Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of Pennsylvania Carey Law School (43)
- Seattle University School of Law (26)
- Selected Works (13)
- University of New Hampshire (9)
- University of Pennsylvania (8)
-
- Singapore Management University (7)
- Boise State University (4)
- University of Nebraska - Lincoln (4)
- William & Mary Law School (3)
- City University of New York (CUNY) (3)
- UIC John Marshall Law School (3)
- Washington University in St. Louis (3)
- University of Maryland Francis King Carey School of Law (3)
- SelectedWorks (3)
- Maurer School of Law: Indiana University (2)
- Embry-Riddle Aeronautical University (2)
- University of Pittsburgh School of Law (2)
- University at Buffalo School of Law (2)
- Ouachita Baptist University (1)
- Georgia State University College of Law (1)
- Chicago-Kent College of Law (1)
- California State University, San Bernardino (1)
- Illinois State University (1)
- Northeastern Illinois University (1)
- Georgetown University Law Center (1)
- Northwestern Pritzker School of Law (1)
- Bowdoin College (1)
- James Madison University (1)
- Cleveland State University (1)
- Osgoode Hall Law School of York University (1)
- Keyword
-
- Privacy (45)
- Privacy Law (13)
- Surveillance (10)
- Women (7)
- Data protection (6)
-
- Constitutional Law (6)
- Internet (5)
- Technology (5)
- Feminism (4)
- Moral and Political Philosophy (4)
- Behavioral advertising (4)
- Law and Technology (4)
- Data privacy (4)
- Ethics (4)
- Politics (4)
- Right to privacy (3)
- Big data (3)
- Consumer protection (3)
- Public health (3)
- Philosophy (3)
- Right to be forgotten (3)
- Public assistance (3)
- Transparency (3)
- Human rights (3)
- Gender Studies (3)
- Drug testing (3)
- Aerial videography (2)
- AALL Spectrum (2)
- Aerial photography (2)
- AALL Publications (2)
- Publication Year
- Publication
-
- Faculty Scholarship at Penn Law (43)
- Seattle Journal for Social Justice (25)
- Departmental Papers (ASC) (8)
- Research Collection School Of Law (7)
- Law Faculty Scholarship (6)
-
- Management Faculty Publications and Presentations (4)
- Articles (4)
- Library Philosophy and Practice (e-journal) (3)
- UIC Law Open Access Faculty Scholarship (3)
- Washington University Jurisprudence Review (3)
- Journal of Business & Technology Law (3)
- Faculty Publications (2)
- Siyuan CHEN (2)
- The University of New Hampshire Law Review (2)
- Chris Jay Hoofnagle (2)
- Michael Friedewald (2)
- Electronic Theses, Projects, and Dissertations (1)
- Articles by Maurer Faculty (1)
- Gundars E. Kaupins (1)
- Faculty Publications By Year (1)
- Honors Projects (1)
- Honors Undergraduate Theses (1)
- Buffalo Law Review (1)
- Georgetown Law Faculty Publications and Other Works (1)
- Honors Theses (1)
- Faculty and Staff Publications – Milner Library (1)
- Electronic Thesis and Dissertation Repository (1)
- Anil Kalhan (1)
- All Faculty Scholarship (1)
- Catholic University Journal of Law and Technology (1)
- Publication Type
- File Type
Articles 1 - 30 of 166
Full-Text Articles in Social and Behavioral Sciences
Privacy Vs. Transparency: Handling Protected Materials In Agency Rulemaking, Christopher S. Yoo, Kellen Mccoy
Privacy Vs. Transparency: Handling Protected Materials In Agency Rulemaking, Christopher S. Yoo, Kellen Mccoy
Faculty Scholarship at Penn Law
Agencies conducting informal rulemaking proceedings increasingly confront conflicting duties with respect to protected materials included in information submitted in public rulemaking dockets. They must reconcile the broad commitment to openness and transparency reflected in federal law with the duty to protect confidential business information (CBI) and personally identifiable information (PII) against improper disclosure.
This Article presents an analysis of how agencies can best balance these often-countervailing considerations. Part I explores the statutory duties to disclose and withhold information submitted in public rulemaking dockets placed on agencies. It also examines judicial decisions and other legal interpretations regarding the proper way to ...
An Analysis Of Technological Components In Relation To Privacy In A Smart City, Kayla Rutherford, Ben Lands, A. J. Stiles
An Analysis Of Technological Components In Relation To Privacy In A Smart City, Kayla Rutherford, Ben Lands, A. J. Stiles
James Madison Undergraduate Research Journal (JMURJ)
A smart city is an interconnection of technological components that store, process, and wirelessly transmit information to enhance the efficiency of applications and the individuals who use those applications. Over the course of the 21st century, it is expected that an overwhelming majority of the world’s population will live in urban areas and that the number of wireless devices will increase. The resulting increase in wireless data transmission means that the privacy of data will be increasingly at risk. This paper uses a holistic problem-solving approach to evaluate the security challenges posed by the technological components that make up ...
The Internet Never Forgets: Image-Based Sexual Abuse And The Workplace, John Schriner, Melody Lee Rood
The Internet Never Forgets: Image-Based Sexual Abuse And The Workplace, John Schriner, Melody Lee Rood
Publications and Research
Image-based sexual abuse (IBSA), commonly known as revenge pornography, is a type of cyberharassment that often results in detrimental effects to an individual's career and livelihood. Although there exists valuable research concerning cyberharassment in the workplace generally, there is little written about specifically IBSA and the workplace. This chapter examines current academic research on IBSA, the issues with defining this type of abuse, victim blaming, workplace policy, and challenges to victim-survivors' redress. The authors explore monetary motivation for websites that host revenge pornography and unpack how the dark web presents new challenges to seeking justice. Additionally, this chapter presents ...
Compliance Management Systems: Do They Make A Difference?, Cary Coglianese, Jennifer Nash
Compliance Management Systems: Do They Make A Difference?, Cary Coglianese, Jennifer Nash
Faculty Scholarship at Penn Law
Regulatory compliance is vital for promoting the public values served by regulation. Yet many businesses remain out of compliance with some of the regulations that apply to them—presenting not only possible dangers to the public but also exposing themselves to potentially significant liability risk. Compliance management systems (CMSs) may help reduce the likelihood of noncompliance. In recent years, managers have begun using CMSs in an effort to address compliance issues in a variety of domains: environment, workplace health and safety, finance, health care, and aviation, among others. CMSs establish systematic, checklist-like processes by which managers seek to improve their ...
The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin
The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin
Open Educational Resources
Using episodes from the show Black Mirror as a study tool - a show that features tales that explore techno-paranoia - the course analyzes legal and policy considerations of futuristic or hypothetical case studies. The case studies tap into the collective unease about the modern world and bring up a variety of fascinating key philosophical, legal, and economic-based questions.
Privacy And Surveillance In The Workplace: Closing The Electronic Surveillance Gap, Christina Catenacci
Privacy And Surveillance In The Workplace: Closing The Electronic Surveillance Gap, Christina Catenacci
Electronic Thesis and Dissertation Repository
This dissertation argues that there is an electronic surveillance gap in the employment context in Canada, a gap that is best understood as an absence of appropriate legal provisions to regulate employers’ electronic surveillance of employees both inside and outside the workplace. This dissertation aims to identify and articulate principles and values that can be used to close the electronic surveillance gap in Canada and suggests that, through the synthesis of social theories of surveillance and privacy, together with analyses of privacy provisions and workplace privacy cases, a new and better workplace privacy regime can be designed. This dissertation uses ...
Surveillance Technology Toward A Dystopian Future, Sandy Hernandez
Surveillance Technology Toward A Dystopian Future, Sandy Hernandez
University Honors Program Senior Projects
There is a continual debate between individuals who attempt to measure the individual’s right to privacy against the government’s right to know as an exchange to provide for the security of all citizens. Questions that demand an answer are whether the individual’s right to privacy outweighs the government’s duty to provide security; and if security is considered more important, can there even be a right to privacy. When questioning the right to privacy and state surveillance, there are three key goals. First, to investigate whether the human right to privacy should exist, considering the continued threat ...
Youtube Is Unsafe For Children: Youtube's Safeguards And The Current Legal Framework Are Inadequate To Protect Children From Disturbing Content, Heather Wilson
Youtube Is Unsafe For Children: Youtube's Safeguards And The Current Legal Framework Are Inadequate To Protect Children From Disturbing Content, Heather Wilson
Seattle Journal of Technology, Environmental & Innovation Law
For America’s children, the amount of screen time they consume has not changed much over the years. Children under eight have steadily spent about two hours a day in front of a screen, with those under age two averaging 42 minutes a day. Children from low-income families spend roughly an hour and forty minutes longer in front of a screen. According to the American Academy of Pediatrics, screen time should be limited to two hours a day for children ages two to five; whereas, for those youngest children—under two years—they recommend zero screen time.
While the average ...
Ethics, Ai, Mass Data And Pandemic Challenges: Responsible Data Use And Infrastructure Application For Surveillance And Pre-Emptive Tracing Post-Crisis, Mark Findlay, Jia Yuan Loke, Nydia Remolina Leon, Yum Yin, Benjamin (Tan Renyan) Tham
Ethics, Ai, Mass Data And Pandemic Challenges: Responsible Data Use And Infrastructure Application For Surveillance And Pre-Emptive Tracing Post-Crisis, Mark Findlay, Jia Yuan Loke, Nydia Remolina Leon, Yum Yin, Benjamin (Tan Renyan) Tham
Research Collection School Of Law
As the COVID-19 health pandemic rages governments and private companies across the globe are utilising AI-assisted surveillance, reporting, mapping and tracing technologies with the intention of slowing the spread of the virus. These technologies have the capacity to amass personal data and share for community control and citizen safety motivations that empower state agencies and inveigle citizen co-operation which could only be imagined outside such times of real and present danger. While not cavilling with the short-term necessity for these technologies and the data they control, process and share in the health regulation mission, this paper argues that this infrastructure ...
The Data Market: A Proposal To Control Data About You, David Shaw, Daniel W. Engels
The Data Market: A Proposal To Control Data About You, David Shaw, Daniel W. Engels
SMU Data Science Review
The current legal and economic infrastructure facilitating data collection practices and data analysis has led to extreme over-collection of data and the overall loss of personal privacy. Data over-collection has led to a secondary market for consumer data that is invisible to the consumer and results in a person's data being distributed far beyond their knowledge or control. In this paper, we propose a Data Market framework and design for personal data management and privacy protection in which the individual controls and profits from the dissemination of their data. Our proposed Data Market uses a market-based approach utilizing blockchain ...
Screened Out Of Housing: The Impact Of Misleading Tenant Screening Reports And The Potential For Criminal Expungement As A Model For Effectively Sealing Evictions, Katelyn Polk
Northwestern Journal of Law & Social Policy
Having an eviction record “blacklists” tenants from finding future housing. Even renters with mere eviction filings—not eviction orders—on their records face the harsh collateral consequences of eviction. This Note argues that eviction records should be sealed at filing and only released into the public record if a landlord prevails in court. Juvenile record expungement mechanisms in Illinois serve as a model for one way to protect people with eviction records. Recent updates to the Illinois juvenile expungement process provided for the automatic expungement of certain records and strengthened the confidentiality protections of juvenile records. Illinois protects juvenile records ...
Privacy Or The Polls: Public Voter Registration Laws As A Modern Form Of Vote Denial, Audrey Paige Sauer
Privacy Or The Polls: Public Voter Registration Laws As A Modern Form Of Vote Denial, Audrey Paige Sauer
William & Mary Law Review
On May 11, 2017, President Donald J. Trump signed an executive order establishing the Presidential Advisory Commission on Election Integrity (PACEI), with the mission to “study the registration and voting processes used in Federal elections.” Pursuant to this mission, Vice Chair of the Commission, Kansas Secretary of State Kris Kobach, sent out letters to state election officials soliciting all “publicly available voter roll data,” including all registrants’ full first and last names, middle names or initials, addresses, dates of birth, political party, last four digits of Social Security numbers if available, voter history from 2006 onward, information regarding any felony ...
Governing The Internet: The Extraterritorial Effects Of The General Data Protection Regulation, Sasa Jovanovic
Governing The Internet: The Extraterritorial Effects Of The General Data Protection Regulation, Sasa Jovanovic
Honors Projects
The advent of the commercial Internet has introduced novel challenges to global governance because of the transnational nature of shared data flows, creating interdependence that may result in inter-state cooperation or competition. Data protection laws that are designed to ensure citizens’ right to privacy are one of the primary tool used by states to extend control over data flows. The European Union’s (EU) General Data Protection Regulation (2016) is widely regarded as the strongest data protection law in the world, and therefore may serve as a barrier to the openness of the Internet. The GDPR is both an instance ...
Privacidad Digital En Ecuador: El Papel De La Vigilancia, La Jurisprudencia Y Los Derechos Humanos, Giselle Valdez
Privacidad Digital En Ecuador: El Papel De La Vigilancia, La Jurisprudencia Y Los Derechos Humanos, Giselle Valdez
Independent Study Project (ISP) Collection
Este documento es un estudio de caso sobre la privacidad digital en Ecuador, cómo se protege y cómo se debe mejorar las protecciones. Comienzo presentando la falta de privacidad de la persona en Ecuador, a través de la reciente violación de datos y las tecnologías de vigilancia en todo el país desde China. Luego, para analizar la jurisprudencia y la falta de protección de la privacidad en la ley, hago la transición a un análisis legal de la privacidad de datos en Ecuador a través de la Constitución de 2008. Cuando establezco que falta privacidad digital en Ecuador, demuestro una ...
Towards Standard Information Privacy, Innovations Of The New General Data Protection Regulation, Ali Alibeigi, Abu Bakar Munir, Md Ershadulkarim, Adeleh Asemi
Towards Standard Information Privacy, Innovations Of The New General Data Protection Regulation, Ali Alibeigi, Abu Bakar Munir, Md Ershadulkarim, Adeleh Asemi
Library Philosophy and Practice (e-journal)
Protection of personal data in recent decades became more crucial affecting by emergence of the new technologies especially computer, internet, information and communications technology. However, Europeans felt this necessity at time and provided for up-to-date and supportive laws. The General Data Protection Regulation (GDPR) is the latest legislation in EU to protect personal data of individuals based on the recent technological advancements. However, its’ domestic and international output still is debatable. This doctrinal legal study by using descriptive methods, aimed to evaluate the GDPR through analyzing and interpreting its’ provisions by especial focus on its’ innovations. The results show that ...
Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick
Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick
Faculty Scholarship at Penn Law
Across the Internet, mistaken and malicious routing announcements impose significant costs on users and network operators. To make routing announcements more reliable and secure, Internet coordination bodies have encouraged network operators to adopt the Resource Public Key Infrastructure (“RPKI”) framework. Despite this encouragement, RPKI’s adoption rates are low, especially in North America.
This report presents the results of a year-long investigation into the hypothesis—widespread within the network operator community—that legal issues pose barriers to RPKI adoption and are one cause of the disparities between North America and other regions of the world. On the basis of interviews ...
Examining The Legality Of Employee Microchipping Under The Lens Of The Transhumanistic Proactionary Principle, Joshua Z. Wasbin
Examining The Legality Of Employee Microchipping Under The Lens Of The Transhumanistic Proactionary Principle, Joshua Z. Wasbin
Washington University Jurisprudence Review
Modern workplaces are beginning to look to implanting their
employees with RFID microchips as a replacement for badges and
keycards. While both employers and employees stand to benefit from the
convenience of this innovation, states have begun to look to legislative
options for restricting employers from requiring that their employees get
microchipped. This Note will examine some of the state legislation and
will argue that Congress must institute a federal law that will provide
similar, if not stronger, levels of protection for employees who seek to
avoid being microchipped, an argument premised upon the
Transhumanistic Proactionary Principle.
Privacy And The Internet Of Things: Why Changing Expectations Demand Heightened Standards, Graham Johnson
Privacy And The Internet Of Things: Why Changing Expectations Demand Heightened Standards, Graham Johnson
Washington University Jurisprudence Review
Entertainment consoles, wearable monitors, and security systems. For
better or worse, internet-connected devices are revolutionizing the
consumer products industry. Referred to broadly as the Internet of Things
(IoT), this ‘smart’ technology is drastically increasing the means, scope,
and frequency by which individuals communicate their personal
information. This Note explores the disruptive impact of IoT consumer
devices on the U.S.’s patchwork system of privacy protections. After
presenting a high-level survey of several key regulatory issues, this Note
argues that the proliferation of IoT devices exposes a fundamental flaw in
the Katz “reasonable expectation of privacy” standard. As individual
expectations ...
Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment's Third-Party Doctrine, Cristina Del Rosso
Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment's Third-Party Doctrine, Cristina Del Rosso
Honors Undergraduate Theses
The intent of this thesis is to examine the future of the third-party doctrine with the proliferation of technology and the online data we are surrounded with daily, specifically after the United States Supreme Court's decision in Carpenter v. United States. In order to better understand the Supreme Court's reasoning in that case, this thesis will review the history of the third-party doctrine and its roots in United States v. Miller and Smith v. Maryland. A review of Fourth Amendment history and jurisprudence is also crucial to this thesis, as it is imperative that individuals do not forfeit ...
Right To Privacy, A Complicated Concept To Review, Ali Alibeigi, Abu Bakar Munir, Md Ershadul Karim
Right To Privacy, A Complicated Concept To Review, Ali Alibeigi, Abu Bakar Munir, Md Ershadul Karim
Library Philosophy and Practice (e-journal)
The Concept and definition of the privacy has been changed during the time affecting by different factors. At the same time, the boundaries of privacy may differ from one place to another affecting by the culture, religion, etc. Nonetheless, there is not a unique general accepted definition for the privacy. Privacy has been considered from different disciplines like sociology, psychology, law and philosophy. It is a multidisciplinary domain, having an easy concept but difficult to define. However, by reviewing all different viewpoints, it can be concluded that privacy is an individual tendency, wish and natural need to be away from ...
Hardware, Heartware, Or Nightmare: Smart-City Technology And The Concomitant Erosion Of Privacy, Leila Lawlor
Hardware, Heartware, Or Nightmare: Smart-City Technology And The Concomitant Erosion Of Privacy, Leila Lawlor
Faculty Publications By Year
Smart city technology is being adopted in cities all around the world to simplify our lives, save us time, ease traffic, improve education, reduce energy usage and keep us safe. This article discusses smart city projects being utilized in crime prevention and investigations. Specifically, this article highlights examples of gunshot detection devices and surveillance that have led to improvements in public safety in Cape Town, Chicago and Atlanta, and discusses their impacts to privacy.
Facebook-Cambridge Analytica Data Harvesting: What You Need To Know, Ikhlaq Ur Rehman
Facebook-Cambridge Analytica Data Harvesting: What You Need To Know, Ikhlaq Ur Rehman
Library Philosophy and Practice (e-journal)
In 2018, it became public knowledge that millions of Facebook users’ data had been harvested without their consent. At the heart of the issue was Cambridge Analytica (CA) which in partnership with Cambridge researcher, Aleksandr Kogan harvested data from millions of Facebook profiles. Kogan had developed an application called “thisisyourdigitallife” which featured a personality quiz and CA paid for people to take it. The app recorded results of each quiz, collected data from quiz taker’s Facebook account such as personal information and Facebook activity (e.g., what content was “liked”) as well as their Facebook friends which led to ...
Protecting Consumers' Personal Data In The Digital World: Challenges And Changes, Man Yip
Protecting Consumers' Personal Data In The Digital World: Challenges And Changes, Man Yip
Research Collection School Of Law
At the Personal Data Protection Seminar 2017, Dr Yaacob Ibrahim, Minister for Communications and Information, said that Singapore must “aspire towards a high standard of data protection that strengthens trust with the public, gives confidence to customers whose data is collected and used, while providing an environment for companies to thrive in the digital economy”.
Law, Metaphor, And The Encrypted Machine, Lex Gill
Law, Metaphor, And The Encrypted Machine, Lex Gill
Osgoode Hall Law Journal
The metaphors we use to imagine, describe, and regulate new technologies have profound legal implications. This article offers a critical examination of the metaphors we choose to describe encryption technology and aims to uncover some of the normative and legal implications of those choices. The article begins with a basic technical backgrounder and reviews the main legal and policy problems raised by strong encryption. Then it explores the relationship between metaphor and the law, demonstrating that legal metaphor may be particularly determinative wherever the law seeks to integrate novel technologies into old legal frameworks. The article establishes a loose framework ...
The Surveillance Gap: The Harms Of Extreme Privacy And Data Marginalization, Michele Gilman, Rebecca Green
The Surveillance Gap: The Harms Of Extreme Privacy And Data Marginalization, Michele Gilman, Rebecca Green
Faculty Publications
We live in an age of unprecedented surveillance, enhanced by modern technology, prompting some to suggest that privacy is dead. Previous scholarship suggests that no subset of the population feels this phenomenon more than marginalized communities. Those who rely on public benefits, for example, must turn over personal information and submit to government surveillance far more routinely than wealthier citizens who enjoy greater opportunity to protect their privacy and the ready funds to secure it. This article illuminates the other end of the spectrum, arguing that many individuals who may value government and nonprofit services and legal protections fail to ...
How Different Are Young Adults From Older Adults When It Comes To Information Privacy Attitudes & Policies?, Chris Jay Hoofnagle, Jennifer King, Su Li, Joseph Turow
How Different Are Young Adults From Older Adults When It Comes To Information Privacy Attitudes & Policies?, Chris Jay Hoofnagle, Jennifer King, Su Li, Joseph Turow
Chris Jay Hoofnagle
Media reports teem with stories of young people posting salacious photos online, writing about alcohol-fueled misdeeds on social networking sites, and publicizing other ill-considered escapades that may haunt them in the future. These anecdotes are interpreted as representing a generation-wide shift in attitude toward information privacy. Many commentators therefore claim that young people “are less concerned with maintaining privacy than older people are.” Surprisingly, though, few empirical investigations have explored the privacy attitudes of young adults. This report is among the first quantitative studies evaluating young adults’ attitudes. It demonstrates that the picture is more nuanced than portrayed in the ...
The Federal Trade Commission And Consumer Privacy In The Coming Decade, Joseph Turow, Chris Jay Hoofnagle, Deirdre K. Mulligan, Nathaniel Good, Jens Grossklags
The Federal Trade Commission And Consumer Privacy In The Coming Decade, Joseph Turow, Chris Jay Hoofnagle, Deirdre K. Mulligan, Nathaniel Good, Jens Grossklags
Chris Jay Hoofnagle
The large majority of consumers believe that the term “privacy policy” describes a baseline level of information practices that protect their privacy. In short, “privacy,” like “free” before it, has taken on a normative meaning in the marketplace. When consumers see the term “privacy policy,” they believe that their personal information will be protected in specific ways; in particular, they assume that a website that advertises a privacy policy will not share their personal information. Of course, this is not the case. Privacy policies today come in all different flavors. Some companies make affirmative commitments not to share the personal ...
The Ecology Of Transparency Reloaded, Seth F. Kreimer
The Ecology Of Transparency Reloaded, Seth F. Kreimer
Faculty Scholarship at Penn Law
As Justice Stewart famously observed, "[t]he Constitution itself is neither a Freedom of Information Act nor an Official Secrets Act." What the Constitution's text omits, the last two generations have embedded in "small c" constitutional law and practice in the form of the Freedom of Information Act and a series of overlapping governance reforms including Inspectors General, disclosure of political contributions, the State Department’s “Dissent Channel,” the National Archives Information Security Oversight Office, and the publication rights guaranteed by New York Times v. United States. These institutions constitute an ecology of transparency.
The late Justice Scalia argued ...
Così Fan Tutte: A Better Approach Than The Right To Be Forgotten, Martha Garcia-Murillo, Ian Macinnes
Così Fan Tutte: A Better Approach Than The Right To Be Forgotten, Martha Garcia-Murillo, Ian Macinnes
School of Information Studies - Faculty Scholarship
In this article, we argue in favor of a macro-societal approach to protect people from the potential harms of personal information online. In the tension between information and privacy, “the right to be forgotten” is not an appropriate solution. Such a micro, individual-based answer puts the burden of protection on each person instead of on external entities that can abuse such knowledge. The personal responsibility to delete personal data is challenging because of the leakage of data that happens through the connections we have with others, many of whom do not share the same privacy preferences. We show that effective ...
The Sidis Case And The Origins Of Modern Privacy Law, Samantha Barbas
The Sidis Case And The Origins Of Modern Privacy Law, Samantha Barbas
Samantha Barbas
The American press, it’s been said, is freer to invade personal privacy than perhaps any other in the world. The tort law of privacy, as a shield against unwanted media exposure of private life, is very weak. The usual reason given for the weakness of U.S. privacy law as a bar on the publication of private information is the strong tradition of First Amendment freedom. But “freedom of the press” alone cannot explain why liberty to publish has been interpreted as a right to print truly intimate matters or to thrust people into the spotlight against their will ...