Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2012

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 104

Full-Text Articles in Privacy Law

Drone Federalism: Civilian Drones And The Things They Carry, Margot E. Kaminski Dec 2012

Drone Federalism: Civilian Drones And The Things They Carry, Margot E. Kaminski

Publications

Civilian drones are scheduled to be permitted in the national airspace as early as 2015. Many think Congress should establish the necessary nationwide regulations to govern both law enforcement and civilian drone use. That thinking, however, is wrong. This Essay suggests drone federalism instead: a state-based approach to privacy regulation that governs drone use by civilians, drawing on states’ experience regulating other forms of civilian-on-civilian surveillance. This approach will allow necessary experimentation in how to best balance privacy concerns against First Amendment rights in the imminent era of drone-use democratization. This Essay closes by providing some guidance to states as …


Natural Law, Slavery, And The Right To Privacy Tort, Anita L. Allen Dec 2012

Natural Law, Slavery, And The Right To Privacy Tort, Anita L. Allen

All Faculty Scholarship

In 1905 the Supreme Court of Georgia became the first state high court to recognize a freestanding “right to privacy” tort in the common law. The landmark case was Pavesich v. New England Life Insurance Co. Must it be a cause for deep jurisprudential concern that the common law right to privacy in wide currency today originated in Pavesich’s explicit judicial interpretation of the requirements of natural law? Must it be an additional worry that the court which originated the common law privacy right asserted that a free white man whose photograph is published without his consent in …


Tax Glasnost' For Millionaires: Peeking Behind The Veil Of Ignorance Along The Publicity-Privacy Continuum, Marc Linder Nov 2012

Tax Glasnost' For Millionaires: Peeking Behind The Veil Of Ignorance Along The Publicity-Privacy Continuum, Marc Linder

Marc Linder

No abstract provided.


The Inalienable Right Of Publicity, Jennifer E. Rothman Nov 2012

The Inalienable Right Of Publicity, Jennifer E. Rothman

All Faculty Scholarship

This article challenges the conventional wisdom that the right of publicity is universally and uncontroversially alienable. Courts and scholars have routinely described the right as a freely transferable property right, akin to patents or copyrights. Despite such broad claims of unfettered alienability, courts have limited the transferability of publicity rights in a variety of instances. No one has developed a robust account of why such limits should exist or what their contours should be. This article remedies this omission and concludes that the right of publicity must have significantly limited alienability to protect the rights of individuals to control the …


Information Escrows, Ian Ayres, Cait Unkovic Nov 2012

Information Escrows, Ian Ayres, Cait Unkovic

Michigan Law Review

A variety of information escrows - including allegation escrows, suspicion escrows, and shared-interest escrows - hold the promise of reducing the first-mover disadvantage that can deter people with socially valuable private information from disclosing that information to others. Information escrows allow people to transmit sensitive information to a trusted intermediary, an escrow agent, who only forwards the information under prespecified conditions. For example, an allegation escrow for sexual harassment might allow a victim to place a private complaint into escrow with instructions that the complaint be lodged with the proper authorities only if the escrow agent receives at least one …


Survey Of Recent European Union Privacy Developments, W. Gregory Voss Oct 2012

Survey Of Recent European Union Privacy Developments, W. Gregory Voss

W. Gregory Voss

The Spanish law implementing the European Union (EU) Data Protection Directive, advisory guidance on consent, facial recognition and biometric technologies from the European Union Article 29 Data Protection Working Party (WP29) , and proposals for EU data protection law reform are analyzed in this survey piece. EU legislative processes are illustrated by a specific occurence: Spanish Organic Law 15/1999 on the Protection of Personal Data is reviewed in the context of Court of Justice of the European Union (ECJ) joined cases, Asociación Nacional de Establecimientos Financieros de Crédito (ASNEF) v. Administración del Estado, and Federación de Comercio Electrónico y Marketing …


Four Easy Pieces To Balance Privacy And Accountability In Public Higher Education: A Response To Wrongdoing Ranging From Petty Corruption To The Sandusky And Penn State Tragedy, Robert E. Steinbuch Oct 2012

Four Easy Pieces To Balance Privacy And Accountability In Public Higher Education: A Response To Wrongdoing Ranging From Petty Corruption To The Sandusky And Penn State Tragedy, Robert E. Steinbuch

Faculty Scholarship

No abstract provided.


Limits Of The Federal Wiretap Act's Ability To Protect Against Wi-Fi Sniffing, Mani Potnuru Oct 2012

Limits Of The Federal Wiretap Act's Ability To Protect Against Wi-Fi Sniffing, Mani Potnuru

Michigan Law Review

Adoption of Wi-Fi wireless technology continues to see explosive growth. However many users still operate their home Wi-Fi networks in unsecured mode or use publicly available unsecured Wi-Fi networks, thus exposing their communications to the dangers of "packet sniffing," a technique used for eavesdropping on a network. Some have argued that communications over unsecured Wi-Fi networks are "readily accessible to the general public" and that such communications are therefore excluded from the broad protections of the Federal Wiretap Act against intentional interception of electronic communications. This Note examines the Federal Wiretap Act and argues that the current Act's treatment of …


Warrantless Searches And Smartphones: Privacy In The Palm Of Your Hand?, Margaret M. Lawton Sep 2012

Warrantless Searches And Smartphones: Privacy In The Palm Of Your Hand?, Margaret M. Lawton

University of the District of Columbia Law Review

Incident to a drug arrest, a police officer removes a smartphone from the pocket of the defendant. The smartphone may have incriminating evidence-phone numbers, pictures, text messages, and e-mails. But can the officer examine the smartphone on the scene or back at the station? Or does the officer need to show probable cause and obtain a warrant before examining the phone? If the phone were instead the arrestee's wallet or a cigarette package, under the search incident to lawful arrest exception to the Fourth Amendment's warrant requirement the officer could open and search inside either of these "containers." Anything found …


Looking Through The Prism Of Privacy And Trespass: Smartphones And The Fourth Amendment, Saby Ghoshray Sep 2012

Looking Through The Prism Of Privacy And Trespass: Smartphones And The Fourth Amendment, Saby Ghoshray

University of the District of Columbia Law Review

Technology in the twenty-first century has dramatically changed our lives, but the law has not kept pace with technological advances. The treatment of smartphones in Fourth Amendment jurisprudence is no exception. This is made evident by the increasingly scattered outcomes of litigation involving the privacy interests of smartphone owners.' As the cross-jurisdictional inconsistencies of judicial decisions applying the Fourth Amendment to smartphones mount, I am drawn to seek answers from two foundational pillars of the Supreme Court's search and seizure jurisprudence: protection against invasions of privacy and the bulwark against trespass.


Access For All: A Review Of “Law Libraries, Government Transparency, And The Internet,” A Presentation By Daniel Schuman Of The Sunlight Foundation At The All-Sis Meeting, July 22, 2012, Susan David Demaine Sep 2012

Access For All: A Review Of “Law Libraries, Government Transparency, And The Internet,” A Presentation By Daniel Schuman Of The Sunlight Foundation At The All-Sis Meeting, July 22, 2012, Susan David Demaine

Articles by Maurer Faculty

Attendees at the ALL-SIS Breakfast and Business Meeting at the AALL Annual Meeting had the pleasure of hearing from Daniel Schuman of the Sunlight Foundation speak on “Law Libraries, Government Transparency, and the Internet.” The Sunlight Foundation is a nonpartisan, nonprofit organization whose mission is to increase access to federal government information resources through advocacy and the development of information technology tools.


The Class Differential In Privacy Law, Michele E. Gilman Jul 2012

The Class Differential In Privacy Law, Michele E. Gilman

All Faculty Scholarship

This article analyzes how privacy law fails the poor. Due to advanced technologies, all Americans are facing corporate and governmental surveillance. However, privacy law is focused on middle-class concerns about limiting the disclosure of personal data so that it is not misused. By contrast, along the welfare-to-work continuum, poor people face privacy intrusions at the time that the state or their employers gather data. This data collection tends to be stigmatizing and humiliating, and it thus not only compounds the harmful effects of living in poverty, but also dampens democratic participation by the poor. The poor interact with the government …


Walled Gardens Of Privacy Or “Binding Corporate Rules?”: A Critical Look At International Protection Of Online Privacy, Joanna Kulesza Jul 2012

Walled Gardens Of Privacy Or “Binding Corporate Rules?”: A Critical Look At International Protection Of Online Privacy, Joanna Kulesza

University of Arkansas at Little Rock Law Review

A growing concern in the era of cloud computing is protecting Internet users' privacy. This concern is compounded by the fact that there are no effective international solutions. This article considers the latest European Union (EU) proposed development in this area – a regulatory model based on amended Binding Corporate Rules (BCR) – as introduced by the EU Justice Commissioner. These planned changes would have worldwide effects on international companies' online activities in transboundary cyberspace.

After providing a background on the concept of defining privacy in general, the article describes the BCR proposal, and proceeds to consider the likelihood of …


Privacy For Social Networking, Connie Davis Powell Jul 2012

Privacy For Social Networking, Connie Davis Powell

University of Arkansas at Little Rock Law Review

This article begins by considering the emergence of social networks as a major medium of communication and posits that the success of social networks is attributable to their users' willingness to share their information. Next, the article considers the expectation of privacy for users of social networks and whether such expectation is reasonable. In particular, the article discusses the privacy policies and legal terms governing the use of social networks, and tracks the evolution of such terms and policies as they slowly whittle away user control over time. The article then discusses public outcry regarding the disclosure of information contrary …


Electronic Privacy And Employee Speech, Pauline T. Kim Jun 2012

Electronic Privacy And Employee Speech, Pauline T. Kim

Chicago-Kent Law Review

The boundary between work and private life is blurring as a result of changes in the organization of work and advances in technology. Current privacy law is ill-equipped to address these changes and as a result, employees' privacy in their electronic communications is only weakly protected from employer scrutiny. At the same time, the law increasingly protects certain socially valued forms of employee speech. In particular, collective speech, speech that enforces workplace regulations and speech that deters or reports employer wrong-doing are explicitly protected by law from employer reprisals. These two developments—weak protection of employee privacy and increased protection for …


The Progress Of Science And The Useful Arts: Misadventures In Canadian Law On Patent-Eligible Subject Matter, Ken Bousfield Jun 2012

The Progress Of Science And The Useful Arts: Misadventures In Canadian Law On Patent-Eligible Subject Matter, Ken Bousfield

Canadian Journal of Law and Technology

Patent-Eligible Subject-Matter in Canada

The law of patent-eligible subject-matter in Canada has become badly muddled. There has been repeated confusion of subject-matter issues with non-subject matter issues such as novelty, obviousness, and utility. There has also been repeated confusion within the following group of issues pertaining to whether subject-matter is patent-eligible: whether a claim is for a mere idea or aggregation or for a patentable invention; whether claimed subject-matter falls within science and the useful arts; and whether claimed subject-matter falls within the statutory classes listed in the definition of “invention”. Echoes of older UK-based cases, relating to statutory provisions …


Harvesting The "Forbidden Fruit" Of Biotechnology Research: Genetic Engineering, International Law And The Patentability Of Higher Life Forms In Canada, Eugene C. Lim Jun 2012

Harvesting The "Forbidden Fruit" Of Biotechnology Research: Genetic Engineering, International Law And The Patentability Of Higher Life Forms In Canada, Eugene C. Lim

Canadian Journal of Law and Technology

As the frontiers of science are constantly redefined by the emergence of new technology, patent law often has to struggle to keep pace with the changing conception of what constitutes a protectable “invention”. A key challenge facing patent law in the age of biotechnology lies in ascertaining the extent to which genetically engineered life forms should be protected. A major concern relates to whether such life forms should be excluded from patentability on grounds of ordre public, ethics and morality.

This article critically explores the extent to which patent law in Canada protects this “forbidden fruit” of biotechnological innovation, and …


A Delicate Balance: Defining The Line Between Open Civil Proceedings And The Protection Of Children In The Online Digital Era, Courtney Retter, Shaheen Shariff Jun 2012

A Delicate Balance: Defining The Line Between Open Civil Proceedings And The Protection Of Children In The Online Digital Era, Courtney Retter, Shaheen Shariff

Canadian Journal of Law and Technology

He thought of the telescreen with its never-sleeping ear. They could spy upon you night and day, but if you kept your head you could still outwit them. [. . .] They could lay bare in the utmost detail everything that you had done or said or thought; but the inner heart, whose workings were mysterious even to yourself, remained impregnable.

— George Orwell, 1984

On Thursday September 27, 2012, a few months after our paper was written, the Supreme Court of Canada solidified the rights of children victimized by cyberbullying in the landmark decision of AB (Litigation Guardian of) …


Understanding The Internet As A Human Right, Michael Karanicolas Jun 2012

Understanding The Internet As A Human Right, Michael Karanicolas

Canadian Journal of Law and Technology

Around the world, fundamental human rights have undergone a dramatic conceptual shift as a result of the spread of the Internet. The right to freedom of expression, once largely limited to printing, has exploded in a digital world that provides users with an unprecedented megaphone to broadcast their views. The right to political participation and the right to free assembly have similarly been reborn in an age of instant communication, allowing activists to mobilise hundreds of thousands of followers with a single email, text or tweet. Although these are the most notable examples, the Internet has also had a transformative …


The Limitations Of Regulatory Oversight On Online Video, Jennifer Simpson Jun 2012

The Limitations Of Regulatory Oversight On Online Video, Jennifer Simpson

Canadian Journal of Law and Technology

Discussion in this paper focuses on the factors, attributes, and elements of telecom and broadcast regulation in Canada. Part I of this study briefly outlines the history of online video regulation in Canada to date. In Part II speculation as to how online video might be regulated, based on prior decisions of the CRTC, is presented. Part III considers the challenges of applying the Broadcasting Act to new media entities in order to create a regulatory framework for online video. Part IV looks at judicial decisions related to broadcast law that may be used to define the nature of the …


The Rules Of Corporate Governance In Public Companies In The Uae, Salama Hmoud Hamad Ai Ameri Jun 2012

The Rules Of Corporate Governance In Public Companies In The Uae, Salama Hmoud Hamad Ai Ameri

Dissertations

Due to the recent upheavals and deteriorating global economic outlook, a healthy reevaluation and attention is being focused on the role of corporate governance in global economic and legal debate among policy makers and experts. The urgency has been expedited by the global financial crisis of 2007-2008 ("Financial Crisis") which had negative impact on all corners of the globe. The United Arab Emirates ("UAE") was also affected by the Financial Crisis, albeit in a limited and manageable manner than many other countries around the world.

As a result of the Financial Crisis and its impact, UAE responded with measures to …


Privacy Rights: The Virtue Of Protecting A False Reputation, John A. Humbach May 2012

Privacy Rights: The Virtue Of Protecting A False Reputation, John A. Humbach

Elisabeth Haub School of Law Faculty Publications

What is the virtue of protecting a false reputation? The thesis of this paper is that there is none. There is none, at least, that justifies the suppression of free speech. Yet, there is a growing trend to see the protection of reputation from truth as a key function of the so-called “right of privacy.”

Unfortunately, people often do things that they are not proud of or do not want others to know about. Often, however, these are precisely the things that others want or need to know. For our own protection, each of us is better off being aware …


Privacy Rights Left Behind At The Border: The Exhaustive, Exploratory Searches Effectuated In United States V. Cotterman, Aaron Mcknight May 2012

Privacy Rights Left Behind At The Border: The Exhaustive, Exploratory Searches Effectuated In United States V. Cotterman, Aaron Mcknight

BYU Law Review

No abstract provided.


Post-Mortem Right Of Publicity In Arkansas: Protecting Against The Unauthorized Use Of A Person’S Identity For Commercial Purposes, Rashauna A. Norment Apr 2012

Post-Mortem Right Of Publicity In Arkansas: Protecting Against The Unauthorized Use Of A Person’S Identity For Commercial Purposes, Rashauna A. Norment

University of Arkansas at Little Rock Law Review

The right of publicity protects a person against the use of his or her name, identity, likeness, or other personal characteristics for commercial purposes without consent. Many states have implemented a statutory right of publicity or have recognized the right under common law. Currently, only three states have a post-mortem right of publicity. This article discusses jurisdictions that have adopted a postmortem right of publicity, and advocates that Arkansas adopt a postmortem right of publicity for everyone.

Specifically, the article argues that traditional protection stemming from actions for invasion of a right of privacy, trademark infringement, and copyright infringement cannot …


Wiretapping The Internet: The Expansion Of The Communications Assistance To Law Enforcement Act To Extend Government Surveillance, Christa M. Hibbard Mar 2012

Wiretapping The Internet: The Expansion Of The Communications Assistance To Law Enforcement Act To Extend Government Surveillance, Christa M. Hibbard

Federal Communications Law Journal

Criminal use of the Internet to circumvent traditional government phone wiretaps has inspired the Obama Administration to create a proposal to expand the Communications Assistance to Law Enforcement Act ("CALEA"). CALEA was passed in 1994 to regulate telephone and broadband companies to ensure compliance with standards to enable government wiretapping. The proposed amendment of CALEA would allow the government to require all communications service providers to meet technical standards necessary to comply with a wiretap order. The expansion of CALEA would likely widen its scope to social networking sites, instant messaging, gaming consoles that allow conversation among multiple players, and …


The Guatemala Std Inoculation Study As The Incentive To Change Modern Informed Consent Standards, Marie Constance Scheperle Mar 2012

The Guatemala Std Inoculation Study As The Incentive To Change Modern Informed Consent Standards, Marie Constance Scheperle

Washington and Lee Journal of Civil Rights and Social Justice

No abstract provided.


(Un)Reasonable Expectation Of Digital Privacy, Brandon T. Crowther Mar 2012

(Un)Reasonable Expectation Of Digital Privacy, Brandon T. Crowther

BYU Law Review

No abstract provided.


Public Education And Student Privacy: Application Of The Fourth Amendment To Dormitories At Public Colleges And Universities, Bryan R. Lemons Mar 2012

Public Education And Student Privacy: Application Of The Fourth Amendment To Dormitories At Public Colleges And Universities, Bryan R. Lemons

Brigham Young University Education and Law Journal

No abstract provided.


First Amendment Privacy And The Battle For Progressively Liberal Social Change, Anita L. Allen Mar 2012

First Amendment Privacy And The Battle For Progressively Liberal Social Change, Anita L. Allen

All Faculty Scholarship

No abstract provided.


Hard To Believe: The High Cost Of A Biometric Identity Card, A. Michael Froomkin, Jonathan Weinberg Feb 2012

Hard To Believe: The High Cost Of A Biometric Identity Card, A. Michael Froomkin, Jonathan Weinberg

Short Works

No abstract provided.