Information Privacy Law: [Connected eBook]

Information Privacy Law: [Connected eBook]

Information Privacy Law: [Connected eBook]

Information Privacy Law: [Connected eBook]

Hardcover(Seventh Edition)

$335.00 
  • SHIP THIS ITEM
    Not Eligible for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores

Related collections and offers


Overview

Buy a new version of this textbook and receive access to the Connected eBook on Casebook Connect, including lifetime access to the online ebook with highlight, annotation, and search capabilities. Access also includes an outline tool and other helpful resources. Connected eBooks provide what you need most to be successful in your law school classes.


The Seventh Edition of Information Privacy Law has been revised to include the California Consumer Privacy Act, the GDPR, Carpenter, state biometric data laws, and many other new developments. A clear, comprehensive, and cutting-edge introduction to the field of information privacy law, Information Privacy Law contains the latest cases and materials exploring issues of emerging technology and information privacy, and the extensive background information and authorial guidance provide clear and concise introductions to various areas of law.

New to the Seventh Edition:

  • Additional Coverage or updates to:
    • California Consumer Privacy Act
    • Carpenter v. United States
    • General Data Protection Regulation
    • State biometric data laws
    • New FTC enforcement actions, including Facebook

Professors and students will benefit from:

  • Extensive coverage of FTC privacy enforcement, HIPAA and HHS enforcement, standing in privacy lawsuits, among other topics.
  • Chapters devoted exclusively to data security, national security, employment privacy, and education privacy.
  • Sections on government surveillance and freedom to explore ideas.
  • Extensive coverage of the NSA and the Snowden revelations and the ensuing regulation.
  • Engaging approach to complicated laws and regulations such as HIPAA, FCRA, ECPA, GDPR, and CCPA.

Product Details

ISBN-13: 9781543813722
Publisher: Wolters Kluwer Law & Business
Publication date: 11/18/2020
Series: Aspen Casebook Series
Edition description: Seventh Edition
Pages: 1272
Product dimensions: 7.38(w) x 10.00(h) x (d)

Table of Contents

Prefacexxv
Acknowledgmentsxxix
1Introduction1
AInformation Privacy, Technology, and the Law1
Sidis v. F-R Publishing Corp.2
BInformation Privacy Law: Origins and Types9
1Common Law9
2Constitutional Law33
3Statutory Law35
4International Law38
CPhilosophical Perspectives39
1The Philosophical Discourse About Privacy39
2The Definition and the Value of Privacy40
3Critics of Privacy59
4The Feminist Perspective on Privacy67
2Privacy and the Media75
AInformation Gathering76
1Intrusion upon Seclusion76
2Paparazzi94
3Video Voyeurism100
BDisclosure of Truthful Information102
1Public Disclosure of Private Facts103
2Disclosure of Illegally Obtained Information152
CDissemination of False or Misleading Information159
1Defamation159
2False Light181
3Infliction of Emotional Distress185
DAppropriation of Name or Likeness188
1Introduction188
2Name or Likeness191
3Connection to Matters of Public Interest197
4First Amendment Limitations203
3Privacy and Law Enforcement207
AThe Fourth Amendment and Emerging Technology207
1Introduction207
2Wiretapping, Bugging, and Beyond214
3The Reasonable Expectation of Privacy Test and Emerging Technology232
BFederal Electronic Surveilliance Law263
1Section 605 of the Federal Communications Act of 1934263
2Title III of the Omnibus Crime Control Act of 1968264
3The Electronic Communications Privacy Act (ECPA) of 1986265
4The Communications Assistance for Law Enforcement Act285
5The Foreign Intelligence Surveillance Act288
6The USA PATRIOT Act294
CIntelligence, Terrorism, and National Security300
1Is National Security Different?300
2FISA and the "Wall"303
3The Attorney General's FBI Guidelines314
4The Homeland Security Act317
5The Intelligence Reform and Terrorism Prevention Act317
DEncryption320
EGovernment Computer Searches323
1The Scope of Warrants to Search Computers323
2ISP Records326
3Carnivore338
4Key Logging Devices339
4Health and Genetic Privacy345
AMedical Data and Privacy in the Information Age346
Privacy and the Economics of Health Care Information346
Health Information Privacy347
"Nobody Knows the MIB"348
BConfidentiality of Medical Information350
1Professional Ethics and Evidentiary Privileges350
2Tort Liability for Disclosure of Patient Information356
3Tort Liability for Failure to Disclose Patient Information363
4Statutory Reporting Requirements375
5State Law Privacy Protections for Medical Information377
6Health Insurance Portability and Accountability Act379
CConstitutional Protection of Medical Information394
1The Constitutional Right to Information Privacy394
2The Fourth Amendment415
DGenetic Information421
1Background: Genetic Privacy421
2Property Rights in Body Parts and DNA422
3Genetic Testing and Discrimination436
4DNA Databases and Identification441
5Privacy of Associations, Anonymity, and Identification451
APrivacy of Group Associations453
1Compelled Disclosure of Group Membership Lists453
2Interrogation About Group Associations456
3Surveillance of Group Activities461
BAnonymity470
1Anonymous Speech470
2Anonymity in Cyberspace480
3Anonymous Reading and Receiving of Ideas490
4Anonymity and Copyright498
CIdentification504
1Identification Devices and Techniques504
2Identification and the Constitution506
3Social Security Numbers513
4National Identification Systems519
6Privacy and Government Records and Databases523
APublic Access to Government Records524
1Public Records and Court Records524
2The Freedom of Information Act526
3Constitutional Requirements of Public Access542
4Constitutional Limitations on Public Access550
BGovernment Records of Personal Information577
1Fair Information Practices577
2The Privacy Act579
3The Use of Government Databases599
4The Driver's Privacy Protection Act618
7Privacy, Business Records, and Financial Information623
AThe Collection and Use of Personal Data623
1Data Collection Techniques and Devices624
2The Database Industry629
3Perspectives on the Collection and Use of Personal Data631
BRegulating Business Records and Databases636
1Self-Regulation636
2Property and Contract Law637
3Technological Solutions642
4Tort Law643
5Statutory Protections649
6First Amendment Limitations on Privacy Regulation673
CSpam693
1State Anti-Spam Laws693
2The Federal CAN-SPAM Act693
3Spam and Speech695
DIdentity Theft696
1The Identity Theft Assumption and Deterrence Act696
2State Statutory Approaches697
3Perspectives on Identity Theft Legislation698
4Database Companies, Security Breaches, and Identity Theft699
EFinancial Information700
Financial Privacy and the Theory of High-Tech Government Surveillance700
1The Credit System702
2The Use and Disclosure of Financial Information711
FGovernment Access to Financial and Business Records718
1Information Gathering Without Search Warrants718
2Information Gathering with Search Warrants735
GPrivacy Policies: Private vs. Public Enforcement739
1Privacy Policies739
2Private Enforcement: Contract Remedies746
3Public Enforcement: The FTC750
8Privacy and Place765
APrivacy at Home765
Stanley v. Georgia766
Osborne v. Ohio768
Wilson v. Layne772
BPrivacy at School778
1School Searches and Surveillance778
2Drug Testing784
3School Records794
CPrivacy at Work798
1Introduction798
2Workplace Searches801
3Workplace Surveillance809
4Drug Testing813
5The Issue of Consent824
6Testing, Questionnaires, and Polygraphs830
7Employer Monitoring of the Telephone845
8Employer Monitoring of Mail, E-mail, and Internet Use852
9International Privacy Law869
AThe Oecd Privacy Guidelines871
BThe Protection of Privacy in Europe873
1Convergence or Divergence?873
2European Convention of Human Rights (ECHR) Article 8878
3The European Union Data Protection Directive900
CPrivacy Protection in Other Countries922
1Canada922
2Australia928
3Japan928
4Argentina929
DInternational Transfers of Data929
1International Data Transfers in Litigation930
2Adequate Level of Protection Under the EU Directive933
3The Safe Harbor Arrangement936
4Passenger Name Record Data Transfers957
5Outsourcing Information Processing to Other Countries964
Table of Cases969
Table of Authorities979
Index1001
From the B&N Reads Blog

Customer Reviews