Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Boston University School of Law (3)
- Chicago-Kent College of Law (2)
- The Peter A. Allard School of Law (2)
- University of Maryland Francis King Carey School of Law (2)
- Brooklyn Law School (1)
-
- Florida A&M University College of Law (1)
- Schulich School of Law, Dalhousie University (1)
- Texas A&M University School of Law (1)
- University of Colorado Law School (1)
- University of Maine School of Law (1)
- University of Miami Law School (1)
- University of Michigan Law School (1)
- University of Pennsylvania Carey Law School (1)
- University of the District of Columbia School of Law (1)
- Wayne State University (1)
- Keyword
-
- Privacy (9)
- Technology (3)
- Records (2)
- Surveillance (2)
- Torts (2)
-
- Access to information (1)
- Adolescent Confidentiality (1)
- Architecture (1)
- Child protection (1)
- Children (1)
- Commercial speech (1)
- Computers and Privacy (1)
- Confidentiality (1)
- Confidentiality of Adolescents (1)
- Consent (1)
- Constraints (1)
- Convention on the Rights of the Child (1)
- Copyright (1)
- Data brokers (1)
- Diabetes (1)
- Disclosure (1)
- Educational records (1)
- Emerging (1)
- Emerging Technology (1)
- Exceptions (1)
- Family Education Rights and Privacy Act (1)
- First Amendment (1)
- Fourth Amendment (1)
- Fourth amendment (1)
- Freedom of information (1)
Articles 1 - 20 of 20
Full-Text Articles in Law
Face To Face With “It”: And Other Neglected Contexts Of Health Privacy, Anita L. Allen
Face To Face With “It”: And Other Neglected Contexts Of Health Privacy, Anita L. Allen
All Faculty Scholarship
“Illness has recently emerged from the obscurity of medical treatises and private diaries to acquire something like celebrity status,” Professor David Morris astutely observes. Great plagues and epidemics throughout history have won notoriety as collective disasters; and the Western world has made curiosities of an occasional “Elephant Man,” “Wild Boy,” or pair of enterprising “Siamese Twins.” People now reveal their illnesses and medical procedures in conversation, at work and on the internet. This paper explores the reasons why, despite the celebrity of disease and a new openness about health problems, privacy and confidentiality are still values in medicine.
Second Class For The Second Time: How The Commercial Speech Doctrine Stigmatizes Commercial Use Of Aggregated Public Records, Brian N. Larson, Genelle I. Belmas
Second Class For The Second Time: How The Commercial Speech Doctrine Stigmatizes Commercial Use Of Aggregated Public Records, Brian N. Larson, Genelle I. Belmas
Faculty Scholarship
This Article argues that access to aggregated electronic public records for commercial use should receive protection under the First Amendment in the same measure as the speech acts the access supports. In other words, we view commercial access to aggregated public records as an essential means to valuable speech. For many, however, the taint of the commercial speech doctrine is turning all “information flows” into commercial ones. This, in turn, is threatening the access to government records.
Mission Creep: Public Health Surveillance And Medical Privacy, Wendy K. Mariner
Mission Creep: Public Health Surveillance And Medical Privacy, Wendy K. Mariner
Faculty Scholarship
The National Security Agency's domestic surveillance program has parallels in the growth of disease surveillance for public health purposes. This article explores whether laws requiring health providers to report to government names and identifiable information about patients with infectious or chronic diseases may be vulnerable to challenge as an invasion of privacy. A shift in the use of disease surveillance data from investigating disease outbreaks to data mining and analysis for research, budgeting, and policy planning, as well as bioterrorism, tests the boundaries of liberty and privacy. The Supreme Court has not reviewed a disease reporting law. Its few related …
Newsgathering In Light Of Hipaa, Alexander A. Boni-Saenz
Newsgathering In Light Of Hipaa, Alexander A. Boni-Saenz
All Faculty Scholarship
This short piece examines the interaction between the Health Insurance Portability and Accountability Act (HIPAA), a federal law designed to protect the privacy of individuals’ health information, and state Freedom of Information (FOI) laws, which are designed to ensure public access to government documents. It describes three recent cases from different states that addressed difficult issues about where and how to draw the line between the public’s right to know and individuals’ rights to keep their medical information secret. It concludes that questions about the interaction of state FOI laws and HIPAA should be guided by the framework suggested in …
Tracking Rfid, Jonathan Weinberg
Tracking Rfid, Jonathan Weinberg
Law Faculty Research Publications
RFID-Radio Frequency Identification-is a powerful enabling technology with a wide range of potential applications. Its proponents initially overhyped its capabilities and business case: RFID deployment is proceeding along a much slower and less predictable trajectory than was initially thought. Nonetheless, in the end it is plausible that we will find ourselves moving in the direction of a world with pervasive RFID: a world in which objects' wireless self-identification will become much more nearly routine, and networked devices will routinely collect and process the resulting information.
RFID-equipped goods and documents present privacy threats: they may reveal information about themselves, and hence …
The Physics Of Fourth Amendment Privacy Rights, Omar Saleem
The Physics Of Fourth Amendment Privacy Rights, Omar Saleem
Journal Publications
Einstein's esteem for theoretical physics and Dostoyevsky serve as a conduit for this article's discussion about the similarities between the evolution of theoretical physics and the criminal process related to Fourth Amendment privacy rights. Part I of this Article demonstrates that law and science share traits of rationality, a quest for universality, and theoretical evolution. Part II traces the parallel paths of Fourth Amendment privacy rights and theoretical physics. Part III illustrates the radical alterations in theoretical physics created by Einstein's relativity discoveries and the radical alterations in Fourth Amendment privacy rights created by the U.S. Supreme Court's decision in …
Tied Up In Knotts? Gps And The Fourth Amendment, Renee Mcdonald Hutchins
Tied Up In Knotts? Gps And The Fourth Amendment, Renee Mcdonald Hutchins
Journal Articles
Judicial and scholarly assessment of emerging technology seems poised to drive the Fourth Amendment down one of three paths. The first would simply relegate the amendment to a footnote in history books by limiting its reach to harms that the framers specifically envisioned. A modified version of this first approach would dispense with expansive constitutional notions of privacy and replace them with legislative fixes. A third path offers the amendment continued vitality but requires the U.S. Supreme Court to overhaul its Fourth Amendment analysis. Fortunately, a fourth alternative is available to cabin emerging technologies within the existing doctrinal framework. Analysis …
Personal Data Privacy Tradeoffs And How A Swedish Church Lady, Austrian Public Radio Employees, And Transatlantic Air Carriers Show That Europe Does Not Have All The Answers, Edward C. Harris
All Faculty Scholarship
No abstract provided.
Creating A Viral Federal Privacy Standard, A. Michael Froomkin
Creating A Viral Federal Privacy Standard, A. Michael Froomkin
Articles
No abstract provided.
Reservoirs Of Danger: The Evolution Of Public And Private Law At The Dawn Of The Information Age, Danielle Keats Citron
Reservoirs Of Danger: The Evolution Of Public And Private Law At The Dawn Of The Information Age, Danielle Keats Citron
Faculty Scholarship
A defining problem at the dawn of the Information Age will be securing computer databases of ultra-sensitive personal information. These reservoirs of data fuel our Internet economy but endanger individuals when their information escapes into the hands of cyber-criminals. This juxtaposition of opportunities for rapid economic growth and novel dangers recalls similar challenges society and law faced at the outset of the Industrial Age. Then, reservoirs collected water to power textile mills: the water was harmless in repose but wrought havoc when it escaped. After initially resisting Rylands v. Fletcher’s strict liability standard as undermining economic development, American courts …
The Structure Of Search Engine Law, James Grimmelmann
The Structure Of Search Engine Law, James Grimmelmann
Faculty Scholarship
This Article provides a road map to issues of search engine law. It indicates what questions we must consider when thinking about search engines, and it indicates the interconnections among those questions. It does not endorse any particular normative framework for search. Nor does it recommend who should regulate search. Instead, it provides the necessary foundation for informed decision-making, by whatever regulator and whatever its normative approach.
Part I will explain how modern search engines function and describe the business environment within which they operate. Search engine operations can be understood in terms of the information flows among four principal …
The Geography Of Family Privacy, David D. Meyer
The Geography Of Family Privacy, David D. Meyer
Faculty Scholarship
No abstract provided.
Reservoirs Of Danger: The Evolution Of Public And Private Law At The Dawn Of The Information Age, Danielle K. Citron
Reservoirs Of Danger: The Evolution Of Public And Private Law At The Dawn Of The Information Age, Danielle K. Citron
Faculty Scholarship
A defining problem at the dawn of the Information Age will be securing computer databases of ultra-sensitive personal information. These reservoirs of data fuel our Internet economy but endanger individuals when their information escapes into the hands of cyber-criminals. This juxtaposition of opportunities for rapid economic growth and novel dangers recalls similar challenges society and law faced at the outset of the Industrial Age. Then, reservoirs collected water to power textile mills: the water was harmless in repose but wrought havoc when it escaped. After initially resisting Rylands v. Fletcher's strict liability standard as undermining economic development, American courts and …
Respecting Adolescents' Confidentiality And Reproductive And Sexual Choices, Rebecca J. Cook, Joanna Erdman, Bernard M. Dickens
Respecting Adolescents' Confidentiality And Reproductive And Sexual Choices, Rebecca J. Cook, Joanna Erdman, Bernard M. Dickens
Articles, Book Chapters, & Popular Press
Adolescents, defined as between 10 and 19 years old, present a growing challenge to reproductive health. Adolescent sexual intercourse contributes to worldwide burdens of unplanned pregnancy, abortion, spread of sexually transmitted infections (STIs), including HIV, and maternal mortality and morbidity. A barrier to contraceptive care and termination of adolescent pregnancy is the belief that in law minors intellectually mature enough to give consent also require consent of, or at least prior information to, their parental guardians. Adolescents may avoid parental disclosure by forgoing desirable reproductive health care. Recent judicial decisions, however, give effect to internationally established human rights to confidentiality, …
A Panoptic Approach To Information Policy: Utilizing A More Balanced Theory Of Property In Order To Ensure The Existence Of A Prodigious Public Domain, Christine Galbraith Davik
A Panoptic Approach To Information Policy: Utilizing A More Balanced Theory Of Property In Order To Ensure The Existence Of A Prodigious Public Domain, Christine Galbraith Davik
Faculty Publications
Public access to ideas and information is critically important to creativity, competition, innovation, and a democratic culture. Nonetheless, material that belongs in the public domain is increasingly being transformed into private property. Data which was once freely available has become inaccessible as a result of legislatively or judicially sanctioned technological and contractual constraints. This is due in large part to the fact that lawmakers promulgating legislation and judges resolving disputes concerning data have failed to adequately take into account the multi-dimensional problems involved in controversies concerning access to ideas and information. The focus is often inappropriately centered on the tangible …
Privacy, Identity And Security, Benjamin J. Goold
Privacy, Identity And Security, Benjamin J. Goold
All Faculty Publications
This paper examines the relationship between security, surveillance, privacy and identity, both in the context of legislation such as the Anti-terrorism Act and the PATRIOT Act, and also in the light of ongoing changes in how that personal information is gathered, processed and used. It is argued that prevailing notions of privacy — and the legal frameworks that aim to protect privacy interests — are ill-suited to defending individuals from an increasingly sophisticated array of surveillance and data processing techniques, which enable information to be acquired and shared at almost zero-cost and which threaten to establish the ‘categorical identity’ as …
Public Protection, Proportionality, And The Search For Balance, Benjamin J. Goold, Liora Lazarus, Gabriel Swiney
Public Protection, Proportionality, And The Search For Balance, Benjamin J. Goold, Liora Lazarus, Gabriel Swiney
All Faculty Publications
This report examines how courts in the UK and Europe respond when human rights and security appear to conflict. It compares cases from the United Kingdom, France, Germany, Spain, and the European Court of Human Rights (ECtHR). It examines how rights are applied and how courts use the concept of proportionality to mediate conflicts between rights and security. The report concludes that British courts are less consistent in their application of proportionality than countries with constitutional rights protections which tend to be more rigorous in their protections of rights than are countries, like the UK, that rely instead on the …
Confidentiality Of Educational Records And Child Protective Proceedings, Frank E. Vandervort
Confidentiality Of Educational Records And Child Protective Proceedings, Frank E. Vandervort
Book Chapters
The Federal Family Education Rights and Privacy Act (FERPA), which provides funding for state educational programming, requires that student records be disclosed to a nonparent only with the written consent of the child’s parent, unless the disclosure falls within one of the several exceptions detailed in the statute. One of the exemptions provided for in the federal law permits a school to disclose information to “state or local officials or authorities to whom [that] information is allowed to be reported or disclosed pursuant to state statute,” if that official certifies in writing “that the information will not be disclosed to …
Structural Rights In Privacy, Harry Surden
Structural Rights In Privacy, Harry Surden
Publications
This Essay challenges the view that privacy interests are protected primarily by law. Based upon the understanding that society relies upon nonlegal devices such as markets, norms, and structure to regulate human behavior, this Essay calls attention to a class of regulatory devices known as latent structural constraints and provides a positive account of their role in regulating privacy. Structural constraints are physical or technological barriers which regulate conduct; they can be either explicit or latent. An example of an explicit structural constraint is a fence which is designed to prevent entry onto real property, thereby effectively enforcing property rights. …
Medicine And Public Health: Crossing Legal Boundaries, Wendy K. Mariner
Medicine And Public Health: Crossing Legal Boundaries, Wendy K. Mariner
Faculty Scholarship
In 2006, New York City began a mandatory reporting system for laboratories to submit blood sugar (A1c) test results (primarily for diabetes) to the city's Department of Health and Mental Hygiene without the patient's consent. This article examines whether this new program is an innovative way to improve New Yorkers' health, an invasion of medical privacy, or usurpation of the physician's role. The registry is an example of public health initiatives in chronic diseases, which challenge the limits of laws governing medicine care and public health programs by blurring the historical boundaries between them.