Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (94)
- Science and Technology Law (74)
- Fourth Amendment (64)
- Computer Law (51)
- Constitutional Law (50)
-
- Law and Society (37)
- First Amendment (34)
- Intellectual Property Law (32)
- Communications Law (31)
- Criminal Law (22)
- Comparative and Foreign Law (21)
- International Law (21)
- National Security Law (20)
- Legislation (18)
- Supreme Court of the United States (18)
- Health Law and Policy (17)
- Consumer Protection Law (15)
- Criminal Procedure (15)
- State and Local Government Law (15)
- European Law (14)
- Labor and Employment Law (14)
- Torts (14)
- Civil Rights and Discrimination (13)
- Commercial Law (13)
- Other Law (13)
- Human Rights Law (12)
- Law Enforcement and Corrections (12)
- Family Law (11)
- Institution
-
- Vanderbilt University Law School (53)
- University of Michigan Law School (42)
- The Catholic University of America, Columbus School of Law (17)
- Maurer School of Law: Indiana University (13)
- Pepperdine University (13)
-
- Seattle University School of Law (13)
- University of Oklahoma College of Law (11)
- Chicago-Kent College of Law (10)
- Schulich School of Law, Dalhousie University (10)
- Touro University Jacob D. Fuchsberg Law Center (9)
- University of Washington School of Law (9)
- Washington and Lee University School of Law (9)
- Cleveland State University (8)
- Loyola Marymount University and Loyola Law School (8)
- New York Law School (8)
- Northwestern Pritzker School of Law (8)
- University of Georgia School of Law (8)
- University of Miami Law School (8)
- St. Mary's University (5)
- University of Maryland Francis King Carey School of Law (5)
- University of New Hampshire (5)
- University of the District of Columbia School of Law (5)
- William & Mary Law School (5)
- Fordham Law School (4)
- Georgia State University College of Law (4)
- Mitchell Hamline School of Law (4)
- National Law School of India University (4)
- St. John's University School of Law (4)
- The University of Akron (4)
- University of Colorado Law School (4)
- Publication Year
- Publication
-
- Vanderbilt Journal of Entertainment & Technology Law (31)
- Michigan Telecommunications & Technology Law Review (19)
- Vanderbilt Law Review (16)
- Catholic University Journal of Law and Technology (13)
- Chicago-Kent Law Review (10)
-
- Indiana Law Journal (10)
- Michigan Law Review (10)
- Seattle University Law Review (10)
- Touro Law Review (9)
- Washington Law Review (9)
- NYLS Law Review (8)
- Oklahoma Journal of Law and Technology (8)
- Pepperdine Law Review (8)
- Loyola of Los Angeles Law Review (7)
- Vanderbilt Journal of Transnational Law (6)
- Canadian Journal of Law and Technology (5)
- Cleveland State Law Review (5)
- Dalhousie Law Journal (5)
- Georgia Journal of International & Comparative Law (5)
- St. Mary's Law Journal (5)
- Washington and Lee Law Review Online (5)
- Akron Law Review (4)
- Georgia State University Law Review (4)
- Indian Journal of Law and Technology (4)
- Journal of the National Association of Administrative Law Judiciary (4)
- Northwestern University Law Review (4)
- RISK: Health, Safety & Environment (1990-2002) (4)
- St. John's Law Review (4)
- University of Colorado Law Review (4)
- University of Michigan Journal of Law Reform (4)
Articles 331 - 360 of 366
Full-Text Articles in Privacy Law
Japan's Communications Interception Act: Unconstitutional Invasion Of Privacy Or Necessary Tool?, Lillian R. Gilmer
Japan's Communications Interception Act: Unconstitutional Invasion Of Privacy Or Necessary Tool?, Lillian R. Gilmer
Vanderbilt Journal of Transnational Law
In August 1999, Japan became the last of the G8 nations to pass legislation to allow law enforcement to wiretap communications. For some, passage of the law was long overdue; for others, its passage marked the beginning of an impermissible government encroachment on civil rights. This Note examines Japan's Communications Interception Act, the forces in Japanese society creating the need for the law, and the reasons why the law is being challenged. Part II examines the policy behind the law, its history, and public reaction to the law. Part III presents the history of organized crime in Japan, and a …
Privacy, Eh! The Impact Of Canada's Personal Information Protection And Electronic Documents Act On Transnational Business, Juliana M. Spaeth, Mark J. Plotkin, Sandra C. Sheets
Privacy, Eh! The Impact Of Canada's Personal Information Protection And Electronic Documents Act On Transnational Business, Juliana M. Spaeth, Mark J. Plotkin, Sandra C. Sheets
Vanderbilt Journal of Entertainment & Technology Law
In 2002, the requirements imposed by PIPEDA will extend to encompass all personal health information. PIPEDA will ultimately extend to the collection, use, or disclosure of all personal information in the course of any commercial activity within a province in 2004. This change in Canadian law carries significant consequences for the general business practices of American companies that conduct, or may conduct, business with Canadians. It is therefore crucial for lawyers with clients collecting personal data on- and offline to familiarize themselves with its requirements in order to counsel clients effectively about their current and future obligations under this privacy …
The Emergence Of Website Privacy Norms, Steven A. Hetcher
The Emergence Of Website Privacy Norms, Steven A. Hetcher
Michigan Telecommunications & Technology Law Review
Part I of the Article will first look at the original privacy norms that emerged at the Web's inception in the early 1990s. Two groups have been the main contributors to the emergence of these norms; the thousands of commercial websites on the early Web, on the one hand, and the millions of users of the early Web, on the other hand. The main structural feature of these norms was that websites benefitted through the largely unrestricted collection of personal data while consumers suffered injury due to the degradation of their personal privacy from this data collection. In other words, …
Criminalization Of True Anonymity In Cyberspace, The, George F. Du Pont
Criminalization Of True Anonymity In Cyberspace, The, George F. Du Pont
Michigan Telecommunications & Technology Law Review
The question of whether a state or the federal government can create a narrowly tailored restriction on cyberspace anonymity without violating the First Amendment remains unresolved[...]The Supreme Court has not directly addressed the issue, but it may soon consider the constitutionality of criminalizing certain kinds of cyber-anonymity in light of the unique nature of cyberspace. This comment explores the various forms of anonymity, examines the First Amendment status of anonymity in and outside of cyberspace, analyzes relevant scholarly commentary, and concludes that a narrowly tailored legislative restriction on "true" anonymity in cyberspace would not violate the First Amendment.
The Personal Information Protection And Electronic Documents Act: A Lost Opportunity To Democratize Canada's "Technological Society", Tina Piper
Dalhousie Law Journal
Bill C-6, more recently known as the Personal Information Protection and Electronic Documents Act, is promoted by the Canadian government as privacy legislation to protect Canadians' personal information. This paper explores that characterization and concludes that it is inaccurate and misleading. The problems that motivated a response by Parliament are the proliferation and commercial importance of personal information, concerns Canadians have about its uncontrolled use by the private sector and the inadequacy of existing law to address those concerns. However, the Act has not responded to these problems. There are several reasons for this, primarily the disproportionate and antidemocratic importance …
Establishing A Legitimate Expectation Of Privacy In Clickstream Data, Gavin Skok
Establishing A Legitimate Expectation Of Privacy In Clickstream Data, Gavin Skok
Michigan Telecommunications & Technology Law Review
This Article argues that Web users should enjoy a legitimate expectation of privacy in clickstream data. Fourth Amendment jurisprudence as developed over the last half-century does not support an expectation of privacy. However, reference to the history of the Fourth Amendment and the intent of its drafters reveals that government investigation and monitoring of clickstream data is precisely the type of activity the Framers sought to limit. Courts must update outdated methods of expectation of privacy analysis to address the unique challenges posed by the Internet in order to fulfill the Amendment's purpose. Part I provides an overview of the …
Privacy And Democracy In Cyberspace, Paul M. Schwartz
Privacy And Democracy In Cyberspace, Paul M. Schwartz
Vanderbilt Law Review
In this Article, Professor Schwartz depicts the widespread, silent collection of personal information in cyberspace. At present, it is impossible to know the fate of the personal data that one generates online. Professor Schwartz argues that this state of affairs degrades the health of a deliberative democracy; it cloaks in dark uncertainty the transmutation of Internet activity into personal information that will follow one into other areas and discourage civic participation. This situation also will have a negative impact on individual self- determination by deterring individuals from engaging in the necessary thinking out loud and deliberation with others upon which …
Building A Community Through Workplace E-Mail: The New Privacy Frontier, Peter Schnaitman
Building A Community Through Workplace E-Mail: The New Privacy Frontier, Peter Schnaitman
Michigan Telecommunications & Technology Law Review
The relatively new technology of electronic mail (e-mail) presents an entirely new issue of workplace privacy. Currently, whether a person has a privacy interest in their workplace e-mail communications is as unsettled an issue as it has been since the technology emerged in the early part of this decade as the preferred mode of communication in the workplace. Indeed, e-mail may soon be the preferred mode of communication in general. This comment will argue that all e-mail users have a privacy interest in workplace e-mail communications and that the current law does not afford e-mail users any type of protection …
Filling The Black Hole Of Cyberspace: Legal Protections For Online Privacy, R. Craig Tolliver
Filling The Black Hole Of Cyberspace: Legal Protections For Online Privacy, R. Craig Tolliver
Vanderbilt Journal of Entertainment & Technology Law
The Internet is a unique and wholly new medium of worldwide human communication. This pronouncement of the United States Supreme Court echoes what most of the American population has known for some time. The emergence of cyberspace has dramatically changed the nature of electronic communications, and consumers are conducting online transactions at a tremendous pace. While this revolution has obviously increased the amount and types of information available to American consumers, it has also achieved a different result: businesses now have access to an unprecedented amount of personal information. In turn, there exists a danger that this information will be …
The Architecture Of Privacy: Remaking Privacy In Cyberspace, Lawrence Lessig
The Architecture Of Privacy: Remaking Privacy In Cyberspace, Lawrence Lessig
Vanderbilt Journal of Entertainment & Technology Law
This is an essay about privacy. My aim is to understand privacy through these two very different ideas. Privacy, in the sense that I mean here, can be described by these two different ideas. It stands in competition with these ideas. It is that part of life that is left after one subtracts, as it were, the monitored and the searchable. A life where less is monitored is a life where more is private; and life where less can (legally or technologically) be searched is also a life where more is private. By understanding the technologies of these two different …
Time Enough - Consequences Of Human Microchip Implantation, Elaine M. Ramesh
Time Enough - Consequences Of Human Microchip Implantation, Elaine M. Ramesh
RISK: Health, Safety & Environment (1990-2002)
Dr. Ramesh argues that microchip implantation is both possible and, for some purposes, desirable and suggests that now is the time to consider strategies for preventing potentially grievous intrusion into personal privacy.
Psychosocial Risks Of Storing And Using Human Tissues In Research, Jon F. Merz
Psychosocial Risks Of Storing And Using Human Tissues In Research, Jon F. Merz
RISK: Health, Safety & Environment (1990-2002)
Dr. Merz argues that genetics technology makes it more compelling that researchers plan more carefully for the collection and disposition of information derived from subjects' tissues and blood.
Honesty, Privacy, And Shame: When Gay People Talk About Other Gay People To Nongay People, David L. Chambers, Steven K. Homer
Honesty, Privacy, And Shame: When Gay People Talk About Other Gay People To Nongay People, David L. Chambers, Steven K. Homer
Michigan Journal of Gender & Law
There is a longstanding convention among lesbians and gay men in the United States: Do not reveal the sexuality of a gay person to a heterosexual person; unless you are certain that the gay person does not regard his sexuality as a secret. Lie if necessary to protect her secret. Violating the convention by "outing" another person is widely considered a serious social sin.
Social Issues Of Genome Innovation And Intellectual Property, Elaine Alma Draper
Social Issues Of Genome Innovation And Intellectual Property, Elaine Alma Draper
RISK: Health, Safety & Environment (1990-2002)
Dr. Draper's focus is the use of personal information derived from genome research. She identifies several potential problems, including access to and control of genetic information, employment discrimination and social stratification. She also recommends possible solutions.
The Consensual Electronic Surveillance Experiment: State Courts React To "United States V. White", Melanie L. Black Dubis
The Consensual Electronic Surveillance Experiment: State Courts React To "United States V. White", Melanie L. Black Dubis
Vanderbilt Law Review
It has long been recognized that a state, if its citizens so chose, may "serve as a laboratory" for economic and social legislation. In an era of new federalism, state courts have experimented by extending individual rights under state constitutions that the United States Supreme Court, beginning with the Burger Court, refused to recognize under the federal constitution. Although this approach has been criticized by the judiciary and academia, it continues to be a driving force in the development of individual rights.
In United States v. White, the Supreme Court held that the police practice of obtaining evidence with warrantless …
Legislative Amendments To The District Of Columbia's Vital Records Act: Medical Cause Of Death Privacy, Suzanne Brette Greene
Legislative Amendments To The District Of Columbia's Vital Records Act: Medical Cause Of Death Privacy, Suzanne Brette Greene
University of the District of Columbia Law Review
No abstract provided.
Whose Genes Are These Anyway?: Familial Conflicts Over Access To Genetic Information, Sonia M. Suter
Whose Genes Are These Anyway?: Familial Conflicts Over Access To Genetic Information, Sonia M. Suter
Michigan Law Review
This Note argues first that courts and legislatures should follow a presumption against mandating disclosure of a person's genetic information to third parties. Second, genetic testing for the benefit of a third party should not, and constitutionally cannot, be compelled. Part I presents an overview of genetics and discusses the special legal and ethical issues genetic testing poses. Part II examines the issue of nonconsensual disclosure to family members, who could potentially use the information from tests that have already been performed. This Part concludes that there should be a presumption against disclosure. Part III examines a related, but different, …
Constitutional Posture Of Canine Sniffs, Lina Shahin
Constitutional Posture Of Canine Sniffs, Lina Shahin
Touro Law Review
No abstract provided.
The Supreme Court As Risk Manager: An Analysis Of Skinner, Todd F. Volyn, James F. Mogan, Lisa M. White
The Supreme Court As Risk Manager: An Analysis Of Skinner, Todd F. Volyn, James F. Mogan, Lisa M. White
RISK: Health, Safety & Environment (1990-2002)
Examining a recent case in which the U.S. Supreme Court approved the collection of blood and urine samples from railroad employees, the authors conclude that, in attempting to improve railroad safety, both majority and minority opinions reflected undue emphasis on technical issues and inadequate attention to the intangible social values underlying traditional Constitutional rights to privacy.
Private Lives, Public Selves, Jean B. Elshtain
Private Lives, Public Selves, Jean B. Elshtain
Vanderbilt Law Review
What of the making public of a letter, what of the vocation of correspondent? Letters are a private genre, belonging in general, Kundera would say, to the domain of intimate life. When they "go public" some boundary is crossed, some violation is committed. Kundera's position hints that the great Oliver Wendell Holmes was perhaps a bit of a monster, seeming in his private life to be very much the "same" man as he was in his public vocation, except for his romantic effulgency with Clare Castletown. Reading this occasionally twittery and school boyish prose in Professor G. Edward White's article, …
The Constitutionality Of An Off-Dutysmoking Ban For Public Employees:Should The State Butt Out?, Elizabeth B. Thompson
The Constitutionality Of An Off-Dutysmoking Ban For Public Employees:Should The State Butt Out?, Elizabeth B. Thompson
Vanderbilt Law Review
During the past several years, restrictions imposed by states, cities,and municipalities on smoking in public areas have survived court challenges and become almost commonplace.' Likewise, both public and private employers have limited smoking in the workplace. A further restriction that seems to be emerging, however, is a refusal by both the state and a growing number of private employers to hire or to continue to employ smokers. These restrictions limit the employee's freedom to smoke not only in the workplace, but also after working hours and within the privacy of the worker's home.
This Note will address the constitutionality of …
Privacy In A Public Society: Human Rights In Conflict, David Clark Esseks
Privacy In A Public Society: Human Rights In Conflict, David Clark Esseks
Michigan Law Review
A Review of Privacy in a Public Society: Human Rights in Conflict by Richard F. Hixson
Computer Data Banks And Personal Information: Protection Against Negligent Disclosure, Chris Dockrill
Computer Data Banks And Personal Information: Protection Against Negligent Disclosure, Chris Dockrill
Dalhousie Law Journal
The common law has for centuries recognized the protection of certain interests which fall under the rubric of what is commonly referred to as the right of privacy.' While these safeguards have not always satisfied the concerns of the aggrieved individual, they have and continue to afford some measure of protection. The recognition of a need for a more specific means of protecting such interests is more recent in origin, dating to the later part of the last century.
Privatization Of Corrections: Is The State Out On A Limb When The Company Goes Bankrupt?, Cathy E. Holley
Privatization Of Corrections: Is The State Out On A Limb When The Company Goes Bankrupt?, Cathy E. Holley
Vanderbilt Law Review
The incarceration of convicted criminals is an important matter to law enforcement officials and the public at large. Institutional correctional services consume significant governmental energy and resources. In 1983 corrections, including jails, prisons, probation, and parole, cost over 10.4 billion dollars. In 1985 approximately 503,000 people were imprisoned in federal and state correctional facilities.' The provision of prison services must occur on a continuous basis, and space must be available for every convicted criminal. As certain commentators have noted, "[o]ne cannot simply let offenders wait in line for an opening."'Historically, local, state, and federal government has overseen and operated our …
Are Privacy And Public Disclossure Compatible?: The Privacy Exemption To Washington's Freedom Of Information Act—In Re Rosier, 105 Wn. 2d 606, 717 P.2d 1353 (1986), Matthew Edwards
Washington Law Review
In 1972, Washington State voters passed Initiative 276, the Public Disclosure Act, by a substantial margin. The initiative contained four measures intended to open up government, including one designed to ensure public access to government-held records. This measure, popularly known as Washington's Freedom of Information Act (FOIA), provides a mechanism by which individuals can access information held by the government, subject to only a few exemptions. One such exemption prevents disclosure which is an "unreasonable invasion" of personal privacy. The Washington Supreme Court greatly expanded the scope of this personal privacy exemption in In re Rosier. Prior to this decision, …
Privacy, Abortion, And Judicial Review: Haunted By The Ghost Of Lochner, Helen Garfield
Privacy, Abortion, And Judicial Review: Haunted By The Ghost Of Lochner, Helen Garfield
Washington Law Review
This article poses the question whether Lochner can finally be laid to rest without repudiating all applications of substantive due process, particularly protection of privacy and autonomy. The answer to that question requires a closer look at Lochner itself, and then at Griswold, Roe, and a few of the cases in between. The answers suggested by Ely, Perry, Choper, and others will then be discussed. Finally, this article will examine the ideas and ideals of the man who first conceived the common law right of privacy, Justice Louis D. Brandeis.
The Securing Of The Premises Exception: A Search For The Proper Balance, Adam K. Peck
The Securing Of The Premises Exception: A Search For The Proper Balance, Adam K. Peck
Vanderbilt Law Review
This Recent Development argues that although an opinion endorsed by only two justices is not binding precedent, this portion of Segura represents an undesirable departure from the strict protections traditionally afforded a person's privacy interest in the home and leaves lower courts confused about the constitutional limitations on seizures in the home. Part II examines prior Supreme Court opinions that have defined the parameters of permissible warrantless searches and seizures. Part III explores the circuit court opinions that have developed a "securing of the premises"exception. Part IV describes Chief Justice Burger's analysis in Segura. Part V argues that the Chief …
Copyright And The Moral Right: Is An American Marriage Possible?, Roberta R. Kwall
Copyright And The Moral Right: Is An American Marriage Possible?, Roberta R. Kwall
Vanderbilt Law Review
The 1976 Copyright Act (the 1976 Act) embodies the most extensive reforms in the history of our nation's copyright laws. One proposed reform that is noticeably absent from the statutory scheme, however, is the explicit adoption of protections for the personal rights of creators with respect to their works. Instead,the 1976 Act continues this country's tradition of safeguarding only the pecuniary rights of a copyright owner. By assuring the copyright owner the exclusive rights to reproduce and distribute the original work, to prepare derivative works, and to perform and display publicly certain types of copyrighted works, the 1976 Act focuses …
Lost Privacy In The Computer Age: Computer Matching Programs Are Turning Uncle Sam Into Big Brother, Miriam Lapp Azrael
Lost Privacy In The Computer Age: Computer Matching Programs Are Turning Uncle Sam Into Big Brother, Miriam Lapp Azrael
University of Baltimore Law Forum
No abstract provided.
The Constitutionality Of The Foreign Intelligence Surveillance Act Of 1978, Judith B. Anderson
The Constitutionality Of The Foreign Intelligence Surveillance Act Of 1978, Judith B. Anderson
Vanderbilt Journal of Transnational Law
Within its more limited scope, the Belfield decision provides a helpful approach to FISA cases by articulating both a solid rationale for FISA's in camera, ex parte provision and a workable balancing approach for determining whether open proceedings may be necessary. The Falvey decision, although broader in scope, does not provide a satisfactory rationale for FISA's deviation from the traditional fourth amendment warrant requirement, nor does it articulate a workable approach to evaluating a FISA-warranted surveillance. The Falvey court, by predicating its upholding of FISA on an acceptance of the national security exception, may perpetuate a debate that the statute …