|
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910457031903321 |
|
|
Autore |
Gellman Robert |
|
|
Titolo |
Online privacy [[electronic resource] ] : a reference handbook / / Robert Gellman and Pam Dixon |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Santa Barbara, Calif., : ABC-CLIO, 2011 |
|
|
|
|
|
|
|
ISBN |
|
1-283-25568-5 |
1-78034-918-1 |
9786613255686 |
1-59884-650-7 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (312 p.) |
|
|
|
|
|
|
Collana |
|
Contemporary world issues |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Data protection - Law and legislation - United States |
Internet - Law and legislation - United States |
Privacy, Right of - United States |
Electronic books. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Cover; Contents; Preface; 1. Background and History; What Is Privacy? The Social, Cultural, and Legal Context of Privacy; What Does Online Mean Today?; How Is Online Privacy Different?; Is Privacy Still Important?; Adapting the Law to New Technologies; How Ideas about Privacy Have Adapted to an Online World; 2. Problems, Controversies, and Solutions; Key Controversies and Problems; Overview of Privacy and Health Information; Online Medical Privacy Issues; Cloud Computing; Social Networking; Identity, Reidentification, and Deidentification; Data Retention; Privacy versus the First Amendment |
Overview of Remedies to Privacy ProblemsA Closer Look at Regulation versus Self-Regulation; The FCRA Model; Remedies in a Self-Regulated or Regulated World; Consumer Choices: Opt In versus Opt Out; Consumer Choices: Do Not Track; 3. Worldwide Perspective; Introduction to International Approaches; Basic Approaches; Differing Privacy Rules and Data Exports; Internet Jurisdiction; Basic Issues; Other EU E-Privacy Directives; The WHOIS Database; 4. Chronology of Online Privacy; 5. Biographical Sketches; J. Howard Beales III; Jerry Berman; |
|
|
|
|
|
|
|
|
|
|
|
Louis Brandeis; Julie Brill; Jeff Chester |
Lorrie Faith CranorMary Culnan; Simon Davies; David Flaherty; Michael Geist; John Gilmore; Beth Givens; Susan Grant; Jim Harper; Evan Hendricks; Chris Hoofnagle; Masao Horibe; Jane Horvath; Peter Hustinx; Nuala O'Connor Kelly; Orin S. Kerr; Patrick Leahy; Jon Leibowitz; Takato Natsui; Jules Polonetsky; Marc Rotenberg; Rebecca Schaeffer; Spiros Simitis; Richard M. Smith; Robert Ellis Smith; Christopher Soghoian; Tim Sparapani; Latanya Sweeney; Lee Tien; David C. Vladeck; Willis H. Ware; Daniel J. Weitzner; Philip R. Zimmermann; 6. Data and Documents |
Council of Europe Convention for the Protection of Human Rights and Fundamental Freedoms (9150)Organisation for Economic Cooperation and Development (OECD) 1980 Privacy Guidelines; Warren and Brandeis, The Right to Privacy, Harvard Law Review 1890; Olmstead v. United States; Katz v. United States; Electronic Communications Privacy Act; Children's Online Privacy Protection Act; Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003; World Privacy Forum, Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Computing |
Federal Trade Commission Staff Report: Self-Regulatory Principles for Online Behavioral Advertising (2009)California Online Privacy Protection Act; California Office of Privacy Protection; 7. Directory of Organizations; 8. Resources; Books; Fiction; Nonfiction; Nonprint; Video; Movies; Webcasts; Sound Clips; Articles; Reports; Key Government Reports; Key Nonprofit Reports, Studies, and Documents; Key Academic Studies and Reports; Online Resources; General (Nongovernment) Internet Resources; Government Resources; Glossary; A; B; C; D; E; F; G; H; I; K; L; M; N; O; P; S; T; W; Index; A; B; C; D |
E |
|
|
|
|
|
|
Sommario/riassunto |
|
The Internet is great-until someone hacks your accounts or otherwise violates your privacy. This expert book provides a thorough and up-to-date overview of the key issues and risks relative to online privacy and explains how to counter those risks with solutions everyone needs to know. |
|
|
|
|
|
|
|
| |