Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2010

Privacy

Discipline
Institution
Publication
Publication Type

Articles 1 - 22 of 22

Full-Text Articles in Privacy Law

Privacy Implications Of Smart Meters, Cheryl Dancey Balough Dec 2010

Privacy Implications Of Smart Meters, Cheryl Dancey Balough

Chicago-Kent Law Review

Many people worry about the erosion of privacy in our society given developments in technology, but that loss of privacy may take a quantum leap as electric "smart meters" make it possible for strangers to know on a real-time basis what is occurring in our houses and apartments. Perhaps the greatest concern is that current laws and regulations do not fully protect us from this unprecedented threat to two of our most basic rights—to be left alone in our own homes and to control personal information. Utility companies across the country are replacing conventional electric meters with smart meters designed …


Location-Based Services: Time For A Privacy Check-In, Chris Conley, Nicole Ozer, Hari O'Connell, Ellen Ginsburg, Tamar Gubins Nov 2010

Location-Based Services: Time For A Privacy Check-In, Chris Conley, Nicole Ozer, Hari O'Connell, Ellen Ginsburg, Tamar Gubins

Faculty Scholarship

Need to get directions when you are lost? Want to know if your friends are in the neighborhood? Location-based services – applications and websites that provide services based on your current location – can put this information and more in the palm of your hand.

But outdated privacy laws and varying corporate practices could mean that sensitive information about who you are, where you go, what you do, and who you know end up being shared, sold, or turned over to the government.

Can location-based services protect your privacy? Do they? And what can we do to improve the situation? …


Free Speech And The Myth Of The Internet As An Unintermediated Experience, Christopher S. Yoo Sep 2010

Free Speech And The Myth Of The Internet As An Unintermediated Experience, Christopher S. Yoo

All Faculty Scholarship

In recent years, a growing number of commentators have raised concerns that the decisions made by Internet intermediaries — including last-mile network providers, search engines, social networking sites, and smartphones — are inhibiting free speech and have called for restrictions on their ability to prioritize or exclude content. Such calls ignore the fact that when mass communications are involved, intermediation helps end users to protect themselves from unwanted content and allows them to sift through the avalanche of desired content that grows ever larger every day. Intermediation also helps solve a number of classic economic problems associated with the Internet. …


From Scanning To Sexting: The Scope Of Protection Of Dignity-Based Privacy In Canadian Child Pornography Law, Andrea Slane Jul 2010

From Scanning To Sexting: The Scope Of Protection Of Dignity-Based Privacy In Canadian Child Pornography Law, Andrea Slane

Osgoode Hall Law Journal

The Canadian approach to privacy rights in one's body is embedded in the relationship between interests in privacy, bodily integrity, and human dignity. Clarifying these interests is complicated by Canada's middle-ground stance between the European "dignity-based" approach to privacy and the US "liberty-based" orientation. The Canadian approach is closer to the European model when intrusions upon the body are conceived as wholly or mostly non-consensual (e.g., strip searches, voyeurism, and most child pornography). However, once consent plays a potentially determinative rote, the US liberty-based approach gains ground. This reluctance to fully align dignity with privacy results in confusion about the …


The Anatomy Of A Search: Intrusiveness And The Fourth Amendment, Renee Mcdonald Hutchins May 2010

The Anatomy Of A Search: Intrusiveness And The Fourth Amendment, Renee Mcdonald Hutchins

Journal Articles

For more than two months beginning in late December of 2005, police officers in New York State continuously monitored the location and movements of Scott Weaver's van using a surreptitiously attached global positioning system ("GPS") device, known as a "Qball."' The reason Weaver was targeted for police surveillance has never been disclosed. 2 In addition, law enforcement made no attempt to justify the heightened scrutiny of Weaver by seeking the pre-authorization of a warrant from a neutral magistrate.3 Rather, for sixty-five days, the police subjected Weaver to intense surveillance without oversight, interruption, or explanation. 4 More than a year after …


Undermined Norms: The Corrosive Effect Of Information Processing Technology On Informational Privacy, Richard Warner Mar 2010

Undermined Norms: The Corrosive Effect Of Information Processing Technology On Informational Privacy, Richard Warner

All Faculty Scholarship

Informational privacy is a matter of control; it consists in the ability to control when one’s personal information is collected, how it is used, and to whom it is distributed. The degree of control we once enjoyed has vanished. Advances in information processing technology now give others considerable power to determine when personal information is collected, how it is used, and to it is whom distributed. Privacy advocates sound the alarm in regard to both the governmental and private sectors. I focus exclusively on the later. Relying on the extensive privacy advocate literature, I assume we should try to regain …


Liberating Copyright: Thinking Beyond Free Speech, Jennifer E. Rothman Mar 2010

Liberating Copyright: Thinking Beyond Free Speech, Jennifer E. Rothman

All Faculty Scholarship

Scholars have often turned to the First Amendment to limit the scope of ever-expanding copyright law. This approach has mostly failed to convince courts that independent review is merited and has offered little to individuals engaged in personal rather than political or cultural expression. In this Article, I consider the value of an alternative paradigm using the lens of substantive due process and liberty to evaluate users’ rights. A liberty-based approach uses this other developed body of constitutional law to demarcate justifiable personal, identity-based uses of copyrighted works. Uses that are essential for mental integrity, intimacy promotion, communication, or religious …


There Is A Time To Keep Silent And A Time To Speak, The Hard Part Is Knowing Which Is Which: Striking The Balance Between Privacy Protection And The Flow Of Health Care Information, Daniel J. Gilman, James C. Cooper Jan 2010

There Is A Time To Keep Silent And A Time To Speak, The Hard Part Is Knowing Which Is Which: Striking The Balance Between Privacy Protection And The Flow Of Health Care Information, Daniel J. Gilman, James C. Cooper

Michigan Telecommunications & Technology Law Review

Health information technology (HIT) has become a signal element of federal health policy, especially as the recently enacted American Recovery and Reinvestment Act of 2009 (Recovery Act or ARRA) comprises numerous provisions related to HIT and commits tens of billions of dollars to its development and adoption. These provisions charge various agencies of the federal government with both general and specific HIT-related implementation tasks including, inter alia, providing funding for HIT in various contexts: the implementation of interoperable HIT, HIT-related infrastructure, and HIT-related training and research. The Recovery Act also contains various regulatory provisions pertaining to HIT. Provisions of the …


Stories Told And Untold: Confidentiality Laws And The Master Narrative Of Child Welfare, Matthew I. Fraidin Jan 2010

Stories Told And Untold: Confidentiality Laws And The Master Narrative Of Child Welfare, Matthew I. Fraidin

Journal Articles

In most states, child welfare hearings and records are sealed or confidential. This means that by law, court hearings and records may not be observed. The same laws and court rules also preclude those who are authorized to enter and watch from discussing anything learned or observed in a closed courtroom or from a sealed court record with anyone not involved in the case. It is the restriction on speech—on telling stories about child welfare—with which this Article is concerned. I will argue in this Article that the insights of narrative theory and agenda-setting studies help us understand the damaging …


Gina's Genotypes, David H. Kaye Jan 2010

Gina's Genotypes, David H. Kaye

Michigan Law Review First Impressions

In August 2009, the Board of Trustees of the University of Akron added to the university's employment policy the following proviso: "any applicant may be asked to submit fingerprints or DNA sample for purpose of a federal criminal background check." Although the federal government does not do background checks with DNA, the policy is significant because it highlights a largely unexplored feature of the Genetic Information Nondiscrimination Act of 2008 ("GINA"). Hailed by the late Senator Edward Kennedy as "the first civil rights bill of the new century of life sciences," GINA generally prohibits employers from asking for "genetic information." …


Civilians In Cyberwarfare: Conscripts, Susan W. Brenner, Leo L. Clarke Jan 2010

Civilians In Cyberwarfare: Conscripts, Susan W. Brenner, Leo L. Clarke

Vanderbilt Journal of Transnational Law

Civilian-owned and -operated entities will almost certainly be a target in cyberwarfare because cyberattackers are likely to be more focused on undermining the viability of the targeted state than on invading its territory. Cyberattackers will probably target military computer systems, at least to some extent, but in a departure from traditional warfare, they will also target companies that operate aspects of the victim nation's infrastructure. Cyberwarfare, in other words, will penetrate the territorial borders of the attacked state and target high-value civilian businesses. Nation-states will therefore need to integrate the civilian employees of these (and perhaps other) companies into their …


A Fourth Amendment For The Poor Alone: Subconstitutional Status And The Myth Of The Inviolate Home, Jordan C. Budd Jan 2010

A Fourth Amendment For The Poor Alone: Subconstitutional Status And The Myth Of The Inviolate Home, Jordan C. Budd

Law Faculty Scholarship

For much of our nation’s history, the poor have faced pervasive discrimination in the exercise of fundamental rights. Nowhere has the impairment been more severe than in the area of privacy. This Article considers the enduring legacy of this tradition with respect to the Fourth Amendment right to domestic privacy. Far from a matter of receding historical interest, the diminution of the poor’s right to privacy has accelerated in recent years and now represents a powerful theme within the jurisprudence of poverty. Triggering this development has been a series of challenges to aggressive administrative practices adopted by localities in the …


The Death Of The Public Disclosure Tort: A Historical Perspective, Samantha Barbas Jan 2010

The Death Of The Public Disclosure Tort: A Historical Perspective, Samantha Barbas

Journal Articles

In 1890, Samuel Warren and Louis Brandeis, in their famous Harvard Law Review article The Right to Privacy, called for a new legal right that would allow the victims of truthful but embarrassing press publicity to recover damages for emotional harm. Currently, in most states, it constitutes a tort if the disclosure of “matter concerning the private life of another” would be highly offensive to a reasonable person and the matter is not “of legitimate concern to the public,” or newsworthy. However, because courts generally consider virtually everything that appears in the news media to be newsworthy, the public disclosure …


The Weak Protection Of Strong Encryption: Passwords, Privacy, And Fifth Amendment Privilege, Nathan K. Mcgregor Jan 2010

The Weak Protection Of Strong Encryption: Passwords, Privacy, And Fifth Amendment Privilege, Nathan K. Mcgregor

Vanderbilt Journal of Entertainment & Technology Law

While the constitutional protection afforded private papers has waxed and waned for more than a century, the Supreme Court has greatly restricted the Fifth Amendment privilege against self-incrimination--at least as applied to voluntarily prepared documents. Specifically, where the government knows of the existence and location of subpoenaed documents, the Fifth Amendment guarantee will not justify a failure to produce them, unless the act of production would itself incriminate the defendant. However, the Self-Incrimination Clause still precludes the compelled creation of documents that are both incriminating and testimonial.

The "private papers" doctrine has remained relatively stable for approximately thirty years now, …


Nieves V. Home Box Office, Inc., Andrew Nieh Jan 2010

Nieves V. Home Box Office, Inc., Andrew Nieh

NYLS Law Review

No abstract provided.


Discipline In Schools After Safford Unified School District #1 V. Redding, Dennis D. Parker Jan 2010

Discipline In Schools After Safford Unified School District #1 V. Redding, Dennis D. Parker

NYLS Law Review

No abstract provided.


Substitution Effects: A Problematic Justification For The Third-Party Doctrine Of The Fourth Amendment, Blake Ellis Reid Jan 2010

Substitution Effects: A Problematic Justification For The Third-Party Doctrine Of The Fourth Amendment, Blake Ellis Reid

Publications

In the past half-century, the Supreme Court has crafted a vein of jurisprudence virtually eliminating Fourth Amendment protection in information turned over to third parties - regardless of any subjective expectation of privacy or confidentiality in the information on the part of the revealer. This so-called “third-party” doctrine of the Fourth Amendment has become increasingly controversial in light of the growing societal reliance on the Internet in the United States, where nearly every transaction requires a user to turn information over to at least one third party: the Internet service provider (“ISP”).

Citing the scholarship that has criticized the third-party …


Visionary Pragmatism And The Value Of Privacy In The Twenty-First Century, Danielle Keats Citron, Leslie Meltzer Henry Jan 2010

Visionary Pragmatism And The Value Of Privacy In The Twenty-First Century, Danielle Keats Citron, Leslie Meltzer Henry

Michigan Law Review

Part I of our Review discusses the central premises of Understanding Privacy, with particular attention paid to Solove's pragmatic methodology and his taxonomy of privacy. We introduce his pluralistic approach to conceptualizing privacy, which urges decision makers to assess privacy problems in context, and we explore his view that meaningful choices about privacy depend on an appreciation of how privacy benefits society as a whole. We also describe how Solove's taxonomy aims to account for the variety of activities that threaten privacy. In Part II, we analyze the strengths of Solove's pragmatism by demonstrating its functionality and flexibility in …


Envisioning The Smart Grid: Network Architecture, Information Control, And The Public Policy Balancing Act, Elias L. Quinn, Adam L. Reed Jan 2010

Envisioning The Smart Grid: Network Architecture, Information Control, And The Public Policy Balancing Act, Elias L. Quinn, Adam L. Reed

University of Colorado Law Review

While smart grid development promises benefits for utilities and consumers alike, the public policy surrounding its rollout remains conflicted. Will regulation guide the structure and usability of the smart grid, or will the ways in which the smart grid is already being applied force specific types of regulation? Early decisions by regulators will surely influence the balancing of policy concerns later in the smart grid development process; yet these decisions will be made in a regulatory environment in which utilities may lack the proper incentives to promote energy efficiency and consumer awareness-both functions of the smart grid. This Article examines …


Mapping Online Privacy, Jacqueline D. Lipton Jan 2010

Mapping Online Privacy, Jacqueline D. Lipton

Articles

Privacy scholars have recently outlined difficulties in applying existing concepts of personal privacy to the maturing Internet. With Web 2.0 technologies, more people have more opportunities to post information about themselves and others online, often with scant regard for individual privacy. Shifting notions of 'reasonable expectations of privacy' in the context of blogs, wikis, and online social networks create challenges for privacy regulation. Courts and commentators struggle with Web 2.0 privacy incursions without the benefit of a clear regulatory framework. This article offers a map of privacy that might help delineate at least the outer boundaries of Web 2.0 privacy. …


The So-Called Right To Privacy, Jamal Greene Jan 2010

The So-Called Right To Privacy, Jamal Greene

Faculty Scholarship

The constitutional right to privacy has been a conservative bugaboo ever since Justice Douglas introduced it into the United States Reports in Griswold v. Connecticut. Reference to the "so-called" right to privacy has become code for the view that the right is doctrinally recognized but not in fact constitutionally enshrined. This Article argues that the constitutional right to privacy is no more. The two rights most associated historically with the right to privacy are abortion and intimate sexual conduct, yet Gonzales v. Carhart and Lawrence v. Texas made clear that neither of these rights is presently justified by its …


Cloud Computing: Storm Warning For Privacy?, Nicole Ozer, Chris Conley Jan 2010

Cloud Computing: Storm Warning For Privacy?, Nicole Ozer, Chris Conley

Faculty Scholarship

“Cloud computing” - the ability to create, store, and manipulate data through Web-based services - is growing in popularity. Cloud computing itself may not transform society; for most consumers, it is simply an appealing alternative tool for creating and storing the same records and documents that people have created for years. However, outdated laws and varying corporate practices mean that documents created and stored in the cloud may not have the same protections as the same documents stored in a filing cabinet or on a home computer. Can cloud computing services protect the privacy of their consumers? Do they? And …