Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 11 of 11
Full-Text Articles in Law
Privacy And National Politics: Fingerprint And Dna Litigation In Japan And The United States Compared, Dongsheng Zang
Privacy And National Politics: Fingerprint And Dna Litigation In Japan And The United States Compared, Dongsheng Zang
Articles
Drawing cases from two related areas of law-fingerprint and DNA (deoxyribonucleic acid) data-this Article proposes a modified framework, built on the Balkin-Levinson emphasis on national politics: First, national politics understood as partisan rivalry cannot account for what I call doctrinal lock-in in this Article, where I will demonstrate that in different stages of American politics-the Lochner era, the New Deal era, and Civil Rights era-courts across the nation ruled predominantly in favor of public data collectors-state and federal law enforcement in fingerprint cases. From the 1990s, when DNA data became hot targets of law enforcement, the United States Supreme Court …
23rd Annual Open Government Summit: Access To Public Records Act, Open Meetings Act Powerpoint Presentation 07-30-2021, Office Of Attorney General State Of Rhode Island, Peter F. Neronha
23rd Annual Open Government Summit: Access To Public Records Act, Open Meetings Act Powerpoint Presentation 07-30-2021, Office Of Attorney General State Of Rhode Island, Peter F. Neronha
School of Law Conferences, Lectures & Events
No abstract provided.
Law And Authors: A Legal Handbook For Writers (Introduction), Jacqueline D. Lipton
Law And Authors: A Legal Handbook For Writers (Introduction), Jacqueline D. Lipton
Book Chapters
Drawing on a wealth of experience in legal scholarship and publishing, Professor Jacqueline D. Lipton provides a useful legal guide for writers whatever their levels of expertise or categories of work (fiction, nonfiction, academic, journalism, freelance content development). This introductory chapter outlines the key legal and business issues authors are likely to face during the course of their careers, and emphasizes that most legal problems have solutions so law should never be an excuse to avoid writing something that an author feels strongly about creating. The larger work draws from case studies and hypothetical examples to address issues of copyright …
Privacy's Double Standards: Public Disclosure Tort Case Chart (2006-2016), Scott Skinner-Thompson
Privacy's Double Standards: Public Disclosure Tort Case Chart (2006-2016), Scott Skinner-Thompson
Research Data
This document, Privacy's Double Standards: Public Disclosure Tort Case Chart (2006-2016), 93 Wash. L. Rev. Online 2051 (2018), https://www.law.uw.edu/wlr/online-edition/scott-skinner-thompson, was published as an electronic supplement to the empirical study, Scott Skinner-Thompson, Privacy’s Double Standards, 93 Wash. L. Rev. 2051 (2018), available at https://scholar.law.colorado.edu/articles/1218/.
Rwu First Amendment Blog: David Logan's Blog: Discovering Trump 06-22-2018, David A. Logan
Rwu First Amendment Blog: David Logan's Blog: Discovering Trump 06-22-2018, David A. Logan
Law School Blogs
No abstract provided.
Newsroom: Logan On Trump And Libel Law 01-03-2017, Roger Williams University School Of Law
Newsroom: Logan On Trump And Libel Law 01-03-2017, Roger Williams University School Of Law
Life of the Law School (1993- )
No abstract provided.
Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski
Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski
Publications
Article III standing is difficult to achieve in the context of data security and data privacy claims. Injury in fact must be "concrete," "particularized," and "actual or imminent"--all characteristics that are challenging to meet with information harms. This Article suggests looking to an unusual source for clarification on privacy and standing: recent national security surveillance litigation. There we can find significant discussions of what rises to the level of Article III injury in fact. The answers may be surprising: the interception of sensitive information; the seizure of less sensitive information and housing of it in a database for analysis; and …
Chilling Effects: Online Surveillance And Wikipedia Use, Jonathon Penney
Chilling Effects: Online Surveillance And Wikipedia Use, Jonathon Penney
Articles, Book Chapters, & Popular Press
This article discusses the results of the first empirical study providing evidence of regulatory “chilling effects” of Wikipedia users associated with online government surveillance. The study explores how traffic to Wikipedia articles on topics that raise privacy concerns for Wikipedia users decreased after the widespread publicity about NSA/PRISM surveillance revelations in June 2013. Using an interdisciplinary research design, the study tests the hypothesis, based on chilling effects theory, that traffic to privacy-sensitive Wikipedia articles reduced after the mass surveillance revelations. The Article finds not only a statistically significant immediate decline in traffic for these Wikipedia articles after June 2013, but …
Social Media: Children’S Lawyer’S Friend And Foe, Jennifer Baum, Sarah N. Fox
Social Media: Children’S Lawyer’S Friend And Foe, Jennifer Baum, Sarah N. Fox
Faculty Publications
(Excerpt)
Social media is taking over the globe. The Pew Research Internet Project states that in the United States, 95 percent of 12- to 17-year-old children are online. Teenagers are also sharing more and more information online: 91 percent of teenagers post a photo of themselves, 92 percent post their real name, and 71 percent post the city or town where they live. “Teens Fact Sheet,” Pew Res. Internet Project (Sept. 2012). This information, in the wrong hands, can be harmful to a child. The Children’s Online Privacy Protection Rule, designed to safeguard children’s information and access online, is a …
The Trickle-Down War, Rosa Brooks
The Trickle-Down War, Rosa Brooks
Georgetown Law Faculty Publications and Other Works
The history of the European nation-state, wrote political sociologist Charles Tilly, is inextricably bound up with the history of warfare. To oversimplify Tilly’s nuanced and complex arguments, the story goes something like this: As power-holders (originally bandits and local strongmen) sought to expand their power, they needed capital to pay for weapons, soldiers and supplies. The need for capital and new recruits drove the creation of taxation systems and census mechanisms, and the need for more effective systems of taxation and recruitment necessitated better roads, better communications and better record keeping. This in turn enabled the creation of larger and …
The Secrecy Interest In Contract Law, Omri Ben-Shahar, Lisa Bernstein
The Secrecy Interest In Contract Law, Omri Ben-Shahar, Lisa Bernstein
Articles
A long and distinguished line of law-and-economics articles has established that in many circumstances fully compensatory expectation damages are a desirable remedy for breach of contract because they induce both efficient performance and efficient breach. The expectation measure, which seeks to put the breached-against party in the position she would have been in had the contract been performed, has, therefore, rightly been chosen as the dominant contract default rule. It does a far better job of regulating breach-or-perform incentives than its leading competitors-the restitution measure, the reliance measure, and specific performance. This Essay does not directly take issue with the …