Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2,172 Full-Text Articles 2,137 Authors 714,965 Downloads 112 Institutions

All Articles in Privacy Law

Faceted Search

2,172 full-text articles. Page 5 of 54.

A Pantomime Of Privacy: Terrorism And Investigative Powers In German Constitutional Law, Russell A. Miller 2017 Washington & Lee University School of Law

A Pantomime Of Privacy: Terrorism And Investigative Powers In German Constitutional Law, Russell A. Miller

Boston College Law Review

Germany is widely regarded as a global model for the privacy protection its constitutional regime offers against intrusive intelligence-gathering and law enforcement surveillance. There is some basis for Germany’s privacy “exceptionalism,” especially as the text of the German Constitution (“Basic Law”) provides explicit textual protections that America’s Eighteenth Century Constitution lacks. The German Federal Constitutional Court has added to those doctrines with an expansive interpretation of the more general rights to dignity (Basic Law Article 1) and the free development of one’s personality (Basic Law Article 2). This jurisprudence includes constitutional liberty guarantees such as the absolute ...


Contemplating The Use Of Classified Or State Secret Information Obtained Ex Parte On The Merits In Civil Litigation: Bl(A)Ck Tea Society V. City Of Boston, Brian M. Tomney 2017 University of Maine School of Law

Contemplating The Use Of Classified Or State Secret Information Obtained Ex Parte On The Merits In Civil Litigation: Bl(A)Ck Tea Society V. City Of Boston, Brian M. Tomney

Maine Law Review

In Bl(a)ck Tea Society v. City of Boston, the First Circuit Court of Appeals affirmed, without dissent, a district court's ruling denying protesters at the 2004 Democratic National Convention a preliminary injunction designed to force the City of Boston to modify its designated demonstration zone (DZ) and remove some of the draconian security measures surrounding the zone. The injunction was denied by Judge Woodlock after he personally inspected the DZ and determined that, given “constraints of time, geography, and safety,” there were no viable alternatives—to site location or construction of the DZ itself—that could reasonably ...


Collection Of Cryptocurrency Customer-Information: Tax Enforcement Mechanism Or Invasion Of Privacy?, Austin Elliott 2017 Duke Law

Collection Of Cryptocurrency Customer-Information: Tax Enforcement Mechanism Or Invasion Of Privacy?, Austin Elliott

Duke Law & Technology Review

After granting permission to the Internal Revenue Service to serve a digital exchange company a summons for user information, the Federal District Court for the Northern District of California created some uncertainty regarding the privacy of cryptocurrencies. The IRS views this information gathering as necessary for monitoring compliance with Notice 2014-21, which classifies cryptocurrencies as property for tax purposes. Cryptocurrency users, however, view the attempt for information as an infringement on their privacy rights and are seeking legal protection. This Issue Brief investigates the future tax implications of Notice 2014-21 and considers possible routes the cryptocurrency market can take to ...


When Fame Takes Away The Right To Privacy In One's Body: Revenge Porn And Tort Remedies For Public Figures, Caroline Drinnon 2017 College of William & Mary Law School

When Fame Takes Away The Right To Privacy In One's Body: Revenge Porn And Tort Remedies For Public Figures, Caroline Drinnon

William & Mary Journal of Women and the Law

No abstract provided.


The Privacy, Probability, And Political Pitfalls Of Universal Dna Collection, Meghan J. Ryan 2017 Southern Methodist University

The Privacy, Probability, And Political Pitfalls Of Universal Dna Collection, Meghan J. Ryan

Science and Technology Law Review

Watson and Crick’s discovery of the structure of DNA (deoxyribonucleic acid) in 1953 launched a truth-finding mission not only in science but also in the law. Just thirty years later–after the science had evolved–DNA evidence was being introduced in criminal courts. Today, DNA evidence is heavily relied on in criminal and related cases. It is routinely introduced in murder and rape cases as evidence of guilt; DNA databases have grown as even arrestees have been required to surrender DNA samples; and this evidence has been used to exonerate hundreds of convicted individuals. DNA evidence is generally revered ...


Blethen Maine Newspapers, Inc. V. State: Balancing The Public's Right To Know Against The Privacy Rights Of Victims Of Sexual Abuse, Kenleigh A. Nicoletta 2017 University of Maine School of Law

Blethen Maine Newspapers, Inc. V. State: Balancing The Public's Right To Know Against The Privacy Rights Of Victims Of Sexual Abuse, Kenleigh A. Nicoletta

Maine Law Review

In Blethen Maine Newspapers, Inc. v. State, a sharply divided Maine Supreme Judicial Court, sitting as the Law Court, held that release of records relating to Attorney General G. Steven Rowe's investigation of alleged sexual abuse by Catholic priests was warranted under Maine's Freedom of Access Act (FOAA). Although such investigative records are designated confidential by statute, the majority held that the public's interest in the contents of the records mandated their disclosure after all information identifying persons other than the deceased priests had been redacted. The concurrence asserted that the majority had reached the correct conclusion ...


Who Are The Real Cyberbullies: Hackers Or The Ftc? The Fairness Of The Ftc’S Authority In The Data Security Context, Jaclyn K. Haughom 2017 The Catholic University of America, Columbus School of Law

Who Are The Real Cyberbullies: Hackers Or The Ftc? The Fairness Of The Ftc’S Authority In The Data Security Context, Jaclyn K. Haughom

Catholic University Law Review

As technology continues to be an integral part of daily life, there lies an ever-increasing threat of the personally identifiable information of consumers being lost, stolen, or accessed without authorization. The Federal Trade Commission (FTC) is the U.S. government’s primary consumer protection agency and the country’s lead enforcer against companies subject to data breaches. Although the FTC lacks explicit statutory authority to enforce against data breaches, the Commission has successfully relied on Section 5 of the FTC Act (FTCA) to exercise its consumer protection power in the data security context. However, as the FTC continues to take ...


How Useful Is Gsv As An Environmental Observation Tool? An Analysis Of The Evidence So Far., Katherine Nesse, Leah Airt 2017 Seattle Pacific University

How Useful Is Gsv As An Environmental Observation Tool? An Analysis Of The Evidence So Far., Katherine Nesse, Leah Airt

SPU Works

Researchers in many disciplines have turned to Google Street View to replace pedestrian- or carbased in-person observation of streetscapes. It is most prevalent within the research literature on the relationship between neighborhood environments and public health but has been used as diverse as disaster recovery, ecology and wildlife habitat, and urban design. Evaluations of the tool have found that the results of GSV-based observation are similar to the results from in-person observation although the similarity depends on the type of characteristic being observed. Larger, permanent and discrete features showed more consistency between the two methods and smaller, transient and judgmental ...


Testimony @ House Energy And Commerce Subcommittee On Digital Commerce And Consumer Protection Hearing; "21st Century Trade Barriers: Protectionist Cross Border Data Flow Policies Impact On U.S. Jobs.", Jennifer Daskal 2017 American University Washington College of Law

Testimony @ House Energy And Commerce Subcommittee On Digital Commerce And Consumer Protection Hearing; "21st Century Trade Barriers: Protectionist Cross Border Data Flow Policies Impact On U.S. Jobs.", Jennifer Daskal

Jennifer Daskal

Ttestimony at House Energy and Commerce Subcommittee on Digital Commerce and Consumer Protection Hearing; "21st Century Trade Barriers: Protectionist Cross Border Data Flow Policies Impact on U.S. Jobs." October 12, 2017

"The free movement of data across borders is critical to economic growth, has benefits for data security, and promotes privacy, speech, and associational rights. Yet, increasingly states are adopting a range of measures that restrict data flows to the United States and elsewhere and adopting costly data localization mandates, pursuant to which companies must store data locally.1 Such restrictions on the free movement of data harm U ...


Second Class For The Second Time: How The Commercial Speech Doctrine Stigmatizes Commercial Use Of Aggregated Public Records, Brian N. Larson, Genelle I. Belmas 2017 Texas A&M University School of Law

Second Class For The Second Time: How The Commercial Speech Doctrine Stigmatizes Commercial Use Of Aggregated Public Records, Brian N. Larson, Genelle I. Belmas

Brian Larson

This Article argues that access to aggregated electronic public records for commercial use should receive protection under the First Amendment in the same measure as the speech acts the access supports. In other words, we view commercial access to aggregated public records as an essential means to valuable speech. For many, however, the taint of the commercial speech doctrine is turning all “information flows” into commercial ones. This, in turn, is threatening the access to government records.


نظرية الظروف الطارئة وأثر هافي التوازن الاقتصادي للعقد (دراسة تحليلية في ضوء قانون المعاملات المدنية الإماراتي, خميس صالح ناصر عبدا لله المنصوري 2017 United Arab Emirates University

نظرية الظروف الطارئة وأثر هافي التوازن الاقتصادي للعقد (دراسة تحليلية في ضوء قانون المعاملات المدنية الإماراتي, خميس صالح ناصر عبدا لله المنصوري

Theses

All contracts are subjected to the general rule, which is the commitment of the parties to the implementation of the contract, but this rule is dissenting with other rule, that it should be a balance between the obligations of the parties in the economic terms at the stage of formation of the contract and its implementation, and any disruption facing the imbalance will affects this balance in the contracting phase through the theory of compliance, either at the implementation phase that will face it through the theory of emergency circumstances, and what we need is the second exception of emergency ...


Who's Watching The Kids?--The Use Of Peer-To-Peer Programs To Cyberstalk Children, Jessica Herndon 2017 University of Oklahoma College of Law

Who's Watching The Kids?--The Use Of Peer-To-Peer Programs To Cyberstalk Children, Jessica Herndon

Oklahoma Journal of Law and Technology

No abstract provided.


Fbi's Carnivore: Under The Fourth Amendment And The Usa Patriot Act, Scott Griner 2017 University of Oklahoma College of Law

Fbi's Carnivore: Under The Fourth Amendment And The Usa Patriot Act, Scott Griner

Oklahoma Journal of Law and Technology

No abstract provided.


Emailer Beware: The Fourth Amendment And Electronic Mail, E. Parker Lowe 2017 University of Oklahoma College of Law

Emailer Beware: The Fourth Amendment And Electronic Mail, E. Parker Lowe

Oklahoma Journal of Law and Technology

No abstract provided.


Adelson V. Harris, 133 Nev. Adv. Op. 67 (Sept. 27, 2017) (En Banc), David E. Chavez 2017 University of Nevada, Las Vegas -- William S. Boyd School of Law

Adelson V. Harris, 133 Nev. Adv. Op. 67 (Sept. 27, 2017) (En Banc), David E. Chavez

Nevada Supreme Court Summaries

The Nevada Supreme Court (en banc) held that (1) a hyperlink to source material concerning a judicial proceeding may qualify as a report within the common law fair report privilege; and (2) Nevada’s anti-SLAPP statute, as effective prior to the 2013 amendment, reaches communication “aimed at procuring any governmental or electoral action,” even if it is not addressed to a government agency.


Health Information Technology And Hipaa: Can We Satisfy Security And Privacy Standards In The Digital Age, Robert Malone 2017 University of Oklahoma College of Law

Health Information Technology And Hipaa: Can We Satisfy Security And Privacy Standards In The Digital Age, Robert Malone

Oklahoma Journal of Law and Technology

No abstract provided.


Looking For Lagniappe: Publicity As A Culprit To Social Networking Websites, Kristin Decker 2017 University of Oklahoma College of Law

Looking For Lagniappe: Publicity As A Culprit To Social Networking Websites, Kristin Decker

Oklahoma Journal of Law and Technology

No abstract provided.


Not So Fast: Quon V. Arch Wireless Is Not Employees' License To Text The Workday Away, Amanda R. Higgins 2017 University of Oklahoma College of Law

Not So Fast: Quon V. Arch Wireless Is Not Employees' License To Text The Workday Away, Amanda R. Higgins

Oklahoma Journal of Law and Technology

No abstract provided.


Lichtenberger And The Three Bears: Getting The Private Search Exception And Modern Digital Storage "Just Right", Samuel Crecelius 2017 Texas A&M University School of Law

Lichtenberger And The Three Bears: Getting The Private Search Exception And Modern Digital Storage "Just Right", Samuel Crecelius

Texas A&M Law Review

Finding a happy medium is hard. Often, it is a challenge to find a workable balance between two unworkable extremes. Known as the “Goldilocks Principle,” this phenomenon has been observed in fields as diverse as developmental psychology and astrobiology. As Goldilocks found in the Three Bears’ house, “just right” may not come on the first attempt. We may have to explore the extremes of the spectrum—“too hot” and “too cold”—before we can settle on “just right. Goldilocks also discovered that this process is all the more difficult in a new environment—like the Three Bears’ house. Goldilocks persevered ...


The Ecology Of Transparency Reloaded, Seth F. Kreimer 2017 University of Pennsylvania Law School

The Ecology Of Transparency Reloaded, Seth F. Kreimer

Faculty Scholarship

As Justice Stewart famously observed, "[t]he Constitution itself is neither a Freedom of Information Act nor an Official Secrets Act." What the Constitution's text omits, the last two generations have embedded in "small c" constitutional law and practice in the form of the Freedom of Information Act and a series of overlapping governance reforms including Inspectors General, disclosure of political contributions, the State Department’s “Dissent Channel,” the National Archives Information Security Oversight Office, and the publication rights guaranteed by New York Times v. United States. These institutions constitute an ecology of transparency.

The late Justice Scalia argued ...


Digital Commons powered by bepress