Open Access. Powered by Scholars. Published by Universities.®
- Institution
Articles 1 - 9 of 9
Full-Text Articles in Law
Second Class For The Second Time: How The Commercial Speech Doctrine Stigmatizes Commercial Use Of Aggregated Public Records, Brian N. Larson, Genelle I. Belmas
Second Class For The Second Time: How The Commercial Speech Doctrine Stigmatizes Commercial Use Of Aggregated Public Records, Brian N. Larson, Genelle I. Belmas
Faculty Scholarship
This Article argues that access to aggregated electronic public records for commercial use should receive protection under the First Amendment in the same measure as the speech acts the access supports. In other words, we view commercial access to aggregated public records as an essential means to valuable speech. For many, however, the taint of the commercial speech doctrine is turning all “information flows” into commercial ones. This, in turn, is threatening the access to government records.
Mission Creep: Public Health Surveillance And Medical Privacy, Wendy K. Mariner
Mission Creep: Public Health Surveillance And Medical Privacy, Wendy K. Mariner
Faculty Scholarship
The National Security Agency's domestic surveillance program has parallels in the growth of disease surveillance for public health purposes. This article explores whether laws requiring health providers to report to government names and identifiable information about patients with infectious or chronic diseases may be vulnerable to challenge as an invasion of privacy. A shift in the use of disease surveillance data from investigating disease outbreaks to data mining and analysis for research, budgeting, and policy planning, as well as bioterrorism, tests the boundaries of liberty and privacy. The Supreme Court has not reviewed a disease reporting law. Its few related …
Newsgathering In Light Of Hipaa, Alexander A. Boni-Saenz
Newsgathering In Light Of Hipaa, Alexander A. Boni-Saenz
All Faculty Scholarship
This short piece examines the interaction between the Health Insurance Portability and Accountability Act (HIPAA), a federal law designed to protect the privacy of individuals’ health information, and state Freedom of Information (FOI) laws, which are designed to ensure public access to government documents. It describes three recent cases from different states that addressed difficult issues about where and how to draw the line between the public’s right to know and individuals’ rights to keep their medical information secret. It concludes that questions about the interaction of state FOI laws and HIPAA should be guided by the framework suggested in …
Tied Up In Knotts? Gps And The Fourth Amendment, Renee Mcdonald Hutchins
Tied Up In Knotts? Gps And The Fourth Amendment, Renee Mcdonald Hutchins
Journal Articles
Judicial and scholarly assessment of emerging technology seems poised to drive the Fourth Amendment down one of three paths. The first would simply relegate the amendment to a footnote in history books by limiting its reach to harms that the framers specifically envisioned. A modified version of this first approach would dispense with expansive constitutional notions of privacy and replace them with legislative fixes. A third path offers the amendment continued vitality but requires the U.S. Supreme Court to overhaul its Fourth Amendment analysis. Fortunately, a fourth alternative is available to cabin emerging technologies within the existing doctrinal framework. Analysis …
Reservoirs Of Danger: The Evolution Of Public And Private Law At The Dawn Of The Information Age, Danielle Keats Citron
Reservoirs Of Danger: The Evolution Of Public And Private Law At The Dawn Of The Information Age, Danielle Keats Citron
Faculty Scholarship
A defining problem at the dawn of the Information Age will be securing computer databases of ultra-sensitive personal information. These reservoirs of data fuel our Internet economy but endanger individuals when their information escapes into the hands of cyber-criminals. This juxtaposition of opportunities for rapid economic growth and novel dangers recalls similar challenges society and law faced at the outset of the Industrial Age. Then, reservoirs collected water to power textile mills: the water was harmless in repose but wrought havoc when it escaped. After initially resisting Rylands v. Fletcher’s strict liability standard as undermining economic development, American courts …
Reservoirs Of Danger: The Evolution Of Public And Private Law At The Dawn Of The Information Age, Danielle K. Citron
Reservoirs Of Danger: The Evolution Of Public And Private Law At The Dawn Of The Information Age, Danielle K. Citron
Faculty Scholarship
A defining problem at the dawn of the Information Age will be securing computer databases of ultra-sensitive personal information. These reservoirs of data fuel our Internet economy but endanger individuals when their information escapes into the hands of cyber-criminals. This juxtaposition of opportunities for rapid economic growth and novel dangers recalls similar challenges society and law faced at the outset of the Industrial Age. Then, reservoirs collected water to power textile mills: the water was harmless in repose but wrought havoc when it escaped. After initially resisting Rylands v. Fletcher's strict liability standard as undermining economic development, American courts and …
Medicine And Public Health: Crossing Legal Boundaries, Wendy K. Mariner
Medicine And Public Health: Crossing Legal Boundaries, Wendy K. Mariner
Faculty Scholarship
In 2006, New York City began a mandatory reporting system for laboratories to submit blood sugar (A1c) test results (primarily for diabetes) to the city's Department of Health and Mental Hygiene without the patient's consent. This article examines whether this new program is an innovative way to improve New Yorkers' health, an invasion of medical privacy, or usurpation of the physician's role. The registry is an example of public health initiatives in chronic diseases, which challenge the limits of laws governing medicine care and public health programs by blurring the historical boundaries between them.
Structural Rights In Privacy, Harry Surden
Structural Rights In Privacy, Harry Surden
Publications
This Essay challenges the view that privacy interests are protected primarily by law. Based upon the understanding that society relies upon nonlegal devices such as markets, norms, and structure to regulate human behavior, this Essay calls attention to a class of regulatory devices known as latent structural constraints and provides a positive account of their role in regulating privacy. Structural constraints are physical or technological barriers which regulate conduct; they can be either explicit or latent. An example of an explicit structural constraint is a fence which is designed to prevent entry onto real property, thereby effectively enforcing property rights. …
Confidentiality Of Educational Records And Child Protective Proceedings, Frank E. Vandervort
Confidentiality Of Educational Records And Child Protective Proceedings, Frank E. Vandervort
Book Chapters
The Federal Family Education Rights and Privacy Act (FERPA), which provides funding for state educational programming, requires that student records be disclosed to a nonparent only with the written consent of the child’s parent, unless the disclosure falls within one of the several exceptions detailed in the statute. One of the exemptions provided for in the federal law permits a school to disclose information to “state or local officials or authorities to whom [that] information is allowed to be reported or disclosed pursuant to state statute,” if that official certifies in writing “that the information will not be disclosed to …