Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Law

Systematic Ict Surveillance By Employers: Are Your Personal Activities Private?, Arlene J. Nicholas Jul 2014

Systematic Ict Surveillance By Employers: Are Your Personal Activities Private?, Arlene J. Nicholas

Faculty and Staff - Articles & Papers

This paper reviews the various methods of information and communications technology (ICT) that is used by employers to peer into the work lives and, in some cases, private lives of employees. Some of the most common methods – such as computer and Internet monitoring, video surveillance, and global positioning systems (GPS) – have resulted in employee disciplines that have been challenged in courts. This paper provides background information on United States (U.S.) laws and court cases which, in this age of easily accessible information, mostly support the employer. Assessments regarding regulations and policies, which will need to be continually updated …


E-Mails To Clients: Avoiding Missteps, Kristin J. Hazelwood Nov 2012

E-Mails To Clients: Avoiding Missteps, Kristin J. Hazelwood

Law Faculty Popular Media

In this column for Kentucky Bar Association's magazine (B&B - Bench & Bar), Professor Hazelwood addresses the ethical implications of emailing with a client. Practitioners are provided a series of questions to ask before emailing a client.


Busting Blocks: Revisiting 47 U.S.C. §230 To Address The Lack Of Effective Legal Recourse For Wrongful Inclusion In Spam Filters, Jonathan I. Ezor Jan 2011

Busting Blocks: Revisiting 47 U.S.C. §230 To Address The Lack Of Effective Legal Recourse For Wrongful Inclusion In Spam Filters, Jonathan I. Ezor

Scholarly Works

This paper discusses the growth and increasing significance of e-mail in the business and personal environment, and how unsolicited bulk commercial e-mail, also known as spam, has become a significant drain on technical and economic resources. It analyzes the statutory and self-help efforts to combat spam, with a specific focus on block lists and automated spam filters, and describes how alleged spammers have brought lawsuits in U.S. courts claiming they had been wrongfully included within block lists and filters. Finally, it describes some possible claims under U.S. law, then argues for a revision to current statutes to mandate a higher …


Designing Surveillance Law, Patricia L. Bellia Jan 2011

Designing Surveillance Law, Patricia L. Bellia

Journal Articles

As communications surveillance techniques become increasingly important in government efforts to detect and thwart criminal and terrorist activities, questions of how to reconcile privacy and law enforcement interests take on paramount importance. These questions have institutional as well as substantive dimensions. That is, the issue is not simply what the limits on communications surveillance should be, but who should set them — courts through application of the Fourth Amendment or legislatures through statutes and the oversight process? The scholarly literature offers divergent positive and normative perspectives on these questions.

For most scholars, the question of who should regulate communications surveillance …


S08rs Sgb No. 4 (Bylaws), Palermo Apr 2008

S08rs Sgb No. 4 (Bylaws), Palermo

Student Senate Enrolled Legislation

No abstract provided.


The Memory Gap In Surveillance Law, Patricia L. Bellia Jan 2008

The Memory Gap In Surveillance Law, Patricia L. Bellia

Journal Articles

U.S. information privacy laws contain a memory gap: they regulate the collection and disclosure of certain kinds of information, but they say little about its retention. This memory gap has ever-increasing significance for the structure of government surveillance law. Under current doctrine, the Fourth Amendment generally requires government agents to meet high standards before directly and prospectively gathering a target's communications. The law takes a dramatically different approach to indirect, surveillance-like activities, such as the compelled production of communications from a third party, even when those activities yield the same information as, or more information than, direct surveillance activities. Because …


Fourth Amendment Protection For Stored E-Mail, Patricia L. Bellia, Susan Freiwald Jan 2008

Fourth Amendment Protection For Stored E-Mail, Patricia L. Bellia, Susan Freiwald

Journal Articles

The question of whether and how the Fourth Amendment regulates government access to stored e-mail remains open and pressing. A panel of the Sixth Circuit recently held in Warshak v. United States, 490 F.3d 455 (6th Cir. 2007), that users generally retain a reasonable expectation of privacy in the e-mails they store with their Internet Service Providers (ISPs), which implies that government agents must generally acquire a warrant before they may compel ISPs to disclose their users' stored e-mails. The Sixth Circuit, however, is reconsidering the case en banc. This Article examines the nature of stored e-mail surveillance and argues …


From Snail Mail To E-Mail: The Traditional Legal Memorandum In The Twenty-First Century, Kristen Konrad Robbins-Tiscione Jan 2008

From Snail Mail To E-Mail: The Traditional Legal Memorandum In The Twenty-First Century, Kristen Konrad Robbins-Tiscione

Georgetown Law Faculty Publications and Other Works

Traditional legal memoranda have been used to teach objective analysis since the inception of legal writing programs in the 1970's. The continued use of these memoranda in the legal writing classroom leads law students to believe that traditional memoranda are still the primary form of communication between attorney and client. A 2006 survey of Georgetown University Law Center graduates, however, suggests that the traditional legal memorandum is all but dead in law practice. Seventy-five percent of the graduates surveyed said they write no more than three traditional memoranda per year. Instead, these graduates are more likely to communicate with clients …


A Copyright Conundrum: Protecting Email Privacy, Ned Snow Apr 2007

A Copyright Conundrum: Protecting Email Privacy, Ned Snow

Faculty Publications

The practice of email forwarding deprives email senders of privacy. Expression meant for only a specific recipient often finds its way into myriad inboxes or onto a public website, exposed for all to see. Simply by clicking the "forward" button, email recipients routinely strip email senders of expressive privacy. The common law condemns such conduct. Beginning over two-hundred-fifty years ago, courts recognized that authors of personal correspondence hold property rights in their expression. Under common-law copyright, authors held a right to control whether their correspondence was published to third parties. This common-law protection of private expression was nearly absolute, immune …


The Fourth Amendment Status Of Stored E-Mail: The Law Professors' Brief In Warshak V. United States, Susan Freiwald, Patricia L. Bellia Jan 2007

The Fourth Amendment Status Of Stored E-Mail: The Law Professors' Brief In Warshak V. United States, Susan Freiwald, Patricia L. Bellia

Journal Articles

This paper contains the law professors' brief in the landmark case of Warshak v. United States, the first federal appellate case to recognize a reasonable expectation of privacy in electronic mail stored with an Internet Service Provider (ISP). While the 6th circuit's opinion was subsequently vacated and reheard en banc, the panel decision will remain extremely significant for its requirement that law enforcement agents must generally acquire a warrant before compelling an ISP to disclose its subscriber's stored e-mails. The law professors' brief, co-authored by Susan Freiwald (University of San Francisco) and Patricia L. Bellia (Notre Dame) and signed by …


Preemption Of State Spam Laws By The Federal Can-Spam Act, Roger Allen Ford Jan 2005

Preemption Of State Spam Laws By The Federal Can-Spam Act, Roger Allen Ford

Law Faculty Scholarship

Unsolicited bulk commercial email is an increasing problem, and though many states have passed laws aimed at curbing its use and abuse, for several years the federal government took no action. In 2003 that changed when Congress passed the CAN-SPAM Act. Though the law contains many different restrictions on spam messages, including some restriction of nearly every type that states had adopted, the Act was widely criticized as weak. Many of the CAN-SPAM Act's provisions are weaker than corresponding provisions of state law, and the Act preempts most state spam laws that would go farther, including two state laws that …


Chasing Bits Across Borders, Patricia L. Bellia Jan 2001

Chasing Bits Across Borders, Patricia L. Bellia

Journal Articles

As computer crime becomes more widespread, countries increasingly confront difficulties in securing evidence stored in electronic form outside of their borders. These difficulties have prompted two related responses. Some states have asserted a broad power to conduct remote cross-border searches - that is, to use computers within their territory to access and examine data physically stored outside of their territory. Other states have pressed for recognition of a remote cross-border search power in international fora, arguing that such a power is an essential weapon in efforts to combat computer crime. This Article explores these state responses and develops a framework …