Skip to main content

2010 | OriginalPaper | Buchkapitel

The Regulatory Framework for Privacy and Security

verfasst von : Janine S. Hiller

Erschienen in: International Handbook of Internet Research

Verlag: Springer Netherlands

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The internet enables the easy collection of massive amounts of personally identifiable information. Unregulated data collection causes distrust and conflicts with widely accepted principles of privacy. The regulatory framework in the United States for ensuring privacy and security in the online environment consists of federal, state, and self-regulatory elements. New laws have been passed to address technological and internet practices that conflict with privacy protecting policies. The United States and the European Union approaches to privacy differ significantly, and the global internet environment will likely cause regulators to face the challenge of balancing privacy interests with data collection for many years to come.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat America Online, Inc. v. LCGM, Inc., 46 F. Supp. 2d 444 (E.D.Va., 1998). America Online, Inc. v. LCGM, Inc., 46 F. Supp. 2d 444 (E.D.Va., 1998).
Zurück zum Zitat Burgunder, L. (2007). Legal aspects of managing technology (4th ed.). New York, NY: Thomson Higher Education. Burgunder, L. (2007). Legal aspects of managing technology (4th ed.). New York, NY: Thomson Higher Education.
Zurück zum Zitat California Database Breach Notification Security Act. (2002). California Civil Code Sections 1798.80-1798.84. Retrieved December 4, 2006, from http://www.leginfo.ca.gov/cgibin/waisgate?WAISdocID=24968225804+0+0+0&WAISaction=retrieve California Database Breach Notification Security Act. (2002). California Civil Code Sections 1798.80-1798.84. Retrieved December 4, 2006, from http://​www.​leginfo.​ca.​gov/cgibin/waisgate?WAISdocID=24968225804+0+0+0&WAISaction=retrieve
Zurück zum Zitat Ciocchetti, C. (2008). Just click submit: The Collection, dissemination, and tagging of personally identifying information. Vanderbilt Journal of Entertainment & Technology Law, 10, 553–642. Ciocchetti, C. (2008). Just click submit: The Collection, dissemination, and tagging of personally identifying information. Vanderbilt Journal of Entertainment & Technology Law, 10, 553–642.
Zurück zum Zitat Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003 (CAN-SPAM Act) 15 U.S.C. Sections 7701–7713 (2003). Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003 (CAN-SPAM Act) 15 U.S.C. Sections 7701–7713 (2003).
Zurück zum Zitat DeMarco, D. A. (2006). Understanding consumer information privacy in the realm of internet commerce: Personhood and pragmatism, pop-tarts and six-packs. Texas Law Review, 84, 1013–1065. DeMarco, D. A. (2006). Understanding consumer information privacy in the realm of internet commerce: Personhood and pragmatism, pop-tarts and six-packs. Texas Law Review, 84, 1013–1065.
Zurück zum Zitat Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data.
Zurück zum Zitat Gramm-Leach-Bliley Act. 15 U.S.C. Sections 6801–6809 (2000). Gramm-Leach-Bliley Act. 15 U.S.C. Sections 6801–6809 (2000).
Zurück zum Zitat Hardee, K. A. (2006). The Gramm-Leach-Bliley Act: Five years after implementation, does the Emperor wear clothes? Creighton Law Review, 39, 915–936. Hardee, K. A. (2006). The Gramm-Leach-Bliley Act: Five years after implementation, does the Emperor wear clothes? Creighton Law Review, 39, 915–936.
Zurück zum Zitat Health Information Privacy and Accountability Act (HIPAA), Pub. L. No. 104-191, 110 Stat. 1936 (1996). Health Information Privacy and Accountability Act (HIPAA), Pub. L. No. 104-191, 110 Stat. 1936 (1996).
Zurück zum Zitat Hiller, J., Belanger, F., Hsiao, M., & Park, J.-M. (2008). POCKET protection. American Business Law Journal, 45, 417–453.CrossRef Hiller, J., Belanger, F., Hsiao, M., & Park, J.-M. (2008). POCKET protection. American Business Law Journal, 45, 417–453.CrossRef
Zurück zum Zitat Jaynes, v. Commonwealth, 276 Va. 443, 666 S.E.2d 303 (2008). Jaynes, v. Commonwealth, 276 Va. 443, 666 S.E.2d 303 (2008).
Zurück zum Zitat Jaynes v. Commonwealth, 48 Va.App. 673, 634 S.E.2d 357 (2006). Jaynes v. Commonwealth, 48 Va.App. 673, 634 S.E.2d 357 (2006).
Zurück zum Zitat McClurg, A. J. (2003). A thousand words are worth a picture: A privacy tort response to consumer data profiling. Northwestern University Law Review, 98, 63–143. McClurg, A. J. (2003). A thousand words are worth a picture: A privacy tort response to consumer data profiling. Northwestern University Law Review, 98, 63–143.
Zurück zum Zitat Nehf, J. P. (2005). Shopping for privacy online: Consumer decision-making strategies and the emerging market for information privacy. University of Illinois Journal of Law, Technology and Policy, 2005, 1–53. Nehf, J. P. (2005). Shopping for privacy online: Consumer decision-making strategies and the emerging market for information privacy. University of Illinois Journal of Law, Technology and Policy, 2005, 1–53.
Zurück zum Zitat Reidenberg, J. A. (2003). Privacy wrongs in search of remedies. Hastings Law Journal, 54, 877–898. Reidenberg, J. A. (2003). Privacy wrongs in search of remedies. Hastings Law Journal, 54, 877–898.
Zurück zum Zitat Soma, J. T., Rynerson, S. D., & Beall-Eder, B. D. (2004). An analysis of the use of bilateral agreements between transnational trading groups: The US/EU e-commerce privacy safe harbor. Texas International Law Journal, 39, 171–227. Soma, J. T., Rynerson, S. D., & Beall-Eder, B. D. (2004). An analysis of the use of bilateral agreements between transnational trading groups: The US/EU e-commerce privacy safe harbor. Texas International Law Journal, 39, 171–227.
Metadaten
Titel
The Regulatory Framework for Privacy and Security
verfasst von
Janine S. Hiller
Copyright-Jahr
2010
Verlag
Springer Netherlands
DOI
https://doi.org/10.1007/978-1-4020-9789-8_15