Privacy Legal Landscape

Slides:



Advertisements
Similar presentations
A Brief History of Information Privacy IC211. Colonial America Eavesdropping “listen[ing] under walls or windows, or the eaves of a house, to hearken.
Advertisements

US Constitution and Right to Privacy Generally only protects against government action Doesn’t obligate government to do something, but rather to refrain.
Confidentiality and HIPAA
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
WHAT IS HIPAA? The Health Insurance Portability and Accountability Act of 1996 (HIPAA) provides certain protections for any of your health information.
Today’s Schools face:  Numerous State and Federal Regulations  Reduced Technology Funding  More Stringent Guidelines for Technology Use.
School-Based Health Centers & Confidentiality: Understanding FERPA & HIPAA Laurie Mesibov & Jill Moore UNC School of Government December 2012.
Privacy and the Right to Know Grayson Barber, Esq. Grayson Barber, LLC.
© 2004 Property Casualty Insurers Association of America The Alphabet of Federal Legislation Kathleen Jensen Property and Casualty Insurers Association.
1 PRIVACY ISSUES IN THE U.S. – CANADA CROSS BORDER BUSINESS CONTEXT Presented by: Anneli LeGault ACC Greater New York Chapter Compliance Seminar May 19,
13.1 Chapter 13 Privacy © 2003 by West Legal Studies in Business/A Division of Thomson Learning.
E-Commerce: Legal and Practical Issues Legal Issues: Security – December 2, 2005 Stephen M. Foxman Philadelphia.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
Data Retention LIS 550 Winter 2010 Unsworth Tuesday, March 02, 2010.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2007 Lorrie Cranor 1 Privacy Law.
CS294-1 Deeply Embedded Networks Privacy Discussion 11/25/03 David Culler University of California, Berkeley.
Allows FBI to request (from FISA court judges) access to certain business records, including Common carriers (airlines, bus companies, and others in the.
Banks and the Privacy of Medical Information 8 th National HIPAA Summit March 8, 2004 Joy Pritts, JD Health Policy Institute Georgetown University
+ Protecting Individual Liberties Section 1 Chapter 14.
Forum IIIB Group 7 Open Access to Personal Information Introduction- Steve Ayers Pros- Michelle Peterson Cons- Christie Christman Conclusion- Audrey Clausen.
CSE/ISE 312 Privacy (Part 1). What We Will Cover Privacy risks and principles 4 th Amendment, expectations, and surveillance Business and social sectors.
Confidentiality for Transportation Personnel.  Family Educational Rights and Privacy Act (FERPA)  Kentucky Family Educational Rights and Privacy Act.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
Computerized Networking of HIV Providers Workshop Data Security, Privacy and HIPAA: Focus on Privacy Joy L. Pritts, J.D. Assistant Research Professor Health.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Privacy in Healthcare Challenges Associated with Implementing Privacy in an Electronic Health Records Environment John P. Houston, J.D. Vice President,
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
Building a Privacy Foundation. Setting the Standard for Privacy Health Insurance Portability and Accountability Act (HIPAA) Patient Bill of Rights Federal.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
Chapter 7—Privacy Law and HIPAA
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 15 Privacy as a Value.
Session Title: FERPA: What You Need To Know Presented By: Jeffery Loggins Institution: Mississippi Valley State University September 15, 2015.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
C HAPTER 34 Code Blue Health Sciences Edition 4. Confidentiality of sensitive information is an important issue in healthcare. Breaches of confidentiality.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
Ethical and Legal Issues Information Systems 337 Prof. Harry Plantinga.
Approved for Public Release. Distribution Unlimited. 1 Government Privacy Rick Newbold, JD, MBA, CIPP/G Futures Branch 28.
An Introduction to the Privacy Act Privacy Act 1993 Promotes and protects individual privacy Is concerned with the privacy of information about people.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
Jody Blanke, Professor Computer Information Systems and Law 1.
HIPAA Overview Why do we need a federal rule on privacy? Privacy is a fundamental right Privacy can be defined as the ability of the individual to determine.
APEC Privacy Framework “The lack of consumer trust and confidence in the privacy and security of online transactions and information networks is one element.
Sharing Information (FERPA) FY07 REMS Initial Grantee Meeting December 5, 2007, San Diego, CA U.S. Department of Education, Office of Safe and Drug-Free.
Human Subjects Update E. Wethington, Chair, UCHS.
Disclaimer This presentation is intended only for use by Tulane University faculty, staff, and students. No copy or use of this presentation should occur.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
FERPA & HIPAA: Maintaining Student Confidentiality.
Juvenile Legislative Update 2013 Confidential Records and Protected Disclosures.
FERPA Family Educational Rights and Privacy Act
Denise Chrysler, JD Director, Mid-States Region
Bellwork Think about this…. Historical Event
Privacy and the Law.
Surveillance around the world
Federal Agencies and Laws for Consumer Rights
Networking 2002 USA-Patriot Act Tracy Mitrano Cornell University
Protection of CONSUMER information
Chapter 10 Cyberlaw, Social Media, and Privacy
What is HIPAA? HIPAA stands for “Health Insurance Portability & Accountability Act” It was an Act of Congress passed into law in HEALTH INSURANCE.
Data Protection: EU & International
Legal and Ethical Issues
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web Lecture 4 This material was developed by Oregon.
Essentials of the Legal Environment today, 5E
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
Employee Privacy and Privacy of Employee Information
CompTIA Security+ Study Guide (SY0-401)
Data Protection What’s new about The General Data Protection Regulation (GDPR) May 2018? Call Kerry on Or .
Laws Governing Police Surveillance
Student Privacy in the age of big data
Student Data Privacy: National Trends and Wyoming’s Role
Chapter 23 Government Regulation and Administrative Law
Presentation transcript:

Privacy Legal Landscape Monday, March 19, 2018

Dear Ithaca Campus Community, With safety as a priority, Cornell University is making available a free mobile app for faculty, students and staff on the Ithaca campus. RAVE Guardian turns your smartphone into a personal safety device. Check out the FAQs for more information. By downloading the app on your mobile phone, you can invite friends and family to join your network as your “Guardians.” You can then request one or more of your Guardians to virtually walk with you on or off campus. It’s like having an emergency blue light system and a trusted friend with you at all times. The app also has a safety feature that directly connects you to campus police (or 9-1-1 if off-campus) in an emergency situation, as well as the ability to submit an anonymous tip to campus police should you see something suspicious. The Guardian app augments emergency communications and safety. All students, faculty and staff are encouraged to enhance their personal safety and the safety of their friends by downloading the free app at the Apple App Store or the Android app on Google Play. Sincerely, Cornell University Police Cornell Office of Emergency Management emergency.cornell.edu

Law Other forms of regulation . Ethics . Professional codes . Technology Law

Is this legal? in the US

Is this legal?

Arne Svensen-2013 Julie Saul Gallery

IRS hands over Donald Trump’s tax returns to Mueller investigation US Census provides a full report of short form responses to the public Acxiom (a data broker) obtains divorce records from the New York State courthouse Dictionary.com shares information about users to advertisers Your best friend tells her brother about your financial troubles The FBI cites a protester for distributing anonymous fliers Cornell sells student’s grade transcripts to headhunting firm Coursera sells performance information about you to headhunting firm

Federal and State/Local E.g. Privacy Act (1974; HIPAA) LEGISLATURE Statutes U.S. Constitution ”Bill of Rights” Where does law pertaining to PRIVACY come from? United States v. Jones (2013) FB sponsored stories (2013) E.g. 4th Amendment COURTS Judicial decisions COMMON (CIVIL) LAW “Torts” E.g. Privacy policies online E.G. Hulk Hogan sues Gawker GOVERNMENT AGENCIES FTC, FCC, DHHS, ... Rules, Legal Actions, Principles

Federal Constitutional Law – Bill of Rights (“privacy penumbra”) • The First Amendment right to speak anonymously • The First Amendment freedom of association • The Third Amendment’s protection of the home from the quartering of troops • The Fourth Amendment’s protection against unreasonable searches and seizures • The Fifth Amendment’s privilege against self-incrimination Ask class about Gawker, to test fact that constitution applies to govt actor only. 1928 Olmstead v. United States (wiretap private phone) 1967 Katz v. United States (bug public payphone) Justice John Marshall Harlan invents the “reasonable expectation of privacy test,” (1) exhibited subjective expectation; (2) deemed reasonable by society

CODE OF FAIR INFORMATION PRACTICES (for PID information) US Dept of HEW, 1973 Report on Automated Personal Data Systems • There must be no personal data record-keeping systems whose very existence is secret. • There must be a way for an individual to find out what information about him is in a record and how it is used. • There must be a way for an individual to prevent information about him obtained for one purpose from being used or made available for other purposes without his consent. • There must be a way for an individual to correct or amend a record of identifiable information about him. • Any organization creating, maintaining, using, or disseminating records of identifiable personal data must assure the reliability of the data for their intended use and must take reasonable precautions to prevent misuse of the data.

Federal Statutory Law • Fair Credit Reporting Act of 1970, 15 U.S.C. §§ 1681 et seq. — provides citizens rights regarding use and disclosure of personal information by consumer reporting agencies. • Bank Secrecy Act of 1970, Pub. L. No. 91-508 — requires banks to maintain reports of people’s financial transactions to assist in government white-collar investigations. • Privacy Act of 1974, 5 U.S.C. § 552a — provides individuals with a number of rights concerning their personal information maintained in government record systems, such as the right to see one’s records and to ensure that the information in them is accurate. • Family Educational Rights and Privacy Act of 1974, 20 U.S.C. §§ 1221 note, 1232g — protects the privacy of school records. • Foreign Intelligence Surveillance Act of 1978, 15 U.S.C. §§ 1801–1811 — regulates foreign intelligence gathering within the U.S. • Electronic Communications Privacy Act of 1986, 18 U.S.C. §§ 2510–2522, 2701–2709 — updates federal electronic surveillance law for new developments in technology. • Computer Matching and Privacy Protection Act of 1988, 5 U.S.C. § 552a — regulates automated investigations conducted by government agencies comparing computer files. • Video Privacy Protection Act of 1988, 18 U.S.C. §§ 2710–2711 — protects the privacy of videotape rental information.

Federal Statutory Law, continued: • Driver’s Privacy Protection Act of 1994, 18 U.S.C. §§ 2721–2725 — restricts the states from disclosing or selling personal information in motor vehicle records. • Health Insurance Portability and Accountability Act (HIPAA) of 1996 — gives the Department of Health and Human Services (HHS) the authority to promulgate regulations governing the privacy of medical records. • Children’s Online Privacy Protection Act of 1998, 15 U.S.C. §§ 6501–6506 — restricts the use by Internet websites of information gathered from children under age 13. • Gramm-Leach-Bliley Act of 1999, 15 U.S.C. §§ 6801–6809 — requires privacy notices and provides opt-out rights when financial institutions seek to disclose personal data to other companies. • USA-PATRIOT Act of 2001 — amends a number of electronic surveillance statutes and other statutes to facilitate law enforcement investigations and access to information.

The Common Law: Torts (“harms”) 1890 Warren & Brandeis: The Right to Privacy Declares a NEW common law right to privacy (vs. Libel, Slander, Property Rights) 1960 William Prosser organizes over 300 cases since W&B Intrusion upon seclusion (and private affairs) Public disclosure of private facts False light Appropriation of name or likeness Tests: Note: offensive to “a reasonable person” Note: no of legitimate concern to the public

Government Agencies Federal Trade Commission* Department of Health and Human Services Federal Communications Commission National Security Agency Federal Bureau of Investigation Central Intelligence Agency

OECD PRIVACY GUIDELINES 1980  (1) collection limitation—data should be collected lawfully with the individual’s consent; (2) data quality—data should be relevant to a particular purpose and be accurate; (3) purpose specification—the purpose for data collection should be stated at the time of the data collection and the use of the data should be limited to this purpose; (4) use limitation—data should not be disclosed for different purposes without the consent of the individual; (5) security safeguards—data should be protected by reasonable safeguards; (6) openness principle—individuals should be informed about the practices and polices of those handling their personal information; (7) individual participation—people should be able to learn about the data that an entity possesses about them and to rectify errors or problems in that data; (8) accountability—the entities that control personal information should be held accountable for carrying out these principles.