When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Privacy regulation theory - Wikipedia

    en.wikipedia.org/wiki/Privacy_regulation_theory

    Traditionally, privacy is regarded as a state of social withdrawal (i.e., avoiding people). [3] Altman, however, regards it as a dialectic and dynamic boundary regulation process where privacy is not static but "a selective control of access to the self or to one’s group" [1] (p. 18).

  3. Reasonable expectation of privacy (United States) - Wikipedia

    en.wikipedia.org/wiki/Reasonable_expectation_of...

    An individual has no legitimate expectation of privacy in information provided to third parties. In Smith v. Maryland , 442 U.S. 735 (1979), the Supreme Court held individuals have no "legitimate expectation of privacy" regarding the telephone numbers they dial because they knowingly give that information to telephone companies when they dial a ...

  4. Privacy - Wikipedia

    en.wikipedia.org/wiki/Privacy

    The word privacy is derived from the Latin word and concept of ‘privatus’, which referred to things set apart from what is public; personal and belonging to oneself, and not to the state. [3] Literally, ‘privatus’ is the past participle of the Latin verb ‘privere’ meaning ‘to be deprived of’. [4]

  5. Privacy laws of the United States - Wikipedia

    en.wikipedia.org/wiki/Privacy_laws_of_the_United...

    Appropriation is the oldest recognized form of invasion of privacy involving the use of an individual's name, likeness, or identity without consent for purposes such as ads, fictional works, or products. [15] "The same action – appropriation – can violate either an individual's right of privacy or right of publicity.

  6. Third-party doctrine - Wikipedia

    en.wikipedia.org/wiki/Third-party_doctrine

    The third-party doctrine is a United States legal doctrine that holds that people who voluntarily give information to third parties—such as banks, phone companies, internet service providers (ISPs), and e-mail servers—have "no reasonable expectation of privacy" in that information.

  7. Information privacy - Wikipedia

    en.wikipedia.org/wiki/Information_privacy

    Information privacy is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, contextual information norms, and the legal and political issues surrounding them. [1] It is also known as data privacy [2] [3] or data protection.

  8. Communication privacy management theory - Wikipedia

    en.wikipedia.org/wiki/Communication_privacy...

    Communication privacy management (CPM), originally known as communication boundary management, is a systematic research theory developed by Sandra Petronio in 1991. CPM theory aims to develop an evidence-based understanding of the way people make decisions about revealing and concealing private information.

  9. Personal data - Wikipedia

    en.wikipedia.org/wiki/Personal_data

    Personal data, also known as personal information or personally identifiable information (PII), [1] [2] [3] is any information related to an identifiable person.. The abbreviation PII is widely used in the United States, but the phrase it abbreviates has four common variants based on personal or personally, and identifiable or identifying.