Daniel Solove presents a startling revelation of how digital dossiers are created, usually without the knowledge of the subject, & argues that we must rethink our understanding of what privacy is & what it means in the digital age before addressing the need to reform the laws that regulate it.
If you've got nothing to hide," many people say, "you shouldn't worry about government surveillance." Others argue that we must sacrifice privacy for security. But as Daniel J. Solove argues in this important book, these arguments and many others are flawed. They are based on mistaken views about what it means to protect privacy and the costs and benefits of doing so. The debate between privacy and security has been framed incorrectly as a zero-sum game in which we are forced to choose between one value and the other. Why can't we have both? In this concise and accessible book, Solove exposes the fallacies of many pro-security arguments that have skewed law and policy to favor security at the expense of privacy. Protecting privacy isn't fatal to security measures; it merely involves adequate oversight and regulation. Solove traces the history of the privacy-security debate from the Revolution to the present day. He explains how the law protects privacy and examines concerns with new technologies. He then points out the failings of our current system and offers specific remedies. Nothing to Hide makes a powerful and compelling case for reaching a better balance between privacy and security and reveals why doing so is essential to protect our freedom and democracy"--Jacket.
A clear, comprehensive, and cutting-edge introduction to the field of information privacy law, with the latest cases and materials exploring issues of emerging technology, information privacy, algorithmic decisions, AI, data security, and European data protection law. New to the 8th Edition: Tighter editing and shorter chapters New sections about AI and algorithms in law enforcement (Chapter 4), consumer privacy (Chapter 9), and employment privacy (Chapter 12) New cases: MD Anderson, Loomis v. Wisconsin, Clearview AI Discussion of post-Carpenter cases Discussion of new FTC enforcement cases involving dark patterns and algorithm deletion Discussion of protections of reproductive health data after Dobbs Benefits for instructors and students: Extensive coverage of FTC privacy enforcement, HIPAA and HHS enforcement, and standing in privacy lawsuits, among other topics Chapters devoted exclusively to data security, national security, employment privacy, and education privacy Sections on government surveillance and freedom to explore ideas Engaging approach to complicated laws and regulations such as HIPAA, FCRA, ECPA, GDPR, and CCPA
A clear, comprehensive, and cutting-edge introduction to the field of information privacy law with a focus on the crucial topic of the protection of consumer interests. This volume is perfect for a full three-credit course or a seminar. Read the latest cases and materials exploring issues of emerging technology, information privacy, financial data, consumer data, and data security. New to the 4th Edition: Tighter editing and shorter chapters New case on facial recognition and the BIPA: Clearview AI Discussion of new FTC enforcement cases involving dark patterns and algorithm deletion Discussion of protections of reproductive health data after Dobbs New section on AI and algorithms New case on standing: TransUnion v. Ramirez New material about state consumer privacy laws
Developed from the casebook¿Information Privacy Law, this short paperback contains key cases and materials focusing on privacy issues¿related to the media. Topics covered include the privacy torts, free speech, First¿Amendment, paparazzi, defamation, online gossip and social network websites. New to the Fourth Edition: New cases and notes throughout, including the addition of a leading right of publicity case from California, De Havilland v. FX Networks, LLC. This book could be used in courses including: Media law Entertainment law Cyberlaw First Amendment / free speech Privacy law Information law Torts II Journalism
A clear, comprehensive, and cutting-edge introduction to the field of information privacy law with a focus on EU Data Protection and the GDPR. The volume is perfect as a stand-alone text for a seminar and as supplement to a course on EU law. It contains the latest cases and materials exploring issues of emerging technology, information privacy, OECD privacy guidelines, privacy protection in Europe, international transfers of data, and selected provisions of the GDPR. New to the 2nd Edition: Tighter editing and shorter chapters Full text of the GDPR Schrems II and the Data Privacy Framework
If you've got nothing to hide," many people say, "you shouldn't worry about government surveillance." Others argue that we must sacrifice privacy for security. But as Daniel J. Solove argues in this important book, these arguments and many others are flawed. They are based on mistaken views about what it means to protect privacy and the costs and benefits of doing so. The debate between privacy and security has been framed incorrectly as a zero-sum game in which we are forced to choose between one value and the other. Why can't we have both? In this concise and accessible book, Solove exposes the fallacies of many pro-security arguments that have skewed law and policy to favor security at the expense of privacy. Protecting privacy isn't fatal to security measures; it merely involves adequate oversight and regulation. Solove traces the history of the privacy-security debate from the Revolution to the present day. He explains how the law protects privacy and examines concerns with new technologies. He then points out the failings of our current system and offers specific remedies. Nothing to Hide makes a powerful and compelling case for reaching a better balance between privacy and security and reveals why doing so is essential to protect our freedom and democracy"--Jacket.
A novel account of how the law contributes to the insecurity of our data and a bold way to rethink it. Digital connections permeate our lives-and so do data breaches. Given that we must be online for basic communication, finance, healthcare, and more, it is alarming how difficult it is to create rules for securing our personal information. Despite the passage of many data security laws, data breaches are increasing at a record pace. In Breached!, Daniel Solove and Woodrow Hartzog, two of the world's leading experts on privacy and data security, argue that the law fails because, ironically, it focuses too much on the breach itself. Drawing insights from many fascinating stories about data breaches, Solove and Hartzog show how major breaches could have been prevented or mitigated through a different approach to data security rules. Current law is counterproductive. It pummels organizations that have suffered a breach but doesn't address the many other actors that contribute to the problem: software companies that create vulnerable software, device companies that make insecure devices, government policymakers who write regulations that increase security risks, organizations that train people to engage in risky behaviors, and more. Although humans are the weakest link for data security, policies and technologies are often designed with a poor understanding of human behavior. Breached! corrects this course by focusing on the human side of security. Drawing from public health theory and a nuanced understanding of risk, Solove and Hartzog set out a holistic vision for data security law-one that holds all actors accountable, understands security broadly and in relationship to privacy, looks to prevention and mitigation rather than reaction, and works by accepting human limitations rather than being in denial of them. The book closes with a roadmap for how we can reboot law and policy surrounding data security.
Privacy is one of the most important concepts of our time, yet it is also one of the most elusive. As rapidly changing technology makes information increasingly available, scholars, activists, and policymakers have struggled to define privacy, with many conceding that the task is virtually impossible. In this concise and lucid book, Daniel J. Solove offers a comprehensive overview of the difficulties involved in discussions of privacy and ultimately provides a provocative resolution. He argues that no single definition can be workable, but rather that there are multiple forms of privacy, related to one another by family resemblances. His theory bridges cultural differences and addresses historical changes in views on privacy. Drawing on a broad array of interdisciplinary sources, Solove sets forth a framework for understanding privacy that provides clear, practical guidance for engaging with relevant issues. Understanding Privacy will be an essential introduction to long-standing debates and an invaluable resource for crafting laws and policies about surveillance, data mining, identity theft, state involvement in reproductive and marital decisions, and other pressing contemporary matters concerning privacy.
A startling account of personal data dossiers and the newest grave threat to privacy Seven days a week, twenty-four hours a day, electronic databases are compiling information about you. As you surf the Internet, an unprecedented amount of your personal information is being recorded and preserved forever in the digital minds of computers. For each individual, these databases create a profile of activities, interests, and preferences used to investigate backgrounds, check credit, market products, and make a wide variety of decisions affecting our lives. The creation and use of these databases—which Daniel J. Solove calls “digital dossiers”—has thus far gone largely unchecked. In this startling account of new technologies for gathering and using personal data, Solove explains why digital dossiers pose a grave threat to our privacy. The Digital Person sets forth a new understanding of what privacy is, one that is appropriate for the new challenges of the Information Age. Solove recommends how the law can be reformed to simultaneously protect our privacy and allow us to enjoy the benefits of our increasingly digital world. This is the first volume in the series EX MACHINA: LAW, TECHNOLOGY, AND SOCIETY.
Privacy Risk Analysis fills a gap in the existing literature by providing an introduction to the basic notions, requirements, and main steps of conducting a privacy risk analysis. The deployment of new information technologies can lead to significant privacy risks and a privacy impact assessment should be conducted before designing a product or system that processes personal data. However, if existing privacy impact assessment frameworks and guidelines provide a good deal of details on organizational aspects (including budget allocation, resource allocation, stakeholder consultation, etc.), they are much vaguer on the technical part, in particular on the actual risk assessment task. For privacy impact assessments to keep up their promises and really play a decisive role in enhancing privacy protection, they should be more precise with regard to these technical aspects. This book is an excellent resource for anyone developing and/or currently running a risk analysis as it defines the notions of personal data, stakeholders, risk sources, feared events, and privacy harms all while showing how these notions are used in the risk analysis process. It includes a running smart grids example to illustrate all the notions discussed in the book.
Teeming with chatrooms, online discussion groups, and blogs, the Internet offers previously unimagined opportunities for personal expression and communication. But there's a dark side to the story. A trail of information fragments about us is forever preserved on the Internet, instantly available in a Google search. A permanent chronicle of our private lives--often of dubious reliability and sometimes totally false--will follow us wherever we go, accessible to friends, strangers, dates, employers, neighbors, relatives, and anyone else who cares to look. This engrossing book, brimming with amazing examples of gossip, slander, and rumor on the Internet, explores the profound implications of the online collision between free speech and privacy. Daniel Solove, an authority on information privacy law, offers a fascinating account of how the Internet is transforming gossip, the way we shame others, and our ability to protect our own reputations. Focusing on blogs, Internet communities, cybermobs, and other current trends, he shows that, ironically, the unconstrained flow of information on the Internet may impede opportunities for self-development and freedom. Long-standing notions of privacy need review, the author contends: unless we establish a balance between privacy and free speech, we may discover that the freedom of the Internet makes us less free.
the key resource for privacy professionals; all the privacy statutes, regulations, and materials you need together in one book! Includes the up-to-date complete text of about 40 statutes, regulations, and other materials. Includes: APEC Privacy Framework, CCPA, California Breach Notification Statute, California's SB1, COPPA, CALEA, CAN-SPAM, CFAA, CIIA, DPPA, ECPA, EU Data Protection Directive, FCRA, FERPA, FISA, FOIA, FTC Act, GLB Act, HIPAA, OECD Privacy Guidelines, Privacy Act, PPA, Real ID Act, RFPA, Safe Harbor Arrangement, TCPA, VPPA, and much more. Contains introductions to each statute and regulation. Presents the text of statutes and regulations in an easy-to-read format Author Website: http://informationprivacylaw.com
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.