The Law of Privacy Prof. Michael Madison – University of Pittsburgh School of Law – January 22, 2004 [1] What is privacy? [2] What law regulates privacy?

Slides:



Advertisements
Similar presentations
Data Privacy and Security in the Cloud Presented by Robert J. Scott Managing Partner Scott & Scott, LLP
Advertisements

Privacy and the Internet Professor Peter P. Swire Ohio State University National Press Foundation February 14, 2001.
HIPAA In Relation to Other Federal Laws Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster LLP Glasser LegalWorks/HIPAA Conference.
WORLD BANK AMFA – Investors Fair Good Practices for Consumer Protection in Financial Services Baku, 7 October 2009 Juan Carlos Izaguirre Consultant Consumer.
Mobile Payments and the FTC Manas Mohapatra Director of Mobile Policy Mobile Technology Unit Federal Trade Commission The views expressed are not necessarily.
US Constitution and Right to Privacy Generally only protects against government action Doesn’t obligate government to do something, but rather to refrain.
Privacy Laws & Higher Education. Agenda 1.Five Privacy Laws a.FERPA b.HIPAA c.GLB d.FACTA Disposal Rule e.CAN-SPAM 2.Overview of the Laws a.What does.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 1 Fair Information Practice.
Privacy Rights Under Pressure  Innovations in technology: photography, audio recording, motion pictures, computers, telecommunications, digital data,
CSE2500 Systems Security and Privacy Week 11 Privacy Law in Australia (after 2000)
Information Systems Unit 3 – Outcome 3 Legal Obligations of Programmers Student Lecture.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
Data Retention LIS 550 Winter 2010 Unsworth Tuesday, March 02, 2010.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2007 Lorrie Cranor 1 Privacy Law.
Privacy Chris Kelly iLaw July 5, 2002.
CS294-1 Deeply Embedded Networks Privacy Discussion 11/25/03 David Culler University of California, Berkeley.
1 Who Gets to Know? Child Welfare & Confidentiality John L. Saxon Institute of Government The University of North Carolina at Chapel Hill February, 2004.
CyLab Usable Privacy and Security Laboratory 1 Privacy Policy, Law and Technology Privacy Law September 9, 2010.
What if my organization conducts business across borders ? Your footnote Privacy and “Personal Information” have different meanings in different countries;
A European View of Privacy Protection John Woulds Director of Operations UK Data Protection Commissioner National Conference on Privacy, Technology & Criminal.
Data Protection: International. Data Protection: a Human Right Part of Right to Personal Privacy Personal Privacy : necessary in a Democratic Society.
Taking Steps to Protect Privacy A presentation to Hamilton-area Physiotherapy Managers by Bob Spence Communications Co-ordinator Office of the Ontario.
Class 13 Internet Privacy Law European Privacy.
Banks and the Privacy of Medical Information 8 th National HIPAA Summit March 8, 2004 Joy Pritts, JD Health Policy Institute Georgetown University
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor 1 Fair Information Practice.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
Sharing Low-Income Customer Information Water & Energy Utilities LIOB Meeting - January 2009 Seaneen M Wilson Division of Water & Audits.
Privacy and Ubiquitous Computing Deirdre K. Mulligan Acting Clinical Professor of Law Director Samuelson Law, Technology & Public Policy Clinic, Boalt.
© 2007 The MITRE Corporation. MITRE Privacy Practice W3C Government Linked Data Working Group Michael Aisenberg, Esq. 29 June 2011 Predicate for Privacy.
Track II: Introduction and Overview of Financial Services and Information Technology Privacy Policy: Synthesizing Financial Services Industry Privacy David.
1 CIVIL RIGHTS COMPLIANCE AND ENFORCEMENT Office for Civil Rights U.S. Department of Health and Human Services Introduction to OCR.
Legal aspects Based on Law in the Internet Age Sharon K. Black.
Notes for Discussion on a Privacy Practice © Joe Cleetus.
Case Study: Pharmaceuticals Patrick F. Sullivan, Ph.D. 939 North Graham Avenue, Indianapolis, IN
The Primacy of Privacy: A survey of knowledge and opinions Prof. Masooda Bashir Kevin Hoff Gahyun Jeon.
Federal Trade Commission required to issue and enforce regulations concerning children’s online privacy. Initial COPPA Rule effective April 21, 2000;
A project implemented by the HTSPE consortium This project is funded by the European Union SECURITY AND CITIZENS SECURITY AND CITIZENSHIP CONSUMER
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
PricewaterhouseCoopers 1 Administrative Simplification: Privacy Audioconference April 14, 2003 William R. Braithwaite, MD, PhD “Doctor HIPAA” HIPAA Today.
Policies for Information Sharing April 10, 2006 Mark Frisse, MD, MBA, MSc Marcy Wilder, JD Janlori Goldman, JD Joseph Heyman, MD.
C HAPTER 34 Code Blue Health Sciences Edition 4. Confidentiality of sensitive information is an important issue in healthcare. Breaches of confidentiality.
14.1 Chapter 14 Privacy © 2003 by West Legal Studies in Business/A Division of Thomson Learning.
Student Financial Assistance. Session 55-2 Session 55 Internet Privacy Laws.
CS 6v Privacy The end of Privacy ?? Dr.Murat Kantarcioglu.
Privacy Jody Blanke Distinguished Professor of Computer Information Systems and Law Mercer University.
Privacy Advisory Services … … A Best Practices, Integrated Approach Insert Firm Name Here.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
Jody Blanke, Professor Computer Information Systems and Law 1.
Data Security and Privacy Overview and Update Peter Moldave October 28, 2015.
Roundtable on Privacy in Transition: Is Privacy Policy Working in the Healthcare Sector?
Dino Tsibouris & Mehmet Munur Privacy and Information Security Laws and Updates.
1 Privacy Lessons from Other Industries Chris Zoladz, CIPP, Vice President, Information Protection Marriott International, President, International Association.
Chapter 4: Laws, Regulations, and Compliance
Copyright ©2012 Delmar, Cengage Learning. All rights reserved. Chapter 5 Legal Issues.
APEC Privacy Framework “The lack of consumer trust and confidence in the privacy and security of online transactions and information networks is one element.
Data Security in the Cloud and Data Breaches: Lawyer’s Perspective Dino Tsibouris Mehmet Munur
LAW RIGHT TO PRIVACY NOTES 1. Def: Right protecting citizens from unreasonable interference by government 2. No right to privacy in the Constitution.
Medical Records and Managed Care
Legal and Ethical Dimensions of Sport Public Relations
Federal Agencies and Laws for Consumer Rights
Data Protection: EU & International
Other Sources of Information
NATIONAL HEALTH INFORMATION TECHNOLOGY AUDIOCONFERENCE NOVEMBER 23, 2004 Legal Barriers to the Adoption of Health Information Technology Paul T. Smith,
Privacy 101 A Brief History of Privacy
Presentation to The Fourth National HIPAA Summit
National HIPAA Audioconferences
HIPAA Privacy and Security Update - 5 Years After Implementation
Reflections on information sharing in health privacy law in New Zealand There are at least five sides to every issue – the patient’s right to medical privacy,
Presentation transcript:

The Law of Privacy Prof. Michael Madison – University of Pittsburgh School of Law – January 22, 2004 [1] What is privacy? [2] What law regulates privacy? [3] How does the law regulate privacy? [4] How might the law solve new privacy problems?

The Law of Privacy Prof. Michael Madison – University of Pittsburgh School of Law – January 22, 2004 [1] What is privacy? Broadly defined: an interest in shielding information about oneself from disclosure to others. (Privacy interests may include: publicity, anonymity, transparency, accuracy, solitude, intimacy, imagination, secrecy, dignity, physical separation) More specifically: Privacy can be defined best by focusing on the particular context(s) involved in a particular dispute over privacy. Where? [a] Home [where?] [b] Office [c] School [d] The street [e] A shopping mall [f] Your car [someone elses car?] Who? [a] The news media [b] The government [c] Your neighbors [d] Your employer [e] Your colleagues at work [f] Your classmates at school When? [a] Now [b] Tomorrow [c] A year from now [d] Yesterday [e] Five years ago What?

The Law of Privacy Prof. Michael Madison – University of Pittsburgh School of Law – January 22, 2004 [2] What law regulates privacy? Federal law Constitution of the United States (no explicit privacy right, but a zone of privacy recognized in its penumbras, including 1st, 3 rd, 4th, 5th, and 14th Amendments) [a] Griswold v. Connecticut (1965) (decisional privacy) (also Roe v. Wade (1973)) [b] Whalen v. Roe (1977) (information privacy) [c] Spatial privacy? Data privacy? Federal statutes (for example: Privacy Act, Buckley Amendment, COPPA, HIPAA, GLB, ECPA, VPPA) State law State constitutions may recognize explicit right to privacy (Georgia, Hawaii) State statutes and common (tort) law Local laws and regulations (for example: ordinances on soliciting anonymously) No law: Informal and socially-based privacy-protecting customs; technologies

The Law of Privacy Prof. Michael Madison – University of Pittsburgh School of Law – January 22, 2004 [3] How does the law regulate privacy? Types of solutions: Law may require waiving privacy interests. Law may enforce privacy interests. Typically, the law identifies relevant privacy interests to protect, identifies relevant interests supporting disclosure, and tries to balance both sets of issues in a single resolution. Particularly difficult problems: Can an individual own (and therefore sell) his or her own privacy rights? Should the default assumption be protect the privacy interest or compel waiver of the privacy interest? [Who should bear the cost of changing the default?] When should the law defer to informal or social norms, or to technological (barriers) (solutions)?

The Law of Privacy Prof. Michael Madison – University of Pittsburgh School of Law – January 22, 2004 [3] How does the law regulate privacy? Comparing US and European Union approaches to data privacy Issue: Database provider collects information about an individuals credit card use. The individuals database record contains errors. (1)What are the providers obligations to the individual? (2)Can the provider sell or license access to the database for profit? US: business-sector specific; designed to cure market problems Obligations of database provider depend on character of provider as, for example, a consumer reporting agency (Fair Credit Reporting Act); financial institution (Gramm Leach Bliley); or a covered entity in health care (HIPAA) EU approach: comprehensive principles; human rights foundation (Data Protection Directive/1996) Notice/awareness; choice/consent; access/participation; integrity/security; enforcement/remedy [Similar to Code of Fair Information Practices]

The Law of Privacy Prof. Michael Madison – University of Pittsburgh School of Law – January 22, 2004 [4] How might the law solve new privacy problems? Assumptions of the US legal system: [a] benefits from free flow of information [b] presumption that markets (bargains) should regulate that flow Create a market for privacy? How? Technological tools: give individuals the means to bargain Privacy rights: give individuals the legal leverage to bargain Compare: copyright law in the digital age