Part I invites the reader to consider the problems of identity theft, the problems of having government access to each book and web page that an individual has accessed, and the risks of having an authoritarian or totalitarian government being able to trace every financial transaction within its borders. Part II introduces the metaphor of data entering a “vault 600 feet down,” and uses that metaphor to understand the range of ways that data can “reach the surface,” or become accessible. Part III systematically examines the advantages of government access to financial transaction data. Part IV examines the possible harms from government access to financial data
As the United States government collects personal and private information about each of us, the gove...
Technological evolution is changing the way in which financial services are produced and delivered. ...
American society in the present day is grappling with issues of privacy and surveillance. These issu...
In recent years, “data privacy” has vaulted to the forefront of public attention. Scholars, policyma...
This article will review the factors leading to the Miller decision and the legislative response to ...
Financial data are key to various law enforcement processes, including criminal investigations, anti...
Information is the handmaiden of the modern activist state. In particular, information provided by i...
A letter believed to be written by Benjamin Franklin in 1755 on behalf of the Pennsylvania Assembly ...
This symposium article is the second of two on regulation of government efforts to obtain recorded i...
The article examines the government\u27s growing appetite for collecting personal data. Often just...
We study the incentives of a digital business to collect and protect users’ data. The users' data th...
My three criticisms are this: First, Peter frames the problem as privacy versus government surveilla...
Part 4: Privacy IInternational audienceIn the fight against tax evaders and other cheats, government...
This thesis reviews the growing problem of identity theft and fraud that result from the misuse of ...
This book chapter was originally written for a conference on privacy and security at Stanford Law Sc...
As the United States government collects personal and private information about each of us, the gove...
Technological evolution is changing the way in which financial services are produced and delivered. ...
American society in the present day is grappling with issues of privacy and surveillance. These issu...
In recent years, “data privacy” has vaulted to the forefront of public attention. Scholars, policyma...
This article will review the factors leading to the Miller decision and the legislative response to ...
Financial data are key to various law enforcement processes, including criminal investigations, anti...
Information is the handmaiden of the modern activist state. In particular, information provided by i...
A letter believed to be written by Benjamin Franklin in 1755 on behalf of the Pennsylvania Assembly ...
This symposium article is the second of two on regulation of government efforts to obtain recorded i...
The article examines the government\u27s growing appetite for collecting personal data. Often just...
We study the incentives of a digital business to collect and protect users’ data. The users' data th...
My three criticisms are this: First, Peter frames the problem as privacy versus government surveilla...
Part 4: Privacy IInternational audienceIn the fight against tax evaders and other cheats, government...
This thesis reviews the growing problem of identity theft and fraud that result from the misuse of ...
This book chapter was originally written for a conference on privacy and security at Stanford Law Sc...
As the United States government collects personal and private information about each of us, the gove...
Technological evolution is changing the way in which financial services are produced and delivered. ...
American society in the present day is grappling with issues of privacy and surveillance. These issu...