Over at the Conglomerate, Professor Eric Goldman’s paper, A Coasean Analysis of Marketing, is being workshopped in the Conglomerate’s Second Annual Junior Scholars Workshop. Professors Peter Huang and Frank Pasquale (previously a guest blogger here at Concurring Opinions) are providing commentary.
Category: Archive Solove Blog Posts
Older Posts by Professor Daniel J. Solove for his blog at TeachPrivacy, a privacy awareness and security training company.
Template for News Stories on Government Data Gathering
NSA warrantless wiretaps. NSA collection of phone records. CIA gathering of financial records. The stories are endless. To help out reporters, I thought I’d just write a quick and easy template to make reporting a little bit easier. So here it is:
Massive Government Data Mining of Financial Records
Apparently, warrantless wiretapping and gathering of phone call records just aren’t enough to quench the Bush Administration’s thirst for data. Now we learn that the government has gathered massive quantities of financial records. The New York Times reports:
Why Is There a Shortage of Organ Donations?
I was watching a show on CNN about people in need of organ transplants going to China for organ donation tourism. China harvests organs from prisoners it executes, sometimes without their consent, and then offers them to “tourists” who come in need of transplants.
Some Interesting Facts About Identity Theft
Today’s Washington Post contains an interesting article about identity theft. Some identity thieves enlist unwitting employees of financial institutions into supplying them with personal information:
HIPAA’s Lax Enforcement
Today’s Washington Post has an interesting story about how the privacy regulations under the Health Insurance Portability and Accountability Act (HIPAA) are not being enforced:
More Data Lost: 1.3 Million Student Loan Recipients
From CNET: About 1.3 million customers of a Texas provider of student loans are at risk of ID fraud, after a contractor lost computer equipment with sensitive information on them. The equipment, which was not identified, contains the names and Social Security numbers of the borrowers, the Texas Guaranteed Student Loan company said in a statement […]
Internet Shaming in China
The New York Times has a fascinating and frightening article on Internet shaming in China. From the article:
Is There a Good Response to the “Nothing to Hide” Argument?
One of the most common attitudes of those unconcerned about government surveillance or privacy invasions is “I’ve got nothing to hide.” I was talking the issue over one day with a few colleagues in my field, and we all agreed that thus far, those emphasizing the value of privacy had not been able to articulate […]
Private vs. Public Sector Responses to Data Security Breaches
I just blogged about the massive data security breach by the Veterans Administration, affecting 26.5 million veterans. Bob Sullivan has a terrific post comparing the government’s response to its data security breach to that of the businesses that have had such breaches in the past: