Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of Colorado Law School (11)
- Washington University in St. Louis (7)
- New York Law School (6)
- Selected Works (5)
- University at Buffalo School of Law (5)
-
- The Catholic University of America, Columbus School of Law (4)
- Vanderbilt University Law School (4)
- Georgetown University Law Center (3)
- Maurer School of Law: Indiana University (3)
- Pepperdine University (3)
- Schulich School of Law, Dalhousie University (3)
- Touro University Jacob D. Fuchsberg Law Center (3)
- University of Pennsylvania Carey Law School (3)
- Boston University School of Law (2)
- University of Baltimore Law (2)
- University of Georgia School of Law (2)
- University of Missouri School of Law (2)
- University of Washington School of Law (2)
- American University Washington College of Law (1)
- Case Western Reserve University School of Law (1)
- Columbia Law School (1)
- DePaul University (1)
- Florida State University College of Law (1)
- Loyola Marymount University and Loyola Law School (1)
- Northwestern Pritzker School of Law (1)
- Nova Southeastern University (1)
- Roger Williams University (1)
- SJ Quinney College of Law, University of Utah (1)
- Seattle University School of Law (1)
- St. Mary's University (1)
- Publication Year
- Publication
-
- Publications (11)
- Scholarship@WashULaw (7)
- All Faculty Scholarship (5)
- Faculty Scholarship (5)
- NYLS Law Review (5)
-
- Faculty Publications (4)
- Journal Articles (4)
- Articles, Book Chapters, & Popular Press (3)
- Catholic University Journal of Law and Technology (3)
- Georgetown Law Faculty Publications and Other Works (3)
- Pepperdine Law Review (3)
- Touro Law Review (3)
- Vanderbilt Journal of Entertainment & Technology Law (3)
- Indiana Law Journal (2)
- Akron Law Review (1)
- Amicus Briefs (1)
- Articles & Chapters (1)
- Articles by Maurer Faculty (1)
- Brian C. Murchison (1)
- Brian Larson (1)
- Buffalo Law Review (1)
- Catholic University Law Review (1)
- DePaul Journal of Art, Technology & Intellectual Property Law (1)
- Edward Lee (1)
- Journal of Intellectual Property Law (1)
- Life of the Law School (1993- ) (1)
- Loyola of Los Angeles Law Review (1)
- Mark Bartholomew (1)
- Northwestern University Law Review (1)
- Samantha Barbas (1)
- Publication Type
Articles 31 - 60 of 87
Full-Text Articles in Law
Second Class For The Second Time: How The Commercial Speech Doctrine Stigmatizes Commercial Use Of Aggregated Public Records, Brian N. Larson, Genelle I. Belmas
Second Class For The Second Time: How The Commercial Speech Doctrine Stigmatizes Commercial Use Of Aggregated Public Records, Brian N. Larson, Genelle I. Belmas
Brian Larson
This Article argues that access to aggregated electronic public records for commercial use should receive protection under the First Amendment in the same measure as the speech acts the access supports. In other words, we view commercial access to aggregated public records as an essential means to valuable speech. For many, however, the taint of the commercial speech doctrine is turning all “information flows” into commercial ones. This, in turn, is threatening the access to government records.
Disentangling The Right Of Publicity, Eric E. Johnson
Disentangling The Right Of Publicity, Eric E. Johnson
Northwestern University Law Review
Despite the increasing importance attached to the right of publicity, its doctrinal scope has yet to be clearly articulated. The right of publicity supposedly allows a cause of action for the commercial exploitation of a person’s name, voice, or image. The inconvenient reality, however, is that only a tiny fraction of such instances are truly actionable. This Article tackles the mismatch between the blackletter doctrine and the shape of the case law, and it aims to elucidate, in straightforward terms, what the right of publicity actually is.
This Article explains how, in the absence of a clear enunciation of its …
Newsroom: Logan On Trump And Libel Law 01-03-2017, Roger Williams University School Of Law
Newsroom: Logan On Trump And Libel Law 01-03-2017, Roger Williams University School Of Law
Life of the Law School (1993- )
No abstract provided.
"Free Speech, First Amendment, And New Media For Cons And Festivals" From Pop Culture Business Handbook For Cons And Festivals, Jon Garon
Faculty Scholarship
This article is part of a series of book excerpts from The Pop Culture Business Handbook for Cons and Festivals, which provides the business, strategy, and legal reference guide for fan conventions, film festivals, musical festivals, and cultural events.Although most events are organized by private parties, the location of these events in public venues and the crowd management issues involving free speech make First Amendment and free speech issues a critical component of event management. This excerpt provides a framework for understanding the legal and security issues involving free speech at public events.
Making News: Balancing Newsworthiness And Privacy In The Age Of Algorithms, Erin C. Carroll
Making News: Balancing Newsworthiness And Privacy In The Age Of Algorithms, Erin C. Carroll
Georgetown Law Faculty Publications and Other Works
In deciding privacy lawsuits against media defendants, courts have for decades deferred to the media. They have given it wide berth to determine what is newsworthy and so, what is protected under the First Amendment. And in doing so, they have often spoken reverently of the editorial process and journalistic decision-making.
Yet, in just the last several years, news production and consumption has changed dramatically. As we get more of our news from digital and social media sites, the role of information gatekeeper is shifting from journalists to computer engineers, programmers, and app designers. The algorithms that the latter write …
Performative Privacy, Scott Skinner-Thompson
Performative Privacy, Scott Skinner-Thompson
Publications
Broadly speaking, privacy doctrine suggests that the right to privacy is non-existent once one enters the public realm. Although some scholars contend that privacy ought to exist in public, “public privacy” has been defended largely with reference to other, ancillary values privacy may serve. For instance, public privacy may be necessary to make the freedom of association meaningful in practice.
This Article identifies a new dimension of public privacy, supplementing extant justifications for the right, by arguing that many efforts to maintain privacy while in “public” are properly conceptualized as forms of performative, expressive resistance against an ever-pervasive surveillance society. …
Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski
Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski
Publications
Article III standing is difficult to achieve in the context of data security and data privacy claims. Injury in fact must be "concrete," "particularized," and "actual or imminent"--all characteristics that are challenging to meet with information harms. This Article suggests looking to an unusual source for clarification on privacy and standing: recent national security surveillance litigation. There we can find significant discussions of what rises to the level of Article III injury in fact. The answers may be surprising: the interception of sensitive information; the seizure of less sensitive information and housing of it in a database for analysis; and …
Privacy And The Right To Record, Margot E. Kaminski
Privacy And The Right To Record, Margot E. Kaminski
Publications
Many U.S. laws protect privacy by governing recording. Recently, however, courts have recognized a First Amendment “right to record.” This Article addresses how courts should handle privacy laws in light of the developing First Amendment right to record.
The privacy harms addressed by recording laws are situated harms. Recording changes the way people behave in physical spaces by altering the nature of those spaces. Thus, recording laws can be placed within a long line of First Amendment case law that recognizes a valid government interest in managing the qualities of rivalrous physical space, so as not to allow one person’s …
Taking A Bite Out Of Michael Vick's Publicity Rights: An Analysis Of How Teh Right Of Publicity Should Be Treated After A Celebrity Is Convicted Of A Crime, Stephen Reginald Fowler
Taking A Bite Out Of Michael Vick's Publicity Rights: An Analysis Of How Teh Right Of Publicity Should Be Treated After A Celebrity Is Convicted Of A Crime, Stephen Reginald Fowler
Journal of Intellectual Property Law
No abstract provided.
Privacy Petitions And Institutional Legitimacy, Lauren Henry Scholz
Privacy Petitions And Institutional Legitimacy, Lauren Henry Scholz
Scholarly Publications
This Article argues that a petitions process for privacy concerns arising from new technologies would substantially aid in gauging privacy social norms and legitimating regulation of new technologies. An accessible, transparent petitions process would empower individuals who have privacy concerns by making their proposals for change more visible. Moreover, data accumulated from such a petitions process would provide the requisite information to enable institutions to incorporate social norms into privacy policy development. Hearing and responding to privacy petitions would build trust with the public regarding the role of government and large companies in shaping the modern privacy technical infrastructure. This …
Diy Solutions To The Hobby Lobby Problem, Kristin Haule
Diy Solutions To The Hobby Lobby Problem, Kristin Haule
Loyola of Los Angeles Law Review
No abstract provided.
The Right To Be Forgotten: Comparing U.S. And European Approaches, Samuel W. Royston
The Right To Be Forgotten: Comparing U.S. And European Approaches, Samuel W. Royston
St. Mary's Law Journal
This Article compares the European and United States stances regarding the right to be forgotten. Within that context, this Article explores the implications of technological advances on constitutional rights, specifically the intersection of the right to free speech and the right to privacy, commonly referred to as the "right to be forgotten" paradox. In the United States, the trend is to favor free speech, while Europe places an emphasis on human rights. Each approach is analyzed based on supporting case law. The consequences of each approach on society, both long- and short-term, are also discussed. This Article argues that a …
The Right To Be Forgotten V. Free Speech (Symposium) (Forthcoming), Edward Lee
The Right To Be Forgotten V. Free Speech (Symposium) (Forthcoming), Edward Lee
Edward Lee
No abstract provided.
Alternative Restrictions Of Sex Offenders' Social Media Use & The Freedom Of Speech, Norah M. Sloss
Alternative Restrictions Of Sex Offenders' Social Media Use & The Freedom Of Speech, Norah M. Sloss
Catholic University Journal of Law and Technology
No abstract provided.
When Privacy Almost Won: Time, Inc. V. Hill (1967), Samantha Barbas
When Privacy Almost Won: Time, Inc. V. Hill (1967), Samantha Barbas
Journal Articles
Drawing on previously unexplored and unpublished archival papers of Richard Nixon, the plaintiffs’ lawyer in the case, and the justices of the Warren Court, this article tells the story of the seminal First Amendment case Time, Inc. v. Hill (1967). In Hill, the Supreme Court for the first time addressed the conflict between the right to privacy and freedom of the press. The Court constitutionalized tort liability for invasion of privacy, acknowledging that it raised First Amendment issues and must be governed by constitutional standards. Hill substantially diminished privacy rights; today it is difficult if not impossible to recover against …
The Difficulty Of Balancing The Doctrine Of Prior Restraint With The Right Of Privacy, Bridgette Nunez
The Difficulty Of Balancing The Doctrine Of Prior Restraint With The Right Of Privacy, Bridgette Nunez
Touro Law Review
No abstract provided.
Bad News: Privacy Ruling To Increase Press Litigation, The Florida Star V. B.J.F., Mary Ellen Hockwalt
Bad News: Privacy Ruling To Increase Press Litigation, The Florida Star V. B.J.F., Mary Ellen Hockwalt
Akron Law Review
This note analyzes the history and precedent upon which the Court relied in reaching Florida Star's "harsh outcome." Next, the note discusses how the Court, by refusing to extend its holding beyond the facts of the case and give broad Constitutional protection to publications of truth, failed to provide lower courts with any guidance in deciding future invasion of privacy actions. Finally, the note examines the Court's balancing test: weighing the privacy interests of a crime victim against the newspaper's freedom to print truthful information.
Charting The Course For Use Of Small Unmanned Aerial Systems In Newsgathering, Mickey H. Osterreicher
Charting The Course For Use Of Small Unmanned Aerial Systems In Newsgathering, Mickey H. Osterreicher
Pepperdine Law Review
News organizations and individual journalists eagerly anticipate safely utilizing Small Unmanned Aerial Systems (sUAS) for newsgathering purposes as lawmakers integrate sUAS into the National Air Space (NAS). For now, these potential users may be flying over an "unchartered" regulatory landscape while the FAA struggles to complete its administrative rulemaking. In order to better understand how media organizations and individual journalists intend to use sUAS for newsgathering purposes, the National Press Photographers Association (NPPA) developed a survey consisting of twenty-one multiple choice questions, with space for elaboration, and three questions seeking narrative responses. The survey was distributed via email to approximately …
The Pond Betwixt: Differences In The U.S.-Eu Data Protection/Safe Harbor Negotiation, Richard J. Peltz-Steele
The Pond Betwixt: Differences In The U.S.-Eu Data Protection/Safe Harbor Negotiation, Richard J. Peltz-Steele
Faculty Publications
This article analyzes the differing perspectives that animate US and EU conceptions of privacy in the context of data protection. It begins by briefly reviewing the two continental approaches to data protection and then explains how the two approaches arise in a context of disparate cultural traditions with respect to the role of law in society. In light of those disparities, Underpinning contemporary data protection regulation is the normative value that both US and EU societies place on personal privacy. Both cultures attribute modern privacy to the famous Warren-Brandeis article in 1890, outlining a "right to be let alone." But …
Regulating Real-World Surveillance, Margot E. Kaminski
Regulating Real-World Surveillance, Margot E. Kaminski
Publications
A number of laws govern information gathering, or surveillance, by private parties in the physical world. But we lack a compelling theory of privacy harm that accounts for the state's interest in enacting these laws. Without a theory of privacy harm, these laws will be enacted piecemeal. Legislators will have a difficult time justifying the laws to constituents; the laws will not be adequately tailored to legislative interest; and courts will find it challenging to weigh privacy harms against other strong values, such as freedom of expression.
This Article identifies the government interest in enacting laws governing surveillance by private …
Outing Privacy, Scott Skinner-Thompson
Outing Privacy, Scott Skinner-Thompson
Publications
The government regularly outs information concerning people's sexuality, gender identity, and HIV status. Notwithstanding the implications of such outings, the Supreme Court has yet to resolve whether the Constitution contains a right to informational privacy - a right to limit the government's ability to collect and disseminate personal information.
This Article probes informational privacy theory and jurisprudence to better understand the judiciary's reluctance to fully embrace a constitutional right to informational privacy. The Article argues that while existing scholarly theories of informational privacy encourage us to broadly imagine the right and its possibilities, often focusing on informational privacy's ability to …
The Post-Tsa Airport: A Constitution Free Zone?, Daniel S. Harawa
The Post-Tsa Airport: A Constitution Free Zone?, Daniel S. Harawa
Pepperdine Law Review
No abstract provided.
Anonymity, Faceprints, And The Constitution, Kimberly L. Wehle
Anonymity, Faceprints, And The Constitution, Kimberly L. Wehle
All Faculty Scholarship
Part I defines anonymity and explains that respect for the capacity to remain physically and psychologically unknown to the government traces back to the Founding. With the advent and expansion of new technologies such as facial recognition technology (“FRT”), the ability to remain anonymous has eroded, leading to a litany of possible harms.
Part II reviews the existing Fourth and First Amendment doctrine that is available to stave off ubiquitous government surveillance and identifies anonymity as a constitutional value that warrants more explicit doctrinal protection. Although the Fourth Amendment has been construed to excise surveillance of public and third-party information …
Intellectual Property’S Lessons For Information Privacy, Mark Bartholomew
Intellectual Property’S Lessons For Information Privacy, Mark Bartholomew
Journal Articles
There is an inherent tension between an individual’s desire to safeguard her personal information and the expressive rights of businesses seeking to communicate that information to others. This tension has multiplied as consumers generate and businesses collect more and more personal data online, forcing efforts to strike an appropriate balance between privacy and commercial speech. No consensus on this balance has been reached. Some privacy scholars bemoan what they see as a slanted playing field in favor of those wishing to profit from the private details of other people’s lives. Others contend that the right in free expression must always …
Intellectual Freedom And Privacy, Neil M. Richards, Joanna Cornwell
Intellectual Freedom And Privacy, Neil M. Richards, Joanna Cornwell
Scholarship@WashULaw
This essay offers an account of the complex ways intellectual freedom and privacy are interrelated. We pay particular attention to both the constitutional dimensions of these important values, as well as the important roles that social and professional norms play in their protection in practice. Our examination of these issues is divided into three parts. Part I lays out the law and legal theory governing privacy as it relates to intellectual freedom. Part II examines a special context in which law and professional norms operate together to protect intellectual freedom through privacy–the library. Finally, Part III discusses how government actions …
Warrant Canaries Beyond The First Amendment: A Comment, Jonathon Penney
Warrant Canaries Beyond The First Amendment: A Comment, Jonathon Penney
Articles, Book Chapters, & Popular Press
Warrant canaries have emerged as an intriguing tool for Internet companies to provide some measure of transparency for users while also complying with national security laws. Though there is at least a reasonable argument for the legality of warrant canaries in the U.S. based primarily on First Amendment "compelled speech" doctrine, the same cannot be said for the use of warrant canaries in other "Five Eyes” intelligence agency countries — United Kingdom, Canada, New Zealand, and Australia — where the legality of warrant canaries has yet to be examined in either cases or scholarship. This comment, which provides an overview …
Online Privacy And The First Amendment: An Opt-In Approach To Data Processing, Joseph A. Tomain
Online Privacy And The First Amendment: An Opt-In Approach To Data Processing, Joseph A. Tomain
Articles by Maurer Faculty
An individual has little to no ability to prevent online commercial actors from collecting, using, or disclosing data about her. This lack of individual choice is problematic in the Big Data era because individual privacy interests are threatened by the ever increasing number of actors processing data, as well as the ever increasing amount and types of data being processed. This Article argues that online commercial actors should be required to receive an individual’s opt-in consent prior to data processing as a way of protecting individual privacy. I analyze whether an opt-in requirement is constitutionally permissible under the First Amendment …
Warrant Canaries Beyond The First Amendment: A Comment, Jonathon Penney
Warrant Canaries Beyond The First Amendment: A Comment, Jonathon Penney
Articles, Book Chapters, & Popular Press
Warrant canaries have emerged as an intriguing tool for Internet companies to provide some measure of transparency for users while also complying with national security laws. Though there is at least a reasonable argument for the legality of warrant canaries in the U.S. based primarily on First Amendment "compelled speech" doctrine, the same cannot be said for the use of warrant canaries in other "Five Eyes” intelligence agency countries — United Kingdom, Canada, New Zealand, and Australia — where the legality of warrant canaries has yet to be examined in either cases or scholarship. This comment, which provides an overview …
Revisiting The American Action For Public Disclosure Of Facts, Brian C. Murchison
Revisiting The American Action For Public Disclosure Of Facts, Brian C. Murchison
Brian C. Murchison
None available.
Speech As A Weapon: Planned Parenthood V. American Coalition Of Life Activists And The Need For A Reasonable Listener Standard, Alex J. Berkman
Speech As A Weapon: Planned Parenthood V. American Coalition Of Life Activists And The Need For A Reasonable Listener Standard, Alex J. Berkman
Touro Law Review
No abstract provided.