Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Privacy Law (23)
- Constitutional Law (11)
- Fourth Amendment (9)
- Internet Law (9)
- Science and Technology Law (9)
-
- Computer Law (6)
- First Amendment (6)
- Law and Society (6)
- Labor and Employment Law (5)
- Comparative and Foreign Law (4)
- Criminal Law (4)
- Health Law and Policy (4)
- Criminal Procedure (3)
- Law Enforcement and Corrections (3)
- Supreme Court of the United States (3)
- Arts and Humanities (2)
- Civil Rights and Discrimination (2)
- Communications Law (2)
- Contracts (2)
- European Law (2)
- Family Law (2)
- Intellectual Property Law (2)
- International Law (2)
- Law and Gender (2)
- Legislation (2)
- Property Law and Real Estate (2)
- Social and Behavioral Sciences (2)
- Administrative Law (1)
- African American Studies (1)
- Institution
-
- SelectedWorks (12)
- Selected Works (10)
- University of Michigan Law School (6)
- Vanderbilt University Law School (5)
- University of Pennsylvania Carey Law School (4)
-
- George Washington University Law School (3)
- University of Maryland Francis King Carey School of Law (3)
- American University Washington College of Law (2)
- Boston University School of Law (2)
- Fordham Law School (2)
- Touro University Jacob D. Fuchsberg Law Center (2)
- Cornell University Law School (1)
- Florida Coastal School of Law (1)
- Florida State University College of Law (1)
- Georgetown University Law Center (1)
- Golden Gate University School of Law (1)
- Maurer School of Law: Indiana University (1)
- Notre Dame Law School (1)
- Roger Williams University (1)
- Saint Louis University School of Law (1)
- Southern Methodist University (1)
- St. John's University School of Law (1)
- University of Colorado Law School (1)
- University of Massachusetts School of Law (1)
- University of Miami Law School (1)
- University of Oklahoma College of Law (1)
- University of Richmond (1)
- University of Washington School of Law (1)
- University of Wollongong (1)
- West Virginia University (1)
- Publication
-
- Faculty Scholarship (4)
- All Faculty Scholarship (3)
- GW Law Faculty Publications & Other Works (3)
- Vanderbilt Journal of Entertainment & Technology Law (3)
- Amicus Briefs (2)
-
- Articles (2)
- Corey A Ciocchetti (2)
- Faculty Publications (2)
- James Grimmelmann (2)
- Michigan Telecommunications & Technology Law Review (2)
- Robert Sprague (2)
- Touro Law Review (2)
- Andrew B. Serwin (1)
- Cornell International Law Journal (1)
- Daniel J Gervais (1)
- Dr Rebecca Wong (1)
- Elad Oreg (1)
- Faculty Journal Articles and Book Chapters (1)
- Faculty of Law - Papers (Archive) (1)
- Fordham Intellectual Property, Media and Entertainment Law Journal (1)
- Fordham Urban Law Journal (1)
- Georgetown Law Faculty Publications and Other Works (1)
- Heidi R Anderson (1)
- Hillary B. Farber (1)
- Indiana Law Journal (1)
- Intellectual Property Law (1)
- Jane Yakowitz (1)
- Jared A. Harshbarger (1)
- Journal Articles (1)
- Lara A Ballard (1)
- Publication Type
- File Type
Articles 61 - 71 of 71
Full-Text Articles in Law
The Fourth Amendment Rights Of Children At Home: When Parental Authority Goes Too Far, Kristin N. Henning
The Fourth Amendment Rights Of Children At Home: When Parental Authority Goes Too Far, Kristin N. Henning
Georgetown Law Faculty Publications and Other Works
Although it is virtually undisputed that children have some Fourth Amendment rights independent of their parents, it is equally clear that youth generally receive less constitutional protection than adults. In a search for continuity and coherence in Fourth Amendment jurisprudence involving minors, Professor Henning identifies three guiding principles—context, parental authority, and the minor’s capacity—that weave together children’s rights cases. She argues that parental authority too often prevails over children’s rights, even when context and demonstrated capacity would support affirmation of those rights. Context involves both the physical setting in which Fourth Amendment protections are sought and the nature of the …
The “New Body Snatchers”: Analyzing The Effect Of Presumed Consent Organ Donation Laws On Privacy, Autonomy, And Liberty, Maryellen Liddy
The “New Body Snatchers”: Analyzing The Effect Of Presumed Consent Organ Donation Laws On Privacy, Autonomy, And Liberty, Maryellen Liddy
Fordham Urban Law Journal
This Note examines, in three parts, presumed consent laws as they pertain to organ donation. Part I discusses presumed consent and explains the salient features of presumed consent laws. It then discusses case law that addresses the aftermath of unauthorized organ or tissue harvesting. Part II evaluates the United States Supreme Court's evolving conceptions of the rights of individual and family-based privacy, autonomy, and liberty, for subsequent application to the presumed consent organ donation controversy. Part III analyzes presumed consent laws in light of the donors and their families' privacy, autonomy, and liberty interests. The Note concludes that current presumed …
Nothing To Hide: The False Tradeoff Between Privacy And Security (Introduction), Daniel J. Solove
Nothing To Hide: The False Tradeoff Between Privacy And Security (Introduction), Daniel J. Solove
GW Law Faculty Publications & Other Works
"If you've got nothing to hide," many people say, "you shouldn't worry about government surveillance." Others argue that we must sacrifice privacy for security. But as Daniel J. Solove argues in this book, these arguments and many others are flawed. They are based on mistaken views about what it means to protect privacy and the costs and benefits of doing so.
In addition to attacking the "Nothing-to Hide Argument," Solove exposes the fallacies of pro-security arguments that have often been used to justify government surveillance and data mining. These arguments - such as the "Luddite Argument,"the "War-Powers Argument," the "All-or-Nothing …
The Pii Problem: Privacy And A New Concept Of Personally Identifiable Information, Daniel J. Solove, Paul M. Schwartz
The Pii Problem: Privacy And A New Concept Of Personally Identifiable Information, Daniel J. Solove, Paul M. Schwartz
GW Law Faculty Publications & Other Works
Personally identifiable information (PII) is one of the most central concepts in information privacy regulation. The scope of privacy laws typically turns on whether PII is involved. The basic assumption behind the applicable laws is that if PII is not involved, then there can be no privacy harm. At the same time, there is no uniform definition of PII in information privacy law. Moreover, computer science has shown that in many circumstances non-PII can be linked to individuals, and that de-identified data can be re-identified. PII and non-PII are thus not immutable categories, and there is a risk that information …
Privacy Law Fundamentals, Daniel J. Solove, Paul M. Schwartz
Privacy Law Fundamentals, Daniel J. Solove, Paul M. Schwartz
GW Law Faculty Publications & Other Works
"Privacy Law Fundamentals" is a distilled guide to the essential elements of U.S. data privacy law. In an easily-digestible format, the book covers core concepts, key laws, and leading cases. Included here for download are The Table of Contents and Chapter 1.
The book explains the major provisions of all of the major privacy statutes, regulations, cases, including state privacy laws and FTC enforcement actions. It provides numerous charts and tables summarizing the privacy statutes (i.e. statutes with private rights of action, preemption, and liquidated damages, among other things). Topics covered include: the media, domestic law enforcement, national security, government …
Intrusive Monitoring: Employee Privacy Expectations Are Reasonable In Europe, Destroyed In The United States, Lothar Determann, Robert Sprague
Intrusive Monitoring: Employee Privacy Expectations Are Reasonable In Europe, Destroyed In The United States, Lothar Determann, Robert Sprague
Robert Sprague
This Article examines the contrasting policy and legal frameworks relating to data privacy in the United States and the European Union, with a particular focus on workplace privacy and intrusive surveillance technologies and practices. It examines the U.S. perspective on modern work-related employer monitoring practices, the laws giving rise to possible employee privacy rights, and specific types of employer monitoring that may lead to actionable invasions of employee privacy rights. This article then addresses the issue of employee privacy from the EU perspective, beginning with an overview of the formation of authority to protect individual privacy rights, followed by an …
Invasion Of The Social Networks: Blurring The Line Between Personal Life And The Employment Relationship, Robert Sprague
Invasion Of The Social Networks: Blurring The Line Between Personal Life And The Employment Relationship, Robert Sprague
Robert Sprague
Over one-half billion people worldwide have registered accounts with Facebook, the most popular online social network. This article addresses some of the more significant employment-related legal issues arising from the growing popularity of online social networks. First, the need for employers to investigate the background of prospective employees is examined from the context of employers using online social networks to conduct those investigations. In particular, this article analyzes the degree to which job applicants have privacy rights in the information they post online. This article then examines the interrelationship between online social networks and employees, focusing on limitations faced by …
The Eavesdropping Employer: A Twenty-First Century Framework For Employee Monitoring, Corey A. Ciocchetti
The Eavesdropping Employer: A Twenty-First Century Framework For Employee Monitoring, Corey A. Ciocchetti
Corey A Ciocchetti
The twenty-first century continues to usher in new and increasingly-powerful technology. This technology is both a blessing and a curse in the employment arena. Sophisticated monitoring software and hardware allow businesses to conduct basic business transactions, avoid liability, conduct investigations and, ultimately, achieve success in a competitive global environment. Employees can also benefit when monitoring provides immediate feedback, keeps the workforce efficient and focused and discourages unethical/illegal behavior. The same technology, however, allows employers to monitor every detail of their employees’ actions, communications and whereabouts both inside and outside the workplace. As more and more employers conduct some form of …
First-Class Objects, James Grimmelmann
First-Class Objects, James Grimmelmann
James Grimmelmann
What is the difference between "James Grimmelmann" and "@grimmelm" and why should we care? Some computer systems, like Facebook and credit reporting agencies, are inherently "about" people. Others are not. This essay argues that the key technical difference is whether they use unique identifiers to refer to people in their databases. From this single distinction, a host of social and humanistic consequences follow. The essay taxonomizes them and teases out some of their implications for privacy law.
The Timely Demise Of The Fourth Amendment Third Party Doctrine, Stephen E. Henderson
The Timely Demise Of The Fourth Amendment Third Party Doctrine, Stephen E. Henderson
Stephen E Henderson
In what may be a slightly premature obituary, in this response to a forthcoming paper by Matthew Tokson I argue that the Fourth Amendment third party doctrine "has at least taken ill, and it can be hoped it is an illness from which it will never recover." It is increasingly unpopular as a matter of state constitutional law, has long been assailed in scholarship but now thoughtful alternatives are percolating, and it cannot – or at least should not – withstand the pressures which technology and social norms are placing upon it. Even the Supreme Court seems loath to defend …
Known And Unknown, Property And Contract: Comments On Hoofnagle And Moringiello, James Grimmelmann
Known And Unknown, Property And Contract: Comments On Hoofnagle And Moringiello, James Grimmelmann
James Grimmelmann
In addition to gerund-noun-noun titles and a concern with the misaligned incentives of businesses that handle consumers' financial data, Chris Hoofnagle's Internalizing Identity Theft and Juliet Moringiello's Warranting Data Security share something else: hidden themes. Hoofnagle's paper is officially about an empirical study of identity theft, but behind the scenes it's also an exploration of where we draw the line between public information shared freely and secret information used to authenticate individuals. Moringiello's paper is officially a proposal for a new warranty of secure handling of payment information, but under the surface, it invites us to think about the relationship …