Page 200 - Privacy in a Cyber Age Policy and Practice
P. 200

188  NOTES

              of an airport screening, which detects information about an individual only
              at one given point in time. A single CCTV camera is limited in its ability to
              collect information; it cannot collect information about a passing individual
              except while that person is within range of the camera. By contrast, wiretaps
              or continuous GPS monitoring collect many data points about the individual
              over a long range of time, and paint a much more comprehensive picture of the
              person’s movements or associations.
           45.  Cate, Cullen, and Mayer-Schönberger, “Reinventing Privacy Principles for the
              Big Data Age.”
           46.  This is a subject about which much has been written; it is therefore not further
              explored here.
           47.  Paul M. Schwartz and Daniel J. Solove, “The PII Problem: Privacy and a New
              Concept of Personally Identifiable Information,”  New York University Law
              Review 86, 6 (2011): 1816.
           48.  Joel M. Gora, “The Fourth Amendment at the Airport: Arriving, Departing, or
              Cancelled,” Villanova Law Review 18, 6 (1973): 1038.
           49.  Jay Stanley, “Extreme Traffic Enforcement,” ACLU Blog, American Civil
              Liberties Union, May 24, 2012, https://www.aclu.org/blog/technology-and-
              liberty-criminal-law-reform/extreme-traffic-enforcement. “ACLU of Iowa
              Challenges Use of Speed Cameras in Davenport,” American Civil Liber-
              ties Union, June 14, 2006, https://www.aclu.org/technology-and-liberty/
              aclu-iowa-challenges-use-speed-cameras-davenport.
           50.  “Government Proposes Massive Shift In Online Privacy Policy,” American
              Civil Liberties Union, August 10, 2009, https://www.aclu.org/free-speech_
              technology-and-liberty/government-proposes-massive-shift-online-privacy-
              policy.
           51.  “American Civil Liberties Union Privacy Statement,” American Civil Liberties
              Union, January 18, 2013, https://www.aclu.org/american-civil-liberties-union-
              privacy-statement.
           52. Susan Herman, Taking Liberties: The War on Terror and the Erosion of American
              Democracy, New York: Oxford University Press, 2014.
           53.  David Zeitlyn, “The Talk Goes Outside: Argument, Privacy and Power in
              Mambila Society, Towards a Sociology of Embedded Praxis,” Africa: The Journal
              of the International African Institute 73, 4 (2003): 607.
           54.  PHI is information, held by health care providers, defined as “1. Name includ-
              ing current, previous, and mother’s maiden name, 2. Postal address and all geo-
              graphical subdivisions smaller than a State . . . except for the initial three digits of
              a zip code . . . , 3. All elements of dates (except year) for dates directly related to an
              individual, including birth date, admission date, discharge date, [and so forth],
              4.  Telephone numbers, 5. Facsimile numbers, 6. Electronic mail addresses,
              7. Social security numbers, 8. Medical record numbers, 9. Health plan beneficiary
              numbers, 10. Account numbers, 11. Certificate/license numbers, 12. Vehicle iden-
              tifiers and serial numbers, including license plate numbers, 13. Device identifiers
              and serial numbers, 14. Web Universal Resource Locators (URLs), 15. Internet
              Protocol (IP) address numbers, 16. Biometric identifiers, including finger and
   195   196   197   198   199   200   201   202   203   204   205