Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Data mining

Discipline
Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 20 of 20

Full-Text Articles in Privacy Law

Mining For Children’S Data In Today’S Digital World, Damin Park Sep 2018

Mining For Children’S Data In Today’S Digital World, Damin Park

Journal of the National Association of Administrative Law Judiciary

No abstract provided.


Desperately Seeking Solutions: Using Implementation-Based Solutions For The Troubles Of Information Privacy In The Age Of Data Mining And The Internet Society, Tal Z. Zarsky Dec 2017

Desperately Seeking Solutions: Using Implementation-Based Solutions For The Troubles Of Information Privacy In The Age Of Data Mining And The Internet Society, Tal Z. Zarsky

Maine Law Review

Our personal information is constantly being recorded, stored and analyzed. Commercial entities watch our every action, storing this data and analyzing it in conjunction with information acquired from third parties. These entities use this knowledge to their benefit (and at times, our detriment) by discriminating between various customers on the basis of this personal information. At the same time, in the media market, large conglomerates can now provide specifically tailored content to individual customers on the basis of such data, thus potentially controlling their perspectives and impairing their autonomy. The expanding use of data mining applications, which enable vendors to …


Judicial Oversight Of Interception Of Communications In The United Kingdom: An Historical And Comparative Analysis, David G. Barnum Jun 2017

Judicial Oversight Of Interception Of Communications In The United Kingdom: An Historical And Comparative Analysis, David G. Barnum

Georgia Journal of International & Comparative Law

No abstract provided.


The Use Of Big Data Analytics By The Irs: Efficient Solutions Or The End Of Privacy As We Know It?, Kimberly A. Houser, Debra Sanders Jan 2017

The Use Of Big Data Analytics By The Irs: Efficient Solutions Or The End Of Privacy As We Know It?, Kimberly A. Houser, Debra Sanders

Vanderbilt Journal of Entertainment & Technology Law

This Article examines the privacy issues resulting from the IRS's big data analytics program as well as the potential violations of federal law. Although historically, the IRS chose tax returns to audit based on internal mathematical mistakes or mismatches with third party reports (such as W-2s), the IRS is now engaging in data mining of public and commercial data pools (including social media) and creating highly detailed profiles of taxpayers upon which to run data analytics. This Article argues that current IRS practices, mostly unknown to the general public are violating fair information practices. This lack of transparency and accountability …


Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen Dec 2016

Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen

All Faculty Scholarship

Big Data is the vast quantities of information amenable to large-scale collection, storage, and analysis. Using such data, companies and researchers can deploy complex algorithms and artificial intelligence technologies to reveal otherwise unascertained patterns, links, behaviors, trends, identities, and practical knowledge. The information that comprises Big Data arises from government and business practices, consumer transactions, and the digital applications sometimes referred to as the “Internet of Things.” Individuals invisibly contribute to Big Data whenever they live digital lifestyles or otherwise participate in the digital economy, such as when they shop with a credit card, get treated at a hospital, apply …


Secondary Data: A Primary Concern, Kelsey L. Zottnick Jan 2015

Secondary Data: A Primary Concern, Kelsey L. Zottnick

Vanderbilt Journal of Entertainment & Technology Law

This Note addresses privacy concerns implicated by rising secondary data mining. Secondary data mining is the use of personal information for a purpose other than the original. This complex technology drives billions of dollars in commercial industry yet remains largely unregulated. This Note examines the current state of the data mining industry and the behavioral fallacies that belie societal concerns about online privacy. Further, relevant federal, state, and constitutional laws appear outstripped by these technological advances. An analysis of potential privacy solutions examines the advantages and disadvantages of implementing each one through the privacy community, the federal government, and the …


Could Data Broker Information Threaten Physician Prescribing And Professional Behavior?, Marco D. Huesch, Michael K. Ong, Barak D. Richman Jan 2015

Could Data Broker Information Threaten Physician Prescribing And Professional Behavior?, Marco D. Huesch, Michael K. Ong, Barak D. Richman

Faculty Scholarship

Privacy is threatened by the extent of data collected and sold by consumer data brokers. Physicians, as individual consumers, leave a ‘data trail’ in the offline (e.g. through traditional shopping) and online worlds (e.g. through online purchases and use of social media). Such data could easily and legally be used without a physician’s knowledge or consent to influence prescribing practices or other physician professional behavior. We sought to determine the extent to which such consumer data was available on a sample of more than 3,000 physicians, healthcare faculty and healthcare system staff at one university’s health units. Using just work …


Rethinking Privacy, William H. Simon Jan 2014

Rethinking Privacy, William H. Simon

Faculty Scholarship

Anxiety about surveillance and data mining has led many to embrace implausibly expansive and rigid conceptions of privacy. The premises of some current privacy arguments do not fit well with the broader political commitments of those who make them. In particular, liberals seem to have lost touch with the reservations about privacy expressed in the social criticism of some decades ago. They seem unable to imagine that preoccupation with privacy might amount to a “pursuit of loneliness” or how “eyes on the street” might have reassuring connotations. Without denying the importance of the effort to define and secure privacy values, …


Governing, Exchanging, Securing: Big Data And The Production Of Digital Knowledge, Bernard E. Harcourt Jan 2014

Governing, Exchanging, Securing: Big Data And The Production Of Digital Knowledge, Bernard E. Harcourt

Faculty Scholarship

The emergence of Big Data challenges the conventional boundaries between governing, exchange, and security. It ambiguates the lines between commerce and surveillance, between governing and exchanging, between democracy and the police state. The new digital knowledge reproduces consuming subjects who wittingly or unwittingly allow themselves to be watched, tracked, linked and predicted in a blurred amalgam of commercial and governmental projects. Linking back and forth from consumer data to government information to social media, these new webs of information become available to anyone who can purchase the information. How is it that governmental, commercial and security interests have converged, coincided, …


William H. Sorrell, Attorney General Of Vermont, Et Al. V. Ims Health Inc., Et Al. - Amicus Brief In Support Of Petitioners, Kevin Outterson, David Orentlicher, Christopher Robertson, Frank Pasquale Aug 2013

William H. Sorrell, Attorney General Of Vermont, Et Al. V. Ims Health Inc., Et Al. - Amicus Brief In Support Of Petitioners, Kevin Outterson, David Orentlicher, Christopher Robertson, Frank Pasquale

Frank A. Pasquale

On April 26, 2011, the US Supreme Court will hear oral arguments in the Vermont data mining case, Sorrell v. IMS Health Inc. Respondents claim this is the most important commercial speech case in a decade. Petitioner (the State of Vermont) argues this is the most important medical privacy case since Whalen v. Roe. The is an amicus brief supporting Vermont, written by law professors and submitted on behalf of the New England Journal of Medicine


Grand Bargains For Big Data: The Emerging Law Of Health Information, Frank Pasquale Aug 2013

Grand Bargains For Big Data: The Emerging Law Of Health Information, Frank Pasquale

Frank A. Pasquale

No abstract provided.


Addressing The Harm Of Total Surveillance: A Reply To Professor Neil Richards, Danielle Citron, David Gray Jun 2013

Addressing The Harm Of Total Surveillance: A Reply To Professor Neil Richards, Danielle Citron, David Gray

David C. Gray

In his insightful article The Dangers of Surveillance, 126 HARV. L. REV. 1934 (2013), Neil Richards offers a framework for evaluating the implications of government surveillance programs that is centered on protecting "intellectual privacy." Although we share his interest in recognizing and protecting privacy as a condition of personal and intellectual development, we worry in this essay that, as an organizing principle for policy, "intellectual privacy" is too narrow and politically fraught. Drawing on other work, we therefore recommend that judges, legislators, and executives focus instead on limiting the potential of surveillance technologies to effect programs of broad and indiscriminate …


Addressing The Harm Of Total Surveillance: A Reply To Professor Neil Richards, Danielle Keats Citron, David C. Gray Jun 2013

Addressing The Harm Of Total Surveillance: A Reply To Professor Neil Richards, Danielle Keats Citron, David C. Gray

Danielle Keats Citron

In his insightful article The Dangers of Surveillance, 126 HARV. L. REV. 1934 (2013), Neil Richards offers a framework for evaluating the implications of government surveillance programs that is centered on protecting "intellectual privacy." Although we share his interest in recognizing and protecting privacy as a condition of personal and intellectual development, we worry in this essay that, as an organizing principle for policy, "intellectual privacy" is too narrow and politically fraught. Drawing on other work, we therefore recommend that judges, legislators, and executives focus instead on limiting the potential of surveillance technologies to effect programs of broad and indiscriminate …


Addressing The Harm Of Total Surveillance: A Reply To Professor Neil Richards, Danielle Keats Citron, David C. Gray Jan 2013

Addressing The Harm Of Total Surveillance: A Reply To Professor Neil Richards, Danielle Keats Citron, David C. Gray

Faculty Scholarship

In his insightful article The Dangers of Surveillance, 126 HARV. L. REV. 1934 (2013), Neil Richards offers a framework for evaluating the implications of government surveillance programs that is centered on protecting "intellectual privacy." Although we share his interest in recognizing and protecting privacy as a condition of personal and intellectual development, we worry in this essay that, as an organizing principle for policy, "intellectual privacy" is too narrow and politically fraught. Drawing on other work, we therefore recommend that judges, legislators, and executives focus instead on limiting the potential of surveillance technologies to effect programs of broad and indiscriminate …


Grand Bargains For Big Data: The Emerging Law Of Health Information, Frank Pasquale Jan 2013

Grand Bargains For Big Data: The Emerging Law Of Health Information, Frank Pasquale

Maryland Law Review

No abstract provided.


William H. Sorrell, Attorney General Of Vermont, Et Al. V. Ims Health Inc., Et Al. - Amicus Brief In Support Of Petitioners, Kevin Outterson, David Orentlicher, Christopher T. Robertson, Frank A. Pasquale Jan 2011

William H. Sorrell, Attorney General Of Vermont, Et Al. V. Ims Health Inc., Et Al. - Amicus Brief In Support Of Petitioners, Kevin Outterson, David Orentlicher, Christopher T. Robertson, Frank A. Pasquale

Faculty Scholarship

On April 26, 2011, the US Supreme Court will hear oral arguments in the Vermont data mining case, Sorrell v. IMS Health Inc. Respondents claim this is the most important commercial speech case in a decade. Petitioner (the State of Vermont) argues this is the most important medical privacy case since Whalen v. Roe.

The is an amicus brief supporting Vermont, written by law professors and submitted on behalf of the New England Journal of Medicine


Government Data Mining And The Fourth Amendment, Christopher Slobogin Jan 2008

Government Data Mining And The Fourth Amendment, Christopher Slobogin

Vanderbilt Law School Faculty Publications

The government's ability to obtain and analyze recorded information about its citizens through the process known as data mining has expanded enormously over the past decade. Although the best-known government data mining operation (Total Information Awareness, more recently dubbed Terrorism Information Awareness) supposedly no longer exists, large-scale data mining by federal agencies devoted to enforcing criminal and counter-terrorism laws has continued unabated. This paper addresses three puzzles about data mining. First, when data mining is undertaken by the government, does it implicate the Fourth Amendment? Second, does the analysis change when data mining is undertaken by private entities which then …


A Feeling Of Unease About Privacy Law, Ann Bartow Jan 2006

A Feeling Of Unease About Privacy Law, Ann Bartow

Law Faculty Scholarship

This essay responds to Daniel Solove's recent article, A Taxonomy of Privacy. I have read many of Daniel Solove's privacy-related writings, and he has made many important scholarly contributions to the field. As with his previous works about privacy and the law, it is an interesting and substantive piece of work. Where it falls short, in my estimation, is in failing to label and categorize the very real harms of privacy invasions in an adequately compelling manner. Most commentators agree that compromising a person's privacy will chill certain behaviors and change others, but a powerful list of the reasons why …


Lost In Translation? Data Mining, National Security And The Adverse Inference Problem, Anita Ramasastry Jan 2006

Lost In Translation? Data Mining, National Security And The Adverse Inference Problem, Anita Ramasastry

Articles

To the extent that we permit data mining programs to proceed, they must provide adequate due process and redress mechanisms that permit individuals to clear their names. A crucial criteria for such a mechanism is to allow access to information that was used to make adverse assessments so that errors may be corrected. While some information may have to be kept secret for national security purposes, a degree of transparency is needed when individuals are trying to protect their right to travel or access government services free from suspicion.

Part II of this essay briefly outlines the government's ability to …


Beyond The "War" On Terrorism: Towards The New Intelligence Network, Ronald D. Lee, Paul M. Schwartz Jan 2005

Beyond The "War" On Terrorism: Towards The New Intelligence Network, Ronald D. Lee, Paul M. Schwartz

Michigan Law Review

In Terrorism, Freedom, and Security, Philip B. Heymann undertakes a wide-ranging study of how the United States can - and in his view should - respond to the threat of international terrorism. A former Deputy Attorney General of the United States Department of Justice ("DOJ") and current James Barr Ames Professor of Law at Harvard Law School, Heymann draws on his governmental experience and jurisprudential background in developing a series of nuanced approaches to preventing terrorism. Heymann makes clear his own policy and legal preferences. First, as his choice of subtitle suggests, he firmly rejects the widely used metaphor …