Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Privacy Law (33)
- Social and Behavioral Sciences (22)
- Law and Society (16)
- Public Law and Legal Theory (14)
- Science and Technology Law (13)
-
- Computer Law (12)
- Constitutional Law (11)
- Public Affairs, Public Policy and Public Administration (11)
- First Amendment (8)
- Health Law and Policy (8)
- Internet Law (8)
- Law and Gender (8)
- Civil Rights and Discrimination (7)
- Law and Economics (7)
- Sociology (7)
- Communication (6)
- Communication Technology and New Media (6)
- Communications Law (6)
- Intellectual Property Law (6)
- Arts and Humanities (5)
- Computer Engineering (5)
- Engineering (5)
- Family Law (5)
- Jurisprudence (5)
- Legal Studies (5)
- Science and Technology Policy (5)
- Business (4)
- Computer Sciences (4)
- Digital Communications and Networking (4)
- Institution
Articles 31 - 52 of 52
Full-Text Articles in Law
The Class Differential In Privacy Law, Michele E. Gilman
The Class Differential In Privacy Law, Michele E. Gilman
All Faculty Scholarship
This article analyzes how privacy law fails the poor. Due to advanced technologies, all Americans are facing corporate and governmental surveillance. However, privacy law is focused on middle-class concerns about limiting the disclosure of personal data so that it is not misused. By contrast, along the welfare-to-work continuum, poor people face privacy intrusions at the time that the state or their employers gather data. This data collection tends to be stigmatizing and humiliating, and it thus not only compounds the harmful effects of living in poverty, but also dampens democratic participation by the poor. The poor interact with the government …
When Antitrust Met Facebook, Christopher S. Yoo
When Antitrust Met Facebook, Christopher S. Yoo
All Faculty Scholarship
Social networks are among the hottest phenomena on the Internet. Facebook eclipsed Google as the most visited website in both 2010 and 2011. Moreover, according to Nielsen estimates, as of the end of 2011 the average American spent nearly seven hours per month on Facebook, which is more time than they spent on Google, Yahoo!, YouTube, Microsoft, and Wikipedia combined. LinkedIn’s May 19, 2011 initial public offering (“IPO”) surpassed expectations, placing the value of the company at nearly $9 billion, and approximately a year later, its stock price had risen another 20 percent. Facebook followed suit a year later with …
Behavioral Advertising: From One-Sided Chicken To Informational Norms, Richard Warner, Robert Sloan
Behavioral Advertising: From One-Sided Chicken To Informational Norms, Richard Warner, Robert Sloan
All Faculty Scholarship
When you download the free audio recording software from Audacity, you agree that Audacity may collect your information and use it to send you advertising. Billions of such pay-with-data exchanges feed information daily to a massive advertising ecosystem that tailors web site advertising as closely as possible to individual interests. The vast majority want considerably more control over our information. We nonetheless routinely enter pay-with-data exchanges when we visit CNN.com, use Gmail, or visit any of a vast number of other websites. Why? And, what, if anything, should we do about it? We answer both questions by describing pay-with-data exchanges …
Big Brother Or Little Brother? Surrendering Seizure Privacy For The Benefits Of Communication Technology, José F. Anderson
Big Brother Or Little Brother? Surrendering Seizure Privacy For The Benefits Of Communication Technology, José F. Anderson
All Faculty Scholarship
Over two centuries have passed since Benjamin Franklin quipped that we should defend privacy over security if people wanted either privacy or security. Although his axiom did not become a rule of law in its original form, its principles found voice in the Fourth and Fifth Amendments of the Constitution's Bill of Rights. To a lesser extent, provisions against the quartering of troops in private homes found in the Third Amendment also support the idea that what a government can require you to do, or who you must have behind the doors of your home, is an area of grave …
Collateral Consequences, Genetic Surveillance, And The New Biopolitics Of Race, Dorothy E. Roberts
Collateral Consequences, Genetic Surveillance, And The New Biopolitics Of Race, Dorothy E. Roberts
All Faculty Scholarship
This Article is part of a Howard Law Journal Symposium on “Collateral Consequences: Who Really Pays the Price for Criminal Justice?,” as well as my larger book project, Fatal Invention: How Science, Politics, and Big Business Re-create Race in the Twenty-First Century (The New Press, 2011). It considers state and federal government expansion of genetic surveillance as a collateral consequence of a criminal record in the context of a new biopolitics of race in America. Part I reviews the expansion of DNA data banking by states and the federal government, extending the collateral impact of a criminal record—in the form …
Cloud Computing: Architectural And Policy Implications, Christopher S. Yoo
Cloud Computing: Architectural And Policy Implications, Christopher S. Yoo
All Faculty Scholarship
Cloud computing has emerged as perhaps the hottest development in information technology. Despite all of the attention that it has garnered, existing analyses focus almost exclusively on the issues that surround data privacy without exploring cloud computing’s architectural and policy implications. This article offers an initial exploratory analysis in that direction. It begins by introducing key cloud computing concepts, such as service-oriented architectures, thin clients, and virtualization, and discusses the leading delivery models and deployment strategies that are being pursued by cloud computing providers. It next analyzes the economics of cloud computing in terms of reducing costs, transforming capital expenditures …
Associational Privacy And The First Amendment: Naacp V. Alabama, Privacy And Data Protection, Anita L. Allen
Associational Privacy And The First Amendment: Naacp V. Alabama, Privacy And Data Protection, Anita L. Allen
All Faculty Scholarship
No abstract provided.
Free Speech And The Myth Of The Internet As An Unintermediated Experience, Christopher S. Yoo
Free Speech And The Myth Of The Internet As An Unintermediated Experience, Christopher S. Yoo
All Faculty Scholarship
In recent years, a growing number of commentators have raised concerns that the decisions made by Internet intermediaries — including last-mile network providers, search engines, social networking sites, and smartphones — are inhibiting free speech and have called for restrictions on their ability to prioritize or exclude content. Such calls ignore the fact that when mass communications are involved, intermediation helps end users to protect themselves from unwanted content and allows them to sift through the avalanche of desired content that grows ever larger every day. Intermediation also helps solve a number of classic economic problems associated with the Internet. …
Undermined Norms: The Corrosive Effect Of Information Processing Technology On Informational Privacy, Richard Warner
Undermined Norms: The Corrosive Effect Of Information Processing Technology On Informational Privacy, Richard Warner
All Faculty Scholarship
Informational privacy is a matter of control; it consists in the ability to control when one’s personal information is collected, how it is used, and to whom it is distributed. The degree of control we once enjoyed has vanished. Advances in information processing technology now give others considerable power to determine when personal information is collected, how it is used, and to it is whom distributed. Privacy advocates sound the alarm in regard to both the governmental and private sectors. I focus exclusively on the later. Relying on the extensive privacy advocate literature, I assume we should try to regain …
Liberating Copyright: Thinking Beyond Free Speech, Jennifer E. Rothman
Liberating Copyright: Thinking Beyond Free Speech, Jennifer E. Rothman
All Faculty Scholarship
Scholars have often turned to the First Amendment to limit the scope of ever-expanding copyright law. This approach has mostly failed to convince courts that independent review is merited and has offered little to individuals engaged in personal rather than political or cultural expression. In this Article, I consider the value of an alternative paradigm using the lens of substantive due process and liberty to evaluate users’ rights. A liberty-based approach uses this other developed body of constitutional law to demarcate justifiable personal, identity-based uses of copyrighted works. Uses that are essential for mental integrity, intimacy promotion, communication, or religious …
Race, Sex And Genes At Work: Uncovering The Lessons Of Norman-Bloodsaw, Elizabeth Pendo
Race, Sex And Genes At Work: Uncovering The Lessons Of Norman-Bloodsaw, Elizabeth Pendo
All Faculty Scholarship
The Genetic Information Nondiscrimination Act of 2008 (“GINA”) is the first federal, uniform protection against the use of genetic information in both the workplace and health insurance. Signed into law on May 21, 2008, GINA prohibits an employer or health insurer from acquiring or using an individual’s genetic information, with some exceptions. One of the goals of GINA is to eradicate actual, or perceived, discrimination based on genetic information in the workplace and in health insurance. Although the threat of genetic discrimination is often discussed in universal terms - as something that could happen to any of us - the …
The Changing Patterns Of Internet Usage, Christopher S. Yoo
The Changing Patterns Of Internet Usage, Christopher S. Yoo
All Faculty Scholarship
The Internet unquestionably represents one of the most important technological developments in recent history. It has revolutionized the way people communicate with one another and obtain information and created an unimaginable variety of commercial and leisure activities. Interestingly, many members of the engineering community often observe that the current network is ill-suited to handle the demands that end users are placing on it. Indeed, engineering researchers often describe the network as ossified and impervious to significant architectural change. As a result, both the U.S. and the European Commission are sponsoring “clean slate” projects to study how the Internet might be …
The Microsoft-Yahoo Merger: Yes, Privacy Is An Antitrust Concern, Robert H. Lande
The Microsoft-Yahoo Merger: Yes, Privacy Is An Antitrust Concern, Robert H. Lande
All Faculty Scholarship
Privacy and antitrust? Isn't antitrust only supposed to be concerned with price? Well, no. Antitrust is actually about consumer choice, and price is only one type of choice. The ultimate purpose of the antitrust laws is to help ensure that the free market will bring to consumers everything they want from competition. This starts with competitive prices, of course, but consumers also want an optimal level of variety, innovation, quality, and other forms of non-price competition. Including, in the Google-Doubleclick and Microsoft-Yahoo transactions, privacy protection.
Confidentiality: An Expectation In Health Care, Anita L. Allen
Confidentiality: An Expectation In Health Care, Anita L. Allen
All Faculty Scholarship
The practice of confidentiality has continued in an era of increased, voluntary openness about medical information in everyday life. Indeed the number and variety of state and federal laws mandating confidentiality by medical professionals has increased in the last dozen years. Moreover, personal injury suits alleging breach of confidentiality or invasion of privacy, along with suits asserting evidentiary privileges, reflect the reality that expectations of confidentiality of medical records and relationships remain strong.
Dredging Up The Past: Lifelogging, Memory And Surveillance, Anita L. Allen
Dredging Up The Past: Lifelogging, Memory And Surveillance, Anita L. Allen
All Faculty Scholarship
The term “lifelog” refers to a comprehensive archive of an individual's quotidian existence, created with the help of pervasive computing technologies. Lifelog technologies would record and store everyday conversations, actions, and experiences of their users, enabling future replay and aiding remembrance. Products to assist lifelogging are already on the market; but the technology that will enable people fully and continuously to document their entire lives is still in the research and development phase. For generals, edgy artists and sentimental grandmothers alike, lifelogging could someday replace or complement, existing memory preservation practices. Like a traditional diary, journal or day-book, the lifelog …
Newsgathering In Light Of Hipaa, Alexander A. Boni-Saenz
Newsgathering In Light Of Hipaa, Alexander A. Boni-Saenz
All Faculty Scholarship
This short piece examines the interaction between the Health Insurance Portability and Accountability Act (HIPAA), a federal law designed to protect the privacy of individuals’ health information, and state Freedom of Information (FOI) laws, which are designed to ensure public access to government documents. It describes three recent cases from different states that addressed difficult issues about where and how to draw the line between the public’s right to know and individuals’ rights to keep their medical information secret. It concludes that questions about the interaction of state FOI laws and HIPAA should be guided by the framework suggested in …
Birth Certificates, Elizabeth Samuels
Birth Certificates, Elizabeth Samuels
All Faculty Scholarship
Birth certificates in the United States, which are issued by the states, have two different sections, and each section involves different privacy concerns. The first section, the legal record of birth, is always available to the adult whose birth it registers; access by other persons varies widely from state to state, ranging from a short list of specified relatives to the public at large. The second section of the certificate - which records health and medical information about the parents, the birth, and the infant - is used only for data collection and analysis, under regulations that protect the privacy …
Reflections On Standing: Challenges To Searches And Seizures In A High Technology World, José F. Anderson
Reflections On Standing: Challenges To Searches And Seizures In A High Technology World, José F. Anderson
All Faculty Scholarship
Among the profound issues that surround constitutional criminal procedure is the obscure often overlooked issue of who has standing to challenge an illegal search, seizure or confession. Privacy interests are often overlooked because without a legal status that allows a person to complain in court, there is no way to challenge whether one is constitutionally protected from personal invasions. Standing is that procedural barrier often imposed to prevent a person in a case from objecting to improper police conduct because of his or her relationship of ownership, proximity, location, or interest in an item searched or a thing seized. Although …
Privacy Isn't Everything: Accountability As A Personal And Social Good, Anita L. Allen
Privacy Isn't Everything: Accountability As A Personal And Social Good, Anita L. Allen
All Faculty Scholarship
No abstract provided.
Rules, Responsibility And Commitment To Children: The New Language Of Morality In Family Law, Jane C. Murphy
Rules, Responsibility And Commitment To Children: The New Language Of Morality In Family Law, Jane C. Murphy
All Faculty Scholarship
Part One of this Article explores the meaning of morality by briefly reviewing a variety of attempts to explore the meaning of moral conduct. This Section draws on a variety of contemporary moral philosophers who have built on the classical tradition to develop a broader definition of moral behavior. This discussion provides a context for the current debate about the meaning of morality in family law and moral discourse in the no-fault era. Part One also reviews the historical debate about how law should strike a balance between promoting communitarian values and respecting autonomy and individual rights. The Article argues …
Business Information And "Personal Data": Some Common-Law Observations About The Eu Draft Data Protection Directive, James Maxeiner
Business Information And "Personal Data": Some Common-Law Observations About The Eu Draft Data Protection Directive, James Maxeiner
All Faculty Scholarship
Discusses the public interest in the free flow of information.
A Contractual Approach To Data Privacy, Stephanos Bibas
A Contractual Approach To Data Privacy, Stephanos Bibas
All Faculty Scholarship
No abstract provided.