Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2118 Full-Text Articles 2061 Authors 714965 Downloads 107 Institutions

All Articles in Privacy Law

Faceted Search

2118 full-text articles. Page 3 of 52.

The Ecology Of Transparency Reloaded, Seth F. Kreimer 2017 University of Pennsylvania Law School

The Ecology Of Transparency Reloaded, Seth F. Kreimer

Faculty Scholarship

As Justice Stewart famously observed, "[t]he Constitution itself is neither a Freedom of Information Act nor an Official Secrets Act." What the Constitution's text omits, the last two generations have embedded in "small c" constitutional law and practice in the form of the Freedom of Information Act and a series of overlapping governance reforms including Inspectors General, disclosure of political contributions, the State Department’s “Dissent Channel,” the National Archives Information Security Oversight Office, and the publication rights guaranteed by New York Times v. United States. These institutions constitute an ecology of transparency.

The late Justice Scalia argued ...


Reining In Internet-Age Expansion Of Exemption 7(C): Towards A Tort Law Approach For Ferreting Out Legitimate Privacy Concerns And Unwarranted Intrusions Under Foia, Clay Calvert, Austin Vining, Sebastian Zarate 2017 University of Florida

Reining In Internet-Age Expansion Of Exemption 7(C): Towards A Tort Law Approach For Ferreting Out Legitimate Privacy Concerns And Unwarranted Intrusions Under Foia, Clay Calvert, Austin Vining, Sebastian Zarate

SMU Law Review

Using the July 2016 federal appellate court decision in Detroit Free Press, Inc. v. U.S. Department of Justice as an analytical springboard, this article explores the expansion of Freedom of Information Act (FOIA) Exemption 7(C) in the Internet era. In Detroit Free Press, the Sixth Circuit recognized a privacy interest in mug shots under Exemption 7(C). The practical impact of the decision is to uphold the general policy of the U.S. Marshals Service not to release mug shots. This article illustrates the yawning gap between tort law, which this article argues would deny recovery for the ...


Franchise Tax Bd. V. Hyatt, 133 Nev. Adv. Op. 57 (Sept. 14, 2017), Carmen Gilbert 2017 University of Nevada, Las Vegas -- William S. Boyd School of Law

Franchise Tax Bd. V. Hyatt, 133 Nev. Adv. Op. 57 (Sept. 14, 2017), Carmen Gilbert

Nevada Supreme Court Summaries

The Court found that discretionary-function immunity does not apply to intentional bad-faith tort claims. The Court also expressly adopted the false light invasion of privacy right of action in order to fully protect privacy interests. The Court also adopted the sliding scale approach for evaluating IIED claims, holding that increased severity of conduct will require less evidence to prove emotional distress.


Getting Under Fido's Skin: Analyzing The Objections To Mandatory Pet Microchipping Laws, Stephen D. Lott 2017 University of Oklahoma College of Law

Getting Under Fido's Skin: Analyzing The Objections To Mandatory Pet Microchipping Laws, Stephen D. Lott

Oklahoma Journal of Law and Technology

No abstract provided.


Yershov V. Gannett: Rethinking The Vppa In The 21st Century, Ariel A. Pardee 2017 University of Maine School of Law

Yershov V. Gannett: Rethinking The Vppa In The 21st Century, Ariel A. Pardee

Maine Law Review

Almost anyone with a smartphone can recall a time when an online advertisement followed them from webpage to webpage, or mobile browser to mobile application, or even jumped from a mobile device to a desktop web browser. While some people see it as a harmless—or even helpful—quirk of the online world, others find it creepy and intrusive. In the absence of significant government regulation of online advertising practices, particularly aggrieved individuals have sought relief in the courts by alleging violations of ill-fitting statutes drafted decades ago. This note explores just such a case, Yershov v. Gannett, in which ...


Iright: There's No App For That, Justin Hinderliter 2017 University of Oklahoma College of Law

Iright: There's No App For That, Justin Hinderliter

Oklahoma Journal of Law and Technology

No abstract provided.


Photography And The Right To Privacy: The French And American Approaches, W. J. Wagner 2017 St. John's University School of Law

Photography And The Right To Privacy: The French And American Approaches, W. J. Wagner

The Catholic Lawyer

No abstract provided.


Substance Use Disorder Treatment Confidentiality Boot Camp, Lucy C. Hodder, Stephanie Cameron, Marcy Doyle, Christina Muñiz, Jeanne Ryer 2017 University of New Hampshire School of Law

Substance Use Disorder Treatment Confidentiality Boot Camp, Lucy C. Hodder, Stephanie Cameron, Marcy Doyle, Christina Muñiz, Jeanne Ryer

Law Faculty Scholarship

[Excerpt]: "INTRODUCTION: The Health Law and Policy Programs at UNH School of Law, Institute for Health Policy and Practice, and the NH Citizens Health Initiative have contracted with several of the New Hampshire Building Capacity for Transformation Delivery System Reform Incentive Payment (DSRIP) Integrated Delivery Networks (IDN) to provide technical assistance to the IDNs as they develop confidentiality tools related to substance use disorder services projects.

A UNH Team assisted the IDNs by providing an educational summary of federal and state confidentiality requirements, focusing on 42 CFR Part 2, and hosting IDN interdisciplinary teams in three Substance Use Disorder (SUD ...


Legislative Requirements For Cyber Peacekeeping, Nikolay Akatyev, Joshua I. James 2017 Horangi

Legislative Requirements For Cyber Peacekeeping, Nikolay Akatyev, Joshua I. James

Journal of Digital Forensics, Security and Law

Cyber Peacekeeping strives for the prevention, mitigation and cessation of cyber and physical conflicts. The creation of a Cyber Peacekeeping organization, however, has major legal and political implications. In this work we review current international legislation applicable for functions of Cyber Peacekeeping. Specifically, we analyze prominent works which contribute to definitions, law and ethics regulating cyber conflicts from the perspective of the creation of a CPK organization. Legislative and terminological foundations are analyzed and adopted from current practice. Further, this work analyzes guiding principles of global organizations such as ITU IMPACT, INTERPOL and regional organizations such as NATO and the ...


Data Collection And The Regulatory State, Ahmed Ghappour 2017 Boston University School of Law

Data Collection And The Regulatory State, Ahmed Ghappour

Faculty Scholarship

The following remarks were given on January 27, 2017 during the Connecticut Law Review’s symposium, “Privacy, Security & Power: The State of Digital Surveillance.” Hillary Greene, the Zephaniah Swift Professor of Law at the University of Connecticut School of Law, offered introductory remarks and moderated the panel. The panel included Dr. Cooper, Associate Professor of Law and Director of the Program on Economics & Privacy at Antonin Scalia Law School at George Mason University, Professor Ghappour, Visiting Assistant Professor at UC Hastings College of the Law, Attorney Lieber, Senior Privacy Policy Counsel at Google, and Dr. Wu, Professor of Law and ...


Comments To The Federal Trade Commission On The Can-Spam Rule Review, 16 C.F.R. Part 316, Project No. R711010, Roger Allan Ford 2017 University of New Hampshire School of Law

Comments To The Federal Trade Commission On The Can-Spam Rule Review, 16 C.F.R. Part 316, Project No. R711010, Roger Allan Ford

Law Faculty Scholarship

These comments respond to the Federal Trade Commission’s request for public comment on the CAN-SPAM Rule, 16 C.F.R. Part 316.

The CAN-SPAM Act set a minimum baseline for consumer protections that senders of unsolicited commercial email must respect. These protections have been largely effective at giving consumers the ability to manage how a large group of companies uses their email addresses for marketing. At the same time, the Act has had little effect on the volume of unsolicited commercial email or on the amount of email sent by scammers and fraudsters. The Act and its implementing Rule ...


Disposing With A (Not-So) Blunt Instrument, For Privacy’S Sake, Victoria Ashley Paxton 2017 University of Miami Law School

Disposing With A (Not-So) Blunt Instrument, For Privacy’S Sake, Victoria Ashley Paxton

University of Miami International and Comparative Law Review

No abstract provided.


Brief Of Amici Curiae Electronic Privacy Information Center (Epic) And Thirty-Six Technical Experts And Legal Scholars In Support Of Petitioner.Pdf, Jennifer Daskal 2017 American University Washington College of Law

Brief Of Amici Curiae Electronic Privacy Information Center (Epic) And Thirty-Six Technical Experts And Legal Scholars In Support Of Petitioner.Pdf, Jennifer Daskal

Jennifer Daskal

Brief of Amici Curiae Electronic Privacy Information Center (Epic) and Thirty-Six Technical Experts and Legal Scholars in Support of Petitioner, in Carpenter v. United States, No. 16-402 (SCOTUS Aug. 14, 2017).


From Blockbuster To Mobile Apps—Video Privacy Protection Act Of 1988 Continues To Protect The Digital Citizen, Ann Stehling 2017 Southern Methodist University

From Blockbuster To Mobile Apps—Video Privacy Protection Act Of 1988 Continues To Protect The Digital Citizen, Ann Stehling

SMU Law Review

No abstract provided.


Relational Contracts Of Adhesion, David A. Hoffman 2017 University of Pennsylvania Law School

Relational Contracts Of Adhesion, David A. Hoffman

Faculty Scholarship

Not all digital fine print exculpates liability: some exhorts users to perform before the consumer relationship has soured. We promise to choose strong passwords (and hold them private); to behave civilly on social networks; to refrain from streaming shows and sports; and to avoid reverse-engineering code (or, worse, deploying deadly bots). In short: consumers are apparently regulated by digital fine print, though it’s universally assumed we don’t read it, and even if we did, we’ll never be sued for failing to perform.

On reflection, this ordinary phenomenon is perplexing. Why would firms persist in deploying uncommunicative behavioral ...


The Outer Limits: Imsi-Catchers, Technology, And The Future Of The Fourth Amendment, Ryan C. Chapman 2017 Pepperdine University

The Outer Limits: Imsi-Catchers, Technology, And The Future Of The Fourth Amendment, Ryan C. Chapman

Pepperdine Law Review

Recent advances in technology are posing new challenges for a legal system based on decades-old precedent. Nowhere is this more apparent than in law enforcement’s warrantless use of IMSI Catchers. These devices mimic a cell phone tower, and when the device is activated, cell phones will naturally connect to them. Law enforcement officers can use those intercepted cell phone signals to track a suspect’s movements in real time with startling accuracy. Scholarly commentary on these devices has largely concluded that their use requires a warrant. This Comment engages in a close examination of Fourth Amendment precedent and argues ...


Averting Robot Eyes, Margot E. Kaminski, Matthew Rueben, William D. Smart, Cindy M. Grimm 2017 University of Maryland Francis King Carey School of Law

Averting Robot Eyes, Margot E. Kaminski, Matthew Rueben, William D. Smart, Cindy M. Grimm

Maryland Law Review

No abstract provided.


Reviving The Public Trustee Concept And Applying It To Information Privacy Policy, Priscilla M. Regan 2017 University of Maryland Francis King Carey School of Law

Reviving The Public Trustee Concept And Applying It To Information Privacy Policy, Priscilla M. Regan

Maryland Law Review

No abstract provided.


In Defense Of The Long Privacy Statement, Mike Hintze 2017 University of Maryland Francis King Carey School of Law

In Defense Of The Long Privacy Statement, Mike Hintze

Maryland Law Review

No abstract provided.


Rule 41 Amendments Provide For A Drastic Expansion Of Government Authority To Conduct Computer Searches And Should Not Have Been Adopted By The Supreme Court, Markus Rauschecker 2017 University of Maryland Francis King Carey School of Law

Rule 41 Amendments Provide For A Drastic Expansion Of Government Authority To Conduct Computer Searches And Should Not Have Been Adopted By The Supreme Court, Markus Rauschecker

Maryland Law Review

No abstract provided.


Digital Commons powered by bepress