Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Law

Data Privacy Regulation In The Age Of Smartphones, Matthew Hettrich Aug 2015

Data Privacy Regulation In The Age Of Smartphones, Matthew Hettrich

Touro Law Review

No abstract provided.


Unwanted Publicity, The News Media, And The Constitution: Where Privacy Rights Compete With The First Amendment, Ernest D. Giglio Jul 2015

Unwanted Publicity, The News Media, And The Constitution: Where Privacy Rights Compete With The First Amendment, Ernest D. Giglio

Akron Law Review

It is ironic that while recent legal history records the emergence of a constitutional right to privacy, the Supreme Court, in a line of cases from New York Times to Firestone, has restricted the common law tort of privacy. The legal issues are particularly complex and admittedly difficult to reconcile when the public disclosure tort comes in conflict with first amendment privileges. Expansion of the privacy tort need not necessarily impose an unreasonable burden on the news media, provided the Supreme Court distinguishes between defamation and privacy invasion and establishes and applies to the latter wrong its own legal principles.


Furtive Encryption: Power, Trusts, And The Constitutional Cost Of Collective Surveillance, Jeffrey L. Vagle Jan 2015

Furtive Encryption: Power, Trusts, And The Constitutional Cost Of Collective Surveillance, Jeffrey L. Vagle

Indiana Law Journal

Recent revelations of heretofore secret U.S. government surveillance programs have sparked national conversations about their constitutionality and the delicate balance between security and civil liberties in a constitutional democracy. Among the revealed policies asserted by the National Security Agency (NSA) is a provision found in the “minimization procedures” required under section 702 of the Foreign Intelligence Surveillance Act of 1978. This provision allows the NSA to collect and keep indefinitely any encrypted information collected from domestic communications—including the communications of U.S. citizens. That is, according to the U.S. government, the mere fact that a U.S. citizen has encrypted her electronic …