Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Law

Privacy Remedies, Lauren H. Scholz Apr 2019

Privacy Remedies, Lauren H. Scholz

Indiana Law Journal

When consumers sue companies for privacy-intrusive practices, they are often unsuccessful. Many cases fail in federal court at the motion to dismiss phase because the plaintiff has not shown the privacy infringement has caused her concrete harm. This is a symptom of a broader issue: the failure of courts and commentators to describe the relationship between privacy rights and privacy remedies.

This Article contends that restitution is the normal measure of privacy remedies. Restitution measures relief by economic gain to the defendant. If a plaintiff can show the likely ability to recover in restitution, that should be sufficient to pass …


Tactful Inattention: Erving Goffman, Privacy In The Digital Age, And The Virtue Of Averting One's Eyes, Elizabeth De Armond Nov 2018

Tactful Inattention: Erving Goffman, Privacy In The Digital Age, And The Virtue Of Averting One's Eyes, Elizabeth De Armond

St. John's Law Review

(Excerpt)

This Article suggests that we would benefit if we would protect privacy by sometimes requiring tactful inattention by potential users rather than total secrecy by the target. That is, some legal privacy protections should stop emphasizing secrecy and instead emphasize the appropriate uses of personally identifiable and often sensitive information by gelling tactful inattention into legal standards. Culturally, such an expansion may be difficult, as we tend to a “finders-keepers” attitude towards data. However, given technology’s ability to dissolve routine barriers, if we require others to leave some information out of some equations, we may be able to retain …


People Analytics And The Regulation Of Information Under The Fair Credit Reporting Act, Pauline Kim, Erika Hanson Jan 2016

People Analytics And The Regulation Of Information Under The Fair Credit Reporting Act, Pauline Kim, Erika Hanson

Scholarship@WashULaw

People analytics — the use of big data and computer algorithms to make personnel decisions — has been drawing increasing public and scholarly scrutiny. Concerns have been raised that the data collection intrudes on individual privacy, and that algorithms can produce unfair or discriminatory results. This symposium contribution considers whether the Fair Credit Reporting Act’s regulation of consumer information used for employment purposes can respond these concerns. The FCRA establishes certain procedural requirements, and these can sometimes help individual workers challenge inaccurate information about them. However, the statute does little to curb intrusive data collection practices or to address the …


Data Privacy Regulation In The Age Of Smartphones, Matthew Hettrich Aug 2015

Data Privacy Regulation In The Age Of Smartphones, Matthew Hettrich

Touro Law Review

No abstract provided.


Welcome To The Machine: Privacy And Workplace Implications Of Predictive Analytics, Robert Sprague Jan 2015

Welcome To The Machine: Privacy And Workplace Implications Of Predictive Analytics, Robert Sprague

Richmond Journal of Law & Technology

Privacy is not simply an absence of information about us in the minds of others; rather it is the control we have over information about ourselves. The volume of information that people create themselves—the full range of communications from voice calls, e-mails and texts to uploaded pictures, video, and music—pales in comparison to the amount of digital information created about them each day.


Cybercrime, Ronald C. Griffin Jan 2012

Cybercrime, Ronald C. Griffin

Journal Publications

This essay recounts campaigns against privacy; the fortifications erected against them; and hi-jinx attributable to hackers, crackers, and miscreants under the Fair Credit Reporting Act.


The Fair Use Doctrine And Trackjacking: Beautiful Animal Or Destroyer Of Worlds?, S. Wayne Clemons, Jr. Jan 2008

The Fair Use Doctrine And Trackjacking: Beautiful Animal Or Destroyer Of Worlds?, S. Wayne Clemons, Jr.

Vanderbilt Journal of Entertainment & Technology Law

"Trackjacking" is the unauthorized replacement of the original soundtrack of an audiovisual recording, such as a movie or television show, with another that is designed to alter substantially the plot and/or characters of the original work. While trackjacking is a creative and entertaining form of art, it may also constitute copyright infringement if the original work is one that is copyrighted. However, if certain criteria are met, the "fair use" doctrine provides a mechanism for courts to excuse what otherwise would be considered copyright infringement. Because the unique nature of trackjacking allows the new work to be distributed in such …


Six Clicks Of Separation: The Legal Ramifications Of Employers Using Social Networking Sites To Research Applicants, Ian Byrnside Jan 2008

Six Clicks Of Separation: The Legal Ramifications Of Employers Using Social Networking Sites To Research Applicants, Ian Byrnside

Vanderbilt Journal of Entertainment & Technology Law

As social networking sites like Facebook.com and MySpace.com continue to grow in popularity, college students and other job applicants voluntarily divulge an increasing amount of personal information on them, often unaware of the potential negative effects it may have on their search for employment. Employers are beginning to take note of this trend and are increasingly using applicants' social networking profiles to supplement traditional application information. Many applicants feel that employers should not base employment decisions on social networking profiles in any way and believe that it is illegal for employers to do so. Yet, it appears that employers that …


Did Privacy Cause Identity Theft?, Lynn M. Lopucki Jan 2003

Did Privacy Cause Identity Theft?, Lynn M. Lopucki

UF Law Faculty Publications

This essay argues that the decline of public identities over the past three decades, combined with increasing secrecy in the process of identification, is the root cause of the burgeoning problem of identity theft. Identity theft is easy because impersonation increasingly takes place in private transactions that are invisible to the victim. The essay compares two proposed solutions: Professor Daniel Soloves' architectural approach and the author's Public Identity System. Both would make the identification process transparent to the person identified, put imposters at risk by requiring personal appearances, and ban the use of social security numbers as passwords. But the …


The New Consumer Financial Privacy Regulations: Balancing The Interests Of Consumers And Industry, Dolores S. Smith, James H. Mann Jan 2000

The New Consumer Financial Privacy Regulations: Balancing The Interests Of Consumers And Industry, Dolores S. Smith, James H. Mann

NYLS Journal of Human Rights

No abstract provided.


Financial Privacy, Gregory T. Nojeim Jan 2000

Financial Privacy, Gregory T. Nojeim

NYLS Journal of Human Rights

No abstract provided.