-
1
-
-
0344162935
-
The Right to Privacy in Nineteenth Century America
-
Comment, The Right to Privacy in Nineteenth Century America, 94 HARV. L. REV. 1892, 1909 (1981) (citing Edward L. Godkin, Libel and Its Legal Remedy, 12 J. SOC. SCI. 69, 80 (1880)).
-
(1981)
Harv. L. Rev.
, vol.94
, pp. 1892
-
-
-
2
-
-
0346300907
-
Libel and Its Legal Remedy
-
Comment, The Right to Privacy in Nineteenth Century America, 94 HARV. L. REV. 1892, 1909 (1981) (citing Edward L. Godkin, Libel and Its Legal Remedy, 12 J. SOC. SCI. 69, 80 (1880)).
-
(1880)
J. Soc. Sci.
, vol.12
, pp. 69
-
-
Godkin, E.L.1
-
3
-
-
0004073139
-
-
For clarity of understanding and usage, the authors accept and use herein Alan Westin's concise definition of privacy: "Privacy is the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others." ALAN WESTIN, PRIVACY AND FREEDOM 7 (1967).
-
(1967)
Privacy and Freedom
, pp. 7
-
-
Westin, A.1
-
5
-
-
0000320829
-
The Right to Privacy
-
Louis D. Brandeis & Samual D. Warren, The Right to Privacy, 4 HARV. L. REV. 193 (1890). Brandeis was continually concerned with the prospect of new technology allowing or even inducing greater personal invasions. He considered personal privacy "the most comprehensive of all rights" and the right most cherished by citizens of a free nation. U.S. PRIVACY COUNCIL AND COMPUTER PROFESSIONALS FOR SOCIAL RESPONSIBILITY, PRIVACY LAW IN THE UNITED STATES: FAILING TO MAKE THE GRADE i (June 1991) (available from CPSR, 666 Pennsylvania Ave., Washington, D.C. 20003).
-
(1890)
Harv. L. Rev.
, vol.4
, pp. 193
-
-
Brandeis, L.D.1
Warren, S.D.2
-
6
-
-
0347562103
-
-
June available from CPSR, 666 Pennsylvania Ave., Washington, D.C. 20003
-
Lois D. Brandeis & Samual D. Warren, The Right to Privacy, 4 HARV. L. REV. 193 (1890). Brandeis was continually concerned with the prospect of new technology allowing or even inducing greater personal invasions. He considered personal privacy "the most comprehensive of all rights" and the right most cherished by citizens of a free nation. U.S. PRIVACY COUNCIL AND COMPUTER PROFESSIONALS FOR SOCIAL RESPONSIBILITY, PRIVACY LAW IN THE UNITED STATES: FAILING TO MAKE THE GRADE i (June 1991) (available from CPSR, 666 Pennsylvania Ave., Washington, D.C. 20003).
-
(1991)
U.S. Privacy Council and Computer Professionals for Social Responsibility, Privacy Law in the United States: Failing to Make the Grade
-
-
-
7
-
-
55249097295
-
Four Ethical Issues of the Information Age
-
Mar.
-
Richard Mason, Four Ethical Issues of The Information Age, MIS Q., Mar. 1986, at 5.
-
(1986)
Mis Q.
, pp. 5
-
-
Mason, R.1
-
8
-
-
84923733568
-
Privacy Legislation - Implications for Employers
-
Gary Murg & Marilyn Maledon, Privacy Legislation - Implications for Employers, 3 EMP. REL. L.J. 168 (1977).
-
(1977)
Emp. Rel. L.J.
, vol.3
, pp. 168
-
-
Murg, G.1
Maledon, M.2
-
9
-
-
84923752138
-
-
Id.
-
Id.
-
-
-
-
10
-
-
0348191634
-
The Common Law Right to Privacy
-
David S. Hames & Nicki Dierson, The Common Law Right to Privacy, 42 LAB. L.J. 757 (1991). See also Thomas E. Reinert, Jr., Federal Protection of Employment Record Privacy, 18 HARV. J. LEG. 207 (1981).
-
(1991)
Lab. L.J.
, vol.42
, pp. 757
-
-
Hames, D.S.1
Dierson, N.2
-
11
-
-
84925929706
-
Federal Protection of Employment Record Privacy
-
David S. Hames & Nicki Dierson, The Common Law Right to Privacy, 42 LAB. L.J. 757 (1991). See also Thomas E. Reinert, Jr., Federal Protection of Employment Record Privacy, 18 HARV. J. LEG. 207 (1981).
-
(1981)
Harv. J. Leg.
, vol.18
, pp. 207
-
-
Reinert T.E., Jr.1
-
12
-
-
0346930996
-
Legal Issues Presented by Hair Follicle Testing
-
Win.
-
Ann M. O'Neill, Legal Issues Presented by Hair Follicle Testing, EMP. REL. TODAY 411 (Win. 1991/92).
-
(1991)
Emp. Rel. Today
, pp. 411
-
-
O'Neill, A.M.1
-
14
-
-
0001028235
-
Bosses with X-Ray Eyes
-
July Special Report on Electronic Privacy, Workplace and Consumer Privacy Under Siege
-
Charles Piller, Bosses with X-Ray Eyes, MACWORLD, July 1993, at 2 (Special Report on Electronic Privacy, Workplace and Consumer Privacy Under Siege).
-
(1993)
MACWORLD
, pp. 2
-
-
Piller, C.1
-
15
-
-
84923752137
-
-
Id. at 1
-
Id. at 1.
-
-
-
-
16
-
-
84923752136
-
-
Id. at 2, 6
-
Id. at 2, 6; 9TO5, THE PRIVACY FOR CONSUMERS AND WORKERS ACT 1 (undated publication, available from 9to5, 250 10th St., Atlanta, GA 30309).
-
-
-
-
17
-
-
84923752135
-
-
undated publication, available from 9to5, 250 10th St., Atlanta, GA 30309
-
Id. at 2, 6; 9TO5, THE PRIVACY FOR CONSUMERS AND WORKERS ACT 1 (undated publication, available from 9to5, 250 10th St., Atlanta, GA 30309).
-
The Privacy for Consumers and Workers Act
, pp. 1
-
-
-
18
-
-
84923752134
-
-
PWCA Hearings, supra note 10, at 7
-
PWCA Hearings, supra note 10, at 7.
-
-
-
-
19
-
-
84923752133
-
-
note
-
As the Constitution protects only against State action, private sector employees are not subject to Fourth Amendment protection from unreasonable searches and seizures. Borse v. Piece Goods Shop, Inc., 963 F.2d 611, 618 (3d Cir. 1992); Wagner v. Metropolitan Nashville Airport Auth., 772 F.2d 227, 230 (6th Cir. 1985); United States v. Gumerlock, 590 F.2d 794 (9th Cir. 1979) (en banc); Booth v. McDonnell Douglas Truck Services, Inc., 585 A.2d 24, 39, appeal denied, 597 A.2d 1150 (Pa. 1991).
-
-
-
-
20
-
-
84923752132
-
-
note
-
Among these are the freedom of speech, beliefs, and associations, the right to due process of law, the right to not testify against oneself, and the protection against unreasonable searches and seizures.
-
-
-
-
21
-
-
0346930995
-
The Meaning of State Action
-
For a more complete discussion of the state action requirement, see Thomas Lewis, The Meaning of State Action, 60 COLUM. L. REV. 1083 (1960).
-
(1960)
Colum. L. Rev.
, vol.60
, pp. 1083
-
-
Lewis, T.1
-
22
-
-
84923752131
-
-
note
-
In addition, judges have developed case law that specifically affords individuals a constitutional right to privacy. Roe v. Wade, 410 U.S. 113, 154-64 (1973); Doe v. Taylor Indep. School Dist., 15 F.3d 443 (5th Cir. 1994); Walters v. Webre, 88 B.R. 242, 245 (9th Cir. 1988); Hoffman v. United States, 767 F.2d 1431, 1434-35 (9th Cir. 1985). This "right to privacy," while vague in some cases, has slowly been expanded by the courts to include such areas as sexual intercourse, child-bearing and rearing, affinity orientation, and other personal realms if the intrusion is made by the State. Thorne v. City of El Segundo, 726 F.2d 459, 468-72 (9th Cir. 1983) (investigation regarding police officer applicant's sexual involvement with a married man was found to violate individual's right to privacy); Greenberg v. Kimmelman, 494 A.2d 294 (N.J. 1985) (right to privacy in marriage and familial associations); In re Quinlan, 355 A.2d 647 (N.J. 1976) (right to privacy in refusal of medical treatment); State v. Saunders, 381 A.2d 333 (N.J. 1977) (right to privacy in consensual adult sexual relations). But see Hedge v. County of Tippecanoe, 890 F.2d 4, 7 (7th Cir. 1989) (court recognized a confidentiality strand in the constitutional right to privacy but found that case law had not advanced to the stage at which there was a clearly established constitutional right to be free from employment questions regarding sexual history). Courts are more apt to rely on clearly established and articulated state common, statutory, or constitutional law in finding a right of privacy. See, e.g., Borse v. Piece Goods Shop, 963 F.2d at 620, 623 n.12 (finding a common law right to privacy in Pennsylvania which precludes an employer from requiring employees to furnish urine samples as part of a drug prevention program); Sanders v. Parker Drilling Co., 911 F.2d 191, 195 n.3 (9th Cir. 1990) (applying Alaska constitutional right to privacy).
-
-
-
-
23
-
-
84923752130
-
-
See infra notes 60-112 and accompanying text
-
See infra notes 60-112 and accompanying text.
-
-
-
-
25
-
-
84923752129
-
-
note
-
See also MASS. ANN. LAWS ch. 66A, §§ 1-3, ch. 214, § 3B (Law. Co-op. 1987); MINN. STAT. ANN. §§ 13.02-.09 (West 1988); OHIO REV. CODE ANN. §§ 1347.01-.10, 1347.99 (Baldwin 1993); UTAH CODE ANN. §§ 63-50-1 to -10 (1993); VA. CODE ANN. §§ 2.1-377 to -386 (Michie 1987).
-
-
-
-
26
-
-
84923752128
-
-
While some state constitutions recognize a right to privacy, e.g. ALASKA CONST. art. I, § 22; ARIZ. CONST. art. II, § 8; CAL. CONST. art. I, § 1; WASH. CONST. art. I, § 7, courts have held that many of these provisions do not protect against private sector invasions.
-
While some state constitutions recognize a right to privacy, e.g. ALASKA CONST. art. I, § 22; ARIZ. CONST. art. II, § 8; CAL. CONST. art. I, § 1; WASH. CONST. art. I, § 7, courts have held that many of these provisions do not protect against private sector invasions. See, e.g., Luedtke v. Nabors Alaska Drilling, Inc., 768 P.2d 1123 (Alaska 1989). See also IRA M. SHEPARD, WORKPLACE PRIVACY: EMPLOYEE TESTING, SURVEILLANCE, WRONGFUL DISCHARGE, AND OTHER AREAS OF VULNERABILITY 31 (2d ed. 1989).
-
-
-
-
27
-
-
84923752127
-
-
See, e.g., Luedtke v. Nabors Alaska Drilling, Inc., 768 P.2d 1123 (Alaska 1989).
-
While some state constitutions recognize a right to privacy, e.g. ALASKA CONST. art. I, § 22; ARIZ. CONST. art. II, § 8; CAL. CONST. art. I, § 1; WASH. CONST. art. I, § 7, courts have held that many of these provisions do not protect against private sector invasions. See, e.g., Luedtke v. Nabors Alaska Drilling, Inc., 768 P.2d 1123 (Alaska 1989). See also IRA M. SHEPARD, WORKPLACE PRIVACY: EMPLOYEE TESTING, SURVEILLANCE, WRONGFUL DISCHARGE, AND OTHER AREAS OF VULNERABILITY 31 (2d ed. 1989).
-
-
-
-
28
-
-
0003541177
-
-
2d ed.
-
While some state constitutions recognize a right to privacy, e.g. ALASKA CONST. art. I, § 22; ARIZ. CONST. art. II, § 8; CAL. CONST. art. I, § 1; WASH. CONST. art. I, § 7, courts have held that many of these provisions do not protect against private sector invasions. See, e.g., Luedtke v. Nabors Alaska Drilling, Inc., 768 P.2d 1123 (Alaska 1989). See also IRA M. SHEPARD, WORKPLACE PRIVACY: EMPLOYEE TESTING, SURVEILLANCE, WRONGFUL DISCHARGE, AND OTHER AREAS OF VULNERABILITY 31 (2d ed. 1989).
-
(1989)
Workplace Privacy: Employee Testing, Surveillance, Wrongful Discharge, and Other Areas of Vulnerability
, pp. 31
-
-
Shepard, I.M.1
-
29
-
-
84923752126
-
-
supra note 6
-
Not only is private sector legislation warranted, but it has been forecasted since as early as the mid-1970's. See Murg & Maledon, supra note 6;
-
-
-
Murg1
Maledon2
-
30
-
-
0017152814
-
Privacy and Personnel, A Time for Action
-
Schien, Privacy and Personnel, A Time for Action, 55 PERS. J. 604 (1976).
-
(1976)
Pers. J.
, vol.55
, pp. 604
-
-
Schien1
-
33
-
-
84923752125
-
-
Id.
-
Id.
-
-
-
-
34
-
-
84923752124
-
-
note
-
Roe v. Wade, 410 U.S. 113, 154-64 (1973); Walters v. Webre, 88 B.R. 242, 245 (9th Cir. 1988) (identifying a fundamental right as "one based expressly on the terms of the Constitution or necessarily implied therefrom, for example, privacy"); Hoffman v. United States, 767 F.2d 1431, 1434-35 (9th Cir. 1985). See also Planned Parenthood of Southeastern Pennsylvania, 112 S. Ct. 2791, 2846 (1992); Webster v. Reproductive Health Services, 492 U.S. 490 (1989).
-
-
-
-
35
-
-
84923752123
-
-
See infra notes 183-96 and accompanying text
-
See infra notes 183-96 and accompanying text.
-
-
-
-
36
-
-
0346930989
-
The Americans with Disabilities Act: Employers' New Responsibilities to HIV-Positive Employees
-
For a general discussion of the job-relatedness of HIV, see Laura B. Pincus, The Americans With Disabilities Act: Employers' New Responsibilities to HIV-Positive Employees, 21 HOFSTRA L. REV. 561 (1993).
-
(1993)
Hofstra L. Rev.
, vol.21
, pp. 561
-
-
Pincus, L.B.1
-
37
-
-
0013526066
-
Four-Point Plan Helps Solve Harassment Problems
-
May
-
Samuel J. Bresler & Rebecca Thacker, Four-Point Plan Helps Solve Harassment Problems, HRMAGAZINE, May 1993, at 117; Ira M. Shepard & Chris Mason, The Unwanted Advance, BUS. L. TODAY, Jan./Feb. 1993, at 4, 7; Elizabeth R. Koller, Sexual Harassment Laws: Have We Gone Too Far? 4 (unpublished manuscript on file with the authors).
-
(1993)
HRMagazine
, pp. 117
-
-
Bresler, S.J.1
Thacker, R.2
-
38
-
-
0346300880
-
The Unwanted Advance
-
Jan./Feb.
-
Samuel J. Bresler & Rebecca Thacker, Four-Point Plan Helps Solve Harassment Problems, HRMAGAZINE, May 1993, at 117; Ira M. Shepard & Chris Mason, The Unwanted Advance, BUS. L. TODAY, Jan./Feb. 1993, at 4, 7; Elizabeth R. Koller, Sexual Harassment Laws: Have We Gone Too Far? 4 (unpublished manuscript on file with the authors).
-
(1993)
Bus. L. Today
, pp. 4
-
-
Shepard, I.M.1
Mason, C.2
-
39
-
-
84923742161
-
-
unpublished manuscript on file with the authors
-
Samuel J. Bresler & Rebecca Thacker, Four-Point Plan Helps Solve Harassment Problems, HRMAGAZINE, May 1993, at 117; Ira M. Shepard & Chris Mason, The Unwanted Advance, BUS. L. TODAY, Jan./Feb. 1993, at 4, 7; Elizabeth R. Koller, Sexual Harassment Laws: Have We Gone Too Far? 4 (unpublished manuscript on file with the authors).
-
Sexual Harassment Laws: Have we Gone Too Far?
, pp. 4
-
-
Koller, E.R.1
-
40
-
-
84923752122
-
-
See Piller, supra note 11, at 4
-
See Piller, supra note 11, at 4.
-
-
-
-
41
-
-
84923752121
-
-
See Hames & Dierson, supra note 8. See also Reinert, supra note 8
-
See Hames & Dierson, supra note 8. See also Reinert, supra note 8.
-
-
-
-
43
-
-
84923752120
-
-
Id. at 2
-
Id. at 2.
-
-
-
-
45
-
-
85080838406
-
Remember Big Brother? Now; He's a Company Man
-
Mar 31
-
Remember Big Brother? Now; He's A Company Man, N.Y. TIMES, Mar 31, 1991, at E7.
-
(1991)
N.Y. Times
-
-
-
47
-
-
0010108584
-
Who's Watching the Workplace?
-
Caroline Cooney, Who's Watching the Workplace?, 35 SECURITY MANAGEMENT 26, 26 (1991).
-
(1991)
Security Management
, vol.35
, pp. 26
-
-
Cooney, C.1
-
48
-
-
84923752119
-
-
Id.
-
Id.
-
-
-
-
49
-
-
84923752118
-
-
Id.
-
Id.
-
-
-
-
50
-
-
84923752117
-
-
note
-
These states include Alaska (ALASKA STAT. § 23.10.037(a) (1986)), Connecticut (CONN. GEN. STAT. ANN. § 31-51g (West 1987)), Delaware (DEL. CODE ANN. tit. 19, § 704 (19861) District of Columbia (prohibited as a condition of employment, D.C. CODE ANN. § 36 801-803 (1981)), Hawaii (HAW. REV. STAT. § 378-21 (1985)), Idaho (prohibited in private sector, IDAHO CODE § 44-903 (1973)), Iowa (may not require as a condition of employment, IOWA CODE ANN. § 730-4 (West 1987)), Maine (ME. REV. STAT. ANN. tit. 32, § 7154 (West 1979)), Massachusetts (may not require as a condition of employment, MASS. ANN. LAWS, ch. 149, § 19B(2) (Law. Co-op. 1987)), Montana (may not require as a condition of employment, MONT. CODE ANN. § 39-2-304 (1987)), New Jersey (N.J. STAT. ANN. § 2C:40A-1 (West 1987)), New York (N.Y. LAB. LAW § 733 (McKinney 1987)), Pennnsylvania (PA. CONS. STAT. ANN. § 7321 (1987)), Rhode Island (R.I. GEN. LAWS §§ 28-6.1-1 to 28-6.1-3 (1987)), Vermont (VT. STAT. ANN. tit. 21, § 494 (1993)), Washington (WASH. REV. CODE ANN. § 49.44.120 (West 1987)), and West Virginia (W. VA. CODE § 21-5-5a (1983)).
-
-
-
-
51
-
-
84923752116
-
-
note
-
The following states prohibit mandatory polygraph examinations: Alabama (ALA. CODE § 34 25-4 (1994)), Arkansas (ARK. CODE ANN. § 17-32-211 (Michie 1987)), Louisiana (LA. REV. STAT. ANN. tit. 37, § 36A:2835 (West 1993)), Maryland (MD. LABOR & EMP'T CODE ANN. § 30-702 (1991)), Michigan (MICH. COMP. LAWS ANN. § 37.201 (West 1987)), Minnesota (MINN. STAT. ANN. § 181.75(1) (West 1987)), Mississippi (MISS. CODE ANN. § 73-29-31 (1980)), Oklahoma (OKLA. STAT. ANN. tit. 59, § 1455 (West 1994)), South Carolina (S.C. CODE ANN. § 40-53-180 (Law. Co-op. 1972)), and Texas (TEX. REV. CIV. STAT. ANN. art. 4413(29cc) (West 1987)).
-
-
-
-
52
-
-
84923752115
-
-
note
-
5 U.S.C. § 552 (1988). While the purpose of the FOIA is to allow for more complete disclosure of public information within the control of the federal government to the public, the FOIA also protects public sector employees in that the government must delete formation from the records provided if the disclosure of that information would constitute an excessive invasion of the subject's privacy Id. § 552(a)(2). Where a named subject is also a public sector employer, he or she is therefore protected.
-
-
-
-
53
-
-
84923752114
-
-
note
-
Pub. L. No. 91-508, § 601, 84 Stat. 1127 (1970) (codified at 15 U.S.C. §§1681-1681t (1988)) See infra notes 82-90 and accompanying text.
-
-
-
-
54
-
-
84923752113
-
-
note
-
5 U.S.C. § 552a (1988); see infra notes 126-46 and accompanying text.
-
-
-
-
55
-
-
84923752112
-
-
Murg & Maledon, supra note 6, at 172
-
Murg & Maledon, supra note 6, at 172.
-
-
-
-
56
-
-
84923752111
-
-
Pub. L. No 93-579, § 5(b)(2), 88 Stat. 1906 (1974)
-
Pub. L. No 93-579, § 5(b)(2), 88 Stat. 1906 (1974).
-
-
-
-
57
-
-
84923752110
-
-
note
-
There have been bills proposed both in the House (e.g., H.R. 1218 102d Cong., 1st Sess. (1991)) and the Senate (e.g., S. 516, 102d Cong., 1st Sess. (1991)), relating to privacy protection. H.R. 1218, for example, would have protected workers against surreptitious or electronic monitoring and required notification to a prospective or current worker of the existing forms of monitoring to which she or he might be subject. H.R. 1218, 102d Cong., 1st Sess. § 3 (1991). The bill provided that employees would have access to the information collected and maintained, id. § 4, and created a private right of action to harmed employees, id. § 7.
-
-
-
-
58
-
-
84995188499
-
The 1992 EC Data Protection Proposal: An Examination of Its Implications for U.S. Business and U.S. Privacy Law
-
See Robert Boehmer & Todd Palmer, The 1992 EC Data Protection Proposal: An Examination of Its Implications for U.S. Business and U.S. Privacy Law, 31 AM. BUS. L.J. 265 (1993).
-
(1993)
Am. Bus. L.J.
, vol.31
, pp. 265
-
-
Boehmer, R.1
Palmer, T.2
-
59
-
-
0040397312
-
-
While the German State of Hesse passed one of the first data protection laws in 1970, a nationwide data protection law was not enacted in Germany until 1978. WAYNE MADSEN, HANDBOOK OF PERSONAL DATA PROTECTION 24 (1992).
-
(1992)
Handbook of Personal Data Protection
, pp. 24
-
-
Madsen, W.1
-
60
-
-
84923752109
-
-
Id.
-
Id..
-
-
-
-
61
-
-
84923752107
-
-
note
-
GESETZ ZUM SCHUTZ VOR MISSBRAUCH PERSONENBEZOGENER DATEN BEI DER DATENVERARBEITUNG OR BUDESDATENSCHUTZGESETZ - BDSG, translated in LAW ON THE PROTECTION AGAINST MISUSE OF PERSONAL DATA IN DATA PROCESSING, GESETZ ZUM SCHUTZ VOR MISSBRAUCH PERSONENBEZOGENER DATEN (Ursula Gleiss ed. & trans., 1977). The 1991 Amendments to the Act were called GESETZ ZUR FORTENWICKLUNG DER DATEN VERARBEITUNG UND DES DATENSCHUTZES.
-
-
-
-
62
-
-
84923752105
-
-
MADSEN, supra note 50, at 35-37
-
MADSEN, supra note 50, at 35-37.
-
-
-
-
63
-
-
0348191614
-
-
O.E.C.D. Doc. C(80) 58 final Oct. 1, reprinted in 20 I.L.M. 422 (1981) [hereinafter OECD GUIDELINES]
-
ORGANIZATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT, RECOMMENDATION OF THE COUNCIL CONCERNING GUIDELINES GOVERNING THE PROTECTION OF PRIVACY AND TRANSBORDER FLOWS OF PERSONAL DATA, O.E.C.D. Doc. C(80) 58 final (Oct. 1, 1980), reprinted in 20 I.L.M. 422 (1981) [hereinafter OECD GUIDELINES]. For a more complete discussion of the Guidelines, see Boehmer & Palmer, supra, note 49, at 273-76.
-
(1980)
Organization for Economic Co-operation and Development, Recommendation of the Council Concerning Guidelines Governing the Protection of Privacy and Transborder Flows of Personal Data
-
-
-
64
-
-
84923752096
-
-
For a more complete discussion of the Guidelines, see Boehmer & Palmer, supra, note 49, at 273-76
-
ORGANIZATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT, RECOMMENDATION OF THE COUNCIL CONCERNING GUIDELINES GOVERNING THE PROTECTION OF PRIVACY AND TRANSBORDER FLOWS OF PERSONAL DATA, O.E.C.D. Doc. C(80) 58 final (Oct. 1, 1980), reprinted in 20 I.L.M. 422 (1981) [hereinafter OECD GUIDELINES]. For a more complete discussion of the Guidelines, see Boehmer & Palmer, supra, note 49, at 273-76.
-
-
-
-
65
-
-
0346930979
-
-
Jan. 28, EUR. T.S. No. 108, reprinted in 20 I.L.M. 317 (1981) [hereinafter COE CONVENTION]
-
COUNCIL OF EUROPE, CONVENTION FOR THE PROTECTION OF INDIVIDUALS WITH REGARD TO AUTOMATIC PROCESSING OF PERSONAL DATA, Jan. 28, 1981, EUR. T.S. No. 108, reprinted in 20 I.L.M. 317 (1981) [hereinafter COE CONVENTION]. For a more complete discussion of the COE Convention, see Boehmer & Palmer, supra note 49, at 276-79.
-
(1981)
Council of Europe, Convention for the Protection of Individuals with Regard to Automatic Processing of Personal Data
-
-
-
66
-
-
84923752095
-
-
For a more complete discussion of the COE Convention, see Boehmer & Palmer, supra note 49, at 276-79
-
COUNCIL OF EUROPE, CONVENTION FOR THE PROTECTION OF INDIVIDUALS WITH REGARD TO AUTOMATIC PROCESSING OF PERSONAL DATA, Jan. 28, 1981, EUR. T.S. No. 108, reprinted in 20 I.L.M. 317 (1981) [hereinafter COE CONVENTION]. For a more complete discussion of the COE Convention, see Boehmer & Palmer, supra note 49, at 276-79.
-
-
-
-
67
-
-
0346300869
-
-
final
-
DIRECTIVE ON THE PROTECTION OF INDIVIDUALS WITH REGARD TO THE PROCESSING OF PERSONAL DATA AND ON THE FREE MOVEMENT OF SUCH DATA, COM(92)422 final 1992. See also corrigendum issued Oct. 28, 1992; Common Position (EC) No. 1/95, 2/20/95, Official Journal (EC), Vol. 38 (4,13/95) [hereinafter 1992 DIRECTIVE]. One of the primary objectives of the Directive is to harmonize national laws and to establish a community standard of privacy protection. See Joel R. Reidenberg, Privacy in the Information Economy: A Fortress or Frontier for Individual Privacy Rights?, 55 FED. COMM. L.J. 195, 238 (1992).
-
(1992)
Directive on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free MOVEMENT of such Data, Com
, Issue.92
, pp. 422
-
-
-
68
-
-
84923752094
-
-
See also corrigendum issued Oct. 28, 1992
-
DIRECTIVE ON THE PROTECTION OF INDIVIDUALS WITH REGARD TO THE PROCESSING OF PERSONAL DATA AND ON THE FREE MOVEMENT OF SUCH DATA, COM(92)422 final 1992. See also corrigendum issued Oct. 28, 1992; Common Position (EC) No. 1/95, 2/20/95, Official Journal (EC), Vol. 38 (4,13/95) [hereinafter 1992 DIRECTIVE]. One of the primary objectives of the Directive is to harmonize national laws and to establish a community standard of privacy protection. See Joel R. Reidenberg, Privacy in the Information Economy: A Fortress or Frontier for Individual Privacy Rights?, 55 FED. COMM. L.J. 195, 238 (1992).
-
-
-
-
69
-
-
84923752093
-
-
(4,13/95) [hereinafter 1992 DIRECTIVE]
-
DIRECTIVE ON THE PROTECTION OF INDIVIDUALS WITH REGARD TO THE PROCESSING OF PERSONAL DATA AND ON THE FREE MOVEMENT OF SUCH DATA, COM(92)422 final 1992. See also corrigendum issued Oct. 28, 1992; Common Position (EC) No. 1/95, 2/20/95, Official Journal (EC), Vol. 38 (4,13/95) [hereinafter 1992 DIRECTIVE]. One of the primary objectives of the Directive is to harmonize national laws and to establish a community standard of privacy protection. See Joel R. Reidenberg, Privacy in the Information Economy: A Fortress or Frontier for Individual Privacy Rights?, 55 FED. COMM. L.J. 195, 238 (1992).
-
Common Position (EC) No. 1/95, 2/20/95, Official Journal (EC)
, vol.38
-
-
-
70
-
-
0348191613
-
Privacy in the Information Economy: A Fortress or Frontier for Individual Privacy Rights?
-
DIRECTIVE ON THE PROTECTION OF INDIVIDUALS WITH REGARD TO THE PROCESSING OF PERSONAL DATA AND ON THE FREE MOVEMENT OF SUCH DATA, COM(92)422 final 1992. See also corrigendum issued Oct. 28, 1992; Common Position (EC) No. 1/95, 2/20/95, Official Journal (EC), Vol. 38 (4,13/95) [hereinafter 1992 DIRECTIVE]. One of the primary objectives of the Directive is to harmonize national laws and to establish a community standard of privacy protection. See Joel R. Reidenberg, Privacy in the Information Economy: A Fortress or Frontier for Individual Privacy Rights?, 55 FED. COMM. L.J. 195, 238 (1992).
-
(1992)
Fed. Comm. L.J.
, vol.55
, pp. 195
-
-
Reidenberg, J.R.1
-
71
-
-
84923752092
-
-
See infra notes 183-96 and accompanying text
-
See infra notes 183-96 and accompanying text.
-
-
-
-
72
-
-
84923752091
-
-
1992 DIRECTIVE, supra note 56, art. 30, §1
-
1992 DIRECTIVE, supra note 56, art. 30, §1.
-
-
-
-
73
-
-
84887062832
-
New Trends in National and International Data Protection Law
-
J. Dumortier ed.
-
Spiros Simitis, New Trends in National and International Data Protection Law, in RECENT DEVELOPMENTS IN DATA PRIVACY LAW 17 (J. Dumortier ed., 1992).
-
(1992)
Recent Developments in Data Privacy Law
, pp. 17
-
-
Simitis, S.1
-
74
-
-
84923752090
-
-
See supra notes 15-26 and accompanying text
-
See supra notes 15-26 and accompanying text.
-
-
-
-
75
-
-
84923752089
-
-
SHEPARD, supra note 22, at 26
-
SHEPARD, supra note 22, at 26.
-
-
-
-
76
-
-
84923752087
-
-
Id. at 26-30
-
Id. at 26-30.
-
-
-
-
77
-
-
84923752085
-
-
note
-
The tort claim of defamation does not adequately protect the privacy interests of the employee as that tort requires proof that the information transmitted or disclosed be false. RESTATEMENT (SECOND) OF TORTS § 558 (1977). The concern of this article is access to or disclosure of any personal information of the employee, whether it be false or true, as long as it is personal. In addition, defamation requires publication to a third party in order for it to be actionable. Houston Belt and Terminal Rwy. Co. v. Wherry, 548 S.W.2d 743, 751 (Tex. App. 1976), cert. denied, 434 U.S. 962 (1977); Montgomery Ward and Co. v. Peaster, 178 S.W.2d 302, 306 (Tex. App. 1944). The concern of this article is not only with publication but mere knowledge by the employer of an employee's private information. The torts of public disclosure of private facts and portrayal of an individual in a false light are inadequate for similar reasons. As public employees are protected against disclosure of personal information without the additional requirement that such disclosure cause damage to that individual's reputation, see infra notes 116-24 and accompanying text, so too should private sector employees be granted the same protection.
-
-
-
-
78
-
-
84923752076
-
-
note
-
Floyd v. Park Cities People, Inc., 685 S.W.2d 96, 97 (Tex. App. 1985); Gill v. Snow, 644 S.W.2d 222, 224 (Tex. App. 1982), RESTATEMENT (SECOND) OF TORTS, supra note 63, § 652B.
-
-
-
-
79
-
-
84923752075
-
-
note
-
Miller v. Motorola, 560 N.E.2d 900 (Ill. 1990); Eddy v. Brown, 715 P.2d 74 (Okla. 1986); Ellenberg v. Pinkerton's, Inc., 202 S.E.2d 701 (Ga. 1973).
-
-
-
-
80
-
-
84923752074
-
-
note
-
Birnbaum v. United States, 588 F.2d 319, 323 (2d Cir. 1978). C.T.W. v. B.C.G., 809 S.W.2d 788, 796 (Tx. App. 1991); Boyles v. Kerr, 806 S.W.2d 255, 259 n.2 (Tex. App. 1991); Wilkerson v. Eaton Corp., 1994 WL 77719 (Ohio App. 8 Dist. 1994). In one case, Rulon-Miller v. International Business Machines Corp, 162 Cal. App. 3d 241 (1984), an IBM employee was discharged because she continued dating a previous IBM employee who was currently working for a competitor after she was told to terminate her relationship due to the perceived conflict of interest. Id. at 243-44. Rulon-Miller, the employee, successfully sought damages based on claims of wrongful discharge and intentional infliction of emotional distress. Id. at 247. A jury awarded her compensatory and punitive damages against IBM; this verdict was upheld on appeal. Id. at 255. In this case, however, the acts of the employer were so egregious as to justify damages for wrongful termination.
-
-
-
-
81
-
-
84923752073
-
-
note
-
Cort v. Bristol-Myers Co., 431 N.E.2d 908 (Me. 1982) (employer held not in violation of public policy for discharge of employees for their refusal to provide information on a questionnaire); Texas Dept. of Mental Health v. Texas State Employees Union, 708 S.W.2d 498, 504 (Tex. App. 1986); Penokie v. Michigan Tech. Univ., 287 N.W.2d 304 (Mich. App. 1979). On the other hand, those intrusions that are considered in violation of public policy which result in termination of an employee may give rise to a claim for wrongful discharge. Because the public policy exception to employment at will is applied on a state-by-state basis, such decisions vary depending upon the jurisdiction of the termination. For instance, in Roe v. Quality Transportation Services, 838 P.2d 128 (Wash. 1992), the court held that the common law tort of invasion of privacy (intrusion into seclusion) was not a clear mandate of public policy so as to prohibit a private employer from terminating an employee for refusal to submit to a drug test. But see Hennessey v. Coastal Eagle Point Oil Co., 609 A.2d 11, 19 (N.J. 1992), in which the court held that drug testing by private employers could be an invasion of privacy sufficient to breach public policy for purpose of determining whether an at-will employee has a claim for wrongful discharge. See also Luedtke v. Nabors Alaska Drilling, Inc., 768 P.2d 1123, 1131-33 (Alaska 1989) (court held that, while Alaska's constitutional privacy protection is inapplicable to private employee's claim, such can form the basis of public policy); Cordle v. General Hugh Mercer Corp., 325 S.E.2d 111, 117 (W. Va. 1984) (contrary to public policy for an employer to require that an employee submit to a polygraph test as a condition of employment).
-
-
-
-
82
-
-
84923752072
-
-
note
-
In Young v. Jackson, 572 So. 2d 378 (Miss. 1990), the court held that it did not constitute an unwarranted invasion of privacy when a co-worker disclosed the fact of employee's partial hysterectomy. While the court admitted that such a disclosure would be highly offensive to a reasonable person, it held that the co-worker had a right to disclose the information based on a qualified privilege concerning the possibility that the procedure had been necessary as a result of radiation exposure within the work place. In Leggett v. First Interstate Bank of Oregon, 739 P.2d 1083, 1086 (Or. 1987), the court held that privilege applies only if the information is published to third parties and not if the employer is merely gathering information.
-
-
-
-
83
-
-
84923752071
-
-
533 P.2d 343 (Or. 1975)
-
533 P.2d 343 (Or. 1975).
-
-
-
-
84
-
-
84923752070
-
-
Id. at 346-47. 71 502 A.2d 1101 (Md. Ct. Spec. App. 1986).
-
Id. at 346-47. 71 502 A.2d 1101 (Md. Ct. Spec. App. 1986).
-
-
-
-
85
-
-
84923752069
-
-
Id. at 1116-17
-
Id. at 1116-17.
-
-
-
-
86
-
-
84923752067
-
-
Wood v. Hustler Magazine, Inc., 736 F.2d 1084 (5th Cir. 1984); Kimbrough v. Coca-Cola/USA, 521 S.W.2d 719, 723-24 (Tex. App. 1975)
-
Wood v. Hustler Magazine, Inc., 736 F.2d 1084 (5th Cir. 1984); Kimbrough v. Coca-Cola/USA, 521 S.W.2d 719, 723-24 (Tex. App. 1975).
-
-
-
-
87
-
-
84923752065
-
-
note
-
Speer v. Ohio Dept. of Rehabilitation and Correction, 624 N.E.2d 251 (Ohio 1993) (employee's consent to search did not authorize surveillance of employee from bathroom ceiling).
-
-
-
-
88
-
-
84923752056
-
-
note
-
The court in State v. Community Distributors, Inc., 317 A.2d 697 (N.J. 1974), explained the disparity in bargaining power between an employee and employer in connection with a request that the employee submit to a polygraph examination as follows: Nor is there any assurance of true voluntariness [in taking a polygraph examination] for the economic compulsions are generally such that the employee has no realistic choice. Organized labor groups have often expressed intense hostility to employer requirements that employees submit to polygraph tests which they view as improper invasions of their deeply felt rights to personal privacy and to remain free from involuntary self-incrimination. Id. at 699. See also Burk v. K-Mart Corporation, 770 P.2d 24, 30 (Ok. 1989); National Consultants, Inc. v. Burt, 366 S.E.2d 344, 350, cert. vacated, 374 S.E.2d 532 (Ga. 1988); Rash v. Toccoa Clinic Med. Assn., 320 S.E.2d 170 (Ga. 1984); Anderson v. Savin Corporation, 254 Cal. Rptr. 627, 631 (Cal. App. 1988); Wallis v. Superior Court, 207 Cal. Rptr. 123 (Cal. App. 1984). But see Richard A. Epstein, In Defense of the Contract at Will, 51 U. CHI. L. REV. 947, 953 (1984), in which Professor Epstein argues that the contract at will works to the mutual benefit of both parties as long as the power of each party is measured at the time of the contract's formation and not at the time of dispute. For more complete discussions of this debate, see also Lawrence E. Blades, Employment At Will vs. Individual Freedom: On Limiting the Abusive Exercise of Employer Power, 67 COLUM. L. REV. 1404 (1967); Mark M. Hager, The Emperor's Clothes Are Not Efficient- Posner's Jurisprudence of Class, 41 AM. U. L. REV. 7 (1991); Karl E. Klare, Workplace Democracy and Market Deconstruction: An Agenda of Legal Reform, 38 CATH. U. L. REV. 1 (1988).
-
-
-
-
89
-
-
84935657360
-
In Defense of the Contract at Will
-
The court in State v. Community Distributors, Inc., 317 A.2d 697 (N.J. 1974), explained the disparity in bargaining power between an employee and employer in connection with a request that the employee submit to a polygraph examination as follows: Nor is there any assurance of true voluntariness [in taking a polygraph examination] for the economic compulsions are generally such that the employee has no realistic choice. Organized labor groups have often expressed intense hostility to employer requirements that employees submit to polygraph tests which they view as improper invasions of their deeply felt rights to personal privacy and to remain free from involuntary self-incrimination. Id. at 699. See also Burk v. K-Mart Corporation, 770 P.2d 24, 30 (Ok. 1989); National Consultants, Inc. v. Burt, 366 S.E.2d 344, 350, cert. vacated, 374 S.E.2d 532 (Ga. 1988); Rash v. Toccoa Clinic Med. Assn., 320 S.E.2d 170 (Ga. 1984); Anderson v. Savin Corporation, 254 Cal. Rptr. 627, 631 (Cal. App. 1988); Wallis v. Superior Court, 207 Cal. Rptr. 123 (Cal. App. 1984). But see Richard A. Epstein, In Defense of the Contract at Will, 51 U. CHI. L. REV. 947, 953 (1984), in which Professor Epstein argues that the contract at will works to the mutual benefit of both parties as long as the power of each party is measured at the time of the contract's formation and not at the time of dispute. For more complete discussions of this debate, see also Lawrence E. Blades, Employment At Will vs. Individual Freedom: On Limiting the Abusive Exercise of Employer Power, 67 COLUM. L. REV. 1404 (1967); Mark M. Hager, The Emperor's Clothes Are Not Efficient- Posner's Jurisprudence of Class, 41 AM. U. L. REV. 7 (1991); Karl E. Klare, Workplace Democracy and Market Deconstruction: An Agenda of Legal Reform, 38 CATH. U. L. REV. 1 (1988).
-
(1984)
U. Chi. L. Rev.
, vol.51
, pp. 947
-
-
Epstein, R.A.1
-
90
-
-
0010978616
-
Employment at Will vs. Individual Freedom: On Limiting the Abusive Exercise of Employer Power
-
The court in State v. Community Distributors, Inc., 317 A.2d 697 (N.J. 1974), explained the disparity in bargaining power between an employee and employer in connection with a request that the employee submit to a polygraph examination as follows: Nor is there any assurance of true voluntariness [in taking a polygraph examination] for the economic compulsions are generally such that the employee has no realistic choice. Organized labor groups have often expressed intense hostility to employer requirements that employees submit to polygraph tests which they view as improper invasions of their deeply felt rights to personal privacy and to remain free from involuntary self-incrimination. Id. at 699. See also Burk v. K-Mart Corporation, 770 P.2d 24, 30 (Ok. 1989); National Consultants, Inc. v. Burt, 366 S.E.2d 344, 350, cert. vacated, 374 S.E.2d 532 (Ga. 1988); Rash v. Toccoa Clinic Med. Assn., 320 S.E.2d 170 (Ga. 1984); Anderson v. Savin Corporation, 254 Cal. Rptr. 627, 631 (Cal. App. 1988); Wallis v. Superior Court, 207 Cal. Rptr. 123 (Cal. App. 1984). But see Richard A. Epstein, In Defense of the Contract at Will, 51 U. CHI. L. REV. 947, 953 (1984), in which Professor Epstein argues that the contract at will works to the mutual benefit of both parties as long as the power of each party is measured at the time of the contract's formation and not at the time of dispute. For more complete discussions of this debate, see also Lawrence E. Blades, Employment At Will vs. Individual Freedom: On Limiting the Abusive Exercise of Employer Power, 67 COLUM. L. REV. 1404 (1967); Mark M. Hager, The Emperor's Clothes Are Not Efficient- Posner's Jurisprudence of Class, 41 AM. U. L. REV. 7 (1991); Karl E. Klare, Workplace Democracy and Market Deconstruction: An Agenda of Legal Reform, 38 CATH. U. L. REV. 1 (1988).
-
(1967)
Colum. L. Rev.
, vol.67
, pp. 1404
-
-
Blades, L.E.1
-
91
-
-
0038185350
-
The Emperor's Clothes Are Not Efficient- Posner's Jurisprudence of Class
-
The court in State v. Community Distributors, Inc., 317 A.2d 697 (N.J. 1974), explained the disparity in bargaining power between an employee and employer in connection with a request that the employee submit to a polygraph examination as follows: Nor is there any assurance of true voluntariness [in taking a polygraph examination] for the economic compulsions are generally such that the employee has no realistic choice. Organized labor groups have often expressed intense hostility to employer requirements that employees submit to polygraph tests which they view as improper invasions of their deeply felt rights to personal privacy and to remain free from involuntary self-incrimination. Id. at 699. See also Burk v. K-Mart Corporation, 770 P.2d 24, 30 (Ok. 1989); National Consultants, Inc. v. Burt, 366 S.E.2d 344, 350, cert. vacated, 374 S.E.2d 532 (Ga. 1988); Rash v. Toccoa Clinic Med. Assn., 320 S.E.2d 170 (Ga. 1984); Anderson v. Savin Corporation, 254 Cal. Rptr. 627, 631 (Cal. App. 1988); Wallis v. Superior Court, 207 Cal. Rptr. 123 (Cal. App. 1984). But see Richard A. Epstein, In Defense of the Contract at Will, 51 U. CHI. L. REV. 947, 953 (1984), in which Professor Epstein argues that the contract at will works to the mutual benefit of both parties as long as the power of each party is measured at the time of the contract's formation and not at the time of dispute. For more complete discussions of this debate, see also Lawrence E. Blades, Employment At Will vs. Individual Freedom: On Limiting the Abusive Exercise of Employer Power, 67 COLUM. L. REV. 1404 (1967); Mark M. Hager, The Emperor's Clothes Are Not Efficient- Posner's Jurisprudence of Class, 41 AM. U. L. REV. 7 (1991); Karl E. Klare, Workplace Democracy and Market Deconstruction: An Agenda of Legal Reform, 38 CATH. U. L. REV. 1 (1988).
-
(1991)
Am. U. L. Rev.
, vol.41
, pp. 7
-
-
Hager, M.M.1
-
92
-
-
0006254412
-
Workplace Democracy and Market Deconstruction: An Agenda of Legal Reform
-
The court in State v. Community Distributors, Inc., 317 A.2d 697 (N.J. 1974), explained the disparity in bargaining power between an employee and employer in connection with a request that the employee submit to a polygraph examination as follows: Nor is there any assurance of true voluntariness [in taking a polygraph examination] for the economic compulsions are generally such that the employee has no realistic choice. Organized labor groups have often expressed intense hostility to employer requirements that employees submit to polygraph tests which they view as improper invasions of their deeply felt rights to personal privacy and to remain free from involuntary self-incrimination. Id. at 699. See also Burk v. K-Mart Corporation, 770 P.2d 24, 30 (Ok. 1989); National Consultants, Inc. v. Burt, 366 S.E.2d 344, 350, cert. vacated, 374 S.E.2d 532 (Ga. 1988); Rash v. Toccoa Clinic Med. Assn., 320 S.E.2d 170 (Ga. 1984); Anderson v. Savin Corporation, 254 Cal. Rptr. 627, 631 (Cal. App. 1988); Wallis v. Superior Court, 207 Cal. Rptr. 123 (Cal. App. 1984). But see Richard A. Epstein, In Defense of the Contract at Will, 51 U. CHI. L. REV. 947, 953 (1984), in which Professor Epstein argues that the contract at will works to the mutual benefit of both parties as long as the power of each party is measured at the time of the contract's formation and not at the time of dispute. For more complete discussions of this debate, see also Lawrence E. Blades, Employment At Will vs. Individual Freedom: On Limiting the Abusive Exercise of Employer Power, 67 COLUM. L. REV. 1404 (1967); Mark M. Hager, The Emperor's Clothes Are Not Efficient- Posner's Jurisprudence of Class, 41 AM. U. L. REV. 7 (1991); Karl E. Klare, Workplace Democracy and Market Deconstruction: An Agenda of Legal Reform, 38 CATH. U. L. REV. 1 (1988).
-
(1988)
Cath. U. L. Rev.
, vol.38
, pp. 1
-
-
Klare, K.E.1
-
93
-
-
84923752055
-
-
note
-
In Jennings v. Minco Tech. Labs, Inc., 765 S.W.2d 497 (Tex. 1989), the plaintiff/ employee argued that her consent to a drug testing requirement would be ineffective because, if she did not consent to the testing, she would lose her job, which she could not afford to do. The court rejected her argument. Id. at 500. But see Community Distributors, Inc., in which the court addressed the issue in exactly opposite terms in connection with polygraph examinations. 317 A.2d at 699.
-
-
-
-
94
-
-
84923752054
-
-
note
-
Farrington v. Sysco Food Services, Inc., 865 S.W.2d 247, 253 (Tex. 1993) (drug testing of private sector employees does not amount to a tortious invasion of privacy where there is consent); Jennings v. Minco Tech. Labs, Inc., 765 S.W.2d 497, 500 (Tex. 1989); Ballaron v. Equitable Shipyards, 521 S.2d 481 (La. 1988) (employer's requirements that employee sign polygraph examiner's consent forms did not constitute actionable invasion of privacy). But see cases where state constitutional privacy protections apply, such as Soroka v. Dayton Hudson Corp., 18 CaI. App. 4th 1200, 1209 (1993). In that case, the court, in determining whether the employees could consent to a psychological screening test that allegedly invaded their privacy, noted that, "[s]imply put, applicants for jobs . . . have a choice; they may consent to the limited invasion of their privacy resulting from the testing, or may decline both the test and the conditional offer of employment." Id. (citing Wilkinson v. Times Mirror Corp., 264 Cal. Rptr. 194, 204 (Cal. App. 1990)). However, the court concluded that, based on California's constitutional guarantee of privacy rights to all citizens, the psychological screening was not a justified invasion of employees' or applicants' rights; see also Luck v. Southern Pacific Transp. Co., 267 Cal. Rptr. 618 (Cal. App. 1990) (employer's termination of employee for failure to submit to drug urinalysis constituted a violation of employee's right to privacy).
-
-
-
-
95
-
-
84923710116
-
Privacy and the Employment Relationship
-
Lisa Brunn, Privacy and The Employment Relationship, 24 HOUS. L. REV. 389, 401 (1988).
-
(1988)
Hous. L. Rev.
, vol.24
, pp. 389
-
-
Brunn, L.1
-
96
-
-
84923752053
-
-
note
-
Sowards v. Norbar, Inc., 605 N.E.2d 468 (Ohio 1992); Toussaint v. Blue Cross & Blue Shield of Michigan, 292 N.W.2d 88 (Mich. 1980). But see Martin v. Capital Cities, 511 A.2d 830 (Pa. Super. 1986) (handbook is not considered a contract unless the employer states that it is legally binding); Gates v. Life of Montana, 638 P.2d 1063 (Mont. 1982) (dictum) (handbook is not a contract but instead a unilateral employer statement).
-
-
-
-
97
-
-
0346930969
-
-
The Commission was established pursuant to the Privacy Act, Pub. L. No. 93-579, § 5(b)(2), 93rd Cong., 2d Sess., 88 Stat. 1906 (1974)
-
PRIVACY PROTECTION STUDY COMMISSION, PERSONAL PRIVACY IN AN INFORMATION SOCIETY: THE REPORT OF THE PRIVACY PROTECTION STUDY COMMISSION 225 (1977). The Commission was established pursuant to the Privacy Act, Pub. L. No. 93-579, § 5(b)(2), 93rd Cong., 2d Sess., 88 Stat. 1906 (1974).
-
(1977)
Personal Privacy in an Information Society: The Report of the Privacy Protection Study Commission
, pp. 225
-
-
-
99
-
-
84923739499
-
-
COLIN J. BENNETT, REGULATING PRIVACY: DATA PROTECTION AND PUBLIC POLICY IN EUROPE AND THE UNITED STATES 67 (1992) (citing ADVISORY COMMITTEE ON AUTOMATED PERSONAL DATA SYSTEMS OF THE SECRETARY OF HEALTH, EDUCATION AND WELFARE, U.S. HEW, RECORDS, COMPUTERS, AND THE RIGHTS OF CITIZENS 37 (1973)).
-
(1973)
Advisory Committee on Automated Personal Data Systems of the Secretary of Health, Education and Welfare, U.S. Hew, Records, Computers, and the Rights of Citizens
, pp. 37
-
-
-
100
-
-
84923752052
-
-
Pub. L. No. 91-508, § 601, 84 Stat. 1127 (1970)
-
Pub. L. No. 91-508, § 601, 84 Stat. 1127 (1970).
-
-
-
-
101
-
-
84923752051
-
-
DECKER, supra note 24, at 46
-
DECKER, supra note 24, at 46.
-
-
-
-
102
-
-
84923752050
-
-
Id.
-
Id.
-
-
-
-
103
-
-
84923752049
-
-
15 U.S.C. § 1681b (1988)
-
15 U.S.C. § 1681b (1988).
-
-
-
-
104
-
-
84923752047
-
-
Id. § 1681m(a)
-
Id. § 1681m(a).
-
-
-
-
105
-
-
84923752045
-
-
Id. § 1681g(a)(1)(3)
-
Id. § 1681g(a)(1)(3).
-
-
-
-
106
-
-
84923752036
-
-
Id. § 1681i(a)
-
Id. § 1681i(a).
-
-
-
-
107
-
-
84923752035
-
-
Id. § 1681i(b)(c)
-
Id. § 1681i(b)(c).
-
-
-
-
108
-
-
84923752034
-
-
Id. § 1681i(b)(c)
-
Id. § 1681i(b)(c).
-
-
-
-
109
-
-
0002333592
-
Ethics, Public Policy and Managing Advanced Technologies: The Case of Electronic Surveillance
-
Edward Ottensmeyer, Ethics, Public Policy and Managing Advanced Technologies: The Case of Electronic Surveillance, 10 J. BUS. ETHICS 519 (1991).
-
(1991)
J. Bus. Ethics
, vol.10
, pp. 519
-
-
Ottensmeyer, E.1
-
110
-
-
84923752033
-
-
18 U.S.C. §§ 2510-2521 (1988)
-
18 U.S.C. §§ 2510-2521 (1988).
-
-
-
-
111
-
-
84923752032
-
-
Id. § 2511(2)(d)
-
Id. § 2511(2)(d).
-
-
-
-
112
-
-
84923752031
-
-
Id. § 2510(5)(d)
-
Id. § 2510(5)(d).
-
-
-
-
113
-
-
84923752030
-
-
Abel v. Bonfanti, 625 F. Supp. 263 (S.D.N.Y. 1985)
-
Abel v. Bonfanti, 625 F. Supp. 263 (S.D.N.Y. 1985).
-
-
-
-
114
-
-
84923752029
-
-
Ottensmeyer, supra note 91, at 520
-
Ottensmeyer, supra note 91, at 520.
-
-
-
-
115
-
-
84923752027
-
-
Id. at 521
-
Id. at 521.
-
-
-
-
116
-
-
84923752025
-
-
note
-
S. 984, 103d Cong., 1st Sess. (1993) [hereinafter PCWA]. The bill was first introduced in 1991 as S. 516 (by Sen. Simon) and in the House of Representatives as H.R. 1218, 102 Cong., 1st Sess. (by Rep. Williams).
-
-
-
-
117
-
-
84923752016
-
-
note
-
PCWA, supra note 98, Preamble and § 2(4). The PCWA applied to continuous electronic monitoring and provided that employees shall be notified of the monitoring, regulated periodic or random monitoring, and provided for a review and amendment of surveillance records, as well as specific privacy protections. Id. §§ 3-10.
-
-
-
-
118
-
-
84923752015
-
-
Id. §§ 3, 4, 5, 8, 10
-
Id. §§ 3, 4, 5, 8, 10.
-
-
-
-
119
-
-
84923752014
-
-
Cooney, supra, note 38, at 30
-
Cooney, supra, note 38, at 30.
-
-
-
-
120
-
-
84923752013
-
-
29 U.S.C. §§ 2001-09 (1988)
-
29 U.S.C. §§ 2001-09 (1988).
-
-
-
-
121
-
-
84923752012
-
-
Id.
-
Id.
-
-
-
-
122
-
-
84923752011
-
-
Id. § 2002
-
Id. § 2002.
-
-
-
-
123
-
-
84923752010
-
-
Id.
-
Id.
-
-
-
-
124
-
-
84923752009
-
-
Id.
-
Id.
-
-
-
-
125
-
-
84923752007
-
-
29 U.S.C. § 2006(e)
-
29 U.S.C. § 2006(e).
-
-
-
-
126
-
-
84923752005
-
-
Id. § 2006(f)
-
Id. § 2006(f).
-
-
-
-
127
-
-
84923751956
-
-
Id. § 2006(a)-(c)
-
Id. § 2006(a)-(c).
-
-
-
-
128
-
-
84923751955
-
-
Id. § 2006(a)
-
Id. § 2006(a).
-
-
-
-
129
-
-
84923751954
-
-
See notes 107-10 and accompanying text
-
See notes 107-10 and accompanying text.
-
-
-
-
130
-
-
84923751953
-
-
note
-
For instance, under the FCRA, the employer must show that there is a legitimate business need for the information, while the Omnibus Crime Control and Safe Streets Act requires only that the information be collected during the ordinary course of business.
-
-
-
-
131
-
-
0346930941
-
Privacy in Peril
-
July
-
Charles Piller, Privacy in Peril, MACWORLD, July 1993, at 129.
-
(1993)
MACWORLD
, pp. 129
-
-
Piller, C.1
-
132
-
-
84923751952
-
-
note
-
This "quilt-like" method of protection has been criticized to a great extent by privacy scholars. Evan Hendricks, editor of the Privacy Times, explains, "[a]round the world, the U.S. is a laughingstock among privacy experts because we have a law protecting video tape-rental records, but not medical records." Piller, supra note 113, at 129 (Piller was referring to the Video Privacy Protection Act of 1988, 18 U.S.C. §§ 2701-2711 (1988), which, among other protections, limits the access of third parties to personally identifiable information retained by a video tape service provider. Id. §2710(a)(4).) Simon Davies, director of the Australian Privacy Foundation and a member of the Board of Directors of Computer Professionals for Social Responsibility, adds, "[t]he U. S. is an embarrassment to the privacy movement overseas; the U.S. stands alone as an example of what a superpower should not do in privacy." Piller, supra note 113, at 129.
-
-
-
-
133
-
-
84923751951
-
-
note
-
U.S. CONST. amend. IV ("The right of the people to be secure in their persons, homes, papers and effects, against unreasonable searches and seizures, shall not be violated . . . .")
-
-
-
-
134
-
-
84923751950
-
-
5 U.S.C. § 552 (1988)
-
5 U.S.C. § 552 (1988).
-
-
-
-
135
-
-
84923751949
-
-
DECKER, supra note 24, at 44
-
DECKER, supra note 24, at 44.
-
-
-
-
136
-
-
84923751948
-
-
5 U.S.C. " 552(a)(2)(A)-(C) (1988)
-
5 U.S.C. " 552(a)(2)(A)-(C) (1988).
-
-
-
-
137
-
-
84923751947
-
-
Id. § 552(a)(1)-(2)
-
Id. § 552(a)(1)-(2).
-
-
-
-
138
-
-
84923751946
-
-
Id. § 552(a)(2)
-
Id. § 552(a)(2).
-
-
-
-
139
-
-
84923751945
-
-
Id. § 552(b)(6)
-
Id. § 552(b)(6).
-
-
-
-
140
-
-
84923751944
-
-
Id. § 552(a)(2)
-
Id. § 552(a)(2).
-
-
-
-
141
-
-
84923715489
-
Federal Legislative Proposals for the Protection of Privacy
-
Ludmila Kaniuga-Golad, Federal Legislative Proposals for the Protection of Privacy, 8 FORDHAM URB. L.J. 773, 788 (1979).
-
(1979)
Fordham Urb. L.J.
, vol.8
, pp. 773
-
-
Kaniuga-Golad, L.1
-
142
-
-
84923751943
-
-
note
-
Id. The FOIA has been applied to protect public sector employees from excessive and unwarranted invasions of their privacy when private sector employees would not have similar protections. Because the FOIA contains a specific exemption from disclosure of information that would constitute an excessive invasion of privacy, 5 U.S.C. § 552(a)(2), public sector employees have a safe harbor in which to bring their claims. Private sector employees have no similar guarantee. In Maynard v. Central Intelligence Agency, 986 F.2d 547, 566 (1st Cir. 1993), the court held that the names of FBI employees could not be disclosed by their employer because the employees' privacy interest outweighed the public's interest in "what government was up to." In Hopkins v. U.S. Dept. of Housing and Urban Development, 929 F.2d 81, 86-88 (2d Cir. 1991), the court held that payroll records of government contractors were exempt from disclosure requirements of the Act because disclosure would constitute a clearly unwarranted invasion of privacy. In a number of other cases, courts have held that unions were not allowed access to the names and addresses of public employees because it would constitute an invasion of their privacy under the FOIA. See Federal Labor Relations Authority v. U.S. Dept. of Defense, Army and Air Force Exchange Service, 984 F.2d 370 (10th Cir. 1993); Federal Labor Relations Authority v. U.S. Dept. of Defense, 977 F.2d 545 (11th Cir. 1992) (court held that public interest side of balance carried little weight and was not sufficient to outweigh demonstrably significant invasion of privacy). Names and addresses were also considered to be beyond a FOIA request, particularly if coupled with personal financial information, in NARFE v. Horner, 879 F.2d 873, 875 (D.C. Cir. 1989) and Aronson v. HUD, 822 F.2d 182, 186 (1st Cir. 1987).
-
-
-
-
143
-
-
84923751942
-
-
Kaniuga-Golad, supra note 123, at 790
-
Kaniuga-Golad, supra note 123, at 790.
-
-
-
-
144
-
-
84923751941
-
-
5 U.S.C. § 552a (1988)
-
5 U.S.C. § 552a (1988).
-
-
-
-
145
-
-
84923751940
-
-
Kaniuga-Golad, supra note 123, at 787
-
Kaniuga-Golad, supra note 123, at 787.
-
-
-
-
146
-
-
84923751939
-
-
note
-
The Privacy Protection Study Commission was established by the Act in order to evaluate the effectiveness of extending the requirements of the Act to the private sector. See infra notes 147-55 and accompanying text.
-
-
-
-
147
-
-
84923751938
-
-
5 U.S.C. § 552a(e)(1) (1988)
-
5 U.S.C. § 552a(e)(1) (1988).
-
-
-
-
148
-
-
84923751937
-
-
Id. § 552a(e)(2)
-
Id. § 552a(e)(2).
-
-
-
-
149
-
-
84923751936
-
-
Id. § 552a(e)(3)
-
Id. § 552a(e)(3).
-
-
-
-
150
-
-
84923751935
-
-
Id. § 552a(d)(1)
-
Id. § 552a(d)(1).
-
-
-
-
151
-
-
84923751934
-
-
Id. § 552a(d)(2)
-
Id. § 552a(d)(2).
-
-
-
-
152
-
-
84923751933
-
-
5 U.S.C. § 552a(b)
-
5 U.S.C. § 552a(b).
-
-
-
-
153
-
-
84923751932
-
-
Id. § 552a(b)(3)
-
Id. § 552a(b)(3).
-
-
-
-
154
-
-
84923751931
-
-
Id. § 552a(c)(3)
-
Id. § 552a(c)(3).
-
-
-
-
155
-
-
84923751930
-
-
Id § 552a(g)(1)
-
Id § 552a(g)(1).
-
-
-
-
156
-
-
84923751929
-
-
Id. § 552a(b)(1)-(11)
-
Id. § 552a(b)(1)-(11).
-
-
-
-
157
-
-
84923751928
-
-
5 U.S.C. § 552a(b)(3)
-
5 U.S.C. § 552a(b)(3).
-
-
-
-
158
-
-
84923751927
-
-
Id.
-
Id.
-
-
-
-
159
-
-
84923751926
-
-
Id. § 552a(b)
-
Id. § 552a(b).
-
-
-
-
160
-
-
84923751925
-
-
Minnis v. U.S. Dept. of Agriculture, 737 F.2d 784, 786-87 (9th Cir. 1984)
-
Minnis v. U.S. Dept. of Agriculture, 737 F.2d 784, 786-87 (9th Cir. 1984).
-
-
-
-
161
-
-
84923751924
-
-
Id.
-
Id.
-
-
-
-
162
-
-
84923751923
-
-
611 F.2d 738, 746 (9th Cir. 1979)
-
611 F.2d 738, 746 (9th Cir. 1979).
-
-
-
-
163
-
-
84923751922
-
-
Id. at 746; Minnis, 737 F.2d at 786
-
Id. at 746; Minnis, 737 F.2d at 786.
-
-
-
-
164
-
-
84928221900
-
New Challenges to the U.S. Multinational Corporation in the European Economic Community: Data Protection Laws
-
Patrick Cole, New Challenges to The U.S. Multinational Corporation in The European Economic Community: Data Protection Laws, 17 N.Y.U.J. INT'L L. & POL. 893 (1985)
-
(1985)
N.Y.U.J. Int'l L. & Pol.
, vol.17
, pp. 893
-
-
Cole, P.1
-
165
-
-
84923751921
-
-
note
-
The application of the Privacy Act of 1974 to individual privacy lies in its prohibition of the disclosure of personal information pursuant to the FOIA and the provisions by which the Act allows individuals to examine, rectify, and copy information maintained in their files by the government or federal agency. 5 U.S.C. § 552a (1988).
-
-
-
-
166
-
-
84923751920
-
-
PRIVACY PROTECTION STUDY COMMISSION, supra note 80, at 231
-
PRIVACY PROTECTION STUDY COMMISSION, supra note 80, at 231.
-
-
-
-
167
-
-
84923751919
-
-
United States v. Westinghouse Elec. Corp., 638 F.2d 570, 576 (3d Cir. 1980)
-
United States v. Westinghouse Elec. Corp., 638 F.2d 570, 576 (3d Cir. 1980).
-
-
-
-
168
-
-
84923751918
-
-
note
-
PRIVACY PROTECTION STUDY COMMISSION, supra note 80, at 34. It has also been suggested that the Commission was under terrific pressure from private sector lobbyists who recommended that the Act not be extended to the private sector. MADSEN, supra note 50, at 107.
-
-
-
-
169
-
-
84923751917
-
-
MADSEN, supra note 50, at 274
-
MADSEN, supra note 50, at 274.
-
-
-
-
170
-
-
84923751916
-
-
Id. at 232-33
-
Id. at 232-33.
-
-
-
-
171
-
-
84923751915
-
-
Courts have held that mere collection of information is not an invasion of privacy, and its internal use by the employer is not subject to privacy rights of the employee because the employee record is considered employer property. PRIVACY PROTECTION STUDY COMMISSION, supra note 80, at app. 1, p. 21
-
Courts have held that mere collection of information is not an invasion of privacy, and its internal use by the employer is not subject to privacy rights of the employee because the employee record is considered employer property. PRIVACY PROTECTION STUDY COMMISSION, supra note 80, at app. 1, p. 21; Mordechai Mironi, The Confidentiality of Personnel Records: A Legal and Ethical View, 25 LAB. L.J. 270, 288-89 (1974); George Stevens, The Publicity Requirement and the Employee's Right to Privacy, 16 AM. BUS. L.J. 360, 365 (1979). See Saldana v. Wyoming, 846 P.2d 604, 651 (Wyo. 1993) ("[R]etrenchment by the United States Supreme Court and the report of the Privacy Protection Study Commission have made it abundantly clear that the right of privacy will be fully protected only if there is action by the states. It is time to take that step. It is vital to a free society to establish a zone of privacy in which each individual is free from physical and psychological intrusion and has the autonomy to make vital personal decisions." Id. (Urbigkit, J., dissenting)). See also Johnson v. Carpenter Tech. Corp., 723 F. Supp. 180 (D. Conn. 1989); Esnor v. Rust Eng'g Co., 704 F. Supp. 808 (E.D. Tenn. 1989); Greco v. Halliburton Co., 674 F. Supp. 1447 (D. Wy. 1987); Peller v. Retail Credit Co., 359 F. Supp. 1235 (N.D. Ga. 1973), aff'd mem., 505 F.2d 733 (5th Cir. 1974); O'Keefe v. Passaic Valley Water Comm., 624 A.2d 578, (N.J. 1993); Cort v. Bristol-Myers, 431 N.E.2d 908, 914 (Mass. 1982). In addition, the former chairman of the Privacy Protection Study Commission, David Linowes, conducted a study which showed that, of the employers questioned, 64% do not have programs that provide employees privacy protection. In addition, 36% of the employers would not create such programs until required to do so by law. Dept. of Labor Hearings on Workplace Privacy, 44 Fed. Reg. 57537 (1979), 44 Fed. Reg. 75755 (1979) (statement of Prof. David Linowes). On the other hand, some of this country's larger firms have exhibited efforts at conformance. These firms include AT&T, Aetna Life & Casualty, Eastman Kodak, and Prudential Insurance. Alan Westin, What Should Be Done about Employee Privacy?, 25 PERS. ADMIN. 27, 30 (1980). See also David Ewing, IBM's Guidelines to Employee Privacy, HARV. BUS. REV., Sept./Oct. 1976, at 82.
-
-
-
-
172
-
-
0042115869
-
The Confidentiality of Personnel Records: A Legal and Ethical View
-
Courts have held that mere collection of information is not an invasion of privacy, and its internal use by the employer is not subject to privacy rights of the employee because the employee record is considered employer property. PRIVACY PROTECTION STUDY COMMISSION, supra note 80, at app. 1, p. 21; Mordechai Mironi, The Confidentiality of Personnel Records: A Legal and Ethical View, 25 LAB. L.J. 270, 288-89 (1974); George Stevens, The Publicity Requirement and the Employee's Right to Privacy, 16 AM. BUS. L.J. 360, 365 (1979). See Saldana v. Wyoming, 846 P.2d 604, 651 (Wyo. 1993) ("[R]etrenchment by the United States Supreme Court and the report of the Privacy Protection Study Commission have made it abundantly clear that the right of privacy will be fully protected only if there is action by the states. It is time to take that step. It is vital to a free society to establish a zone of privacy in which each individual is free from physical and psychological intrusion and has the autonomy to make vital personal decisions." Id. (Urbigkit, J., dissenting)). See also Johnson v. Carpenter Tech. Corp., 723 F. Supp. 180 (D. Conn. 1989); Esnor v. Rust Eng'g Co., 704 F. Supp. 808 (E.D. Tenn. 1989); Greco v. Halliburton Co., 674 F. Supp. 1447 (D. Wy. 1987); Peller v. Retail Credit Co., 359 F. Supp. 1235 (N.D. Ga. 1973), aff'd mem., 505 F.2d 733 (5th Cir. 1974); O'Keefe v. Passaic Valley Water Comm., 624 A.2d 578, (N.J. 1993); Cort v. Bristol-Myers, 431 N.E.2d 908, 914 (Mass. 1982). In addition, the former chairman of the Privacy Protection Study Commission, David Linowes, conducted a study which showed that, of the employers questioned, 64% do not have programs that provide employees privacy protection. In addition, 36% of the employers would not create such programs until required to do so by law. Dept. of Labor Hearings on Workplace Privacy, 44 Fed. Reg. 57537 (1979), 44 Fed. Reg. 75755 (1979) (statement of Prof. David Linowes). On the other hand, some of this country's larger firms have exhibited efforts at conformance. These firms include AT&T, Aetna Life & Casualty, Eastman Kodak, and Prudential Insurance. Alan Westin, What Should Be Done about Employee Privacy?, 25 PERS. ADMIN. 27, 30 (1980). See also David Ewing, IBM's Guidelines to Employee Privacy, HARV. BUS. REV., Sept./Oct. 1976, at 82.
-
(1974)
Lab. L.J.
, vol.25
, pp. 270
-
-
Mironi, M.1
-
173
-
-
84981847791
-
The Publicity Requirement and the Employee's Right to Privacy
-
Courts have held that mere collection of information is not an invasion of privacy, and its internal use by the employer is not subject to privacy rights of the employee because the employee record is considered employer property. PRIVACY PROTECTION STUDY COMMISSION, supra note 80, at app. 1, p. 21; Mordechai Mironi, The Confidentiality of Personnel Records: A Legal and Ethical View, 25 LAB. L.J. 270, 288-89 (1974); George Stevens, The Publicity Requirement and the Employee's Right to Privacy, 16 AM. BUS. L.J. 360, 365 (1979). See Saldana v. Wyoming, 846 P.2d 604, 651 (Wyo. 1993) ("[R]etrenchment by the United States Supreme Court and the report of the Privacy Protection Study Commission have made it abundantly clear that the right of privacy will be fully protected only if there is action by the states. It is time to take that step. It is vital to a free society to establish a zone of privacy in which each individual is free from physical and psychological intrusion and has the autonomy to make vital personal decisions." Id. (Urbigkit, J., dissenting)). See also Johnson v. Carpenter Tech. Corp., 723 F. Supp. 180 (D. Conn. 1989); Esnor v. Rust Eng'g Co., 704 F. Supp. 808 (E.D. Tenn. 1989); Greco v. Halliburton Co., 674 F. Supp. 1447 (D. Wy. 1987); Peller v. Retail Credit Co., 359 F. Supp. 1235 (N.D. Ga. 1973), aff'd mem., 505 F.2d 733 (5th Cir. 1974); O'Keefe v. Passaic Valley Water Comm., 624 A.2d 578, (N.J. 1993); Cort v. Bristol-Myers, 431 N.E.2d 908, 914 (Mass. 1982). In addition, the former chairman of the Privacy Protection Study Commission, David Linowes, conducted a study which showed that, of the employers questioned, 64% do not have programs that provide employees privacy protection. In addition, 36% of the employers would not create such programs until required to do so by law. Dept. of Labor Hearings on Workplace Privacy, 44 Fed. Reg. 57537 (1979), 44 Fed. Reg. 75755 (1979) (statement of Prof. David Linowes). On the other hand, some of this country's larger firms have exhibited efforts at conformance. These firms include AT&T, Aetna Life & Casualty, Eastman Kodak, and Prudential Insurance. Alan Westin, What Should Be Done about Employee Privacy?, 25 PERS. ADMIN. 27, 30 (1980). See also David Ewing, IBM's Guidelines to Employee Privacy, HARV. BUS. REV., Sept./Oct. 1976, at 82.
-
(1979)
Am. Bus. L.J.
, vol.16
, pp. 360
-
-
Stevens, G.1
-
174
-
-
84923751914
-
-
note
-
Courts have held that mere collection of information is not an invasion of privacy, and its internal use by the employer is not subject to privacy rights of the employee because the employee record is considered employer property. PRIVACY PROTECTION STUDY COMMISSION, supra note 80, at app. 1, p. 21; Mordechai Mironi, The Confidentiality of Personnel Records: A Legal and Ethical View, 25 LAB. L.J. 270, 288-89 (1974); George Stevens, The Publicity Requirement and the Employee's Right to Privacy, 16 AM. BUS. L.J. 360, 365 (1979). See Saldana v. Wyoming, 846 P.2d 604, 651 (Wyo. 1993) ("[R]etrenchment by the United States Supreme Court and the report of the Privacy Protection Study Commission have made it abundantly clear that the right of privacy will be fully protected only if there is action by the states. It is time to take that step. It is vital to a free society to establish a zone of privacy in which each individual is free from physical and psychological intrusion and has the autonomy to make vital personal decisions." Id. (Urbigkit, J., dissenting)). See also Johnson v. Carpenter Tech. Corp., 723 F. Supp. 180 (D. Conn. 1989); Esnor v. Rust Eng'g Co., 704 F. Supp. 808 (E.D. Tenn. 1989); Greco v. Halliburton Co., 674 F. Supp. 1447 (D. Wy. 1987); Peller v. Retail Credit Co., 359 F. Supp. 1235 (N.D. Ga. 1973), aff'd mem., 505 F.2d 733 (5th Cir. 1974); O'Keefe v. Passaic Valley Water Comm., 624 A.2d 578, (N.J. 1993); Cort v. Bristol-Myers, 431 N.E.2d 908, 914 (Mass. 1982). In addition, the former chairman of the Privacy Protection Study Commission, David Linowes, conducted a study which showed that, of the employers questioned, 64% do not have programs that provide employees privacy protection. In addition, 36% of the employers would not create such programs until required to do so by law. Dept. of Labor Hearings on Workplace Privacy, 44 Fed. Reg. 57537 (1979), 44 Fed. Reg. 75755 (1979) (statement of Prof. David Linowes). On the other hand, some of this country's larger firms have exhibited efforts at conformance. These firms include AT&T, Aetna Life & Casualty, Eastman Kodak, and Prudential Insurance. Alan Westin, What Should Be Done about Employee Privacy?, 25 PERS. ADMIN. 27, 30 (1980). See also David Ewing, IBM's Guidelines to Employee Privacy, HARV. BUS. REV., Sept./Oct. 1976, at 82.
-
-
-
-
175
-
-
84923743023
-
Dept. of Labor Hearings on Workplace Privacy
-
Courts have held that mere collection of information is not an invasion of privacy, and its internal use by the employer is not subject to privacy rights of the employee because the employee record is considered employer property. PRIVACY PROTECTION STUDY COMMISSION, supra note 80, at app. 1, p. 21; Mordechai Mironi, The Confidentiality of Personnel Records: A Legal and Ethical View, 25 LAB. L.J. 270, 288-89 (1974); George Stevens, The Publicity Requirement and the Employee's Right to Privacy, 16 AM. BUS. L.J. 360, 365 (1979). See Saldana v. Wyoming, 846 P.2d 604, 651 (Wyo. 1993) ("[R]etrenchment by the United States Supreme Court and the report of the Privacy Protection Study Commission have made it abundantly clear that the right of privacy will be fully protected only if there is action by the states. It is time to take that step. It is vital to a free society to establish a zone of privacy in which each individual is free from physical and psychological intrusion and has the autonomy to make vital personal decisions." Id. (Urbigkit, J., dissenting)). See also Johnson v. Carpenter Tech. Corp., 723 F. Supp. 180 (D. Conn. 1989); Esnor v. Rust Eng'g Co., 704 F. Supp. 808 (E.D. Tenn. 1989); Greco v. Halliburton Co., 674 F. Supp. 1447 (D. Wy. 1987); Peller v. Retail Credit Co., 359 F. Supp. 1235 (N.D. Ga. 1973), aff'd mem., 505 F.2d 733 (5th Cir. 1974); O'Keefe v. Passaic Valley Water Comm., 624 A.2d 578, (N.J. 1993); Cort v. Bristol-Myers, 431 N.E.2d 908, 914 (Mass. 1982). In addition, the former chairman of the Privacy Protection Study Commission, David Linowes, conducted a study which showed that, of the employers questioned, 64% do not have programs that provide employees privacy protection. In addition, 36% of the employers would not create such programs until required to do so by law. Dept. of Labor Hearings on Workplace Privacy, 44 Fed. Reg. 57537 (1979), 44 Fed. Reg. 75755 (1979) (statement of Prof. David Linowes). On the other hand, some of this country's larger firms have exhibited efforts at conformance. These firms include AT&T, Aetna Life & Casualty, Eastman Kodak, and Prudential Insurance. Alan Westin, What Should Be Done about Employee Privacy?, 25 PERS.
-
(1979)
Fed. Reg.
, vol.44
, pp. 57537
-
-
-
176
-
-
84923730344
-
What Should Be Done about Employee Privacy?
-
Courts have held that mere collection of information is not an invasion of privacy, and its internal use by the employer is not subject to privacy rights of the employee because the employee record is considered employer property. PRIVACY PROTECTION STUDY COMMISSION, supra note 80, at app. 1, p. 21; Mordechai Mironi, The Confidentiality of Personnel Records: A Legal and Ethical View, 25 LAB. L.J. 270, 288-89 (1974); George Stevens, The Publicity Requirement and the Employee's Right to Privacy, 16 AM. BUS. L.J. 360, 365 (1979). See Saldana v. Wyoming, 846 P.2d 604, 651 (Wyo. 1993) ("[R]etrenchment by the United States Supreme Court and the report of the Privacy Protection Study Commission have made it abundantly clear that the right of privacy will be fully protected only if there is action by the states. It is time to take that step. It is vital to a free society to establish a zone of privacy in which each individual is free from physical and psychological intrusion and has the autonomy to make vital personal decisions." Id. (Urbigkit, J., dissenting)). See also Johnson v. Carpenter Tech. Corp., 723 F. Supp. 180 (D. Conn. 1989); Esnor v. Rust Eng'g Co., 704 F. Supp. 808 (E.D. Tenn. 1989); Greco v. Halliburton Co., 674 F. Supp. 1447 (D. Wy. 1987); Peller v. Retail Credit Co., 359 F. Supp. 1235 (N.D. Ga. 1973), aff'd mem., 505 F.2d 733 (5th Cir. 1974); O'Keefe v. Passaic Valley Water Comm., 624 A.2d 578, (N.J. 1993); Cort v. Bristol-Myers, 431 N.E.2d 908, 914 (Mass. 1982). In addition, the former chairman of the Privacy Protection Study Commission, David Linowes, conducted a study which showed that, of the employers questioned, 64% do not have programs that provide employees privacy protection. In addition, 36% of the employers would not create such programs until required to do so by law. Dept. of Labor Hearings on Workplace Privacy, 44 Fed. Reg. 57537 (1979), 44 Fed. Reg. 75755 (1979) (statement of Prof. David Linowes). On the other hand, some of this country's larger firms have exhibited efforts at conformance. These firms include AT&T, Aetna Life & Casualty, Eastman Kodak, and Prudential Insurance. Alan Westin, What Should Be Done about Employee Privacy?, 25 PERS. ADMIN. 27, 30 (1980). See also David Ewing, IBM's Guidelines to Employee Privacy, HARV. BUS. REV., Sept./Oct. 1976, at 82.
-
(1980)
Pers. Admin.
, vol.25
, pp. 27
-
-
Westin, A.1
-
177
-
-
0346930945
-
IBM's Guidelines to Employee Privacy
-
Sept./Oct.
-
Courts have held that mere collection of information is not an invasion of privacy, and its internal use by the employer is not subject to privacy rights of the employee because the employee record is considered employer property. PRIVACY PROTECTION STUDY COMMISSION, supra note 80, at app. 1, p. 21; Mordechai Mironi, The Confidentiality of Personnel Records: A Legal and Ethical View, 25 LAB. L.J. 270, 288-89 (1974); George Stevens, The Publicity Requirement and the Employee's Right to Privacy, 16 AM. BUS. L.J. 360, 365 (1979). See Saldana v. Wyoming, 846 P.2d 604, 651 (Wyo. 1993) ("[R]etrenchment by the United States Supreme Court and the report of the Privacy Protection Study Commission have made it abundantly clear that the right of privacy will be fully protected only if there is action by the states. It is time to take that step. It is vital to a free society to establish a zone of privacy in which each individual is free from physical and psychological intrusion and has the autonomy to make vital personal decisions." Id. (Urbigkit, J., dissenting)). See also Johnson v. Carpenter Tech. Corp., 723 F. Supp. 180 (D. Conn. 1989); Esnor v. Rust Eng'g Co., 704 F. Supp. 808 (E.D. Tenn. 1989); Greco v. Halliburton Co., 674 F. Supp. 1447 (D. Wy. 1987); Peller v. Retail Credit Co., 359 F. Supp. 1235 (N.D. Ga. 1973), aff'd mem., 505 F.2d 733 (5th Cir. 1974); O'Keefe v. Passaic Valley Water Comm., 624 A.2d 578, (N.J. 1993); Cort v. Bristol-Myers, 431 N.E.2d 908, 914 (Mass. 1982). In addition, the former chairman of the Privacy Protection Study Commission, David Linowes, conducted a study which showed that, of the employers questioned, 64% do not have programs that provide employees privacy protection. In addition, 36% of the employers would not create such programs until required to do so by law. Dept. of Labor Hearings on Workplace Privacy, 44 Fed. Reg. 57537 (1979), 44 Fed. Reg. 75755 (1979) (statement of Prof. David Linowes). On the other hand, some of this country's larger firms have exhibited efforts at conformance. These firms include AT&T, Aetna Life & Casualty, Eastman Kodak, and Prudential Insurance. Alan Westin, What Should Be Done about Employee Privacy?, 25 PERS. ADMIN. 27, 30 (1980). See also David Ewing, IBM's Guidelines to Employee Privacy, HARV. BUS. REV., Sept./Oct. 1976, at 82.
-
(1976)
Harv. Bus. Rev.
, pp. 82
-
-
Ewing, D.1
-
178
-
-
84923751913
-
-
Murg & Maledon, supra note 6
-
Murg & Maledon, supra note 6.
-
-
-
-
179
-
-
84923751912
-
-
Privacy Act Amendments of 1991, 137 CONG. REC. H3449-06 (1991)
-
Privacy Act Amendments of 1991, 137 CONG. REC. H3449-06 (1991).
-
-
-
-
180
-
-
84923751911
-
-
PRIVACY PROTECTION STUDY COMMISSION, supra note 80, at 238-41
-
PRIVACY PROTECTION STUDY COMMISSION, supra note 80, at 238-41.
-
-
-
-
181
-
-
84923751910
-
-
Id. at 232
-
Id. at 232.
-
-
-
-
182
-
-
84923731724
-
The Privacy Act after a Decade
-
Richard Ehlke, The Privacy Act after a Decade, 18 JOHN MARSHALL L. REV. 829, 840 (1985).
-
(1985)
John Marshall L. Rev.
, vol.18
, pp. 829
-
-
Ehlke, R.1
-
183
-
-
84923751909
-
-
Id.
-
Id.
-
-
-
-
184
-
-
84923751907
-
-
MADSEN, supra note 50, at 141-42
-
MADSEN, supra note 50, at 141-42.
-
-
-
-
185
-
-
84923751905
-
-
Id. See, e.g., Individual Privacy Protection Act, H.R. 126, 135 CONG. REC. E402-02 (daily ed. 1989)
-
Id. See, e.g., Individual Privacy Protection Act, H.R. 126, 135 CONG. REC. E402-02 (daily ed. 1989).
-
-
-
-
186
-
-
84923751896
-
-
note
-
S. 1735, 103d Cong., 1st Sess. (1993). A similar bill was proposed in the House of Representatives by Illinois Rep. Cardiss Collins. H.R. 135, 103d Cong., 1st Sess. (1993). H.R. 135, however, did not make specific reference to application to the private sector, while it also did not exclude that application. Id. § 6(b)(2). One additional point worth noting is that H.R. 135 stated that the "right to privacy is a personal and fundamental right protected by the Constitution of the United States." Id. § 2(4).
-
-
-
-
187
-
-
84923751895
-
-
Id. § 2(5)(A)-(C)
-
Id. § 2(5)(A)-(C).
-
-
-
-
188
-
-
84923751894
-
-
Id. § 6
-
Id. § 6.
-
-
-
-
189
-
-
84923751893
-
-
note
-
Privacy International is an independent non-governmental organization established in 1990 with the objective of protecting personal privacy and monitoring surveillance by governments, financial institutions, intelligence agencies, media, political groups, police, and other organizations.
-
-
-
-
190
-
-
84923751892
-
-
note
-
Simon Davies, The United States Privacy Protection Act, 1993 (S. 1735), Draft Discussion Paper at 2 (Mar. 11, 1994); see also, Simon Davies, Comment: A U.S. Privacy Commission, 2 INT'L PRIVACY BULL., Jan./Mar. 1994, at 3.
-
-
-
-
191
-
-
84923751891
-
-
Davies, The United States Privacy Protection Act, 1993 (S. 1735), Draft Discussion Paper, supra note 166
-
Davies, The United States Privacy Protection Act, 1993 (S. 1735), Draft Discussion Paper, supra note 166.
-
-
-
-
192
-
-
79953849516
-
Privacy, Computers and the Commercial Dissemination of Personal Information
-
Note
-
Jonathan Graham, Note, Privacy, Computers and the Commercial Dissemination of Personal Information, 65 TEX. L. REV. 1395 (1987).
-
(1987)
Tex. L. Rev.
, vol.65
, pp. 1395
-
-
Graham, J.1
-
193
-
-
84923751890
-
-
Id. at 1422-23 n.146 (citation omitted). 170 Privacy Act Amendments of 1991, supra note 155, at 3450
-
Id. at 1422-23 n.146 (citation omitted). 170 Privacy Act Amendments of 1991, supra note 155, at 3450.
-
-
-
-
194
-
-
84923751889
-
-
Id.
-
Id.
-
-
-
-
195
-
-
84923751887
-
-
PRIVACY PROTECTION STUDY COMMISSION, supra note 80, at 232
-
PRIVACY PROTECTION STUDY COMMISSION, supra note 80, at 232.
-
-
-
-
196
-
-
84923751885
-
-
Id.
-
Id.
-
-
-
-
197
-
-
84923751876
-
-
note
-
44 Fed. Reg. 57,537 (1979), 44 Fed. Reg. 75,755 (1979). See also Cooney, supra note 38, for an extensive discussion of the status of work place monitoring in today's private sector industry.
-
-
-
-
198
-
-
84923751875
-
-
Ehlke, supra note 158, at 840-41
-
Ehlke, supra note 158, at 840-41.
-
-
-
-
199
-
-
84923751874
-
-
Id.
-
Id.
-
-
-
-
200
-
-
84923751873
-
-
5 U.S.C. § 552(b)(6) (1988)
-
5 U.S.C. § 552(b)(6) (1988).
-
-
-
-
201
-
-
84923751872
-
-
137 CONG. REC. H3449-06 (daily ed. May 22, 1991) (statement of Rep. Wise)
-
137 CONG. REC. H3449-06 (daily ed. May 22, 1991) (statement of Rep. Wise).
-
-
-
-
202
-
-
84923751871
-
-
See supra notes 8-36 and accompanying text
-
See supra notes 8-36 and accompanying text.
-
-
-
-
203
-
-
84923751870
-
-
Id.
-
Id.
-
-
-
-
204
-
-
84923751869
-
-
Mason, supra note 5; Piller, supra note 113
-
Mason, supra note 5; Piller, supra note 113.
-
-
-
-
205
-
-
84923751867
-
-
note
-
For instance, the National Airline Commission has accepted President Clinton's proposal that the U.S. Air Traffic Control system become a quasi-governmental operation, as opposed to a standard government agency, allowing it greater flexibility and freedom. Jeffrey Lenorovitz & Edward Phillips, Clinton Compromises on Airline Strategy, AVIATION WEEK & SPACE TECHNOLOGY, Jan. 10, 1994, at 22. See also Harold Seidman, Government Corporations in the United States, 22 OPTIMUM 40 (1991/1992).
-
-
-
-
206
-
-
84923751865
-
-
note
-
OECD GUIDELINES, supra note 54. For a more complete discussion of the OECD Guidelines, see Boehmer & Palmer, supra note 49, at 273-76.
-
-
-
-
207
-
-
84923751856
-
-
OECD GUIDELINES, supra note 54, Recommendation 1
-
OECD GUIDELINES, supra note 54, Recommendation 1.
-
-
-
-
208
-
-
84923751855
-
-
OECD GUIDELINES, supra note 54, pt. 3, § 17
-
OECD GUIDELINES, supra note 54, pt. 3, § 17.
-
-
-
-
209
-
-
84923751854
-
-
Id.
-
Id.
-
-
-
-
210
-
-
84923751853
-
-
note
-
COE CONVENTION, supra note 55. For a more complete discussion of the COE Convention, see Boehmer & Palmer, supra note 49, at 276-79.
-
-
-
-
211
-
-
84923751852
-
-
Id. art. 4, §1
-
Id. art. 4, §1.
-
-
-
-
212
-
-
84923751851
-
-
MADSEN, supra note 50, at 25
-
MADSEN, supra note 50, at 25.
-
-
-
-
213
-
-
84923751850
-
-
1992 DIRECTIVE, supra note 56
-
1992 DIRECTIVE, supra note 56.
-
-
-
-
214
-
-
84923751849
-
-
note
-
COUNCIL OF THE EUROPEAN COMMUNITIES, COMMON POSITION (EC) No. 1/95, 1995 O.J. 1 (Notice No. 95/C 93/01 (4/13/95)); EC Press Release: IP/95/822 (7/25/95), "Council Definitively Adopts Directive on Protection of Personal Data."
-
-
-
-
215
-
-
84923751847
-
-
Id. at art. 32(1)
-
Id. at art. 32(1).
-
-
-
-
216
-
-
84923751845
-
-
note
-
1992 DIRECTIVE, supra note 56, art. 5. If minimum standards have not been met, Article 26, §§ 1 and 2 of the 1992 Directive provide mechanisms for specific approval of the transfer of information to that country. In one instance in which the Italian automobile firm, Fiat, attempted to transmit information from its subsidiary in France to Italy, France refused to permit the transmission because Italy did not offer adequate protections for the information. See MADSEN, supra note 50, at 9.
-
-
-
-
217
-
-
84923751836
-
-
1992 DIRECTIVE, supra note 56, art. 30, § 1
-
1992 DIRECTIVE, supra note 56, art. 30, § 1.
-
-
-
-
218
-
-
0003768069
-
-
David Flaherty, a recognized scholar in the area of privacy protection and Canada's Privacy Protection Commissioner, observed in 1989, "Unless a federal data protection agency is created in the United States, the federal system for articulating privacy interests in a systematic fashion is woefully inadequate." DAVID H. FLAHERTY, PROTECTING PRIVACY IN SURVEILLANCE SOCIETIES 382 (1989). See also Mark Rotenberg, In Support of A Data Protection Board in the United States, 8 GOV'T INFO. Q. 79 (1991);
-
(1989)
Protecting Privacy in Surveillance Societies
, pp. 382
-
-
Flaherty, D.H.1
-
219
-
-
0346300824
-
In Support of a Data Protection Board in the United States
-
David Flaherty, a recognized scholar in the area of privacy protection and Canada's Privacy Protection Commissioner, observed in 1989, "Unless a federal data protection agency is created in the United States, the federal system for articulating privacy interests in a systematic fashion is woefully inadequate." DAVID H. FLAHERTY, PROTECTING PRIVACY IN SURVEILLANCE SOCIETIES 382 (1989). See also Mark Rotenberg, In Support of A Data Protection Board in the United States, 8 GOV'T INFO. Q. 79 (1991);
-
(1991)
Gov't Info. Q.
, vol.8
, pp. 79
-
-
Rotenberg, M.1
-
220
-
-
84923751835
-
-
CONG. REC. H755 (daily ed. Jan. 29, 1991) (statement of Rep. Wise) (introduction of the Data Protection Act of 1991, H.R. 685)
-
CONG. REC. H755 (daily ed. Jan. 29, 1991) (statement of Rep. Wise) (introduction of the Data Protection Act of 1991, H.R. 685).
-
-
-
-
221
-
-
21144476385
-
The Globalization of Privacy
-
Priscilla Regan, The Globalization of Privacy, 52 J. ECON. & STRATEGY 257, 266-67 (1993).
-
(1993)
J. Econ. & Strategy
, vol.52
, pp. 257
-
-
Regan, P.1
-
222
-
-
84923751834
-
-
note
-
PRIVACY PROTECTION STUDY COMMISSION, supra note 80, at 14. The requirements and proscriptions of the Privacy Act were based on five principles articulated by an advisory committee to the Department of Health, Education and Welfare in a report entitled, "Records, Computers and The Rights of Citizens." The principles are as follows: 1. There must be no personal data record-keeping systems whose very existence is secret. 2. There must be a way for an individual to find out what information about him is in a record and how it is used. 3. There must be a way for an individual to prevent information about him that was obtained for one purpose from being used or made available for other purposes without his consent. 4. There must be a way for an individual to correct or amend a record of identifiable information about him. 5. Any organization creating, maintaining, using, or disseminating records of identifiable personal data must assure the reliability of the data for their intended use and must take precautions to prevent misuse of the data. Murg & Maledon, supra note 6, at 171 (citing HEW, RECORDS, COMPUTERS AND THE RIGHTS OF CITIZENS (1973)). In addition, in his testimony before Congress, Charles Piller, senior associate editor of MacWorld magazine, outlined basic features for an effective employee privacy policy. The principles espoused by Piller are unique in that they purport to safeguard employee privacy rights without sacrificing important management interests, an appropriate objective for a federal privacy act. Those factors are: 1. Employees are entitled to reasonable expectations of personal privacy on the job. 2. Employees know what electronic surveillance tools are used, and how management uses the collected data. 3. Management uses electronic monitoring or searches of data files, network communications or electronic mail to the minimum extent possible. Continuous monitoring is not permissible. 4. Employees participate in decisions about how and when management conducts electronic monitoring or searches. 5. Data is gathered and used for only clearly defined work-related purposes. 6. Management will not engage in secret monitoring or searches, except when credible evidence of criminal activity or other serious wrongdoing comes to light. 7. Monitoring data will not be the sole factor in evaluating employee performance. 8. Employees can inspect, challenge, and correct electronic records kept on their activities or files captured through electronic means. 9. Records that have become irrelevant to the purposes for which they were collected will be destroyed. 10. Monitoring data that identifies individual employees will not be released to any third party, except to comply with legal requirements. 11. Employees or prospective employees cannot waive privacy rights. 12. Managers who violate these privacy principles are subject to discipline or termination. PWCA Hearings, supra note 10, at 8-9.
-
-
-
-
223
-
-
84923751833
-
-
note
-
It is not so difficult to respond to these concerns in formulating legislation, and several states have already forged a path. New York and Minnesota, for instance, have state privacy protection statutes in place. New York's Personal Privacy Protection Law establishes a Committee on Open Government that oversees the compliance of state agencies with its provisions. Personal Privacy Protection Law (N.Y. STAT. ANN. §§ 89(1), 92(2), 93 (West 1994)). Minnesota's Government Data Practices Act (MINN. STAT. ANN. §§ 13.01 - 13.90 (West 1988 & Supp. 1995)) applies not only to state agencies, but also to municipal governments. Id. §13.01. The Act establishes a data classification system to categorize all government information according to the individuals who may access that information and requires that each agency subject to the Act establish a "responsible authority" who is accountable for compliance with the Act. Id. §§ 13.02(16), 13.03(3), 13.05.
-
-
-
-
224
-
-
84923751832
-
-
See supra note 197 (Piller factor 5)
-
See supra note 197 (Piller factor 5).
-
-
-
-
225
-
-
84923751831
-
-
See supra note 197 (Piller factors 1, 2 and 6)
-
See supra note 197 (Piller factors 1, 2 and 6).
-
-
-
-
226
-
-
84923751830
-
-
See supra note 197 (Piller factor 10)
-
See supra note 197 (Piller factor 10).
-
-
-
-
227
-
-
84923751829
-
-
See supra note 197 (Piller factors 1, 4 and 11)
-
See supra note 197 (Piller factors 1, 4 and 11).
-
-
-
-
228
-
-
84923751827
-
-
note
-
The Privacy Protection Study Commission has endorsed the concept of "expectation of privacy" but only where the government entity seeksrecords from a record keeper such as a bank or an employer. PRIVACY PROTECTION STUDY COMMISSION, supra note 80 at 357. Note also that the Privacy Act has a similar provision. o U.S.C. § 552a(e)(3)(C) (1988).
-
-
-
-
229
-
-
84923751825
-
-
Brunn, supra note 78, at 390
-
Brunn, supra note 78, at 390.
-
-
-
|