68
Bibliography 729 Bibliography and method of citation BOOKS AND JOURNALS 1972 Int Soc Sci J Lengyel Peter (ed) / (asst ed) Kazancigil Ali “The protection of privacy” 1972 Interna- tional Social Science Journal (1972) 1991 (Nov/ Dec) TDR 8 “US criticizes EC Data Directive’s potential burdens and barriers” 1991 (Nov/ Dec) Transnational Data & Communications Report 8–9 1994 (May/June) TDR 43 Privacy Working Group of the Information Infrastructure Task Force “US Information Infrastructure Privacy Principles” 1994 (May/ June) Transnational Data & Communica- tions Report 43 1994 (Nov/Dec) TDR 33 “Council of Europe” 1994 (Nov/Dec) TDR 33 Transnational Data & Communications Report 33–34 2000 Computer Law & Sec Rep 70 2000 Computer Law & Security Report 70–71 A Albinger 1986 Ann Surv Am L 625 Albinger Lisa Ann “Personal information in government agency records: toward an

Bibliography and method of citation

  • Upload
    others

  • View
    7

  • Download
    0

Embed Size (px)

Citation preview

Bibliography 729

Bibliography and method of citation

BOOKS AND JOURNALS

1972 Int Soc Sci J

Lengyel Peter (ed) / (asst ed) Kazancigil Ali “The protection of privacy” 1972 Interna-

tional Social Science Journal (1972)

1991 (Nov/ Dec) TDR 8

“US criticizes EC Data Directive’s potential burdens and barriers” 1991 (Nov/ Dec)

Transnational Data & Communications Report 8–9

1994 (May/June) TDR 43

Privacy Working Group of the Information Infrastructure Task Force “US Information

Infrastructure Privacy Principles” 1994 (May/ June) Transnational Data & Communica-

tions Report 43

1994 (Nov/Dec) TDR 33

“Council of Europe” 1994 (Nov/Dec) TDR 33 Transnational Data & Communications

Report 33–34

2000 Computer Law & Sec Rep 70

2000 Computer Law & Security Report 70–71

A

Albinger 1986 Ann Surv Am L 625

Albinger Lisa Ann “Personal information in government agency records: toward an

Bibliography 730

informational right to privacy” 1986 Annual Survey of American Law 625–643

Alderman & Kennedy Right to privacy

Alderman Ellen & Kennedy Caroline The right to privacy (1995)

Aldhouse 1999 Int R L Computers & Tech 75

Aldhouse FGB “The transfer of personal data to third countries under EU Directive

95/46/EC” 1999 International Review of Law, Computers & Technology 75–79

Aldhouse “UK Data Protection”

Aldhouse FGB “UK Data Protection – where are we in 1991?” 180–187 in Yearbook of

Law Computers & Technology Russel KV (ed) (1991)

Alheit Expert systems

Alheit Karen Issues of civil liability arising from the use of expert systems (1997)

Anderson “American privacy law”

Anderson David A “The failure of American privacy law” 139–167 in Protecting privacy

Markesinis Basil S (ed) (1999)

Archer & Butler European Community

Archer Clive & Butler Fiona The European Community: structure and process (1996)

Artz et al 1998 (5) Priv & Inf 196

Artz M, Ebbers C, Schreuder E & Nouwt S “Marketing en de WBP-proef (Artz &

Ebbers en Schreuder & Nouwt in dialoog over de impact van de WBP op klanten-

databases en relatiemarketing)” 1998 (5) Privacy & Informatie 196-204

Asser-Hartkamp III (Verbintenissenrecht)

Bibliography 731

Hartkamp A S Mr C Asser’s handleiding tot de beoefening van het Nederlands

Burgerlijk Recht: verbintenissenrecht (deel 3) (1998)

Ausems “Council of Europe”

Ausems Egbert “Council of Europe Convention for the protection of individuals with regard

to automatic processing of personal data” 537–552 in Business guide to privacy and data

protection legislation Franklin Charles EH (ed) (1996)

B

Bainbridge Computer law

Bainbridge David I Introduction to computer law (2000)

Bainbridge Data protection

Bainbridge David I Data protection (2000)

Bainbridge 1998 Computer L & Sec Rep 180

Bainbridge David I “Data protection – the new law”1999 Computer Law & Security

Report 180–184

Bainbridge & Pearce 1998 Computer L & Sec Rep 259

Bainbridge David I & Pearce Graham “Data controllers and the new data protection

law”1998 Computer Law & Security Report 259–264

Bainbridge & Pearce 1998 Computer L & Sec Rep 401

Bainbridge David I & Pearce Graham “The UK Data Protection Act 1998 – data subjects

rights” 1998 Computer Law & Security Report 401–406

Baker Human Rights Act 1998

Baker Christopher (ed) Human Rights Act 1998: a practitioner’s guide (1998)

Bibliography 732

Banisar Privacy and human rights

Banisar David, Electronic Privacy Information Center (EPIC) & Privacy International

Privacy and human rights: an international survey of privacy laws and developments

(2000)

Barefoot 1998 N Car LR 283

Barefoot Bartley L “Enacting a health information confidentiality law: can Congress beat the

deadline?” 1998 North Carolina Law Review 283–360

Battock 1995 Int J L & Inf Tech 156

Battock Rupert “Data protection: where next?” 1995 International Journal of Law &

Information Technology 156–177

Beling 1983 Boston College Int & Comp L R 591

Beling Craig T “Transborder data flows: international privacy protection and the free flow of

information” 1983 Boston College International & Comparative Law Review 591–624

Bennett Data protection Directive

Bennett Colin J The European Union data protection Directive: lessons for the

protection of privacy in Canada (Address to the Industry Canada Workshop 31 August

1995)

Bennett Regulating privacy

Bennett Colin J Regulating privacy: data protection and public policy in Europe and

the United States (1992)

Bennett & Grant Visions of privacy

Bennett Colin J & Grant Rebecca (eds) Visions of privacy: policy choices for the digital

age (1999)

Bibliography 733

Bennett & Raab 1997 Inf Soc 245

Bennett Colin J & Raab Charles D “The adequacy of privacy: the European Union Data

Protection Directive and the North American response” 1997 Information Society

245–263

Benyekhlef “Dematerialized transactions”

Benyekhlef Karim “Dematerialized transactions on electronic pathways: a panorama of legal

issues” 93–116 in The electronic superhighway: the shape of technology and law to

come Mackaay Ejan, Poulin Daniel & Trudel Pierr (eds) (1995)

Berkvens & Prins “Van WPR naar WBP”

Berkvens JMA & Prins JEJ “De Bescherming van Persoonsgegevens: van WPR na WBP”

315–368 in Recht en computer Franken H, Kaspersen HWK & de Wild AH (eds)

(1997)

Berkvens 1995 Computer L & Prac 38

Berkvens JMA “Will the data protection Directive prevent a global information infrastruc-

ture?” 1995 Computer Law & Practice 38–44

Bigelow 1986 Inf Age 134

Bigelow Robert P “Computers and privacy – an American perspective” 1986 Information

Age 134–140

Bing 1984 Michigan Yb Int Legal S 271

Bing Jon “The Council of Europe Convention and the OECD Guidelines on data protec-

tion” 1984 Michigan Yearbook of International Legal Studies 271–303

Blackbeard 2002 THRHR 232

Blackbeard M “HIV/AIDS: the right to privacy v the right to life” 2002 Tydskrif vir

Bibliography 734

Hedendaagse Romeins-Hollandse Reg / Journal of Contemporary Roman-Dutch Law

232–241

Blackman 1993 Santa Clara Computer & High Tech LJ 431

Blackman Joshua D “A proposal for federal legislation protecting informational privacy

across the private sector” 1993 Computer & High Technology Law Journal 431–468

Blair & Mauer 1984 Mo LR 289

Blair Roger D & Maurer Virginia “Statute law and common law: the Fair Credit Reporting

Act” 1984 Missouri Law Review 289–308

Blanke 2000 Alb LJ Sci & Tech 57

Blanke Jordan M “Safe Harbor” and the European Union’s Directive on data protection”

2000 Albany Law Journal of Science & Technology 57–88

Blas 1999 (1) Priv & Inf 8

Blas Diana Alonso “25 October 1998: the day after” 1999 (1) Privacy & Informatie

8–14

Bloustein 1964 NYULR 962

Bloustein Edward J “Privacy as an aspect of human dignity: an answer to dean Prosser”

1964 New York University Law Review 962–1007

Blume 1992 Computer/L J 399

Blume Peter “An EEC policy for data protection” 1992 Computer/Law Journal 399–440

Blume 1997 Int R L Computers & Tech 193

Blume Peter “Privacy as theoretical and practical concept” 1997 International Review of

Law, Computers & Technology 193–202

Bibliography 735

Boberg Delict

Boberg PQR The law of delict (vol 1) (Aquilian liability) (1989)

Borking “Privacy technology”

Borking John “Privacy technology, a new challenge in cyberspace” 91–110 in Privacy

disputed Ippel Pieter, de Heij Guus & Crouwers Bart (1995)

Bothe 1989 Mich J Int L 333

Bothe Michael “Transborder data flows: do we mean freedom or business?” 1989 Michi-

gan Journal of International Law 333–344

Bouchard Guidebook

Bouchard Robert F & Franklin Justin D Guidebook to the Freedom of Information and

Privacy Acts (1980)

Bull 2001 Computer L & Sec Rep 239

Bull Gillian “Data protection – Safe Harbor: transferring personal data to the USA” 2001

Computer Law & Security Report 239–243

Burchel Delict

Burchell Jonathan Principles of delict (1993)

Burchell Personality rights

Burchell Jonathan Personality rights and freedom of expression: the modern actio

injuriarum (1998)

Burkert 1986 Computer L & Prac 155

Burkert Herbert “International data protection” 1986 Computer Law & Practice

155–160

Bibliography 736

Burkert “Data protection and access to data”

Burkert Herbert “Data protection and access to data” 49–69 in From data protection to

knowledge machines – the study of law and informatics Seipel P (ed) (1990)

Burns Communications law

Burns Yvonne Communications law (2001)

Buys Cyberlaw

Buys Reinhardt (ed) Cyberlaw @ SA: the law of the Internet in South Africa (2000)

Bygrave 2000 Computer L & Sec Rep 252

Bygrave Lee A “European data protection – determining applicable law pursuant to

European data protection legislation” 2000 Computer Law & Security Report 252–257

Bygrave 2001 Computer L & Sec Rep 17

Bygrave Lee A “Automated profiling – minding the machine: article 15 of the EC data

protection Directive and automated profiling” 2001 Computer Law & Security Report

17–24

Bygrave 2001 UNSWLJ 277

Bygrave Lee A “The place of privacy in data protection law” 2001 University of New

South Wales Law Journal 277–283

Bygrave Data protection law

Bygrave Lee A Data protection law: approaching its rationale, logic and limit (2002)

C

Bibliography 737

Campbell Data transmission and privacy

Campbell Dennis & Fisher Joy (eds) Data transmission and privacy (1994)

Cannataci Privacy and data protection law

Cannataci Joseph Privacy and data protection law: international development and

Maltese perspectives (1986)

Carey Data Protection Act 1998

Carey Peter Blackstone’s guide to the Data Protection Act 1998 (1998)

Carey Data protection in the UK

Carey Peter Data protection in the UK (2000)

Carey E-privacy

Carey Peter E-privacy and online data protection (2002)

Carter 1999 William Mitchell LR 223

Carter Patricia I “Health information privacy: can congress protect confidential medical

information in the ‘information age’”? 1999 William Mitchell Law Review 223–286

Cate 1995 Iowa LR 431

Cate Fred H “The EU data protection Directive, information privacy, and the public

interest” 1995 Iowa Law Review 431–443

Cate Information age

Cate Fred H Privacy in the information age (1997)

Chalton 1997 Computer L & Sec Rep 425

Chalton Simon “Data protection: the government’s proposals” 1997 Computer Law &

Bibliography 738

Security Report 425–428

Chalton et al Encyclopedia of data protection

Chalton Simon, Gaskill Shelagh, Walden Ian, Grant Hazel, Hendrie-Liaño Jessica & Inger

Lucy Encyclopedia of data protection (loose leave: 1988–1999)

Charlesworth 1999 Gov Inf Q 203

Charlesworth Andrew “Implementing the European Union Data Protection Directive 1995

in UK law: the Data Protection Act 1998” 1999 Government Information Quarterly

203–240

Clear 2002 J Mar J Computer & Inf L 981

Clear Marie “Falling into the gap: the European Union’s data protection act and its impact

on US law and commerce” 2002 John Marshall Journal of Computer and Information

Law 981–1018

Coetser Identiteit

Coetser Paulus Petrus Johannes Die reg op identiteit (1986)

Cole 1985 NYUJ Int L & Pol 893

Cole Patrick E “New challenges to the US multinational corporation in the European

Economic Community: data protection laws” 1985 New York University Journal of

International Law & Politics 893–947

Coles 1991 Am ULR 957

Coles Todd Robert “Does the Privacy Act of 1974 protect your right to privacy? An

examination of the routine use exemption” 1991 American University Law Review

957–1002

Bibliography 739

Cooley Treatise on the law of torts

Cooley TM Treatise on the law of torts (1880) (extract in Turkington & Allen Privacy

law 51)

Cooper 1998 Employee Relations LJ 57

Cooper Scott F “The Fair Credit Reporting Act – time for employers to change their use of

credit information” 1998 Employee Relations Law Journal 57–71

Corbett 1987 SALJ 52

Corbett MM “Aspects of the role of policy in the evolution of our common law” 1987

South African Law Journal 52–69

Cowley Access to medical records and reports

Cowley Robert Access to medical records and reports: a practical guide (1994)

Currie & Klaaren AIA commentary

Currie Iain & Klaaren Jonathan The Promotion of Access to Information Act commen-

tary (2002)

D

Daggett 1997 Catholic ULR 617

Daggett Lynn M “Bucking up Buckley I: making the federal student records statute work”

1997 Catholic University Law Review 617–670

Daniel-Paczosa 1987 Arizona J Int Comp L 154

Daniel-Paczosa Angela “Data protection and the right to privacy in the US and West

Germany”1987 Arizona Journal of International & Comparative Law 154–163

Bibliography 740

David & Brierley Major legal systems

David René & Brierley John EC Major legal systems in the world today (1985)

Davis Computer data processing

Davis Gordon B Computer data processing (1973)

Dean “SA”

Dean Owen “South Africa” 381–394 in International privacy, publicity and personality

laws Henry Michael (ed) (2001)

De Graaf Privacy en persoonsgegevens

De Graaf F Privacy en persoonsgegevens: het ontwerp van Wet Persoonsregistraties

(1987)

De Graaf “Wet Persoonsregistraties”

De Graaf F “De Wet Persoonsregistraties” 361–381 in Hoofdstukken informaticarecht

De Graaf F (ed) (1989)

De Klerk 1991 SALJ 166

De Klerk Anton “The right of a patient to have access to his medical records” 1991 South

African Law Journal 166–170

Dendy 1990 BML 149

Dendy Mervyn “Corporate reputation revisited: defaming a non-trading juristic person”

1990 Businessman’s Law 149–152

Devenish SA Bill of Rights

Devenish GE A commentary on the South African Bill of Rights (1999)

Bibliography 741

De Vos 1995 Stell LR 34

De Vos W le R “The impact of the new constitution on civil procedural law”1995

Stellenbosch Law Review / Regstydskrif 34–53

De Waal, Currie & Erasmus Bill of Rights

De Waal Johan, Currie Iain & Erasmus Gerhard Bill of Rights handbook (2000)

De Wet & Swanepoel Strafreg

De Wet JC & Swanepoel HL Strafreg (1985)

Drebes 1994 J L & Education 290

Drebes Charles “The Buckley Amendment: an administrator’s refuge from accountability”

1994 Journal of Law & Education 290–293

Du Plessis 1999 Obiter 92

Du Plessis W “Enforcement of environmental rights by way of a right to information” 1999

Obiter 92–112

Du Plessis Reg op inligting

Du Plessis W Die reg op inligting en die openbare belang (1986)

Du Plessis & De Ville “Personal rights”

Du Plessis Lourens M & De Ville Jacques R “Personal rights: life, freedom, and security of

the person, privacy, and freedom of movement” 212–263 in Rights and constitutionalism

Van Wyk Dawid, Dugard John, De Villiers Bertus, & Davis Dennis (eds) (1994)

Dumortier 1997 Int R L Computers & Tech 93

Dumortier Jos “The Protection of personal data in the Schengen Convention”1997

International Review of Law, Computers & Technology 93–106

Bibliography 742

E

Early 1986 Computer L & Prac 68

Early T Lawrence “Recent developments in data protection in the Council of Europe” 1986

Computer Law & Practice 68–69

Eckenwiler 1998 Seton Hall Const LJ 725

Eckenwiler Mark “Applications of the Privacy Protection Act” 1998 Seton Hall

Constitutional Law Journal 725–730

Edelman 1990 Tex L R 1195

Edelman Peter B “Free press v privacy: haunted by the ghost of Justice Black” 1990 Texas

Law Review 1195–1234

Ehlke 1985 J Mar LR 829

Ehlke Richard “The Privacy Act after a decade” 1985 John Marshall Law Review

829–846

Eiselen Reg op privaatheid in die inligtingsera

Eiselen Sieg Die reg op privaatheid in die inligtingsera Unpublished inaugural lecture PU

for CHE (1994)

Elder Law of privacy

Elder David E The law of privacy (1991)

Ennison 1984 Int Bus L’yer 163

Ennison Thomas “Legal aspects of TDF in developing countries: sovereignty considerations”

1984 International Business Lawyer 163–170

Bibliography 743

EPIC Privacy and human rights

Electronic Privacy Information Center (EPIC) (in association with Privacy International)

Privacy and human rights: an international survey of privacy laws and developments

(2002)

Estadella-Yuste 1992 Int & Comp L Q 170

Estadella-Yuste Olga “The draft Directive of the EC regarding the protection of personal

data” 1992 International & Comparative Law Quarterly 170–179

Evans 1981 Am J Comp L 571

Evans AC “European data protection law” 1981 American Journal of Comparative Law

571–582

Evans 1981 J World Trade L 150

Evans AC “Data Protection in Europe” 1981 Journal of World Trade Law 150–158

Evans & Korn Data Protection Act

Evans AC & Korn Anthony How to comply with the Data Protection Act: policies,

practice and procedures (1986)

Ewing 2002 Houston J Int L 315

Ewing Mike “The perfect storm: the Safe Harbor and the Directive on data protection”

2002 Houston Journal of International Law 315–344

F

Falby 1982 Geo LJ 219

Falby Bruce E A “Constitutional right to avoid disclosure of personal matter: perfecting

privacy analysis in JP v DeSanti 653 F2nd 1080 (6th Cir1981): case comment” 1982

Bibliography 744

Georgetown Law Journal 219–251

Farnsworth 1983 Int Bus L’yer 114

Farnsworth David P “Data privacy or data protection and transborder or transnational data

flow: an American’s view of European legislation” 1983 International Business Lawyer

114–118

Faul Bankgeheim

Faul Wilna Grondslae van die beskerming van die bankgeheim (1991)

Fenwick & Phillipson 1996 Cambridge L J 447

Fenwick Helen & Phillipson Gavin “Confidence and privacy: a re-examination” 1996

Cambridge Law Journal 447–455

Fenwick Civil liberties

Fenwick Helen Civil liberties (1998)

Ferreira 2000 SAPR/PL 527

Ferreira Gerrit “Inligting, audi alteram partem en redes” 2000 SA Publiekreg / Public Law

527–540

Flaherty 1991 Case West Res LR 831

Flaherty David H “On the utility of constitutional rights to privacy and data protection”1991

Case Western Reserve Law Review 831–855

Flaherty Surveillance societies

Flaherty David H Protecting privacy in surveillance societies – the Federal Republic of

Germany, Sweden, France, Canada, and the United States (1989)

Bibliography 745

Flaherty “Data protection and national information policy”

Flaherty David H “Data protection and national information policy” in From data

protection to knowledge machines – the study of law and informatics Seipel P (ed)

(1990)

Flaherty “Visions of privacy”

Flaherty David H “Visions of privacy: past, present, and future”19–38 in Visions of

privacy: policy choices for the digital age Bennett Colin J & Grant Rebecca (eds)

(1999)

Flanagan 2002 J Int Banking L 237

Flanagan Anne “Gramm-Leach-Bliley: through the EU data protection looking glass” 2002

Journal of International Banking Law 237–248

Folsom European Union law

Folsom Ralph H European Union law in a nutshell (1995)

Frankena “Bescherming van privacy en persoonsgegevens”

Frankena HC “Bescherming van privacy en persoonsgegevens” 323–360 in Hoofdstukken

informaticarecht De Graaf F (ed) (1989)

Franklin Business guide

Franklin Charles EH (ed) Business guide to privacy and data protection legislation

(1996)

Freedman Computer age

Freedman Warren The right of privacy in the computer age (1987)

Fromholz 2000 Berkeley Tech LJ 461

Bibliography 746

Fromholz Julia M “The European Union data privacy Directive” 2000 Berkeley

Technology Law Journal 461–484

Frosini 1987 Computer L & Prac 84

Frosini Vittorio “The European Convention on data protection” 1987 Computer Law &

Practice 84–90

G

Gardeniers, Van Kralingen & Schreuders “Privacyaspecten van informatie-mijnbouw”

Gardeniers HJM, van Kralingen RW & Schreuders E “Knowledge discovery in databases;

privacyaspecten van informatie-mijnbouw” 69–81 in Privacy in het informatietijdperk

Nouwt Sjaak & Voermans Wim (eds) (1996)

Gassmann “Privacy implications of transborder data flows” 109

Gassmann Hans-Peter “Privacy implications of transborder data flows” 109–117 in

Hoffman Lance J (ed) Computers and privacy in the next decade (1980)

Gaum 2001 THRHR 146

Gaum Liezl “The right to access to information: Korf v Health Professions Council of South

Africa” 2001 Tydskrif vir Hedendaagse Romeins-Hollandse Reg / Journal of

Contemporary Roman-Dutch Law 146–155

Gavison 1980 Yale LJ 421

Gavison Ruth “Privacy and the limits of the law” 1980 Yale Law Journal 421–471

Geldenhuys 1997 THRHR 254

Geldenhuys T “Die regsbeskerming van privaatregtelike belange ten aansien van inligting”

1997 Tydskrif vir Hedendaagse Romeins-Hollandse Reg / Journal of Contemporary

Bibliography 747

Roman-Dutch Law 254–281

Geldenhuys Regsbeskerming van inligting

Geldenhuys T Die Regsbeskerming van inligting (1993)

Gellman 1993 Softw LJ 199

Gellman Robert “Fragmented, incomplete, and discontinuous: the failure of federal privacy

regulatory proposals and institutions” 1993 Software Law Journal 199–238

Gellman 1994 Gov Inf Q 245

Gellman Robert “An American Privacy Protection Commissioner: an idea whose time has

come ... Again” 1994 Government Information Quarterly 245–247

Gellman 1996 Villanova LR 129

Gellman Robert M “Can privacy be regulated effectively on a national level: thoughts on the

possible need for international privacy rules” 1996 Villanova Law Review 129–172

Gellman 2000 Gov Inf Q 235

Gellman Robert “Taming the privacy monster: a proposal for a non-regulatory privacy

agency” 2000 Government Information Quarterly 235–241

Gilbert 1997 N Dakota LR 93

Gilbert Francoise “Privacy of medical records? The Health Insurance Portability and

Accountability Act of 1996 creates a framework for the establishment of security standards

and the protection of individually identifiable information” 1997 North Dakota Law Review

93–108

GILC Privacy and human rights

Global Internet Liberty Campaign Privacy and Human Rights: an international survey

Bibliography 748

of privacy laws and practice (1998)

Available from <<http://www.gilc.org//privacy/survey/>> [Accessed November 1999]

Girot & De Wit “Privacy van ondernemingen”

Girot C & De Wit AP “Privacy van ondernemingen” 139–154 in Privacy in het

informatietijdperk Nouwt Sjaak & Voermans Wim (eds) (1996)

Glazeswki 1999 Acta Jurida 1

Glazeswki Jan “Environmental justice and the new South African democratic legal order”

1999 Acta Jurida 1–35

Goldstein 1992 Emory LJ 1185

Goldstein Bruce D “Confidentiality and dissemination of personal information: an

examination of state laws governing data protection” 1992 Emory Law Journal

1185–1216

Goldman “Privacy and individual empowerment”

Goldman Janlori “Privacy and individual empowerment” 97–115 in Visions of privacy:

policy choices for the digital age Bennett Colin J & Grant Rebecca (eds) (1999)

Goodenough 1993 Eur Intel Prop R 227

Goodenough Oliver R “A right of privacy in the UK: why not the courts?” 1993 European

Intellectual Property Review 227–228

Gostin 1995 Cornell LR 451

Gostin Lawrence “Health information privacy” 1995 Cornell Law Review 451–528

Govender “Limitation on access to information”

Govender Karthy “An assessment of limitation on access to information in the Promotion of

Bibliography 749

the Access to Information Act and the danger that disclosure will become the exception

rather than the norm” 17–26 in The constitutional right of access to information (Report

of seminar held on 4 September 2000 at St George’s Hotel, Rietvlei Dam, Pretoria)

Konrad Adenauer Stiftung Seminar Report no 5 (2001). Available from

<<http://www.kas.org.za/Publications.asp>> [Accessed October 2003]

Graham 1987 Tex LR 1395

Graham Jonathan P “Privacy, computers, and the commercial dissemination of personal

information” 1987 Texas Law Review 1395–1439

Greenleaf 1995 (2) Int Priv Bul 1

Greenleaf Graham “The 1995 EU Directive on data protection – an overview” 1995 (2)

International Privacy Bulletin 1–28

Greer 1999 European LR 3

Greer Steven “A guide to the Human Rights Act 1998” 1999 European Law Review 3–21

Gross 1967 NYULR 34

Gross Hyman “The concept of privacy” 1967 New York University Law Review 34–54

Gross Privacy

Gross Hyman Privacy – its legal protection (1976)

H

Harris, O’Boyle & Warbrick European Convention on Human Rights

Harris DJ, O’Boyle M & Warbrick C Law of the European Convention on Human

Rights (1995)

Bibliography 750

Harrison 1992 Memp SULR 775

Harrison Heather “Protecting personal information from unauthorised government

disclosure” 1992 Memphis State University Law Review 775–806

Heaney 1986 Fordham Urb LJ 927

Heaney Gretta J “The constitutional right of informational privacy: does it protect children

suffering from AIDS?” 1986 Fordham Urban Law Journal 927–969

Hernandez 1988 Fed Com LJ 17

Hernandez Ruel Torres “ECPA and online computer privacy” 1988 Federal

Communications Law Journal 17–41

Heydrich 1999 Brooklyn J Int L 407

Heydrich Michael W “A Brave New World: complying with the European Union Directive

on personal privacy through the power of contract” 1999 Brooklyn Journal of

International Law 407–443

Hill European Community

Hill Brian The European Community (1991)

Hixon Public society

Hixon Richard F Privacy in a public society: human rights in conflict (1987)

Hofman Vertrouwelijke communicatie

Hofman JRAR Vertrouwelijke communicatie: een rechtsvergelijkende studie over de

geheimhouding van communicatie in grondrechtelijk perspectief naar internationaal,

Nederlands en Duits recht (1994)

Hofman et al Cyberlaw

Bibliography 751

Hofman Julian, Johnston David, Handa Sunny & Morgan Charles Cyberlaw: a guide for

South Africans doing business online (1999)

Holmes “Privacy: philosophical foundations and moral dilemmas”

Holmes Robert “Privacy: philosophical foundations and moral dilemma’s” in Privacy

disputed Ippel Pieter; de Heij Guus & Crouwers Bart (eds) (1995)

Holvast 1998 (1) Priv & Inf 4

Holvast Jan “Wet Bescherming Persoonsgegevens: overzicht en stappenplan” 1998 (1)

Privacy & Informatie 4–10

Hondius 1983 Neth Int LR 103

Hondius Frits W “A decade of international data protection” 1983 Netherlands

International Law Review 103–128

Hondius Emerging data protection

Hondius Frits W Emerging data protection in Europe (1975)

Horn & Smith 1999 Banking LJ 689

Horn Charles M & Smith Brian W “Financial modernization in the new millennium:

implementation of the Gramm-Leach-Bliley Act” 1999 Banking Law Journal 689–710

Hosch 1983 Vand LR 139

Hosch Heyward C “The interest in limiting the disclosure of personal information: a

constitutional analysis” 1983 Vanderbilt Law Review 139–197

Hudgins & Vacca Law and education

Hudgins HC & Vacca Richard S Law and education: contemporary issues and court

decisions (1991)

Bibliography 752

Hustinx “The case of data protection”

Hustinx Peter J “Co-regulation or self-regulation by public and private bodies – the case of

data protection” 283–288 in Freundesgabe für Alfred Bullesbach 2000

Available from <<http://www.cbpweb.nl/indexen/ind_publ_art.htm>> [Accessed March

2003]

I

Ippel et al Privacy disputed

Ippel Pieter, de Heij Guus & Crouwers Bart Privacy disputed (1995)

Itzikowitz 1996 THRHR 497

Itzikowitz Angela “Investigation of Serious Economic Offences Act 117 of 1991” 1996

Tydskrif vir Hedendaagse Romeins-Hollandse Reg / Journal of Contemporary Roman-

Dutch Law 497–504

J

Janger & Schwartz 2002 Minn LR 1219

Janger Edward & Schwartz Paul “The Gramm-Leach-Bliley Act, information privacy, and

the limits of default rules” 2002 Minnesota LR 1219–1261

Jansen 2002 (Apr) De Rebus 29

Jansen Jacques “Criminal protection of online privacy” 2002 (Apr) De Rebus 29–31

Jay 1989 Computer L & Prac 134

Jay Rosemary “The Data Protection Act 1984 and the Convention for the Protection of

Individuals with regard to Automatic Processing of Personal Data: recommendations and

reservations – interpretation status”1989 Computer Law & Practice 134–137

Bibliography 753

Jay & Hamilton Data protection

Jay Rosemary & Hamilton Angus Data protection law and practice (1999)

Johnson 2000 (Nov) De Rebus 54

Johnson Jason “E-spy vs the right to privacy: workplace monitoring and technology

surveillance” 2000 (Nov) De Rebus 54–55

Joubert Grondslae

Joubert WA Grondslae van die persoonlikheidsreg (1953)

Justice Privacy and the law

Justice (British Section of the International Commission of Jurist) Privacy and the law:

report by Justice (1970)

K

Kang 1998 Stanford LR 1193

Kang Jerry “Information privacy in cyberspace transactions” 1998 Stanford Law Review

1193–1294

Kaplan & Mahoney 1997 Fed L’yer 38

Kaplan Joseph V & Mahoney John P “Reckless disregard: intentional and willful violations

of the Privacy Act’s investigatory requirements” 1997 Federal Lawyer 38–44

Kaspersen “Data protection and e-commerce”

Kaspersen Henrik WK “Data protection and e-commerce” 119–145 in eDirectives: guide

to European law on e-commerce Lodder Arno R & Kaspersen Henrik WK (eds) (2002)

Keeton Law of torts

Bibliography 754

Keeton Page Prosser & Keeton on the Law of Torts (1984)

Kemp 2000 Stell LR 437

Kemp Gerhard “Die ondersoek van ernstige ekonomiese misdade in die lig van die

grondwetlike reg op privaatheid” 2000 Stellenbosch Law Review / Regstydskrif 437–451

Kirby 1987 U Cin LR 745

Kirby MD “Access to information and privacy: the ten information commandments” 1987

University of Cincinnati Law Review 745–759

Klaaren, Currie & Smith “Access to information legislation”

Klaaren Jonathan, Currie Iain & Smith Andrew “Analysing foreign access to information

legislation from a South African viewpoint” 29–40 in The constitutional right of access to

information (Report of seminar held on 4 September 2000 at St George’s Hotel, Rietvlei

Dam, Pretoria) Konrad Adenauer Stiftung Seminar Report no 5 (2001) Available from

<<http://www.kas.org.za/Publications.asp>> [Accessed October 2003]

Klopper Kredietwaardigheid

Klopper HB Die beskerming van kredietwaardigheid in die Suid-Afrikaanse reg

(1986)

Knobel 1997 THRHR 533

Knobel JC “HIV-toetse, toestemming en onregmatigheidsbewussyn” 1997 Tydskrif vir

Hedendaagse Romeins-Hollandse Reg / Journal of Contemporary Roman-Dutch Law

533–536

Knobel 2002 THRHR 24

Knobel JC “Nalatige persoonlikheidskrenking” 2002 Tydskrif vir Hedendaagse Romeins-

Hollandse Reg / Journal of Contemporary Roman-Dutch Law 24–36

Bibliography 755

Knobel Trade secret

Knobel JC The right to the trade secret (1996)

Komuves 1998 J Mar J Computer & Inf L 529

Komuves Flavio “We’ve got your number: an overview of legislation and decisions to

control the use of social security numbers and personal identifiers” 1998 John Marshall

Journal of Computer & Information Law 529–577

Kuitenbrouwer “Privacy”

Kuitenbrouwer F “Privacy: een historisch-vergelijkend overzicht” 7–24 in Privacy-

regulering in theorie en praktijk Berkvens JMA & Prins JEJ (eds) (1994)

Kuitenbrouwer et al Drieluik privacybescherming

Kuitenbrouwer F, Verkade DWF & van der Horst RJM Drieluik privacybescerming:

een overzicht en enkele exercities (1984)

L

Langan 1979 Colum JL & Soc Probs 143

Langan Kenneth James “Computer matching programs: a threat to privacy?” 1979

Columbia Journal of Law & Social Problems 143–180

Larremore 1912 Colum LR 693

Larremore D “The law of privacy” 1912 Columbia Law Review 693–708

Laurie Genetic privacy

Laurie Graham Genetic privacy: a challenge to medico-legal norms (2002)

Leigh 1976 Hastings Con LQ 229

Bibliography 756

Leigh Lawrence J “Informational privacy: constitutional challenges to the collection and

dissemination of personal information by government agencies” 1976 Hastings

Constitutional Law Quarterly 229–259

Leinius & Midgley 2002 SALJ 17

Leinius Birte & Midgley JR “The impact of the Constitution on the law of delict” 2002

South African Law Journal 17–27

Lloyd Data Protection Act 1998

Lloyd, Ian J A Guide to the Data Protection Act 1998 (1998)

Lloyd Information technology law

Lloyd Ian J Information technology law (1997)

M

Maditisi 1992 De Rebus 659

Maditsi Alexander “The right of privacy in America: what does it mean?” 1992 De Rebus

659–663

Madsen Personal data protection

Madsen Wayne Handbook of personal data protection (1992)

Martin Bits, bytes and big brother

Martin Shannon E Bits, bytes and Big Brother – federal information control in the

technological age (1995)

Mathijsen European Union law

Mathijsen PSRF A guide to European Union law (1999)

Bibliography 757

Matthews 1984 Int Bus L’yer 410

Matthews Rosalyn Clive “Reflection of rights of individuals in the EEC” 1984 International

Business Lawyer 410–414

Maxeiner 1995 Fed Comm LJ 93

Maxeiner James R “Freedom of information and the EU data protection Directive” 1995

Federal Communications Law Journal 93–104

Maxwell & Reinsch “Freedom of Information Act”

Maxwell Kimiera & Reinsch Roger “The Freedom of Information Act privacy exemption:

who does it really protect?” 83–97 in Privacy and publicity: readings from commu-

nications and the law, 2 Kupferman Theodore R (ed) (1990)

McKeaver 1984 Int Bus L’yer 159

McKeaver Edward D “Is it best not to regulate transborder data flow?” 1984 Internatio-

nal Business Lawyer 159–162

McKerron Delict

McKerron RG Law of delict (1971)

McQuoid-Mason 1982 CILSA 135

McQuoid-Mason David J “Consumer protection and the right to privacy” 1982

Comparative & International Law Journal of Southern Africa 135–157

McQuoid-Mason 2000 Acta Juridica 227

McQuoid-Mason David J “Invasion of privacy: common law v constitutional delict – does it

make a difference?” 2000 Acta Juridica 227–261

McQuoid-Mason “Constitutional privacy”

Bibliography 758

McQuoid-Mason David J “Privacy” in Chaskalson Matthew, Kentridge Janet, Klaaren

Jonathan, Marcus Gilbert, Spitz Derick, Woolman Stuart (eds) Constitutional law of

South Africa (1996)

McQuoid-Mason Privacy

McQuoid-Mason David J The law of privacy in South Africa (1978)

Meiring Betalinsgstelsel

Meiring GA Regsaspekte van die betalingstelsel (1998)

Mellors & Pollitt 1984 Pol Q 311

Mellors Colin & Pollitt David “The Data Protection Bill: protecting privacy or promoting

commerce?” 1984 Political Quarterly 310–311

Menacker School law

Menacker Julius School law: theoretical and case perspectives (1987)

Messick 1985 Santa Clara LR 153

Messick Robert “IRS computer data bank searches: an infringement of the Fourth Amend-

ment search and seizure clause” 1985 Santa Clara Law Review 153–189

Michael 1982 Pub L 360

Michael James “Data protection” 1982 Public Law 360–366

Michael Privacy and human rights

Michael James Privacy and human rights (1994)

Midgley 1996 THRHR 635

Midgley JR “The attenuated form of intention: a constitutionally acceptable alternative to

Bibliography 759

strict liability for the media”1996 Tydskrif vir Hedendaagse Romeins-Hollandse Reg /

Journal of Contemporary Roman-Dutch Law 635–638

Miller Assault on privacy

Miller AR The assault on privacy (computers, data banks and dossiers) (1971)

Miller Statement to the US Congress Senate Committee on the Judiciary 1967

Miller AR Statement to the US Congress Senate Committee on the Judiciary, 1967 (as

quoted in 1972 Int Soc Sci J 429 fn 1)

Milmo 1993 New L J 1182

Milmo Patrick “The new law of privacy” 1993 New Law Journal 1182–1183

Mischke 2003 CLL 71

Mischke Carl “Workplace privacy, e-mail interception and the law: does new legislation

limit employers’ right to read e-mail?” 2003 Contemporary Labour Law 71–80

Mogg 1994 (Nov/Dec) TDR 29

Mogg John F “Privacy protection in the information society” 1994 (Nov / Dec) Transna-

tional Data & Communications Report 29–32

Mostert Reklamebeeld

Mostert Frederik Willem Grondslae van die reg op die reklamebeeld (1985)

Mowery 1998 U Cin LR 697

Mowery Grace-Marie “A patient’s right of privacy in computerized pharmacy

records”1998 University of Cincinnati Law Review 697–746

Mullock & Leigh-Pollitt Data Protection Act explained

Bibliography 760

Mullock James & Leigh-Pollitt Piers The Data Protection Act explained (1999)

Mutsaers 1998 (3) Priv & Inf 109

Mutsaers Luc “De gemeentelijke basisadministratie: verleden, heden en toekomst” 1998 (3)

Privacy & Informatie 109

N

Nabben & van de Luytgaarden De ultieme vrijheid

Nabben PFP & van de Luytgaarden HJLM De ultieme vrijheid: een rechtstheoretische

analyse van het recht op privacy (1996)

Naidoo 2001 (Feb) De Rebus 14

Naidoo Melanie “A public nuisance? (Coping with the Promotion of Access to Information

Act)” 2001 (Feb) De Rebus 14–16

Neethling 1971 THRHR 240

Neethling J “Enkele gedagtes oor die juridiese aard en inhoud van menseregte en funda-

mentele vryhede” 1971 Tydskrif vir Hedendaagse Romeins-Hollandse Reg / Journal of

Contemporary Roman-Dutch Law 240–249

Neethling 1976 THRHR 121

Neethling J “Grondslag vir die erkenning van ‘n selfstandige persoonlikheidsreg op privaat-

heid in die Suid-Afrikaanse Reg”1976 Tydskrif vir Hedendaagse Romeins-Hollandse

Reg / Journal of Contemporary Roman-Dutch Law 121–128

Neethling 1980 THRHR 141

Neethling J “Die kredietburowese en databeskerming” 1980 Tydskrif vir Hedendaagse

Romeins-Hollandse Reg / Journal of Contemporary Roman-Dutch Law 141–155

Bibliography 761

Neethling 1992 (1) Codicillus 4

Neethling J “Computers and private-law legal remedies for the protection of privacy, trade

secrets, patents and copyright” 1992 (1) Codicillus 4–18

Neethling 1993 THRHR 704

Neethling J “Die reg op privaatheid: regspersone, onregmatigheid en die openbare inlig-

tingsbelang– Financial Mail (Pty) Ltd v Sage Holdings 1993 2 SA 451 (A)” 1993 Tydskrif

vir Hedendaagse Romeins-Hollandse Reg / Journal of Contemporary Roman-Dutch

Law 704–708

Neethling 1996 THRHR 528

Neethling J “Die reg op privaatheid, die pers en artikel 12 van die Wet op Egskeiding 70

van 1979 – National Media v Jooste 1996 3 SA 262 (A)” 1996 Tydskrif vir Hedendaag-

se Romeins-Hollandse Reg / Journal of Contemporary Roman-Dutch Law 528–533

Neethling 1997 THRHR 137

Neethling J “Die reg op privaatheid en die konstitusionele hof: die noodsaaklikheid vir dui-

delike begripsvorming” 1997 Tydskrif vir Hedendaagse Romeins-Hollandse Reg /

Journal of Contemporary Roman-Dutch Law 137–143

Neethling 2000 TSAR 761

Neethling J “Privaatheidsbeskerming: die vertroulike verhouding tussen die misdaadberig-

gewer en die polisie” 2000 Tydskrif vir die Suid-Afrikaanse Reg / Journal of South

African Law 761–765

Neethling 2001 THRHR 131

Neethling J “Deelnemende elektroniese waarneming as dreigend-onregmatige privaatheid-

skending: Tap Wine Trading CC v Cape Classics Wines (Western Cape) CC 1999 4 SA

194 (K)” 2001 Tydskrif vir Hedendaagse Romeins-Hollandse Reg / Journal of

Bibliography 762

Contemporary Roman-Dutch Law 131–135

Neethling 2002 SALJ 700

Neethling J “The Constitutional Court gives the green light to the common law of

defamation” 2002 South African Law Journal 700–708

Neethling 2002 THRHR 260

Neethling J “Nalatigheid as aanspreeklikheidsvereiste vir die actio iniuriarum by laster:

Marais v Groenewald 2001 1 SA 634 (T)” 2002 Tydskrif vir Hedendaagse Romeins-

Hollandse Reg / Journal of Contemporary Roman-Dutch Law 260–265

Neethling 2002 THRHR 574

Neethling J “Aanspreeklikheid vir ‘nuwe’ risiko’s: moontlikhede en beperkinge van die

Suid-Afrikaanse deliktereg” 2002 Tydskrif vir Hedendaagse Romeins-Hollandse Reg /

Journal of Contemporary Roman-Dutch Law 574–592

Neethling “Databeskerming”

Neethling J “Databeskerming: motivering en riglyne vir wetgewing in Suid-Afrika” 105–131

in Huldigingsbundel vir WA Joubert Strauss SA (ed) (1988)

Neethling Persoonlikheidsreg

Neethling J Persoonlikheidsreg (1998)

Neethling Privaatheid

Neethling J Die Reg op privaatheid (1976)

Neethling “Privaatheid en universiteite”

Neethling J “Die reg op privaatheid en universiteite” 125–143 in Nihil Obstat: feesbundel

vir WJ Hosten / Essays in honour of WJ Hosten Van Wyk CW (ed) (1996)

Bibliography 763

Neethling & Potgieter 1991 THRHR 120

Neethling J & Potgieter JM “Persoonlikheidsregte van ‘n regspersoon: Dhlomo v Natal

Newspapers (Pty) Ltd 1989 1 SA 945 (A); Caxton Ltd v Reeva Forman (Pty) Ltd 1990 3

SA 547 (A); Boka Enterprises (Pvt) Ltd v Manatse 1990 3 SA 626 (ZHC)” 1991

Tydskrif vir Hedendaagse Romeins-Hollandse Reg / Journal of Contemporary Roman-

Dutch Law 120–127

Neethling & Potgieter 1994 THRHR 513

Neethling J & Potgieter JM “Laster: die bewyslas, media-privilegie en die invloed van die

nuwe grondwet” 1994 Tydskrif vir Hedendaagse Romeins-Hollandse Reg / Journal of

Contemporary Roman-Dutch Law 513–519

Neethling & Potgieter 1994 THRHR 703

Neethling J & Potgieter JM “Aspekte van die reg op privaatheid: Jooste v National Media

Ltd 1994 2 SA 634 (K); Motor Industry Fund Administrators (Pty) Ltd v Janit 1994 3 SA

56 (W)” 1994 Tydskrif vir Hedendaagse Romeins-Hollandse Reg / Journal of

Contemporary Roman-Dutch Law 703–710

Neethling & Potgieter 1995 THRHR 709

Neethling J & Potgieter JM “Aspekte van die lasterreg in die lig van die Grondwet” 1995

Tydskrif vir Hedendaagse Romeins-Hollandse Reg / Journal of Contemporary Roman-

Dutch Law 709–715

Neethling & Potgieter 1996 THRHR 706

Neethling J & Potgieter JM “Regsonsekerheid in die lasterreg in die lig van die grondwet -

die pad vorentoe?” 1996 Tydskrif vir Hedendaagse Romeins-Hollandse Reg /Journal of

Contemporary Roman-Dutch Law 706–711

Neethling & Potgieter 1999 THRHR 442

Bibliography 764

Neethling J & Potgieter JM “Die lasterreg en die media: strikte aanspreeklikheid word ten

gunste van nalatigheid verwerp en ‘n verweer van mediaprivilegie gevestig: National Media

Ltd v Bogoshi 1998 4 SA 1196 (HHA)” 1999 Tydskrif vir Hedendaagse Romeins-

Hollandse Reg / Journal of Contemporary Roman-Dutch Law 442–450

Neethling & Potgieter 2002 THRHR 265

Neethling J & Potgieter JM “Toepassing van die Grondwet op die deliktereg: Carmichele v

Minister of Safety and Security (Centre for Applied Legal Studies Intervening) 2001 4 SA

938 (CC)” 2002 Tydskrif vir Hedendaagse Romeins-Hollandse Reg / Journal of

Contemporary Roman-Dutch Law 265–273

Neethling, Potgieter & Visser Delict

Neethling J, Potgieter JM & Visser PJ (translated by Knobel JC) Law of Delict (2001)

Neethling, Potgieter & Visser Neethling’s Law of Personality

Neethling J, Potgieter JM & Visser PJ Neethling’s Law of Personality (1996)

Neethling & Van Aswegen 1989 THRHR 607

Neethling J & Van Aswegen Annél “Aspekte van aanspreeklikheid weens suiwer ekono-

miese verlies: bemoeiing met ‘n kontraktuele verhouding en die rol van beleidsoor-

wegings”1989 Tydskrif vir Hedendaagse Romeins-Hollandse Reg / Journal of

Contemporary Roman-Dutch Law 607–611

Neill “Privacy”

Neill Brian “Privacy: a challenge for the next century” 1–28 in Protecting privacy

Markesinis Basil S (ed) (1999)

Neisingh & de Houwer Transborder flow of personal data

Neisingh Andries W & de Houwer Joke Transborder flow of personal data: a survey of

Bibliography 765

some legal restrictions on the free flow of data across national borders (1987)

New York Times 27 February 1988

Nieuwenhuis et al Nieuw burgerlijk wetboek

Nieuwenhuis JH, Valk WL & Stolker CJJM Nieuw burgerlijk wetboek: tekst en

commentaar (1990)

Nouwt 1998 (3) Priv & Inf 100

Nouwt Sjaak “Een model van de Wet Bescherming Persoonsgegevens (deel 2): over

reikwijdte, verantwoording en procedures” 1998 (3) Privacy & Informatie 100–108

Nugter Transborder flow of personal data

Nugter, ACM Transborder flow of personal data within the EC (1990)

O

Oliver & Von Borries 1984 Pub L 199

Oliver Peter & Von Borries Reimer “Data protection and censuses under the West German

constitution”1984 Public Law 199–206

O’Reilly Federal information

O’Reilly James T Federal information disclosure vol 2 (1990)

Overkleeft-Verburg De Wet Persoonsregistraties

Overkleeft-Verburg G De Wet Persoonsregistraties: norm, toepassing en evaluatie

(1995)

P

Bibliography 766

Paddock 1998 Colorado L’yer 95

Paddock John R “New Limitations and requirements in reviewing applicants’ and

employees’ credit records” 1998 Colorado Lawyer 95–98

Papapavlou “Latest developments”

Papapavlou G “Latest developments concerning the EC draft data protection Directive“

29–57 in Recent developments in data privacy law Dumortier J (ed) Bing J, Korff D,

Nugter AM, Papapavlou G, Robben F, Simitis S (1992)

Parent 1983 L & Phil 305

Parent WA “A new definition of privacy for the law” 1983 Law & Philosophy 305–338

Pauw Persoonlikheidskrenking en skuld

Pauw PC Persoonlikheidskrenking en skuld in die Suid-Afrikaanse privaatreg - ‘n

regshistoriese en regsvergelykende ondersoek (1976)

Pearce & Platten 1999 Fordham Int LJ 2024

Pearce Graham & Platten Nicholas “Orchestrating transatlantic approaches to personal

data protection: a European perspective” 1999 Fordham International Law Journal

2024–2051

Peck 1984 Hofstra LR 893

Peck Robert S “Extending the constitutional right to privacy in the new technological age”

1984 Hofstra Law Review 893–912

Petrocelli Low profile

Petrocelli William Low profile: how to avoid the privacy invaders (1981)

Philips 1997 U New Brunswick LJ 127

Bibliography 767

Philips Bruce “Privacy in a ‘survellance society’” 1997 University of New Brunswick Law

Journal 127–138

Pieterse 2002 SALJ 27

Pieterse Marius “The right to be free from public or private violence after Carmichele” 2002

South African Law Journal 27–39

Pimstone 1999 SAJHR 2

Pimstone Gideon “Going quietly about their business: access to corporate information and

the Open Democracy Bill” 1999 South African Journal on Human Rights 2–24

Pinegar 1984 Int Bus L’yer 183

Pinegar Kevin R “Privacy protection acts: privacy protection or economic protectionism?”

1984 International Business Lawyer 183–188

Pounder 1998 Computers & Sec 124

Pounder Chris “Security and the new data protection law” 1998 Computers & Security

124–128

Pounder & Kosten 1995 (21) Data Protection News 44

Pounder Chris & Kosten Freddy 1995 (21) Data Protection News 44

Price “UK data protection law”

Price David “The emergence of a UK data protection law” 131–135 in Yearbook of Law

Computers & Technology Arnold C (ed) (1984)

Prins 1998 (1) Priv & Inf 11

Prins Corien “De bescherming van persoonsgegevens: de betrokkene betrokken” 1998 (1)

Privacy & Informatie 11–14

Bibliography 768

Prins et al In het licht van de Wet Persoonsregistraties

Prins J, Van de Donk WBHJ, Van Duivenboden HPM, Ten Have K, Nouwt J, Vorselaars

HACM & Zouridis S In het licht van de Wet Persoonsregistraties: zon, maan of ster?

(1995)

Prosser 1960 Cal LR 383

Prosser William “Privacy” 1960 California Law Review 383–423

R

Raab & Bennett 1994 Pub Adm 95

Raab Charles D & Bennett Colin J “Protecting privacy across borders: European policies

and prospects” 1994 Public Administration 95–112

Rasor 1986 J Mar LR 941

Rasor Paul B “Privacy implications of consumer credit protection laws” 1986 John

Marshall Law Review 941–957

Rautenbach 2001 TSAR 115

Rautenbach IM “The conduct and the interests protected by the right to privacy in section

14 of the Constitution” 2001 Tydskrif vir die Suid-Afrikaanse Reg / Journal of South

African Law 115–123

Reed & Angel Computer law

Reed Chris & Angel John (ed) Computer law (2000)

Regan Legislating privacy

Regan Priscilla M Legislating privacy: technology, social values, and public policy

(1995)

Bibliography 769

Regan “American business and the data protection Directive”

Regan Priscilla M “American business and the European data protection Directive: lobbying

strategies and tactics” 199–216 in Visions of privacy: policy choices for the digital age

Bennett Colin J & Grant Rebecca (eds) (1999)

Reidenberg 1992 Fed Comm LJ 195

Reidenberg Joel R “Privacy in the information economy: a fortress or frontier for individual

rights” 1992 Federal Communications Law Journal 195–243

Reidenberg 1995 Iowa LR 497

Reidenberg Joel R “Setting standards for fair information practice in the US private sector”

1995 Iowa Law Review 497–551

Reidenberg & Gamet-Pol 1995 Wake Forest LR 105

Reidenberg Joel & Gamet-Pol Francoise J “The fundamental role of privacy and confidence

in the network” 1995 Wake Forest Law Review 105–125

Restatement of Torts

American Law Institute Restatement of the law of torts s 867 (1938)

Restatement (Second) of Torts

American Law Institute Restatement of the law of torts (second) s 652B – s 625E

(1977)

Riedel 1984 Human Rights LJ 67

Riedel Eibe H “New bearings in German data protection: census Act 1983 partially uncon-

stitutional” 1984 Human Rights Law Journal 67–75

Rogers Winfield & Jolowicz on torts

Bibliography 770

Rogers WVH Winfield & Jolowicz on torts (1989)

Rogovin 1986 Ann Surv Am L 587

Rogovin Michael “Privacy of financial records”1986 Annual Survey of American Law

587–607

Roos 1990 TSAR 264

Roos Anneliese “Data privacy: the American experience” 1990 Tydskrif vir die

Suid-Afrikaanse Reg / Journal of South African Law 264–278

Roos 1990 TSAR 477

Roos Anneliese “Data privacy: the American experience (continued)” 1990 Tydskrif vir

die Suid-Afrikaanse Reg / Journal of South African Law 477–490

Roos 1998 THRHR 497

Roos Anneliese “Data protection provisions in the Open Democracy Bill, 1997” 1998

Tydskrif vir Hedendaagse Romeins-Hollandse Reg / Journal of Contemporary Roman-

Dutch Law 497–506

Roos “Data protection”

Roos Anneliese “Data protection for South Africa: expectations created by the Open

Democracy Bill, 1988” in The constitutional right of access to information (Report of

seminar held on 4 September 2000 at St George’s Hotel, Rietvlei Dam, Pretoria) Konrad

Adenauer Stiftung Seminar Report no 5 (2001)

Available from<<http://www.kas.org.za/Publications.asp>> [Accessed October 2003]

Rosenbaum 1992 Jurimetrics J 1

Rosenbaum Joseph I “The European Commission’s draft Directive on data protection”

1992 Jurimetrics Journal 1–12

Bibliography 771

Rotenberg 1991 Gov Inf Q 79

Rotenberg Marc 1991 “In support of a data protection board in the United States” 1991

Government Information Quarterly 79–93

Rotenberg The privacy law sourcebook 1999

Rotenberg Marc The privacy law sourcebook 1999: United States law, international

law, and recent developments (1999)

Rothstein Genetic secrets

Rothstein Mark A (ed) Genetic secrets: protecting privacy and confidentiality in the

genetic era (1997)

Rowland & Macdonald Information technology law

Rowland Diane & Macdonald Elizabeth Information technology law (2000)

Rubenfeld 1989 Harv LR 737

Rubenfeld Jed “The right of privacy” 1989 Harvard Law Review 737–807

Rubin Private rights

Rubin Michael Rogers Private rights, public wrongs: the computer and personal

privacy (1988)

Rumbelow 1984 Int Bus L’yer 153

Rumbelow Clive “Privacy and transborder data flow in the UK and Europe” 1984

International Business Lawyer 153–157

S

Samuels & Pearce 1984 Solicitor’s J 587

Bibliography 772

Samuels Alec & Pearce Penelope “Data Protection Act 1984” 1984 Solicitor’s Journal

587–590

Savage & Edwards 1985 (6) Computer/L J 143

Savage Nigel & Edwards Chris “The legislative control of data processing – the British

approach” 1985 Computer/Law Journal 143–156

Savage & Edwards Data Protection Act

Savage Nigel & Edwards Chris A guide to the Data Protection Act (1985)

Savino & Smirti 2000 Banking LJ 7

Savino William M & Smirti Stephan J “Banks must begin to develop forms, policies and

practices to comply with federal privacy regulations” 2000 Banking Law Journal 7–24

Schlundt 1985 Inf Age 67

Schlundt Virgina “Transborder data flow and its importance in the international arena”1985

Information Age 67–70

Schreuders 1998 (2) Priv & Inf 52

Schreuders Eric “Een model van de Wet Bescherming Persoonsgegevens” 1998 (2)

Privacy & Informatie” 52–59

Schuijt Onrechtmatige daad VII

Schuijt GAI Onrechtmatige daad (part VII: aantasting eer en goede naam en andere

aantasting van de persoon) (1995)

Schulze 1994 THRHR 75

Schulze WG “The LOA life register – a snap survey of possible legal pitfalls” 1994

Tydskrif vir Hedendaagse Romeins-Hollandse Reg / Journal of Contemporary Roman-

Bibliography 773

Dutch Law 75–86

Schwartz 1989 Am J Comp L 675

Schwartz Paul M “The computer in German and American constitutional law: towards an

American right of informational self-determination” 1989 American Journal of

Comparative Law 675–701

Schwartz 1991 Am J Comp L 618

Schwartz Paul M “Book review – protecting privacy in surveillance societies: the Federal

Republic of Germany, Sweden, France, Canada and the United States” 1991 American

Journal of Comparative Law 618–625

Schwartz 1992 Hastings LJ 1321

Schwartz Paul M “Data processing and government administration: the failure of the

American legal response to the computer” 1992 Hastings Law Journal 1321–1389

Schwartz 1995 Iowa LR 471

Schwartz Paul M “European data protection law and restrictions on international data

flows” 1995 Iowa Law Review 471–496

Schwartz 1995 Iowa LR 553

Schwartz Paul M “Privacy and participation: personal information and public sector

regulation in the United States” 1995 Iowa Law Review 553–618

Schwartz 1995 Iowa LR 683

Schwartz Paul M “Panel discussion” 1995 Iowa Law Review 683

Schwartz 1995 Vand LR 295

Schwartz Paul M “The protection of privacy in health care reform” 1995 Vanderbilt Law

Bibliography 774

Review 295–347

Schwartz 1997 Tex LR 1

Schwartz Paul M “Privacy and the economics of personal health care information” 1997

Texas Law Review 1–75

Schwartz 1999 Vand LR 1609

Schwartz Paul M “Privacy and democracy in cyberspace” 1999 Vanderbilt Law Review

1609–1702

Schwartz 2000 Stanford LR 1559

Schwartz Paul M “Free speech vs information privacy: Eugene Volokh’s First Amendment

jurisprudence” 2000 Stanford Law Review 1559–1572

Schwartz & Reidenberg Data privacy law

Schwartz Paul M & Reidenberg Joel R Data privacy law: a study of United States data

protection (1996)

Scott 2001 THRHR 681

Scott Johan “Deliktuele aanspreeklikheid vir veroorsaaking van suiwer ekonomiese verlies:

die deur word wyer oopgemaak – Dersley v Minister van Veiligheid en Sekuriteit” 2001

Tydskrif vir Hedendaagse Romeins-Hollandse Reg / Journal of Contemporary Roman-

Dutch Law 681–692

Seipel “Computers and information power”

Seipel Peter “The right to know: computers and information power” 7–43 in Nordic studies

in information technology law Blume Peter (ed) (1991)

Selmer “Data protection policy”

Bibliography 775

Selmer Knut S “Data protection policy” 12–28 in From data protection to knowledge

machines – the study of law and informatics Seipel P (ed) (1990)

Seng 1985 J Mar LR 871

Seng Michael P “The Constitution and informational privacy, or how so-called

conservatives countenance governmental intrusions into a person’s private affairs” 1985

John Marshall Law Review 871–893

Sentrop Privacy-bescherming

Sentrop JW Privacy-bescherming in Nederland: schets van een ontwikkeling (1985)

Shalala 1998 Health Matrix 223

Shalala Donna E “Health care information and privacy” 1998 Health Matrix 223–232

Shattuck 1984 Hastings LJ 991

Shattuck John “In the shadow of 1984: national identification systems, computer matching

and privacy in the United States” 1984 Hastings Law Journal 991–1005

Sherland 1984 Wash LR 401

Sherland Barbara C “The functions of consumer credit reporting agencies under the Fair

Credit Reporting Act – Bryant v TRW Inc 689 F2d 72 (6th Cir 1982)” 1984 Washington

Law Review 401–416

Shiraz 1995 Int J Refugee L 179

Shiraz Mahmood “The Schengen Convention: an inequitable data protection regime” 1995

International Journal of Refugee Law 179–200

Sieber “Emergence of information law”

Sieber Ulrich “The emergence of information law: object and characteristics of a new legal

Bibliography 776

area” 1–29 in Law, information and information technology Lederman Eli & Shapira

Ron (eds) (2001)

Sieghart Privacy and computers

Sieghart Paul Privacy and computers (1976)

Sieghart “Protection of personal data” 224

Sieghart Paul “The protection of personal data: lacuna and overlap” 224–229 in Transbor-

der data flows and the protection of privacy (1979)

Simitis 1981 Am J Comp L 583

Simitis Spiros “Data protection and research: a case study of control” 1981 American

Journal of Comparative Law 583–605

Simitis 1984 NJW 398

Simitis Spiros “Die informationelle Selbstbestimmung – Grundbedingung einer verfas-

sungskonformen Informationsordnung”1984 Neue Juristische Wochenschrift 398–405

Simitis 1985 TDR 95

Simitis Spiros “Data protection: new developments, new challenges” 1985 Transnational

Data Report 95–96

Simitis 1987 U Pa LR 707

Simitis Spiros “Reviewing privacy in an information society” 1987 University of

Pennsylvania Law Review 707–746

Simitis 1995 Iowa LR 445

Simitis Spiros “From the market to the polis: the EU Directive on the protection of personal

data” 1995 Iowa Law Review 445–469

Bibliography 777

Simitis “New trends”

Simitis Spiros “New trends in national and international data protection law” 17–28 in

Recent developments in data privacy law – Belgium’s Data Protection Bill & the

European draft Directive Dumortier J (ed), Bing J, Korff D, Nugter AM, Papapavlou G,

Robben F, Simitis S (1992)

Simons Privacy in the computer age

Simons GL Privacy in the computer age (1982)

Singh “Privacy and the media”

Singh Rabinder “Privacy and the media: the impact of the Human Rights Bill” 170–190 in

Protecting privacy Markesinis Basil S (ed) (1999)

Singleton 1995 Computer L & Prac 140

Singleton Susan E “The data protection Directive” 1995 Tolley’s Computer Law &

Practice 140–144

Singleton Data protection

Singleton Susan E Data protection – the new law (1998)

Slee 1999 Inf & Comm Tech L 71

Slee David “The Data Protection Bill 1988: a comparative examination” 1999 Information

& Communications Technology Law 71–109

Sloan Law of privacy

Sloan Irving J Law of privacy rights in a technological society (1986)

Smith Compilation

Smith Robert Ellis Compilation of state & federal privacy laws (1992)

Bibliography 778

Snyman Criminal law

Snyman CR Criminal law (1995)

Solove “Identity theft”

Solove Daniel J “Identity theft, privacy, and the architecture of vulnerability” 303–353 in

Enforcing privacy rights symposium (2002) (Symposium hosted by Samuelson Law,

Technology and Public Policy Clinic Boalt Hall School of Law UC at Berkeley, Institute for

Law and Economic Policy & Hastings Law Journal, 15 & 16 Nov 2002, San Francisco)

Soma & Wehmhoefer 1983 Denver LJ 449

Soma John T & Wehmhoefer A “A legal and technical assessment of the effect of

computers on privacy” 1983 Denver Law Journal 449–483

Southard 1989 Computer/LJ 359

Southard C Dennis “Individual privacy and governmental efficiency: technology’s effect on

government’s ability to gather, store, and distribute information” 1989 Computer/Law

Journal 359–374

Stanton 1991 Hastings Con LQ 391

Stanton Martha Goldman “Florida Star v BJF: the wrongful obliteration of the tort of

invasion of privacy through the publication of private facts” 1991 Hastings Constitutional

Law Quarterly 391–416

Stassen & Stassen 2001 (Jun) De Rebus 49

Stassen Pieter & Stassen Koos “Toegang tot inligting” 2001 (Jun) De Rebus 49–50

Sterling Data Protection Act

Sterling, JAL The Data Protection Act 1984: a guide to the new legislation (1985)

Bibliography 779

Strauss et al Mediareg

Strauss SA, Strydom MJ & Van der Walt JC Mediareg (4th ed by Klopper HB) (1987)

Strong 1988 Softw LJ 391

Strong Donsia Renee “Computer Matching and Privacy Protection Act 1988: necessary

relief from the erosion of the Privacy Act of 1974” 1988 Software Law Journal 391–422

Swire & Litan None of your business

Swire Peter P & Litan Robert E None of your business – world data flows, electronic

commerce, and the European privacy Directive (1998)

T

Time Magazine 31 August 2003

Tribe Constitutional law

Tribe Laurence H American Constitutional law (1988)

Trubow 1985 J Mar LR 815

Trubow George B “Information law overview” 1985 John Marshall Law Review

815–828

Trubow 1992 NW J Int L & Bus 159

Trubow George B “The European harmonization of data protection laws threatens US

participation in trans border data flow” 1992 Northwestern Journal of International Law

and Business 159–176

Trubow “Information privacy”

Trubow George B “The development and status of ‘information privacy’ law and policy in

Bibliography 780

the United States” 1–9 in Invited papers on privacy: law, ethics, and technology

(Presented at the National Symposium on Personal Privacy and Information Technology

held in Washington DC on 4–7 October 1981) (1982)

Turkington 1997 JL Med & Ethics 113

Turkington Richard C “Medical record confidentiality law, scientific research, and data

collection in the information age” 1997 Journal of Law, Medicine & Ethics 113–129

Turkington & Allen Privacy law

Turkington Richard C & Allen Anita Privacy law: cases and materials (1999)

Turn Transborder data flows

Turn, Rein (ed) Transborder data flows: concerns in privacy protection and free flow

of information (vol 1) (1979)

U

Uglow 1998 Crim LR 235–245

Uglow Steve “Criminal records under the Police Act 1997” 1998 Criminal Law Review

235–245

Ustaran & Johnson 1997 (3) JILT 6

Ustaran Eduardo & Johnson Martineau “Data protection regulation: the challenge ahead”

1997 (3) Journal of Information Law and Technology 6

Available from <<http://elj.warwick.ac.uk/jilt/dp/97_3ust/>> [Accessed Oct 2003]

V

Van Aswegen 1995 SAJHR 50

Bibliography 781

Van Aswegen Annél “The implications of a Bill of Rights for the law of contract and

delict”1995 South African Journal on Human Rights 50–69

Van Aswegen 1993 THRHR 171

Van Aswegen Annél “Policy considerations in the law of delict” 1993 Tydskrif vir

Hedendaagse Romeins-Hollandse Reg / Journal of Contemporary Roman-Dutch Law

171–195

Van Aswegen Sameloop

Van Aswegen Annél Die sameloop van eise om skadevergoeding uit kontrakbreuk en

delik (1991)

Van der Merwe Computers and the law

Van der Merwe Dana Computers and the law (2000)

Van der Merwe & Olivier Onregmatige daad

Van der Merwe NJ & Olivier PJJ Die onregmatige daad in die Suid-Afrikaanse reg

(1989)

Van der Walt 1968 CILSA 49

Van der Walt JC “Strict liability in the South African law of delict” 1968 Comparative

International Law Journal of South Africa 49–83

Van der Walt 1993 THRHR 558

Van der Walt JC “‘Duy of care’: tendense in die Suid-Afrikaanse en Engelse regspraak”

1993 Tydskrif vir Hedendaagse Romeins-Hollandse Reg / Journal of Contemporary

Roman-Dutch Law 558–568

Van der Walt Risiko-aanspreeklikheid

Bibliography 782

Van der Walt JC Risiko-aanspreeklikheid uit onregmatige daad (1974)

Van der Walt 1998 TSAR 198

Van der Walt JWG “Freedom of expression and defamation: a reflection on recent

developments” 1998 Tydskrif vir die Suid-Afrikaanse Reg / Journal of South African

Law 198–221

Van der Walt Sommeskadeleer

Van der Walt CFC Die sommeskadeleer en die “once and for all”-reël (1977)

Van der Walt & Midgley Delict

Van der Walt JC & Midgley JR Delict: principles and cases (Vol 1: principles) (1997)

Van Dokkum 1996 De Rebus 748

Van Dokkum Neil “Should doctor-patient communications be privileged?” 1996 De Rebus

748–751

Van Heerden & Neethling Unalwful competition

Van Heerden HJO & Neethling J Unalwful competition (1995)

Van Wyk 1996 THRHR 626

Van Wyk CW “HIV of Vigs op doodsertifikate” 1996 Tydskrif vir Hedendaagse

Romeins-Hollandse Reg / Journal of Contemporary Roman-Dutch Law 626–635

Venter et al Regsnavorsing

Venter F, Van der Walt CFC, Van der Walt AJ & Pienaar GJ Regsnavorsing – metode

en publikasie 1990

Verhey Horizontale werking van grondrechten

Bibliography 783

Verhey LFM Horizontale werking van grondrechten, in besonder van het recht op

privacy (1992)

Visser 1982 THRHR 168

Visser PJ “Nalatige krenking van die reg op die fama” 1982 Tydskrif vir Hedendaagse

Romeins-Hollandse Reg / Journal of Contemporary Roman-Dutch Law 168–174

Visser 2002 THRHR 254

Visser PJ “Some principles regarding the ‘requester’ of access to a record and related

issues in terms of the Promotion of Access to Information Act 2 of 2000” 2002 Tydskrif

vir Hedendaagse Romeins-Hollandse Reg / Journal of Contemporary Roman-Dutch

Law 254–259

Visser et al Damages

Visser PJ, Potgieter JM, Steynberg Loma & Floyd TB Visser & Potgieter’s law of

damages (2003)

Volokh 2000 Stanford LR 1049

Volokh Eugene “Freedom of speech and information privacy: the troubling implications of a

right to stop people from speaking about you” 2000 Stanford Law Review 1049–1124

Vorstenbosch “Privacy and autonomy”

Vorstenbosch Jan “Privacy and autonomy: conflicting theories” 65–78 in Privacy disputed

Ippel Pieter, de Heij Guus & Crouwers Bart (eds) (1995)

Vunderink “Openbaarheid versus privacy”

Vunderink PAM “Openbaarheid versus privacy” 205–218 in Privacy in het informatie-

tijdperk Nouwt Sjaak & Voermans Wim (eds) (1996)

Bibliography 784

W

Wacks Personal information

Wacks Raymond Personal information: privacy and the law (1989)

Wacks Privacy (vol I)

Wacks Raymond Privacy Volume I: the concept of privacy (1993)

Wacks Privacy (vol II)

Wacks Raymond Privacy Volume II: privacy and the law (1993)

Wacks “Privacy reconceived”

Wacks Raymond “Privacy reconceived: protecting personal information in a digital world”

75–97 in Law, information and information technology Lederman Eli & Shapira Ron

(eds) (2001)

Walden “Data protection”

Walden Ian “Data protection” 442–471 in Computer law Reed Chris & Angel John (eds)

(1995)

Warner & Stone Data bank society

Warner Malcolm & Stone Michael The data bank society – organizations, computers

and social freedom (1970)

Warren & Brandeis 1890 Harv LR 193

Warren Samuel & Brandeis Louis “The Right to Privacy” 1890 Harvard Law Review

193–220

Weichert 1992 Computer und Recht 738

Bibliography 785

Weichert Thilo “Neue Vervassungsregelungen zur informationellen Selbstbestimmung” 1992

Computer und Recht 738–745

Wessels 2002 (Mar) De Rebus 28

Wessels Jakkie “Failed? Accessing your exam paper” 2002 (Mar) De Rebus 28–29, 32

Westin Privacy and freedom

Westin Alan F Privacy and freedom (1970)

White 1998 SAJHR 65

White Justine “Open Democracy: has the window of opportunity closed?” 1998 South

African Journal on Human Rights 65–47

Williams 1997 De Rebus 563

Williams Des “Access to information in the new South Africa” 1997 De Rebus 563–565

Williams 1982 Annals of Air & Space L 447

Williams Sylvia Maureen “Teleinformatics, the protection of privacy and the law” 1982

Annals of Air & Space Law 447–468

Wise 1991 (Mar/Apr) TDR 41

Wise Bob “US Data Protection Board needed” 1991 (Mar/Apr) Transnational Data &

Communications Report 41–44

Woodward 1997 JL Med & Ethics 88

Woodward Beverly “Medical record confidentiality and data collection: current dilemmas”

1997 Journal of Law , Medicine and Ethics 88–97

Bibliography 786

Y

Young Privacy

Young John B (ed) Privacy 1978

Z

Zimmerman 1989 NYULR 364

Zimmerman DL “False light invasion of privacy: the light that failed” 1989 New York

University Law Review 364–543

DOCUMENTS ISSUED BY INTERNATIONAL ORGANISATIONS OR DATA

PROTECTION AUTHORITIES: CONVENTIONS, DIRECTIVES, REPORTS ETC

COUNCIL OF EUROPE

Convention for the Protection of Human Rights and Fundamental Freedoms (1950)

Convention for the Protection of Individuals with regard to Automatic Processing of Data (1981)

(Convention No 108/1981) (with Explanatory Report)

Recommendation on Data Protection and Freedom of Information Recommendation 1037 (1986)

Resolution 73(22) on the Protection of the Privacy of Individuals Vis-à-vis Electronic Data Banks in

the Private Sector (1973 )

Resolution 74(29) on the Protection of the Privacy of Individuals Vis-à-vis Electronic Data Banks in

the Public Sector (1974)

Bibliography 787

EUROPEAN COMMUNITY

Community Policy on Data Processing SEC(73) 4300 final (1973 )

Recommendation 81/679 981 Official Journal L 246 (29-8-81)

Resolution on the Protection of the Rights of the Individual in the face of Technological

Developments in Data Processing 1976 Official Journal C 100/27

Resolution on the Protection of the Rights of the Individual in the face of Technological

Developments in Data Processing 1982 Official Journal C 87/39

Resolution on the Protection of the Rights of the Individual in the Face of Technological

Developments in Data Processing1982 Official Journal C 87/39

EUROPEAN UNION

Commission of the European Communities Proposal for a Council Directive concerning the

Protection of Individuals in relation to the Processing of Personal Data COM (90) final - SYN 287

Brussels 13 September 1990

Decision in the Field of Information Security 1990 Official Journal C 277/18

EU Directive on data protection

European Union Directive on the Protection of Individuals with regard to the Processing of

Personal Data and on the Free Movement of such Data Dir 95/46/EC 1995 Official

Journal L 281/ 31

Bibliography 788

EU Directive on privacy and electronic communications

European Union Directive Concerning the Processing of Personal Data and the Protection

of Privacy in the Electronic Communications Sector Dir 2002/58/EC Official Journal L

201 of 31 July 2002

EU Directive on privacy in the telecommunications sector

European Union Directive Concerning the Protection of Personal Data and the Protection

of Privacy in the Telecommunications Sector Dir 97/66/EC 1998 Official Journal L 24/1

Schengen Agreement (1985)

DATA PROTECTION WORKING PARTY DOCUMENTS

Data Protection Working Party Data protection law and the media

European Union: Data Protection Working Party Data protection law and the media

(1997)

Data Protection Working Party First annual report

European Union: Data Protection Working Party First annual report (1997)

Data Protection Working Party Judging industry self-regulation

European Union: Data Protection Working Party Working document: judging industry

self-regulation: when does it make a meaningful contribution to the level of data

protection in a third country? (1998)

Data protection Working Party Opinion 1/99 concerning the level of data protection in the

United States

European Union: Data Protection Working Party Opinion 1/99 concerning the level of

data protection in the united states and the ongoing discussions between the

Bibliography 789

European Commission and the United States Government (1999)

Data Protection Working Party Second annual report

European Union: Data Protection Working Party Second annual report (1998)

Data Protection Working Party Third annual report

European Union: Data Protection Working Party Third annual report (1999)

Data Protection Working Party Transfers of personal data to third countries

European Union: Data Protection Working Party Transfer of personal data to third

countries: applying article 25 and 26 of the EU data protection Directive (1998)

Data Protection Working Party Working document on the functioning of the Safe Harbor

Agreement

Data Protection Working Party Working document on the functioning of the Safe

Harbor Agreement (2002)

INTERNATIONAL WORKING GROUP ON DATA PROTECTION AND

TELECOMMUNICATIONS

Common Position on Data Protection and Search Engines on the Internet (1998)

Common Position on Public Accountability in Relation to Interception of Private Communications

(1998)

Common Position on Essentials for Privacy-enhancing Technologies (eg P3P) on the

WorldWideWeb (1998)

Common Position Relating to Reverse Directories (1998)

Bibliography 790

Common Statement on Cryptography (1997)

Report and Guidance on Data Protection and Privacy on the Internet (1996)

Report on Telecommunications and Privacy in Labour Relations (1989)

ORGANISATION FOR ECONOMIC COOPERATION AND DEVELOPMENT (OECD)

OECD Economic Surveys

Organisation for Economic Co-operation and Development Economic surveys 1994–-

1995 (1995)

OECD Guidelines

Organisation for Economic Co-operation and Development Guidelines on the Protection of

Privacy and Transborder Flows of Personal Data (1981)

OECD Guidelines Explanatory Memorandum

Organisation for Economic Co-operation and Development Guidelines on the Protection of

Privacy and Transborder Flows of Personal Data: Explanatory Memorandum (1981)

OECD Policy issues in data protection

Organisation for Economic Co-operation and Development (Seminar report) Policy issues

in data protection (1974)

OECD Transborder data flows and the protection of privacy

Organisation for Economic Co-operation and Development (Seminar report) Transborder

data flows and the protection of privacy (1979)

Bibliography 791

UNITED NATIONS

Guidelines for the Regulation of Computerized Personal Data Files (1990)

International Covenant on Civil and Political Rights (1966)

Universal Declaration of Human Rights (1948)

INDIVIDUAL COUNTRIES

South Africa

Joint Committee on Open Demoracy Bill Report

Ad hoc Joint Committee on Open Democracy Bill Report on the Open Democracy Bill

(2000)

Green Paper on Electronic Commerce for South Africa

Green Paper on Electronic Commerce for South Africa (Theme 2 “Building trust in the

electronic economy”)

Available from <<http://www.ecomm-debate.co.za/greenpaper/theme2.htm>> [Accessed

January 2003]

Netherlands

WBP Memorie van toelichting

Tweede Kamer der Staten-Generaal (vergaderjaar 1997–1998) Regels inzake de Bescher-

ming van Persoonsgegevens (Wet bescherming persoonsgegevens) Memorie van

Bibliography 792

toelichting (1998)

United Kingdom

a Home Office

Computers and privacy

UK Home Office Computers and privacy Cmnd 6353 (1975)

Computers: safeguards for privacy

UK Home Office Computers: safeguards for privacy Cmnd 6354 (1975)

Consultation Paper on the EC Data Protection Directive

UK Home Office Consultation Paper EC Data Protection Directive (95/46/EC) (1996)

Consultation Paper on Subordinate legislation: notification regulations

UK Home Office Consultation Paper Subordinate legislation: notification regulations

(1998)

Data protection: the Government’s proposals

UK Home Office Data Protection: the Government’s proposals Cmnd 8539 (1982)

Report of the Committee on Data Protection

UK Home Office Report of the Committee on Data Protection ( Lindop Committee)

(1978)

b House of Commons Library

Bibliography 793

House of Commons Library Research paper 98/48

House of Commons Library Research Paper 98/48 The Data Protection Bill [HL] Bill

158 of 1997-98 (1998)

c House of Lords

House of Lords Select Commitee Report on protection of personal data

House of Lords Select Commttee on the European Communities Report on protection of

personal data (1993)

d Data Potection Registrar

DPR 1998 Data protection law: latest update

Data Protection Registrar 1998 Data protection law: latest update

DPR Advice on new law

Data Protection Registrar Data Protection Directive in force: Data Protection

Registrar issues advice on new law (26 October 1998)

DPR Criminal disclosures

Data Protection Registrar Initial comments from the Data Protection Registrar:

criminal disclosures by the Commissioners staff (January 1998)

DPR Data Protection Act 1998

Data Protection Registrar Data Protection Act 1998: an introduction (1998 vers 1)

DPR Guidelines

Data Protection Registrar The Guidelines – third series November 1994 (1994)

Bibliography 794

DPR Our answers

Data Protection Registrar Consultation paper on the EC Data Protection Directive

(95/46/EC) – response of the DPR (July 1996)

DPR Questions to answers

Data Protection Registrar (UK) Questions to answers – the EU Directive and Data

Protection (April 1996)

DPR The eighth data protection principle and TBDF

Data Protection Registrar The eighth data protection principle and transborder data

flows (July 1999)

United States

IITF Options for Promoting Privacy on the National Information Infrastructure

Information Infrastructure Task Force (Privacy Working Group) Options for Promoting

Privacy on the National Information Infrastructure (1997)

National Council of Citizens in Education Children, parents, and school records (1974)

Privacy Commission Report

US Privacy Protection Study Commission Personal privacy in an information society

(1977)

US Dept of Health, Education, and Welfare Records, computers and the rights of citizens

US Department of Health, Education, and Welfare Records, computers and the rights of

citizens Report of the Secretary’s Advisory Committee on Automated Personal Data

Systems (1973)

Bibliography 795

US Dept of Justice Overview of the Privacy Act

US Department of Justice Office of Information and Privacy Overview of the Privacy Act

of 1974 (2002)

Available from <<http://www.usdoj.gov/opi.html>> [Accessed June 2003]

US Dept of Justice Privacy Act overview

US Department of Justice Office of Information and Privacy Freedom of Information Act

guide and Privacy Act overview (1995)

US House of Representatives Hearings Before the Special Subcommittee on Invasion of Privacy

US House of Representatives Hearings Before the Special Subcommittee on Invasion of

Privacy: Special inquiry on invasion of privacy part 1 June and Sept 1965, part 2 May

1966; The computer and invasion of privacy July 1966; Privacy and the national data

bank concept Aug 1968

US House of Representatives Hearing Before the Special Subcommittee on Invasion of Privacy

Commercial credit bureaus 90th Cong 2d Sess (1968)

US House of Representatives Report No 1383 95th Cong 2d Sess 33 (1978) (reprinted in 1978

US Code Cong & Ad News 9273 9305)

US Senate Federal data banks, computers, and the Bill of Rights

US Senate Federal data banks, computers, and the Bill of Rights Hearings before the

Subcommittee on Constitutional Rights of the Committee on the Judiciary 92nd Cong 1st

sess (1971)

US Senate Government dossier

US Senate Government dossier Report from the Subcommittee on Administrative Practice

and Procedure of the Committee on the Judiciary 90th Congress 1st Sess (1967)

Bibliography 796

US Senate Legislative history of the Privacy Act

US Senate Legislative history of the Privacy Act Government Operations Committee

Rep No 1183 93rd Cong 2nd Sess (1974)

Congressional Records

120 Cong Rec 36,655-58 (1974)