An Overview of Privacy Law in 2022 - Scholarly Commons

Page created by Annette Garrett
 
CONTINUE READING
An Overview of Privacy Law in 2022 - Scholarly Commons
GW Law Faculty Publications & Other Works                                           Faculty Scholarship

2022

An Overview of Privacy Law in 2022
Daniel J. Solove

Paul M. Schwartz

Follow this and additional works at: https://scholarship.law.gwu.edu/faculty_publications

   Part of the Law Commons
An Overview of Privacy Law in 2022 - Scholarly Commons
There are no better-qualified authors than Professor Schwartz and Solove to summarize

                                                                                                        PRIVACY LAW FUNDAMENTALS, SIXTH EDITION, 2022
the current state of privacy law and, as a result, there is no better compact privacy law
resource than Privacy Law Fundamentals.”
                                             – Christopher Wolf, Hogan Lovells US LLP

“This book is an indispensable guide for privacy and data protection practitioners, students, and
scholars. You will find yourself consulting it regularly, as I do. It is a must for your book shelf.”
                                                    – Danielle Citron, University of Virginia

                                                                                                                                                              Daniel J. Solove & Paul M. Schwartz

                                                                                                                                                            PRIVACY LAW
                                                                                                                                                            FUNDAMENTALS
                                                                                                                                                                          SIXTH EDITION, 2022

ABOUT THE AUTHORS

 DANIEL J. SOLOVE                              PAUL M. SCHWARTZ
                                                                                                          Daniel J. Solove & Paul M. Schwartz

 is the John Marshall Harlan Research          is Jefferson E. Peyser Professor of
 Professor of Law at the George                Law at Berkeley Law School and
 Washington University Law School.             a director of the Berkeley Center
 He is also President and CEO of               for Law & Technology. He is also a
 TeachPrivacy, a privacy and security          special advisor at Paul Hastings.
 training company.
                                                                                        $50.00
                                                                        ISBN 978-1-948771-59-7
                                                                                          55000>

                                                                      9 781948 771597

                                                                           Electronic copy available at: https://ssrn.com/abstract=4072205
An Overview of Privacy Law in 2022 - Scholarly Commons
Order the Book on the International Association
      of Privacy Professionals (IAPP) Website

https://iapp.org/store/books/a191P000004nyr2QAA

                   Click Here to
                  Order the Book

           20% Student Discount
          Use code PLF4STUDENT

  Electronic copy available at: https://ssrn.com/abstract=4072205
An Overview of Privacy Law in 2022 - Scholarly Commons
Privacy Law
        Fundamentals
        Sixth Edition, 2022

                         Daniel J. Solove
          John Marshall Harlan Research Professor of Law
            George Washington University Law School
                                  &
                        Paul M. Schwartz
                Jefferson E. Peyser Professor of Law
                   U.C. Berkeley School of Law

                     An IAPP Publication

Electronic copy available at: https://ssrn.com/abstract=4072205
©2022, by the International Association of Privacy Professionals (IAPP).
All rights reserved. No part of this publication may be reproduced, stored in
a retrieval system, or transmitted in any form or by any means, mechanical,
photocopying, recording, or otherwise, without the prior, written permission
of the publisher, International Association of Privacy Professionals, Pease
International Tradeport, 75 Rochester Ave., Portsmouth, NH 03801

ISBN 978-1-948771-59-7

      Electronic copy available at: https://ssrn.com/abstract=4072205
ABOUT PRIVACY LAW FUNDAMENTALS

 “This book is an indispensable guide for privacy and data protection practitioners,
 students, and scholars. You will find yourself consulting it regularly, as I do. It is a
 must for your book shelf.”
                                            —Danielle Citron, University of Virginia

 “The go-to privacy law reference that you will keep going to. Professors Schwartz
 and Solove manage to distill without distorting and to outline without obscuring.
 Part reference, part primer and part pathfinder, Privacy Law Fundamentals is the
 ultimate privacy law resource.”
                                                      —Tom Counts, Paul Hastings

 “Two giants of privacy scholarship succeed in distilling their legal expertise into
 an essential guide for a broad range of the legal community. Whether used to learn
 the basics or for quick reference, Privacy Law Fundamentals proves to be concise
 and authoritative.”
                                           —Jules Polonetsky, Future of Privacy Forum

 “Privacy Law Fundamentals is a must-read for privacy practitioners to keep up and
 gain a clear and succinct picture of where the law is and where it is heading around
 the world and across different industries.”
                                             —Lindsey Tonsager, Covington & Burling

 “There are no better-qualified authors than Professors Schwartz and Solove
 to summarize the current state of privacy law and, as a result, there is no better
 compact privacy law resource than Privacy Law Fundamentals”
                                                —Christopher Wolf, Hogan Lovells

Privacy Law Fundamentals, Sixth Edition                                                 iii

        Electronic copy available at: https://ssrn.com/abstract=4072205
Electronic copy available at: https://ssrn.com/abstract=4072205
ABOUT THE AUTHORS

 Daniel J. Solove is the John Marshall Harlan Research Professor of Law at the
 George Washington University Law School. He is also the president and CEO of
 TeachPrivacy, www.teachprivacy.com, a company that provides privacy and data
 security training to organizations in an array of industries. One of the world’s
 leading experts in privacy law, Solove is the author of numerous books, including
 Breached: Why Data Security Fails and How to Improve It (2022)(with Woodrow
 Hartzog); Nothing to Hide: The False Tradeoff Between Privacy and Security (Yale
 2011), Understanding Privacy (Harvard 2008), The Future of Reputation: Gossip and
 Rumor in the Information Age (Yale 2007; winner of the 2007 McGannon Award),
 and The Digital Person: Technology and Privacy in the Information Age (NYU 2004).
 Solove is also the co-author (with Paul Schwartz) of a textbook, Information
 Privacy Law, with Aspen Publishing Co., now in its seventh edition. Additionally,
 he is the author of several other textbooks, including Privacy and the Media (4th
 edition, Wolters Kluwer 2021), Privacy, Law Enforcement, and National Security
 (3rd edition, Wolters Kluwer 2021), Consumer Privacy and Data Protection (3rd
 edition, Wolters Kluwer 2021), and EU Data Protection and the GDPR (1st edition,
 Wolters Kluwer 2021), all with Paul Schwartz. He has published more than 50
 articles and essays.
      Solove has testified before the U.S. Congress and has been involved as an
 expert and consultant in a number of high-profile privacy cases. His work has
 been cited by many federal and state courts, including the U.S. Supreme Court.
 He has been interviewed and featured in several hundred media broadcasts and
 articles in publications and on networks, including The New York Times, The Wall
 Street Journal, The Washington Post, Chicago Tribune, USA Today, Time, Newsweek,
 People, Reader’s Digest, The Associated Press, ABC, CBS, NBC, CNN, NPR, and
 C-SPAN’s “Book TV.”
      More information about Solove’s work can be found at www.daniel-
 solove.com. He can also be followed on Twitter at @DanielSolove. He blogs at
 Privacy+Security Blog, www.teachprivacy.com/privacy-security-training-blog/.
 As one of a select group of “Influencers,” Solove has more than 1 million LinkedIn
 followers.

Privacy Law Fundamentals, Sixth Edition                                               v

        Electronic copy available at: https://ssrn.com/abstract=4072205
Paul M. Schwartz is the Jefferson E. Peyser Professor of Law at the UC Berkeley
 School of Law and a director of the Berkeley Center for Law & Technology. A
 leading international expert on informational privacy and information law, he has
 published widely on these topics. In the United States, his articles and essays have
 appeared in periodicals such as the Harvard Law Review, Yale Law Journal, Stanford
 Law Review, Columbia Law Review, California Law Review, N.Y.U. Law Review, and
 Chicago Law Review. With Daniel Solove, he has published the leading casebook
 Information Privacy Law (Aspen, 7th edition, 2021) and other books.
      Schwartz has testified as an expert before congressional committees in the
 United States and provided legal reports to the Commission of the European
 Community and Department of Justice, Canada. He has assisted numerous
 corporations in the United States and abroad with information privacy issues. A
 member of the American Law Institute, Schwartz has received scholarships and
 grants from the American Academy in Berlin, where he was a Berlin Prize Fellow;
 the Alexander von Humboldt Foundation; German Marshall Fund; Fulbright
 Foundation; the German Academic Exchange; and the Harry Frank Guggenheim
 Foundation. He is a member of the American Law Institute and the organizing
 committee of the Privacy Law Salon, as well as special advisor to Paul Hastings
 LLP.
      Schwartz belongs to the editorial boards of International Data Privacy Law,
 the International Journal of Law and Information Technology, and the Zeitschrift für
 Datenschutz (Data Protection Journal). His homepage is www.paulschwartz.net.
 His Twitter account is @paulmschwartz.

vi                                               Privacy Law Fundamentals, Sixth Edition

       Electronic copy available at: https://ssrn.com/abstract=4072205
DEDICATION

                In memory of Joel Reidenberg and Kurt Wimmer,
             two great figures in privacy law and two cherished friends.

                             To Pamela and Griffin —DJS

                          To Steffie, Clara, and Leo —PMS

Privacy Law Fundamentals, Sixth Edition                                    vii

        Electronic copy available at: https://ssrn.com/abstract=4072205
Electronic copy available at: https://ssrn.com/abstract=4072205
PREFACE

 This book provides a concise guide to privacy law. Privacy Law Fundamentals is
 designed to serve as a primer of the essential information one needs to know about
 the field. For the student of privacy law or the beginning privacy professional, the
 book will provide an overview that can be digested readily. For the more seasoned
 and experienced, the book will serve as a handy reference guide, a way to refresh
 one’s memory of key components of privacy laws and central cases. It will help close
 gaps in knowledge and inform on areas of the field about which one wants to know
 more.
      In writing this book, we have aimed to avoid the “too much information”
 problem by singling out the essential provisions of law, regulations, and judicial
 decisions. A frequent risk in law books is that key definitions, provisions, and
 concepts will become lost in a litany of long and dense statutes and in a mass of
 cases. We have endeavored to distill the field down to its fundamentals and present
 this information in as clear and useful a manner as we could. Wherever possible,
 we have developed charts and lists to convey the material. The book is organized
 in twelve chapters:

    •    Chapter 1—an overview of privacy law in all its varied types and forms
         and a timeline with key points in the development of privacy law.

    •    Chapter 2—privacy law involving the media, including the privacy torts,
         defamation, and the First Amendment.

    •    Chapter 3—the law of domestic law enforcement, focusing on the Fourth
         Amendment and the statutes regulating electronic surveillance.

    •    Chapter 4—national security law, including the U.S. Foreign Intelligence
         Surveillance Act (FISA).

Privacy Law Fundamentals, Sixth Edition                                             ix

        Electronic copy available at: https://ssrn.com/abstract=4072205
•    Chapter 5—the laws and regulations that pertain to health and genetic
            data, including the U.S. Health Insurance Portability and Accountability
            Act (HIPAA).

       •    Chapter 6—government records and laws, such as the Privacy Act and
            the Freedom of Information Act (FOIA).

       •    Chapter 7—the laws concerning financial information, including the
            U.S. Fair Credit Reporting Act (FCRA) and Gramm-Leach-Bliley Act
            (GLBA).

       •    Chapter 8—legal regulation of the privacy of consumer data and business
            records, involving statutes, tort protections, and U.S. Federal Trade
            Commission (FTC) enforcement actions.

       •    Chapter 9—data security law, including the varying laws in all the states.

       •    Chapter 10—school privacy, including the U.S. Family Educational
            Rights and Privacy Act (FERPA).

       •    Chapter 11—the regulation of employment privacy, including the
            different rules for government and private sector employees.

       •    Chapter 12—international privacy law, including the EU General Data
            Protection Regulation, the Organisation for Economic Co-operation and
            Development (OECD) Guidelines, the Asia-Pacific Economic Cooperation
            (APEC) Privacy Framework, and rules of international data transfers.

        For his suggestions on our chapter about school privacy, we wish to thank
    Steven McDonald. Through its different editions, this book also benefitted greatly
    from the research assistance of a dream team of students. These are Lorraine
    Abdulahad, Deborah Choi, Luisa Domenichini, Robert Fairbanks, David Fang,
    Russell Fink, Natalie Heim, Joey Kingerski, Charlotte Kress, Annie Lee, Brittany
    Johnson, Harris Mateen, Meet Mehta, Gregory Merchant, Michelle Park, Sanjana
    Parikh, Amelie Raepple, Sarah Suwanda, Sophia Wallach, Kevin Yang, and Andy
    Zachrich.
        For further references, including books, websites, statutes, and other sources
    of news and legal materials, visit our website (www.informationprivacylaw.com),
    and for our casebooks, click on the “Resources” tab at the top.

x                                                  Privacy Law Fundamentals, Sixth Edition

           Electronic copy available at: https://ssrn.com/abstract=4072205
We look forward to keeping this book up to date and finding additional ways
 to make it as useful as possible. Please feel free to contact us with any suggestions
 and feedback about the book.
     In 2021, Joel Reidenberg and Kurt Wimmer, two leaders of data privacy law,
 passed away. Both were cherished friends of the authors of this volume and of so
 many in our field. Joel Reidenberg was a distinguished professor at Fordham Law
 School and a leader in international privacy law. Kurt Wimmer led the privacy and
 cybersecurity practice at Covington and advanced press freedom in his pro bono
 work. We wish to dedicate this volume to them.

     Daniel J. Solove
     Washington, DC
     dsolove@law.gwu.edu

     Paul M. Schwartz
     Berkeley, CA
     pschwartz@law.berkeley.edu

Privacy Law Fundamentals, Sixth Edition                                              xi

        Electronic copy available at: https://ssrn.com/abstract=4072205
Electronic copy available at: https://ssrn.com/abstract=4072205
TABLE OF CONTENTS

 CHAPTER 1: AN OVERVIEW OF PRIVACY LAW
 ESSENTIAL POINTS  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 1
 TYPES OF PRIVACY LAW  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 2
   Torts .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 2
       Torts Most Commonly Involved In Privacy Cases  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 2
       Origins Of The Privacy Torts .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 2
   Contract/Promissory Estoppel  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 2
   Criminal Law  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 3
   Evidentiary Privileges .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 3
   Federal Constitutional Law .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 3
       Ways the U.S. Constitution Protects Privacy  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 3
   State Constitutional Law .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 3
       States With Express Constitutional Privacy Protection .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 3
   Federal Statutory Law  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 4
   State Statutory Law  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 6
       Areas of State Legislation on Privacy .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 6
   International Law  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 7
 THE CHIEF PRIVACY OFFICER OR DATA PROTECTION OFFICER  .  .  .  . 8
 THE CHIEF INFORMATION SECURITY OFFICER  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 9
 FOR FURTHER REFERENCE .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 16
   Treatises  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 16
   General Sources .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 16

 CHAPTER 2: PRIVACY AND THE MEDIA
 ESSENTIAL POINTS .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 19
 THE PRIVACY TORTS  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 19
   Public Disclosure of Private Facts .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 20
      Approaches to the Newsworthiness Test  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 20

Privacy Law Fundamentals, Sixth Edition                                                                                                                        xiii

             Electronic copy available at: https://ssrn.com/abstract=4072205
Intrusion upon Seclusion .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 20
       False Light .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 23
       Appropriation of Name or Likeness  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 23
 OTHER TORTS  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 24
   Intentional Infliction of Emotional Distress  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 24
   Breach of Confidentiality  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 24
 OTHER PRIVACY LAWS OF NOTE .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 24
   Video Voyeurism Prevention Act, 18 U.S.C. § 1801 (2004)  .  .  .  .  .  .  .  .  .  .  .  . 24
   State Video Voyeurism Statutes .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 24
   “Peeping Tom” Laws  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 25
   Blackmail Laws .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 25
   California Anti-Paparazzi Act, Cal. Civ. Code § 1708.8  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 25
   Image-Based Sexual Abuse  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 25
 DEFAMATION LAW .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 26
   Libel and Slander  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 26
   First Amendment Restrictions .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 26
       Actual Malice  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 26
       Public vs. Private Figures .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 27
   Communications Decency Act § 230(c), 47 U.S.C. § 230(c) (1996)  .  .  .  .  .  . 28
 FIRST AMENDMENT .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 28
 THE FIRST AMENDMENT AND TORTS  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 30
   Public Disclosure of Private Facts .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 30
   Intrusion upon Seclusion .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 30
   False Light .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 30
   Appropriation of Name or Likeness  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 30
   Intentional Infliction of Emotional Distress  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 30
   Breach of Confidentiality  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 30
   Defamation Torts  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 30
       Anti-SLAPP .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 31
 ANONYMOUS SPEECH .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 31
     Standards for Unmasking Anonymous Speakers .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 32
 PRIVACY OF READING AND INTELLECTUAL EXPLORATION  .  .  .  .  .  .  . 32
      Reporter’s Privilege .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 33
 FOR FURTHER REFERENCE .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 33
   Treatises  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 33
   Books  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 33
   Articles and Other Sources  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 34

xiv                                                                                      Privacy Law Fundamentals, Sixth Edition

             Electronic copy available at: https://ssrn.com/abstract=4072205
CHAPTER 3: PRIVACY AND LAW ENFORCEMENT
 ESSENTIAL POINTS .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 37
 FOURTH AMENDMENT  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 38
   The Fourth Amendment to the U.S. Constitution  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 38
      How the Fourth Amendment Works .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 38
      Key Fourth Amendment Doctrines  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 40
 ELECTRONIC COMMUNICATIONS  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 43
   Electronic Communications Privacy Act of 1986 .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 43
   Types of Communications in ECPA  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 43
   Wiretap Act  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 44
   Stored Communications Act  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 45
   Pen Register Act  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 46
      Key Facts About ECPA  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 47
   Clarifying Lawful Overseas Use of Data Act Pub. L No. 115-141, 132
    Stat. 348 (codified as amended in scattered sections of 18 U.S.C.) (2018)  .  . 49
   Communications Assistance for Law Enforcement Act of 1994  .  .  .  .  .  .  .  .  . 49
 STATE ELECTRONIC SURVEILLANCE LAW .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 50
      Recording Police Encounters  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 50
      State Electronic Surveillance Law .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 51
 GOVERNMENT ACCESS TO PERSONAL DATA .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 52
   Fourth Amendment: Third-Party Doctrine .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 52
   Bank Secrecy Act of 1970  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 53
   Right to Financial Privacy Act of 1978 .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 53
   Subpoenas .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 53
      Federal Statutory Provisions for Government Access to Records  .  .  .  .  .  .  .  .  . 54
 SEARCHES AND SEIZURES OF MEDIA DOCUMENTS  .  .  .  .  .  .  .  .  .  .  .  .  . 55
   Privacy Protection Act of 1980  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 55
 FOR FURTHER REFERENCE .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 56
   Treatises  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 56
   Books  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 56
   Articles and Other Sources  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 57

 CHAPTER 4: NATIONAL SECURITY AND FOREIGN INTELLIGENCE
 ESSENTIAL POINTS .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 59
 THE FOURTH AMENDMENT .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 59
 FOREIGN INTELLIGENCE GATHERING .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 60
   Foreign Intelligence Surveillance Act of 1978  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 60
   USA Freedom Act of 2015  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 61

Privacy Law Fundamentals, Sixth Edition                                                                                                                    xv

             Electronic copy available at: https://ssrn.com/abstract=4072205
GOVERNMENT ACCESS TO PERSONAL DATA FOR
 NATIONAL SECURITY PURPOSES  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 62
   National Security Letters  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 62
   USA Patriot Act of 2001, § 215  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 63
 STATE SECRETS .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 64
 THE INTELLIGENCE COMMUNITY  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 64
   Intelligence Agencies  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 64
   Intelligence Reform and Terrorism Prevention Act of 2004  .  .  .  .  .  .  .  .  .  .  .  . 65
 FOR FURTHER REFERENCE .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 66
   Treatises  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 66
   Books  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 66
   Government Reports .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 66
   Articles and Other Sources  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 67

 CHAPTER 5: HEALTH PRIVACY
 ESSENTIAL POINTS .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 71
 PATIENT-PHYSICIAN CONFIDENTIALITY  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 72
   Ethical Rules  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 72
   Evidentiary Privileges .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 72
   The Breach of Confidentiality Tort  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 72
   Public Disclosure of Private Facts .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 73
      Key Points: Common Law Torts and Medical Information .  .  .  .  .  .  .  .  .  .  .  . 73
   Tort Liability for Failing to Disclose Personal Data .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 73
 MEDICAL INFORMATION  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 74
   State Regulation  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 74
   Health Insurance Portability and Accountability Act of 1996  .  .  .  .  .  .  .  .  .  .  . 76
      Deidentifying Data Under HIPAA  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 78
   Court Cases .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 80
      HIPAA Myths and Facts  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 81
   OCR HIPAA Enforcement Actions with Monetary Penalties .  .  .  .  .  .  .  .  .  .  . 81
   State Enforcement Actions .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 83
   The Common Rule .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 84
   Federal Drug and Alcohol Confidentiality Statute  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 85
   Subpoenas for Medical Information  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 85
 CONSTITUTIONAL PROTECTIONS .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 86
   Constitutional Right to Privacy .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 86
   Constitutional Right to Information Privacy .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 87
   Fourth Amendment .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 87
 GENETIC INFORMATION  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 87
   Genetic Testing and Discrimination  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 87

xvi                                                                                      Privacy Law Fundamentals, Sixth Edition

             Electronic copy available at: https://ssrn.com/abstract=4072205
FOR FURTHER REFERENCE .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 88
   Treatises  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 88
   Articles and Other Sources  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 88

 CHAPTER 6: GOVERNMENT RECORDS
 ESSENTIAL POINTS .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 91
 FAIR INFORMATION PRACTICES  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 92
 COURT RECORDS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
   Common Law Right to Access Court Records  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 92
   Protective Orders  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 92
   Depositions and Interrogatories .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 93
   Pseudonymous Litigation  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 93
   Juror Privacy  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 93
   The First Amendment Right to Access .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 93
 PUBLIC RECORDS  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 93
   Freedom of Information Act .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 93
   State Public Records  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 95
      The Constitution and Personal Data in Public Records .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 97
      When Does the Constitution Limit the Government from
        Disclosing Personal Information?  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 98
   Critical Infrastructure Information Act of 2002 .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 98
 PRIVACY RIGHTS IN GOVERNMENT RECORDS  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 98
   The Privacy Act of 1974  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 98
      Establishing a Violation of the Privacy Act  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 100
   State Privacy Acts .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 101
      State Statutes Regulating Government Website Privacy Policies  .  .  .  .  .  .  .  . 103
   DNA Databases  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 103
   Driver’s Privacy Protection Act of 1994  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  104
      DPPA: Key Points  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  104
   Identification Records and Requirements .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  106
      Social Security Numbers  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 106
 GOVERNMENT PRIVACY AND SECURITY MANAGEMENT .  .  .  .  .  .  .  .  .  107
   E-Government Act of 2002 .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  107
   Federal Information Security Management Act of 2002  .  .  .  .  .  .  .  .  .  .  .  .  . 108
   Office of Management and Budget  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  108
   Federal Acquisitions Regulation .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  108
 FOR FURTHER REFERENCE .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  108
   Treatises  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 108
   Books  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  108
   Articles and Other Sources  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  109

Privacy Law Fundamentals, Sixth Edition                                                                                                                   xvii

             Electronic copy available at: https://ssrn.com/abstract=4072205
CHAPTER 7: FINANCIAL DATA
 ESSENTIAL POINTS .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  111
   The Financial Services Industry  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  111
   Fair Credit Reporting Act of 1970 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
      The Consumer Financial Protection Bureau .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  113
      FCRA: Keys to Compliance  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 117
   Federal Trade Commission Fair Credit Reporting Act
    Enforcement Actions  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  119
   Consumer Financial Protectoin Bureau Fair Credit Reporting Act
    Enforcement Actions  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  120
 THE USE AND DISCLOSURE OF FINANCIAL INFORMATION .  .  .  .  .  .  .  120
   Gramm-Leach-Bliley Act of 1999  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  120
   Federal Trade Commission Enforcement Actions  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 122
   CFPB Enforcement Actions  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 123
   Right to Financial Privacy Act of 1978 .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  123
   Bank Secrecy Act of 1970  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  125
   Torts and Financial Privacy  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  126
   State Financial Statutes and Regulations  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 126
   NY Department of Financial Services Enforcement Actions . . . . . . . . . . . 127
      California’s SB1 and FCRA Preemption .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  127
 TAX PRIVACY  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  128
   Internal Revenue Code  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 128
 IDENTITY THEFT  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  128
    Identity Theft Assumption and Deterrence Act of 1998  .  .  .  .  .  .  .  .  .  .  .  .  . 128
    FTC Red Flags Rule .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  129
    SEC and CFTC Red Flags Rule  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  129
    State Identity Theft Statutes .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  129
 GOVERNMENT ACCESS TO FINANCIAL INFORMATION  .  .  .  .  .  .  .  .  .  .  130
 FOR FURTHER REFERENCE .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  130
   Treatises  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 130
   Books  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  130
   Articles and Other Sources  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  130

 CHAPTER 8: CONSUMER DATA
 ESSENTIAL POINTS .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  133
 PERSONAL DATA OR PERSONALLY IDENTIFIABLE INFORMATION  .  134
       Approaches to Defining PII .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  134
   Injury and Standing .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  135
       Standing .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 135
 TORT LAW  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  137

xviii                                                                                   Privacy Law Fundamentals, Sixth Edition

             Electronic copy available at: https://ssrn.com/abstract=4072205
CONTRACT AND PROMISSORY ESTOPPEL  .                                                       .    .    .    .    .    .    .    .    .    .    .    .    .    .    .    .    .    .     138
   Breach of Contract . . . . . . . . . . . . . . . . . . .                               .    .    .    .    .    .    .    .    .    .    .    .    .    .    .    .    .    .    . 138
   Promissory Estoppel .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .                .    .    .    .    .    .    .    .    .    .    .    .    .    .    .    .    .    .     138
      Are Privacy Policies Contracts?  .  .  .  .  .  .  .  .  .  .                        .    .    .    .    .    .    .    .    .    .    .    .    .    .    .    .    .    .     139
      Liability for Third-Party Apps? .  .  .  .  .  .  .  .  .  .                         .    .    .    .    .    .    .    .    .    .    .    .    .    .    .    .    .    .     140
 FEDERAL TRADE COMMISSION ENFORCEMENT OF SECTION 5
 OF THE FEDERAL TRADE COMMISSION ACT  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  140
      Statutes Granting Enforcement Authority to the FTC  .  .  .  .  .  .  .  .  .  .  .  .  .  . 141
      Triggers for FTC Complaints  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 147
      FTC Consent Decrees  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  147
 CONSUMER FINANCIAL PROTECTION BUREAU ENFORCEMENT  .  . 148
 FEDERAL STATUTES: ENTERTAINMENT RECORDS  .  .  .  .  .  .  .  .  .  .  .  .  .  148
   Communications Act of 1934  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 148
   Cable Communications Policy Act of 1984  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  150
   Federal Communications Commission Enforcement of the FCA
    and Cable Act  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  151
   FCC, Privacy Guidelines for ISPs (2016)  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 151
   Video Privacy Protection Act of 1988 .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 152
   Video Privacy Protection Act Amendments Act of 2012  .  .  .  .  .  .  .  .  .  .  .  .  .  153
 FEDERAL STATUTES: MARKETING  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 155
   Telephone Consumer Protection Act of 1991  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  155
   Controlling the Assault of Non-Solicited Pornography and Marketing
    Act of 2003 .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  157
 FEDERAL STATUTES: INTERNET USE AND
 ELECTRONIC COMMUNICATIONS  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  158
   Children’s Online Privacy Protection Act of 1998  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 158
   Federal Trade Commission Children’s Online Privacy Protection Act
    Enforcement Actions  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  159
      Complying with COPPA  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  162
      How to Determine if a Website (or a Portion of It)
      Is Directed at Children . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
   Electronic Communications Privacy Act of 1986 .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  163
   Computer Fraud and Abuse Act .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  164
 FEDERAL STATUTES: OVERVIEW .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  166
     Federal Statutes and Preemption  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 172
     Federal Statutes and Opt-In/Opt-Out .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  179
 STATE STATUTES .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  180
   Data Sale and Sharing .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  180
   California Consumer Privacy Act of 2018, AB 375 .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  180
   Virginia’s Consumer Data Protection Act, Va. Code Ann.
    § 59.1-571 (2021)  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  182

Privacy Law Fundamentals, Sixth Edition                                                                                                                                                     xix

            Electronic copy available at: https://ssrn.com/abstract=4072205
Colorado Privacy Act .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  182
       Unfair and Deceptive Acts and Practices Acts  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  183
       Radio-Frequency Identification  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  183
          State Statutes Regulating Private Sector Use of RFID .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  183
       Eraser or Right to Be Forgotten Laws  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 185
       Biometric Data  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  185
       Website Privacy Notices  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  186
       Data Brokers  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 186
       Spyware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
          State Spyware Statutes  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 186
       Video Privacy  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 188
       Transparency  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  189
 FIRST AMENDMENT .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  189
 FOR FURTHER REFERENCE .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  191
   Books  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  191
   Articles and Other Sources  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  193

 CHAPTER 9: DATA SECURITY
 ESSENTIAL POINTS .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  197
 DATA BREACH NOTIFICATION STATUTES  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  197
   Rise of the State Statutes .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  197
   State Data Security Breach Notification Statutes .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 198
   Federal and State Credit Freeze Statutes .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  203
 FEDERAL TRADE COMMISSION ENFORCEMENT UNDER
 SECTION 5 OF THE FTC ACT  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 203
 CONSUMER FINANCIAL PROTECTION BUREAU ENFORCEMENT  .  . 207
 FEDERAL COMMUNICATIONS COMMISSION ENFORCEMENT  .  .  .  .  .  208
 SECURITIES AND EXCHANGE COMMISSION GUIDANCE AND
 ENFORCEMENT  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  208
 STATE CYBERSECURITY STATUTES AND REGULATIONS .  .  .  .  .  .  .  .  .  209
 TORT  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  212
 DATA RETENTION AND DISPOSAL .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  214
 FOR FURTHER REFERENCE .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  216
   Treatises  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 216
   Books  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  217
   Articles and Other Sources  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  218

xx                                                                                        Privacy Law Fundamentals, Sixth Edition

             Electronic copy available at: https://ssrn.com/abstract=4072205
CHAPTER 10: EDUCATION PRIVACY
 ESSENTIAL POINTS .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  221
 STUDENT RECORDS  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 221
   Family Educational Rights and Privacy Act of 1974  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  221
   Protection of Pupil Rights Amendment of 1978  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 224
   Every Student Succeeds Act  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 224
   Individuals with Disabilities Education Act  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 224
   National School Lunch Act  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  225
   Jeanne Clery Disclosure of Campus Security Policy and Campus
    Crime Statistics Act  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  225
   Other Regulations .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  226
   Gainful Employment Rule (2011) .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 226
   Other Statutes  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 226
 STATE LAWS  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 226
   Student Data Collection, Use, and Disclosure .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  226
   Social Media Account Access .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  230
 STUDENT SPEECH AND EXPRESSION .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  230
     State Anti-Bullying Laws  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  231
 SEARCHES AND SURVEILLANCE  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  232
   Fourth Amendment .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  232
 SELF-REGULATORY MEASURES  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 233
   Future of Privacy Forum, Student Data Privacy Pledge (2014) .  .  .  .  .  .  .  .  .  233
 FOR FURTHER REFERENCE .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  233
   Treatises  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 233
   Articles and Other Sources  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  234

 CHAPTER 11: EMPLOYMENT PRIVACY
 ESSENTIAL POINTS .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  235
 SEARCHES .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  236
   Government Employees: Fourth Amendment  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 236
   Private Sector Employees: Fourth Amendment .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  236
   Searches and Surveillance by Private Sector Employers .  .  .  .  .  .  .  .  .  .  .  .  .  .  237
 QUESTIONING AND TESTING  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 238
   Fourth Amendment .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  238
   Constitutional Right to Information Privacy .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  238
   Employee Polygraph Protection Act of 1988 .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  239
   Americans with Disabilities Act of 1990 .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  240
   Occupational Safety and Health Act  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  241
   Genetic Information Nondiscrimination Act of 2008  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  241

Privacy Law Fundamentals, Sixth Edition                                                                                                                xxi

            Electronic copy available at: https://ssrn.com/abstract=4072205
State Employment Testing and Inquiry Laws  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 241
       State Criminal Background Check “Ban the Box” Laws .  .  .  .  .  .  .  .  .  .  .  .  .  .  241
 EMPLOYEE ACCESS TO THE COMPUTER NETWORK  .  .  .  .  .  .  .  .  .  .  .  .  243
   Van Buren v. United States, 141 S. Ct. 1648 (2021)  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  243
 SURVEILLANCE AND MONITORING .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  243
   Electronic Communications Privacy Act  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  243
      What Every Employer Must Know to Comply with ECPA  .  .  .  .  .  .  .  .  .  .  . 244
      Employment Privacy Law: Public vs. Private Sector .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  244
   Biometric Data Collection Laws .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  245
 EMPLOYER SOCIAL MEDIA POLICIES AND PRACTICES  .  .  .  .  .  .  .  .  .  .  246
   National Labor Relations Act .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  246
      The NLRA and Social Media Policies  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 246
   Employer Access to Employee Social Media Accounts .  .  .  .  .  .  .  .  .  .  .  .  .  . 248
 FOR FURTHER REFERENCE .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  249
   Treatises  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 249
   Articles and Other Sources  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  249

 CHAPTER 12: INTERNATIONAL PRIVACY LAW
 ESSENTIAL POINTS .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  251
   Data Protection and Information Privacy: A Note on Terminology  .  .  .  .  .  .  252
 WORLDWIDE PRIVACY RIGHTS AND GUIDELINES .  .  .  .  .  .  .  .  .  .  .  .  .  .  252
   Universal Declaration of Human Rights (1948)  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 252
   Organisation for Economic Co-operation and Development
    Privacy Guidelines (1980) .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  253
      The Influence of the OECD Guidelines .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  254
   UN Guidelines for the Regulation of Computerized Personal Files (1990)  .  .  254
 EUROPE .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  255
   European Convention on Human Rights
    Article 8—The Right to Respect for Private and Family Life (1950) . . . . . 255
   Council of Europe Convention on Privacy, Treaty No. 108ETS
    No. 108 (1981) .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  259
   Modernization Convention for the Protection of Individuals with
    Regard to the Processing of Personal Data (2018)  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 260
   EU Data Protection Directive  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  260
   General Data Protection Regulation  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  263
       The First Evaluation of the GDPR  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 266
       EDPB: Its Guidelines  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 267
   The European Data Protection Board and the Consistency Mechanism  .  .  .  267
   Binding decision 1/2021 on the dispute arisen on the draft decision
    of the Irish Supervisory Authority regarding WhatsApp Ireland
    ( July 28, 2021)  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  268

xxii                                                                                   Privacy Law Fundamentals, Sixth Edition

             Electronic copy available at: https://ssrn.com/abstract=4072205
Decision 01/2020 on the dispute arisen on the draft decision of the
        Irish Supervisory Authority regarding Twitter (Nov. 9, 2020) .  .  .  .  .  .  .  .  .  268
       EU Law Enforcement Directive (2018) .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  268
       EU-U.S. Privacy Shield Framework (2016) .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  268
           Principles of the Privacy Shield  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 269
           Positive Adequacy Determinations by the EU Commission  .  .  .  .  .  .  .  .  .  .  . 271
           Passenger Name Record Agreements  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  272
       Transferring Personal Data to Non-EU Countries: Standard
        Contractual Clauses and Binding Corporate Rules .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  272
       Standard Contractual Clauses  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 272
       Binding Corporate Rules  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 272
       The EU Cybersecurity Act (2019)  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 273
       EU Network and Information Security Directive (2016)  .  .  .  .  .  .  .  .  .  .  .  . 273
           Discovery from EU Member Nations in U.S. Litigation .  .  .  .  .  .  .  .  .  .  .  .  .  .  273
       Directive on Privacy and Electronic Communications
        (ePrivacy Directive) .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  274
       The ePrivacy Regulation: A Work-in Progress  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  274
       EU Data Retention Directive  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 275
           European Data Protection Supervisor .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 277
 THE UK POST-BREXIT  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  277
 CANADA .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  278
   Charter of Rights and Freedoms (1982)  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 278
   Privacy Act (1985)  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 279
   Personal Information Protection and Electronic
    Documents Act (2000)  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 279
      PIPEDA’s 10 Privacy Principles .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  280
   Canada’s Anti-Spam Law (2010) .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 281
      Provincial Privacy Laws for the Private Sector  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  282
 LATIN AMERICA .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  282
      Habeas Data  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 282
   Argentina .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  282
   Brazil  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 283
   Colombia  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 283
   Mexico  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  283
   Uruguay  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 284
 AFRICA AND THE MIDDLE EAST .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  284
   Bahrain  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  284
   Dubai  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  284
   Ghana .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  284
   Israel .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  285
   Morocco  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  285
   South Africa .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  285

Privacy Law Fundamentals, Sixth Edition                                                                                                                  xxiii

             Electronic copy available at: https://ssrn.com/abstract=4072205
ASIA-PACIFIC .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  286
   APEC Privacy Framework (2004)  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 286
      APEC Privacy Framework’s Nine Principles .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 286
      APEC Member Nations .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  287
      APEC Cross-Border Privacy Rules System  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 287
   Federal Trade Commission Enforcement of the APEC
    Cross-Border Privacy Rules System .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  288
   Australia .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 288
   China  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  288
   Hong Kong  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 289
   India .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  289
   Japan  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 289
   New Zealand .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 290
   Philippines .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  290
   Singapore  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 290
   South Korea .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  291
 EUROPE, NON–EU COUNTRIES .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  291
   Russia .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  291
   Turkey  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  292
   United Kingdom .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  292
 FOR FURTHER REFERENCE .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  293
   Treatises and Books .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  293
   Articles and Other Sources  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  295

xxiv                                                                                     Privacy Law Fundamentals, Sixth Edition

             Electronic copy available at: https://ssrn.com/abstract=4072205
CHAPTER 1                                                         1

                                                                                               An Overview of Privacy Law
                       An Overview
                      of Privacy Law

 ESSENTIAL POINTS

  • Information privacy law is a relatively youthful area of law. New developments
    are still shaping it and changing its form. For example, data breach notification
    statutes in the United States date only to 2003.

  • The development of privacy law in the United States may also be viewed as a di-
    alogue between the courts and legislature about the scope and application of the
    legal concept of privacy. In some matters, courts will define new privacy rights. In
    others, the courts will leave the job to the legislature.

  • Privacy problems occur in particular contexts, and different types of problems
    involve different trade-offs and concerns.

  • Technology plays an especially important role in shaping the kinds of privacy con-
    cerns that society faces and the role of the law.

  • In Europe and most of the rest of the world, this area is called data protection
    law. International developments have played a highly visible and important part
    in shaping the role of privacy professionals and the privacy dialogue within the
    United States.

Privacy Law Fundamentals, Sixth Edition                                                    1

        Electronic copy available at: https://ssrn.com/abstract=4072205
TYPES OF PRIVACY LAW

    Torts
    In the United States, tort law is primarily state law. As a result, the particular bound-
    aries of this area of law will differ from state to state—sometimes dramatically. For
    example, some states recognize all four privacy interests, but Minnesota accepts only
    three of the four. It does not recognize the false light tort. Lake v. Wal-Mart Stores, Inc.,
    582 N.W.2d 231 (Minn. 1998).

               TORTS MOST COMMONLY INVOLVED IN PRIVACY CASES
            • Invasion of privacy (a collective term for the four privacy torts)
                   – Public disclosure of private facts
                   – Intrusion upon seclusion
                   – False light
                   – Appropriation of name or likeness
            • Breach of confidentiality
            • Intentional infliction of emotional distress
            • Defamation
                   – Libel
                   – Slander
            • Negligence

                             ORIGINS OF THE PRIVACY TORTS
          Samuel D. Warren & Louis D. Brandeis, The Right to Privacy, 4 Harv. L.
          Rev. 193 (1890)
          This foundational article, which inspired the development of privacy law
          in the twentieth century, argued that the common law protected privacy
          as “the right to be let alone.”
          William L. Prosser, Privacy, 48 Cal. L. Rev. 383 (1960)
          Legendary torts scholar William Prosser surveyed all the common law
          privacy tort cases and identified the central four interests protected. His
          formulations of the privacy torts remain in widespread use today. The
          states have widely adopted Prosser’s four privacy torts.

    Contract/Promissory Estoppel
    Confidentiality or other privacy protections can be express or implied contractual
    terms in a relationship. Promises to protect privacy might be enforced through prom-
    issory estoppel.

2                                                       Privacy Law Fundamentals, Sixth Edition

           Electronic copy available at: https://ssrn.com/abstract=4072205
Criminal Law
 Many privacy laws have criminal penalties. Many states have criminalized blackmail,
 “Peeping Tom” activity, or the surreptitious capture of nude images.
                                                                                                        1
 Evidentiary Privileges
 In evidence law, many privileges protect the confidentiality of information shared

                                                                                                 An Overview of Privacy Law
 within certain relationships, such as attorney-client and patient-physician.

 Federal Constitutional Law

              WAYS THE U.S. CONSTITUTION PROTECTS PRIVACY
          • The First Amendment’s right to speak anonymously
          • The First Amendment’s freedom of association, which protects the
            privacy of one’s associations
          • The Third Amendment’s protection of the home from the quartering
            of troops
          • The Fourth Amendment’s protection against unreasonable searches
            and seizures
          • The Fifth Amendment’s privilege against self-incrimination
          • The constitutional right to privacy
          • The constitutional right to information privacy

 State Constitutional Law
 A number of states have directly provided for the protection of privacy in their consti-
 tutions. For example, Cal. Const. art. I, § 1 stipulates: “All people are by their nature
 free and independent and have inalienable rights. Among these are enjoying and de-
 fending life and liberty, acquiring, possessing, and protecting property, and pursuing
 and obtaining safety, happiness and privacy.”

                            STATES WITH EXPRESS
                     CONSTITUTIONAL PRIVACY PROTECTION
     AK      Alaska Const. art. I, § 22       IL     Ill. Const. art. I, § 6

     AZ      Ariz. Const. art. II, § 8        LA     La. Const. art. I, § 5

     CA      Cal. Const. art. I, § 1          MT     Mt. Const. art. II, § 10

     FL      Fla. Const. art. I, § 23         SC     S.C. Const. art. I, § 10

     HI      Hawai’i Const. art. I, § 23      WA     Wash. Const. art. I, § 7

Privacy Law Fundamentals, Sixth Edition                                                      3

        Electronic copy available at: https://ssrn.com/abstract=4072205
Federal Statutory Law

    • Fair Credit Reporting Act (FCRA) of 1970, 15 U.S.C. §§ 1681 et seq.—
      provides citizens with rights regarding the use and disclosure of their personal
      information by consumer reporting agencies.

    • Bank Secrecy Act of 1970, Pub. L. No. 91-508—requires banks to maintain
      reports of people’s financial transactions to assist in government white-collar
      investigations.

    • Privacy Act of 1974, 5 U.S.C. § 552a—provides individuals with a number of
      rights concerning their personal information maintained in government record
      systems by federal agencies, such as the right to see one’s records and ensure the
      information in them is accurate.

    • Family Educational Rights and Privacy Act (FERPA) of 1974, 20 U.S.C. §§
      1221 note, 1232g—protects the privacy of school records.

    • Right to Financial Privacy Act of 1978, 12 U.S.C. §§ 3401–3422—requires
      a subpoena or search warrant for law enforcement officials to obtain financial
      records.

    • Foreign Intelligence Surveillance Act (FISA) of 1978, 15 U.S.C.
      §§ 1801–1811—regulates foreign intelligence gathering within the United States.

    • Privacy Protection Act (PPA) of 1980, 42 U.S.C. § 2000aa—restricts the gov-
      ernment’s ability to search and seize the work product of the press and media.

    • Cable Communications Policy Act of 1984, 47 U.S.C. § 551—mandates
      privacy protection for records maintained by cable companies.

    • Electronic Communications Privacy Act (ECPA) of 1986, 18 U.S.C. §§
      2510–2522, 2701–2709—contains three distinct statutes that regulate elec-
      tronic surveillance law: the Wiretap Act, Stored Communications Act, and Pen
      Register Act. The Wiretap Act was first enacted in 1968 as Title III of the Omni-
      bus Crime Control and Safe Streets Act.

    • Computer Matching and Privacy Protection Act of 1988, 5 U.S.C. § 552a—
      regulates automated investigations conducted by federal agencies carrying out
      automatic matching on computer files with other federal agencies or non-federal
      entities.

    • Employee Polygraph Protection Act of 1988, 29 U.S.C. §§ 2001–2009—
      governs the use of polygraphs by employers.

4                                                   Privacy Law Fundamentals, Sixth Edition

         Electronic copy available at: https://ssrn.com/abstract=4072205
• Video Privacy Protection Act (VPPA) of 1988, 18 U.S.C. §§ 2710–2711—
    protects the privacy of prerecorded videotapes, cassette tapes, or “similar audio
    visual materials.
                                                                                                      1
  • Telephone Consumer Protection Act (TCPA) of 1991, 47 U.S.C. § 227—
    provides certain remedies from repeat telephone calls by telemarketers.

                                                                                               An Overview of Privacy Law
  • Driver’s Privacy Protection Act of 1994, 18 U.S.C. §§ 2721–2725—restricts
    the states from disclosing or selling personal information from their motor vehicle
    records.

  • Communications Assistance for Law Enforcement Act of 1994, Pub. L.
    No. 103–414—requires telecommunications providers to help facilitate govern-
    ment interceptions of communications and surveillance.

  • Personal Responsibility and Work Opportunity Reconciliation Act of 1996,
    Pub. L. No. 104–193—requires the collection of personal information (includ-
    ing Social Security numbers, addresses, and wages) of all people who obtain a new
    job anywhere in the nation. The resulting information is placed into a national
    database to help government officials track down parents with outstanding child
    support payments.

  • Health Insurance Portability and Accountability Act (HIPAA) of 1996,
    Pub. L. No. 104–191—gives the Department of Health and Human Services
    (HHS) the authority to promulgate regulations governing the privacy of medical
    records. These regulations, the HIPAA Privacy Rule, were initially finalized in
    2000 with modifications made in subsequent years. 45 C.F.R. 160, 162, and 164.

  • Identity Theft and Assumption Deterrence Act (ITADA) of 1998, 18 U.S.C.
    § 1028—criminalizes the transfer or use of fraudulent identification with the
    intent to commit unlawful activity.

  • Children’s Online Privacy Protection Act (COPPA) of 1998, 15 U.S.C. §§
    6501–6506—restricts the use by internet websites of information gathered from
    children under age 13.

  • Gramm-Leach-Bliley Act (GLBA) of 1999, 15 U.S.C. §§ 6801–6809—
    requires privacy notices and provides opt-out rights when financial institutions
    seek to disclose personal data to other companies.

  • Uniting and Strengthening America by Providing Appropriate Tools
    Required to Intercept and Obstruct Terrorism Act (USA Patriot Act) of
    2001, Pub. L. No. 107–56—amends a number of electronic surveillance statutes
    and other statutes to facilitate law enforcement investigations and access to infor-
    mation.

Privacy Law Fundamentals, Sixth Edition                                                    5

        Electronic copy available at: https://ssrn.com/abstract=4072205
• Controlling the Assault of Non-Solicited Pornography And Marketing Act
       (CAN-SPAM Act) of 2003, Pub. L. No. 180–187—provides penalties for the
       transmission of unsolicited email.

     • Video Voyeurism Prevention Act of 2004, 18 U.S.C § 1801—criminalizes the
       capturing of nude images of people (when on federal property) under circum-
       stances where they have a reasonable expectation of privacy.

     • FISA Amendments Act of 2008, Pub. L. No. 110–261—amends FISA to add
       a new title creating additional procedures concerning the acquisition of informa-
       tion about certain persons outside the United States.

    State Statutory Law
    Much of privacy law is found in state law. Privacy tort law and data breach notifi-
    cation statutes are predominately state law. In addition, numerous federal statutes
    permit state laws to exceed their specifications. This issue is regulated under the
    rubric of “preemption.” In Chapter 9, we provide a chart that lists the federal statutes
    that preempt state laws and those that do not. The U.S. regulation of privacy is best
    thought of as a dual federal-state system.

                         Areas of State Legislation on Privacy
          Substantial state legislation on privacy exists in the following areas:

          Law Enforcement
            • Wiretapping and electronic surveillance
          Medical and Genetic Information
            • Confidentiality of medical information
            • Genetic privacy
          Government Records
            • Public records
            • State agency use and disclosure of personal information
          Financial Privacy
            • Banking privacy
            • Consumer reports
            • Security freeze

6                                                     Privacy Law Fundamentals, Sixth Edition

           Electronic copy available at: https://ssrn.com/abstract=4072205
Consumer Data and Business Records
         • Biometrics
         • Sale of personal data                                                                     1
         • Spam

                                                                                              An Overview of Privacy Law
         • Spyware and phishing
         • Telecommunications privacy
         • Pretexting
         • Use of Social Security numbers
         • Data disposal
         • Video privacy
         • Radio frequency identification (RFID) and tracking devices
         • Restrictions on internet service providers (ISPs)
         • Unauthorized access to computers and networks
       Data Security
         • Identity theft
         • Data security breach notification
         • Substantive security standards
        • Data disposal
       Employment
         • State employee personal information
         • Restrictions on employment application questions

 International Law
 Around the world, numerous countries have endeavored to protect privacy in their
 laws. There are two general approaches toward protecting privacy:
     1. Omnibus: A comprehensive approach to protecting privacy that covers person-
        al data across all industries and most contexts. Sometimes a single omnibus
        law will also regulate the public and private sectors.
     2. Sectoral: Regulates information on a sector-by-sector basis. Different indus-
        tries receive different regulation, and some contexts are not regulated at all.
        Different statutes regulate the public and private sectors.
     The world’s first comprehensive information privacy statute was a state law; the
 Hessian Parliament enacted this statute in Wiesbaden, Germany, on September 30,
 1970. Like most European data protection laws, this statute is an omnibus law. Note,
 however, that the European Union today relies on a mixture of omnibus and sectoral
 laws. The General Data Protection Regulation (GDPR) is an omnibus law and one
 that is supplemented by sectoral laws from the European Union, such as the ePrivacy
 Directive, and from the member states.

Privacy Law Fundamentals, Sixth Edition                                                   7

        Electronic copy available at: https://ssrn.com/abstract=4072205
You can also read