Page 214 - Privacy in a Cyber Age Policy and Practice
P. 214
202 NOTES
67. D. C. Roth, “Florida v. Jardines: Trespassing on the Reasonable Expectation of
Privacy,” Denver University Law Review 91, 2 (2014): 554.
68. Cynthia Lee, “Package Bombs, Footlockers, and Laptops: What the Disappearing
Container Doctrine Can Tell Us About the Fourth Amendment,” The Journal of
Criminal Law and Criminology 100, 4 (2010): 1415.
69. Ibid., 1405.
70. Ibid., 1414.
71. Ex Parte Jackson, 96 U.S. 727 (1828).
72. Amitai Etzioni, “A Cyber Age Privacy Doctrine: A Liberal Communitarian
Approach,” I/S: A Journal of Law and Policy for the Information Society 10,
2 (2014).
73. Arguably, restrictions or guidelines on the megabytes of information to be
collected should vary based on the type of information because the byte is,
strictly speaking, a measure of data, not information. For example, 100 mb of
data is enough for thousands of text e-mails but less than five minutes of high-
quality video, and the former could provide a much greater amount of private
information than the latter.
74. Riley v. California, 134 S. Ct. 2473 (2014).
75. Ibid.
76. Ibid.
77. National Conference of State Legislatures, “Genetic Privacy Laws” (2008),
http://www.ncsl.org/research/health/genetic-privacy-laws.aspx.
78. “The Act prohibits law enforcement officials from searching for or seizing
information from people who disseminate information to the public [the
media]. Where it applies, the Act requires law enforcement officials to instead
rely on compliance with a subpoena.” Elizabeth B. Uzelac, “Reviving the Pri-
vacy Protection Act of 1980,” Northwestern University Law Review 107,
3 (2013): 1437–68.
79. N. J. King and V. T. Raja, “What Do They Really Know About Me in the Cloud?
A Comparative Law Perspective on Protecting Privacy and Security of Sensi-
tive Information,” American Business Law Journal 50,2 (2013): 424–31.
80. Assume holding constant the level of public interest. The said markers would
be recollected, for instance, when a terrorist attack is imminent or for other
significant changes in public concerns. For more on this see Amitai Etzioni,
Limits of Privacy (Basic Books: New York, 1999).
Chapter 5
1. Julia Angwin, “The Web’s New Gold Mine: Your Secrets,” Wall Street Journal,
July 30, 2010, http://online.wsj.com/article/SB10001424052748703940904575
395073512989404.html.
2. Ibid.
3. Justin Scheck, “Stalkers Exploit Cell Phone GPS,” Wall Street Journal, August 3,
2010, http://online.wsj.com/article/SB100014240527487034673045753835223
18244234.html.