Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 60 of 66

Full-Text Articles in Law

Your View: ‘Do Not Track’ Should Apply To Drivers, Too, Hillary B. Farber Jan 2014

Your View: ‘Do Not Track’ Should Apply To Drivers, Too, Hillary B. Farber

Faculty Publications

Location tracking data can reveal quite a bit of information about a person when it is all pieced together. Just by knowing where and when a person frequents certain places we can know about his/her recreational habits, religious affiliations, professional affiliations, relationship status, personal health and hygiene, social preferences and contacts, and so much more. That is why it is so important to regulate the use of location tracking technology. There are a variety of efforts afoot to rein in government use of such technology – this op-ed is concerned with automated license plate readers.


Secret Consumer Scores And Segmentations: Separating Consumer 'Haves' From 'Have-Nots', Amy J. Schmitz Jan 2014

Secret Consumer Scores And Segmentations: Separating Consumer 'Haves' From 'Have-Nots', Amy J. Schmitz

Faculty Publications

“Big Data” is big business. Data brokers profit by tracking consumers’ information and behavior both on- and offline and using this collected data to assign consumers evaluative scores and classify consumers into segments. Companies then use these consumer scores and segmentations for marketing and to determine what deals, offers, and remedies they provide to different individuals. These valuations and classifications are based on not only consumers’ financial histories and relevant interests, but also their race, gender, ZIP Code, social status, education, familial ties, and a wide range of additional data. Nonetheless, consumers are largely unaware of these scores and segmentations, …


Order, Technology And The Constitutional Meanings Of Criminal Procedure, Thomas P. Crocker Jul 2013

Order, Technology And The Constitutional Meanings Of Criminal Procedure, Thomas P. Crocker

Faculty Publications

No abstract provided.


The New American Privacy, Richard J. Peltz-Steele Jan 2013

The New American Privacy, Richard J. Peltz-Steele

Faculty Publications

Conventional wisdom paints U.S. and European approaches to privacy at irreconcilable odds. But that portrayal overlooks a more nuanced reality of privacy in American law. The free speech imperative of U.S. constitutional law since the civil rights movement shows signs of tarnish. And in areas of law that have escaped constitutionalization, such as fair-use copyright and the freedom of information, developing personality norms resemble European-style balancing. Recent academic and political initiatives on privacy in the United States emphasize subject control and contextual analysis, reflecting popular thinking not so different after all from that which animates Europe’s 1995 directive and 2012 …


Guest View: In Defense Of Student Privacy, Richard J. Peltz-Steele Jan 2013

Guest View: In Defense Of Student Privacy, Richard J. Peltz-Steele

Faculty Publications

Privacy is another American value we rush to sacrifice on the altar of accountability. In Ohio, reporters swarm the yards of liberated kidnapping victims. And in Massachusetts, news trucks besiege the campus at UMass Dartmouth, where I work, and where marathon bombing suspect Dzhokhar Tsarnaev was a student. Media want to know everything about Tsarnaev and his college friends. The university, bound by federal privacy law, has refused access to student academic and financial aid records.


Eyes In The Sky: Constitutional And Regulatory Approaches To Domestic Drone Deployment, Hillary B. Farber Jan 2013

Eyes In The Sky: Constitutional And Regulatory Approaches To Domestic Drone Deployment, Hillary B. Farber

Faculty Publications

This article begins with a current look at the deployment of drones domestically, both in terms of their use and the procedure for attaining approval for flight. Part II examines the capabilities of drones. Part III considers the Supreme Court's current Fourth Amendment jurisprudence and its application to law enforcement's use of drones. Part IV reviews existing and proposed federal and state regulation of drones. Part V offers constitutional and legislative prescriptions for regulating drones.


Teaching Access, Or Freedom Of Information Law, Richard J. Peltz-Steele Jan 2013

Teaching Access, Or Freedom Of Information Law, Richard J. Peltz-Steele

Faculty Publications

Based on the author's experience developing and administering the course and materials, this article provides an introduction and resources to teach a graduate journalism or professional law school course on access to government, commonly called "freedom of information law", which may be constructed as a capstone course in law school. The appendices provide supporting material and references.


The Irony Of Privacy Class Action Litigation, Eric Goldman Dec 2012

The Irony Of Privacy Class Action Litigation, Eric Goldman

Faculty Publications

In the past few years, publicized privacy violations have regularly spawned class action lawsuits in the United States, even when the company made a good faith mistake and no victim suffered any quantifiable harm. Privacy advocates often cheer these lawsuits because they generally favor vigorous enforcement of privacy violations, but this essay encourages privacy advocates to reconsider their support for privacy class action litigation. By its nature, class action litigation uses tactics that privacy advocates disavow. Thus, using class action litigation to remediate privacy violations proves to be unintentionally ironic.


Intimate Terrorism And Technology: There's An App For That, Justine A. Dunlap Jan 2012

Intimate Terrorism And Technology: There's An App For That, Justine A. Dunlap

Faculty Publications

Technology enhances the ability of the domestic violence perpetrator. It also holds the promise of assisting domestic violence survivors in their quest for safety. This is true in practical, daily ways and is becoming increasingly true in the legal treatment of these cases. Perpetrators can use technology to stalk and find their victims; survivors can use it to access necessary information to get away from their batterers. Laws are being amended to take into account cyber-enhanced domestic violence techniques. Domestic or intimate terrorists are among the class of criminals targeted for use of GPS monitoring. This article discusses the way …


Balancing Privacy, Autonomy, And Scientific Needs In Electronic Health Records Research, Sharona Hoffman, Andy Podgurski Jan 2012

Balancing Privacy, Autonomy, And Scientific Needs In Electronic Health Records Research, Sharona Hoffman, Andy Podgurski

Faculty Publications

The ongoing transition from paper medical files to electronic health records will provide unprecedented amounts of data for biomedical research, with the potential to catalyze significant advances in medical knowledge. But this potential can be fully realized only if the data available to researchers is representative of the patient population as a whole. Thus, allowing individual patients to exclude their health information, in keeping with traditional notions of informed consent, may compromise the research enterprise and the medical benefits it produces.

This Article analyzes the tension between realizing societal benefits from medical research and granting individual preferences for privacy. It …


A Parent's "Apparent" Authority: Why Intergenerational Coresidence Requires A Reassessment Of Parental Consent To Search Adult Children's Bedrooms, Hillary B. Farber Jan 2011

A Parent's "Apparent" Authority: Why Intergenerational Coresidence Requires A Reassessment Of Parental Consent To Search Adult Children's Bedrooms, Hillary B. Farber

Faculty Publications

The proliferation of multigenerational U.S. households provides a new perspective on the social customs and practices concerning coresidence in the United States. Rather than relying outdated presumptions of parental control, this Article argues that police should be compelled to conduct a more thorough inquiry before searching areas occupied exclusively by the adult child. Police should differentiate between "common" and private areas, and inquire into any agreements - formal or informal - that the parent and child may have regarding access and control over such areas. By fully recognizing the changing nature of the American household and rejecting a bare reliance …


A Taxonomy Of Virtual Work, Miriam A. Cherry Jan 2011

A Taxonomy Of Virtual Work, Miriam A. Cherry

Faculty Publications

(Excerpt)

The blockbuster movie Avatar begins as humans circle the planet Pandora in search of an element, unobtainium, which will boost the profits of their employer, a mining corporation. Pandora, however, is already inhabited by the Na'vi, an alien species of tall, skinny, blue beings, who live in harmony with the natural environment. With the goal of learning more about the Na'vi and their world, a team of human scientists controls and inhabits vat-grown bodies, using these avatars to interact with the Na'vi. Jake, the protagonist, is a former soldier who has become a paraplegic. When Jake's identical twin, a …


Employing E-Health: The Impact Of Electronic Health Records On The Workplace, Sharona Hoffman Jan 2010

Employing E-Health: The Impact Of Electronic Health Records On The Workplace, Sharona Hoffman

Faculty Publications

Electronic Health Record (HER) systems may soon become a fixture in most medical settings. President Obama’s 29 stimulus legislation includes $19 billion to promote their implementation. The sophisticated features and efficiencies of HER systems have the potential to improve health outcomes and enhance patient welfare considerably. However, this emerging technology also poses significant challenges and risks, not the least of which are its workplace impacts. This article provides a first of its kind analysis of the ramifications of HER systems for workers and employers.

The potential effects of health information computerization on the workplace are numerous. Employers may obtain and …


Regulating Offensiveness: Snyder V. Phelps, Emotion, And The First Amendment, Christina E. Wells Jan 2010

Regulating Offensiveness: Snyder V. Phelps, Emotion, And The First Amendment, Christina E. Wells

Faculty Publications

In its upcoming term, the Court will decide in Snyder v. Phelps whether Albert Snyder can sue the Reverend Fred Phelps and other members of the Westboro Baptist Church for invasion of privacy and intentional infliction of emotional distress for protesting near his son’s funeral. Those arguing in favor of tort liability claim that the Phelps’ speech during a time of mourning and vulnerability is especially outrageous and injurious and that the First Amendment allows such regulation. Their arguments, however, effectively rely on the offensiveness of the Phelps’ message rather than on any external indicia of harm, such as noisy …


Dangerous Terrain: Mapping The Female Body In Gonzales V. Carhart, B. Jessie Hill Jan 2010

Dangerous Terrain: Mapping The Female Body In Gonzales V. Carhart, B. Jessie Hill

Faculty Publications

The body occupies an ambiguous position within the law. It is, in one sense, the quintessential object of state regulatory and police power, the object that the state acts both upon and for. At the same time, the body is often constructed in legal discourse as the site of personhood - our most intimate, sacred, and inviolate possession. The inherent tension between these two concepts of the body permeates the law, but it is perhaps nowhere more prominent than in the constitutional doctrine pertaining to abortion. Abortion is one of the most heavily regulated medical procedures in the United States, …


Privacy Is The Problem, Raymond Shih Ray Ku Jan 2010

Privacy Is The Problem, Raymond Shih Ray Ku

Faculty Publications

A local school district remotely activates laptop web cameras that allegedly record the activities of students, even in their bedrooms.1 The President authorizes the National Security Agency (NSA) to monitor the telephone calls and electronic communications of individuals within the United States on an unprecedented scale in the interest of national security.2 Even a cursory examination of the news suggests that the activities and communications of Americans are increasingly subject to government surveillance from every level of government. Whatever we may think about the necessity for this surveillance, we should question how such programs come into being; in other words, …


From Privacy To Liberty: The Fourth Amendment After Lawrence, Thomas P. Crocker Oct 2009

From Privacy To Liberty: The Fourth Amendment After Lawrence, Thomas P. Crocker

Faculty Publications

This Article explores a conflict between the protections afforded interpersonal relations in Lawrence v. Texas and the vulnerability experienced under the Fourth Amendment by individuals who share their lives with others. Under the Supreme Court's third-party doctrine, we have no constitutionally protected expectation of privacy in what we reveal to other persons. The effect of this doctrine is to leave many aspects of ordinary life shared in the company of others constitutionally unprotected. In an increasingly socially networked world, the Fourth Amendment may fail to protect precisely those liberties-to live in the company of others free from state surveillance and …


Reproductive Rights As Health Care Rights, B. Jessie Hill Jan 2009

Reproductive Rights As Health Care Rights, B. Jessie Hill

Faculty Publications

U.S. legal scholarship concerning reproductive rights has largely revolved around the poles of decisional autonomy, privacy, and equality, with a concomitant a tendency to de-emphasize the medical aspect of abortion rights. The medical approach has been particularly disfavored by feminist scholars, largely due to concerns about undermining the equality rationale for reproductive rights and placing too much power in the hands of physicians. In addition, American constitutional law has tended to treat reproductive-rights cases differently from other cases raising challenges to government restrictions on individuals’ rights to access certain forms of medical treatment, granting heightened judicial scrutiny to the former …


Privacy And Funeral Protests, Christina E. Wells Jan 2008

Privacy And Funeral Protests, Christina E. Wells

Faculty Publications

This article examines the free speech implications of funeral protest statutes. Enacted in response to the Westboro Baptist Church, whose members protest at funerals to spread their antigay message, such statutes restrict a broad array of peaceful expressive activity. This Article focuses on the states’ interest underlying these statutes - protecting mourners’ right to be free from unwanted intrusions while at funeral services. Few would argue against protecting funeral services from intrusive protests. These statutes, however, go far beyond that notion and protect mourners from offensive, rather than intrusive, protests. As such, they do not conceive of privacy as protection …


A Copyright Conundrum: Protecting Email Privacy, Ned Snow Apr 2007

A Copyright Conundrum: Protecting Email Privacy, Ned Snow

Faculty Publications

The practice of email forwarding deprives email senders of privacy. Expression meant for only a specific recipient often finds its way into myriad inboxes or onto a public website, exposed for all to see. Simply by clicking the "forward" button, email recipients routinely strip email senders of expressive privacy. The common law condemns such conduct. Beginning over two-hundred-fifty years ago, courts recognized that authors of personal correspondence hold property rights in their expression. Under common-law copyright, authors held a right to control whether their correspondence was published to third parties. This common-law protection of private expression was nearly absolute, immune …


In Sickness, Health And Cyberspace: Protecting The Security Of Electronic Private Health Information, Sharona Hoffman, Andy Podgurski Jan 2007

In Sickness, Health And Cyberspace: Protecting The Security Of Electronic Private Health Information, Sharona Hoffman, Andy Podgurski

Faculty Publications

The electronic processing of health information provides considerable benefits to patients and health care providers at the same time that it creates serious risks to the confidentiality, integrity, and availability of the data. The Internet provides a conduit for rapid and uncontrolled dispersion and trafficking of illicitly-obtained private health information, with far-reaching consequences to the unsuspecting victims. In order to address such threats to electronic private health information, the U.S. Department of Health and Human Services enacted the HIPAA Security Rule, which thus far has received little attention in the legal literature. This article presents a critique of the Security …


Workplace Blogs And Workers' Privacy, Rafael Gely, Leonard Bierman Jul 2006

Workplace Blogs And Workers' Privacy, Rafael Gely, Leonard Bierman

Faculty Publications

In this article we focus on a related issue. We discuss the development of blogs, and the virtual “space” where blogs and bloggers interact the “blogosphere” and their impact on the issue of workers' privacy. To some extent it would seem a bit of a contradiction to talk about privacy and blogging in the same article. Blogging, as we will discuss below, does not appear to be the most private of enterprises. There are, we argue, a number of interesting privacy issues raised by the development of blogs as an employee communication tool and by the way employers have reacted …


Preplacement Examinations And Job-Relatedness: How To Enhance Privacy And Diminish Discrimination In The Workplace, Sharona Hoffman Mar 2006

Preplacement Examinations And Job-Relatedness: How To Enhance Privacy And Diminish Discrimination In The Workplace, Sharona Hoffman

Faculty Publications

Medical testing in the workplace is raising growing concern in light of increasingly available genetic tests and what is perceived as a general assault on individual privacy in the United States. Almost seventy percent of major U.S. firms require individuals who receive job offers to undergo medical testing prior to the commencement of employment, and the law does not restrict the scope of these examinations. Thus, employers test job candidates not only for fitness for duty and use of illegal substances, but also for a variety of conditions including susceptibility to workplace hazards, breast and colon cancer, sexually transmitted diseases, …


Confidentiality In Arbitration: Beyond The Myth, Richard C. Reuben Jan 2006

Confidentiality In Arbitration: Beyond The Myth, Richard C. Reuben

Faculty Publications

Many people assume that arbitration is private and confidential. But is that assumption accurate? This article is the first to explore that question in the important context of whether arbitration communications can be discovered and admitted into evidence in other legal proceedings - a question that is just beginning to show up in the cases. It first surveys the federal and state statutory and case law, finding that arbitration communications in fact are generally discoverable and admissible. It then considers the normative desirability of discovering and admitting arbitration communications evidence, concluding that the free discovery and admissibility of arbitration communications …


Untangling The Privacy Paradox In Arbitration, Amy J. Schmitz Jan 2006

Untangling The Privacy Paradox In Arbitration, Amy J. Schmitz

Faculty Publications

Arbitration is private but not secret. This truism regarding arbitration seems contradictory and nonsensical. However, common understandings of privacy in arbitration often lull individuals into assuming personal information revealed in arbitration may not become public. They assume privacy and confidentiality are synonymous. The reality is that arbitration is private but not necessarily confidential, or secret. This is the privacy paradox: it defies common conceptions of arbitration's secrecy, but is nonetheless true. This paradox is problematic because it leads to shortsighted contracting and simplistic assumptions about arbitral justice. Moreover, it may foster injustice when repeat players unduly benefit from unpublished awards …


User Choices And Regret: Understanding Users' Decision Process About Consensually Acquired Spyware, Nathaniel Good, Jens Grossklags, David Thaw, Aaron K. Perzanowski, Deirdre K. Mulligan, Joseph Konstan Jan 2006

User Choices And Regret: Understanding Users' Decision Process About Consensually Acquired Spyware, Nathaniel Good, Jens Grossklags, David Thaw, Aaron K. Perzanowski, Deirdre K. Mulligan, Joseph Konstan

Faculty Publications

Spyware is software which monitors user actions, gathers personal data, and/or displays advertisements to users. While some spyware is installed surreptitiously, a surprising amount is installed on users’ computers with their active participation. In some cases, users agree to accept spyware as part of a software bundle as a cost associated with gaining functionality they desire. In many other cases, however, users are unaware that they installed spyware, or of the consequences of that installation. This lack of awareness occurs even when the functioning of the spyware is explicitly declared in the end user license agreement (EULA). We argue and …


Data Mining And Attention Consumption, Eric Goldman Jan 2005

Data Mining And Attention Consumption, Eric Goldman

Faculty Publications

This Essay challenges the prevailing hostility towards data mining and direct marketing. The Essay starts by defining data mining and shows that the only important step is how data is used, not its aggregation or sorting. The Essay then discusses one particular type of data use, the sending of direct marketing. The Essay establishes a model for calculating the private utility experienced by a direct marketing recipient. The model posits that utility is a function of the message's substantive content, the degree of attention consumed, and the recipient's reaction to receiving the message. The Essay concludes with some policy recommendations …


Nevada Case Threatens To Expand Terry Stops, Shaun B. Spencer Jan 2004

Nevada Case Threatens To Expand Terry Stops, Shaun B. Spencer

Faculty Publications

This term, the U.S. Supreme Court will review a Nevada decision authorizing police to arrest people for refusing to identify themselves. If affirmed, the decision could reshape how privacy is viewed in the criminal context throughout the United States, and could prompt the Massachusetts Supreme Judicial Court to depart from the Supreme Court’s approach to stop-and-frisk cases. The case is Hiibel v. Sixth Judicial District Court, 59 P.3d 1201 (Nev. 2002), cert. granted, 124 S. Ct. 430 (2003).


Reasonable Expectations And The Erosion Of Privacy, Shaun Spencer Jan 2002

Reasonable Expectations And The Erosion Of Privacy, Shaun Spencer

Faculty Publications

This Article examines how the prevailing legal conception of privacy facilitates the erosion of privacy. The law generally measures privacy by reference to society’s reasonable expectation of privacy. If we think of the universe of legally private matters as a sphere, the sphere will contract (or least in theory) expand in accordance with changing social expectations. This expectations-driven conception of privacy in effect establishes a privacy marketplace, analogous in both a literal and metaphorical sense to a marketplace of ideas. In this marketplace, societal expectations of privacy fluctuate in response to changing social practices. For this reason, privacy is susceptible …


An Overview Of Canadian Privacy Law For Pharmaceutical And Device Manufacturers Operating In Canada, Erika Lietzan, John K. Fuson Jan 2002

An Overview Of Canadian Privacy Law For Pharmaceutical And Device Manufacturers Operating In Canada, Erika Lietzan, John K. Fuson

Faculty Publications

On April 13, 2000, the Canadian Parliament enacted by Royal Assent the Personal Information Protection and Electronic Documents Act (PIPEDA). The Act requires private organizations to comply with a code of “fair information practice,” which mandates individual consent for the collection, use, and disclosure of personal information. PIPEDA complements the Federal Privacy Act, which places similar obligations on government institutions. On January 1, 2002, the Act began to apply to personal information (including personal health information) collected, used, or disclosed by a federal work, undertaking, or business, and personal information (including personal health information) disclosed by any organization for consideration …