Reconsidering Constitutional Protection for Health Information Privacy

نویسنده

  • Wendy K. Mariner
چکیده

Wendy K. Mariner ∗ TABLE OF CONTENTS INTRODUCTION ............................................................................. 976 I. FRAMING THE QUESTIONS......................................................... 979 II. USES OF HEALTH INFORMATION ........................................... 986 A. Clinical Medical Care, Payment for Services, and Health Care Operations ........................................................... 987 B. State Databases .............................................................. 988 C. Public Health Surveillance .............................................. 991 D. Research ....................................................................... 993 III. THE FOURTH AMENDMENT AND THE THIRD-PARTY DOCTRINE ............................................................................. 995 A. The Third-Party Doctrine and Continuous Reporting ........... 998 B. Third-Party Doctrine Rationales ..................................... 1005 IV. ADMINISTRATIVE SEARCHES .................................................. 1015 V. SPECIAL NEEDS ....................................................................... 1022 VI. THE FIFTH AND FOURTEENTH AMENDMENTS ...................... 1031 VII. TOWARD A MORE NUANCED VIEW OF REPORTING LAWS .... 1038 CONCLUSION ............................................................................... 1052

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks

The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...

متن کامل

What to Expect When You’re Expecting: Fetal Protection Laws that Strip Away the Constitutional Rights of Pregnant Women

Many states have enacted fetal protection laws as a way of promoting fetal health and combatting the problem of in utero fetal drug abuse. These laws, however, unduly compromise the constitutional rights of pregnant women, implicating a woman’s rights to privacy, due process, and equal protection under the laws. Additionally, such laws compromise both maternal health and fetal health by discour...

متن کامل

Analysis and Evaluation of Privacy Protection Behavior and Information Disclosure Concerns in Online Social Networks

Online Social Networks (OSN) becomes the largest infrastructure for social interactions like: making relationship, sharing personal experiences and service delivery. Nowadays social networks have been widely welcomed by people. Most of the researches about managing privacy protection within social networks sites (SNS), observes users as owner of their information. However, individuals cannot co...

متن کامل

Children and Their Digital Dossiers:lessons in Privacyrights in the Digitalage

The right to privacy is a firmly entrenched democratic principle that has been inferred in the U.S. Constitution and protected by the Fourteenth Amendment as a liberty of personal autonomy.I Although the Constitution does not include language that explicitly details privacy protections, since the 1800s justices have interpreted the text as promoting the "right to be left alone."2 Evidence of co...

متن کامل

An Architecture for Security and Protection of Big Data

The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016