Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Law

An Expressive Theory Of Privacy Intrusions, Craig Konnoth Jan 2017

An Expressive Theory Of Privacy Intrusions, Craig Konnoth

Publications

The harms of privacy intrusions are numerous. They include discrimination, reputational harm, and chilling effects on speech, thought, and behavior. However, scholarship has yet to fully recognize a kind of privacy harm that this article terms "expressive."

Depending on where the search is taking place and who the actors involved are--a teacher in a school, the police on the street, a food inspector in a restaurant--victims and observers might infer different messages from the search. The search marks the importance of certain societal values such as law enforcement or food safety. It can also send messages about certain groups by …


Entrepreneurial Administration, Philip J. Weiser Jan 2017

Entrepreneurial Administration, Philip J. Weiser

Publications

A core failing of today’s administrative state and modern administrative law scholarship is the lack of imagination as to how agencies should operate. On the conventional telling, public agencies follow specific grants of regulatory authority, use the traditional tools of notice-and-comment rulemaking and adjudication, and are checked by judicial review. In reality, however, effective administration depends on entrepreneurial leadership that spearheads policy experimentation and trial-and-error problem-solving, including the development of regulatory programs that use non-traditional tools.

Entrepreneurial administration takes place both at public agencies and private entities, each of which can address regulatory challenges and earn regulatory authority as a …


Health Information Equity, Craig Konnoth Jan 2017

Health Information Equity, Craig Konnoth

Publications

In the last few years, numerous Americans’ health information has been collected and used for follow-on, secondary research. This research studies correlations between medical conditions, genetic or behavioral profiles, and treatments, to customize medical care to specific individuals. Recent federal legislation and regulations make it easier to collect and use the data of the low-income, unwell, and elderly for this purpose. This would impose disproportionate security and autonomy burdens on these individuals. Those who are well-off and pay out of pocket could effectively exempt their data from the publicly available information pot. This presents a problem which modern research ethics …


With Great Power Comes No Responsibility: The Tragedy And The Irony Of Erisa Preemption, Jessica Frenkel Jan 2017

With Great Power Comes No Responsibility: The Tragedy And The Irony Of Erisa Preemption, Jessica Frenkel

University of Colorado Law Review

Under the current health care financing regime, managed care organizations have significant power to determine patients' care but no legal responsibility when they use that power to pursue profits and harm patients. Managed care organizations are shielded from liability because the Employee Retirement Income Security Act of 1974 (ERISA) preempts state causes of action and does not provide a comparable remedy. This Comment attempts to restart a conversation about the dangers of allowing managed care organizations to retain significant power over patient care without any risk of liability of an especially vulnerable subgroup of patients: the severely mentally ill. It …