Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

Privacy

2010

Discipline
Institution
Publication

Articles 1 - 28 of 28

Full-Text Articles in Law

Location-Based Services: Time For A Privacy Check-In, Chris Conley, Nicole Ozer, Hari O'Connell, Ellen Ginsburg, Tamar Gubins Nov 2010

Location-Based Services: Time For A Privacy Check-In, Chris Conley, Nicole Ozer, Hari O'Connell, Ellen Ginsburg, Tamar Gubins

Faculty Scholarship

Need to get directions when you are lost? Want to know if your friends are in the neighborhood? Location-based services – applications and websites that provide services based on your current location – can put this information and more in the palm of your hand.

But outdated privacy laws and varying corporate practices could mean that sensitive information about who you are, where you go, what you do, and who you know end up being shared, sold, or turned over to the government.

Can location-based services protect your privacy? Do they? And what can we do to improve the situation? …


Free Speech And The Myth Of The Internet As An Unintermediated Experience, Christopher S. Yoo Sep 2010

Free Speech And The Myth Of The Internet As An Unintermediated Experience, Christopher S. Yoo

All Faculty Scholarship

In recent years, a growing number of commentators have raised concerns that the decisions made by Internet intermediaries — including last-mile network providers, search engines, social networking sites, and smartphones — are inhibiting free speech and have called for restrictions on their ability to prioritize or exclude content. Such calls ignore the fact that when mass communications are involved, intermediation helps end users to protect themselves from unwanted content and allows them to sift through the avalanche of desired content that grows ever larger every day. Intermediation also helps solve a number of classic economic problems associated with the Internet. …


Enforcing Intellectual Property Rights By Diminishing Privacy: How The Anti-Counterfeiting Trade Agreement Jeopardizes The Right To Privacy, Alberto Cerda Silva Sep 2010

Enforcing Intellectual Property Rights By Diminishing Privacy: How The Anti-Counterfeiting Trade Agreement Jeopardizes The Right To Privacy, Alberto Cerda Silva

Joint PIJIP/TLS Research Paper Series

Enforcing the law in the digital environment is one of the main challenges of the Anti-Counterfeiting Trade Agreement (ACTA). In order to enforce the intellectual property law, unlike previous international agreements on the matter, ACTA attempts to set forth provisions concerned with privacy and personal data. Special provisions refer to law enforcement in the digital environment; ACTA would require the adoption of domestic law to allow identifying supposed infringers and, consequently, the collaboration of the online service providers (OSPs) with rights holders. However, those provisions raise some human rights concerns, particularly as related to the right to privacy of Internet …


Stepping Out Of The Vehicle: The Potential Of Arizona V. Gant To End Automatic Searches Incident To Arrest Beyond The Vehicular Context, Angad Singh Aug 2010

Stepping Out Of The Vehicle: The Potential Of Arizona V. Gant To End Automatic Searches Incident To Arrest Beyond The Vehicular Context, Angad Singh

Articles in Law Reviews & Journals

“Because the law says we can do it” was the response Officer Griffith offered when asked why officers searched Rodney Gant’s car when he was arrested for driving with a suspended license. Officer Griffith’s honest answer exemplifies the effect of prior Supreme Court decisions on search incident to arrest power in the vehicle context: that a vehicle search incident to arrest is a police entitlement divorced from any rationale whatsoever. Concerns for officer safety and preservation of evidence -- legal justifications that generally permit warrantless searches incident to arrest generally -- had been utterly abandoned by the Court in the …


The Story Of Us: Resolving The Face-Off Between Autobiographical Speech And Information Privacy, Sonja R. West Jul 2010

The Story Of Us: Resolving The Face-Off Between Autobiographical Speech And Information Privacy, Sonja R. West

Scholarly Works

Increasingly more “ordinary” Americans are choosing to share their life experiences with a public audience. In doing so, however, they are revealing more than their own personal stories, they are exposing private information about others as well. The face-off between autobiographical speech and information privacy is coming to a head, and our legal system is not prepared to handle it.

In a prior article, I established that autobiographical speech is a unique and important category of speech that is at risk of being undervalued under current law. This article builds on my earlier work by addressing the emerging conflict between …


The Anatomy Of A Search: Intrusiveness And The Fourth Amendment, Renee Mcdonald Hutchins May 2010

The Anatomy Of A Search: Intrusiveness And The Fourth Amendment, Renee Mcdonald Hutchins

Journal Articles

For more than two months beginning in late December of 2005, police officers in New York State continuously monitored the location and movements of Scott Weaver's van using a surreptitiously attached global positioning system ("GPS") device, known as a "Qball."' The reason Weaver was targeted for police surveillance has never been disclosed. 2 In addition, law enforcement made no attempt to justify the heightened scrutiny of Weaver by seeking the pre-authorization of a warrant from a neutral magistrate.3 Rather, for sixty-five days, the police subjected Weaver to intense surveillance without oversight, interruption, or explanation. 4 More than a year after …


Undermined Norms: The Corrosive Effect Of Information Processing Technology On Informational Privacy, Richard Warner Mar 2010

Undermined Norms: The Corrosive Effect Of Information Processing Technology On Informational Privacy, Richard Warner

All Faculty Scholarship

Informational privacy is a matter of control; it consists in the ability to control when one’s personal information is collected, how it is used, and to whom it is distributed. The degree of control we once enjoyed has vanished. Advances in information processing technology now give others considerable power to determine when personal information is collected, how it is used, and to it is whom distributed. Privacy advocates sound the alarm in regard to both the governmental and private sectors. I focus exclusively on the later. Relying on the extensive privacy advocate literature, I assume we should try to regain …


Liberating Copyright: Thinking Beyond Free Speech, Jennifer E. Rothman Mar 2010

Liberating Copyright: Thinking Beyond Free Speech, Jennifer E. Rothman

All Faculty Scholarship

Scholars have often turned to the First Amendment to limit the scope of ever-expanding copyright law. This approach has mostly failed to convince courts that independent review is merited and has offered little to individuals engaged in personal rather than political or cultural expression. In this Article, I consider the value of an alternative paradigm using the lens of substantive due process and liberty to evaluate users’ rights. A liberty-based approach uses this other developed body of constitutional law to demarcate justifiable personal, identity-based uses of copyrighted works. Uses that are essential for mental integrity, intimacy promotion, communication, or religious …


Stories Told And Untold: Confidentiality Laws And The Master Narrative Of Child Welfare, Matthew I. Fraidin Jan 2010

Stories Told And Untold: Confidentiality Laws And The Master Narrative Of Child Welfare, Matthew I. Fraidin

Journal Articles

In most states, child welfare hearings and records are sealed or confidential. This means that by law, court hearings and records may not be observed. The same laws and court rules also preclude those who are authorized to enter and watch from discussing anything learned or observed in a closed courtroom or from a sealed court record with anyone not involved in the case. It is the restriction on speech—on telling stories about child welfare—with which this Article is concerned. I will argue in this Article that the insights of narrative theory and agenda-setting studies help us understand the damaging …


Employing E-Health: The Impact Of Electronic Health Records On The Workplace, Sharona Hoffman Jan 2010

Employing E-Health: The Impact Of Electronic Health Records On The Workplace, Sharona Hoffman

Faculty Publications

Electronic Health Record (HER) systems may soon become a fixture in most medical settings. President Obama’s 29 stimulus legislation includes $19 billion to promote their implementation. The sophisticated features and efficiencies of HER systems have the potential to improve health outcomes and enhance patient welfare considerably. However, this emerging technology also poses significant challenges and risks, not the least of which are its workplace impacts. This article provides a first of its kind analysis of the ramifications of HER systems for workers and employers.

The potential effects of health information computerization on the workplace are numerous. Employers may obtain and …


Regulating Offensiveness: Snyder V. Phelps, Emotion, And The First Amendment, Christina E. Wells Jan 2010

Regulating Offensiveness: Snyder V. Phelps, Emotion, And The First Amendment, Christina E. Wells

Faculty Publications

In its upcoming term, the Court will decide in Snyder v. Phelps whether Albert Snyder can sue the Reverend Fred Phelps and other members of the Westboro Baptist Church for invasion of privacy and intentional infliction of emotional distress for protesting near his son’s funeral. Those arguing in favor of tort liability claim that the Phelps’ speech during a time of mourning and vulnerability is especially outrageous and injurious and that the First Amendment allows such regulation. Their arguments, however, effectively rely on the offensiveness of the Phelps’ message rather than on any external indicia of harm, such as noisy …


Legal Implications Of The Use Of Social Media: Minimizing The Legal Risks For Employers And Employees, Damian R. Laplaca, Noah Winkeller Jan 2010

Legal Implications Of The Use Of Social Media: Minimizing The Legal Risks For Employers And Employees, Damian R. Laplaca, Noah Winkeller

Proxy

No abstract provided.


Beyond Innovation And Competition: The Need For Qualified Transparency In Internet Intermediaries, Frank Pasquale Jan 2010

Beyond Innovation And Competition: The Need For Qualified Transparency In Internet Intermediaries, Frank Pasquale

Faculty Scholarship

Internet service providers and search engines have mapped the web, accelerated e-commerce, and empowered new communities. They also pose new challenges for law. Individuals are rapidly losing the ability to affect their own image on the web - or even to know what data are presented about them. When web users attempt to find information or entertainment, they have little assurance that a carrier or search engine is not biasing the presentation of results in accordance with its own commercial interests.

Technology’s impact on privacy and democratic culture needs to be at the center of internet policy-making. Yet before they …


Richmond Medical Center For Women V. Herring: Prohibiting Partial Birth Abortion But Keeping Constitutional Rights Intact, Kathleen Morris Jan 2010

Richmond Medical Center For Women V. Herring: Prohibiting Partial Birth Abortion But Keeping Constitutional Rights Intact, Kathleen Morris

Maryland Law Review Online

No abstract provided.


Race, Sex And Genes At Work: Uncovering The Lessons Of Norman-Bloodsaw, Elizabeth Pendo Jan 2010

Race, Sex And Genes At Work: Uncovering The Lessons Of Norman-Bloodsaw, Elizabeth Pendo

All Faculty Scholarship

The Genetic Information Nondiscrimination Act of 2008 (“GINA”) is the first federal, uniform protection against the use of genetic information in both the workplace and health insurance. Signed into law on May 21, 2008, GINA prohibits an employer or health insurer from acquiring or using an individual’s genetic information, with some exceptions. One of the goals of GINA is to eradicate actual, or perceived, discrimination based on genetic information in the workplace and in health insurance. Although the threat of genetic discrimination is often discussed in universal terms - as something that could happen to any of us - the …


A Fourth Amendment For The Poor Alone: Subconstitutional Status And The Myth Of The Inviolate Home, Jordan C. Budd Jan 2010

A Fourth Amendment For The Poor Alone: Subconstitutional Status And The Myth Of The Inviolate Home, Jordan C. Budd

Law Faculty Scholarship

For much of our nation’s history, the poor have faced pervasive discrimination in the exercise of fundamental rights. Nowhere has the impairment been more severe than in the area of privacy. This Article considers the enduring legacy of this tradition with respect to the Fourth Amendment right to domestic privacy. Far from a matter of receding historical interest, the diminution of the poor’s right to privacy has accelerated in recent years and now represents a powerful theme within the jurisprudence of poverty. Triggering this development has been a series of challenges to aggressive administrative practices adopted by localities in the …


The Death Of The Public Disclosure Tort: A Historical Perspective, Samantha Barbas Jan 2010

The Death Of The Public Disclosure Tort: A Historical Perspective, Samantha Barbas

Journal Articles

In 1890, Samuel Warren and Louis Brandeis, in their famous Harvard Law Review article The Right to Privacy, called for a new legal right that would allow the victims of truthful but embarrassing press publicity to recover damages for emotional harm. Currently, in most states, it constitutes a tort if the disclosure of “matter concerning the private life of another” would be highly offensive to a reasonable person and the matter is not “of legitimate concern to the public,” or newsworthy. However, because courts generally consider virtually everything that appears in the news media to be newsworthy, the public disclosure …


Taxation, Pregnancy, And Privacy, Bridget J. Crawford Jan 2010

Taxation, Pregnancy, And Privacy, Bridget J. Crawford

Elisabeth Haub School of Law Faculty Publications

This Article frames a discussion of surrogacy within the context of existing income tax laws. A surrogate receives money for carrying and bearing a child. This payment is income by any definition, even if the surrogacy contract recites that it is a "reimbursement." Cases and rulings on the income tax consequences of the sale of blood and human breast milk, as well as analogies to situations in which people are paid to wear advertising on their bodies, support the conclusion that a surrogate recognizes taxable income, although the Internal Revenue Service has never stated so. For tax purposes, the reproductive …


Using Protection Of Privacy Legislation To Erode Privacy: R. V. Chehil, Steve Coughlan Jan 2010

Using Protection Of Privacy Legislation To Erode Privacy: R. V. Chehil, Steve Coughlan

Articles, Book Chapters, & Popular Press

The Nova Scotia Court of Appeal here in R. v. Chehil overturns the trial judge's conclusion that the accused had a reasonable expectation of privacy in the information the police obtained from the computer manifest. With respect, their application of the totality of the circumstances test is subject to question at several important points. For example, in assessing the objective reasonableness of an expectation of privacy, the Court of Appeal relies on the fact that the Westjet website informs customers that "information will be disclosed to the authorities without your knowledge and consent as required by law." The court then …


Dangerous Terrain: Mapping The Female Body In Gonzales V. Carhart, B. Jessie Hill Jan 2010

Dangerous Terrain: Mapping The Female Body In Gonzales V. Carhart, B. Jessie Hill

Faculty Publications

The body occupies an ambiguous position within the law. It is, in one sense, the quintessential object of state regulatory and police power, the object that the state acts both upon and for. At the same time, the body is often constructed in legal discourse as the site of personhood - our most intimate, sacred, and inviolate possession. The inherent tension between these two concepts of the body permeates the law, but it is perhaps nowhere more prominent than in the constitutional doctrine pertaining to abortion. Abortion is one of the most heavily regulated medical procedures in the United States, …


Protecting Privacy In Health Research: The Limits Of Individual Choice, Fred H. Cate Jan 2010

Protecting Privacy In Health Research: The Limits Of Individual Choice, Fred H. Cate

Articles by Maurer Faculty

No abstract provided.


Substitution Effects: A Problematic Justification For The Third-Party Doctrine Of The Fourth Amendment, Blake Ellis Reid Jan 2010

Substitution Effects: A Problematic Justification For The Third-Party Doctrine Of The Fourth Amendment, Blake Ellis Reid

Publications

In the past half-century, the Supreme Court has crafted a vein of jurisprudence virtually eliminating Fourth Amendment protection in information turned over to third parties - regardless of any subjective expectation of privacy or confidentiality in the information on the part of the revealer. This so-called “third-party” doctrine of the Fourth Amendment has become increasingly controversial in light of the growing societal reliance on the Internet in the United States, where nearly every transaction requires a user to turn information over to at least one third party: the Internet service provider (“ISP”).

Citing the scholarship that has criticized the third-party …


Mapping Online Privacy, Jacqueline D. Lipton Jan 2010

Mapping Online Privacy, Jacqueline D. Lipton

Articles

Privacy scholars have recently outlined difficulties in applying existing concepts of personal privacy to the maturing Internet. With Web 2.0 technologies, more people have more opportunities to post information about themselves and others online, often with scant regard for individual privacy. Shifting notions of 'reasonable expectations of privacy' in the context of blogs, wikis, and online social networks create challenges for privacy regulation. Courts and commentators struggle with Web 2.0 privacy incursions without the benefit of a clear regulatory framework. This article offers a map of privacy that might help delineate at least the outer boundaries of Web 2.0 privacy. …


12th Annual Open Government Summit: Access To Public Records Act & Open Meetings Act, 2010, Department Of Attorney General, State Of Rhode Island Jan 2010

12th Annual Open Government Summit: Access To Public Records Act & Open Meetings Act, 2010, Department Of Attorney General, State Of Rhode Island

School of Law Conferences, Lectures & Events

No abstract provided.


The Changing Patterns Of Internet Usage, Christopher S. Yoo Jan 2010

The Changing Patterns Of Internet Usage, Christopher S. Yoo

All Faculty Scholarship

The Internet unquestionably represents one of the most important technological developments in recent history. It has revolutionized the way people communicate with one another and obtain information and created an unimaginable variety of commercial and leisure activities. Interestingly, many members of the engineering community often observe that the current network is ill-suited to handle the demands that end users are placing on it. Indeed, engineering researchers often describe the network as ossified and impervious to significant architectural change. As a result, both the U.S. and the European Commission are sponsoring “clean slate” projects to study how the Internet might be …


Cloud Computing: Storm Warning For Privacy?, Nicole Ozer, Chris Conley Jan 2010

Cloud Computing: Storm Warning For Privacy?, Nicole Ozer, Chris Conley

Faculty Scholarship

“Cloud computing” - the ability to create, store, and manipulate data through Web-based services - is growing in popularity. Cloud computing itself may not transform society; for most consumers, it is simply an appealing alternative tool for creating and storing the same records and documents that people have created for years. However, outdated laws and varying corporate practices mean that documents created and stored in the cloud may not have the same protections as the same documents stored in a filing cabinet or on a home computer. Can cloud computing services protect the privacy of their consumers? Do they? And …


Privacy Is The Problem, Raymond Shih Ray Ku Jan 2010

Privacy Is The Problem, Raymond Shih Ray Ku

Faculty Publications

A local school district remotely activates laptop web cameras that allegedly record the activities of students, even in their bedrooms.1 The President authorizes the National Security Agency (NSA) to monitor the telephone calls and electronic communications of individuals within the United States on an unprecedented scale in the interest of national security.2 Even a cursory examination of the news suggests that the activities and communications of Americans are increasingly subject to government surveillance from every level of government. Whatever we may think about the necessity for this surveillance, we should question how such programs come into being; in other words, …


The So-Called Right To Privacy, Jamal Greene Jan 2010

The So-Called Right To Privacy, Jamal Greene

Faculty Scholarship

The constitutional right to privacy has been a conservative bugaboo ever since Justice Douglas introduced it into the United States Reports in Griswold v. Connecticut. Reference to the "so-called" right to privacy has become code for the view that the right is doctrinally recognized but not in fact constitutionally enshrined. This Article argues that the constitutional right to privacy is no more. The two rights most associated historically with the right to privacy are abortion and intimate sexual conduct, yet Gonzales v. Carhart and Lawrence v. Texas made clear that neither of these rights is presently justified by its …