Why Is Privacy an Issue?What Is Privacy?How Is Privacy Different from Information Security?What Are the Sources of Privacy Law?Constitutional LawFederal LawsCensus Confidentiality (1952)Freedom of Information Act (1966)Wiretap Act (1968, amended)Mail Privacy Statute (1971)Privacy Act (1974)Cable Communications Policy Act (1984)Electronic Communications Privacy Act (1986)Driver's Privacy Protection Act (1994)E-Government Act (2002)State LawsCommon LawsIntrusion into SeclusionPortrayal in a False LightAppropriation of Likeness or IdentityPublic Disclosure of Private FactsVoluntary AgreementsWhat Are Threats to Personal Data Privacy in the Information Age?Technology-Based Privacy ConcernsSpyware, Keystroke Loggers, and AdwareCookies, Web Beacons, and ClickstreamsRFID and GPS TechnologiesSecurity BreachesPeople-Based Privacy ConcernsPhishingSocial Engineering, Shoulder Surfing, and Dumpster DivingSocial Networking SitesInformation SharingSecurityOnline Data GatheringWhat Is Workplace Privacy?Telephone and Voice Mail MonitoringVideo Surveillance MonitoringComputer Use MonitoringE-mail MonitoringPublic EmployeesWhat Are General Principles for Privacy Protection in Information Systems?Privacy Policies and Data Privacy LawsCHAPTER SUMMARYKEY CONCEPTS AND TERMSCHAPTER 2 ASSESSMENTENDNOTES