scallinstitute.files.wordpress.com · 3. PRIVACY AND TECHNOLOGY. By Alyssa Thurston . Books and...

31
Privacy: Current Legal Trends Further Reading April 11-12, 2014 Ventura, California 2014 SCALL Institute

Transcript of scallinstitute.files.wordpress.com · 3. PRIVACY AND TECHNOLOGY. By Alyssa Thurston . Books and...

Page 1: scallinstitute.files.wordpress.com · 3. PRIVACY AND TECHNOLOGY. By Alyssa Thurston . Books and Practice Materials . AM. BAR ASSOC., INFORMATION SECURITY AND PRIVACY: A PRACTICAL

Privacy: Current Legal Trends

Further Reading

April 11-12, 2014

Ventura, California

2014 SCALL Institute

Page 2: scallinstitute.files.wordpress.com · 3. PRIVACY AND TECHNOLOGY. By Alyssa Thurston . Books and Practice Materials . AM. BAR ASSOC., INFORMATION SECURITY AND PRIVACY: A PRACTICAL

i

Bibliography Committee

Co-Chairs

Jodi Kruger

Assistant Director for Reference Services, Pepperdine University School of Law

Alyssa Thurston

Research and Electronic Services Librarian, Pepperdine University School of Law

Tiffani Willis

Research Services Librarian, Pepperdine University School of Law

Members

Erik Adams

Electronic Resources Librarian, Sheppard, Mullin, Richter & Hampton

Don Buffaloe

Senior Research and Student Services Librarian, Pepperdine University School of Law

Esther Eastman

Reference & Research Librarian, LA Law Library

Page 3: scallinstitute.files.wordpress.com · 3. PRIVACY AND TECHNOLOGY. By Alyssa Thurston . Books and Practice Materials . AM. BAR ASSOC., INFORMATION SECURITY AND PRIVACY: A PRACTICAL

ii

Table of Contents

Privacy Generally.............................................................................................................................1

Privacy and Technology ..................................................................................................................3

Privacy and the Government ............................................................................................................7

Workplace Privacy .........................................................................................................................11

Privacy and Social Media ..............................................................................................................17

Consumer Privacy and Identity Theft ............................................................................................20

Privacy and Healthcare ..................................................................................................................25

Page 4: scallinstitute.files.wordpress.com · 3. PRIVACY AND TECHNOLOGY. By Alyssa Thurston . Books and Practice Materials . AM. BAR ASSOC., INFORMATION SECURITY AND PRIVACY: A PRACTICAL

1

PRIVACY GENERALLY

Books and Practice Materials

AM. BAR ASSOC., THE INFORMATION PRIVACY LAW SOURCEBOOK (2014).

CHARLENE BROWNLEE & BLAZE WALESKI, PRIVACY LAW (2006- ).

GRETCHEN MCCORD, WHAT YOU NEED TO KNOW ABOUT PRIVACY LAW: A GUIDE FOR

LIBRARIANS AND EDUCATORS (2013).

ADAM D. MOORE, PRIVACY RIGHTS: MORAL AND LEGAL FOUNDATIONS (2010).

PRACTISING LAW INST., PROSKAUER ON PRIVACY: A GUIDE TO PRIVACY AND DATA SECURITY

LAW IN THE INFORMATION AGE (Kristen J. Mathews ed., 2006-). (available on Bloomberg Law)

ALEXANDRA I. RENGEL, PRIVACY IN THE 21ST CENTURY (2013).

ANDREW B. SERWIN, INFORMATION SECURITY AND PRIVACY: A GUIDE TO FEDERAL AND STATE

LAW AND COMPLIANCE (2009- ).

ANDREW SERWIN, PETER F. MCLAUGHLIN & JOHN TOMASZEWSKI, PRIVACY, SECURITY AND

INFORMATION MANAGEMENT: AN OVERVIEW (2011).

DANIEL J. SOLOVE, UNDERSTANDING PRIVACY (2010).

DANIEL J. SOLOVE & PAUL M. SCHWARTZ, PRIVACY LAW FUNDAMENTALS (2d ed. 2013).

JOHN T. SOMA & STEPHEN D. RYNERSON, PRIVACY LAW IN A NUTSHELL (2008).

LISA J. SOTTO, PRIVACY & DATA SECURITY LAW DESKBOOK (2010- ).

Websites

ABA Journal, Blawg Directory: Privacy Law, http://www.abajournal.com/blawgs/topic/privacy+law/.

Electronic Frontier Foundation, Privacy, https://www.eff.org/issues/privacy.

Electronic Privacy Information Center, http://epic.org/.

Page 5: scallinstitute.files.wordpress.com · 3. PRIVACY AND TECHNOLOGY. By Alyssa Thurston . Books and Practice Materials . AM. BAR ASSOC., INFORMATION SECURITY AND PRIVACY: A PRACTICAL

2

State of California Department of Justice, Office of the Attorney General, Privacy Enforcement and Protection, http://oag.ca.gov/privacy.

U.S. General Services Administration, Privacy Laws, Regulations, and More, http://www.gsa.gov/portal/content/104250.

Privacy.org, http://www.privacy.org.

Page 6: scallinstitute.files.wordpress.com · 3. PRIVACY AND TECHNOLOGY. By Alyssa Thurston . Books and Practice Materials . AM. BAR ASSOC., INFORMATION SECURITY AND PRIVACY: A PRACTICAL

3

PRIVACY AND TECHNOLOGY

By Alyssa Thurston

Books and Practice Materials

AM. BAR ASSOC., INFORMATION SECURITY AND PRIVACY: A PRACTICAL GUIDE FOR GLOBAL

EXECUTIVES, LAWYERS, AND TECHNOLOGISTS (Thomas J. Shaw ed., 2012).

TERENCE CRAIG & MARY E. LUDLOFF, PRIVACY AND BIG DATA (2011).

DATA SECURITY AND PRIVACY LAW (Ronald Weikers ed., 2013). (available on Westlaw)

WHITFIELD DIFFIE & SUSAN LANDAU, PRIVACY ON THE LINE: THE POLITICS OF WIRETAPPING

AND ENCRYPTION (2007).

DAVID J. HOLTZMAN, PRIVACY LOST: HOW TECHNOLOGY IS ENDANGERING YOUR PRIVACY (2006).

LESSONS FROM THE IDENTITY TRAIL: ANONYMITY, PRIVACY, AND IDENTITY IN A NETWORKED

SOCIETY (Ian Kerr et al. eds., 2009).

NAT’L RESEARCH COUNCIL, ENGAGING PRIVACY AND INFORMATION TECHNOLOGY IN A DIGITAL

AGE (2007).

HELEN NISSENBAUM, PRIVACY IN CONTEXT: TECHNOLOGY, POLICY, AND THE INTEGRITY OF

SOCIAL LIFE (2010).

ROBERT O’HARROW, NO PLACE TO HIDE (2006).

DANIEL J. SOLOVE, NOTHING TO HIDE: THE FALSE TRADEOFF BETWEEN PRIVACY AND SECURITY (2011).

DANIEL J. SOLOVE & PAUL M. SCHWARTZ, PRIVACY, INFORMATION, AND TECHNOLOGY (3rd ed. 2011).

DANIEL J. SOLOVE, THE DIGITAL PERSON: TECHNOLOGY AND PRIVACY IN THE INFORMATION AGE (2006).

ANDREW B. SERWIN, INFORMATION SECURITY AND PRIVACY: A GUIDE TO FEDERAL AND STATE

LAW AND COMPLIANCE (2012). (available on Westlaw)

Page 7: scallinstitute.files.wordpress.com · 3. PRIVACY AND TECHNOLOGY. By Alyssa Thurston . Books and Practice Materials . AM. BAR ASSOC., INFORMATION SECURITY AND PRIVACY: A PRACTICAL

4

Selected Articles and Symposia

Claudia Diaz et al., Hero or Villain: The Data Controller in Privacy Law and Technologies, 74 OHIO ST. L. J. 923 (2013).

Demetrius Klitou, Privacy by Design and Privacy-Invading Technologies: Safeguarding Privacy, Liberty and Security in the 21st Century, 5 LEGISPRUDENCE 297 (2011).

Alexandra W. Joel, Choosing Both: Making Technology Choices at the Intersections of Privacy and Security, 88 TEX. L. REV. 1751 (2010).

Jacqueline D. Lipton, Digital Multimedia and the Limits of Privacy Law, 42 CASE W. RES. J. INT’L L. 551 (2010).

Devin W. Ness, Note, Information Overload: Why Omnipresent Technology and the Rise of Big Data Shouldn’t Spell the End for Privacy As We Know It, 31 CARDOZO ARTS & ENT. L. J. 925 (2013).

Paul Ohm, The Argument Against Technology-Neutral Surveillance Laws, 88 TEX. L. REV. 1685 (2010).

Scott R. Peppet, Unraveling Privacy: The Personal Prospectus and the Threat of a Full-Disclosure Future, 105 NW. U. L. REV. 1153 (2011).

Alexandra Rengel, Privacy-Invading Technologies and Recommendations for Designing a Better Future for Privacy Rights, 8 INTERCULTURAL HUM. RTS. L. REV. 177 (2013).

Neil M. Richards, The Dangers of Surveillance, 126 HARV L. REV. 1934 (2013).

Jeffrey Rosen, Naked Scanners, GPS Tracking, and Private Citizens: Technology’s Role in Balancing Security and Privacy, 57 WAYNE L. REV. 1 (2011).

Symposium, Law at the Intersection of National Security, Privacy, and Technology, 88 TEX. L. REV. 1401 (2010).

Symposium, Privacy and Big Data: Making Ends Meet, 66 STAN. L. REV. ONLINE 25 (2013).

Symposium, Privacy & Technology, 126 HARV. L. REV. 1880 (2013).

Omer Tene & Jules Polonetsky, Judged by the Tin Man: Individual Rights in the Age of Big Data, 11 J. TELECOMM. & HIGH TECH. L. 351 (2013).

Russell L. Weaver, Privacy in an Age of Advancing Technology, 82 MISS. L. J. 975 (2013).

Page 8: scallinstitute.files.wordpress.com · 3. PRIVACY AND TECHNOLOGY. By Alyssa Thurston . Books and Practice Materials . AM. BAR ASSOC., INFORMATION SECURITY AND PRIVACY: A PRACTICAL

5

Journals

Berkeley Technology Law Journal

Journal of Science and Technology Law

John Marshall Journal of Information Technology & Privacy Law

Journal of Technology Law & Policy

Journal on Telecommunications and High Technology Law

Stanford Technology Law Review

Suffolk University Journal of High Technology Law

SSRN Information Privacy Law eJournal, http://www.ssrn.com/link/Information-Privacy.html.

Reports

LEE RAINIE ET AL., PEW RESEARCH INTERNET PROJECT, ANONYMITY, PRIVACY, AND SECURITY

ONLINE (Sept. 5, 2013), available at http://pewinternet.org/Reports/2013/Anonymity-online.aspx.

GINA STEVENS, CONG. RESEARCH SERV., PRIVACY PROTECTIONS FOR PERSONAL INFORMATION

ONLINE (2011), available at http://assets.opencrs.com/rpts/R41756_20110406.pdf.

Websites

American Civil Liberties Union, Technology and Liberty – Bigger Monsters, Weaker Chains, https://www.aclu.org/technology-and-liberty.

Berkeley Center for Law and Technology, Privacy at BCLT, http://www.law.berkeley.edu/bcltprivacy.htm.

Center for Democracy and Technology, https://cdt.org/.

Privacy Rights Clearinghouse, Online Privacy & Technology, https://www.privacyrights.org/Online-Privacy-and-Technology.

Stanford Law School Center for Internet and Society, Privacy, http://cyberlaw.stanford.edu/focus-areas/privacy.

Page 9: scallinstitute.files.wordpress.com · 3. PRIVACY AND TECHNOLOGY. By Alyssa Thurston . Books and Practice Materials . AM. BAR ASSOC., INFORMATION SECURITY AND PRIVACY: A PRACTICAL

6

Current Awareness

cNet, Privacy Inc., http://news.cnet.com/privacy-inc/.

Electronic Frontier Foundation, Deeplinks, https://www.eff.org/deeplinks.

FindLaw, Technologist: The FindLaw Legal Technology Blog, http://blogs.findlaw.com/technologist/.

Proskauer Privacy Law Blog, http://privacylaw.proskauer.com/.

Stop the Cyborgs, http://stopthecyborgs.org/.

Dino Tsibouris et al., Tsibouris Privacy + Technology Law Blog, http://blog.tsibouris.com/.

Page 10: scallinstitute.files.wordpress.com · 3. PRIVACY AND TECHNOLOGY. By Alyssa Thurston . Books and Practice Materials . AM. BAR ASSOC., INFORMATION SECURITY AND PRIVACY: A PRACTICAL

7

PRIVACY AND THE GOVERNMENT

By Tiffani Willis

Privacy can mean different things depending on the context and the parties involved. In the context of government, privacy is often interpreted through the lens of the Fourth (and to some extent the Fifth) Amendment of the U.S. Constitution and the actions of law enforcement. This section of the bibliography includes materials that discuss privacy law in general, as well as privacy in the specific contexts of criminal law and national security.

Primary Sources

U.S. CONST. amend. IV:

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

CAL. CONST. art. 1 §1:

All people are by nature free and independent and have inalienable rights. Among these are enjoying and defending life and liberty, acquiring, possessing, and protecting property, and pursuing and obtaining safety, happiness, and privacy.

Electronic Communications Privacy Act of 1986 (ECPA), Pub. L. No. 99-508, 100 Stat. 1848 (codified as amended at 18 U.S.C. §2510 et seq.).

Foreign Intelligence Surveillance Act of 1978 (FISA), Pub. L. No. 95-111, 92 Stat. 1783 (codified as amended at 50 U.S.C. §1801 et seq.).

The Privacy Act of 1974, Pub. L. No. 93-579, 88 Stat. 1896 (codified as amended at 5 U.S.C. §552 et. seq.).

Uniting and Strengthening America by Fulfilling Rights and Ending Eavesdropping, Dragnet-Collection, and Online Monitoring Act (USA FREEDOM Act), H.R. 3361, 113th Cong. (2013-2014), available at http://beta.congress.gov/bill/113th-congress/house-bill/3361.

Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001 (USA PATRIOT Act), Pub. L. 107–56, 115 Stat. 272 (codified as amended in scattered sections of 18 U.S.C.).

Page 11: scallinstitute.files.wordpress.com · 3. PRIVACY AND TECHNOLOGY. By Alyssa Thurston . Books and Practice Materials . AM. BAR ASSOC., INFORMATION SECURITY AND PRIVACY: A PRACTICAL

8

Mapp v. Ohio, 367 U.S. 643 (1961).

Katz v. United States, 389 U.S. 347 (1967).

Books and Practice Materials

CHARLENE BROWNLEE & BLAZE WALESKI, PRIVACY LAW (2006- ).

Includes a chapter by Charlene Brownlee and Sheila M. Sokolowski titled The Constitutional Right to Privacy: Privacy Legislation and Government Access to Personal Information.

JACQUELINE KLOSEK, THE WAR ON PRIVACY (2007).

PRIVACY AND THE CRIMINAL LAW (Erik Claes et al. eds., 2006).

STEPHEN J. SCHULHOFER, MORE ESSENTIAL THAN EVER: THE FOURTH AMENDMENT IN THE

TWENTY-FIRST CENTURY (2012).

CHRISTOPHER SLOBOGIN, PRIVACY AT RISK: THE NEW GOVERNMENT SURVEILLANCE AND THE

FOURTH AMENDMENT (2007).

Selected Articles and Symposia

Derek E. Bambauer, Privacy Versus Security, 103 J. CRIM. L. & CRIMINOLOGY 667 (2013).

Lon A. Berk, After Jones, the Deluge: The Fourth Amendment’s Treatment of Information, Big Data and the Cloud, 14 J. HIGH TECH. L. 1 (2014).

Kimberly N. Brown, Anonymity, Faceprints, and the Constitution, 21 GEO. MASON L. REV. 409 (2014).

Matthew L. Burow, The Sentinel Clouds Above the Nameless Crowd: Protecting Anonymity from Domestic Drones, 39 NEW ENG. J. ON CRIM. & CIV. CONFINEMENT 427 (2013).

Eoin Carolan, Surveillance and the Individual’s Expectation of Privacy under the Fourth Amendment, 71 CAMBRIDGE L.J. 250 (2013).

Lloyd Chebaclo, Privacy Protections Left Wanting: Looking at Doctrine and Safeguards on Law Enforcement’s Use of GPS Tracking and Cell Phone Records with a Focus on Massachusetts, 14

J. HIGH TECH L. 120 (2014).

Page 12: scallinstitute.files.wordpress.com · 3. PRIVACY AND TECHNOLOGY. By Alyssa Thurston . Books and Practice Materials . AM. BAR ASSOC., INFORMATION SECURITY AND PRIVACY: A PRACTICAL

9

Thomas K. Clancy, The Purpose of the Fourth Amendment and Crafting Rules to Implement that Purpose, 48 U. RICH. L. REV. 479 (2014).

Sherry F. Colb, A World Without Privacy: Why Property Does Not Define the Limits of the Right Against Unreasonable Searches and Seizures, 102 MICH. L. REV. 889 (2004).

George M. Dery III & Ryan Evaro, The Court Loses Its Way with the Global Positioning System: United States v. Jones Retreats to the “Classic Trespassory Search,” 19 MICH. J. RACE & L. 113 (2013).

Elizabeth E. Joh, Privacy Protests: Surveillance Evasion and Fourth Amendment Suspicion, 55 ARIZ. L. REV. 997 (2013).

Christine Jolls, Privacy and Consent Over Time: The Roll of Agreement in Fourth Amendment Analysis, 54 WM. & MARY L. REV. 1693 (2013).

Orin S. Kerr, The Fourth Amendment and New Technologies: Constitutional Myths and the Case for Caution, 102 MICH. L. REV. 801 (2004).

Anna Kim, Comment, FAA v. Cooper: How the Court Stripped the Privacy Act of its Purpose and Meaning, 46 LOY. L.A. L. REV. 739 (2013).

Kenneth J. Melilli, Dog Sniffs, Technology, and the Mythical Constitutional Right to Criminal Privacy, 41 HASTINGS CONST. L.Q. 357 (2014).

Robert Molko, The Drones are Coming! Will the Fourth Amendment Stop Their Threat to Our Privacy? 78 BROOK. L. REV. 1279 (2013).

Stephanie Pell & Christopher Soghoian, A Lot More than a Pen Register, and Less Than a Wiretap, 16 YALE J.L. & TECH. 134 (2013).

Symposium, Privacy Rights and Proactive Investigations: Emerging Constitutional Issues in Law Enforcement, 42 U. BALT. L. REV. (2013).

Symposium, The Second Wave of Global Privacy Protection, 74 OHIO ST. L.J. (2013).

Symposium, Where There is No Darkness: Technology and the Future of Privacy, 65 RUTGERS

L. REV. (2013).

Christina Wong, Comment, The Need for the Federal Wiretap Act to Expand Protection of Our Wireless Communications, 16 U. PA. J. BUS. L. 333 (2013).

Dawn M.K. Zoldi, Protecting Security and Privacy: An Analytical Framework for Airborne Domestic Imagery, 70 A.F. L. REV. 1 (2013).

Page 13: scallinstitute.files.wordpress.com · 3. PRIVACY AND TECHNOLOGY. By Alyssa Thurston . Books and Practice Materials . AM. BAR ASSOC., INFORMATION SECURITY AND PRIVACY: A PRACTICAL

10

Journals

American Criminal Law Review

Criminal Law Quarterly

International Data Privacy Law

Journal of Criminal Law & Criminology

Privacy & Data Protection Journal

The John Marshall Journal of Information Technology & Privacy Law

Yale Journal of Law & Technology

• This journal’s website also hosts a blog with several entries related to privacy issues, available at http://yjolt.org/.

Reports

CHARLES DOYLE, CONG. RESEARCH SERV., R41734, PRIVACY: AN ABRIDGED OVERVIEW OF THE

ELECTRONIC COMMUNICATIONS PRIVACY ACT (2012).

GINA STEVENS & CHARLES DOYLE, CONG. RESEARCH SERV.,98-327, PRIVACY: AN ABBREVIATED

OUTLINE OF FEDERAL STATUTES GOVERNING WIRETAPPING AND ELECTRONIC EAVESDROPPING (2012).

Websites

American Civil Liberties Union, Internet Privacy, https://www.aclu.org/technology-and-liberty/internet-privacy.

American Civil Liberties Union, Technology and Liberty: Key Resources, https://www.aclu.org/technology-and-liberty/technology-and-liberty-key-resources.

Berkman Center for Internet and Society at Harvard University, Privacy Initiatives, http://cyber.law.harvard.edu/research/privacy.

Privacy and Civil Liberties Oversight Board, http://www.pclob.gov/.

Page 14: scallinstitute.files.wordpress.com · 3. PRIVACY AND TECHNOLOGY. By Alyssa Thurston . Books and Practice Materials . AM. BAR ASSOC., INFORMATION SECURITY AND PRIVACY: A PRACTICAL

11

WORKPLACE PRIVACY

By Jodi Kruger

Workplace privacy is not a new concept, but increasing use of technology has created new challenges in this ever-evolving area of law. Hot topics include electronic surveillance, drug testing, genetic testing, psychological testing, polygraphs, social media issues, employer control of off-duty activities, confidentiality in medical records, and so much more.

Identified below is a sampling of the most recent literature on the subject.

Primary Sources

There are a plethora of federal and state statutes and cases relating to workplace privacy. Identified below are selected federal statutes and U.S. Supreme Court cases.

• Federal Statutes

Employee Polygraph Protection Act of 1988, Pub. L. 100-347, 102 Stat. 646 (1988) (codified at 29 U.S.C. §§ 2001- 2009).

Genetic Information Non-Discrimination Act of 2008, Pub. L. 110-233, Title II, 122 Stat. 905 (2008) (codified at 42 U.S.C.§§ 2000ff-1-2000ff-11).

• U.S. Supreme Court Cases

Nat'l Aeronautics & Space Admin. v. Nelson, 131 S. Ct. 746, 178 L. Ed. 2d 667 (2011). Nat'l Treasury Employees Union v. Von Raab, 489 U.S. 656, 109 S. Ct. 1384, 103 L. Ed. 2d 685 (1989).

O'Connor v. Ortega, 480 U.S. 709, 107 S. Ct. 1492, 94 L. Ed. 2d 714 (1987).

City of Ontario, Cal. v. Quon, 560 U.S. 746, 130 S. Ct. 2619, 177 L. Ed. 2d 216 (2010).

Skinner v. Ry. Labor Executives' Ass'n, 489 U.S. 602, 109 S. Ct. 1402, 103 L. Ed. 2d 639 (1989).

Page 15: scallinstitute.files.wordpress.com · 3. PRIVACY AND TECHNOLOGY. By Alyssa Thurston . Books and Practice Materials . AM. BAR ASSOC., INFORMATION SECURITY AND PRIVACY: A PRACTICAL

12

Looseleafs

ADVISING CALIFORNIA EMPLOYERS AND EMPLOYEES (2005- ).

Includes a chapter by Everett F. Meiners titled Workplace Privacy.

CHARLENE BROWNLEE & BLAZE WALESKI, PRIVACY LAW (2006- ).

Includes a chapter by Charlene Brownlee & Klaus Aurisch titled Privacy and Surveillance in the Workplace.

L CAMILLE HÉBERT, EMPLOYEE PRIVACY LAW (1993- ).

Also available electronically in Westlaw.

N. PETER LAREAU, LABOR AND EMPLOYMENT LAW (2003- ).

Also available electronically in Lexis. Includes a chapter titled Privacy in the Workplace.

LEX K. LARSON, EMPLOYMENT SCREENING (1988- ).

Also available electronically in Lexis.

PROSKAUER ON PRIVACY: A GUIDE TO PRIVACY AND DATA SECURITY LAW IN THE INFORMATION

AGE (2006- ).

Includes a chapter by Kathleen M. McKenna & Anthony J. Oncidi titled Workplace Privacy Law.

ANDREW B. SERWIN, INFORMATION SECURITY AND PRIVACY: A GUIDE TO FEDERAL AND STATE

LAW AND COMPLIANCE (2009- ).

Also available electronically in Westlaw. Includes a chapter titled Employee Privacy.

LISA J. SOTTO, PRIVACY & DATA SECURITY LAW DESKBOOK (2010- ).

Includes a chapter titled Workplace Privacy.

WILCOX ET AL., CALIFORNIA EMPLOYMENT LAW (1989- ).

Also available electronically in Lexis. Includes a chapter by Kay M. Reeves & Edward Baskauskas titled Limitations on Employer Collection of Private Information About Employees and a chapter by John M. True, III & Edward Baskauskas titled Use and Disclosure of Private Information About Employees.

Page 16: scallinstitute.files.wordpress.com · 3. PRIVACY AND TECHNOLOGY. By Alyssa Thurston . Books and Practice Materials . AM. BAR ASSOC., INFORMATION SECURITY AND PRIVACY: A PRACTICAL

13

Books

JONATHAN EZOR, PRIVACY AND DATA PROTECTION IN BUSINESS: LAWS AND PRACTICES (2012).

Includes a chapter titled Workplace Privacy: Different Needs, Different Expectations, Different Rules.

MATTHEW W. FINKIN, PRIVACY IN EMPLOYMENT LAW (4th ed. 2013).

Also available electronically in Bloomberg Law.

CHARLES H. KENNEDY, THE BUSINESS PRIVACY LAW HANDBOOK (2008).

FREDERICK S. LANE, THE NAKED EMPLOYEE: HOW TECHNOLOGY IS COMPROMISING WORKPLACE

PRIVACY (2003).

LITTLER MENDELSON’S THE NATIONAL EMPLOYER (2013).

Also available electronically in Lexis. Includes a chapter titled Employee Privacy Rights.

BARBARA S. MAGILL, WORKPLACE PRIVACY: REAL ANSWERS AND PRACTICAL SOLUTIONS (2d ed. 2007).

ADAM D. MOORE, PRIVACY RIGHTS: MORAL AND LEGAL FOUNDATIONS (2010).

Includes a chapter titled Drug Testing and Privacy in the Workplace.

REASONABLE EXPECTATIONS OF PRIVACY?: ELEVEN COUNTRY REPORTS ON CAMERA

SURVEILLANCE AND WORKPLACE PRIVACY (Sjaak Nouwt et al. eds., 2005).

ANDREW SERWIN, PETER F. MCLAUGHLIN & JOHN TOMASZEWSKI, PRIVACY, SECURITY AND

INFORMATION MANAGEMENT: AN OVERVIEW (2011).

Includes a chapter titled Employee Privacy.

DANIEL J. SOLOVE & PAUL M. SCHWARTZ, PRIVACY LAW FUNDAMENTALS (2d ed. 2013).

Includes a chapter titled Employment Privacy.

JEFFREY M. STANTON & KATHRYN R. STAM, THE VISIBLE EMPLOYEE: USING WORKPLACE

MONITORING AND SURVEILLANCE TO PROTECT INFORMATION ASSETS – WITHOUT COMPROMISING

EMPLOYEE PRIVACY OR TRUST (2006).

SURVEILLANCE, PRIVACY, AND THE GLOBALIZATION OF PERSONAL INFORMATION: INTERNATIONAL COMPARISONS (Elia Zureik et al. eds., 2010).

Page 17: scallinstitute.files.wordpress.com · 3. PRIVACY AND TECHNOLOGY. By Alyssa Thurston . Books and Practice Materials . AM. BAR ASSOC., INFORMATION SECURITY AND PRIVACY: A PRACTICAL

14

Includes a chapter by Avner Levin titled Is There a Global Approach to Workplace Privacy?.

WORKPLACE PRIVACY: PROCEEDINGS OF THE NEW YORK UNIVERSITY 58TH ANNUAL CONFERENCE

ON LABOR (Jonathan Remy Nash ed., 2010).

MIRIAM WUGMEISTER & CHRISTINE E. LYON, GLOBAL EMPLOYEE PRIVACY AND DATA SECURITY

LAW (2009).

Articles

Patricia Sánchez Abril, Avner Levin & Alissa Del Riego, Blurred Boundaries: Social Media Privacy and the Twenty-First Century Employee, 49 AM. BUS. L.J. 63 (2012).

Bradley A. Areheart, GINA, Privacy, and Antisubordination, 46 GA. L. REV. 705 (2012).

Carol M. Bast & Cynthia A. Brown, Where Has All Our Privacy Gone?, 18 J. LEGAL STUD. IN

BUS. 17 (2013).

Jordan M. Blanke, The Legislative Response to Employers’ Requests for Password Disclosure, 14 J. HIGH TECH. L. 42 (2014).

Corey A. Ciocchetti, The Eavesdropping Employer: A Twenty-First Century Framework for Employee Monitoring, 48 AM. BUS. L.J. 285 (2011).

Elizabeth D. De Armond, To Cloak the Within: Protecting Employees from Personality Testing, 61 DEPAUL L. REV. 1129 (2012).

Saby Ghoshray, Employer Surveillance Versus Employee Privacy: The New Reality of Social Media and Workplace Privacy, 40 N. KY. L. REV. 593 (2013).

Michael Z. Green, Against Employer Dumpster Diving for E-Mail, 64 S.C. L. REV. 323 (2012).

William A. Herbert, Can’t Escape from the Memory: Social Media and Public Sector Labor Law, 40 N. Ky. L. Rev. 427 (2013).

William A. Herbert, Workplace Consequences of Electronic Exhibitionism and Voyeurism, 30 TECH. & SOC'Y MAG. 25 (2011).

Stacy A. Hickox, Clearing the Smoke on Medical Marijuana Users in the Workplace, 29 QUINNIPIAC L. REV. 1001 (2011).

Louise L. Hill, Gone but Not Forgotten: When Privacy, Policy and Privilege Collide, 9 NW. J. TECH. & INTELL. PROP. 565 (2011).

Page 18: scallinstitute.files.wordpress.com · 3. PRIVACY AND TECHNOLOGY. By Alyssa Thurston . Books and Practice Materials . AM. BAR ASSOC., INFORMATION SECURITY AND PRIVACY: A PRACTICAL

15

Ryan J. Hunt & Lara L. Kessler, Wanna Be Friends? The Potential Impact of Lifestyle Discrimination Statutes on Employer Facebook Policies, 18 J. LEGAL STUD. IN BUS. 45 (2013).

Carly L. Huth, The Insider Threat and Employee Privacy: An Overview of Recent Case Law, 29 COMPUTER L. & SECURITY REV. 368 (2013).

Pauline T. Kim, Electronic Privacy and Employee Speech, 87 CHI.-KENT L. REV. 901 (2012).

Pauline T. Kim, Regulating the Use of Genetic Information: Perspectives from the U.S. Experience, 31 COMP. LAB. L. & POL’Y J. 693 (2010).

Ariana R. Levinson, Toward a Cohesive Interpretation of the Electronic Communications Privacy Act for the Electronic Monitoring of Employees, 114 W. VA. L. REV. 461 (2012).

Ariana R. Levinson, Workplace Privacy and Monitoring: The Quest for Balanced Interests, 59 CLEV. ST. L. REV. 377 (2011).

Ariana R. Levinson, Carpe Diem: Privacy Protection in Employment Act, 43 AKRON L. REV. 331 (2010).

Lewis Maltby, Employment Privacy: Is There Anything Left?, 39 HUM. RTS. MAG. (ABA) (2013), available at http://www.americanbar.org/publications/human_rights_magazine_home/2013_vol_39/may_2013_n2_privacy/employment_privacy.html.

The theme for this issue is “Privacy: Who is Watching,” and the issue includes several articles on various topics related to privacy. The issue is available at http://www.americanbar.org/publications/human_rights_magazine_home/2013_vol_39/may_2013_n2_privacy.html.

Jeffrey A. Mello, Social Media, Employee Privacy and Concerted Activity: Brave New World or Big Brother, 63 LA. L.J. 165 (2012).

Adam D. Moore, Drug Testing and Privacy in the Workplace, 29 J. MARSHALL J. COMPUTER &

INFO. LAW 463 (2012).

Donald E. Sanders, John K. Ross & Patricia Pattison, Electronic Snoops, Spies, and Supervisory Surveillance in the Workplace, 23 S. L.J. 1 (2013).

Paul M. Secunda, Privatizing Workplace Privacy, 88 NOTRE DAME L. REV. 277 (2012).

James A. Sonne, Monitoring for Quality Assurance: Employer Regulation of Off-Duty Behavior, 43 GA. L. REV. 133 (2008).

Robert Sprague, Invasion of the Social Networks: Blurring the Line Between Personal Life and the Employment Relationship, 50 U. LOUISVILLE L. REV. 1 (2011).

Page 19: scallinstitute.files.wordpress.com · 3. PRIVACY AND TECHNOLOGY. By Alyssa Thurston . Books and Practice Materials . AM. BAR ASSOC., INFORMATION SECURITY AND PRIVACY: A PRACTICAL

16

Lily M. Strumwasser, Phishing on Facebook: Do You Ask Job Applicants for Their Social Media Passwords?, 31 COMPUTER & INTERNET L. 6 (2014).

Additional Resources Westlaw Next includes a content library titled “Practical Law.” Within the Practical Law library, there is “Labor & Employment” practice area, and that section includes a topic “Employee Data, Monitoring & Privacy.” This topic contains a wide array of relevant practice materials, including state law surveys, sample documents and clauses, white papers and other articles, and checklists. Electronic Privacy Information Center, Workplace Privacy, at http://epic.org/privacy/workplace/. (Please note that it is unclear how up-to-date this page is. Nonetheless, it contains some very useful information and links to other resources.)

Privacy Rights Clearinghouse, Fact Sheet 7: Workplace Privacy and Employee Monitoring, at https://www.privacyrights.org/workplace-privacy-and-employee-monitoring.

Page 20: scallinstitute.files.wordpress.com · 3. PRIVACY AND TECHNOLOGY. By Alyssa Thurston . Books and Practice Materials . AM. BAR ASSOC., INFORMATION SECURITY AND PRIVACY: A PRACTICAL

17

PRIVACY AND SOCIAL MEDIA

By Erik Adams

Primary Sources “Social Media” Defined; Prohibited Employer Actions; Exceptions, CAL. LAB. CODE § 980 (West 2014).

Monographs and Practice Materials LORI ANDREWS, I KNOW WHO YOU ARE AND I SAW WHAT YOU DID: SOCIAL NETWORKS AND THE

DEATH OF PRIVACY (2012).

CHARLENE BROWNLEE & BLAZE WALESKI, PRIVACY LAW (2006- ).

Includes a chapter by Charlene Brownlee titled Online Mobile Privacy.

PAUL D. MCGRADY, MCGRADY ON SOCIAL MEDIA (2011). Includes a chapter titled Privacy and Social Media. CLARA RUYAN MARTIN, DAVID B. OSHINSKY & SUZANNE L. WEAKLEY, INTERNET LAW AND

PRACTICE IN CALIFORNIA (2004-).

Note: Most treatises on evidence and discovery now include discussion of social media, i.e. California Practice Guide: Civil Procedure Before Trial 8:356.1 (“Investigations and Discovery”), Matthew Bender Practice Guide: California E-Discovery and Evidence 9.24[3A][c] (“Collecting ESI from Social Media Web Sites”), Advising California Employers and Employees 13.32 (“Blogging and Social Media”), and others.

Articles Theodore F. Claypoole, Privacy and Social Media, BUS. L. TODAY, Jan. 2014, available at http://www.americanbar.org/publications/blt/2014/01/03a_claypoole.html.

Adrian Fontecilla, The Ascendance of Social Media as Evidence, 28 CRIM. JUST. 55 (2013). Steven S. Gensler, Special Rules for Social Media Discovery?, 65 ARK. L. REV. 7 (2012).

Page 21: scallinstitute.files.wordpress.com · 3. PRIVACY AND TECHNOLOGY. By Alyssa Thurston . Books and Practice Materials . AM. BAR ASSOC., INFORMATION SECURITY AND PRIVACY: A PRACTICAL

18

Dr. Saby Ghoshray, The Emerging Reality of Social Media: Erosion of Individual Privacy Through Cyber-vetting and Law’s Inability to Catch Up, 12 J. MARSHALL REV. INTELL. PROP. L. 551 (2013).

Saby Ghoshray, Employer Surveillance Versus Employee Privacy: The New Reality of Social Media and Workplace Privacy, 40 N. KY. L. REV. 593 (2013).

Jamie P. Hopkins, Katie Hopkins & Bigan Whelton, Being Social: Why the NCAA Has Forced Universities to Monitor Student-Athletes’ Social Media, 13 PITT. J. TECH. L. & POL’Y (2012), http://tlp.law.pitt.edu/ojs/index.php/tlp/article/view/116.

Eric Larson, 8 Dumb Criminals Caught Through Facebook, MASHABLE (Dec. 12, 2012), http://mashable.com/2012/12/12/crime-social-media/.

Jared S. Livingston, Invasion Contracts: The Privacy Implications of Terms of Use Agreements in the Online Social Media Setting, 21 ALB. L.J. SCI. & TECH. 591 (2011).

Alexander Naito, A Fourth Amendment Status Update: Applying Constitutional Privacy Protection to Employees’ Social Media Use, 14 U. PA. J. CONST. L. 849 (2012).

Connie Davis Powell, “You already have zero privacy. Get over it!” Would Warren and Brandeis Argue for Privacy for Social Networking? 31 PACE L. REV. 146 (2011).

Connie Davis Powell, Privacy for Social Networking, 34 UALR L. REV. 689 (2011).

Michelle Poore, A Call for Uncle Sam to Get Big Brother Out of Our Knickers: Protecting Privacy and Freedom of Speech Interests in Social Media Accounts, 40 N. KY. L. REV. 507 (2013).

Michelle Scheinman, Cyberfrontier: New Guidelines for Employers Regarding Employee Social Media, 44 MCGEORGE L. REV. 731 (2013).

Junichi P. Semitsu, From Facebook to Mug Shot: How the Dearth of Social Networking Privacy Rights Revolutionized Online Government Surveillance, 31 PACE L. REV. 291 (2011).

Robert Sprague, Rethinking Information Privacy in an Age of Online Transparency, 25 HOFSTRA

LAB. & EMP. L.J. 395 (2008).

Steven D. Zansberg, Janna K. Fischer, Privacy Expectations in Online Social Media – An Emerging Generational Divide? 28 COMM. LAW. 3 (2011).

Page 22: scallinstitute.files.wordpress.com · 3. PRIVACY AND TECHNOLOGY. By Alyssa Thurston . Books and Practice Materials . AM. BAR ASSOC., INFORMATION SECURITY AND PRIVACY: A PRACTICAL

19

Websites

Bloomberg BNA Privacy & Data Security Law Resource Center, http://privacylaw.bna.com.lib.pepperdine.edu/pvrc/ (subscription service).

Includes a blog titled Social Media Law (found in BNA’s Privacy & Data Security Practice Series Portfolios).

Privacy Rights Clearinghouse, http://www.privacyrights.org.

Includes a report titled Fact Sheet 35: Social Networking Privacy: How to be Safe, Secure and Social, available at https://www.privacyrights.org/social-networking-privacy-how-be-safe-secure-and-social.

Page 23: scallinstitute.files.wordpress.com · 3. PRIVACY AND TECHNOLOGY. By Alyssa Thurston . Books and Practice Materials . AM. BAR ASSOC., INFORMATION SECURITY AND PRIVACY: A PRACTICAL

20

CONSUMER PRIVACY AND IDENTITY THEFT

By Don Buffaloe

Primary Sources

Dodd–Frank Wall Street Reform and Consumer Protection Act, 124 Stat. 1376 (2010) (codified at 15 U.S.C. § 6801 et seq.) (2012).

THE WHITE HOUSE, CONSUMER DATA PRIVACY IN A NETWORKED WORLD: A FRAMEWORK FOR

PROTECTING PRIVACY AND PROMOTING INNOVATION IN THE GLOBAL DIGITAL ECONOMY (Consumer Privacy Bill of Rights) (Feb. 2012), available at http://www.whitehouse.gov/sites/default/files/privacy-final.pdf.

Books

REBA A. BEST, IDENTITY THEFT: A LEGAL RESEARCH GUIDE (2004).

MARTIN T. BIEGELMAN, IDENTITY THEFT HANDBOOK: DETECTION, PREVENTION, AND SECURITY (2009).

JONATHAN EZOR, PRIVACY AND DATA PROTECTION IN BUSINESS: LAWS AND PRACTICES (2012).

SERGE GUTWIRTH, YVES POULLET & PAUL DE HERT, DATA PROTECTION IN A PROFILED WORLD

(2010).

SANDRA K. HOFFMAN & TRACY G MCGINLEY, IDENTITY THEFT: A REFERENCE HANDBOOK

(2010).

MARGARET C. JASPER, IDENTITY THEFT AND HOW TO PROTECT YOURSELF (2d ed. 2006).

SASKIA KIM, CAL. S. OFFICE OF RESEARCH, CONSUMER PRIVACY AND IDENTITY THEFT: A

SUMMARY OF KEY STATUTES AND GUIDE FOR LAWMAKERS (3d ed. 2008).

CARY S. LOGWELLER, IDENTITY THEFT BREACHES (2009).

DAVID A. MAY & JAMES E. HEADLEY, IDENTITY THEFT (2004).

MEGAN M. MCNALLY, IDENTITY THEFT IN TODAY'S WORLD (2012).

Page 24: scallinstitute.files.wordpress.com · 3. PRIVACY AND TECHNOLOGY. By Alyssa Thurston . Books and Practice Materials . AM. BAR ASSOC., INFORMATION SECURITY AND PRIVACY: A PRACTICAL

21

Scholarly Articles

Alessandro Acquisti, Leslie K. John & George Loewenstein, What Is Privacy Worth?, 42 J. LEGAL STUD. 249 (2013).

Stephen F. Ambrose, Jr. & Joseph W. Gelb, Consumer Privacy Litigation and Enforcement Actions in the United States, 61 BUS. LAW. 887 (2006).

Clark D. Asay, Consumer Information Privacy and the Problem(s) of Third-Party Disclosures, 11 NW. J. TECH. & INTELL. PROP. 321 (2013).

Steven C. Bennett, Regulating Online Behavioral Advertising, 44 J. MARSHALL L. REV. 899 (2011).

Mark Burdon, Contextualizing the Tensions and Weaknesses of Information Privacy and Data Breach Notification Laws, 27 SANTA CLARA COMPUTER & HIGH TECH. L.J. 63 (2010-2011).

Ryan Calo, Consumer Subject Review Boards: A Thought Experiment, 66 STAN. L. REV. ONLINE 97 (Sept. 3, 2013), available at https://cyberlaw.stanford.edu/files/publication/files/Calo.pdf.

James C. Cooper, Privacy and Antitrust: Underpants Gnomes, the First Amendment, and Subjectivity, 20 Geo. Mason L. Rev. 1129 (2013).

Joshua A.T. Fairfield, Do-Not-Track as Default, 11 NW. J. TECH. & INTELL. PROP. 575 (2013).

Joseph Farrell, Can Privacy Be Just Another Good?, 10 J. TELECOMM. & HIGH TECH. L. 251 (2012).

James Grimmelmann, Known and Unknown, Property and Contract: Comments on Hoofnagle and Moringiello, 5 BROOK. J. CORP. FIN. & COM. L. 85 (2010).

Allyson W. Haynes, Online Privacy Policies: Contracting Away Control Over Personal Information?, 111 PENN ST. L. REV. 587 (2007).

Chris Jay Hoofnagle, Identity Theft: Making the Known Unknowns Known, 21 HARV. J.L. &

TECH. 97 (2007).

Chris Jay Hoofnagle, Internalizing Identity Theft, 13 UCLA J.L. & TECH. 1 (2009).

Chris Jay Hoofnagle, Towards a Market for Bank Safety, 21 LOY. CONSUMER L. REV. 155 (2008).

Irene D. Johnson, Preventing Identity Theft and Other Financial Abuses Perpetrated Against Vulnerable Members Of Society: Keeping the Horse in the Barn Rather than Litigating Over the Cause and/or Consequences of His Leaving, 79 UMKC L. REV. 99 (2010).

Page 25: scallinstitute.files.wordpress.com · 3. PRIVACY AND TECHNOLOGY. By Alyssa Thurston . Books and Practice Materials . AM. BAR ASSOC., INFORMATION SECURITY AND PRIVACY: A PRACTICAL

22

Vincent R. Johnson, Credit-Monitoring Damages in Cybersecurity Tort Litigation, 19 GEO. MASON L. REV. 113 (2011).

Erin Kenneally & Jon Stanley, Beyond Whiffle-Ball Bats: Addressing Identity Crime in an Information Economy, 26 J. MARSHALL J. COMPUTER & INFO. L. 47 (2008).

Jay P. Kesan, Carol M. Hayes & Masooda N. Bashir, Information Privacy and Data Control in Cloud Computing: Consumers, Privacy Preferences, and Market Efficiency, 70 WASH. & LEE L. REV. 341 (2013).

Nancy J. King & V.T. Raja, What Do They Really Know About Me in the Cloud? A Comparative Law Perspective on Protecting Privacy and Security of Sensitive Consumer Data, 50 AM. BUS. L.J. 413 (2013).

William E. Kovacic, The Digital Broadband Migration and the Federal Trade Commission: Building the Competition and Consumer Protection Agency of the Future, 8 J. TELECOMM. &

HIGH TECH. L. 1 (2010).

Juliet Moringiello, Warranting Data Security, 5 BROOKLYN J. CORP. FIN. & COMM. L. 63 (2010).

James P. Nehf, The FTC's Proposed Framework for Privacy Protection Online: A Move Toward Substantive Controls or Just More Notice and Choice? 37 WM. MITCHELL L. REV. 1727 (2011).

James P. Nehf, Shopping for Privacy Online: Consumer Decision-Making Strategies and the Emerging Market for Information Privacy, 2005 U. ILL. J.L. TECH. & POL'Y 1 (2005).

Xuan-Thao N. Nguyen, Collateralizing Privacy, 78 TUL. L. REV. 553 (2004).

Paul Ohm, Branding Privacy, 97 MINN. L. REV. 907 (2013).

Nicole A. Ozer, Putting Online Privacy Above the Fold: Building a Social Movement and Creating Corporate Change, 36 N.Y.U. REV. L. & SOC. CHANGE 215 (2012).

Kimberly Kiefer Peretti, Data Breaches: What the Underground World of “Carding” Reveals, 25 SANTA CLARA COMPUTER & HIGH TECH. L.J. 375 (2009).

Sasha Romanosky & Alessandro Acquisti, Privacy Costs and Personal Data Protection, 24 BERKELEY TECH. L.J. 1061 (2009).

Jonathan J. Rusch, Iago's Net: Notes for an International Legal Regime to Combat Identity-Related Crime, 42 GEO. J. INT'L L. 923 (2011).

Andrew Serwin, The Federal Trade Commission and Privacy: Defining Enforcement and Encouraging the Adoption of Best Practices, 48 SAN DIEGO L. REV. 809 (2011).

Page 26: scallinstitute.files.wordpress.com · 3. PRIVACY AND TECHNOLOGY. By Alyssa Thurston . Books and Practice Materials . AM. BAR ASSOC., INFORMATION SECURITY AND PRIVACY: A PRACTICAL

23

Peter Swire & Yianni Lagos, Why the Right to Data Portability Likely Reduces Consumer Welfare: Antitrust and Privacy Critique, 72 MD. L. REV. 335 (2013).

Holly K. Towle, Identity Theft: Myths, Methods, and New Law, 30 RUTGERS COMPUTER & TECH. L.J. 237 (2004).

Joseph Turow et al., The Federal Trade Commission and Consumer Privacy in the Coming Decade, 3 I/S: J. L. & POL'Y FOR INFO. SOC'Y 723 (2007-2008).

Felix T. Wu, The Constitutionality of Consumer Privacy Regulation, 2013 U. CHI. LEGAL F. 69 (2013).

U.S. Government Reports

Communications Networks and Consumer Privacy: Recent Developments : Hearing Before the H. Subcomm. on Communications, Tech., and the Internet of the Comm. on Energy and Commerce, 111th Cong. (2009).

Consumer Privacy and Protection in the Mobile Marketplace: Hearing Before the Subcomm. on Consumer Prot., Product Safety, and Insurance of the S. Comm. on Commerce, Sci., and Transport., 112th Cong. (2011).

FED. TRADE COMM’N, PROTECTING CONSUMER PRIVACY IN AN ERA OF RAPID CHANGE: RECOMMENDATIONS FOR BUSINESSES AND POLICYMAKERS (2012), available at http://www.ftc.gov/sites/default/files/documents/reports/federal-trade-commission-report-protecting-consumer-privacy-era-rapid-change-recommendations/120326privacyreport.pdf.

H.R. REP. NO. 113-344 (2014) (Consumer Right to Financial Privacy Act Of 2013, to accompany H.R. 2571).

The State of Online Consumer Privacy: Hearing Before the S. Comm. on Commerce, Sci., and Transport., 112th Cong. (2011).

Understanding Consumer Attitudes About Privacy: Hearing Before the H. Subcomm. on Commerce, Mfg., and Trade of the Comm. on Energy and Commerce, 112th Cong. (2011).

Websites

American Civil Liberties Union, Consumer Privacy, https://www.aclu.org/technology-and-liberty/consumer-privacy.

Consumer Federation of California, http://consumercal.org/.

Page 27: scallinstitute.files.wordpress.com · 3. PRIVACY AND TECHNOLOGY. By Alyssa Thurston . Books and Practice Materials . AM. BAR ASSOC., INFORMATION SECURITY AND PRIVACY: A PRACTICAL

24

Federal Trade Commission, Privacy & Identity, http://www.consumer.ftc.gov/topics/privacy-identity.

U.S. Deptartment of the Treasury, Identity Theft and Consumer Fraud, http://www.treasury.gov/services/report-fwa/Pages/id_theft.aspx.

U.S. Department of Justice, Identity Theft and Identity Fraud, http://www.justice.gov/criminal/fraud/websites/idtheft.html.

Current Awareness

Stephanie Clifford & Quentin Hardy, Attention, Shoppers: Store Is Tracking Your Cell, N.Y. TIMES, July 15, 2013, at A1.

Federal Trade Commission, Consumer Information Blog, http://www.consumer.ftc.gov/blog.

Elizabeth A. Harris et al., A Sneaky Path Into Target Customers' Wallets, N.Y. TIMES , Jan. 18, 2014, at A1.

IDentity Theft 911 Blog, http://www.idt911blog.com/.

Ashlee Kieler, More Than 30 Consumer Groups Urge President To Put Privacy Bill of Rights Into Law, CONSUMERIST, Feb. 24, 2014, available at http://consumerist.com/2014/02/24/more-than-30-consumer-groups-urge-president-to-put-privacy-bill-of-rights-into-law/.

Privacy & Security Law Blog, Davis Wright Tremaine LLP, http://www.privsecblog.com/?wref=bif.

Mark Sableman & Tom Carpenter, A B-to-B Carve-Out in Privacy Legislation: The U.S. Supreme Court Doesn't Recognize a Privacy Interest for Businesses, as Opposed to that Enjoyed by Individual Consumers, NAT'L L.J., Apr. 22, 2013, at 12.

Somini Sengupta, Letting Down Our Guard, N.Y. TIMES, Mar. 31, 2013, at BU 1.

Andrew M. Smith & Peter Gilbert, Fair Credit Reporting Act Update—2012, 68 BUS. LAW. 593 (2013).

Page 28: scallinstitute.files.wordpress.com · 3. PRIVACY AND TECHNOLOGY. By Alyssa Thurston . Books and Practice Materials . AM. BAR ASSOC., INFORMATION SECURITY AND PRIVACY: A PRACTICAL

25

PRIVACY AND HEALTHCARE

By Esther Eastman

Looseleafs

LISA M. BOYLE, HIPPA: A GUIDE TO HEALTH CARE PRIVACY AND SECURITY LAW (1998 - ).

CHARLENE BROWNLEE & BLAZE WALESKI, PRIVACY LAW (2006 - ) (Includes a chapter by Charlene Brownlee and Sheila M. Sokolowski titled Privacy of Health Information).

LYNN D. FLEISHER & JAMES C. DECHENE, TELEMEDICINE AND E-HEALTH LAW (2004 - ).

N. PETER LAREAU, MEDICAL RECORDS PRIVACY UNDER HIPPA (2003 - ).

Books

BEYOND THE HIPAA PRIVACY RULE: ENHANCING PRIVACY, IMPROVING HEALTH THROUGH

RESEARCH (Sharyl J. Nass, Laura A. Levit & Lawrence O Gostin eds., 2009), available at http://www.ncbi.nlm.nih.gov/books/NBK9578/.

MELANIE D. BRAGG, HIPAA FOR THE GENERAL PRACTITIONER (2009).

ROBERT BRZEZINSKI, HIPAA PRIVACY AND SECURITY COMPLIANCE - SIMPLIFIED: PRACTICAL

GUIDE FOR HEALTHCARE PROVIDERS AND PRACTICE MANAGERS (2012).

CAL. HOSP. ASS’N, CALIFORNIA HEALTH INFORMATION PRIVACY MANUAL (6th ed. 2013).

E-HEALTH, PRIVACY, AND SECURITY LAW (W. Andrew H. Gantt ed., 2d ed. 2011).

HEALTH CARE IT: THE ESSENTIAL LAWYER’S GUIDE TO HEALTH CARE INFORMATION

TECHNOLOGY AND THE LAW (Arthur Peabody, Jr. ed., 2013).

INFORMATION PRIVACY IN THE EVOLVING HEALTHCARE ENVIRONMENT (Linda. D. Koontz ed., 2013).

DAN KRAGER & CAROLE KRAGER, HIPAA FOR HEALTH CARE PROFESSIONALS (2008).

NAT’L RES. COUNCIL, FOR THE RECORD: PROTECTING ELECTRONIC HEALTH INFORMATION (1997), available at http://www.nap.edu/catalog.php?record_id=5595.

Page 29: scallinstitute.files.wordpress.com · 3. PRIVACY AND TECHNOLOGY. By Alyssa Thurston . Books and Practice Materials . AM. BAR ASSOC., INFORMATION SECURITY AND PRIVACY: A PRACTICAL

26

ANDREW SERWIN, PETER F. MCLAUGHLIN & JOHN TOMASZEWSKI, PRIVACY, SECURITY AND

INFORMATION MANAGEMENT: AN OVERVIEW (2011) (Includes a chapter titled Health Information and Privacy and Security).

J. STUART SHOWALTER, THE LAW OF HEALTHCARE ADMINISTRATION (7th ed. 2014).

JOHN J. TRINCKES, THE DEFINITIVE GUIDE TO COMPLYING WITH THE HIPAA/HITECH PRIVACY

AND SECURITY RULES (2013).

KAREN A. WAGER, FRANCES W. LEE & JOHN P. GLASER, HEALTH CARE INFORMATION SYSTEMS: A PRACTICAL APPROACH FOR HEALTH CARE MANAGEMENT (3d ed. 2013).

Articles

Marcia M. Boumil, Kaityln Dunn, Nancy Ryan & Katrina Clearwater, Prescription Data Mining, Medical Privacy and the First Amendment: the U.S. Supreme Court in Sorrell v. IMS Health Inc., 21 ANNALS HEALTH L. 447 (2012).

Chris Chambers Goodman, When Privacy Is Not an Option: Codifying the Contours of Necessary Third Parties in Emergency Medical Situations, 63 SYRACUSE L.REV. 399 (2013).

Sharona Hoffman & Andy Podgurski, Balancing Privacy, Autonomy, and Scientific Needs in Electronic Health Records Research, 65 SMU L. REV. 85 (2012).

Lauren Bair Jacques, Electronic Health Records and Respect for Patient Privacy: A Prescription for Compatibility, 13 VAND. J. ENT. & TECH. L.441 (2011).

Amy E. Kempfert & Benjamin D. Reed, Health Care Reform in the United States: HITECH Act and HIPAA Privacy, Security, and Enforcement Issues, 2011 FDCC Q. 240 (2011).

Patrick Ouellette, Healthcare Privacy, Security 2014 Predictions: Future Trends, HEALTHITSECURITY (Dec. 30, 2013), http://healthitsecurity.com/2013/12/30/healthcare-privacy-security-2014-predictions-future-trends/http://www.privsecblog.com/?wref=bif.

Francine Richards, How to File a Lawsuit for a HIPPA Violation, EHOW, http://www.ehow.com/how_6898423_file-lawsuit-hipaa-violation.html.

Symposium, Focus on Patient Privacy, 20 J. AM. MED. INFORMATICS ASS’N 2 (2013) (includes sixteen articles; see http://jamia.bmj.com/content/20/1.toc for a list of the articles).

Nicolas P. Terry, Protecting Patient Privacy in the Age of Big Data, 81 UMKC L. REV.385 (2012).

Page 30: scallinstitute.files.wordpress.com · 3. PRIVACY AND TECHNOLOGY. By Alyssa Thurston . Books and Practice Materials . AM. BAR ASSOC., INFORMATION SECURITY AND PRIVACY: A PRACTICAL

27

Joseph J. Thorndike, Obamacare, the IRS, and the End of Privacy. TAXANALYSTS (Nov. 1, 2012), http://www.taxhistory.org/thp/readings.nsf/ArtWeb/5819F3F7A85082BA85257AC6006BC242?OpenDocument.

John Verdi, Transcript: Sorrell v. IMS Health - Any Impact on Patient Privacy? 36 VT. L REV. 829 (2012).

Lisa Zamosky, Social Media Users Willing to Share Data Despite Concerns about Privacy, IHEALTHBEAT (March 10, 2014), http://www.ihealthbeat.org/insight/2014/social-media-users-willing-to-share-health-data-despite-concerns-about-privacyhttp://www.privsecblog.com/?wref=bif.

Government Information

• Current Proposed Federal Legislation

Healthcare Privacy and Anti-Fraud Act, S. 1666, 113th Cong. (2013), available at http://beta.congress.gov/bill/113th-congress/senate-bill/1666?q=%7B%22search%22%3A%5B%22s1666%22%5D%7D.

• Federal and California Legislative Hearings

CAL. LEG. S. COMM. ON INS., INFORMATIONAL HEARING ON PRIVACY PROTECTION FOR

CONFIDENTIAL MEDICAL RECORDS AND PEER REVIEW RECORDS : BALANCING THE NEEDS OF

PATIENT AND PROVIDER PRIVACY, HEALTH CARE DELIVERY, AND GOVERNMENT OVERSIGHT (1997).

Evaluating Privacy, Security, and Fraud Concerns with Obamacare’s Information Sharing Apparatus: Joint Hearing Before the Subcomm. on Energy Policy, Health Care and Entitlements of the H. Comm. on Oversight and Gov’t Reform and the Subcomm. on Cybersecurity, Infrastructure Protection, and Security Technologies of the H. Comm. on Homeland Security, 113th Cong. (2013), available at http://www.gpo.gov/fdsys/pkg/CHRG-113hhrg86193/pdf/CHRG-113hhrg86193.pdf.

Health Information Technology: Protecting Americans’ Privacy in the Digital Age: Hearing Before the S. Comm. on the Judiciary, 111th Cong. (2009), available at http://www.gpo.gov/fdsys/pkg/CHRG-111shrg54240/pdf/CHRG-111shrg54240.pdf.

State of Federal Privacy and Data Security Law: Lagging Behind the Times: Hearing Before the Oversight of Gov’t Mgmt., the Fed. Workforce, and the D.C. Subcomm. of the S. Comm. on

Page 31: scallinstitute.files.wordpress.com · 3. PRIVACY AND TECHNOLOGY. By Alyssa Thurston . Books and Practice Materials . AM. BAR ASSOC., INFORMATION SECURITY AND PRIVACY: A PRACTICAL

28

Homeland Security and Gov’t Affairs, 112th Cong. (2012), available at http://www.gpo.gov/fdsys/pkg/CHRG-112shrg76066/pdf/CHRG-112shrg76066.pdf.

• Federal Agency Rulemaking

Information Nondiscrimination Act; Other Modifications to the HIPAA Rules, 78 Fed. Reg. 5566 (Jan. 25, 2013) (codified at 45 C.F.R. pts. 160 and 164), available at http://www.gpo.gov/fdsys/pkg/FR-2013-01-25/pdf/2013-01073.pdf.

Modifications to the HIPAA Privacy, Security, Enforcement, and Breach Notification Rules Under the Health Information Technology for Economic and Clinical Health Act and the Genetic Information Nondiscrimination Act; Other Modifications to the HIPAA Rules, 78 Fed. Reg. 5566 (Jan. 25, 2013) (codified at 45 C.F.R. pts. 160 and 164), available at http://www.gpo.gov/fdsys/pkg/FR-2013-01-25/pdf/2013-01073.pdf.

Current Awareness

HealthCare.gov, HealthCare.gov Privacy Policy, https://www.healthcare.gov/privacy/.

HealthIT.gov, Privacy & Security, http://www.healthit.gov/providers-professionals/ehr-privacy-security.

HealthIT.gov, Privacy & Security Policy, http://www.healthit.gov/policy-researchers-implementers/everyone-has-role-protecting-and-securing-health-information.

HealthIT.gov, Protecting Your Privacy & Security, http://www.healthit.gov/patients-families/protecting-your-privacy-security.

Privacy Rights Clearinghouse, Medical Privacy, https://www.privacyrights.org/Medical-Privacy.

U.S. Dept. of Health & Human Services, Health Information Privacy, http://www.hhs.gov/ocr/privacy/index.html.