Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Privacy Law

Series

2007

Institution
Keyword
Publication

Articles 1 - 20 of 20

Full-Text Articles in Law

Face To Face With “It”: And Other Neglected Contexts Of Health Privacy, Anita L. Allen Oct 2007

Face To Face With “It”: And Other Neglected Contexts Of Health Privacy, Anita L. Allen

All Faculty Scholarship

“Illness has recently emerged from the obscurity of medical treatises and private diaries to acquire something like celebrity status,” Professor David Morris astutely observes. Great plagues and epidemics throughout history have won notoriety as collective disasters; and the Western world has made curiosities of an occasional “Elephant Man,” “Wild Boy,” or pair of enterprising “Siamese Twins.” People now reveal their illnesses and medical procedures in conversation, at work and on the internet. This paper explores the reasons why, despite the celebrity of disease and a new openness about health problems, privacy and confidentiality are still values in medicine.


Second Class For The Second Time: How The Commercial Speech Doctrine Stigmatizes Commercial Use Of Aggregated Public Records, Brian N. Larson, Genelle I. Belmas Jul 2007

Second Class For The Second Time: How The Commercial Speech Doctrine Stigmatizes Commercial Use Of Aggregated Public Records, Brian N. Larson, Genelle I. Belmas

Faculty Scholarship

This Article argues that access to aggregated electronic public records for commercial use should receive protection under the First Amendment in the same measure as the speech acts the access supports. In other words, we view commercial access to aggregated public records as an essential means to valuable speech. For many, however, the taint of the commercial speech doctrine is turning all “information flows” into commercial ones. This, in turn, is threatening the access to government records.


Mission Creep: Public Health Surveillance And Medical Privacy, Wendy K. Mariner Apr 2007

Mission Creep: Public Health Surveillance And Medical Privacy, Wendy K. Mariner

Faculty Scholarship

The National Security Agency's domestic surveillance program has parallels in the growth of disease surveillance for public health purposes. This article explores whether laws requiring health providers to report to government names and identifiable information about patients with infectious or chronic diseases may be vulnerable to challenge as an invasion of privacy. A shift in the use of disease surveillance data from investigating disease outbreaks to data mining and analysis for research, budgeting, and policy planning, as well as bioterrorism, tests the boundaries of liberty and privacy. The Supreme Court has not reviewed a disease reporting law. Its few related …


Newsgathering In Light Of Hipaa, Alexander A. Boni-Saenz Feb 2007

Newsgathering In Light Of Hipaa, Alexander A. Boni-Saenz

All Faculty Scholarship

This short piece examines the interaction between the Health Insurance Portability and Accountability Act (HIPAA), a federal law designed to protect the privacy of individuals’ health information, and state Freedom of Information (FOI) laws, which are designed to ensure public access to government documents. It describes three recent cases from different states that addressed difficult issues about where and how to draw the line between the public’s right to know and individuals’ rights to keep their medical information secret. It concludes that questions about the interaction of state FOI laws and HIPAA should be guided by the framework suggested in …


Tracking Rfid, Jonathan Weinberg Jan 2007

Tracking Rfid, Jonathan Weinberg

Law Faculty Research Publications

RFID-Radio Frequency Identification-is a powerful enabling technology with a wide range of potential applications. Its proponents initially overhyped its capabilities and business case: RFID deployment is proceeding along a much slower and less predictable trajectory than was initially thought. Nonetheless, in the end it is plausible that we will find ourselves moving in the direction of a world with pervasive RFID: a world in which objects' wireless self-identification will become much more nearly routine, and networked devices will routinely collect and process the resulting information.

RFID-equipped goods and documents present privacy threats: they may reveal information about themselves, and hence …


The Physics Of Fourth Amendment Privacy Rights, Omar Saleem Jan 2007

The Physics Of Fourth Amendment Privacy Rights, Omar Saleem

Journal Publications

Einstein's esteem for theoretical physics and Dostoyevsky serve as a conduit for this article's discussion about the similarities between the evolution of theoretical physics and the criminal process related to Fourth Amendment privacy rights. Part I of this Article demonstrates that law and science share traits of rationality, a quest for universality, and theoretical evolution. Part II traces the parallel paths of Fourth Amendment privacy rights and theoretical physics. Part III illustrates the radical alterations in theoretical physics created by Einstein's relativity discoveries and the radical alterations in Fourth Amendment privacy rights created by the U.S. Supreme Court's decision in …


Tied Up In Knotts? Gps And The Fourth Amendment, Renee Mcdonald Hutchins Jan 2007

Tied Up In Knotts? Gps And The Fourth Amendment, Renee Mcdonald Hutchins

Journal Articles

Judicial and scholarly assessment of emerging technology seems poised to drive the Fourth Amendment down one of three paths. The first would simply relegate the amendment to a footnote in history books by limiting its reach to harms that the framers specifically envisioned. A modified version of this first approach would dispense with expansive constitutional notions of privacy and replace them with legislative fixes. A third path offers the amendment continued vitality but requires the U.S. Supreme Court to overhaul its Fourth Amendment analysis. Fortunately, a fourth alternative is available to cabin emerging technologies within the existing doctrinal framework. Analysis …


Personal Data Privacy Tradeoffs And How A Swedish Church Lady, Austrian Public Radio Employees, And Transatlantic Air Carriers Show That Europe Does Not Have All The Answers, Edward C. Harris Jan 2007

Personal Data Privacy Tradeoffs And How A Swedish Church Lady, Austrian Public Radio Employees, And Transatlantic Air Carriers Show That Europe Does Not Have All The Answers, Edward C. Harris

All Faculty Scholarship

No abstract provided.


Creating A Viral Federal Privacy Standard, A. Michael Froomkin Jan 2007

Creating A Viral Federal Privacy Standard, A. Michael Froomkin

Articles

No abstract provided.


Reservoirs Of Danger: The Evolution Of Public And Private Law At The Dawn Of The Information Age, Danielle Keats Citron Jan 2007

Reservoirs Of Danger: The Evolution Of Public And Private Law At The Dawn Of The Information Age, Danielle Keats Citron

Faculty Scholarship

A defining problem at the dawn of the Information Age will be securing computer databases of ultra-sensitive personal information. These reservoirs of data fuel our Internet economy but endanger individuals when their information escapes into the hands of cyber-criminals. This juxtaposition of opportunities for rapid economic growth and novel dangers recalls similar challenges society and law faced at the outset of the Industrial Age. Then, reservoirs collected water to power textile mills: the water was harmless in repose but wrought havoc when it escaped. After initially resisting Rylands v. Fletcher’s strict liability standard as undermining economic development, American courts …


The Structure Of Search Engine Law, James Grimmelmann Jan 2007

The Structure Of Search Engine Law, James Grimmelmann

Faculty Scholarship

This Article provides a road map to issues of search engine law. It indicates what questions we must consider when thinking about search engines, and it indicates the interconnections among those questions. It does not endorse any particular normative framework for search. Nor does it recommend who should regulate search. Instead, it provides the necessary foundation for informed decision-making, by whatever regulator and whatever its normative approach.

Part I will explain how modern search engines function and describe the business environment within which they operate. Search engine operations can be understood in terms of the information flows among four principal …


The Geography Of Family Privacy, David D. Meyer Jan 2007

The Geography Of Family Privacy, David D. Meyer

Faculty Scholarship

No abstract provided.


Reservoirs Of Danger: The Evolution Of Public And Private Law At The Dawn Of The Information Age, Danielle K. Citron Jan 2007

Reservoirs Of Danger: The Evolution Of Public And Private Law At The Dawn Of The Information Age, Danielle K. Citron

Faculty Scholarship

A defining problem at the dawn of the Information Age will be securing computer databases of ultra-sensitive personal information. These reservoirs of data fuel our Internet economy but endanger individuals when their information escapes into the hands of cyber-criminals. This juxtaposition of opportunities for rapid economic growth and novel dangers recalls similar challenges society and law faced at the outset of the Industrial Age. Then, reservoirs collected water to power textile mills: the water was harmless in repose but wrought havoc when it escaped. After initially resisting Rylands v. Fletcher's strict liability standard as undermining economic development, American courts and …


Respecting Adolescents' Confidentiality And Reproductive And Sexual Choices, Rebecca J. Cook, Joanna Erdman, Bernard M. Dickens Jan 2007

Respecting Adolescents' Confidentiality And Reproductive And Sexual Choices, Rebecca J. Cook, Joanna Erdman, Bernard M. Dickens

Articles, Book Chapters, & Popular Press

Adolescents, defined as between 10 and 19 years old, present a growing challenge to reproductive health. Adolescent sexual intercourse contributes to worldwide burdens of unplanned pregnancy, abortion, spread of sexually transmitted infections (STIs), including HIV, and maternal mortality and morbidity. A barrier to contraceptive care and termination of adolescent pregnancy is the belief that in law minors intellectually mature enough to give consent also require consent of, or at least prior information to, their parental guardians. Adolescents may avoid parental disclosure by forgoing desirable reproductive health care. Recent judicial decisions, however, give effect to internationally established human rights to confidentiality, …


A Panoptic Approach To Information Policy: Utilizing A More Balanced Theory Of Property In Order To Ensure The Existence Of A Prodigious Public Domain, Christine Galbraith Davik Jan 2007

A Panoptic Approach To Information Policy: Utilizing A More Balanced Theory Of Property In Order To Ensure The Existence Of A Prodigious Public Domain, Christine Galbraith Davik

Faculty Publications

Public access to ideas and information is critically important to creativity, competition, innovation, and a democratic culture. Nonetheless, material that belongs in the public domain is increasingly being transformed into private property. Data which was once freely available has become inaccessible as a result of legislatively or judicially sanctioned technological and contractual constraints. This is due in large part to the fact that lawmakers promulgating legislation and judges resolving disputes concerning data have failed to adequately take into account the multi-dimensional problems involved in controversies concerning access to ideas and information. The focus is often inappropriately centered on the tangible …


Privacy, Identity And Security, Benjamin J. Goold Jan 2007

Privacy, Identity And Security, Benjamin J. Goold

All Faculty Publications

This paper examines the relationship between security, surveillance, privacy and identity, both in the context of legislation such as the Anti-terrorism Act and the PATRIOT Act, and also in the light of ongoing changes in how that personal information is gathered, processed and used. It is argued that prevailing notions of privacy — and the legal frameworks that aim to protect privacy interests — are ill-suited to defending individuals from an increasingly sophisticated array of surveillance and data processing techniques, which enable information to be acquired and shared at almost zero-cost and which threaten to establish the ‘categorical identity’ as …


Public Protection, Proportionality, And The Search For Balance, Benjamin J. Goold, Liora Lazarus, Gabriel Swiney Jan 2007

Public Protection, Proportionality, And The Search For Balance, Benjamin J. Goold, Liora Lazarus, Gabriel Swiney

All Faculty Publications

This report examines how courts in the UK and Europe respond when human rights and security appear to conflict. It compares cases from the United Kingdom, France, Germany, Spain, and the European Court of Human Rights (ECtHR). It examines how rights are applied and how courts use the concept of proportionality to mediate conflicts between rights and security. The report concludes that British courts are less consistent in their application of proportionality than countries with constitutional rights protections which tend to be more rigorous in their protections of rights than are countries, like the UK, that rely instead on the …


Confidentiality Of Educational Records And Child Protective Proceedings, Frank E. Vandervort Jan 2007

Confidentiality Of Educational Records And Child Protective Proceedings, Frank E. Vandervort

Book Chapters

The Federal Family Education Rights and Privacy Act (FERPA), which provides funding for state educational programming, requires that student records be disclosed to a nonparent only with the written consent of the child’s parent, unless the disclosure falls within one of the several exceptions detailed in the statute. One of the exemptions provided for in the federal law permits a school to disclose information to “state or local officials or authorities to whom [that] information is allowed to be reported or disclosed pursuant to state statute,” if that official certifies in writing “that the information will not be disclosed to …


Structural Rights In Privacy, Harry Surden Jan 2007

Structural Rights In Privacy, Harry Surden

Publications

This Essay challenges the view that privacy interests are protected primarily by law. Based upon the understanding that society relies upon nonlegal devices such as markets, norms, and structure to regulate human behavior, this Essay calls attention to a class of regulatory devices known as latent structural constraints and provides a positive account of their role in regulating privacy. Structural constraints are physical or technological barriers which regulate conduct; they can be either explicit or latent. An example of an explicit structural constraint is a fence which is designed to prevent entry onto real property, thereby effectively enforcing property rights. …


Medicine And Public Health: Crossing Legal Boundaries, Wendy K. Mariner Jan 2007

Medicine And Public Health: Crossing Legal Boundaries, Wendy K. Mariner

Faculty Scholarship

In 2006, New York City began a mandatory reporting system for laboratories to submit blood sugar (A1c) test results (primarily for diabetes) to the city's Department of Health and Mental Hygiene without the patient's consent. This article examines whether this new program is an innovative way to improve New Yorkers' health, an invasion of medical privacy, or usurpation of the physician's role. The registry is an example of public health initiatives in chronic diseases, which challenge the limits of laws governing medicine care and public health programs by blurring the historical boundaries between them.