Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Privacy Law

2012

Institution
Keyword
Publication
Publication Type
File Type

Articles 91 - 104 of 104

Full-Text Articles in Law

Personal Environmental Information: The Promise And Perils Of The Emerging Capacity To Identify Individual Environmental Harms, Katrina Fischer Kuh Jan 2012

Personal Environmental Information: The Promise And Perils Of The Emerging Capacity To Identify Individual Environmental Harms, Katrina Fischer Kuh

Elisabeth Haub School of Law Faculty Publications

This Article begins from the premise that successful regulation of environmentally significant individual behaviors could achieve meaningful environmental benefits and argues that (1) technology is increasingly making information about individual environmental behaviors and associated harms more accessible; (2) better information about environmentally significant individual behaviors could substantially enhance fledgling efforts to regulate those behaviors; and (3) use of technology-enabled personal environmental information in support of regulation will require the resolution of myriad privacy concerns. The Article seeks to generate and inform a discussion about the appropriate balance between access to personal environmental information and privacy by identifying how regulation can …


The Sidis Case And The Origins Of Modern Privacy Law, Samantha Barbas Jan 2012

The Sidis Case And The Origins Of Modern Privacy Law, Samantha Barbas

Journal Articles

The American press, it’s been said, is freer to invade personal privacy than perhaps any other in the world. The tort law of privacy, as a shield against unwanted media exposure of private life, is very weak. The usual reason given for the weakness of U.S. privacy law as a bar on the publication of private information is the strong tradition of First Amendment freedom. But “freedom of the press” alone cannot explain why liberty to publish has been interpreted as a right to print truly intimate matters or to thrust people into the spotlight against their will. Especially in …


Toward A Cohesive Interpretation Of The Electronic Communications Privacy Act For The Electronic Monitoring Of Employees, Ariana R. Levinson Jan 2012

Toward A Cohesive Interpretation Of The Electronic Communications Privacy Act For The Electronic Monitoring Of Employees, Ariana R. Levinson

West Virginia Law Review

This Article proposes a cohesive interpretation of the Electronic Com- munications Privacy Act ("ECPA") designed to protect employees' basic right to privacy in their electronic communications. The difficulty of new technology outpacing the law's ability to protect employees' privacy from electronic moni- toring by employers is widely acknowledged. Yet, scholars have generally over- looked or dismissed the potential of the ECPA to provide privacy protection for employees in the electronic workplace, calling instead for reform through the legislative process. Nevertheless, despite increasing calls from a broad range of entities for stronger privacy protections, passage of new legislation designed to adequately …


The Ownership And Exploitation Of Personal Identity In The New Media Age, 12 J. Marshall Rev. Intell. Prop. L. 1 (2012), Thomas Hemnes Jan 2012

The Ownership And Exploitation Of Personal Identity In The New Media Age, 12 J. Marshall Rev. Intell. Prop. L. 1 (2012), Thomas Hemnes

UIC Review of Intellectual Property Law

Personally Identifiable Information (“PII”) has never been more valuable. In today’s networked world, seemingly trivial facts can be collected, molded into a marketable economic profile, and transferred in the blink of an eye. To be sure, the commodification of PII allows for provision of dramatically more efficient and effective services. Yet the potential for privacy abuses is substantial. What interest does one have in the constellation of facts that defines one’s identity? Is it something one can own, like their right of publicity? Or are others free to use what they learn about a person? This article surveys current privacy …


What Must We Hide: The Ethics Of Privacy And The Ethos Of Disclosure, Anita L. Allen Jan 2012

What Must We Hide: The Ethics Of Privacy And The Ethos Of Disclosure, Anita L. Allen

All Faculty Scholarship

No abstract provided.


Facebook Fallacies, Geoffrey C. Hazard Jr. Jan 2012

Facebook Fallacies, Geoffrey C. Hazard Jr.

All Faculty Scholarship

No abstract provided.


Privacy & The Personal Prospectus: Should We Introduce Privacy Agents Or Regulate Privacy Intermediaries, Scott R. Peppet Jan 2012

Privacy & The Personal Prospectus: Should We Introduce Privacy Agents Or Regulate Privacy Intermediaries, Scott R. Peppet

Publications

No abstract provided.


Bringing Clarity To Administrative Search Doctrine: Distinguishing Dragnets From Special Subpopulation Searches, Eve Brensike Primus Jan 2012

Bringing Clarity To Administrative Search Doctrine: Distinguishing Dragnets From Special Subpopulation Searches, Eve Brensike Primus

Articles

Anyone who has been stopped at a sobriety checkpoint, screened at an international border, scanned by a metal detector at an airport or government building, or drug tested for public employment has been subjected to an administrative search or seizure. Searches of public school students, government employees, and probationers are characterized as administrative, as are business inspections and-increasingly-wiretaps and other searches used in the gathering of national security intelligence. In other words, the government conducts thousands of administrative searches every day. None of these searches requires either probable cause or a search warrant. Instead, courts evaluating administrative searches need only …


Csi Las Vegas: Privacy, Policing, And Profiteering In Casino Structured Intelligence, Jessica D. Gabel Jan 2012

Csi Las Vegas: Privacy, Policing, And Profiteering In Casino Structured Intelligence, Jessica D. Gabel

Faculty Publications By Year

Casinos are powerhouses of information gathering and distribution and use their surveillance activities to police, protect, and profit. The private information does not exist in a vacuum; casinos share it with other casinos and, in some cases, law enforcement. But who protects the consumer in the event that the information is breached or the company is sold or files for bankruptcy? Are there restrictions on the information that casinos may share with law enforcement? This Article argues that the intricate, vast amounts of consumer information compiled through casino structured intelligence ("CSI") require greater protection and oversight in the contexts of …


Quasi-Property: Like, But Not Quite Property, Shyamkrishna Balganesh Jan 2012

Quasi-Property: Like, But Not Quite Property, Shyamkrishna Balganesh

Faculty Scholarship

Quasi-property interests refer to situations in which the law seeks to simulate the idea of exclusion, normally associated with property rights, through a relational liability regime, by focusing on the nature and circumstances of the interaction in question, which is thought to merit a highly circumscribed form of exclusion. In this Article, I unpack the analytical and normative bases of quasi-property interests, examine the primary triggering events that cause courts to invoke the category, and respond to potential objections to the recognition of quasi-property as an independent category of interests in the law.


Can The States Keep Secrets From The Federal Government?, Robert A. Mikos Jan 2012

Can The States Keep Secrets From The Federal Government?, Robert A. Mikos

Vanderbilt Law School Faculty Publications

States amass troves of information detailing the regulated activities of their citizens, including activities that violate federal law. Not surprisingly, the federal government is keenly interested in this information. It has ordered reluctant state officials to turn over their confidential files concerning medical marijuana, juvenile criminal history, immigration status, tax payments, and employment discrimination, among many other matters, to help enforce federal laws against private citizens. Many states have objected to these demands, citing opposition to federal policies and concerns about the costs of breaching confidences, but the lower courts have uniformly upheld the federal government’s power to commandeer information …


Giving Credit Where Credit Is Due: A Comment On The Theoretical Foundation And Historical Origin Of The Tort Remedy For Invasion Of Privacy, Alberto Bernabe Dec 2011

Giving Credit Where Credit Is Due: A Comment On The Theoretical Foundation And Historical Origin Of The Tort Remedy For Invasion Of Privacy, Alberto Bernabe

Alberto Bernabe

This article discusses the origin of the cause of action for damages for invasion to privacy


Systematic Government Access To Private-Sector Data In Germany, Paul M. Schwartz Dec 2011

Systematic Government Access To Private-Sector Data In Germany, Paul M. Schwartz

Paul M. Schwartz

No abstract provided.


Expectations Of Privacy In Social Media, Stephen E. Henderson Dec 2011

Expectations Of Privacy In Social Media, Stephen E. Henderson

Stephen E Henderson

This article, which largely tracks my remarks at Mississippi College’s Social Media Symposium, examines expectations of privacy in social media such as weblogs (blogs), Facebook pages, and Twitter tweets. Social media is diverse and ever-diversifying, and while I address some of that complexity, I focus on the core functionality, which provides the groundwork for further conversation as the technology and related social norms develop. As one would expect, just as with our offline communications and other online communications, in some we have an expectation of privacy that is recognized by current law, in some we have an expectation of privacy …