Page 200 - Privacy in a Cyber Age Policy and Practice
P. 200
188 NOTES
of an airport screening, which detects information about an individual only
at one given point in time. A single CCTV camera is limited in its ability to
collect information; it cannot collect information about a passing individual
except while that person is within range of the camera. By contrast, wiretaps
or continuous GPS monitoring collect many data points about the individual
over a long range of time, and paint a much more comprehensive picture of the
person’s movements or associations.
45. Cate, Cullen, and Mayer-Schönberger, “Reinventing Privacy Principles for the
Big Data Age.”
46. This is a subject about which much has been written; it is therefore not further
explored here.
47. Paul M. Schwartz and Daniel J. Solove, “The PII Problem: Privacy and a New
Concept of Personally Identifiable Information,” New York University Law
Review 86, 6 (2011): 1816.
48. Joel M. Gora, “The Fourth Amendment at the Airport: Arriving, Departing, or
Cancelled,” Villanova Law Review 18, 6 (1973): 1038.
49. Jay Stanley, “Extreme Traffic Enforcement,” ACLU Blog, American Civil
Liberties Union, May 24, 2012, https://www.aclu.org/blog/technology-and-
liberty-criminal-law-reform/extreme-traffic-enforcement. “ACLU of Iowa
Challenges Use of Speed Cameras in Davenport,” American Civil Liber-
ties Union, June 14, 2006, https://www.aclu.org/technology-and-liberty/
aclu-iowa-challenges-use-speed-cameras-davenport.
50. “Government Proposes Massive Shift In Online Privacy Policy,” American
Civil Liberties Union, August 10, 2009, https://www.aclu.org/free-speech_
technology-and-liberty/government-proposes-massive-shift-online-privacy-
policy.
51. “American Civil Liberties Union Privacy Statement,” American Civil Liberties
Union, January 18, 2013, https://www.aclu.org/american-civil-liberties-union-
privacy-statement.
52. Susan Herman, Taking Liberties: The War on Terror and the Erosion of American
Democracy, New York: Oxford University Press, 2014.
53. David Zeitlyn, “The Talk Goes Outside: Argument, Privacy and Power in
Mambila Society, Towards a Sociology of Embedded Praxis,” Africa: The Journal
of the International African Institute 73, 4 (2003): 607.
54. PHI is information, held by health care providers, defined as “1. Name includ-
ing current, previous, and mother’s maiden name, 2. Postal address and all geo-
graphical subdivisions smaller than a State . . . except for the initial three digits of
a zip code . . . , 3. All elements of dates (except year) for dates directly related to an
individual, including birth date, admission date, discharge date, [and so forth],
4. Telephone numbers, 5. Facsimile numbers, 6. Electronic mail addresses,
7. Social security numbers, 8. Medical record numbers, 9. Health plan beneficiary
numbers, 10. Account numbers, 11. Certificate/license numbers, 12. Vehicle iden-
tifiers and serial numbers, including license plate numbers, 13. Device identifiers
and serial numbers, 14. Web Universal Resource Locators (URLs), 15. Internet
Protocol (IP) address numbers, 16. Biometric identifiers, including finger and