Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Privacy Law (16)
- Internet Law (9)
- Science and Technology Law (8)
- Communications Law (7)
- Constitutional Law (7)
-
- Computer Law (6)
- First Amendment (6)
- Social and Behavioral Sciences (5)
- Law and Society (4)
- Communication (3)
- Fourth Amendment (3)
- Intellectual Property Law (3)
- International Law (3)
- Jurisprudence (3)
- Labor and Employment Law (3)
- Library and Information Science (3)
- Commercial Law (2)
- Communication Technology and New Media (2)
- Consumer Protection Law (2)
- Contracts (2)
- Environmental Law (2)
- Family Law (2)
- Law Librarianship (2)
- Law and Economics (2)
- Law and Politics (2)
- National Security Law (2)
- State and Local Government Law (2)
- Torts (2)
- Administrative Law (1)
- Institution
-
- Georgetown University Law Center (3)
- Pace University (3)
- University of Colorado Law School (3)
- University of Florida Levin College of Law (3)
- Chicago-Kent College of Law (2)
-
- Cleveland State University (2)
- Schulich School of Law, Dalhousie University (2)
- University at Buffalo School of Law (2)
- University of Baltimore Law (2)
- University of Pennsylvania Carey Law School (2)
- Boston University School of Law (1)
- Case Western Reserve University School of Law (1)
- Florida A&M University College of Law (1)
- Maurer School of Law: Indiana University (1)
- Roger Williams University (1)
- Santa Clara Law (1)
- The Catholic University of America, Columbus School of Law (1)
- University of Maryland Francis King Carey School of Law (1)
- University of Massachusetts School of Law (1)
- University of Miami Law School (1)
- University of Michigan Law School (1)
- University of New Hampshire (1)
- University of Tennessee College of Law (1)
- Washington and Lee University School of Law (1)
- Western University (1)
- William & Mary Law School (1)
- Publication
-
- All Faculty Scholarship (6)
- Elisabeth Haub School of Law Faculty Publications (3)
- Faculty Publications (3)
- Georgetown Law Faculty Publications and Other Works (3)
- Publications (3)
-
- UF Law Faculty Publications (3)
- Articles, Book Chapters, & Popular Press (2)
- Faculty Scholarship (2)
- Journal Articles (2)
- Law Faculty Articles and Essays (2)
- Scholarly Articles (2)
- Articles (1)
- Articles by Maurer Faculty (1)
- College of Law Faculty Scholarship (1)
- FIMS Presentations (1)
- Journal Publications (1)
- Law Faculty Scholarship (1)
- Library Staff Publications (1)
- School of Law Conferences, Lectures & Events (1)
- Short Works (1)
Articles 31 - 40 of 40
Full-Text Articles in Law
Renegotiating The Social Contract, Jennifer S. Hendricks
Renegotiating The Social Contract, Jennifer S. Hendricks
Publications
This review of The Supportive State: Families, Government and America’s Political Ideals highlights Maxine Eichner’s important theoretical contributions to both liberal political theory and feminist theory, applauding her success in reforming liberalism to account for dependency, vulnerability, and families. The review then considers some implications of Eichner’s proposals and their likely reception among feminists. It concludes that The Supportive State is a sound and inspiring response to recent calls that feminist theory move from being strictly a school of criticism to developing a theory of governance.
Privacy In The Workplace: Are Collective Bargaining Agreements A Place To Start Formulating More Uniform Standards?, Karin Mika
Law Faculty Articles and Essays
This paper discusses ambiguities related to laws in employee privacy and posits that this is problematic for both employers and employees. The article discusses how private employers have almost no restrictions when it comes to employee monitoring, especially when there is an announced (albeit vague) policy. The article then suggests that unions have at least some negotiating power in terms of setting standards for when an employee may be disciplined and thus, labor unions have at least a modicum of power in negotiating clear rules regarding employee monitoring. The paper further suggests that clear policies aren't a bad thing, and …
Executive Trade Secrets, Tom C.W. Lin
Executive Trade Secrets, Tom C.W. Lin
UF Law Faculty Publications
The law discriminates among a corporation’s secrets. In the eyes of the law, commercial secrets of corporations are legitimate secrets that deserve legal protection and nondisclosure, but personal secrets of executives are not as deserving of legal protection and nondisclosure. This divergent treatment of secrets has resulted in a legal landscape of perplexing, paradoxical paths for corporations and executives concerning executive disclosures — a precarious landscape that has left corporations and investors dangerously susceptible to revelations of private facts that shock market valuation and institutional stability.
This Article explores this divergent treatment of secrets in the context of public corporations …
Balancing Privacy, Autonomy, And Scientific Needs In Electronic Health Records Research, Sharona Hoffman, Andy Podgurski
Balancing Privacy, Autonomy, And Scientific Needs In Electronic Health Records Research, Sharona Hoffman, Andy Podgurski
Faculty Publications
The ongoing transition from paper medical files to electronic health records will provide unprecedented amounts of data for biomedical research, with the potential to catalyze significant advances in medical knowledge. But this potential can be fully realized only if the data available to researchers is representative of the patient population as a whole. Thus, allowing individual patients to exclude their health information, in keeping with traditional notions of informed consent, may compromise the research enterprise and the medical benefits it produces.
This Article analyzes the tension between realizing societal benefits from medical research and granting individual preferences for privacy. It …
Cybercrime, Ronald C. Griffin
Cybercrime, Ronald C. Griffin
Journal Publications
This essay recounts campaigns against privacy; the fortifications erected against them; and hi-jinx attributable to hackers, crackers, and miscreants under the Fair Credit Reporting Act.
Technological Leap, Statutory Gap, And Constitutional Abyss: Remote Biometric Identification Comes Of Age, Laura K. Donohue
Technological Leap, Statutory Gap, And Constitutional Abyss: Remote Biometric Identification Comes Of Age, Laura K. Donohue
Georgetown Law Faculty Publications and Other Works
Federal interest in using facial recognition technology (“FRT”) to collect, analyze, and use biometric information is rapidly growing. Despite the swift movement of agencies and contractors into this realm, however, Congress has been virtually silent on the current and potential uses of FRT. No laws directly address facial recognition—much less the pairing of facial recognition with video surveillance—in criminal law. Limits placed on the collection of personally identifiable information, moreover, do not apply. The absence of a statutory framework is a cause for concern. FRT represents the first of a series of next generation biometrics, such as hand geometry, iris, …
Gina, Privacy, & Antisubordination, Brad Areheart
Gina, Privacy, & Antisubordination, Brad Areheart
College of Law Faculty Scholarship
This Essay briefly considers both the current and optimal role of privacy in employment discrimination jurisprudence. The recently passed Genetic Information Nondiscrimination Act (GINA) is illustrative of one way to value privacy through employment discrimination mandates. In particular, GINA includes a prohibition on the use of genetic information in all employment decisions, affording a measure of genetic privacy to potential and current employees.GINA stands in contrast to prior employment discrimination statutes, which have often encouraged or required employers to be knowledgeable of and consider particular identity traits through policies such as reasonable accommodation and affirmative action, and the disparate impact …
Configuring The Networked Citizen, Julie E. Cohen
Configuring The Networked Citizen, Julie E. Cohen
Georgetown Law Faculty Publications and Other Works
Among legal scholars of technology, it has become commonplace to acknowledge that the design of networked information technologies has regulatory effects. For the most part, that discussion has been structured by the taxonomy developed by Lawrence Lessig, which classifies "code" as one of four principal regulatory modalities, alongside law, markets, and norms. As a result of that framing, questions about the applicability of constitutional protections to technical decisions have taken center stage in legal and policy debates. Some scholars have pondered whether digital architectures unacceptably constrain fundamental liberties, and what "public" design obligations might follow from such a conclusion. Others …
The Sidis Case And The Origins Of Modern Privacy Law, Samantha Barbas
The Sidis Case And The Origins Of Modern Privacy Law, Samantha Barbas
Journal Articles
The American press, it’s been said, is freer to invade personal privacy than perhaps any other in the world. The tort law of privacy, as a shield against unwanted media exposure of private life, is very weak. The usual reason given for the weakness of U.S. privacy law as a bar on the publication of private information is the strong tradition of First Amendment freedom. But “freedom of the press” alone cannot explain why liberty to publish has been interpreted as a right to print truly intimate matters or to thrust people into the spotlight against their will. Especially in …
Bringing Clarity To Administrative Search Doctrine: Distinguishing Dragnets From Special Subpopulation Searches, Eve Brensike Primus
Bringing Clarity To Administrative Search Doctrine: Distinguishing Dragnets From Special Subpopulation Searches, Eve Brensike Primus
Articles
Anyone who has been stopped at a sobriety checkpoint, screened at an international border, scanned by a metal detector at an airport or government building, or drug tested for public employment has been subjected to an administrative search or seizure. Searches of public school students, government employees, and probationers are characterized as administrative, as are business inspections and-increasingly-wiretaps and other searches used in the gathering of national security intelligence. In other words, the government conducts thousands of administrative searches every day. None of these searches requires either probable cause or a search warrant. Instead, courts evaluating administrative searches need only …