TITLE

Social Data

AUTHOR(S)
HARTZOG, WOODROW
PUB. DATE
November 2013
SOURCE
Ohio State Law Journal;2013, Vol. 74 Issue 6, p995
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
As online social media grow, it is increasingly important to distinguish between the different threats to privacy that arise from the conversion of our social interactions into data. One well-recognized threat is from the robust concentrations of electronic information aggregated into colossal databases. Yet much of this same information is also consumed socially and dispersed through a user interface to hundreds, if not thousands, of peer users. In order to distinguish relationally shared information from the threat of the electronic database, this essay identifies the massive amounts of personal information shared via the user interface of social technologies as "social data. " The main thesis of this essay is that, unlike electronic databases, which are the focus of the Fair Information Practice Principles (FIPPs), there are no commonly accepted principles to guide the recent explosion of voluntarily adopted practices, industry codes, and laws that address social data. This essay aims to remedy that by proposing three social data principles--a sort of FIPPs for the front-end of social media: the Boundary Regulation Principle, the Identity Integrity Principle, and the Network Integrity Principle. These principles can help courts, policymakers, and organizations create more consistent and effective rules regarding the use of social data.
ACCESSION #
93394618

 

Related Articles

  • With "Friends" Like These, Who Needs Enemies? Passwords, Privacy, and the Discovery of Social Media Content. Browning, John G. // American Journal of Trial Advocacy;Spring2013, Vol. 36 Issue 3, p505 

    The emergence of social media has expanded the bounds of discovery and the information sought by parties. Yet there is no unanimity in opinion among the courts when determining whether to compel production of a party's social media login and password credentials. This Article examines the...

  • Cyber Threat Information Sharing Bill Advances. Wilhelm, Colin // American Banker;3/30/2015, Vol. 180 Issue 47, p1 

    The article reports on the House Permanent Select Committee on Intelligence's passage of the Cybersecurity Information Sharing Act on March 26, 2015 by voice vote. The bill, HR 1560, would allow private companies to share cyber threat information. Topics discussed include what the current...

  • PRIVATE MATTERS. Moscaritolo, Angela // SC Magazine: For IT Security Professionals (15476693);Jan2011, Vol. 22 Issue 1, p24 

    The article reports on proposed legislations to prevent the breach of data security and protect the privacy of citizens in the U.S. The 2010 Best Practices Act of Representative Bobby Rush places restrictions on the collection, dissemination and use of information. A bill proposed by...

  • Protecting Privacy in an Era of Weakening Regulation. Brookman, Justin // Harvard Law & Policy Review;2015, Vol. 9 Issue 2, p355 

    The article explores the state of privacy law in the U.S. and discusses how its substantive protections are weaker than in other countries. Topics discussed inculde failure of efforts of the government to improve privacy law in the country, consumer concern about commercial data collection, and...

  • INSTITUTIONALLY APPROPRIATE APPROACHES TO PRIVACY: STRIKING A BALANCE BETWEEN JUDICIAL AND ADMINISTRATIVE ENFORCEMENT OF PRIVACY LAW.  // Harvard Journal on Legislation;2014, Vol. 51 Issue 1, p193 

    The article discusses how a balance between judicial and administrative enforcement of law can be created in the U.S. with regard to privacy and describes the privacy torts at common law in the U.S. It reflects that the enforcement authority should be distributed between the U.S. courts and the...

  • Heavily Regulated Insurers, Producers Face Additional Risks When Using Social Media Sites. Fidei, Richard J.; Siska, Erin T. // National Underwriter / P&C;8/27/2012, Vol. 116 Issue 27, p24 

    The article focuses on the authors' thoughts about the implementation of a social-media policy to protect insurers and producers from social media risks in the U.S. The authors mention the federal and state laws such as the Gramm-Leach-Bliley Act and the Health Insurance Portability and...

  • A CALL FOR UNCLE SAM TO GET BIG BROTHER OUT OF OUR KNICKERS: PROTECTING PRIVACY AND FREEDOM OF SPEECH INTERESTS IN SOCIAL MEDIA ACCOUNTS. Poore, Michelle // Northern Kentucky Law Review;2013, Vol. 40 Issue 3, p507 

    The article focuses on the call for protection of freedom of speech and privacy interests in social media accounts in the U.S. It discusses the intrusion of academic institutions and private and public employees on privately held social media accounts. It explains the potential of intrusion to...

  • Regulating at the End of Privacy. Boyden, Bruce E. // University of Chicago Legal Forum;2013, p173 

    The article discusses developments made in the regulation of privacy and the obstacles to accurate assessment of privacy threats in light of changing social media norms in the U.S. It describes the features of privacy that leads to privacy crises and highlights the historical changes in social...

  • The USA PATRIOT Act. Lucas, Teresa // Idaho Librarian;Spring2012, Vol. 62 Issue 1, p24 

    The article discusses the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act known as the USA PATRIOT Act (USAPA). The legislation was developed to increase national security in the U.S. The various provisions of the USA PATRIOT Act...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics