Privacy and the Right to Know Grayson Barber, Esq. Grayson Barber, LLC.

Slides:



Advertisements
Similar presentations
University Data Classification Table* Level 5Level 4 Information that would cause severe harm to individuals or the University if disclosed. Level 5 information.
Advertisements

A Brief History of Information Privacy IC211. Colonial America Eavesdropping “listen[ing] under walls or windows, or the eaves of a house, to hearken.
Overview of the Privacy Act
US Constitution and Right to Privacy Generally only protects against government action Doesn’t obligate government to do something, but rather to refrain.
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
Consumer Privacy and Information Access Professor Matt Thatcher.
© 2015 Sherman & Howard L.L.C. TO B OR NOT TO B YOD Emily Keimig, Esq
© 2007 by West Legal Studies in Business / A Division of Thomson Learning CHAPTER 4 Constitutional Authority to Regulate Business.
Section 6.3 Protecting Your Credit. Billing Errors and Disputes Notify your creditor in writing Notify your creditor in writing Pay the portion of the.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
13.1 Chapter 13 Privacy © 2003 by West Legal Studies in Business/A Division of Thomson Learning.
McCarthy Tétrault McCarthy Tétrault LLP An Act respecting the protection of personal information in the private sector (Quebec): « Particularities of the.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2007 Lorrie Cranor 1 Privacy Law.
CS294-1 Deeply Embedded Networks Privacy Discussion 11/25/03 David Culler University of California, Berkeley.
Disclaimer This Presentation is provided “as is” without any express or implied warranty. This Presentation is for educational purposes only and does not.
CyLab Usable Privacy and Security Laboratory 1 Privacy Policy, Law and Technology Privacy Law September 9, 2010.
Privacy & Personal Information -- Why do we care or do we?
Taking Steps to Protect Privacy A presentation to Hamilton-area Physiotherapy Managers by Bob Spence Communications Co-ordinator Office of the Ontario.
“Privacy Implications of RFID Technology in Health Care Settings” Marc Rotenberg President EPIC Dept. of Health & Human Services Washington, DC 11 January.
Privacy After Nixon's resignation, the govt took control of all of his presidential records, including the tapes, in the Presidential Recordings and Materials.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
A member of The Marmon Group of companies The Fair Credit Reporting Act as amended by the FACT Act Eric Rosenberg May 14, 2004 Chicago Association of Direct.
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
RISING DATA FLOW- OUT OF CONTROL? ARTHUR POBER, ED.D.
Legal aspects Based on Law in the Internet Age Sharon K. Black.
STANDARD 5.3 Objective 3 Students will explain and understand the need for confidentiality.
Notes for Discussion on a Privacy Practice © Joe Cleetus.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Smart Machines, Smart Privacy: Rules of the Road and Challenges Ahead The views expressed are those of the speaker and not necessarily those of the FTC.
Sharing Information With Affiliates and Third Parties F. Jay Meyer Vice President & Senior Counsel TD Bank, N.A. Portland, Maine.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
Privacy Professional Practice for Computer Science Guest Lecture, 05 March 2007 Philippa Lawson Director, Canadian Internet Policy & Public Interest Clinic.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
Amendments to the U.S Constitution that have particular implications in science, medicine, and the delivery of health care >>>>>>
PricewaterhouseCoopers 1 Administrative Simplification: Privacy Audioconference April 14, 2003 William R. Braithwaite, MD, PhD “Doctor HIPAA” HIPAA Today.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
Federal Agencies and Laws for Consumer Rights
14.1 Chapter 14 Privacy © 2003 by West Legal Studies in Business/A Division of Thomson Learning.
Databases and Privacy Storing, Organizing and Retrieving Data.
McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 11 Employment Regulation and Labor Law.
Privacy and Free Speech: It's Good for Business Nicole A. Ozer, Esq. Technology and Civil Liberties Policy Director ACLU of Northern California Online.
Student Financial Assistance. Session 55-2 Session 55 Internet Privacy Laws.
Financial Law Objective 4.01 Understand financial, credit, and bankruptcy law. Objective 4.01 Understand financial, credit, and bankruptcy law. BB30 Business.
Lecture 8 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS (continued) © Prentice Hall
Essentials Of Business Law Chapter 27 Conducting Business In Cyberspace McGraw-Hill/Irwin Copyright © 2007 The McGraw-Hill Companies, Inc. All rights reserved.
The Protection of Personal Information Bill 13 February
Privacy Policy Issues & Pages Amy Reese INF385E Information Architecture and Design 1 UT iSchool 21 September 2004.
James Fox Shane Stuart Danny Deselle Matt Baldwin Acceptable Use Policies.
Cyberlaw. “The moving finger writes; and, having writ Moves on: nor all thy piety nor wit Shall lure it back to cancel half a line. Nor all thy tears.
APEC Privacy Framework “The lack of consumer trust and confidence in the privacy and security of online transactions and information networks is one element.
Copyright, Intellectual Property, and Privacy 1 Lesson Plan: BMM A9-4.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
1 Ethics of Computing MONT 113G, Spring 2012 Session 31 Privacy as a value.
Table of Contents. Lessons 1. Introduction to HIPAA Go Go 2. The Privacy Rule Go Go.
The Data Protection Audit How to prepare What to expect The end results Dublin Chamber of Commerce, March 24 th.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
Government Protection Consumers protected by both laws and agencies at different levels Look at table on page 30.
TYLER GROUP
Consumer Information Federal Trade Commission Act grants Federal Trade Commission (FTC) responsibility regarding unfair methods of competition and unfair.
Privacy and the Law.
CHAPTER 24 Laws of Debtor--Creditor Relations and Consumer Protection
Federal Agencies and Laws for Consumer Rights
Attention Identity theft Definition
Essentials of the Legal Environment today, 5E
Current Privacy Issues That May Affect Your Credit Union
Employee Privacy and Privacy of Employee Information
Chapter 23 Government Regulation and Administrative Law
Presentation transcript:

Privacy and the Right to Know Grayson Barber, Esq. Grayson Barber, LLC

What is Privacy?  Personal security  Control over personal information  Freedom from unreasonable searches and seizures  Individual dignity  Property interest in name, image or likeness  The right to be left alone

Constitutional Privacy Protection  First Amendment right to free expression  Fourth Amendment freedom from governmental overreaching  Substantive liberty interests  New Jersey State Constitution

Federal Statutory Privacy Protection – A Patchwork  Freedom of Information Act  Federal Privacy Act of 1974  Fair Credit Reporting Act of 1970  Cable Act of 1984  Electronic Communications Privacy Act  Polygraph Protection Act of 1988  Telephone Consumer Protection Act  Children’s Online Privacy Protection Act

Fair Information Practices 1.Relevance 2.Purpose 3.Use Limitations 4.Quality 5.Security 6.Access 7.Consent 8.Accountability

Fair Information Practices 1.Relevance

Fair Information Practices 1.Relevance 2.Purpose

Fair Information Practices 1.Relevance 2.Purpose 3.Use Limitations

Fair Information Practices 1.Relevance 2.Purpose 3.Use Limitations 4.Quality

Fair Information Practices 1.Relevance 2.Purpose 3.Use Limitations 4.Quality 5.Security

Fair Information Practices 1.Relevance 2.Purpose 3.Use Limitations 4.Quality 5.Security 6.Access

Fair Information Practices 1.Relevance 2.Purpose 3.Use Limitations 4.Quality 5.Security 6.Access 7.Consent

Fair Information Practices 1.Relevance 2.Purpose 3.Use Limitations 4.Quality 5.Security 6.Access 7.Consent 8.Accountability

Reasons for Fair Information Practices  Ensure data collection is fair and subject to law  Build consumer confidence  Establish stable business environment  Reap benefits of new technology while safeguarding key interests

Notice and Opt-Out  Gramm-Leach-Bliley

Gramm-Leach-Bliley Banks Insurance Companies Brokerage Houses

Gramm-Leach-Bliley Banks Insurance Companies Brokerage Houses “Affiliates” Third Parties Notice and “Opt Out”

Gramm-Leach-Bliley Banks Insurance Companies Brokerage Houses “Affiliates” Medical Information

Notice and Opt-Out  Gramm-Leach-Bliley  “Privacy statements” are reservations of rights, disclaimers, warning labels  Enforcement is difficult  No private cause of action  Market-based practices fail to protect privacy  Amplification effect

Failures in Self-Regulation  Identity theft  Prozac in the mail  Toysmart.com  Scarlet letters

What Is To Be Done?  Open government  Opt-in for disclosures of personal data  Fair information practices  Allow lawsuits for invasions of privacy  New laws for new technologies  Ask what actually works

Open Records are Essential for Protecting Privacy  Free expression and privacy are both essential for democracy  Without open government, there is no privacy  Open records can shed light on government without disclosing personal information about individuals

What Can You Do?  Contact your legislators  New Jersey Financial Privacy Act A-3216 and S-2245 

What Can You Do?  Speak up!  Attend meetings of the Privacy Study Commission  Write to the PSC