Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

University of Michigan Journal of Law Reform

Journal

Articles 1 - 25 of 25

Full-Text Articles in Privacy Law

Giving The Fourth Amendment Meaning: Creating An Adversarial Warrant Proceeding To Protect From Unreasonable Searches And Seizures, Ben Mordechai-Strongin Apr 2023

Giving The Fourth Amendment Meaning: Creating An Adversarial Warrant Proceeding To Protect From Unreasonable Searches And Seizures, Ben Mordechai-Strongin

University of Michigan Journal of Law Reform

For at least the past 40 years, police and prosecutors have had free reign in conducting illegal searches and seizures nominally barred by the Fourth Amendment. The breadth of exceptions to the warrant requirement, the lax interpretation of probable cause, and especially the “good faith” doctrine announced in U.S. v. Leon have led to severe violations of privacy rights, trauma to those wrongly searched or seized, and a court system overburdened by police misconduct cases. Most scholars analyzing the issue agree that the rights guaranteed by the Fourth Amendment—to be free from unreasonable search and seizure—have been severely eroded or …


Remarks, Andrea Dennis Jun 2022

Remarks, Andrea Dennis

University of Michigan Journal of Law Reform

Over the course of one week, the Michigan Journal of Law Reform presented its annual Symposium, this year titled Reimagining Police Surveillance: Protecting Activism and Ending Technologies of Oppression. During this week, the Journal explored complicated questions surrounding the expansion of police surveillance technologies, including how police and federal agencies utilize their extensive resources to identify and surveil public protest, the ways in which technology employed by police is often flawed and disparately impacts people of color, and potential reforms of police surveillance technology. Before delving into these complicated questions, I presented remarks on the history of police surveillance …


Suspect Development Systems: Databasing Marginality And Enforcing Discipline, Rashida Richardson, Amba Kak Jun 2022

Suspect Development Systems: Databasing Marginality And Enforcing Discipline, Rashida Richardson, Amba Kak

University of Michigan Journal of Law Reform

Algorithmic accountability law—focused on the regulation of data-driven systems like artificial intelligence (AI) or automated decision-making (ADM) tools—is the subject of lively policy debates, heated advocacy, and mainstream media attention. Concerns have moved beyond data protection and individual due process to encompass a broader range of group-level harms such as discrimination and modes of democratic participation. While a welcome and long overdue shift, the current discourse ignores systems like databases, which are viewed as technically “rudimentary” and often siloed from regulatory scrutiny and public attention. Additionally, burgeoning regulatory proposals like algorithmic impact assessments are not structured to surface important –yet …


Fighting Global Surveillance: Lessons From The American Muslim Community, Danna Z. Elmasry Jun 2022

Fighting Global Surveillance: Lessons From The American Muslim Community, Danna Z. Elmasry

University of Michigan Journal of Law Reform

The United States government has been spying on its citizens through a massive surveillance infrastructure that is unrestricted to a particular target or suspicion of wrongdoing. The statutory and regulatory authorities responsible for this infrastructure are sprawling and often secret. Built-in limitations and oversight mechanisms are riddled with loopholes or inaccessible due to exceedingly high thresholds. Litigation challenges to surveillance overreach often fail at standing. Under the current doctrine, plaintiffs must show that their own communications have been surveilled by a specific surveillance program. This Note contributes to surveillance reform by proposing a private right of action that sets the …


“Bang!”: Shotspotter Gunshot Detection Technology, Predictive Policing, And Measuring Terry’S Reach, Harvey Gee Jun 2022

“Bang!”: Shotspotter Gunshot Detection Technology, Predictive Policing, And Measuring Terry’S Reach, Harvey Gee

University of Michigan Journal of Law Reform

ShotSpotter technology is a rapid identification and response system used in ninety American cities that is designed to detect gunshots and dispatch police. ShotSpotter is one of many powerful surveillance tools used by local police departments to purportedly help fight crime, but they often do so at the expense of infringing upon privacy rights and civil liberties. This Article expands the conversation about ShotSpotter technology considerably by examining the adjacent Fourth Amendment issues emanating from its use. For example, law enforcement increasingly relies on ShotSpotter to create reasonable suspicion where it does not exist. In practice, the use of ShotSpotter …


Another Katz Moment?: Privacy, Property, And A Dna Database, Claire Mena Apr 2022

Another Katz Moment?: Privacy, Property, And A Dna Database, Claire Mena

University of Michigan Journal of Law Reform

The Fourth Amendment protects the “right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures.” The understanding of these words seems to shift as new technologies emerge. As law enforcement’s arsenal of surveillance techniques has grown to include GPS tracking, cell phones, and cell site location information (CSLI), the Supreme Court has applied Fourth Amendment protections to these modern tools. Law enforcement continues to use one pervasive surveillance technique without limitations: the routine collection of DNA. In 2013, the Supreme Court in Maryland v. King held that law enforcement may routinely …


Automating Threat Sharing: How Companies Can Best Ensure Liability Protection When Sharing Cyber Threat Information With Other Companies Or Organizations, Ari Schwartz, Sejal C. Shah, Matthew H. Mackenzie, Sheena Thomas, Tara Sugiyama Potashnik, Bri Law Jun 2017

Automating Threat Sharing: How Companies Can Best Ensure Liability Protection When Sharing Cyber Threat Information With Other Companies Or Organizations, Ari Schwartz, Sejal C. Shah, Matthew H. Mackenzie, Sheena Thomas, Tara Sugiyama Potashnik, Bri Law

University of Michigan Journal of Law Reform

This Article takes an in-depth look at the evolution of cybersecurity information sharing legislation, leading to the recent passage of the Cybersecurity Information Sharing Act (CISA) and offers insights into how automated information sharing mechanisms and associated requirements implemented pursuant to CISA can be leveraged to help ensure liability protections when engaging in cyber threat information sharing with and amongst other non-federal government entities.


Protecting Personal Information: Achieving A Balance Between User Privacy And Behavioral Targeting, Patrick Myers Jan 2016

Protecting Personal Information: Achieving A Balance Between User Privacy And Behavioral Targeting, Patrick Myers

University of Michigan Journal of Law Reform

Websites and mobile applications provide immeasurable benefits to both users and companies. These services often collect vast amounts of personal information from the individuals that use them, including sensitive details such as Social Security numbers, credit card information, and physical location. Personal data collection and dissemination leave users vulnerable to various threats that arise from the invasion of their privacy, particularly because users are often ignorant of the existence or extent of these practices. Current privacy law does not provide users with adequate protection from the risks attendant to the collection and dissemination of their personal information. This Note advocates …


What Common Law And Common Sense Teach Us About Corporate Cybersecurity, Stephanie Balitzer Jan 2016

What Common Law And Common Sense Teach Us About Corporate Cybersecurity, Stephanie Balitzer

University of Michigan Journal of Law Reform

This Note examines the challenges of corporate cyberdefense and suggests an approach to mitigate them. Part I outlines the background of the corporate cyberdefense quandary and various cyberdefense strategies. Part II explores the current landscape of cybersecurity law in the United States and the regulatory infrastructure that governs cybercrimes. Part II also surveys case law that illustrates the legal loopholes and ambiguities corporations face when implementing cybersecurity measures. Finally, Part III argues that the proposed active defense model fails to comport with practical concerns and established legal principles. This Note’s comparative analysis of common law ‘defense of property’ principles and …


Social Media And The Job Market: How To Reconcile Applicant Privacy With Employer Needs, Peter B. Baumhart Jan 2015

Social Media And The Job Market: How To Reconcile Applicant Privacy With Employer Needs, Peter B. Baumhart

University of Michigan Journal of Law Reform

In the modern technological age, social media allows us to communicate vast amounts of personal information to countless people instantaneously. This information is valuable to more than just our “friends” and “followers,” however. Prospective employers can use this personal data to inform hiring decisions, thereby maximizing fit and minimizing potential liability. The question then arises, how best to acquire this information? For job applicants, the counter-question is how best to protect the privacy of their social media accounts. As these two competing desires begin to clash, it is important to find a method to mediate the conflict. Existing privacy law, …


Protecting Anonymous Expression: The Internet's Role In Washington State's Disclosure Laws And The Direct Democracy Process, Karen Cullinane Jul 2011

Protecting Anonymous Expression: The Internet's Role In Washington State's Disclosure Laws And The Direct Democracy Process, Karen Cullinane

University of Michigan Journal of Law Reform

This Note proposes that the Washington State Legislature amend its Public Records Act to exempt from public disclosure personal information legally required to be disclosed by signers of referendum petitions. This Note also proposes that the Washington State Legislature designate an electronic system, to be detailed in its election law, by which referendum petitions can be checked for fraud without violating the right to anonymous expression protected by the First Amendment. Part I describes Washington State's referendum process and the path of Doe v. Reed, the case animating the reform presented in this Note. Part II illustrates how the rise …


Privacy 3.0-The Principle Of Proportionality, Andrew B. Serwin Jul 2009

Privacy 3.0-The Principle Of Proportionality, Andrew B. Serwin

University of Michigan Journal of Law Reform

Individual concern over privacy has existed as long as humans have said or done things they do not wish others to know about. In their groundbreaking law review article The Right to Privacy, Warren and Brandeis posited that the common law should protect an individual's right to privacy under a right formulated as the right to be let alone-Privacy 1.0. As technology advanced and societal values also changed, a belief surfaced that the Warren and Brandeis formulation did not provide sufficient structure for the development of privacy laws. As such, a second theoretical construct of privacy, Privacy 2.0 as …


The Absentee Ballot And The Secret Ballot: Challenges For Election Reform, John C. Fortier, Norman J. Ornstein Apr 2003

The Absentee Ballot And The Secret Ballot: Challenges For Election Reform, John C. Fortier, Norman J. Ornstein

University of Michigan Journal of Law Reform

Reforms in the recently enacted federal election reform legislation primarily address improving voting at a polling place, but there is a growing share of the electorate who vote away from the polling place through increased use of absentee ballots and vote-by-mail systems. Voters who vote away from the polling place do not have the same protections as those at the polling place. In particular, these voters do not have a secret ballot, as any ballot cast without a drawn curtain behind oneself is potentially subject to coercion, vote buying and fraud.

This Article looks at the tension between the Australian …


In Light Of Reason And Experience: Against A Crime Fraud Exception To The Psychotherapist-Patient Privilege, Catherine Thompson Dobrowitsky May 2002

In Light Of Reason And Experience: Against A Crime Fraud Exception To The Psychotherapist-Patient Privilege, Catherine Thompson Dobrowitsky

University of Michigan Journal of Law Reform

This Note argues against the adoption of a crime fraud exception to the federal psychotherapist-patient privilege. Part I argues that the restrictive legal elements of the privilege adequately exclude fraudulent or criminal statements from protection. Part II addresses the needed distinction between the dangerous patient exception and the crime fraud exception to the psychotherapist-patient privilege and concludes that the adoption of a crime fraud exception would threaten a limited dangerous patient exception. Part III contends that the policies underlying the attorney-client and psychotherapist-patient privileges must be distinguished and do not merit a shared crime fraud exception. This Note concludes that …


Reforming The Ncaa Drug-Testing Program To Withstand State Constitutional Scrutiny: An Analysis And Proposal, Thomas P. Simon Oct 1990

Reforming The Ncaa Drug-Testing Program To Withstand State Constitutional Scrutiny: An Analysis And Proposal, Thomas P. Simon

University of Michigan Journal of Law Reform

Shortly after year-round testing went into effect, the California Court of Appeal held that the NCAA's original drug testing program violated a student-athlete's right of privacy as protected by the California Constitution. This Note examines the impact of that decision and attempts to design a program that will withstand state constitutional scrutiny. Part I describes the current NCAA drug-testing program. Part II looks at the fourth amendment argument against drug testing of student-athletes. Part III assesses the viability of a federal constitutional attack on NCAA testing, while Part IV discusses a state constitutional challenge. Finally, Part V proposes reform of …


Public Employees Or Private Citizens: The Off-Duty Sexual Activities Of Police Officers And The Constitutional Right Of Privacy, Michael A. Woronoff Oct 1984

Public Employees Or Private Citizens: The Off-Duty Sexual Activities Of Police Officers And The Constitutional Right Of Privacy, Michael A. Woronoff

University of Michigan Journal of Law Reform

This Note proposes a framework for dealing with problems in this area in a manner which best balances the competing interests involved. It argues that, while there is no explicit constitutional guarantee of privacy, the state is not free to regulate all aspects of a police officer's otherwise legal, off-duty, sexual activity. Part I of the Note examines several possible sources of a constitutional right of privacy. It concludes that, although many of the courts which invalidate state regulation of police officers' off-duty sexual activity do so on the basis of some constitutional right of privacy, any implied fundamental right …


Narrowing The "Routine Use" Exemption To The Privacy Act Of 1974, John W. Finger Oct 1980

Narrowing The "Routine Use" Exemption To The Privacy Act Of 1974, John W. Finger

University of Michigan Journal of Law Reform

This article suggests a balancing test to determine which routine uses of information legitimately fall within the Privacy Act. Part I briefly examines the background of the Act, concentrating on the legislative history of the routine use exemption, and examining problems the exemption presents. Part II then proposes a balancing test, based on notice and need for data, as a means of ascertaining proper routine uses.


Police Use Of Cctv Surveillance: Constitutional Implications And Proposed Regulations, Gary C. Robb Apr 1980

Police Use Of Cctv Surveillance: Constitutional Implications And Proposed Regulations, Gary C. Robb

University of Michigan Journal of Law Reform

This article evaluates the constitutionality of CCTV "searches." Part I discusses the present uses being made of closed circuit technology and evaluates the merits of the CCTV surveillance system. The critical policy trade-off is the system's effectiveness in combatting crime against the resulting loss of privacy to individual citizens.

Part II considers the constitutional implications of CCTV use in terms of three major doctrines: the Fourth Amendment prohibition against "unreasonable searches and seizures"; the constitutional right of privacy; and the First Amendment guarantees of free speech and association. This part briefly summarizes the state of the law concerning these constitutional …


The Right To Financial Privacy Act Of 1978-The Congressional Response To United States V. Miller: A Procedural Right To Challenge Government Access To Financial Records, Nancy M. Kirschner Oct 1979

The Right To Financial Privacy Act Of 1978-The Congressional Response To United States V. Miller: A Procedural Right To Challenge Government Access To Financial Records, Nancy M. Kirschner

University of Michigan Journal of Law Reform

This article will review the factors leading to the Miller decision and the legislative response to that decision. Part I will examine the bank customer's expectation of privacy and the way Miller affects this expectation. Part II will discuss the congressional response to Miller and the competing interests which led to the Right to Financial Privacy Act. The Act itself will be discussed in detail in Part III. Part IV will evaluate the Act, and offer recommendations for reform. The article concludes that the Act, by adopting a purely procedural approach, fails to provide adequate protection to bank customers.


Parental Notification As A Prerequisite For Minors' Access To Contraceptives: A Behavioral And Legal Analysis, Michael N. Finger Oct 1979

Parental Notification As A Prerequisite For Minors' Access To Contraceptives: A Behavioral And Legal Analysis, Michael N. Finger

University of Michigan Journal of Law Reform

This article examines whether the constitutional right of parents to determine what is best for their children prevents the state from permitting minors access to contraceptives without notifying their parents. Part I examines the effect of the presence or absence of a notice requirement upon the interests of parents, minors, and the state. Part II reviews the development of the constitutional right of privacy and the impact of parental rights and state interests on the extension of privacy rights to minors. Part III considers the manner in which the interests of minors, parents, and the state should be balanced. The …


Scope Of Disclosure Of Internal Revenue Communications And Information Files Under The Freedom Of Information Act, Peter R. Spanos Jan 1975

Scope Of Disclosure Of Internal Revenue Communications And Information Files Under The Freedom Of Information Act, Peter R. Spanos

University of Michigan Journal of Law Reform

This article will discuss the proper scope of disclosure under the Freedom of Information Act of the files and administrative and policy materials of the IRS, with particular attention to the following currently contested issues: (1) the extent to which IRS guideline documents and private letter rulings are subject to disclosure; (2) the proper scope of the FOIA exemption for "interagency or intra-agency memorandums or letters which would not be available by law to a party other than an agency in litigation with the agency" as applied to the IRS; and (3) the scope of the exemption for "investigatory records …


Protection Of Privacy Of Computerized Records In The National Crime Information Center, Stuart R. Hemphill Jan 1974

Protection Of Privacy Of Computerized Records In The National Crime Information Center, Stuart R. Hemphill

University of Michigan Journal of Law Reform

The purpose of this article is to describe the social benefits and costs of the NCIC and to indicate the need for a program of operational controls to temper the system's impact on the balance between individual privacy and law enforcement needs. Various approaches which could be incorporated into a program of safeguards are introduced and briefly analyzed. Finally, the article discusses several overall design issues which should be considered in the construction of an adequate program of safeguards. Particular emphasis is placed on the NCCH file since it is the major source of the tensions underlying the issues addressed.


A Suggested Legislative Device For Dealing With Abuses Of Criminal Records, Walter W. Steele Jr. Jan 1972

A Suggested Legislative Device For Dealing With Abuses Of Criminal Records, Walter W. Steele Jr.

University of Michigan Journal of Law Reform

There are pitfalls apparent in ameliorating the overuse of criminal records. For example, techniques of expunging, sealing, and limiting access do not affect legal status. No amount of expunging, or sealing, or limiting access is truly useful unless civil rights, such as the right to vote, are restored as well. Another problem is the inherent breadth of a criminal record, which can involve acts or allegations of acts ranging from traffic offenses to murder or rape. Thus, it is difficult to draw precise guidelines delineating those parts of the record which may be legitimately used. The apparently illegitimate use of …


The Concept Of Privacy And The Fourth Amendment, Steven C. Douse Jan 1972

The Concept Of Privacy And The Fourth Amendment, Steven C. Douse

University of Michigan Journal of Law Reform

This Article attempts at a minimum to offer a common background and frame of reference for defining and comparing myriad facets of the law. If successful, they furnish a model for the integration of these many facets. This inquiry begins with an examination of the proposition that the essence of the fourth amendment is protection of a right of privacy. The concept of privacy is then defined and elaborated, both without and within the constitutional context. These conclusions are further extended in an exploration of mechanisms for defining the invasions and protection of fourth amendment privacy.


The Newsman's Privilege: Protection Of Confidential Associations And Private Communications, Wayne C. Dabb Jr., Peter A. Kelly Jan 1970

The Newsman's Privilege: Protection Of Confidential Associations And Private Communications, Wayne C. Dabb Jr., Peter A. Kelly

University of Michigan Journal of Law Reform

The purpose of this comment is to determine whether the confidential associations and-or private communications of a newsman are privileged.