Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (1847)
- Science and Technology Law (1576)
- Computer Law (1531)
- Intellectual Property Law (688)
- Constitutional Law (671)
-
- Health Law and Policy (447)
- Fourth Amendment (427)
- Criminal Law (375)
- First Amendment (356)
- Legislation (347)
- Criminal Procedure (344)
- International Law (326)
- Law and Society (322)
- Torts (321)
- State and Local Government Law (307)
- Human Rights Law (299)
- Administrative Law (294)
- Family Law (291)
- Supreme Court of the United States (288)
- Legal History (280)
- Courts (274)
- Jurisprudence (268)
- Communications Law (265)
- Marketing Law (264)
- Other Law (262)
- Consumer Protection Law (248)
- Public Law and Legal Theory (248)
- Transnational Law (247)
- Institution
-
- UIC School of Law (911)
- Schulich School of Law, Dalhousie University (302)
- Selected Works (193)
- University of Michigan Law School (168)
- Vanderbilt University Law School (142)
-
- Seattle University School of Law (135)
- Universitas Indonesia (123)
- University of Washington School of Law (104)
- The Catholic University of America, Columbus School of Law (96)
- Maurer School of Law: Indiana University (91)
- Boston University School of Law (81)
- Brooklyn Law School (81)
- University of Pennsylvania Carey Law School (68)
- University of Colorado Law School (60)
- University at Buffalo School of Law (56)
- New York Law School (54)
- University of Richmond (53)
- Washington and Lee University School of Law (53)
- American University Washington College of Law (45)
- William & Mary Law School (45)
- University of Maryland Francis King Carey School of Law (43)
- Brigham Young University Law School (42)
- Notre Dame Law School (42)
- West Virginia University (41)
- University of Kentucky (38)
- Fordham Law School (36)
- Roger Williams University (36)
- Chicago-Kent College of Law (35)
- University of Miami Law School (35)
- University of Georgia School of Law (31)
- Keyword
-
- Privacy (831)
- Surveillance (147)
- Fourth Amendment (145)
- Technology (145)
- Internet (108)
-
- Data protection (87)
- Data privacy (80)
- First Amendment (79)
- Data (75)
- Right to privacy (64)
- Privacy law (62)
- Right of privacy (61)
- Fourth amendment (58)
- Social media (57)
- Cybersecurity (52)
- Copyright (46)
- Privacy Law (46)
- Information (45)
- Big data (44)
- Law (40)
- European Union (39)
- GDPR (38)
- Artificial intelligence (37)
- Security (37)
- Confidentiality (35)
- Data security (34)
- Regulation (34)
- FTC (33)
- Search (33)
- Abortion (32)
- Publication Year
- Publication
-
- UIC John Marshall Journal of Information Technology & Privacy Law (777)
- Canadian Journal of Law and Technology (256)
- Faculty Scholarship (193)
- "Dharmasisya” Jurnal Program Magister Hukum FHUI (122)
- UIC Law Review (111)
-
- All Faculty Scholarship (95)
- Seattle University Law Review (90)
- Catholic University Journal of Law and Technology (84)
- Articles (73)
- Michigan Law Review (72)
- Articles by Maurer Faculty (55)
- Vanderbilt Journal of Entertainment & Technology Law (54)
- Publications (51)
- Washington Law Review (43)
- Faculty Publications (42)
- West Virginia Law Review (40)
- Vanderbilt Law Review (39)
- Articles, Book Chapters, & Popular Press (34)
- Buffalo Law Review (32)
- Journal Articles (32)
- Seattle Journal for Social Justice (29)
- Kentucky Law Journal (28)
- Law Faculty Scholarship (27)
- Vanderbilt Law School Faculty Publications (27)
- Touro Law Review (26)
- Articles & Chapters (25)
- BYU Law Review (25)
- Indiana Law Journal (25)
- NYLS Law Review (25)
- University of Michigan Journal of Law Reform (25)
- Publication Type
- File Type
Articles 31 - 60 of 4161
Full-Text Articles in Privacy Law
Three Stories: A Comment On Pritchard & Thompson’S A History Of Securities Laws In The Supreme Court, Harwell Wells
Three Stories: A Comment On Pritchard & Thompson’S A History Of Securities Laws In The Supreme Court, Harwell Wells
Seattle University Law Review
Adam Pritchard and Robert Thompson’s A History of Securities Laws in the Supreme Court should stand for decades as the definitive work on the Federal securities laws’ career in the Supreme Court across the twentieth century.1 Like all good histories, it both tells a story and makes an argument. The story recounts how the Court dealt with the major securities laws, as well the agency charged with enforcing them, the Securities and Exchange Commission (SEC), and the rules it promulgated, from the 1930s into the twenty-first century. But the book does not just string together a series of events, “one …
On The Value Of History: A Review Of A.C. Pritchard & Robert B. Thompson’S A History Of Securities Law In The Supreme Court, Joel Seligman
On The Value Of History: A Review Of A.C. Pritchard & Robert B. Thompson’S A History Of Securities Law In The Supreme Court, Joel Seligman
Seattle University Law Review
A.C. Pritchard and Bob Thompson have written a splendid history of securities law decisions in the Supreme Court. Their book is exemplary because of its detailed use of the long unpublished papers of Supreme Court justices, including those of Harry Blackmun, William O. Douglas, Felix Frankfurter and Lewis F. Powell, primary sources which included correspondence with other Justices and law clerks as well as interviews with law clerks. The use of these primary sources recounted throughout the text and 67 pages of End Notes deepens our understanding of the intentions of the Justices and sharpens our understanding of the conflicts …
Securities Regulation And Administrative Deference In The Roberts Court, Eric C. Chaffee
Securities Regulation And Administrative Deference In The Roberts Court, Eric C. Chaffee
Seattle University Law Review
In A History of Securities Law in the Supreme Court, A.C. Pritchard and Robert B. Thompson write, “Securities law offers an illuminating window into the Supreme Court’s administrative law jurisprudence over the last century. The securities cases provide one of the most accessible illustrations of key transitions of American law.” A main reason for this is that the U.S. Securities and Exchange Commission (SEC) is a bellwether among administrative agencies, and as a result, A History of Securities Law in the Supreme Court is a history of administrative law in the Supreme Court of the United States as well.
The Esg Information System, Stavros Gadinis, Amelia Miazad
The Esg Information System, Stavros Gadinis, Amelia Miazad
Seattle University Law Review
The mounting focus on ESG has forced internal corporate decision-making into the spotlight. Investors are eager to support companies in innovative “green” technologies and scrutinize companies’ transition plans. Activists are targeting boards whose decisions appear too timid or insufficiently explained. Consumers and employees are incorporating companies sustainability credentials in their purchasing and employment decisions. These actors are asking companies for better information, higher quality reports, and granular data. In response, companies are producing lengthy sustainability reports, adopting ambitious purpose statements, and touting their sustainability credentials. Understandably, concerns about greenwashing and accountability abound, and policymakers are preparing for action.
In this …
Stakeholder Governance On The Ground (And In The Sky), Stephen Johnson, Frank Partnoy
Stakeholder Governance On The Ground (And In The Sky), Stephen Johnson, Frank Partnoy
Seattle University Law Review
Professor Frank Partnoy: This is a marvelous gathering, and it is all due to Chuck O’Kelley and the special gentleness, openness, and creativity that he brings to this symposium. For more than a decade, he has been open to new and creative ways to discuss important issues surrounding business law and Adolf Berle’s legacy. We also are grateful to Dorothy Lund for co-organizing this gathering.
In introducing Stephen Johnson, I am reminded of a previous Berle, where Chuck allowed me some time to present the initial thoughts that led to my book, WAIT: The Art and Science of Delay. Part …
The Structure Of Corporate Law Revolutions, William Savitt
The Structure Of Corporate Law Revolutions, William Savitt
Seattle University Law Review
Since, call it 1970, corporate law has operated under a dominant conception of governance that identifies profit-maximization for stockholder benefit as the purpose of the corporation. Milton Friedman’s essay The Social Responsibility of Business is to Increase Its Profits, published in September of that year, provides a handy, if admittedly imprecise, marker for the coronation of the shareholder-primacy paradigm. In the decades that followed, corporate law scholars pursued an ever-narrowing research agenda with the purpose and effect of confirming the shareholder-primacy paradigm. Corporate jurisprudence followed a similar path, slowly at first and later accelerating, to discover in the precedents and …
Stakeholder Capitalism’S Greatest Challenge: Reshaping A Public Consensus To Govern A Global Economy, Leo E. Strine Jr., Michael Klain
Stakeholder Capitalism’S Greatest Challenge: Reshaping A Public Consensus To Govern A Global Economy, Leo E. Strine Jr., Michael Klain
Seattle University Law Review
The Berle XIV: Developing a 21st Century Corporate Governance Model Conference asks whether there is a viable 21st Century Stakeholder Governance model. In our conference keynote article, we argue that to answer that question yes requires restoring—to use Berle’s term—a “public consensus” throughout the global economy in favor of the balanced model of New Deal capitalism, within which corporations could operate in a way good for all their stakeholders and society, that Berle himself supported.
The world now faces problems caused in large part by the enormous international power of corporations and the institutional investors who dominate their governance. These …
Delegated Corporate Voting And The Deliberative Franchise, Sarah C. Haan
Delegated Corporate Voting And The Deliberative Franchise, Sarah C. Haan
Seattle University Law Review
Starting in the 1930s with the earliest version of the proxy rules, the Securities and Exchange Commission (SEC) has gradually increased the proportion of “instructed” votes on the shareholder’s proxy card until, for the first time in 2022, it required a fully instructed proxy card. This evolution effectively shifted the exercise of the shareholder’s vote from the shareholders’ meeting to the vote delegation that occurs when the share-holder fills out the proxy card. The point in the electoral process when the binding voting choice is communicated is now the execution of the proxy card (assuming the shareholder completes the card …
Robo-Voting: Does Delegated Proxy Voting Pose A Challenge For Shareholder Democracy?, John Matsusaka, Chong Shu
Robo-Voting: Does Delegated Proxy Voting Pose A Challenge For Shareholder Democracy?, John Matsusaka, Chong Shu
Seattle University Law Review
Robo-voting is the practice by an investment fund of mechanically voting in corporate elections according to the advice of its proxy advisor— in effect fully delegating its voting decision to its advisor. We examined over 65 million votes cast during the period 2008–2021 by 14,582 mutual funds to describe and quantify the prevalence of robo-voting. Overall, 33% of mutual funds robo-voted in 2021: 22% with ISS, 4% with Glass Lewis, and six percent with the recommendations of the issuer’s management. The fraction of funds that robo-voted increased until around 2013 and then stabilized at the current level. Despite the sizable …
Data Controllers As Data Fiduciaries: Theory, Definitions & Burdens Of Proof, Noelle Wilson, Amanda Reid
Data Controllers As Data Fiduciaries: Theory, Definitions & Burdens Of Proof, Noelle Wilson, Amanda Reid
University of Colorado Law Review
As more U.S. states have begun to pass consumer privacy laws, there are growing calls for federal data privacy regulation to ease the burden of compliance with various, sometimes conflicting, state laws. However, scholars and lawmakers are divided on how best to balance robust privacy protections with privacy laws to which businesses can realistically comply. Two prominent regulatory models have emerged from scholarly debate. The Rights/Obligations Model grants consumers various rights and imposes obligations on businesses. This model has been trending in U.S. states, which have mirrored language from the European Union’s General Data Protection Regulation (GDPR) by imposing different …
China Data Flows And Power In The Era Of Chinese Big Tech, W. Gregory Voss, Emmanuel Pernot-Leplay
China Data Flows And Power In The Era Of Chinese Big Tech, W. Gregory Voss, Emmanuel Pernot-Leplay
Northwestern Journal of International Law & Business
Personal data have great economic interest today and their possession and control are the object of geopolitics, leading to their regulation by means that vary dependent on the strategic objectives of the jurisdiction considered. This study fills a gap in the literature in this area by analyzing holistically the regulation of personal data flows both into and from China, the world’s second largest economy. In doing so, it focuses on laws and regulations of three major power blocs: the United States, the European Union, and China, seen within the framework of geopolitics, and considering the rise of Chinese big tech. …
Cyberflashing: Exposing Oklahoma’S Legal Loophole, Sara Wray
Cyberflashing: Exposing Oklahoma’S Legal Loophole, Sara Wray
Oklahoma Law Review
No abstract provided.
Capitalism Stakeholderism, Christina Parajon Skinner
Capitalism Stakeholderism, Christina Parajon Skinner
Seattle University Law Review
Today’s corporate governance debates are replete with discussion of how best to operationalize so-called stakeholder capitalism—that is, a version of capitalism that considers the interests of employees, communities, suppliers, and the environment alongside (if not before) a company’s shareholders. So much focus has been dedicated to the question of capitalism’s reform that few have questioned a key underlying premise of stakeholder capitalism: that is, that competitive capitalism does not serve these various constituencies and groups. This Essay presents a different view and argues that capitalism is, in fact, the ultimate form of stakeholderism. As such, the Essay urges that the …
Privacy Policy Indeterminacy, Christopher G. Bradley
Privacy Policy Indeterminacy, Christopher G. Bradley
Connecticut Law Review
Despite being subjected to decades of sharp criticism, privacy policies published by companies remain a linchpin of privacy regulation. Representations in these policies provide the main measure against which consumer privacy can be judged. Policies are rarely read by consumers. Instead, these policies are interpreted by company decision makers tasked with interpreting whether a proposed course of action is consistent with stated policies as well as underlying privacy law. To be effective, policies must constrain use of consumer data even when they are given a company-friendly reading.
Experimental evidence on the interpretation of privacy policies provides no grounds for encouragement …
Privacy Nicks: How The Law Normalizes Surveillance, Woodrow Hartzog, Evan Selinger, Johanna Gunawan
Privacy Nicks: How The Law Normalizes Surveillance, Woodrow Hartzog, Evan Selinger, Johanna Gunawan
Faculty Scholarship
Privacy law is failing to protect individuals from being watched and exposed, despite stronger surveillance and data protection rules. The problem is that our rules look to social norms to set thresholds for privacy violations, but people can get used to being observed. In this article, we argue that by ignoring de minimis privacy encroachments, the law is complicit in normalizing surveillance. Privacy law helps acclimate people to being watched by ignoring smaller, more frequent, and more mundane privacy diminutions. We call these reductions “privacy nicks,” like the proverbial “thousand cuts” that lead to death.
Privacy nicks come from the …
The Automated Fourth Amendment, Maneka Sinha
The Automated Fourth Amendment, Maneka Sinha
Faculty Scholarship
Courts routinely defer to police officer judgments in reasonable suspicion and probable cause determinations. Increasingly, though, police officers outsource these threshold judgments to new forms of technology that purport to predict and detect crime and identify those responsible. These policing technologies automate core police determinations about whether crime is occurring and who is responsible. Criminal procedure doctrine has failed to insist on some level of scrutiny of—or skepticism about—the reliability of this technology. Through an original study analyzing numerous state and federal court opinions, this Article exposes the implications of law enforcement’s reliance on these practices given the weighty interests …
The Trade Origins Of Privacy Law, Anupam Chander
The Trade Origins Of Privacy Law, Anupam Chander
Georgetown Law Faculty Publications and Other Works
The desire for trade propelled the growth of data privacy law across the world. Countries with strong privacy laws sought to ensure that their citizens’ privacy would not be compromised when their data traveled to other countries. Even before this vaunted Brussels Effect pushed privacy law across the world through the enticement of trade with the European Union, Brussels had to erect privacy law within the Union itself. And as the Union itself expanded, privacy law was a critical condition for accession.
But this coupling of privacy and trade leaves a puzzle: how did the U.S. avoid a comprehensive privacy …
Unavoidability In U.S. Privacy Law, Laura M. Moy
Unavoidability In U.S. Privacy Law, Laura M. Moy
Georgetown Law Faculty Publications and Other Works
Why is U.S. privacy law structured the way it is, with a series of sectoral laws rather than a cross-sectoral law or laws? Why does U.S. privacy law protect information shared in certain contexts—such as information shared with an attorney, a healthcare provider, or a financial provider—rather than particular types of information? One possibility is that sectoral laws apply to contexts in which people typically share highly “sensitive” information containing intimate secrets or with the potential to harm them financially or psychologically.
But this Article argues that there is something else at play—that in fact, an under-discussed and underappreciated factor …
How (Not) To Deal With The Bubble Effect In Cyberspace: The Case Of The Eu And Digital Services Act, João Tornada
How (Not) To Deal With The Bubble Effect In Cyberspace: The Case Of The Eu And Digital Services Act, João Tornada
Brooklyn Journal of International Law
Deliberative democracies are based on an ideal process of speech and dialogue that fosters an “uninhibited, robust, and wide-open” public discourse sphere. In cyberspace, social networks and search engine platforms largely operate with recommender systems that tailor content according to the users' interests and online behavior (“profiling”), thus segregating them from different points of view (“bubble effect”). While this personalization of content is particularly efficient to promote commercial goods and services, when it comes to information of common interest, especially on political matters, it undermines consensus-building dialogue and threatens democratic ideals. The theory of a free “marketplace of ideas” justifies …
It's Finally Time For A National Data Privacy Law: A Discussion Of The American Data Privacy And Protection Act (Adppa), Erin J. An
Brooklyn Journal of Corporate, Financial & Commercial Law
Millions of Americans face unprecedented privacy risks related to their data, often without their awareness. With the increasing value of consumer data and its growing utilization by businesses, there is a growing demand for greater transparency and privacy protections. As of 2023, no comprehensive federal law governs data privacy in the United States, leaving citizens with limited protections. Introduced to Congress on June 21, 2022, the American Data and Privacy Protection Act (ADPPA) successfully passed the House of Representatives Committee on Energy and Commerce, making it the furthest a national comprehensive data privacy bill has progressed through the federal legislative …
Regulating The Revolution: A Legal Roadmap To Optimizing Ai In Healthcare, Fazal Khan Md, Jd
Regulating The Revolution: A Legal Roadmap To Optimizing Ai In Healthcare, Fazal Khan Md, Jd
Minnesota Journal of Law, Science & Technology
No abstract provided.
Fintech Lending In India: Taking Stock Of Implications For Privacy And Autonomy, Vidushi Marda, Amber Sinha
Fintech Lending In India: Taking Stock Of Implications For Privacy And Autonomy, Vidushi Marda, Amber Sinha
Indian Journal of Law and Technology
In the last five years, the Fintech sector has thrived in India, with Machine Learning (ML) driven credit scoring based on alternative data, emerging as a growing segment. The credit scoring industry in India needs to be viewed in light of a careful examination of rights, inclusion, appropriate safeguards and discrimination, currently missing from the discourse and practices. In this paper, we explain how ML-based credit scoring works, and the regulatory and commercial factors that have enabled and impeded its growth in India. Through legal and technological analysis, richened by insights from qualitative interviews with entrepreneurs and practitioners, we provide …
The Present And Future Of Ai Usage In The Banking And Financial Decision-Making Processes Within The Developing Indian Economy, Dr. Shouvik Kumar Guha, Bash Savage-Mansary, Dr. Navyajyoti Samanta
The Present And Future Of Ai Usage In The Banking And Financial Decision-Making Processes Within The Developing Indian Economy, Dr. Shouvik Kumar Guha, Bash Savage-Mansary, Dr. Navyajyoti Samanta
Indian Journal of Law and Technology
In course of this paper, the authors have soght to examine the extent to which technology based on artificial intelligence (AI) have made inroads into the banking and financial sectors of a developing economy like India. The paper begins with providing a contextual background to the adoption of such technology in the global financial arena. It then proceeds to identify and categorise the forms of AI currently being used in the Indian financial sector and also considers the different channels of operation where such technology is in vogue. The advantages of using such technology and the future goals for integrating …
Shields Up For Software, Derek E. Bambauer, Melanie J. Teplinsky
Shields Up For Software, Derek E. Bambauer, Melanie J. Teplinsky
UF Law Faculty Publications
This Article contends that the National Cybersecurity Strategy's software liability regime should incorporate two safe harbors. The first would shield software creators and vendors from liability for decisions related to design, implementation, and maintenance, as long as those choices follow enumerated best practices. The second—the “inverse safe harbor”—would have the opposite effect: coders and distributors who engaged in defined worst practices would automatically become liable. This Article explains the design, components, and justifications for these twin safe harbors. The software safe harbors are key parts of the overall design of the new liability regime and work in tandem with the …
Does Federal Law Ban Mailing Abortion Drugs? A Textual Analysis Of 18 U.S.C. § 1461, Peter Allevato
Does Federal Law Ban Mailing Abortion Drugs? A Textual Analysis Of 18 U.S.C. § 1461, Peter Allevato
Pepperdine Law Review
As the regulation of abortion availability returned to the States, many have grappled with so-called trigger laws: dormant laws that were set to take effect to restrict or ensure access to abortion should constitutional protection be revoked. While the federal government has no true trigger law, it does have long-unenforced laws prohibiting the mailing of “[e]very article or thing designed, adapted, or intended for producing abortion.” 18 U.S.C. § 1461 is an old law, and it has not been enforced for at least fifty years. But the law’s potential effect on the growing practice of mail-distribution of chemical abortion pills …
Our Changing Reality: The Metaverse And The Importance Of Privacy Regulations In The United States, Anushkay Raza
Our Changing Reality: The Metaverse And The Importance Of Privacy Regulations In The United States, Anushkay Raza
Global Business Law Review
This Note discusses the legal and pressing digital challenges that arise in connection with the growing use of virtual reality, and more specifically, the metaverse. As this digital realm becomes more integrated into our daily lives, the United States should look towards creating a federal privacy law that protects fundamental individual privacy rights. This Note argues that congress should emulate the European Union's privacy regulations, and further, balances the potential consequences and benefits of adapting European regulations within the United Sates. Finally, this Note provides drafting considerations of future lawyers who will not only be dealing with the rise of …
Enhanced Privacy-Enabled Face Recognition Using Κ-Identity Optimization, Ryan Karl
Enhanced Privacy-Enabled Face Recognition Using Κ-Identity Optimization, Ryan Karl
Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research
Facial recognition is becoming more and more prevalent in the daily lives of the common person. Law enforcement utilizes facial recognition to find and track suspects. The newest smartphones have the ability to unlock using the user's face. Some door locks utilize facial recognition to allow correct users to enter restricted spaces. The list of applications that use facial recognition will only increase as hardware becomes more cost-effective and more computationally powerful. As this technology becomes more prevalent in our lives, it is important to understand and protect the data provided to these companies. Any data transmitted should be encrypted …
Brief Of Amici Curiae Privacy And First Amendment Law Professors In Support Of Defendant-Appellant And Reversal, G. S. Hans, Hannah Bloch-Wehba, Danielle K. Citron, Julie E. Cohen, Mary Anne Franks, Woodrow Hartzog, Margot E. Kaminski, Gregory P. Magarian, Frank Pasquale, Neil Richards, Daniel J. Solove
Brief Of Amici Curiae Privacy And First Amendment Law Professors In Support Of Defendant-Appellant And Reversal, G. S. Hans, Hannah Bloch-Wehba, Danielle K. Citron, Julie E. Cohen, Mary Anne Franks, Woodrow Hartzog, Margot E. Kaminski, Gregory P. Magarian, Frank Pasquale, Neil Richards, Daniel J. Solove
Faculty Scholarship
STATEMENT OF INTEREST: Amici curiae are law professors and scholars of data privacy, constitutional law, and the First Amendment. Amici write to provide the court with scholarly expertise on the complexities of data privacy law and its intersection with the First Amendment. Amici have collectively written scores of academic articles and multiple books on data privacy, technology, the First Amendment, and constitutional challenges to state and federal privacy regulation.
Amici submit this brief pursuant to Fed. Rule App. P. 29(a) and do not repeat arguments made by the parties. No party’s counsel authored this brief, or any part of …
Perlindungan Hukum Bagi Pembeli Terhadap Gugatan Pembatalan Jual Beli Tanah Oleh Para Ahli Waris Penjual, M Waldi Ali Soraya, Lauditta Humaira ,S.H.,M.Kn.
Perlindungan Hukum Bagi Pembeli Terhadap Gugatan Pembatalan Jual Beli Tanah Oleh Para Ahli Waris Penjual, M Waldi Ali Soraya, Lauditta Humaira ,S.H.,M.Kn.
Lex Patrimonium
In the implementation of the Sale and Purchase Binding Agreement Deed, a dispute may occur. For example, if the land being sold is an inheritance. For example, one of the sellers does not approve of the sale and purchase, or the land is sold by someone who is not an heir. Of course the buyer will be disadvantaged. The aim of the research is to find out the legal provisions governing the unilateral cancellation of the PPJB, to explain the determination of unlawful acts and to analyze the legal protection for buyers in land sale and purchase agreements which are …
Why (And How) The Constitution Should Protect Prisoners From Gratuitous Disclosure Of Their Hiv/Aids Status, Dillon Schweers
Why (And How) The Constitution Should Protect Prisoners From Gratuitous Disclosure Of Their Hiv/Aids Status, Dillon Schweers
William & Mary Law Review
This Note is not the first to advocate for prisoners’ constitutional privacy rights concerning their HIV/AIDS status, but it is the first to focus on isolated incidents of disclosure rather than general policies that tend to lead to disclosure like mandatory testing or segregation based on HIV/AIDS status. This Note argues that the Fourteenth Amendment’s Due Process Clause should protect prisoners from isolated disclosures, meaning prisoners should have a § 1983 cause of action against guards or other prison officials who disclose their HIV/AIDS status in a gratuitous manner.
[...]
The proceeding section of this Note, Part I, details the …