Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (5)
- Communications Law (3)
- Constitutional Law (2)
- Fourth Amendment (2)
- Legal Ethics and Professional Responsibility (2)
-
- Legal Writing and Research (2)
- Business (1)
- Business Law, Public Responsibility, and Ethics (1)
- Business Organizations Law (1)
- Commercial Law (1)
- Communication (1)
- Communication Technology and New Media (1)
- Computer Law (1)
- Criminal Law (1)
- Human Resources Management (1)
- International Law (1)
- Labor Relations (1)
- Labor and Employment Law (1)
- Legal Education (1)
- Legislation (1)
- Mass Communication (1)
- National Security Law (1)
- Organizational Behavior and Theory (1)
- Privacy Law (1)
- Science and Technology Law (1)
- Social and Behavioral Sciences (1)
- Technology and Innovation (1)
- Institution
Articles 1 - 12 of 12
Full-Text Articles in Law
Systematic Ict Surveillance By Employers: Are Your Personal Activities Private?, Arlene J. Nicholas
Systematic Ict Surveillance By Employers: Are Your Personal Activities Private?, Arlene J. Nicholas
Faculty and Staff - Articles & Papers
This paper reviews the various methods of information and communications technology (ICT) that is used by employers to peer into the work lives and, in some cases, private lives of employees. Some of the most common methods – such as computer and Internet monitoring, video surveillance, and global positioning systems (GPS) – have resulted in employee disciplines that have been challenged in courts. This paper provides background information on United States (U.S.) laws and court cases which, in this age of easily accessible information, mostly support the employer. Assessments regarding regulations and policies, which will need to be continually updated …
E-Mails To Clients: Avoiding Missteps, Kristin J. Hazelwood
E-Mails To Clients: Avoiding Missteps, Kristin J. Hazelwood
Law Faculty Popular Media
In this column for Kentucky Bar Association's magazine (B&B - Bench & Bar), Professor Hazelwood addresses the ethical implications of emailing with a client. Practitioners are provided a series of questions to ask before emailing a client.
Busting Blocks: Revisiting 47 U.S.C. §230 To Address The Lack Of Effective Legal Recourse For Wrongful Inclusion In Spam Filters, Jonathan I. Ezor
Busting Blocks: Revisiting 47 U.S.C. §230 To Address The Lack Of Effective Legal Recourse For Wrongful Inclusion In Spam Filters, Jonathan I. Ezor
Scholarly Works
This paper discusses the growth and increasing significance of e-mail in the business and personal environment, and how unsolicited bulk commercial e-mail, also known as spam, has become a significant drain on technical and economic resources. It analyzes the statutory and self-help efforts to combat spam, with a specific focus on block lists and automated spam filters, and describes how alleged spammers have brought lawsuits in U.S. courts claiming they had been wrongfully included within block lists and filters. Finally, it describes some possible claims under U.S. law, then argues for a revision to current statutes to mandate a higher …
Designing Surveillance Law, Patricia L. Bellia
Designing Surveillance Law, Patricia L. Bellia
Journal Articles
As communications surveillance techniques become increasingly important in government efforts to detect and thwart criminal and terrorist activities, questions of how to reconcile privacy and law enforcement interests take on paramount importance. These questions have institutional as well as substantive dimensions. That is, the issue is not simply what the limits on communications surveillance should be, but who should set them — courts through application of the Fourth Amendment or legislatures through statutes and the oversight process? The scholarly literature offers divergent positive and normative perspectives on these questions.
For most scholars, the question of who should regulate communications surveillance …
S08rs Sgb No. 4 (Bylaws), Palermo
S08rs Sgb No. 4 (Bylaws), Palermo
Student Senate Enrolled Legislation
No abstract provided.
The Memory Gap In Surveillance Law, Patricia L. Bellia
The Memory Gap In Surveillance Law, Patricia L. Bellia
Journal Articles
U.S. information privacy laws contain a memory gap: they regulate the collection and disclosure of certain kinds of information, but they say little about its retention. This memory gap has ever-increasing significance for the structure of government surveillance law. Under current doctrine, the Fourth Amendment generally requires government agents to meet high standards before directly and prospectively gathering a target's communications. The law takes a dramatically different approach to indirect, surveillance-like activities, such as the compelled production of communications from a third party, even when those activities yield the same information as, or more information than, direct surveillance activities. Because …
Fourth Amendment Protection For Stored E-Mail, Patricia L. Bellia, Susan Freiwald
Fourth Amendment Protection For Stored E-Mail, Patricia L. Bellia, Susan Freiwald
Journal Articles
The question of whether and how the Fourth Amendment regulates government access to stored e-mail remains open and pressing. A panel of the Sixth Circuit recently held in Warshak v. United States, 490 F.3d 455 (6th Cir. 2007), that users generally retain a reasonable expectation of privacy in the e-mails they store with their Internet Service Providers (ISPs), which implies that government agents must generally acquire a warrant before they may compel ISPs to disclose their users' stored e-mails. The Sixth Circuit, however, is reconsidering the case en banc. This Article examines the nature of stored e-mail surveillance and argues …
From Snail Mail To E-Mail: The Traditional Legal Memorandum In The Twenty-First Century, Kristen Konrad Robbins-Tiscione
From Snail Mail To E-Mail: The Traditional Legal Memorandum In The Twenty-First Century, Kristen Konrad Robbins-Tiscione
Georgetown Law Faculty Publications and Other Works
Traditional legal memoranda have been used to teach objective analysis since the inception of legal writing programs in the 1970's. The continued use of these memoranda in the legal writing classroom leads law students to believe that traditional memoranda are still the primary form of communication between attorney and client. A 2006 survey of Georgetown University Law Center graduates, however, suggests that the traditional legal memorandum is all but dead in law practice. Seventy-five percent of the graduates surveyed said they write no more than three traditional memoranda per year. Instead, these graduates are more likely to communicate with clients …
A Copyright Conundrum: Protecting Email Privacy, Ned Snow
A Copyright Conundrum: Protecting Email Privacy, Ned Snow
Faculty Publications
The practice of email forwarding deprives email senders of privacy. Expression meant for only a specific recipient often finds its way into myriad inboxes or onto a public website, exposed for all to see. Simply by clicking the "forward" button, email recipients routinely strip email senders of expressive privacy. The common law condemns such conduct. Beginning over two-hundred-fifty years ago, courts recognized that authors of personal correspondence hold property rights in their expression. Under common-law copyright, authors held a right to control whether their correspondence was published to third parties. This common-law protection of private expression was nearly absolute, immune …
The Fourth Amendment Status Of Stored E-Mail: The Law Professors' Brief In Warshak V. United States, Susan Freiwald, Patricia L. Bellia
The Fourth Amendment Status Of Stored E-Mail: The Law Professors' Brief In Warshak V. United States, Susan Freiwald, Patricia L. Bellia
Journal Articles
This paper contains the law professors' brief in the landmark case of Warshak v. United States, the first federal appellate case to recognize a reasonable expectation of privacy in electronic mail stored with an Internet Service Provider (ISP). While the 6th circuit's opinion was subsequently vacated and reheard en banc, the panel decision will remain extremely significant for its requirement that law enforcement agents must generally acquire a warrant before compelling an ISP to disclose its subscriber's stored e-mails. The law professors' brief, co-authored by Susan Freiwald (University of San Francisco) and Patricia L. Bellia (Notre Dame) and signed by …
Preemption Of State Spam Laws By The Federal Can-Spam Act, Roger Allen Ford
Preemption Of State Spam Laws By The Federal Can-Spam Act, Roger Allen Ford
Law Faculty Scholarship
Unsolicited bulk commercial email is an increasing problem, and though many states have passed laws aimed at curbing its use and abuse, for several years the federal government took no action. In 2003 that changed when Congress passed the CAN-SPAM Act. Though the law contains many different restrictions on spam messages, including some restriction of nearly every type that states had adopted, the Act was widely criticized as weak. Many of the CAN-SPAM Act's provisions are weaker than corresponding provisions of state law, and the Act preempts most state spam laws that would go farther, including two state laws that …
Chasing Bits Across Borders, Patricia L. Bellia
Chasing Bits Across Borders, Patricia L. Bellia
Journal Articles
As computer crime becomes more widespread, countries increasingly confront difficulties in securing evidence stored in electronic form outside of their borders. These difficulties have prompted two related responses. Some states have asserted a broad power to conduct remote cross-border searches - that is, to use computers within their territory to access and examine data physically stored outside of their territory. Other states have pressed for recognition of a remote cross-border search power in international fora, arguing that such a power is an essential weapon in efforts to combat computer crime. This Article explores these state responses and develops a framework …