This article suggests a balancing test to determine which routine uses of information legitimately fall within the Privacy Act. Part I briefly examines the background of the Act, concentrating on the legislative history of the routine use exemption, and examining problems the exemption presents. Part II then proposes a balancing test, based on notice and need for data, as a means of ascertaining proper routine uses
This Article attempts at a minimum to offer a common background and frame of reference for defining ...
A number of laws govern information gathering, or surveillance, by private parties in the physical w...
Information is the handmaiden of the modern activist state. In particular, information provided by i...
This article suggests a balancing test to determine which routine uses of information legitimately f...
Previously, privacy rights had to be litigated under one of the four recognized tort claim of action...
This article addresses health privacy in the broader context of other areas of recent privacy activi...
Doris “Katey” Walker, Privacy in the information age, Kansas State University, September 1997
The federal privacy legislative scheme is composed of a fragmented patchwork of aging sector-specifi...
This article focuses on privacy protection in United States. To examine the arguments that were used...
This article analyzes the Privacy Protection Act as a response to Zurcher. Part I discusses the Zurc...
As society becomes increasingly automated, the ability of individuals to protect their information ...
In this article, the authors do not propose to discuss the innumerable ways in which one\u27s privac...
A divided Supreme Court recently decided in Doe v. Chao that the federal government’s disclosure of ...
For the past 80 years privacy has been of increasingly important legal concern. In 1952, the U.S. Su...
Although seventy-seven years have passed since its launching, the right of privacy is still in its i...
This Article attempts at a minimum to offer a common background and frame of reference for defining ...
A number of laws govern information gathering, or surveillance, by private parties in the physical w...
Information is the handmaiden of the modern activist state. In particular, information provided by i...
This article suggests a balancing test to determine which routine uses of information legitimately f...
Previously, privacy rights had to be litigated under one of the four recognized tort claim of action...
This article addresses health privacy in the broader context of other areas of recent privacy activi...
Doris “Katey” Walker, Privacy in the information age, Kansas State University, September 1997
The federal privacy legislative scheme is composed of a fragmented patchwork of aging sector-specifi...
This article focuses on privacy protection in United States. To examine the arguments that were used...
This article analyzes the Privacy Protection Act as a response to Zurcher. Part I discusses the Zurc...
As society becomes increasingly automated, the ability of individuals to protect their information ...
In this article, the authors do not propose to discuss the innumerable ways in which one\u27s privac...
A divided Supreme Court recently decided in Doe v. Chao that the federal government’s disclosure of ...
For the past 80 years privacy has been of increasingly important legal concern. In 1952, the U.S. Su...
Although seventy-seven years have passed since its launching, the right of privacy is still in its i...
This Article attempts at a minimum to offer a common background and frame of reference for defining ...
A number of laws govern information gathering, or surveillance, by private parties in the physical w...
Information is the handmaiden of the modern activist state. In particular, information provided by i...