Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Law

Privacy Vs. Transparency: Handling Protected Materials In Agency Rulemaking, Christopher S. Yoo, Kellen Mccoy Jul 2021

Privacy Vs. Transparency: Handling Protected Materials In Agency Rulemaking, Christopher S. Yoo, Kellen Mccoy

Indiana Law Journal

Agencies conducting informal rulemaking proceedings increasingly confront conflicting duties with respect to protected materials included in information submitted in public rulemaking dockets. They must reconcile the broad commitment to openness and transparency reflected in federal law with the duty to protect confidential business information (CBI) and personally identifiable information (PII) against improper disclosure.

This Article presents an analysis of how agencies can best balance these often countervailing considerations. Part I explores the statutory duties to disclose and withhold information submitted in public rulemaking dockets placed on agencies. It also examines judicial decisions and other legal interpretations regarding the proper way …


Privacy Vs. Convenience: The Benefits And Drawbacks Of Tax System Modernization, E. Maria Grace Dec 1994

Privacy Vs. Convenience: The Benefits And Drawbacks Of Tax System Modernization, E. Maria Grace

Federal Communications Law Journal

The Internal Revenue Service has launched the Tax System Modernization (TSM) program, a $23 billion plan to modernize its computer and information systems. TSM will be the largest computer upgrade ever undertaken by the federal government. Like any other computer network, TSM will inevitably be threatened by computer viruses, professional eavesdroppers, power outages, natural disasters, and human error. Given the sensitive nature of tax returns, the IRS has the difficult task of modernizing its data collection procedures and telecommunications facilities without risking the privacy of taxpayers and offending the security measures required by the Privacy Act of 1974, Computer Security …