Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Law

Gender And Privacy In Cyberspace, Anita L. Allen May 2000

Gender And Privacy In Cyberspace, Anita L. Allen

All Faculty Scholarship

No abstract provided.


Privacy, Cyberspace, And Democracy: A Case Study, Michael J. Gerhardt Apr 2000

Privacy, Cyberspace, And Democracy: A Case Study, Michael J. Gerhardt

Faculty Publications

No abstract provided.


Paradox Of Family Privacy, David D. Meyer Mar 2000

Paradox Of Family Privacy, David D. Meyer

Faculty Scholarship

No abstract provided.


2nd Annual Computer & Technology Law Institute, Office Of Continuing Legal Education At The University Of Kentucky College Of Law, Carlyle C. Ring, Holly K. Towle, Timothy E. Nielander, John G. Hundley, J. Mark Grundy, Matthew M. Clark, David E. Fleenor, William L. Montague Jr., Jack E. Toliver, Joel T. Beres, Cynthia L. Stewart, Kenneth J. Tuggle, Kenneth R. Sagan, Stephen E. Gillen Mar 2000

2nd Annual Computer & Technology Law Institute, Office Of Continuing Legal Education At The University Of Kentucky College Of Law, Carlyle C. Ring, Holly K. Towle, Timothy E. Nielander, John G. Hundley, J. Mark Grundy, Matthew M. Clark, David E. Fleenor, William L. Montague Jr., Jack E. Toliver, Joel T. Beres, Cynthia L. Stewart, Kenneth J. Tuggle, Kenneth R. Sagan, Stephen E. Gillen

Continuing Legal Education Materials

Materials from the 2nd Annual Computer & Technology Law Institute held by UK/CLE in March 2000.


The Establishment Of A U.S. Federal Data Protection Agency To Define And Regulate Internet Privacy And Its Impact On U.S.-China Relations: Marco Polo Where Are You?, Omar Saleem Jan 2000

The Establishment Of A U.S. Federal Data Protection Agency To Define And Regulate Internet Privacy And Its Impact On U.S.-China Relations: Marco Polo Where Are You?, Omar Saleem

Journal Publications

Marco Polo's desire to explore new worlds and exchange both ideas and goods should be the impetus behind the Internet. The Internet is the global economic network of the new millennium. This Article first discusses the factors that have caused both the reevaluation of Western notions of privacy, and consideration of the establishment of a Federal Data Protections Agency. Next, the article discusses the EU's approach to regulating Internet privacy. This section is followed by a discussion of why the U.S. and EU approaches to Internet privacy regulation must be implemented from a global, or MarcoPolo-like perspective. The article then …


The Death Of Privacy?, A. Michael Froomkin Jan 2000

The Death Of Privacy?, A. Michael Froomkin

Articles

The rapid deployment of privacy-destroying technologies by governments and businesses threatens to make informational privacy obsolete. The first part of this article describes a range of current technologies to which the law has yet to respond effectively. These include: routine collection of transactional data, growing automated surveillance in public places, deployment of facial recognition technology and other biometrics, cell-phone tracking, vehicle tracking, satellite monitoring, workplace surveillance, Internet tracking from cookies to "clicktrails", hardware-based identifiers, intellectual property-protecting "snitchware," and sense-enhanced searches that allow observers to see through everything from walls to clothes. The cumulative and reinforcing effect of these technologies may …


Blood, Sweat, And Tears: Toward A New Paradigm For Protecting Donor Privacy, 7 Va. J. Soc. Pol'y & L. 141 (2000), Kevin Hopkins Jan 2000

Blood, Sweat, And Tears: Toward A New Paradigm For Protecting Donor Privacy, 7 Va. J. Soc. Pol'y & L. 141 (2000), Kevin Hopkins

UIC Law Open Access Faculty Scholarship

No abstract provided.


The Secrecy Interest In Contract Law, Omri Ben-Shahar, Lisa Bernstein Jan 2000

The Secrecy Interest In Contract Law, Omri Ben-Shahar, Lisa Bernstein

Articles

A long and distinguished line of law-and-economics articles has established that in many circumstances fully compensatory expectation damages are a desirable remedy for breach of contract because they induce both efficient performance and efficient breach. The expectation measure, which seeks to put the breached-against party in the position she would have been in had the contract been performed, has, therefore, rightly been chosen as the dominant contract default rule. It does a far better job of regulating breach-or-perform incentives than its leading competitors-the restitution measure, the reliance measure, and specific performance. This Essay does not directly take issue with the …


Going Private: Technology, Due Process, And Internet Dispute Resolution, Elizabeth G. Thornburg Jan 2000

Going Private: Technology, Due Process, And Internet Dispute Resolution, Elizabeth G. Thornburg

Faculty Journal Articles and Book Chapters

Despite cliches about Internet speed, disputes that arise on and about the Internet can be time-consuming to resolve, legally murky, and factually complex. In response, Internet players with market power are opting out: mandatory arbitration is replacing both substantive law and court procedure, and technological remedies are providing self-help without any dispute resolution at all. These alternative procedures tend to move faster than courts and to cost their corporate creators less than lawsuits. They are also structured to maximize the success of the powerful. But faster is not always better. Cheap is not always fair or accurate. Market power is …


An Institutional Emphasis, Lance Liebman Jan 2000

An Institutional Emphasis, Lance Liebman

Faculty Scholarship

Professor Schwartz is an important scholar of the interface between the difficult moral concept of privacy and the new information technologies. Someday a book will tell the story of modem history through the lens of privacy: village lives well known to neighbors; the claims of the national state (taxes, military service); the social welfare state; and the possibilities and dangers of modem biology. As Paul Schwartz has written, DNA and other tools can tell us a great deal about ourselves and can improve our lives; they can also tell employers, drug companies, prospective in-laws, and the police things we prefer …


Silencing John Doe: Defamation And Discourse In Cyberspace, Lyrissa Lidsky Jan 2000

Silencing John Doe: Defamation And Discourse In Cyberspace, Lyrissa Lidsky

Faculty Publications

John Doe has become a popular defamation defendant as corporations and their officers bring defamation suits for statements made about them in Internet discussion fora. These new suits are not even arguably about recovering money damages but instead are brought for symbolic reasons — some worthy, some not so worthy. If the only consequence of these suits were that Internet users were held accountable for their speech, the suits would be an unalloyed good. However, these suits threaten to suppress legitimate criticism along with intentional and reckless falsehoods, and existing First Amendment law doctrines are not responsive to the threat …


Privacy-As-Data Control: Conceptual, Practical, And Moral Limits Of The Paradigm, Anita L. Allen Jan 2000

Privacy-As-Data Control: Conceptual, Practical, And Moral Limits Of The Paradigm, Anita L. Allen

All Faculty Scholarship

No abstract provided.


The Undue Burden: Parental Notification Requirements For Publicly Funded Contraception, Stephanie Bornstein Jan 2000

The Undue Burden: Parental Notification Requirements For Publicly Funded Contraception, Stephanie Bornstein

UF Law Faculty Publications

This article analyzes the legal impact of legislative proposals in 1998 and 1999 to require parental notification for minors seeking publicly funded contraception. Part I explores the history of Title X and some of its amendments, the HHS interpretive “squeal rule,” and the federal courts' rejection of the HHS rule based on the congressional intent behind Title X. Part II focuses on the Parental Notification Act of 1998 and its likelihood for success against a constitutional challenge, based on an analysis of precedent on parental consent requirements for contraception and abortion. Part III discusses the change in the legislative and …