Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 23 of 23

Full-Text Articles in Law

Profiling With Apologies, Sherry F. Colb Dec 2014

Profiling With Apologies, Sherry F. Colb

Sherry Colb

No abstract provided.


A World Without Privacy: Why Property Does Not Define The Limits Of The Right Against Unreasonable Searches And Seizures, Sherry F. Colb Dec 2014

A World Without Privacy: Why Property Does Not Define The Limits Of The Right Against Unreasonable Searches And Seizures, Sherry F. Colb

Sherry Colb

No abstract provided.


Standing Room Only: Why Fourth Amendment Exclusion And Standing Can No Longer Logically Coexist, Sherry F. Colb Dec 2014

Standing Room Only: Why Fourth Amendment Exclusion And Standing Can No Longer Logically Coexist, Sherry F. Colb

Sherry Colb

No abstract provided.


Domestic Violence And The Politics Of Privacy, By Kristin A. Kelly [Book Review], Cynthia Grant Bowman Dec 2014

Domestic Violence And The Politics Of Privacy, By Kristin A. Kelly [Book Review], Cynthia Grant Bowman

Cynthia Grant Bowman

No abstract provided.


Prying, Spying, And Lying: Intrusive Newsgathering And What The Law Should Do About It, Lyrissa Barnett Lidsky Dec 2014

Prying, Spying, And Lying: Intrusive Newsgathering And What The Law Should Do About It, Lyrissa Barnett Lidsky

Lyrissa Barnett Lidsky

The media's use of intrusive newsgathering techniques poses an increasing threat to individual privacy. Courts currently resolve the overwhelming majority of conflicts in favor of the media. This is not because the First Amendment bars the imposition of tort liability on the media for its newsgathering practices. It does not. Rather, tort law has failed to seize the opportunity to create meaninful privacy protection. After surveying the economic, philosophical, and practical obstacles to reform, this Article proposes to rejuvenate the tort of intrusion to tip the balance between privacy and the press back in privacy's direction. Working within the framework …


Privacy, Copyright, And Letters, Jeffrey Harrison Nov 2014

Privacy, Copyright, And Letters, Jeffrey Harrison

Jeffrey L Harrison

The focus of this Essay is the privacy of letters – the written manifestations of thoughts, intents, and the recollections of facts directed to a person or a narrowly defined audience. The importance of this privacy is captured in the novel Atonement by Ian McEwan and in the film based on the novel. The fulcrum from which the action springs is a letter that is read by someone to whom it was not addressed. The result is literally life-changing, even disastrous for a number of characters. One person dies, two people seemingly meant for each other are torn apart and …


The Logic And Experience Of Law: Lawrence V. Texas And The Politics Of Privacy, Danaya C. Wright Nov 2014

The Logic And Experience Of Law: Lawrence V. Texas And The Politics Of Privacy, Danaya C. Wright

Danaya C. Wright

The U.S. Supreme Court's June 2003 decision in Lawrence v. Texas may prove to be one of the most important civil rights cases of the twenty-first century. It may do for gay and lesbian people what Brown v. Board of Education did for African-Americans and Roe v. Wade did for women. While I certainly hope so, my enthusiasm is tempered by the fact that discrimination on the basis of race or gender has not disappeared. Will Lawrence signal meaningful change, or will its revolutionary possibilities be stifled by endless cycles of excuse and redefinition? The case is important, but I …


Comment On Home Mortgage Disclosure Act Proposed Rulemaking, David J. Reiss Oct 2014

Comment On Home Mortgage Disclosure Act Proposed Rulemaking, David J. Reiss

David J Reiss

The Consumer Financial Protection Bureau's Home Mortgage Disclosure Act proposed rulemaking (proposed Aug. 29, 2014) is a reasonable one. It increases the amount of information that is to be collected about important consumer products, such as reverse mortgages. It also increases the amount of important information it collects about all mortgages. At the same time, it releases lenders from having to determine borrowers’ intentions about how they will use their loan proceeds, something that can be hard to do and to document well. Finally, while the proposed rule raises some privacy concerns, the CFPB can address them.


Csi Las Vegas: Privacy, Policing, And Profiteering In Casino Structured Intelligence, Jessica D. Gabel Oct 2014

Csi Las Vegas: Privacy, Policing, And Profiteering In Casino Structured Intelligence, Jessica D. Gabel

Jessica Gabel Cino

This Article argues that the intricate, vast amounts of consumer information compiled through casino structured intelligence require greater protection and oversight in the contexts of both bankruptcy and law enforcement. Section II examines the various types of casino technology and information gathering that casinos perform. Section III considers the available protections of private information in terms of security breaches, law enforcement sharing, and sales in the context of a bankruptcy. Section IV discusses additional safeguards and ethical concerns that should be considered as casinos continue to increase their data mining efforts. Finally, Section V concludes that, minimally, consumers are entitled …


Self-Defense Against Robots, A. Michael Froomkin, Zak Colangelo Aug 2014

Self-Defense Against Robots, A. Michael Froomkin, Zak Colangelo

A. Michael Froomkin

This paper examines when, under U.S. law, humans may use force against robots to protect themselves, their property, and their privacy. May a landowner legally shoot down a trespassing drone? May she hold a trespassing autonomous car as security against damage done or further torts? Is the fear that a drone may be operated by a paparazzo or a peeping Tom sufficient grounds to disable or interfere with it? How hard may you shove if the office robot rolls over your foot? This paper addresses all those issues and one more: what rules and standards we could put into place …


Prenatal Caretaking: Limits Of State Intervention With And Without Roe, Sharon E. Rush May 2014

Prenatal Caretaking: Limits Of State Intervention With And Without Roe, Sharon E. Rush

Sharon E. Rush

With or without Roe, difficult questions regarding the state's role in prenatal caretaking remain. Unless the Supreme Court addresses the assumptions underlying the abortion controversy, overruling Roe would not resolve the problem of allocating decisionmaking responsibility between the woman and the state during the woman's pregnancy. Fundamental constitutional questions about life and death, parental authority over the fetus, and the scope of the woman's right of privacy outside of abortion have not been answered by the Supreme Court.


Do Androids Dream Of Electric Free Speech? Visions Of The Future Of Copyright, Privacy And The First Amendment In Science Fiction, Daxton R. Stewart Apr 2014

Do Androids Dream Of Electric Free Speech? Visions Of The Future Of Copyright, Privacy And The First Amendment In Science Fiction, Daxton R. Stewart

Daxton "Chip" Stewart

Science fiction authors have long projected the future of technology, including communication devices and the way in which future societies may use them. In this essay, these visions of future technology, and their implications on the future of media law and policy, are explored in three areas in particular – copyright, privacy, and the First Amendment. Themes examined include moving toward massively open copyright systems, problems of perpetual surveillance by the state, addressing rights of obscurity in public places threatened by wearable and implantable computing devices, and considering free speech rights of autonomous machines created by humans. In conclusion, the …


Privacy In Public: “Google Glass” And “Creepshots”, Subhajit Basu Apr 2014

Privacy In Public: “Google Glass” And “Creepshots”, Subhajit Basu

Subhajit Basu

This article looks at two interrelated issues that we will be confronting since the invention of “Google Glass”. First, the development of a particular technology that is inevitable and sometimes autonomous and, second, potential victims of that innovation. I argue that the expansion of a technology like “Google Glass”, in particular the use of this technology for taking “creepshots”, blurs the line between what is considered public and private. “Creepshots” are covertly taken sexually indicative photographs, mostly of women, which are posted online without consent. In fact, it is the lack of consent that is the crucial component for a …


To Read Or Not To Read: Privacy Within Social Networks, The Entitlement Of Employees To A Virtual “Private Zone” And The Balloon Theory, Shlomit Yanisky-Ravid Apr 2014

To Read Or Not To Read: Privacy Within Social Networks, The Entitlement Of Employees To A Virtual “Private Zone” And The Balloon Theory, Shlomit Yanisky-Ravid

Shlomit Yanisky-Ravid Professor of Law

Social networking has increasingly become the most common venue of self-expression in the digital era. Although social networks started as a social vehicle, they have recently become a major source for employers to track personal data ("screening") of applicants, employees or former employees.

This article addresses the questions of whether this casual business routine harms employees' rights to privacy with regard to data users post in social networks, what the drawbacks of this routine may be, and why and how privacy rights should be protected to secure private zones within the virtual sphere. The article suggests that a privacy right …


Regulating Mass Surveillance As Privacy Pollution: Learning From Environmental Impact Statements, A. Michael Froomkin Mar 2014

Regulating Mass Surveillance As Privacy Pollution: Learning From Environmental Impact Statements, A. Michael Froomkin

A. Michael Froomkin

US law has remarkably little to say about mass surveillance in public, a failure which has allowed the surveillance to grow at an alarming rate – a rate that is only set to increase. This article proposes ‘Privacy Impact Notices’ (PINs) — modeled on Environmental Impact Statements — as an initial solution to this problem. Data collection in public (and in the home via public spaces) resembles an externality imposed on the person whose privacy is reduced involuntarily; it can also be seen as a market failure caused by an information asymmetry. Current doctrinal legal tools available to respond to …


When Enough Is Enough: Location Tracking, Mosaic Theory, And Machine Learning, Steven M. Bellovin, Renée M. Hutchins, Tony Jebara, Sebastian Zimmeck Feb 2014

When Enough Is Enough: Location Tracking, Mosaic Theory, And Machine Learning, Steven M. Bellovin, Renée M. Hutchins, Tony Jebara, Sebastian Zimmeck

Renée M. Hutchins

Since 1967, when it decided Katz v. United States, the Supreme Court has tied the right to be free of unwanted government scrutiny to the concept of reasonable xpectations of privacy.[1] An evaluation of reasonable expectations depends, among other factors, upon an assessment of the intrusiveness of government action. When making such assessment historically the Court has considered police conduct with clear temporal, geographic, or substantive limits. However, in an era where new technologies permit the storage and compilation of vast amounts of personal data, things are becoming more complicated. A school of thought known as “mosaic theory” has stepped …


Big Data's Other Privacy Problem, James Grimmelmann Jan 2014

Big Data's Other Privacy Problem, James Grimmelmann

James Grimmelmann

Big Data has not one privacy problem, but two. We are accustomed to talking about surveillance of data subjects. But Big Data also enables disconcertingly close surveillance of its users. The questions we ask of Big Data can be intensely revealing, but, paradoxically, protecting subjects' privacy can require spying on users. Big Data is an ideology of technology, used to justify the centralization of information and power in data barons, pushing both subjects and users into a kind of feudal subordination. This short and polemical essay uses the Bloomberg Terminal scandal as a window to illuminate Big Data's other privacy …


Nothing To Fear Or Nowhere To Hide: Competing Visions Of The Nsa's 215 Program, Susan Freiwald Dec 2013

Nothing To Fear Or Nowhere To Hide: Competing Visions Of The Nsa's 215 Program, Susan Freiwald

Susan Freiwald

Despite Intelligence Community leaders’ assurances, the detailed knowledge of the NSA metadata program (the 215 program) that flowed from the Snowden revelations did not assuage concerns about the program. Three groups, the American Civil Liberties Union, the Electronic Frontier Foundation, and the Electronic Privacy Information Center, brought immediate legal challenges with mixed results in the lower courts. The conflict, in the courts, Congress, and the press, has revealed that the proponents and opponents of Section 215 view the program in diametrically opposed ways. Program proponents see a vital intelligence program operating within legal limits, which has suffered a few compliance …


Grounding Drones: Big Brother’S Tool Box Needs Regulation Not Elimination, Melanie M. Reid Dec 2013

Grounding Drones: Big Brother’S Tool Box Needs Regulation Not Elimination, Melanie M. Reid

Melanie M. Reid

One of the most significant contemporary issues in privacy law relates to law enforcement’s new domestic surveillance tool: unmanned aerial vehicles, also known as, drones. Law enforcement’s use of aerial surveillance as an investigatory tool is currently under attack. In the past, if law enforcement chose to follow a suspect throughout the day, either on the ground or in the air, they need not worry about seeking a warrant or determining whether probable cause or reasonable suspicion exists to justify their surveillance. Aerial surveillance of criminal suspects has been considered outside the protections of Fourth Amendment law. In the 1980’s, …


No Surfing Allowed: A Review And Analysis Of Legislation Prohibiting Employers From Demanding Access To Employees’ And Job Applicants’ Social Media Accounts, Robert Sprague Dec 2013

No Surfing Allowed: A Review And Analysis Of Legislation Prohibiting Employers From Demanding Access To Employees’ And Job Applicants’ Social Media Accounts, Robert Sprague

Robert Sprague

This article examines recent state legislation prohibiting employers from requesting username and password information from employees and job applicants in order to access restricted portions of those employees’ and job applicants’ personal social media accounts. This article raises the issue of whether this legislation is even needed, from both practical and legal perspectives, focusing on: (a) how prevalent the practice is of requesting employees’ and job applicants’ social media access information; (b) whether alternative laws already exist which prohibit employers from requesting employees’ and job applicants’ social media access information; and (c) whether any benefits can be derived from this …


Self, Privacy, And Power: Is It All Over? (With R. Sloan), Richard Warner Dec 2013

Self, Privacy, And Power: Is It All Over? (With R. Sloan), Richard Warner

Richard Warner

The realization of a multifaceted self is an ideal one strives to realize. One realizes such a self in large part through interaction with others in various social roles. Such realization requires a significant degree of informational privacy. Informational privacy is the ability to determine for yourself when others may collect and how they may use your information. The realization of multifaceted selves requires informational privacy in public. There is no contradiction here: informational privacy is a matter of control, and you can have such control in public. Current information processing practices greatly reduce privacy in public thereby threatening the …


European Union Data Privacy Law Developments, W. Gregory Voss Dec 2013

European Union Data Privacy Law Developments, W. Gregory Voss

W. Gregory Voss

This article explores recent developments in European Union data privacy and data protection law, through an analysis of European Union advisory guidance, independent administrative agency enforcement action, case law, and legislative reform in the areas of digital technologies, the internet, telecommunications and personal data. In the first case, Article 29 Working Party guidance on anonymization techniques – so important in the field of big data – is discussed and distinguished from pseudonymization. Next, Google privacy policy enforcement action by various EU Member State data protection agencies (inter alia, France, Germany, Italy, the Netherlands and Spain) is chronicled, with lessons being …


Our Records Panopticon And The American Bar Association Standards For Criminal Justice, Stephen E. Henderson Dec 2013

Our Records Panopticon And The American Bar Association Standards For Criminal Justice, Stephen E. Henderson

Stephen E Henderson

"Secrets are lies. Sharing is caring. Privacy is theft." So concludes the main character in Dave Egger’s novel The Circle, in which a single company that unites Google, Facebook, and Twitter – and on steroids – has the ambition not only to know, but also to share, all of the world's information. It is telling that a current dystopian novel features not the government in the first instance, but instead a private third party that, through no act of overt coercion, knows so much about us. This is indeed the greatest risk to privacy in our day, both the unprecedented …