I/S: A Journal of Law and Policy for the Information Society
Volume 2, Issue 3
Privacy
2006


Table of Contents
Description | Full Text PDF

2005-2006 Privacy Year in Review Annual Updates

Introductory Essay for "Privacy Law Year in Review, 2005-2006"
Swire, Peter pp. 475-484
Description | Full Text PDF

Government Information Collection

Federal Data Collection, Secure Flight, the Intelligence Reform and Terrorism Prevention Act, and the Reauthorization of the USA PATRIOT Act
Christensen, Grant pp. 485-520
Description | Full Text PDF

U.S. E-Passports: ETA August 2006: Recent Changes Provide Additional Protection for Biometric Information Contained in U.S. Electronic Passports
Fungsang, Francis pp. 521-546
Description | Full Text PDF

State Government Information Collection: The Shutdown of the MATRIX Program, REAL ID, and DNA Collection
Stenman, Katie pp. 547-572
Description | Full Text PDF

Internet

The Effects of Spyware and Phishing on the Privacy Rights of Internet Users
Cherry, Sarah A. pp. 573-598
Description | Full Text PDF

Internet Wiretaps: Applying the Communications Assistance for Law Enforcement Act to Broadband Services
Park, Gene D. pp. 599-626
Description | Full Text PDF

Unsolicited Commercial E-mail, Privacy Concerns Related To Social Network Services, Online Protection of Children, and Cyberbullying
Munukutla-Parker, Usha pp. 627-650
Description | Full Text PDF

Medical

Toward Implementation of Electronic Health Records: Justifications, Action, and Barriers to Adoption
Koehler, Kirk Benton pp. 651-683
Description | Full Text PDF

Reflections on Privacy: Recent Developments in HIPAA Privacy Rule
Rahman, Nusrat N. pp. 685-714
Description | Full Text PDF

Financial

Fair and Accurate Credit Transactions Act Regulations: Disclosure, Opt-Out Rights, Medical Information Usage, and Consumer Information Disposal
Liu, Katy K. pp. 715-735
Description | Full Text PDF

Developments in the Gramm-Leach-Bliley Act During 2005-06: An Overview of Important Changes in Case Law and Pending Legislation
McMahon, Richard Joseph pp. 737-759
Description | Full Text PDF

Two-Factor Authentication: A Solution to Times Past or Present? The Debate Surrounding the Gramm-Leach-Bliley Security Safeguards Rule and the Methods of Risk Assessment and Compliance
Singh, Ritu pp. 761-779
Description | Full Text PDF

International

Argentina's Protection of Personal Data: Initiation and Response
Gakh, Maxim pp. 781-801
Description | Full Text PDF

Data Protection in the European Union: Current Status and Future Implications
Godbey, Briana N. pp. 803-829
Description | Full Text PDF

2005-2006 Privacy Year in Review Special Topics

Privacy Law Developments in California
Betzel, Margaret pp. 831-877
Description | Full Text PDF

Auditing for Privacy
Easter, Christine pp. 879-900
Description | Full Text PDF

Information Brokers and Privacy
Somogy, Derek J. pp. 901-925
Description | Full Text PDF

Security Breach Notifications: State Laws, Federal Proposals, and Recommendations
Sutton, Milton C. pp. 927-942
Description | Full Text PDF

Articles

An Evaluation of the Effect of US Financial Privacy Legislation Through the Analysis of Privacy Policies
Sheng, Xinguang; Cranor, Lorrie Faith pp. 943-979
Description | Full Text PDF

How Technology Drives Vehicular Privacy
McDonald, Aleecia M.; Cranor, Lorrie Faith pp. 981-1015
Description | Full Text PDF


Recent Submissions