Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Law

Three Milestones In The History Of Privacy In The United States, Vernon Valentine Palmer Dec 2010

Three Milestones In The History Of Privacy In The United States, Vernon Valentine Palmer

Vernon Palmer

Over the course of more than 120 years the right of privacy has somehow acquired, absorbed and incorporated various tangential interests such as the right to control use of one’s name, one’s image, one’s writings, one’s life story, and even the right to exploit one’s own publicity value. Obviously those who seek to capitalize upon the publicity value of their name or talent are not in fact seeking privacy in the usual sense of the word, and yet American tort law protects the publicity right either in the name of privacy or describes it as a related offshoot. Somewhat more …


In The Name Of Watergate -- Returning Ferpa To Its Original Design, Mary Margaret Meg Penrose Jul 2010

In The Name Of Watergate -- Returning Ferpa To Its Original Design, Mary Margaret Meg Penrose

Meg Penrose

The attached article, entitled "In the Name of Watergate: Returning FERPA to its Original Design" details the Watergate effect on federal privacy legislation, particularly the Family Educational Rights and Privacy Act (FERPA). Senator James L. Buckley, a one-term Senator from New York, served as the architect for what remains the most important education privacy law in existence. However, Senator Buckley recently discussed the reasons that this law should be "clarified" and returned to its original design. I wholeheartedly agree. In the digital era, we must zealously protect privacy with effective legislation that guards both the collection and release of personal …


In The Name Of Watergate -- Returning Ferpa To Its Original Design, Meg Penrose Jul 2010

In The Name Of Watergate -- Returning Ferpa To Its Original Design, Meg Penrose

Meg Penrose

The attached article, entitled "In the Name of Watergate: Returning FERPA to its Original Design" details the Watergate effect on federal privacy legislation, particularly the Family Educational Rights and Privacy Act (FERPA). Senator James L. Buckley, a one-term Senator from New York, served as the architect for what remains the most important education privacy law in existence. However, Senator Buckley recently discussed the reasons that this law should be "clarified" and returned to its original design. I wholeheartedly agree. In the digital era, we must zealously protect privacy with effective legislation that guards both the collection and release of personal …


Privacy As Product Safety, James Grimmelmann Dec 2009

Privacy As Product Safety, James Grimmelmann

James Grimmelmann

Online social media confound many of our familiar expectaitons about privacy. Contrary to popular myth, users of social software like Facebook do care about privacy, deserve it, and have trouble securing it for themselves. Moreover, traditional database-focused privacy regulations on the Fair Information Practices model, while often worthwhile, fail to engage with the distinctively social aspects of these online services.

Instead, online privacy law should take inspiration from a perhaps surprising quarter: product-safety law. A web site that directs users' personal information in ways they don't expect is a defectively designed product, and many concepts from products liability law could …


Trade Secret Law And Information Development Incentives, Michael Risch Dec 2009

Trade Secret Law And Information Development Incentives, Michael Risch

Michael Risch

Trade secrets differ from other forms of intellectual property in many subtle ways that affect incentives to invest in information development. These differences relate not only to the types of information protected, but also to the requirements one must meet to protect that type of information. The various divergences and intersections of trade secret laws with other intellectual property laws lead to differences in the amount and types of investments companies make in developing information. This chapter explores five types of differential incentives associated with trade secret law: - Trade secret law v. no trade secret law - Trade secret …


The Unmasking Option, James Grimmelmann Dec 2009

The Unmasking Option, James Grimmelmann

James Grimmelmann

In the recent "Skanks in NYC" case, the plaintiff dropped her defamation lawsuit once the court had unmasked the John Doe defendant. Although the plaintiff was criticized for her seemingly pretextual use of a lawsuit, the outcome was substantively just. The harasser got almost exactly what she deserved for trying to humiliate her victim: embarrassment of her own.

This brief essay discusses a counterintuitive proposal inspired by the Skanks in NYC case: that the law unmask anonymous online harassers as a substitute for litigation, rather than as an aid to it. Identifying harassers can be an effective way of holding …


Balancing The Rights Of The Public With The Jurors' Right To Privacy During The Jury Selection Process, Stephen A. Gerst Dec 2009

Balancing The Rights Of The Public With The Jurors' Right To Privacy During The Jury Selection Process, Stephen A. Gerst

Stephen A Gerst

It is rare for a trial judge hearing a criminal case to receive a motion to intervene filed by third parties not named in the proceedings. In the jury selection process of cases involving high profile defendants, however, the public - including the press - has a heightened interest in the proceedings. At the same time, the trial judge may have a heightened interest in the protection of juror privacy. This article discusses the issue of when and under what circumstances a trial court may close proceedings to the public during the jury selection process and seal the written responses …


Symposium, Internet Expression In The 21st Century: Where Technology & Law Collide: Introduction, Michael R. Dimino, Tonya M. Evans-Walls, Nicole M. Santo Dec 2009

Symposium, Internet Expression In The 21st Century: Where Technology & Law Collide: Introduction, Michael R. Dimino, Tonya M. Evans-Walls, Nicole M. Santo

Michael R Dimino

The Widener Law Journal has assembled a dynamic and diverse group of preeminent legal scholars to evaluate and discuss the many engaging, perplexing, and unanswered legal and ethical questions presented by Internet expression. These scholars have focused on two primary topics: (1) issues of constitutional law and criminal procedure that arise with Internet expression, including whether the Internet has increased concerns about invasions of other persons' rights and what regulations are necessary to protect privacy rights; (2) the intersection of Internet expression and property law, including issues of ownership, protectable interests,
and fair use in the realm of intellectual property …


Real Name System On The Internet: Origins, Practices And Reflections(中国网络实名制管理:由来、实践与反思,Forthcoming), Henry L. Hu Dec 2009

Real Name System On The Internet: Origins, Practices And Reflections(中国网络实名制管理:由来、实践与反思,Forthcoming), Henry L. Hu

Henry L Hu

No abstract provided.