Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- California Online Privacy Protection Act (1)
- Commercial Privacy Bill of Rights Act of 2011 (1)
- Computer security (1)
- Computer systems (1)
- Cookies (1)
-
- Data collection (1)
- Digital Privacy Act (1)
- Electronic records (1)
- Electronic signature (1)
- Federal Trade Commission (1)
- Identity theft (1)
- Informed consent (1)
- Law reform (1)
- Mobile applications (1)
- National Crime Information Center (1)
- Online Privacy Protection Act (1)
- Personal information (1)
- Privacy (1)
- Private causes of action (1)
- Records (1)
- Statutory remedies (1)
- Terms and conditions (1)
- Third parties (1)
- Websites (1)
Articles 1 - 2 of 2
Full-Text Articles in Privacy Law
Protecting Personal Information: Achieving A Balance Between User Privacy And Behavioral Targeting, Patrick Myers
Protecting Personal Information: Achieving A Balance Between User Privacy And Behavioral Targeting, Patrick Myers
University of Michigan Journal of Law Reform
Websites and mobile applications provide immeasurable benefits to both users and companies. These services often collect vast amounts of personal information from the individuals that use them, including sensitive details such as Social Security numbers, credit card information, and physical location. Personal data collection and dissemination leave users vulnerable to various threats that arise from the invasion of their privacy, particularly because users are often ignorant of the existence or extent of these practices. Current privacy law does not provide users with adequate protection from the risks attendant to the collection and dissemination of their personal information. This Note advocates …
Protection Of Privacy Of Computerized Records In The National Crime Information Center, Stuart R. Hemphill
Protection Of Privacy Of Computerized Records In The National Crime Information Center, Stuart R. Hemphill
University of Michigan Journal of Law Reform
The purpose of this article is to describe the social benefits and costs of the NCIC and to indicate the need for a program of operational controls to temper the system's impact on the balance between individual privacy and law enforcement needs. Various approaches which could be incorporated into a program of safeguards are introduced and briefly analyzed. Finally, the article discusses several overall design issues which should be considered in the construction of an adequate program of safeguards. Particular emphasis is placed on the NCCH file since it is the major source of the tensions underlying the issues addressed.