By Kypreos, Markus.
Texas District and County Attorneys Association.
This volume from the Texas District and County Attorneys Association is written to assist prosecutors in understanding the Health Insurance Portability and Accountability Act of 1996 as well as accessing certain medical records. Topics covered include a thorough introduction to HIPAA, disclosures permitted to law enforcement, acquiring medical information, and civil issues related to HIPAA. Also included is an appendix that discusses Parts 160 and 164 of the Code of Federal Regulations as well as an appendix containing important forms.
American privacy : The 400-year history of our most contested right
By Lane, Frederick S.
"A sweeping story of the right to privacy as it sped along colonial postal routes, telegraph wires, and today's fiber-optic cables on a collision course with presidents and programmers, librarians and letter-writers." - from the publisher
Balancing privacy and security : The privacy implications of government data mining programs : hearing before the Committee on the Judiciary, United States Senate, One Hundred Tenth Congress, first session, January 10, 2007
With so many recently reported incidents of data breaches, "cyberattacks" on businesses as well as government agencies, and the use of encryption to secure confidential data, this book serves as a great explanation of data security. The authors look at data breach risks--what type of information is vulnerable and why--and the potential liability and damages stemming from data breaches.
Information security and privacy : A practical guide for global executives, lawyers and technologists
ABA Section of Science & Technology Law.
Written by legal and technology experts and compiled by the ABA's Science & Technology Law Section, this is an in-depth treatment of nearly all aspects of information security. This title begins by defining information security, spelling out why it is important, and explaining how it relates to privacy and risk management. It also covers federal, state, and international laws that come into play with information security. It ends with a discussion of emerging technologies (e.g., cloud computing, mobile computing) and their security issues. Overall, this is an expansive and in-depth title of interest to anyone charged with protecting sensitive information. Also includes information security/privacy standards and guidelines.
Photographer's guide to privacy : What every cameraman, photographer and videographer should know about invasion of privacy standards in the 50 states and D.C
Reporters Committee for Freedom of the Press.
"This guide provides a general explanation of each privacy tort and related causes of action. The state case law section summarizes privacy cases involving photography from federal and state courts throughout the country" - page 2
Biometrics is the most accurate method of identification. It raises questions about personal privacy, surveillance, and the effects of government and corporate databases that gather and hold biometric information.
Latest received: REL. 17 2015, not renewed.
By Brownlee, Charlene.
Law Journal Press.
This title explains the legal obligations and potential liability of those who work with and share private information. It offers guidance on the privacy policies and practices organizations need to adopt to ensure compliance.
Latest received:REL. 61 AUG 2012.
By Freeman, D. Reed.
CCH, Wolters Kluwer Law & Business.
"Designed with attorneys and corporate privacy officers in mind, Privacy Law in Marketing is the first product of its kind to treat the issue of privacy from a practical, issue-specific, jurisdiction-specific perspective. The publication aids attorneys and privacy professionals in both the compliance and litigation of privacy issues." - from the publisher
Privacy, security and information management : An overview
By Serwin, Andrew.
American Bar Assocation, Business Law Section.
This publication from the American Bar Association touches on aspects of privacy with respect to electronic and wire communication, telephone communications, and employee monitoring. The preface indicates that the purpose of the book is "... to provide key insights and outlines from some of the leading practitioners..." rather than an exhaustive examination. The introduction gives a brief history of the international and US legal developments in privacy law. Subsequent chapters discuss specific areas such as internet privacy, employee privacy, data security and destruction, and constitutional and statutory privacy rights. Extensive footnotes give the reader additional research avenues.
Protecting consumer privacy in an era of rapid change : A recommendations for business and policymakers : FTC report
Federal Trade Commission.
This December 2010 preliminary staff report by the Federal Trade Commission develops a framework for businesses to follow with respect to privacy and consumer information. This framework is specifically aimed at all commercial entities that collect or use consumer data that can be reasonably linked to a specific consumer, computer, or other device and was spurred the rapid shift to doing business electronically. A highly recommended title for any entity that deals with consumer privacy.
Who's on first : Challenges facing prosecutors and financial institutions in responding to identity theft
By Budzilowicz, Lisa M.
National District Attorneys Association.
As the topic of identity theft becomes more pressing for consumers, it necessarily becomes more pressing for prosecutors. Budzilowicz's examination of the challenges prosecutors and district attorneys are encountering in identity theft cases offers an alternative perspective to the frustration that consumers feel with their personal identity theft problems. The report is concluded with a list of laws, agencies, task forces, and contact information for entities that can support financial institutions and prosecutors in cooperation to solve identity theft issues.
Available on the Internet Archive: