Page 201 - Privacy in a Cyber Age Policy and Practice
P. 201
NOTES 189
voice prints, 17. Full face photographic images and any comparable images,
[and] 18. Any other unique identifying number, characteristic, or code (other
than a unique study ID).” David T. Fetzer and O. Clark West, “The HIPAA Pri-
vacy Rule and Protected Health Information: Implications in Research Involving
DICOM Image Databases,” Academic Radiology 15, 3 (2008): 390–395.
55. C.F.R. 164.508 (a) (2) (2003).
56. Italics mine. http://www.hhs.gov/ocr/privacy/hipaa/administrative/privacyrule/
privrulepd.pdf.
57. United States v. Miller (425 U.S. 435, 1976).
58. U.S. Code § 3401, http://www.law.cornell.edu/uscode/text/12/3401.
59. Harold C. Relyea, “Legislating Personal Privacy Protection: The Federal
Response,” The Journal of Academic Leadership 27, 1 (2001): 43.
60. Pub.L. 110–233, 122 Stat. 881.
61. “The Act prohibits law enforcement officials from searching for or seiz-
ing information from people who disseminate information to the public
[the media]. Where it applies, the Act requires law enforcement officials to
instead rely on compliance with a subpoena.” Elizabeth B. Uzelac, “Reviving
the Privacy Protection Act of 1980,” Northwestern University Law Review 107,
3 (2015): 1437–1468.
62. N. J. King and V. T. Raja, “What Do They Really Know About Me in the Cloud?
A Comparative Law Perspective on Protecting Privacy and Security of Sensi-
tive Information,” American Business Law Journal 50, 2 (2013): 424–431.
63. Ibid.
64. Ibid.
65. PHI is further elaborated in the law, with sixteen specific data fields named
as patient information that must be deleted from health-care research man-
uscripts and other publications. Elizabeth Madsen, Daniel R. Masys, and
Randolph A. Miller, “HIPAA Possamus,” Journal of the American Medical
Informatics Association 10, 3: 294.
66. Paul M. Schwartz and Daniel J. Solove, “The PII Problem: Privacy and A New
Concept of Personally Identifiable Information,” New York University Law
Review 86, 6 (2011): 1821.
67. United States v. Jones (565 U.S. ___, 2012).
68. Andrew A. Proia, “A New Approach to Digital Reader Privacy: State Regulations
and Their Protection of Digital Book Data,” Indiana Law Journal 88, 4 (2013): 1608.
69. Amitai Etzioni, “The Privacy Merchants: What Is to Be Done?” Journal of Con-
stitutional Law 14 no. 4 (2012): 950. Ted Bridis, “FBI: Data Brokers Probably
Act Illegally,” The Washington Post, June 22, 2006, www.washingtonpost.com/
wp-dyn/content/article/2006/06/22/AR2006062200932.html. Martin H. Bos-
worth, “FBI Uses Data Brokers, ‘Risk Scores’ to Hunt Terrorists,” Consumer
Affairs, July 11, 2007, http://www.consumeraffairs.com/news04/2007/07/fbi_
risk_scores.html.
70. Erik Brynjolfsson and Andrew McAfee, The Second Machine Age: Work, Prog-
ress, and Prosperity in a Time of Brilliant Technologies, New York: W. W. Norton &
Company, 2014.