Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

2007

Privacy

Discipline
Institution
Publication

Articles 1 - 28 of 28

Full-Text Articles in Law

The Nanny State — It Takes A Village, Timothy Zick Oct 2007

The Nanny State — It Takes A Village, Timothy Zick

Popular Media

No abstract provided.


Second Draft Of The Public's Right To Fair Use - 2007, Wendy J. Gordon Aug 2007

Second Draft Of The Public's Right To Fair Use - 2007, Wendy J. Gordon

Scholarship Chronologically

Under provocative titles like "fared use" and "the end of friction," commentators argue about whether or not the doctrine of "fair use" should exist in a world of instantaneous transactions. As collecting societies like the Copyright Clearance Center become more powerful, and technologies like the internet have made it possible to purchase digital copies by clicking a mouse, the suggestion is sometimes made that fair use could or should disappear. Courts like the Second and Sixth Circuits have flirted with foreclosing fair use if a licensing market is present or possible. The presence of 'traditional, reasonable, or likely to be …


Draft Of The Public's Right To Fair Use - 2007, Wendy J. Gordon Aug 2007

Draft Of The Public's Right To Fair Use - 2007, Wendy J. Gordon

Scholarship Chronologically

Under provocative titles like "fared use" and "the end of friction," commentators argue about whether or not the doctrine of "fair use" should exist in a world of instantaneous transactions. As collecting societies like the Copyright Clearance Center become more powerful, and technologies like the internet have made it possible to purchase digital copies by clicking a mouse, the suggestion is sometimes made that fair use could or should disappear. Courts like the Second and Sixth Circuits have flirted with foreclosing fair use if a licensing market is present or possible. The presence of 'traditional, reasonable, or likely to be …


9th Annual Open Government Summit: The Access To Public Records Act & The Open Meetings Act, 2007, Department Of Attorney General, State Of Rhode Island Aug 2007

9th Annual Open Government Summit: The Access To Public Records Act & The Open Meetings Act, 2007, Department Of Attorney General, State Of Rhode Island

School of Law Conferences, Lectures & Events

No abstract provided.


Second Class For The Second Time: How The Commercial Speech Doctrine Stigmatizes Commercial Use Of Aggregated Public Records, Brian N. Larson, Genelle I. Belmas Jul 2007

Second Class For The Second Time: How The Commercial Speech Doctrine Stigmatizes Commercial Use Of Aggregated Public Records, Brian N. Larson, Genelle I. Belmas

Faculty Scholarship

This Article argues that access to aggregated electronic public records for commercial use should receive protection under the First Amendment in the same measure as the speech acts the access supports. In other words, we view commercial access to aggregated public records as an essential means to valuable speech. For many, however, the taint of the commercial speech doctrine is turning all “information flows” into commercial ones. This, in turn, is threatening the access to government records.


Draft Of Fair Use And Face-To-Face Bargaining - 2007, Wendy J. Gordon Jun 2007

Draft Of Fair Use And Face-To-Face Bargaining - 2007, Wendy J. Gordon

Scholarship Chronologically

Alex has a ten-year-old cassette of a favorite movie. Unfortunately, she does not have a video cassette player. She wants to copy the movie onto her iPod. To do this, she borrows a VCR from a friend, runs a cable to a video capture port on my computer, reformats the file into something the iPod can read, and sends the file to the iPod, which she will use to watch the movie in the future. After the file is securely on the iPod, she will delete all records of the movie from my computer. Destroy the original VHS copy seems …


A Copyright Conundrum: Protecting Email Privacy, Ned Snow Apr 2007

A Copyright Conundrum: Protecting Email Privacy, Ned Snow

Faculty Publications

The practice of email forwarding deprives email senders of privacy. Expression meant for only a specific recipient often finds its way into myriad inboxes or onto a public website, exposed for all to see. Simply by clicking the "forward" button, email recipients routinely strip email senders of expressive privacy. The common law condemns such conduct. Beginning over two-hundred-fifty years ago, courts recognized that authors of personal correspondence hold property rights in their expression. Under common-law copyright, authors held a right to control whether their correspondence was published to third parties. This common-law protection of private expression was nearly absolute, immune …


Mission Creep: Public Health Surveillance And Medical Privacy, Wendy K. Mariner Apr 2007

Mission Creep: Public Health Surveillance And Medical Privacy, Wendy K. Mariner

Faculty Scholarship

The National Security Agency's domestic surveillance program has parallels in the growth of disease surveillance for public health purposes. This article explores whether laws requiring health providers to report to government names and identifiable information about patients with infectious or chronic diseases may be vulnerable to challenge as an invasion of privacy. A shift in the use of disease surveillance data from investigating disease outbreaks to data mining and analysis for research, budgeting, and policy planning, as well as bioterrorism, tests the boundaries of liberty and privacy. The Supreme Court has not reviewed a disease reporting law. Its few related …


Newsgathering In Light Of Hipaa, Alexander A. Boni-Saenz Feb 2007

Newsgathering In Light Of Hipaa, Alexander A. Boni-Saenz

All Faculty Scholarship

This short piece examines the interaction between the Health Insurance Portability and Accountability Act (HIPAA), a federal law designed to protect the privacy of individuals’ health information, and state Freedom of Information (FOI) laws, which are designed to ensure public access to government documents. It describes three recent cases from different states that addressed difficult issues about where and how to draw the line between the public’s right to know and individuals’ rights to keep their medical information secret. It concludes that questions about the interaction of state FOI laws and HIPAA should be guided by the framework suggested in …


Standing Room Only: Why Fourth Amendment Exclusion And Standing Can No Longer Logically Coexist, Sherry F. Colb Feb 2007

Standing Room Only: Why Fourth Amendment Exclusion And Standing Can No Longer Logically Coexist, Sherry F. Colb

Cornell Law Faculty Publications

No abstract provided.


Tied Up In Knotts? Gps And The Fourth Amendment, Renee Mcdonald Hutchins Jan 2007

Tied Up In Knotts? Gps And The Fourth Amendment, Renee Mcdonald Hutchins

Journal Articles

Judicial and scholarly assessment of emerging technology seems poised to drive the Fourth Amendment down one of three paths. The first would simply relegate the amendment to a footnote in history books by limiting its reach to harms that the framers specifically envisioned. A modified version of this first approach would dispense with expansive constitutional notions of privacy and replace them with legislative fixes. A third path offers the amendment continued vitality but requires the U.S. Supreme Court to overhaul its Fourth Amendment analysis. Fortunately, a fourth alternative is available to cabin emerging technologies within the existing doctrinal framework. Analysis …


Tied Up In Knotts? Gps Technology And The Fourth Amendment, Renée Mcdonald Hutchins Jan 2007

Tied Up In Knotts? Gps Technology And The Fourth Amendment, Renée Mcdonald Hutchins

Faculty Scholarship

Judicial and scholarly assessment of emerging technology seems poised to drive the Fourth Amendment down one of three paths. The first would simply relegate the amendment to a footnote in history books by limiting its reach to harms that the framers specifically envisioned. A modified version of this first approach would dispense with expansive constitutional notions of privacy and replace them with legislative fixes. A third path offers the amendment continued vitality but requires the U.S. Supreme Court to overhaul its Fourth Amendment analysis. Fortunately, a fourth alternative is available to cabin emerging technologies within the existing doctrinal framework. Analysis …


Reservoirs Of Danger: The Evolution Of Public And Private Law At The Dawn Of The Information Age, Danielle Keats Citron Jan 2007

Reservoirs Of Danger: The Evolution Of Public And Private Law At The Dawn Of The Information Age, Danielle Keats Citron

Faculty Scholarship

A defining problem at the dawn of the Information Age will be securing computer databases of ultra-sensitive personal information. These reservoirs of data fuel our Internet economy but endanger individuals when their information escapes into the hands of cyber-criminals. This juxtaposition of opportunities for rapid economic growth and novel dangers recalls similar challenges society and law faced at the outset of the Industrial Age. Then, reservoirs collected water to power textile mills: the water was harmless in repose but wrought havoc when it escaped. After initially resisting Rylands v. Fletcher’s strict liability standard as undermining economic development, American courts …


Please, Let's Bury The Junk: The Codis Loci And The Revelation Of Private Information, David H. Kaye Jan 2007

Please, Let's Bury The Junk: The Codis Loci And The Revelation Of Private Information, David H. Kaye

Journal Articles

This Northwestern University Law Review Colloquy paper describes the four possible ways in which genetic loci could possess predictive or diagnostic value with regard to diseases and explains why these mechanisms have not led, and probably cannot lead, to useful screening tests with the Convicted Offender DNA Index System (CODIS) profiles in national, state, and local databases. It then considers the phenotypes and familial relationships that the CODIS STRs can be used to identify. The profiles carry limited information about an individual's race and familial relationships, and the article places the resulting privacy issues in perspective. Finally, the paper comments …


In Sickness, Health And Cyberspace: Protecting The Security Of Electronic Private Health Information, Sharona Hoffman, Andy Podgurski Jan 2007

In Sickness, Health And Cyberspace: Protecting The Security Of Electronic Private Health Information, Sharona Hoffman, Andy Podgurski

Faculty Publications

The electronic processing of health information provides considerable benefits to patients and health care providers at the same time that it creates serious risks to the confidentiality, integrity, and availability of the data. The Internet provides a conduit for rapid and uncontrolled dispersion and trafficking of illicitly-obtained private health information, with far-reaching consequences to the unsuspecting victims. In order to address such threats to electronic private health information, the U.S. Department of Health and Human Services enacted the HIPAA Security Rule, which thus far has received little attention in the legal literature. This article presents a critique of the Security …


The Liberal Assault On The Fourth Amendment, Christopher Slobogin Jan 2007

The Liberal Assault On The Fourth Amendment, Christopher Slobogin

Vanderbilt Law School Faculty Publications

As construed by the Supreme Court, the Fourth Amendment's reasonableness requirement regulates overt, non-regulatory government searches of homes, cars, and personal effects-and virtually nothing else. This essay is primarily about how we got to this point. It is fashionable to place much of the blame for today's law on the Warren Court's adoption of the malleable expectation of privacy concept as the core value protected by the Fourth Amendment. But this diagnosis fails to explain why even the more liberal justices have often gone along with many of the privacy-diminishing holdings of the Court. This essay argues that three other …


The Public's Right To Fair Use: Amending Section 107 To Avoid The 'Fared Use' Fallacy, Wendy J. Gordon, Daniel Bahls Jan 2007

The Public's Right To Fair Use: Amending Section 107 To Avoid The 'Fared Use' Fallacy, Wendy J. Gordon, Daniel Bahls

Faculty Scholarship

Under provocative titles like "Fared Use"1 and "The End of Friction,"2 commentators argue about whether or not the copyright doctrine of fair use3 should exist in a world of instantaneous transactions. As collecting societies such as the Copyright Clearance Center have become more powerful, and technologies like cellular phones and the internet have made it possible to purchase digital copies by dialing a number or clicking a mouse, the suggestion is sometimes made that fair use could or should disappear. The Second and Sixth Circuits have flirted with foreclosing fair use if a licensing market is present …


Medicine And Public Health: Crossing Legal Boundaries, Wendy K. Mariner Jan 2007

Medicine And Public Health: Crossing Legal Boundaries, Wendy K. Mariner

Faculty Scholarship

In 2006, New York City began a mandatory reporting system for laboratories to submit blood sugar (A1c) test results (primarily for diabetes) to the city's Department of Health and Mental Hygiene without the patient's consent. This article examines whether this new program is an innovative way to improve New Yorkers' health, an invasion of medical privacy, or usurpation of the physician's role. The registry is an example of public health initiatives in chronic diseases, which challenge the limits of laws governing medicine care and public health programs by blurring the historical boundaries between them.


Twilight Of The Idols? Eu Internet Privacy And The Post Enlightenment Paradigm, Mark F. Kightlinger Jan 2007

Twilight Of The Idols? Eu Internet Privacy And The Post Enlightenment Paradigm, Mark F. Kightlinger

Law Faculty Scholarly Articles

This Article provides a timely examination of the European Union's approach to information privacy on the internet, an approach that some legal scholars have held up as a model for law reform in the United States. Building on the author's recent piece discussing the U.S. approach to internet privacy, this Article applies to the EU's internet privacy regime a theoretical framework constructed from the writings of philosopher and social theorist Alasdair MacIntyre on the failures of Enlightenment and post-Enlightenment thought. The EU internet privacy regime is shown to reflect and reinforce three key elements of the "post-Enlightenment paradigm," i.e., the …


Confidentiality Of Educational Records And Child Protective Proceedings, Frank E. Vandervort Jan 2007

Confidentiality Of Educational Records And Child Protective Proceedings, Frank E. Vandervort

Book Chapters

The Federal Family Education Rights and Privacy Act (FERPA), which provides funding for state educational programming, requires that student records be disclosed to a nonparent only with the written consent of the child’s parent, unless the disclosure falls within one of the several exceptions detailed in the statute. One of the exemptions provided for in the federal law permits a school to disclose information to “state or local officials or authorities to whom [that] information is allowed to be reported or disclosed pursuant to state statute,” if that official certifies in writing “that the information will not be disclosed to …


Birth Certificates, Elizabeth Samuels Jan 2007

Birth Certificates, Elizabeth Samuels

All Faculty Scholarship

Birth certificates in the United States, which are issued by the states, have two different sections, and each section involves different privacy concerns. The first section, the legal record of birth, is always available to the adult whose birth it registers; access by other persons varies widely from state to state, ranging from a short list of specified relatives to the public at large. The second section of the certificate - which records health and medical information about the parents, the birth, and the infant - is used only for data collection and analysis, under regulations that protect the privacy …


Regulating Cyberbullies Through Notice-Based Liability, Brad Areheart Jan 2007

Regulating Cyberbullies Through Notice-Based Liability, Brad Areheart

College of Law Faculty Scholarship

With the growth of the Internet's uses and abuses, Internet harassment is making headlines. Given its immediacy, anonymity, and accessibility, the Internet offers an unprecedented forum for defamation and harassment. The salient problem with such cyberbullying is that victims are typically left without adequate recourse. The government should provide recourse by curtailing the near absolute immunity Internet Service Providers (ISPs) currently enjoy under the Communications Decency Act (CDA) and implementing a notice and take-down scheme similar to that for copyright infringement under the Digital Millennium Copyright Act (DMCA) for certain torts.


Structural Rights In Privacy, Harry Surden Jan 2007

Structural Rights In Privacy, Harry Surden

Publications

This Essay challenges the view that privacy interests are protected primarily by law. Based upon the understanding that society relies upon nonlegal devices such as markets, norms, and structure to regulate human behavior, this Essay calls attention to a class of regulatory devices known as latent structural constraints and provides a positive account of their role in regulating privacy. Structural constraints are physical or technological barriers which regulate conduct; they can be either explicit or latent. An example of an explicit structural constraint is a fence which is designed to prevent entry onto real property, thereby effectively enforcing property rights. …


Towards A Right To Privacy In Transnational Intelligence Networks, Francesca Bignami Jan 2007

Towards A Right To Privacy In Transnational Intelligence Networks, Francesca Bignami

GW Law Faculty Publications & Other Works

Transnational intelligence networks have emerged as an essential tool for combating international terrorism and criminal activity. As with domestic intelligence-gathering, they raise a number of privacy concerns: the risk of false information, the danger that intelligence will be used for illegitimate purposes, and the burden placed on human dignity and individual autonomy by free-wheeling data gathering. Transnational networks, however, exacerbate these privacy problems due to the dispersed nature of government authority and the difficulty of ensuring compliance with privacy duties by each node in the network. This article illustrates the dangers of transnational intelligence sharing with the case of Maher …


'I'Ve Got Nothing To Hide' And Other Misunderstandings Of Privacy, Daniel J. Solove Jan 2007

'I'Ve Got Nothing To Hide' And Other Misunderstandings Of Privacy, Daniel J. Solove

GW Law Faculty Publications & Other Works

In this short essay, written for a symposium in the San Diego Law Review, Professor Daniel Solove examines the nothing to hide argument. When asked about government surveillance and data mining, many people respond by declaring: "I've got nothing to hide." According to the nothing to hide argument, there is no threat to privacy unless the government uncovers unlawful activity, in which case a person has no legitimate justification to claim that it remain private. The nothing to hide argument and its variants are quite prevalent, and thus are worth addressing. In this essay, Solove critiques the nothing to hide …


Privacy's Other Path: Recovering The Law Of Confidentiality, Daniel J. Solove, Neil M. Richards Jan 2007

Privacy's Other Path: Recovering The Law Of Confidentiality, Daniel J. Solove, Neil M. Richards

GW Law Faculty Publications & Other Works

The familiar legend of privacy law holds that Samuel Warren and Louis Brandeis invented the right to privacy in 1890, and that William Prosser aided its development by recognizing four privacy torts in 1960. In this article, Professors Richards and Solove contend that Warren, Brandeis, and Prosser did not invent privacy law, but took it down a new path. Well before 1890, a considerable body of Anglo-American law protected confidentiality, which safeguards the information people share with others. Warren, Brandeis, and later Prosser turned away from the law of confidentiality to create a new conception of privacy based on the …


The Future Of Reputation: Gossip, Rumor, And Privacy On The Internet, Daniel J. Solove Jan 2007

The Future Of Reputation: Gossip, Rumor, And Privacy On The Internet, Daniel J. Solove

GW Law Faculty Publications & Other Works

YouTube. Facebook. MySpace. Wikipedia. Google. These are among the many new ways people are communicating and obtaining information. In THE FUTURE OF REPUTATION: GOSSIP, RUMOR, AND PRIVACY ON THE INTERNET (Yale University Press, October 2007), Professor Daniel J. Solove warns that this new world demands new thinking about the nature of privacy.

Teeming with chatrooms, online discussion groups, and blogs, the Internet offers previously unimagined opportunities for personal expression and communication. But there's a dark side to the story. A trail of information fragments about us is forever preserved on the Internet, instantly available in a Google search. A permanent …


Reservoirs Of Danger: The Evolution Of Public And Private Law At The Dawn Of The Information Age, Danielle K. Citron Jan 2007

Reservoirs Of Danger: The Evolution Of Public And Private Law At The Dawn Of The Information Age, Danielle K. Citron

Faculty Scholarship

A defining problem at the dawn of the Information Age will be securing computer databases of ultra-sensitive personal information. These reservoirs of data fuel our Internet economy but endanger individuals when their information escapes into the hands of cyber-criminals. This juxtaposition of opportunities for rapid economic growth and novel dangers recalls similar challenges society and law faced at the outset of the Industrial Age. Then, reservoirs collected water to power textile mills: the water was harmless in repose but wrought havoc when it escaped. After initially resisting Rylands v. Fletcher's strict liability standard as undermining economic development, American courts and …