Page 201 - Privacy in a Cyber Age Policy and Practice
P. 201

NOTES  189

              voice prints, 17. Full face photographic images and any comparable images,
              [and] 18. Any other unique identifying number, characteristic, or code (other
              than a unique study ID).” David T. Fetzer and O. Clark West, “The HIPAA Pri-
              vacy Rule and Protected Health Information: Implications in Research Involving
              DICOM Image Databases,” Academic Radiology 15, 3 (2008): 390–395.
           55.  C.F.R. 164.508 (a) (2) (2003).
           56. Italics mine. http://www.hhs.gov/ocr/privacy/hipaa/administrative/privacyrule/
              privrulepd.pdf.
           57.  United States v. Miller (425 U.S. 435, 1976).
           58.  U.S. Code § 3401, http://www.law.cornell.edu/uscode/text/12/3401.
           59.  Harold C. Relyea, “Legislating Personal Privacy Protection: The Federal
              Response,” The Journal of Academic Leadership 27, 1 (2001): 43.
           60.  Pub.L. 110–233, 122 Stat. 881.
           61.  “The Act prohibits law enforcement officials from searching for or seiz-
              ing information from people who disseminate information to the public
              [the media]. Where it applies, the Act requires law enforcement officials to
              instead rely on compliance with a subpoena.” Elizabeth B. Uzelac, “Reviving
              the Privacy Protection Act of 1980,” Northwestern University Law Review 107,
              3 (2015): 1437–1468.
           62.  N. J. King and V. T. Raja, “What Do They Really Know About Me in the Cloud?
              A Comparative Law Perspective on Protecting Privacy and Security of Sensi-
              tive Information,” American Business Law Journal 50, 2 (2013): 424–431.
           63. Ibid.
           64. Ibid.
           65.  PHI is further elaborated in the law, with sixteen specific data fields named
              as patient information that must be deleted from health-care research man-
              uscripts and other publications. Elizabeth Madsen, Daniel R. Masys, and
              Randolph A. Miller, “HIPAA Possamus,”  Journal of the American Medical
              Informatics Association 10, 3: 294.
           66.  Paul M. Schwartz and Daniel J. Solove, “The PII Problem: Privacy and A New
              Concept of Personally Identifiable Information,”  New York University Law
              Review 86, 6 (2011): 1821.
           67.  United States v. Jones (565 U.S. ___, 2012).
           68.  Andrew A. Proia, “A New Approach to Digital Reader Privacy: State Regulations
              and Their Protection of Digital Book Data,” Indiana Law Journal 88, 4 (2013): 1608.
           69.  Amitai Etzioni, “The Privacy Merchants: What Is to Be Done?” Journal of Con-
              stitutional Law 14 no. 4 (2012): 950. Ted Bridis, “FBI: Data Brokers Probably
              Act Illegally,” The Washington Post, June 22, 2006, www.washingtonpost.com/
              wp-dyn/content/article/2006/06/22/AR2006062200932.html. Martin H. Bos-
              worth, “FBI Uses Data Brokers, ‘Risk Scores’ to Hunt Terrorists,” Consumer
              Affairs, July 11, 2007, http://www.consumeraffairs.com/news04/2007/07/fbi_
              risk_scores.html.
           70.  Erik Brynjolfsson and Andrew McAfee, The Second Machine Age: Work, Prog-
              ress, and Prosperity in a Time of Brilliant Technologies, New York: W. W. Norton &
              Company, 2014.
   196   197   198   199   200   201   202   203   204   205   206