Federal Trade Commission Privacy Law and Policy

Author: Chris Jay Hoofnagle

Publisher: Cambridge University Press

ISBN: 1316495493

Category: Law

Page: N.A

View: 3686

DOWNLOAD NOW »

The Federal Trade Commission, a US agency created in 1914 to police the problem of 'bigness', has evolved into the most important regulator of information privacy - and thus innovation policy - in the world. Its policies profoundly affect business practices and serve to regulate most of the consumer economy. In short, it now regulates our technological future. Despite its stature, however, the agency is often poorly understood by observers and even those who practice before it. This volume by Chris Jay Hoofnagle - an internationally recognized scholar with more than fifteen years of experience interacting with the FTC - is designed to redress this confusion by explaining how the FTC arrived at its current position of power. It will be essential reading for lawyers, legal academics, political scientists, historians and anyone else interested in understanding the FTC's privacy activities and how they fit in the context of the agency's broader consumer protection mission.

Federal Trade Commission Privacy Law and Policy

Author: Chris Jay Hoofnagle

Publisher: Cambridge University Press

ISBN: 9781107565630

Category: Law

Page: 356

View: 7381

DOWNLOAD NOW »

The Federal Trade Commission, a US agency created in 1914 to police the problem of 'bigness', has evolved into the most important regulator of information privacy - and thus innovation policy - in the world. Its policies profoundly affect business practices and serve to regulate most of the consumer economy. In short, it now regulates our technological future. Despite its stature, however, the agency is often poorly understood by observers and even those who practice before it. This volume by Chris Jay Hoofnagle - an internationally recognized scholar with more than fifteen years of experience interacting with the FTC - is designed to redress this confusion by explaining how the FTC arrived at its current position of power. It will be essential reading for lawyers, legal academics, political scientists, historians and anyone else interested in understanding the FTC's privacy activities and how they fit in the context of the agency's broader consumer protection mission.

Federal Trade Commission

Law, Practice and Procedure

Author: Peter C. Ward

Publisher: Law Journal Press

ISBN: 9781588520401

Category: Law

Page: 601

View: 5730

DOWNLOAD NOW »

The book brings you up-to-date on the latest legislative, judicial and administrative actions affecting practice before the Commission.

Healthcare Antitrust, Settlements, and the Federal Trade Commission

Author: James Langenfeld,Edwin Galeano

Publisher: Emerald Group Publishing

ISBN: 1787566005

Category: Business & Economics

Page: 488

View: 2727

DOWNLOAD NOW »

This volume of Research in Law and Economics contains articles that address important legal and economic developments in the areas of healthcare, intellectual property and labor settlements, competitive effects, cartel overcharges, and the U.S. Federal Trade Commission (“FTC”).

Niche Envy

Author: Joseph Turow

Publisher: MIT Press

ISBN: 026226496X

Category: Business & Economics

Page: 240

View: 1595

DOWNLOAD NOW »

We have all been to Web sites that welcome us by name, offering us discounts, deals, or special access to content. For the most part, it feels good to be wanted--to be valued as a customer. But if we thought about it, we might realize that we've paid for this special status by turning over personal information to a company's database. And we might wonder whether other customers get the same deals we get, or something even better. We might even feel stirrings of resentment toward customers more valued than we are. In Niche Envy, Joseph Turow examines the emergence of databases as marketing tools and the implications this may have for media, advertising, and society. If the new goal of marketing is to customize commercial announcements according to a buyer's preferences and spending history--or even by race, gender, and political opinions--what does this mean for the twentieth-century tradition of equal access to product information, and how does it affect civic life?Turow shows that these marketing techniques are not wholly new; they have roots in direct marketing and product placement, widely used decades ago and recently revived and reimagined by advertisers as part of "customer relationship management" (known popularly as CRM). He traces the transformation of marketing techniques online, on television, and in retail stores. And he describes public reaction against database marketing--pop-up blockers, spam filters, commercial-skipping video recorders, and other ad-evasion methods. Polls show that the public is nervous about giving up personal data. Meanwhile, companies try to persuade the most desirable customers to trust them with their information in return for benefits. Niche Envy tracks the marketing logic that got us to this uneasy impasse.

Privacy on the Ground

Driving Corporate Behavior in the United States and Europe

Author: Kenneth A. Bamberger,Deirdre K. Mulligan

Publisher: MIT Press

ISBN: 0262029987

Category: Business & Economics

Page: 352

View: 2035

DOWNLOAD NOW »

An examination of corporate privacy management in the United States, Germany, Spain, France, and the United Kingdom, identifying international best practices and making policy recommendations.

Internet and Online Privacy

A Legal and Business Guide

Author: Andrew Frackman,Rebecca C. Martin,Claudia Ray

Publisher: ALM Publishing

ISBN: 9780970597076

Category: Computers

Page: 233

View: 5705

DOWNLOAD NOW »

Analyzes the state of the law of online and Internet privacy in both the US and Europe, as well as the historical developments behind it. This book examines enforcement activity by the Federal Trade Commission, legislation and regulation, as well as the leading lawsuits that have asserted invasion of privacy on the Internet.

Asian Data Privacy Laws

Trade and Human Rights Perspectives

Author: Graham Greenleaf

Publisher: Oxford University Press, USA

ISBN: 0199679665

Category: Law

Page: 579

View: 5873

DOWNLOAD NOW »

The first work to examine data privacy laws across Asia, covering all 26 countries and separate jurisdictions, and with in-depth analysis of the 14 which have specialised data privacy laws. Professor Greenleaf demonstrates the increasing world-wide significance of data privacy and the international context of the development of national data privacy laws as well as assessing the laws, their powers and their enforcement against international standards.

The Cambridge Handbook of Consumer Privacy

Author: Evan Selinger,Jules Polonetsky,Omer Tene

Publisher: Cambridge University Press

ISBN: 1316859274

Category: Law

Page: N.A

View: 5414

DOWNLOAD NOW »

Businesses are rushing to collect personal data to fuel surging demand. Data enthusiasts claim personal information that's obtained from the commercial internet, including mobile platforms, social networks, cloud computing, and connected devices, will unlock path-breaking innovation, including advanced data security. By contrast, regulators and activists contend that corporate data practices too often disempower consumers by creating privacy harms and related problems. As the Internet of Things matures and facial recognition, predictive analytics, big data, and wearable tracking grow in power, scale, and scope, a controversial ecosystem will exacerbate the acrimony over commercial data capture and analysis. The only productive way forward is to get a grip on the key problems right now and change the conversation. That's exactly what Jules Polonetsky, Omer Tene, and Evan Selinger do. They bring together diverse views from leading academics, business leaders, and policymakers to discuss the opportunities and challenges of the new data economy.

The Privacy Engineer's Manifesto

Getting from Policy to Code to QA to Value

Author: Michelle Dennedy,Jonathan Fox,Tom Finneran

Publisher: Apress

ISBN: 1430263563

Category: Computers

Page: 400

View: 8703

DOWNLOAD NOW »

"It's our thesis that privacy will be an integral part of the next wave in the technology revolution and that innovators who are emphasizing privacy as an integral part of the product life cycle are on the right track." --The authors of The Privacy Engineer's Manifesto The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value is the first book of its kind, offering industry-proven solutions that go beyond mere theory and adding lucid perspectives on the challenges and opportunities raised with the emerging "personal" information economy. The authors, a uniquely skilled team of longtime industry experts, detail how you can build privacy into products, processes, applications, and systems. The book offers insight on translating the guiding light of OECD Privacy Guidelines, the Fair Information Practice Principles (FIPPs), Generally Accepted Privacy Principles (GAPP) and Privacy by Design (PbD) into concrete concepts that organizations, software/hardware engineers, and system administrators/owners can understand and apply throughout the product or process life cycle—regardless of development methodology—from inception to retirement, including data deletion and destruction. In addition to providing practical methods to applying privacy engineering methodologies, the authors detail how to prepare and organize an enterprise or organization to support and manage products, process, systems, and applications that require personal information. The authors also address how to think about and assign value to the personal information assets being protected. Finally, the team of experts offers thoughts about the information revolution that has only just begun, and how we can live in a world of sensors and trillions of data points without losing our ethics or value(s)...and even have a little fun. The Privacy Engineer's Manifesto is designed to serve multiple stakeholders: Anyone who is involved in designing, developing, deploying and reviewing products, processes, applications, and systems that process personal information, including software/hardware engineers, technical program and product managers, support and sales engineers, system integrators, IT professionals, lawyers, and information privacy and security professionals. This book is a must-read for all practitioners in the personal information economy. Privacy will be an integral part of the next wave in the technology revolution; innovators who emphasize privacy as an integral part of the product life cycle are on the right track. Foreword by Dr. Eric Bonabeau, PhD, Chairman, Icosystem, Inc. & Dean of Computational Sciences, Minerva Schools at KGI.

Taming Japan's Deflation

The Debate over Unconventional Monetary Policy

Author: Gene Park,Saori N. Katada,Giacomo Chiozza,Yoshiko Kojo

Publisher: Cornell University Press

ISBN: 1501728180

Category: Political Science

Page: 264

View: 7695

DOWNLOAD NOW »

Bolder economic policy could have addressed the persistent bouts of deflation in post-bubble Japan, write Gene Park, Saori N. Katada, Giacomo Chiozza, and Yoshiko Kojo in Taming Japan's Deflation. Despite warnings from economists, intense political pressure, and well-articulated unconventional policy options to address this problem, Japan's central bank, the Bank of Japan (BOJ), resisted taking the bold actions that the authors believe would have significantly helped. With Prime Minister Abe Shinzo's return to power, Japan finally shifted course at the start of 2013 with the launch of Abenomics—an economic agenda to reflate the economy—and Abe's appointment of new leadership at the BOJ. As Taming Japan's Deflation shows, the BOJ's resistance to experimenting with bolder policy stemmed from entrenched policy ideas that were hostile to activist monetary policy. The authors explain how these policy ideas evolved over the course of the BOJ's long history and gained dominance because of the closed nature of the broader policy network. The explanatory power of policy ideas and networks suggests a basic inadequacy in the dominant framework for analysis of the politics of monetary policy derived from the literature on central bank independence. This approach privileges the interaction between political principals and their supposed agents, central bankers; but Taming Japan's Deflation shows clearly that central bankers' views, shaped by ideas and institutions, can be decisive in determining monetary policy. Through a combination of institutional analysis, quantitative empirical tests, in-depth case studies, and structured comparison of Japan with other countries, the authors show that, ultimately, the decision to adopt aggressive monetary policy depends largely on the bankers' established policy ideas and policy network.

Online Identity Theft

Author: OECD

Publisher: OECD Publishing

ISBN: 9264056599

Category:

Page: 138

View: 8185

DOWNLOAD NOW »

This book defines identity theft, studies how it is perpetrated, outlines what is being done to combat it, and recommends specific ways to address it in a global manner.

The Business Privacy Law Handbook

Author: Charles H. Kennedy

Publisher: Artech House

ISBN: 1596931779

Category: Business & Economics

Page: 312

View: 7467

DOWNLOAD NOW »

The complex, evolving world of corporate privacy law is the topic of this one-stop guide. Clearly written in non-technical language, the handbook offers a solid understanding of the industry-specific obligations of banks, healthcare providers, and other lines of business.

Privacy Law and Society

Author: Anita L. Allen,Rok Lampe

Publisher: West Academic

ISBN: 9780314267030

Category: Law

Page: 1187

View: 9321

DOWNLOAD NOW »

This casebook on privacy, information, and surveillance law is the most comprehensive on the market. In addition to covering federal regulatory regimes, it explores the full range of constitutional and state privacy tort doctrines. It has been updated to include human rights and EU developments and expose readers to recent debates over cloud computing, social marketing, and the role of the Federal Trade Commission. Chapter 1 of the textbook focuses on the four common law invasion of privacy torts, plus the publicity tort and breach of confidentiality. Chapter 2 focuses on constitutional law, with special attention to the First, Fourth and 14th Amendments. Chapter 3 includes cases and materials that lay out federal information policy, including fair information practice standards reflected in the Privacy Act, the Freedom of Information Act, the Fair Credit Reporting Act, the Family Education and Right to Privacy Act, The Children's Online Privacy Protection Act, HIPPA, Gramm-Leach-Bliley and many others. Chapter 4 takes up communications privacy and federal approaches to the regulation of intelligence, law enforcement and private surveillance. All of this is accomplished with considerable attention to the ethical, social and policy foundations of the field.

To review the Federal Trade Commission's survey of privacy policies posted by commercial web sites

hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Sixth Congress, second session, May 25, 2000

Author: United States. Congress. Senate. Committee on Commerce, Science, and Transportation,Sheila Foster Anthony,Thomas Barrett Leary,Robert Pitofsky,Orson Swindle,Mozelle W. Thompson

Publisher: Government Printing Office

ISBN: N.A

Category: Computers

Page: 101

View: 1516

DOWNLOAD NOW »

Privacy as Trust

Information Privacy for an Information Age

Author: Ari Ezra Waldman

Publisher: N.A

ISBN: 1107186005

Category: Law

Page: 196

View: 9555

DOWNLOAD NOW »

Proposes a new way of thinking about information privacy that leverages law to protect disclosures in contexts of trust.

Privacy’s Blueprint

The Battle to Control the Design of New Technologies

Author: Woodrow Hartzog

Publisher: Harvard University Press

ISBN: 0674976002

Category: Computers

Page: 322

View: 769

DOWNLOAD NOW »

Woodrow Hartzog develops the underpinning of a new kind of privacy law responsive to the way people actually perceive and use digital technologies. Rather than permit exploitation, it would demand encryption, prohibit malicious interfaces that deceive users and leave them vulnerable, and require safeguards against abuses of biometric surveillance.