Open Access. Powered by Scholars. Published by Universities.®
- Publication Type
- File Type
Articles 1 - 5 of 5
Full-Text Articles in Law
The Privacy Bailout: State Government Involvement In The Privacy Arena, Corey A. Ciocchetti
The Privacy Bailout: State Government Involvement In The Privacy Arena, Corey A. Ciocchetti
Corey A Ciocchetti
In the midst of massive government involvement in the financial, real estate and automotive sectors, other important problems linger without sufficient governmental attention. This article focuses on one area where federal intervention has been particularly absent - the realm of individual privacy in the Information Age. The problem is that monitoring in the United States is increasingly powerful and takes many forms. Online, prominent Web sites collect, store and disseminate a great deal of personally identifying information (PII) without clearly and simply informing users. This is the case even though such notice is cheap and can be effective. Offline, technology …
A Taxonomy Of Virtual Work, Miriam A. Cherry
A Taxonomy Of Virtual Work, Miriam A. Cherry
Faculty Publications
(Excerpt)
The blockbuster movie Avatar begins as humans circle the planet Pandora in search of an element, unobtainium, which will boost the profits of their employer, a mining corporation. Pandora, however, is already inhabited by the Na'vi, an alien species of tall, skinny, blue beings, who live in harmony with the natural environment. With the goal of learning more about the Na'vi and their world, a team of human scientists controls and inhabits vat-grown bodies, using these avatars to interact with the Na'vi. Jake, the protagonist, is a former soldier who has become a paraplegic. When Jake's identical twin, a …
Intrusive Monitoring: Employee Privacy Expectations Are Reasonable In Europe, Destroyed In The United States, Lothar Determann, Robert Sprague
Intrusive Monitoring: Employee Privacy Expectations Are Reasonable In Europe, Destroyed In The United States, Lothar Determann, Robert Sprague
Robert Sprague
This Article examines the contrasting policy and legal frameworks relating to data privacy in the United States and the European Union, with a particular focus on workplace privacy and intrusive surveillance technologies and practices. It examines the U.S. perspective on modern work-related employer monitoring practices, the laws giving rise to possible employee privacy rights, and specific types of employer monitoring that may lead to actionable invasions of employee privacy rights. This article then addresses the issue of employee privacy from the EU perspective, beginning with an overview of the formation of authority to protect individual privacy rights, followed by an …
Invasion Of The Social Networks: Blurring The Line Between Personal Life And The Employment Relationship, Robert Sprague
Invasion Of The Social Networks: Blurring The Line Between Personal Life And The Employment Relationship, Robert Sprague
Robert Sprague
Over one-half billion people worldwide have registered accounts with Facebook, the most popular online social network. This article addresses some of the more significant employment-related legal issues arising from the growing popularity of online social networks. First, the need for employers to investigate the background of prospective employees is examined from the context of employers using online social networks to conduct those investigations. In particular, this article analyzes the degree to which job applicants have privacy rights in the information they post online. This article then examines the interrelationship between online social networks and employees, focusing on limitations faced by …
The Eavesdropping Employer: A Twenty-First Century Framework For Employee Monitoring, Corey A. Ciocchetti
The Eavesdropping Employer: A Twenty-First Century Framework For Employee Monitoring, Corey A. Ciocchetti
Corey A Ciocchetti
The twenty-first century continues to usher in new and increasingly-powerful technology. This technology is both a blessing and a curse in the employment arena. Sophisticated monitoring software and hardware allow businesses to conduct basic business transactions, avoid liability, conduct investigations and, ultimately, achieve success in a competitive global environment. Employees can also benefit when monitoring provides immediate feedback, keeps the workforce efficient and focused and discourages unethical/illegal behavior. The same technology, however, allows employers to monitor every detail of their employees’ actions, communications and whereabouts both inside and outside the workplace. As more and more employers conduct some form of …