Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Privacy Law (16)
- Internet Law (9)
- Science and Technology Law (8)
- Communications Law (7)
- Constitutional Law (7)
-
- Computer Law (6)
- First Amendment (6)
- Social and Behavioral Sciences (5)
- Law and Society (4)
- Communication (3)
- Fourth Amendment (3)
- Intellectual Property Law (3)
- International Law (3)
- Jurisprudence (3)
- Labor and Employment Law (3)
- Library and Information Science (3)
- Commercial Law (2)
- Communication Technology and New Media (2)
- Consumer Protection Law (2)
- Contracts (2)
- Environmental Law (2)
- Family Law (2)
- Law Librarianship (2)
- Law and Economics (2)
- Law and Politics (2)
- National Security Law (2)
- State and Local Government Law (2)
- Torts (2)
- Administrative Law (1)
- Institution
-
- Georgetown University Law Center (3)
- Pace University (3)
- University of Colorado Law School (3)
- University of Florida Levin College of Law (3)
- Chicago-Kent College of Law (2)
-
- Cleveland State University (2)
- Schulich School of Law, Dalhousie University (2)
- University at Buffalo School of Law (2)
- University of Baltimore Law (2)
- University of Pennsylvania Carey Law School (2)
- Boston University School of Law (1)
- Case Western Reserve University School of Law (1)
- Florida A&M University College of Law (1)
- Maurer School of Law: Indiana University (1)
- Roger Williams University (1)
- Santa Clara Law (1)
- The Catholic University of America, Columbus School of Law (1)
- University of Maryland Francis King Carey School of Law (1)
- University of Massachusetts School of Law (1)
- University of Miami Law School (1)
- University of Michigan Law School (1)
- University of New Hampshire (1)
- University of Tennessee College of Law (1)
- Washington and Lee University School of Law (1)
- Western University (1)
- William & Mary Law School (1)
- Publication
-
- All Faculty Scholarship (6)
- Elisabeth Haub School of Law Faculty Publications (3)
- Faculty Publications (3)
- Georgetown Law Faculty Publications and Other Works (3)
- Publications (3)
-
- UF Law Faculty Publications (3)
- Articles, Book Chapters, & Popular Press (2)
- Faculty Scholarship (2)
- Journal Articles (2)
- Law Faculty Articles and Essays (2)
- Scholarly Articles (2)
- Articles (1)
- Articles by Maurer Faculty (1)
- College of Law Faculty Scholarship (1)
- FIMS Presentations (1)
- Journal Publications (1)
- Law Faculty Scholarship (1)
- Library Staff Publications (1)
- School of Law Conferences, Lectures & Events (1)
- Short Works (1)
Articles 1 - 30 of 40
Full-Text Articles in Law
Drone Federalism: Civilian Drones And The Things They Carry, Margot E. Kaminski
Drone Federalism: Civilian Drones And The Things They Carry, Margot E. Kaminski
Publications
Civilian drones are scheduled to be permitted in the national airspace as early as 2015. Many think Congress should establish the necessary nationwide regulations to govern both law enforcement and civilian drone use. That thinking, however, is wrong. This Essay suggests drone federalism instead: a state-based approach to privacy regulation that governs drone use by civilians, drawing on states’ experience regulating other forms of civilian-on-civilian surveillance. This approach will allow necessary experimentation in how to best balance privacy concerns against First Amendment rights in the imminent era of drone-use democratization. This Essay closes by providing some guidance to states as …
The Irony Of Privacy Class Action Litigation, Eric Goldman
The Irony Of Privacy Class Action Litigation, Eric Goldman
Faculty Publications
In the past few years, publicized privacy violations have regularly spawned class action lawsuits in the United States, even when the company made a good faith mistake and no victim suffered any quantifiable harm. Privacy advocates often cheer these lawsuits because they generally favor vigorous enforcement of privacy violations, but this essay encourages privacy advocates to reconsider their support for privacy class action litigation. By its nature, class action litigation uses tactics that privacy advocates disavow. Thus, using class action litigation to remediate privacy violations proves to be unintentionally ironic.
To Drink The Cup Of Fury: Funeral Picketing, Public Discourse And The First Amendment, Steven J. Heyman
To Drink The Cup Of Fury: Funeral Picketing, Public Discourse And The First Amendment, Steven J. Heyman
All Faculty Scholarship
In Snyder v. Phelps, the Supreme Court held that the Westboro Baptist Church had a First Amendment right to picket the funeral of a young soldier killed in Iraq. This decision reinforces a position that has become increasingly prevalent in First Amendment jurisprudence – the view that the state may not regulate public discourse to protect individuals from emotional or dignitary injury. In this Article, I argue that this view is deeply problematic for two reasons: it unduly sacrifices the value of individual personality and it tends to undermine the sphere of public discourse itself by negating the practical and …
The Inalienable Right Of Publicity, Jennifer E. Rothman
The Inalienable Right Of Publicity, Jennifer E. Rothman
All Faculty Scholarship
This article challenges the conventional wisdom that the right of publicity is universally and uncontroversially alienable. Courts and scholars have routinely described the right as a freely transferable property right, akin to patents or copyrights. Despite such broad claims of unfettered alienability, courts have limited the transferability of publicity rights in a variety of instances. No one has developed a robust account of why such limits should exist or what their contours should be. This article remedies this omission and concludes that the right of publicity must have significantly limited alienability to protect the rights of individuals to control the …
Who's In Charge Here? Information Privacy In A Social Networking World, Lisa Di Valentino
Who's In Charge Here? Information Privacy In A Social Networking World, Lisa Di Valentino
FIMS Presentations
No abstract provided.
The Benefit Of Adopting Comprehensive Standards Of Monitoring Employee Technology Use In The Workplace, Karin M. Mika
The Benefit Of Adopting Comprehensive Standards Of Monitoring Employee Technology Use In The Workplace, Karin M. Mika
Law Faculty Articles and Essays
This article will examine issues as they relate to the privacy of employees’ lives given that nearly everything can be discovered by some form of electronic monitoring. It will posit that most laws as they exist today do little to apprise either the employer or the employee as to what type of electronic monitoring of personal communications is acceptable. It will further propose that most employer policies related to scrutinizing employee electronic communications are vague and unsuitable. The article will conclude that, given the leeway employers tend to be given (often justifiably so) in monitoring employees there is little chance …
Access For All: A Review Of “Law Libraries, Government Transparency, And The Internet,” A Presentation By Daniel Schuman Of The Sunlight Foundation At The All-Sis Meeting, July 22, 2012, Susan David Demaine
Access For All: A Review Of “Law Libraries, Government Transparency, And The Internet,” A Presentation By Daniel Schuman Of The Sunlight Foundation At The All-Sis Meeting, July 22, 2012, Susan David Demaine
Articles by Maurer Faculty
Attendees at the ALL-SIS Breakfast and Business Meeting at the AALL Annual Meeting had the pleasure of hearing from Daniel Schuman of the Sunlight Foundation speak on “Law Libraries, Government Transparency, and the Internet.” The Sunlight Foundation is a nonpartisan, nonprofit organization whose mission is to increase access to federal government information resources through advocacy and the development of information technology tools.
Agricultural Secrecy: Going Dark Down On The Farm: How Legalized Secrecy Gives Agribusiness A Federally Funded Free Ride, Rena I. Steinzor, Yee Huang
Agricultural Secrecy: Going Dark Down On The Farm: How Legalized Secrecy Gives Agribusiness A Federally Funded Free Ride, Rena I. Steinzor, Yee Huang
Faculty Scholarship
This briefing paper examines the agricultural secrecy granted by section 1619 of the 2008 Farm Bill, its implications for transparency and oversight, and its impact on other federal agencies such as the U.S. Environmental Protection Agency (EPA). In an era of fiscal responsibility, tight budgets, and increasing pressure on the environment, the public has a right to know whether the U.S. Department of Agriculture (USDA) is making the best decisions about how to allocate public funds.
Each year, agricultural producers in the United States receive billions of dollars in federal payments: crop subsidies, crop insurance, conservation payments, disaster payments, loans, …
14th Annual Open Government Summit: Access To Public Records Act & Open Meetings Act, 2012, Department Of Attorney General, State Of Rhode Island
14th Annual Open Government Summit: Access To Public Records Act & Open Meetings Act, 2012, Department Of Attorney General, State Of Rhode Island
School of Law Conferences, Lectures & Events
No abstract provided.
The Class Differential In Privacy Law, Michele E. Gilman
The Class Differential In Privacy Law, Michele E. Gilman
All Faculty Scholarship
This article analyzes how privacy law fails the poor. Due to advanced technologies, all Americans are facing corporate and governmental surveillance. However, privacy law is focused on middle-class concerns about limiting the disclosure of personal data so that it is not misused. By contrast, along the welfare-to-work continuum, poor people face privacy intrusions at the time that the state or their employers gather data. This data collection tends to be stigmatizing and humiliating, and it thus not only compounds the harmful effects of living in poverty, but also dampens democratic participation by the poor. The poor interact with the government …
When Antitrust Met Facebook, Christopher S. Yoo
When Antitrust Met Facebook, Christopher S. Yoo
All Faculty Scholarship
Social networks are among the hottest phenomena on the Internet. Facebook eclipsed Google as the most visited website in both 2010 and 2011. Moreover, according to Nielsen estimates, as of the end of 2011 the average American spent nearly seven hours per month on Facebook, which is more time than they spent on Google, Yahoo!, YouTube, Microsoft, and Wikipedia combined. LinkedIn’s May 19, 2011 initial public offering (“IPO”) surpassed expectations, placing the value of the company at nearly $9 billion, and approximately a year later, its stock price had risen another 20 percent. Facebook followed suit a year later with …
Confronting The Wizard Of Oz: National Security, Expertise, And Secrecy, David Cole
Confronting The Wizard Of Oz: National Security, Expertise, And Secrecy, David Cole
Georgetown Law Faculty Publications and Other Works
Aziz Rana’s account of the takeover of American national security by experts, and of the public’s acceptance of that state of affairs, offers an important and novel perspective on what ails us in national security today. In this Comment, I suggest that while Rana is correct to identify our deference to experts as a central aspect of the problem, the problem is more complicated. First, the phenomenon of elite control over foreign and security policy questions is not new, but likely dates back to the founding—when elites ruled not based on expertise but on the basis of status, class, and …
Privacy Rights: The Virtue Of Protecting A False Reputation, John A. Humbach
Privacy Rights: The Virtue Of Protecting A False Reputation, John A. Humbach
Elisabeth Haub School of Law Faculty Publications
What is the virtue of protecting a false reputation? The thesis of this paper is that there is none. There is none, at least, that justifies the suppression of free speech. Yet, there is a growing trend to see the protection of reputation from truth as a key function of the so-called “right of privacy.”
Unfortunately, people often do things that they are not proud of or do not want others to know about. Often, however, these are precisely the things that others want or need to know. For our own protection, each of us is better off being aware …
Keeping And Deleting Patron Records In Law Libraries, Benjamin J. Keele
Keeping And Deleting Patron Records In Law Libraries, Benjamin J. Keele
Library Staff Publications
No abstract provided.
Hard To Believe: The High Cost Of A Biometric Identity Card, A. Michael Froomkin, Jonathan Weinberg
Hard To Believe: The High Cost Of A Biometric Identity Card, A. Michael Froomkin, Jonathan Weinberg
Short Works
No abstract provided.
Privacy, Copyright, And Letters, Jeffrey L. Harrison
Privacy, Copyright, And Letters, Jeffrey L. Harrison
UF Law Faculty Publications
The focus of this Essay is the privacy of letters – the written manifestations of thoughts, intents, and the recollections of facts directed to a person or a narrowly defined audience. The importance of this privacy is captured in the novel Atonement by Ian McEwan and in the film based on the novel. The fulcrum from which the action springs is a letter that is read by someone to whom it was not addressed. The result is literally life-changing, even disastrous for a number of characters. One person dies, two people seemingly meant for each other are torn apart and …
The Laws Of Image, Samantha Barbas
The Laws Of Image, Samantha Barbas
Journal Articles
We live in an image society. Since the turn of the 20th century if not earlier, Americans have been awash in a sea of images throughout the visual landscape. We have become highly image-conscious, attuned to first impressions and surface appearances, and deeply concerned with our own personal images – our looks, reputations, and the impressions we make on others. The advent of this image-consciousness has been a familiar subject of commentary by social and cultural historians, yet its legal implications have not been explored. This article argues that one significant legal consequence of the image society was the evolution …
Behavioral Advertising: From One-Sided Chicken To Informational Norms, Richard Warner, Robert Sloan
Behavioral Advertising: From One-Sided Chicken To Informational Norms, Richard Warner, Robert Sloan
All Faculty Scholarship
When you download the free audio recording software from Audacity, you agree that Audacity may collect your information and use it to send you advertising. Billions of such pay-with-data exchanges feed information daily to a massive advertising ecosystem that tailors web site advertising as closely as possible to individual interests. The vast majority want considerably more control over our information. We nonetheless routinely enter pay-with-data exchanges when we visit CNN.com, use Gmail, or visit any of a vast number of other websites. Why? And, what, if anything, should we do about it? We answer both questions by describing pay-with-data exchanges …
Intimate Terrorism And Technology: There's An App For That, Justine A. Dunlap
Intimate Terrorism And Technology: There's An App For That, Justine A. Dunlap
Faculty Publications
Technology enhances the ability of the domestic violence perpetrator. It also holds the promise of assisting domestic violence survivors in their quest for safety. This is true in practical, daily ways and is becoming increasingly true in the legal treatment of these cases. Perpetrators can use technology to stalk and find their victims; survivors can use it to access necessary information to get away from their batterers. Laws are being amended to take into account cyber-enhanced domestic violence techniques. Domestic or intimate terrorists are among the class of criminals targeted for use of GPS monitoring. This article discusses the way …
Personal Environmental Information: The Promise And Perils Of The Emerging Capacity To Identify Individual Environmental Harms, Katrina Fischer Kuh
Personal Environmental Information: The Promise And Perils Of The Emerging Capacity To Identify Individual Environmental Harms, Katrina Fischer Kuh
Elisabeth Haub School of Law Faculty Publications
This Article begins from the premise that successful regulation of environmentally significant individual behaviors could achieve meaningful environmental benefits and argues that (1) technology is increasingly making information about individual environmental behaviors and associated harms more accessible; (2) better information about environmentally significant individual behaviors could substantially enhance fledgling efforts to regulate those behaviors; and (3) use of technology-enabled personal environmental information in support of regulation will require the resolution of myriad privacy concerns. The Article seeks to generate and inform a discussion about the appropriate balance between access to personal environmental information and privacy by identifying how regulation can …
"Do-Not-Track" As Contract, Joshua A.T. Fairfield
"Do-Not-Track" As Contract, Joshua A.T. Fairfield
Scholarly Articles
Support for enforcement of a do-not-track option in browsers has been gathering steam. Such an option presents a simple method for consumers to protect their privacy. The problem is how to enforce this choice. The Federal Trade Commission (FTC) could enforce a do-not-track option in a consumer browser under its section 5 powers. The FTC, however, currently appears to lack the political will to do so. Moreover, the FTC cannot follow the model of its successful do-not-call list since the majority of Internet service providers (ISPs) assign Internet addresses dynamically — telephone numbers do not change, whereas Internet protocol (IP) …
Big Brother Or Little Brother? Surrendering Seizure Privacy For The Benefits Of Communication Technology, José F. Anderson
Big Brother Or Little Brother? Surrendering Seizure Privacy For The Benefits Of Communication Technology, José F. Anderson
All Faculty Scholarship
Over two centuries have passed since Benjamin Franklin quipped that we should defend privacy over security if people wanted either privacy or security. Although his axiom did not become a rule of law in its original form, its principles found voice in the Fourth and Fifth Amendments of the Constitution's Bill of Rights. To a lesser extent, provisions against the quartering of troops in private homes found in the Third Amendment also support the idea that what a government can require you to do, or who you must have behind the doors of your home, is an area of grave …
The Sidis Case And The Origins Of Modern Privacy Law, Samantha Barbas
The Sidis Case And The Origins Of Modern Privacy Law, Samantha Barbas
Journal Articles
The American press, it’s been said, is freer to invade personal privacy than perhaps any other in the world. The tort law of privacy, as a shield against unwanted media exposure of private life, is very weak. The usual reason given for the weakness of U.S. privacy law as a bar on the publication of private information is the strong tradition of First Amendment freedom. But “freedom of the press” alone cannot explain why liberty to publish has been interpreted as a right to print truly intimate matters or to thrust people into the spotlight against their will. Especially in …
Privacy And The Right Of Free Expression, John A. Humbach
Privacy And The Right Of Free Expression, John A. Humbach
Elisabeth Haub School of Law Faculty Publications
Nobody likes to be talked about but everybody likes to talk. Trying to stop the dissemination of private information is, however, an impingement on free expression and the freedom to observe. A freestanding “right of privacy” that violates these interests is constitutionally permissible only if it can be justified using one of the standard bases for allowing restrictions on First Amendment rights. The three most likely possibilities are that the law in question: (1) can pass strict scrutiny, (2) fall within a recognized “categorical” exception, or (3) places only an “incidental” burden on First Amendment interests. Of these three, only …
Communications Disruption And Censorship Under International Law: History Lessons, Jonathon Penney
Communications Disruption And Censorship Under International Law: History Lessons, Jonathon Penney
Articles, Book Chapters, & Popular Press
With Internet censorship on the rise around the world, a variety of tools have proliferated to assist Internet users to circumvent such censorship. However, there are few studies examining the implications of censorship circumvention under international law, and its related politics. This paper aims to help fill some of that void, with an examination of case studies wherein global communications technologies have been disrupted or censored — telegram cable cutting and censorship, high frequency radio jamming, and direct broadcast satellite blocking — and how the world community responded to that disruption or censorship through international law and law making. In …
Indecent Exposure: Do Warrantless Searches Of Cell Phones Violate The Fourth Amendment?, Amy Vorenberg
Indecent Exposure: Do Warrantless Searches Of Cell Phones Violate The Fourth Amendment?, Amy Vorenberg
Law Faculty Scholarship
This article argues that searches of student’s cell phone should require a warrant in most circumstances. The amount and personal nature of information on a smart phone warrants special Fourth Amendment protection. This issue is particularly relevant in the public school setting where administrators routinely confiscate phones from students caught using them in school. With more frequency, administrators are looking at the phones, scrolling through text messages and photos, and on some occasions, responding to text messages.
The U.S. Supreme Court in Safford v. Redding, acknowledges the special considerations that school children should be afforded in part because of the …
Renegotiating The Social Contract, Jennifer S. Hendricks
Renegotiating The Social Contract, Jennifer S. Hendricks
Publications
This review of The Supportive State: Families, Government and America’s Political Ideals highlights Maxine Eichner’s important theoretical contributions to both liberal political theory and feminist theory, applauding her success in reforming liberalism to account for dependency, vulnerability, and families. The review then considers some implications of Eichner’s proposals and their likely reception among feminists. It concludes that The Supportive State is a sound and inspiring response to recent calls that feminist theory move from being strictly a school of criticism to developing a theory of governance.
Privacy, Copyright, And Letters, Jeffrey L. Harrison
Privacy, Copyright, And Letters, Jeffrey L. Harrison
UF Law Faculty Publications
The focus of this Essay is the privacy of letters – the written manifestations of thoughts, intents, and the recollections of facts directed to a person or a narrowly defined audience. The importance of this privacy is captured in the novel Atonement by Ian McEwan and in the film based on the novel. The fulcrum from which the action springs is a letter that is read by someone to whom it was not addressed. The result is literally life-changing, even disastrous for a number of characters. One person dies, two people seemingly meant for each other are torn apart and …
Executive Trade Secrets, Tom C.W. Lin
Executive Trade Secrets, Tom C.W. Lin
UF Law Faculty Publications
The law discriminates among a corporation’s secrets. In the eyes of the law, commercial secrets of corporations are legitimate secrets that deserve legal protection and nondisclosure, but personal secrets of executives are not as deserving of legal protection and nondisclosure. This divergent treatment of secrets has resulted in a legal landscape of perplexing, paradoxical paths for corporations and executives concerning executive disclosures — a precarious landscape that has left corporations and investors dangerously susceptible to revelations of private facts that shock market valuation and institutional stability.
This Article explores this divergent treatment of secrets in the context of public corporations …
Cybercrime, Ronald C. Griffin
Cybercrime, Ronald C. Griffin
Journal Publications
This essay recounts campaigns against privacy; the fortifications erected against them; and hi-jinx attributable to hackers, crackers, and miscreants under the Fair Credit Reporting Act.