Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Privacy Law

The Double-Helix Double-Edged Sword: Comparing Dna Retention Policies Of The United States And The United Kingdom, Erica S. Deray Jan 2011

The Double-Helix Double-Edged Sword: Comparing Dna Retention Policies Of The United States And The United Kingdom, Erica S. Deray

Vanderbilt Journal of Transnational Law

Forensic scientists have used DNA profiling technologies to link suspects to crimes since Alec Jeffreys first proposed the idea in the 1970s. Recognizing the potential for using DNA databases to solve crimes and to prevent future crimes, England and Wales attempted to greatly expand its DNA database by allowing for the collection and indefinite retention of DNA profiles from arrestees. The European Court of Human Rights, however, issued a ruling in 2008 in the case of S. & Marper v. United Kingdom, advising the United Kingdom to restrict use of DNA profiles from arrestees and to establish time frames for …


Civilians In Cyberwarfare: Conscripts, Susan W. Brenner, Leo L. Clarke Jan 2010

Civilians In Cyberwarfare: Conscripts, Susan W. Brenner, Leo L. Clarke

Vanderbilt Journal of Transnational Law

Civilian-owned and -operated entities will almost certainly be a target in cyberwarfare because cyberattackers are likely to be more focused on undermining the viability of the targeted state than on invading its territory. Cyberattackers will probably target military computer systems, at least to some extent, but in a departure from traditional warfare, they will also target companies that operate aspects of the victim nation's infrastructure. Cyberwarfare, in other words, will penetrate the territorial borders of the attacked state and target high-value civilian businesses. Nation-states will therefore need to integrate the civilian employees of these (and perhaps other) companies into their …


The Headscarf As Threat: A Comparison Of German And U.S. Legal Discourses, Robert A. Kahn Jan 2007

The Headscarf As Threat: A Comparison Of German And U.S. Legal Discourses, Robert A. Kahn

Vanderbilt Journal of Transnational Law

This Article compares how U.S. and German judges conceptualize the harm the headscarf poses to society. The examples are the 2003 Ludin case, in which the German Federal Constitutional Court held that the civil service, in the absence of state regulation, could not reject a woman from a civil service teaching position solely because she would not remove her headscarf while teaching, and State v. Freeman, in which a Florida court held that a woman could not pose for a driver's license photograph wearing a garment (the niqab) that covered all of her face except her eyes. While judges and …


Japan's Communications Interception Act: Unconstitutional Invasion Of Privacy Or Necessary Tool?, Lillian R. Gilmer Jan 2002

Japan's Communications Interception Act: Unconstitutional Invasion Of Privacy Or Necessary Tool?, Lillian R. Gilmer

Vanderbilt Journal of Transnational Law

In August 1999, Japan became the last of the G8 nations to pass legislation to allow law enforcement to wiretap communications. For some, passage of the law was long overdue; for others, its passage marked the beginning of an impermissible government encroachment on civil rights. This Note examines Japan's Communications Interception Act, the forces in Japanese society creating the need for the law, and the reasons why the law is being challenged. Part II examines the policy behind the law, its history, and public reaction to the law. Part III presents the history of organized crime in Japan, and a …


The Constitutionality Of The Foreign Intelligence Surveillance Act Of 1978, Judith B. Anderson Jan 1983

The Constitutionality Of The Foreign Intelligence Surveillance Act Of 1978, Judith B. Anderson

Vanderbilt Journal of Transnational Law

Within its more limited scope, the Belfield decision provides a helpful approach to FISA cases by articulating both a solid rationale for FISA's in camera, ex parte provision and a workable balancing approach for determining whether open proceedings may be necessary. The Falvey decision, although broader in scope, does not provide a satisfactory rationale for FISA's deviation from the traditional fourth amendment warrant requirement, nor does it articulate a workable approach to evaluating a FISA-warranted surveillance. The Falvey court, by predicating its upholding of FISA on an acceptance of the national security exception, may perpetuate a debate that the statute …


Recent Treaties, James H. Bloem Jan 1974

Recent Treaties, James H. Bloem

Vanderbilt Journal of Transnational Law

To obtain information on the financial dealings of organized crime in Switzerland, the United States must show both probable cause and the absence of a reasonable possibility of conviction without the information. Thus, Switzerland has preserved its prudent and traditional requirement of secrecy with respect to transactions of those who utilize its financial institutions. Because the Treaty was drafted in two different legal environments, conflicts may rise under it. The limitation on use of any disclosed information to investigations or proceedings for which the information originally was granted does not coincide with the United States rule of evidence that allows …