Table of Contents

Research Handbook on Electronic Commerce Law

Research Handbook on Electronic Commerce Law

Research Handbooks in Information Law

John A. Rothchild

The steady growth of internet commerce over the past twenty years has given rise to a host of new legal issues in a broad range of fields. This authoritative Research Handbook comprises chapters by leading scholars which will provide a solid foundation for newcomers to the subject and also offer exciting new insights that will further the understanding of e-commerce experts. Key topics covered include: contracting, payments, intellectual property, extraterritorial enforcement, alternative dispute resolution, social media, consumer protection, network neutrality, online gambling, domain name governance, and privacy.

Chapter 19: Protecting privacy with “heightened” notice and choice

James P Nehf

Subjects: law - academic, commercial law, internet and technology law, law -professional, technology, media and telecommunications law


The 2014 White House paper on privacy and big data signaled that the Obama administration might acknowledge that efforts to limit data collection online through a “notice and choice” regime have failed and instead work toward developing data privacy norms that focus more on permissible purposes of data collection in an attempt to limit its use post-collection. When it came to proposing legislation, however, the administration retreated from its earlier rhetoric, and in 2015 proposed a privacy Bill of Rights that wholly embraced notice and choice, albeit in an enhanced or heightened state for certain kinds of data collection that were perceived to be particularly sensitive. The first section of this chapter discusses the proposed privacy legislation and its inclusion of a heightened notice and choice framework. The second part explains why even heightened notice and choice fails to protect legitimate privacy interests, particularly in an online environment. The third section explores what a regime based on permissible uses of data might look like and includes suggestions on how we might get there.

You are not authenticated to view the full text of this chapter or article.

Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.

Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.

Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.

Further information