WorldCat Identities

Stevens, Gina Marie

Overview
Works: 35 works in 87 publications in 1 language and 786 library holdings
Classifications: JK1108, 342.730858
Publication Timeline
Key
Publications about  Gina Marie Stevens Publications about Gina Marie Stevens
Publications by  Gina Marie Stevens Publications by Gina Marie Stevens
Most widely held works by Gina Marie Stevens
Privacy : wiretapping and electronic eavesdropping by Gina Marie Stevens ( Book )
3 editions published in 2002 in English and held by 179 WorldCat member libraries worldwide
A brief summary of the medical privacy rule by Gina Marie Stevens ( Book )
7 editions published between 2002 and 2003 in English and held by 80 WorldCat member libraries worldwide
Privacy : total information awareness programs and latest developments by Gina Marie Stevens ( Book )
1 edition published in 2003 in English and held by 73 WorldCat member libraries worldwide
Online privacy protection issues and developments by Gina Marie Stevens ( Book )
5 editions published between 1999 and 2001 in English and held by 64 WorldCat member libraries worldwide
It is routinely acknowledged that the success of the Internet and electronic commerce depends upon the resolution of issues related to the privacy of online personal information. This paper discusses some potential threats to the privacy of online personal information, and efforts by businesses, governments, and citizens to respond to them. The paper also provides an overview of the legal framework for the protection of personal information. The Constitution protects the privacy of personal information in a limited number of ways, and extends only to the protection of the individual against government intrusions. Any limitations placed on the data processing activities of the private sector will be found not in the Constitution but in federal or state law. With the exception of the Children's Online Privacy Protection Act of 1998, none of these laws specifically covers the collection of online personal information. The Commission issued a report to Congress in July 1999 on Self-Regulation and Online Privacy and found that the vast majority of the sites surveyed collect personal information from consumers online, and that the implementation of fair information practices is not widespread. The FTC issued a new report in May 2000 after another survey of web sites. Notwithstanding measurable gains since the 1999 report to Congress, a majority of the Commission found that self-regulation alone, without some legislation, is unlikely to provide online consumers with the level of protection they seek and deserve, and recommended that Congress consider legislation to complement self-regulation
Critical infrastructure information disclosure and homeland security by John D Moteff ( Book )
6 editions published between 2002 and 2003 in English and held by 56 WorldCat member libraries worldwide
One of the findings of the President's Commission on Critical Infrastructure Protection, established by President Clinton in 1996, was the need for the federal government and owners and operators of the nation's critical infrastructures to share information on vulnerabilities and threats. Among the strategies to help owners and operators share information with the federal government was a proposal to exempt the information they share from disclosure under the Freedom of Information Act (FOIA). Three of the nine exemptions provide possible protection against the release of critical infrastructure information: exemption 1 (national security information); exemption 3 (information exempted by statute); and exemption 4 (confidential business information). Public interest groups argue that the language in the House bill is far too broad and would allow a wide range of information to be protected from disclosure (including information previously available under FOIA), and that existing FOIA exemptions and case law provide sufficient protections
Data security federal legislative approaches by Gina Marie Stevens ( Book )
9 editions published between 2006 and 2008 in English and held by 38 WorldCat member libraries worldwide
Numerous data security bills were introduced in the first session of the 109th Congress to address data security breaches; some of these bills preempt and sometimes limit recently enacted state laws. Three congressional hearings were held in 2005 to examine issues related to data breaches. Three bills were reported by Senate committees during the first session of the 109th Congress. The prospect for continued congressional attention is high during the second session of the 109th Congress, with eight congressional committees having jurisdiction over some aspect of data security, data breach notification, and data privacy. This report discusses the core areas addressed in federal legislation, including the scope of coverage (who is covered and what information is covered); data privacy and security safeguards for sensitive personal information; requirements for security breach notification (when, how, triggers, frequency, and exceptions); restrictions on social security numbers (collection, use, and sale); credit freezes on consumer reports; identity theft penalties; causes of action; and preemption. For related reports, see CRS Report RS22374, Data Security: Federal and State Laws, by Gina Marie Stevens; CRS Report RL33005, Information Brokers: Federal and State Laws, by Angie A. Welborn; CRS Report RS20185, Privacy Protection for Customer Financial Information, by M. Maureen Murphy; and CRS Report RL31408, Internet Privacy: Overview and Pending Legislation, by Marcia S. Smith. This report will be updated as warranted
Privacy total information awareness programs and related information access, collection, and protection laws by Gina Marie Stevens ( Book )
5 editions published in 2003 in English and held by 34 WorldCat member libraries worldwide
This report describes the Total Information Awareness (TIA) programs in the Defense Research Projects Agency (DARPA) of the Department of Defense, and related information access, collection, and protection laws. TIA is a new technology under development that plans to use data mining technologies to sift through personal transactions in electronic data to find patterns and associations connected to terrorist threats and activities. Data mining technologies are currently used by federal agencies for various purposes. DARPA has underway a five year research project to develop and integrate information technologies into prototype systems to identify foreign terrorists for use by the intelligence, counterintelligence, law enforcement, and homeland security communities. Recent increased awareness about the existence if the TIA project provoked expressions of concern about the potential for the invasion of privacy of law-abiding citizens by the Government, and about the direction of the project by John Poindexter, a central figure in the Iran-Contra affair. While the law enforcement and intelligence communities argue that more sophisticated information gathering techniques are essential to combat today's sophisticated terrorists, civil libertarians worry that the Government's increased capability to assemble information will result in increased and unchecked government power, and the erosion of individual privacy. A coalition of public interest groups has asked Congress to intervene
Data security federal and state laws by Gina Marie Stevens ( Book )
5 editions published between 2006 and 2007 in English and held by 33 WorldCat member libraries worldwide
Security breaches involving electronic personal data have come to light largely as a result of the California Security Breach Notification Act, a California notification law that went into effect in 2003. In response, the states and some Members have introduced bills that would require companies to notify persons affected by such security breaches. By December 2005, 35 states had introduced data security legislation and 22 states had enacted data security laws. Numerous data security bills have been introduced in the 109th Congress (S. 115, S. 500, S. 751, S. 768, S. 1216, S. 1326, S. 1332, S. 1408, S. 1594, S. 1789, S. 2169, H.R. 1069, H.R. 1080, H.R. 3140, H.R. 3374, H.R. 3375, H.R. 3397, H.R. 4127). S. 1326, S. 1408, and S. 1789 were reported by Senate committees. This report provides a brief discussion of federal and state data security laws
Data brokers background and industry overview by Gina Marie Stevens ( Book )
4 editions published in 2007 in English and held by 31 WorldCat member libraries worldwide
Compliance with the HIPAA medical privacy rule by Gina Marie Stevens ( Book )
3 editions published in 2003 in English and held by 27 WorldCat member libraries worldwide
Sex-based employment discrimination UAW v. Johnson Controls, Inc. by Gina Marie Stevens ( Book )
1 edition published in 1991 in English and held by 22 WorldCat member libraries worldwide
Foster care and federal law significant developments and continuing issues by Gina Marie Stevens ( Book )
1 edition published in 1991 in English and held by 21 WorldCat member libraries worldwide
Legal overview of grandparent visitation rights by Gina Marie Stevens ( Book )
1 edition published in 1991 in English and held by 21 WorldCat member libraries worldwide
Child abuse and neglect fatalities federal and state issues and responses by Dale H Robinson ( Book )
1 edition published in 1992 in English and held by 20 WorldCat member libraries worldwide
Remedies available to victims of identity theft by Angie Welborn ( Book )
2 editions published in 2007 in English and held by 16 WorldCat member libraries worldwide
This report provides an overview of the federal laws that could assist victims of identity theft with purging inaccurate information from their credit records and removing unauthorized changes from credit accounts, as well as federal laws that impost criminal penalties on those who assume another persons identity through the use of fraudulent identification documents. State laws and recent legislative proposals aimed at preventing identity theft and providing additional remedies are also discussed
Enforcement of the HIPAA privacy rule by Gina Marie Stevens ( Book )
3 editions published in 2007 in English and held by 16 WorldCat member libraries worldwide
Information security and data breach notification safeguards by Gina Marie Stevens ( Book )
2 editions published in 2007 in English and held by 15 WorldCat member libraries worldwide
Government access to phone calling activity and related records : legal authorities by Elizabeth B Bazan ( Book )
3 editions published in 2006 in English and held by 10 WorldCat member libraries worldwide
Recent media disclosures regarding an alleged National Security Agency (NSA) program designed to collect and analyze information on telephone calling patterns within the United States have raised interest in the means by which the Government may collect such information. The factual information available in the public domain with respect to any such alleged program is limited and, in some instances, inconsistent, and the application, if at all, of any possibly relevant statutory provisions to any such program is likely to be a fact-specific inquiry. It is possible that any information provided to the NSA from the telephone service providers was provided in response to a request for information, not founded on a statutory basis. If this were the case, such a request would not necessarily be limited by the statutory structures discussed below, but in some instances, depending upon the facts involved, might expose the telephone companies to some civil remedies or criminal sanctions. In addition, a request not founded upon a statutory scheme, would appear to lack a means of compelling production of the information requested. This would seem to be consistent with the statement in the "USA Today" article that one of the companies refused to comply with NSA's request for calling detail records, while at least one other company appears to have complied. This report will summarize statutory authorities regarding access by the Government, for either foreign intelligence or law enforcement purposes, to information related to telephone calling patterns or practices. Where pertinent, the authors also will discuss statutory prohibitions against accessing or disclosing such information, along with relevant exceptions to those prohibitions
Federal information security and data breach notification laws by Gina Marie Stevens ( )
3 editions published between 2008 and 2010 in English and held by 4 WorldCat member libraries worldwide
The following report describes information security and data breach notification requirements included in the Privacy Act, the Federal Information Security Management Act, Office of Management and Budget Guidance, the Veterans Affairs Information Security Act, the Health Insurance Portability and Accountability Act, the Gramm-Leach-Bliley Act, the Federal Trade Commission Act, and the Fair Credit Reporting Act. Also included in this report is a brief summary of the Payment Card Industry Data Security Standard (PCI DSS), an industry regulation developed by VISA, MasterCard, and other bank card distributors. Information security laws are designed to protect personally identifiable information from compromise, unauthorized disclosure, unauthorized acquisition, unauthorized access, or other situations where unauthorized persons have access or potential access to personally identifiable information for unauthorized purposes. Data breach notification laws typically require covered entities to implement a breach notification policy, and include requirements for incident reporting and handling and external breach notification. During the 110th Congress, three data security bills--S. 239 (Feinstein), S. 495 (Leahy), and S. 1178 (Inouye)--were reported favorably out of Senate committees. Those bills include information security and data breach notification requirements. Several other data security bills were also introduced. The 109th and 110th Congresses did not pass data security legislation. In the 111th Congress, expectations are that efforts to move data security legislation will continue this year
Privacy : an overview of federal statutes governing wiretapping and electronic eavesdropping by Gina Marie Stevens ( )
1 edition published in 2009 in English and held by 3 WorldCat member libraries worldwide
This report provides an overview of federal law governing wiretapping and electronic eavesdropping. It also appends citations to state law in the area and contains a bibliography of legal commentary as well as the text of the Electronic Communications Privacy Act (ECPA) and the Foreign Intelligence Surveillance Act (FISA). It is a federal crime to wiretap or to use a machine to capture the communications of others without court approval, unless one of the parties has given their prior consent. It is likewise a federal crime to use or disclose any information acquired by illegal wiretapping or electronic eavesdropping. Violations can result in imprisonment for not more than five years; fines up to $250,000 (up to $500,000 for organizations); in civil liability for damages, attorneys' fees and possibly punitive damages; in disciplinary action against any attorneys involved; and in suppression of any derivative evidence. Congress has created separate but comparable protective schemes for electronic communications (e.g., e-mail) and against the surreptitious use of telephone call monitoring practices such as pen registers and trap and trace devices. Each of these protective schemes comes with a procedural mechanism to afford limited law enforcement access to private communications and communications records under conditions consistent with the dictates of the Fourth Amendment. The government has been given even more narrowly confined authority to engage in electronic surveillance, conduct physical searches, install and use pen registers and trap and trace devices for law enforcement purposes under the Electronic Communications Privacy Act and for purposes of foreign intelligence gathering under the Foreign Intelligence Surveillance Act. This report includes a brief summary of the recently expired Protect America Act, P.L. 110-55 and of the Foreign Intelligence Surveillance Act of 1978 Amendments Act of 2008, P.L. 110-261 (H.R. 6304). It is available in an abridged form without footnotes, quotations, or appendices as CRS Report 98-327, Privacy: An Abbreviated Outline of Federal Statutes Governing Wiretapping and Electronic Eavesdropping, by Gina Marie Stevens and Charles Doyle. Both will be revised as circumstances warrant
 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.87 (from 0.47 for Government ... to 1.00 for Federal in ...)
Alternative Names
Stevens, G. (Gina)
Languages
English (66)
Covers