Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Journal

Privacy

Discipline
Institution
Publication Year
Publication

Articles 331 - 360 of 366

Full-Text Articles in Privacy Law

Japan's Communications Interception Act: Unconstitutional Invasion Of Privacy Or Necessary Tool?, Lillian R. Gilmer Jan 2002

Japan's Communications Interception Act: Unconstitutional Invasion Of Privacy Or Necessary Tool?, Lillian R. Gilmer

Vanderbilt Journal of Transnational Law

In August 1999, Japan became the last of the G8 nations to pass legislation to allow law enforcement to wiretap communications. For some, passage of the law was long overdue; for others, its passage marked the beginning of an impermissible government encroachment on civil rights. This Note examines Japan's Communications Interception Act, the forces in Japanese society creating the need for the law, and the reasons why the law is being challenged. Part II examines the policy behind the law, its history, and public reaction to the law. Part III presents the history of organized crime in Japan, and a …


Privacy, Eh! The Impact Of Canada's Personal Information Protection And Electronic Documents Act On Transnational Business, Juliana M. Spaeth, Mark J. Plotkin, Sandra C. Sheets Jan 2002

Privacy, Eh! The Impact Of Canada's Personal Information Protection And Electronic Documents Act On Transnational Business, Juliana M. Spaeth, Mark J. Plotkin, Sandra C. Sheets

Vanderbilt Journal of Entertainment & Technology Law

In 2002, the requirements imposed by PIPEDA will extend to encompass all personal health information. PIPEDA will ultimately extend to the collection, use, or disclosure of all personal information in the course of any commercial activity within a province in 2004. This change in Canadian law carries significant consequences for the general business practices of American companies that conduct, or may conduct, business with Canadians. It is therefore crucial for lawyers with clients collecting personal data on- and offline to familiarize themselves with its requirements in order to counsel clients effectively about their current and future obligations under this privacy …


The Emergence Of Website Privacy Norms, Steven A. Hetcher Jun 2001

The Emergence Of Website Privacy Norms, Steven A. Hetcher

Michigan Telecommunications & Technology Law Review

Part I of the Article will first look at the original privacy norms that emerged at the Web's inception in the early 1990s. Two groups have been the main contributors to the emergence of these norms; the thousands of commercial websites on the early Web, on the one hand, and the millions of users of the early Web, on the other hand. The main structural feature of these norms was that websites benefitted through the largely unrestricted collection of personal data while consumers suffered injury due to the degradation of their personal privacy from this data collection. In other words, …


Criminalization Of True Anonymity In Cyberspace, The, George F. Du Pont Jun 2001

Criminalization Of True Anonymity In Cyberspace, The, George F. Du Pont

Michigan Telecommunications & Technology Law Review

The question of whether a state or the federal government can create a narrowly tailored restriction on cyberspace anonymity without violating the First Amendment remains unresolved[...]The Supreme Court has not directly addressed the issue, but it may soon consider the constitutionality of criminalizing certain kinds of cyber-anonymity in light of the unique nature of cyberspace. This comment explores the various forms of anonymity, examines the First Amendment status of anonymity in and outside of cyberspace, analyzes relevant scholarly commentary, and concludes that a narrowly tailored legislative restriction on "true" anonymity in cyberspace would not violate the First Amendment.


The Personal Information Protection And Electronic Documents Act: A Lost Opportunity To Democratize Canada's "Technological Society", Tina Piper Oct 2000

The Personal Information Protection And Electronic Documents Act: A Lost Opportunity To Democratize Canada's "Technological Society", Tina Piper

Dalhousie Law Journal

Bill C-6, more recently known as the Personal Information Protection and Electronic Documents Act, is promoted by the Canadian government as privacy legislation to protect Canadians' personal information. This paper explores that characterization and concludes that it is inaccurate and misleading. The problems that motivated a response by Parliament are the proliferation and commercial importance of personal information, concerns Canadians have about its uncontrolled use by the private sector and the inadequacy of existing law to address those concerns. However, the Act has not responded to these problems. There are several reasons for this, primarily the disproportionate and antidemocratic importance …


Establishing A Legitimate Expectation Of Privacy In Clickstream Data, Gavin Skok Jun 2000

Establishing A Legitimate Expectation Of Privacy In Clickstream Data, Gavin Skok

Michigan Telecommunications & Technology Law Review

This Article argues that Web users should enjoy a legitimate expectation of privacy in clickstream data. Fourth Amendment jurisprudence as developed over the last half-century does not support an expectation of privacy. However, reference to the history of the Fourth Amendment and the intent of its drafters reveals that government investigation and monitoring of clickstream data is precisely the type of activity the Framers sought to limit. Courts must update outdated methods of expectation of privacy analysis to address the unique challenges posed by the Internet in order to fulfill the Amendment's purpose. Part I provides an overview of the …


Privacy And Democracy In Cyberspace, Paul M. Schwartz Nov 1999

Privacy And Democracy In Cyberspace, Paul M. Schwartz

Vanderbilt Law Review

In this Article, Professor Schwartz depicts the widespread, silent collection of personal information in cyberspace. At present, it is impossible to know the fate of the personal data that one generates online. Professor Schwartz argues that this state of affairs degrades the health of a deliberative democracy; it cloaks in dark uncertainty the transmutation of Internet activity into personal information that will follow one into other areas and discourage civic participation. This situation also will have a negative impact on individual self- determination by deterring individuals from engaging in the necessary thinking out loud and deliberation with others upon which …


Building A Community Through Workplace E-Mail: The New Privacy Frontier, Peter Schnaitman Jun 1999

Building A Community Through Workplace E-Mail: The New Privacy Frontier, Peter Schnaitman

Michigan Telecommunications & Technology Law Review

The relatively new technology of electronic mail (e-mail) presents an entirely new issue of workplace privacy. Currently, whether a person has a privacy interest in their workplace e-mail communications is as unsettled an issue as it has been since the technology emerged in the early part of this decade as the preferred mode of communication in the workplace. Indeed, e-mail may soon be the preferred mode of communication in general. This comment will argue that all e-mail users have a privacy interest in workplace e-mail communications and that the current law does not afford e-mail users any type of protection …


Filling The Black Hole Of Cyberspace: Legal Protections For Online Privacy, R. Craig Tolliver Jan 1999

Filling The Black Hole Of Cyberspace: Legal Protections For Online Privacy, R. Craig Tolliver

Vanderbilt Journal of Entertainment & Technology Law

The Internet is a unique and wholly new medium of worldwide human communication. This pronouncement of the United States Supreme Court echoes what most of the American population has known for some time. The emergence of cyberspace has dramatically changed the nature of electronic communications, and consumers are conducting online transactions at a tremendous pace. While this revolution has obviously increased the amount and types of information available to American consumers, it has also achieved a different result: businesses now have access to an unprecedented amount of personal information. In turn, there exists a danger that this information will be …


The Architecture Of Privacy: Remaking Privacy In Cyberspace, Lawrence Lessig Jan 1999

The Architecture Of Privacy: Remaking Privacy In Cyberspace, Lawrence Lessig

Vanderbilt Journal of Entertainment & Technology Law

This is an essay about privacy. My aim is to understand privacy through these two very different ideas. Privacy, in the sense that I mean here, can be described by these two different ideas. It stands in competition with these ideas. It is that part of life that is left after one subtracts, as it were, the monitored and the searchable. A life where less is monitored is a life where more is private; and life where less can (legally or technologically) be searched is also a life where more is private. By understanding the technologies of these two different …


Time Enough - Consequences Of Human Microchip Implantation, Elaine M. Ramesh Sep 1997

Time Enough - Consequences Of Human Microchip Implantation, Elaine M. Ramesh

RISK: Health, Safety & Environment (1990-2002)

Dr. Ramesh argues that microchip implantation is both possible and, for some purposes, desirable and suggests that now is the time to consider strategies for preventing potentially grievous intrusion into personal privacy.


Psychosocial Risks Of Storing And Using Human Tissues In Research, Jon F. Merz Jun 1997

Psychosocial Risks Of Storing And Using Human Tissues In Research, Jon F. Merz

RISK: Health, Safety & Environment (1990-2002)

Dr. Merz argues that genetics technology makes it more compelling that researchers plan more carefully for the collection and disposition of information derived from subjects' tissues and blood.


Honesty, Privacy, And Shame: When Gay People Talk About Other Gay People To Nongay People, David L. Chambers, Steven K. Homer Jan 1997

Honesty, Privacy, And Shame: When Gay People Talk About Other Gay People To Nongay People, David L. Chambers, Steven K. Homer

Michigan Journal of Gender & Law

There is a longstanding convention among lesbians and gay men in the United States: Do not reveal the sexuality of a gay person to a heterosexual person; unless you are certain that the gay person does not regard his sexuality as a secret. Lie if necessary to protect her secret. Violating the convention by "outing" another person is widely considered a serious social sin.


Social Issues Of Genome Innovation And Intellectual Property, Elaine Alma Draper Jun 1996

Social Issues Of Genome Innovation And Intellectual Property, Elaine Alma Draper

RISK: Health, Safety & Environment (1990-2002)

Dr. Draper's focus is the use of personal information derived from genome research. She identifies several potential problems, including access to and control of genetic information, employment discrimination and social stratification. She also recommends possible solutions.


The Consensual Electronic Surveillance Experiment: State Courts React To "United States V. White", Melanie L. Black Dubis Apr 1994

The Consensual Electronic Surveillance Experiment: State Courts React To "United States V. White", Melanie L. Black Dubis

Vanderbilt Law Review

It has long been recognized that a state, if its citizens so chose, may "serve as a laboratory" for economic and social legislation. In an era of new federalism, state courts have experimented by extending individual rights under state constitutions that the United States Supreme Court, beginning with the Burger Court, refused to recognize under the federal constitution. Although this approach has been criticized by the judiciary and academia, it continues to be a driving force in the development of individual rights.

In United States v. White, the Supreme Court held that the police practice of obtaining evidence with warrantless …


Legislative Amendments To The District Of Columbia's Vital Records Act: Medical Cause Of Death Privacy, Suzanne Brette Greene Mar 1994

Legislative Amendments To The District Of Columbia's Vital Records Act: Medical Cause Of Death Privacy, Suzanne Brette Greene

University of the District of Columbia Law Review

No abstract provided.


Whose Genes Are These Anyway?: Familial Conflicts Over Access To Genetic Information, Sonia M. Suter Jun 1993

Whose Genes Are These Anyway?: Familial Conflicts Over Access To Genetic Information, Sonia M. Suter

Michigan Law Review

This Note argues first that courts and legislatures should follow a presumption against mandating disclosure of a person's genetic information to third parties. Second, genetic testing for the benefit of a third party should not, and constitutionally cannot, be compelled. Part I presents an overview of genetics and discusses the special legal and ethical issues genetic testing poses. Part II examines the issue of nonconsensual disclosure to family members, who could potentially use the information from tests that have already been performed. This Part concludes that there should be a presumption against disclosure. Part III examines a related, but different, …


Constitutional Posture Of Canine Sniffs, Lina Shahin Jan 1993

Constitutional Posture Of Canine Sniffs, Lina Shahin

Touro Law Review

No abstract provided.


The Supreme Court As Risk Manager: An Analysis Of Skinner, Todd F. Volyn, James F. Mogan, Lisa M. White Jun 1992

The Supreme Court As Risk Manager: An Analysis Of Skinner, Todd F. Volyn, James F. Mogan, Lisa M. White

RISK: Health, Safety & Environment (1990-2002)

Examining a recent case in which the U.S. Supreme Court approved the collection of blood and urine samples from railroad employees, the authors conclude that, in attempting to improve railroad safety, both majority and minority opinions reflected undue emphasis on technical issues and inadequate attention to the intangible social values underlying traditional Constitutional rights to privacy.


Private Lives, Public Selves, Jean B. Elshtain Nov 1990

Private Lives, Public Selves, Jean B. Elshtain

Vanderbilt Law Review

What of the making public of a letter, what of the vocation of correspondent? Letters are a private genre, belonging in general, Kundera would say, to the domain of intimate life. When they "go public" some boundary is crossed, some violation is committed. Kundera's position hints that the great Oliver Wendell Holmes was perhaps a bit of a monster, seeming in his private life to be very much the "same" man as he was in his public vocation, except for his romantic effulgency with Clare Castletown. Reading this occasionally twittery and school boyish prose in Professor G. Edward White's article, …


The Constitutionality Of An Off-Dutysmoking Ban For Public Employees:Should The State Butt Out?, Elizabeth B. Thompson Mar 1990

The Constitutionality Of An Off-Dutysmoking Ban For Public Employees:Should The State Butt Out?, Elizabeth B. Thompson

Vanderbilt Law Review

During the past several years, restrictions imposed by states, cities,and municipalities on smoking in public areas have survived court challenges and become almost commonplace.' Likewise, both public and private employers have limited smoking in the workplace. A further restriction that seems to be emerging, however, is a refusal by both the state and a growing number of private employers to hire or to continue to employ smokers. These restrictions limit the employee's freedom to smoke not only in the workplace, but also after working hours and within the privacy of the worker's home.

This Note will address the constitutionality of …


Privacy In A Public Society: Human Rights In Conflict, David Clark Esseks May 1989

Privacy In A Public Society: Human Rights In Conflict, David Clark Esseks

Michigan Law Review

A Review of Privacy in a Public Society: Human Rights in Conflict by Richard F. Hixson


Computer Data Banks And Personal Information: Protection Against Negligent Disclosure, Chris Dockrill Mar 1988

Computer Data Banks And Personal Information: Protection Against Negligent Disclosure, Chris Dockrill

Dalhousie Law Journal

The common law has for centuries recognized the protection of certain interests which fall under the rubric of what is commonly referred to as the right of privacy.' While these safeguards have not always satisfied the concerns of the aggrieved individual, they have and continue to afford some measure of protection. The recognition of a need for a more specific means of protecting such interests is more recent in origin, dating to the later part of the last century.


Privatization Of Corrections: Is The State Out On A Limb When The Company Goes Bankrupt?, Cathy E. Holley Mar 1988

Privatization Of Corrections: Is The State Out On A Limb When The Company Goes Bankrupt?, Cathy E. Holley

Vanderbilt Law Review

The incarceration of convicted criminals is an important matter to law enforcement officials and the public at large. Institutional correctional services consume significant governmental energy and resources. In 1983 corrections, including jails, prisons, probation, and parole, cost over 10.4 billion dollars. In 1985 approximately 503,000 people were imprisoned in federal and state correctional facilities.' The provision of prison services must occur on a continuous basis, and space must be available for every convicted criminal. As certain commentators have noted, "[o]ne cannot simply let offenders wait in line for an opening."'Historically, local, state, and federal government has overseen and operated our …


Are Privacy And Public Disclossure Compatible?: The Privacy Exemption To Washington's Freedom Of Information Act—In Re Rosier, 105 Wn. 2d 606, 717 P.2d 1353 (1986), Matthew Edwards Apr 1987

Are Privacy And Public Disclossure Compatible?: The Privacy Exemption To Washington's Freedom Of Information Act—In Re Rosier, 105 Wn. 2d 606, 717 P.2d 1353 (1986), Matthew Edwards

Washington Law Review

In 1972, Washington State voters passed Initiative 276, the Public Disclosure Act, by a substantial margin. The initiative contained four measures intended to open up government, including one designed to ensure public access to government-held records. This measure, popularly known as Washington's Freedom of Information Act (FOIA), provides a mechanism by which individuals can access information held by the government, subject to only a few exemptions. One such exemption prevents disclosure which is an "unreasonable invasion" of personal privacy. The Washington Supreme Court greatly expanded the scope of this personal privacy exemption in In re Rosier. Prior to this decision, …


Privacy, Abortion, And Judicial Review: Haunted By The Ghost Of Lochner, Helen Garfield Apr 1986

Privacy, Abortion, And Judicial Review: Haunted By The Ghost Of Lochner, Helen Garfield

Washington Law Review

This article poses the question whether Lochner can finally be laid to rest without repudiating all applications of substantive due process, particularly protection of privacy and autonomy. The answer to that question requires a closer look at Lochner itself, and then at Griswold, Roe, and a few of the cases in between. The answers suggested by Ely, Perry, Choper, and others will then be discussed. Finally, this article will examine the ideas and ideals of the man who first conceived the common law right of privacy, Justice Louis D. Brandeis.


The Securing Of The Premises Exception: A Search For The Proper Balance, Adam K. Peck Nov 1985

The Securing Of The Premises Exception: A Search For The Proper Balance, Adam K. Peck

Vanderbilt Law Review

This Recent Development argues that although an opinion endorsed by only two justices is not binding precedent, this portion of Segura represents an undesirable departure from the strict protections traditionally afforded a person's privacy interest in the home and leaves lower courts confused about the constitutional limitations on seizures in the home. Part II examines prior Supreme Court opinions that have defined the parameters of permissible warrantless searches and seizures. Part III explores the circuit court opinions that have developed a "securing of the premises"exception. Part IV describes Chief Justice Burger's analysis in Segura. Part V argues that the Chief …


Copyright And The Moral Right: Is An American Marriage Possible?, Roberta R. Kwall Jan 1985

Copyright And The Moral Right: Is An American Marriage Possible?, Roberta R. Kwall

Vanderbilt Law Review

The 1976 Copyright Act (the 1976 Act) embodies the most extensive reforms in the history of our nation's copyright laws. One proposed reform that is noticeably absent from the statutory scheme, however, is the explicit adoption of protections for the personal rights of creators with respect to their works. Instead,the 1976 Act continues this country's tradition of safeguarding only the pecuniary rights of a copyright owner. By assuring the copyright owner the exclusive rights to reproduce and distribute the original work, to prepare derivative works, and to perform and display publicly certain types of copyrighted works, the 1976 Act focuses …


Lost Privacy In The Computer Age: Computer Matching Programs Are Turning Uncle Sam Into Big Brother, Miriam Lapp Azrael Jan 1984

Lost Privacy In The Computer Age: Computer Matching Programs Are Turning Uncle Sam Into Big Brother, Miriam Lapp Azrael

University of Baltimore Law Forum

No abstract provided.


The Constitutionality Of The Foreign Intelligence Surveillance Act Of 1978, Judith B. Anderson Jan 1983

The Constitutionality Of The Foreign Intelligence Surveillance Act Of 1978, Judith B. Anderson

Vanderbilt Journal of Transnational Law

Within its more limited scope, the Belfield decision provides a helpful approach to FISA cases by articulating both a solid rationale for FISA's in camera, ex parte provision and a workable balancing approach for determining whether open proceedings may be necessary. The Falvey decision, although broader in scope, does not provide a satisfactory rationale for FISA's deviation from the traditional fourth amendment warrant requirement, nor does it articulate a workable approach to evaluating a FISA-warranted surveillance. The Falvey court, by predicating its upholding of FISA on an acceptance of the national security exception, may perpetuate a debate that the statute …