Privacy, Right ofSee also what's at Wikipedia, your library, or elsewhere.
Broader terms:Related terms:Narrower terms:Used for:- Invasion of privacy
- Privacy, Right of -- Law and legislation
- Right of privacy
- Right to privacy
|
Filed under: Privacy, Right of Privacy Design Strategies (The Little Blue Book) (c2022), by Jaap-Henk Hoepman (PDF in the Netherlands) "Trivial Complaints": The Role of Privacy in Domestic Violence Law And activism in the U.S. (c2008), by Kirsten S. Rambo (HTML and PDF at gutenberg-e.org) The Future of Reputation: Gossip, Rumor, and Privacy on the Internet (New Haven: Yale University Press, 2007), by Daniel J. Solove (PDF files with commentary at GWU) Privacy and Human Rights, by Privacy International and Electronic Privacy Information Center (full serial archives) The Public and the Private in Aristotle's Political Philosophy (Ithaca, NY and London: Cornell University Press, c1992), by Judith A. Swanson (multiple formats with commentary at Cornell Open) Surveillance Giants: How the Business Model of Google and Facebook Threatens human Rights (in multiple languages; 2019), by Amnesty International (PDF files with commentary at amnesty.org) Controlling Knowledge: Freedom of Information and Privacy Protection in a Networked World (Edmonton: AU Press, c2011), by Lorna Stefanick (PDF with commentary at AU Press) The Scoring of America: How Secret Consumer Scores Threaten Your Privacy and Your Future (San Diego: World Privacy Forum, 2014), by Pam Dixon and Robert Gellman (PDF with commentary at worldprivacyforum.org) Global Survey on Internet Privacy and Freedom of Expression (in English, French, and Arabic; Paris: UNESCO, 2012), by Toby Mendel, Andrew Puddephatt, Ben Wagner, Dixie Hawtin, and Natalia Torres (PDF with commentary at unesco.org) Lessons From the Identity Trail: Anonymity, Privacy and Identity in a Networked Society (2009), ed. by Ian Kerr, Valerie M. Steeves, and Carole Lucock (PDF files with commentary at idtrail.org) The Private, the Public, and the Published: Reconciling Private Lives and Public Rhetoric (Logan, UT: Utah State University Press, c2004), ed. by Barbara Couture and Thomas Kent (PDF with commentary at usu.edu) Rights and Responsibilities of Participants in Networked Communities (1994), ed. by Dorothy Elizabeth Robling Denning and Herbert Lin (HTML with commentary at NAP) Code and Other Laws of Cyberspace (second edition, 2006; with link to wiki updates of 1999 edition), by Lawrence Lessig (PDF with commentary at codev2.cc)
Filed under: Privacy, Right of -- Canada
Filed under: Privacy, Right of -- China -- Xinjiang Uygur ZizhiquFiled under: Privacy, Right of -- CongressesFiled under: Privacy, Right of -- PeriodicalsFiled under: Privacy, Right of -- Public opinionFiled under: Privacy, Right of -- United StateFiled under: Privacy, Right of -- United States Privacy and Free Speech: It's Good for Business (second edition; San Francisco: ACLU of California, 2012), by Nicole A. Ozer and Chris Conley (HTML and PDF with commentary at aclunc-tech.org) Private Lives and Public Policies: Confidentiality and Accessibility of Government Statistics (1993), by National Research Council Commission on Behavioral and Social Sciences and Education (page images with commentary at NAP) What the Government Does With Americans' Data (New York: Brennan Center for Justice, c2013), by Rachel Levinson-Waldman (PDF with commentary at brennancenter.org) Engaging Privacy and Information Technology in a Digital Age (2007), ed. by James Waldo, Herbert Lin, and Lynette I. Millett (HTML and page images with commentary at NAP) Records, Computers, and the Rights of Citizens (1973), by United States Department of Health, Education, and Welfare Secretary's Advisory Committee on Automated Personal Data Systems (HTML at hhs.gov) Protecting Privacy in Computerized Medical Information (OTA-TCT-576; 1993), by United States Congress Office of Technology Assessment (page images at HathiTrust) A Citizen's Guide on Using the Freedom of Information Act and the Privacy Act of 1974 to Request Government Records (2012), by United States House Committee on Oversight and Government Reform (text and PDF at congress.gov) Bigger Monster, Weaker Chains: The Growth of an American Surveillance Society (2003), by Jay Stanley and Barry Steinhardt (PDF with commentary at aclu.org) With Liberty to Monitor All: How Large-Scale US Surveillance is Harming Journalism, Law, and American Democracy (New York: Human Rights Watch, 2014), by G. Alex Sinha (HTML and PDF with commentary at hrw.org) A Citizen's Guide on Using the Freedom of Information Act and the Privacy Act of 1974 to Request Government Records (fifth edition; Washington: GPO, 1993), by United States House Committee on Government Operations (page images at HathiTrust) The Electronic Supervisor: New Technology, New Tensions (1987), by United States Congress Office of Technology Assessment (PDF files at Princeton) Privacy on the Line: The Politics of Wiretapping and Encryption (updated and expanded edition; Cambridge, MA and London: MIT Press, 2007), by Whitfield Diffie and Susan Eva Landau (PDF files with commentary at MIT Press) Fourth Amendment and the Internet: Hearing Before the Subcommittee on the Constitution of the Committee on the Judiciary, House of Representatives, One Hundred Sixth Congress, Second Session, April 6, 2000 (Washington: GPO, 2000), by United States House Committee on the Judiciary Electronic Record Systems and Individual Privacy (1986), by United States Congress Office of Technology Assessment (PDF files at Princeton) For the Record: Protecting Electronic Health Information, by National Research Council Computer Science and Telecommunications Board (HTML and page images at NAP) Filed under: Archives -- Access control
Filed under: Public records -- Access control -- United States
Filed under: Records -- Access control -- AustraliaFiled under: Records -- Access control -- New Zealand
Items below (if any) are from related and broader terms.
Filed under: Computer crimes
Filed under: Computer crimes -- Australia
Filed under: Computer crimes -- CongressesFiled under: Computer crimes -- CostsFiled under: Computer crimes -- Periodicals- Journal of Online Trust and Safety (2021-)
Filed under: Computer crimes -- South AfricaFiled under: Computer crimes -- United States The Use of Computers to Transmit Material Inciting Crime: Hearing Before the Subcommittee on Security and Terrorism of the Committee on the Judiciary, United States Senate, Ninety-Ninth Congress, First Session, on the Use of Computers to Transmit Material That Incites Crime and Constitutes Interstate Transmission of Implicit Obscene Matter, June 11, 1985 (Washington: GPO, 1985), by United States Senate Committee on the Judiciary (page images at HathiTrust) My Tiny Life: Crime and Passion in a Virtual World (c1998), by Julian Dibbell (PDF with commentary at lulu.com) The Hacker Crackdown: Law and Disorder on the Electronic Frontier, by Bruce Sterling (Gutenberg text) Filed under: CyberterrorismMore items available under broader and related terms at left. |