Page 214 - Privacy in a Cyber Age Policy and Practice
P. 214

202  NOTES

           67.  D. C. Roth, “Florida v. Jardines: Trespassing on the Reasonable Expectation of
              Privacy,” Denver University Law Review 91, 2 (2014): 554.
           68. Cynthia Lee, “Package Bombs, Footlockers, and Laptops: What the Disappearing
              Container Doctrine Can Tell Us About the Fourth Amendment,” The Journal of
              Criminal Law and Criminology 100, 4 (2010): 1415.
           69. Ibid., 1405.
           70. Ibid., 1414.
           71.  Ex Parte Jackson, 96 U.S. 727 (1828).
           72.  Amitai Etzioni, “A Cyber Age Privacy Doctrine: A Liberal Communitarian
              Approach,” I/S: A Journal of Law and Policy for the Information Society 10,
              2 (2014).
           73.  Arguably, restrictions or guidelines on the megabytes of information to be
              collected should vary based on the type of information because the byte is,
              strictly speaking, a measure of data, not information. For example, 100 mb of
              data is enough for thousands of text e-mails but less than five minutes of high-
              quality video, and the former could provide a much greater amount of private
              information than the latter.
           74.  Riley v. California, 134 S. Ct. 2473 (2014).
           75. Ibid.
           76. Ibid.
           77.  National Conference of State Legislatures, “Genetic Privacy Laws” (2008),
              http://www.ncsl.org/research/health/genetic-privacy-laws.aspx.
           78.  “The Act prohibits law enforcement officials from searching for or seizing
              information from people who disseminate information to the public [the
              media]. Where it applies, the Act requires law enforcement officials to instead
              rely on compliance with a subpoena.” Elizabeth B. Uzelac, “Reviving the Pri-
              vacy Protection Act of 1980,”  Northwestern University Law Review 107,
              3 (2013): 1437–68.
           79.  N. J. King and V. T. Raja, “What Do They Really Know About Me in the Cloud?
              A Comparative Law Perspective on Protecting Privacy and Security of Sensi-
              tive Information,” American Business Law Journal 50,2 (2013): 424–31.
           80.  Assume holding constant the level of public interest. The said markers would
              be recollected, for instance, when a terrorist attack is imminent or for other
              significant changes in public concerns. For more on this see Amitai Etzioni,
              Limits of Privacy (Basic Books: New York, 1999).



                                     Chapter 5
             1.  Julia Angwin, “The Web’s New Gold Mine: Your Secrets,” Wall Street Journal,
              July 30, 2010, http://online.wsj.com/article/SB10001424052748703940904575
              395073512989404.html.
            2.  Ibid.
             3.  Justin Scheck, “Stalkers Exploit Cell Phone GPS,” Wall Street Journal, August 3,
              2010, http://online.wsj.com/article/SB100014240527487034673045753835223
              18244234.html.
   209   210   211   212   213   214   215   216   217   218   219