Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Litigation

Privacy

Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 30

Full-Text Articles in Law

Aclu V. Clearview Ai, Inc.,, Isra Ahmed May 2023

Aclu V. Clearview Ai, Inc.,, Isra Ahmed

DePaul Journal of Art, Technology & Intellectual Property Law

No abstract provided.


Inadequate Privacy: The Necessity Of Hipaa Reform In A Post-Dobbs World, Katherine Robertson Jan 2023

Inadequate Privacy: The Necessity Of Hipaa Reform In A Post-Dobbs World, Katherine Robertson

Seattle University Law Review

Part I of this Comment will provide an overview of HIPAA and the legal impacts of Dobbs. Part II will discuss the anticipatory response to the impacts of Dobbs on PHI by addressing the response from (1) the states, (2) the Biden Administration, and (3) the medical field. Part III will discuss the loopholes that exist in HIPAA and further address the potential impacts on individuals and the medical field if reform does not occur. Finally, Part IV will argue that the reform of HIPAA is the best avenue for protecting PHI related to reproductive healthcare.


Privacy And National Politics: Fingerprint And Dna Litigation In Japan And The United States Compared, Dongsheng Zang Jan 2023

Privacy And National Politics: Fingerprint And Dna Litigation In Japan And The United States Compared, Dongsheng Zang

Articles

Drawing cases from two related areas of law-fingerprint and DNA (deoxyribonucleic acid) data-this Article proposes a modified framework, built on the Balkin-Levinson emphasis on national politics: First, national politics understood as partisan rivalry cannot account for what I call doctrinal lock-in in this Article, where I will demonstrate that in different stages of American politics-the Lochner era, the New Deal era, and Civil Rights era-courts across the nation ruled predominantly in favor of public data collectors-state and federal law enforcement in fingerprint cases. From the 1990s, when DNA data became hot targets of law enforcement, the United States Supreme Court …


Passcodes, Protection, And Legal Practicality: The Necessity Of A Digital Fifth Amendment, Ethan Swierczewski Jan 2022

Passcodes, Protection, And Legal Practicality: The Necessity Of A Digital Fifth Amendment, Ethan Swierczewski

Catholic University Journal of Law and Technology

No abstract provided.


23rd Annual Open Government Summit: Access To Public Records Act, Open Meetings Act Powerpoint Presentation 07-30-2021, Office Of Attorney General State Of Rhode Island, Peter F. Neronha Jul 2021

23rd Annual Open Government Summit: Access To Public Records Act, Open Meetings Act Powerpoint Presentation 07-30-2021, Office Of Attorney General State Of Rhode Island, Peter F. Neronha

School of Law Conferences, Lectures & Events

No abstract provided.


Freedom Of Expression V. Social Responsibility On The Internet: Vivi Down Association V. Google, Raphael Cohen-Almagor, Natalina Stamile May 2021

Freedom Of Expression V. Social Responsibility On The Internet: Vivi Down Association V. Google, Raphael Cohen-Almagor, Natalina Stamile

Seattle Journal of Technology, Environmental & Innovation Law

The aim of the article is to reflect on Google’s social responsibility by analyzing a milestone court decision, Vivi Down Association v. Google, that took place in Italy, involving the posting of an offensive video clip on Google Video. It was a landmark decision because it refuted the assertion that the Internet knows no boundaries, that the Internet transcends national laws due to its international nature, and that Internet intermediaries, such as Google, are above the law. This case shows that when the legal authorities of a given country decide to assert their jurisdiction, Internet companies need to abide by …


Law And Authors: A Legal Handbook For Writers (Introduction), Jacqueline D. Lipton Aug 2020

Law And Authors: A Legal Handbook For Writers (Introduction), Jacqueline D. Lipton

Book Chapters

Drawing on a wealth of experience in legal scholarship and publishing, Professor Jacqueline D. Lipton provides a useful legal guide for writers whatever their levels of expertise or categories of work (fiction, nonfiction, academic, journalism, freelance content development). This introductory chapter outlines the key legal and business issues authors are likely to face during the course of their careers, and emphasizes that most legal problems have solutions so law should never be an excuse to avoid writing something that an author feels strongly about creating. The larger work draws from case studies and hypothetical examples to address issues of copyright …


Drones: Where Does The National Airspace System Start?, Jason T. Lorenzon J.D. Mar 2020

Drones: Where Does The National Airspace System Start?, Jason T. Lorenzon J.D.

National Training Aircraft Symposium (NTAS)

Unmanned Aerial Systems (UAS), Unmanned Aeronautical Vehicles (UAV), drones and Personal Aerial Vehicles (PAV) constitute the greatest technological advancement since the jet age. (Elaine Chao, Secretary of Transportation, October 26, 2017) This technological advancement has prompted significant public policy challenges and the need for new laws regarding navigable airspace. This proposal investigates how airspace used by drones will evolve given existing Constitutional and common law principals. These principals will influence the creation, development and modification of UAS airspace regulations by the Federal Aviation Administration (FAA).

Two critical but unanswered questions concerning the National Airspace System, are where does navigable airspace …


Privacy's Double Standards: Public Disclosure Tort Case Chart (2006-2016), Scott Skinner-Thompson Dec 2018

Privacy's Double Standards: Public Disclosure Tort Case Chart (2006-2016), Scott Skinner-Thompson

Research Data

This document, Privacy's Double Standards: Public Disclosure Tort Case Chart (2006-2016), 93 Wash. L. Rev. Online 2051 (2018), https://www.law.uw.edu/wlr/online-edition/scott-skinner-thompson, was published as an electronic supplement to the empirical study, Scott Skinner-Thompson, Privacy’s Double Standards, 93 Wash. L. Rev. 2051 (2018), available at https://scholar.law.colorado.edu/articles/1218/.


Rwu First Amendment Blog: David Logan's Blog: Discovering Trump 06-22-2018, David A. Logan Jun 2018

Rwu First Amendment Blog: David Logan's Blog: Discovering Trump 06-22-2018, David A. Logan

Law School Blogs

No abstract provided.


Newsroom: Logan On Trump And Libel Law 01-03-2017, Roger Williams University School Of Law Jan 2017

Newsroom: Logan On Trump And Libel Law 01-03-2017, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski Jan 2017

Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski

Publications

Article III standing is difficult to achieve in the context of data security and data privacy claims. Injury in fact must be "concrete," "particularized," and "actual or imminent"--all characteristics that are challenging to meet with information harms. This Article suggests looking to an unusual source for clarification on privacy and standing: recent national security surveillance litigation. There we can find significant discussions of what rises to the level of Article III injury in fact. The answers may be surprising: the interception of sensitive information; the seizure of less sensitive information and housing of it in a database for analysis; and …


Reconsidering The History Of Open Courts In The Digital Age, Rory B. O'Sullivan, Catherine Connell Jul 2016

Reconsidering The History Of Open Courts In The Digital Age, Rory B. O'Sullivan, Catherine Connell

Seattle University Law Review

Article I, Section 10 of the Constitution of the State of Washington guarantees, “Justice in all cases shall be administered openly, and without unnecessary delay.” The Washington State Supreme Court has interpreted this clause to guarantee the public a right to attend legal proceedings and to access court documents separate and apart from the rights of the litigants themselves. Based on this interpretation, the court has struck down laws protecting the identity of both juvenile victims of sexual assault and individuals subject to involuntary commitment hearings. Its interpretation has also compromised the privacy rights of litigants wrongly named in legal …


Litigating In The 21st Century: Amending Challenges For Cause In Light Of Big Data, Andrew Kasabian Feb 2016

Litigating In The 21st Century: Amending Challenges For Cause In Light Of Big Data, Andrew Kasabian

Pepperdine Law Review

The amount of data generated daily is growing exponentially. The majority of this data is unstructured data. Big Data analytics provides the capability to analyze sets of unrelated data to find hidden and meaningful correlations and predict an individual’s future actions. Therefore, Big Data can alter trial preparation by opening up new sets of information for lawyers to analyze in the jury selection process. Privacy concerns may follow Big Data’s incorporation because Big Data aggregates an individual’s information and predicts future actions. This Comment details how Big Data will provide a net benefit to trial preparation. In order to protect …


The Sixth Pillar Of Anti-Money Laundering Compliance: Balancing Effective Enforcement With Financial Privacy, Maria A. De Dios Jan 2016

The Sixth Pillar Of Anti-Money Laundering Compliance: Balancing Effective Enforcement With Financial Privacy, Maria A. De Dios

Brooklyn Journal of Corporate, Financial & Commercial Law

The U.S. government has responded to the increase of financial crimes, including money laundering and terrorist financing, by requiring that financial institutions implement anti-money laundering compliance programs within their institutions. Most recently, the Financial Crimes Enforcement Network exercised its regulatory powers, as authorized by the Treasury Department, by proposing regulations that now explicitly add customer due diligence to the preexisting anti-money laundering regime. The policy behind the government’s legislative and regulatory measures is clear—financial institutions must ensure that they are protected from and not aiding in the illegal efforts of criminals. The complexity and insidiousness of these financial crimes makes …


Chilling Effects: Online Surveillance And Wikipedia Use, Jonathon Penney Jan 2016

Chilling Effects: Online Surveillance And Wikipedia Use, Jonathon Penney

Articles, Book Chapters, & Popular Press

This article discusses the results of the first empirical study providing evidence of regulatory “chilling effects” of Wikipedia users associated with online government surveillance. The study explores how traffic to Wikipedia articles on topics that raise privacy concerns for Wikipedia users decreased after the widespread publicity about NSA/PRISM surveillance revelations in June 2013. Using an interdisciplinary research design, the study tests the hypothesis, based on chilling effects theory, that traffic to privacy-sensitive Wikipedia articles reduced after the mass surveillance revelations. The Article finds not only a statistically significant immediate decline in traffic for these Wikipedia articles after June 2013, but …


El Derecho Al Secreto Y La Teoría Del Cono, Juan Carlos Riofrío Martínez-Villalba Sep 2015

El Derecho Al Secreto Y La Teoría Del Cono, Juan Carlos Riofrío Martínez-Villalba

Juan Carlos Riofrío Martínez-Villalba

El presente estudio contiene una teoría general del derecho de los secretos, que sirve para determinar el peso específico de cada secreto, a efectos de realizar una correcta ponderación de derechos. La teoría explica las relaciones que existen entre los diversos tipos de secreto, utilizando y desarrollando la teoría del cono de García Morente, que se muestra como una herramienta apropiada para dilucidar cuándo hay derecho al secreto, cuando no lo hay y en qué medida. La metodología utilizada es inductiva. El análisis se estructura de la siguiente manera: (i) se recapitula la teoría general del derecho de los secretos; …


Prince V. St. Francis-St. George Hospital, Inc., Michael Christie Jul 2015

Prince V. St. Francis-St. George Hospital, Inc., Michael Christie

Akron Law Review

This note considers the possible impact on Ohio law of the Prince holding. A review of Ohio's prior position on invasion of privacy suggests that the holding of Prince represents a substantial departure from past decisions in two respects: first, the plaintiffs alleged that their privacy was invaded when information was communicated to only one other person, and second, the invasion of the privacy of one spouse served as the basis for a claim of the other spouse. This apparent departure of Prince from prior decisions is discussed in the context of a physician's duty of confidentiality and defendant's breach …


Bad News: Privacy Ruling To Increase Press Litigation, The Florida Star V. B.J.F., Mary Ellen Hockwalt Jul 2015

Bad News: Privacy Ruling To Increase Press Litigation, The Florida Star V. B.J.F., Mary Ellen Hockwalt

Akron Law Review

This note analyzes the history and precedent upon which the Court relied in reaching Florida Star's "harsh outcome." Next, the note discusses how the Court, by refusing to extend its holding beyond the facts of the case and give broad Constitutional protection to publications of truth, failed to provide lower courts with any guidance in deciding future invasion of privacy actions. Finally, the note examines the Court's balancing test: weighing the privacy interests of a crime victim against the newspaper's freedom to print truthful information.


Social Media: Children’S Lawyer’S Friend And Foe, Jennifer Baum, Sarah N. Fox Jan 2015

Social Media: Children’S Lawyer’S Friend And Foe, Jennifer Baum, Sarah N. Fox

Faculty Publications

(Excerpt)

Social media is taking over the globe. The Pew Research Internet Project states that in the United States, 95 percent of 12- to 17-year-old children are online. Teenagers are also sharing more and more information online: 91 percent of teenagers post a photo of themselves, 92 percent post their real name, and 71 percent post the city or town where they live. “Teens Fact Sheet,” Pew Res. Internet Project (Sept. 2012). This information, in the wrong hands, can be harmful to a child. The Children’s Online Privacy Protection Rule, designed to safeguard children’s information and access online, is a …


Lawrence V. Texas: The Decision And Its Implications For The Future, Martin A. Schwartz Dec 2014

Lawrence V. Texas: The Decision And Its Implications For The Future, Martin A. Schwartz

Touro Law Review

No abstract provided.


The Trickle-Down War, Rosa Brooks Jan 2014

The Trickle-Down War, Rosa Brooks

Georgetown Law Faculty Publications and Other Works

The history of the European nation-state, wrote political sociologist Charles Tilly, is inextricably bound up with the history of warfare. To oversimplify Tilly’s nuanced and complex arguments, the story goes something like this: As power-holders (originally bandits and local strongmen) sought to expand their power, they needed capital to pay for weapons, soldiers and supplies. The need for capital and new recruits drove the creation of taxation systems and census mechanisms, and the need for more effective systems of taxation and recruitment necessitated better roads, better communications and better record keeping. This in turn enabled the creation of larger and …


Finding Privacy In A Sea Of Social Media And Other E-Discovery, Allyson Haynes Stuart Aug 2013

Finding Privacy In A Sea Of Social Media And Other E-Discovery, Allyson Haynes Stuart

Allyson Haynes Stuart

This article looks at the case law governing discovery of social media, and finds several problems. First, many courts are improperly requiring a threshold showing that relevant information exists in public portions of the user’s social media account before allowing such discovery. Second, they allow overbroad discovery, often requiring a litigant to turn over its username and password to the other party. At the same time, parties are seeking such information directly from social media sites, attempting an end-run around the relevancy requirement and increasing motion practice. The article argues that, instead, social media discovery should be treated like other …


Public Duties, Private Rights: Privacy And Unsubstantiated Allegations In Washington’S Public Records Act, Robert E. Miller May 2013

Public Duties, Private Rights: Privacy And Unsubstantiated Allegations In Washington’S Public Records Act, Robert E. Miller

Seattle University Law Review

Open government laws allow private citizens to monitor public servants. But this vital function of access presents a clash of competing interests: the privacy of public employees versus the public’s right to know. Washington’s Public Records Act (PRA) seeks to balance these interests, and the Washington Supreme Court has fought to adhere to the PRA’s spirit of open government while creating bright-line rules for the ease of government agencies. The Bainbridge Island Police Guild court held that investigative reports of unsubstantiated allegations of sexual misconduct against public officials are highly offensive to a reasonable person and that the public has …


In Quest Of The Arbitration Trifecta, Or Closed Door Litigation?: The Delaware Arbitration Program, Thomas Stipanowich Dec 2012

In Quest Of The Arbitration Trifecta, Or Closed Door Litigation?: The Delaware Arbitration Program, Thomas Stipanowich

Thomas J. Stipanowich

The Delaware Arbitration Program established a procedure by which businesses can agree to have their disputes heard in an arbitration proceeding before a sitting judge of the state’s highly regarded Chancery Court. The Program arguably offers a veritable trifecta of procedural advantages for commercial parties, including expert adjudication, efficient case management and short cycle time and, above all, a proceeding cloaked in secrecy. It also may enhance the reputation of Delaware as the forum of choice for businesses. But the Program’s ambitious intermingling of public and private forums brings into play the longstanding tug-of-war between the traditional view of court …


Substance And Method In The Year 2000, Akhil Reed Amar Oct 2012

Substance And Method In The Year 2000, Akhil Reed Amar

Pepperdine Law Review

No abstract provided.


Litigating Medical Malpractice Cases In Oklahoma: The Aftermath Of Hipaa, Melissa A. Couch Jan 2004

Litigating Medical Malpractice Cases In Oklahoma: The Aftermath Of Hipaa, Melissa A. Couch

Oklahoma Law Review

No abstract provided.


Thermal Imaging And The Fourth Amendment: The Role Of The Katz Test In The Aftermath Of Kyllo V. United States, Gregory Gomez Jan 2003

Thermal Imaging And The Fourth Amendment: The Role Of The Katz Test In The Aftermath Of Kyllo V. United States, Gregory Gomez

NYLS Law Review

No abstract provided.


The Secrecy Interest In Contract Law, Omri Ben-Shahar, Lisa Bernstein Jan 2000

The Secrecy Interest In Contract Law, Omri Ben-Shahar, Lisa Bernstein

Articles

A long and distinguished line of law-and-economics articles has established that in many circumstances fully compensatory expectation damages are a desirable remedy for breach of contract because they induce both efficient performance and efficient breach. The expectation measure, which seeks to put the breached-against party in the position she would have been in had the contract been performed, has, therefore, rightly been chosen as the dominant contract default rule. It does a far better job of regulating breach-or-perform incentives than its leading competitors-the restitution measure, the reliance measure, and specific performance. This Essay does not directly take issue with the …


Evidence-Privilege-Right Of Third Person To Assert Privilege As To Accident Report Made Confidential By Statute, Richard W. Young S.Ed. May 1954

Evidence-Privilege-Right Of Third Person To Assert Privilege As To Accident Report Made Confidential By Statute, Richard W. Young S.Ed.

Michigan Law Review

Plaintiff brought a negligence action for injuries sustained when the automobile in which she was a passenger collided with that operated by the defendant. Defendant questioned a police officer, who had filed the accident report, concerning statements made to him by the driver of the vehicle in which the plaintiff was riding. The trial court permitted this testimony over the plaintiff's objection that these statements were privileged under an Iowa statute purporting to make written accident reports confidential and inadmissible in evidence. On appeal after a verdict was returned in favor of the defendant, held, reversed. The statute can …