Introduction To Privacy Law Richard Warner. Informational Privacy Our focus will be on informational privacy. Informational privacy consists in the ability.

Slides:



Advertisements
Similar presentations
/0403 © 2004 Business & Legal Reports, Inc. BLRs Training Presentations Privacy Issues in the Workplace.
Advertisements

THE FOURTH AMENDMENT Constitutional Law.
Background Checks. Why Conduct Background Checks? INDIANA UNIVERSITY 1.
Wait Times Guarantee Pilot A partnership between Saint Elizabeth Health Care and the Assembly of Manitoba Chiefs.
A Brief History of Information Privacy IC211. Colonial America Eavesdropping “listen[ing] under walls or windows, or the eaves of a house, to hearken.
US Constitution and Right to Privacy Generally only protects against government action Doesn’t obligate government to do something, but rather to refrain.
William G. Madsen, Madsen, Prestley & Parenteau LLC A. Robert Fischer, Jackson Lewis LLC CBIA’s Mid-Year HR Update Workplace Privacy.
Back to Table of Contents
© 2012 Lathrop & Gage LLP Presented by: Lincoln D. Bandlow, Esq. Lathrop & Gage LLP 1888 Century Park East, Suite 1000 Los Angeles, CA
Privacy: Expectations, Norms, Technology Richard Warner.
Iowa Civil Rights Commission Disclaimer The information contained in this presentation is a brief overview and should not be construed as legal advice.
13.1 Chapter 13 Privacy © 2003 by West Legal Studies in Business/A Division of Thomson Learning.
4.01B Marketing Information Management. A system that analyzes and assesses marketing information, gathered continuously from sources inside and outside.
Ch. 1: What is Economics? Objectives
Copyright © 2005 by South-Western, a division of Thomson Learning All rights reserved 1 Chapter 6 Ethics and Stakeholder Social Responsibility.
Ideas; Publicity Intro to IP – Prof Merges
Topic 7. Insurance Markets and Regulation
Informational Privacy, Privacy Law, Consent, and Norms Richard Warner.
AAEC 3315 Agricultural Price Theory
Developing a Global Vision through Marketing Research Chapter 8 McGraw-Hill/Irwin© 2005 The McGraw-Hill Companies, Inc. All rights reserved.
 MODERN DATABASE MANAGEMENT SYSTEMS OVERVIEW BY ENGINEER BILAL AHMAD
CHAPTER 1 The Fundamentals of Managerial Economics Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without.
COMPUTING AT CARNEGIE MELLON SECTION I2 Privacy. Introduction Lauren Milisits.
Invasion of Privacy – What you are (and are not) entitled to in the eyes of the law Image courtesy of privacy-please/
INVASION OF PRIVACY What is freedom of the press? Should there be limits on the press? Are there aspects of the media essential to freedom of the press?
24 Legal and Ethical Considerations. 24 Legal and Ethical Considerations.
13 July 2006Susan Joseph Health Privacy It’s My Business Health Records Act 2001 (Vic) eReferral Service Co-ordination System.
(Edited) WORKPLACE PRIVACY.
Privacy: Law, Values, Norms
The Privacy Torts Public Disclosure of a Private Fact Intrusion False Light Appropriation.
Using the Internet to Conduct Research What Investigators and IRB Members Should Know -- January 29, Lisa Shickle, MS Analyst, VCU Massey Cancer.
Copyright © 2010 – Jeffrey Pittman. Introduction The following slides expand the textbook coverage of the topic “Invasion of Privacy” Privacy Law - Jeffrey.
CSE/ISE 312 Privacy (Part 1). What We Will Cover Privacy risks and principles 4 th Amendment, expectations, and surveillance Business and social sectors.
Notes for Discussion on a Privacy Practice © Joe Cleetus.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Top-Down or Bottom-Up? Richard Warner. Top-Down and Bottom-Up  “Top-down” refers to central planning through legislation and court decisions. Top-down.
The Right to Privacy Jody Blanke, Professor Computer Information Systems and Law.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
Law Online: An Introduction Richard Warner Chicago-Kent College of Law
“Britain Weighs Proposal to Allow Greatly Increased Internet Snooping ” Article By:Anthony Faiola and Ellen Nakashima Presentation By: Dedric Guest.
Invasion of Privacy in Digital Media Basic Concepts.
Introduction To Privacy Law Richard Warner. An Informational Privacy Ideal Informational privacy consists in the ability to control  What information.
Managing the Information Copyright © Texas Education Agency, All rights reserved.
Activities affecting informational privacy Collection Processing dissemination Monitoring ContractNo-contract questioning AggregationSecondary useExclusion.
Privacy Jody Blanke Distinguished Professor of Computer Information Systems and Law Mercer University.
FERPA Guidelines for Cooperating Teacher and University Supervisors.
COMMUNICATION LAW Chapter 20. Communication Law Preview Libel— –Libel is defamation (injury to someone’s reputation) by written words or by communication.
1-1 CHAPTER 7 MATERIALS TO SUPPLEMENT TEXTBOOK J. Pittman, Instructor.
CS 99 Final Paper The Ethics of Privacy in a Digital Economy Jason Gelman.
A Crash Course in Press Law For the High School Press.
Jody Blanke, Professor Computer Information Systems and Law 1.
Chapter 18 The Legal Aspects of Sport Marketing. Objectives To introduce the key legal concepts and issues that affect the marketing of the sport product.
The Right of Privacy and the Right of Publicity It’s not just about tabloids and fame Heather Briston Special Collections and University Archives University.
Markets and Information Richard Warner. Three Types of Privacy  Spatial rights define a physical zone of control over intrusions by others.  Decisional.
Business Ethics and Social Responsibility
The legal right of privacy has been defined as the right to be let alone, the right of a person "to withhold himself and his property from public scrutiny.
On the Front Lines: Building Skills for Reentry and Diversion March 31,
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
Surveillance around the world
Fundamentals of business law, 10e
South Carolina AHEC Health Careers Academy
Democracy in the United States
Student Confidentiality: The FERPA/HIPAA Facts
Chapter # 1 Overview of Ethics
Image courtesy of Invasion of Privacy – What you are (and are not) entitled to in the eyes of the law.
The Law of Journalism & Mass Communication
Privacy What does it mean to you?.
Business Ethics and Social Responsibility
Accounting Discipline Overview
Student Confidentiality: The FERPA/HIPAA Facts
Presentation transcript:

Introduction To Privacy Law Richard Warner

Informational Privacy Our focus will be on informational privacy. Informational privacy consists in the ability to control  what information others obtain about you, and  what they do with that information. Other types of privacy:  Spatial privacy: the ability to control intrusions into certain places.  Decisional privacy: the ability to avoid intrusions into one’s decisions.

An Overview One way to get an overview is to consider four types of things we can do in regard to information.  Collection  Processing Storage Aggregation Analysis  Use Primary Secondary  Distribution

Activities CollectionProcessing Use Distribution Intrusion upon seclusion Public disclosure of private facts Misappropriation False light

The Response to Technology Computers and the Internet have greatly increased our ability to collect, process, use, and distribute information. The traditional privacy torts illustrate the issues this raises.

Misappropriation The tort of misappropriation singles out those aspects of my identity—my “name or likeness”—that others cannot use for their benefit without my consent. Is the profile created by analysis of purchasing information such an aspect?  Dwyer v. American Express answers “no.” But the case confuses a person name with the profile created by analysis.  What profiles can be created?  How can they be used?  By whom?

Efficiency Versus Privacy Businesses collect information because, other things being equal, more relevant information allows them to more efficiently achieve their goals.  Product development, marketing, price discrimination, extension of credit, and so on. Efficiency matters. Protecting privacy typically means less efficiency in regard to business goals.

How Do We Make the Tradeoff? How to make the tradeoff between business efficiency and privacy? This is currently a matter of considerable controversy. The same controversy arises in the case of the other privacy torts.

Intrusion Upon Seclusion Does DoubleClick intrude upon seclusion when it obtains information when it deposits on your hard drive to collect information?  The cookie is deposited without your consent.  Is the information “private”? A French court has held such cookies violate fundamental privacy rights. The US has not taken this position.  In Re DoubleClick.

Public Disclosure of Private Facts Does ChoicePoint commit the tort of public disclosure if it sends an arrest report of a job applicant to an employer even though the report had been officially expunged?  It is true that the applicant had been arrested.  The record was just officially expunged.  But ChoicePoint is not a governmental agency.  Is it highly offensive to a reasonable person that the employer obtain the record?

How Should The Law Respond? The law needs to respond to the changes technology has caused. The critical question about privacy law is not what the law is but what it should be?