Privacy: The Collection, Use, and Computerization of Personal Data : Joint Hearings Before the Ad Hoc Subcommittee on Privacy and Information Systems of the Committee on Government Operations and the Subcommittee on Constitutional Rights of the Committee on the Judiciary, United States Senate, Ninety-third Congress, Second Session on S. 3418, S. 3633, S. 3116, S. 2810, S. 2542, June 18, 19, and 20, 1974, Part 2U.S. Government Printing Office, 1974 - 337 pages |
From inside the book
Results 1-5 of 100
Page 1350
... involved in any incident subsequently except a few minor traffic violations . He served 11 years in the armed ... involvement in the way computers are used . 29. Letter , identity withheld , in Subcommittee files with comment by the ...
... involved in any incident subsequently except a few minor traffic violations . He served 11 years in the armed ... involvement in the way computers are used . 29. Letter , identity withheld , in Subcommittee files with comment by the ...
Page 1354
... involved a man in political life , the mayor of San Francisco , who was the subject of an article in Look Magazine purporting to establish that he associated with persons involved in organized crime . When the Mayor sued the magazine ...
... involved a man in political life , the mayor of San Francisco , who was the subject of an article in Look Magazine purporting to establish that he associated with persons involved in organized crime . When the Mayor sued the magazine ...
Page 1382
... involved in a news event is itself relevant to the purposes of self - government , as when the person holds public office or a place in the public eye.39 But in many cases , the identification of the subject of a published news item is ...
... involved in a news event is itself relevant to the purposes of self - government , as when the person holds public office or a place in the public eye.39 But in many cases , the identification of the subject of a published news item is ...
Page 1384
... involved , was only de- scriptive ; it offered no justification for the different types of recovery . And though his categories have been widely influential , critics have complained that his most original category - the public ...
... involved , was only de- scriptive ; it offered no justification for the different types of recovery . And though his categories have been widely influential , critics have complained that his most original category - the public ...
Page 1406
... testified that , " under present law , [ wire tapping ] should be permitted only where national security is involved " and acknowledged that the department had 62 wiretaps then 1971 ] PRIVACY AND THE COMPUTER 851 The practice of 1406.
... testified that , " under present law , [ wire tapping ] should be permitted only where national security is involved " and acknowledged that the department had 62 wiretaps then 1971 ] PRIVACY AND THE COMPUTER 851 The practice of 1406.
Contents
1737 | |
1820 | |
1912 | |
1930 | |
1974 | |
1991 | |
1994 | |
2002 | |
1603 | |
1610 | |
1613 | |
1624 | |
1650 | |
1666 | |
1677 | |
1684 | |
1690 | |
1705 | |
1717 | |
2030 | |
2058 | |
2093 | |
2102 | |
2116 | |
2125 | |
2222 | |
2266 | |
2272 | |
2284 | |
2287 | |
Other editions - View all
Common terms and phrases
action activities administrative amendment American application arrest records Attorney authorized automatic data processing bill Census citizens civil collection Committee communication compilers computerized concern confidential Cong Congress Congressional consumer reporting consumer reporting agency Credit Bureau Hearings Credit Reporting Act criminal offender record data banks decision disclosure dissemination dossiers Dun & Bradstreet EMORY LAW SCHOOL employee Ervin Fair Credit Reporting Federal agencies files fourth amendment governmental identify individual privacy individual's information systems interception Internal Revenue Service invasion of privacy investigation issue law enforcement legislation maintained ment October 26 offender record information Office operation organization personal data personal information political President problem procedures protect purpose regulation reporting agency request Retail Credit right to privacy Secretary Service Stat statute Subcommittee supra note surveillance tax returns tion U.S. Senate United violation wiretapping
Popular passages
Page 1518 - ... (6) personnel and medical files and similar files the disclosure of which would constitute a clearly unwarranted invasion of personal privacy ; (7) Investigatory files compiled for law enforcement purposes except to the extent available by law to a party other than an agency...
Page 1584 - To redress the deprivation, under color of any State law, statute, ordinance, regulation, custom or usage, of any right, privilege or immunity secured by the Constitution of the United States...
Page 1533 - States courts of any Territory or other place subject to the jurisdiction of the United States, to enjoin such acts or practices, and upon a proper showing a permanent or temporary injunction or restraining order shall be granted without bond.
Page 1517 - ... (B) statements of the general course and method by which its functions are channeled and determined, including the nature and requirements of all formal and informal procedures available; (C) rules of procedure, descriptions of forms available or the places at which forms may be obtained and instructions as to the scope and contents of all papers, reports, or examinations; (D) substantive rules of general applicability adopted as authorized by law, and statements of general policy or interpretations...
Page 1520 - Subject to published rules of the agency and within its powers, employees presiding at hearings may — (1) administer oaths and affirmations; (2) issue subpenas authorized by law; (3) rule on offers of proof and receive relevant evidence; (4) take depositions or have depositions taken when the ends of justice would be served...
Page 2004 - Experience should teach us to be most on our guard to protect liberty when the Government's purposes are beneficent. Men born to freedom are naturally alert to repel invasion of their liberty by evil-minded rulers. The greatest dangers to liberty lurk in insidious encroachment by men of zeal, well-meaning but without understanding.
Page 1520 - Every party shall have the right to present his case or defense by oral or documentary evidence, to submit rebuttal evidence, and to conduct such cross-examination as may be required for a full and true disclosure of the facts.
Page 1573 - Every person who having been summoned as a witness by the authority of either House of Congress to give testimony or to produce papers upon any matter under inquiry before either House...
Page 1780 - It is cardinal with us that the custody, care and nurture of the child reside first in the parents, whose primary function and freedom include preparation for obligations the state can neither supply nor hinder.
Page 1779 - Under the doctrine of Meyer v. Nebraska, 262 US 390, we think it entirely plain that the Act of 1922 unreasonably interferes with the liberty of parents and guardians to direct the upbringing and education of children under their control.