Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Law

The Privacy Bailout: State Government Involvement In The Privacy Arena, Corey A. Ciocchetti Jan 2011

The Privacy Bailout: State Government Involvement In The Privacy Arena, Corey A. Ciocchetti

Corey A Ciocchetti

In the midst of massive government involvement in the financial, real estate and automotive sectors, other important problems linger without sufficient governmental attention. This article focuses on one area where federal intervention has been particularly absent - the realm of individual privacy in the Information Age. The problem is that monitoring in the United States is increasingly powerful and takes many forms. Online, prominent Web sites collect, store and disseminate a great deal of personally identifying information (PII) without clearly and simply informing users. This is the case even though such notice is cheap and can be effective. Offline, technology …


A Taxonomy Of Virtual Work, Miriam A. Cherry Jan 2011

A Taxonomy Of Virtual Work, Miriam A. Cherry

Faculty Publications

(Excerpt)

The blockbuster movie Avatar begins as humans circle the planet Pandora in search of an element, unobtainium, which will boost the profits of their employer, a mining corporation. Pandora, however, is already inhabited by the Na'vi, an alien species of tall, skinny, blue beings, who live in harmony with the natural environment. With the goal of learning more about the Na'vi and their world, a team of human scientists controls and inhabits vat-grown bodies, using these avatars to interact with the Na'vi. Jake, the protagonist, is a former soldier who has become a paraplegic. When Jake's identical twin, a …


Intrusive Monitoring: Employee Privacy Expectations Are Reasonable In Europe, Destroyed In The United States, Lothar Determann, Robert Sprague Dec 2010

Intrusive Monitoring: Employee Privacy Expectations Are Reasonable In Europe, Destroyed In The United States, Lothar Determann, Robert Sprague

Robert Sprague

This Article examines the contrasting policy and legal frameworks relating to data privacy in the United States and the European Union, with a particular focus on workplace privacy and intrusive surveillance technologies and practices. It examines the U.S. perspective on modern work-related employer monitoring practices, the laws giving rise to possible employee privacy rights, and specific types of employer monitoring that may lead to actionable invasions of employee privacy rights. This article then addresses the issue of employee privacy from the EU perspective, beginning with an overview of the formation of authority to protect individual privacy rights, followed by an …


Invasion Of The Social Networks: Blurring The Line Between Personal Life And The Employment Relationship, Robert Sprague Dec 2010

Invasion Of The Social Networks: Blurring The Line Between Personal Life And The Employment Relationship, Robert Sprague

Robert Sprague

Over one-half billion people worldwide have registered accounts with Facebook, the most popular online social network. This article addresses some of the more significant employment-related legal issues arising from the growing popularity of online social networks. First, the need for employers to investigate the background of prospective employees is examined from the context of employers using online social networks to conduct those investigations. In particular, this article analyzes the degree to which job applicants have privacy rights in the information they post online. This article then examines the interrelationship between online social networks and employees, focusing on limitations faced by …


The Eavesdropping Employer: A Twenty-First Century Framework For Employee Monitoring, Corey A. Ciocchetti Dec 2010

The Eavesdropping Employer: A Twenty-First Century Framework For Employee Monitoring, Corey A. Ciocchetti

Corey A Ciocchetti

The twenty-first century continues to usher in new and increasingly-powerful technology. This technology is both a blessing and a curse in the employment arena. Sophisticated monitoring software and hardware allow businesses to conduct basic business transactions, avoid liability, conduct investigations and, ultimately, achieve success in a competitive global environment. Employees can also benefit when monitoring provides immediate feedback, keeps the workforce efficient and focused and discourages unethical/illegal behavior. The same technology, however, allows employers to monitor every detail of their employees’ actions, communications and whereabouts both inside and outside the workplace. As more and more employers conduct some form of …