Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (33)
- Science and Technology Law (22)
- Computer Law (20)
- Intellectual Property Law (16)
- Law and Society (13)
-
- Constitutional Law (7)
- Health Law and Policy (7)
- National Security Law (6)
- Labor and Employment Law (5)
- First Amendment (4)
- Fourth Amendment (4)
- Consumer Protection Law (2)
- Criminal Procedure (2)
- Education Law (2)
- Family Law (2)
- Human Rights Law (2)
- International Law (2)
- Jurisprudence (2)
- Juvenile Law (2)
- Legislation (2)
- Administrative Law (1)
- Arts and Humanities (1)
- Banking and Finance Law (1)
- Business Organizations Law (1)
- Commercial Law (1)
- Communications Law (1)
- Comparative and Foreign Law (1)
- Criminal Law (1)
- Institution
-
- Schulich School of Law, Dalhousie University (12)
- University of San Diego (10)
- Selected Works (7)
- UIC School of Law (7)
- Boston University School of Law (3)
-
- University of Michigan Law School (3)
- Vanderbilt University Law School (3)
- Brigham Young University Law School (2)
- Chicago-Kent College of Law (2)
- Florida A&M University College of Law (2)
- The Peter A. Allard School of Law (2)
- University of Maryland Francis King Carey School of Law (2)
- University of Washington School of Law (2)
- Brooklyn Law School (1)
- New York Law School (1)
- Pace University (1)
- Texas A&M University School of Law (1)
- University of Arkansas at Little Rock William H. Bowen School of Law (1)
- University of Baltimore Law (1)
- University of Colorado Law School (1)
- University of Maine School of Law (1)
- University of Miami Law School (1)
- University of Pennsylvania Carey Law School (1)
- University of the District of Columbia School of Law (1)
- Wayne State University (1)
- Keyword
-
- Privacy (19)
- Copyright (4)
- Technology (4)
- Fourth amendment (3)
- Employment Practice (2)
-
- Law and Technology (2)
- Reasonable expectation of privacy (2)
- Records (2)
- Surveillance (2)
- Torts (2)
- AWS spectrum (1)
- Access to information (1)
- Accountability (1)
- Adolescent Confidentiality (1)
- Architecture (1)
- Biometrics (1)
- Blogging (1)
- Book reviews (1)
- Breach of confidentiality (1)
- Canadian wireless industry (1)
- Case comment (1)
- Child protection (1)
- Children (1)
- Civil liberties (1)
- Commercial speech (1)
- Commodification (1)
- Computer Law (1)
- Computers and Privacy (1)
- Confidentiality (1)
- Confidentiality of Adolescents (1)
- Publication
-
- Canadian Journal of Law and Technology (11)
- San Diego Law Review (10)
- Faculty Scholarship (7)
- UIC John Marshall Journal of Information Technology & Privacy Law (6)
- All Faculty Scholarship (3)
-
- All Faculty Publications (2)
- Robert Sprague (2)
- Stephen E Henderson (2)
- Vanderbilt Law Review (2)
- Vincent Samar (2)
- Washington Journal of Law, Technology & Arts (2)
- Articles (1)
- Articles, Book Chapters, & Popular Press (1)
- Book Chapters (1)
- Brigham Young University Education and Law Journal (1)
- Brigham Young University Journal of Public Law (1)
- Elizabeth De Armond (1)
- Faculty Publications (1)
- Florida A & M University Law Review (1)
- Journal Articles (1)
- Journal Publications (1)
- Law Faculty Research Publications (1)
- Michigan Journal of International Law (1)
- Michigan Telecommunications & Technology Law Review (1)
- NYLS Law Review (1)
- Pace Law Review (1)
- Publications (1)
- UIC Law Review (1)
- University of Arkansas at Little Rock Law Review (1)
- University of Baltimore Law Review (1)
- Publication Type
Articles 61 - 69 of 69
Full-Text Articles in Privacy Law
Structural Rights In Privacy, Harry Surden
Structural Rights In Privacy, Harry Surden
Publications
This Essay challenges the view that privacy interests are protected primarily by law. Based upon the understanding that society relies upon nonlegal devices such as markets, norms, and structure to regulate human behavior, this Essay calls attention to a class of regulatory devices known as latent structural constraints and provides a positive account of their role in regulating privacy. Structural constraints are physical or technological barriers which regulate conduct; they can be either explicit or latent. An example of an explicit structural constraint is a fence which is designed to prevent entry onto real property, thereby effectively enforcing property rights. …
Public Protection, Proportionality, And The Search For Balance, Benjamin J. Goold, Liora Lazarus, Gabriel Swiney
Public Protection, Proportionality, And The Search For Balance, Benjamin J. Goold, Liora Lazarus, Gabriel Swiney
All Faculty Publications
This report examines how courts in the UK and Europe respond when human rights and security appear to conflict. It compares cases from the United Kingdom, France, Germany, Spain, and the European Court of Human Rights (ECtHR). It examines how rights are applied and how courts use the concept of proportionality to mediate conflicts between rights and security. The report concludes that British courts are less consistent in their application of proportionality than countries with constitutional rights protections which tend to be more rigorous in their protections of rights than are countries, like the UK, that rely instead on the …
Fired For Blogging: Are There Legal Protections For Employees Who Blog?, Robert Sprague
Fired For Blogging: Are There Legal Protections For Employees Who Blog?, Robert Sprague
Robert Sprague
No abstract provided.
Frothy Chaos: Modern Data Warehousing And Old-Fashioned Defamation, Elizabeth De Armond
Frothy Chaos: Modern Data Warehousing And Old-Fashioned Defamation, Elizabeth De Armond
Elizabeth De Armond
No abstract provided.
From Taylorism To The Omnipticon: Expanding Employee Surveillance Beyond The Workplace, Robert Sprague
From Taylorism To The Omnipticon: Expanding Employee Surveillance Beyond The Workplace, Robert Sprague
Robert Sprague
No abstract provided.
Bowers V. Hardwick, Vincent Samar
Lawrence V. Texas, Vincent Samar
The Technology Of Surveillance: Will The Supreme Court's Expectations Ever Resemble Society's?, Stephen E. Henderson
The Technology Of Surveillance: Will The Supreme Court's Expectations Ever Resemble Society's?, Stephen E. Henderson
Stephen E Henderson
Beyond The (Current) Fourth Amendment: Protecting Third-Party Information, Third Parties, And The Rest Of Us Too, Stephen E. Henderson
Beyond The (Current) Fourth Amendment: Protecting Third-Party Information, Third Parties, And The Rest Of Us Too, Stephen E. Henderson
Stephen E Henderson
For at least thirty years the Supreme Court has adhered to its third-party doctrine in interpreting the Fourth Amendment, meaning that so far as a disclosing party is concerned, information in the hands of a third party receives no Fourth Amendment protection. The doctrine was controversial when adopted, has been the target of sustained criticism, and is the predominant reason that the Katz revolution has not been the revolution many hoped it would be. Some forty years after Katz the Court's search jurisprudence largely remains tied to property conceptions. As I have demonstrated elsewhere, however, the doctrine is not the …