Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

Privacy

2012

Discipline
Institution
Publication

Articles 31 - 40 of 40

Full-Text Articles in Law

Renegotiating The Social Contract, Jennifer S. Hendricks Jan 2012

Renegotiating The Social Contract, Jennifer S. Hendricks

Publications

This review of The Supportive State: Families, Government and America’s Political Ideals highlights Maxine Eichner’s important theoretical contributions to both liberal political theory and feminist theory, applauding her success in reforming liberalism to account for dependency, vulnerability, and families. The review then considers some implications of Eichner’s proposals and their likely reception among feminists. It concludes that The Supportive State is a sound and inspiring response to recent calls that feminist theory move from being strictly a school of criticism to developing a theory of governance.


Privacy In The Workplace: Are Collective Bargaining Agreements A Place To Start Formulating More Uniform Standards?, Karin Mika Jan 2012

Privacy In The Workplace: Are Collective Bargaining Agreements A Place To Start Formulating More Uniform Standards?, Karin Mika

Law Faculty Articles and Essays

This paper discusses ambiguities related to laws in employee privacy and posits that this is problematic for both employers and employees. The article discusses how private employers have almost no restrictions when it comes to employee monitoring, especially when there is an announced (albeit vague) policy. The article then suggests that unions have at least some negotiating power in terms of setting standards for when an employee may be disciplined and thus, labor unions have at least a modicum of power in negotiating clear rules regarding employee monitoring. The paper further suggests that clear policies aren't a bad thing, and …


Executive Trade Secrets, Tom C.W. Lin Jan 2012

Executive Trade Secrets, Tom C.W. Lin

UF Law Faculty Publications

The law discriminates among a corporation’s secrets. In the eyes of the law, commercial secrets of corporations are legitimate secrets that deserve legal protection and nondisclosure, but personal secrets of executives are not as deserving of legal protection and nondisclosure. This divergent treatment of secrets has resulted in a legal landscape of perplexing, paradoxical paths for corporations and executives concerning executive disclosures — a precarious landscape that has left corporations and investors dangerously susceptible to revelations of private facts that shock market valuation and institutional stability.

This Article explores this divergent treatment of secrets in the context of public corporations …


Balancing Privacy, Autonomy, And Scientific Needs In Electronic Health Records Research, Sharona Hoffman, Andy Podgurski Jan 2012

Balancing Privacy, Autonomy, And Scientific Needs In Electronic Health Records Research, Sharona Hoffman, Andy Podgurski

Faculty Publications

The ongoing transition from paper medical files to electronic health records will provide unprecedented amounts of data for biomedical research, with the potential to catalyze significant advances in medical knowledge. But this potential can be fully realized only if the data available to researchers is representative of the patient population as a whole. Thus, allowing individual patients to exclude their health information, in keeping with traditional notions of informed consent, may compromise the research enterprise and the medical benefits it produces.

This Article analyzes the tension between realizing societal benefits from medical research and granting individual preferences for privacy. It …


Cybercrime, Ronald C. Griffin Jan 2012

Cybercrime, Ronald C. Griffin

Journal Publications

This essay recounts campaigns against privacy; the fortifications erected against them; and hi-jinx attributable to hackers, crackers, and miscreants under the Fair Credit Reporting Act.


Technological Leap, Statutory Gap, And Constitutional Abyss: Remote Biometric Identification Comes Of Age, Laura K. Donohue Jan 2012

Technological Leap, Statutory Gap, And Constitutional Abyss: Remote Biometric Identification Comes Of Age, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

Federal interest in using facial recognition technology (“FRT”) to collect, analyze, and use biometric information is rapidly growing. Despite the swift movement of agencies and contractors into this realm, however, Congress has been virtually silent on the current and potential uses of FRT. No laws directly address facial recognition—much less the pairing of facial recognition with video surveillance—in criminal law. Limits placed on the collection of personally identifiable information, moreover, do not apply. The absence of a statutory framework is a cause for concern. FRT represents the first of a series of next generation biometrics, such as hand geometry, iris, …


Gina, Privacy, & Antisubordination, Brad Areheart Jan 2012

Gina, Privacy, & Antisubordination, Brad Areheart

College of Law Faculty Scholarship

This Essay briefly considers both the current and optimal role of privacy in employment discrimination jurisprudence. The recently passed Genetic Information Nondiscrimination Act (GINA) is illustrative of one way to value privacy through employment discrimination mandates. In particular, GINA includes a prohibition on the use of genetic information in all employment decisions, affording a measure of genetic privacy to potential and current employees.GINA stands in contrast to prior employment discrimination statutes, which have often encouraged or required employers to be knowledgeable of and consider particular identity traits through policies such as reasonable accommodation and affirmative action, and the disparate impact …


Configuring The Networked Citizen, Julie E. Cohen Jan 2012

Configuring The Networked Citizen, Julie E. Cohen

Georgetown Law Faculty Publications and Other Works

Among legal scholars of technology, it has become commonplace to acknowledge that the design of networked information technologies has regulatory effects. For the most part, that discussion has been structured by the taxonomy developed by Lawrence Lessig, which classifies "code" as one of four principal regulatory modalities, alongside law, markets, and norms. As a result of that framing, questions about the applicability of constitutional protections to technical decisions have taken center stage in legal and policy debates. Some scholars have pondered whether digital architectures unacceptably constrain fundamental liberties, and what "public" design obligations might follow from such a conclusion. Others …


The Sidis Case And The Origins Of Modern Privacy Law, Samantha Barbas Jan 2012

The Sidis Case And The Origins Of Modern Privacy Law, Samantha Barbas

Journal Articles

The American press, it’s been said, is freer to invade personal privacy than perhaps any other in the world. The tort law of privacy, as a shield against unwanted media exposure of private life, is very weak. The usual reason given for the weakness of U.S. privacy law as a bar on the publication of private information is the strong tradition of First Amendment freedom. But “freedom of the press” alone cannot explain why liberty to publish has been interpreted as a right to print truly intimate matters or to thrust people into the spotlight against their will. Especially in …


Bringing Clarity To Administrative Search Doctrine: Distinguishing Dragnets From Special Subpopulation Searches, Eve Brensike Primus Jan 2012

Bringing Clarity To Administrative Search Doctrine: Distinguishing Dragnets From Special Subpopulation Searches, Eve Brensike Primus

Articles

Anyone who has been stopped at a sobriety checkpoint, screened at an international border, scanned by a metal detector at an airport or government building, or drug tested for public employment has been subjected to an administrative search or seizure. Searches of public school students, government employees, and probationers are characterized as administrative, as are business inspections and-increasingly-wiretaps and other searches used in the gathering of national security intelligence. In other words, the government conducts thousands of administrative searches every day. None of these searches requires either probable cause or a search warrant. Instead, courts evaluating administrative searches need only …