Peter Swire
American academic
Peter Swire's AcademicInfluence.com Rankings
Download Badge
Law Political Science
Peter Swire's Degrees
- Bachelors Mathematics Princeton University
Similar Degrees You Can Earn
Why Is Peter Swire Influential?
(Suggest an Edit or Addition)According to Wikipedia, Peter P. Swire is the J.Z. Liang Chair in the School of Cybersecurity and Privacy in the College of Computing at the Georgia Institute of Technology. Swire is also Professor of Law and Ethics in the Scheller College of Business and has an appointment by courtesy with the School of Public Policy. He is an internationally recognized expert in privacy law. Swire is also a senior fellow at the Future of Privacy Forum and has served on the National Academies of Science and Engineering Forum on Cyber Resilience. During the Clinton administration, he became the first person to hold the position of Chief Counselor for Privacy in the Office of Management and Budget. In this role, he coordinated administration policy on privacy and data protection, including interfacing with privacy officials in foreign countries. He may be best known for shaping the Health Insurance Portability and Accountability Act Privacy Rule while serving as the Chief Counselor for Privacy. In November 2012 he was named as co-chair of the Tracking Protection Working Group of the World Wide Web Consortium , to attempt to mediate a global Do Not Track standard. In August 2013, President Obama named Swire as one of five members of the Director of National Intelligence Review Group on Intelligence and Communications Technologies.
Peter Swire's Published Works
Published Works
- Markets, Self-Regulation, and Government Enforcement in the Protection of Personal Information, in Privacy and Self-Regulation in the Information Age by the U.S. Department of Commerce. (1997) (86)
- Identifying and classifying ambiguity for regulatory requirements (2014) (74)
- Automated text mining for requirements analysis of policy documents (2013) (74)
- Liberty and Security in a Changing World: Report and Recommendations of The President's Review Group on Intelligence and Communications Technologies (2013) (61)
- Why the Right to Data Portability Likely Reduces Consumer Welfare: Antitrust and Privacy Critique (2013) (56)
- None of Your Business: World Data Flows, Electronic Commerce, and the European Privacy Directive (1998) (47)
- The Race to Laxity and the Race to Undesirability: Explaining Failures in Competition Among Jurisdictions in Environmental Law (1996) (44)
- A legal cross-references taxonomy for reasoning about compliance requirements (2012) (42)
- A legal cross-references taxonomy for identifying conflicting software requirements (2011) (40)
- Learning to Create Jazz Melodies Using Deep Belief Nets (2010) (40)
- A Model for When Disclosure Helps Security: What Is Different About Computer and Network Security? (2004) (38)
- The Race to the Bottom and Federal Environmental Regulation : A Response to Critics (2013) (37)
- Efficient Confidentiality for Privacy, Security, and Confidential Business Information (2003) (29)
- Security and privacy after September 11: the health care example (2002) (29)
- Of Elephants, Mice, and Privacy: International Choice of Law and the Internet (1998) (28)
- Elephants and Mice Revisited: Law and Choice of Law on the Internet (2005) (27)
- No Cop on the Beat: Underenforcement in E-Commerce and Cybercrime (2008) (27)
- Financial Privacy and the Theory of High-Tech Government Surveillance (1998) (26)
- Managing changing compliance requirements by predicting regulatory evolution (2012) (24)
- The Surprising Virtues of the New Financial Privacy Law (2002) (19)
- The NSA Report: Liberty and Security in a Changing World (2014) (16)
- State Wiretaps and Electronic Surveillance After September 11 (2003) (14)
- Bank Insolvency Law Now that It Matters Again (1992) (14)
- The System of Foreign Intelligence Surveillance Law (2004) (13)
- ‘ Going Dark ’ Versus a ‘ Golden Age for Surveillance ’ (2012) (13)
- Equality of Opportunity and Investment in Creditworthiness (1995) (13)
- Privacy and Information Sharing in the War on Terrorism (2006) (12)
- Encryption and Globalization (2011) (12)
- Katz is Dead. Long Live Katz. (2004) (11)
- The ethical and legal implications of Jaffee v Redmond and the HIPAA medical privacy rule for psychotherapy and general psychiatry. (2002) (9)
- A Strategy for Addressing Ambiguity in Regulatory Requirements (2015) (8)
- Defining the Internet of Devices: Privacy and Security Implications (2014) (8)
- From Real-Time Intercepts to Stored Records: Why Encryption Drives the Government to Seek Access to the Cloud (2012) (8)
- Social Networks, Privacy, and Freedom of Association: Data Empowerment vs. Data Protection (2012) (7)
- The Uses and Limits of Financial Cryptography: A Law Professor's Perspective (1997) (6)
- Privacy for the People? Exploring Collective Action as a Mechanism to Shift Power to Consumers in End-User Privacy (2021) (6)
- A Theory of Disclosure for Security and Competitive Reasons : Open Source , Proprietary Software , and Government Systems (2011) (6)
- A Theory of Disclosure for Security and Competitive Reasons: Open Source, Proprietary Software, and Government Agencies (2006) (6)
- Reply: Safe Harbors and a Proposal to Improve the Community Reinvestment Act (1993) (5)
- Privacy excerpt from “Towards Digital eQuality: the U.S. Government working group on electronic commerce” (2000) (5)
- Trustwrap: The Importance of Legal Rules to Electronic Commerce and Internet Privacy (2003) (5)
- A pedagogic cybersecurity framework (2018) (5)
- What Should be Hidden and Open in Computer Security: Lessons from Deception, the Art of War, Law, and Economic Theory (2001) (5)
- A Mutual Legal Assistance Case Study: The United States and France (2017) (4)
- The Second Wave of Global Privacy Protection: Symposium Introduction (2013) (4)
- Privacy and Security A Pedagogic Cybersecurity Framework (2018) (3)
- How Both the Eu and the U.S. Are "Stricter" Than Each Other for the Privacy of Government Requests for Information (2016) (3)
- Mutual Legal Assistance in an Era of Globalized Communications: The Analogy to the Visa Waiver Program (2016) (3)
- Clarifying the Internet of Things by Defining the Internet of Devices (2014) (3)
- US Surveillance Law, Safe Harbor, and Reforms Since 2013 (2015) (3)
- The Privacy Paradox: Privacy and Its Conflicting Values (2012) (3)
- The Portability and Other Required Transfers Impact Assessment: Assessing Competition, Privacy, Cybersecurity, and Other Considerations (2020) (3)
- A Reasonableness Approach to Searches After the Jones GPS Tracking Case (2012) (3)
- Why the Federal Government Should Have a Privacy Policy Office (2011) (2)
- The Law and Economics of Cybersecurity: A Model for When Disclosure Helps Security: What Is Different about Computer and Network Security? (2005) (2)
- Building Common Approaches for Cybersecurity and Privacy in a Globalized World (2019) (2)
- After Schrems II: A Proposal to Meet the Individual Redress Challenge (2020) (2)
- Consumers as Producers (2008) (2)
- What Base Text to Use for the Do Not Track Compliance Specification, with Explanatory Memorandum (2013) (2)
- Stakeholders in Reform of the Global System for Mutual Legal Assistance (2015) (2)
- A Political Economy of the Business Judgment Rule in Banking : Implications for Corporate Law (2015) (2)
- Incorporation of Independent Agencies into the Executive Branch (1985) (2)
- Proportionality for High-Tech Searches (2009) (1)
- Introductory Essay for 2008 Privacy Year in Review (2005) (1)
- The Data Protection Commissioner and Facebook Ireland Limited and Maximillian Schrems, Affidavit of Peter Swire (2016) (1)
- When Should “Consumers-as-Producers” Have to Comply With Consumer Protection Laws? (2008) (1)
- Security market: incentives for disclosure of vulnerabilities (2005) (1)
- Appendix B: Overview of NSA Privacy Protections Under FAA 702; Overview of NSA Privacy Protections Under EO 12333 (2014) (1)
- Trustmarks and Privacy (2014) (1)
- Chapter Seven. Global Communications Technology: Promoting Prosperity, Security, and Openness in a Networked World (2014) (1)
- Finding the Best of the Imperfect Alternatives for Privacy, Health IT, and Cybersecurity (2012) (1)
- Ethics and Privacy in Mixed Reality (2020) (1)
- Privacy and Cybersecurity Lessons at the Intersection of the Internet of Things and Police Body-Worn Cameras (2018) (1)
- THE JOHN MARSHALL REVIEW OF INTELLECTUAL PROPERTY LAW (2005) (1)
- Privacy and security: what are you doing to keep the community safe? (2008) (0)
- Copyright & Privacy - Through the Privacy Lens (2004) (0)
- Cyber MayDay: Who Is in Command When Your Business is in the Crosshairs and How Do You Respond? (2017) (0)
- Appendix C: US Intelligence: Multiple Layers of Rules and Oversight (2014) (0)
- A legal cross-references taxonomy for reasoning about compliance requirements (2012) (0)
- The Effects of Data Localization on Cybersecurity (2022) (0)
- Introductory Essay for "Privacy Law Year in Review, 2005-2006" (2006) (0)
- Chapter Six. Organizational Reform in Light of Changing Communications Technology (2014) (0)
- Appendix E: US Government Role in Current Encryption Standards (2014) (0)
- Appendix F: Review Group Briefings and Meetings (2014) (0)
- Data & Jurisdiction Policy Options: Cross-border access to user data (2017) (0)
- Introductory Essay for '2004 Privacy Law Year in Review' (2005) (0)
- Consumers as Producers: The Personal Mainframe and the Law of Computing (2008) (0)
- A Prognosis for Use of Health, Medical, and Genetic Information (2002) (0)
- How to Address Standardless Discretion after Jones (2012) (0)
- Chapter Four. Reforming Foreign Intelligence Surveillance Directed at Non- United States Persons (2014) (0)
- The Non-Code Aspects of Cybersecurity and the Globalization of Criminal Evidence (2017) (0)
- When Does GDPR Act as a Blocking Statute: The Relevance of a Lawful Basis for Transfer (2019) (0)
- Privacy and Surveillance With New Technologies (2012) (0)
- Defining the Scope of 'Possession, Custody, or Control' for Privacy Issues and the Cloud Act (2019) (0)
- What the Fair Credit Reporting Act Should Teach Us About Mortgage Servicing (2011) (0)
- Chapter One. Principles (2014) (0)
- Hot Topics: Health Privacy (2000) (0)
- Appendix D: Avenues for Whistle-blowers in the Intelligence Community (2014) (0)
- Biometrics for Security and Counterterrorism (2008) (0)
- Chapter Eight. Protecting What We Do Collect (2014) (0)
- Chapter Five. Determining What Intelligence Should Be Collected and How (2014) (0)
- Delivering ERISA Disclosure for Defined Contribution Plans: Why the Time Has Come to Prefer Electronic Delivery (2011) (0)
- Session III: Privacy Regulation and Policy Perspectives, 29 J. Marshall J. Computer & Info. L. 343 (2012) (2012) (0)
- part of of a (2008) (0)
- Session on "Cyberlaw" at the Intellectual Property Scholars Conference at DePaul University College of Law (2011) (0)
- Peter Hustinx and Three Clichés About E.U.-U.S. Data Privacy (2014) (0)
- Appendix A: The Legal Standards for Government Access to Communications (2014) (0)
- Chapter Two. Lessons of History (2014) (0)
- Copyright & Privacy - Through the Privacy Lens, 4 J. Marshall Rev. Intell. Prop. L. 273 (2005) (2005) (0)
- Appendix G: Glossary (2014) (0)
This paper list is powered by the following services:
Other Resources About Peter Swire
What Schools Are Affiliated With Peter Swire?
Peter Swire is affiliated with the following schools: