Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Privacy Law (10)
- Internet Law (7)
- Constitutional Law (6)
- Science and Technology Law (5)
- Fourth Amendment (4)
-
- Communications Law (3)
- Computer Law (3)
- Criminal Law (3)
- Criminal Procedure (3)
- Law and Society (3)
- Social and Behavioral Sciences (3)
- Business (2)
- Civil Rights and Discrimination (2)
- Comparative and Foreign Law (2)
- Computer Sciences (2)
- Family Law (2)
- International Law (2)
- Labor and Employment Law (2)
- Legal Studies (2)
- Physical Sciences and Mathematics (2)
- Sociology (2)
- Technology and Innovation (2)
- Administrative Law (1)
- Business and Corporate Communications (1)
- Civil Procedure (1)
- Courts (1)
- Criminology (1)
- Criminology and Criminal Justice (1)
- Databases and Information Systems (1)
Articles 1 - 20 of 20
Full-Text Articles in Law
The Greening Of Canadian Cyber Laws: What Environmental Law Can Teach And Cyber Law Can Learn, Sara Smyth
The Greening Of Canadian Cyber Laws: What Environmental Law Can Teach And Cyber Law Can Learn, Sara Smyth
Sara Smyth
This article examines whether Canadian environmental law and policy could serve as a model for cyber crime regulation. A wide variety of offences are now committed through digital technologies, including thievery, identity theft, fraud, the misdirection of communications, intellectual property theft, espionage, system disruption, the destruction of data, money laundering, hacktivism, and terrorism, among others. The focus of this Article is on the problem of data security breaches, which target businesses and consumers. Following the Introduction, Part I provides an overview of the parallels that can be drawn between threats in the natural environment and on the Internet. Both disciplines …
Workshop | Body Worn Video Recorders: The Socio-Technical Implications Of Gathering Direct Evidence, Katina Michael, Alexander Hayes
Workshop | Body Worn Video Recorders: The Socio-Technical Implications Of Gathering Direct Evidence, Katina Michael, Alexander Hayes
Alexander Hayes Mr.
- From in-car video recording to body-worn video recording
- Exploring available technologies: how do they work, pros and cons
- Storing direct evidence in secure storage: factors to consider
- Citizens “shooting” back with POV tech – what are their rights?
- Crowdsourced sousveillance- harnessing public data for forensic profiling
- Police force policies and practices on the application of new media
Welcome To The Machine: Privacy And Workplace Implications Of Predictive Analytics, Robert Sprague
Welcome To The Machine: Privacy And Workplace Implications Of Predictive Analytics, Robert Sprague
Robert Sprague
Privacy, Copyright, And Letters, Jeffrey Harrison
Privacy, Copyright, And Letters, Jeffrey Harrison
Jeffrey L Harrison
The focus of this Essay is the privacy of letters – the written manifestations of thoughts, intents, and the recollections of facts directed to a person or a narrowly defined audience. The importance of this privacy is captured in the novel Atonement by Ian McEwan and in the film based on the novel. The fulcrum from which the action springs is a letter that is read by someone to whom it was not addressed. The result is literally life-changing, even disastrous for a number of characters. One person dies, two people seemingly meant for each other are torn apart and …
Nothing To Fear Or Nowhere To Hide: Competing Visions Of The Nsa's 215 Program, Susan Freiwald
Nothing To Fear Or Nowhere To Hide: Competing Visions Of The Nsa's 215 Program, Susan Freiwald
Susan Freiwald
Despite Intelligence Community leaders’ assurances, the detailed knowledge of the NSA metadata program (the 215 program) that flowed from the Snowden revelations did not assuage concerns about the program. Three groups, the American Civil Liberties Union, the Electronic Frontier Foundation, and the Electronic Privacy Information Center, brought immediate legal challenges with mixed results in the lower courts. The conflict, in the courts, Congress, and the press, has revealed that the proponents and opponents of Section 215 view the program in diametrically opposed ways. Program proponents see a vital intelligence program operating within legal limits, which has suffered a few compliance …
Immigration Policing And Federalism Through The Lens Of Technology, Surveillance, And Privacy, Anil Kalhan
Immigration Policing And Federalism Through The Lens Of Technology, Surveillance, And Privacy, Anil Kalhan
Anil Kalhan
With the deployment of technology, federal programs to enlist state and local police assistance with immigration enforcement are undergoing a sea change. For example, even as it forcefully has urged invalidation of Arizona’s S.B. 1070 and similar state laws, the Obama administration has presided over the largest expansion of state and local immigration policing in U.S. history with its implementation of the “Secure Communities” program, which integrates immigration and criminal history database systems in order to automatically ascertain the immigration status of every individual who is arrested and booked by state and local police nationwide. By 2012, over one fifth …
William H. Sorrell, Attorney General Of Vermont, Et Al. V. Ims Health Inc., Et Al. - Amicus Brief In Support Of Petitioners, Kevin Outterson, David Orentlicher, Christopher Robertson, Frank Pasquale
William H. Sorrell, Attorney General Of Vermont, Et Al. V. Ims Health Inc., Et Al. - Amicus Brief In Support Of Petitioners, Kevin Outterson, David Orentlicher, Christopher Robertson, Frank Pasquale
Frank A. Pasquale
On April 26, 2011, the US Supreme Court will hear oral arguments in the Vermont data mining case, Sorrell v. IMS Health Inc. Respondents claim this is the most important commercial speech case in a decade. Petitioner (the State of Vermont) argues this is the most important medical privacy case since Whalen v. Roe. The is an amicus brief supporting Vermont, written by law professors and submitted on behalf of the New England Journal of Medicine
Addressing The Harm Of Total Surveillance: A Reply To Professor Neil Richards, Danielle Citron, David Gray
Addressing The Harm Of Total Surveillance: A Reply To Professor Neil Richards, Danielle Citron, David Gray
David C. Gray
In his insightful article The Dangers of Surveillance, 126 HARV. L. REV. 1934 (2013), Neil Richards offers a framework for evaluating the implications of government surveillance programs that is centered on protecting "intellectual privacy." Although we share his interest in recognizing and protecting privacy as a condition of personal and intellectual development, we worry in this essay that, as an organizing principle for policy, "intellectual privacy" is too narrow and politically fraught. Drawing on other work, we therefore recommend that judges, legislators, and executives focus instead on limiting the potential of surveillance technologies to effect programs of broad and indiscriminate …
The Davis Good Faith Rule And Getting Answers To The Questions Jones Left Open, Susan Freiwald
The Davis Good Faith Rule And Getting Answers To The Questions Jones Left Open, Susan Freiwald
Susan Freiwald
The Supreme Court’s decision in United States v. Jones clearly established that use of GPS tracking surveillance constitutes a search under the Fourth Amendment. But the Court left many other questions unanswered about the nature and scope of the constitutional privacy right in location data. A review of lower court decisions in the wake of Jones reveals that, rather than begin to answer the questions that Jones left open, courts are largely avoiding substantive Fourth Amendment analysis of location data privacy. Instead, they are finding that officers who engaged in GPS tracking and related surveillance operated in good faith, based …
Workplace Data: Law & Litigation (With 2014 Supplement), Robert Sprague
Workplace Data: Law & Litigation (With 2014 Supplement), Robert Sprague
Robert Sprague
Workplace Data: Law and Litigation provides an overview of legal issues associated with employment-related electronically stored information (ESI), focusing on discovery issues in particular. Written for employment and labor law practitioners, this new treatise offers a comprehensive overview of today’s discovery challenges, a detailed statute-by-statute analysis of data retention requirements in federal workplace-related laws, a summary of emerging workplace social media and other technology-related issues and a guide to data protection privacy laws in North America, Europe, Asia and Oceania.
In Quest Of The Arbitration Trifecta, Or Closed Door Litigation?: The Delaware Arbitration Program, Thomas Stipanowich
In Quest Of The Arbitration Trifecta, Or Closed Door Litigation?: The Delaware Arbitration Program, Thomas Stipanowich
Thomas J. Stipanowich
The Delaware Arbitration Program established a procedure by which businesses can agree to have their disputes heard in an arbitration proceeding before a sitting judge of the state’s highly regarded Chancery Court. The Program arguably offers a veritable trifecta of procedural advantages for commercial parties, including expert adjudication, efficient case management and short cycle time and, above all, a proceeding cloaked in secrecy. It also may enhance the reputation of Delaware as the forum of choice for businesses. But the Program’s ambitious intermingling of public and private forums brings into play the longstanding tug-of-war between the traditional view of court …
Intrusive Monitoring: Employee Privacy Expectations Are Reasonable In Europe, Destroyed In The United States, Lothar Determann, Robert Sprague
Intrusive Monitoring: Employee Privacy Expectations Are Reasonable In Europe, Destroyed In The United States, Lothar Determann, Robert Sprague
Robert Sprague
This Article examines the contrasting policy and legal frameworks relating to data privacy in the United States and the European Union, with a particular focus on workplace privacy and intrusive surveillance technologies and practices. It examines the U.S. perspective on modern work-related employer monitoring practices, the laws giving rise to possible employee privacy rights, and specific types of employer monitoring that may lead to actionable invasions of employee privacy rights. This article then addresses the issue of employee privacy from the EU perspective, beginning with an overview of the formation of authority to protect individual privacy rights, followed by an …
Privacy Concern In Google Voice Call Recording, Michael Katz, James Tuthill
Privacy Concern In Google Voice Call Recording, Michael Katz, James Tuthill
Michael Katz
The Federal Communications Commission, taking note of AT&T's complaint, has written to Google with questions about its call blocking. But the implications for our privacy of software-managed call services like Google Voice are a much greater threat to consumers, and that's where the FCC should direct its energy - immediately.
Securing Our Infrastructure: Private/Public Information Sharing, Rena Steinzor
Securing Our Infrastructure: Private/Public Information Sharing, Rena Steinzor
Rena I. Steinzor
No abstract provided.
A Comment On James Grimmelmann’S Saving Facebook, Susan Freiwald
A Comment On James Grimmelmann’S Saving Facebook, Susan Freiwald
Susan Freiwald
This paper comments on Professor James Grimmelmann’s article Saving Facebook (94 Iowa L. Rev. 1137 (2009) http://http://works.bepress.com/james_grimmelmann/20). provides a useful analysis of the privacy debates surrounding this social networking web site. Grimmelmann provides valuable sociological and psychological material for future legislators to draw on in considering legislative control of Facebook and similar sites. Grimmelmann uses Facebook to provide concrete examples of privacy concerns to build on the more general framework provided by the works of Daniel Solove. The comment does take exception to Grimmelmann’s analysis in several points. Chief among these is Grinnlemann’s lack of evidence in support of his …
Measuring Identity Theft At Top Banks (Version 1.5), Chris Hoofnagle
Measuring Identity Theft At Top Banks (Version 1.5), Chris Hoofnagle
Chris Jay Hoofnagle
There is no reliable way for consumers, regulators, and businesses to assess the relative rates of identity fraud at major financial institutions. This lack of information prevents a consumer market for bank safety from emerging. As part of a multiple strategy approach to obtaining more actionable data on identity theft, the Freedom of Information Act was used to obtain complaint data submitted by victims in 2006 to the Federal Trade Commission. This complaint data identifies the institution where impostors established fraudulent accounts or affected existing accounts in the name of the victim. The data were aggregated and used to create …
Fourth Amendment Protection For Stored E-Mail, Susan Freiwald, Patricia L. Bellia
Fourth Amendment Protection For Stored E-Mail, Susan Freiwald, Patricia L. Bellia
Susan Freiwald
The question of whether and how the Fourth Amendment regulates government access to stored e-mail remains open and pressing. A panel of the Sixth Circuit recently held in Warshak v. United States, 490 F.3d 455 (6th Cir. 2007), that users generally retain a reasonable expectation of privacy in the e-mails they store with their Internet Service Providers (ISPs), which implies that government agents must generally acquire a warrant before they may compel ISPs to disclose their users' stored e-mails. The Sixth Circuit, however, is reconsidering the case en banc. This Article examines the nature of stored e-mail surveillance and argues …
A First Principles Approach To Communications' Privacy, Susan Freiwald
A First Principles Approach To Communications' Privacy, Susan Freiwald
Susan Freiwald
Eyes Wide Shut: Erasing Women's Experience, From The Clinic To The Courtroom, Marybeth Herald, Ellen Waldman
Eyes Wide Shut: Erasing Women's Experience, From The Clinic To The Courtroom, Marybeth Herald, Ellen Waldman
Marybeth Herald
n his decade long exploration of female sexuality, Sigmund Freud professed to be on a mission to answer the elusive question, what do women want. Unfortunately, the 19th century psychiatrist was unable to separate that question from the one he ultimately answered, What do men want women to want? In some sense, Freud's inquiries provide an apt metaphor for the medical professions' stance toward female experience. When confronted with the difference presented by the female body as well as women's unique life experience, the medical field has responded with approaches that range from bemusement to hostility to intense indifference.
Although …
Federalism And Family, Libby Adler
Federalism And Family, Libby Adler
Libby S. Adler
This article takes up the axiomatic place of family law under federalism. Family is often depicted as belonging squarely in the state law domain, reflecting its nature as a matter of moral deliberation, rather than of, say, commerce or constitutional rights. This article demonstrates, however, that family law is a matter of federal law in an endless number of substantive areas, from immigration and taxation to privacy in the marital bedroom and the relative rights of putative and presumed fathers. It asks how the innumerable exceptions to the rule about family law’s place under federalism come to be rationalized. The …