Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

Privacy

2006

Discipline
Institution
Publication

Articles 1 - 29 of 29

Full-Text Articles in Law

Science Fiction And Shed Dna, D. H. Kaye Dec 2006

Science Fiction And Shed Dna, D. H. Kaye

NULR Online

No abstract provided.


8th Annual Open Government Summit: Access To Public Records Act & Open Meetings Act, 2006, Department Of Attorney General, State Of Rhode Island Aug 2006

8th Annual Open Government Summit: Access To Public Records Act & Open Meetings Act, 2006, Department Of Attorney General, State Of Rhode Island

School of Law Conferences, Lectures & Events

No abstract provided.


No Direction Home: Will The Law Keep Pace With Human Tracking Technology To Protect Individual Privacy And Stop Geoslavery, William A. Herbert Jul 2006

No Direction Home: Will The Law Keep Pace With Human Tracking Technology To Protect Individual Privacy And Stop Geoslavery, William A. Herbert

Publications and Research

Increasingly, public and private employers are utilizing human tracking devices to monitor employee movement and conduct. Due to the propensity of American labor law to give greater weight toemployer property interests over most employee privacy expectations, there are currently few limitations on the use of human tracking in employment. The scope and nature of current legal principles regarding individual privacy are not sufficient to respond to the rapid development and use of human tracking technology. The academic use of the phrase “geoslavery” to describe the abusive use of such technology underscores its power. This article examines the use of such …


Workplace Blogs And Workers' Privacy, Rafael Gely, Leonard Bierman Jul 2006

Workplace Blogs And Workers' Privacy, Rafael Gely, Leonard Bierman

Faculty Publications

In this article we focus on a related issue. We discuss the development of blogs, and the virtual “space” where blogs and bloggers interact the “blogosphere” and their impact on the issue of workers' privacy. To some extent it would seem a bit of a contradiction to talk about privacy and blogging in the same article. Blogging, as we will discuss below, does not appear to be the most private of enterprises. There are, we argue, a number of interesting privacy issues raised by the development of blogs as an employee communication tool and by the way employers have reacted …


Bargaining For Privacy In The Unionized Workplace, Ann C. Hodges Jul 2006

Bargaining For Privacy In The Unionized Workplace, Ann C. Hodges

Law Faculty Publications

This article considers whether collective bargaining can enhance privacy protection for employees in the United States. Employers are increasingly engaging in practices that invade employee privacy with few existing legal protections to limit their actions. While data on the extent of bargaining about privacy is limited, it appears that unions in the U.S. have primarily used the grievance and arbitration procedure to challenge invasions of privacy that lead to discipline of the employee instead of negotiating explicit contractual privacy rights. In contrast to the U.S., labor representatives in many other countries, particularly in the European Union, have greater legal rights …


The Gathering Twilight? Information Privacy On The Internet In The Post-Enlightenment Era, Mark F. Kightlinger Apr 2006

The Gathering Twilight? Information Privacy On The Internet In The Post-Enlightenment Era, Mark F. Kightlinger

Law Faculty Scholarly Articles

The steady stream of news reports about violations of privacy on the Internet has spawned a growing body of literature discussing the legal protections available for personally identifiable information—i.e., information about identified or identifiable persons—collected via the Internet. This Article takes the discussion of Internet privacy protection in a new and very different direction by reexamining the U.S. Internet privacy regime from the perspective of a broader cultural/historical analysis and critique. The perspective adopted is that of Alasdair MacIntyre's account of the disarray in Enlightenment and post-Enlightenment discourse about morality and human nature and the accompanying disappearance of rational justifications …


Reflections On Standing: Challenges To Searches And Seizures In A High Technology World, José F. Anderson Apr 2006

Reflections On Standing: Challenges To Searches And Seizures In A High Technology World, José F. Anderson

All Faculty Scholarship

Among the profound issues that surround constitutional criminal procedure is the obscure often overlooked issue of who has standing to challenge an illegal search, seizure or confession. Privacy interests are often overlooked because without a legal status that allows a person to complain in court, there is no way to challenge whether one is constitutionally protected from personal invasions. Standing is that procedural barrier often imposed to prevent a person in a case from objecting to improper police conduct because of his or her relationship of ownership, proximity, location, or interest in an item searched or a thing seized. Although …


Preplacement Examinations And Job-Relatedness: How To Enhance Privacy And Diminish Discrimination In The Workplace, Sharona Hoffman Mar 2006

Preplacement Examinations And Job-Relatedness: How To Enhance Privacy And Diminish Discrimination In The Workplace, Sharona Hoffman

Faculty Publications

Medical testing in the workplace is raising growing concern in light of increasingly available genetic tests and what is perceived as a general assault on individual privacy in the United States. Almost seventy percent of major U.S. firms require individuals who receive job offers to undergo medical testing prior to the commencement of employment, and the law does not restrict the scope of these examinations. Thus, employers test job candidates not only for fitness for duty and use of illegal substances, but also for a variety of conditions including susceptibility to workplace hazards, breast and colon cancer, sexually transmitted diseases, …


The Privacy Gambit: Toward A Game Theoretic Approach To International Data Protection, Horace E. Anderson Jan 2006

The Privacy Gambit: Toward A Game Theoretic Approach To International Data Protection, Horace E. Anderson

Elisabeth Haub School of Law Faculty Publications

This article briefly explores several scenarios in which economic actors compete and cooperate in order to capture the value in personal information. The focus then shifts to one particular scenario: the ongoing interaction between the United States and the European Union in attempting to construct data protection regimes that serve the philosophies and citizens of each jurisdiction as well as provide a strategic economic advantage. A game theoretic model is presented to explain the course of dealings between the two actors, including both unilateral and bilateral actions. Part I ends with an exploration of opportunities for seizing competitive advantage, and …


Confidentiality In Arbitration: Beyond The Myth, Richard C. Reuben Jan 2006

Confidentiality In Arbitration: Beyond The Myth, Richard C. Reuben

Faculty Publications

Many people assume that arbitration is private and confidential. But is that assumption accurate? This article is the first to explore that question in the important context of whether arbitration communications can be discovered and admitted into evidence in other legal proceedings - a question that is just beginning to show up in the cases. It first surveys the federal and state statutory and case law, finding that arbitration communications in fact are generally discoverable and admissible. It then considers the normative desirability of discovering and admitting arbitration communications evidence, concluding that the free discovery and admissibility of arbitration communications …


Revisiting The American Action For Public Disclosure Of Facts, Brian C. Murchison Jan 2006

Revisiting The American Action For Public Disclosure Of Facts, Brian C. Murchison

Scholarly Articles

None available.


Patients And Biobanks, Ellen Wright Clayton Jan 2006

Patients And Biobanks, Ellen Wright Clayton

Vanderbilt Law School Faculty Publications

The question about the privacy of medical information can be stated simply: To what extent can and should patients control what the medical record contains and who has access to it and for what purposes? Patients often have apparently conflicting views on this subject. On the one hand, we, as patients, say that we prize privacy and that we fear that information will be used to harm us. On the other hand, we value the benefits that come from improved communication among providers, such as having our visits covered by third party payers and advances in medical science, which often …


Lost In Translation? Data Mining, National Security And The Adverse Inference Problem, Anita Ramasastry Jan 2006

Lost In Translation? Data Mining, National Security And The Adverse Inference Problem, Anita Ramasastry

Articles

To the extent that we permit data mining programs to proceed, they must provide adequate due process and redress mechanisms that permit individuals to clear their names. A crucial criteria for such a mechanism is to allow access to information that was used to make adverse assessments so that errors may be corrected. While some information may have to be kept secret for national security purposes, a degree of transparency is needed when individuals are trying to protect their right to travel or access government services free from suspicion.

Part II of this essay briefly outlines the government's ability to …


A Feeling Of Unease About Privacy Law, Ann Bartow Jan 2006

A Feeling Of Unease About Privacy Law, Ann Bartow

Law Faculty Scholarship

This essay responds to Daniel Solove's recent article, A Taxonomy of Privacy. I have read many of Daniel Solove's privacy-related writings, and he has made many important scholarly contributions to the field. As with his previous works about privacy and the law, it is an interesting and substantive piece of work. Where it falls short, in my estimation, is in failing to label and categorize the very real harms of privacy invasions in an adequately compelling manner. Most commentators agree that compromising a person's privacy will chill certain behaviors and change others, but a powerful list of the reasons why …


Privacy For The Working Class: Public Work And Private Lives, Michael Selmi Jan 2006

Privacy For The Working Class: Public Work And Private Lives, Michael Selmi

GW Law Faculty Publications & Other Works

Privacy has become the law's chameleon, simultaneously everywhere and nowhere. This is particularly true of the workplace where employees often seek some private space but where the law, particularly the formidable employment-at-will rule, typically frustrates that search. As the workplace has expanded both in its scope and importance, additional concerns have been raised about an employer's potential reach outside of the workplace. In this symposium contribution, I explore the privacy issue by asking a fundamental question: what do employees deserve? My answer is that, as a matter of policy, we ought to concede privacy issues as the employer's domain at …


Family, Naomi R. Cahn Jan 2006

Family, Naomi R. Cahn

GW Law Faculty Publications & Other Works

Based on contemporary privacy law, this entry discusses two different aspects of family privacy: (1) the marital relationship and (2) the parent-child relationship. Marital privacy protects several aspects of married life. The first form of marital privacy protects the very decision of whom to marry. While state laws generally establish who may marry whom, the Supreme Court has established the quasi-fundamental nature of the right to marry. The second form of marital privacy involves the right to relational privacy. This constitutionally developed right to marital privacy protects the relationship from undue interference, particularly in the context of sexual decision-making.

There …


"Can You Hear Me Now?": Expectations Of Privacy, False Friends, And The Perils Of Speaking Under The Supreme Court's Fourth Amendment Jurisprudence, Donald L. Doernberg Jan 2006

"Can You Hear Me Now?": Expectations Of Privacy, False Friends, And The Perils Of Speaking Under The Supreme Court's Fourth Amendment Jurisprudence, Donald L. Doernberg

Elisabeth Haub School of Law Faculty Publications

Part I of this article offers a brief history of the development of Fourth Amendment jurisprudence and the Court's articulation and application of what has come to be known as the exclusionary rule, which forbids some (but not all) government use of evidence seized in violation of the Fourth Amendment. Part II focuses on the false-friend cases, elaborating the Court's reasoning and showing why, although the most famous cases involve varying kinds of activity from electronic recording to eavesdropping to simple reporting of the false friend's observation, the Court's method has united these cases under a single analytical rubric. Part …


Privacy Goes To The Dogs, Steve Coughlan Jan 2006

Privacy Goes To The Dogs, Steve Coughlan

Articles, Book Chapters, & Popular Press

It becomes increasingly clear, with the decision of the Newfoundland Court of Appeal in R. v. Taylor, ante, that the question of whether police use of sniffer dogs constitutes a search, and if so when, will need to be addressed by the Supreme Court of Canada. In particular the question of whether R. v. Tessling has changed the approach to reasonable expectation of privacy as dramatically as some courts have suggested must be settled. Other questions will also need to be addressed.


Twenty-First Century Pillow-Talk: Applicability Of The Marital Communications Privilege To Electronic Mail, Mikah K. Thompson Jan 2006

Twenty-First Century Pillow-Talk: Applicability Of The Marital Communications Privilege To Electronic Mail, Mikah K. Thompson

Faculty Works

The marital privilege has two parts: the testimonial privilege and the communications privilege. Originally, the testimonial privilege prevented one spouse from testifying against another. According to the United States Supreme Court, spousal disqualification sprang from two canons of medieval jurisprudence: first, the rule that an accused was not permitted to testify in his own behalf because of his interest in the proceeding; second, the concept that husband and wife were one, and that since the woman had no recognized separate legal existence, the husband was that one. Thus, if a husband were not permitted to testify, then his wife, as …


A Taxonomy Of Privacy, Daniel J. Solove Jan 2006

A Taxonomy Of Privacy, Daniel J. Solove

GW Law Faculty Publications & Other Works

Privacy is a concept in disarray. Nobody can articulate what it means. As one commentator has observed, privacy suffers from an embarrassment of meanings. Privacy is far too vague a concept to guide adjudication and lawmaking, as abstract incantations of the importance of privacy do not fare well when pitted against more concretely-stated countervailing interests.

In 1960, the famous torts scholar William Prosser attempted to make sense of the landscape of privacy law by identifying four different interests. But Prosser focused only on tort law, and the law of information privacy is significantly more vast and complex, extending to Fourth …


A Brief History Of Information Privacy Law, Daniel J. Solove Jan 2006

A Brief History Of Information Privacy Law, Daniel J. Solove

GW Law Faculty Publications & Other Works

This book chapter provides a brief history of information privacy law in the United States from colonial times to the present. It discusses the development of the common law torts, Fourth Amendment law, the constitutional right to information privacy, numerous federal statutes pertaining to privacy, electronic surveillance laws, and more. It explores how the law has emerged and changed in response to new technologies that have increased the collection, dissemination, and use of personal information.


A Tale Of Two Bloggers: Free Speech And Privacy In The Blogosphere, Daniel J. Solove Jan 2006

A Tale Of Two Bloggers: Free Speech And Privacy In The Blogosphere, Daniel J. Solove

GW Law Faculty Publications & Other Works

This short essay was written for the symposium, Bloggership: How Blogs are Transforming Legal Scholarship, held at Harvard Law School on April 27-28, 2006. In this essay, Professor Solove examines Glenn Reynold's new book, An Army of Davids, which champions little guy bloggers (the Davids) who are taking on mainstream media entities (the Goliaths).

Who exactly is David? We have a rather romantic conception of bloggers; we envision Eugene Volokh, but most bloggers are probably more akin to Jessica Cutler, the U.S. Senate staffer who blogged about sex gossip. The average blogger is a teenager writing an online diary, not …


Privacy Issues Affecting Employers, Employees, And Labor Organizations, Charles B. Craver Jan 2006

Privacy Issues Affecting Employers, Employees, And Labor Organizations, Charles B. Craver

GW Law Faculty Publications & Other Works

Privacy issues arise regularly in employment environments. Employers frequently assert privacy rights when denying non-employee union organizers access to employment premises and limiting the distribution of union literature or the solicitation of authorization cards by current employees. On the other hand, when employers desire to monitor employee computer usage on firm computers to be sure they are not accessing inappropriate sites or engaging in other inappropriate electronic behavior, they give short shrift to employee privacy claims. When employer premises are open to the general public, non-employee access to external areas such as parking lots might provide an appropriate accommodation between …


User Choices And Regret: Understanding Users' Decision Process About Consensually Acquired Spyware, Nathaniel Good, Jens Grossklags, David Thaw, Aaron K. Perzanowski, Deirdre K. Mulligan, Joseph Konstan Jan 2006

User Choices And Regret: Understanding Users' Decision Process About Consensually Acquired Spyware, Nathaniel Good, Jens Grossklags, David Thaw, Aaron K. Perzanowski, Deirdre K. Mulligan, Joseph Konstan

Faculty Publications

Spyware is software which monitors user actions, gathers personal data, and/or displays advertisements to users. While some spyware is installed surreptitiously, a surprising amount is installed on users’ computers with their active participation. In some cases, users agree to accept spyware as part of a software bundle as a cost associated with gaining functionality they desire. In many other cases, however, users are unaware that they installed spyware, or of the consequences of that installation. This lack of awareness occurs even when the functioning of the spyware is explicitly declared in the end user license agreement (EULA). We argue and …


Untangling The Privacy Paradox In Arbitration, Amy J. Schmitz Jan 2006

Untangling The Privacy Paradox In Arbitration, Amy J. Schmitz

Faculty Publications

Arbitration is private but not secret. This truism regarding arbitration seems contradictory and nonsensical. However, common understandings of privacy in arbitration often lull individuals into assuming personal information revealed in arbitration may not become public. They assume privacy and confidentiality are synonymous. The reality is that arbitration is private but not necessarily confidential, or secret. This is the privacy paradox: it defies common conceptions of arbitration's secrecy, but is nonetheless true. This paradox is problematic because it leads to shortsighted contracting and simplistic assumptions about arbitral justice. Moreover, it may foster injustice when repeat players unduly benefit from unpublished awards …


Anglo-American Privacy And Surveillance, Laura K. Donohue Jan 2006

Anglo-American Privacy And Surveillance, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

The United States’ Terrorism Surveillance Program represents just one of many expansions in surveillance since 9/11, as legal controls previously introduced to protect citizens’ privacy and to prevent the misuse of surveillance powers have been relaxed. What makes the situation qualitatively different now is not just the lowering of the bar: digitization and the rapid advancement of technology mean that the type and volume of information currently available eclipse that of previous generations. The issue is not confined to the United States. Despite the incorporation of the European Convention of Human Rights into British law, the United Kingdom also appears …


A Model Regime Of Privacy Protection, Daniel J. Solove Jan 2006

A Model Regime Of Privacy Protection, Daniel J. Solove

GW Law Faculty Publications & Other Works

A series of major security breaches at companies with sensitive personal information has sparked significant attention to the problems with privacy protection in the United States. Currently, the privacy protections in the United States are riddled with gaps and weak spots. Although most industrialized nations have comprehensive data protection laws, the United States has maintained a sectoral approach where certain industries are covered and others are not. In particular, emerging companies known as "commercial data brokers" have frequently slipped through the cracks of U.S. privacy law. In this article, the authors propose a Model Privacy Regime to address the problems …


Dna Testing, Banking, And Genetic Privacy, George J. Annas Jan 2006

Dna Testing, Banking, And Genetic Privacy, George J. Annas

Faculty Scholarship

"Who am I?” has always been a fundamental philosophical question that may require decades of reflection to answer. With the advent of DNA analysis, there is a growing public impression that the answer may be found in our genes. Various Internet sites offer descriptions of our ancestral history on the basis of our DNA, as well as testing for specific “disease genes” or general profiles that are used to recommend lifestyle changes, such as foods to be eaten or avoided. Researchers have even suggested that although the scientific evidence is speculative and at best probabilistic, many people will want to …


Three Theories Of Substantive Due Process, Daniel O. Conkle Jan 2006

Three Theories Of Substantive Due Process, Daniel O. Conkle

Articles by Maurer Faculty

Substantive due process is in serious disarray, with the Supreme Court simultaneously embracing two, and perhaps three, competing and inconsistent theories of decisionmaking. The first two theories, historical tradition and reasoned judgment, have explicit and continuing support in the Court's decisions. Under the theory of historical tradition, substantive due process affords presumptive constitutional protection only to liberties that are "deeply rooted in this Nation's history and tradition." By contrast, the theory of reasoned judgment is far more expansive, permitting the Court to identify rights independently, through a process that amounts to philosophical analysis or political-moral reasoning. The third theory, evolving …