Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Roger Williams University (20)
- University of Michigan Law School (11)
- Maurer School of Law: Indiana University (6)
- SelectedWorks (5)
- Schulich School of Law, Dalhousie University (4)
-
- Pepperdine University (3)
- Selected Works (3)
- University of Richmond (3)
- Brooklyn Law School (2)
- Notre Dame Law School (2)
- Seattle University School of Law (2)
- The Catholic University of America, Columbus School of Law (2)
- University of Colorado Law School (2)
- University of Pennsylvania Carey Law School (2)
- BLR (1)
- Chicago-Kent College of Law (1)
- Claremont Colleges (1)
- Florida International University (1)
- Georgetown University Law Center (1)
- Marquette University Law School (1)
- St. John's University School of Law (1)
- Touro University Jacob D. Fuchsberg Law Center (1)
- Universitas Indonesia (1)
- University of Georgia School of Law (1)
- University of Maryland Francis King Carey School of Law (1)
- University of Massachusetts School of Law (1)
- University of Miami Law School (1)
- University of Pittsburgh School of Law (1)
- University of Rhode Island (1)
- University of San Diego (1)
- Publication Year
- Publication
-
- School of Law Conferences, Lectures & Events (19)
- Articles, Book Chapters, & Popular Press (4)
- Federal Communications Law Journal (4)
- Michigan Law Review (4)
- Pepperdine Law Review (3)
-
- University of Richmond Law Review (3)
- All Faculty Scholarship (2)
- Brooklyn Journal of International Law (2)
- Journal of Legislation (2)
- Michigan Telecommunications & Technology Law Review (2)
- Publications (2)
- Seattle University Law Review (2)
- University of Michigan Journal of Law Reform (2)
- Wilhelm Peekhaus (2)
- "Dharmasisya” Jurnal Program Magister Hukum FHUI (1)
- Angela Goodrum (1)
- Articles (1)
- Articles by Maurer Faculty (1)
- Book Chapters (1)
- CMC Senior Theses (1)
- Catholic University Journal of Law and Technology (1)
- Catholic University Law Review (1)
- Chicago-Kent Law Review (1)
- Corey A Ciocchetti (1)
- Dignity: A Journal of Analysis of Exploitation and Violence (1)
- Dissertations (1)
- Electronic Thesis and Dissertation Repository (1)
- ExpressO (1)
- Faculty Publications (1)
- Georgetown Law Faculty Publications and Other Works (1)
- Publication Type
Articles 31 - 60 of 84
Full-Text Articles in Law
Video-Streaming Records And The Video Privacy Protection Act: Broadening The Scope Of Personally Identifiable Information To Include Unique Device Identifiers Disclosed With Video Titles, Gregory M. Huffman
Chicago-Kent Law Review
The Video Privacy Protection Act (“VPPA”) prohibits video tape service providers from disclosing their consumers’ video rental or sale records. Although the VPPA was originally enacted to regulate disclosures by brick-and-mortar video rental stores, litigators have more recently used the VPPA as a vehicle to regulate disclosures by online video content providers.
The application of the VPPA to video streaming via web browsers and mobile devices raises new questions of statutory interpretation. One key question is whether the scope of the VPPA is broad enough to cover a disclosure of a unique device identifier of a user’s device, rather than …
The Need For An International Convention On Data Privacy: Taking A Cue From The Cisg, Morgan Corley
The Need For An International Convention On Data Privacy: Taking A Cue From The Cisg, Morgan Corley
Brooklyn Journal of International Law
In light of the invalidation of the U.S.-EU Safe Harbor, along with the increase in sales of personal data as a commodity, data privacy has become a major concern amongst different nations. The lack of harmonization of data-privacy laws around the world continues to pose obstacles to the free flow of data across national borders. The free flow of data is, nonetheless, essential the international economy. As a result, nations continue to work together to try to create mechanisms by which data can be transferred across borders in a secure manner. This Note examines the current state of data-privacy law …
Protecting Personal Information: Achieving A Balance Between User Privacy And Behavioral Targeting, Patrick Myers
Protecting Personal Information: Achieving A Balance Between User Privacy And Behavioral Targeting, Patrick Myers
University of Michigan Journal of Law Reform
Websites and mobile applications provide immeasurable benefits to both users and companies. These services often collect vast amounts of personal information from the individuals that use them, including sensitive details such as Social Security numbers, credit card information, and physical location. Personal data collection and dissemination leave users vulnerable to various threats that arise from the invasion of their privacy, particularly because users are often ignorant of the existence or extent of these practices. Current privacy law does not provide users with adequate protection from the risks attendant to the collection and dissemination of their personal information. This Note advocates …
17th Annual Open Government Summit: Access To Public Records Act & Open Meetings Act, 2015, Department Of Attorney General, State Of Rhode Island
17th Annual Open Government Summit: Access To Public Records Act & Open Meetings Act, 2015, Department Of Attorney General, State Of Rhode Island
School of Law Conferences, Lectures & Events
No abstract provided.
Open Face: Striking The Balance Between Privacy And Security With The Fbi's Next Generation Identification System, Christopher Delillo
Open Face: Striking The Balance Between Privacy And Security With The Fbi's Next Generation Identification System, Christopher Delillo
Journal of Legislation
Privacy in the United States has never been an explicit general right for every citizen.I Federal grants of privacy protection exist for specific instances or areas, but generally have been left to the province of the States.2 Some states, but not all, have general privacy laws granting citizens privacy rights beyond the scope of con- tent-specific legislation.3 Thus, the privacy law regime in the United States is best characterized as a patchwork: rights or protections exist in numerous areas without much to connect those areas together as an interlocking protective framework for national citizenry.
The Right To No: The Crime Of Marital Rape, Women's Human Rights, And International Law, Melanie Randall, Vasanthi Venkatesh
The Right To No: The Crime Of Marital Rape, Women's Human Rights, And International Law, Melanie Randall, Vasanthi Venkatesh
Brooklyn Journal of International Law
More than half of the world’s countries do not explicitly criminalize sexual assault in marriage. While sexual assault in general is criminalized in these countries, sexual assault perpetrated by a spouse is entirely legal. The human rights violations inhere in acts of violence against women are now well recognized. Yet somehow marital rape is a particular form of gendered violence that has escaped both criminal law sanctions and human rights approbation in a great number of the world’s nations.
This silence in the law creates legal impunity for men who sexually assault or rape the women who are their wives …
The Conforming Effect: First Amendment Implications Of Surveillance, Beyond Chilling Speech, Margot E. Kaminski, Shane Witnov
The Conforming Effect: First Amendment Implications Of Surveillance, Beyond Chilling Speech, Margot E. Kaminski, Shane Witnov
University of Richmond Law Review
No abstract provided.
Lawrence V. Texas: The Decision And Its Implications For The Future, Martin A. Schwartz
Lawrence V. Texas: The Decision And Its Implications For The Future, Martin A. Schwartz
Touro Law Review
No abstract provided.
16th Annual Open Government Summit: Access To Public Records Act & Open Meetings Act, 2014, Department Of Attorney General, State Of Rhode Island
16th Annual Open Government Summit: Access To Public Records Act & Open Meetings Act, 2014, Department Of Attorney General, State Of Rhode Island
School of Law Conferences, Lectures & Events
No abstract provided.
Silence Is Golden...Except In Health Care Philanthropy, Stacey A. Tovino
Silence Is Golden...Except In Health Care Philanthropy, Stacey A. Tovino
University of Richmond Law Review
No abstract provided.
The Communication Decency Act Gone Wild: A Case For Renewing The Presumption Against Preemption, Ryan J.P. Dyer
The Communication Decency Act Gone Wild: A Case For Renewing The Presumption Against Preemption, Ryan J.P. Dyer
Seattle University Law Review
Since its inception, the Internet has disseminated the most vital commodity known to man—information. But not all information is societally desirable. In fact, much of what the Internet serves to disseminate is demonstrably criminal. Nevertheless, in the effort to unbind the “vibrant and competitive free market” of ideas on the Internet, Congress enacted section 230 of the Communications Decency Act, which essentially grants immunity to interactive computer service providers from liability for information provided by a third party. This Comment suggests that, in certain contexts, courts applying section 230 immunity should reexamine the preemptive effect Congress intended section 230 to …
Your View: ‘Do Not Track’ Should Apply To Drivers, Too, Hillary B. Farber
Your View: ‘Do Not Track’ Should Apply To Drivers, Too, Hillary B. Farber
Faculty Publications
Location tracking data can reveal quite a bit of information about a person when it is all pieced together. Just by knowing where and when a person frequents certain places we can know about his/her recreational habits, religious affiliations, professional affiliations, relationship status, personal health and hygiene, social preferences and contacts, and so much more. That is why it is so important to regulate the use of location tracking technology. There are a variety of efforts afoot to rein in government use of such technology – this op-ed is concerned with automated license plate readers.
The Right To Digital Privacy: Advancing The Jeffersonian Vision Of Adaptive Change, Kerry Moller
The Right To Digital Privacy: Advancing The Jeffersonian Vision Of Adaptive Change, Kerry Moller
CMC Senior Theses
The relationship between privacy, technology, and law is complex. Thomas Jefferson’s prescient nineteenth century observation that laws and institutions must keep pace with the times offers a vision for change. Statutory law and court precedents help to define our right to privacy, however, the development of new technologies has complicated the application of old precedents and statutes. Third party organizations, such as Google, facilitate new methods of communication, and the government can often collect the information that third parties receive with a subpoena or court order, rather than a Fourth Amendment-mandated warrant. Privacy promotes fundamental democratic freedoms, however, under current …
Grounding Drones: Big Brother’S Tool Box Needs Regulation Not Elimination, Melanie M. Reid
Grounding Drones: Big Brother’S Tool Box Needs Regulation Not Elimination, Melanie M. Reid
Melanie M. Reid
One of the most significant contemporary issues in privacy law relates to law enforcement’s new domestic surveillance tool: unmanned aerial vehicles, also known as, drones. Law enforcement’s use of aerial surveillance as an investigatory tool is currently under attack. In the past, if law enforcement chose to follow a suspect throughout the day, either on the ground or in the air, they need not worry about seeking a warrant or determining whether probable cause or reasonable suspicion exists to justify their surveillance. Aerial surveillance of criminal suspects has been considered outside the protections of Fourth Amendment law. In the 1980’s, …
No Surfing Allowed: A Review And Analysis Of Legislation Prohibiting Employers From Demanding Access To Employees’ And Job Applicants’ Social Media Accounts, Robert Sprague
Robert Sprague
This article examines recent state legislation prohibiting employers from requesting username and password information from employees and job applicants in order to access restricted portions of those employees’ and job applicants’ personal social media accounts. This article raises the issue of whether this legislation is even needed, from both practical and legal perspectives, focusing on: (a) how prevalent the practice is of requesting employees’ and job applicants’ social media access information; (b) whether alternative laws already exist which prohibit employers from requesting employees’ and job applicants’ social media access information; and (c) whether any benefits can be derived from this …
15th Annual Open Government Summit: Access To Public Records Act & Open Meetings Act, 2013, Department Of Attorney General, State Of Rhode Island
15th Annual Open Government Summit: Access To Public Records Act & Open Meetings Act, 2013, Department Of Attorney General, State Of Rhode Island
School of Law Conferences, Lectures & Events
No abstract provided.
Privacy As A Tool For Antidiscrimination, Jessica Roberts
Privacy As A Tool For Antidiscrimination, Jessica Roberts
Jessica L. Roberts
Traditionally, laws that protect privacy and laws that prohibit discrimination have been considered distinct kinds of legal protections. This Essay challenges that binary on both practical and theoretical grounds. Using the Genetic Information Nondiscrimination Act (GINA) as a case study, it argues that lawmakers can use privacy law to further antidiscrimination goals. GINA, which prohibits genetic-information discrimination in health insurance and employment, does more than simply outlaw discriminatory conduct. It also prohibits employers from requiring—or even requesting—their employees’ genetic information. While GINA’s privacy and antidiscrimination protections have previously been viewed as discrete, this Essay reads them in concert, arguing that …
Snopa And The Ppa: Do You Know What It Means For You? If Snopa (Social Networking Online Protection Act) Or Ppa (Password Protection Act) Do Not Pass, The Snooping Could Cause You Trouble, Angela Goodrum
Angela Goodrum
No abstract provided.
The Politics Of Privacy In The Criminal Justice System: Information Disclosure, The Fourth Amendment, And Statutory Law Enforcement Exemptions, Erin Murphy
Michigan Law Review
When criminal justice scholars think of privacy, they think of the Fourth Amendment. But lately its domain has become far less absolute. The United States Code currently contains over twenty separate statutes that restrict both the acquisition and release of covered information. Largely enacted in the latter part of the twentieth century, these statutes address matters vital to modern existence. They control police access to driver's licenses, educational records, health histories, telephone calls, email messages, and even video rentals. They conform to no common template, but rather enlist a variety of procedural tools to serve as safeguards - ranging from …
Modernizing State Vital Statistics Statutes And Policies To Ensure Accurate Gender Markers On Birth Certificates: A Good Government Approach To Recognizing The Lives Of Transgender People, Lisa Mottet
Michigan Journal of Gender & Law
Across the country, laws governing corrections to gender markers on birth certificates are relatively uniform, in large part because many states adopted the relevant provisions of the 1977 revision of the Model State Vital Statistics Act (MSVSA). The MSVSA, developed by the U.S. Department of Health and Human Services, guides states on the most efficient laws and procedures related to maintaining accurate birth, death, and other vital records at the state, local, and territorial level. At the time when the government promulgated the MSVSA provision related to gender corrections, it served as a forward-thinking model because it acknowledged that vital …
The Policy Against Federal Funding For Abortions Extends Into The Realm Of Free Speech After Rust V. Sullivan, Loye M. Barton
The Policy Against Federal Funding For Abortions Extends Into The Realm Of Free Speech After Rust V. Sullivan, Loye M. Barton
Pepperdine Law Review
No abstract provided.
California's Constitutional Right To Privacy, J. Clark Kelso
California's Constitutional Right To Privacy, J. Clark Kelso
Pepperdine Law Review
No abstract provided.
Substance And Method In The Year 2000, Akhil Reed Amar
Substance And Method In The Year 2000, Akhil Reed Amar
Pepperdine Law Review
No abstract provided.
Limits Of The Federal Wiretap Act's Ability To Protect Against Wi-Fi Sniffing, Mani Potnuru
Limits Of The Federal Wiretap Act's Ability To Protect Against Wi-Fi Sniffing, Mani Potnuru
Michigan Law Review
Adoption of Wi-Fi wireless technology continues to see explosive growth. However many users still operate their home Wi-Fi networks in unsecured mode or use publicly available unsecured Wi-Fi networks, thus exposing their communications to the dangers of "packet sniffing," a technique used for eavesdropping on a network. Some have argued that communications over unsecured Wi-Fi networks are "readily accessible to the general public" and that such communications are therefore excluded from the broad protections of the Federal Wiretap Act against intentional interception of electronic communications. This Note examines the Federal Wiretap Act and argues that the current Act's treatment of …
Electronic Health Record Regulation In Canada: What The Patient Experience Reveals About The Pursuit Of Legislative Harmonization, Patricia M. Goodman
Electronic Health Record Regulation In Canada: What The Patient Experience Reveals About The Pursuit Of Legislative Harmonization, Patricia M. Goodman
Electronic Thesis and Dissertation Repository
This thesis examines Canadian provincial and territorial personal data protection legislation as it relates to electronic health records (“EHRs”). The research categorizes Canadian jurisdictions’ approaches to EHR regulation and three models are identified. Using five criteria, the patient experience when interacting with each of the three models and a combination of the models is described, analyzed and reconciled. A fictional patient scenario is used as a tool to analyze patient interaction with the Canadian jurisdictions and the models. It is shown that, although Canadian jurisdictions use one of three separate modes of incorporating EHR-specific rules into legislation, the outcome of …
14th Annual Open Government Summit: Access To Public Records Act & Open Meetings Act, 2012, Department Of Attorney General, State Of Rhode Island
14th Annual Open Government Summit: Access To Public Records Act & Open Meetings Act, 2012, Department Of Attorney General, State Of Rhode Island
School of Law Conferences, Lectures & Events
No abstract provided.
13th Annual Open Government Summit: Access To Public Records Act & Open Meetings Act, 2011, Department Of Attorney General, State Of Rhode Island
13th Annual Open Government Summit: Access To Public Records Act & Open Meetings Act, 2011, Department Of Attorney General, State Of Rhode Island
School of Law Conferences, Lectures & Events
No abstract provided.
The Privacy Bailout: State Government Involvement In The Privacy Arena, Corey A. Ciocchetti
The Privacy Bailout: State Government Involvement In The Privacy Arena, Corey A. Ciocchetti
Corey A Ciocchetti
In the midst of massive government involvement in the financial, real estate and automotive sectors, other important problems linger without sufficient governmental attention. This article focuses on one area where federal intervention has been particularly absent - the realm of individual privacy in the Information Age. The problem is that monitoring in the United States is increasingly powerful and takes many forms. Online, prominent Web sites collect, store and disseminate a great deal of personally identifying information (PII) without clearly and simply informing users. This is the case even though such notice is cheap and can be effective. Offline, technology …
Gina's Genotypes, David H. Kaye
Gina's Genotypes, David H. Kaye
Michigan Law Review First Impressions
In August 2009, the Board of Trustees of the University of Akron added to the university's employment policy the following proviso: "any applicant may be asked to submit fingerprints or DNA sample for purpose of a federal criminal background check." Although the federal government does not do background checks with DNA, the policy is significant because it highlights a largely unexplored feature of the Genetic Information Nondiscrimination Act of 2008 ("GINA"). Hailed by the late Senator Edward Kennedy as "the first civil rights bill of the new century of life sciences," GINA generally prohibits employers from asking for "genetic information." …
12th Annual Open Government Summit: Access To Public Records Act & Open Meetings Act, 2010, Department Of Attorney General, State Of Rhode Island
12th Annual Open Government Summit: Access To Public Records Act & Open Meetings Act, 2010, Department Of Attorney General, State Of Rhode Island
School of Law Conferences, Lectures & Events
No abstract provided.