Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Privacy (3)
- Computer Law (2)
- Privacy Law (2)
- Abortions (1)
- Adolescent Health Services and Pregnancy Prevention and Care Act (1)
-
- Anonymous speech (1)
- Breaches of contract (1)
- Broadband access (1)
- Business method (1)
- Children's advocate (1)
- China's Internet (1)
- Compensation (1)
- Connecticut Law Review (1)
- Contraception (1)
- Damages (1)
- Decision-making (1)
- Defamation (1)
- Discovery (1)
- Electronic surveillance (1)
- Expectations (1)
- Feminism (1)
- First amendment (1)
- Gender Studies (1)
- Government Information (1)
- Hyperbole (1)
- Impeachment Investigations (1)
- Information (1)
- Internet (1)
- Internet Usage (1)
- Internet contracts (1)
Articles 1 - 13 of 13
Full-Text Articles in Law
Gender And Privacy In Cyberspace, Anita L. Allen
Gender And Privacy In Cyberspace, Anita L. Allen
All Faculty Scholarship
No abstract provided.
Privacy, Cyberspace, And Democracy: A Case Study, Michael J. Gerhardt
Privacy, Cyberspace, And Democracy: A Case Study, Michael J. Gerhardt
Faculty Publications
No abstract provided.
Paradox Of Family Privacy, David D. Meyer
2nd Annual Computer & Technology Law Institute, Office Of Continuing Legal Education At The University Of Kentucky College Of Law, Carlyle C. Ring, Holly K. Towle, Timothy E. Nielander, John G. Hundley, J. Mark Grundy, Matthew M. Clark, David E. Fleenor, William L. Montague Jr., Jack E. Toliver, Joel T. Beres, Cynthia L. Stewart, Kenneth J. Tuggle, Kenneth R. Sagan, Stephen E. Gillen
2nd Annual Computer & Technology Law Institute, Office Of Continuing Legal Education At The University Of Kentucky College Of Law, Carlyle C. Ring, Holly K. Towle, Timothy E. Nielander, John G. Hundley, J. Mark Grundy, Matthew M. Clark, David E. Fleenor, William L. Montague Jr., Jack E. Toliver, Joel T. Beres, Cynthia L. Stewart, Kenneth J. Tuggle, Kenneth R. Sagan, Stephen E. Gillen
Continuing Legal Education Materials
Materials from the 2nd Annual Computer & Technology Law Institute held by UK/CLE in March 2000.
The Establishment Of A U.S. Federal Data Protection Agency To Define And Regulate Internet Privacy And Its Impact On U.S.-China Relations: Marco Polo Where Are You?, Omar Saleem
Journal Publications
Marco Polo's desire to explore new worlds and exchange both ideas and goods should be the impetus behind the Internet. The Internet is the global economic network of the new millennium. This Article first discusses the factors that have caused both the reevaluation of Western notions of privacy, and consideration of the establishment of a Federal Data Protections Agency. Next, the article discusses the EU's approach to regulating Internet privacy. This section is followed by a discussion of why the U.S. and EU approaches to Internet privacy regulation must be implemented from a global, or MarcoPolo-like perspective. The article then …
The Death Of Privacy?, A. Michael Froomkin
The Death Of Privacy?, A. Michael Froomkin
Articles
The rapid deployment of privacy-destroying technologies by governments and businesses threatens to make informational privacy obsolete. The first part of this article describes a range of current technologies to which the law has yet to respond effectively. These include: routine collection of transactional data, growing automated surveillance in public places, deployment of facial recognition technology and other biometrics, cell-phone tracking, vehicle tracking, satellite monitoring, workplace surveillance, Internet tracking from cookies to "clicktrails", hardware-based identifiers, intellectual property-protecting "snitchware," and sense-enhanced searches that allow observers to see through everything from walls to clothes. The cumulative and reinforcing effect of these technologies may …
Blood, Sweat, And Tears: Toward A New Paradigm For Protecting Donor Privacy, 7 Va. J. Soc. Pol'y & L. 141 (2000), Kevin Hopkins
Blood, Sweat, And Tears: Toward A New Paradigm For Protecting Donor Privacy, 7 Va. J. Soc. Pol'y & L. 141 (2000), Kevin Hopkins
UIC Law Open Access Faculty Scholarship
No abstract provided.
The Secrecy Interest In Contract Law, Omri Ben-Shahar, Lisa Bernstein
The Secrecy Interest In Contract Law, Omri Ben-Shahar, Lisa Bernstein
Articles
A long and distinguished line of law-and-economics articles has established that in many circumstances fully compensatory expectation damages are a desirable remedy for breach of contract because they induce both efficient performance and efficient breach. The expectation measure, which seeks to put the breached-against party in the position she would have been in had the contract been performed, has, therefore, rightly been chosen as the dominant contract default rule. It does a far better job of regulating breach-or-perform incentives than its leading competitors-the restitution measure, the reliance measure, and specific performance. This Essay does not directly take issue with the …
Going Private: Technology, Due Process, And Internet Dispute Resolution, Elizabeth G. Thornburg
Going Private: Technology, Due Process, And Internet Dispute Resolution, Elizabeth G. Thornburg
Faculty Journal Articles and Book Chapters
Despite cliches about Internet speed, disputes that arise on and about the Internet can be time-consuming to resolve, legally murky, and factually complex. In response, Internet players with market power are opting out: mandatory arbitration is replacing both substantive law and court procedure, and technological remedies are providing self-help without any dispute resolution at all. These alternative procedures tend to move faster than courts and to cost their corporate creators less than lawsuits. They are also structured to maximize the success of the powerful. But faster is not always better. Cheap is not always fair or accurate. Market power is …
An Institutional Emphasis, Lance Liebman
An Institutional Emphasis, Lance Liebman
Faculty Scholarship
Professor Schwartz is an important scholar of the interface between the difficult moral concept of privacy and the new information technologies. Someday a book will tell the story of modem history through the lens of privacy: village lives well known to neighbors; the claims of the national state (taxes, military service); the social welfare state; and the possibilities and dangers of modem biology. As Paul Schwartz has written, DNA and other tools can tell us a great deal about ourselves and can improve our lives; they can also tell employers, drug companies, prospective in-laws, and the police things we prefer …
Silencing John Doe: Defamation And Discourse In Cyberspace, Lyrissa Lidsky
Silencing John Doe: Defamation And Discourse In Cyberspace, Lyrissa Lidsky
Faculty Publications
John Doe has become a popular defamation defendant as corporations and their officers bring defamation suits for statements made about them in Internet discussion fora. These new suits are not even arguably about recovering money damages but instead are brought for symbolic reasons — some worthy, some not so worthy. If the only consequence of these suits were that Internet users were held accountable for their speech, the suits would be an unalloyed good. However, these suits threaten to suppress legitimate criticism along with intentional and reckless falsehoods, and existing First Amendment law doctrines are not responsive to the threat …
Privacy-As-Data Control: Conceptual, Practical, And Moral Limits Of The Paradigm, Anita L. Allen
Privacy-As-Data Control: Conceptual, Practical, And Moral Limits Of The Paradigm, Anita L. Allen
All Faculty Scholarship
No abstract provided.
The Undue Burden: Parental Notification Requirements For Publicly Funded Contraception, Stephanie Bornstein
The Undue Burden: Parental Notification Requirements For Publicly Funded Contraception, Stephanie Bornstein
UF Law Faculty Publications
This article analyzes the legal impact of legislative proposals in 1998 and 1999 to require parental notification for minors seeking publicly funded contraception. Part I explores the history of Title X and some of its amendments, the HHS interpretive “squeal rule,” and the federal courts' rejection of the HHS rule based on the congressional intent behind Title X. Part II focuses on the Parental Notification Act of 1998 and its likelihood for success against a constitutional challenge, based on an analysis of precedent on parental consent requirements for contraception and abortion. Part III discusses the change in the legislative and …