-
1
-
-
84889733946
-
-
last visited Jan. 16, 2012
-
See GOOGLE ANALYTICS, http://www.google.com/analytics/ (last visited Jan. 16, 2012).
-
-
-
-
2
-
-
84889695268
-
-
As of December, The Pulse product is for "employee tracking" by management; in this sense, it is old-school surveillance. By contrast, the Empower product is more for self-analytics in that an individual voluntarily initiates the data collection for self-analysis. But even in this context, the meaning of the data collected turns on "peer" comparisons
-
As of December 2010, RescueTime advertises two products, Pulse and Empower. The Pulse product is for "employee tracking" by management; in this sense, it is old-school surveillance. By contrast, the Empower product is more for self-analytics in that an individual voluntarily initiates the data collection for self-analysis. But even in this context, the meaning of the data collected turns on "peer" comparisons.
-
(2010)
RescueTime Advertises Two Products, Pulse and Empower
-
-
-
3
-
-
84889732796
-
-
last visited Jan. 16, 2012
-
See RESCUETIME, http://www.rescuetime.com/ (last visited Jan. 16, 2012).
-
-
-
-
4
-
-
84889701116
-
-
last visited Jan. 16, 2012
-
See GARMIN CONNECT, http://connect.garmin. com (last visited Jan. 16, 2012)
-
-
-
-
5
-
-
84889762127
-
-
last visited Jan. 16, 2012 making use of Google charting API
-
DAYTUM, http://daytum.com/ (last visited Jan. 16, 2012) (making use of Google charting API);
-
-
-
-
6
-
-
84889737546
-
-
last visited Jan. 16, 2012 pulling data from RescueTime and Twitter and others
-
ME-TRICS, http://beta.me-trics.com/ (last visited Jan. 16, 2012) (pulling data from RescueTime and Twitter and others);
-
-
-
-
7
-
-
84889739892
-
-
last visited Jan. 16, 2012 "A web service that allows you to share snippets of information from the minutiae of daily life in the form of simple statistical graphs."
-
MYCROCOSM, http://mycro.media.mit.edu/ (last visited Jan. 16, 2012) ("[A] web service that allows you to share snippets of information from the minutiae of daily life in the form of simple statistical graphs.");
-
-
-
-
8
-
-
84889731116
-
-
last visited Jan. 16, 2012
-
NIKE+DASHBOARD, http://nikerunning.nike.com/nikeos/p/nikeplus/en-us/ plus#//dashboard (last visited Jan. 16, 2012);
-
-
-
-
9
-
-
84889758520
-
-
last visited Jan. 16, 2012 providing wide-open flexibility over data that can be tracked
-
YOUR. FLOWINGDATA, http://your.flowingdata.com/ (last visited Jan. 16, 2012) (providing wide-open flexibility over data that can be tracked).
-
-
-
-
10
-
-
84889752444
-
Getting fit with 2 bits of help
-
Dec. 17
-
See David Pogue, Getting Fit with 2 Bits of Help, N. Y. TIMES (Dec. 17, 2009), http://www.nytimes.com/2009/12/17/technology/personaltech/17pogue.html.
-
(2009)
N. Y. Times
-
-
Pogue, D.1
-
11
-
-
84889718916
-
-
last visited Jan. 16, 2012
-
See PHILIPS DIRECTLIFE, http://www.directlife.philips.com/ (last visited Jan. 16, 2012).
-
-
-
-
12
-
-
0347989497
-
Information privacy in cyberspace transactions
-
our definition, self-surveillance data refer only to individual human beings and not to, for example, data about corporations or other fictional legal persons. For an explanation of why we exclude non-human persons, 1210-11
-
In our definition, self-surveillance data refer only to individual human beings and not to, for example, data about corporations or other fictional legal persons. For an explanation of why we exclude non-human persons, see Jerry Kang, Information Privacy in Cyberspace Transactions, 50 STAN. L. REV. 1193, 1210-11 (1998).
-
(1998)
Stan. L. Rev.
, vol.50
, pp. 1193
-
-
Kang, J.1
-
14
-
-
12544250445
-
Experience sampling: Promises and pitfalls, strengths and weaknesses
-
describing interval-contingent, eventcontingent, and signal-contingent sampling procedures
-
See, e.g., Christie Napa Scollon et al., Experience Sampling: Promises and Pitfalls, Strengths and Weaknesses, 4 J. HAPPINESS STUD. 5, 5-8 (2003) (describing interval-contingent, eventcontingent, and signal-contingent sampling procedures).
-
(2003)
J. Happiness Stud.
, vol.4
, Issue.5-8
, pp. 5
-
-
Scollon, C.N.1
-
15
-
-
84889733961
-
-
last visited Jan. 16, 2012
-
See URBAN SENSING, http://urban. cens.ucla.edu/ (last visited Jan. 16, 2012).
-
-
-
-
16
-
-
42649113428
-
The value and challenges of participatory research: Strengthening its practice
-
Participatory Sensing is inspired by, and draws its name from, the broader tradition of participatory research "PR". PR is a set of methods that position research subjects as coinvestigators. PR traditions develop their research questions with the cooperation of partner communities and engage community members in research design, implementation, analysis, and dissemination. Involvement with every stage of the research process allows participants to target local knowledge and benefit from the results of systematic investigations. PR successes in health and environmental research have improved the ability of marginalized or underserved groups to act on the results of the data they have helped collect and analyze
-
Participatory Sensing is inspired by, and draws its name from, the broader tradition of participatory research ("PR"). PR is a set of methods that position research subjects as coinvestigators. See Margaret Cargo & Shawna L. Mercer, The Value and Challenges of Participatory Research: Strengthening Its Practice, 29 ANN. REV. PUB. HEALTH 325 (2008). PR traditions develop their research questions with the cooperation of partner communities and engage community members in research design, implementation, analysis, and dissemination. Involvement with every stage of the research process allows participants to target local knowledge and benefit from the results of systematic investigations. PR successes in health and environmental research have improved the ability of marginalized or underserved groups to act on the results of the data they have helped collect and analyze.
-
(2008)
Ann. Rev. Pub. Health
, vol.29
, pp. 325
-
-
Cargo, M.1
Mercer, S.L.2
-
17
-
-
66349103358
-
Community-based participatory research from the margin to the mainstream: Are researchers prepared?
-
See, e.g., Carol R. Horowitz et al., Community-Based Participatory Research from the Margin to the Mainstream: Are Researchers Prepared?, 119 CIRCULATION 2633 (2009).
-
(2009)
Circulation
, vol.119
, pp. 2633
-
-
Horowitz, C.R.1
-
18
-
-
78149290264
-
Open mHealth architecture: An engine for health care innovation
-
See Deborah Estrin & Ida Sim, Open mHealth Architecture: An Engine for Health Care Innovation, 330 SCIENCE 759 (2010);
-
(2010)
Science
, vol.330
, pp. 759
-
-
Estrin, D.1
Sim, I.2
-
19
-
-
79951618488
-
And wellness: An open mobile system for activity and experience sampling
-
Oct. 5-7, at
-
John Hicks et al., AndWellness: An Open Mobile System for Activity and Experience Sampling, WIRELESS HEALTH, Oct. 5-7, 2010, at 34.
-
(2010)
Wireless Health
, pp. 34
-
-
Hicks, J.1
-
20
-
-
84870842643
-
-
last visited Jan. 16, 2012. Although we have highlighted self-surveillance examples, other CENS Participatory Sensing projects extend far beyond this scope. Indeed, such research was launched initially to support sensing activities in which people decide what, how, and when to sense not only themselves but features of the world around them to collect and analyze geotagged imagery in support of ecological, public health, and cultural goals. For example, data can be collected as part of an explicit campaign undertaken by many users in collaboration. One such campaign focused on recycling practices on the UCLA campus. Project participants used phone cameras to document and tag incidences of recyclable materials thrown into garbage cans on campus. The incidents were tallied, mapped, and reported to campus facilities to suggest the most urgent places to add new recycling bins
-
See Our Projects, URBAN SENSING, http://urban. cens.ucla.edu/projects/ (last visited Jan. 16, 2012). Although we have highlighted self-surveillance examples, other CENS Participatory Sensing projects extend far beyond this scope. Indeed, such research was launched initially to support sensing activities in which people decide what, how, and when to sense not only themselves but features of the world around them to collect and analyze geotagged imagery in support of ecological, public health, and cultural goals. For example, data can be collected as part of an explicit campaign undertaken by many users in collaboration. One such campaign focused on recycling practices on the UCLA campus. Project participants used phone cameras to document and tag incidences of recyclable materials thrown into garbage cans on campus. The incidents were tallied, mapped, and reported to campus facilities to suggest the most urgent places to add new recycling bins.
-
Urban Sensing
-
-
-
21
-
-
84870842643
-
-
last visited Jan. 16, 2012. The point here is to make clear that CENS Participatory Sensing projects can easily extend beyond selfsurveillance
-
See Garbage Watch, URBAN SENSING, http://urban. cens.ucla.edu/projects/ gabagewatch/ (last visited Jan. 16, 2012). The point here is to make clear that CENS Participatory Sensing projects can easily extend beyond selfsurveillance.
-
Urban Sensing
-
-
-
23
-
-
84889696350
-
-
last visited Jan. 16, 2012 providing an online example of tests used to measure automatic associations
-
See, e.g., PROJECT IMPLICIT, http://projectimplicit.org (last visited Jan. 16, 2012) (providing an online example of tests used to measure automatic associations).
-
Project Implicit
-
-
-
24
-
-
78649816877
-
Seeing through colorblindness: Implicit bias and the law
-
For recent discussion of implicit bias in the law reviews, see Jerry Kang & Kristin Lane, Seeing Through Colorblindness: Implicit Bias and the Law, 58 UCLA L. REV. 465 (2010).
-
(2010)
UCLA L. Rev.
, vol.58
, pp. 465
-
-
Kang, J.1
Lane, K.2
-
25
-
-
84859079948
-
Benjamin Franklin and the way to virtue
-
Franklin never completed writing his planned work THE ART OF VIRTUE, but he referred to his practice in his autobiography, 200
-
Franklin never completed writing his planned work THE ART OF VIRTUE, but he referred to his practice in his autobiography. See Norman S. Fiering, Benjamin Franklin and the Way to Virtue, 30 AM. Q. 199, 200 (1978).
-
(1978)
AM. Q.
, vol.30
, pp. 199
-
-
Fiering, N.S.1
-
28
-
-
33744908764
-
Pervasive computing: Embedding the public sphere
-
generally, &, including commentary on transparency discussion. Consider, for example, not Google Analytics but Google Trends, which provides visualizations of the relative frequencies of certain search terms
-
See generally Jerry Kang & Dana Cuff, Pervasive Computing: Embedding the Public Sphere, 62 WASH. & LEE L. REV. 93 (2005) (including commentary on transparency discussion). Consider, for example, not Google Analytics but Google Trends, which provides visualizations of the relative frequencies of certain search terms.
-
(2005)
Wash. & Lee L. Rev.
, vol.62
, pp. 93
-
-
Kang, J.1
Cuff, D.2
-
29
-
-
84889703007
-
-
last visited Jan. 16, 2012
-
See GOOGLE TRENDS, http://www.google. com/trends (last visited Jan. 16, 2012).
-
-
-
-
32
-
-
79956051527
-
Conversations about the internet #5: Anonymous facebook employee
-
addition to hackers, one could worry about underpoliced employees with access to servers. Jan. 11, explaining how employees casually viewed private user profiles with a master word that was a variant of "Chuck Norris" internal quotation marks omitted
-
In addition to hackers, one could worry about underpoliced employees with access to servers. See, e.g., Phil Wong, Conversations About the Internet #5: Anonymous Facebook Employee, RUMPUS (Jan. 11, 2010), http://therumpus.net/2010/ 01/conversations-about-the-internet-5-anonymous-facebook-employee/ (explaining how employees casually viewed private user profiles with a master word that was a variant of "Chuck Norris" (internal quotation marks omitted)).
-
(2010)
Rumpus
-
-
Wong, P.1
-
33
-
-
0003488992
-
-
This approach has long been standard in the legal and policy literature, "The basic attribute of an effective right of privacy is the individual's ability to control the circulation of information relating to him-a power that often is essential to maintaining social relationships and personal freedom."
-
This approach has long been standard in the legal and policy literature. ARTHUR R. MILLER, THE ASSAULT ON PRIVACY: COMPUTERS, DATA BANKS, AND DOSSIERS 25 (1971) ("[T]he basic attribute of an effective right of privacy is the individual's ability to control the circulation of information relating to him-a power that often is essential to maintaining social relationships and personal freedom.");
-
(1971)
The Assault on Privacy: Computers, Data Banks, and Dossiers
, pp. 25
-
-
Miller, A.R.1
-
34
-
-
0004073139
-
-
"Privacy is the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others."
-
ALAN F. WESTIN, PRIVACY AND FREEDOM 7 (1967) ("Privacy is the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others.");
-
(1967)
Privacy and Freedom
, pp. 7
-
-
Westin, A.F.1
-
35
-
-
0001601662
-
Privacy
-
482, "Privacy is not simply an absence of information about us in the minds of others; rather it is the control we have over information about ourselves."
-
Charles Fried, Privacy, 77 YALE L. J. 475, 482 (1968) ("Privacy is not simply an absence of information about us in the minds of others; rather it is the control we have over information about ourselves.");
-
(1968)
Yale L. J.
, vol.77
, pp. 475
-
-
Fried, C.1
-
37
-
-
79953883857
-
Commentary, privacy-as-data control: Conceptual, practical, and moral limits of the paradigm
-
Anita Allen has insightfully explored such weirdness., 867-68, Allen points out, "You can invade that is diminish your own privacy the same way you can diminish your own freedom."
-
Anita Allen has insightfully explored such weirdness. See, e.g., Anita L. Allen, Commentary, Privacy-as-Data Control: Conceptual, Practical, and Moral Limits of the Paradigm, 32 CONN. L. REV. 861, 867-68 (2000). Allen points out, "You can invade (that is diminish) your own privacy the same way you can diminish your own freedom."
-
(2000)
Conn. L. Rev.
, vol.32
, pp. 861
-
-
Allen, A.L.1
-
38
-
-
0009301899
-
-
flow conception has affinities with approaches that define privacy in terms of "constraint on access." emphasizing a definition focused on "inaccessibility" of a person to others
-
The flow conception has affinities with approaches that define privacy in terms of "constraint on access." See, e.g., ANITA L. ALLEN, UNEASY ACCESS: PRIVACY FOR WOMEN IN A FREE SOCIETY 3 (1988) (emphasizing a definition focused on "inaccessibility" of a person to others);
-
(1988)
Uneasy Access: Privacy for Women in a Free Society
, pp. 3
-
-
Allen, A.L.1
-
39
-
-
84923486508
-
Privacy and the limits of law
-
428-33, arguing that privacy is a condition that is measured in terms of the degree of access others have to use through information, attention, and proximity
-
Ruth Gavison, Privacy and the Limits of Law, 89 YALE L. J. 421, 428-33 (1980) (arguing that privacy is a condition that is measured in terms of the degree of access others have to use through information, attention, and proximity).
-
(1980)
Yale L. J.
, vol.89
, pp. 421
-
-
Gavison, R.1
-
40
-
-
84859049360
-
Protecting the inner environment: What privacy regulation can learn from environmental law
-
Dennis Hirsch argues that personal information is a resource that behaves similarly to environmental resources, such as fisheries. Just as over use of the fishery will cause it to collapse, so will over use of personal data by commercial data miners, 23-25, 28-30, This may well be true of self-surveillance data
-
Dennis Hirsch argues that personal information is a resource that behaves similarly to environmental resources, such as fisheries. Just as over use of the fishery will cause it to collapse, so will over use of personal data by commercial data miners. See Dennis D. Hirsch, Protecting the Inner Environment: What Privacy Regulation Can Learn from Environmental Law, 41 GA. L. REV. 1, 23-25, 28-30 (2006). This may well be true of self-surveillance data.
-
(2006)
Ga. L. Rev.
, vol.41
, pp. 1
-
-
Hirsch, D.D.1
-
41
-
-
84889752129
-
-
"Cloud computing is the style of computing in which the users can rent infrastructure, platform or software services from other vendors without requiring the physical access to them.", Feb. 23, unpublished manuscript, available at, One characterization of cloud computing emphasizes that users simply do not care about the "location" of data or a particular server
-
"Cloud computing is the style of computing in which the users can rent infrastructure, platform or software services from other vendors without requiring the physical access to them." Karthick Ramachandran, Thomas Margoni & Mark Perry, Clarifying Privacy in the Clouds 3 (Feb. 23, 2011) (unpublished manuscript), available at http://papers.ssrn. com/sol3/Delivery. cfm/SSRN-ID1755225-code1383303.pdf?abstractid=1755225&mirid=1. One characterization of cloud computing emphasizes that users simply do not care about the "location" of data or a particular server.
-
(2011)
Clarifying Privacy in the Clouds
, pp. 3
-
-
Ramachandran, K.1
Margoni, T.2
Perry, M.3
-
42
-
-
79551528884
-
Facebook beacon has poked its last
-
Sept. 18, 11:58 PM
-
See, e.g., Caroline McCarthy, Facebook Beacon Has Poked Its Last, CNET (Sept. 18, 2009, 11:58 PM), http://news.cnet.com/8301-13577-3-10357107-36.html? tag=mncol;txt.
-
(2009)
CNET
-
-
McCarthy, C.1
-
43
-
-
53149088880
-
All the president's spies: Private-public intelligence partnerships in the war on terror
-
It's important to recognize that one of those third parties might be the government, such as in some law-enforcement or national-security project. The state can purchase personal data in the marketplace, subpoena it through legal process, or lean hard on private actors in gray cases to get data, 917-18, 930
-
It's important to recognize that one of those third parties might be the government, such as in some law-enforcement or national-security project. The state can purchase personal data in the marketplace, subpoena it through legal process, or lean hard on private actors in gray cases to get data. See Jon D. Michaels, All the President's Spies: Private-Public Intelligence Partnerships in the War on Terror, 96 CALIF. L. REV. 901, 917-18, 930 (2008).
-
(2008)
Calif. L. Rev.
, vol.96
, pp. 901
-
-
Michaels, J.D.1
-
44
-
-
0039274116
-
Lochner in cyberspace: The new economic orthodoxy of "rights management"
-
For a general, skeptical read of how market-based consent operates in cyberspace and information-technology discourse, see Julie E. Cohen, Lochner in Cyberspace: The New Economic Orthodoxy of "Rights Management", 97 MICH. L. REV. 462 (1998).
-
(1998)
Mich. L. Rev.
, vol.97
, pp. 462
-
-
Cohen, J.E.1
-
45
-
-
84859048517
-
Blind consent? A social psychological investigation of non-readership of click-through agreements
-
For empirical evidence that individuals rarely read "click-through agreements" or understand them, forthcoming
-
For empirical evidence that individuals rarely read "click-through agreements" or understand them, see Victoria C. Plaut & Robert P. Bartlett III, Blind Consent? A Social Psychological Investigation of Non-Readership of Click-Through Agreements, 36 LAW & HUM. BEHAV. (forthcoming 2012).
-
(2012)
Law & Hum. Behav.
, vol.36
-
-
Plaut, V.C.1
Robert III, P.B.2
-
46
-
-
0005462742
-
Commentary, internet privacy and the state
-
822, identifying the problem of "bounded rationality"
-
See, e.g., Paul M. Schwartz, Commentary, Internet Privacy and the State, 32 CONN. L. REV. 815, 822 (2000) (identifying the problem of "bounded rationality").
-
(2000)
Conn. L. Rev.
, vol.32
, pp. 815
-
-
Schwartz, P.M.1
-
47
-
-
0346053624
-
Cyberspace self-governance: A skeptical view from liberal democratic theory
-
476
-
Neil Weinstock Netanel, Cyberspace Self-Governance: A Skeptical View from Liberal Democratic Theory, 88 CALIF. L. REV. 395, 476 (2000).
-
(2000)
Calif. L. Rev.
, vol.88
, pp. 395
-
-
Netanel, N.W.1
-
48
-
-
0003544675
-
-
There may also be more standard forms of collective-action problems as well
-
See CASS R. SUNSTEIN, FREE MARKETS AND SOCIAL JUSTICE 29-30 (1997). There may also be more standard forms of collective-action problems as well.
-
(1997)
Free Markets and Social Justice
, pp. 29-30
-
-
Sunstein, C.R.1
-
49
-
-
40549119452
-
Urban sensing: Out of the woods
-
Mar.
-
see also Dana Cuff, Mark Hansen & Jerry Kang, Urban Sensing: Out of the Woods, COMM. ACM, Mar. 2008, at 24.
-
(2008)
Comm. ACM
, pp. 24
-
-
Cuff, D.1
Hansen, M.2
Kang, J.3
-
50
-
-
32844467792
-
Privacy in atlantis
-
Given the nonrivalrous nature of information, more than one party can "own" various facts, such as the fact that I bought a red scarf on Tuesday for seventy-nine dollars. I possess that fact in my short-term memory. So does my friend who went shopping with me. So does Victoria's Secret. It is a sort of joint possession. For further discussion of this "entitlement anarchy", 238-41
-
Given the nonrivalrous nature of information, more than one party can "own" various facts, such as the fact that I bought a red scarf on Tuesday for seventy-nine dollars. I possess that fact in my short-term memory. So does my friend who went shopping with me. So does Victoria's Secret. It is a sort of joint possession. For further discussion of this "entitlement anarchy", see Jerry Kang & Benedikt Buchner, Privacy in Atlantis, 18 HARV. J. L. & TECH. 229, 238-41 (2004).
-
(2004)
Harv. J. L. & Tech
, vol.18
, pp. 229
-
-
Kang, J.1
Buchner, B.2
-
51
-
-
0346945066
-
Lockean arguments for private intellectual property
-
For careful exploration of the relationship between Lockean desert theory and intellectual property, Stephen R. Munzer ed., where the author argues that Lockean analysis provides a prima facie argument against property rights in intellectual property
-
For careful exploration of the relationship between Lockean desert theory and intellectual property, see Seana Valentine Shiffrin, Lockean Arguments for Private Intellectual Property, in NEW ESSAYS IN THE LEGAL AND POLITICAL THEORY OF PROPERTY 138 (Stephen R. Munzer ed., 2001), where the author argues that Lockean analysis provides a prima facie argument against property rights in intellectual property.
-
(2001)
New Essays in the Legal and Political Theory of Property
, pp. 138
-
-
Shiffrin, S.V.1
-
52
-
-
1542401733
-
An introduction to privacy in economics and politics
-
628-33, arguing that the more accurate classifications will increase economic efficiency
-
See, e.g., George J. Stigler, An Introduction to Privacy in Economics and Politics, 9 J. LEGAL STUD. 623, 628-33 (1980) (arguing that the more accurate classifications will increase economic efficiency).
-
(1980)
J. Legal Stud.
, vol.9
, pp. 623
-
-
Stigler, G.J.1
-
53
-
-
0347315060
-
Freedom of speech and information privacy: The troubling implications of a right to stop people from speaking about you
-
generally
-
See generally Eugene Volokh, Freedom of Speech and Information Privacy: The Troubling Implications of a Right To Stop People from Speaking About You, 52 STAN. L. REV. 1049 (2000).
-
(2000)
Stan. L. Rev.
, vol.52
, pp. 1049
-
-
Volokh, E.1
-
54
-
-
84889755389
-
MyLifeBits
-
last visited Jan. 16, 2012
-
For examples of such ventures, see MyLifeBits, MICROSOFT RESEARCH, http://research. microsoft.com/en-us/projects/mylifebits (last visited Jan. 16, 2012);
-
Microsoft Research
-
-
-
55
-
-
84889705897
-
Total recall: A personal information management system
-
last visited Jan. 16, 2012
-
Total Recall: A Personal Information Management System, USC. EDU, http://bourbon. usc.edu/iml/recall (last visited Jan. 16, 2012).
-
USC. Edu.
-
-
-
56
-
-
34250329971
-
'Outlines of a world coming into existence': Pervasive computing and the ethics of forgetting
-
431, defining Lifelog as a "unified digital record of the totality of an individual's experiences, captured multimodally through digital sensors and stored permanently as a personal multimedia archive"
-
See Martin Dodge & Rob Kitchin, 'Outlines of a World Coming into Existence': Pervasive Computing and the Ethics of Forgetting, 34 ENV'T & PLAN. B: PLAN. & DESIGN 431, 431 (2007) (defining Lifelog as a "unified digital record of the totality of an individual's experiences, captured multimodally through digital sensors and stored permanently as a personal multimedia archive").
-
(2007)
Env't & Plan. B: Plan. & Design
, vol.34
, pp. 431
-
-
Dodge, M.1
Kitchin, R.2
-
57
-
-
84859019568
-
-
Lions Gate Entertainment
-
For science-fiction iterations, see THE FINAL CUT (Lions Gate Entertainment 2004).
-
(2004)
The Final Cut
-
-
-
58
-
-
84889747074
-
Equiveillance: The equilibrium between sur-veillance and sous-veillance
-
May, Mann explains, Surveillance is derived from French "sur" above and "veiller" to watch
-
See Steve Mann, Equiveillance: The Equilibrium Between Sur-veillance and Sous-veillance, ON THE IDENTITY TRAIL, May 2005, available at http://wearcam.org/anonequity.htm. Mann explains, Surveillance is derived from French "sur" (above) and "veiller" (to watch). Typically (though not necessarily) surveillance cameras look down from above, both physically (from high poles) as well as hierarchically (bosses watching employees, citizens watching police, cab drivers photographing passengers, and shopkeepers videotaping shoppers). Likewise Sousveillance, derived from French "sous" (below) and "veiller" (to watch), is the art, science, and technologies of "People Looking at"⋯. [S]ousveillance typically involves small person-centric imaging technologies, whereas surveillance tends to be architecture or enviro-centric (cameras in or on the architecture or environment around us). Sousveillance does not necessarily limit itself to citizens photographing police, shoppers photographing shopkeepers, etc., any more than surveillance limits itself along similar lines. For example, one surveillance camera may be pointed at another, just as one person may sousveill another. Sousveillance therefore expands the range of possibilities, without limitation to the possibility of going both ways in an up-down hierarchy. With the miniaturization of cameras into portable electronic devices, such as camera phones, there has been an increased awareness of sousveillance (more than 30, 000 articles, references, and citations on the word "sousveillance" alone), and we are ready to see a new industry grow around devices that implement sousveillance, together with a new sousveillance services industry.
-
(2005)
On the Identity Trail
-
-
Mann, S.1
-
59
-
-
84992684750
-
Sousveillance: Inventing and using wearable computing devices for data collection in surveillance environments
-
332, discussing the difference between sousveillance and surveillance
-
See generally Steve Mann, Jason Nolan & Barry Wellman, Sousveillance: Inventing and Using Wearable Computing Devices for Data Collection in Surveillance Environments, 1 SURVEILLANCE & SOC'Y 331, 332 (2003) (discussing the difference between sousveillance and surveillance).
-
(2003)
Surveillance & Soc'y
, vol.1
, pp. 331
-
-
Mann, S.1
Nolan, J.2
Wellman, B.3
-
60
-
-
0347684347
-
The death of privacy?
-
1524, describing privacy-enhancing technologies as insufficient to meet the evolving challenges presented by developments in personal-data-collection technology
-
See, e.g., A. Michael Froomkin, The Death of Privacy?, 52 STAN. L. REV. 1461, 1524 (2000) (describing privacy-enhancing technologies as insufficient to meet the evolving challenges presented by developments in personal-data- collection technology);
-
(2000)
Stan. L. Rev.
, vol.52
, pp. 1461
-
-
Froomkin, A.M.1
-
61
-
-
41549098916
-
'Code' and the slow erosion of privacy
-
187, questioning the efficacy of privacy-enhancing technologies as "they remain a mainly theoretical solution that has yet to prove their effect in practice"
-
Bert-Jaap Koops & Ronald Leenes, 'Code' and the Slow Erosion of Privacy, 12 MICH. TELECOMM. & TECH. L. REV. 115, 187 (2005) (questioning the efficacy of privacy-enhancing technologies as "[t]hey remain a mainly theoretical solution that has yet to prove [their] effect in practice");
-
(2005)
Mich. Telecomm. & Tech. L. Rev.
, vol.12
, pp. 115
-
-
Koops, B.1
Leenes, R.2
-
62
-
-
0345792391
-
Privacy as intellectual property?
-
1126, arguing that privacy-enhancing technologies "have thus far done little to make cyberspace more privacyfriendly"
-
Pamela Samuelson, Privacy as Intellectual Property?, 52 STAN. L. REV. 1125, 1126 (2000) (arguing that privacy-enhancing technologies "have thus far done little to make cyberspace more privacyfriendly").
-
(2000)
Stan. L. Rev.
, vol.52
, pp. 1125
-
-
Samuelson, P.1
-
63
-
-
31144473142
-
The banality of fraud: Re-situating the inside counsel as gatekeeper
-
1012
-
For a discussion of "role ideology", see Sung Hui Kim, The Banality of Fraud: Re-Situating the Inside Counsel as Gatekeeper, 74 FORDHAM L. REV. 983, 1012 (2005).
-
(2005)
Fordham L. Rev.
, vol.74
, pp. 983
-
-
Kim, S.H.1
-
64
-
-
85014530583
-
Personal data vaults: A locus of control for personal data streams
-
For technical details and descriptions, see Min Mun et al., Personal Data Vaults: A Locus of Control for Personal Data Streams, in PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE (2010), available at http://dl.acm.org/citation. cfm?id=1921191&bnc=1.
-
(2010)
Proceedings of the 6th International Conference
-
-
Mun, M.1
-
65
-
-
77957594024
-
Broken promises of privacy: Responding to the surprising failure of anonymization
-
1744-45, proposing for legal discourse the term scrub instead of anonymize or deidentify. Ohm points out that reidentification of "anonymized" data has been shown to be much easier than commonly supposed
-
Paul Ohm, Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization, 57 UCLA L. REV. 1701, 1744-45 (2010) (proposing for legal discourse the term scrub instead of anonymize or deidentify). Ohm points out that reidentification of "anonymized" data has been shown to be much easier than commonly supposed.
-
(2010)
UCLA L. Rev.
, vol.57
, pp. 1701
-
-
Ohm, P.1
-
66
-
-
84859062374
-
-
Model Rule of Professional Conduct 5.4 prevents nonlawyers from partial ownership of a law firm. It also prevents lawyers from providing multiple services beyond legal services, such as accounting or healthcare, from the same office
-
Model Rule of Professional Conduct 5.4 prevents nonlawyers from partial ownership of a law firm. It also prevents lawyers from providing multiple services (beyond legal services), such as accounting or healthcare, from the same office. MODEL RULES OF PROF'L CONDUCT R. 5.4 (2005).
-
(2005)
Model Rules of Prof'l Conduct R
, pp. 54
-
-
-
67
-
-
25144479398
-
Rejecting a general privilege for self-critical analyses
-
Some such privileges have been recognized in the context of medical committee reports, affirmative-action studies, and environmental-impact assessments, 552, suggesting that protection for self-critical evaluations has been found in only three contexts: peer reviews, affirmative-action studies, and internal corporate investigations
-
Some such privileges have been recognized in the context of medical committee reports, affirmative-action studies, and environmental-impact assessments. See, e.g., James F. Flanagan, Rejecting a General Privilege for Self-Critical Analyses, 51 GEO. WASH. L. REV. 551, 552 (1983) (suggesting that protection for self-critical evaluations has been found in only three contexts: peer reviews, affirmative-action studies, and internal corporate investigations);
-
(1983)
Geo. Wash. L. Rev.
, vol.51
, pp. 551
-
-
Flanagan, J.F.1
-
68
-
-
84859085675
-
Note, criticizing the self-criticism privilege
-
describing doctrinal evolution of self-criticism privilege
-
S. Kay McNab, Note, Criticizing the Self-Criticism Privilege, 1987 U. ILL. L. REV. 675, 678-82 (describing doctrinal evolution of self-criticism privilege).
-
(1987)
U. Ill. L. Rev.
, vol.675
, pp. 678-682
-
-
McNab, S.K.1
-
69
-
-
84889711810
-
-
We focus on state legislatures because although Federal Rules of Evidence Rule 501 gives the federal courts broad discretion in applying privileges "in the light of reason and experience" within the federal courts, Congress expressly rejected the adoption of any specifically enumerated privileges, Supp
-
We focus on state legislatures because although Federal Rules of Evidence Rule 501 gives the federal courts broad discretion in applying privileges "in the light of reason and experience" within the federal courts, Congress expressly rejected the adoption of any specifically enumerated privileges. CHARLES ALAN WRIGHT & KENNETH W. GRAHAM, JR., FEDERAL PRACTICE AND PROCEDURE: EVIDENCE § 5421, at 587 n. 79 (Supp. 2008);
-
(2008)
Federal Practice and Procedure: Evidence § 5421
, Issue.79
, pp. 587
-
-
Wright, A.W.1
Graham Jr., K.W.2
-
70
-
-
0008925427
-
The new rules of show and tell: Identifying and protecting the peer review and medical committee privileges
-
describing Texas privileges for peer review and medical committees
-
See, e.g., Gail N. Friend et al., The New Rules of Show and Tell: Identifying and Protecting the Peer Review and Medical Committee Privileges, 49 BAYLOR L. REV. 607 (1997) (describing Texas privileges for peer review and medical committees).
-
(1997)
Baylor L. Rev.
, vol.49
, pp. 607
-
-
Friend, G.N.1
-
71
-
-
72749126022
-
-
b 1
-
FED. R. CIV. P. 26 (b) (1) (2010).
-
(2010)
Fed. R. Civ. P.
, pp. 26
-
-
-
72
-
-
84859048574
-
-
West
-
See, e.g., CAL. CIV. PROC. CODE § 2017.010 (West 2007);
-
(2007)
Cal. Civ. Proc. Code
, pp. 2017010
-
-
-
73
-
-
84859031378
-
-
b 1 West
-
COLO. R. CIV. P. 26 (b) (1) (West 2010);
-
(2010)
Colo. R. Civ. P
, pp. 26
-
-
-
74
-
-
77951487421
-
-
b 1
-
KAN. STAT. ANN. § 60-226 (b) (1) (2010);
-
(2010)
Kan. Stat. Ann.
, pp. 60-226
-
-
-
76
-
-
84859074396
-
-
b 1
-
WYO. R. CIV. P. 26 (b) (1) (2011).
-
(2011)
Wyo. R. Civ. P.
, pp. 26
-
-
-
77
-
-
84859089898
-
-
Ledbetter v. Wal-Mart Stores, Inc., No. 06-cv-01958-WYD-MJW, D. Colo. Apr. 21
-
Ledbetter v. Wal-Mart Stores, Inc., No. 06-cv-01958-WYD-MJW, 2009 WL 1067018 (D. Colo. Apr. 21, 2009);
-
(2009)
WL 1067018
, vol.2009
-
-
-
79
-
-
84889719494
-
Ledbetter
-
Ledbetter, 2009 WL 1067018.
-
WL 1067018
, vol.2009
-
-
-
80
-
-
84889752480
-
Ledbetter
-
* 1.
-
WL 1067018
, vol.2009
, pp. 1
-
-
-
81
-
-
84889696152
-
Stored communications act
-
Stored Communications Act, 18 U. S. C. §§ 2701-2712 (Supp. 2010).
-
(2010)
U. S. C.
, vol.18
, Issue.SUPPL.
, pp. 2701-2712
-
-
-
83
-
-
84889719494
-
Ledbetter
-
Ledbetter, 2009 WL 1067018.
-
WL 1067018
, vol.2009
-
-
-
84
-
-
72749126022
-
-
Federal Rule of Civil Procedure 34 states that this requirement applies to "any designated documents or electronically stored information-including writings, drawings, graphs, charts, photographs, sound recording, images, and other data or data compilations-stored in any medium from which information can be obtained either directly or, if necessary, after translation by the responding party into a reasonably usable form.", a 1 A
-
Federal Rule of Civil Procedure 34 states that this requirement applies to "any designated documents or electronically stored information-including writings, drawings, graphs, charts, photographs, sound recording, images, and other data or data compilations-stored in any medium from which information can be obtained either directly or, if necessary, after translation by the responding party into a reasonably usable form." FED. R. CIV. P. 34 (a) (1) (A) (2010).
-
(2010)
Fed. R. Civ. P
, pp. 34
-
-
-
85
-
-
84889696508
-
Ledbetter
-
* 2.
-
WL 1067018
, vol.2009
, pp. 2
-
-
-
86
-
-
72749126022
-
-
b 3 also known as "work product"
-
See FED. R. CIV. P. 26 (b) (3) (also known as "work product").
-
Fed. R. Civ. P
, pp. 26
-
-
-
87
-
-
84889699987
-
-
Unlike the topical privileges that protect facts, a confidential- communications privilege applies only to communications. According to Imwinkelried, "communications" include "expressive statements and acts.", § 6.7.1, at, Richard D. Friedman ed., 2d ed, A statement or act "is expressive if the speaker or writer subjectively intends the statement to convey meaning to a person such as a hearer or reader⋯. State of mind must also exist at a particular time⋯. The transfer of a pre-existing document does not qualify the document for protection. "
-
Unlike the topical privileges that protect facts, a confidential- communications privilege applies only to communications. According to Imwinkelried, "communication[s]" include "expressive statements and acts." EDWARD J. IMWINKELRIED, THE NEW WIGMORE: A TREATISE ON EVIDENCE: EVIDENTIARY PRIVILEGES § 6.7.1, at 731 (Richard D. Friedman ed., 2d ed. 2009). A statement or act "is expressive if the speaker or writer subjectively intends the statement to convey meaning to a person such as a hearer or reader⋯. [S]tate of mind must also exist at a particular time⋯. [T]he transfer of a pre-existing document does not qualify the document for protection. "
-
(2009)
The New Wigmore: A Treatise on Evidence: Evidentiary Privileges
, pp. 731
-
-
Imwinkelried, E.J.1
-
90
-
-
0030241302
-
Markets and privacy
-
Sept, at, 99-101
-
See Kenneth C. Laudon, Markets and Privacy, COMM. ACM, Sept. 1996, at 92, 99-101.
-
(1996)
Comm. ACM
, pp. 92
-
-
Laudon, K.C.1
-
91
-
-
33846522980
-
A coasean analysis of marketing
-
internal quotation marks omitted
-
See Eric Goldman, A Coasean Analysis of Marketing, 2006 WIS. L. REV. 1151, 1202 (internal quotation marks omitted).
-
(2006)
Wis. L. Rev.
, vol.1151
, pp. 1202
-
-
Goldman, E.1
-
92
-
-
84859019912
-
Why some civil law systems burden notice-filing with a civil law notary "public writing" requirement
-
forthcoming, manuscript at, In contrast to notaries in the United States, civil law notaries receive specialized training beyond that of lawyer and generally enjoy higher status and compensation than lawyers
-
See Patrick Del Duca, Why Some Civil Law Systems Burden Notice-Filing with a Civil Law Notary "Public Writing" Requirement, 44 UCC L. J. (forthcoming 2011) (manuscript at 5-6). In contrast to notaries in the United States, civil law notaries receive specialized training beyond that of lawyer and generally enjoy higher status and compensation than lawyers.
-
(2011)
UCC L. J.
, vol.44
, pp. 5-6
-
-
Del Duca, P.1
-
93
-
-
84889735152
-
Health information privacy
-
various moments, we've raised the domain of medical data. One might naturally wonder whether certain medical-privacy laws might apply to the PDV. In particular, the Health Insurance Portability and Accountability Act of 1996 "HIPAA" Privacy Rule "protects the privacy of individually identifiable health information. ", last visited Jan. 16, 2012
-
At various moments, we've raised the domain of medical data. One might naturally wonder whether certain medical-privacy laws might apply to the PDV. In particular, the Health Insurance Portability and Accountability Act of 1996 ("HIPAA") Privacy Rule "protects the privacy of individually identifiable health information. " Health Information Privacy, U. S. DEP'T HEALTH & HUMAN SERVS., http://www.hhs.gov/ocr/privacy/index.html (last visited Jan. 16, 2012).
-
U. S. Dep't Health & Human Servs
-
-
-
94
-
-
84455186585
-
-
For HIPPA, 164, But it applies only to such information held by three types of entities: health plans, healthcare clearinghouses, and certain healthcare providers
-
For HIPPA, see 45 C. F. R. §§ 160, 164 (2010). But it applies only to such information held by three types of entities: health plans, healthcare clearinghouses, and certain healthcare providers.
-
(2010)
C. F. R.
, vol.45
, pp. 160
-
-
-
95
-
-
84889718521
-
-
Because the PDV stores but does not process data, nor acts as an intermediary between health plans and healthcare providers, it cannot be classified under the rule as a healthcare clearinghouse. Were the PDV system to process raw self-analytic data into a standardized format for the benefit of the user, the HIPAA Privacy Rule would still not apply because the PDV system is receiving the data from the individual and the individual determines where this data is transferred. A system somewhat analogous to the PDV system, and which is also not regulated by HIPAA, is Google Health (http://www.google.com/health), a free service designed by Google to "store [and] manage⋯ all of your health⋯ information in one central [online] place."
-
-
-
-
96
-
-
84889702751
-
About google health
-
About Google Health, GOOGLE HEALTH, http://www.google.com/intl/en-US/ health/about/index.html (last visited Nov. 16, 2011) (Google Health has been discontinued as of Jan. 1, 2012). The PDV and Google Health systems are similar to the extent that both may store selfanalytic healthcare information and both serve individuals. However, unlike the PDV system, Google Health's specific purpose is to store all healthcare information, and it does not store non-health related self-analytics. In contrast, the PDV system is designed to store all selfanalytics and exclude non-self-analytic healthcare information.
-
Google Health
-
-
-
97
-
-
84889746118
-
Google health privacy
-
On its site, Google Health states: "Google Health is not regulated by HIPAA. because Google does not store data on behalf of health care providers. Instead, our primary relationship is with⋯ the user.", last visited Jan. 16, 2012
-
On its site, Google Health states: "Google Health is not regulated by [HIPAA]⋯. because Google does not store data on behalf of health care providers. Instead, our primary relationship is with⋯ the user." Google Health Privacy, GOOGLE HEALTH, http://www.google.com/intl/en-US/health/ about/privacy.html (last visited Jan. 16, 2012).
-
Google Health
-
-
-
98
-
-
84889741591
-
-
last visited Jan. 16, 2012
-
See MOZY. COM, https://mozy.com/home/pricing/ (last visited Jan. 16, 2012).
-
-
-
-
99
-
-
84889721690
-
-
last visited Jan. 16, 2012
-
See ANONYMIZER. COM, http://www.anonymizer.com/homeuser (last visited Jan. 16, 2012).
-
-
-
-
100
-
-
4243058424
-
-
last visited Jan. 16, 2012
-
See Enrollment, LIFELOCK. COM, https://secure.lifelock.com/enrollment/ (last visited Jan. 16, 2012).
-
Enrollment
-
-
-
101
-
-
84889754886
-
-
last visited Jan. 20, 2012
-
® Frequently Asked Questions, WELLS FARGO, https://wellsfargo.com/help/faqs/wellsfargovsafe (last visited Jan. 20, 2012).
-
® Frequently Asked Questions
-
-
-
102
-
-
84889699317
-
-
last visited Jan. 20, 2012. The site's trademarked motto is, "The Motley Fool: To Educate, Amuse & Enrich."
-
MOTLEY FOOL, http://www.fool.com (last visited Jan. 20, 2012). The site's trademarked motto is, "The Motley Fool: To Educate, Amuse & Enrich."
-
-
-
-
103
-
-
84889737491
-
-
last visited Jan. 20, 2012
-
PRIVACY RIGHTS CLEARINGHOUSE, http://www.privacyrights.org (last visited Jan. 20, 2012).
-
-
-
-
104
-
-
84889744446
-
-
last visited Jan. 20, 2012
-
ELECTRONIC PRIVACY INFO. CTR., http://epic.org (last visited Jan. 20, 2012).
-
-
-
-
105
-
-
84889711073
-
-
available at, Further, there is no evidentiary privilege. The Agreement states: "You understand that we may provide copies of electronic records in your Wells Fargo vSafe Account and our audit logs in response to legal process."
-
® SERVICE AGREEMENT 2(2008), available at https://www.wellsfargo.com/downloads/pdf/wfonline/vsafe-service- agreement.pdf. Further, there is no evidentiary privilege. The Agreement states: "You understand that we may provide copies of electronic records in your Wells Fargo vSafe Account and our audit logs in response to legal process."
-
(2008)
® Service Agreement
, pp. 2
-
-
Fargo, W.1
-
106
-
-
8744287004
-
United States: The contradictions of professionalism
-
188 Richard L. Abel & Philip S. C. Lewis eds., "American lawyers pursued the project of market control through their professional organizations, and they justified those institutions by the axiomatic identification of professionalism with self-regulation. But the actual experience of self-regulation has tended to undermine the profession's claim to privileged immunity from external oversight.". But mild deterrence is better than nothing
-
See Richard L. Abel, United States: The Contradictions of Professionalism, in 1 LAWYERS IN SOCIETY: THE COMMON LAW WORLD 186, 188 (Richard L. Abel & Philip S. C. Lewis eds., 1988) ("American lawyers pursued the project of market control through their professional organizations, and they justified those institutions by the axiomatic identification of professionalism with self-regulation. But the actual experience of self-regulation has tended to undermine the profession's claim to privileged immunity from external oversight."). But mild deterrence is better than nothing.
-
(1988)
Lawyers in Society: The Common Law World
, vol.1
, pp. 186
-
-
Abel, R.L.1
-
107
-
-
0039364771
-
Protection of human subjects
-
Protection of Human Subjects, 45 C. F. R. § 46 (2010).
-
(2010)
C. F. R.
, vol.45
, pp. 46
-
-
-
108
-
-
84859020226
-
Basic ethical principles in the conduct of biomedical and behavioral research involving human subjects
-
8-5 to-6, defining basic principles for research ethics
-
See H. Tristram Engelhart, Jr., Basic Ethical Principles in the Conduct of Biomedical and Behavioral Research Involving Human Subjects, in NAT'L COMM'N FOR THE PROT. OF HUMAN SUBJECTS OF BIOMEDICAL & BEHAVIORAL RESEARCH, THE BELMONT REPORT 7-39, 8-5 to-6 (1979) (defining basic principles for research ethics).
-
(1979)
Nat'l Comm'n for the Prot. of Human Subjects of Biomedical & Behavioral Research, the Belmont Report
, pp. 7-39
-
-
Engelhart Jr., H.T.1
-
109
-
-
84889711426
-
-
This is similar to an approach suggested by the Common Data Project, a nonprofit organization developing a cloud service that would allow third parties to query sensitive personal data without revealing that data, available at
-
This is similar to an approach suggested by the Common Data Project, a nonprofit organization developing a cloud service that would allow third parties to query sensitive personal data without revealing that data. THE COMMON DATA PROJECT, WHITE PAPER v. 2 13-31(2011), available at http://www. commondataproject.org/docs/whitepaper.pdf.
-
(2011)
The Common Data Project, White Paper V. 2
, pp. 13-31
-
-
-
110
-
-
33947166190
-
-
Sun Microsystems Labs., Technical Report No. TR-2005-140, available at
-
See RADIA PERLMAN, THE EPHEMERIZER: MAKING DATA DISAPPEAR (Sun Microsystems Labs., Technical Report No. TR-2005-140, 2005), available at labs.oracle.com/techrep/2005/smli-tr-2005-140.pdf.
-
(2005)
The Ephemerizer: Making Data Disappear
-
-
Perlman, R.1
-
111
-
-
84889734229
-
Vanish: Self-destructing digital data
-
last visited Jan. 22, 2012
-
Vanish: Self-Destructing Digital Data, UNIV. OF WASH., http://vanish.cs.washington.edu (last visited Jan. 22, 2012).
-
Univ. of Wash.
-
-
-
112
-
-
84859048576
-
-
Even without an express designation, in most jurisdictions, intended-beneficiary status might still be found when the circumstances suggest that the party to the contract that extracted the promise the Guardian did so for the benefit of the third party the client
-
See RESTATEMENT (SECOND) OF CONTRACTS § 302 (1981). Even without an express designation, in most jurisdictions, intended-beneficiary status might still be found when the circumstances suggest that the party to the contract that extracted the promise (the Guardian) did so for the benefit of the third party (the client).
-
(1981)
Restatement (Second) of Contracts
, pp. 302
-
-
-
113
-
-
84859048578
-
-
But some jurisdictions, such as New York, resist looking beyond the four corners of the contract., Debary v. Harrah's Operating Co., 263 S. D. N. Y
-
But some jurisdictions, such as New York, resist looking beyond the four corners of the contract. See, e.g., Debary v. Harrah's Operating Co., 465 F. Supp. 2d 250, 263 (S. D. N. Y. 2006)
-
(2006)
F. Supp. 2d
, vol.465
, pp. 250
-
-
-
114
-
-
84859030421
-
-
citing Newman & Schwartz v. Asplundh Tree Expert Co., 2d Cir
-
(citing Newman & Schwartz v. Asplundh Tree Expert Co., 102 F.3d 660 (2d Cir. 1996))
-
(1996)
F.3d
, vol.102
, pp. 660
-
-
-
115
-
-
84859089904
-
-
aff'd sub nom. Catskill Dev., L. L. C. v. Park Place Entm't Corp., 2d Cir, To satisfy these jurisdictions and to avoid the uncertainty that inherently accompanies a judicial determination of intended-beneficiary status, explicit identification of the client as an intended beneficiary in the contract itself makes sense
-
aff'd sub nom. Catskill Dev., L. L. C. v. Park Place Entm't Corp., 547 F.3d 115 (2d Cir. 2008). To satisfy these jurisdictions and to avoid the uncertainty that inherently accompanies a judicial determination of intended-beneficiary status, explicit identification of the client as an intended beneficiary in the contract itself makes sense.
-
(2008)
F.3d
, vol.547
, pp. 115
-
-
-
116
-
-
84859089905
-
-
Courts routinely recognize the right of an intended third-party beneficiary of a contract to recover damages for breach, Cnty. of Santa Clara v. Astra USA, Inc., 1109 9th Cir, finding that local medical clinics are intended third-party beneficiaries that may recover damages from pharmaceutical companies resulting from the alleged breach of pricing agreements with the federal government
-
Courts routinely recognize the right of an intended third-party beneficiary of a contract to recover damages for breach. See, e.g., Cnty. of Santa Clara v. Astra USA, Inc., 540 F.3d 1094, 1109 (9th Cir. 2008) (finding that local medical clinics are intended third-party beneficiaries that may recover damages from pharmaceutical companies resulting from the alleged breach of pricing agreements with the federal government)
-
(2008)
F.3d
, vol.540
, pp. 1094
-
-
-
117
-
-
84859010281
-
-
opinion withdrawn and superseded, 9th Cir
-
opinion withdrawn and superseded, 588 F.3d 1237 (9th Cir. 2009)
-
(2009)
F.3d
, vol.588
, pp. 1237
-
-
-
118
-
-
84859073877
-
-
rev'd, holding that healthcare facilities cannot sue pharmaceutical manufacturers as third-party beneficiaries to enforce pricing agreements between the federal government and the manufacturers because such suits are incompatible with the statutory scheme
-
rev'd, 131 S. Ct. 1342 (2011) (holding that healthcare facilities cannot sue pharmaceutical manufacturers as third-party beneficiaries to enforce pricing agreements between the federal government and the manufacturers because such suits are incompatible with the statutory scheme);
-
(2011)
S. Ct.
, vol.131
, pp. 1342
-
-
-
119
-
-
84999176341
-
-
Colavito v. N. Y. Organ Donor Network, Inc., 2d Cir, holding that a prospective kidney donee who sued a donor network and others when a kidney that was donated on the condition that he receive it was implanted in another person was an intended third-party beneficiary
-
Colavito v. N. Y. Organ Donor Network, Inc., 438 F.3d 214 (2d Cir. 2006) (holding that a prospective kidney donee who sued a donor network and others when a kidney that was donated on the condition that he receive it was implanted in another person was an intended third-party beneficiary)
-
(2006)
F.3d
, vol.438
, pp. 214
-
-
-
120
-
-
84859065157
-
-
certified question answered, N. Y, holding that the intended donee had no common-law right to an incompatible kidney and, thus, no cause of action for conversion, and that the intended donee also had no right of action under New York's Public Health Law for an incompatible kidney
-
certified question answered, 860 N. E.2d 713 (N. Y. 2006) (holding that the intended donee had no common-law right to an incompatible kidney and, thus, no cause of action for conversion, and that the intended donee also had no right of action under New York's Public Health Law for an incompatible kidney);
-
(2006)
N. E.2d
, vol.860
, pp. 713
-
-
-
121
-
-
84859096700
-
-
Vanerian v. Charles L. Pugh Co., 109, 114 Mich. Ct. App, holding that a homeowner was an intended third-party beneficiary of a contract between a subcontractor and a general contractor to install a floor in her home. By contrast, incidental beneficiaries have no legal recourse in the event of a breach
-
Vanerian v. Charles L. Pugh Co., 761 N. W.2d 108, 109, 114 (Mich. Ct. App. 2008) (holding that a homeowner was an intended third-party beneficiary of a contract between a subcontractor and a general contractor to install a floor in her home). By contrast, incidental beneficiaries have no legal recourse in the event of a breach.
-
(2008)
N. W.2d
, vol.761
, pp. 108
-
-
-
122
-
-
0042961664
-
-
"Fraud-detection systems employ some machine learning and statistical analysis algorithms to produce pattern-directed inference systems using models of anomalous or errant transaction behaviors to forewarn of impending threats.", unpublished manuscript, last visited Jan. 22, 2012
-
"[Fraud-detection] systems employ some machine learning and statistical analysis algorithms to produce pattern-directed inference systems using models of anomalous or errant transaction behaviors to forewarn of impending threats." Salvatore J. Stolfo et al., Credit Card Fraud Detection Using Meta-Learning: Issues and Initial Results 1 (unpublished manuscript), http://wenke.gtisc.gatech.edu/papers/credit-card-FD.ps (last visited Jan. 22, 2012).
-
Credit Card Fraud Detection Using Meta-learning: Issues and Initial Results
, pp. 1
-
-
Stolfo, S.J.1
-
123
-
-
0042421807
-
Statistical fraud detection: A review
-
For an additional description of fraud-detection systems, see Richard J. Bolton & David J. Hand, Statistical Fraud Detection: A Review, 17 STAT. SCI. 235 (2002).
-
(2002)
Stat. Sci.
, vol.17
, pp. 235
-
-
Bolton, R.J.1
Hand, D.J.2
-
125
-
-
77954654234
-
-
In re Jetblue Airways Corp. Privacy Litig., 326-27 E. D. N. Y
-
See In re Jetblue Airways Corp. Privacy Litig., 379 F. Supp. 2d 299, 326-27 (E. D. N. Y. 2005).
-
(2005)
F. Supp. 2d
, vol.379
, pp. 299
-
-
-
127
-
-
84859096699
-
-
Whether violation of contracts guaranteeing privacy allow for damages for emotional distress has seemingly turned on the nature of information that was improperly disclosed. Compare Trikas v. Universal Card Servs. Corp., 46 E. D. N. Y, awarding no damages for improper disclosure of credit report
-
Whether violation of contracts guaranteeing privacy allow for damages for emotional distress has seemingly turned on the nature of information that was improperly disclosed. Compare Trikas v. Universal Card Servs. Corp., 351 F. Supp. 2d 37, 46 (E. D. N. Y. 2005) (awarding no damages for improper disclosure of credit report)
-
(2005)
F. Supp. 2d
, vol.351
, pp. 37
-
-
-
128
-
-
84859059059
-
-
with Huskey v. Nat'l Broad. Co., 1293 N. D. Ill, allowing a prisoner to recover damages for defendant's improper national broadcast of images of him incarcerated
-
with Huskey v. Nat'l Broad. Co., 632 F. Supp. 1282, 1293 (N. D. Ill. 1986) (allowing a prisoner to recover damages for defendant's improper national broadcast of images of him incarcerated).
-
(1986)
F. Supp.
, vol.632
, pp. 1282
-
-
-
129
-
-
34547831915
-
-
If we assume that this is ultimately grounded in the principles of foreseeability of particular harm by the contracting parties enshrined in Hadley v. Baxendale, Exch. Div. 1854, then the existence of a PDG and the act of stipulating damages itself would seem to alert both parties to the harm and to allow for recovery of damages
-
If we assume that this is ultimately grounded in the principles of foreseeability of particular harm by the contracting parties enshrined in Hadley v. Baxendale, (1854) 156 Eng. Rep. 145 (Exch. Div. 1854), then the existence of a PDG and the act of stipulating damages itself would seem to alert both parties to the harm and to allow for recovery of damages.
-
(1854)
Eng. Rep.
, vol.156
, pp. 145
-
-
-
130
-
-
84889701594
-
-
EEOC v. First Citizens Bank of Billings, 403 9th Cir, "Liquidated damages are compensatory, not punitive in nature."
-
See, e.g., EEOC v. First Citizens Bank of Billings, 758 F.2d 397, 403 (9th Cir. 1985) ("Liquidated damages are compensatory, not punitive in nature.");
-
(1985)
F.2d
, vol.758
, pp. 397
-
-
-
131
-
-
84889741409
-
-
United States v. Am. Motorists Ins. Co., 1572 Ct. Int'l Trade, "True liquidated damages are not penalties. They are compensatory in nature, providing a measure of recovery when it appears at the time a contract is made that damages caused by breach will be difficult or impossible to estimate."
-
United States v. Am. Motorists Ins. Co., 680 F. Supp. 1569, 1572 (Ct. Int'l Trade 1987) ("True liquidated damages are not penalties. They are compensatory in nature, providing a measure of recovery when it appears at the time a contract is made that damages caused by breach will be difficult or impossible to estimate.").
-
(1987)
F. Supp.
, vol.680
, pp. 1569
-
-
|