Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Law

Mainstreaming Privacy Torts, Danielle K. Citron Dec 2010

Mainstreaming Privacy Torts, Danielle K. Citron

Faculty Scholarship

In 1890, Samuel Warren and Louis Brandeis proposed a privacy tort and seventy years later, William Prosser conceived it as four wrongs. In both eras, privacy invasions primarily caused psychic and reputational wounds of a particular sort. Courts insisted upon significant proof due to those injuries’ alleged ethereal nature. Digital networks alter this calculus by exacerbating the injuries inflicted. Because humiliating personal information posted online has no expiration date, neither does individual suffering. Leaking databases of personal information and postings that encourage assaults invade privacy in ways that exact significant financial and physical harm. This dispels concerns that plaintiffs might …


Location-Based Services: Time For A Privacy Check-In, Chris Conley, Nicole Ozer, Hari O'Connell, Ellen Ginsburg, Tamar Gubins Nov 2010

Location-Based Services: Time For A Privacy Check-In, Chris Conley, Nicole Ozer, Hari O'Connell, Ellen Ginsburg, Tamar Gubins

Faculty Scholarship

Need to get directions when you are lost? Want to know if your friends are in the neighborhood? Location-based services – applications and websites that provide services based on your current location – can put this information and more in the palm of your hand.

But outdated privacy laws and varying corporate practices could mean that sensitive information about who you are, where you go, what you do, and who you know end up being shared, sold, or turned over to the government.

Can location-based services protect your privacy? Do they? And what can we do to improve the situation? …


Fulfilling Government 2.0'S Promise With Robust Privacy Protections, Danielle K. Citron Jun 2010

Fulfilling Government 2.0'S Promise With Robust Privacy Protections, Danielle K. Citron

Faculty Scholarship

The public can now “friend” the White House and scores of agencies on social networks, virtual worlds, and video-sharing sites. The Obama Administration sees this trend as crucial to enhancing governmental transparency, public participation, and collaboration. As the President has underscored, government needs to tap into the public’s expertise because it doesn’t have all of the answers.

To be sure, Government 2.0 might improve civic engagement. But it also might produce privacy vulnerabilities because agencies often gain access to individuals’ social network profiles, photographs, videos, and contact lists when interacting with individuals online. Little would prevent agencies from using and …


Visionary Pragmatism And The Value Of Privacy In The Twenty-First Century, Danielle K. Citron, Leslie Henry Apr 2010

Visionary Pragmatism And The Value Of Privacy In The Twenty-First Century, Danielle K. Citron, Leslie Henry

Faculty Scholarship

Despite extensive scholarly, legislative, and judicial attention to privacy, our understanding of privacy and the interests it protects remains inadequate. At the crux of this problem is privacy’s protean nature: it means “so many different things to so many different people” that attempts to articulate just what it is, or why it is important, generally have failed or become unwieldy. As a result, important privacy problems remain unaddressed, often to society’s detriment.

In his newest book, Understanding Privacy, Daniel J. Solove aims to reverse this state of affairs with a pluralistic conception of privacy that recognizes the societal value of …


Cloud Computing: Storm Warning For Privacy?, Nicole Ozer, Chris Conley Jan 2010

Cloud Computing: Storm Warning For Privacy?, Nicole Ozer, Chris Conley

Faculty Scholarship

“Cloud computing” - the ability to create, store, and manipulate data through Web-based services - is growing in popularity. Cloud computing itself may not transform society; for most consumers, it is simply an appealing alternative tool for creating and storing the same records and documents that people have created for years. However, outdated laws and varying corporate practices mean that documents created and stored in the cloud may not have the same protections as the same documents stored in a filing cabinet or on a home computer. Can cloud computing services protect the privacy of their consumers? Do they? And …