I/S: Volume 2, Issue 3 (Fall 2006)
Permanent URI for this collection
Volume 2, Issue 3
Privacy
2006
Table of Contents
Description | Full Text PDF
2005-2006 Privacy Year in Review Annual Updates
Introductory Essay for "Privacy Law Year in Review, 2005-2006"
Swire, Peter pp. 475-484
Description | Full Text PDF
Government Information Collection
Federal Data Collection, Secure Flight, the Intelligence Reform and Terrorism Prevention Act, and the Reauthorization of the USA PATRIOT Act
Christensen, Grant pp. 485-520
Description | Full Text PDF
U.S. E-Passports: ETA August 2006: Recent Changes Provide Additional Protection for Biometric Information Contained in U.S. Electronic Passports
Fungsang, Francis pp. 521-546
Description | Full Text PDF
State Government Information Collection: The Shutdown of the MATRIX Program, REAL ID, and DNA Collection
Stenman, Katie pp. 547-572
Description | Full Text PDF
Internet
The Effects of Spyware and Phishing on the Privacy Rights of Internet Users
Cherry, Sarah A. pp. 573-598
Description | Full Text PDF
Internet Wiretaps: Applying the Communications Assistance for Law Enforcement Act to Broadband Services
Park, Gene D. pp. 599-626
Description | Full Text PDF
Unsolicited Commercial E-mail, Privacy Concerns Related To Social Network Services, Online Protection of Children, and Cyberbullying
Munukutla-Parker, Usha pp. 627-650
Description | Full Text PDF
Medical
Toward Implementation of Electronic Health Records: Justifications, Action, and Barriers to Adoption
Koehler, Kirk Benton pp. 651-683
Description | Full Text PDF
Reflections on Privacy: Recent Developments in HIPAA Privacy Rule
Rahman, Nusrat N. pp. 685-714
Description | Full Text PDF
Financial
Fair and Accurate Credit Transactions Act Regulations: Disclosure, Opt-Out Rights, Medical Information Usage, and Consumer Information Disposal
Liu, Katy K. pp. 715-735
Description | Full Text PDF
Developments in the Gramm-Leach-Bliley Act During 2005-06: An Overview of Important Changes in Case Law and Pending Legislation
McMahon, Richard Joseph pp. 737-759
Description | Full Text PDF
Two-Factor Authentication: A Solution to Times Past or Present? The Debate Surrounding the Gramm-Leach-Bliley Security Safeguards Rule and the Methods of Risk Assessment and Compliance
Singh, Ritu pp. 761-779
Description | Full Text PDF
International
Argentina's Protection of Personal Data: Initiation and Response
Gakh, Maxim pp. 781-801
Description | Full Text PDF
Data Protection in the European Union: Current Status and Future Implications
Godbey, Briana N. pp. 803-829
Description | Full Text PDF
2005-2006 Privacy Year in Review Special Topics
Privacy Law Developments in California
Betzel, Margaret pp. 831-877
Description | Full Text PDF
Auditing for Privacy
Easter, Christine pp. 879-900
Description | Full Text PDF
Information Brokers and Privacy
Somogy, Derek J. pp. 901-925
Description | Full Text PDF
Security Breach Notifications: State Laws, Federal Proposals, and Recommendations
Sutton, Milton C. pp. 927-942
Description | Full Text PDF
Articles
An Evaluation of the Effect of US Financial Privacy Legislation Through the Analysis of Privacy Policies
Sheng, Xinguang; Cranor, Lorrie Faith pp. 943-979
Description | Full Text PDF
How Technology Drives Vehicular Privacy
McDonald, Aleecia M.; Cranor, Lorrie Faith pp. 981-1015
Description | Full Text PDF