Author: Daniel Solove

0

The Year in Privacy Books 2011

Here’s a list of notable privacy books published in 2011.

Previous lists:

Privacy Books 2010

Privacy Books 2009

Privacy Books 2008

 

Saul Levmore & Martha Nussbaum, eds., The Offensive Internet (Harvard 2011)

 

This is a great collection of essays about the clash of free speech and privacy online.  I have a book chapter in this volume along with Martha Nussbaum, Cass Sunstein, Brian Leiter, Danielle Citron, Frank Pasquale, Geoffrey Stone, and many others.

Daniel J. Solove, Nothing to Hide: The False Tradeoff Between Privacy and Security (Yale 2011)

 

Nothing to Hide “succinctly and persuasively debunks the arguments that have contributed to privacy’s demise, including the canard that if you have nothing to hide, you have nothing to fear from surveillance. Privacy, he reminds us, is an essential aspect of human existence, and of a healthy liberal democracy—a right that protects the innocent, not just the guilty.” — David Cole, New York Review of Books

Jeff Jarvis, Public Parts: How Sharing in the Digital Age Improves the Way We Work and Live (Simon & Schuster 2011)

 

I strongly disagree with a lot of what Jarvis says, but the book is certainly provocative and engaging.

Daniel J. Solove & Paul M. Schwartz, Privacy Law Fundamentals (IAPP 2011)

 

“A key resource for busy professional practitioners. Solove and Schwartz have succeeded in distilling the fundamentals of privacy law in a manner accessible to a broad audience.” – Jules Polonetsky, Future of Privacy Forum

Eli Pariser, The Filter Bubble (Penguin 2011)

 

An interesting critique of the personalization of the Internet.  We often don’t see the Internet directly, but through tinted goggles designed by others who determine what we want to see. 

Siva Vaidhyanathan, The Googlization of Everything (U. California 2011)

 

A vigorous critique of Google and other companies that shape the Internet.  With regard to privacy, Vaidhyanathan explains how social media and other companies encourage people’s sharing of information through their architecture — and often confound people in their ability to control their reputation.

Susan Landau, Surveillance or Security? The Risk Posed by New Wiretapping Technologies (MIT 2011)

 

A compelling argument for how designing technologies around surveillance capabilities will undermine rather than promote security.

 


Kevin Mitnick, Ghost in the Wires (Little Brown 2011)

 

A fascinating account of the exploits of Kevin Mitnick, the famous ex-hacker who inspired War Games.  His tales are quite engaging, and he demonstrates that hacking is often not just about technical wizardry but old-fashioned con-artistry.

Matt Ivester, lol . . . OMG! (CreateSpace 2011)

 

Ivester created Juicy Campus, the notorious college gossip website.  After the site’s demise, Ivester changed his views about online gossip, recognizing the problems with Juicy Campus and the harms it caused.  In this book, he offers thoughtful advice for students about what they post online.

Joseph Epstein, Gossip: The Untrivial Pursuit (Houghton Mifflin Harcourt 2011)

 

A short engaging book that is filled with interesting stories and quotes about gossip.  Highly literate, this book aims to expose gossip’s bad and good sides, and how new media are transforming gossip in troublesome ways.

Anita Allen, Unpopular Privacy (Oxford 2011)

 

My blurb: “We live in a world of increasing exposure, and privacy is increasingly imperiled by the torrent of information being released online. In this powerful book, Anita Allen examines when the law should mandate privacy and when it shouldn’t. With nuance and thoughtfulness, Allen bravely tackles some of the toughest questions about privacy law — those involving the appropriate level of legal paternalism. Unpopular Privacy is lively, engaging, and provocative. It is filled with vivid examples, complex and fascinating issues, and thought-provoking ideas.”

Frederick Lane, Cybertraps for the Young (NTI Upstream 2011)

 

A great overview of the various problems the Internet poses for children such as cyberbullying and sexting.  This book is a very accessible overview for parents.

Clare Sullivan, Digital Identity (University of Adelaide Press 2011)

 

Australian scholar Clare Sullivan explores the rise of “digital identity,” which is used for engaging in various transactions.  Instead of arguing against systematized identification, she sees the future as heading inevitably in that direction and proposes a robust set of rights individuals should have over such identities.  This is a thoughtful and pragmatic book, with a great discussion of Australian, UK, and EU law.

0

The Student Data Grab

There’s a good editorial in the NY Post today about the big data grab the Education Department is facilitating with student data.  I blogged about this issue a short while ago at the Huffington Post.

According to the op-ed:

Would it bother you to know that the federal Centers for Disease Control had been shown your daughter’s health records to see how she responded to an STD/teen-pregnancy-prevention program? How about if the federal Department of Education and Department of Labor scrutinized your son’s academic performance to see if he should be “encouraged” to leave high school early to learn a trade? Would you think the government was intruding on your territory as a parent?

Under regulations the Obama Department of Education released this month, these scenarios could become reality. The department has taken a giant step toward creating a de facto national student database that will track students by their personal information from preschool through career. Although current federal law prohibits this, the department decided to ignore Congress and, in effect, rewrite the law. Student privacy and parental authority will suffer.

How did it happen? Buried within the enormous 2009 stimulus bill were provisions encouraging states to develop data systems for collecting copious information on public-school kids. To qualify for stimulus money, states had to agree to build such systems according to federally dictated standards. So all 50 states either now maintain or are capable of maintaining extensive databases on public-school students.

The administration wants this data to include much more than name, address and test scores. According to the National Data Collection Model, the government should collect information on health-care history, family income and family voting status. In its view, public schools offer a golden opportunity to mine reams of data from a captive audience.

1

Two New Cases Regarding NSA Surveillance

The 9th Circuit has decided a pair of cases involving the NSA Surveillance Program.

In Jewel v. NSA, the 9th Circuit concluded that plaintiffs had standing to raise constitutional challenges against NSA telephone surveillance:

At issue in this appeal is whether Carolyn Jewel and other residential telephone customers (collectively “Jewel”) have standing to bring their statutory and constitutional claims against the government for what they describe as a communications dragnet of ordinary American citizens.  In light of detailed allegations and claims of harm linking Jewel to the intercepted telephone, internet and electronic communications, we conclude that Jewel’s claims are not abstract, generalized grievances and instead meet the constitutional standing requirement of concrete injury.

In In re NSA Telecommunications Litigation, the 9th Circuit held that § 802 of the Foreign Intelligence Surveillance Act (“FISA”), 50 U.S.C. § 1885a (the FISA Amendments
Act) is constitutional.  The Act retroactively immunized telecommunication companies for cooperating with the NSA.

2

Law School Debt

This report by the Center for American Progress has some interesting statistics about law school debt:

The high demand for legal education is somewhat surprising given its hefty price tag. The average tuition and fees at private, nonprofit law schools in 2010 was $34,656 per year.  At public universities, in-state students paid $19,912 yearly on average in tuition and fees, and out-of-state students paid $32,247 per year. And unlike enrollments or degree completions, law school tuition is on a steady upward path. (see Figure 3)

It’s difficult to locate the cause of this steep rise in tuition. Though some have claimed that stringent accreditation requirements drive price, a 2009 GAO study showed that this assumption is incorrect. That report identified a few drivers of tuition based on interviews with law school officials, including a more hands-on approach to legal education that includes pricey clinical experiences and smaller class sizes.

Other changes to the legal education model may also drive tuition, including greater diversity of course offerings and increased academic support and career services for students, as well as higher faculty salaries, competition for higher rankings, and state disinvestment at public law schools. And of course, many of these changes are driven by increased competition among law schools, which in itself can be considered a driver of tuition.

Some other findings:

Law students have more debt on average than almost all other graduate students, excepting only medical students. And more law students borrow to pay for their education than all other graduate students. . . .

It’s difficult to get a complete picture of defaults at law schools, as the Department of Education collects and publishes default rates for institutions as a whole rather than by division or professional school. But since some law schools operate as standalone institutions, we can get some idea of how law grads fare. Of these standalone institutions, the average default rate is only 2.6 percent.

2

Do Computer “Unlawful Access” Laws Exempt Improperly Accessing a Spouse’s Account?

Short answer: No.  This case got considerable media attention and outrage when it was first reported.  A man accessed his wife’s email without her consent.  They were separated.  He was charged with violating the Michigan’s computer unlawful access law, MCL 752.795, which is similar to the federal Computer Fraud and Abuse Act (CFAA).  Now a court of appeals has rejected the spouse’s argument.  From the Detroit Free Press:

A Rochester Hills man charged with a 5-year felony for reading his wife’s e-mail pledged today to take the matter to the state’s highest court after a lower court refused to dismiss the charge.

In a written opinion released this morning, the Michigan Court of Appeals rule that Leon Walker should proceed to trial on charges that he gained unlawful access to his then-wife Clara Walker’s Gmail account in the summer of 2009.

His 2010 arrest prompted widespread outrage and a national debate about computer privacy in the marital home. But in today’s decision, the three-member appellate panel said Michigan’s computer hacking law has “no spousal exception,” and the law as written applies to Walker’s case. The judges also noted discussions in Michigan’s legislature to amend the law to exclude spouses.

“However, unless and until such legislation occurs, this court is left with the statute as written,” the court said.

The opinion is here.  From the opinion:

Second, there was evidence that defendant acted without authorization when he accessed his estranged wife’s Gmail account. Defendant’s wife testified that her Gmail account was a personal account and that she never shared her passwords for the account with defendant or granted him permission to access the account. Further, she allowed defendant to use her computer only when it needed a repair. Defendant admitted to the police that he accessed his wife’s Gmail account by guessing her password. These facts support a reasonable inference that defendant lacked authorization for his access of his wife’s Gmail account.

It seems to me that spouses should not be given special exemptions to hack into each other’s accounts.  Breaking into one’s private accounts is a violation no matter who does it.  Even spouses are entitled to have private accounts and things, and the law should protect them.

0

More Titles from Oxford University Press — 2011

OUPHere are even more new titles from Oxford University Press. If you’re interested in reviewing a book, please let me know and tell me a bit about your background. If I select you as a reviewer for the book, Oxford University Press will send you a free review copy.

 

Dan Hunter The Oxford Introductions to U.S. Law: Intellectual Property, 1st ed.

 

Matthew Adler Well-Being and Fair Distribution: Beyond Cost-Benefit Analysis

 

Adrian Vermeule The System of the Constitution

 

Professor Erin Ryan Federalism and the Tug of War Within

 

Stephen M. Bainbridge Corporate Governance after the Financial Crisis

 

Kathryn Christopher and Russell Christopher Criminal Law: Model Problems and Outstanding Answers, 1st ed.

 

Edward McCaffery The Oxford Introductions to U.S. Law: Income Tax Law, 1st ed.

 

Christina Bohannan and Herbert Hovenkamp Creation without Restraint: Promoting Liberty and Rivalry in Innovation

 

Edited by Paul H. Robinson, Stephen Garvey, and Kimberly Kessler Ferzan Criminal Law Conversations

 

 

Richard Hyland Gifts: A Study in Comparative Law

 

E. Norman Veasey and Christine T. Di Guglielmo Indispensable Counsel: The Chief Legal Officer in the New Reality

 

0

New Titles from Oxford University Press

OUPHere are some new titles from Oxford University Press.  If you’re interested in reviewing a book, please let me know and tell me a bit about your background.  If I select you as a reviewer for the book, Oxford University Press will send you a free review copy.

 

Stephanos Bibas The Machinery of Criminal Justice

 

William Patry How to Fix Copyright

 

Eric A. Posner and Adrian Vermeule The Executive Unbound: After the Madisonian Republic

 

Deborah L. Rhode The Beauty Bias: The Injustice of Appearance in Life and Law

 

Rainer Grote and Tilmann Roder Constitutionalism in Islamic Countries: Between Upheaval and Continuity

 

Jennifer Nedelsky Law’s Relations: A Relational Theory of Self, Autonomy, and Law

 

Professor Brad R. Roth Sovereign Equality and Moral Disagreement

 

Ruti G. Teitel Humanity’s Law

 

Fionnuala Ni Aolain, Dina Francesca Haynes, and Naomi Cahn On the Frontlines: Gender, War, and the Post-Conflict Process
Camilla E. Watson Federal Income Taxation: Model Problems and Outstanding Answers

 

Stephen Pevar The Rights of Indians and Tribes, 4th ed.

 

Julian Ku and John Yoo Taming Globalization: International Law, the U.S. Constitution, and the New World Order

 

Michael J. Gerhardt The Power of Precedent

 

Tai-Heng Cheng When International Law Works: Realistic Idealism After 9/11 and the Global Recession

 

2

FTC v. Santa

Jeff Jarvis has this humorous piece about the FTC vs. Santa:

Federal Trade Commission Chairman Jon Leibowitz today announced a record fine against Santa Claus for violations of the Children’s Online Privacy Protection Act.

“Mr. Claus has flagrantly violated children’s privacy, collecting their consumer preferences for toys and also tracking their behavior so as to judge and maintain a data base of naughtiness and niceness,” Leibowitz said. “Worse, he has tied this data to personally identifiable information, including any child’s name, address, and age. He has solicited this information online, in some cases passing data to third parties so they may fulfill children’s wishes. According to unconfirmed reports, he has gone so far as to invade children’s homes in the dead of night. He has done this on a broad scale, unchallenged by government authorities for too long.”

I also heard that DHS has called for the arrest of Santa for flying over restricted airspace.  The FBI is seeking his records about those who are naughty.  The TSA is upset that he bypassed security screening.  Meanwhile, his reindeer are being charged with cyberbullying Rudolf.  And he’s in trouble with the NLRB for his restrictive social media policy forbidding his elves from blogging about their low pay and inability to unionize. . . .