Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
- Publication Type
Articles 1 - 6 of 6
Full-Text Articles in Law
The Emergence Of Website Privacy Norms, Steven A. Hetcher
The Emergence Of Website Privacy Norms, Steven A. Hetcher
Michigan Telecommunications & Technology Law Review
Part I of the Article will first look at the original privacy norms that emerged at the Web's inception in the early 1990s. Two groups have been the main contributors to the emergence of these norms; the thousands of commercial websites on the early Web, on the one hand, and the millions of users of the early Web, on the other hand. The main structural feature of these norms was that websites benefitted through the largely unrestricted collection of personal data while consumers suffered injury due to the degradation of their personal privacy from this data collection. In other words, …
Criminalization Of True Anonymity In Cyberspace, The, George F. Du Pont
Criminalization Of True Anonymity In Cyberspace, The, George F. Du Pont
Michigan Telecommunications & Technology Law Review
The question of whether a state or the federal government can create a narrowly tailored restriction on cyberspace anonymity without violating the First Amendment remains unresolved[...]The Supreme Court has not directly addressed the issue, but it may soon consider the constitutionality of criminalizing certain kinds of cyber-anonymity in light of the unique nature of cyberspace. This comment explores the various forms of anonymity, examines the First Amendment status of anonymity in and outside of cyberspace, analyzes relevant scholarly commentary, and concludes that a narrowly tailored legislative restriction on "true" anonymity in cyberspace would not violate the First Amendment.
Is Coppa A Cop Out? The Child Online Privacy Protection Act As Proof That Parents, Not Government, Should Be Protecting Children's Interests On The Internet, Melanie L. Hersh
Is Coppa A Cop Out? The Child Online Privacy Protection Act As Proof That Parents, Not Government, Should Be Protecting Children's Interests On The Internet, Melanie L. Hersh
Fordham Urban Law Journal
This Note first presents a historical background of media regulations protecting children, and introduces COPPA. Next, it presents the arguments fueling the debate about who should regulate the Internet - the government or non-government entities. It then argues that in light of COPPA's shortcomings and faulty attempts to emulate regulations of other media, the government should step back and allow parents to maintain the bulk of regulatory responsibility. Finally, it suggests a future course of action for successfully regulating the Internet to protect children's privacy while taking into account the Internet's dissimilarity to previously regulated media. This Note concludes that …
E-Commerce And Trans-Atlantic Privacy, Joel R. Reidenberg
E-Commerce And Trans-Atlantic Privacy, Joel R. Reidenberg
Faculty Scholarship
For almost a decade, the United States and Europe have anticipated a clash over the protection of personal information. Between the implementation in Europe of comprehensive legal protections pursuant to the directive on data protection and the continued reliance on industry self-regulation in the United States, trans-Atlantic privacy policies have been at odds with each other. The rapid growth in e-commerce is now sparking the long-anticipated trans-Atlantic privacy clash. This Article will first look at the context of American e-commerce and the disjuncture between citizens' privacy and business practices. The Article will then turn to the international context and explore …
Chasing Bits Across Borders, Patricia L. Bellia
Chasing Bits Across Borders, Patricia L. Bellia
Journal Articles
As computer crime becomes more widespread, countries increasingly confront difficulties in securing evidence stored in electronic form outside of their borders. These difficulties have prompted two related responses. Some states have asserted a broad power to conduct remote cross-border searches - that is, to use computers within their territory to access and examine data physically stored outside of their territory. Other states have pressed for recognition of a remote cross-border search power in international fora, arguing that such a power is an essential weapon in efforts to combat computer crime. This Article explores these state responses and develops a framework …
Privacy, Ideology, And Technology: A Response To Jeffrey Rosen, Julie E. Cohen
Privacy, Ideology, And Technology: A Response To Jeffrey Rosen, Julie E. Cohen
Georgetown Law Faculty Publications and Other Works
This essay reviews Jeffrey Rosen’s The Unwanted Gaze: The Destruction of Privacy in America (2000).
Rosen offers a compelling (and often hair-raising) account of the pervasive dissolution of the boundary between public and private information. This dissolution is both legal and social; neither the law nor any other social institution seems to recognize many limits on the sorts of information that can be subjected to public scrutiny. The book also provides a rich, evocative characterization of the dignitary harms caused by privacy invasion. Rosen’s description of the sheer unfairness of being “judged out of context” rings instantly true. Privacy, Rosen …