bibliography and method of citation
TRANSCRIPT
Bibliography 729
Bibliography and method of citation
BOOKS AND JOURNALS
1972 Int Soc Sci J
Lengyel Peter (ed) / (asst ed) Kazancigil Ali “The protection of privacy” 1972 Interna-
tional Social Science Journal (1972)
1991 (Nov/ Dec) TDR 8
“US criticizes EC Data Directive’s potential burdens and barriers” 1991 (Nov/ Dec)
Transnational Data & Communications Report 8–9
1994 (May/June) TDR 43
Privacy Working Group of the Information Infrastructure Task Force “US Information
Infrastructure Privacy Principles” 1994 (May/ June) Transnational Data & Communica-
tions Report 43
1994 (Nov/Dec) TDR 33
“Council of Europe” 1994 (Nov/Dec) TDR 33 Transnational Data & Communications
Report 33–34
2000 Computer Law & Sec Rep 70
2000 Computer Law & Security Report 70–71
A
Albinger 1986 Ann Surv Am L 625
Albinger Lisa Ann “Personal information in government agency records: toward an
Bibliography 730
informational right to privacy” 1986 Annual Survey of American Law 625–643
Alderman & Kennedy Right to privacy
Alderman Ellen & Kennedy Caroline The right to privacy (1995)
Aldhouse 1999 Int R L Computers & Tech 75
Aldhouse FGB “The transfer of personal data to third countries under EU Directive
95/46/EC” 1999 International Review of Law, Computers & Technology 75–79
Aldhouse “UK Data Protection”
Aldhouse FGB “UK Data Protection – where are we in 1991?” 180–187 in Yearbook of
Law Computers & Technology Russel KV (ed) (1991)
Alheit Expert systems
Alheit Karen Issues of civil liability arising from the use of expert systems (1997)
Anderson “American privacy law”
Anderson David A “The failure of American privacy law” 139–167 in Protecting privacy
Markesinis Basil S (ed) (1999)
Archer & Butler European Community
Archer Clive & Butler Fiona The European Community: structure and process (1996)
Artz et al 1998 (5) Priv & Inf 196
Artz M, Ebbers C, Schreuder E & Nouwt S “Marketing en de WBP-proef (Artz &
Ebbers en Schreuder & Nouwt in dialoog over de impact van de WBP op klanten-
databases en relatiemarketing)” 1998 (5) Privacy & Informatie 196-204
Asser-Hartkamp III (Verbintenissenrecht)
Bibliography 731
Hartkamp A S Mr C Asser’s handleiding tot de beoefening van het Nederlands
Burgerlijk Recht: verbintenissenrecht (deel 3) (1998)
Ausems “Council of Europe”
Ausems Egbert “Council of Europe Convention for the protection of individuals with regard
to automatic processing of personal data” 537–552 in Business guide to privacy and data
protection legislation Franklin Charles EH (ed) (1996)
B
Bainbridge Computer law
Bainbridge David I Introduction to computer law (2000)
Bainbridge Data protection
Bainbridge David I Data protection (2000)
Bainbridge 1998 Computer L & Sec Rep 180
Bainbridge David I “Data protection – the new law”1999 Computer Law & Security
Report 180–184
Bainbridge & Pearce 1998 Computer L & Sec Rep 259
Bainbridge David I & Pearce Graham “Data controllers and the new data protection
law”1998 Computer Law & Security Report 259–264
Bainbridge & Pearce 1998 Computer L & Sec Rep 401
Bainbridge David I & Pearce Graham “The UK Data Protection Act 1998 – data subjects
rights” 1998 Computer Law & Security Report 401–406
Baker Human Rights Act 1998
Baker Christopher (ed) Human Rights Act 1998: a practitioner’s guide (1998)
Bibliography 732
Banisar Privacy and human rights
Banisar David, Electronic Privacy Information Center (EPIC) & Privacy International
Privacy and human rights: an international survey of privacy laws and developments
(2000)
Barefoot 1998 N Car LR 283
Barefoot Bartley L “Enacting a health information confidentiality law: can Congress beat the
deadline?” 1998 North Carolina Law Review 283–360
Battock 1995 Int J L & Inf Tech 156
Battock Rupert “Data protection: where next?” 1995 International Journal of Law &
Information Technology 156–177
Beling 1983 Boston College Int & Comp L R 591
Beling Craig T “Transborder data flows: international privacy protection and the free flow of
information” 1983 Boston College International & Comparative Law Review 591–624
Bennett Data protection Directive
Bennett Colin J The European Union data protection Directive: lessons for the
protection of privacy in Canada (Address to the Industry Canada Workshop 31 August
1995)
Bennett Regulating privacy
Bennett Colin J Regulating privacy: data protection and public policy in Europe and
the United States (1992)
Bennett & Grant Visions of privacy
Bennett Colin J & Grant Rebecca (eds) Visions of privacy: policy choices for the digital
age (1999)
Bibliography 733
Bennett & Raab 1997 Inf Soc 245
Bennett Colin J & Raab Charles D “The adequacy of privacy: the European Union Data
Protection Directive and the North American response” 1997 Information Society
245–263
Benyekhlef “Dematerialized transactions”
Benyekhlef Karim “Dematerialized transactions on electronic pathways: a panorama of legal
issues” 93–116 in The electronic superhighway: the shape of technology and law to
come Mackaay Ejan, Poulin Daniel & Trudel Pierr (eds) (1995)
Berkvens & Prins “Van WPR naar WBP”
Berkvens JMA & Prins JEJ “De Bescherming van Persoonsgegevens: van WPR na WBP”
315–368 in Recht en computer Franken H, Kaspersen HWK & de Wild AH (eds)
(1997)
Berkvens 1995 Computer L & Prac 38
Berkvens JMA “Will the data protection Directive prevent a global information infrastruc-
ture?” 1995 Computer Law & Practice 38–44
Bigelow 1986 Inf Age 134
Bigelow Robert P “Computers and privacy – an American perspective” 1986 Information
Age 134–140
Bing 1984 Michigan Yb Int Legal S 271
Bing Jon “The Council of Europe Convention and the OECD Guidelines on data protec-
tion” 1984 Michigan Yearbook of International Legal Studies 271–303
Blackbeard 2002 THRHR 232
Blackbeard M “HIV/AIDS: the right to privacy v the right to life” 2002 Tydskrif vir
Bibliography 734
Hedendaagse Romeins-Hollandse Reg / Journal of Contemporary Roman-Dutch Law
232–241
Blackman 1993 Santa Clara Computer & High Tech LJ 431
Blackman Joshua D “A proposal for federal legislation protecting informational privacy
across the private sector” 1993 Computer & High Technology Law Journal 431–468
Blair & Mauer 1984 Mo LR 289
Blair Roger D & Maurer Virginia “Statute law and common law: the Fair Credit Reporting
Act” 1984 Missouri Law Review 289–308
Blanke 2000 Alb LJ Sci & Tech 57
Blanke Jordan M “Safe Harbor” and the European Union’s Directive on data protection”
2000 Albany Law Journal of Science & Technology 57–88
Blas 1999 (1) Priv & Inf 8
Blas Diana Alonso “25 October 1998: the day after” 1999 (1) Privacy & Informatie
8–14
Bloustein 1964 NYULR 962
Bloustein Edward J “Privacy as an aspect of human dignity: an answer to dean Prosser”
1964 New York University Law Review 962–1007
Blume 1992 Computer/L J 399
Blume Peter “An EEC policy for data protection” 1992 Computer/Law Journal 399–440
Blume 1997 Int R L Computers & Tech 193
Blume Peter “Privacy as theoretical and practical concept” 1997 International Review of
Law, Computers & Technology 193–202
Bibliography 735
Boberg Delict
Boberg PQR The law of delict (vol 1) (Aquilian liability) (1989)
Borking “Privacy technology”
Borking John “Privacy technology, a new challenge in cyberspace” 91–110 in Privacy
disputed Ippel Pieter, de Heij Guus & Crouwers Bart (1995)
Bothe 1989 Mich J Int L 333
Bothe Michael “Transborder data flows: do we mean freedom or business?” 1989 Michi-
gan Journal of International Law 333–344
Bouchard Guidebook
Bouchard Robert F & Franklin Justin D Guidebook to the Freedom of Information and
Privacy Acts (1980)
Bull 2001 Computer L & Sec Rep 239
Bull Gillian “Data protection – Safe Harbor: transferring personal data to the USA” 2001
Computer Law & Security Report 239–243
Burchel Delict
Burchell Jonathan Principles of delict (1993)
Burchell Personality rights
Burchell Jonathan Personality rights and freedom of expression: the modern actio
injuriarum (1998)
Burkert 1986 Computer L & Prac 155
Burkert Herbert “International data protection” 1986 Computer Law & Practice
155–160
Bibliography 736
Burkert “Data protection and access to data”
Burkert Herbert “Data protection and access to data” 49–69 in From data protection to
knowledge machines – the study of law and informatics Seipel P (ed) (1990)
Burns Communications law
Burns Yvonne Communications law (2001)
Buys Cyberlaw
Buys Reinhardt (ed) Cyberlaw @ SA: the law of the Internet in South Africa (2000)
Bygrave 2000 Computer L & Sec Rep 252
Bygrave Lee A “European data protection – determining applicable law pursuant to
European data protection legislation” 2000 Computer Law & Security Report 252–257
Bygrave 2001 Computer L & Sec Rep 17
Bygrave Lee A “Automated profiling – minding the machine: article 15 of the EC data
protection Directive and automated profiling” 2001 Computer Law & Security Report
17–24
Bygrave 2001 UNSWLJ 277
Bygrave Lee A “The place of privacy in data protection law” 2001 University of New
South Wales Law Journal 277–283
Bygrave Data protection law
Bygrave Lee A Data protection law: approaching its rationale, logic and limit (2002)
C
Bibliography 737
Campbell Data transmission and privacy
Campbell Dennis & Fisher Joy (eds) Data transmission and privacy (1994)
Cannataci Privacy and data protection law
Cannataci Joseph Privacy and data protection law: international development and
Maltese perspectives (1986)
Carey Data Protection Act 1998
Carey Peter Blackstone’s guide to the Data Protection Act 1998 (1998)
Carey Data protection in the UK
Carey Peter Data protection in the UK (2000)
Carey E-privacy
Carey Peter E-privacy and online data protection (2002)
Carter 1999 William Mitchell LR 223
Carter Patricia I “Health information privacy: can congress protect confidential medical
information in the ‘information age’”? 1999 William Mitchell Law Review 223–286
Cate 1995 Iowa LR 431
Cate Fred H “The EU data protection Directive, information privacy, and the public
interest” 1995 Iowa Law Review 431–443
Cate Information age
Cate Fred H Privacy in the information age (1997)
Chalton 1997 Computer L & Sec Rep 425
Chalton Simon “Data protection: the government’s proposals” 1997 Computer Law &
Bibliography 738
Security Report 425–428
Chalton et al Encyclopedia of data protection
Chalton Simon, Gaskill Shelagh, Walden Ian, Grant Hazel, Hendrie-Liaño Jessica & Inger
Lucy Encyclopedia of data protection (loose leave: 1988–1999)
Charlesworth 1999 Gov Inf Q 203
Charlesworth Andrew “Implementing the European Union Data Protection Directive 1995
in UK law: the Data Protection Act 1998” 1999 Government Information Quarterly
203–240
Clear 2002 J Mar J Computer & Inf L 981
Clear Marie “Falling into the gap: the European Union’s data protection act and its impact
on US law and commerce” 2002 John Marshall Journal of Computer and Information
Law 981–1018
Coetser Identiteit
Coetser Paulus Petrus Johannes Die reg op identiteit (1986)
Cole 1985 NYUJ Int L & Pol 893
Cole Patrick E “New challenges to the US multinational corporation in the European
Economic Community: data protection laws” 1985 New York University Journal of
International Law & Politics 893–947
Coles 1991 Am ULR 957
Coles Todd Robert “Does the Privacy Act of 1974 protect your right to privacy? An
examination of the routine use exemption” 1991 American University Law Review
957–1002
Bibliography 739
Cooley Treatise on the law of torts
Cooley TM Treatise on the law of torts (1880) (extract in Turkington & Allen Privacy
law 51)
Cooper 1998 Employee Relations LJ 57
Cooper Scott F “The Fair Credit Reporting Act – time for employers to change their use of
credit information” 1998 Employee Relations Law Journal 57–71
Corbett 1987 SALJ 52
Corbett MM “Aspects of the role of policy in the evolution of our common law” 1987
South African Law Journal 52–69
Cowley Access to medical records and reports
Cowley Robert Access to medical records and reports: a practical guide (1994)
Currie & Klaaren AIA commentary
Currie Iain & Klaaren Jonathan The Promotion of Access to Information Act commen-
tary (2002)
D
Daggett 1997 Catholic ULR 617
Daggett Lynn M “Bucking up Buckley I: making the federal student records statute work”
1997 Catholic University Law Review 617–670
Daniel-Paczosa 1987 Arizona J Int Comp L 154
Daniel-Paczosa Angela “Data protection and the right to privacy in the US and West
Germany”1987 Arizona Journal of International & Comparative Law 154–163
Bibliography 740
David & Brierley Major legal systems
David René & Brierley John EC Major legal systems in the world today (1985)
Davis Computer data processing
Davis Gordon B Computer data processing (1973)
Dean “SA”
Dean Owen “South Africa” 381–394 in International privacy, publicity and personality
laws Henry Michael (ed) (2001)
De Graaf Privacy en persoonsgegevens
De Graaf F Privacy en persoonsgegevens: het ontwerp van Wet Persoonsregistraties
(1987)
De Graaf “Wet Persoonsregistraties”
De Graaf F “De Wet Persoonsregistraties” 361–381 in Hoofdstukken informaticarecht
De Graaf F (ed) (1989)
De Klerk 1991 SALJ 166
De Klerk Anton “The right of a patient to have access to his medical records” 1991 South
African Law Journal 166–170
Dendy 1990 BML 149
Dendy Mervyn “Corporate reputation revisited: defaming a non-trading juristic person”
1990 Businessman’s Law 149–152
Devenish SA Bill of Rights
Devenish GE A commentary on the South African Bill of Rights (1999)
Bibliography 741
De Vos 1995 Stell LR 34
De Vos W le R “The impact of the new constitution on civil procedural law”1995
Stellenbosch Law Review / Regstydskrif 34–53
De Waal, Currie & Erasmus Bill of Rights
De Waal Johan, Currie Iain & Erasmus Gerhard Bill of Rights handbook (2000)
De Wet & Swanepoel Strafreg
De Wet JC & Swanepoel HL Strafreg (1985)
Drebes 1994 J L & Education 290
Drebes Charles “The Buckley Amendment: an administrator’s refuge from accountability”
1994 Journal of Law & Education 290–293
Du Plessis 1999 Obiter 92
Du Plessis W “Enforcement of environmental rights by way of a right to information” 1999
Obiter 92–112
Du Plessis Reg op inligting
Du Plessis W Die reg op inligting en die openbare belang (1986)
Du Plessis & De Ville “Personal rights”
Du Plessis Lourens M & De Ville Jacques R “Personal rights: life, freedom, and security of
the person, privacy, and freedom of movement” 212–263 in Rights and constitutionalism
Van Wyk Dawid, Dugard John, De Villiers Bertus, & Davis Dennis (eds) (1994)
Dumortier 1997 Int R L Computers & Tech 93
Dumortier Jos “The Protection of personal data in the Schengen Convention”1997
International Review of Law, Computers & Technology 93–106
Bibliography 742
E
Early 1986 Computer L & Prac 68
Early T Lawrence “Recent developments in data protection in the Council of Europe” 1986
Computer Law & Practice 68–69
Eckenwiler 1998 Seton Hall Const LJ 725
Eckenwiler Mark “Applications of the Privacy Protection Act” 1998 Seton Hall
Constitutional Law Journal 725–730
Edelman 1990 Tex L R 1195
Edelman Peter B “Free press v privacy: haunted by the ghost of Justice Black” 1990 Texas
Law Review 1195–1234
Ehlke 1985 J Mar LR 829
Ehlke Richard “The Privacy Act after a decade” 1985 John Marshall Law Review
829–846
Eiselen Reg op privaatheid in die inligtingsera
Eiselen Sieg Die reg op privaatheid in die inligtingsera Unpublished inaugural lecture PU
for CHE (1994)
Elder Law of privacy
Elder David E The law of privacy (1991)
Ennison 1984 Int Bus L’yer 163
Ennison Thomas “Legal aspects of TDF in developing countries: sovereignty considerations”
1984 International Business Lawyer 163–170
Bibliography 743
EPIC Privacy and human rights
Electronic Privacy Information Center (EPIC) (in association with Privacy International)
Privacy and human rights: an international survey of privacy laws and developments
(2002)
Estadella-Yuste 1992 Int & Comp L Q 170
Estadella-Yuste Olga “The draft Directive of the EC regarding the protection of personal
data” 1992 International & Comparative Law Quarterly 170–179
Evans 1981 Am J Comp L 571
Evans AC “European data protection law” 1981 American Journal of Comparative Law
571–582
Evans 1981 J World Trade L 150
Evans AC “Data Protection in Europe” 1981 Journal of World Trade Law 150–158
Evans & Korn Data Protection Act
Evans AC & Korn Anthony How to comply with the Data Protection Act: policies,
practice and procedures (1986)
Ewing 2002 Houston J Int L 315
Ewing Mike “The perfect storm: the Safe Harbor and the Directive on data protection”
2002 Houston Journal of International Law 315–344
F
Falby 1982 Geo LJ 219
Falby Bruce E A “Constitutional right to avoid disclosure of personal matter: perfecting
privacy analysis in JP v DeSanti 653 F2nd 1080 (6th Cir1981): case comment” 1982
Bibliography 744
Georgetown Law Journal 219–251
Farnsworth 1983 Int Bus L’yer 114
Farnsworth David P “Data privacy or data protection and transborder or transnational data
flow: an American’s view of European legislation” 1983 International Business Lawyer
114–118
Faul Bankgeheim
Faul Wilna Grondslae van die beskerming van die bankgeheim (1991)
Fenwick & Phillipson 1996 Cambridge L J 447
Fenwick Helen & Phillipson Gavin “Confidence and privacy: a re-examination” 1996
Cambridge Law Journal 447–455
Fenwick Civil liberties
Fenwick Helen Civil liberties (1998)
Ferreira 2000 SAPR/PL 527
Ferreira Gerrit “Inligting, audi alteram partem en redes” 2000 SA Publiekreg / Public Law
527–540
Flaherty 1991 Case West Res LR 831
Flaherty David H “On the utility of constitutional rights to privacy and data protection”1991
Case Western Reserve Law Review 831–855
Flaherty Surveillance societies
Flaherty David H Protecting privacy in surveillance societies – the Federal Republic of
Germany, Sweden, France, Canada, and the United States (1989)
Bibliography 745
Flaherty “Data protection and national information policy”
Flaherty David H “Data protection and national information policy” in From data
protection to knowledge machines – the study of law and informatics Seipel P (ed)
(1990)
Flaherty “Visions of privacy”
Flaherty David H “Visions of privacy: past, present, and future”19–38 in Visions of
privacy: policy choices for the digital age Bennett Colin J & Grant Rebecca (eds)
(1999)
Flanagan 2002 J Int Banking L 237
Flanagan Anne “Gramm-Leach-Bliley: through the EU data protection looking glass” 2002
Journal of International Banking Law 237–248
Folsom European Union law
Folsom Ralph H European Union law in a nutshell (1995)
Frankena “Bescherming van privacy en persoonsgegevens”
Frankena HC “Bescherming van privacy en persoonsgegevens” 323–360 in Hoofdstukken
informaticarecht De Graaf F (ed) (1989)
Franklin Business guide
Franklin Charles EH (ed) Business guide to privacy and data protection legislation
(1996)
Freedman Computer age
Freedman Warren The right of privacy in the computer age (1987)
Fromholz 2000 Berkeley Tech LJ 461
Bibliography 746
Fromholz Julia M “The European Union data privacy Directive” 2000 Berkeley
Technology Law Journal 461–484
Frosini 1987 Computer L & Prac 84
Frosini Vittorio “The European Convention on data protection” 1987 Computer Law &
Practice 84–90
G
Gardeniers, Van Kralingen & Schreuders “Privacyaspecten van informatie-mijnbouw”
Gardeniers HJM, van Kralingen RW & Schreuders E “Knowledge discovery in databases;
privacyaspecten van informatie-mijnbouw” 69–81 in Privacy in het informatietijdperk
Nouwt Sjaak & Voermans Wim (eds) (1996)
Gassmann “Privacy implications of transborder data flows” 109
Gassmann Hans-Peter “Privacy implications of transborder data flows” 109–117 in
Hoffman Lance J (ed) Computers and privacy in the next decade (1980)
Gaum 2001 THRHR 146
Gaum Liezl “The right to access to information: Korf v Health Professions Council of South
Africa” 2001 Tydskrif vir Hedendaagse Romeins-Hollandse Reg / Journal of
Contemporary Roman-Dutch Law 146–155
Gavison 1980 Yale LJ 421
Gavison Ruth “Privacy and the limits of the law” 1980 Yale Law Journal 421–471
Geldenhuys 1997 THRHR 254
Geldenhuys T “Die regsbeskerming van privaatregtelike belange ten aansien van inligting”
1997 Tydskrif vir Hedendaagse Romeins-Hollandse Reg / Journal of Contemporary
Bibliography 747
Roman-Dutch Law 254–281
Geldenhuys Regsbeskerming van inligting
Geldenhuys T Die Regsbeskerming van inligting (1993)
Gellman 1993 Softw LJ 199
Gellman Robert “Fragmented, incomplete, and discontinuous: the failure of federal privacy
regulatory proposals and institutions” 1993 Software Law Journal 199–238
Gellman 1994 Gov Inf Q 245
Gellman Robert “An American Privacy Protection Commissioner: an idea whose time has
come ... Again” 1994 Government Information Quarterly 245–247
Gellman 1996 Villanova LR 129
Gellman Robert M “Can privacy be regulated effectively on a national level: thoughts on the
possible need for international privacy rules” 1996 Villanova Law Review 129–172
Gellman 2000 Gov Inf Q 235
Gellman Robert “Taming the privacy monster: a proposal for a non-regulatory privacy
agency” 2000 Government Information Quarterly 235–241
Gilbert 1997 N Dakota LR 93
Gilbert Francoise “Privacy of medical records? The Health Insurance Portability and
Accountability Act of 1996 creates a framework for the establishment of security standards
and the protection of individually identifiable information” 1997 North Dakota Law Review
93–108
GILC Privacy and human rights
Global Internet Liberty Campaign Privacy and Human Rights: an international survey
Bibliography 748
of privacy laws and practice (1998)
Available from <<http://www.gilc.org//privacy/survey/>> [Accessed November 1999]
Girot & De Wit “Privacy van ondernemingen”
Girot C & De Wit AP “Privacy van ondernemingen” 139–154 in Privacy in het
informatietijdperk Nouwt Sjaak & Voermans Wim (eds) (1996)
Glazeswki 1999 Acta Jurida 1
Glazeswki Jan “Environmental justice and the new South African democratic legal order”
1999 Acta Jurida 1–35
Goldstein 1992 Emory LJ 1185
Goldstein Bruce D “Confidentiality and dissemination of personal information: an
examination of state laws governing data protection” 1992 Emory Law Journal
1185–1216
Goldman “Privacy and individual empowerment”
Goldman Janlori “Privacy and individual empowerment” 97–115 in Visions of privacy:
policy choices for the digital age Bennett Colin J & Grant Rebecca (eds) (1999)
Goodenough 1993 Eur Intel Prop R 227
Goodenough Oliver R “A right of privacy in the UK: why not the courts?” 1993 European
Intellectual Property Review 227–228
Gostin 1995 Cornell LR 451
Gostin Lawrence “Health information privacy” 1995 Cornell Law Review 451–528
Govender “Limitation on access to information”
Govender Karthy “An assessment of limitation on access to information in the Promotion of
Bibliography 749
the Access to Information Act and the danger that disclosure will become the exception
rather than the norm” 17–26 in The constitutional right of access to information (Report
of seminar held on 4 September 2000 at St George’s Hotel, Rietvlei Dam, Pretoria)
Konrad Adenauer Stiftung Seminar Report no 5 (2001). Available from
<<http://www.kas.org.za/Publications.asp>> [Accessed October 2003]
Graham 1987 Tex LR 1395
Graham Jonathan P “Privacy, computers, and the commercial dissemination of personal
information” 1987 Texas Law Review 1395–1439
Greenleaf 1995 (2) Int Priv Bul 1
Greenleaf Graham “The 1995 EU Directive on data protection – an overview” 1995 (2)
International Privacy Bulletin 1–28
Greer 1999 European LR 3
Greer Steven “A guide to the Human Rights Act 1998” 1999 European Law Review 3–21
Gross 1967 NYULR 34
Gross Hyman “The concept of privacy” 1967 New York University Law Review 34–54
Gross Privacy
Gross Hyman Privacy – its legal protection (1976)
H
Harris, O’Boyle & Warbrick European Convention on Human Rights
Harris DJ, O’Boyle M & Warbrick C Law of the European Convention on Human
Rights (1995)
Bibliography 750
Harrison 1992 Memp SULR 775
Harrison Heather “Protecting personal information from unauthorised government
disclosure” 1992 Memphis State University Law Review 775–806
Heaney 1986 Fordham Urb LJ 927
Heaney Gretta J “The constitutional right of informational privacy: does it protect children
suffering from AIDS?” 1986 Fordham Urban Law Journal 927–969
Hernandez 1988 Fed Com LJ 17
Hernandez Ruel Torres “ECPA and online computer privacy” 1988 Federal
Communications Law Journal 17–41
Heydrich 1999 Brooklyn J Int L 407
Heydrich Michael W “A Brave New World: complying with the European Union Directive
on personal privacy through the power of contract” 1999 Brooklyn Journal of
International Law 407–443
Hill European Community
Hill Brian The European Community (1991)
Hixon Public society
Hixon Richard F Privacy in a public society: human rights in conflict (1987)
Hofman Vertrouwelijke communicatie
Hofman JRAR Vertrouwelijke communicatie: een rechtsvergelijkende studie over de
geheimhouding van communicatie in grondrechtelijk perspectief naar internationaal,
Nederlands en Duits recht (1994)
Hofman et al Cyberlaw
Bibliography 751
Hofman Julian, Johnston David, Handa Sunny & Morgan Charles Cyberlaw: a guide for
South Africans doing business online (1999)
Holmes “Privacy: philosophical foundations and moral dilemmas”
Holmes Robert “Privacy: philosophical foundations and moral dilemma’s” in Privacy
disputed Ippel Pieter; de Heij Guus & Crouwers Bart (eds) (1995)
Holvast 1998 (1) Priv & Inf 4
Holvast Jan “Wet Bescherming Persoonsgegevens: overzicht en stappenplan” 1998 (1)
Privacy & Informatie 4–10
Hondius 1983 Neth Int LR 103
Hondius Frits W “A decade of international data protection” 1983 Netherlands
International Law Review 103–128
Hondius Emerging data protection
Hondius Frits W Emerging data protection in Europe (1975)
Horn & Smith 1999 Banking LJ 689
Horn Charles M & Smith Brian W “Financial modernization in the new millennium:
implementation of the Gramm-Leach-Bliley Act” 1999 Banking Law Journal 689–710
Hosch 1983 Vand LR 139
Hosch Heyward C “The interest in limiting the disclosure of personal information: a
constitutional analysis” 1983 Vanderbilt Law Review 139–197
Hudgins & Vacca Law and education
Hudgins HC & Vacca Richard S Law and education: contemporary issues and court
decisions (1991)
Bibliography 752
Hustinx “The case of data protection”
Hustinx Peter J “Co-regulation or self-regulation by public and private bodies – the case of
data protection” 283–288 in Freundesgabe für Alfred Bullesbach 2000
Available from <<http://www.cbpweb.nl/indexen/ind_publ_art.htm>> [Accessed March
2003]
I
Ippel et al Privacy disputed
Ippel Pieter, de Heij Guus & Crouwers Bart Privacy disputed (1995)
Itzikowitz 1996 THRHR 497
Itzikowitz Angela “Investigation of Serious Economic Offences Act 117 of 1991” 1996
Tydskrif vir Hedendaagse Romeins-Hollandse Reg / Journal of Contemporary Roman-
Dutch Law 497–504
J
Janger & Schwartz 2002 Minn LR 1219
Janger Edward & Schwartz Paul “The Gramm-Leach-Bliley Act, information privacy, and
the limits of default rules” 2002 Minnesota LR 1219–1261
Jansen 2002 (Apr) De Rebus 29
Jansen Jacques “Criminal protection of online privacy” 2002 (Apr) De Rebus 29–31
Jay 1989 Computer L & Prac 134
Jay Rosemary “The Data Protection Act 1984 and the Convention for the Protection of
Individuals with regard to Automatic Processing of Personal Data: recommendations and
reservations – interpretation status”1989 Computer Law & Practice 134–137
Bibliography 753
Jay & Hamilton Data protection
Jay Rosemary & Hamilton Angus Data protection law and practice (1999)
Johnson 2000 (Nov) De Rebus 54
Johnson Jason “E-spy vs the right to privacy: workplace monitoring and technology
surveillance” 2000 (Nov) De Rebus 54–55
Joubert Grondslae
Joubert WA Grondslae van die persoonlikheidsreg (1953)
Justice Privacy and the law
Justice (British Section of the International Commission of Jurist) Privacy and the law:
report by Justice (1970)
K
Kang 1998 Stanford LR 1193
Kang Jerry “Information privacy in cyberspace transactions” 1998 Stanford Law Review
1193–1294
Kaplan & Mahoney 1997 Fed L’yer 38
Kaplan Joseph V & Mahoney John P “Reckless disregard: intentional and willful violations
of the Privacy Act’s investigatory requirements” 1997 Federal Lawyer 38–44
Kaspersen “Data protection and e-commerce”
Kaspersen Henrik WK “Data protection and e-commerce” 119–145 in eDirectives: guide
to European law on e-commerce Lodder Arno R & Kaspersen Henrik WK (eds) (2002)
Keeton Law of torts
Bibliography 754
Keeton Page Prosser & Keeton on the Law of Torts (1984)
Kemp 2000 Stell LR 437
Kemp Gerhard “Die ondersoek van ernstige ekonomiese misdade in die lig van die
grondwetlike reg op privaatheid” 2000 Stellenbosch Law Review / Regstydskrif 437–451
Kirby 1987 U Cin LR 745
Kirby MD “Access to information and privacy: the ten information commandments” 1987
University of Cincinnati Law Review 745–759
Klaaren, Currie & Smith “Access to information legislation”
Klaaren Jonathan, Currie Iain & Smith Andrew “Analysing foreign access to information
legislation from a South African viewpoint” 29–40 in The constitutional right of access to
information (Report of seminar held on 4 September 2000 at St George’s Hotel, Rietvlei
Dam, Pretoria) Konrad Adenauer Stiftung Seminar Report no 5 (2001) Available from
<<http://www.kas.org.za/Publications.asp>> [Accessed October 2003]
Klopper Kredietwaardigheid
Klopper HB Die beskerming van kredietwaardigheid in die Suid-Afrikaanse reg
(1986)
Knobel 1997 THRHR 533
Knobel JC “HIV-toetse, toestemming en onregmatigheidsbewussyn” 1997 Tydskrif vir
Hedendaagse Romeins-Hollandse Reg / Journal of Contemporary Roman-Dutch Law
533–536
Knobel 2002 THRHR 24
Knobel JC “Nalatige persoonlikheidskrenking” 2002 Tydskrif vir Hedendaagse Romeins-
Hollandse Reg / Journal of Contemporary Roman-Dutch Law 24–36
Bibliography 755
Knobel Trade secret
Knobel JC The right to the trade secret (1996)
Komuves 1998 J Mar J Computer & Inf L 529
Komuves Flavio “We’ve got your number: an overview of legislation and decisions to
control the use of social security numbers and personal identifiers” 1998 John Marshall
Journal of Computer & Information Law 529–577
Kuitenbrouwer “Privacy”
Kuitenbrouwer F “Privacy: een historisch-vergelijkend overzicht” 7–24 in Privacy-
regulering in theorie en praktijk Berkvens JMA & Prins JEJ (eds) (1994)
Kuitenbrouwer et al Drieluik privacybescherming
Kuitenbrouwer F, Verkade DWF & van der Horst RJM Drieluik privacybescerming:
een overzicht en enkele exercities (1984)
L
Langan 1979 Colum JL & Soc Probs 143
Langan Kenneth James “Computer matching programs: a threat to privacy?” 1979
Columbia Journal of Law & Social Problems 143–180
Larremore 1912 Colum LR 693
Larremore D “The law of privacy” 1912 Columbia Law Review 693–708
Laurie Genetic privacy
Laurie Graham Genetic privacy: a challenge to medico-legal norms (2002)
Leigh 1976 Hastings Con LQ 229
Bibliography 756
Leigh Lawrence J “Informational privacy: constitutional challenges to the collection and
dissemination of personal information by government agencies” 1976 Hastings
Constitutional Law Quarterly 229–259
Leinius & Midgley 2002 SALJ 17
Leinius Birte & Midgley JR “The impact of the Constitution on the law of delict” 2002
South African Law Journal 17–27
Lloyd Data Protection Act 1998
Lloyd, Ian J A Guide to the Data Protection Act 1998 (1998)
Lloyd Information technology law
Lloyd Ian J Information technology law (1997)
M
Maditisi 1992 De Rebus 659
Maditsi Alexander “The right of privacy in America: what does it mean?” 1992 De Rebus
659–663
Madsen Personal data protection
Madsen Wayne Handbook of personal data protection (1992)
Martin Bits, bytes and big brother
Martin Shannon E Bits, bytes and Big Brother – federal information control in the
technological age (1995)
Mathijsen European Union law
Mathijsen PSRF A guide to European Union law (1999)
Bibliography 757
Matthews 1984 Int Bus L’yer 410
Matthews Rosalyn Clive “Reflection of rights of individuals in the EEC” 1984 International
Business Lawyer 410–414
Maxeiner 1995 Fed Comm LJ 93
Maxeiner James R “Freedom of information and the EU data protection Directive” 1995
Federal Communications Law Journal 93–104
Maxwell & Reinsch “Freedom of Information Act”
Maxwell Kimiera & Reinsch Roger “The Freedom of Information Act privacy exemption:
who does it really protect?” 83–97 in Privacy and publicity: readings from commu-
nications and the law, 2 Kupferman Theodore R (ed) (1990)
McKeaver 1984 Int Bus L’yer 159
McKeaver Edward D “Is it best not to regulate transborder data flow?” 1984 Internatio-
nal Business Lawyer 159–162
McKerron Delict
McKerron RG Law of delict (1971)
McQuoid-Mason 1982 CILSA 135
McQuoid-Mason David J “Consumer protection and the right to privacy” 1982
Comparative & International Law Journal of Southern Africa 135–157
McQuoid-Mason 2000 Acta Juridica 227
McQuoid-Mason David J “Invasion of privacy: common law v constitutional delict – does it
make a difference?” 2000 Acta Juridica 227–261
McQuoid-Mason “Constitutional privacy”
Bibliography 758
McQuoid-Mason David J “Privacy” in Chaskalson Matthew, Kentridge Janet, Klaaren
Jonathan, Marcus Gilbert, Spitz Derick, Woolman Stuart (eds) Constitutional law of
South Africa (1996)
McQuoid-Mason Privacy
McQuoid-Mason David J The law of privacy in South Africa (1978)
Meiring Betalinsgstelsel
Meiring GA Regsaspekte van die betalingstelsel (1998)
Mellors & Pollitt 1984 Pol Q 311
Mellors Colin & Pollitt David “The Data Protection Bill: protecting privacy or promoting
commerce?” 1984 Political Quarterly 310–311
Menacker School law
Menacker Julius School law: theoretical and case perspectives (1987)
Messick 1985 Santa Clara LR 153
Messick Robert “IRS computer data bank searches: an infringement of the Fourth Amend-
ment search and seizure clause” 1985 Santa Clara Law Review 153–189
Michael 1982 Pub L 360
Michael James “Data protection” 1982 Public Law 360–366
Michael Privacy and human rights
Michael James Privacy and human rights (1994)
Midgley 1996 THRHR 635
Midgley JR “The attenuated form of intention: a constitutionally acceptable alternative to
Bibliography 759
strict liability for the media”1996 Tydskrif vir Hedendaagse Romeins-Hollandse Reg /
Journal of Contemporary Roman-Dutch Law 635–638
Miller Assault on privacy
Miller AR The assault on privacy (computers, data banks and dossiers) (1971)
Miller Statement to the US Congress Senate Committee on the Judiciary 1967
Miller AR Statement to the US Congress Senate Committee on the Judiciary, 1967 (as
quoted in 1972 Int Soc Sci J 429 fn 1)
Milmo 1993 New L J 1182
Milmo Patrick “The new law of privacy” 1993 New Law Journal 1182–1183
Mischke 2003 CLL 71
Mischke Carl “Workplace privacy, e-mail interception and the law: does new legislation
limit employers’ right to read e-mail?” 2003 Contemporary Labour Law 71–80
Mogg 1994 (Nov/Dec) TDR 29
Mogg John F “Privacy protection in the information society” 1994 (Nov / Dec) Transna-
tional Data & Communications Report 29–32
Mostert Reklamebeeld
Mostert Frederik Willem Grondslae van die reg op die reklamebeeld (1985)
Mowery 1998 U Cin LR 697
Mowery Grace-Marie “A patient’s right of privacy in computerized pharmacy
records”1998 University of Cincinnati Law Review 697–746
Mullock & Leigh-Pollitt Data Protection Act explained
Bibliography 760
Mullock James & Leigh-Pollitt Piers The Data Protection Act explained (1999)
Mutsaers 1998 (3) Priv & Inf 109
Mutsaers Luc “De gemeentelijke basisadministratie: verleden, heden en toekomst” 1998 (3)
Privacy & Informatie 109
N
Nabben & van de Luytgaarden De ultieme vrijheid
Nabben PFP & van de Luytgaarden HJLM De ultieme vrijheid: een rechtstheoretische
analyse van het recht op privacy (1996)
Naidoo 2001 (Feb) De Rebus 14
Naidoo Melanie “A public nuisance? (Coping with the Promotion of Access to Information
Act)” 2001 (Feb) De Rebus 14–16
Neethling 1971 THRHR 240
Neethling J “Enkele gedagtes oor die juridiese aard en inhoud van menseregte en funda-
mentele vryhede” 1971 Tydskrif vir Hedendaagse Romeins-Hollandse Reg / Journal of
Contemporary Roman-Dutch Law 240–249
Neethling 1976 THRHR 121
Neethling J “Grondslag vir die erkenning van ‘n selfstandige persoonlikheidsreg op privaat-
heid in die Suid-Afrikaanse Reg”1976 Tydskrif vir Hedendaagse Romeins-Hollandse
Reg / Journal of Contemporary Roman-Dutch Law 121–128
Neethling 1980 THRHR 141
Neethling J “Die kredietburowese en databeskerming” 1980 Tydskrif vir Hedendaagse
Romeins-Hollandse Reg / Journal of Contemporary Roman-Dutch Law 141–155
Bibliography 761
Neethling 1992 (1) Codicillus 4
Neethling J “Computers and private-law legal remedies for the protection of privacy, trade
secrets, patents and copyright” 1992 (1) Codicillus 4–18
Neethling 1993 THRHR 704
Neethling J “Die reg op privaatheid: regspersone, onregmatigheid en die openbare inlig-
tingsbelang– Financial Mail (Pty) Ltd v Sage Holdings 1993 2 SA 451 (A)” 1993 Tydskrif
vir Hedendaagse Romeins-Hollandse Reg / Journal of Contemporary Roman-Dutch
Law 704–708
Neethling 1996 THRHR 528
Neethling J “Die reg op privaatheid, die pers en artikel 12 van die Wet op Egskeiding 70
van 1979 – National Media v Jooste 1996 3 SA 262 (A)” 1996 Tydskrif vir Hedendaag-
se Romeins-Hollandse Reg / Journal of Contemporary Roman-Dutch Law 528–533
Neethling 1997 THRHR 137
Neethling J “Die reg op privaatheid en die konstitusionele hof: die noodsaaklikheid vir dui-
delike begripsvorming” 1997 Tydskrif vir Hedendaagse Romeins-Hollandse Reg /
Journal of Contemporary Roman-Dutch Law 137–143
Neethling 2000 TSAR 761
Neethling J “Privaatheidsbeskerming: die vertroulike verhouding tussen die misdaadberig-
gewer en die polisie” 2000 Tydskrif vir die Suid-Afrikaanse Reg / Journal of South
African Law 761–765
Neethling 2001 THRHR 131
Neethling J “Deelnemende elektroniese waarneming as dreigend-onregmatige privaatheid-
skending: Tap Wine Trading CC v Cape Classics Wines (Western Cape) CC 1999 4 SA
194 (K)” 2001 Tydskrif vir Hedendaagse Romeins-Hollandse Reg / Journal of
Bibliography 762
Contemporary Roman-Dutch Law 131–135
Neethling 2002 SALJ 700
Neethling J “The Constitutional Court gives the green light to the common law of
defamation” 2002 South African Law Journal 700–708
Neethling 2002 THRHR 260
Neethling J “Nalatigheid as aanspreeklikheidsvereiste vir die actio iniuriarum by laster:
Marais v Groenewald 2001 1 SA 634 (T)” 2002 Tydskrif vir Hedendaagse Romeins-
Hollandse Reg / Journal of Contemporary Roman-Dutch Law 260–265
Neethling 2002 THRHR 574
Neethling J “Aanspreeklikheid vir ‘nuwe’ risiko’s: moontlikhede en beperkinge van die
Suid-Afrikaanse deliktereg” 2002 Tydskrif vir Hedendaagse Romeins-Hollandse Reg /
Journal of Contemporary Roman-Dutch Law 574–592
Neethling “Databeskerming”
Neethling J “Databeskerming: motivering en riglyne vir wetgewing in Suid-Afrika” 105–131
in Huldigingsbundel vir WA Joubert Strauss SA (ed) (1988)
Neethling Persoonlikheidsreg
Neethling J Persoonlikheidsreg (1998)
Neethling Privaatheid
Neethling J Die Reg op privaatheid (1976)
Neethling “Privaatheid en universiteite”
Neethling J “Die reg op privaatheid en universiteite” 125–143 in Nihil Obstat: feesbundel
vir WJ Hosten / Essays in honour of WJ Hosten Van Wyk CW (ed) (1996)
Bibliography 763
Neethling & Potgieter 1991 THRHR 120
Neethling J & Potgieter JM “Persoonlikheidsregte van ‘n regspersoon: Dhlomo v Natal
Newspapers (Pty) Ltd 1989 1 SA 945 (A); Caxton Ltd v Reeva Forman (Pty) Ltd 1990 3
SA 547 (A); Boka Enterprises (Pvt) Ltd v Manatse 1990 3 SA 626 (ZHC)” 1991
Tydskrif vir Hedendaagse Romeins-Hollandse Reg / Journal of Contemporary Roman-
Dutch Law 120–127
Neethling & Potgieter 1994 THRHR 513
Neethling J & Potgieter JM “Laster: die bewyslas, media-privilegie en die invloed van die
nuwe grondwet” 1994 Tydskrif vir Hedendaagse Romeins-Hollandse Reg / Journal of
Contemporary Roman-Dutch Law 513–519
Neethling & Potgieter 1994 THRHR 703
Neethling J & Potgieter JM “Aspekte van die reg op privaatheid: Jooste v National Media
Ltd 1994 2 SA 634 (K); Motor Industry Fund Administrators (Pty) Ltd v Janit 1994 3 SA
56 (W)” 1994 Tydskrif vir Hedendaagse Romeins-Hollandse Reg / Journal of
Contemporary Roman-Dutch Law 703–710
Neethling & Potgieter 1995 THRHR 709
Neethling J & Potgieter JM “Aspekte van die lasterreg in die lig van die Grondwet” 1995
Tydskrif vir Hedendaagse Romeins-Hollandse Reg / Journal of Contemporary Roman-
Dutch Law 709–715
Neethling & Potgieter 1996 THRHR 706
Neethling J & Potgieter JM “Regsonsekerheid in die lasterreg in die lig van die grondwet -
die pad vorentoe?” 1996 Tydskrif vir Hedendaagse Romeins-Hollandse Reg /Journal of
Contemporary Roman-Dutch Law 706–711
Neethling & Potgieter 1999 THRHR 442
Bibliography 764
Neethling J & Potgieter JM “Die lasterreg en die media: strikte aanspreeklikheid word ten
gunste van nalatigheid verwerp en ‘n verweer van mediaprivilegie gevestig: National Media
Ltd v Bogoshi 1998 4 SA 1196 (HHA)” 1999 Tydskrif vir Hedendaagse Romeins-
Hollandse Reg / Journal of Contemporary Roman-Dutch Law 442–450
Neethling & Potgieter 2002 THRHR 265
Neethling J & Potgieter JM “Toepassing van die Grondwet op die deliktereg: Carmichele v
Minister of Safety and Security (Centre for Applied Legal Studies Intervening) 2001 4 SA
938 (CC)” 2002 Tydskrif vir Hedendaagse Romeins-Hollandse Reg / Journal of
Contemporary Roman-Dutch Law 265–273
Neethling, Potgieter & Visser Delict
Neethling J, Potgieter JM & Visser PJ (translated by Knobel JC) Law of Delict (2001)
Neethling, Potgieter & Visser Neethling’s Law of Personality
Neethling J, Potgieter JM & Visser PJ Neethling’s Law of Personality (1996)
Neethling & Van Aswegen 1989 THRHR 607
Neethling J & Van Aswegen Annél “Aspekte van aanspreeklikheid weens suiwer ekono-
miese verlies: bemoeiing met ‘n kontraktuele verhouding en die rol van beleidsoor-
wegings”1989 Tydskrif vir Hedendaagse Romeins-Hollandse Reg / Journal of
Contemporary Roman-Dutch Law 607–611
Neill “Privacy”
Neill Brian “Privacy: a challenge for the next century” 1–28 in Protecting privacy
Markesinis Basil S (ed) (1999)
Neisingh & de Houwer Transborder flow of personal data
Neisingh Andries W & de Houwer Joke Transborder flow of personal data: a survey of
Bibliography 765
some legal restrictions on the free flow of data across national borders (1987)
New York Times 27 February 1988
Nieuwenhuis et al Nieuw burgerlijk wetboek
Nieuwenhuis JH, Valk WL & Stolker CJJM Nieuw burgerlijk wetboek: tekst en
commentaar (1990)
Nouwt 1998 (3) Priv & Inf 100
Nouwt Sjaak “Een model van de Wet Bescherming Persoonsgegevens (deel 2): over
reikwijdte, verantwoording en procedures” 1998 (3) Privacy & Informatie 100–108
Nugter Transborder flow of personal data
Nugter, ACM Transborder flow of personal data within the EC (1990)
O
Oliver & Von Borries 1984 Pub L 199
Oliver Peter & Von Borries Reimer “Data protection and censuses under the West German
constitution”1984 Public Law 199–206
O’Reilly Federal information
O’Reilly James T Federal information disclosure vol 2 (1990)
Overkleeft-Verburg De Wet Persoonsregistraties
Overkleeft-Verburg G De Wet Persoonsregistraties: norm, toepassing en evaluatie
(1995)
P
Bibliography 766
Paddock 1998 Colorado L’yer 95
Paddock John R “New Limitations and requirements in reviewing applicants’ and
employees’ credit records” 1998 Colorado Lawyer 95–98
Papapavlou “Latest developments”
Papapavlou G “Latest developments concerning the EC draft data protection Directive“
29–57 in Recent developments in data privacy law Dumortier J (ed) Bing J, Korff D,
Nugter AM, Papapavlou G, Robben F, Simitis S (1992)
Parent 1983 L & Phil 305
Parent WA “A new definition of privacy for the law” 1983 Law & Philosophy 305–338
Pauw Persoonlikheidskrenking en skuld
Pauw PC Persoonlikheidskrenking en skuld in die Suid-Afrikaanse privaatreg - ‘n
regshistoriese en regsvergelykende ondersoek (1976)
Pearce & Platten 1999 Fordham Int LJ 2024
Pearce Graham & Platten Nicholas “Orchestrating transatlantic approaches to personal
data protection: a European perspective” 1999 Fordham International Law Journal
2024–2051
Peck 1984 Hofstra LR 893
Peck Robert S “Extending the constitutional right to privacy in the new technological age”
1984 Hofstra Law Review 893–912
Petrocelli Low profile
Petrocelli William Low profile: how to avoid the privacy invaders (1981)
Philips 1997 U New Brunswick LJ 127
Bibliography 767
Philips Bruce “Privacy in a ‘survellance society’” 1997 University of New Brunswick Law
Journal 127–138
Pieterse 2002 SALJ 27
Pieterse Marius “The right to be free from public or private violence after Carmichele” 2002
South African Law Journal 27–39
Pimstone 1999 SAJHR 2
Pimstone Gideon “Going quietly about their business: access to corporate information and
the Open Democracy Bill” 1999 South African Journal on Human Rights 2–24
Pinegar 1984 Int Bus L’yer 183
Pinegar Kevin R “Privacy protection acts: privacy protection or economic protectionism?”
1984 International Business Lawyer 183–188
Pounder 1998 Computers & Sec 124
Pounder Chris “Security and the new data protection law” 1998 Computers & Security
124–128
Pounder & Kosten 1995 (21) Data Protection News 44
Pounder Chris & Kosten Freddy 1995 (21) Data Protection News 44
Price “UK data protection law”
Price David “The emergence of a UK data protection law” 131–135 in Yearbook of Law
Computers & Technology Arnold C (ed) (1984)
Prins 1998 (1) Priv & Inf 11
Prins Corien “De bescherming van persoonsgegevens: de betrokkene betrokken” 1998 (1)
Privacy & Informatie 11–14
Bibliography 768
Prins et al In het licht van de Wet Persoonsregistraties
Prins J, Van de Donk WBHJ, Van Duivenboden HPM, Ten Have K, Nouwt J, Vorselaars
HACM & Zouridis S In het licht van de Wet Persoonsregistraties: zon, maan of ster?
(1995)
Prosser 1960 Cal LR 383
Prosser William “Privacy” 1960 California Law Review 383–423
R
Raab & Bennett 1994 Pub Adm 95
Raab Charles D & Bennett Colin J “Protecting privacy across borders: European policies
and prospects” 1994 Public Administration 95–112
Rasor 1986 J Mar LR 941
Rasor Paul B “Privacy implications of consumer credit protection laws” 1986 John
Marshall Law Review 941–957
Rautenbach 2001 TSAR 115
Rautenbach IM “The conduct and the interests protected by the right to privacy in section
14 of the Constitution” 2001 Tydskrif vir die Suid-Afrikaanse Reg / Journal of South
African Law 115–123
Reed & Angel Computer law
Reed Chris & Angel John (ed) Computer law (2000)
Regan Legislating privacy
Regan Priscilla M Legislating privacy: technology, social values, and public policy
(1995)
Bibliography 769
Regan “American business and the data protection Directive”
Regan Priscilla M “American business and the European data protection Directive: lobbying
strategies and tactics” 199–216 in Visions of privacy: policy choices for the digital age
Bennett Colin J & Grant Rebecca (eds) (1999)
Reidenberg 1992 Fed Comm LJ 195
Reidenberg Joel R “Privacy in the information economy: a fortress or frontier for individual
rights” 1992 Federal Communications Law Journal 195–243
Reidenberg 1995 Iowa LR 497
Reidenberg Joel R “Setting standards for fair information practice in the US private sector”
1995 Iowa Law Review 497–551
Reidenberg & Gamet-Pol 1995 Wake Forest LR 105
Reidenberg Joel & Gamet-Pol Francoise J “The fundamental role of privacy and confidence
in the network” 1995 Wake Forest Law Review 105–125
Restatement of Torts
American Law Institute Restatement of the law of torts s 867 (1938)
Restatement (Second) of Torts
American Law Institute Restatement of the law of torts (second) s 652B – s 625E
(1977)
Riedel 1984 Human Rights LJ 67
Riedel Eibe H “New bearings in German data protection: census Act 1983 partially uncon-
stitutional” 1984 Human Rights Law Journal 67–75
Rogers Winfield & Jolowicz on torts
Bibliography 770
Rogers WVH Winfield & Jolowicz on torts (1989)
Rogovin 1986 Ann Surv Am L 587
Rogovin Michael “Privacy of financial records”1986 Annual Survey of American Law
587–607
Roos 1990 TSAR 264
Roos Anneliese “Data privacy: the American experience” 1990 Tydskrif vir die
Suid-Afrikaanse Reg / Journal of South African Law 264–278
Roos 1990 TSAR 477
Roos Anneliese “Data privacy: the American experience (continued)” 1990 Tydskrif vir
die Suid-Afrikaanse Reg / Journal of South African Law 477–490
Roos 1998 THRHR 497
Roos Anneliese “Data protection provisions in the Open Democracy Bill, 1997” 1998
Tydskrif vir Hedendaagse Romeins-Hollandse Reg / Journal of Contemporary Roman-
Dutch Law 497–506
Roos “Data protection”
Roos Anneliese “Data protection for South Africa: expectations created by the Open
Democracy Bill, 1988” in The constitutional right of access to information (Report of
seminar held on 4 September 2000 at St George’s Hotel, Rietvlei Dam, Pretoria) Konrad
Adenauer Stiftung Seminar Report no 5 (2001)
Available from<<http://www.kas.org.za/Publications.asp>> [Accessed October 2003]
Rosenbaum 1992 Jurimetrics J 1
Rosenbaum Joseph I “The European Commission’s draft Directive on data protection”
1992 Jurimetrics Journal 1–12
Bibliography 771
Rotenberg 1991 Gov Inf Q 79
Rotenberg Marc 1991 “In support of a data protection board in the United States” 1991
Government Information Quarterly 79–93
Rotenberg The privacy law sourcebook 1999
Rotenberg Marc The privacy law sourcebook 1999: United States law, international
law, and recent developments (1999)
Rothstein Genetic secrets
Rothstein Mark A (ed) Genetic secrets: protecting privacy and confidentiality in the
genetic era (1997)
Rowland & Macdonald Information technology law
Rowland Diane & Macdonald Elizabeth Information technology law (2000)
Rubenfeld 1989 Harv LR 737
Rubenfeld Jed “The right of privacy” 1989 Harvard Law Review 737–807
Rubin Private rights
Rubin Michael Rogers Private rights, public wrongs: the computer and personal
privacy (1988)
Rumbelow 1984 Int Bus L’yer 153
Rumbelow Clive “Privacy and transborder data flow in the UK and Europe” 1984
International Business Lawyer 153–157
S
Samuels & Pearce 1984 Solicitor’s J 587
Bibliography 772
Samuels Alec & Pearce Penelope “Data Protection Act 1984” 1984 Solicitor’s Journal
587–590
Savage & Edwards 1985 (6) Computer/L J 143
Savage Nigel & Edwards Chris “The legislative control of data processing – the British
approach” 1985 Computer/Law Journal 143–156
Savage & Edwards Data Protection Act
Savage Nigel & Edwards Chris A guide to the Data Protection Act (1985)
Savino & Smirti 2000 Banking LJ 7
Savino William M & Smirti Stephan J “Banks must begin to develop forms, policies and
practices to comply with federal privacy regulations” 2000 Banking Law Journal 7–24
Schlundt 1985 Inf Age 67
Schlundt Virgina “Transborder data flow and its importance in the international arena”1985
Information Age 67–70
Schreuders 1998 (2) Priv & Inf 52
Schreuders Eric “Een model van de Wet Bescherming Persoonsgegevens” 1998 (2)
Privacy & Informatie” 52–59
Schuijt Onrechtmatige daad VII
Schuijt GAI Onrechtmatige daad (part VII: aantasting eer en goede naam en andere
aantasting van de persoon) (1995)
Schulze 1994 THRHR 75
Schulze WG “The LOA life register – a snap survey of possible legal pitfalls” 1994
Tydskrif vir Hedendaagse Romeins-Hollandse Reg / Journal of Contemporary Roman-
Bibliography 773
Dutch Law 75–86
Schwartz 1989 Am J Comp L 675
Schwartz Paul M “The computer in German and American constitutional law: towards an
American right of informational self-determination” 1989 American Journal of
Comparative Law 675–701
Schwartz 1991 Am J Comp L 618
Schwartz Paul M “Book review – protecting privacy in surveillance societies: the Federal
Republic of Germany, Sweden, France, Canada and the United States” 1991 American
Journal of Comparative Law 618–625
Schwartz 1992 Hastings LJ 1321
Schwartz Paul M “Data processing and government administration: the failure of the
American legal response to the computer” 1992 Hastings Law Journal 1321–1389
Schwartz 1995 Iowa LR 471
Schwartz Paul M “European data protection law and restrictions on international data
flows” 1995 Iowa Law Review 471–496
Schwartz 1995 Iowa LR 553
Schwartz Paul M “Privacy and participation: personal information and public sector
regulation in the United States” 1995 Iowa Law Review 553–618
Schwartz 1995 Iowa LR 683
Schwartz Paul M “Panel discussion” 1995 Iowa Law Review 683
Schwartz 1995 Vand LR 295
Schwartz Paul M “The protection of privacy in health care reform” 1995 Vanderbilt Law
Bibliography 774
Review 295–347
Schwartz 1997 Tex LR 1
Schwartz Paul M “Privacy and the economics of personal health care information” 1997
Texas Law Review 1–75
Schwartz 1999 Vand LR 1609
Schwartz Paul M “Privacy and democracy in cyberspace” 1999 Vanderbilt Law Review
1609–1702
Schwartz 2000 Stanford LR 1559
Schwartz Paul M “Free speech vs information privacy: Eugene Volokh’s First Amendment
jurisprudence” 2000 Stanford Law Review 1559–1572
Schwartz & Reidenberg Data privacy law
Schwartz Paul M & Reidenberg Joel R Data privacy law: a study of United States data
protection (1996)
Scott 2001 THRHR 681
Scott Johan “Deliktuele aanspreeklikheid vir veroorsaaking van suiwer ekonomiese verlies:
die deur word wyer oopgemaak – Dersley v Minister van Veiligheid en Sekuriteit” 2001
Tydskrif vir Hedendaagse Romeins-Hollandse Reg / Journal of Contemporary Roman-
Dutch Law 681–692
Seipel “Computers and information power”
Seipel Peter “The right to know: computers and information power” 7–43 in Nordic studies
in information technology law Blume Peter (ed) (1991)
Selmer “Data protection policy”
Bibliography 775
Selmer Knut S “Data protection policy” 12–28 in From data protection to knowledge
machines – the study of law and informatics Seipel P (ed) (1990)
Seng 1985 J Mar LR 871
Seng Michael P “The Constitution and informational privacy, or how so-called
conservatives countenance governmental intrusions into a person’s private affairs” 1985
John Marshall Law Review 871–893
Sentrop Privacy-bescherming
Sentrop JW Privacy-bescherming in Nederland: schets van een ontwikkeling (1985)
Shalala 1998 Health Matrix 223
Shalala Donna E “Health care information and privacy” 1998 Health Matrix 223–232
Shattuck 1984 Hastings LJ 991
Shattuck John “In the shadow of 1984: national identification systems, computer matching
and privacy in the United States” 1984 Hastings Law Journal 991–1005
Sherland 1984 Wash LR 401
Sherland Barbara C “The functions of consumer credit reporting agencies under the Fair
Credit Reporting Act – Bryant v TRW Inc 689 F2d 72 (6th Cir 1982)” 1984 Washington
Law Review 401–416
Shiraz 1995 Int J Refugee L 179
Shiraz Mahmood “The Schengen Convention: an inequitable data protection regime” 1995
International Journal of Refugee Law 179–200
Sieber “Emergence of information law”
Sieber Ulrich “The emergence of information law: object and characteristics of a new legal
Bibliography 776
area” 1–29 in Law, information and information technology Lederman Eli & Shapira
Ron (eds) (2001)
Sieghart Privacy and computers
Sieghart Paul Privacy and computers (1976)
Sieghart “Protection of personal data” 224
Sieghart Paul “The protection of personal data: lacuna and overlap” 224–229 in Transbor-
der data flows and the protection of privacy (1979)
Simitis 1981 Am J Comp L 583
Simitis Spiros “Data protection and research: a case study of control” 1981 American
Journal of Comparative Law 583–605
Simitis 1984 NJW 398
Simitis Spiros “Die informationelle Selbstbestimmung – Grundbedingung einer verfas-
sungskonformen Informationsordnung”1984 Neue Juristische Wochenschrift 398–405
Simitis 1985 TDR 95
Simitis Spiros “Data protection: new developments, new challenges” 1985 Transnational
Data Report 95–96
Simitis 1987 U Pa LR 707
Simitis Spiros “Reviewing privacy in an information society” 1987 University of
Pennsylvania Law Review 707–746
Simitis 1995 Iowa LR 445
Simitis Spiros “From the market to the polis: the EU Directive on the protection of personal
data” 1995 Iowa Law Review 445–469
Bibliography 777
Simitis “New trends”
Simitis Spiros “New trends in national and international data protection law” 17–28 in
Recent developments in data privacy law – Belgium’s Data Protection Bill & the
European draft Directive Dumortier J (ed), Bing J, Korff D, Nugter AM, Papapavlou G,
Robben F, Simitis S (1992)
Simons Privacy in the computer age
Simons GL Privacy in the computer age (1982)
Singh “Privacy and the media”
Singh Rabinder “Privacy and the media: the impact of the Human Rights Bill” 170–190 in
Protecting privacy Markesinis Basil S (ed) (1999)
Singleton 1995 Computer L & Prac 140
Singleton Susan E “The data protection Directive” 1995 Tolley’s Computer Law &
Practice 140–144
Singleton Data protection
Singleton Susan E Data protection – the new law (1998)
Slee 1999 Inf & Comm Tech L 71
Slee David “The Data Protection Bill 1988: a comparative examination” 1999 Information
& Communications Technology Law 71–109
Sloan Law of privacy
Sloan Irving J Law of privacy rights in a technological society (1986)
Smith Compilation
Smith Robert Ellis Compilation of state & federal privacy laws (1992)
Bibliography 778
Snyman Criminal law
Snyman CR Criminal law (1995)
Solove “Identity theft”
Solove Daniel J “Identity theft, privacy, and the architecture of vulnerability” 303–353 in
Enforcing privacy rights symposium (2002) (Symposium hosted by Samuelson Law,
Technology and Public Policy Clinic Boalt Hall School of Law UC at Berkeley, Institute for
Law and Economic Policy & Hastings Law Journal, 15 & 16 Nov 2002, San Francisco)
Soma & Wehmhoefer 1983 Denver LJ 449
Soma John T & Wehmhoefer A “A legal and technical assessment of the effect of
computers on privacy” 1983 Denver Law Journal 449–483
Southard 1989 Computer/LJ 359
Southard C Dennis “Individual privacy and governmental efficiency: technology’s effect on
government’s ability to gather, store, and distribute information” 1989 Computer/Law
Journal 359–374
Stanton 1991 Hastings Con LQ 391
Stanton Martha Goldman “Florida Star v BJF: the wrongful obliteration of the tort of
invasion of privacy through the publication of private facts” 1991 Hastings Constitutional
Law Quarterly 391–416
Stassen & Stassen 2001 (Jun) De Rebus 49
Stassen Pieter & Stassen Koos “Toegang tot inligting” 2001 (Jun) De Rebus 49–50
Sterling Data Protection Act
Sterling, JAL The Data Protection Act 1984: a guide to the new legislation (1985)
Bibliography 779
Strauss et al Mediareg
Strauss SA, Strydom MJ & Van der Walt JC Mediareg (4th ed by Klopper HB) (1987)
Strong 1988 Softw LJ 391
Strong Donsia Renee “Computer Matching and Privacy Protection Act 1988: necessary
relief from the erosion of the Privacy Act of 1974” 1988 Software Law Journal 391–422
Swire & Litan None of your business
Swire Peter P & Litan Robert E None of your business – world data flows, electronic
commerce, and the European privacy Directive (1998)
T
Time Magazine 31 August 2003
Tribe Constitutional law
Tribe Laurence H American Constitutional law (1988)
Trubow 1985 J Mar LR 815
Trubow George B “Information law overview” 1985 John Marshall Law Review
815–828
Trubow 1992 NW J Int L & Bus 159
Trubow George B “The European harmonization of data protection laws threatens US
participation in trans border data flow” 1992 Northwestern Journal of International Law
and Business 159–176
Trubow “Information privacy”
Trubow George B “The development and status of ‘information privacy’ law and policy in
Bibliography 780
the United States” 1–9 in Invited papers on privacy: law, ethics, and technology
(Presented at the National Symposium on Personal Privacy and Information Technology
held in Washington DC on 4–7 October 1981) (1982)
Turkington 1997 JL Med & Ethics 113
Turkington Richard C “Medical record confidentiality law, scientific research, and data
collection in the information age” 1997 Journal of Law, Medicine & Ethics 113–129
Turkington & Allen Privacy law
Turkington Richard C & Allen Anita Privacy law: cases and materials (1999)
Turn Transborder data flows
Turn, Rein (ed) Transborder data flows: concerns in privacy protection and free flow
of information (vol 1) (1979)
U
Uglow 1998 Crim LR 235–245
Uglow Steve “Criminal records under the Police Act 1997” 1998 Criminal Law Review
235–245
Ustaran & Johnson 1997 (3) JILT 6
Ustaran Eduardo & Johnson Martineau “Data protection regulation: the challenge ahead”
1997 (3) Journal of Information Law and Technology 6
Available from <<http://elj.warwick.ac.uk/jilt/dp/97_3ust/>> [Accessed Oct 2003]
V
Van Aswegen 1995 SAJHR 50
Bibliography 781
Van Aswegen Annél “The implications of a Bill of Rights for the law of contract and
delict”1995 South African Journal on Human Rights 50–69
Van Aswegen 1993 THRHR 171
Van Aswegen Annél “Policy considerations in the law of delict” 1993 Tydskrif vir
Hedendaagse Romeins-Hollandse Reg / Journal of Contemporary Roman-Dutch Law
171–195
Van Aswegen Sameloop
Van Aswegen Annél Die sameloop van eise om skadevergoeding uit kontrakbreuk en
delik (1991)
Van der Merwe Computers and the law
Van der Merwe Dana Computers and the law (2000)
Van der Merwe & Olivier Onregmatige daad
Van der Merwe NJ & Olivier PJJ Die onregmatige daad in die Suid-Afrikaanse reg
(1989)
Van der Walt 1968 CILSA 49
Van der Walt JC “Strict liability in the South African law of delict” 1968 Comparative
International Law Journal of South Africa 49–83
Van der Walt 1993 THRHR 558
Van der Walt JC “‘Duy of care’: tendense in die Suid-Afrikaanse en Engelse regspraak”
1993 Tydskrif vir Hedendaagse Romeins-Hollandse Reg / Journal of Contemporary
Roman-Dutch Law 558–568
Van der Walt Risiko-aanspreeklikheid
Bibliography 782
Van der Walt JC Risiko-aanspreeklikheid uit onregmatige daad (1974)
Van der Walt 1998 TSAR 198
Van der Walt JWG “Freedom of expression and defamation: a reflection on recent
developments” 1998 Tydskrif vir die Suid-Afrikaanse Reg / Journal of South African
Law 198–221
Van der Walt Sommeskadeleer
Van der Walt CFC Die sommeskadeleer en die “once and for all”-reël (1977)
Van der Walt & Midgley Delict
Van der Walt JC & Midgley JR Delict: principles and cases (Vol 1: principles) (1997)
Van Dokkum 1996 De Rebus 748
Van Dokkum Neil “Should doctor-patient communications be privileged?” 1996 De Rebus
748–751
Van Heerden & Neethling Unalwful competition
Van Heerden HJO & Neethling J Unalwful competition (1995)
Van Wyk 1996 THRHR 626
Van Wyk CW “HIV of Vigs op doodsertifikate” 1996 Tydskrif vir Hedendaagse
Romeins-Hollandse Reg / Journal of Contemporary Roman-Dutch Law 626–635
Venter et al Regsnavorsing
Venter F, Van der Walt CFC, Van der Walt AJ & Pienaar GJ Regsnavorsing – metode
en publikasie 1990
Verhey Horizontale werking van grondrechten
Bibliography 783
Verhey LFM Horizontale werking van grondrechten, in besonder van het recht op
privacy (1992)
Visser 1982 THRHR 168
Visser PJ “Nalatige krenking van die reg op die fama” 1982 Tydskrif vir Hedendaagse
Romeins-Hollandse Reg / Journal of Contemporary Roman-Dutch Law 168–174
Visser 2002 THRHR 254
Visser PJ “Some principles regarding the ‘requester’ of access to a record and related
issues in terms of the Promotion of Access to Information Act 2 of 2000” 2002 Tydskrif
vir Hedendaagse Romeins-Hollandse Reg / Journal of Contemporary Roman-Dutch
Law 254–259
Visser et al Damages
Visser PJ, Potgieter JM, Steynberg Loma & Floyd TB Visser & Potgieter’s law of
damages (2003)
Volokh 2000 Stanford LR 1049
Volokh Eugene “Freedom of speech and information privacy: the troubling implications of a
right to stop people from speaking about you” 2000 Stanford Law Review 1049–1124
Vorstenbosch “Privacy and autonomy”
Vorstenbosch Jan “Privacy and autonomy: conflicting theories” 65–78 in Privacy disputed
Ippel Pieter, de Heij Guus & Crouwers Bart (eds) (1995)
Vunderink “Openbaarheid versus privacy”
Vunderink PAM “Openbaarheid versus privacy” 205–218 in Privacy in het informatie-
tijdperk Nouwt Sjaak & Voermans Wim (eds) (1996)
Bibliography 784
W
Wacks Personal information
Wacks Raymond Personal information: privacy and the law (1989)
Wacks Privacy (vol I)
Wacks Raymond Privacy Volume I: the concept of privacy (1993)
Wacks Privacy (vol II)
Wacks Raymond Privacy Volume II: privacy and the law (1993)
Wacks “Privacy reconceived”
Wacks Raymond “Privacy reconceived: protecting personal information in a digital world”
75–97 in Law, information and information technology Lederman Eli & Shapira Ron
(eds) (2001)
Walden “Data protection”
Walden Ian “Data protection” 442–471 in Computer law Reed Chris & Angel John (eds)
(1995)
Warner & Stone Data bank society
Warner Malcolm & Stone Michael The data bank society – organizations, computers
and social freedom (1970)
Warren & Brandeis 1890 Harv LR 193
Warren Samuel & Brandeis Louis “The Right to Privacy” 1890 Harvard Law Review
193–220
Weichert 1992 Computer und Recht 738
Bibliography 785
Weichert Thilo “Neue Vervassungsregelungen zur informationellen Selbstbestimmung” 1992
Computer und Recht 738–745
Wessels 2002 (Mar) De Rebus 28
Wessels Jakkie “Failed? Accessing your exam paper” 2002 (Mar) De Rebus 28–29, 32
Westin Privacy and freedom
Westin Alan F Privacy and freedom (1970)
White 1998 SAJHR 65
White Justine “Open Democracy: has the window of opportunity closed?” 1998 South
African Journal on Human Rights 65–47
Williams 1997 De Rebus 563
Williams Des “Access to information in the new South Africa” 1997 De Rebus 563–565
Williams 1982 Annals of Air & Space L 447
Williams Sylvia Maureen “Teleinformatics, the protection of privacy and the law” 1982
Annals of Air & Space Law 447–468
Wise 1991 (Mar/Apr) TDR 41
Wise Bob “US Data Protection Board needed” 1991 (Mar/Apr) Transnational Data &
Communications Report 41–44
Woodward 1997 JL Med & Ethics 88
Woodward Beverly “Medical record confidentiality and data collection: current dilemmas”
1997 Journal of Law , Medicine and Ethics 88–97
Bibliography 786
Y
Young Privacy
Young John B (ed) Privacy 1978
Z
Zimmerman 1989 NYULR 364
Zimmerman DL “False light invasion of privacy: the light that failed” 1989 New York
University Law Review 364–543
DOCUMENTS ISSUED BY INTERNATIONAL ORGANISATIONS OR DATA
PROTECTION AUTHORITIES: CONVENTIONS, DIRECTIVES, REPORTS ETC
COUNCIL OF EUROPE
Convention for the Protection of Human Rights and Fundamental Freedoms (1950)
Convention for the Protection of Individuals with regard to Automatic Processing of Data (1981)
(Convention No 108/1981) (with Explanatory Report)
Recommendation on Data Protection and Freedom of Information Recommendation 1037 (1986)
Resolution 73(22) on the Protection of the Privacy of Individuals Vis-à-vis Electronic Data Banks in
the Private Sector (1973 )
Resolution 74(29) on the Protection of the Privacy of Individuals Vis-à-vis Electronic Data Banks in
the Public Sector (1974)
Bibliography 787
EUROPEAN COMMUNITY
Community Policy on Data Processing SEC(73) 4300 final (1973 )
Recommendation 81/679 981 Official Journal L 246 (29-8-81)
Resolution on the Protection of the Rights of the Individual in the face of Technological
Developments in Data Processing 1976 Official Journal C 100/27
Resolution on the Protection of the Rights of the Individual in the face of Technological
Developments in Data Processing 1982 Official Journal C 87/39
Resolution on the Protection of the Rights of the Individual in the Face of Technological
Developments in Data Processing1982 Official Journal C 87/39
EUROPEAN UNION
Commission of the European Communities Proposal for a Council Directive concerning the
Protection of Individuals in relation to the Processing of Personal Data COM (90) final - SYN 287
Brussels 13 September 1990
Decision in the Field of Information Security 1990 Official Journal C 277/18
EU Directive on data protection
European Union Directive on the Protection of Individuals with regard to the Processing of
Personal Data and on the Free Movement of such Data Dir 95/46/EC 1995 Official
Journal L 281/ 31
Bibliography 788
EU Directive on privacy and electronic communications
European Union Directive Concerning the Processing of Personal Data and the Protection
of Privacy in the Electronic Communications Sector Dir 2002/58/EC Official Journal L
201 of 31 July 2002
EU Directive on privacy in the telecommunications sector
European Union Directive Concerning the Protection of Personal Data and the Protection
of Privacy in the Telecommunications Sector Dir 97/66/EC 1998 Official Journal L 24/1
Schengen Agreement (1985)
DATA PROTECTION WORKING PARTY DOCUMENTS
Data Protection Working Party Data protection law and the media
European Union: Data Protection Working Party Data protection law and the media
(1997)
Data Protection Working Party First annual report
European Union: Data Protection Working Party First annual report (1997)
Data Protection Working Party Judging industry self-regulation
European Union: Data Protection Working Party Working document: judging industry
self-regulation: when does it make a meaningful contribution to the level of data
protection in a third country? (1998)
Data protection Working Party Opinion 1/99 concerning the level of data protection in the
United States
European Union: Data Protection Working Party Opinion 1/99 concerning the level of
data protection in the united states and the ongoing discussions between the
Bibliography 789
European Commission and the United States Government (1999)
Data Protection Working Party Second annual report
European Union: Data Protection Working Party Second annual report (1998)
Data Protection Working Party Third annual report
European Union: Data Protection Working Party Third annual report (1999)
Data Protection Working Party Transfers of personal data to third countries
European Union: Data Protection Working Party Transfer of personal data to third
countries: applying article 25 and 26 of the EU data protection Directive (1998)
Data Protection Working Party Working document on the functioning of the Safe Harbor
Agreement
Data Protection Working Party Working document on the functioning of the Safe
Harbor Agreement (2002)
INTERNATIONAL WORKING GROUP ON DATA PROTECTION AND
TELECOMMUNICATIONS
Common Position on Data Protection and Search Engines on the Internet (1998)
Common Position on Public Accountability in Relation to Interception of Private Communications
(1998)
Common Position on Essentials for Privacy-enhancing Technologies (eg P3P) on the
WorldWideWeb (1998)
Common Position Relating to Reverse Directories (1998)
Bibliography 790
Common Statement on Cryptography (1997)
Report and Guidance on Data Protection and Privacy on the Internet (1996)
Report on Telecommunications and Privacy in Labour Relations (1989)
ORGANISATION FOR ECONOMIC COOPERATION AND DEVELOPMENT (OECD)
OECD Economic Surveys
Organisation for Economic Co-operation and Development Economic surveys 1994–-
1995 (1995)
OECD Guidelines
Organisation for Economic Co-operation and Development Guidelines on the Protection of
Privacy and Transborder Flows of Personal Data (1981)
OECD Guidelines Explanatory Memorandum
Organisation for Economic Co-operation and Development Guidelines on the Protection of
Privacy and Transborder Flows of Personal Data: Explanatory Memorandum (1981)
OECD Policy issues in data protection
Organisation for Economic Co-operation and Development (Seminar report) Policy issues
in data protection (1974)
OECD Transborder data flows and the protection of privacy
Organisation for Economic Co-operation and Development (Seminar report) Transborder
data flows and the protection of privacy (1979)
Bibliography 791
UNITED NATIONS
Guidelines for the Regulation of Computerized Personal Data Files (1990)
International Covenant on Civil and Political Rights (1966)
Universal Declaration of Human Rights (1948)
INDIVIDUAL COUNTRIES
South Africa
Joint Committee on Open Demoracy Bill Report
Ad hoc Joint Committee on Open Democracy Bill Report on the Open Democracy Bill
(2000)
Green Paper on Electronic Commerce for South Africa
Green Paper on Electronic Commerce for South Africa (Theme 2 “Building trust in the
electronic economy”)
Available from <<http://www.ecomm-debate.co.za/greenpaper/theme2.htm>> [Accessed
January 2003]
Netherlands
WBP Memorie van toelichting
Tweede Kamer der Staten-Generaal (vergaderjaar 1997–1998) Regels inzake de Bescher-
ming van Persoonsgegevens (Wet bescherming persoonsgegevens) Memorie van
Bibliography 792
toelichting (1998)
United Kingdom
a Home Office
Computers and privacy
UK Home Office Computers and privacy Cmnd 6353 (1975)
Computers: safeguards for privacy
UK Home Office Computers: safeguards for privacy Cmnd 6354 (1975)
Consultation Paper on the EC Data Protection Directive
UK Home Office Consultation Paper EC Data Protection Directive (95/46/EC) (1996)
Consultation Paper on Subordinate legislation: notification regulations
UK Home Office Consultation Paper Subordinate legislation: notification regulations
(1998)
Data protection: the Government’s proposals
UK Home Office Data Protection: the Government’s proposals Cmnd 8539 (1982)
Report of the Committee on Data Protection
UK Home Office Report of the Committee on Data Protection ( Lindop Committee)
(1978)
b House of Commons Library
Bibliography 793
House of Commons Library Research paper 98/48
House of Commons Library Research Paper 98/48 The Data Protection Bill [HL] Bill
158 of 1997-98 (1998)
c House of Lords
House of Lords Select Commitee Report on protection of personal data
House of Lords Select Commttee on the European Communities Report on protection of
personal data (1993)
d Data Potection Registrar
DPR 1998 Data protection law: latest update
Data Protection Registrar 1998 Data protection law: latest update
DPR Advice on new law
Data Protection Registrar Data Protection Directive in force: Data Protection
Registrar issues advice on new law (26 October 1998)
DPR Criminal disclosures
Data Protection Registrar Initial comments from the Data Protection Registrar:
criminal disclosures by the Commissioners staff (January 1998)
DPR Data Protection Act 1998
Data Protection Registrar Data Protection Act 1998: an introduction (1998 vers 1)
DPR Guidelines
Data Protection Registrar The Guidelines – third series November 1994 (1994)
Bibliography 794
DPR Our answers
Data Protection Registrar Consultation paper on the EC Data Protection Directive
(95/46/EC) – response of the DPR (July 1996)
DPR Questions to answers
Data Protection Registrar (UK) Questions to answers – the EU Directive and Data
Protection (April 1996)
DPR The eighth data protection principle and TBDF
Data Protection Registrar The eighth data protection principle and transborder data
flows (July 1999)
United States
IITF Options for Promoting Privacy on the National Information Infrastructure
Information Infrastructure Task Force (Privacy Working Group) Options for Promoting
Privacy on the National Information Infrastructure (1997)
National Council of Citizens in Education Children, parents, and school records (1974)
Privacy Commission Report
US Privacy Protection Study Commission Personal privacy in an information society
(1977)
US Dept of Health, Education, and Welfare Records, computers and the rights of citizens
US Department of Health, Education, and Welfare Records, computers and the rights of
citizens Report of the Secretary’s Advisory Committee on Automated Personal Data
Systems (1973)
Bibliography 795
US Dept of Justice Overview of the Privacy Act
US Department of Justice Office of Information and Privacy Overview of the Privacy Act
of 1974 (2002)
Available from <<http://www.usdoj.gov/opi.html>> [Accessed June 2003]
US Dept of Justice Privacy Act overview
US Department of Justice Office of Information and Privacy Freedom of Information Act
guide and Privacy Act overview (1995)
US House of Representatives Hearings Before the Special Subcommittee on Invasion of Privacy
US House of Representatives Hearings Before the Special Subcommittee on Invasion of
Privacy: Special inquiry on invasion of privacy part 1 June and Sept 1965, part 2 May
1966; The computer and invasion of privacy July 1966; Privacy and the national data
bank concept Aug 1968
US House of Representatives Hearing Before the Special Subcommittee on Invasion of Privacy
Commercial credit bureaus 90th Cong 2d Sess (1968)
US House of Representatives Report No 1383 95th Cong 2d Sess 33 (1978) (reprinted in 1978
US Code Cong & Ad News 9273 9305)
US Senate Federal data banks, computers, and the Bill of Rights
US Senate Federal data banks, computers, and the Bill of Rights Hearings before the
Subcommittee on Constitutional Rights of the Committee on the Judiciary 92nd Cong 1st
sess (1971)
US Senate Government dossier
US Senate Government dossier Report from the Subcommittee on Administrative Practice
and Procedure of the Committee on the Judiciary 90th Congress 1st Sess (1967)