首页 > 最新文献

Information Privacy Law eJournal最新文献

英文 中文
Driven into Society: Philosophies of Surveillance Take to Streets of New York 被推向社会:纽约街头的监控哲学
Pub Date : 2009-09-01 DOI: 10.37974/ALF.84
Anita L. Allen
The problem of terrorism has heightened the need for security. The need for improved security has led officials at all levels of government to consider, and to implement, surveillance programs. In 2002, the New York City Police Department (NYPD) created a Counterterrorism Bureau. The Bureau’s Lower Manhattan Security Initiative of networked surveillance has been controversial. Civil libertarians and privacy advocates have raised concerns. What is the fate of privacy with the massive use of surveillance cameras and other monitoring technology in America’s premier city? In response to concerns about the program, in February 2009, the NYPD issued proposed voluntary Public Security Privacy Guidelines. The Guidelines were weak on genuine privacy protection restrictions. They were an inadequate instantiations of the “fair information practice” ideals reflected in US federal privacy statutes and in the data protection laws of Canada and the EU. If the NYPD is going to operate on the basis of privacy guidelines, it needs guidelines that articulate for the police themselves and for the affected public why privacy in public places matters. The starting point could be Rousseau’s notion that pervasive surveillance opens the door to the misery of perpetual judgment. Not everything the NYPD says it is doing seriously affects privacy interests, but those interests need to be specifically understood; and intrusive policies need to be justified beyond the broad assertion that there is no expectation of privacy in public places and non intimate activities. New York could be a model for other municipalities how to take privacy seriously when observation imposes the Rousseavian burdens and when security seems essential.
恐怖主义问题加剧了对安全的需要。加强安全的需要促使各级政府官员考虑并实施监视项目。2002年,纽约市警察局(NYPD)成立了一个反恐局。联邦调查局关于网络监控的曼哈顿下城安全倡议一直备受争议。公民自由主义者和隐私权倡导者对此表示担忧。随着监控摄像头和其他监控技术在美国首要城市的大量使用,隐私的命运将会如何?2009年2月,为了回应人们对该计划的担忧,纽约警察局发布了一份自愿性的《公共安全隐私指南》。《指引》在真正的隐私保护限制方面力度不够。它们是美国联邦隐私法规以及加拿大和欧盟数据保护法中反映的“公平信息实践”理想的不充分例证。如果纽约警察局要在隐私指导方针的基础上运作,它需要指导方针,向警察自己和受影响的公众阐明为什么公共场所的隐私很重要。起点可以是卢梭的观点,即无孔不入的监视打开了通往永久审判的痛苦之门。并不是纽约警察局所说的每件事都严重影响了隐私利益,但这些利益需要特别理解;除了在公共场所和非亲密活动中没有隐私的期望这一宽泛的断言之外,侵入性政策需要得到证明。当观察带来卢梭式的负担,而安全似乎至关重要时,纽约可以成为其他城市如何认真对待隐私的榜样。
{"title":"Driven into Society: Philosophies of Surveillance Take to Streets of New York","authors":"Anita L. Allen","doi":"10.37974/ALF.84","DOIUrl":"https://doi.org/10.37974/ALF.84","url":null,"abstract":"The problem of terrorism has heightened the need for security. The need for improved security has led officials at all levels of government to consider, and to implement, surveillance programs. In 2002, the New York City Police Department (NYPD) created a Counterterrorism Bureau. The Bureau’s Lower Manhattan Security Initiative of networked surveillance has been controversial. Civil libertarians and privacy advocates have raised concerns. What is the fate of privacy with the massive use of surveillance cameras and other monitoring technology in America’s premier city? In response to concerns about the program, in February 2009, the NYPD issued proposed voluntary Public Security Privacy Guidelines. The Guidelines were weak on genuine privacy protection restrictions. They were an inadequate instantiations of the “fair information practice” ideals reflected in US federal privacy statutes and in the data protection laws of Canada and the EU. If the NYPD is going to operate on the basis of privacy guidelines, it needs guidelines that articulate for the police themselves and for the affected public why privacy in public places matters. The starting point could be Rousseau’s notion that pervasive surveillance opens the door to the misery of perpetual judgment. Not everything the NYPD says it is doing seriously affects privacy interests, but those interests need to be specifically understood; and intrusive policies need to be justified beyond the broad assertion that there is no expectation of privacy in public places and non intimate activities. New York could be a model for other municipalities how to take privacy seriously when observation imposes the Rousseavian burdens and when security seems essential.","PeriodicalId":179517,"journal":{"name":"Information Privacy Law eJournal","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127477365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring Information Sharing through California’s 'Shine the Light' Law 通过加州的“发光”法探索信息共享
Pub Date : 2009-08-13 DOI: 10.2139/SSRN.1448365
Lauren Thomas, C. Hoofnagle
Consumers have a dim understanding of how companies share personal information. To "shine a light" on information sharing practices, the authors employed a unique California law to survey the information sharing practices of 112 businesses. This follow-on study to a similar, smaller survey in 2007, found that four years after the law took effect, compliance is uneven. Fifty-three companies did not respond to the request at all. Only six companies disclosed how they shared information with third parties for their direct marketing purposes. Thirty-nine companies informed us that they do not share information, 5 provided an opt-out option for third party sharing, and 9 responses were categorized as "other."
消费者对公司如何共享个人信息的理解很模糊。为了“照亮”信息共享实践,作者采用了一项独特的加州法律来调查112家企业的信息共享实践。2007年进行的一项规模较小的类似调查的后续研究发现,该法律生效四年后,遵守情况参差不齐。53家公司根本没有回应记者的要求。只有六家公司披露了他们如何与第三方共享信息以用于直接营销目的。39家公司通知我们他们不会共享信息,5家公司提供了第三方共享的退出选项,9家公司的回复被归类为“其他”。
{"title":"Exploring Information Sharing through California’s 'Shine the Light' Law","authors":"Lauren Thomas, C. Hoofnagle","doi":"10.2139/SSRN.1448365","DOIUrl":"https://doi.org/10.2139/SSRN.1448365","url":null,"abstract":"Consumers have a dim understanding of how companies share personal information. To \"shine a light\" on information sharing practices, the authors employed a unique California law to survey the information sharing practices of 112 businesses. This follow-on study to a similar, smaller survey in 2007, found that four years after the law took effect, compliance is uneven. Fifty-three companies did not respond to the request at all. Only six companies disclosed how they shared information with third parties for their direct marketing purposes. Thirty-nine companies informed us that they do not share information, 5 provided an opt-out option for third party sharing, and 9 responses were categorized as \"other.\"","PeriodicalId":179517,"journal":{"name":"Information Privacy Law eJournal","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129016499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Inadvertent File Sharing Over Peer-to-Peer Networks: How it Endangers Citizens and Jeopardizes National Security, Testimony Before the U.S. House Committee on Oversight and Government Reform 在点对点网络上无意的文件共享:它如何危及公民和国家安全,在美国众议院监督和政府改革委员会面前的证词
Pub Date : 2009-07-29 DOI: 10.2139/ssrn.1443289
T. Sydnor
Certain distributors of popular file-sharing programs have repeatedly failed to prevent, and may have knowingly caused and perpetuated, inadvertent file-sharing, Inadvertent sharing cannot be remediated by self-regulation by distributors of file-sharing programs because certain distributors have repeatedly violated every set of self-regulations proposed - including a Code of Conduct and a set of Volutary Best Practices that they drafted. Three critical defects are present in every released version of the LimeWire 5 file-sharing program: (1) every version is dangerously unpredictable and can share all of a user's personal document, image, video, and audio files just by being installed, (2) every version violates critical provisions of the LimeWire's own Voluntary Best Practices, (3) every version contains a feature that LimeWire itself knew to be a needlessly dangerous of means of ensuring that one reasonable mistake by a child could inadvertently share thousands of a family's most sensitive personal files. In short, the problem of inadvertent sharing has persisted for nine years because distributors of file-sharing programs like LimeWire LLC have repeatedly responded to even the most serious and well-documented concerns about inadvertent sharing with half-measures, misrepresentations, whitewash, and other conduct that, considered in its entirety, could strongly suggest bad faith - an intent to cause and perpetuate inadvertent sharing. Consequently, the widespread, well-documented breaches of national, military, corporate, and family security caused by inadvertent sharing may be nothing more - or less - than the acceptable 'collateral damage' of schemes intended to trick users into sharing popular music and movies. Congress should pursue a two-pronged remedial strategy. First, this issue should be formally referred to law-enforcement agencies possessing relevant civil and criminal enforcement authority. And Congress should support efforts to amend H.R. 1319, The Informed P2P User Act, in order to grant the Federal Trade Commission additional targeted enforcement powers.
某些流行的文件共享程序的分发者一再未能阻止,并可能故意造成和延续了无意的文件共享。无意的共享不能通过文件共享程序分发者的自我监管来纠正,因为某些分发者一再违反了每一套自我监管提议——包括他们起草的行为准则和一套自愿最佳实践。LimeWire 5文件共享程序的每个发布版本都存在三个关键缺陷:(1)每个版本都是危险的不可预测的,并且可以通过安装共享所有用户的个人文档,图像,视频和音频文件;(2)每个版本都违反了LimeWire自己的自愿最佳实践的关键条款;(3)每个版本都包含一个功能,LimeWire自己知道这是一个不必要的危险手段,以确保一个孩子的一个合理的错误可能无意中共享数千个家庭最敏感的个人文件。简而言之,无意共享的问题已经持续了9年,因为像LimeWire LLC这样的文件共享程序的分发者一再回应,即使是最严重的、有充分证据的关于无意共享的担忧,他们也会采取半措施、虚假陈述、粉饰和其他行为,从整体上看,这些行为可能强烈表明恶意——有意引起并延续无意共享。因此,由于无意的分享而导致的对国家、军事、企业和家庭安全的广泛的、有案可查的破坏,可能只是一种可接受的“附带损害”,即欺骗用户分享流行音乐和电影。国会应该采取双管齐下的补救策略。首先,这一问题应正式提交具有有关民事和刑事执法权力的执法机构。国会应该支持修订H.R. 1319《知情P2P用户法案》,以授予联邦贸易委员会额外的有针对性的执法权力。
{"title":"Inadvertent File Sharing Over Peer-to-Peer Networks: How it Endangers Citizens and Jeopardizes National Security, Testimony Before the U.S. House Committee on Oversight and Government Reform","authors":"T. Sydnor","doi":"10.2139/ssrn.1443289","DOIUrl":"https://doi.org/10.2139/ssrn.1443289","url":null,"abstract":"Certain distributors of popular file-sharing programs have repeatedly failed to prevent, and may have knowingly caused and perpetuated, inadvertent file-sharing, Inadvertent sharing cannot be remediated by self-regulation by distributors of file-sharing programs because certain distributors have repeatedly violated every set of self-regulations proposed - including a Code of Conduct and a set of Volutary Best Practices that they drafted. Three critical defects are present in every released version of the LimeWire 5 file-sharing program: (1) every version is dangerously unpredictable and can share all of a user's personal document, image, video, and audio files just by being installed, (2) every version violates critical provisions of the LimeWire's own Voluntary Best Practices, (3) every version contains a feature that LimeWire itself knew to be a needlessly dangerous of means of ensuring that one reasonable mistake by a child could inadvertently share thousands of a family's most sensitive personal files. In short, the problem of inadvertent sharing has persisted for nine years because distributors of file-sharing programs like LimeWire LLC have repeatedly responded to even the most serious and well-documented concerns about inadvertent sharing with half-measures, misrepresentations, whitewash, and other conduct that, considered in its entirety, could strongly suggest bad faith - an intent to cause and perpetuate inadvertent sharing. Consequently, the widespread, well-documented breaches of national, military, corporate, and family security caused by inadvertent sharing may be nothing more - or less - than the acceptable 'collateral damage' of schemes intended to trick users into sharing popular music and movies. Congress should pursue a two-pronged remedial strategy. First, this issue should be formally referred to law-enforcement agencies possessing relevant civil and criminal enforcement authority. And Congress should support efforts to amend H.R. 1319, The Informed P2P User Act, in order to grant the Federal Trade Commission additional targeted enforcement powers.","PeriodicalId":179517,"journal":{"name":"Information Privacy Law eJournal","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133362907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Balancing Access to Data and Privacy; A Review of the Issues and Approaches for the Future 平衡数据访问和隐私;展望未来的问题和方法
Pub Date : 2009-07-01 DOI: 10.2139/ssrn.1460714
J. Lane, C. Schur
Access to sensitive micro data should be provided using remote access data enclaves. These enclaves should be built to facilitate the productive, high-quality usage of microdata. In other words, they should support a collaborative environment that facilitates the development and exchange of knowledge about data among data producers and consumers. The experience of the physical and life sciences has shown that it is possible to develop a research community and a knowledge infrastructure around both research questions and the different types of data necessary to answer policy questions. In sum, establishing a virtual organization approach would provided the research community with the ability to move away from individual, or artisan, science, towards the more generally accepted community based approach. Enclave should include a number of features: metadata documentation capacity so that knowledge about data can be shared; capacity to add data so that the data infrastructure can be augmented; communication capacity, such as wikis, blogs and discussion groups so that knowledge about the data can be deepened and incentives for information sharing so that a community of practice can be built. The opportunity to transform micro-data based research through such a organizational infrastructure could potentially be as far-reaching as the changes that have taken place in the biological and astronomical sciences. It is, however, an open research question how such an organization should be established: whether the approach should be centralized or decentralized. Similarly, it is an open research question as to the appropriate metrics of success, and the best incentives to put in place to achieve success.
应使用远程访问数据飞地提供对敏感微数据的访问。这些飞地的建立应该有利于高效、高质量地使用微数据。换句话说,它们应该支持一种协作环境,促进数据生产者和消费者之间数据知识的开发和交流。物理科学和生命科学的经验表明,围绕研究问题和回答政策问题所需的不同类型的数据建立一个研究界和知识基础设施是可能的。总而言之,建立一个虚拟组织方法将为研究社区提供从个人或工匠科学转向更普遍接受的基于社区的方法的能力。Enclave应该包括一些特性:元数据文档能力,以便共享有关数据的知识;增加数据的能力,以便扩充数据基础设施;沟通能力,如维基、博客和讨论组,以便加深对数据的了解,并鼓励信息共享,以便建立一个实践社区。通过这种组织基础设施转变基于微数据的研究的机会可能与生物科学和天文学中发生的变化一样具有深远意义。然而,如何建立这样一个组织是一个悬而未决的研究问题:这种方法应该是集中的还是分散的。同样,衡量成功的适当标准,以及实现成功的最佳激励措施,也是一个悬而未决的研究问题。
{"title":"Balancing Access to Data and Privacy; A Review of the Issues and Approaches for the Future","authors":"J. Lane, C. Schur","doi":"10.2139/ssrn.1460714","DOIUrl":"https://doi.org/10.2139/ssrn.1460714","url":null,"abstract":"Access to sensitive micro data should be provided using remote access data enclaves. These enclaves should be built to facilitate the productive, high-quality usage of microdata. In other words, they should support a collaborative environment that facilitates the development and exchange of knowledge about data among data producers and consumers. The experience of the physical and life sciences has shown that it is possible to develop a research community and a knowledge infrastructure around both research questions and the different types of data necessary to answer policy questions. In sum, establishing a virtual organization approach would provided the research community with the ability to move away from individual, or artisan, science, towards the more generally accepted community based approach. Enclave should include a number of features: metadata documentation capacity so that knowledge about data can be shared; capacity to add data so that the data infrastructure can be augmented; communication capacity, such as wikis, blogs and discussion groups so that knowledge about the data can be deepened and incentives for information sharing so that a community of practice can be built. The opportunity to transform micro-data based research through such a organizational infrastructure could potentially be as far-reaching as the changes that have taken place in the biological and astronomical sciences. It is, however, an open research question how such an organization should be established: whether the approach should be centralized or decentralized. Similarly, it is an open research question as to the appropriate metrics of success, and the best incentives to put in place to achieve success.","PeriodicalId":179517,"journal":{"name":"Information Privacy Law eJournal","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128203734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Inevitable Disclosure Doctrine: A Common-Sense Application that Considers the Rights of Trade Secret Holders and Employees 不可避免披露原则:考虑商业秘密持有人和雇员权利的常识性应用
Pub Date : 2009-03-18 DOI: 10.2139/SSRN.1364726
Eduardo M. Gonzalez
Under the inevitable disclosure doctrine, a court may enjoin a person accepting employment with a direct competitor of a former employer to protect a trade secret. Most states that have adopted the doctrine do not limit its application. Such broad application of the doctrine can be harsh and unfair if the former employee lacked any intent to disclose a trade secret. Moreover, it encourages frivolous lawsuits by employers and discourages bargained-for non-compete agreements. Some states, notably California, citing these policy concerns, have declined to adopt the doctrine. This extreme approach is equally troublesome because it ignores that the protection of trade secrets is vital to society. This article advocates for a common-sense application of the doctrine that considers its two competing policy interests: A person's right to work and the protection of trade secrets. States should adopt the doctrine, but limit its application to encourage the formation of noncompete agreements, discourage frivolous lawsuits, and protect a person's right to choose their profession and employer. This could be accomplished with a strict standing requirement, by barring an injunction against employment when it would harm public health or welfare, and by applying several factors to determine the equities of an injunction. This would correctly balance the competing policy interests of trade secret holders and their employees.
根据不可避免披露原则,法院可以禁止受雇于前雇主的直接竞争对手的人保护商业秘密。大多数采纳这一原则的州并不限制其适用。如果前雇员没有任何披露商业秘密的意图,那么这种原则的广泛适用可能是苛刻和不公平的。此外,它鼓励雇主提起无聊的诉讼,不鼓励讨价还价的竞业禁止协议。一些州,特别是加利福尼亚州,以这些政策考虑为由,拒绝采用这一原则。这种极端做法同样麻烦,因为它忽视了保护商业秘密对社会至关重要。本文提倡对这一原则的常识性应用,考虑到它的两个相互竞争的政策利益:个人的工作权利和保护商业秘密。各州应采纳这一原则,但限制其适用,以鼓励签订竞业禁止协议,劝阻无谓的诉讼,并保护个人选择职业和雇主的权利。要做到这一点,可以采用严格的时效要求,禁止在不利于公众健康或福利的情况下禁止就业的禁令,并采用若干因素来确定禁令的效力。这将正确平衡商业秘密持有人及其雇员之间相互竞争的政策利益。
{"title":"The Inevitable Disclosure Doctrine: A Common-Sense Application that Considers the Rights of Trade Secret Holders and Employees","authors":"Eduardo M. Gonzalez","doi":"10.2139/SSRN.1364726","DOIUrl":"https://doi.org/10.2139/SSRN.1364726","url":null,"abstract":"Under the inevitable disclosure doctrine, a court may enjoin a person accepting employment with a direct competitor of a former employer to protect a trade secret. Most states that have adopted the doctrine do not limit its application. Such broad application of the doctrine can be harsh and unfair if the former employee lacked any intent to disclose a trade secret. Moreover, it encourages frivolous lawsuits by employers and discourages bargained-for non-compete agreements. Some states, notably California, citing these policy concerns, have declined to adopt the doctrine. This extreme approach is equally troublesome because it ignores that the protection of trade secrets is vital to society. This article advocates for a common-sense application of the doctrine that considers its two competing policy interests: A person's right to work and the protection of trade secrets. States should adopt the doctrine, but limit its application to encourage the formation of noncompete agreements, discourage frivolous lawsuits, and protect a person's right to choose their profession and employer. This could be accomplished with a strict standing requirement, by barring an injunction against employment when it would harm public health or welfare, and by applying several factors to determine the equities of an injunction. This would correctly balance the competing policy interests of trade secret holders and their employees.","PeriodicalId":179517,"journal":{"name":"Information Privacy Law eJournal","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116885542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Confusing Fundamental Rights Protection in Europe: Loopholes in European Fundamental Rights Protection Exemplified on European Data Protection Rules 欧洲基本权利保护的混乱:以欧洲数据保护规则为例
Pub Date : 2009-02-24 DOI: 10.2139/SSRN.1348472
Franziska Boehm
Data protection is one of the most discussed topics today. European citizens are affected by data processing in every part of their daily life. But, in case of misuse of their personal data, are they aware of the rights that protect them? European data protection rules can be found in the European Charter of Fundamental Rights, in the European Convention on Data Protection of the Council of Europe, in the OECD Guidelines, in the Directive on Data Protection 95/46, in the EU Charter of Fundamental Rights and in the case law of the ECJ and the ECHR. European citizens are protected by different public international law rules, as well as by national and by EU norms. Complex legal constructions and difficult overarching structures hinder the understanding of data protection provisions, especially as regards newly developed information exchange systems in Police and Judicial Cooperation. The paper will demonstrate the confusing legal situation and recent developments in this field. A final section will summarize the legal difficulties currently arising in this context.
数据保护是当今讨论最多的话题之一。欧洲公民日常生活的方方面面都受到数据处理的影响。但是,如果他们的个人资料被滥用,他们是否知道保护他们的权利?欧洲数据保护规则可在《欧洲基本权利宪章》、欧洲委员会《欧洲数据保护公约》、经合组织指南、《数据保护指令95/46》、《欧盟基本权利宪章》以及欧洲法院和欧洲人权法院的判例法中找到。欧洲公民受到不同的国际公法规则以及国家和欧盟规范的保护。复杂的法律结构和困难的总体结构阻碍了对数据保护规定的理解,特别是在警察和司法合作中新发展的信息交换系统方面。本文将论证这一领域令人困惑的法律状况和最近的发展。最后一节将总结目前在这方面产生的法律困难。
{"title":"Confusing Fundamental Rights Protection in Europe: Loopholes in European Fundamental Rights Protection Exemplified on European Data Protection Rules","authors":"Franziska Boehm","doi":"10.2139/SSRN.1348472","DOIUrl":"https://doi.org/10.2139/SSRN.1348472","url":null,"abstract":"Data protection is one of the most discussed topics today. European citizens are affected by data processing in every part of their daily life. But, in case of misuse of their personal data, are they aware of the rights that protect them? European data protection rules can be found in the European Charter of Fundamental Rights, in the European Convention on Data Protection of the Council of Europe, in the OECD Guidelines, in the Directive on Data Protection 95/46, in the EU Charter of Fundamental Rights and in the case law of the ECJ and the ECHR. European citizens are protected by different public international law rules, as well as by national and by EU norms. Complex legal constructions and difficult overarching structures hinder the understanding of data protection provisions, especially as regards newly developed information exchange systems in Police and Judicial Cooperation. The paper will demonstrate the confusing legal situation and recent developments in this field. A final section will summarize the legal difficulties currently arising in this context.","PeriodicalId":179517,"journal":{"name":"Information Privacy Law eJournal","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133842170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Privacy and the New Energy Infrastructure 隐私和新能源基础设施
Pub Date : 2009-02-15 DOI: 10.2139/SSRN.1370731
E. Quinn
This article examines the privacy consequences of the diffusion of smart grid and smart metering technologies. It illustrates how high resolution electricity usage information can be used to reconstruct many intimate details of a consumer's daily life, and provides examples of how that information could be used in ways potentially invasive of an individual's privacy. The article then examines the nature of existing protections for such information, and evaluates their adequacy in protecting against some of these potentially invasive uses. The article concludes that state legislators and public utility commissions should examine the codes of conduct governing utility disclosure of consumer information in their various jurisdictions to address this new privacy threat.
本文探讨了智能电网和智能计量技术扩散所带来的隐私后果。它说明了高分辨率的用电信息可以用来重建消费者日常生活的许多私密细节,并举例说明了这些信息如何被用于可能侵犯个人隐私的方式。然后,本文检查了对此类信息的现有保护的性质,并评估了它们在防止某些潜在侵入性使用方面的充分性。文章的结论是,州立法机构和公用事业委员会应该在不同的司法管辖区审查管理公用事业披露消费者信息的行为准则,以应对这种新的隐私威胁。
{"title":"Privacy and the New Energy Infrastructure","authors":"E. Quinn","doi":"10.2139/SSRN.1370731","DOIUrl":"https://doi.org/10.2139/SSRN.1370731","url":null,"abstract":"This article examines the privacy consequences of the diffusion of smart grid and smart metering technologies. It illustrates how high resolution electricity usage information can be used to reconstruct many intimate details of a consumer's daily life, and provides examples of how that information could be used in ways potentially invasive of an individual's privacy. The article then examines the nature of existing protections for such information, and evaluates their adequacy in protecting against some of these potentially invasive uses. The article concludes that state legislators and public utility commissions should examine the codes of conduct governing utility disclosure of consumer information in their various jurisdictions to address this new privacy threat.","PeriodicalId":179517,"journal":{"name":"Information Privacy Law eJournal","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121220913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 214
Open Borders, Intellectual Property, & Federal Criminal Trade Secret Law 开放边界,知识产权和联邦刑事商业秘密法
Pub Date : 2009-01-28 DOI: 10.2139/SSRN.1334101
Shubha Ghosh
The mobility of skilled labor across firms has been identified as an important source of regional advantage. Scholars have shown how cultural, economic, and legal conditions (such as the nonenforceability of covenants not to compete) affect the development of high tech sectors that are geographically concentrated. This paper explores to what extent these theories are applicable to the movement of skilled labor across national borders. This inquiry is relevant because the United States enacted the Economic Espionage Act in 1996, and this Act has been used to prosecute non-US skilled workers for theft of trade secret. The Act has application to mobility within the United States as well. To what extent are justifications for the Economic Espionage Act of 1996 mitigated by its effects on labor mobility and the accompanying transfer of knowledge and technology? This paper addresses this question through a theoretical discussion of international trade and mobility of labor and knowledge across borders and an assessment of the case law under the Economic Espionage Act. The author criticizes the Act because of its effect on the transfer of knowledge and makes the case for open borders to promote the mobility of knowledge. Several policy implications are drawn for limits on the Economic Espionage Act, including extraterritorial application of state trade secret law and federal patent law.
技术劳动力在企业之间的流动已被确定为区域优势的重要来源。学者们已经展示了文化、经济和法律条件(如不竞争契约的不可执行性)如何影响地理上集中的高科技部门的发展。本文探讨了这些理论在多大程度上适用于技术劳动力的跨国流动。这项调查具有相关性,因为美国于1996年颁布了《经济间谍法》,该法案已被用于起诉非美国技术工人盗窃商业秘密。该法案也适用于美国境内的流动性。1996年《经济间谍法》对劳动力流动以及随之而来的知识和技术转移的影响,在多大程度上减轻了其正当性?本文通过对国际贸易和跨境劳动力和知识流动的理论讨论以及对《经济间谍法》下的判例法的评估来解决这个问题。作者批评了该法案,因为它对知识转移的影响,并提出了开放边界以促进知识流动的理由。对《经济间谍法》的限制提出了若干政策含义,包括州商业秘密法和联邦专利法的域外适用。
{"title":"Open Borders, Intellectual Property, & Federal Criminal Trade Secret Law","authors":"Shubha Ghosh","doi":"10.2139/SSRN.1334101","DOIUrl":"https://doi.org/10.2139/SSRN.1334101","url":null,"abstract":"The mobility of skilled labor across firms has been identified as an important source of regional advantage. Scholars have shown how cultural, economic, and legal conditions (such as the nonenforceability of covenants not to compete) affect the development of high tech sectors that are geographically concentrated. This paper explores to what extent these theories are applicable to the movement of skilled labor across national borders. This inquiry is relevant because the United States enacted the Economic Espionage Act in 1996, and this Act has been used to prosecute non-US skilled workers for theft of trade secret. The Act has application to mobility within the United States as well. To what extent are justifications for the Economic Espionage Act of 1996 mitigated by its effects on labor mobility and the accompanying transfer of knowledge and technology? This paper addresses this question through a theoretical discussion of international trade and mobility of labor and knowledge across borders and an assessment of the case law under the Economic Espionage Act. The author criticizes the Act because of its effect on the transfer of knowledge and makes the case for open borders to promote the mobility of knowledge. Several policy implications are drawn for limits on the Economic Espionage Act, including extraterritorial application of state trade secret law and federal patent law.","PeriodicalId":179517,"journal":{"name":"Information Privacy Law eJournal","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132861108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Conceptions of Privacy: A Comment on R. v. Kang-Brown and R. v. A.M. 隐私权的概念:评r.v . Kang-Brown和r.v . A.M.
Pub Date : 2008-11-01 DOI: 10.29173/ALR243
S. Penney
The Supreme Court of Canada's recent "sniffer dog" decisions expose two key flaws in its s. 8 jurisprudence. First, it has failed to develop a sophisticated understanding of the different interests that privacy is designed to protect. This led it to set out procedural rules that both over- and under-protect the privacy interests implicated by canine sniffs. By requiring reasonable suspicion before using dogs to detect drugs concealed in anonymous containers, the Court severely restricted the ability of police to investigate drug crime in a context where the risk and magnitude of informational harm is low. The Court's approach is under-protective, in contrast, in relation to non-anonymous sniffs. In the absence of ex ante checks on the discretion of front-line investigators, the reasonable suspicion standard provides insufficient protection against the harms of arbitrary selection and discriminatory profiling.The second flaw is the Court's failure to foster a more dynamic, co-operative, and modest relationship with Parliament in regulating investigative powers. In interpreting both the common law and s. 8, the Court could easily have taken a more minimalist approach. What harm would come from finding that anonymous sniffs attract no reasonable expectation of privacy? If people believed that such sniffs should be regulated, they could lobby their elected representatives to do so. Similarly, had the majority found no common law power to conduct non-anonymous sniffs without warrants or reasonable suspicion, Parliament would likely have been moved to act. In so doing, it may very well have crafted a more detailed, nuanced, and protective regulatory regime than the one imposed by the Court.In commenting on these cases, I set out a taxonomy of the concepts of privacy relevant to s. 8. The taxonomy's organizing principle is simple: privacy is described in relation to the discrete interests that it protects. Not surprisingly, this may not tell us precisely how those interests should be balanced against countervailing concerns, such as the detection and deterrence of crime, but it should help us to achieve a more optimal accommodation between them.
加拿大最高法院最近关于“嗅探犬”的判决暴露了其第8条判例中的两个关键缺陷。首先,它未能对隐私旨在保护的不同利益形成成熟的理解。这导致它制定了程序规则,对犬类嗅探所涉及的隐私利益保护过度或不足。法院要求在使用警犬探测隐藏在匿名容器中的毒品之前进行合理怀疑,这严重限制了警察在信息危害风险和程度较低的情况下调查毒品犯罪的能力。相比之下,对于非匿名的嗅探者,法院的做法缺乏保护。在对一线调查人员的自由裁量权缺乏事前检查的情况下,合理怀疑标准提供的保护不足以防止任意选择和歧视性定性的危害。第二个缺陷是法院未能在规范调查权力方面与议会建立一种更有活力、更合作、更适度的关系。在解释普通法和第8条时,最高法院很容易采取一种更简单的方法。如果发现匿名嗅探没有引起对隐私的合理期望,会有什么害处呢?如果人们认为这种嗅闻应该受到监管,他们可以游说他们选出的代表这样做。同样,如果大多数人认为普通法没有权力在没有搜查令或合理怀疑的情况下进行非匿名嗅探,议会很可能会采取行动。在这样做的过程中,它很可能制定了一个比法院所施加的更详细、更细致和更具保护性的管理制度。在评论这些案例时,我列出了与第8条有关的隐私概念的分类。该分类法的组织原则很简单:隐私是根据它所保护的离散利益来描述的。不足为奇的是,这可能无法准确地告诉我们,这些利益应该如何与侦查和威慑犯罪等相互抵消的关切相平衡,但它应该有助于我们在两者之间实现更优的协调。
{"title":"Conceptions of Privacy: A Comment on R. v. Kang-Brown and R. v. A.M.","authors":"S. Penney","doi":"10.29173/ALR243","DOIUrl":"https://doi.org/10.29173/ALR243","url":null,"abstract":"The Supreme Court of Canada's recent \"sniffer dog\" decisions expose two key flaws in its s. 8 jurisprudence. First, it has failed to develop a sophisticated understanding of the different interests that privacy is designed to protect. This led it to set out procedural rules that both over- and under-protect the privacy interests implicated by canine sniffs. By requiring reasonable suspicion before using dogs to detect drugs concealed in anonymous containers, the Court severely restricted the ability of police to investigate drug crime in a context where the risk and magnitude of informational harm is low. The Court's approach is under-protective, in contrast, in relation to non-anonymous sniffs. In the absence of ex ante checks on the discretion of front-line investigators, the reasonable suspicion standard provides insufficient protection against the harms of arbitrary selection and discriminatory profiling.The second flaw is the Court's failure to foster a more dynamic, co-operative, and modest relationship with Parliament in regulating investigative powers. In interpreting both the common law and s. 8, the Court could easily have taken a more minimalist approach. What harm would come from finding that anonymous sniffs attract no reasonable expectation of privacy? If people believed that such sniffs should be regulated, they could lobby their elected representatives to do so. Similarly, had the majority found no common law power to conduct non-anonymous sniffs without warrants or reasonable suspicion, Parliament would likely have been moved to act. In so doing, it may very well have crafted a more detailed, nuanced, and protective regulatory regime than the one imposed by the Court.In commenting on these cases, I set out a taxonomy of the concepts of privacy relevant to s. 8. The taxonomy's organizing principle is simple: privacy is described in relation to the discrete interests that it protects. Not surprisingly, this may not tell us precisely how those interests should be balanced against countervailing concerns, such as the detection and deterrence of crime, but it should help us to achieve a more optimal accommodation between them.","PeriodicalId":179517,"journal":{"name":"Information Privacy Law eJournal","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116355974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research Report: What Californians Understand About Privacy Offline 研究报告:加州人对离线隐私的理解
Pub Date : 2008-05-15 DOI: 10.2139/SSRN.1133075
C. Hoofnagle, J. King
Many online privacy problems are rooted in the offline world, where businesses are free to sell consumers' personal information unless they voluntarily agree not to or where a specific law prohibits the practice. In order to gauge Californians' understanding of business practices with respect to the selling of customer data, we asked a representative sample of Californians about the default rules for protecting personal information in nine contexts. In six of those contexts (pizza delivery, donations to charities, product warranties, product rebates, phone numbers collected at the register, and catalog sales), a majority either didn't know or falsely believed that opt-in rules protected their personal information from being sold to others. In one context - grocery store club cards - a majority did not know or thought information could be sold when California law prohibited the sale. Only in two contexts - newspaper and magazine subscriptions and sweepstakes competitions - did our sample of Californians understand that personal information collected by a company could be sold to others. Respondents who shopped online were less likely to say that they didn't know the answer to the nine questions asked than those who never shopped online. In about half of the cases, those who shopped online answered correctly more often than those who do not shop online. Professor Alan Westin has pioneered a popular "segmentation" to describe Americans as fitting into one of three subgroups concerning privacy: privacy "fundamentalists" (high concern for privacy), "pragmatists" (mid-level concern), and the "unconcerned" (low or no privacy concern). When compared with these segments, Californians are more likely to be privacy pragmatists or fundamentalists, and less likely to be unconcerned about privacy. Fundamentalists were much more likely to be correct in their views of privacy rules. In light of this finding, we question Westin's conclusion that privacy pragmatists are well served by self-regulatory and opt-out approaches, as we found this subgroup of consumers is likely to misunderstand default rules in the marketplace.
许多在线隐私问题的根源在于线下世界,在线下,企业可以自由地出售消费者的个人信息,除非他们自愿同意不这样做,或者有特定的法律禁止这种做法。为了衡量加州人对销售客户数据方面的商业惯例的理解,我们询问了加州人的代表性样本,了解在九种情况下保护个人信息的默认规则。在其中的六种情况下(披萨外卖、慈善捐款、产品保修、产品回扣、登记时收集的电话号码和目录销售),大多数人要么不知道,要么错误地认为选择加入规则保护了他们的个人信息不被出售给他人。在一种情况下——杂货店会员卡——当加州法律禁止销售信息时,大多数人不知道或认为信息可以出售。只有在两种情况下——报纸和杂志订阅和抽奖竞赛——我们的加州样本才明白,公司收集的个人信息可能会出售给他人。与从未在网上购物的受访者相比,在网上购物的受访者不知道9个问题的答案的可能性更小。在大约一半的情况下,那些在网上购物的人比那些不在网上购物的人回答正确的频率更高。艾伦·威斯汀教授开创了一个流行的“细分”理论,将美国人描述为三个关于隐私的小群体之一:隐私“原教旨主义者”(高度关注隐私),“实用主义者”(中等程度的关注)和“不关心”(低或没有隐私关注)。与这些部分相比,加州人更可能是隐私实用主义者或原教旨主义者,而不太可能不关心隐私。原教旨主义者对隐私规则的看法更有可能是正确的。鉴于这一发现,我们质疑威斯汀的结论,即隐私实用主义者通过自我监管和选择退出的方式得到了很好的服务,因为我们发现这部分消费者很可能误解了市场上的默认规则。
{"title":"Research Report: What Californians Understand About Privacy Offline","authors":"C. Hoofnagle, J. King","doi":"10.2139/SSRN.1133075","DOIUrl":"https://doi.org/10.2139/SSRN.1133075","url":null,"abstract":"Many online privacy problems are rooted in the offline world, where businesses are free to sell consumers' personal information unless they voluntarily agree not to or where a specific law prohibits the practice. In order to gauge Californians' understanding of business practices with respect to the selling of customer data, we asked a representative sample of Californians about the default rules for protecting personal information in nine contexts. In six of those contexts (pizza delivery, donations to charities, product warranties, product rebates, phone numbers collected at the register, and catalog sales), a majority either didn't know or falsely believed that opt-in rules protected their personal information from being sold to others. In one context - grocery store club cards - a majority did not know or thought information could be sold when California law prohibited the sale. Only in two contexts - newspaper and magazine subscriptions and sweepstakes competitions - did our sample of Californians understand that personal information collected by a company could be sold to others. Respondents who shopped online were less likely to say that they didn't know the answer to the nine questions asked than those who never shopped online. In about half of the cases, those who shopped online answered correctly more often than those who do not shop online. Professor Alan Westin has pioneered a popular \"segmentation\" to describe Americans as fitting into one of three subgroups concerning privacy: privacy \"fundamentalists\" (high concern for privacy), \"pragmatists\" (mid-level concern), and the \"unconcerned\" (low or no privacy concern). When compared with these segments, Californians are more likely to be privacy pragmatists or fundamentalists, and less likely to be unconcerned about privacy. Fundamentalists were much more likely to be correct in their views of privacy rules. In light of this finding, we question Westin's conclusion that privacy pragmatists are well served by self-regulatory and opt-out approaches, as we found this subgroup of consumers is likely to misunderstand default rules in the marketplace.","PeriodicalId":179517,"journal":{"name":"Information Privacy Law eJournal","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114794937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
期刊
Information Privacy Law eJournal
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1