This Research Guide is intended to provide a starting point for research into the various ways in which law and technology intersect. In particular, this Guide comprises resources focused on Information and Data Privacy as well as Data and Cybersecurity. This Guide also features a selection of resources on a number of broad law-and-technology topics such as Artificial Intelligence (including ChatGPT/GPT-4, and algorithms generally), Social Media and the Law, the "law of the Internet," Biotechnology and the Law, as well as technology issues as pertaining to Environmental Law. Finally, due to the many ways in which Intellectual Property Law impacts and is, in turn, impacted by Technology, this Research Guide also includes a page of general resources in the overarching area of Intellectual Property. The user is invited to visit the Law Library's Intellectual Property Research Guide for additional and more specific resources in this doctrinal area.
The user should note that the materials featured in this Research Guide are intended to be suggestive, rather than prescriptive or comprehensive. That is, the intention is to present the user with an overview of the Law Library's collection in these areas, with the hope that one or more titles may spark curiosity about a particular topic. All materials listed here are available in the Law Library in print form, but in some cases electronic access may also be available. Accordingly, the remote/ online user is encouraged to check the Law Library's catalog to find out whether other editions/ versions are available.
In their seminal 1891 Harvard Law Review article, future Supreme Court Justices Warren and Brandeis famously framed an initial definition of Privacy as consisting in "the right to be let alone." (Samuel D. Warren & Louis D. Brandeis, The Right to Privacy, 4 HARV. L. REV. 193 (1890-1891)).
Privacy and legal scholars have since enhanced that definition. Noted privacy scholar Alan Westin defined Privacy as "...the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others..." (Alan Westin, Privacy and Freedom 5 (1967)).
Today, as defined in Black's Law Dictionary (11th Ed., 2019), the term PRIVACY is broadly defined to mean and refer to:
"The quality, state, or condition of being free from public attention to intrusion into or interference with one's acts or decisions" and comprises the following:
"autonomy privacy - An individual's right to control his or her personal activities or intimate personal decisions without outside interference, observation, or intrusion; informational privacy - A private person's right to choose to determine whether, how, and to what extent information about oneself is communicated to others, esp. sensitive and confidential information; and personal privacy - A person's interest in nondisclosure or selective disclosure of confidential or private information or matters relating to his or her person."
The following is a list of U.S. Federal legislation pertaining to Information Privacy/ Data Privacy and Cyber- and Information Security.
The legislation is presented in chronological order, to provide the user with an idea of the development of this area of law over time.
Fair Credit Reporting Act (FCRA) of 1970 (15 U.S.C. §§ 1681 et seq.)
Bank Secrecy Act of 1970 (Pub L. 91-508)
Privacy Act of 1974 (5 U.S.C. §552a)
Family Educational Rights and Privacy Act (FERPA) of 1974 (20 U.S.C. §§ 1221; 1232g)
Right to Financial Privacy Act of 1978 (12 U.S.C. §§ 3401-3422)
Foreign Intelligence Surveillance Act (FISA) of 1978 (15 U.S.C. §§ 1801-1811)
Privacy Protection Act (PPA) of 1980 (42 U.S.C. § 2000aa)
Cable Communications Policy Act of 1984 (47 U.S.C. § 551)
Electronic Communications Privacy Act (ECPA) of 1986 (18 U.S.C. § 2510-2522 & 2701-2709)
Computer Matching and Privacy Protection Act of 1988 (5 U.S.C. § 552a)
Employee Polygraph Protection Act of 1988 (29 U.S.C. §§ 22001-2009)
Video Privacy Protection Act (VPPA) of 1988 (18 U.S.C. §§ 2710 - 2711)
Telephone Consumer Protection Act (TCPA) of 1991 (47 U.S.C. § 227)
Driver's Privacy Protection Act of 1994 (18 U.S.C. §§ 2721-2725)
Communications Assistance for Law Enforcement Act of 1994 (Pub. L. No. 103-414)
Personal Responsibility and Work Opportunity Reconciliation Act of 1996 (Pub. L. No. 104-193)
Health Insurance Portability and Accountability Act (HIPAA) of 1996 (Pub. L. 104-191; 45 C.F.R. 160, 162, 164)
Identity Theft and Assumption Deterrence Act (ITADA) of 1998 (18 U.S.C. § 1028)
Children's Online Privacy Protection Act (COPPA) of 1998 (15 U.S.C. §§ 6501-6506)
Gramm-Leach-Bliley Act (GLBA) of 1999 (15 U.S.C. §§ 6801-6809)
Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act (USA Patriot Act) of 2001 (Pub. L. No 107-56)
Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN-SPAM Act) of 2003
Video Voyeurism Prevention Act of 2004 (18 U.S.C. § 1801)
FISA Amendments Act of 2008 (Pub. L. No. 110-261)
The titles below are a selection of the study aids and materials available through the Panza Maurer Law Library to provide those studying issues in Information and Data Privacy with a starting point for their research.
NOTE: The links below will take the user to the Law Library's online study aids collection. The inclusion of a Call Number indicates that the Law Library also has the particular title in print, although the print resource may be an earlier edition of the title.
Privacy Law Fundamentals, Sixth Edition (2022)
by
“Privacy Law Fundamentals, Sixth Edition” incorporates extensive new developments in privacy law. It includes key provisions of privacy statutes, leading cases, tables summarizing the statutes, summaries of key state privacy laws and overviews of various agency enforcement actions. This book serves as an easily digestible overview for privacy law students, as well as a handy reference guide for those who are more experienced.
Topics covered
Key provisions of privacy statutes.
Leading cases.
Tables summarizing the statutes.
Summaries of key state privacy laws.
Overviews of various agency enforcement actions.
Regulatory enforcement – states.
Self-protective measures.
Ransomware.
National security economic controls, trade limits, and equipment bans.
U. S. Private-Sector Privacy, Third Edition
by
For privacy practitioners seeking guidance on the evolving U.S. privacy landscape, “U.S. Private-Sector Privacy, Third Edition” is the principal text for the IAPP’s Certified Information Privacy Professional/United States (CIPP/US) program. The book explores U.S. privacy laws, regulations, and key influencing technological and societal developments. It also covers privacy practice essentials in the medical, financial, educational, telecommunications and marketing sectors, as well as enforcement, online activities, data breach and incident management, and privacy issues in investigations and litigation.
Topics covered
Limits on private-sector collection and data use.
Common principles and approaches to information privacy and data protection.
Critical components of the CCPA.
Key elements of the EU’s GDPR.
Federal and state best practices for emerging technologies and privacy expectations.
An Introduction to Privacy for Technology Professionals
by
An Introduction to Privacy for Technology Professionals” is an official textbook of the IAPP’s Certified Information Privacy Technologist (CIPT) program. It addresses how privacy and technology intersect and examines critical areas of concern in the industry. This textbook provides technology professionals with key concepts and techniques to use throughout the entire data life cycle to help navigate the rapidly changing privacy landscape.
Topics covered
The impact of privacy on engineering.
Incorporating privacy into risk analyses.
The role of encryption and nonrepudiation in building solutions.
Concepts of identifiability and anonymity.
The impact of privacy on tracking and surveillance.
Usable and useful privacy interfaces.
Concepts of interference and other privacy harms.
The roles and management of privacy governance.
The integration of security and privacy.
The titles below are selected hornbooks that provide a general overview of Information Privacy Law and Data Privacy Law. These resources will generally provide more in-depth coverage of these areas than the study guides described in this page.
NOTE: The links below will take the user to the Law Library's online collection. The inclusion of a Call Number indicates that the Law Library also has the particular title in print, although the print resource may be an earlier edition of the title.
The titles below are a selection of both law-specific and interdisciplinary materials in the areas of Information Privacy and Data Privacy that are available through the Panza Maurer Law Library.
NOTE: Where the Law Library has a title as part of an online collection, the links below will take the user to the Law Library's online collection. The inclusion of a Call Number indicates that the Law Library has the particular title in print, although if the title is also available in electronic format, the print resource may be an earlier edition.
The Right to Privacy
by
To what extent is the individual protected from arbitrary and unreasonable intrusions into his personal privacy by the Bill of Rights and the Fourteenth Amendment? The aim of Dr. Beckenridge's study is to answer this question, which is of such crucial relevance in America today. The Right to Privacy is based upon the belief that the individual has the right to determine the degree to which he wishes to share of himself with others and has control over the time, place, and circumstances in which he communicates with others; that he has the right to withdraw or participate as he sees fit; and the right to control dissemination of information about himself. But since man lives in a community of others, inescapably he has the need to participate and communicate with others. When this apparent dichotomy is coupled with the recognized power of government, even in a democracy, to function for the public good, the question arises: to what extent and in what areas may an individual's personal affairs be exposed without his knowledge or consent? Sooner or later it becomes the business of judges to determine the limits of individual privacy claims, and it is to the decisions and opinions of judges, primarily of the United States Supreme Court, that one must look to find the status of claims of a right to privacy--what has been called man's "right to be let alone." In determining how far the United States government has gone in invading the right to privacy--and what it has done to protect that right--the author examines recent court decisions, especially those of the United States Supreme Court, and some court opinions as they interpret the Bill of Rights and the Fourteenth Amendment. He also scrutinizes the extension or incorporation of the Rights into the Fourteenth Amendment, and the relation of police power to individual rights. This timely study also demonstrates that some "rights" are superior to others and that they come info conflict--conflicts which still have to be resolved.
Strategic Privacy by Design, Second Edition
by
Strategic Privacy by Design, Second Edition” contains a methodology for building privacy into a product, service, or business process. It also challenges traditional thought and offers a new way to think of and build up privacy while providing a comprehensive threat modeling and diagraming method to systematically approach threat identification and mitigation.
Topics covered
Examples and exercises with detailed answers.
A glossary of defined terms.
Threat modeling.
Factor analysis of information risk (FAIR).
Controls (aka privacy design strategies and tactics).
New appendix, maps, and chapters.