Books
- Social Physics: How Good Ideas Spread—The Lessons from a New Science, by Alex Pentland The Penguin Press 2014
- Understanding Privacy, by Daniel J. Solove Harvard University Press 2008
- Free Culture: How Big Media Uses Technology and the Law to Lock Down Culture and Control Creativity, by Lawrence Lessig, 2004
- IBM and the Holocaust: The Strategic Alliance Between Nazi Germany and America’s Most Powerful Corporation, by Edwin Black Crown 2000
- Privacy and Freedom, by Alan Westin, 1976
Research
- Reasoning over Public and Private Data in Retrieval-Based Systems, Human-Centred AI (Stanford University) 2022
- The past, present, and future of digital privacy for youth and children: Part II, UofT Schwartz Reisman Institute May 12, 2021
- Digital Crime Scenes: The Role of Digital Evidence in the Persecution of LGBTQ People in Egypt, Lebanon, and Tunisia, Berkman Klein Center for Internet and Society March 7, 2022
- The past, present, and future of digital privacy for youth and children: Part I, UofT Schwartz Reisman Institute May 11, 2021
- Canada’s Proposed Privacy Law Reforms Are Not Enough: A Path to Improving Organizational Transparency and Accountability, The Citizen Lab April 2021
- A Duty of Loyalty for Privacy Law, The Center for Internet and Society October 2020
- Green Lighting ML: Confidentiality, Integrity, and Availability of Machine Learning Systems in Deployment, Montreal AI Ethics Lab 2020
- Privacy’s Constitutional Moment and the Limits of Data Protection, The Center for Internet and Society November 20, 2019
- Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security, The Center for Internet and Society July 21, 2018
- Differential Privacy: A Primer for a non-technical audience, Berkman Klein Center for Internet and Society November 1, 2018
- Is Privacy Privacy? Berkman Klein Center for Internet and Society October 18, 2018
- Privacy’s Constitutional Moment and the Limits of Data Protection, Stanford University November 20, 2019
- Estimating the Success of Re-identifications from Incomplete Data in Generative Models, Nature Communications July 23, 2019
- How DNS over HTTPS is Reshaping Privacy, Performance, and Policy in the Internet Ecosystem, Princeton University, July 2019
- Disaster Privacy/Privacy Disaster, Princeton University, July 2019
- The Dawn of Robot Surveillance: AI, Video Analytics, and Privacy, American Civil Liberties Union, 2019
- Security and Privacy for Implantable Medical Devices, Pervasive Computing January–March 2018
- Privacy Law’s False Promise, Princeton University February 2019
- SoK: Security and Privacy in Machine Learning, Center for Human Compatible Artificial Intelligence 2018
- Information Security: Control Deficiencies Continue to Limit IRS’s Effectiveness in Protecting Sensitive Financial and Taxpayer Data, US Government Accountability Office July 26, 2017
- Vehicle Data Privacy: Industry and Federal Efforts Under Way, but NHTSA Needs to Define Its Role, US Government Accountability Office July 2017
- National ID and the REAL ID Act, Electronic Privacy Information Center 2017
- Privacy and Fair Information Practices in Ubiquitous Environments: Research Challenges and Future Directions, Internet Research 2009
- Reality Mining: The End of Personal Privacy? Human Dynamics Group, MIT Media Lab 2009
- RFID and Privacy: What Consumers Really Want and Fear, Personal and Ubiquitous Computing 2009
- Data Mining and Internet Profiling: Emerging Regulatory and Technological Approaches, The University of Chicago Law Review 2008
- Data Mining and the Fourth Amendment, The University of Chicago Law Review 2008
- A Taxonomy of Privacy, University of Pennsylvania Law Review 2006
- Keeping Ubiquitous Computing to Yourself: A Practical Model for User Control of Privacy, International Journal of Human–Computer Studies 2005
- The Right to Privacy and the Birth of the Right to Privacy, Tennessee Law Review 2002
- The Ever-Expanding Network of Local and Federal Databases, CACM 2002
- Privacy and Power: Computer Databases and Metaphors for Information Privacy, Stanford Law Review 2001
- Identity Theft, Social Security Numbers, and the Web, CACM 2000
- Information about Individuals in the Hands of Government: Some Reflections on Mechanisms for Privacy Protection, William & Mary Bill Rights Journal 1995
- Locating the Victim: An Overview of Census-Taking. Tabulation Technology, and Persecution in Nazi Germany, IEEE Annals of the History of Computing 1994
- The Active Badge Location System, ACM Transactions on Information Systems 1992
- Data Quality and Due Process in Large Interorganizational Record Systems, CACM 1986
- In the Shadow of 1984: National Identification Systems, Computer-Matching, and Privacy in the United States, Hastings Law Journal 1984
- Privacy and Freedom, Atheneum 1967
- The Right to Privacy, Harvard Law Review 1890
Law Review Articles
- Personalized Smart Guns: A Futuristic Dream or a Pragmatic Solution? Duke Law & Technology Review 2022
- On the Propertization of Data and the Harmonization Imperative, Fordham Law Review 2022
- United States v. Wilson, Harvard Law Review 2022
- Losing Dignity: Eroding Privacy Rights of Immigrants in Technology-based Immigration Enforcement, University of Cincinnati Intellectual Property and Computer Law Journal 2022
- Sharing More Than You Thought: Facebook Cannot Assert the Party Exception to Avoid Liability Under the Wiretap Act, Boston College Law Review 2021
- From the Golden Gate to London: Bridging the Gap Between Data Privacy and the Right of Publicity, Brooklyn Journal of International Law 2021
- Your Voice Gave You Away: the Privacy Risks of Voice-Inferred Information, Duke Law Journal 2021
- A Deep Dive into Technical Encryption Concepts to Better Understand Cybersecurity & Data Privacy Legal & Policy Issues, Georgia Journal of International and Comparative Law 2021
- Privacy as Privilege: The Stored Communications Act and Internet Evidence, Harvard Law Review 2021
- Privacy vs. Transparency: Handling Protected Materials in Agency Rulemaking, Indiana Law Journal 2021
- The global governance on automated facial recognition (AFR): ethical and legal opportunities and privacy challenges, International Cybersecurity Law Review 2021
- Data as Public Goods or Private Properties?: A Way Out of Conflict Between Data Protection and Free Speech, UC Irvine Journal of International, Transnational, and Comparative Law 2021
- Defending Face-Recognition Technology (And Defending Against It), Journal of Technology Law and Policy (Levin College of Law at University of Florida) 2021
- Handle with Care: Domestic Violence Safety Planning in the Age of Data Privacy Laws, Seattle Journal of Technology, Environmental, and Innovation Law 2021
- Personal Data Privacy and Protective Federal Legislation: An Exploration of Constituent Position on the Need for Legislation to Control Data Reliant Organizations Collecting and Monetizing Internet-Obtained Personal Data, University of San Diego 2021
- Reflections on the use of facial recognition technology during COVID-19, Yong Pung How School of Law 2021
- Opting Out: Biometric Information Privacy and Standing, Duke Law & Technology Review 2020
- The Danger of Facial Recognition in Our Children’s Classrooms, Duke Law & Technology Review 2020
- Coronavirus: Pandemics, artificial intelligence and personal data: How to manage pandemics using AI and what that means for personal data protection, Yong Pung How School of Law 2020
- Digital Colonialism: The 21st Century Scramble for Africa through the Extraction and Control of User Data and the Limitations of Data Protection Laws, Michigan Journal of Race and Law 2019
- Legal Access To The Global Cloud, Columbia Law Review November 1, 2018
- The Promise and Perils of Algorithmic Lenders’ Use of Big Data, Chicago-Kent Law Review 2018
- Data Privacy and Dignitary Privacy: Google Spain, the Right To Be Forgotten, and the Construction of the Public Sphere, Duke Law Journal 2018
- Ajemian v. Yahoo!, Inc. Harvard Law Review 2018
- Cooperation or Resistance?: The Role of Tech Companies in Government Surveillance, Harvard Law Review 2018
- Robotics and the Lessons of Cyberlaw, California Law Review 2015
- As If All the World Were Watching: Why Today’s Law Enforcement Needs to Be Wearing Body Cameras, University of Illinois Law Review Online Journal 2015
- Regulating Privacy by Design, Berkeley Technology Law Journal 2011
- Mainstreaming Privacy Torts, California Law Review 2010
- Lifelogging, Memory, and Surveillance, The University of Chicago Law Review 2008
- A Taxonomy of Privacy, University of Pennsylvania Law Review 2006
- Brandeis and Warren’s The Right to Privacy and the Birth of the Right to Privacy, Tennessee Law Review 2002
- Privacy and Power: Computer Databases and Metaphors for Information Privacy, Stanford Law Review 2001
- The Death of Privacy? Stanford Law Review 2000
- Lost and Found in Cyberspace: Informational Privacy in the Age of the Internet, San Diego Law Review 1997
- In the Shadow of 1984: National Identification Systems, Computer Matching, and Privacy in the United States, Hastings Law Journal 1984
- The Right to Privacy, Harvard Journal of Law and Technology 1890
Laws
- Fair Credit Reporting Act (FCRA) United States, 2022 – Text; Additional link; Wikipedia
- Minnesota Stat. § 13.15, United States, Minnesota, 2022 – Text
- Family Educational Rights and Privacy Act (FERPA), United States, 2021 – Text
- National Conference of State Legislatures, United States, 2021 – Text
- Personal Information Protection Law, China, 2021 – Text
- Arkansas Code § 25-1-114, United States, Arkansas, 2020 – Text
- General Data Protection Law, Brazil, 2020 – Text
- Texas Govt. Code Ann. § 10-2054.126, United States, Texas, 2019 – Text
- California Consumer Privacy Act CCPA, United States, California, 2018 – Text; Wikipedia
- Digital Code, Benin Republic, 2018 – Text
- General Data Protection Regulation (GDPR), European Union, 2018 – Text; Wikipedia
- Illinois Rev. Stat. ch. 5 § 177/15, United States, Illinois, 2017 – Text
- Law On Personal Data Protection, Armenia, 2015 – Text
- Delaware Code tit. 29 § 9017C et seq., United States, Delaware, 2014 – Text
- Law 1581/2012*, Colombia, 2012 – Text
- Australian Privacy Principles (included in Privacy Act), Australia, 2012 – Text
- Law 1266/2008, Colombia, 2008 – Text
- South Carolina Code Ann. § 30-2-40, United States, South Carolina, 2008 – Text
- Communications Assistance for Law Enforcement Act (CALEA), United States, 2005 – Text; Wikipedia
- Maryland Gen. Prov. Code § 4-501, United States, Maryland, 2005 – Text
- HIPPA Privacy Rule, 2000 – Text
- Personal Data Protection Act, Argentina, 2000 – Text
- Personal Information Protection and Electronic Documents Act, Canada, 2000 – Text
- Privacy Act 1988, Australia, 1988 – Text
- Australian Privacy Principles Guidelines, Australia, 1988 – Text
- Electronic Communications Privacy Act (ECPA), United States, 1986 – Text; Wikipedia
- Privacy Act of 1974, United States, 1974 – Text; Alternative link; Wikipedia
- Iowa Code § 22.11, United States, Iowa, 1851 – Text
Essays/Blogs
- The Statecraft of DigitalIDs: An Annotated Bibliography, Data Society November 30, 2021
- Why Online Anonymity Matters, Belfer Center November 10, 2021
- The Corporate Cultivation of Digital Resignation, TechPolicy March 2019
- Every Step You Fake: A Comparative Analysis of Fitness Tracker Privacy and Security, The Citizen Lab February 2, 2016
- Lessons from the Stasi, The European Magazine April 1, 2015
- IRS Agents Caught Snooping on Taxpayer Data Rehired, Americans for Tax Reform February 6, 2015
- A Phone for the Age of Snowden, The New Yorker January 30, 2014
- No, the NSA Isn’t Like the Stasi—and Comparing Them is Treacherous, Wired January 14, 2014
- Identity Crisis: How Social Security Numbers Became Our Insecure National ID, The Verge September 26, 2012
- ‘Don’t trust anyone’: Privacy Protection for Location-based Services, Pervasive and Mobile Computing 2011
- Five IRS Employees Charged with Snooping on Tax Returns, Wired May 13, 2008
- Centers Tap Into Personal Databases, The Washington Post April 2, 2008
- Bureau Gave Up Names of Japanese-Americans in WWII, Scientific American March 30, 2007
- The Computer for the 21st Century, Scientific American September 1991
News
- C.I.A. Is Collecting in Bulk Certain Data Affecting Americans, Senators Warn, NYTimes February 10, 2022
- China passes new personal data privacy law, to take effect Nov. 1, Reuters August 20, 2021
- New York City’s Vaccine Passport Plan Renews Online Privacy Debate, NY Times August 4, 2021
- Fugitive Italian Killer Finally Meets His Match: Google Maps, NYTimes January 7, 2021
- How My Boss Monitors Me While I Work from Home, NYTimes May 6, 2020
- Managers Turn to Surveillance Software, Always-On Webcams to Ensure Employees Are (Really) Working From Home, The Washington Post April 30, 2020
- Your Doorbell Camera Spied On You, Now What? NYTimes February 19, 2020
- Uh-oh, Silicon Valley is Building a Chinese-style Social Credit System, Fast Company August 26, 2019
- I Shared My Phone Number, I Learned I Shouldn’t Have, NYTimes August 15, 2019
- Your Data Were ‘Anonymized’? These Scientists Can Still Identify You, NYTimes July 23, 2019
- U.S. Requiring Social Media Information From VISA Applicants, NYTimes June 2, 2019
- Made in China, Exported to the World: The Surveillance State, NYTimes April 24, 2019
- Stores See a Future Without ‘May I Help You?’ (They’ll Already Have Your Data), NYTimes March 10, 2019
- China Uses DNA to Track Its People, With the Help of American Expertise, NYTimes February 21, 2019
- It’s Not Just Google or Facebook: The Freezer Aisle is Ad Targeting Now, Fast Company February 6, 2019
- In High-Tech Cities, No More Potholes, but What About Privacy? NYTimes January 1, 2019
- ‘Black Mirror’ in China: 1,4 Billion Citizens to be Monitored through Social Credit System, Newsweek May 1, 2018
- Find Out How to Keep Tabs on Your Phone with These Helpful Tracking Tips, Digital Trends March 28, 2018
- A New Border Security App Uses AI to Flag Suspicious People in Seconds, Fast Company March 6, 2018
- Homeland Security Given Data on Arab-Americans, NYTimes July 30, 2004
- The Punch-Card Conspiracy: A Journalist Explores Relations between I.B.M, and the Third Reich, NYTimes March 18, 2001
Websites
- Global Positioning System, Wikipedia
- Government Database, Wikipedia
- National Identification Number, Wikipedia
- Nosedive, Wikipedia
- Radio Frequency Identification, Wikipedia
- Stasi Records Agency, Wikipedia
- Everyone In China Is Getting A ‘Social Credit Score’, YouTube May 8, 2018