메뉴 건너뛰기




Volumn 97, Issue 3, 2012, Pages 809-847

Self-surveillance privacy

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84859056524     PISSN: 00210552     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Review
Times cited : (43)

References (132)
  • 1
    • 84889733946 scopus 로고    scopus 로고
    • last visited Jan. 16, 2012
    • See GOOGLE ANALYTICS, http://www.google.com/analytics/ (last visited Jan. 16, 2012).
  • 2
    • 84889695268 scopus 로고    scopus 로고
    • As of December, The Pulse product is for "employee tracking" by management; in this sense, it is old-school surveillance. By contrast, the Empower product is more for self-analytics in that an individual voluntarily initiates the data collection for self-analysis. But even in this context, the meaning of the data collected turns on "peer" comparisons
    • As of December 2010, RescueTime advertises two products, Pulse and Empower. The Pulse product is for "employee tracking" by management; in this sense, it is old-school surveillance. By contrast, the Empower product is more for self-analytics in that an individual voluntarily initiates the data collection for self-analysis. But even in this context, the meaning of the data collected turns on "peer" comparisons.
    • (2010) RescueTime Advertises Two Products, Pulse and Empower
  • 3
    • 84889732796 scopus 로고    scopus 로고
    • last visited Jan. 16, 2012
    • See RESCUETIME, http://www.rescuetime.com/ (last visited Jan. 16, 2012).
  • 4
    • 84889701116 scopus 로고    scopus 로고
    • last visited Jan. 16, 2012
    • See GARMIN CONNECT, http://connect.garmin. com (last visited Jan. 16, 2012)
  • 5
    • 84889762127 scopus 로고    scopus 로고
    • last visited Jan. 16, 2012 making use of Google charting API
    • DAYTUM, http://daytum.com/ (last visited Jan. 16, 2012) (making use of Google charting API);
  • 6
    • 84889737546 scopus 로고    scopus 로고
    • last visited Jan. 16, 2012 pulling data from RescueTime and Twitter and others
    • ME-TRICS, http://beta.me-trics.com/ (last visited Jan. 16, 2012) (pulling data from RescueTime and Twitter and others);
  • 7
    • 84889739892 scopus 로고    scopus 로고
    • last visited Jan. 16, 2012 "A web service that allows you to share snippets of information from the minutiae of daily life in the form of simple statistical graphs."
    • MYCROCOSM, http://mycro.media.mit.edu/ (last visited Jan. 16, 2012) ("[A] web service that allows you to share snippets of information from the minutiae of daily life in the form of simple statistical graphs.");
  • 8
    • 84889731116 scopus 로고    scopus 로고
    • last visited Jan. 16, 2012
    • NIKE+DASHBOARD, http://nikerunning.nike.com/nikeos/p/nikeplus/en-us/ plus#//dashboard (last visited Jan. 16, 2012);
  • 9
    • 84889758520 scopus 로고    scopus 로고
    • last visited Jan. 16, 2012 providing wide-open flexibility over data that can be tracked
    • YOUR. FLOWINGDATA, http://your.flowingdata.com/ (last visited Jan. 16, 2012) (providing wide-open flexibility over data that can be tracked).
  • 10
    • 84889752444 scopus 로고    scopus 로고
    • Getting fit with 2 bits of help
    • Dec. 17
    • See David Pogue, Getting Fit with 2 Bits of Help, N. Y. TIMES (Dec. 17, 2009), http://www.nytimes.com/2009/12/17/technology/personaltech/17pogue.html.
    • (2009) N. Y. Times
    • Pogue, D.1
  • 11
    • 84889718916 scopus 로고    scopus 로고
    • last visited Jan. 16, 2012
    • See PHILIPS DIRECTLIFE, http://www.directlife.philips.com/ (last visited Jan. 16, 2012).
  • 12
    • 0347989497 scopus 로고    scopus 로고
    • Information privacy in cyberspace transactions
    • our definition, self-surveillance data refer only to individual human beings and not to, for example, data about corporations or other fictional legal persons. For an explanation of why we exclude non-human persons, 1210-11
    • In our definition, self-surveillance data refer only to individual human beings and not to, for example, data about corporations or other fictional legal persons. For an explanation of why we exclude non-human persons, see Jerry Kang, Information Privacy in Cyberspace Transactions, 50 STAN. L. REV. 1193, 1210-11 (1998).
    • (1998) Stan. L. Rev. , vol.50 , pp. 1193
    • Kang, J.1
  • 14
    • 12544250445 scopus 로고    scopus 로고
    • Experience sampling: Promises and pitfalls, strengths and weaknesses
    • describing interval-contingent, eventcontingent, and signal-contingent sampling procedures
    • See, e.g., Christie Napa Scollon et al., Experience Sampling: Promises and Pitfalls, Strengths and Weaknesses, 4 J. HAPPINESS STUD. 5, 5-8 (2003) (describing interval-contingent, eventcontingent, and signal-contingent sampling procedures).
    • (2003) J. Happiness Stud. , vol.4 , Issue.5-8 , pp. 5
    • Scollon, C.N.1
  • 15
    • 84889733961 scopus 로고    scopus 로고
    • last visited Jan. 16, 2012
    • See URBAN SENSING, http://urban. cens.ucla.edu/ (last visited Jan. 16, 2012).
  • 16
    • 42649113428 scopus 로고    scopus 로고
    • The value and challenges of participatory research: Strengthening its practice
    • Participatory Sensing is inspired by, and draws its name from, the broader tradition of participatory research "PR". PR is a set of methods that position research subjects as coinvestigators. PR traditions develop their research questions with the cooperation of partner communities and engage community members in research design, implementation, analysis, and dissemination. Involvement with every stage of the research process allows participants to target local knowledge and benefit from the results of systematic investigations. PR successes in health and environmental research have improved the ability of marginalized or underserved groups to act on the results of the data they have helped collect and analyze
    • Participatory Sensing is inspired by, and draws its name from, the broader tradition of participatory research ("PR"). PR is a set of methods that position research subjects as coinvestigators. See Margaret Cargo & Shawna L. Mercer, The Value and Challenges of Participatory Research: Strengthening Its Practice, 29 ANN. REV. PUB. HEALTH 325 (2008). PR traditions develop their research questions with the cooperation of partner communities and engage community members in research design, implementation, analysis, and dissemination. Involvement with every stage of the research process allows participants to target local knowledge and benefit from the results of systematic investigations. PR successes in health and environmental research have improved the ability of marginalized or underserved groups to act on the results of the data they have helped collect and analyze.
    • (2008) Ann. Rev. Pub. Health , vol.29 , pp. 325
    • Cargo, M.1    Mercer, S.L.2
  • 17
    • 66349103358 scopus 로고    scopus 로고
    • Community-based participatory research from the margin to the mainstream: Are researchers prepared?
    • See, e.g., Carol R. Horowitz et al., Community-Based Participatory Research from the Margin to the Mainstream: Are Researchers Prepared?, 119 CIRCULATION 2633 (2009).
    • (2009) Circulation , vol.119 , pp. 2633
    • Horowitz, C.R.1
  • 18
    • 78149290264 scopus 로고    scopus 로고
    • Open mHealth architecture: An engine for health care innovation
    • See Deborah Estrin & Ida Sim, Open mHealth Architecture: An Engine for Health Care Innovation, 330 SCIENCE 759 (2010);
    • (2010) Science , vol.330 , pp. 759
    • Estrin, D.1    Sim, I.2
  • 19
    • 79951618488 scopus 로고    scopus 로고
    • And wellness: An open mobile system for activity and experience sampling
    • Oct. 5-7, at
    • John Hicks et al., AndWellness: An Open Mobile System for Activity and Experience Sampling, WIRELESS HEALTH, Oct. 5-7, 2010, at 34.
    • (2010) Wireless Health , pp. 34
    • Hicks, J.1
  • 20
    • 84870842643 scopus 로고    scopus 로고
    • last visited Jan. 16, 2012. Although we have highlighted self-surveillance examples, other CENS Participatory Sensing projects extend far beyond this scope. Indeed, such research was launched initially to support sensing activities in which people decide what, how, and when to sense not only themselves but features of the world around them to collect and analyze geotagged imagery in support of ecological, public health, and cultural goals. For example, data can be collected as part of an explicit campaign undertaken by many users in collaboration. One such campaign focused on recycling practices on the UCLA campus. Project participants used phone cameras to document and tag incidences of recyclable materials thrown into garbage cans on campus. The incidents were tallied, mapped, and reported to campus facilities to suggest the most urgent places to add new recycling bins
    • See Our Projects, URBAN SENSING, http://urban. cens.ucla.edu/projects/ (last visited Jan. 16, 2012). Although we have highlighted self-surveillance examples, other CENS Participatory Sensing projects extend far beyond this scope. Indeed, such research was launched initially to support sensing activities in which people decide what, how, and when to sense not only themselves but features of the world around them to collect and analyze geotagged imagery in support of ecological, public health, and cultural goals. For example, data can be collected as part of an explicit campaign undertaken by many users in collaboration. One such campaign focused on recycling practices on the UCLA campus. Project participants used phone cameras to document and tag incidences of recyclable materials thrown into garbage cans on campus. The incidents were tallied, mapped, and reported to campus facilities to suggest the most urgent places to add new recycling bins.
    • Urban Sensing
  • 21
    • 84870842643 scopus 로고    scopus 로고
    • last visited Jan. 16, 2012. The point here is to make clear that CENS Participatory Sensing projects can easily extend beyond selfsurveillance
    • See Garbage Watch, URBAN SENSING, http://urban. cens.ucla.edu/projects/ gabagewatch/ (last visited Jan. 16, 2012). The point here is to make clear that CENS Participatory Sensing projects can easily extend beyond selfsurveillance.
    • Urban Sensing
  • 23
    • 84889696350 scopus 로고    scopus 로고
    • last visited Jan. 16, 2012 providing an online example of tests used to measure automatic associations
    • See, e.g., PROJECT IMPLICIT, http://projectimplicit.org (last visited Jan. 16, 2012) (providing an online example of tests used to measure automatic associations).
    • Project Implicit
  • 24
    • 78649816877 scopus 로고    scopus 로고
    • Seeing through colorblindness: Implicit bias and the law
    • For recent discussion of implicit bias in the law reviews, see Jerry Kang & Kristin Lane, Seeing Through Colorblindness: Implicit Bias and the Law, 58 UCLA L. REV. 465 (2010).
    • (2010) UCLA L. Rev. , vol.58 , pp. 465
    • Kang, J.1    Lane, K.2
  • 25
    • 84859079948 scopus 로고
    • Benjamin Franklin and the way to virtue
    • Franklin never completed writing his planned work THE ART OF VIRTUE, but he referred to his practice in his autobiography, 200
    • Franklin never completed writing his planned work THE ART OF VIRTUE, but he referred to his practice in his autobiography. See Norman S. Fiering, Benjamin Franklin and the Way to Virtue, 30 AM. Q. 199, 200 (1978).
    • (1978) AM. Q. , vol.30 , pp. 199
    • Fiering, N.S.1
  • 28
    • 33744908764 scopus 로고    scopus 로고
    • Pervasive computing: Embedding the public sphere
    • generally, &, including commentary on transparency discussion. Consider, for example, not Google Analytics but Google Trends, which provides visualizations of the relative frequencies of certain search terms
    • See generally Jerry Kang & Dana Cuff, Pervasive Computing: Embedding the Public Sphere, 62 WASH. & LEE L. REV. 93 (2005) (including commentary on transparency discussion). Consider, for example, not Google Analytics but Google Trends, which provides visualizations of the relative frequencies of certain search terms.
    • (2005) Wash. & Lee L. Rev. , vol.62 , pp. 93
    • Kang, J.1    Cuff, D.2
  • 29
    • 84889703007 scopus 로고    scopus 로고
    • last visited Jan. 16, 2012
    • See GOOGLE TRENDS, http://www.google. com/trends (last visited Jan. 16, 2012).
  • 32
    • 79956051527 scopus 로고    scopus 로고
    • Conversations about the internet #5: Anonymous facebook employee
    • addition to hackers, one could worry about underpoliced employees with access to servers. Jan. 11, explaining how employees casually viewed private user profiles with a master word that was a variant of "Chuck Norris" internal quotation marks omitted
    • In addition to hackers, one could worry about underpoliced employees with access to servers. See, e.g., Phil Wong, Conversations About the Internet #5: Anonymous Facebook Employee, RUMPUS (Jan. 11, 2010), http://therumpus.net/2010/ 01/conversations-about-the-internet-5-anonymous-facebook-employee/ (explaining how employees casually viewed private user profiles with a master word that was a variant of "Chuck Norris" (internal quotation marks omitted)).
    • (2010) Rumpus
    • Wong, P.1
  • 33
    • 0003488992 scopus 로고
    • This approach has long been standard in the legal and policy literature, "The basic attribute of an effective right of privacy is the individual's ability to control the circulation of information relating to him-a power that often is essential to maintaining social relationships and personal freedom."
    • This approach has long been standard in the legal and policy literature. ARTHUR R. MILLER, THE ASSAULT ON PRIVACY: COMPUTERS, DATA BANKS, AND DOSSIERS 25 (1971) ("[T]he basic attribute of an effective right of privacy is the individual's ability to control the circulation of information relating to him-a power that often is essential to maintaining social relationships and personal freedom.");
    • (1971) The Assault on Privacy: Computers, Data Banks, and Dossiers , pp. 25
    • Miller, A.R.1
  • 34
    • 0004073139 scopus 로고
    • "Privacy is the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others."
    • ALAN F. WESTIN, PRIVACY AND FREEDOM 7 (1967) ("Privacy is the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others.");
    • (1967) Privacy and Freedom , pp. 7
    • Westin, A.F.1
  • 35
    • 0001601662 scopus 로고
    • Privacy
    • 482, "Privacy is not simply an absence of information about us in the minds of others; rather it is the control we have over information about ourselves."
    • Charles Fried, Privacy, 77 YALE L. J. 475, 482 (1968) ("Privacy is not simply an absence of information about us in the minds of others; rather it is the control we have over information about ourselves.");
    • (1968) Yale L. J. , vol.77 , pp. 475
    • Fried, C.1
  • 37
    • 79953883857 scopus 로고    scopus 로고
    • Commentary, privacy-as-data control: Conceptual, practical, and moral limits of the paradigm
    • Anita Allen has insightfully explored such weirdness., 867-68, Allen points out, "You can invade that is diminish your own privacy the same way you can diminish your own freedom."
    • Anita Allen has insightfully explored such weirdness. See, e.g., Anita L. Allen, Commentary, Privacy-as-Data Control: Conceptual, Practical, and Moral Limits of the Paradigm, 32 CONN. L. REV. 861, 867-68 (2000). Allen points out, "You can invade (that is diminish) your own privacy the same way you can diminish your own freedom."
    • (2000) Conn. L. Rev. , vol.32 , pp. 861
    • Allen, A.L.1
  • 38
    • 0009301899 scopus 로고
    • flow conception has affinities with approaches that define privacy in terms of "constraint on access." emphasizing a definition focused on "inaccessibility" of a person to others
    • The flow conception has affinities with approaches that define privacy in terms of "constraint on access." See, e.g., ANITA L. ALLEN, UNEASY ACCESS: PRIVACY FOR WOMEN IN A FREE SOCIETY 3 (1988) (emphasizing a definition focused on "inaccessibility" of a person to others);
    • (1988) Uneasy Access: Privacy for Women in a Free Society , pp. 3
    • Allen, A.L.1
  • 39
    • 84923486508 scopus 로고
    • Privacy and the limits of law
    • 428-33, arguing that privacy is a condition that is measured in terms of the degree of access others have to use through information, attention, and proximity
    • Ruth Gavison, Privacy and the Limits of Law, 89 YALE L. J. 421, 428-33 (1980) (arguing that privacy is a condition that is measured in terms of the degree of access others have to use through information, attention, and proximity).
    • (1980) Yale L. J. , vol.89 , pp. 421
    • Gavison, R.1
  • 40
    • 84859049360 scopus 로고    scopus 로고
    • Protecting the inner environment: What privacy regulation can learn from environmental law
    • Dennis Hirsch argues that personal information is a resource that behaves similarly to environmental resources, such as fisheries. Just as over use of the fishery will cause it to collapse, so will over use of personal data by commercial data miners, 23-25, 28-30, This may well be true of self-surveillance data
    • Dennis Hirsch argues that personal information is a resource that behaves similarly to environmental resources, such as fisheries. Just as over use of the fishery will cause it to collapse, so will over use of personal data by commercial data miners. See Dennis D. Hirsch, Protecting the Inner Environment: What Privacy Regulation Can Learn from Environmental Law, 41 GA. L. REV. 1, 23-25, 28-30 (2006). This may well be true of self-surveillance data.
    • (2006) Ga. L. Rev. , vol.41 , pp. 1
    • Hirsch, D.D.1
  • 41
    • 84889752129 scopus 로고    scopus 로고
    • "Cloud computing is the style of computing in which the users can rent infrastructure, platform or software services from other vendors without requiring the physical access to them.", Feb. 23, unpublished manuscript, available at, One characterization of cloud computing emphasizes that users simply do not care about the "location" of data or a particular server
    • "Cloud computing is the style of computing in which the users can rent infrastructure, platform or software services from other vendors without requiring the physical access to them." Karthick Ramachandran, Thomas Margoni & Mark Perry, Clarifying Privacy in the Clouds 3 (Feb. 23, 2011) (unpublished manuscript), available at http://papers.ssrn. com/sol3/Delivery. cfm/SSRN-ID1755225-code1383303.pdf?abstractid=1755225&mirid=1. One characterization of cloud computing emphasizes that users simply do not care about the "location" of data or a particular server.
    • (2011) Clarifying Privacy in the Clouds , pp. 3
    • Ramachandran, K.1    Margoni, T.2    Perry, M.3
  • 42
    • 79551528884 scopus 로고    scopus 로고
    • Facebook beacon has poked its last
    • Sept. 18, 11:58 PM
    • See, e.g., Caroline McCarthy, Facebook Beacon Has Poked Its Last, CNET (Sept. 18, 2009, 11:58 PM), http://news.cnet.com/8301-13577-3-10357107-36.html? tag=mncol;txt.
    • (2009) CNET
    • McCarthy, C.1
  • 43
    • 53149088880 scopus 로고    scopus 로고
    • All the president's spies: Private-public intelligence partnerships in the war on terror
    • It's important to recognize that one of those third parties might be the government, such as in some law-enforcement or national-security project. The state can purchase personal data in the marketplace, subpoena it through legal process, or lean hard on private actors in gray cases to get data, 917-18, 930
    • It's important to recognize that one of those third parties might be the government, such as in some law-enforcement or national-security project. The state can purchase personal data in the marketplace, subpoena it through legal process, or lean hard on private actors in gray cases to get data. See Jon D. Michaels, All the President's Spies: Private-Public Intelligence Partnerships in the War on Terror, 96 CALIF. L. REV. 901, 917-18, 930 (2008).
    • (2008) Calif. L. Rev. , vol.96 , pp. 901
    • Michaels, J.D.1
  • 44
    • 0039274116 scopus 로고    scopus 로고
    • Lochner in cyberspace: The new economic orthodoxy of "rights management"
    • For a general, skeptical read of how market-based consent operates in cyberspace and information-technology discourse, see Julie E. Cohen, Lochner in Cyberspace: The New Economic Orthodoxy of "Rights Management", 97 MICH. L. REV. 462 (1998).
    • (1998) Mich. L. Rev. , vol.97 , pp. 462
    • Cohen, J.E.1
  • 45
    • 84859048517 scopus 로고    scopus 로고
    • Blind consent? A social psychological investigation of non-readership of click-through agreements
    • For empirical evidence that individuals rarely read "click-through agreements" or understand them, forthcoming
    • For empirical evidence that individuals rarely read "click-through agreements" or understand them, see Victoria C. Plaut & Robert P. Bartlett III, Blind Consent? A Social Psychological Investigation of Non-Readership of Click-Through Agreements, 36 LAW & HUM. BEHAV. (forthcoming 2012).
    • (2012) Law & Hum. Behav. , vol.36
    • Plaut, V.C.1    Robert III, P.B.2
  • 46
    • 0005462742 scopus 로고    scopus 로고
    • Commentary, internet privacy and the state
    • 822, identifying the problem of "bounded rationality"
    • See, e.g., Paul M. Schwartz, Commentary, Internet Privacy and the State, 32 CONN. L. REV. 815, 822 (2000) (identifying the problem of "bounded rationality").
    • (2000) Conn. L. Rev. , vol.32 , pp. 815
    • Schwartz, P.M.1
  • 47
    • 0346053624 scopus 로고    scopus 로고
    • Cyberspace self-governance: A skeptical view from liberal democratic theory
    • 476
    • Neil Weinstock Netanel, Cyberspace Self-Governance: A Skeptical View from Liberal Democratic Theory, 88 CALIF. L. REV. 395, 476 (2000).
    • (2000) Calif. L. Rev. , vol.88 , pp. 395
    • Netanel, N.W.1
  • 48
    • 0003544675 scopus 로고    scopus 로고
    • There may also be more standard forms of collective-action problems as well
    • See CASS R. SUNSTEIN, FREE MARKETS AND SOCIAL JUSTICE 29-30 (1997). There may also be more standard forms of collective-action problems as well.
    • (1997) Free Markets and Social Justice , pp. 29-30
    • Sunstein, C.R.1
  • 49
    • 40549119452 scopus 로고    scopus 로고
    • Urban sensing: Out of the woods
    • Mar.
    • see also Dana Cuff, Mark Hansen & Jerry Kang, Urban Sensing: Out of the Woods, COMM. ACM, Mar. 2008, at 24.
    • (2008) Comm. ACM , pp. 24
    • Cuff, D.1    Hansen, M.2    Kang, J.3
  • 50
    • 32844467792 scopus 로고    scopus 로고
    • Privacy in atlantis
    • Given the nonrivalrous nature of information, more than one party can "own" various facts, such as the fact that I bought a red scarf on Tuesday for seventy-nine dollars. I possess that fact in my short-term memory. So does my friend who went shopping with me. So does Victoria's Secret. It is a sort of joint possession. For further discussion of this "entitlement anarchy", 238-41
    • Given the nonrivalrous nature of information, more than one party can "own" various facts, such as the fact that I bought a red scarf on Tuesday for seventy-nine dollars. I possess that fact in my short-term memory. So does my friend who went shopping with me. So does Victoria's Secret. It is a sort of joint possession. For further discussion of this "entitlement anarchy", see Jerry Kang & Benedikt Buchner, Privacy in Atlantis, 18 HARV. J. L. & TECH. 229, 238-41 (2004).
    • (2004) Harv. J. L. & Tech , vol.18 , pp. 229
    • Kang, J.1    Buchner, B.2
  • 51
    • 0346945066 scopus 로고    scopus 로고
    • Lockean arguments for private intellectual property
    • For careful exploration of the relationship between Lockean desert theory and intellectual property, Stephen R. Munzer ed., where the author argues that Lockean analysis provides a prima facie argument against property rights in intellectual property
    • For careful exploration of the relationship between Lockean desert theory and intellectual property, see Seana Valentine Shiffrin, Lockean Arguments for Private Intellectual Property, in NEW ESSAYS IN THE LEGAL AND POLITICAL THEORY OF PROPERTY 138 (Stephen R. Munzer ed., 2001), where the author argues that Lockean analysis provides a prima facie argument against property rights in intellectual property.
    • (2001) New Essays in the Legal and Political Theory of Property , pp. 138
    • Shiffrin, S.V.1
  • 52
    • 1542401733 scopus 로고
    • An introduction to privacy in economics and politics
    • 628-33, arguing that the more accurate classifications will increase economic efficiency
    • See, e.g., George J. Stigler, An Introduction to Privacy in Economics and Politics, 9 J. LEGAL STUD. 623, 628-33 (1980) (arguing that the more accurate classifications will increase economic efficiency).
    • (1980) J. Legal Stud. , vol.9 , pp. 623
    • Stigler, G.J.1
  • 53
    • 0347315060 scopus 로고    scopus 로고
    • Freedom of speech and information privacy: The troubling implications of a right to stop people from speaking about you
    • generally
    • See generally Eugene Volokh, Freedom of Speech and Information Privacy: The Troubling Implications of a Right To Stop People from Speaking About You, 52 STAN. L. REV. 1049 (2000).
    • (2000) Stan. L. Rev. , vol.52 , pp. 1049
    • Volokh, E.1
  • 54
    • 84889755389 scopus 로고    scopus 로고
    • MyLifeBits
    • last visited Jan. 16, 2012
    • For examples of such ventures, see MyLifeBits, MICROSOFT RESEARCH, http://research. microsoft.com/en-us/projects/mylifebits (last visited Jan. 16, 2012);
    • Microsoft Research
  • 55
    • 84889705897 scopus 로고    scopus 로고
    • Total recall: A personal information management system
    • last visited Jan. 16, 2012
    • Total Recall: A Personal Information Management System, USC. EDU, http://bourbon. usc.edu/iml/recall (last visited Jan. 16, 2012).
    • USC. Edu.
  • 56
    • 34250329971 scopus 로고    scopus 로고
    • 'Outlines of a world coming into existence': Pervasive computing and the ethics of forgetting
    • 431, defining Lifelog as a "unified digital record of the totality of an individual's experiences, captured multimodally through digital sensors and stored permanently as a personal multimedia archive"
    • See Martin Dodge & Rob Kitchin, 'Outlines of a World Coming into Existence': Pervasive Computing and the Ethics of Forgetting, 34 ENV'T & PLAN. B: PLAN. & DESIGN 431, 431 (2007) (defining Lifelog as a "unified digital record of the totality of an individual's experiences, captured multimodally through digital sensors and stored permanently as a personal multimedia archive").
    • (2007) Env't & Plan. B: Plan. & Design , vol.34 , pp. 431
    • Dodge, M.1    Kitchin, R.2
  • 57
    • 84859019568 scopus 로고    scopus 로고
    • Lions Gate Entertainment
    • For science-fiction iterations, see THE FINAL CUT (Lions Gate Entertainment 2004).
    • (2004) The Final Cut
  • 58
    • 84889747074 scopus 로고    scopus 로고
    • Equiveillance: The equilibrium between sur-veillance and sous-veillance
    • May, Mann explains, Surveillance is derived from French "sur" above and "veiller" to watch
    • See Steve Mann, Equiveillance: The Equilibrium Between Sur-veillance and Sous-veillance, ON THE IDENTITY TRAIL, May 2005, available at http://wearcam.org/anonequity.htm. Mann explains, Surveillance is derived from French "sur" (above) and "veiller" (to watch). Typically (though not necessarily) surveillance cameras look down from above, both physically (from high poles) as well as hierarchically (bosses watching employees, citizens watching police, cab drivers photographing passengers, and shopkeepers videotaping shoppers). Likewise Sousveillance, derived from French "sous" (below) and "veiller" (to watch), is the art, science, and technologies of "People Looking at"⋯. [S]ousveillance typically involves small person-centric imaging technologies, whereas surveillance tends to be architecture or enviro-centric (cameras in or on the architecture or environment around us). Sousveillance does not necessarily limit itself to citizens photographing police, shoppers photographing shopkeepers, etc., any more than surveillance limits itself along similar lines. For example, one surveillance camera may be pointed at another, just as one person may sousveill another. Sousveillance therefore expands the range of possibilities, without limitation to the possibility of going both ways in an up-down hierarchy. With the miniaturization of cameras into portable electronic devices, such as camera phones, there has been an increased awareness of sousveillance (more than 30, 000 articles, references, and citations on the word "sousveillance" alone), and we are ready to see a new industry grow around devices that implement sousveillance, together with a new sousveillance services industry.
    • (2005) On the Identity Trail
    • Mann, S.1
  • 59
    • 84992684750 scopus 로고    scopus 로고
    • Sousveillance: Inventing and using wearable computing devices for data collection in surveillance environments
    • 332, discussing the difference between sousveillance and surveillance
    • See generally Steve Mann, Jason Nolan & Barry Wellman, Sousveillance: Inventing and Using Wearable Computing Devices for Data Collection in Surveillance Environments, 1 SURVEILLANCE & SOC'Y 331, 332 (2003) (discussing the difference between sousveillance and surveillance).
    • (2003) Surveillance & Soc'y , vol.1 , pp. 331
    • Mann, S.1    Nolan, J.2    Wellman, B.3
  • 60
    • 0347684347 scopus 로고    scopus 로고
    • The death of privacy?
    • 1524, describing privacy-enhancing technologies as insufficient to meet the evolving challenges presented by developments in personal-data-collection technology
    • See, e.g., A. Michael Froomkin, The Death of Privacy?, 52 STAN. L. REV. 1461, 1524 (2000) (describing privacy-enhancing technologies as insufficient to meet the evolving challenges presented by developments in personal-data- collection technology);
    • (2000) Stan. L. Rev. , vol.52 , pp. 1461
    • Froomkin, A.M.1
  • 61
    • 41549098916 scopus 로고    scopus 로고
    • 'Code' and the slow erosion of privacy
    • 187, questioning the efficacy of privacy-enhancing technologies as "they remain a mainly theoretical solution that has yet to prove their effect in practice"
    • Bert-Jaap Koops & Ronald Leenes, 'Code' and the Slow Erosion of Privacy, 12 MICH. TELECOMM. & TECH. L. REV. 115, 187 (2005) (questioning the efficacy of privacy-enhancing technologies as "[t]hey remain a mainly theoretical solution that has yet to prove [their] effect in practice");
    • (2005) Mich. Telecomm. & Tech. L. Rev. , vol.12 , pp. 115
    • Koops, B.1    Leenes, R.2
  • 62
    • 0345792391 scopus 로고    scopus 로고
    • Privacy as intellectual property?
    • 1126, arguing that privacy-enhancing technologies "have thus far done little to make cyberspace more privacyfriendly"
    • Pamela Samuelson, Privacy as Intellectual Property?, 52 STAN. L. REV. 1125, 1126 (2000) (arguing that privacy-enhancing technologies "have thus far done little to make cyberspace more privacyfriendly").
    • (2000) Stan. L. Rev. , vol.52 , pp. 1125
    • Samuelson, P.1
  • 63
    • 31144473142 scopus 로고    scopus 로고
    • The banality of fraud: Re-situating the inside counsel as gatekeeper
    • 1012
    • For a discussion of "role ideology", see Sung Hui Kim, The Banality of Fraud: Re-Situating the Inside Counsel as Gatekeeper, 74 FORDHAM L. REV. 983, 1012 (2005).
    • (2005) Fordham L. Rev. , vol.74 , pp. 983
    • Kim, S.H.1
  • 64
    • 85014530583 scopus 로고    scopus 로고
    • Personal data vaults: A locus of control for personal data streams
    • For technical details and descriptions, see Min Mun et al., Personal Data Vaults: A Locus of Control for Personal Data Streams, in PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE (2010), available at http://dl.acm.org/citation. cfm?id=1921191&bnc=1.
    • (2010) Proceedings of the 6th International Conference
    • Mun, M.1
  • 65
    • 77957594024 scopus 로고    scopus 로고
    • Broken promises of privacy: Responding to the surprising failure of anonymization
    • 1744-45, proposing for legal discourse the term scrub instead of anonymize or deidentify. Ohm points out that reidentification of "anonymized" data has been shown to be much easier than commonly supposed
    • Paul Ohm, Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization, 57 UCLA L. REV. 1701, 1744-45 (2010) (proposing for legal discourse the term scrub instead of anonymize or deidentify). Ohm points out that reidentification of "anonymized" data has been shown to be much easier than commonly supposed.
    • (2010) UCLA L. Rev. , vol.57 , pp. 1701
    • Ohm, P.1
  • 66
    • 84859062374 scopus 로고    scopus 로고
    • Model Rule of Professional Conduct 5.4 prevents nonlawyers from partial ownership of a law firm. It also prevents lawyers from providing multiple services beyond legal services, such as accounting or healthcare, from the same office
    • Model Rule of Professional Conduct 5.4 prevents nonlawyers from partial ownership of a law firm. It also prevents lawyers from providing multiple services (beyond legal services), such as accounting or healthcare, from the same office. MODEL RULES OF PROF'L CONDUCT R. 5.4 (2005).
    • (2005) Model Rules of Prof'l Conduct R , pp. 54
  • 67
    • 25144479398 scopus 로고
    • Rejecting a general privilege for self-critical analyses
    • Some such privileges have been recognized in the context of medical committee reports, affirmative-action studies, and environmental-impact assessments, 552, suggesting that protection for self-critical evaluations has been found in only three contexts: peer reviews, affirmative-action studies, and internal corporate investigations
    • Some such privileges have been recognized in the context of medical committee reports, affirmative-action studies, and environmental-impact assessments. See, e.g., James F. Flanagan, Rejecting a General Privilege for Self-Critical Analyses, 51 GEO. WASH. L. REV. 551, 552 (1983) (suggesting that protection for self-critical evaluations has been found in only three contexts: peer reviews, affirmative-action studies, and internal corporate investigations);
    • (1983) Geo. Wash. L. Rev. , vol.51 , pp. 551
    • Flanagan, J.F.1
  • 68
    • 84859085675 scopus 로고
    • Note, criticizing the self-criticism privilege
    • describing doctrinal evolution of self-criticism privilege
    • S. Kay McNab, Note, Criticizing the Self-Criticism Privilege, 1987 U. ILL. L. REV. 675, 678-82 (describing doctrinal evolution of self-criticism privilege).
    • (1987) U. Ill. L. Rev. , vol.675 , pp. 678-682
    • McNab, S.K.1
  • 69
    • 84889711810 scopus 로고    scopus 로고
    • We focus on state legislatures because although Federal Rules of Evidence Rule 501 gives the federal courts broad discretion in applying privileges "in the light of reason and experience" within the federal courts, Congress expressly rejected the adoption of any specifically enumerated privileges, Supp
    • We focus on state legislatures because although Federal Rules of Evidence Rule 501 gives the federal courts broad discretion in applying privileges "in the light of reason and experience" within the federal courts, Congress expressly rejected the adoption of any specifically enumerated privileges. CHARLES ALAN WRIGHT & KENNETH W. GRAHAM, JR., FEDERAL PRACTICE AND PROCEDURE: EVIDENCE § 5421, at 587 n. 79 (Supp. 2008);
    • (2008) Federal Practice and Procedure: Evidence § 5421 , Issue.79 , pp. 587
    • Wright, A.W.1    Graham Jr., K.W.2
  • 70
    • 0008925427 scopus 로고    scopus 로고
    • The new rules of show and tell: Identifying and protecting the peer review and medical committee privileges
    • describing Texas privileges for peer review and medical committees
    • See, e.g., Gail N. Friend et al., The New Rules of Show and Tell: Identifying and Protecting the Peer Review and Medical Committee Privileges, 49 BAYLOR L. REV. 607 (1997) (describing Texas privileges for peer review and medical committees).
    • (1997) Baylor L. Rev. , vol.49 , pp. 607
    • Friend, G.N.1
  • 71
    • 72749126022 scopus 로고    scopus 로고
    • b 1
    • FED. R. CIV. P. 26 (b) (1) (2010).
    • (2010) Fed. R. Civ. P. , pp. 26
  • 72
    • 84859048574 scopus 로고    scopus 로고
    • West
    • See, e.g., CAL. CIV. PROC. CODE § 2017.010 (West 2007);
    • (2007) Cal. Civ. Proc. Code , pp. 2017010
  • 73
    • 84859031378 scopus 로고    scopus 로고
    • b 1 West
    • COLO. R. CIV. P. 26 (b) (1) (West 2010);
    • (2010) Colo. R. Civ. P , pp. 26
  • 74
    • 77951487421 scopus 로고    scopus 로고
    • b 1
    • KAN. STAT. ANN. § 60-226 (b) (1) (2010);
    • (2010) Kan. Stat. Ann. , pp. 60-226
  • 76
    • 84859074396 scopus 로고    scopus 로고
    • b 1
    • WYO. R. CIV. P. 26 (b) (1) (2011).
    • (2011) Wyo. R. Civ. P. , pp. 26
  • 77
    • 84859089898 scopus 로고    scopus 로고
    • Ledbetter v. Wal-Mart Stores, Inc., No. 06-cv-01958-WYD-MJW, D. Colo. Apr. 21
    • Ledbetter v. Wal-Mart Stores, Inc., No. 06-cv-01958-WYD-MJW, 2009 WL 1067018 (D. Colo. Apr. 21, 2009);
    • (2009) WL 1067018 , vol.2009
  • 79
    • 84889719494 scopus 로고    scopus 로고
    • Ledbetter
    • Ledbetter, 2009 WL 1067018.
    • WL 1067018 , vol.2009
  • 80
    • 84889752480 scopus 로고    scopus 로고
    • Ledbetter
    • * 1.
    • WL 1067018 , vol.2009 , pp. 1
  • 81
    • 84889696152 scopus 로고    scopus 로고
    • Stored communications act
    • Stored Communications Act, 18 U. S. C. §§ 2701-2712 (Supp. 2010).
    • (2010) U. S. C. , vol.18 , Issue.SUPPL. , pp. 2701-2712
  • 83
    • 84889719494 scopus 로고    scopus 로고
    • Ledbetter
    • Ledbetter, 2009 WL 1067018.
    • WL 1067018 , vol.2009
  • 84
    • 72749126022 scopus 로고    scopus 로고
    • Federal Rule of Civil Procedure 34 states that this requirement applies to "any designated documents or electronically stored information-including writings, drawings, graphs, charts, photographs, sound recording, images, and other data or data compilations-stored in any medium from which information can be obtained either directly or, if necessary, after translation by the responding party into a reasonably usable form.", a 1 A
    • Federal Rule of Civil Procedure 34 states that this requirement applies to "any designated documents or electronically stored information-including writings, drawings, graphs, charts, photographs, sound recording, images, and other data or data compilations-stored in any medium from which information can be obtained either directly or, if necessary, after translation by the responding party into a reasonably usable form." FED. R. CIV. P. 34 (a) (1) (A) (2010).
    • (2010) Fed. R. Civ. P , pp. 34
  • 85
    • 84889696508 scopus 로고    scopus 로고
    • Ledbetter
    • * 2.
    • WL 1067018 , vol.2009 , pp. 2
  • 86
    • 72749126022 scopus 로고    scopus 로고
    • b 3 also known as "work product"
    • See FED. R. CIV. P. 26 (b) (3) (also known as "work product").
    • Fed. R. Civ. P , pp. 26
  • 87
    • 84889699987 scopus 로고    scopus 로고
    • Unlike the topical privileges that protect facts, a confidential- communications privilege applies only to communications. According to Imwinkelried, "communications" include "expressive statements and acts.", § 6.7.1, at, Richard D. Friedman ed., 2d ed, A statement or act "is expressive if the speaker or writer subjectively intends the statement to convey meaning to a person such as a hearer or reader⋯. State of mind must also exist at a particular time⋯. The transfer of a pre-existing document does not qualify the document for protection. "
    • Unlike the topical privileges that protect facts, a confidential- communications privilege applies only to communications. According to Imwinkelried, "communication[s]" include "expressive statements and acts." EDWARD J. IMWINKELRIED, THE NEW WIGMORE: A TREATISE ON EVIDENCE: EVIDENTIARY PRIVILEGES § 6.7.1, at 731 (Richard D. Friedman ed., 2d ed. 2009). A statement or act "is expressive if the speaker or writer subjectively intends the statement to convey meaning to a person such as a hearer or reader⋯. [S]tate of mind must also exist at a particular time⋯. [T]he transfer of a pre-existing document does not qualify the document for protection. "
    • (2009) The New Wigmore: A Treatise on Evidence: Evidentiary Privileges , pp. 731
    • Imwinkelried, E.J.1
  • 90
    • 0030241302 scopus 로고    scopus 로고
    • Markets and privacy
    • Sept, at, 99-101
    • See Kenneth C. Laudon, Markets and Privacy, COMM. ACM, Sept. 1996, at 92, 99-101.
    • (1996) Comm. ACM , pp. 92
    • Laudon, K.C.1
  • 91
    • 33846522980 scopus 로고    scopus 로고
    • A coasean analysis of marketing
    • internal quotation marks omitted
    • See Eric Goldman, A Coasean Analysis of Marketing, 2006 WIS. L. REV. 1151, 1202 (internal quotation marks omitted).
    • (2006) Wis. L. Rev. , vol.1151 , pp. 1202
    • Goldman, E.1
  • 92
    • 84859019912 scopus 로고    scopus 로고
    • Why some civil law systems burden notice-filing with a civil law notary "public writing" requirement
    • forthcoming, manuscript at, In contrast to notaries in the United States, civil law notaries receive specialized training beyond that of lawyer and generally enjoy higher status and compensation than lawyers
    • See Patrick Del Duca, Why Some Civil Law Systems Burden Notice-Filing with a Civil Law Notary "Public Writing" Requirement, 44 UCC L. J. (forthcoming 2011) (manuscript at 5-6). In contrast to notaries in the United States, civil law notaries receive specialized training beyond that of lawyer and generally enjoy higher status and compensation than lawyers.
    • (2011) UCC L. J. , vol.44 , pp. 5-6
    • Del Duca, P.1
  • 93
    • 84889735152 scopus 로고    scopus 로고
    • Health information privacy
    • various moments, we've raised the domain of medical data. One might naturally wonder whether certain medical-privacy laws might apply to the PDV. In particular, the Health Insurance Portability and Accountability Act of 1996 "HIPAA" Privacy Rule "protects the privacy of individually identifiable health information. ", last visited Jan. 16, 2012
    • At various moments, we've raised the domain of medical data. One might naturally wonder whether certain medical-privacy laws might apply to the PDV. In particular, the Health Insurance Portability and Accountability Act of 1996 ("HIPAA") Privacy Rule "protects the privacy of individually identifiable health information. " Health Information Privacy, U. S. DEP'T HEALTH & HUMAN SERVS., http://www.hhs.gov/ocr/privacy/index.html (last visited Jan. 16, 2012).
    • U. S. Dep't Health & Human Servs
  • 94
    • 84455186585 scopus 로고    scopus 로고
    • For HIPPA, 164, But it applies only to such information held by three types of entities: health plans, healthcare clearinghouses, and certain healthcare providers
    • For HIPPA, see 45 C. F. R. §§ 160, 164 (2010). But it applies only to such information held by three types of entities: health plans, healthcare clearinghouses, and certain healthcare providers.
    • (2010) C. F. R. , vol.45 , pp. 160
  • 95
    • 84889718521 scopus 로고    scopus 로고
    • Because the PDV stores but does not process data, nor acts as an intermediary between health plans and healthcare providers, it cannot be classified under the rule as a healthcare clearinghouse. Were the PDV system to process raw self-analytic data into a standardized format for the benefit of the user, the HIPAA Privacy Rule would still not apply because the PDV system is receiving the data from the individual and the individual determines where this data is transferred. A system somewhat analogous to the PDV system, and which is also not regulated by HIPAA, is Google Health (http://www.google.com/health), a free service designed by Google to "store [and] manage⋯ all of your health⋯ information in one central [online] place."
  • 96
    • 84889702751 scopus 로고    scopus 로고
    • About google health
    • About Google Health, GOOGLE HEALTH, http://www.google.com/intl/en-US/ health/about/index.html (last visited Nov. 16, 2011) (Google Health has been discontinued as of Jan. 1, 2012). The PDV and Google Health systems are similar to the extent that both may store selfanalytic healthcare information and both serve individuals. However, unlike the PDV system, Google Health's specific purpose is to store all healthcare information, and it does not store non-health related self-analytics. In contrast, the PDV system is designed to store all selfanalytics and exclude non-self-analytic healthcare information.
    • Google Health
  • 97
    • 84889746118 scopus 로고    scopus 로고
    • Google health privacy
    • On its site, Google Health states: "Google Health is not regulated by HIPAA. because Google does not store data on behalf of health care providers. Instead, our primary relationship is with⋯ the user.", last visited Jan. 16, 2012
    • On its site, Google Health states: "Google Health is not regulated by [HIPAA]⋯. because Google does not store data on behalf of health care providers. Instead, our primary relationship is with⋯ the user." Google Health Privacy, GOOGLE HEALTH, http://www.google.com/intl/en-US/health/ about/privacy.html (last visited Jan. 16, 2012).
    • Google Health
  • 98
    • 84889741591 scopus 로고    scopus 로고
    • last visited Jan. 16, 2012
    • See MOZY. COM, https://mozy.com/home/pricing/ (last visited Jan. 16, 2012).
  • 99
    • 84889721690 scopus 로고    scopus 로고
    • last visited Jan. 16, 2012
    • See ANONYMIZER. COM, http://www.anonymizer.com/homeuser (last visited Jan. 16, 2012).
  • 100
    • 4243058424 scopus 로고    scopus 로고
    • last visited Jan. 16, 2012
    • See Enrollment, LIFELOCK. COM, https://secure.lifelock.com/enrollment/ (last visited Jan. 16, 2012).
    • Enrollment
  • 101
    • 84889754886 scopus 로고    scopus 로고
    • last visited Jan. 20, 2012
    • ® Frequently Asked Questions, WELLS FARGO, https://wellsfargo.com/help/faqs/wellsfargovsafe (last visited Jan. 20, 2012).
    • ® Frequently Asked Questions
  • 102
    • 84889699317 scopus 로고    scopus 로고
    • last visited Jan. 20, 2012. The site's trademarked motto is, "The Motley Fool: To Educate, Amuse & Enrich."
    • MOTLEY FOOL, http://www.fool.com (last visited Jan. 20, 2012). The site's trademarked motto is, "The Motley Fool: To Educate, Amuse & Enrich."
  • 103
    • 84889737491 scopus 로고    scopus 로고
    • last visited Jan. 20, 2012
    • PRIVACY RIGHTS CLEARINGHOUSE, http://www.privacyrights.org (last visited Jan. 20, 2012).
  • 104
    • 84889744446 scopus 로고    scopus 로고
    • last visited Jan. 20, 2012
    • ELECTRONIC PRIVACY INFO. CTR., http://epic.org (last visited Jan. 20, 2012).
  • 105
    • 84889711073 scopus 로고    scopus 로고
    • available at, Further, there is no evidentiary privilege. The Agreement states: "You understand that we may provide copies of electronic records in your Wells Fargo vSafe Account and our audit logs in response to legal process."
    • ® SERVICE AGREEMENT 2(2008), available at https://www.wellsfargo.com/downloads/pdf/wfonline/vsafe-service- agreement.pdf. Further, there is no evidentiary privilege. The Agreement states: "You understand that we may provide copies of electronic records in your Wells Fargo vSafe Account and our audit logs in response to legal process."
    • (2008) ® Service Agreement , pp. 2
    • Fargo, W.1
  • 106
    • 8744287004 scopus 로고
    • United States: The contradictions of professionalism
    • 188 Richard L. Abel & Philip S. C. Lewis eds., "American lawyers pursued the project of market control through their professional organizations, and they justified those institutions by the axiomatic identification of professionalism with self-regulation. But the actual experience of self-regulation has tended to undermine the profession's claim to privileged immunity from external oversight.". But mild deterrence is better than nothing
    • See Richard L. Abel, United States: The Contradictions of Professionalism, in 1 LAWYERS IN SOCIETY: THE COMMON LAW WORLD 186, 188 (Richard L. Abel & Philip S. C. Lewis eds., 1988) ("American lawyers pursued the project of market control through their professional organizations, and they justified those institutions by the axiomatic identification of professionalism with self-regulation. But the actual experience of self-regulation has tended to undermine the profession's claim to privileged immunity from external oversight."). But mild deterrence is better than nothing.
    • (1988) Lawyers in Society: The Common Law World , vol.1 , pp. 186
    • Abel, R.L.1
  • 107
    • 0039364771 scopus 로고    scopus 로고
    • Protection of human subjects
    • Protection of Human Subjects, 45 C. F. R. § 46 (2010).
    • (2010) C. F. R. , vol.45 , pp. 46
  • 108
    • 84859020226 scopus 로고
    • Basic ethical principles in the conduct of biomedical and behavioral research involving human subjects
    • 8-5 to-6, defining basic principles for research ethics
    • See H. Tristram Engelhart, Jr., Basic Ethical Principles in the Conduct of Biomedical and Behavioral Research Involving Human Subjects, in NAT'L COMM'N FOR THE PROT. OF HUMAN SUBJECTS OF BIOMEDICAL & BEHAVIORAL RESEARCH, THE BELMONT REPORT 7-39, 8-5 to-6 (1979) (defining basic principles for research ethics).
    • (1979) Nat'l Comm'n for the Prot. of Human Subjects of Biomedical & Behavioral Research, the Belmont Report , pp. 7-39
    • Engelhart Jr., H.T.1
  • 109
    • 84889711426 scopus 로고    scopus 로고
    • This is similar to an approach suggested by the Common Data Project, a nonprofit organization developing a cloud service that would allow third parties to query sensitive personal data without revealing that data, available at
    • This is similar to an approach suggested by the Common Data Project, a nonprofit organization developing a cloud service that would allow third parties to query sensitive personal data without revealing that data. THE COMMON DATA PROJECT, WHITE PAPER v. 2 13-31(2011), available at http://www. commondataproject.org/docs/whitepaper.pdf.
    • (2011) The Common Data Project, White Paper V. 2 , pp. 13-31
  • 110
    • 33947166190 scopus 로고    scopus 로고
    • Sun Microsystems Labs., Technical Report No. TR-2005-140, available at
    • See RADIA PERLMAN, THE EPHEMERIZER: MAKING DATA DISAPPEAR (Sun Microsystems Labs., Technical Report No. TR-2005-140, 2005), available at labs.oracle.com/techrep/2005/smli-tr-2005-140.pdf.
    • (2005) The Ephemerizer: Making Data Disappear
    • Perlman, R.1
  • 111
    • 84889734229 scopus 로고    scopus 로고
    • Vanish: Self-destructing digital data
    • last visited Jan. 22, 2012
    • Vanish: Self-Destructing Digital Data, UNIV. OF WASH., http://vanish.cs.washington.edu (last visited Jan. 22, 2012).
    • Univ. of Wash.
  • 112
    • 84859048576 scopus 로고
    • Even without an express designation, in most jurisdictions, intended-beneficiary status might still be found when the circumstances suggest that the party to the contract that extracted the promise the Guardian did so for the benefit of the third party the client
    • See RESTATEMENT (SECOND) OF CONTRACTS § 302 (1981). Even without an express designation, in most jurisdictions, intended-beneficiary status might still be found when the circumstances suggest that the party to the contract that extracted the promise (the Guardian) did so for the benefit of the third party (the client).
    • (1981) Restatement (Second) of Contracts , pp. 302
  • 113
    • 84859048578 scopus 로고    scopus 로고
    • But some jurisdictions, such as New York, resist looking beyond the four corners of the contract., Debary v. Harrah's Operating Co., 263 S. D. N. Y
    • But some jurisdictions, such as New York, resist looking beyond the four corners of the contract. See, e.g., Debary v. Harrah's Operating Co., 465 F. Supp. 2d 250, 263 (S. D. N. Y. 2006)
    • (2006) F. Supp. 2d , vol.465 , pp. 250
  • 114
    • 84859030421 scopus 로고    scopus 로고
    • citing Newman & Schwartz v. Asplundh Tree Expert Co., 2d Cir
    • (citing Newman & Schwartz v. Asplundh Tree Expert Co., 102 F.3d 660 (2d Cir. 1996))
    • (1996) F.3d , vol.102 , pp. 660
  • 115
    • 84859089904 scopus 로고    scopus 로고
    • aff'd sub nom. Catskill Dev., L. L. C. v. Park Place Entm't Corp., 2d Cir, To satisfy these jurisdictions and to avoid the uncertainty that inherently accompanies a judicial determination of intended-beneficiary status, explicit identification of the client as an intended beneficiary in the contract itself makes sense
    • aff'd sub nom. Catskill Dev., L. L. C. v. Park Place Entm't Corp., 547 F.3d 115 (2d Cir. 2008). To satisfy these jurisdictions and to avoid the uncertainty that inherently accompanies a judicial determination of intended-beneficiary status, explicit identification of the client as an intended beneficiary in the contract itself makes sense.
    • (2008) F.3d , vol.547 , pp. 115
  • 116
    • 84859089905 scopus 로고    scopus 로고
    • Courts routinely recognize the right of an intended third-party beneficiary of a contract to recover damages for breach, Cnty. of Santa Clara v. Astra USA, Inc., 1109 9th Cir, finding that local medical clinics are intended third-party beneficiaries that may recover damages from pharmaceutical companies resulting from the alleged breach of pricing agreements with the federal government
    • Courts routinely recognize the right of an intended third-party beneficiary of a contract to recover damages for breach. See, e.g., Cnty. of Santa Clara v. Astra USA, Inc., 540 F.3d 1094, 1109 (9th Cir. 2008) (finding that local medical clinics are intended third-party beneficiaries that may recover damages from pharmaceutical companies resulting from the alleged breach of pricing agreements with the federal government)
    • (2008) F.3d , vol.540 , pp. 1094
  • 117
    • 84859010281 scopus 로고    scopus 로고
    • opinion withdrawn and superseded, 9th Cir
    • opinion withdrawn and superseded, 588 F.3d 1237 (9th Cir. 2009)
    • (2009) F.3d , vol.588 , pp. 1237
  • 118
    • 84859073877 scopus 로고    scopus 로고
    • rev'd, holding that healthcare facilities cannot sue pharmaceutical manufacturers as third-party beneficiaries to enforce pricing agreements between the federal government and the manufacturers because such suits are incompatible with the statutory scheme
    • rev'd, 131 S. Ct. 1342 (2011) (holding that healthcare facilities cannot sue pharmaceutical manufacturers as third-party beneficiaries to enforce pricing agreements between the federal government and the manufacturers because such suits are incompatible with the statutory scheme);
    • (2011) S. Ct. , vol.131 , pp. 1342
  • 119
    • 84999176341 scopus 로고    scopus 로고
    • Colavito v. N. Y. Organ Donor Network, Inc., 2d Cir, holding that a prospective kidney donee who sued a donor network and others when a kidney that was donated on the condition that he receive it was implanted in another person was an intended third-party beneficiary
    • Colavito v. N. Y. Organ Donor Network, Inc., 438 F.3d 214 (2d Cir. 2006) (holding that a prospective kidney donee who sued a donor network and others when a kidney that was donated on the condition that he receive it was implanted in another person was an intended third-party beneficiary)
    • (2006) F.3d , vol.438 , pp. 214
  • 120
    • 84859065157 scopus 로고    scopus 로고
    • certified question answered, N. Y, holding that the intended donee had no common-law right to an incompatible kidney and, thus, no cause of action for conversion, and that the intended donee also had no right of action under New York's Public Health Law for an incompatible kidney
    • certified question answered, 860 N. E.2d 713 (N. Y. 2006) (holding that the intended donee had no common-law right to an incompatible kidney and, thus, no cause of action for conversion, and that the intended donee also had no right of action under New York's Public Health Law for an incompatible kidney);
    • (2006) N. E.2d , vol.860 , pp. 713
  • 121
    • 84859096700 scopus 로고    scopus 로고
    • Vanerian v. Charles L. Pugh Co., 109, 114 Mich. Ct. App, holding that a homeowner was an intended third-party beneficiary of a contract between a subcontractor and a general contractor to install a floor in her home. By contrast, incidental beneficiaries have no legal recourse in the event of a breach
    • Vanerian v. Charles L. Pugh Co., 761 N. W.2d 108, 109, 114 (Mich. Ct. App. 2008) (holding that a homeowner was an intended third-party beneficiary of a contract between a subcontractor and a general contractor to install a floor in her home). By contrast, incidental beneficiaries have no legal recourse in the event of a breach.
    • (2008) N. W.2d , vol.761 , pp. 108
  • 122
    • 0042961664 scopus 로고    scopus 로고
    • "Fraud-detection systems employ some machine learning and statistical analysis algorithms to produce pattern-directed inference systems using models of anomalous or errant transaction behaviors to forewarn of impending threats.", unpublished manuscript, last visited Jan. 22, 2012
    • "[Fraud-detection] systems employ some machine learning and statistical analysis algorithms to produce pattern-directed inference systems using models of anomalous or errant transaction behaviors to forewarn of impending threats." Salvatore J. Stolfo et al., Credit Card Fraud Detection Using Meta-Learning: Issues and Initial Results 1 (unpublished manuscript), http://wenke.gtisc.gatech.edu/papers/credit-card-FD.ps (last visited Jan. 22, 2012).
    • Credit Card Fraud Detection Using Meta-learning: Issues and Initial Results , pp. 1
    • Stolfo, S.J.1
  • 123
    • 0042421807 scopus 로고    scopus 로고
    • Statistical fraud detection: A review
    • For an additional description of fraud-detection systems, see Richard J. Bolton & David J. Hand, Statistical Fraud Detection: A Review, 17 STAT. SCI. 235 (2002).
    • (2002) Stat. Sci. , vol.17 , pp. 235
    • Bolton, R.J.1    Hand, D.J.2
  • 125
    • 77954654234 scopus 로고    scopus 로고
    • In re Jetblue Airways Corp. Privacy Litig., 326-27 E. D. N. Y
    • See In re Jetblue Airways Corp. Privacy Litig., 379 F. Supp. 2d 299, 326-27 (E. D. N. Y. 2005).
    • (2005) F. Supp. 2d , vol.379 , pp. 299
  • 127
    • 84859096699 scopus 로고    scopus 로고
    • Whether violation of contracts guaranteeing privacy allow for damages for emotional distress has seemingly turned on the nature of information that was improperly disclosed. Compare Trikas v. Universal Card Servs. Corp., 46 E. D. N. Y, awarding no damages for improper disclosure of credit report
    • Whether violation of contracts guaranteeing privacy allow for damages for emotional distress has seemingly turned on the nature of information that was improperly disclosed. Compare Trikas v. Universal Card Servs. Corp., 351 F. Supp. 2d 37, 46 (E. D. N. Y. 2005) (awarding no damages for improper disclosure of credit report)
    • (2005) F. Supp. 2d , vol.351 , pp. 37
  • 128
    • 84859059059 scopus 로고
    • with Huskey v. Nat'l Broad. Co., 1293 N. D. Ill, allowing a prisoner to recover damages for defendant's improper national broadcast of images of him incarcerated
    • with Huskey v. Nat'l Broad. Co., 632 F. Supp. 1282, 1293 (N. D. Ill. 1986) (allowing a prisoner to recover damages for defendant's improper national broadcast of images of him incarcerated).
    • (1986) F. Supp. , vol.632 , pp. 1282
  • 129
    • 34547831915 scopus 로고
    • If we assume that this is ultimately grounded in the principles of foreseeability of particular harm by the contracting parties enshrined in Hadley v. Baxendale, Exch. Div. 1854, then the existence of a PDG and the act of stipulating damages itself would seem to alert both parties to the harm and to allow for recovery of damages
    • If we assume that this is ultimately grounded in the principles of foreseeability of particular harm by the contracting parties enshrined in Hadley v. Baxendale, (1854) 156 Eng. Rep. 145 (Exch. Div. 1854), then the existence of a PDG and the act of stipulating damages itself would seem to alert both parties to the harm and to allow for recovery of damages.
    • (1854) Eng. Rep. , vol.156 , pp. 145
  • 130
    • 84889701594 scopus 로고
    • EEOC v. First Citizens Bank of Billings, 403 9th Cir, "Liquidated damages are compensatory, not punitive in nature."
    • See, e.g., EEOC v. First Citizens Bank of Billings, 758 F.2d 397, 403 (9th Cir. 1985) ("Liquidated damages are compensatory, not punitive in nature.");
    • (1985) F.2d , vol.758 , pp. 397
  • 131
    • 84889741409 scopus 로고
    • United States v. Am. Motorists Ins. Co., 1572 Ct. Int'l Trade, "True liquidated damages are not penalties. They are compensatory in nature, providing a measure of recovery when it appears at the time a contract is made that damages caused by breach will be difficult or impossible to estimate."
    • United States v. Am. Motorists Ins. Co., 680 F. Supp. 1569, 1572 (Ct. Int'l Trade 1987) ("True liquidated damages are not penalties. They are compensatory in nature, providing a measure of recovery when it appears at the time a contract is made that damages caused by breach will be difficult or impossible to estimate.").
    • (1987) F. Supp. , vol.680 , pp. 1569


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.