Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2011

Privacy

Discipline
Institution
Publication
Publication Type
File Type

Articles 61 - 71 of 71

Full-Text Articles in Law

The Fourth Amendment Rights Of Children At Home: When Parental Authority Goes Too Far, Kristin N. Henning Jan 2011

The Fourth Amendment Rights Of Children At Home: When Parental Authority Goes Too Far, Kristin N. Henning

Georgetown Law Faculty Publications and Other Works

Although it is virtually undisputed that children have some Fourth Amendment rights independent of their parents, it is equally clear that youth generally receive less constitutional protection than adults. In a search for continuity and coherence in Fourth Amendment jurisprudence involving minors, Professor Henning identifies three guiding principles—context, parental authority, and the minor’s capacity—that weave together children’s rights cases. She argues that parental authority too often prevails over children’s rights, even when context and demonstrated capacity would support affirmation of those rights. Context involves both the physical setting in which Fourth Amendment protections are sought and the nature of the …


The “New Body Snatchers”: Analyzing The Effect Of Presumed Consent Organ Donation Laws On Privacy, Autonomy, And Liberty, Maryellen Liddy Jan 2011

The “New Body Snatchers”: Analyzing The Effect Of Presumed Consent Organ Donation Laws On Privacy, Autonomy, And Liberty, Maryellen Liddy

Fordham Urban Law Journal

This Note examines, in three parts, presumed consent laws as they pertain to organ donation. Part I discusses presumed consent and explains the salient features of presumed consent laws. It then discusses case law that addresses the aftermath of unauthorized organ or tissue harvesting. Part II evaluates the United States Supreme Court's evolving conceptions of the rights of individual and family-based privacy, autonomy, and liberty, for subsequent application to the presumed consent organ donation controversy. Part III analyzes presumed consent laws in light of the donors and their families' privacy, autonomy, and liberty interests. The Note concludes that current presumed …


Nothing To Hide: The False Tradeoff Between Privacy And Security (Introduction), Daniel J. Solove Jan 2011

Nothing To Hide: The False Tradeoff Between Privacy And Security (Introduction), Daniel J. Solove

GW Law Faculty Publications & Other Works

"If you've got nothing to hide," many people say, "you shouldn't worry about government surveillance." Others argue that we must sacrifice privacy for security. But as Daniel J. Solove argues in this book, these arguments and many others are flawed. They are based on mistaken views about what it means to protect privacy and the costs and benefits of doing so.

In addition to attacking the "Nothing-to Hide Argument," Solove exposes the fallacies of pro-security arguments that have often been used to justify government surveillance and data mining. These arguments - such as the "Luddite Argument,"the "War-Powers Argument," the "All-or-Nothing …


The Pii Problem: Privacy And A New Concept Of Personally Identifiable Information, Daniel J. Solove, Paul M. Schwartz Jan 2011

The Pii Problem: Privacy And A New Concept Of Personally Identifiable Information, Daniel J. Solove, Paul M. Schwartz

GW Law Faculty Publications & Other Works

Personally identifiable information (PII) is one of the most central concepts in information privacy regulation. The scope of privacy laws typically turns on whether PII is involved. The basic assumption behind the applicable laws is that if PII is not involved, then there can be no privacy harm. At the same time, there is no uniform definition of PII in information privacy law. Moreover, computer science has shown that in many circumstances non-PII can be linked to individuals, and that de-identified data can be re-identified. PII and non-PII are thus not immutable categories, and there is a risk that information …


Privacy Law Fundamentals, Daniel J. Solove, Paul M. Schwartz Jan 2011

Privacy Law Fundamentals, Daniel J. Solove, Paul M. Schwartz

GW Law Faculty Publications & Other Works

"Privacy Law Fundamentals" is a distilled guide to the essential elements of U.S. data privacy law. In an easily-digestible format, the book covers core concepts, key laws, and leading cases. Included here for download are The Table of Contents and Chapter 1.

The book explains the major provisions of all of the major privacy statutes, regulations, cases, including state privacy laws and FTC enforcement actions. It provides numerous charts and tables summarizing the privacy statutes (i.e. statutes with private rights of action, preemption, and liquidated damages, among other things). Topics covered include: the media, domestic law enforcement, national security, government …


Intrusive Monitoring: Employee Privacy Expectations Are Reasonable In Europe, Destroyed In The United States, Lothar Determann, Robert Sprague Dec 2010

Intrusive Monitoring: Employee Privacy Expectations Are Reasonable In Europe, Destroyed In The United States, Lothar Determann, Robert Sprague

Robert Sprague

This Article examines the contrasting policy and legal frameworks relating to data privacy in the United States and the European Union, with a particular focus on workplace privacy and intrusive surveillance technologies and practices. It examines the U.S. perspective on modern work-related employer monitoring practices, the laws giving rise to possible employee privacy rights, and specific types of employer monitoring that may lead to actionable invasions of employee privacy rights. This article then addresses the issue of employee privacy from the EU perspective, beginning with an overview of the formation of authority to protect individual privacy rights, followed by an …


Invasion Of The Social Networks: Blurring The Line Between Personal Life And The Employment Relationship, Robert Sprague Dec 2010

Invasion Of The Social Networks: Blurring The Line Between Personal Life And The Employment Relationship, Robert Sprague

Robert Sprague

Over one-half billion people worldwide have registered accounts with Facebook, the most popular online social network. This article addresses some of the more significant employment-related legal issues arising from the growing popularity of online social networks. First, the need for employers to investigate the background of prospective employees is examined from the context of employers using online social networks to conduct those investigations. In particular, this article analyzes the degree to which job applicants have privacy rights in the information they post online. This article then examines the interrelationship between online social networks and employees, focusing on limitations faced by …


The Eavesdropping Employer: A Twenty-First Century Framework For Employee Monitoring, Corey A. Ciocchetti Dec 2010

The Eavesdropping Employer: A Twenty-First Century Framework For Employee Monitoring, Corey A. Ciocchetti

Corey A Ciocchetti

The twenty-first century continues to usher in new and increasingly-powerful technology. This technology is both a blessing and a curse in the employment arena. Sophisticated monitoring software and hardware allow businesses to conduct basic business transactions, avoid liability, conduct investigations and, ultimately, achieve success in a competitive global environment. Employees can also benefit when monitoring provides immediate feedback, keeps the workforce efficient and focused and discourages unethical/illegal behavior. The same technology, however, allows employers to monitor every detail of their employees’ actions, communications and whereabouts both inside and outside the workplace. As more and more employers conduct some form of …


First-Class Objects, James Grimmelmann Dec 2010

First-Class Objects, James Grimmelmann

James Grimmelmann

What is the difference between "James Grimmelmann" and "@grimmelm" and why should we care? Some computer systems, like Facebook and credit reporting agencies, are inherently "about" people. Others are not. This essay argues that the key technical difference is whether they use unique identifiers to refer to people in their databases. From this single distinction, a host of social and humanistic consequences follow. The essay taxonomizes them and teases out some of their implications for privacy law.


The Timely Demise Of The Fourth Amendment Third Party Doctrine, Stephen E. Henderson Dec 2010

The Timely Demise Of The Fourth Amendment Third Party Doctrine, Stephen E. Henderson

Stephen E Henderson

In what may be a slightly premature obituary, in this response to a forthcoming paper by Matthew Tokson I argue that the Fourth Amendment third party doctrine "has at least taken ill, and it can be hoped it is an illness from which it will never recover." It is increasingly unpopular as a matter of state constitutional law, has long been assailed in scholarship but now thoughtful alternatives are percolating, and it cannot – or at least should not – withstand the pressures which technology and social norms are placing upon it. Even the Supreme Court seems loath to defend …


Known And Unknown, Property And Contract: Comments On Hoofnagle And Moringiello, James Grimmelmann Dec 2010

Known And Unknown, Property And Contract: Comments On Hoofnagle And Moringiello, James Grimmelmann

James Grimmelmann

In addition to gerund-noun-noun titles and a concern with the misaligned incentives of businesses that handle consumers' financial data, Chris Hoofnagle's Internalizing Identity Theft and Juliet Moringiello's Warranting Data Security share something else: hidden themes. Hoofnagle's paper is officially about an empirical study of identity theft, but behind the scenes it's also an exploration of where we draw the line between public information shared freely and secret information used to authenticate individuals. Moringiello's paper is officially a proposal for a new warranty of secure handling of payment information, but under the surface, it invites us to think about the relationship …