Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Privacy Law

University of Michigan Law School

Articles 61 - 90 of 172

Full-Text Articles in Law

Does Law Matter Online - Empirical Evidence On Privacy Law Compliance, Michael Birnhack, Niva Elkin-Koren Jan 2011

Does Law Matter Online - Empirical Evidence On Privacy Law Compliance, Michael Birnhack, Niva Elkin-Koren

Michigan Telecommunications & Technology Law Review

Does law matter in the information environment? What can we learn from the experience of applying a particular legal regime to the online environment? Informational privacy (or to use the European term, data protection) provides an excellent illustration of the challenges faced by regulators who seek to secure user rights and shape online behavior. A comprehensive study of Israeli website compliance with information privacy regulation in 2003 and 2006 provides insights for understanding these challenges. The study examined the information privacy practices of 1360 active websites, determining the extent to which these sites comply with applicable legal requirements related to …


A Path Toward User Control Of Online Profiling, Tracy A. Steindel Jan 2011

A Path Toward User Control Of Online Profiling, Tracy A. Steindel

Michigan Telecommunications & Technology Law Review

Online profiling is "the practice of tracking information about consumers' interests by monitoring their movements online." A primary purpose of online profiling is to "deliver advertising tailored to the individual's interests," a practice known as online behavioral advertising (OBA). In order to accomplish this, publishers and advertisers track a individual's online behavior using cookies and other means. Publishers and advertisers aggregate the information, often compile it with information from offline sources, and sort individuals into groups based on characteristics such as age, income, and hobbies. Advertisers can then purchase access to these consumer groups, controlling their selections with such specificity …


Disentangling Administrative Searches, Eve Brensike Primus Jan 2011

Disentangling Administrative Searches, Eve Brensike Primus

Articles

Everyone who has been screened at an international border, scanned by an airport metal detector, or drug tested for public employment has been subjected to an administrative search. Since September 11th, the government has increasingly invoked the administrative search exception to justify more checkpoints, unprecedented subway searches, and extensive wiretaps. As science and technology advance, the frequency and scope of administrative searches will only expand. Formulating the boundaries and requirements of administrative search doctrine is therefore a matter of great importance. Yet the rules governing administrative searches are notoriously unclear. This Article seeks to refocus attention on administrative searches and …


There Is A Time To Keep Silent And A Time To Speak, The Hard Part Is Knowing Which Is Which: Striking The Balance Between Privacy Protection And The Flow Of Health Care Information, Daniel J. Gilman, James C. Cooper Jan 2010

There Is A Time To Keep Silent And A Time To Speak, The Hard Part Is Knowing Which Is Which: Striking The Balance Between Privacy Protection And The Flow Of Health Care Information, Daniel J. Gilman, James C. Cooper

Michigan Telecommunications & Technology Law Review

Health information technology (HIT) has become a signal element of federal health policy, especially as the recently enacted American Recovery and Reinvestment Act of 2009 (Recovery Act or ARRA) comprises numerous provisions related to HIT and commits tens of billions of dollars to its development and adoption. These provisions charge various agencies of the federal government with both general and specific HIT-related implementation tasks including, inter alia, providing funding for HIT in various contexts: the implementation of interoperable HIT, HIT-related infrastructure, and HIT-related training and research. The Recovery Act also contains various regulatory provisions pertaining to HIT. Provisions of the …


Gina's Genotypes, David H. Kaye Jan 2010

Gina's Genotypes, David H. Kaye

Michigan Law Review First Impressions

In August 2009, the Board of Trustees of the University of Akron added to the university's employment policy the following proviso: "any applicant may be asked to submit fingerprints or DNA sample for purpose of a federal criminal background check." Although the federal government does not do background checks with DNA, the policy is significant because it highlights a largely unexplored feature of the Genetic Information Nondiscrimination Act of 2008 ("GINA"). Hailed by the late Senator Edward Kennedy as "the first civil rights bill of the new century of life sciences," GINA generally prohibits employers from asking for "genetic information." …


Visionary Pragmatism And The Value Of Privacy In The Twenty-First Century, Danielle Keats Citron, Leslie Meltzer Henry Jan 2010

Visionary Pragmatism And The Value Of Privacy In The Twenty-First Century, Danielle Keats Citron, Leslie Meltzer Henry

Michigan Law Review

Part I of our Review discusses the central premises of Understanding Privacy, with particular attention paid to Solove's pragmatic methodology and his taxonomy of privacy. We introduce his pluralistic approach to conceptualizing privacy, which urges decision makers to assess privacy problems in context, and we explore his view that meaningful choices about privacy depend on an appreciation of how privacy benefits society as a whole. We also describe how Solove's taxonomy aims to account for the variety of activities that threaten privacy. In Part II, we analyze the strengths of Solove's pragmatism by demonstrating its functionality and flexibility in …


Privacy 3.0-The Principle Of Proportionality, Andrew B. Serwin Jul 2009

Privacy 3.0-The Principle Of Proportionality, Andrew B. Serwin

University of Michigan Journal of Law Reform

Individual concern over privacy has existed as long as humans have said or done things they do not wish others to know about. In their groundbreaking law review article The Right to Privacy, Warren and Brandeis posited that the common law should protect an individual's right to privacy under a right formulated as the right to be let alone-Privacy 1.0. As technology advanced and societal values also changed, a belief surfaced that the Warren and Brandeis formulation did not provide sufficient structure for the development of privacy laws. As such, a second theoretical construct of privacy, Privacy 2.0 as …


Do We Need A New Fourth Amendment?, Orin S. Kerr Apr 2009

Do We Need A New Fourth Amendment?, Orin S. Kerr

Michigan Law Review

Slobogin's book offers a new conceptualization of the Fourth Amendment rooted in what he calls the proportionality principle: An investigative technique should be permitted under the Constitution only if the strength of the government's justification for the technique is roughly proportionate to the level of intrusion it causes . Slobogin roots this principle in Terry v. Ohio and its pragmatic balancing of law-enforcement and privacy interests. To determine how much justification the Fourth Amendment requires, Slobogin argues, courts should assess the intrusiveness of the investigatory technique and then set a proportionate threshold of proof that the government must show. The …


When Mobile Phones Are Rfid-Equipped - Finding E.U.-U.S. Solutions To Protect Consumer Privacy And Facilitate Mobile Commerce, Nancy J. King Jan 2008

When Mobile Phones Are Rfid-Equipped - Finding E.U.-U.S. Solutions To Protect Consumer Privacy And Facilitate Mobile Commerce, Nancy J. King

Michigan Telecommunications & Technology Law Review

New mobile phones have been designed to include delivery of mobile advertising and other useful location-based services, but have they also been designed to protect consumers' privacy? One of the key enabling technologies for these new types of phones and new mobile services is Radio Frequency Identification (RFID), a wireless communication technology that enables the unique identification of tagged objects. In the case of RFID-enabled mobile phones, the personal nature of the devices makes it very likely that, by locating a phone, businesses will also be able to locate its owner. Consumers are currently testing new RFID-enabled phones around the …


Biometrics: Weighing Convenience And National Security Against Your Privacy, Lauren D. Adkins Jan 2007

Biometrics: Weighing Convenience And National Security Against Your Privacy, Lauren D. Adkins

Michigan Telecommunications & Technology Law Review

The biometric identifier relies on an individual's unique biological information such as a hand, iris, fingerprint, facial or voice print. When used for verification purposes, a "one-to-one" match is generated in under one second. Biometric technology can substantially improve national security by identifying and verifying individuals in a number of different contexts, providing security in ways that exceed current identification technology and limiting access to areas where security breaches are especially high, such as airport tarmacs and critical infrastructure facilities. At the same time, a legitimate public concern exists concerning the misuse of biometric technology to invade or violate personal …


Towards A Right To Privacy In Transnational Intelligence Networks, Francesca Bignami Jan 2007

Towards A Right To Privacy In Transnational Intelligence Networks, Francesca Bignami

Michigan Journal of International Law

Privacy is one of the most critical liberal rights to come under pressure from transnational intelligence gathering. This Article explores the many ways in which transnational intelligence networks intrude upon privacy and considers some of the possible forms of legal redress. Part II lays bare the different types of transnational intelligence networks that exist today. Part III begins the analysis of the privacy problem by examining the national level, where, over the past forty years, a legal framework has been developed to promote the right to privacy in domestic intelligence gathering. Part IV turns to the privacy problem transnationally, when …


Confidentiality Of Educational Records And Child Protective Proceedings, Frank E. Vandervort Jan 2007

Confidentiality Of Educational Records And Child Protective Proceedings, Frank E. Vandervort

Book Chapters

The Federal Family Education Rights and Privacy Act (FERPA), which provides funding for state educational programming, requires that student records be disclosed to a nonparent only with the written consent of the child’s parent, unless the disclosure falls within one of the several exceptions detailed in the statute. One of the exemptions provided for in the federal law permits a school to disclose information to “state or local officials or authorities to whom [that] information is allowed to be reported or disclosed pursuant to state statute,” if that official certifies in writing “that the information will not be disclosed to …


Password Theft: Rethinking An Old Crime In A New Era, Daniel S. Shamah Oct 2006

Password Theft: Rethinking An Old Crime In A New Era, Daniel S. Shamah

Michigan Telecommunications & Technology Law Review

By putting themselves out in front as the victims, the Recording Industry Association of America (RIAA) helped reshape the governing norms of the times, and as a result, people viewed the act of file-sharing differently. By forcing people to see music downloading as a form of theft, the RIAA was quite successful in deterring it. In the process, they also proposed a radical view of theft that changes our basic economic understandings of the action[...] This paper argues that the RIAA's model for deterring music theft could be successfully used to deter many other forms of computer theft, and, specifically, …


Hipaa-Cracy, Carl E. Schneider Jan 2006

Hipaa-Cracy, Carl E. Schneider

Articles

The Department of Health and Human Services has recently been exercising its authority under the (wittily named) "administrative simplification" part of the Health Insurance Portability and Accountability Act to regulate the confidentiality of medical records. I love the goal; I loathe the means. The benefits are obscure; the costs are onerous. Putatively, the regulations protect my autonomy; practically, they ensnarl me in red tape and hijack my money for services I dislike. HIPAA (a misnomer-HIPAA is the statute, not the regulations) is too lengthy, labile, complex, confused, unfinished, and unclear to be summarized intelligibly or reliably. (Brevis esse laboro, …


'Code' And The Slow Erosion Of Privacy, Bert-Jaap Koops, Ronald Leenes Sep 2005

'Code' And The Slow Erosion Of Privacy, Bert-Jaap Koops, Ronald Leenes

Michigan Telecommunications & Technology Law Review

The notion of software code replacing legal code as a mechanism to control human behavior--"code as law"--is often illustrated with examples in intellectual property and freedom of speech. This Article examines the neglected issue of the impact of "code as law" on privacy. To what extent is privacy-related "code" being used, either to undermine or to enhance privacy? On the basis of cases in the domains of law enforcement, national security, E-government, and commerce, it is concluded that technology rarely incorporates specific privacy-related norms. At the same time, however, technology very often does have clear effects on privacy, as it …


Transgovernmental Networks Vs. Democracy: The Case Of The European Information Privacy Network, Francesca Bignami Jan 2005

Transgovernmental Networks Vs. Democracy: The Case Of The European Information Privacy Network, Francesca Bignami

Michigan Journal of International Law

The perspective offered by this Article is twofold. The emergence of transgovernmental networks gives rise to two questions, one causal and the other normative. First, how do we explain transnational cooperation through networks? Why do governments and regulators choose to establish networks rather than retain virtually limitless discretion over policymaking, conditioned only by international legal obligations? Based on the author’s examination of the records of the intergovernmental negotiations on the Data Protection Directive, this Article concludes that one precondition for fettering national discretion through networks is common preferences among governments on the substance of the policy to be administered. Compared …


Beyond The "War" On Terrorism: Towards The New Intelligence Network, Ronald D. Lee, Paul M. Schwartz Jan 2005

Beyond The "War" On Terrorism: Towards The New Intelligence Network, Ronald D. Lee, Paul M. Schwartz

Michigan Law Review

In Terrorism, Freedom, and Security, Philip B. Heymann undertakes a wide-ranging study of how the United States can - and in his view should - respond to the threat of international terrorism. A former Deputy Attorney General of the United States Department of Justice ("DOJ") and current James Barr Ames Professor of Law at Harvard Law School, Heymann draws on his governmental experience and jurisprudential background in developing a series of nuanced approaches to preventing terrorism. Heymann makes clear his own policy and legal preferences. First, as his choice of subtitle suggests, he firmly rejects the widely used metaphor …


Lawrence V. Texas And Judicial Hubris, Nelson Lund, John O. Mcginnis Jun 2004

Lawrence V. Texas And Judicial Hubris, Nelson Lund, John O. Mcginnis

Michigan Law Review

The republic will no doubt survive the Supreme Court's decision, in Lawrence v. Texas, to invalidate laws against private, consensual sodomy, including those limited to homosexual behavior. Such laws are almost never enforced, and the rare prosecutions for such acts are necessarily capricious. So the principal direct effect of the Court's decision is likely to be extremely limited, and largely salutary: a few individuals will be spared the bad luck of getting a criminal conviction for violating laws that are manifestly out of step with prevailing sexual mores. Nor are we likely to see anything like the intense political …


Sexual Orientation And The Paradox Of Heightened Scrutiny, Nan D. Hunter Jun 2004

Sexual Orientation And The Paradox Of Heightened Scrutiny, Nan D. Hunter

Michigan Law Review

In Lawrence v. Texas, the Supreme Court performed a double move, creating a dramatic discursive moment: it both decriminalized consensual homosexual relations between adults, and, simultaneously, authorized a new regime of heightened regulation of homosexuality. How that happened and what we can expect next are the subjects of this essay. The obvious point of departure for an analysis of Lawrence is its decriminalization of much sexual conduct. Justice Scalia began this project with his dire warning that "[s]tate laws against bigamy, samesex marriage, adult incest, prostitution, masturbation, adultery, fornication, bestiality, and obscenity are . . . sustainable only in …


Surviving Lawrence V. Texas, Marc Spindelman Jun 2004

Surviving Lawrence V. Texas, Marc Spindelman

Michigan Law Review

The lesbian and gay communities have reacted to the Supreme Court's decision in Lawrence v. Texas - striking down state sodomy laws on Due Process grounds - with unbridled enthusiasm. Lawrence has variously been praised as an unmitigated victory for lesbian and gay rights, a turning point in our community's history, and the moment when we have gone from second-class political outcasts to constitutional persons with first-class rights. Obviously, something remarkable happened in Lawrence. In an opinion written by Justice Anthony Kennedy, the Court declared that John Geddes Lawrence and Tyrone Gamer, who had been convicted under Texas's sodomy …


Technology, Privacy, And The Courts: A Reply To Colb And Swire, Orin S. Kerr Mar 2004

Technology, Privacy, And The Courts: A Reply To Colb And Swire, Orin S. Kerr

Michigan Law Review

I thank Sherry Colb and Peter Swire for devoting their time and considerable talents to responding to my article, The Fourth Amendment and New Technologies: Constitutional Myths and the Case for Caution. I will conclude with a few comments.


A World Without Privacy: Why Property Does Not Define The Limits Of The Right Against Unreasonable Searches And Seizures, Sherry F. Colb Mar 2004

A World Without Privacy: Why Property Does Not Define The Limits Of The Right Against Unreasonable Searches And Seizures, Sherry F. Colb

Michigan Law Review

Imagine for a moment that it is the year 2020. An American company has developed a mind-reading device, called the "brain wave recorder" ("BWR"). The BWR is a highly sensitive instrument that detects electrical impulses from any brain within ten feet of the machine. Though previously thought impossible, the BWR can discern the following information about the target individual: (1) whether he or she is happy, sad, anxious, depressed, or irritable; (2) whether he or she is even slightly sexually aroused; (3) whether he or she is taking any medication (and if so, what the medication is); (4) if a …


The Fourth Amendment And New Technologies: Constitutional Myths And The Case For Caution, Orin S. Kerr Mar 2004

The Fourth Amendment And New Technologies: Constitutional Myths And The Case For Caution, Orin S. Kerr

Michigan Law Review

To one who values federalism, federal preemption of state law may significantly threaten the autonomy and core regulatory authority of The Supreme Court recently considered whether a1mmg an infrared thermal imaging device at a suspect's home can violate the Fourth Amendment. Kyllo v. United States announced a new and comprehensive rule: the government's warrantless use of senseenhancing technology that is "not in general use" violates the Fourth Amendment when it yields "details of the home that would previously have been unknowable without physical intrusion." Justice Scalia's majority opinion acknowledged that the Court's rule was not needed to resolve the case …


Katz Is Dead. Long Live Katz, Peter P. Swire Mar 2004

Katz Is Dead. Long Live Katz, Peter P. Swire

Michigan Law Review

Katz v. United States is the king of Supreme Court surveillance cases. Written in 1967, it struck down the earlier regime of property rules, declaring that "the Fourth Amendment protects people, not places." The concurrence by Justice Harlan announced the new regime - court-issued warrants are required where there is an infringement on a person's "reasonable expectation of privacy." Together with the companion case Berger v. New York, Katz has stood for a grand conception of the Fourth Amendment as a bulwark against wiretaps and other emerging forms of surveillance. Professor Orin Kerr, in his excellent article, shows that …


Restructuring The Marital Bedroom: The Role Of The Privacy Doctrine In Advocating The Legalization Of Same-Sex Marriage, Nadine A. Gartner Jan 2004

Restructuring The Marital Bedroom: The Role Of The Privacy Doctrine In Advocating The Legalization Of Same-Sex Marriage, Nadine A. Gartner

Michigan Journal of Gender & Law

Part I of this paper examines the reasons underlying queer rights advocates' reluctance to insert privacy arguments into the case for legalizing same-sex marriage. Part II illustrates that, due to such disinclination, advocates transformed notions of privacy into concepts of liberty. Part III argues that, after the Lawrence decision, proponents of same-sex marriage can and should use privacy-based arguments to fortify their claims.


The Need For Revisions To The Law Of Wiretapping And Interception Of Email, Robert A. Pikowsky Oct 2003

The Need For Revisions To The Law Of Wiretapping And Interception Of Email, Robert A. Pikowsky

Michigan Telecommunications & Technology Law Review

I argue that a person's privacy interest in his email is the same as his privacy interest in a telephone conversation. Moreover, the privacy interest in email remains unchanged regardless of whether it is intercepted in transmission or covertly accessed from the recipient's mailbox. If one accepts this assumption, it follows that the level of protection against surveillance by law enforcement officers should be the same[...] As technology continues to blur the distinction between wire and electronic communication, it becomes apparent that a new methodology must be developed in order to provide logical and consistent protection to private communications. The …


The New Privacy, Paul M. Schwartz, William M. Treanor May 2003

The New Privacy, Paul M. Schwartz, William M. Treanor

Michigan Law Review

In 1964, as the welfare state emerged in full force in the United States, Charles Reich published The New Property, one of the most influential articles ever to appear in a law review. Reich argued that in order to protect individual autonomy in an "age of governmental largess," a new property right in governmental benefits had to be recognized. He called this form of property the "new property." In retrospect, Reich, rather than anticipating trends, was swimming against the tide of history. In the past forty years, formal claims to government benefits have become more tenuous rather than more secure. …


Snake-Oil Security Claims The Systematic Misrepresentation Of Product Security In The E-Commerce Arena, John R. Michener, Steven D. Mohan, James B. Astrachan, David R. Hale Apr 2003

Snake-Oil Security Claims The Systematic Misrepresentation Of Product Security In The E-Commerce Arena, John R. Michener, Steven D. Mohan, James B. Astrachan, David R. Hale

Michigan Telecommunications & Technology Law Review

The modern commercial systems and software industry in the United States have grown up in a snake-oil salesman's paradise. The largest sector of this industry by far is composed of standard commercial systems that are marketed to provide specified functionality (e.g. Internet web server, firewall, router, etc.) Such products are generally provided with a blanket disclaimer stating that the purchaser must evaluate the suitability of the product for use, and that the user assumes all liability for product behavior. In general, users cannot evaluate and cannot be expected to evaluate the security claims of a product. The ability to analyze …


The Absentee Ballot And The Secret Ballot: Challenges For Election Reform, John C. Fortier, Norman J. Ornstein Apr 2003

The Absentee Ballot And The Secret Ballot: Challenges For Election Reform, John C. Fortier, Norman J. Ornstein

University of Michigan Journal of Law Reform

Reforms in the recently enacted federal election reform legislation primarily address improving voting at a polling place, but there is a growing share of the electorate who vote away from the polling place through increased use of absentee ballots and vote-by-mail systems. Voters who vote away from the polling place do not have the same protections as those at the polling place. In particular, these voters do not have a secret ballot, as any ballot cast without a drawn curtain behind oneself is potentially subject to coercion, vote buying and fraud.

This Article looks at the tension between the Australian …


Constitutional Issues In Information Privacy, Fred H. Cate, Robert Litan Oct 2002

Constitutional Issues In Information Privacy, Fred H. Cate, Robert Litan

Michigan Telecommunications & Technology Law Review

The U.S. Constitution has been largely ignored in the recent flurry of privacy laws and regulations designed to protect personal information from incursion by the private sector despite the fact that many of these enactments and efforts to enforce them significantly implicate the First Amendment. Questions about the role of the Constitution have assumed new importance in the aftermath of the September 11, 2001 terrorist attacks on the World Trade Center and the Pentagon. Recent efforts to identify and apprehend terrorists and to protect against future attacks threaten to weaken constitutional protections against government intrusions into personal privacy. However, these …