Page 194 - Privacy in a Cyber Age Policy and Practice
P. 194

182  NOTES

           33.  The Right to Financial Privacy Act of 1978, 12 U.S.C. §§ 3401–3402.
           34.  Department of Health and Human Services, “Summary of the HIPAA Privacy
              Rule,” , http://www.hhs.gov/ocr/privacy/hipaa/understanding/summary/.
           35.  The Video Privacy Protection Act of 1988, 18 U.S.C. § 2710.
           36.  Gina Stevens, “Privacy Protections for Personal Information Online,” Congres-
              sional Research Service (April 6, 2011).
           37.  Orin S. Kerr, “The Mosaic Theory of the Fourth Amendment,” 111 Michigan
              Law Review 3 (December 2012), 333.
           38.  Matthew D. Lawless, “The Third Party Doctrine Redux: Internet Search
              Records and the Case for a ‘Crazy Quilt’ of Fourth Amendment Protection,”
              UCLA Journal of Law & Technology 2 (2007): 1.
           39.  Orin Kerr and Greg Nojeim, “The Data Question: Should the Third-Party
              Records Doctrine Be Revisited?” ABA Journal (August 1, 2012), http://
              www.abajournal.com/magazine/article/the_data_question_should_
              the_third-party_records_doctrine_be_revisited/.
           40.  Daniel Cooper, “Consent in EU Data Protection Law,”  European Privacy
              Association, http://www.europeanprivacyassociation.eu/public/download/
              EPA%20Editorial_%20Consent%20in%20EU%20Data%20Protection%20
              Law.pdf (accessed April 7, 2013).
           41. European Commission, Why Do We Need an EU Data Protection Reform?,
              http://ec.europa.eu/justice/data-protection/document/review2012/fact-
              sheets/1_en.pdf (accessed April 7, 2013).
           42.  “New Draft European Data Protection Regime,” Law Patent Group, http://
              mlawgroup.de/news/publications/detail.php?we_objectID=227 (accessed March 6,
              2015).
           43.  Erica Newland, “CDT Comments on EU Data Protection Directive,” Center
              for Democracy and Technology (January 20, 2011), https://www.cdt.org/blogs/
              erica-newland/cdt-comments-eu-data-protection-directive.
           44.  “Data protection reform: Frequently asked questions,” Europa (January 25,
              2012) http://europa.eu/rapid/press-release_MEMO-12-41_en.htm?locale=fr.
           45.  In the wake of Jones, Professor Susan Freiwald identified four factors that the
              courts use to extend Fourth Amendment protection to new surveillance tech-
              nologies that “make sense.” These include whether the target is unaware of the
              surveillance; it covers items that the people consider private; it is continuous;
              and it is indiscriminate (covers more information than is necessary for estab-
              lishing guilt). Susan Freiwald, “The Four Factor Test,” The Selected Works of
              Susan Freiwald, http://works.bepress.com/susan_freiwald/11.
           46.  People often trust assurances that their sensitive information (names and
              social security number) can be deleted when their data is collected in large
              databases. In fact, scientists have shown that individuals can be easily “deano-
              nymized.” Paul Ohm writes that this misunderstanding has given the public
              a false sense of security and has led to inadequate privacy protections, laws,
              and regulations. See Peter Ohm, “Broken Promises of Privacy: Responding
              to the Surprising Failure of Anonymization,” UCLA Law Review 57 (2010):
              1701. See also Marcia Stepanek, “Weblining,” BusinessWeek (April 3, 2000),
   189   190   191   192   193   194   195   196   197   198   199