Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Labor and Employment Law

Privacy

Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 32

Full-Text Articles in Privacy Law

One Size Does Not Fit All: How The California Privacy Rights Act Will Not Improve Employee Data Collection And Privacy Rights, Kayla N. Bushey Jan 2023

One Size Does Not Fit All: How The California Privacy Rights Act Will Not Improve Employee Data Collection And Privacy Rights, Kayla N. Bushey

Catholic University Journal of Law and Technology

No abstract provided.


Inadequate Privacy: The Necessity Of Hipaa Reform In A Post-Dobbs World, Katherine Robertson Jan 2023

Inadequate Privacy: The Necessity Of Hipaa Reform In A Post-Dobbs World, Katherine Robertson

Seattle University Law Review

Part I of this Comment will provide an overview of HIPAA and the legal impacts of Dobbs. Part II will discuss the anticipatory response to the impacts of Dobbs on PHI by addressing the response from (1) the states, (2) the Biden Administration, and (3) the medical field. Part III will discuss the loopholes that exist in HIPAA and further address the potential impacts on individuals and the medical field if reform does not occur. Finally, Part IV will argue that the reform of HIPAA is the best avenue for protecting PHI related to reproductive healthcare.


Privacy In Pandemic: Law, Technology, And Public Health In The Covid-19 Crisis, Tiffany C. Li Jan 2021

Privacy In Pandemic: Law, Technology, And Public Health In The Covid-19 Crisis, Tiffany C. Li

Law Faculty Scholarship

The COVID-19 pandemic has caused millions of deaths and disastrous consequences around the world, with lasting repercussions for every field of law, including privacy and technology. The unique characteristics of this pandemic have precipitated an increase in use of new technologies, including remote communications platforms, healthcare robots, and medical Al. Public and private actors alike are using new technologies, like heat sensing, and technologically influenced programs, like contact tracing, leading to a rise in government and corporate surveillance in sectors like healthcare, employment, education, and commerce. Advocates have raised the alarm for privacy and civil liberties violations, but the emergency …


Pandemic Surveillance Discrimination, Christian Sundquist Jan 2021

Pandemic Surveillance Discrimination, Christian Sundquist

Articles

The COVID-19 pandemic has laid bare the abiding tension between surveillance and privacy. Public health epidemiology has long utilized a variety of surveillance methods—such as contact tracing, quarantines, and mandatory reporting laws—to control the spread of disease during past epidemics and pandemics. Officials have typically justified the resulting intrusions on privacy as necessary for the greater public good by helping to stave off larger health crisis. The nature and scope of public health surveillance in the battle against COVID-19, however, has significantly changed with the advent of new technologies. Digital surveillance tools, often embedded in wearable technology, have greatly increased …


The Federalism Challenges Of Protecting Medical Privacy In Workers' Compensation, Ani B. Satz Jan 2019

The Federalism Challenges Of Protecting Medical Privacy In Workers' Compensation, Ani B. Satz

Faculty Articles

This Article is the first to address the challenges of federalism in protecting medical privacy in workers’ compensation after the promulgation of the HPR and to propose legal change. The Article argues that workers’ compensation programs must align with the federal privacy protections of the HPR and proposes actions for the U.S. Department of Health and Human Services (HHS) and states to remedy departures. Part I discusses the complex relationship between the HPR and workers’ compensation. This relationship is often misunderstood by legislatures and courts, compounding the challenges of federalism in this area. Specifically, Part I addresses the HPR’s § …


Survey Of (Mostly Outdated And Often Ineffective) Laws Affecting Work-Related Monitoring, Robert Sprague Mar 2018

Survey Of (Mostly Outdated And Often Ineffective) Laws Affecting Work-Related Monitoring, Robert Sprague

Chicago-Kent Law Review

This article reviews various laws that affect work-related monitoring. It reveals that most of our privacy laws were adopted well before smartphones and the Internet became ubiquitous; they still hunt for physical secluded locations; and, because they are based on reasonable expectations of privacy, they can easily be circumvented by employer policies that eliminate that expectation by informing workers they have no right to privacy in the workplace. This article concludes that the future—indeed the present—does not bode well for worker privacy.


Criminal Employment Law, Benjamin Levin Jan 2018

Criminal Employment Law, Benjamin Levin

Publications

This Article diagnoses a phenomenon, “criminal employment law,” which exists at the nexus of employment law and the criminal justice system. Courts and legislatures discourage employers from hiring workers with criminal records and encourage employers to discipline workers for non-work-related criminal misconduct. In analyzing this phenomenon, my goals are threefold: (1) to examine how criminal employment law works; (2) to hypothesize why criminal employment law has proliferated; and (3) to assess what is wrong with criminal employment law. This Article examines the ways in which the laws that govern the workplace create incentives for employers not to hire individuals with …


Privacy, Poverty, And Big Data: A Matrix Of Vulnerabilities For Poor Americans, Mary Madden, Michele E. Gilman, Karen Levy, Alice Marwick Jan 2017

Privacy, Poverty, And Big Data: A Matrix Of Vulnerabilities For Poor Americans, Mary Madden, Michele E. Gilman, Karen Levy, Alice Marwick

All Faculty Scholarship

This Article examines the matrix of vulnerabilities that low-income people face as a result of the collection and aggregation of big data and the application of predictive analytics. On one hand, big data systems could reverse growing economic inequality by expanding access to opportunities for low-income people. On the other hand, big data could widen economic gaps by making it possible to prey on low-income people or to exclude them from opportunities due to biases entrenched in algorithmic decision-making tools. New kinds of “networked privacy” harms, in which users are simultaneously held liable for their own behavior and the actions …


The Law And Policy Of People Analytics, Matthew T. Bodie, Miriam A. Cherry, Marcia L. Mccormick, Jintong Tang Jan 2017

The Law And Policy Of People Analytics, Matthew T. Bodie, Miriam A. Cherry, Marcia L. Mccormick, Jintong Tang

Faculty Publications

(Excerpt)

Recently, leading technology companies such as Google and IBM have started experimenting with "people analytics," a new data-driven approach to human resources management. People analytics is just one example of the phenomenon of "big data," in which analyses of huge sets of quantitative information are used to guide a variety of decisions. Applying big data to workplace situations could lead to more effective work outcomes, as in Moneyball, where the Oakland A's baseball franchise used statistics to assemble a winning team on a shoestring budget. People analytics is the name given to this new approach to personnel management …


The Law And Policy Of People Analytics, Matthew T. Bodie, Miriam A. Cherry, Marcia L. Mccormick, Jintong Tang Jan 2017

The Law And Policy Of People Analytics, Matthew T. Bodie, Miriam A. Cherry, Marcia L. Mccormick, Jintong Tang

University of Colorado Law Review

No abstract provided.


Employee Electronic Communications In A Boundaryless World, Robert Sprague Dec 2015

Employee Electronic Communications In A Boundaryless World, Robert Sprague

Robert Sprague

In 2007, the National Labor Relations Board decided that an employer could maintain an email communications policy that prohibits nonwork-related messages, even if those messages involved communications otherwise protected under the National Labor Relations Act. In December 2014, the National Labor Relations Board reversed this holding, but in doing so, limited its decision to just workplace email. This article argues that such a prescription is outdated and archaic in light of today’s modern workplace filled with communications devices and systems that blur the distinction between work and personal life. This article explains that such a prescription can cause employees to …


Welcome To The Machine: Privacy And Workplace Implications Of Predictive Analytics, Robert Sprague Apr 2015

Welcome To The Machine: Privacy And Workplace Implications Of Predictive Analytics, Robert Sprague

Robert Sprague

Predictive analytics use a method known as data mining to identify trends, patterns, or relationships among data, which can then be used to develop a predictive model. Data mining itself relies upon big data, which is “big” not solely because of its size but also because its analytical potential is qualitatively different. “Big data” analysis allows organizations, including government and businesses, to combine diverse digital datasets and then use statistics and other data mining techniques to extract from them both hidden information and surprising correlations. These data are not necessarily tracking transactional records of atomized behavior, such as the purchasing …


Social Media And The Job Market: How To Reconcile Applicant Privacy With Employer Needs, Peter B. Baumhart Jan 2015

Social Media And The Job Market: How To Reconcile Applicant Privacy With Employer Needs, Peter B. Baumhart

University of Michigan Journal of Law Reform

In the modern technological age, social media allows us to communicate vast amounts of personal information to countless people instantaneously. This information is valuable to more than just our “friends” and “followers,” however. Prospective employers can use this personal data to inform hiring decisions, thereby maximizing fit and minimizing potential liability. The question then arises, how best to acquire this information? For job applicants, the counter-question is how best to protect the privacy of their social media accounts. As these two competing desires begin to clash, it is important to find a method to mediate the conflict. Existing privacy law, …


Systematic Ict Surveillance By Employers: Are Your Personal Activities Private?, Arlene J. Nicholas Jul 2014

Systematic Ict Surveillance By Employers: Are Your Personal Activities Private?, Arlene J. Nicholas

Faculty and Staff - Articles & Papers

This paper reviews the various methods of information and communications technology (ICT) that is used by employers to peer into the work lives and, in some cases, private lives of employees. Some of the most common methods – such as computer and Internet monitoring, video surveillance, and global positioning systems (GPS) – have resulted in employee disciplines that have been challenged in courts. This paper provides background information on United States (U.S.) laws and court cases which, in this age of easily accessible information, mostly support the employer. Assessments regarding regulations and policies, which will need to be continually updated …


Facebook Is Not Your Friend: Protecting A Private Employee's Expectation Of Privacy In Social Networking Content In The Twenty-First Century Workplace, Cara Magatelli Jan 2014

Facebook Is Not Your Friend: Protecting A Private Employee's Expectation Of Privacy In Social Networking Content In The Twenty-First Century Workplace, Cara Magatelli

The Journal of Business, Entrepreneurship & the Law

This Comment explores the implications SNS postings have on private employers concerning the off-duty, non-work related conduct of their employees. This argument recognizes that an employee is entitled to engage in whatever legal off-duty conduct he chooses, so long as the behavior does not damage his employer's legitimate business interests. An employer should not be able to use information gleaned from an employee's SNS postings, unrelated to an employer's business interests, to punish an employee for her choices outside the work place. Disciplining or terminating an employee for his off-duty lifestyle choices permits the morals and standards of the employer …


Policing The Social Media Water Cooler: Recent Nlrb Decisions Should Make Employers Think Twice Before Terminating An Employee For Comments Posted On Social Media Sites, Eric Raphan, Sean Kirby Jan 2014

Policing The Social Media Water Cooler: Recent Nlrb Decisions Should Make Employers Think Twice Before Terminating An Employee For Comments Posted On Social Media Sites, Eric Raphan, Sean Kirby

Journal of Business & Technology Law

No abstract provided.


Beyond Title Vii: Rethinking Race, Ex-Offender Status, And Employment Discrimination In The Information Age, Kimani Paul-Emile Jan 2014

Beyond Title Vii: Rethinking Race, Ex-Offender Status, And Employment Discrimination In The Information Age, Kimani Paul-Emile

Faculty Scholarship

More than sixty-five million people in the United States—more than one in four adults—have had some involvement with the criminal justice system that will appear on a criminal history report. A rapidly expanding, for-profit industry has developed to collect these records and compile them into electronic databases, offering employers an inexpensive and readily accessible means of screening prospective employees. Nine out of ten employers now inquire into the criminal history of job candidates, systematically denying individuals with a criminal record any opportunity to gain work experience or build their job qualifications. This is so despite the fact that many individuals …


The Inalienable Right Of Publicity, Jennifer E. Rothman Nov 2012

The Inalienable Right Of Publicity, Jennifer E. Rothman

All Faculty Scholarship

This article challenges the conventional wisdom that the right of publicity is universally and uncontroversially alienable. Courts and scholars have routinely described the right as a freely transferable property right, akin to patents or copyrights. Despite such broad claims of unfettered alienability, courts have limited the transferability of publicity rights in a variety of instances. No one has developed a robust account of why such limits should exist or what their contours should be. This article remedies this omission and concludes that the right of publicity must have significantly limited alienability to protect the rights of individuals to control the …


Electronic Privacy And Employee Speech, Pauline T. Kim Jun 2012

Electronic Privacy And Employee Speech, Pauline T. Kim

Chicago-Kent Law Review

The boundary between work and private life is blurring as a result of changes in the organization of work and advances in technology. Current privacy law is ill-equipped to address these changes and as a result, employees' privacy in their electronic communications is only weakly protected from employer scrutiny. At the same time, the law increasingly protects certain socially valued forms of employee speech. In particular, collective speech, speech that enforces workplace regulations and speech that deters or reports employer wrong-doing are explicitly protected by law from employer reprisals. These two developments—weak protection of employee privacy and increased protection for …


The Need To Prevent Employers From Accessing Private Social Network Profiles, Brett Novick Jan 2012

The Need To Prevent Employers From Accessing Private Social Network Profiles, Brett Novick

University of Michigan Journal of Law Reform Caveat

In March 2012, social network privacy became a conversation topic after news reports of the story of Justin Bassett, a job applicant who withdrew his application in the middle of an interview when the interviewer asked him for the username and password of his private Facebook account. Although the issue has received much attention from the public and media, the Department of Justice (DOJ) has stated that it has no interest in prosecuting employers for asking for social networking account information. Fortunately, legislation that would make it illegal for employers to ask for the username and passwords for social networking …


Intrusive Monitoring: Employee Privacy Expectations Are Reasonable In Europe, Destroyed In The United States, Lothar Determann, Robert Sprague Dec 2010

Intrusive Monitoring: Employee Privacy Expectations Are Reasonable In Europe, Destroyed In The United States, Lothar Determann, Robert Sprague

Robert Sprague

This Article examines the contrasting policy and legal frameworks relating to data privacy in the United States and the European Union, with a particular focus on workplace privacy and intrusive surveillance technologies and practices. It examines the U.S. perspective on modern work-related employer monitoring practices, the laws giving rise to possible employee privacy rights, and specific types of employer monitoring that may lead to actionable invasions of employee privacy rights. This article then addresses the issue of employee privacy from the EU perspective, beginning with an overview of the formation of authority to protect individual privacy rights, followed by an …


Invasion Of The Social Networks: Blurring The Line Between Personal Life And The Employment Relationship, Robert Sprague Dec 2010

Invasion Of The Social Networks: Blurring The Line Between Personal Life And The Employment Relationship, Robert Sprague

Robert Sprague

Over one-half billion people worldwide have registered accounts with Facebook, the most popular online social network. This article addresses some of the more significant employment-related legal issues arising from the growing popularity of online social networks. First, the need for employers to investigate the background of prospective employees is examined from the context of employers using online social networks to conduct those investigations. In particular, this article analyzes the degree to which job applicants have privacy rights in the information they post online. This article then examines the interrelationship between online social networks and employees, focusing on limitations faced by …


Gina's Genotypes, David H. Kaye Jan 2010

Gina's Genotypes, David H. Kaye

Michigan Law Review First Impressions

In August 2009, the Board of Trustees of the University of Akron added to the university's employment policy the following proviso: "any applicant may be asked to submit fingerprints or DNA sample for purpose of a federal criminal background check." Although the federal government does not do background checks with DNA, the policy is significant because it highlights a largely unexplored feature of the Genetic Information Nondiscrimination Act of 2008 ("GINA"). Hailed by the late Senator Edward Kennedy as "the first civil rights bill of the new century of life sciences," GINA generally prohibits employers from asking for "genetic information." …


Electronic Surveillance In The Global Workplace: Laws, Ethics, Research And Practice, Roland Kidwell, Robert Sprague Dec 2008

Electronic Surveillance In The Global Workplace: Laws, Ethics, Research And Practice, Roland Kidwell, Robert Sprague

Robert Sprague

This paper considers the legal, ethical and cultural factors that must be addressed in evaluating the appropriateness of employing electronic surveillance (ES) in varying international contexts. It critically evaluates the rationale that underlies the use of ES in a variety of settings and types of organisations. It suggests guidelines for the adoption and use of ES and potential directions for future research.


The Fair Use Doctrine And Trackjacking: Beautiful Animal Or Destroyer Of Worlds?, S. Wayne Clemons, Jr. Jan 2008

The Fair Use Doctrine And Trackjacking: Beautiful Animal Or Destroyer Of Worlds?, S. Wayne Clemons, Jr.

Vanderbilt Journal of Entertainment & Technology Law

"Trackjacking" is the unauthorized replacement of the original soundtrack of an audiovisual recording, such as a movie or television show, with another that is designed to alter substantially the plot and/or characters of the original work. While trackjacking is a creative and entertaining form of art, it may also constitute copyright infringement if the original work is one that is copyrighted. However, if certain criteria are met, the "fair use" doctrine provides a mechanism for courts to excuse what otherwise would be considered copyright infringement. Because the unique nature of trackjacking allows the new work to be distributed in such …


Six Clicks Of Separation: The Legal Ramifications Of Employers Using Social Networking Sites To Research Applicants, Ian Byrnside Jan 2008

Six Clicks Of Separation: The Legal Ramifications Of Employers Using Social Networking Sites To Research Applicants, Ian Byrnside

Vanderbilt Journal of Entertainment & Technology Law

As social networking sites like Facebook.com and MySpace.com continue to grow in popularity, college students and other job applicants voluntarily divulge an increasing amount of personal information on them, often unaware of the potential negative effects it may have on their search for employment. Employers are beginning to take note of this trend and are increasingly using applicants' social networking profiles to supplement traditional application information. Many applicants feel that employers should not base employment decisions on social networking profiles in any way and believe that it is illegal for employers to do so. Yet, it appears that employers that …


Rethinking Information Privacy In An Age Of Online Transparency, Robert Sprague Dec 2007

Rethinking Information Privacy In An Age Of Online Transparency, Robert Sprague

Robert Sprague

No abstract provided.


Fired For Blogging: Are There Legal Protections For Employees Who Blog?, Robert Sprague Dec 2006

Fired For Blogging: Are There Legal Protections For Employees Who Blog?, Robert Sprague

Robert Sprague

No abstract provided.


From Taylorism To The Omnipticon: Expanding Employee Surveillance Beyond The Workplace, Robert Sprague Dec 2006

From Taylorism To The Omnipticon: Expanding Employee Surveillance Beyond The Workplace, Robert Sprague

Robert Sprague

No abstract provided.


No Direction Home: Will The Law Keep Pace With Human Tracking Technology To Protect Individual Privacy And Stop Geoslavery, William A. Herbert Jul 2006

No Direction Home: Will The Law Keep Pace With Human Tracking Technology To Protect Individual Privacy And Stop Geoslavery, William A. Herbert

Publications and Research

Increasingly, public and private employers are utilizing human tracking devices to monitor employee movement and conduct. Due to the propensity of American labor law to give greater weight toemployer property interests over most employee privacy expectations, there are currently few limitations on the use of human tracking in employment. The scope and nature of current legal principles regarding individual privacy are not sufficient to respond to the rapid development and use of human tracking technology. The academic use of the phrase “geoslavery” to describe the abusive use of such technology underscores its power. This article examines the use of such …