Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Privacy Law (8)
- Internet Law (7)
- Fourth Amendment (6)
- Criminal Procedure (5)
- Science and Technology Law (5)
-
- Constitutional Law (4)
- Civil Rights and Discrimination (3)
- Computer Law (3)
- First Amendment (3)
- Intellectual Property Law (3)
- Law and Society (3)
- Air and Space Law (2)
- Criminal Law (2)
- Fourteenth Amendment (2)
- Labor and Employment Law (2)
- Legislation (2)
- State and Local Government Law (2)
- Banking and Finance Law (1)
- Commercial Law (1)
- Communications Law (1)
- Entertainment, Arts, and Sports Law (1)
- Environmental Law (1)
- European Law (1)
- Gaming Law (1)
- Human Rights Law (1)
- Law and Gender (1)
- Legal Ethics and Professional Responsibility (1)
- Property Law and Real Estate (1)
- Secured Transactions (1)
- Publication
-
- Sherry Colb (3)
- A. Michael Froomkin (2)
- Cynthia Grant Bowman (1)
- Danaya C. Wright (1)
- David J Reiss (1)
-
- Daxton "Chip" Stewart (1)
- James Grimmelmann (1)
- Jeffrey L Harrison (1)
- Jessica Gabel Cino (1)
- Lyrissa Barnett Lidsky (1)
- Melanie M. Reid (1)
- Renée M. Hutchins (1)
- Richard Warner (1)
- Robert Sprague (1)
- Sharon E. Rush (1)
- Shlomit Yanisky-Ravid Professor of Law (1)
- Stephen E Henderson (1)
- Subhajit Basu (1)
- Susan Freiwald (1)
- W. Gregory Voss (1)
- File Type
Articles 1 - 23 of 23
Full-Text Articles in Law
Profiling With Apologies, Sherry F. Colb
A World Without Privacy: Why Property Does Not Define The Limits Of The Right Against Unreasonable Searches And Seizures, Sherry F. Colb
A World Without Privacy: Why Property Does Not Define The Limits Of The Right Against Unreasonable Searches And Seizures, Sherry F. Colb
Sherry Colb
No abstract provided.
Standing Room Only: Why Fourth Amendment Exclusion And Standing Can No Longer Logically Coexist, Sherry F. Colb
Standing Room Only: Why Fourth Amendment Exclusion And Standing Can No Longer Logically Coexist, Sherry F. Colb
Sherry Colb
No abstract provided.
Domestic Violence And The Politics Of Privacy, By Kristin A. Kelly [Book Review], Cynthia Grant Bowman
Domestic Violence And The Politics Of Privacy, By Kristin A. Kelly [Book Review], Cynthia Grant Bowman
Cynthia Grant Bowman
No abstract provided.
Prying, Spying, And Lying: Intrusive Newsgathering And What The Law Should Do About It, Lyrissa Barnett Lidsky
Prying, Spying, And Lying: Intrusive Newsgathering And What The Law Should Do About It, Lyrissa Barnett Lidsky
Lyrissa Barnett Lidsky
The media's use of intrusive newsgathering techniques poses an increasing threat to individual privacy. Courts currently resolve the overwhelming majority of conflicts in favor of the media. This is not because the First Amendment bars the imposition of tort liability on the media for its newsgathering practices. It does not. Rather, tort law has failed to seize the opportunity to create meaninful privacy protection. After surveying the economic, philosophical, and practical obstacles to reform, this Article proposes to rejuvenate the tort of intrusion to tip the balance between privacy and the press back in privacy's direction. Working within the framework …
Privacy, Copyright, And Letters, Jeffrey Harrison
Privacy, Copyright, And Letters, Jeffrey Harrison
Jeffrey L Harrison
The focus of this Essay is the privacy of letters – the written manifestations of thoughts, intents, and the recollections of facts directed to a person or a narrowly defined audience. The importance of this privacy is captured in the novel Atonement by Ian McEwan and in the film based on the novel. The fulcrum from which the action springs is a letter that is read by someone to whom it was not addressed. The result is literally life-changing, even disastrous for a number of characters. One person dies, two people seemingly meant for each other are torn apart and …
The Logic And Experience Of Law: Lawrence V. Texas And The Politics Of Privacy, Danaya C. Wright
The Logic And Experience Of Law: Lawrence V. Texas And The Politics Of Privacy, Danaya C. Wright
Danaya C. Wright
The U.S. Supreme Court's June 2003 decision in Lawrence v. Texas may prove to be one of the most important civil rights cases of the twenty-first century. It may do for gay and lesbian people what Brown v. Board of Education did for African-Americans and Roe v. Wade did for women. While I certainly hope so, my enthusiasm is tempered by the fact that discrimination on the basis of race or gender has not disappeared. Will Lawrence signal meaningful change, or will its revolutionary possibilities be stifled by endless cycles of excuse and redefinition? The case is important, but I …
Comment On Home Mortgage Disclosure Act Proposed Rulemaking, David J. Reiss
Comment On Home Mortgage Disclosure Act Proposed Rulemaking, David J. Reiss
David J Reiss
The Consumer Financial Protection Bureau's Home Mortgage Disclosure Act proposed rulemaking (proposed Aug. 29, 2014) is a reasonable one. It increases the amount of information that is to be collected about important consumer products, such as reverse mortgages. It also increases the amount of important information it collects about all mortgages. At the same time, it releases lenders from having to determine borrowers’ intentions about how they will use their loan proceeds, something that can be hard to do and to document well. Finally, while the proposed rule raises some privacy concerns, the CFPB can address them.
Csi Las Vegas: Privacy, Policing, And Profiteering In Casino Structured Intelligence, Jessica D. Gabel
Csi Las Vegas: Privacy, Policing, And Profiteering In Casino Structured Intelligence, Jessica D. Gabel
Jessica Gabel Cino
This Article argues that the intricate, vast amounts of consumer information compiled through casino structured intelligence require greater protection and oversight in the contexts of both bankruptcy and law enforcement. Section II examines the various types of casino technology and information gathering that casinos perform. Section III considers the available protections of private information in terms of security breaches, law enforcement sharing, and sales in the context of a bankruptcy. Section IV discusses additional safeguards and ethical concerns that should be considered as casinos continue to increase their data mining efforts. Finally, Section V concludes that, minimally, consumers are entitled …
Self-Defense Against Robots, A. Michael Froomkin, Zak Colangelo
Self-Defense Against Robots, A. Michael Froomkin, Zak Colangelo
A. Michael Froomkin
This paper examines when, under U.S. law, humans may use force against robots to protect themselves, their property, and their privacy. May a landowner legally shoot down a trespassing drone? May she hold a trespassing autonomous car as security against damage done or further torts? Is the fear that a drone may be operated by a paparazzo or a peeping Tom sufficient grounds to disable or interfere with it? How hard may you shove if the office robot rolls over your foot? This paper addresses all those issues and one more: what rules and standards we could put into place …
Prenatal Caretaking: Limits Of State Intervention With And Without Roe, Sharon E. Rush
Prenatal Caretaking: Limits Of State Intervention With And Without Roe, Sharon E. Rush
Sharon E. Rush
With or without Roe, difficult questions regarding the state's role in prenatal caretaking remain. Unless the Supreme Court addresses the assumptions underlying the abortion controversy, overruling Roe would not resolve the problem of allocating decisionmaking responsibility between the woman and the state during the woman's pregnancy. Fundamental constitutional questions about life and death, parental authority over the fetus, and the scope of the woman's right of privacy outside of abortion have not been answered by the Supreme Court.
Do Androids Dream Of Electric Free Speech? Visions Of The Future Of Copyright, Privacy And The First Amendment In Science Fiction, Daxton R. Stewart
Do Androids Dream Of Electric Free Speech? Visions Of The Future Of Copyright, Privacy And The First Amendment In Science Fiction, Daxton R. Stewart
Daxton "Chip" Stewart
Science fiction authors have long projected the future of technology, including communication devices and the way in which future societies may use them. In this essay, these visions of future technology, and their implications on the future of media law and policy, are explored in three areas in particular – copyright, privacy, and the First Amendment. Themes examined include moving toward massively open copyright systems, problems of perpetual surveillance by the state, addressing rights of obscurity in public places threatened by wearable and implantable computing devices, and considering free speech rights of autonomous machines created by humans. In conclusion, the …
Privacy In Public: “Google Glass” And “Creepshots”, Subhajit Basu
Privacy In Public: “Google Glass” And “Creepshots”, Subhajit Basu
Subhajit Basu
This article looks at two interrelated issues that we will be confronting since the invention of “Google Glass”. First, the development of a particular technology that is inevitable and sometimes autonomous and, second, potential victims of that innovation. I argue that the expansion of a technology like “Google Glass”, in particular the use of this technology for taking “creepshots”, blurs the line between what is considered public and private. “Creepshots” are covertly taken sexually indicative photographs, mostly of women, which are posted online without consent. In fact, it is the lack of consent that is the crucial component for a …
To Read Or Not To Read: Privacy Within Social Networks, The Entitlement Of Employees To A Virtual “Private Zone” And The Balloon Theory, Shlomit Yanisky-Ravid
To Read Or Not To Read: Privacy Within Social Networks, The Entitlement Of Employees To A Virtual “Private Zone” And The Balloon Theory, Shlomit Yanisky-Ravid
Shlomit Yanisky-Ravid Professor of Law
Social networking has increasingly become the most common venue of self-expression in the digital era. Although social networks started as a social vehicle, they have recently become a major source for employers to track personal data ("screening") of applicants, employees or former employees.
This article addresses the questions of whether this casual business routine harms employees' rights to privacy with regard to data users post in social networks, what the drawbacks of this routine may be, and why and how privacy rights should be protected to secure private zones within the virtual sphere. The article suggests that a privacy right …
Regulating Mass Surveillance As Privacy Pollution: Learning From Environmental Impact Statements, A. Michael Froomkin
Regulating Mass Surveillance As Privacy Pollution: Learning From Environmental Impact Statements, A. Michael Froomkin
A. Michael Froomkin
US law has remarkably little to say about mass surveillance in public, a failure which has allowed the surveillance to grow at an alarming rate – a rate that is only set to increase. This article proposes ‘Privacy Impact Notices’ (PINs) — modeled on Environmental Impact Statements — as an initial solution to this problem. Data collection in public (and in the home via public spaces) resembles an externality imposed on the person whose privacy is reduced involuntarily; it can also be seen as a market failure caused by an information asymmetry. Current doctrinal legal tools available to respond to …
When Enough Is Enough: Location Tracking, Mosaic Theory, And Machine Learning, Steven M. Bellovin, Renée M. Hutchins, Tony Jebara, Sebastian Zimmeck
When Enough Is Enough: Location Tracking, Mosaic Theory, And Machine Learning, Steven M. Bellovin, Renée M. Hutchins, Tony Jebara, Sebastian Zimmeck
Renée M. Hutchins
Since 1967, when it decided Katz v. United States, the Supreme Court has tied the right to be free of unwanted government scrutiny to the concept of reasonable xpectations of privacy.[1] An evaluation of reasonable expectations depends, among other factors, upon an assessment of the intrusiveness of government action. When making such assessment historically the Court has considered police conduct with clear temporal, geographic, or substantive limits. However, in an era where new technologies permit the storage and compilation of vast amounts of personal data, things are becoming more complicated. A school of thought known as “mosaic theory” has stepped …
Big Data's Other Privacy Problem, James Grimmelmann
Big Data's Other Privacy Problem, James Grimmelmann
James Grimmelmann
Big Data has not one privacy problem, but two. We are accustomed to talking about surveillance of data subjects. But Big Data also enables disconcertingly close surveillance of its users. The questions we ask of Big Data can be intensely revealing, but, paradoxically, protecting subjects' privacy can require spying on users. Big Data is an ideology of technology, used to justify the centralization of information and power in data barons, pushing both subjects and users into a kind of feudal subordination. This short and polemical essay uses the Bloomberg Terminal scandal as a window to illuminate Big Data's other privacy …
Nothing To Fear Or Nowhere To Hide: Competing Visions Of The Nsa's 215 Program, Susan Freiwald
Nothing To Fear Or Nowhere To Hide: Competing Visions Of The Nsa's 215 Program, Susan Freiwald
Susan Freiwald
Despite Intelligence Community leaders’ assurances, the detailed knowledge of the NSA metadata program (the 215 program) that flowed from the Snowden revelations did not assuage concerns about the program. Three groups, the American Civil Liberties Union, the Electronic Frontier Foundation, and the Electronic Privacy Information Center, brought immediate legal challenges with mixed results in the lower courts. The conflict, in the courts, Congress, and the press, has revealed that the proponents and opponents of Section 215 view the program in diametrically opposed ways. Program proponents see a vital intelligence program operating within legal limits, which has suffered a few compliance …
Grounding Drones: Big Brother’S Tool Box Needs Regulation Not Elimination, Melanie M. Reid
Grounding Drones: Big Brother’S Tool Box Needs Regulation Not Elimination, Melanie M. Reid
Melanie M. Reid
One of the most significant contemporary issues in privacy law relates to law enforcement’s new domestic surveillance tool: unmanned aerial vehicles, also known as, drones. Law enforcement’s use of aerial surveillance as an investigatory tool is currently under attack. In the past, if law enforcement chose to follow a suspect throughout the day, either on the ground or in the air, they need not worry about seeking a warrant or determining whether probable cause or reasonable suspicion exists to justify their surveillance. Aerial surveillance of criminal suspects has been considered outside the protections of Fourth Amendment law. In the 1980’s, …
No Surfing Allowed: A Review And Analysis Of Legislation Prohibiting Employers From Demanding Access To Employees’ And Job Applicants’ Social Media Accounts, Robert Sprague
Robert Sprague
This article examines recent state legislation prohibiting employers from requesting username and password information from employees and job applicants in order to access restricted portions of those employees’ and job applicants’ personal social media accounts. This article raises the issue of whether this legislation is even needed, from both practical and legal perspectives, focusing on: (a) how prevalent the practice is of requesting employees’ and job applicants’ social media access information; (b) whether alternative laws already exist which prohibit employers from requesting employees’ and job applicants’ social media access information; and (c) whether any benefits can be derived from this …
Self, Privacy, And Power: Is It All Over? (With R. Sloan), Richard Warner
Self, Privacy, And Power: Is It All Over? (With R. Sloan), Richard Warner
Richard Warner
The realization of a multifaceted self is an ideal one strives to realize. One realizes such a self in large part through interaction with others in various social roles. Such realization requires a significant degree of informational privacy. Informational privacy is the ability to determine for yourself when others may collect and how they may use your information. The realization of multifaceted selves requires informational privacy in public. There is no contradiction here: informational privacy is a matter of control, and you can have such control in public. Current information processing practices greatly reduce privacy in public thereby threatening the …
European Union Data Privacy Law Developments, W. Gregory Voss
European Union Data Privacy Law Developments, W. Gregory Voss
W. Gregory Voss
This article explores recent developments in European Union data privacy and data protection law, through an analysis of European Union advisory guidance, independent administrative agency enforcement action, case law, and legislative reform in the areas of digital technologies, the internet, telecommunications and personal data. In the first case, Article 29 Working Party guidance on anonymization techniques – so important in the field of big data – is discussed and distinguished from pseudonymization. Next, Google privacy policy enforcement action by various EU Member State data protection agencies (inter alia, France, Germany, Italy, the Netherlands and Spain) is chronicled, with lessons being …
Our Records Panopticon And The American Bar Association Standards For Criminal Justice, Stephen E. Henderson
Our Records Panopticon And The American Bar Association Standards For Criminal Justice, Stephen E. Henderson
Stephen E Henderson
"Secrets are lies. Sharing is caring. Privacy is theft." So concludes the main character in Dave Egger’s novel The Circle, in which a single company that unites Google, Facebook, and Twitter – and on steroids – has the ambition not only to know, but also to share, all of the world's information. It is telling that a current dystopian novel features not the government in the first instance, but instead a private third party that, through no act of overt coercion, knows so much about us. This is indeed the greatest risk to privacy in our day, both the unprecedented …