Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 15 of 15

Full-Text Articles in Law

When Privacy Almost Won: Time, Inc. V. Hill (1967), Samantha Barbas Dec 2015

When Privacy Almost Won: Time, Inc. V. Hill (1967), Samantha Barbas

Journal Articles

Drawing on previously unexplored and unpublished archival papers of Richard Nixon, the plaintiffs’ lawyer in the case, and the justices of the Warren Court, this article tells the story of the seminal First Amendment case Time, Inc. v. Hill (1967). In Hill, the Supreme Court for the first time addressed the conflict between the right to privacy and freedom of the press. The Court constitutionalized tort liability for invasion of privacy, acknowledging that it raised First Amendment issues and must be governed by constitutional standards. Hill substantially diminished privacy rights; today it is difficult if not impossible to recover against …


The Shaky Ground Of The Right To Be Delisted, Miquel Peguera Aug 2015

The Shaky Ground Of The Right To Be Delisted, Miquel Peguera

Miquel Peguera

It has long been discussed whether individuals should have a “right to be forgotten” online to suppress old information that could seriously interfere with their privacy and data protection rights. In the landmark case of Google Spain v AEPD, the Court of Justice of the European Union addressed the particular question of whether, under EU Data Protection Law, individuals have a right to have links delisted from the list of search results, in searches made on the basis of their name. It found that they do have this right – which can be best described as a “right to be …


Bad News: Privacy Ruling To Increase Press Litigation, The Florida Star V. B.J.F., Mary Ellen Hockwalt Jul 2015

Bad News: Privacy Ruling To Increase Press Litigation, The Florida Star V. B.J.F., Mary Ellen Hockwalt

Akron Law Review

This note analyzes the history and precedent upon which the Court relied in reaching Florida Star's "harsh outcome." Next, the note discusses how the Court, by refusing to extend its holding beyond the facts of the case and give broad Constitutional protection to publications of truth, failed to provide lower courts with any guidance in deciding future invasion of privacy actions. Finally, the note examines the Court's balancing test: weighing the privacy interests of a crime victim against the newspaper's freedom to print truthful information.


Charting The Course For Use Of Small Unmanned Aerial Systems In Newsgathering, Mickey H. Osterreicher Jul 2015

Charting The Course For Use Of Small Unmanned Aerial Systems In Newsgathering, Mickey H. Osterreicher

Pepperdine Law Review

News organizations and individual journalists eagerly anticipate safely utilizing Small Unmanned Aerial Systems (sUAS) for newsgathering purposes as lawmakers integrate sUAS into the National Air Space (NAS). For now, these potential users may be flying over an "unchartered" regulatory landscape while the FAA struggles to complete its administrative rulemaking. In order to better understand how media organizations and individual journalists intend to use sUAS for newsgathering purposes, the National Press Photographers Association (NPPA) developed a survey consisting of twenty-one multiple choice questions, with space for elaboration, and three questions seeking narrative responses. The survey was distributed via email to approximately …


Balancing Disclosure And Privacy Interests In Campaign Finance, Sarah Harding Jul 2015

Balancing Disclosure And Privacy Interests In Campaign Finance, Sarah Harding

Loyola of Los Angeles Law Review

The law of campaign finance pits two important First Amendment interests against each other: disclosure and privacy. The Supreme Court has recognized the need to balance these two interests to allow for effective elections and to safeguard individual rights. However, through the years the Court has failed to balance these interests equally, resulting in vacillating decisions that unfairly sacrifice one for the other. From Burroughs v. United States in 1934 to Citizens United v. FEC in 2010, the Court has failed to provide a workable roadmap for legislatures in the creation of campaign finance disclosure laws and for lower courts …


The Uneasy And Often Unhelpful Interaction Of Tort Law And Constitutional Law In First Amendment Litigation, George C. Christie Apr 2015

The Uneasy And Often Unhelpful Interaction Of Tort Law And Constitutional Law In First Amendment Litigation, George C. Christie

Marquette Law Review

There are increasing tensions between the First Amendment and the common law torts of intentional infliction of emotional distress, defamation, and privacy. This Article discusses the conflicting interactions among the three models that are competing for primacy as the tort law governing expressive activities evolves to accommodate the requirements of the First Amendment. At one extreme there is the model that expression containing information which has been lawfully obtained that contains neither intentional falsehoods nor incitements to immediate violence can only be sanctioned in narrowly defined exceptional circumstances, even if that expression involves matters that are universally regarded as being …


Why Data Privacy Law Is (Mostly) Constitutional, Neil M. Richards Mar 2015

Why Data Privacy Law Is (Mostly) Constitutional, Neil M. Richards

William & Mary Law Review

Laws regulating the collection, use, and disclosure of personal data are (mostly) constitutional, and critics who suggest otherwise are wrong. Since the New Deal, American law has rested on the wise judgment that, by and large, commercial regulation should be made on the basis of economic and social policy, rather than blunt constitutional rules. This has become one of the basic principles of American constitutional law. Although some observers have suggested that the United States Supreme Court’s recent decision in Sorrell v. IMS Health Inc. changes this state of affairs, such readings are incorrect. Sorrell involved a challenge to a …


Reconciling Privacy And Speech In The Era Of Big Data: A Comparative Legal Analysis, Ronald J. Krotoszynski Jr. Mar 2015

Reconciling Privacy And Speech In The Era Of Big Data: A Comparative Legal Analysis, Ronald J. Krotoszynski Jr.

William & Mary Law Review

In both the United States and the nations of Western Europe, significant constitutional commitments safeguard both expressive freedom (including freedom of speech and of the press) and also a generalized constitutional right of privacy. With some regularity, however, these rights will come into conflict, as the protection of one right can be achieved only at the cost of abridging or denying the other. When a government official or public figure objects to the publication of an embarrassing photograph, perhaps taken by an invasive paparazzo, it is simply not possible to fully vindicate both a newspaper’s interest in publishing the photograph …


The Need To Criminalize Revenge Porn: How A Law Protecting Victims Can Avoid Running Afoul Of The First Amendment, Adrienne N. Kitchen Jan 2015

The Need To Criminalize Revenge Porn: How A Law Protecting Victims Can Avoid Running Afoul Of The First Amendment, Adrienne N. Kitchen

Chicago-Kent Law Review

Revenge porn occurs when someone posts sexually explicit images of their former paramour on the web, often with contact information for the victim’s work and home. There are thousands, perhaps tens of thousands, of victims. Victims lose or quit their jobs; they are harassed by strangers; some change their name or alter their appearance. Some victims resort to suicide; others are stalked, assaulted, or killed. Civil suits fail to remove the images or deter perpetrators. Current criminal laws are insufficient in several common instances. These shortcomings mean there is a need to criminalize revenge porn.

Revenge porn is obscene and …


The Pond Betwixt: Differences In The U.S.-Eu Data Protection/Safe Harbor Negotiation, Richard J. Peltz-Steele Jan 2015

The Pond Betwixt: Differences In The U.S.-Eu Data Protection/Safe Harbor Negotiation, Richard J. Peltz-Steele

Faculty Publications

This article analyzes the differing perspectives that animate US and EU conceptions of privacy in the context of data protection. It begins by briefly reviewing the two continental approaches to data protection and then explains how the two approaches arise in a context of disparate cultural traditions with respect to the role of law in society. In light of those disparities, Underpinning contemporary data protection regulation is the normative value that both US and EU societies place on personal privacy. Both cultures attribute modern privacy to the famous Warren-Brandeis article in 1890, outlining a "right to be let alone." But …


Outing Privacy, Scott Skinner-Thompson Jan 2015

Outing Privacy, Scott Skinner-Thompson

Publications

The government regularly outs information concerning people's sexuality, gender identity, and HIV status. Notwithstanding the implications of such outings, the Supreme Court has yet to resolve whether the Constitution contains a right to informational privacy - a right to limit the government's ability to collect and disseminate personal information.

This Article probes informational privacy theory and jurisprudence to better understand the judiciary's reluctance to fully embrace a constitutional right to informational privacy. The Article argues that while existing scholarly theories of informational privacy encourage us to broadly imagine the right and its possibilities, often focusing on informational privacy's ability to …


The Conforming Effect: First Amendment Implications Of Surveillance, Beyond Chilling Speech, Margot E. Kaminski, Shane Witnov Jan 2015

The Conforming Effect: First Amendment Implications Of Surveillance, Beyond Chilling Speech, Margot E. Kaminski, Shane Witnov

University of Richmond Law Review

No abstract provided.


Regulating Real-World Surveillance, Margot E. Kaminski Jan 2015

Regulating Real-World Surveillance, Margot E. Kaminski

Publications

A number of laws govern information gathering, or surveillance, by private parties in the physical world. But we lack a compelling theory of privacy harm that accounts for the state's interest in enacting these laws. Without a theory of privacy harm, these laws will be enacted piecemeal. Legislators will have a difficult time justifying the laws to constituents; the laws will not be adequately tailored to legislative interest; and courts will find it challenging to weigh privacy harms against other strong values, such as freedom of expression.

This Article identifies the government interest in enacting laws governing surveillance by private …


Book Review. Balancing Privacy And Free Speech: Unwanted Attention In The Age Of Social Media By Mark Tunick, Kimberly Mattioli Jan 2015

Book Review. Balancing Privacy And Free Speech: Unwanted Attention In The Age Of Social Media By Mark Tunick, Kimberly Mattioli

Articles by Maurer Faculty

No abstract provided.


Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo Jan 2015

Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo

Articles

In 1986, Congress passed the Stored Communications Act (“SCA”) to provide additional protections for individuals’ private communications content held in electronic storage by third parties. Acting out of direct concern for the implications of the Third-Party Records Doctrine — a judicially created doctrine that generally eliminates Fourth Amendment protections for information entrusted to third parties — Congress sought to tailor the SCA to electronic communications sent via and stored by third parties. Yet, because Congress crafted the SCA with language specific to the technology of 1986, courts today have struggled to apply the SCA consistently with regard to similar private …