Freedom of information False information, providing, 5, 327 federal laws relating to False light, 130 confidentiality, 142–143 False positives and negatives, 43–45, federal laws relating to individual 120, 270, 299 privacy, 133–142 Family Educational Rights and and open government, 131–146 Privacy Act (FERPA)
From page 418...
... See also De H identification of data Habeas data, 392, 392n.144 biometric, 32 Hardware advances, 90–95 descriptive, 82–83 Harm, intangible, 26 indexical, 82 Harard Law Reiew, 30, 129 nominal, 82 Health care services, 34 technologies and, 266–271 receiving, spillover privacy unique, 40, 47 implications of, 226 "Identity," defining, 47n.21 Health data, 214–215 Identity theft, 140–141, 308–309 access to, 216–227 Identity Theft and Assumption Health insurance, availability of, 228 Deterrence Act, 139 Health Insurance Portability and ILO. See International Labor Accountability Act (HIPAA)
From page 419...
... See Information Security and Privacy Self-regulation Advisory Board, 342 Information. See also Access to Information technology information; Electronic and law enforcement, 252–277 information; Personal and national security, 277–293 information and the practice of health care, analysis of, 31 209–211 concealing, 72 role of, 29–33 consumers of, 361 Information Technology for creation of, 30 Counterterrorism, 278 credit card, 200 Informed choice, 338 databases aggregating, 26, 116, Infrared detectors, 258 196–200, 197n.16, 198n.19, 334, Infrastructures, of the contemporary 361 "information age," 26 digitized, 30, 116, 203 Insiders fusion of, 95–96 access by, 330 institutional use of, 178–183 threats to privacy from, 329–330 keeping private, x Institutions manipulation of, 30–31 advocacy by, 14, 227 proprietary, 2 changes in practice, and societal providing false, 5, 327 shifts, 33–36 providing incomplete, 327 private sector, 34 searches for, 30 use of information by, 178–183 seemingly innocuous, 31 Instrumentalist view of privacy, 66–67 specific uses for, 4 Insurance companies.
From page 420...
... , background, 252–254 381–382 communications and data storage, International Labor Organization 259–266 (ILO) , 386 and information technology, International perspectives 252–277 on privacy, 366–399 national security and individual on privacy policy, 151 privacy, 37, 293–301 Internet, 30, 172, 239–241, 262 potential abuses by, 275 sexually explicit material on, 240 and privacy concerns, 275–277 spread of, vii, 159 technology and identification, Interpretation, of HIPAA privacy 266–271 regulations, improper, 225–226 technology and physical Intimacy, 59 observation, 254–259 Intrusion, 129 use of criminal databases by, 7 Islam.
From page 421...
... United National Center for Health Statistics, Reporting Publishing Co., 132 204 Lunt, Teresa, 109 National Credit Union Administration, Lyon, David, 80 144 National Education Statistics Act, 143 National privacy commissioner, M establishing, 15, 341–342 Madison, James, 376 National Research Council, viii, xi, 20, "Mail cover," 260n.7 161 Mandated disclosure, 315 National Science Foundation, 331 Marketable rights, and privacy, vii National security, viii Marketing personal information, and law enforcement, 23–24, 37 collecting for, vii law enforcement and individual Marketplace, global, 334 privacy, 37, 293–301 Markey, Ed, 159 tensions with privacy, 292–293 Markle Foundation, 169 National Security Agency (NSA) , Marx, Gary T., 64–65 288–291, 319 Mass media, and content distribution National security and information industries, 201–203 technology, 277–293, 279n.18 McIntyre .
From page 422...
... See Guidelines Packet-based networks, 265 Governing the Protection of Pandemic outbreak Privacy and Transborder Flows disease and, 3, 37–38 of Personal Data global, 3 Office of Civil Rights, 222 Paperwork Reduction Act, 204 Office of Technology Assessment, 167 Patient perspectives on privacy, Olmstead . United States, 123, 261 223–226 Omnibus Crime Control and Safe improper interpretation and Streets Act, 135, 362–363 unintended consequences of Online privacy HIPAA privacy regulations, dearth of analytical work on, viii 225–226 practices of businesses and notifications of privacy policy, government agencies, vii 223–224
From page 423...
... See Corporate policy; Privacy 187–188 policy; Public policy collecting for marketing, vii Political-loyalty surveillance, 353 commodification of, 27, 69–70 Politics of privacy policy in the United demand for and supply of, viii, 33 States, 56, 155–173 e-commerce and technologies formulation of corporate policy, permitting collection of, vii 171–173 as an economic good, 70 formulation of public policy, exploitation of, 13, 86n.56, 314 155–162 life cycle of, 13 judicial decisions, 170–171 multidimensional nature of, 65 public opinion and the role of new sources of, 343 privacy advocates, 162–166 protection of, 380–399, 380n.80, the role of reports, 166–169 392n.91 shifts in, 8 repurposing of, 15, 180, 214, 270, Pop-up blockers, 326 314, 338 Pornography threats to, viii, 20 on the Internet, 240 Personally identifiable information privacy issues concerning, 8 (PII) , 39–43 Portia project, 112
From page 424...
...  INDEX Positives, false, 43–45, 120 impact of technology on, 88–90 Post, Robert, 62 important concepts and ideas Potential surveillance, 311 related to, 38–52 Power relationships, differential, 316 individuals protecting their own, Pragmatic approach to privacy, 60 14 Preference factor, 76, 218, 364 as instrumental, 66–67 Presidential directives, executive international perspectives on, orders and, 146–147 366–399 Pressures on privacy, 312–318 large-scale factors affecting, 28 "Pretexting," 135 law enforcement and information Pretty Good Privacy (PGP) , 267 technology, 252–277 Principles of privacy, xi, 13–14, 38–52, law enforcement and national 323–325 security, 251–301 anonymity, 45–48 libraries and, 231–250 choice and consent, 338–339 managing the patchwork of fair information practices, 48–50 approaches, 14, 161, 333–334 false positives, false negatives, and marketable rights in, vii data quality, 43–45 multidimensional nature of, 22 personal information, sensitive national security and information information, and personally technology, 277–293 identifiable information, 39–43, pressures on, 312–318 42n.15 protecting, viii, 33, 121 reasonable expectations of, 50–52 public debates about, 13 Privacy reasonable expectations of, 50–52 and anonymity, 45–48 as restricted access, 59–62 assessing, viii, 61, 206–207 tensions with national security, and the assignment of property 292–293 rights to individuals, 73–74 of thoughts, 90 and behavioral economics, 75–78 threats to, viii, 20 benefits of, 340 in the United States, short history coherence in the concept of, 14, of, 349–365 62–66, 333–336 value of, 66, 308–312, 324n.7, 327 collective, 343 Privacy & American Business, 172 compromising, vii Privacy Act, 137, 159, 159n.14, 165, current environment for, 4 168, 170, 204, 336, 362–363 defining, 1–4, 21–25, 39–40, 59–62, Privacy advocates 305–308, 367n.4, 369n.24 groups, vii dynamics of, 27–38 institutional, 14, 331–332 economic perspectives on, 1, 69–78 public, 339–345 emerging technologies and role of, and public opinion, 162–166 libraries, 244–248 Priacy and Freedom, 59–61, 167 ethics of, 186 Privacy and organizations, 175, group, 83, 343 177–208 guarantees of, 75 data aggregation organizations, 26, in health and medicine, vii–viii, 116, 196–200, 334, 361 209–230 education and academic research impact of non-U.S.
From page 425...
... See also Common law Privacy approaches in the information non-U.S., 151–154 age, 323–346 respecting the spirit of, 14, 335–336 individual actions, 325–328 reviewing existing, 334–335 organization-based actions, 328–332 by state, 148 principles, 323–325 state and local, 334 public policy actions, 332–346 Privacy literature, vii Privacy backdrop, 55–173 economics-oriented, vii intellectual approaches and Privacy policy, 6–7, 206–207. See also conceptual underpinnings, Politics of privacy policy in the 57–87 United States; Public policy legal landscape in the United correction of, 7 States, 122–154 creation of, ix, 153–154 politics of privacy policy in the international perspectives on, United States, 155–173 151, 153–154, 374n.50, 377n.63, technological drivers, 88–121 378n.68 Privacy commission, establishing a limiting information collected and standing, 15, 341–342, 344–345 stored, 6–7 Privacy concerns limiting outsider access to analyzing causes for, viii, 20 information, 7 growing in the United States, vii making easily readable, 179n.2, 328 in the "information age," 19 notifications of, 7, 223–224 and law enforcement, 275–277 prevention of internal abuse, 7 over pornography, 8 Privacy pragmatists, 60 Privacy context, 3–4, 175–301 Privacy Protection Act, 167 in health and medicine, 4, 209–230 Privacy regulation, 143–146 in law enforcement and national economic impact of, 74–75, 75n.29 security, 251–301 HIPAA, 225–226 and libraries, 231–250 Privacy rights in organizations, 177–208 assertions of, 311–312, 359 social, 63 as marketable, vii taking into account, 13 Privacy Rights Clearinghouse, 165 Privacy enhancers Privacy-sensitive system design, technologies for, 107–116 114–115, 114n.32 unsolved problems as, 116–118 Privacy torts, common law and, for use by individuals, 107–109 129–131 for use by information collectors, Private foundations, privacy 109–116 advocates in, viii Privacy fundamentalists, 60 Private sector institutions, 34, 294
From page 426...
... , Query control, 109–110 383–384, 388, 390, 398, 398n.177 Protests, protecting the right to plan R and participate in, 12 Proxies, 325 Radio-frequency ID (RFID) tags, 31, Pruning methods, 118n.35 95, 194–196, 194n.13, 195n.15, Psychological concerns, 26 206, 242, 244, 248–249 Public advocates, for privacy, 339–345 Real ID Act, 142 Public data-gathering systems, large Recoding, 111–112 scale, 6 Records Public debates about privacy, 13 bureaucracies relying heavily on, Public disclosure of private facts, 357 129–130 keeping private, 259 Public education, 338, 344 Records, Computers and the Rights of Public Health Service Act, 143 Citizens, 48, 188 Public-key cryptosystems, 267 Recourse, establishing the means for, Public opinion, and the role of privacy 15, 299, 331, 345–346 advocates, 162–166 Red-teaming, 330–331 Public policy Regan, Priscilla M., 80, 156, 158 controversy since September 11, Registered traveler program, 332 2001, 12 Regulations formulation of, 155–162 framework within United States, 14 Public policy actions, 322n.6, 323, restricting information access, 7 332–346 reviewing existing, 334–335 establishing the means for recourse, Regulatory agencies.
From page 427...
... Condon, 149–150 144 Reports, role of, 166–169 Security screening, expedited, 332 Repurposing of personal information, Security tools, for information, 15, 180, 214, 270, 314, 338 115–116 Research agencies, 203–205 Self-help for privacy, personal Research purposes, personal unilateral actions, 5 information collected for, "Self-realization," 371 187–188 Self-regulation, 14 Reserve, 59 by industry, 216–219, 328–332, 391 Restatement of the Law of Torts, 130–131 Self-service book checkout systems, Restrictions on information access, 7 238 Retail businesses, 35, 191–196 Seltzer, William, 294, 358 Retail Credit Company, 361 Semayne's Case, 122 Retinal pattern scans, 32 Sensing technologies, 93–94, 97, Revolutionary War, 352–355 106–107 RFID. See Radio-frequency ID tags Sensitive information, 39–43 RFPA.
From page 428...
... See Social Security number State perspectives on privacy Talley . California, 125 regulation, 147–150 Targeted suppression, 111 State-sponsored surveillance, 365 Technological drivers, 2–3, 6, 28, Statistical agencies, 203–205 55–56, 88–121 Statistical disclosure limitation biological and other sensing techniques, 111–112 technologies, 106–107 Statistical profiling techniques, 343 data search companies, 102–106 Stigma, 310 hardware advances, 90–95 associated with certain medical impact of technology on privacy, conditions, 11, 41 88–90 Storing electronic information, increased connectivity and expansion of capabilities for, ubiquity, 97–100 91–93 privacy-enhancing technologies, Strong encryption algorithms, 267 107–116 Student information, collected for risks to personal information, viii administrative purposes, software advances, 95–97 183–187 unsolved problems as privacy Stuntz, William, 297 enhancers, 116–118 Surveillance.
From page 429...
... See Universal Declaration of "war against," 365 Human Rights Terrorist operations. See also Unconcern over privacy, 60 September 11, 2001, attacks Unfavorable publicity, costs associated identifying, 96 with, 14 preventing, 292 Unintended consequences, 21 reactions to, 336 of HIPAA privacy regulations, Thailand, 393 225–226 Thermal-imaging surveillance, 124, Unique identifiers, 40, 47 258n.5 United Kingdom, 194, 374, 396 Thompson, Judith Jarvis, 62 United Nations (UN)
From page 430...
... See Anchoring vignettes Voice-over-IP phone service, 136, 262 ZIP code, 36, 39, 40n.14 Voice recognition technologies, 270 Voluntary disclosure, 316 Vote buying, 310 VPPA. See Video Privacy Protection Act


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.