Privacy Jody Blanke Distinguished Professor of Computer Information Systems and Law Mercer University.

Slides:



Advertisements
Similar presentations
The Law of Privacy Prof. Michael Madison – University of Pittsburgh School of Law – January 22, 2004 [1] What is privacy? [2] What law regulates privacy?
Advertisements

A Brief History of Information Privacy IC211. Colonial America Eavesdropping “listen[ing] under walls or windows, or the eaves of a house, to hearken.
US Constitution and Right to Privacy Generally only protects against government action Doesn’t obligate government to do something, but rather to refrain.
Privacy Laws & Higher Education. Agenda 1.Five Privacy Laws a.FERPA b.HIPAA c.GLB d.FACTA Disposal Rule e.CAN-SPAM 2.Overview of the Laws a.What does.
HIPAA HIPAA Health Insurance Portability and Accountability Act of 1996.
Privacy and the Right to Know Grayson Barber, Esq. Grayson Barber, LLC.
Jody Blanke, Professor Computer Information Systems and Law Mercer University, Atlanta.
© South-Western Educational Publishing Chapter 29 Consumer Protection  Laws to Protect Consumers  Agencies to Protect Consumers.
13.1 Chapter 13 Privacy © 2003 by West Legal Studies in Business/A Division of Thomson Learning.
Privacy Fundamentals Ethics in a Computing Culture Ch. 3, pp
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2007 Lorrie Cranor 1 Privacy Law.
Introduction To Privacy Law Richard Warner. Informational Privacy Our focus will be on informational privacy. Informational privacy consists in the ability.
CS294-1 Deeply Embedded Networks Privacy Discussion 11/25/03 David Culler University of California, Berkeley.
CyLab Usable Privacy and Security Laboratory 1 Privacy Policy, Law and Technology Privacy Law September 9, 2010.
Privacy & Personal Information -- Why do we care or do we?
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
INVASION OF PRIVACY What is freedom of the press? Should there be limits on the press? Are there aspects of the media essential to freedom of the press?
PRIVACY LAW JOUR3060 Communication Law & Regulation.
Banks and the Privacy of Medical Information 8 th National HIPAA Summit March 8, 2004 Joy Pritts, JD Health Policy Institute Georgetown University
+ Protecting Individual Liberties Section 1 Chapter 14.
Why You Can’t Win, Break Even, or Get Out of the Game... WATCHING THE DIGITAL DEMOLITION OF OUR FOURTH AMENDMENT RIGHTS IDEAS & INTERSECTIONS: DIGITAL.
(Edited) WORKPLACE PRIVACY.
The Privacy Torts Public Disclosure of a Private Fact Intrusion False Light Appropriation.
Privacy and Ubiquitous Computing Deirdre K. Mulligan Acting Clinical Professor of Law Director Samuelson Law, Technology & Public Policy Clinic, Boalt.
Tort Law Jody Blanke Professor of Computer Information Systems and Law.
Legal aspects Based on Law in the Internet Age Sharon K. Black.
Copyright © 2010 – Jeffrey Pittman. Introduction The following slides expand the textbook coverage of the topic “Invasion of Privacy” Privacy Law - Jeffrey.
HIPAA EFFECTS OF HEALTH CARE LEGISLATION. Evaluation of the influences of HIPAA  How it affected health care system  How it works as a law  Changes.
Confidentiality for Transportation Personnel.  Family Educational Rights and Privacy Act (FERPA)  Kentucky Family Educational Rights and Privacy Act.
Sources of Privacy Rights First, right to privacy based on Constitutional Amendments Second, right to privacy falling under “liberty” of 14 th Amendment.
Risk Assessment. InfoSec and Legal Aspects Risk assessment Laws governing InfoSec Privacy.
Privacy, Confidentiality, Security, and Integrity of Electronic Data
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
The Right to Privacy Jody Blanke, Professor Computer Information Systems and Law.
Building a Privacy Foundation. Setting the Standard for Privacy Health Insurance Portability and Accountability Act (HIPAA) Patient Bill of Rights Federal.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
Tort Law Jody Blanke Professor of Computer Information Systems and Law.
The “Penumbra” of Rights.  Can your right to privacy be defined? ◦ The government typically has looked at privacy as behavior or activity free of an.
14.1 Chapter 14 Privacy © 2003 by West Legal Studies in Business/A Division of Thomson Learning.
Student Financial Assistance. Session 55-2 Session 55 Internet Privacy Laws.
The Privacy Torts Public Disclosure of a Private Fact Intrusion False Light Appropriation.
1-1 CHAPTER 7 MATERIALS TO SUPPLEMENT TEXTBOOK J. Pittman, Instructor.
Tort Law Jody Blanke Professor of Computer Information Systems and Law.
Jody Blanke Professor of Computer Information Systems and Law
The 4 th amendment. The 4 th amendment prohibits unreasonable searches and seizures and requires any warrant to be judicially sanctioned and supported.
Jody Blanke, Professor Computer Information Systems and Law 1.
Chapter 4: Laws, Regulations, and Compliance
HIPAA Overview Why do we need a federal rule on privacy? Privacy is a fundamental right Privacy can be defined as the ability of the individual to determine.
Table of Contents. Lessons 1. Introduction to HIPAA Go Go 2. The Privacy Rule Go Go.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
LAW RIGHT TO PRIVACY NOTES 1. Def: Right protecting citizens from unreasonable interference by government 2. No right to privacy in the Constitution.
Chapter 5 Constitutional Authority To Regulate Business.
Privacy and the Law.
Introduction to Law Jody Blanke
Introduction to the Law BUS 346
Tort Law Jody Blanke Ernest L. Baskin, Jr. Distinguished
The Right to Privacy Jody Blanke
Student Confidentiality: The FERPA/HIPAA Facts
The Right to Privacy Jody Blanke
Chapter 20: Civil Liberties: Protecting Individual Rights Section 1
Introduction to the Law BAA 604
Chapter 20: Civil Liberties: Protecting Individual Rights Section 1
Tort Law Jody Blanke Ernest L. Baskin, Jr. Distinguished
Privacy 101 A Brief History of Privacy
Privacy 101 A Brief History of Privacy
Privacy 101 A Brief History of Privacy
Tort Law Jody Blanke Ernest L. Baskin, Jr. Distinguished
Student Confidentiality: The FERPA/HIPAA Facts
Introduction to Privacy Part I
Presentation transcript:

Privacy Jody Blanke Distinguished Professor of Computer Information Systems and Law Mercer University

Right to Privacy  Origins in 1890 article by Samuel Warren and Louis Brandeis  First state to recognize right in civil case Georgia – 1905

The Right to Privacy Pavesich (1905)

U.S. Constitution  Does not contain the word “privacy”  1965 case held that “zones of privacy” emanate from the “penumbras” of the 1 st, 3 rd, 4 th, 5 th and 9 th Amendments (Griswold v. Conn.)  1967 case held that an electronic listening device violated the 4 th Amendment (Katz v. U.S.) concurring opinion proposed the “reasonable” expectation of privacy rule

U.S. Constitution (cont.)  1968 case adopted the notion of the “reasonable” expectation of privacy rule (Terry v. Ohio)  1977 case identified two “privacy” interests (Whalen v. Roe): the interest in avoiding disclosure of personal matters, and the interest in independence in making certain kinds of important decisions

State Constitutions  Ten state constitutions contain the word “privacy” Ak., Ariz., Calif., Fla., Haw., Ill., La., Mont., S.C., Wash. Ak., Calif., Fla., Haw. and Mont. have privacy protection beyond criminal search and seizure  Many provide for a right greater than that protected by the U.S. Constitution

Invasion of Privacy Tort  Appropriation of name or likeness e.g., Michael Jordan Wine  Intrusion upon seclusion e.g., Jackie O, Holiday Inn, Mazzio’s Pizza, Sean Penn, Bill Gates, Bob Dylan, Katz, Kyllo  False light e.g., Parade Magazine Teenage Prostitution  Publication of private embarrassing facts e.g., “Joe Hero” Silvia Leyva at Café Intermezzo, Atlanta

Federal Privacy Laws  Apply only to federal agencies Freedom of Information Act (FOIA) (1966, re-titled in 1986) Privacy Act (1994)  Very sectoral in approach Fair Credit Reporting Act (FCRA) (1970)  Fair and Accurate Credit Transactions Act (FACTA) (2003) Electronics Communications Privacy Act (ECPA) (1986) 8

Federal Privacy Laws (cont.) Video Privacy Protection Act (1988)  revised in 2013 Health Insurance Portability and Accountability Act (HIPAA) (1996)  modified by the Health Information Technology for Economic and Clinical Health Act (HITECH) (2009) Children’s Online Privacy Protection Act (COPPA) (1998)  revised in

Federal Privacy Laws (cont.) Gramm-Leach-Bliley Act (GLB) (1999) Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN- SPAM) (2003)