Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2007

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 61 - 69 of 69

Full-Text Articles in Privacy Law

Structural Rights In Privacy, Harry Surden Jan 2007

Structural Rights In Privacy, Harry Surden

Publications

This Essay challenges the view that privacy interests are protected primarily by law. Based upon the understanding that society relies upon nonlegal devices such as markets, norms, and structure to regulate human behavior, this Essay calls attention to a class of regulatory devices known as latent structural constraints and provides a positive account of their role in regulating privacy. Structural constraints are physical or technological barriers which regulate conduct; they can be either explicit or latent. An example of an explicit structural constraint is a fence which is designed to prevent entry onto real property, thereby effectively enforcing property rights. …


Public Protection, Proportionality, And The Search For Balance, Benjamin J. Goold, Liora Lazarus, Gabriel Swiney Jan 2007

Public Protection, Proportionality, And The Search For Balance, Benjamin J. Goold, Liora Lazarus, Gabriel Swiney

All Faculty Publications

This report examines how courts in the UK and Europe respond when human rights and security appear to conflict. It compares cases from the United Kingdom, France, Germany, Spain, and the European Court of Human Rights (ECtHR). It examines how rights are applied and how courts use the concept of proportionality to mediate conflicts between rights and security. The report concludes that British courts are less consistent in their application of proportionality than countries with constitutional rights protections which tend to be more rigorous in their protections of rights than are countries, like the UK, that rely instead on the …


Fired For Blogging: Are There Legal Protections For Employees Who Blog?, Robert Sprague Dec 2006

Fired For Blogging: Are There Legal Protections For Employees Who Blog?, Robert Sprague

Robert Sprague

No abstract provided.


Frothy Chaos: Modern Data Warehousing And Old-Fashioned Defamation, Elizabeth De Armond Dec 2006

Frothy Chaos: Modern Data Warehousing And Old-Fashioned Defamation, Elizabeth De Armond

Elizabeth De Armond

No abstract provided.


From Taylorism To The Omnipticon: Expanding Employee Surveillance Beyond The Workplace, Robert Sprague Dec 2006

From Taylorism To The Omnipticon: Expanding Employee Surveillance Beyond The Workplace, Robert Sprague

Robert Sprague

No abstract provided.


Bowers V. Hardwick, Vincent Samar Dec 2006

Bowers V. Hardwick, Vincent Samar

Vincent Samar

Bowers v. Hardwick


Lawrence V. Texas, Vincent Samar Dec 2006

Lawrence V. Texas, Vincent Samar

Vincent Samar

Lawrence v. Texas


The Technology Of Surveillance: Will The Supreme Court's Expectations Ever Resemble Society's?, Stephen E. Henderson Dec 2006

The Technology Of Surveillance: Will The Supreme Court's Expectations Ever Resemble Society's?, Stephen E. Henderson

Stephen E Henderson

For law students studying criminal procedure—or at least for those cramming for the exam—it becomes a mantra: government conduct only implicates the Fourth Amendment protection against unreasonable searches if it invades a “reasonable expectation of privacy.” This is not the contemporary definition of the word “search,” nor was it the definition at the time of the founding. But, via a well-intentioned concurrence by Justice Harlan in the famous 1967 case of Katz v. United States, it became the Court’s definition.
This lack of fealty to the English language left some questions. For example, is determining whether someone has a “reasonable …


Beyond The (Current) Fourth Amendment: Protecting Third-Party Information, Third Parties, And The Rest Of Us Too, Stephen E. Henderson Dec 2006

Beyond The (Current) Fourth Amendment: Protecting Third-Party Information, Third Parties, And The Rest Of Us Too, Stephen E. Henderson

Stephen E Henderson

For at least thirty years the Supreme Court has adhered to its third-party doctrine in interpreting the Fourth Amendment, meaning that so far as a disclosing party is concerned, information in the hands of a third party receives no Fourth Amendment protection. The doctrine was controversial when adopted, has been the target of sustained criticism, and is the predominant reason that the Katz revolution has not been the revolution many hoped it would be. Some forty years after Katz the Court's search jurisprudence largely remains tied to property conceptions. As I have demonstrated elsewhere, however, the doctrine is not the …