Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Privacy Law

Articles

Series

2014

Privacy

Articles 1 - 3 of 3

Full-Text Articles in Law

The 1 Percent Solution: Corporate Tax Returns Should Be Public (And How To Get There), Reuven S. Avi-Yonah, Ariel Siman Feb 2014

The 1 Percent Solution: Corporate Tax Returns Should Be Public (And How To Get There), Reuven S. Avi-Yonah, Ariel Siman

Articles

The justification for publishing corporate tax returns is that corporations are given immense benefits by the state that bestows upon them unlimited life and limited liability, and therefore they owe the public the information of how they treat the state that created them. Tax returns, like the financial disclosures that publicly traded corporations must file with the SEC, also provide useful information to shareholders, creditors, and the investing public.


Privacy Harm Exceptionalism, Ryan Calo Jan 2014

Privacy Harm Exceptionalism, Ryan Calo

Articles

“Exceptionalism” refers to the belief that a person, place, or thing is qualitatively different from others in the same basic category. Thus, some have spoken of America’s exceptionalism as a nation. Early debates about the Internet focused on the prospect that existing laws and institutions would prove inadequate to govern the new medium of cyberspace. Scholars have made similar claims about other areas of law.

The focus of this short essay is the supposed exceptionalism of privacy. Rather than catalogue all the ways that privacy might differ from other concepts or areas of study, I intend to focus on the …


Hands Off Our Fingerprints: State, Local, Andindividual Defiance Of Federal Immigrationenforcement, Christine N. Cimini Jan 2014

Hands Off Our Fingerprints: State, Local, Andindividual Defiance Of Federal Immigrationenforcement, Christine N. Cimini

Articles

Secure Communities, though little-known outside law-enforcement circles, is one of the most powerful of the federal government’s immigration enforcement programs. Under Secure Communities, fingerprints collected by state and local law enforcement and provided to the Federal Bureau of Investigation for criminal background checks are automatically shared with the Department of Homeland Security, which checks the fingerprints against its immigration database. In the event of a match, an immigration detainer can be issued and an individual held after they would otherwise be entitled to release. Originally designed as a voluntary program in which local governments could choose to participate, the Department …