-
1
-
-
66749161722
-
-
SeeAnne Broache, Gates Urges Federal Data Privacy Law,CNET News, Mar. 8, 2007, http://www.news.com/2100-1014-3-6165395.html; Grant Gross, Microsoft's Bill Gates Wants New Privacy Law,CIO, Mar. 7, 2007, http://www.cio.com/article/29936/ Microsoft-s-Bill-Gates-Wants-New-Privacy-Law. The Microsoft support for a federal privacy law did not begin, however, in 2007, but 2005. A white paper by Brad Smith, Microsoft's General Counsel, provides the most detailed explanation of the company's position. SeeBrad Smith, Senior Vice President, Gen. Counsel, Microsoft Corp, Protecting Consumers and the Marketplace: The Need for Federal Privacy Legislation Nov. 2005, http://www.microsoft.com/presspass/download/features/2005/ PrivacyLegislationCallWP.doc [hereinafter Microsoft White Paper
-
SeeAnne Broache, Gates Urges Federal Data Privacy Law,CNET News, Mar. 8, 2007, http://www.news.com/2100-1014-3-6165395.html; Grant Gross, Microsoft's Bill Gates Wants New Privacy Law,CIO, Mar. 7, 2007, http://www.cio.com/article/29936/ Microsoft-s-Bill-Gates-Wants-New-Privacy-Law. The Microsoft support for a federal privacy law did not begin, however, in 2007, but 2005. A white paper by Brad Smith, Microsoft's General Counsel, provides the most detailed explanation of the company's position. SeeBrad Smith, Senior Vice President, Gen. Counsel, Microsoft Corp., Protecting Consumers and the Marketplace: The Need for Federal Privacy Legislation (Nov. 2005), http://www.microsoft.com/presspass/download/features/2005/ PrivacyLegislationCallWP.doc [hereinafter Microsoft White Paper].
-
-
-
-
2
-
-
66749113180
-
-
SeeRiva Richmond, Business Group Calls for Privacy Law,WALL ST. J., June 21, 2006, at B2; Erika Morphy, Tech Giants Form Consumer Privacy Rights Forum,TECH NEWS WORLD , June 21, 2006, http://www.technewsworld.com/ story/51272.html.
-
SeeRiva Richmond, Business Group Calls for Privacy Law,WALL ST. J., June 21, 2006, at B2; Erika Morphy, Tech Giants Form Consumer Privacy Rights Forum,TECH NEWS WORLD , June 21, 2006, http://www.technewsworld.com/ story/51272.html.
-
-
-
-
3
-
-
66749102919
-
-
Morphy, supranote 2
-
Morphy, supranote 2.
-
-
-
-
4
-
-
66749101776
-
-
See infratext accompanying notes 34-39.
-
See infratext accompanying notes 34-39.
-
-
-
-
5
-
-
66749093816
-
-
See infratext accompanying notes 79-86 for a discussion of the Fair Credit Reporting Act in the context of its amendment by the Fair and Accurate Credit Transactions Act.
-
See infratext accompanying notes 79-86 for a discussion of the Fair Credit Reporting Act in the context of its amendment by the Fair and Accurate Credit Transactions Act.
-
-
-
-
6
-
-
66749094999
-
-
The Microsoft White Paper indicates the importance of preemption from the perspective of a leading industry participant in this debate. SeeMicrosoft White Paper, supranote 1, at 4-5. On the presence of numerous veto points for federal legislation in the United States, see ABRAHAM L. NEWMAN , PROTECTORS OF PRIVACY 60 (2008).
-
The Microsoft White Paper indicates the importance of preemption from the perspective of a leading industry participant in this debate. SeeMicrosoft White Paper, supranote 1, at 4-5. On the presence of numerous veto points for federal legislation in the United States, see ABRAHAM L. NEWMAN , PROTECTORS OF PRIVACY 60 (2008).
-
-
-
-
7
-
-
66749157645
-
-
See infratext accompanying notes 166-167 for a discussion of defensive preemption.
-
See infratext accompanying notes 166-167 for a discussion of defensive preemption.
-
-
-
-
8
-
-
84956547845
-
-
§§ 1681-1681X Supp. V 2005
-
15 U.S.C. §§ 1681-1681X (Supp. V 2005).
-
15 U.S.C
-
-
-
10
-
-
66749127569
-
-
For a detailed overview of the privacy tort and its development, see DANIEL J. SOLOVE &PAUL M. SCHWARTZ , INFORMATION PRIVACY LAW 77-231 (3d ed. 2009).
-
For a detailed overview of the privacy tort and its development, see DANIEL J. SOLOVE &PAUL M. SCHWARTZ , INFORMATION PRIVACY LAW 77-231 (3d ed. 2009).
-
-
-
-
11
-
-
66749094404
-
-
582 N.W.2d 231 (Minn. 1998).
-
582 N.W.2d 231 (Minn. 1998).
-
-
-
-
12
-
-
84884492539
-
The Social Foundations of Privacy: Community and Self in the Common Law Tort,77
-
Robert C. Post, The Social Foundations of Privacy: Community and Self in the Common Law Tort,77 CAL . L. REV . 957 (1989).
-
(1989)
CAL . L. REV
, vol.957
-
-
Post, R.C.1
-
13
-
-
66749087757
-
-
See id.at 1010.
-
See id.at 1010.
-
-
-
-
14
-
-
66749190256
-
-
Id.at 1009. Daniel Solove also has developed proposals to revitalize the tort right of privacy for the information age. SeeDANIEL J. SOLOVE , THE FUTURE OF REPUTATION 113-24 (2007).
-
Id.at 1009. Daniel Solove also has developed proposals to revitalize the tort right of privacy for the information age. SeeDANIEL J. SOLOVE , THE FUTURE OF REPUTATION 113-24 (2007).
-
-
-
-
15
-
-
66749156190
-
-
Paul M. Schwartz, Beyond Lessig's Code for Internet Privacy: Cyberspace Filters, Privacy-Control, and Fair Information Practices,2000 WIS . L. REV . 743, 779-81 [hereinafter Schwartz, Lessig's Code]
-
Paul M. Schwartz, Beyond Lessig's Code for Internet Privacy: Cyberspace Filters, Privacy-Control, and Fair Information Practices,2000 WIS . L. REV . 743, 779-81 [hereinafter Schwartz, Lessig's Code]
-
-
-
-
16
-
-
0347358112
-
-
seePaul M. Schwartz, Privacy and Democracy in Cyberspace,52 VAND . L. REV . 1609, 1614 (1999) (fair information practices are the building blocks of modern information privacy law).
-
seePaul M. Schwartz, Privacy and Democracy in Cyberspace,52 VAND . L. REV . 1609, 1614 (1999) (fair information practices "are the building blocks of modern information privacy law").
-
-
-
-
17
-
-
66749137837
-
-
The expression of FlPs in different laws, regulations, and proposals varies in details, sometimes crucially. For my own attempts to summarize these standards, see Schwartz, Lessig's Code, supranote 15, at 779-80;
-
The expression of FlPs in different laws, regulations, and proposals varies in details, sometimes crucially. For my own attempts to summarize these standards, see Schwartz, Lessig's Code, supranote 15, at 779-80;
-
-
-
-
18
-
-
66749115134
-
Review Essay, The New Privacy,101
-
and Paul M. Schwartz&William M. Treanor, Review Essay, The New Privacy,101 MICH . L. REV . 2163, 2181 (2003).
-
(2003)
MICH . L. REV
, vol.2163
, pp. 2181
-
-
Schwartz, P.M.1
Treanor, W.M.2
-
19
-
-
66749129892
-
-
For a masterful account of these developments, see Spiros Simitis, Einleitung [Introduction], inNOMOS KOMMENTAR ZUM BUNDESDATENSCHUTZGESETZ [COMMENTARY ON THE FEDERAL PRIVACY LAW ] 61, 62-63 (Spiros Simitis ed., 6th ed. 2006).
-
For a masterful account of these developments, see Spiros Simitis, Einleitung [Introduction], inNOMOS KOMMENTAR ZUM BUNDESDATENSCHUTZGESETZ [COMMENTARY ON THE FEDERAL PRIVACY LAW ] 61, 62-63 (Spiros Simitis ed., 6th ed. 2006).
-
-
-
-
20
-
-
66749176926
-
-
Gesetz zum Schutz vor Mifibrauch personenbezogener Daten bei der Datenverarbeitung (Bundesdatenschutzgesetz) [Federal Data Protection Act], Jan. 27, 1977, BGBl. I at 201, Jan. 14, 2003, BGBl. I at 66, last amended by Gesetz, Aug. 22, 2006, BGBl. I at 1970.
-
Gesetz zum Schutz vor Mifibrauch personenbezogener Daten bei der Datenverarbeitung (Bundesdatenschutzgesetz) [Federal Data Protection Act], Jan. 27, 1977, BGBl. I at 201, Jan. 14, 2003, BGBl. I at 66, last amended by Gesetz, Aug. 22, 2006, BGBl. I at 1970.
-
-
-
-
21
-
-
66749191741
-
-
Council Directive 95/46, 1995 O.J. (L 281) 31 [hereinafter Data Protection Directive]. For background on the Directive, see Paul M. Schwartz, European Data Protection Law and Restrictions on International Data Flows,80 IOWA L. REV . 471, 480-83 (1995).
-
Council Directive 95/46, 1995 O.J. (L 281) 31 [hereinafter Data Protection Directive]. For background on the Directive, see Paul M. Schwartz, European Data Protection Law and Restrictions on International Data Flows,80 IOWA L. REV . 471, 480-83 (1995).
-
-
-
-
22
-
-
66749116867
-
-
Data Protection Directive, supranote 19, recital 69, at 37.
-
Data Protection Directive, supranote 19, recital 69, at 37.
-
-
-
-
23
-
-
66749170292
-
-
Recital 23 of the Directive leaves the choice of regulatory instruments open to the EU member state. It states, Whereas Member States are empowered to ensure the implementation of the protection of individuals both by means of a general law on the protection of individuals as regards the processing of personal data and by sectorial laws such as those relating, for example, to statistical institutes. Id.recital 23, at 33. This language probably is best read as permitting a combination of omnibus and sectoral laws by member states.
-
Recital 23 of the Directive leaves the choice of regulatory instruments open to the EU member state. It states, "Whereas Member States are empowered to ensure the implementation of the protection of individuals both by means of a general law on the protection of individuals as regards the processing of personal data and by sectorial laws such as those relating, for example, to statistical institutes." Id.recital 23, at 33. This language probably is best read as permitting a combination of omnibus and sectoral laws by member states.
-
-
-
-
24
-
-
66749163380
-
-
Ulrich Dammann, inEG-DATENSCHUTZRICHTLINIE : KOMMENTAR [COMMENTARY ON EUROPEAN COMMUNITY DATA PROTECTION DIRECTIVE ] 133 (Ulrich Dammann&Spiros Simitis eds., 1997).
-
Ulrich Dammann, inEG-DATENSCHUTZRICHTLINIE : KOMMENTAR [COMMENTARY ON EUROPEAN COMMUNITY DATA PROTECTION DIRECTIVE ] 133 (Ulrich Dammann&Spiros Simitis eds., 1997).
-
-
-
-
25
-
-
66749126960
-
-
Id
-
Id.
-
-
-
-
26
-
-
66749174863
-
-
Data Protection Directive, supranote 19, art. 32, at 49.
-
Data Protection Directive, supranote 19, art. 32, at 49.
-
-
-
-
27
-
-
66749190803
-
-
SeeCOMM'N OF THE EUROPEAN CMTYS ., FIRST REPORT ON THE IMPLEMENTATION OF THE DATA PROTECTION DIRECTIVE (95/46/EC), at 3 n.1 (2003), available athttp://eur- lex.europa.eu/LexUriServ/LexUriServ.do? uri=CELEX:52003DC0265:EN:NOT.
-
SeeCOMM'N OF THE EUROPEAN CMTYS ., FIRST REPORT ON THE IMPLEMENTATION OF THE DATA PROTECTION DIRECTIVE (95/46/EC), at 3 n.1 (2003), available athttp://eur- lex.europa.eu/LexUriServ/LexUriServ.do? uri=CELEX:52003DC0265:EN:NOT.
-
-
-
-
28
-
-
84868974008
-
-
In so far as other legal provisions of the federal government are applicable to personal data ... such provisions shall take precedence over the provisions of this Act. Gesetz zum Schutz vor Mifibrauch personenbezogener Daten bei der Datenverarbeitung (Bundesdatenschutzgesetz) [Federal Data Protection Act], Jan. 27, 1977, BGBl. I at 201, last amended by Gesetz, Aug. 22, 2006, BGBl. I at 1046, § 1(3).
-
"In so far as other legal provisions of the federal government are applicable to personal data ... such provisions shall take precedence over the provisions of this Act." Gesetz zum Schutz vor Mifibrauch personenbezogener Daten bei der Datenverarbeitung (Bundesdatenschutzgesetz) [Federal Data Protection Act], Jan. 27, 1977, BGBl. I at 201, last amended by Gesetz, Aug. 22, 2006, BGBl. I at 1046, § 1(3).
-
-
-
-
29
-
-
84868983840
-
-
Privacy Act of 1974, 5 U.S.C. § 552a 2000
-
Privacy Act of 1974, 5 U.S.C. § 552a (2000).
-
-
-
-
30
-
-
66749086563
-
-
Regarding the important limitations of the Privacy Act to only federal agencies and its narrow definition of record, See
-
Regarding the important limitations of the Privacy Act to only "federal agencies" and its narrow definition of "record," See PAUL M. SCHWARTZ &JOEL R. REIDENBERG , DATA PRIVACY LAW 92 n.4 (1996);
-
(1996)
, vol.92
, Issue.4
-
-
SCHWARTZ, P.M.1
REIDENBERG, J.R.2
PRIVACY LAW, D.3
-
31
-
-
66749105389
-
-
and U.S. DEP'T OF JUSTICE , PRIVACY ACT OVERVIEW , MAY 2004 EDITION : DEFINITIONS (2004), available athttp://www.usdoj.gov/oip/ 1974definitions.htm.
-
and U.S. DEP'T OF JUSTICE , PRIVACY ACT OVERVIEW , MAY 2004 EDITION : DEFINITIONS (2004), available athttp://www.usdoj.gov/oip/ 1974definitions.htm.
-
-
-
-
32
-
-
84868974009
-
-
S. 3418, 93d Cong. § 201(a) (1974).
-
S. 3418, 93d Cong. § 201(a) (1974).
-
-
-
-
36
-
-
66749096867
-
-
Data Protection Directive, supranote 19, art. 25(1), at 45; seeSchwartz, supranote 19, at 483-88.
-
Data Protection Directive, supranote 19, art. 25(1), at 45; seeSchwartz, supranote 19, at 483-88.
-
-
-
-
37
-
-
84888491658
-
-
§ 2710 2000
-
18 U.S.C. § 2710 (2000).
-
18 U.S.C
-
-
-
39
-
-
66749164956
-
-
Id
-
Id.
-
-
-
-
40
-
-
84868988888
-
-
Id.§ 2710(b)(2)(E).
-
Id.§ 2710(b)(2)(E).
-
-
-
-
42
-
-
66749180847
-
-
Id
-
Id.
-
-
-
-
43
-
-
66749126407
-
-
STAFF OF S. COMM. ON GOV'T OPERATIONS&H. COMM. ON GOV'T OPERATIONS, 94TH CONG, LEGISLATIVE HISTORY OF THE PRIVACY ACT OF 1974, S. 3418 (PUBLIC LAW 93-579, SOURCE BOOK ON PRIVACY 172 Comm. Print 1976, hereinafter PRIVACY SOURCEBOOK, The Senate Committee on Government Operations in its report on the bill observed that it was persuaded to delay a decision on total application by considerations of time and investigative resources for developing a full hearing record and for drafting the needed complex legislative solution for information abuses in the private sector, beyond those presently covered by the Fair Credit Reporting Act and its pending amendments. Id.As Priscilla Regan in her account of this period writes, A major argument for removing the private sector from the purvie
-
STAFF OF S. COMM. ON GOV'T OPERATIONS&H. COMM. ON GOV'T OPERATIONS, 94TH CONG., LEGISLATIVE HISTORY OF THE PRIVACY ACT OF 1974, S. 3418 (PUBLIC LAW 93-579): SOURCE BOOK ON PRIVACY 172 (Comm. Print 1976) [hereinafter PRIVACY SOURCEBOOK]. The Senate Committee on Government Operations in its report on the bill observed that it was persuaded to "delay a decision on total application by considerations of time and investigative resources for developing a full hearing record and for drafting the needed complex legislative solution for information abuses in the private sector, beyond those presently covered by the Fair Credit Reporting Act and its pending amendments." Id.As Priscilla Regan in her account of this period writes, "A major argument for removing the private sector from the purview of the 1974 legislation was that there was little concrete evidence of abuses in private sector personal information practices." PRISCILLA REGAN, LEGISLATING PRIVACY 78 (1995).
-
-
-
-
44
-
-
66749137254
-
-
REGAN, supranote 40, at 78
-
REGAN, supranote 40, at 78.
-
-
-
-
45
-
-
16844384808
-
Origin and Uses ofPrimum Non Nocere-Above All, Do No Harm!,45
-
For a discussion of the origins of this phrase, see
-
For a discussion of the origins of this phrase, see Cedric M. Smith, Origin and Uses ofPrimum Non Nocere-Above All, Do No Harm!,45 J. CLINICAL PHARMACOLOGY 371 (2005).
-
(2005)
J. CLINICAL PHARMACOLOGY
, vol.371
-
-
Smith, C.M.1
-
46
-
-
84924493795
-
-
SeeCass R. SUNSTEIN, LAWS OF FEAR: BEYOND THE PRECAUTIONARY PRINCIPLE 23-25 (2005).
-
SeeCass R. SUNSTEIN, LAWS OF FEAR: BEYOND THE PRECAUTIONARY PRINCIPLE 23-25 (2005).
-
-
-
-
47
-
-
66749140643
-
-
Simitis, supranote 17, at 68
-
Simitis, supranote 17, at 68.
-
-
-
-
48
-
-
66749121567
-
-
Id
-
Id.
-
-
-
-
49
-
-
66649139087
-
-
NEWMAN, supranote 6, at 60-69
-
NEWMAN, supranote 6, at 60-69.
-
-
-
-
51
-
-
66749186916
-
-
Id.at 63-64
-
Id.at 63-64.
-
-
-
-
52
-
-
66749164377
-
-
14. tATIGKEITSBERICHT DES BUNDESBEAUFTRAGTEN FUR DEN DATENSCHUTZ GEMAFI ABS. 1 dES BUNDESDATENSCHUTZGESETZES [REPORT OF THE COMMISSIONER FOR DATA PROTECTION IN ACCORDANCE WITH ABS. 1 OF THE FEDERAL DATA PROTECTION ACt] 12 (1993).
-
14. tATIGKEITSBERICHT DES BUNDESBEAUFTRAGTEN FUR DEN DATENSCHUTZ GEMAFI ABS. 1 dES BUNDESDATENSCHUTZGESETZES [REPORT OF THE COMMISSIONER FOR DATA PROTECTION IN ACCORDANCE WITH ABS. 1 OF THE FEDERAL DATA PROTECTION ACt] 12 (1993).
-
-
-
-
53
-
-
66749150151
-
-
For a discussion of the influence of the European pressure on Margaret Thatcher's Tory government and how it led to the U.K. data protection law, see
-
For a discussion of the influence of the European pressure on Margaret Thatcher's Tory government and how it led to the U.K. data protection law, see COLIN J. BENNETT, REGULATING PRIVACY 91 (1992).
-
(1992)
, vol.91
-
-
BENNETT, C.J.1
PRIVACY, R.2
-
54
-
-
66749176350
-
-
NEWMAN, supranote 6, at 75. For an early discussion of the important role of the data protection commissioners in the EU, see Schwartz, supranote 19, at 492-95.
-
NEWMAN, supranote 6, at 75. For an early discussion of the important role of the data protection commissioners in the EU, see Schwartz, supranote 19, at 492-95.
-
-
-
-
55
-
-
66749150723
-
-
NEWMAN, supranote 6, at 3, 97-98
-
NEWMAN, supranote 6, at 3, 97-98.
-
-
-
-
56
-
-
66749088936
-
-
James Whitman provides the richest argument for the influences of cultural differences in the differing approaches to information privacy in Europe and the United States. James Q Whitman, The Two Western Cultures of Privacy: Dignity Versus Liberty,113 YALE L.J. 1151, 1163 (2004). For an interpretation of differences in EU and U.S. information privacy law that stresses the influence of historically contingent events, see NEWMAN, supranote 6, at 52-54. For a discussion that stresses both historically contingent factors and cultural ones in shaping European privacy law, see Francesca Bignami, European Versus American Liberty: A Comparative Privacy Analysis of Antiterrorism Data Mining,48 B.C. L. REV. 609, 684-88 (2007).
-
James Whitman provides the richest argument for the influences of cultural differences in the differing approaches to information privacy in Europe and the United States. James Q Whitman, The Two Western Cultures of Privacy: Dignity Versus Liberty,113 YALE L.J. 1151, 1163 (2004). For an interpretation of differences in EU and U.S. information privacy law that stresses the influence of historically contingent events, see NEWMAN, supranote 6, at 52-54. For a discussion that stresses both historically contingent factors and cultural ones in shaping European privacy law, see Francesca Bignami, European Versus American Liberty: A Comparative Privacy Analysis of Antiterrorism Data Mining,48 B.C. L. REV. 609, 684-88 (2007).
-
-
-
-
57
-
-
84868965780
-
-
Right to Financial Privacy Act of 1978, 12 U.S.C. §§ 3401-3422 2000
-
Right to Financial Privacy Act of 1978, 12 U.S.C. §§ 3401-3422 (2000);
-
-
-
-
58
-
-
84868983803
-
-
Fair Credit Reporting Act of 1970, 15 U.S.C. §§ 1681a-1681x; Wiretap Act, 18 U.S.C. §§ 2510-2522;
-
Fair Credit Reporting Act of 1970, 15 U.S.C. §§ 1681a-1681x; Wiretap Act, 18 U.S.C. §§ 2510-2522;
-
-
-
-
59
-
-
84868965773
-
-
Family Educational Rights and Privacy Act of 1974, 20 U.S.C. § 1232g
-
Family Educational Rights and Privacy Act of 1974, 20 U.S.C. § 1232g.
-
-
-
-
60
-
-
66749102915
-
-
PRIVACY PROTECTION STUDY COMM'N, PERSONAL PRIVACY IN AN INFORMATION SOCIETY 491 (1977).
-
PRIVACY PROTECTION STUDY COMM'N, PERSONAL PRIVACY IN AN INFORMATION SOCIETY 491 (1977).
-
-
-
-
61
-
-
84868965769
-
-
Cal. Civ. Code §§ 1798.29, 1798.82 (West Supp. 2009);
-
Cal. Civ. Code §§ 1798.29, 1798.82 (West Supp. 2009);
-
-
-
-
62
-
-
33947536241
-
Notification of Data Security Breaches,105
-
see also
-
see alsoPaul M. Schwartz&Edward J. Janger, Notification of Data Security Breaches,105 MICH. L. REV. 913, 915 (2007).
-
(2007)
MICH. L. REV
, vol.913
, pp. 915
-
-
Schwartz, P.M.1
Janger, E.J.2
-
63
-
-
66749155621
-
-
Nat'l Conference of State Legislatures, State Security Breach Notification Laws, http://www.ncsl.org/programs/lis/cip/priv/breachlaws.htm (last visited Feb. 9, 2009).
-
Nat'l Conference of State Legislatures, State Security Breach Notification Laws, http://www.ncsl.org/programs/lis/cip/priv/breachlaws.htm (last visited Feb. 9, 2009).
-
-
-
-
64
-
-
66749110905
-
-
For the Connecticut bill, see H.B. 5765, Gen. Assem., Feb. Sess. (Conn. 2008). In New York, there have been bills introduced in the Senate and House. SeeAssem. B. 9275, 2007 Leg., 230th Sess. (N.Y. 2007); S. 6441, 2007 Leg., 230th Sess. (N.Y. 2007).
-
For the Connecticut bill, see H.B. 5765, Gen. Assem., Feb. Sess. (Conn. 2008). In New York, there have been bills introduced in the Senate and House. SeeAssem. B. 9275, 2007 Leg., 230th Sess. (N.Y. 2007); S. 6441, 2007 Leg., 230th Sess. (N.Y. 2007).
-
-
-
-
65
-
-
66749146341
-
-
National Conference of State Legislatures, Financial Privacy, http://www.ncsl.org/ programs/lis/privacy/financeprivacy.htm (last visited Feb. 9, 2009).
-
National Conference of State Legislatures, Financial Privacy, http://www.ncsl.org/ programs/lis/privacy/financeprivacy.htm (last visited Feb. 9, 2009).
-
-
-
-
66
-
-
84868965770
-
-
Consumer Union, State Security Freeze Laws, http://www.consumersunion. org/ campaigns/learn-more/003484indiv.html (last visited Dec. 1, 2008). For an example of a state law requirement requiring the disclosure of transaction information to a victim of ID theft, see CAL. PENAL CODE § 530.8 (West Supp. 2009).
-
Consumer Union, State Security Freeze Laws, http://www.consumersunion. org/ campaigns/learn-more/003484indiv.html (last visited Dec. 1, 2008). For an example of a state law requirement requiring the disclosure of transaction information to a victim of ID theft, see CAL. PENAL CODE § 530.8 (West Supp. 2009).
-
-
-
-
67
-
-
84868973965
-
-
The applicable states are Colorado, Georgia, Maine, Maryland, Massachusetts, New Jersey, and Vermont. COLO. REV. STAT. §§ 12-14.3-104 to -105 (2008);
-
The applicable states are Colorado, Georgia, Maine, Maryland, Massachusetts, New Jersey, and Vermont. COLO. REV. STAT. §§ 12-14.3-104 to -105 (2008);
-
-
-
-
68
-
-
84868965772
-
-
Ga. Code. Ann. § 10-1- 393(29)(C) (2000);
-
Ga. Code. Ann. § 10-1- 393(29)(C) (2000);
-
-
-
-
69
-
-
84868988854
-
-
Me. Rev. Stat. Ann. tit. 10, §§ 1315-1316 (1997&Supp. 2008); Md. Code Ann., Com. Law §§ 14-1206 to -1209 (LexisNexis 2005);
-
Me. Rev. Stat. Ann. tit. 10, §§ 1315-1316 (1997&Supp. 2008); Md. Code Ann., Com. Law §§ 14-1206 to -1209 (LexisNexis 2005);
-
-
-
-
70
-
-
84868965765
-
-
Mass. Ann. Laws ch. 93, §§ 58-59 (LexisNexis 2006&Supp. 2008);
-
Mass. Ann. Laws ch. 93, §§ 58-59 (LexisNexis 2006&Supp. 2008);
-
-
-
-
71
-
-
84868965766
-
-
N.J. STAT. ANN. §§ 56:11-34 to -37 (West 2001&Supp. 2008);
-
N.J. STAT. ANN. §§ 56:11-34 to -37 (West 2001&Supp. 2008);
-
-
-
-
72
-
-
84868983787
-
-
Vt. Stat. Ann. tit. 9, § 2480(b, c, 2006, Federal law permits these states to continue to determine how many free credit reports each year that their residents can receive. 15 U.S.C. § 1681t(b)4, Supp. v 2005, The result of these federal and state laws is that residents of these states each year can receive one free credit report under federal law and one free credit report under state law, or, in the case of the Georgia statute, two free reports
-
Vt. Stat. Ann. tit. 9, § 2480(b)-(c) (2006). Federal law permits these states to continue to determine how many free credit reports each year that their residents can receive. 15 U.S.C. § 1681t(b)(4) (Supp. v 2005). The result of these federal and state laws is that residents of these states each year can receive one free credit report under federal law and one free credit report under state law, or, in the case of the Georgia statute, two free reports.
-
-
-
-
73
-
-
84898135152
-
-
MALCOLM M. FEELEy& EDWARD RUBIN, FEDERALISM: POLITICAL IDENTITY AND TRAGIC COMPROMISE 26 (2008).
-
MALCOLM M. FEELEy& EDWARD RUBIN, FEDERALISM: POLITICAL IDENTITY AND TRAGIC COMPROMISE 26 (2008).
-
-
-
-
74
-
-
66749173180
-
-
New State ice Co. v. Liebmann, 285 U.S. 262, 311 (1932) (Brandeis, J., dissenting) (it is one of the happy incidents of the federal system that a single courageous state may, if its citizens choose, serve as a laboratory; and try novel social and economic experiments without risk to the rest of the country.).
-
New State ice Co. v. Liebmann, 285 U.S. 262, 311 (1932) (Brandeis, J., dissenting) ("it is one of the happy incidents of the federal system that a single courageous state may, if its citizens choose, serve as a laboratory; and try novel social and economic experiments without risk to the rest of the country.").
-
-
-
-
75
-
-
66749156778
-
-
Schwartz&Janger, supranote 56, at 960-70.
-
Schwartz&Janger, supranote 56, at 960-70.
-
-
-
-
76
-
-
66849143359
-
Federalization in Information Privacy Law,118
-
Patricia L. Bellia, Federalization in Information Privacy Law,118 YALE L.J. 868 (2009).
-
(2009)
YALE L.J
, vol.868
-
-
Bellia, P.L.1
-
77
-
-
66749099736
-
-
Id.at 882
-
Id.at 882.
-
-
-
-
78
-
-
66749176347
-
-
For different critical perspectives, see CHRISTOPHER SLOBOGIN, PRIVACY AT RISK 181 (2007); Susan Freiwald, Uncertain Privacy: Communication Attributes After the Digital Telephony Act,69 S. CAL. L. REV. 949 (1996);
-
For different critical perspectives, see CHRISTOPHER SLOBOGIN, PRIVACY AT RISK 181 (2007); Susan Freiwald, Uncertain Privacy: Communication Attributes After the Digital Telephony Act,69 S. CAL. L. REV. 949 (1996);
-
-
-
-
79
-
-
42349110194
-
Reviving Telecommunications Surveillance Law,75
-
Paul M. Schwartz, Reviving Telecommunications Surveillance Law,75 U. CHI. L. REV. 287 (2008);
-
(2008)
U. CHI. L. REV
, vol.287
-
-
Schwartz, P.M.1
-
80
-
-
10844224409
-
-
and Daniel J. Solove, Reconstructing Electronic Surveillance Law,72 GEO. WASH. L. REV. 1264, 1292-98 (2004). Although not a critic in general of federal surveillance law, Orin Kerr has expressed strong criticisms of one branch of this law, the Stored Communications Act. Orin S. Kerr, A User's Guide to the Stored Communications Act, and a Legislator's Guide to Amending It,72 GEO. WASH. L. REV. 1208, 1233-43 (2004).
-
and Daniel J. Solove, Reconstructing Electronic Surveillance Law,72 GEO. WASH. L. REV. 1264, 1292-98 (2004). Although not a critic in general of federal surveillance law, Orin Kerr has expressed strong criticisms of one branch of this law, the Stored Communications Act. Orin S. Kerr, A User's Guide to the Stored Communications Act, and a Legislator's Guide to Amending It,72 GEO. WASH. L. REV. 1208, 1233-43 (2004).
-
-
-
-
81
-
-
42349097864
-
-
As a single example, classic statutory assumptions in the Foreign intelligence Surveillance Act regarding the location of the subject of surveillance have been undercut by modern telecommunications surveillance. SeeOrin S. Kerr, Updating the Foreign Intelligence Surveillance Act,75 U. CHI. L. REV. 225 (2008).
-
As a single example, classic statutory assumptions in the Foreign intelligence Surveillance Act regarding the location of the subject of surveillance have been undercut by modern telecommunications surveillance. SeeOrin S. Kerr, Updating the Foreign Intelligence Surveillance Act,75 U. CHI. L. REV. 225 (2008).
-
-
-
-
82
-
-
66749187980
-
-
Schwartz, supranote 67, at 287
-
Schwartz, supranote 67, at 287.
-
-
-
-
83
-
-
84888491658
-
-
§ 2710 2000
-
18 U.S.C. § 2710 (2000).
-
18 U.S.C
-
-
-
85
-
-
84868965756
-
-
SeeCal. Civ. Code § 1799.3 (Deering 2005);
-
SeeCal. Civ. Code § 1799.3 (Deering 2005);
-
-
-
-
86
-
-
84868991833
-
-
Stat. § 53-450
-
Conn. Gen. Stat. § 53-450 (2007);
-
(2007)
Gen
-
-
Conn1
-
87
-
-
84868965045
-
-
Del. Code Ann. tit. 11, § 925 (2008);
-
Del. Code Ann. tit. 11, § 925 (2008);
-
-
-
-
88
-
-
84868965046
-
-
IOWA CODE § 727.11 (2003);
-
IOWA CODE § 727.11 (2003);
-
-
-
-
89
-
-
84868992214
-
Ann. §
-
La. Rev. Stat. Ann. § 37:1748 (2007);
-
(2007)
, vol.37
, pp. 1748
-
-
La1
Rev2
Stat3
-
90
-
-
84868982066
-
-
Md. Code Ann., Crim. Law § 3-907 (LexisNexis 2002);
-
Md. Code Ann., Crim. Law § 3-907 (LexisNexis 2002);
-
-
-
-
91
-
-
84868986337
-
-
Mass. Gen. Laws ch. 93, § 106 (2006);
-
Mass. Gen. Laws ch. 93, § 106 (2006);
-
-
-
-
92
-
-
84868965037
-
-
Mich. Comp. Laws Ann. §§ 445.1711-.1715 (West 2002);
-
Mich. Comp. Laws Ann. §§ 445.1711-.1715 (West 2002);
-
-
-
-
93
-
-
84868986330
-
-
Minn. Stat. Ann. § 325I.02-.03 (West 2004);
-
Minn. Stat. Ann. § 325I.02-.03 (West 2004);
-
-
-
-
94
-
-
84868977612
-
-
N.H. REV. STAT. ANN. § 351-Aa (2008); N.Y. GEN. BUS. LAW §§ 670-675 (McKinney 1996);
-
N.H. REV. STAT. ANN. § 351-Aa (2008); N.Y. GEN. BUS. LAW §§ 670-675 (McKinney 1996);
-
-
-
-
95
-
-
84868982060
-
-
R.I. GEN. LAWS § 11-18-32 (2002);
-
R.I. GEN. LAWS § 11-18-32 (2002);
-
-
-
-
96
-
-
84868982061
-
-
Tenn. Code Ann. §§ 47-18-2201 to -2205 (2002).
-
Tenn. Code Ann. §§ 47-18-2201 to -2205 (2002).
-
-
-
-
97
-
-
84888491658
-
-
§ 25112
-
18 U.S.C. § 2511(2).
-
18 U.S.C
-
-
-
98
-
-
66749107663
-
-
SeePeople v. Conklin, 522 P.2d 1049, 1057 (Cal. 1974).
-
SeePeople v. Conklin, 522 P.2d 1049, 1057 (Cal. 1974).
-
-
-
-
99
-
-
66749145163
-
-
S. REP. No. 1097, at 98 1968, reprinted in1968 U.S.C.C.A.N. 2112, 2187
-
S. REP. No. 1097, at 98 (1968), reprinted in1968 U.S.C.C.A.N. 2112, 2187.
-
-
-
-
100
-
-
66749174860
-
-
Reporters Committee for Freedom of the Press, Can We Tape?, http://www.rcfp.org/ taping/index.html (last visited Dec. 1, 2008).
-
Reporters Committee for Freedom of the Press, Can We Tape?, http://www.rcfp.org/ taping/index.html (last visited Dec. 1, 2008).
-
-
-
-
101
-
-
84868982054
-
-
15 U.S.C. § 6807
-
15 U.S.C. § 6807.
-
-
-
-
102
-
-
66749161721
-
-
For an analysis, see Edward J. Janger&Paul M. Schwartz, The Gramm-Leach-Bliley Act, Information Privacy, and the Limits of Default Rules,86 MINN. L. REV. 1219, 1241-46, 1257-59 (2002).
-
For an analysis, see Edward J. Janger&Paul M. Schwartz, The Gramm-Leach-Bliley Act, Information Privacy, and the Limits of Default Rules,86 MINN. L. REV. 1219, 1241-46, 1257-59 (2002).
-
-
-
-
103
-
-
84956547845
-
-
§§ 1681-1681x Supp. V 2005
-
15 U.S.C. §§ 1681-1681x (Supp. V 2005).
-
15 U.S.C
-
-
-
105
-
-
84868965025
-
-
Id.§ 1681c(g). For these cases, see Grabein v. 1-800-Flowers.com, Inc., No. 07-22235-CIV, 2008 U.S. Dist. LEXIS 11757 (S.D. Fla. Jan. 29, 2008); Vasquez-Torres v. Stubhub, Inc., No. CV 07-1328, 2007 U.S. Dist. LEXIS 63719 (C.D. Cal. July 2, 2007).
-
Id.§ 1681c(g). For these cases, see Grabein v. 1-800-Flowers.com, Inc., No. 07-22235-CIV, 2008 U.S. Dist. LEXIS 11757 (S.D. Fla. Jan. 29, 2008); Vasquez-Torres v. Stubhub, Inc., No. CV 07-1328, 2007 U.S. Dist. LEXIS 63719 (C.D. Cal. July 2, 2007).
-
-
-
-
106
-
-
84956547845
-
-
§ 1681c(g)1
-
15 U.S.C. § 1681c(g)(1).
-
15 U.S.C
-
-
-
108
-
-
84868986321
-
§ 1681m(e). A Red Flag is a pattern, or activity that might indicate identity theft, and the law and applicable guidelines require covered companies that have consumer information to implement identity theft programs to respond to Red Flags
-
Id.§ 1681m(e). A Red Flag is a pattern, or activity that might indicate identity theft, and the law and applicable guidelines require covered companies that have consumer information to implement identity theft programs to respond to Red Flags. Id.
-
Id
-
-
-
110
-
-
84868977590
-
-
For example, FACTA reversed one aspect of California's Senate Bill 1 (S.B. 1), which required customers to be permitted to opt-out, or indicate their refusal to information sharing before an organization could share such personal information with their affiliates. Id.§ 1681a(d)(1). For case law finding that FACTA's preemption voids some but not all of S.B. 1's affiliate sharing provisions, see American Bankers Ass'n v. Lockyer,541 F.3d 1214 (9th Cir. 2008).
-
For example, FACTA reversed one aspect of California's Senate Bill 1 (S.B. 1), which required customers to be permitted to "opt-out," or indicate their refusal to information sharing before an organization could share such personal information with their affiliates. Id.§ 1681a(d)(1). For case law finding that FACTA's preemption voids some but not all of S.B. 1's affiliate sharing provisions, see American Bankers Ass'n v. Lockyer,541 F.3d 1214 (9th Cir. 2008).
-
-
-
-
111
-
-
84956547845
-
-
§§ 1681c-1,1681t(b)5, Supp. V 2005
-
15 U.S.C. §§ 1681c-1,1681t(b)(5) (Supp. V 2005).
-
15 U.S.C
-
-
-
112
-
-
66749102918
-
-
Microsoft White Paper, supranote 1, at 4
-
Microsoft White Paper, supranote 1, at 4.
-
-
-
-
113
-
-
66749098598
-
-
CompareWatters v. Wachovia Bank, N.A., 127 S. Ct. 1559 (2007) (noting that under the National Bank Act, a national bank's mortgage business, including its operating subsidiaries in the states, is subject exclusively to regulation by the Federal Office of the Comptroller of the Currency), with id.at 1573 (Stevens, J., dissenting) (noting an absence of relevant statutory authority permitting the laws of a sovereign State to yield to federal power in the regulation of the business activities of mortgage brokers and lenders).
-
CompareWatters v. Wachovia Bank, N.A., 127 S. Ct. 1559 (2007) (noting that under the National Bank Act, a national bank's mortgage business, including its operating subsidiaries in the states, is subject exclusively to regulation by the Federal Office of the Comptroller of the Currency), with id.at 1573 (Stevens, J., dissenting) (noting an "absence of relevant statutory authority" permitting "the laws of a sovereign State" to "yield to federal power" in the regulation of the business activities of mortgage brokers and lenders).
-
-
-
-
114
-
-
66749125573
-
-
SeeReno v. Condon, 528 U.S. 141 (2000). in Reno,the Supreme Court held in a unanimous decision that Congress had power to regulate the conditions under which states and private parties could use, share, and sell drivers' motor vehicle registration information. Id.The Supreme Court has considerable leeway to decide that personal information itself is a subject of interstate commerce, and to find that even intrastate information markets can have an impact on interstate commerce. SeeGonzales v. Raich, 545 U.S. 1, 26 (2005).
-
SeeReno v. Condon, 528 U.S. 141 (2000). in Reno,the Supreme Court held in a unanimous decision that Congress had power to regulate the conditions under which states and private parties could use, share, and sell drivers' motor vehicle registration information. Id.The Supreme Court has considerable leeway to decide that personal information itself is a subject of interstate commerce, and to find that even intrastate information markets can have an impact on interstate commerce. SeeGonzales v. Raich, 545 U.S. 1, 26 (2005).
-
-
-
-
115
-
-
66749152846
-
-
ITHIEL DE SOLA POOL, TECHNOLOGIES OF FREEDOM 27 (1983).
-
ITHIEL DE SOLA POOL, TECHNOLOGIES OF FREEDOM 27 (1983).
-
-
-
-
116
-
-
84888491658
-
-
§ 2710(a)4, 2000
-
18 U.S.C. § 2710(a)(4) (2000).
-
18 U.S.C
-
-
-
117
-
-
84868977592
-
-
15 U.S.C. §§ 6501-6506. The two enforcement actions in question were settled in 2006 and 2008 respectively. United States v. Xanga.com, Inc., No. 06 Civ. 6853 (S.D.N.Y. filed Sept. 12, 2006), available athttp://www.ftc.gov/os/caselist/0623073/xangaconsentdecree -image.pdf; United States v. Industrious Kid, Inc., No. 08-0639 (N.D. Cal. filed Jan. 30, 2008), available athttp://www.ftc.gov/os/caselist/0723082/080730cons.pdf.
-
15 U.S.C. §§ 6501-6506. The two enforcement actions in question were settled in 2006 and 2008 respectively. United States v. Xanga.com, Inc., No. 06 Civ. 6853 (S.D.N.Y. filed Sept. 12, 2006), available athttp://www.ftc.gov/os/caselist/0623073/xangaconsentdecree -image.pdf; United States v. Industrious Kid, Inc., No. 08-0639 (N.D. Cal. filed Jan. 30, 2008), available athttp://www.ftc.gov/os/caselist/0723082/080730cons.pdf.
-
-
-
-
118
-
-
84956547845
-
-
§ 6502(b)(1)A
-
15 U.S.C. § 6502(b)(1)(A).
-
15 U.S.C
-
-
-
119
-
-
66749174861
-
-
See generallySOLOVE& SCHWARTZ, supranote 10, at 803 (describing FTC enforcement actions pursuant to COPPA).
-
See generallySOLOVE& SCHWARTZ, supranote 10, at 803 (describing FTC enforcement actions pursuant to COPPA).
-
-
-
-
120
-
-
66749164953
-
-
There has been a dramatic increase in the marketing of food products, frequently unhealthy ones, to children on just such digital platforms. JEFF CHESTER& KATHRYN MONTGOMERY, INTERACTIVE FOOD& BEVERAGE MARKETING: TARGETING CHILDREN AND YOUTH IN THE DIGITAL AGE 13-18 (2007). At the same time, there also has been an increase in the ability of advertisers to track consumers on the internet and elsewhere and collect personal information about them. JEFF CHESTER, DIGITAL DESTINY 128-38 (2007).
-
There has been a dramatic increase in the marketing of food products, frequently unhealthy ones, to children on just such digital platforms. JEFF CHESTER& KATHRYN MONTGOMERY, INTERACTIVE FOOD& BEVERAGE MARKETING: TARGETING CHILDREN AND YOUTH IN THE DIGITAL AGE 13-18 (2007). At the same time, there also has been an increase in the ability of advertisers to track consumers on the internet and elsewhere and collect personal information about them. JEFF CHESTER, DIGITAL DESTINY 128-38 (2007).
-
-
-
-
121
-
-
84868982039
-
-
CPNI consists of personal customer information relating to the quantity, technical configuration, type, destination, location, and amount of use of a telecommunications service subscribed to by any customer of a telecommunications carrier. 47 U.S.C. § 222(h)(1)(A, As the D.C. Circuit explains, CPNI encompasses customers' particular calling plans and special features, the pricing and terms of their contracts for those services, and details about who they call and when. Nat'l Cable&Telecomms. Ass'n v. FCC, No. 070312, 2009 WL 348811, at *1 D.C. Cir. Feb. 13, 2009, The D.C. Circuit has upheld the FCC's requirement that carriers obtain opt-in consent from a customer before sharing personal information with a carrier's joint venture partner or independent contractor in order to market communication-related services to that customer. Id.at *7
-
CPNI consists of personal customer information relating to the "quantity, technical configuration, type, destination, location, and amount of use of a telecommunications service subscribed to by any customer of a telecommunications carrier." 47 U.S.C. § 222(h)(1)(A). As the D.C. Circuit explains, CPNI "encompasses customers' particular calling plans and special features, the pricing and terms of their contracts for those services, and details about who they call and when." Nat'l Cable&Telecomms. Ass'n v. FCC, No. 070312, 2009 WL 348811, at *1 (D.C. Cir. Feb. 13, 2009). The D.C. Circuit has upheld the FCC's requirement that carriers obtain opt-in consent from a customer before sharing personal information with a carrier's joint venture partner or independent contractor in order to market communication-related services to that customer. Id.at *7.
-
-
-
-
122
-
-
66749180163
-
-
Microsoft White Paper, supranote 1, at 5
-
Microsoft White Paper, supranote 1, at 5.
-
-
-
-
123
-
-
66749122720
-
-
Data Protection Directive, supranote 19, art. 25(1), at 46.
-
Data Protection Directive, supranote 19, art. 25(1), at 46.
-
-
-
-
124
-
-
66749111502
-
-
See supratext accompanying note 29.
-
See supratext accompanying note 29.
-
-
-
-
125
-
-
66749162298
-
-
WORKING PARTY ON THE PROTECTION OF INDIVIDUALS WITH REGARD TO THE PROCESSING OF PERSONAL DATA, OPINION 1/99 at 2 (1999), http://ec.europa.eu/justice-home/fsj/privacy/docs/wpdocs/1999/wp15en.pdf [hereinafter WORKING PARTY].
-
WORKING PARTY ON THE PROTECTION OF INDIVIDUALS WITH REGARD TO THE PROCESSING OF PERSONAL DATA, OPINION 1/99 at 2 (1999), http://ec.europa.eu/justice-home/fsj/privacy/docs/wpdocs/1999/wp15en.pdf [hereinafter WORKING PARTY].
-
-
-
-
126
-
-
66749133697
-
-
Data Protection Directive, supranote 19, art. 30, at 48.
-
Data Protection Directive, supranote 19, art. 30, at 48.
-
-
-
-
127
-
-
66749134317
-
-
WORKING PARTY, supranote 101, at 2
-
WORKING PARTY, supranote 101, at 2.
-
-
-
-
128
-
-
66749167314
-
-
SOLOVE& SCHWARTZ, supranote 10, at 1079-80
-
SOLOVE& SCHWARTZ, supranote 10, at 1079-80.
-
-
-
-
129
-
-
66749145755
-
-
As a specific example of this phenomenon, the European Commission in 2003 formally found Argentina to have adequate data protection. Its decision was influenced by Argentina's omnibus law. SeePress Release, European Union, Data Protection: Commission Recognises That Argentina Provides Adequate Protection for Personal Data (July 2, 2003), http://europa.eu/rapid/ pressReleasesAction.do?reference=IP/03/932.
-
As a specific example of this phenomenon, the European Commission in 2003 formally found Argentina to have adequate data protection. Its decision was influenced by Argentina's omnibus law. SeePress Release, European Union, Data Protection: Commission Recognises That Argentina Provides Adequate Protection for Personal Data (July 2, 2003), http://europa.eu/rapid/ pressReleasesAction.do?reference=IP/03/932.
-
-
-
-
130
-
-
66749134919
-
-
Data Protection Directive, supranote 19, art. 28, at 47.
-
Data Protection Directive, supranote 19, art. 28, at 47.
-
-
-
-
131
-
-
66749121565
-
-
The EU Data Protection Supervisor was created in 2000. Regulation 45/2001, art. 41, 2001 O.J. (L 8/1) 1. For the home page of the European Data Protection Supervisor, see European Data Protection Supervisor, http://www.edps.europa.eu/EDPSWEB/edps/site/ mySite/pid/15 (last visited Feb. 9, 2009).
-
The EU Data Protection Supervisor was created in 2000. Regulation 45/2001, art. 41, 2001 O.J. (L 8/1) 1. For the home page of the European Data Protection Supervisor, see European Data Protection Supervisor, http://www.edps.europa.eu/EDPSWEB/edps/site/ mySite/pid/15 (last visited Feb. 9, 2009).
-
-
-
-
132
-
-
66749088935
-
-
For a listing of these agencies, see European Commission, National Data Protection Commissioners, http://ec.europa.eu/justice-home/fsj/privacy/ nationalcomm/index-en.htm (last visited Feb. 9, 2009).
-
For a listing of these agencies, see European Commission, National Data Protection Commissioners, http://ec.europa.eu/justice-home/fsj/privacy/ nationalcomm/index-en.htm (last visited Feb. 9, 2009).
-
-
-
-
133
-
-
66749113178
-
-
NEWMAN, supranote 6, at 155; seeSchwartz, supranote 19, at 494 (arguing that the lack of an information privacy agency in the United States handicaps its participation in important international debates).
-
NEWMAN, supranote 6, at 155; seeSchwartz, supranote 19, at 494 (arguing that the lack of an information privacy agency in the United States "handicaps its participation" in important international debates).
-
-
-
-
134
-
-
0042658166
-
A Better Way To Approach Privacy Policy in the United States: Establish a Non-Regulatory Privacy Protection Board,54
-
Robert Gellman, A Better Way To Approach Privacy Policy in the United States: Establish a Non-Regulatory Privacy Protection Board,54 HASTINGS L.J. 1183, 1187 (2003).
-
(2003)
HASTINGS L.J
, vol.1183
, pp. 1187
-
-
Gellman, R.1
-
135
-
-
66749171399
-
-
See supratext accompanying note 95.
-
See supratext accompanying note 95.
-
-
-
-
136
-
-
0036811367
-
The Ossification of American Labor Law,102
-
offering an especially perceptive account of the way that labor law preemption doctrine has come untethered from its statutory moorings
-
Cynthia L. Estlund, The Ossification of American Labor Law,102 COLUM. L. REV. 1527, 1574 (2002) (offering an especially perceptive account of the way that labor law preemption doctrine has come "untethered from its statutory moorings").
-
(2002)
COLUM. L. REV
, vol.1527
, pp. 1574
-
-
Estlund, C.L.1
-
137
-
-
66749100922
-
-
See generallyNewman, supranote 6, at 60 (discussing several institutional veto points in the federal legislative system, which makes it easy to block legislation).
-
See generallyNewman, supranote 6, at 60 (discussing "several institutional veto points" in the federal legislative system, which makes it easy to block legislation).
-
-
-
-
138
-
-
66749146903
-
-
Privacy in the Commercial World II: Hearing Before the Subcomm. on Commerce, Trade, and Consumer Protection of the H. Comm. on Energy and Commerce,109th Cong. 12-13 (2006) (statement of Meg Whitman, President and CEO, eBay Inc.) [hereinafter Whitman Statement at Commercial Privacy Hearing].
-
Privacy in the Commercial World II: Hearing Before the Subcomm. on Commerce, Trade, and Consumer Protection of the H. Comm. on Energy and Commerce,109th Cong. 12-13 (2006) (statement of Meg Whitman, President and CEO, eBay Inc.) [hereinafter Whitman Statement at Commercial Privacy Hearing].
-
-
-
-
139
-
-
66749143244
-
-
SeeRichard A. Epstein&Michael S. Greve, Introduction: Preemption in Context, inFEDERAL PREEMPTION: STATES' POWERS, NATIONAL INTERESTS 1, 1-5 (Richard A. Epstein&Michael S. Greve eds., 2007).
-
SeeRichard A. Epstein&Michael S. Greve, Introduction: Preemption in Context, inFEDERAL PREEMPTION: STATES' POWERS, NATIONAL INTERESTS 1, 1-5 (Richard A. Epstein&Michael S. Greve eds., 2007).
-
-
-
-
140
-
-
66749186374
-
-
SeePac. Gas&Elec. Co. v. State Energy Res. Conservation&Dev. Comm'n, 461 U.S. 190, 212-13 (1983); Hines v. Davidowitz, 312 U.S. 52, 67-68 (1941).
-
SeePac. Gas&Elec. Co. v. State Energy Res. Conservation&Dev. Comm'n, 461 U.S. 190, 212-13 (1983); Hines v. Davidowitz, 312 U.S. 52, 67-68 (1941).
-
-
-
-
141
-
-
66749182475
-
-
Martha Derthick, Federalism, inUNDERSTANDING AMERICA: THE ANATOMY OF AN EXCEPTIONAL NATION 121, 140 (Peter H. Schuck&James Q. Wilson eds., 2008).
-
Martha Derthick, Federalism, inUNDERSTANDING AMERICA: THE ANATOMY OF AN EXCEPTIONAL NATION 121, 140 (Peter H. Schuck&James Q. Wilson eds., 2008).
-
-
-
-
142
-
-
66749186099
-
-
The general German terms for this area of regulation are Sozialordnung(social order), or Sozialwesen( social welfare). For examples of the data protection issues in this area, see the recent report of the Berlin Data Protection Commissioner. BERLINER BEAUFTRAGTER, BERICHT DES BERLINER BEAUFTRAGTEN FUR DATENSCHUTZ UND INFORMATIONSFREIHEIT [REPORT OF THE BERLIN COMMISSIONER FOR DATA PROTECTION AND FREEDOM OF INFORMATION] 123-56 (2007).
-
The general German terms for this area of regulation are Sozialordnung("social order"), or Sozialwesen(" social welfare"). For examples of the data protection issues in this area, see the recent report of the Berlin Data Protection Commissioner. BERLINER BEAUFTRAGTER, BERICHT DES BERLINER BEAUFTRAGTEN FUR DATENSCHUTZ UND INFORMATIONSFREIHEIT [REPORT OF THE BERLIN COMMISSIONER FOR DATA PROTECTION AND FREEDOM OF INFORMATION] 123-56 (2007).
-
-
-
-
143
-
-
66749191151
-
-
Spiros Simitis, Zweck und Andwendungsbereich des Gesetzes [Goal and Scope of the Statute], inNOMOS KOMMENTAR ZUM BUNDESDATENSCHUTZGESETZ [COMMENTARY ON THE FEDERAL PRIVACY LAW], supranote 17, at 156 (commenting on Section 1 of the BDSG).
-
Spiros Simitis, Zweck und Andwendungsbereich des Gesetzes [Goal and Scope of the Statute], inNOMOS KOMMENTAR ZUM BUNDESDATENSCHUTZGESETZ [COMMENTARY ON THE FEDERAL PRIVACY LAW], supranote 17, at 156 (commenting on Section 1 of the BDSG).
-
-
-
-
144
-
-
84868964986
-
-
Personal Information Protection and Electronic Documents Act, 2000 S.C., ch. 5 § 26(2)(b) (Can.); seeSTEPHANIE PERRIN ET AL., THE PERSONAL INFORMATION PROTECTION AND ELECTRONIC DOCUMENTS ACT: AN ANNOTATED GUIDE 119 (2001).
-
Personal Information Protection and Electronic Documents Act, 2000 S.C., ch. 5 § 26(2)(b) (Can.); seeSTEPHANIE PERRIN ET AL., THE PERSONAL INFORMATION PROTECTION AND ELECTRONIC DOCUMENTS ACT: AN ANNOTATED GUIDE 119 (2001).
-
-
-
-
145
-
-
66749192937
-
-
PRIVACY COMM'R OF CANADA, REPORT TO PARLIAMENT CONCERNING SUBSTANTIALLY SIMILAR PROVINCIAL LEGISLATION 2 (2002).
-
PRIVACY COMM'R OF CANADA, REPORT TO PARLIAMENT CONCERNING SUBSTANTIALLY SIMILAR PROVINCIAL LEGISLATION 2 (2002).
-
-
-
-
146
-
-
66749177486
-
-
Id
-
Id.
-
-
-
-
147
-
-
66749183050
-
-
See infratext accompanying notes 135-136.
-
See infratext accompanying notes 135-136.
-
-
-
-
148
-
-
66749157643
-
-
SeeBellia, supranote 65, at 875
-
SeeBellia, supranote 65, at 875.
-
-
-
-
149
-
-
66749138426
-
-
See supranote 112 and accompanying text.
-
See supranote 112 and accompanying text.
-
-
-
-
150
-
-
66749136645
-
-
SeeFEELEY&RUBIN, supranote 62.
-
SeeFEELEY&RUBIN, supranote 62.
-
-
-
-
151
-
-
66749106523
-
-
Id.at 28
-
Id.at 28.
-
-
-
-
152
-
-
66749134316
-
-
Contra Costa County, Cal., Ordinance 2002-30 (Sept. 24, 2002); San Mateo County, Cal., Ordinance 04126 (Aug. 6, 2002).
-
Contra Costa County, Cal., Ordinance 2002-30 (Sept. 24, 2002); San Mateo County, Cal., Ordinance 04126 (Aug. 6, 2002).
-
-
-
-
153
-
-
66749145164
-
-
For a selection of cases and a sense of the heavy influence of privacy torts as articulated in the Restatement (Second) of Torts,see SOLOVE&SCHWARTZ, supranote 10, at 30-140.
-
For a selection of cases and a sense of the heavy influence of privacy torts as articulated in the Restatement (Second) of Torts,see SOLOVE&SCHWARTZ, supranote 10, at 30-140.
-
-
-
-
154
-
-
66749094998
-
-
NAAG PRIVACY SUBCOMMITTEE REPORT: PRIVACY PRINCIPLES AND BACKGROUND, available athttp://web.archive.org/web/20041216174950/http://www.naag.org/naag/ resolutions/subrep ort.php (last visited Feb. 23, 2009).
-
NAAG PRIVACY SUBCOMMITTEE REPORT: PRIVACY PRINCIPLES AND BACKGROUND, available athttp://web.archive.org/web/20041216174950/http://www.naag.org/naag/ resolutions/subrep ort.php (last visited Feb. 23, 2009).
-
-
-
-
155
-
-
22544441901
-
which ultimately led in 1996 to certain amendments to the Fair Credit Reporting Act. SeeMichael Epshteyn, Note, The Fair and Accurate Credit Transactions Act of 2003: Will Preemption of State Credit Reporting Laws Harm Consumers?,93
-
For one illustration, contrast the quick reaction in vermont in 1992 to certain credit reporting mistakes in the state the year before, and the slower reaction in
-
For one illustration, contrast the quick reaction in vermont in 1992 to certain credit reporting mistakes in the state the year before, and the slower reaction in Washington, D.C., which ultimately led in 1996 to certain amendments to the Fair Credit Reporting Act. SeeMichael Epshteyn, Note, The Fair and Accurate Credit Transactions Act of 2003: Will Preemption of State Credit Reporting Laws Harm Consumers?,93 Geo. L.J. 1143, 1162-63 (2005).
-
(2005)
Geo. L.J
, vol.1143
, pp. 1162-1163
-
-
Washington, D.C.1
-
156
-
-
37749015685
-
Federalism: Evaluating the Founders' Design,54
-
book review, Lower levels of government are more likely to depart from established consensus simply because they are smaller and more numerous, See
-
SeeMichael W. McConnell, Federalism: Evaluating the Founders' Design,54 U. CHI. L. REV. 1484, 1498 (1987) (book review) ("Lower levels of government are more likely to depart from established consensus simply because they are smaller and more numerous.").
-
(1987)
U. CHI. L. REV
, vol.1484
, pp. 1498
-
-
McConnell, M.W.1
-
157
-
-
66749117984
-
-
Id
-
Id.
-
-
-
-
158
-
-
66749085869
-
-
PERRIN ET AL, supranote 120, at 2-11
-
PERRIN ET AL, supranote 120, at 2-11.
-
-
-
-
159
-
-
66749159928
-
-
See supratext accompanying note 120.
-
See supratext accompanying note 120.
-
-
-
-
160
-
-
66749182474
-
-
Personal Information Protection and Electronic Documents Act: Process for the Determination of Substantially Similar Provincial Legislation by the Governor in Council, C. Gaz., pt. I, at 3618-22 (Sept. 22, 2001) (Can.);
-
Personal Information Protection and Electronic Documents Act: Process for the Determination of "Substantially Similar" Provincial Legislation by the Governor in Council, C. Gaz., pt. I, at 3618-22 (Sept. 22, 2001) (Can.);
-
-
-
-
161
-
-
66749192354
-
-
PRIVACY COMM'R OF CANADA, supranote 121, at 1-2
-
PRIVACY COMM'R OF CANADA, supranote 121, at 1-2.
-
-
-
-
162
-
-
66749109578
-
-
BARBARA MCISAAC, RICK SHIELDS& KRIS KLEIN, THE LAW OF PRIVACY IN CANADA 4-27 (rev. ed. 2006);
-
BARBARA MCISAAC, RICK SHIELDS& KRIS KLEIN, THE LAW OF PRIVACY IN CANADA 4-27 (rev. ed. 2006);
-
-
-
-
163
-
-
66749123284
-
-
STANDING COMM. ON ACCESS TO INFO., PRIVACY AND ETHICS, STATUTORY REVIEW OF PIPEDA 3 (2007) [hereinafter STANDING COMM. REPORT].
-
STANDING COMM. ON ACCESS TO INFO., PRIVACY AND ETHICS, STATUTORY REVIEW OF PIPEDA 3 (2007) [hereinafter STANDING COMM. REPORT].
-
-
-
-
164
-
-
66749152247
-
-
MCISSAC ET AL, supranote 137, at 4-27 to 4-28
-
MCISSAC ET AL., supranote 137, at 4-27 to 4-28.
-
-
-
-
165
-
-
84868981991
-
-
Personal Information Protection and Electronic Documents Act, 2000 S.C., ch. 5 § 29 (Can.).
-
Personal Information Protection and Electronic Documents Act, 2000 S.C., ch. 5 § 29 (Can.).
-
-
-
-
166
-
-
66749109579
-
-
STANDING COMM. REPORT, supranote 137.
-
STANDING COMM. REPORT, supranote 137.
-
-
-
-
167
-
-
66749085870
-
-
Id.at 1
-
Id.at 1.
-
-
-
-
168
-
-
66749183051
-
-
Id.at 47-51
-
Id.at 47-51.
-
-
-
-
169
-
-
66749179615
-
-
Id.at 1
-
Id.at 1.
-
-
-
-
170
-
-
70349234825
-
-
Ann E. Carlson, Iterative Federalism and Climate Change,103 NW. U. L. REV. (forthcoming June 2009) (manuscript at 12, on file with author).
-
Ann E. Carlson, Iterative Federalism and Climate Change,103 NW. U. L. REV. (forthcoming June 2009) (manuscript at 12, on file with author).
-
-
-
-
171
-
-
31544443926
-
Modular Environmental Regulation,54
-
Jody Freeman&Daniel A. Farber, Modular Environmental Regulation,54 DUKE L.J. 795 (2005).
-
(2005)
DUKE L.J
, vol.795
-
-
Freeman, J.1
Farber, D.A.2
-
172
-
-
66749139267
-
-
Bellia, supranote 65, at 881-86
-
Bellia, supranote 65, at 881-86.
-
-
-
-
173
-
-
66749085276
-
-
Judge Bork did not think that the Constitution contained a right to privacy. The confirmation hearings did not, however, turn on whether Congress had a right to legislate in this area. See Video and Library Privacy Protection Act of 1988: Joint Hearing on H.R. 4947 and S. 2361 Before the Subcomm. on Courts, Civil Liberties and the Administration of Justice of the H. Comm. on the Judiciary and the Subcomm. on Technology and the Law of the S. Comm. on the Judiciary,100th Cong. 133-34 (1988) (statement of Sen. Alan K. Simpson) [hereinafter Video Privacy Hearings](As Judge Bork so articulately pointed out during his hearings, the Congress of the United States does have the power to legislate privacy rights if it wishes.);
-
Judge Bork did not think that the Constitution contained a right to privacy. The confirmation hearings did not, however, turn on whether Congress had a right to legislate in this area. See Video and Library Privacy Protection Act of 1988: Joint Hearing on H.R. 4947 and S. 2361 Before the Subcomm. on Courts, Civil Liberties and the Administration of Justice of the H. Comm. on the Judiciary and the Subcomm. on Technology and the Law of the S. Comm. on the Judiciary,100th Cong. 133-34 (1988) (statement of Sen. Alan K. Simpson) [hereinafter Video Privacy Hearings]("As Judge Bork so articulately pointed out during his hearings, the Congress of the United States does have the power to legislate privacy rights if it wishes.");
-
-
-
-
174
-
-
66749181389
-
-
id.at 67 (statement of Janlori Goldman, Staff Attorney, Am. Civil Liberties Union) ([T]he majority of Senators who voted against his confirmation cited their concern about the Judge's limited view of the Constitutional right to privacy.).
-
id.at 67 (statement of Janlori Goldman, Staff Attorney, Am. Civil Liberties Union) ("[T]he majority of Senators who voted against his confirmation cited their concern about the Judge's limited view of the Constitutional right to privacy.").
-
-
-
-
175
-
-
66749180845
-
-
Id.at 31 (statement of Sen. Patrick Leahy).
-
Id.at 31 (statement of Sen. Patrick Leahy).
-
-
-
-
176
-
-
84888491658
-
-
§ 2710f, 2000
-
18 U.S.C. § 2710(f) (2000).
-
18 U.S.C
-
-
-
177
-
-
66749169737
-
-
For such a brief reference, see S. REP. No. 100-599, at 15 1988, reprinted in1988 U.S.C.C.A.N. 4342-1, 4342-12
-
For such a brief reference, see S. REP. No. 100-599, at 15 (1988), reprinted in1988 U.S.C.C.A.N. 4342-1, 4342-12.
-
-
-
-
178
-
-
66749089469
-
-
See id.at 8, reprinted in1988 U.S.C.C.A.N. 4342-1, 4342-8 noting that the Subcommittee was unable to resolve questions regarding the application of a provision on disclosure of library borrower records, For the discussion of the protection of library records at the hearing, see Video Privacy Hearings, supranote 147, at 34-53
-
See id.at 8, reprinted in1988 U.S.C.C.A.N. 4342-1, 4342-8 (noting that the Subcommittee "was unable to resolve questions regarding the application" of a provision on disclosure of "library borrower records"). For the discussion of the protection of library records at the hearing, see Video Privacy Hearings, supranote 147, at 34-53.
-
-
-
-
179
-
-
66749170864
-
-
See Video Privacy Hearings, supranote 147, at 87-114 (statement of Richard A. Barton, Senior Vice President, Direct Mktg. Assoc.).
-
See Video Privacy Hearings, supranote 147, at 87-114 (statement of Richard A. Barton, Senior Vice President, Direct Mktg. Assoc.).
-
-
-
-
180
-
-
84888491658
-
-
§ 2710(b)(2)(D)i, ii
-
18 U.S.C. § 2710(b)(2)(D)(i)-(ii);
-
18 U.S.C
-
-
-
181
-
-
66749175444
-
-
seeS. Rep. No. 100-599, supranote 150, at 13-14.
-
seeS. Rep. No. 100-599, supranote 150, at 13-14.
-
-
-
-
182
-
-
66749164954
-
-
See Video Privacy Hearings, supranote 147, at 88-89 (statement of Richard A. Barton, Senior Vice President, Direct Mktg. Assoc.).
-
See Video Privacy Hearings, supranote 147, at 88-89 (statement of Richard A. Barton, Senior Vice President, Direct Mktg. Assoc.).
-
-
-
-
183
-
-
66749131574
-
-
Id.at 125
-
Id.at 125.
-
-
-
-
184
-
-
66749164375
-
-
Indeed, preemption was not even on the radar of the nation's then-largest video retailer, Erol's, which had some multi-state operations. A representative of Erol's testified before Congress strongly in favor of the Video Privacy Protection Act and did not raise the preemption issue. Id.at 76-86 (statement of Vans Stevenson, Dir. of Pub. Relations, Erol's,inc.).
-
Indeed, preemption was not even on the radar of the nation's then-largest video retailer, Erol's, which had some multi-state operations. A representative of Erol's testified before Congress strongly in favor of the Video Privacy Protection Act and did not raise the preemption issue. Id.at 76-86 (statement of Vans Stevenson, Dir. of Pub. Relations, Erol's,inc.).
-
-
-
-
185
-
-
66749087168
-
-
SeeEpshteyn, supranote 131, at 1154-55 (describing the rise of identity theft after the enactment of the original Fair Credit Reporting Act); Gail Hillebrand, After the FACTA: State Power To Prevent Identity Theft,17 LOY. CONSUMER L. REV. 53, 56-57 (2004) (discussing the use of risk-based pricing to determine the nuances and gradations in price and terms of consumer credit).
-
SeeEpshteyn, supranote 131, at 1154-55 (describing the rise of identity theft after the enactment of the original Fair Credit Reporting Act); Gail Hillebrand, After the FACTA: State Power To Prevent Identity Theft,17 LOY. CONSUMER L. REV. 53, 56-57 (2004) (discussing the use of "risk-based" pricing to determine the "nuances and gradations in price and terms" of consumer credit).
-
-
-
-
186
-
-
84956547845
-
-
§ 1681c-1a, Supp. V 2005
-
15 U.S.C. § 1681c-1(a) (Supp. V 2005).
-
15 U.S.C
-
-
-
187
-
-
84868964975
-
-
Id.§ 1681c-1(e).
-
Id.§ 1681c-1(e).
-
-
-
-
188
-
-
66749141667
-
-
See supratext accompanying note 84.
-
See supratext accompanying note 84.
-
-
-
-
189
-
-
84956547845
-
-
§ 1681cg
-
15 U.S.C. § 1681c(g).
-
15 U.S.C
-
-
-
192
-
-
66749112051
-
-
seeHillebrand, supranote 157, at 65-66
-
seeHillebrand, supranote 157, at 65-66.
-
-
-
-
193
-
-
0010103733
-
Federalism and the Double Standard of Judicial Review,51
-
Lynn A. Baker&Ernest A. Young, Federalism and the Double Standard of Judicial Review,51 DUKE L.J. 75, 151-52 (2001).
-
(2001)
DUKE L.J
, vol.75
, pp. 151-152
-
-
Baker, L.A.1
Young, E.A.2
-
194
-
-
66749151642
-
-
Even though Baker and Young favor state lawmaking, they also concede that increased diversity [in legislation] among the states is not always a good thing. Id.at 155.
-
Even though Baker and Young favor state lawmaking, they also concede that "increased diversity [in legislation] among the states is not always a good thing." Id.at 155.
-
-
-
-
195
-
-
77958410286
-
-
E. Donald Elliott, Bruce A. Ackerman&John C. Millian, Toward a Theory of Statutory Evolution: The Federalization of Environmental Law,1 J.L. ECON.&Org. 313 (1985).
-
E. Donald Elliott, Bruce A. Ackerman&John C. Millian, Toward a Theory of Statutory Evolution: The Federalization of Environmental Law,1 J.L. ECON.&Org. 313 (1985).
-
-
-
-
196
-
-
34548119871
-
Timing and Form of Federal Regulation: The Case of Climate Change,155
-
J.R. DeShazo&Jody Freeman, Timing and Form of Federal Regulation: The Case of Climate Change,155 U. PA. L. REV. 1499, 1500 (2007).
-
(2007)
U. PA. L. REV
, vol.1499
, pp. 1500
-
-
DeShazo, J.R.1
Freeman, J.2
-
197
-
-
66749085868
-
-
See id.at 1530.
-
See id.at 1530.
-
-
-
-
198
-
-
66749191150
-
-
California Office of Information Security and Privacy Protection, 2008 Privacy Legislation Enacted, http://www.oispp.ca.gov/consumer-privacy/privacy- leg/leg.asp (last visited Dec. 1, 2008).
-
California Office of Information Security and Privacy Protection, 2008 Privacy Legislation Enacted, http://www.oispp.ca.gov/consumer-privacy/privacy- leg/leg.asp (last visited Dec. 1, 2008).
-
-
-
-
199
-
-
66749179039
-
-
Id
-
Id.
-
-
-
-
200
-
-
66749181972
-
-
Adam Clymer, North Dakota Tightens Law on Bank Data and Privacy,N.Y. TIMES, June 13, 2002, at A28; Jennifer 8. Lee, California Law Provides More Financial Privacy,N.Y. TIMES, Aug. 28, 2008, at A24.
-
Adam Clymer, North Dakota Tightens Law on Bank Data and Privacy,N.Y. TIMES, June 13, 2002, at A28; Jennifer 8. Lee, California Law Provides More Financial Privacy,N.Y. TIMES, Aug. 28, 2008, at A24.
-
-
-
-
201
-
-
66749165541
-
-
REGAN, supranote 40, at 202-09.
-
REGAN, supranote 40, at 202-09.
-
-
-
-
203
-
-
66749144360
-
-
Id
-
Id.
-
-
-
-
204
-
-
66749118571
-
-
Id
-
Id.
-
-
-
-
206
-
-
0347141446
-
-
See, e.g.,Kirsten H. Engel, State Environmental Standard-Setting: Is There a Race and Is It to the Bottom?,48 HASTINGS L.J. 271 (1997); Richard L. Revesz, The Race to the Bottom and Federal Environmental Regulation: A Response to Critics,82 MINN. L. REV. 535 (1997);
-
See, e.g.,Kirsten H. Engel, State Environmental Standard-Setting: Is There a "Race" and Is It "to the Bottom"?,48 HASTINGS L.J. 271 (1997); Richard L. Revesz, The Race to the Bottom and Federal Environmental Regulation: A Response to Critics,82 MINN. L. REV. 535 (1997);
-
-
-
-
207
-
-
0000584741
-
Rehabilitating Interstate Competition: Rethinking the "Race-to-the-Bottom" Rationale for Federal Environmental Regulation,67
-
Richard L. Revesz, Rehabilitating Interstate Competition: Rethinking the "Race-to-the-Bottom" Rationale for Federal Environmental Regulation,67 N.Y.U. L. REV. 1210, 1211-12 (1992).
-
(1992)
N.Y.U. L. REV
, vol.1210
, pp. 1211-1212
-
-
Revesz, R.L.1
-
208
-
-
84868977533
-
-
Mass. Gen. Laws ch. 93H, § 3 (2007).
-
Mass. Gen. Laws ch. 93H, § 3 (2007).
-
-
-
-
209
-
-
84868981958
-
-
Compare id.(The notice to be provided to the resident shall not include the nature of the breach or unauthorized acquisition or use or the number of residents of the commonwealth affected by said breach or unauthorized access or use.), withN.Y. GEN. BUS. LAW § 899-aa) (McKinney 2005) ([N]otice shall include... a description of the categories of information that were, or are reasonably believed to have been, acquired by a person without valid authorization, including specification of which of the elements of personal information and private information were, or are reasonably believed to have been, so acquired.).
-
Compare id.("The notice to be provided to the resident shall not include the nature of the breach or unauthorized acquisition or use or the number of residents of the commonwealth affected by said breach or unauthorized access or use."), withN.Y. GEN. BUS. LAW § 899-aa) (McKinney 2005) ("[N]otice shall include... a description of the categories of information that were, or are reasonably believed to have been, acquired by a person without valid authorization, including specification of which of the elements of personal information and private information were, or are reasonably believed to have been, so acquired.").
-
-
-
-
210
-
-
66749192353
-
-
See, e.g.,Schwartz&Janger, supranote 56, at 942-43
-
See, e.g.,Schwartz&Janger, supranote 56, at 942-43.
-
-
-
-
211
-
-
66749145754
-
-
For a table with a detailed comparison of different state security breach notification laws, see id.at
-
For a table with a detailed comparison of different state security breach notification laws, see id.at 972-84.
-
-
-
-
212
-
-
84956547845
-
-
§ 1681ad, 2000&Supp. V 2005
-
15 U.S.C. § 1681a(d) (2000&Supp. V 2005).
-
15 U.S.C
-
-
-
213
-
-
66749128110
-
-
See supratext accompanying note 121.
-
See supratext accompanying note 121.
-
-
-
-
214
-
-
66749093815
-
-
Personal Information Protection and Electronic Documents Act: Process for the Determination of Substantially Similar Provincial Legislation by the Governor in Council, C. Gaz., pt. I, at 3621-22 (Sept. 22, 2001) (Can.).
-
Personal Information Protection and Electronic Documents Act: Process for the Determination of "Substantially Similar" Provincial Legislation by the Governor in Council, C. Gaz., pt. I, at 3621-22 (Sept. 22, 2001) (Can.).
-
-
-
-
215
-
-
38049158206
-
Asymmetrical Regulation: Risk, Preemption, and the Floor/Ceiling Distinction,82
-
William W. Buzbee, Asymmetrical Regulation: Risk, Preemption, and the Floor/Ceiling Distinction,82 N.Y.U. L. REV. 1547, 1602 (2007).
-
(2007)
N.Y.U. L. REV
, vol.1547
, pp. 1602
-
-
Buzbee, W.W.1
-
216
-
-
84868977531
-
-
15 U.S.C. § 1681t
-
15 U.S.C. § 1681t.
-
-
-
-
217
-
-
84868981956
-
-
Id.§ 1681c-1. The preemption narrowed to the conduct required is codified at 15 U.S.C. § 1681t(b)5
-
Id.§ 1681c-1. The preemption narrowed to "the conduct required" is codified at 15 U.S.C. § 1681t(b)(5).
-
-
-
-
218
-
-
34247498788
-
Against Preemption: How Federalism Can Improve the National Legislative Process: Cyberspace Filters, Privacy Controls, and Fair Information Practices,82
-
Roderick M. Hills, Jr., Against Preemption: How Federalism Can Improve the National Legislative Process: Cyberspace Filters, Privacy Controls, and Fair Information Practices,82 N.Y.U. L. REV. 1, 4 (2007).
-
(2007)
N.Y.U. L. REV
, vol.1
, pp. 4
-
-
Hills Jr., R.M.1
-
219
-
-
66749167911
-
-
SeeSchwartz, Lessig's Code, supranote 15, 781-86
-
SeeSchwartz, Lessig's Code, supranote 15, 781-86.
-
-
-
-
220
-
-
66749192936
-
-
A range of other issues also arise in any division and sharing of power, including the question of choice of judicial fora for hearing claims
-
A range of other issues also arise in any division and sharing of power, including the question of choice of judicial fora for hearing claims.
-
-
-
-
221
-
-
66749126406
-
-
Whitman Statement at Commercial Privacy Hearing, supranote 114, at 13, 37.
-
Whitman Statement at Commercial Privacy Hearing, supranote 114, at 13, 37.
-
-
-
-
222
-
-
84956547845
-
-
§ 45(a)1, For a discussion of the FTC's enforcement powers under its enabling act and its use in the context of children's online privacy, see SOLOVE&SCHWARTZ, supranote 10, at 777-82, 803
-
15 U.S.C. § 45(a)(1). For a discussion of the FTC's enforcement powers under its enabling act and its use in the context of children's online privacy, see SOLOVE&SCHWARTZ, supranote 10, at 777-82, 803.
-
15 U.S.C
-
-
-
223
-
-
66749116283
-
-
Regarding this trend in areas other than information privacy law, see Buzbee, supranote 185, at 1552-55
-
Regarding this trend in areas other than information privacy law, see Buzbee, supranote 185, at 1552-55.
-
-
-
-
224
-
-
84868972422
-
-
§§ 7507, 7543e
-
42 U.S.C. §§ 7507, 7543(e).
-
42 U.S.C
-
-
-
225
-
-
66749149606
-
-
Carlson, supranote 144 manuscript at 1
-
Carlson, supranote 144 (manuscript at 1).
-
-
-
-
226
-
-
84868964957
-
-
U.S.C. § 1681t(b)(1)(F).
-
U.S.C. § 1681t(b)(1)(F).
-
-
-
-
227
-
-
66749185528
-
-
EVAN HENDRICKS, CREDIT SCORES& CREDIT REPORTS 307-08 (2d ed. 2005). For a skeptical view of the industry's assessment of the cost of letting the preemption of these provisions lapse, noting the historic absence of a single nationwide market for credit reporting, see Epshteyn, supranote 131, at 1161.
-
EVAN HENDRICKS, CREDIT SCORES& CREDIT REPORTS 307-08 (2d ed. 2005). For a skeptical view of the industry's assessment of the cost of letting the preemption of these provisions lapse, noting the historic absence of a single nationwide market for credit reporting, see Epshteyn, supranote 131, at 1161.
-
-
-
|