Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

4,166 Full-Text Articles 3,976 Authors 3,103,715 Downloads 157 Institutions

All Articles in Privacy Law

Faceted Search

4,166 full-text articles. Page 78 of 132.

Reader Privacy In Digital Library Collaborations: Signs Of Commitment, Opportunities For Improvement, Anne Klinefelter 2016 University of North Carolina School of Law

Reader Privacy In Digital Library Collaborations: Signs Of Commitment, Opportunities For Improvement, Anne Klinefelter

Faculty Publications

Libraries collaborate to digitize collections large and small in order to provide information with fewer geographical, temporal, or socio-economic barriers. These collaborations promise economy of scale and breadth of impact, both for access to content and for preservation of decaying print source material. Some suggest this increased access to information through the digital environment comes at the expense of reader privacy, a value that United States librarians have advanced for nearly eighty years. Multiplying risks to digital reader privacy are said to weaken librarians’ commitment to privacy of library use and to overwhelm libraries’ ability to ensure confidential access to …


Privacy Harmonization And The Developing World: The Impact Of The Eu's General Data Protection Regulation On Developing Economies, Tiffany Curtiss 2016 University of Washington School of Law

Privacy Harmonization And The Developing World: The Impact Of The Eu's General Data Protection Regulation On Developing Economies, Tiffany Curtiss

Washington Journal of Law, Technology & Arts

Through strengthened third-party obligations for data protection, the European Union’s General Data Protection Regulation will export privacy norms. However, developing economies may want to consider a co-regulatory industry approach to data protection before adopting similar national legislation. The General Data Protection Regulation can be an ideal model for global harmonization of privacy laws, particularly for adoption among industries and willing participants. To benefit from a co-regulatory approach, however, a developing economy would need to invest in education and legal systems in order to capture the benefits of the growing e-commerce market that will undoubtedly be influenced by the General Data …


The Second Amendment Burden: Arming Courts With A Workable Standard For Reviewing Gun Safety Legislation, Melanie Kalmanson 2016 Florida State University College of Law

The Second Amendment Burden: Arming Courts With A Workable Standard For Reviewing Gun Safety Legislation, Melanie Kalmanson

Florida State University Law Review

Two controversial topics; one framework. Jurisprudence surrounding the Second Amendment to the U.S. Constitution lacks a workable standard under which courts are to review gun control legislation. This Note presents an intersectional argument whereby the abortion “undue burden” framework is applied to Second Amendment legislation. Through this approach of applying the abortion framework to gun control legislation, like those recently proposed or discussed, this Note argues that these provisions would likely be constitutional. Though abortion is at the center of this discussion, this Note does not aim to contribute to discourse concerning reproductive rights and accepts prima facie the current-standing …


Digital Self-Ownership: A Publicity-Rights Framework For Determining Employee Social Media Rights, Susan Park, Patricia Sánchez Abril 2016 Boise State University

Digital Self-Ownership: A Publicity-Rights Framework For Determining Employee Social Media Rights, Susan Park, Patricia Sánchez Abril

Management Faculty Publications and Presentations

Imagine an upandcoming company hires you as one of its first employees. Passionate about your employer, you put in long hours doing everything from marketing to accounting to event planning. You are also proud of your employer's product, so you begin to publicize it to your friends through your social network accounts. (In fact, the company's founder is also one of your Facebook friends.) You tell your friends about the product launch, invite them to marketing events, and eventually blog about your industry, amassing a significant social media following while creating buzz about your employer. But one day, during layoffs …


Equitable Recovery For Ashley Madison Hack Victims: The Federal Trade Commission As Executor Of A Narrow Right To Be Forgotten In The United States, Mackenzie Olson 2016 University of Washington School of Law

Equitable Recovery For Ashley Madison Hack Victims: The Federal Trade Commission As Executor Of A Narrow Right To Be Forgotten In The United States, Mackenzie Olson

Washington Journal of Law, Technology & Arts

Events following the Ashley Madison data breach exposed the personal information of millions of users. Victims filed class action suits in multiple courts in the United States, seeking various forms of monetary and equitable relief. However, these plaintiffs have been unable to compel the removal of personal information from third-party Internet sites hosting the information previously circulated by hackers. Citizens of the European Union, by contrast, could likely compel the removal of such personal information. Unlike the United States, the European Union recognizes a “right to be forgotten”, which authorizes individuals to demand the removal of their personal information from …


Testimony On Unmanned Aircraft Systems Rules And Regulations, Stephen E. Henderson 2016 University of Oklahoma College of Law

Testimony On Unmanned Aircraft Systems Rules And Regulations, Stephen E. Henderson

Stephen E Henderson

Chairman Barrington, Vice Chair Brooks, members of the Committee on Public Safety, Senators, and distinguished guests, I am grateful for the opportunity to speak to you today about unmanned aerial systems, or drones, and more particularly about their federal constitutional implications and what might be the constitutional restrictions on any legislation you might like to enact. I am the Judge Haskell A. Holloman Professor of Law at the University of Oklahoma, where my teaching and research focus on criminal law and procedure and privacy, including the constitutional rights pertaining thereto.

My topic is not an easy one. The constitutional law …


Balancing A Right To Be Forgotten With A Right To Freedom Of Expression In The Wake Of Google Spain V. Aepd, Shaniqua Singleton 2016 University of Georgia School of Law

Balancing A Right To Be Forgotten With A Right To Freedom Of Expression In The Wake Of Google Spain V. Aepd, Shaniqua Singleton

Georgia Journal of International & Comparative Law

No abstract provided.


Police Body Worn Cameras And Privacy: Retaining Benefits While Reducing Public Concerns, Richard Lin 2016 Duke Law

Police Body Worn Cameras And Privacy: Retaining Benefits While Reducing Public Concerns, Richard Lin

Duke Law & Technology Review

Recent high-profile incidents of police misconduct have led to calls for increased police accountability. One proposed reform is to equip police officers with body worn cameras, which provide more reliable evidence than eyewitness accounts. However, such cameras may pose privacy concerns for individuals who are recorded, as the footage may fall under open records statutes that would require the footage to be released upon request. Furthermore, storage of video data is costly, and redaction of video for release is time-consuming. While exempting all body camera video from release would take care of privacy issues, it would also prevent the public …


Trending @ Rwu Law: Linn F. Freedman's Post: The Goal Of Gender Equality In Cybersecurity 08/23/2016, Linn F. Freedman 2016 Roger Williams University School of Law

Trending @ Rwu Law: Linn F. Freedman's Post: The Goal Of Gender Equality In Cybersecurity 08/23/2016, Linn F. Freedman

Law School Blogs

No abstract provided.


Controversy Over Information Privacy Arising From The Taiwan National Health Insurance Database Examining The Taiwan Taipei High Administrative Court Judgement No. 102-Su-36 (Tsai V. Nhia), Chen-Hung Chang 2016 American University Washington College of Law

Controversy Over Information Privacy Arising From The Taiwan National Health Insurance Database Examining The Taiwan Taipei High Administrative Court Judgement No. 102-Su-36 (Tsai V. Nhia), Chen-Hung Chang

Pace International Law Review

This article examines the limitations of the application of traditional information privacy theory to disputes relating to modern technologies. If information privacy is understood as an individual’s right to full control over his information, activities involving the collection, process and use of personal data cannot be conducted without the data subject’s consent because his privacy rights would be affected as a result of such activities. Instead of the privacy interest approach, this article introduces a privacy harm approach to reconcile the defects of traditional privacy theory. The privacy interest approach helps identify situations in which an individual’s information privacy conflicts …


Cell Phone Searches After Riley: Establishing Probable Cause And Applying Search Warrant Exceptions, Erica L. Danielsen 2016 Pace University School of Law

Cell Phone Searches After Riley: Establishing Probable Cause And Applying Search Warrant Exceptions, Erica L. Danielsen

Pace Law Review

Part I of this note discusses the Fourth Amendment’s protection against unreasonable search and seizures and its probable cause requirement. The Fourth Amendment’s text remains the same since its enactment. However, interpretation of the Fourth Amendment continues to evolve in order to stay current with society. Interpretation of the Fourth Amendment also varies based on state constitutional law since states can provide its citizens with greater protection than the United States Constitution. This is why the United States Supreme Court, federal district courts, and state courts have all undergone thorough Fourth Amendment analyses when applying the true meaning of the …


Just Cause Discipline For Social Networking In The New Guilded Age: Will The Law Look The Other Way?, William A. Herbert, Alicia McNally 2016 CUNY Hunter College

Just Cause Discipline For Social Networking In The New Guilded Age: Will The Law Look The Other Way?, William A. Herbert, Alicia Mcnally

Publications and Research

We live and work in an era with the moniker of the New Gilded Age to describe the growth in societal income inequality. The designation is not limited to evidence of the growing gap in wealth distribution, but also the sharp rise in employment without security, including contingent and part-time work. This article examines the state of workplace procedural protections against discipline as they relate to employee use of social media in the New Gilded Age. In our times, reactions to the rapid distribution of troublesome electronic communications through social networking tend to eclipse patience for enforceable workplace procedures. The …


Cellphones, Stingrays, And Searches! An Inquiry Into The Legality Of Cellular Location Information, Jeremy H. D'Amico 2016 University of Miami Law School

Cellphones, Stingrays, And Searches! An Inquiry Into The Legality Of Cellular Location Information, Jeremy H. D'Amico

University of Miami Law Review

Can the Fourth Amendment protect an individual’s right privacy by preventing the disclosure of her location through cell site location information? Does it currently? Should it? Many court opinions answer these questions in both the affirmative and the negative. The rationale underlying each conclusion is disparate. Some rely on statutory regimes, others rely on the United States Supreme Court’s interpretation of reasonableness. However, Cell Site Location Information is a technology that requires uniformity in its interpretation. This note investigates the different interpretations of the Fourth Amendment as it relates to Cell Site Location Information. It explains the technology behind Cell …


Important Steps To Maintain The Privacy Of Patients In The Hospital, Savera Aziz Ali, Minaz Mawani, Gulshan Bano, Sumera Aziz Ali 2016 Aga Khan University

Important Steps To Maintain The Privacy Of Patients In The Hospital, Savera Aziz Ali, Minaz Mawani, Gulshan Bano, Sumera Aziz Ali

School of Nursing & Midwifery

Women are considered as vulnerable groups in our society in spite of their defined women rights by various laws. This shows that unfortunately these laws are not implemented practically in the real life. Society is shaped by the individuals and everyone should be responsible for advocating their own rights as well as the right of others especially of the vulnerable groups within the population.


That ‘70s Show: Why The 11th Circuit Was Wrong To Rely On Cases From The 1970s To Decide A Cell-Phone Tracking Case, David Oscar Markus, Nathan Freed Wessler 2016 University of Miami Law School

That ‘70s Show: Why The 11th Circuit Was Wrong To Rely On Cases From The 1970s To Decide A Cell-Phone Tracking Case, David Oscar Markus, Nathan Freed Wessler

University of Miami Law Review

In light of society's increasing reliance on technology, this article explores a critical question – that of the Fourth Amendment’s protection over privacy in the digital age. Specifically, this article addresses how the law currently fails to protect the privacy of one’s cell phone records and its ramifications. By highlighting the antiquated precedent leading up to the Eleventh Circuit’s ruling in United States v. Davis, this article calls on the judiciary to find a more appropriate balance for protecting the right to privacy in a modern society.


Wearable Fitness Devices: Personal Health Data Privacy In Washington State, Steven Spann 2016 Seattle University School of Law

Wearable Fitness Devices: Personal Health Data Privacy In Washington State, Steven Spann

Seattle University Law Review

Private entities are increasingly targeting individuals in the United States and around the world to gather personal data for such purposes as product development, market identification, and insurance risk assessment. While credit card records and online browsing histories have long been the medium through which this data is gathered, in more recent years, wearable fitness devices have added a new dimension to data production and collection. These devices are capable of gathering a significant amount of data regarding a person’s physical and physiological characteristics, thereby exposing these data producers to personal privacy infringement. Washington State lawmakers and citizens must be …


Surveillance By Algorithm: The Nsa, Computerized Intelligence Collection, And Human Rights, Peter Margulies 2016 Roger Williams University School of Law

Surveillance By Algorithm: The Nsa, Computerized Intelligence Collection, And Human Rights, Peter Margulies

Law Faculty Scholarship

No abstract provided.


The Two Faces Of The Foreign Intelligence Surveillance Court, Emily Berman 2016 University of Houston Law Center

The Two Faces Of The Foreign Intelligence Surveillance Court, Emily Berman

Indiana Law Journal

When former National Security Agency contractor Edward Snowden leaked a massive trove of information about secret intelligence-collection programs implemented under the Foreign Intelligence Surveillance Act in the summer of 2013, U.S. surveillance activities were thrust to the forefront of public debate. This debate included the question of whether and how to reform the Foreign Intelligence Surveillance Court (“FISA Court”), the statutorily created secret court that reviews government applications to conduct surveillance in the United States. This discussion, however, has underemphasized a critical feature of the way the FISA Court works. As this Article will show, since the terrorist attacks of …


Modern-Day Monitorships, Veronica Root 2016 Notre Dame Law School

Modern-Day Monitorships, Veronica Root

Veronica Root

When a sexual abuse scandal rocked Penn State, when Apple engaged in anticompetitive behavior, and when servicers like Bank of America improperly foreclosed upon hundreds of thousands of homeowners, each organization entered into a Modern-Day Monitorship. Modern-Day Monitorships are utilized in an array of contexts to assist in widely varying remediation efforts. They provide outsiders a unique source of information about the efficacy of the tarnished organization’s efforts to remediate misconduct. Yet despite their use in high-profile and serious matters of organizational wrongdoing, they are not an outgrowth of careful study and deliberate planning. Instead, Modern-Day Monitorships have been employed …


Taking A Bite Out Of Michael Vick's Publicity Rights: An Analysis Of How Teh Right Of Publicity Should Be Treated After A Celebrity Is Convicted Of A Crime, Stephen Reginald Fowler 2016 University of Georgia School of Law

Taking A Bite Out Of Michael Vick's Publicity Rights: An Analysis Of How Teh Right Of Publicity Should Be Treated After A Celebrity Is Convicted Of A Crime, Stephen Reginald Fowler

Journal of Intellectual Property Law

No abstract provided.


Digital Commons powered by bepress