Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Law

The Puzzle Of Brandeis, Privacy, And Speech, Neil M. Richards Oct 2010

The Puzzle Of Brandeis, Privacy, And Speech, Neil M. Richards

Vanderbilt Law Review

The Right to Privacy' and his dissent in Olmstead v. United States. In The Right to Privacy, Brandeis and Samuel Warren argued that intrusion into and public disclosure of private affairs by the press was deeply hurtful, and that the common law should be read to recognize a tort remedy for such violations. Their short article is considered by scholars to have established not just the privacy torts but the field of privacy law itself. Brandeis is also famous (though less so) for his Olmstead dissent-a document which introduced modern concepts of privacy into constitutional law, and ultimately led not …


Proportionality, Privacy, And Public Opinion: A Reply To Kerr And Swire, Christopher Slobogin May 2010

Proportionality, Privacy, And Public Opinion: A Reply To Kerr And Swire, Christopher Slobogin

Vanderbilt Law School Faculty Publications

In 2007, I published Privacy at Risk: The New Government Surveillance and the Fourth Amendment.' The immediate trigger for the book was the recent upsurge in government use of technology to monitor public and private behavior, and more particularly the tremendous increase in government surveillance after 9/11 using techniques such as data mining, phone and computer intercepts, and public camera systems. The primary analytical target of the book, however, was more general: Supreme Court case law that, read broadly, permits much of this technological surveillance to take place without impinging on any constitutional interests. In an effort to counteract this …


Civilians In Cyberwarfare: Conscripts, Susan W. Brenner, Leo L. Clarke Jan 2010

Civilians In Cyberwarfare: Conscripts, Susan W. Brenner, Leo L. Clarke

Vanderbilt Journal of Transnational Law

Civilian-owned and -operated entities will almost certainly be a target in cyberwarfare because cyberattackers are likely to be more focused on undermining the viability of the targeted state than on invading its territory. Cyberattackers will probably target military computer systems, at least to some extent, but in a departure from traditional warfare, they will also target companies that operate aspects of the victim nation's infrastructure. Cyberwarfare, in other words, will penetrate the territorial borders of the attacked state and target high-value civilian businesses. Nation-states will therefore need to integrate the civilian employees of these (and perhaps other) companies into their …


The Weak Protection Of Strong Encryption: Passwords, Privacy, And Fifth Amendment Privilege, Nathan K. Mcgregor Jan 2010

The Weak Protection Of Strong Encryption: Passwords, Privacy, And Fifth Amendment Privilege, Nathan K. Mcgregor

Vanderbilt Journal of Entertainment & Technology Law

While the constitutional protection afforded private papers has waxed and waned for more than a century, the Supreme Court has greatly restricted the Fifth Amendment privilege against self-incrimination--at least as applied to voluntarily prepared documents. Specifically, where the government knows of the existence and location of subpoenaed documents, the Fifth Amendment guarantee will not justify a failure to produce them, unless the act of production would itself incriminate the defendant. However, the Self-Incrimination Clause still precludes the compelled creation of documents that are both incriminating and testimonial.

The "private papers" doctrine has remained relatively stable for approximately thirty years now, …


Google Books: Page By Page, Click By Click, Users Are Reading Away Privacy Rights, Kathleen E. Kubis Jan 2010

Google Books: Page By Page, Click By Click, Users Are Reading Away Privacy Rights, Kathleen E. Kubis

Vanderbilt Journal of Entertainment & Technology Law

Google Books will likely become the world's most extensive book and magazine search and browsing resource, library, and bookstore--combined. However, as users necessarily reveal personal identifying information through their book searches and reading habits, this service poses a significant threat to personal privacy.

Because the Google Books Amended Settlement Agreement neglects to meaningfully address user privacy, the only available privacy protections are the limited rights bestowed by the Google Books Privacy Policy and the Google Privacy Policy. Unfortunately, these Privacy Policies protect the interests of Google at the expense of users.

The enactment of federal privacy statutes, which include provisions …