Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Disclosure (2)
- Privacy (2)
- Access to information (1)
- Bank Secrecy Act (1)
- Banks (1)
-
- California Online Privacy Protection Act (1)
- Commercial Privacy Bill of Rights Act of 2011 (1)
- Consent (1)
- Cookies (1)
- Cybersecurity (1)
- Cybersecurity Information Sharing Act (1)
- Data collection (1)
- Digital Privacy Act (1)
- Disclosures (1)
- Documents (1)
- Electronic signature (1)
- Federal Trade Commission (1)
- Federal agencies (1)
- Financial institutions (1)
- Financial records (1)
- Freedom of Information Act (1)
- Identity theft (1)
- Information sharing (1)
- Informed consent (1)
- Internal Revenue Service (1)
- Internet (1)
- Law reform (1)
- Liability (1)
- Mobile applications (1)
- Online Privacy Protection Act (1)
Articles 1 - 5 of 5
Full-Text Articles in Privacy Law
Automating Threat Sharing: How Companies Can Best Ensure Liability Protection When Sharing Cyber Threat Information With Other Companies Or Organizations, Ari Schwartz, Sejal C. Shah, Matthew H. Mackenzie, Sheena Thomas, Tara Sugiyama Potashnik, Bri Law
Automating Threat Sharing: How Companies Can Best Ensure Liability Protection When Sharing Cyber Threat Information With Other Companies Or Organizations, Ari Schwartz, Sejal C. Shah, Matthew H. Mackenzie, Sheena Thomas, Tara Sugiyama Potashnik, Bri Law
University of Michigan Journal of Law Reform
This Article takes an in-depth look at the evolution of cybersecurity information sharing legislation, leading to the recent passage of the Cybersecurity Information Sharing Act (CISA) and offers insights into how automated information sharing mechanisms and associated requirements implemented pursuant to CISA can be leveraged to help ensure liability protections when engaging in cyber threat information sharing with and amongst other non-federal government entities.
Protecting Personal Information: Achieving A Balance Between User Privacy And Behavioral Targeting, Patrick Myers
Protecting Personal Information: Achieving A Balance Between User Privacy And Behavioral Targeting, Patrick Myers
University of Michigan Journal of Law Reform
Websites and mobile applications provide immeasurable benefits to both users and companies. These services often collect vast amounts of personal information from the individuals that use them, including sensitive details such as Social Security numbers, credit card information, and physical location. Personal data collection and dissemination leave users vulnerable to various threats that arise from the invasion of their privacy, particularly because users are often ignorant of the existence or extent of these practices. Current privacy law does not provide users with adequate protection from the risks attendant to the collection and dissemination of their personal information. This Note advocates …
Narrowing The "Routine Use" Exemption To The Privacy Act Of 1974, John W. Finger
Narrowing The "Routine Use" Exemption To The Privacy Act Of 1974, John W. Finger
University of Michigan Journal of Law Reform
This article suggests a balancing test to determine which routine uses of information legitimately fall within the Privacy Act. Part I briefly examines the background of the Act, concentrating on the legislative history of the routine use exemption, and examining problems the exemption presents. Part II then proposes a balancing test, based on notice and need for data, as a means of ascertaining proper routine uses.
The Right To Financial Privacy Act Of 1978-The Congressional Response To United States V. Miller: A Procedural Right To Challenge Government Access To Financial Records, Nancy M. Kirschner
The Right To Financial Privacy Act Of 1978-The Congressional Response To United States V. Miller: A Procedural Right To Challenge Government Access To Financial Records, Nancy M. Kirschner
University of Michigan Journal of Law Reform
This article will review the factors leading to the Miller decision and the legislative response to that decision. Part I will examine the bank customer's expectation of privacy and the way Miller affects this expectation. Part II will discuss the congressional response to Miller and the competing interests which led to the Right to Financial Privacy Act. The Act itself will be discussed in detail in Part III. Part IV will evaluate the Act, and offer recommendations for reform. The article concludes that the Act, by adopting a purely procedural approach, fails to provide adequate protection to bank customers.
Scope Of Disclosure Of Internal Revenue Communications And Information Files Under The Freedom Of Information Act, Peter R. Spanos
Scope Of Disclosure Of Internal Revenue Communications And Information Files Under The Freedom Of Information Act, Peter R. Spanos
University of Michigan Journal of Law Reform
This article will discuss the proper scope of disclosure under the Freedom of Information Act of the files and administrative and policy materials of the IRS, with particular attention to the following currently contested issues: (1) the extent to which IRS guideline documents and private letter rulings are subject to disclosure; (2) the proper scope of the FOIA exemption for "interagency or intra-agency memorandums or letters which would not be available by law to a party other than an agency in litigation with the agency" as applied to the IRS; and (3) the scope of the exemption for "investigatory records …