P1: c-146Everett-Church
Everett-Chruch-1 WL040/Bidgoli-Vol III-Ch-08 July 11, 2003 11:46 Char Count= 0
106 PRIVACYLAW
technologies have created new challenges to the aver-
age person’s desire to “be let alone.” As this chapter has
shown, however, a number of concepts find their way into
privacy-related policies and practices. Among these, the
fundamental principles of notice, choice, access, and se-
curity are driving both consumer expectations and busi-
ness planning. Keeping these principles in mind, many
who are called on to seek privacy solutions in their own
particular business or personal context have a conceptual
framework within which to arrive at their own conclusion.
GLOSSARY
Ad network A consortium of Web sites linked together
by an advertising agency for purposes of aggregating
advertising placements and tracking consumers move-
ments among and between member sites.
Cookies A small file saved by a Web browser, at the di-
rection of a Web site, containing data that may be later
retrieved by that Web site. See also persistent cookies,
session cookies, third-party cookies.
Children’s Online Privacy Protection Act of 1998
(COPPA) Legislation that limits operators of com-
mercial Web sites and online services from collecting
personal information from children under age 13.
Electronic Communications Privacy Act of 1986
(ECPA) Legislation governing the use of wiretaps for
domestic law enforcement activities.
Foreign Intelligence Surveillance Act of 1978 (FISA)
Legislation governing the use of wiretapping and phys-
ical searches in investigations involving terrorists and
agents of foreign powers.
Gramm–Leach–Bliley Act (GLB) Also known as the Fi-
nancial Services Modernization Act. Legislation that
instituted major changes to the U.S. banking system.
In pertinent part, GLB requires that organizations pro-
viding financial services disclose their data collection
practices to customers and to provide the ability to opt-
out of those practices.
Health Insurance Portability and Accountability Act
of 1996 (HIPAA) Legislation that instituted a num-
ber of changes to health insurance practices. In per-
tinent part, HIPAA included privacy-related provisions
applicable to health information created or maintained
by health care providers, health plans, and health care
clearinghouses.
Internet protocol (IP) address The unique numerical
address assigned to each computer connected to the In-
ternet. An address may be assigned temporarily (called
a dynamic IP address) or may be assigned for long pe-
riods (called a static IP address).
Organization for Economic Cooperation and Devel-
opment (OECD) A group of 30 democratic, mar-
ket economy countries working collaboratively on eco-
nomic, social, and trade issues.
Persistent cookies Cookie files designated to be stored
for long periods, sometimes as long as 10 years.
Privacy Freedom from unauthorized intrusion. A state
of being let alone and able to keep certain especially
personal matters to oneself.
Safe harbor A legal concept that permits an entity to
reduce or avoid legal liability by agreeing to adhere to
certain standards or procedures. In the context of Inter-
net privacy, safe harbor refers to an agreement between
the United States and the European Union which per-
mits U.S. companies to certify that they adhere to the
stricter privacy standards required by European law,
thereby avoiding a more burdensome set of country-
by-country registration procedures.
Session cookies Cookie files designated to be stored
for only the duration of a visit to a Web site; usually
10 minutes or less.
Third-party cookies A cookie file set by some entity
other than the operator of the Web site being visited by
the user. Third-party cookies are often used by advertis-
ing services to track user movements between multiple
Web sites over periods of time.
Trustmark A symbol used to identify those companies
whose Web sites have subjected their privacy policy to
review by a third-party watchdog organization.
Web bugs Also called Web beacons, 1-by-1 pixels, or
clear GIFs. Special links imbedded in Web pages, or
other HTML-coded documents such as some types of
e-mail, that allow the link’s creator to track every in-
stance in which the document is viewed.
CROSS REFERENCES
SeeCyberlaw: The Major Areas, Development, and Provi-
sions; International Cyberlaw; Legal, Social and Ethical
Issues.
REFERENCES
American Management Association (2001). 2001 work-
place monitoring and surveillance: Policies and prac-
tices. Retrieved May 9, 2003, from http://www.amanet.
org/research/archives.htm
Cailliau, R. (1995).A little history of the World Wide Web.
Retrieved December 3, 2002, from http://www.w3c.org/
History.html
Cantrell v. Forest City Publishing Co.,419 U.S. 245 (1974).
Retrieved December 3, 2002, from http://laws.findlaw.
com/us/419/245.html
Children’s Online Privacy Protection Act, 15 U.S.C.
§§6501—6506 (1998). Retrieved December 3, 2002,
from http://www.ftc.gov/ogc/coppa1.htm
Douglass v. Hustler Magazine, 769 F.2d 1128 (1985).
Electronic Communications Privacy Act, 18 U.S.C.§ 2701
(1986). Retrieved December 3, 2002, from http://www4.
law.cornell.edu/uscode/18/2701.html
Electronic Privacy Information Center Carnivore Archive
(2002). Retrieved February 9, 2003, from http://www.
epic.org/privacy/carnivore/
Electronic Privacy Information Center Foreign Intel-
ligence Surveillance Act Archive (2003). Retrieved
February 8, 2003, from http://www.epic.org/privacy/
terrorism/fisa/
Electronic Privacy Information Center Total Information
Awareness Archive (2003). Retrieved February 8, 2003,
from http://www.epic.org/privacy/profiling/tia/
Enright, K. P., & McCullough, M. R. (2000).Computer
professionals for social responsibility privacy working
group: CPO guidelines. Retrieved December 3, 2002,
from http://www.privacylaw.net/CPOGuidelines.pdf