Federal Data Banks and Constitutional Rights: A Study of Data Systems on Individuals Maintained by Agencies of the United States Government, Summary and Conclusions Prepared by the Staff of the Subcommittee on Constitutional Rights of ... , 19741974 - 53 pages |
From inside the book
Results 1-5 of 17
Page 1
... abuses by a then novel breed of snooper - the photographer , professional and amateur . * Warren and Brandeis were concerned about non - governmental in- vasions of privacy and the right of an aggrieved individual to sue for damages ...
... abuses by a then novel breed of snooper - the photographer , professional and amateur . * Warren and Brandeis were concerned about non - governmental in- vasions of privacy and the right of an aggrieved individual to sue for damages ...
Page 5
... Abuse . ) U.S. Bureau of the Budget . Task Force on the Storage of and Access to Government Statistics ; Report . Washington , 1966. Annex . U.S. President's Commission on Federal Statistics . Federal Statistics ; Report . Vol . I ...
... Abuse . ) U.S. Bureau of the Budget . Task Force on the Storage of and Access to Government Statistics ; Report . Washington , 1966. Annex . U.S. President's Commission on Federal Statistics . Federal Statistics ; Report . Vol . I ...
Page 19
... abuses of reports on the credit - worthiness of individuals . During the Ninetieth Congress , both the Special Sub ... abusive practices in the burgeoning credit industry led to the final passage of the Fair Credit Reporting Act ( P.L. ...
... abuses of reports on the credit - worthiness of individuals . During the Ninetieth Congress , both the Special Sub ... abusive practices in the burgeoning credit industry led to the final passage of the Fair Credit Reporting Act ( P.L. ...
Page 27
... Abuse Prevention Subversive Activities Control Board Tennessee Valley Authority U.S. Atomic Energy Commission U.S. Commission on Civil Rights U.S. Information Agency U.S. Postal Service U.S. Tariff Commission Veterans Administration ...
... Abuse Prevention Subversive Activities Control Board Tennessee Valley Authority U.S. Atomic Energy Commission U.S. Commission on Civil Rights U.S. Information Agency U.S. Postal Service U.S. Tariff Commission Veterans Administration ...
Page 34
... Abuse Prevention's computerized CODAP System , are examples of this type of file . They are not intended to be used against individual subjects , but neverthe- less contain data which could be used to the detriment of file subjects ...
... Abuse Prevention's computerized CODAP System , are examples of this type of file . They are not intended to be used against individual subjects , but neverthe- less contain data which could be used to the detriment of file subjects ...
Common terms and phrases
90th Congress Activities Control Board Administrative Practice Appalachian Regional Commission bill census citizens Civil Service Commission Commission_ computerized congressional Constitutional Rights Subcommittee data bank responses Department of Defense Department of Health Emergency Preparedness Ervin Farm Credit Administration Federal agencies Federal Communications Commission Federal data banks Federal Deposit Insurance Federal employees files Ibid individual privacy Information Act Invasion of Privacy Judiciary law enforcement legislative Loan Bank Board ment National Data Center Ninety-second Congress Office for Drug Office of Economic Office of Emergency percent personal information personnel Practice and Procedure Print programs proposals Railroad Retirement Board records Securities and Exchange Selective Service System Senate Special Action Office statutory authority Subcommittee on Administrative Subcommittee on Constitutional survey Tennessee Valley Authority tion U.S. Atomic Energy U.S. Commission U.S. Congress U.S. Courts U.S. Govt U.S. Information Agency U.S. Postal Service U.S. Tariff Commission Veterans Administration Washington White House wiretaps
Popular passages
Page 39 - ... (6) personnel and medical files and similar files the disclosure of which would constitute a clearly unwarranted invasion of personal privacy ; (7) investigatory files compiled for law enforcement purposes except to the extent available by law to a party other than an agency...
Page 39 - ... (5) inter-agency or intra-agency memorandums or letters which would not be available by law to a party other than an agency in litigation with the agency; (6) personnel and medical files and similar files the disclosure of which would constitute a clearly unwarranted invasion of personal privacy...
Page 39 - ... (3) Except with respect to the records made available under paragraphs (1) and (2) of this subsection, each agency, on request for identifiable records made in accordance with published rules stating the time, place, fees to the extent authorized by statute, and procedure to be followed, shall make the records promptly available to any person.
Page 43 - Department of Energy Department of Health. Education, and Welfare Department of Housing and Urban Development Department of the Interior Department of Justice Department of Labor Department of State Department of Transportation Department of the Treasury...
Page 21 - Judiciary, Subcommittee on Administrative Practice and Procedure. Invasions of privacy. Government agencies. Hearings, 89th Cong., 1st sess., Feb.
Page 39 - Nothing in this section authorizes withholding of information or limiting the availability of records to the public except as specifically stated in this section, nor shall this section be authority to withhold information from Congress.
Page 4 - Report of the Task Force on the Storage of and Access to Government Statistics, Executive Office of the President, Bureau of the Budget, October, 1966, p.
Page 39 - Public information ; agency rules, opinions, orders, records, and proceedings (a) Each agency shall make available to the public information as follows : (1) Each agency shall separately state and currently publish in the Federal Register for the guidance of the public — (A) descriptions of its central and field organization and the established places at which, the employees (and in the case of a uniformed service, the members) from whom, and the...
Page 19 - The Special Subcommittee on Invasion of Privacy of the House Committee on Government Operations held a series of hearings relating to threats to Invade the privacy of individual and business firms in 1965 and 1966, and has continued its investigations in these matters.
Page 9 - ... we would like to know just what information would be stored in a national data center; who would have access to it; who would control the computers; and, most importantly, how confidentiality and individual privacy would be protected.