Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

2002

Privacy

Discipline
Institution
Publication
Publication Type

Articles 1 - 30 of 38

Full-Text Articles in Law

The Battle Of The Music Industry: The Distribution Of Audio And Video Works Via The Internet, Music And More, David Balaban Dec 2002

The Battle Of The Music Industry: The Distribution Of Audio And Video Works Via The Internet, Music And More, David Balaban

Fordham Intellectual Property, Media and Entertainment Law Journal

No abstract provided.


Education Law, D. Patrick Lacy Jr., Kathleen S. Mehfoud Nov 2002

Education Law, D. Patrick Lacy Jr., Kathleen S. Mehfoud

University of Richmond Law Review

No abstract provided.


4th Annual Computer & Technology Law Institute, Office Of Continuing Legal Education At The University Of Kentucky College Of Law Nov 2002

4th Annual Computer & Technology Law Institute, Office Of Continuing Legal Education At The University Of Kentucky College Of Law

Continuing Legal Education Materials

Materials from the 4th Annual Computer & Technology Law Institute held by UK/CLE in November 2002.


Constitutional Issues In Information Privacy, Fred H. Cate, Robert Litan Oct 2002

Constitutional Issues In Information Privacy, Fred H. Cate, Robert Litan

Michigan Telecommunications & Technology Law Review

The U.S. Constitution has been largely ignored in the recent flurry of privacy laws and regulations designed to protect personal information from incursion by the private sector despite the fact that many of these enactments and efforts to enforce them significantly implicate the First Amendment. Questions about the role of the Constitution have assumed new importance in the aftermath of the September 11, 2001 terrorist attacks on the World Trade Center and the Pentagon. Recent efforts to identify and apprehend terrorists and to protect against future attacks threaten to weaken constitutional protections against government intrusions into personal privacy. However, these …


The Patriot Act’S Impact On The Government’S Ability To Conduct Electronic Surveillance Of Ongoing Domestic Communications, Nathan C. Henderson Oct 2002

The Patriot Act’S Impact On The Government’S Ability To Conduct Electronic Surveillance Of Ongoing Domestic Communications, Nathan C. Henderson

Duke Law Journal

No abstract provided.


An Equality Paradign For Preventing Genetic Discrimination, Anita Silvers, Michael A. Stein Oct 2002

An Equality Paradign For Preventing Genetic Discrimination, Anita Silvers, Michael A. Stein

Vanderbilt Law Review

On June 26, 2000, scientists announced at a White House news conference that they had completed mapping the human genome sequence, the human race's genetic blueprint. This pronouncement generated tremendous and well-deserved excitement. Genomics, the study and application of genetic information, promises to be an unparalleled tool for improving public health. Genetic testing can identify asymptomatic individuals who are at risk of becoming ill themselves or bestowing illness on their children. As a result, individuals who test positive can take prophylactic measures to slow or stop disease and can also reduce the births of progeny at high risk of compromised …


The Fourth Amendment In The Hallway: Do Tenants Have A Constitutionally Protected Privacy Interest In The Locked Common Areas Of Their Apartment Buildings?, Sean M. Lewis Oct 2002

The Fourth Amendment In The Hallway: Do Tenants Have A Constitutionally Protected Privacy Interest In The Locked Common Areas Of Their Apartment Buildings?, Sean M. Lewis

Michigan Law Review

One afternoon, a police officer spots a man driving a Cadillac through a run·down neighborhood. His interest piqued, the officer decides to follow the vehicle. The Cadillac soon comes to rest in front of an apartment building, and the driver, Jimmy Barrios-Moriera, removes a shopping bag from the trunk and enters the building. The moment Barrios-Moriera disappears within the doorway, the officer sprints after him because he knows that the door to the apartment building will automatically lock when it closes. He manages to catch the door just in time and rushes in. Barrios-Moriera is already halfway up a flight …


Sneak And Peak Search Warrants, Donald E. Wilkes Jr. Sep 2002

Sneak And Peak Search Warrants, Donald E. Wilkes Jr.

Popular Media

In his recent article "Taking Liberty with Freedom," author Richard P. Moore reminds us that the USA Patriot Act, signed by President Bush last Oct. 26 in the wake of the Sept. 11 terrorist attacks, "gives the government the kind of sweeping powers of arrest, detention, surveillance, investigation, deportation, and search and seizure that ... assault ... our most basic freedoms."

I want to examine here a single section of the USA Patriot Act--section 213, definitely one of the most sinister provisions of this monstrous statute.


Privacy And The Post-September 11 Immigration Detainees: The Wrong Way To A Right (And Other Wrongs), Sadiq Reza Jul 2002

Privacy And The Post-September 11 Immigration Detainees: The Wrong Way To A Right (And Other Wrongs), Sadiq Reza

Faculty Scholarship

In forthcoming work, I argue that this common-law privacy right should indeed attach to individuals arrested for or suspected of crime.9 I also argue that support for the right exists in a variety of judicial, statutory, and other sources, and that legislation to formally protect the right is warranted and constitutional. The reasoning is simple: being publicly named in connection with criminal allegations is stigmatizing, and the resultant personal harm-social, professional, emotional, other-lasts, and is difficult to justify when it is visited upon someone who is acquitted of the charges or against whom the charges are dismissed. Equally troubling is …


Corporate Cybersmear: Employers File John Doe Defamation Lawsuits Seeking The Identity Of Anonymous Employee Internet Posters, Margo E. K. Reder, Christine Neylon O'Brien Jun 2002

Corporate Cybersmear: Employers File John Doe Defamation Lawsuits Seeking The Identity Of Anonymous Employee Internet Posters, Margo E. K. Reder, Christine Neylon O'Brien

Michigan Telecommunications & Technology Law Review

Communications systems are now wide open and fully accessible, with no limits in range, scope or geography. Targeted audiences are accessible with pinpoint accuracy. Messages reach millions of readers with one click. There is a chat room for everyone. Most importantly, there is no limit on content. Therefore, employees can register their dissatisfaction by posting a message in a chat room. Moreover, the identity of the posting employee is not easily discoverable due to anonymous and pseudonymous communications capabilities. The nature of these online messages is qualitatively different from real-world communications. By way of example, newspapers have a responsibility regarding …


Marking Carnivore's Territory: Rethinking Pen Registers On The Internet, Anthony E. Orr Jun 2002

Marking Carnivore's Territory: Rethinking Pen Registers On The Internet, Anthony E. Orr

Michigan Telecommunications & Technology Law Review

"Carnivore" entered the online world's collective consciousness in June 2000 when the Federal Bureau of Investigation unveiled the Internet surveillance software program to telecommunications industry specialists. The FBI claims the program allows agents to scan the traffic of an Internet Service Provider (ISP) for messages or commands to or from a criminal suspect and then intercept only those messages, capturing copies of e-mails, web site downloads and other file transfers[...] A central issue in the controversy surrounding Carnivore is whether current law permits the FBI to employ the program in the Internet context. Bureau officials claim statutory authority for deployments …


Computer Searches And Seizures: Some Unresolved Issues, Susan W. Brenner, Barbara A. Frederiksen Jun 2002

Computer Searches And Seizures: Some Unresolved Issues, Susan W. Brenner, Barbara A. Frederiksen

Michigan Telecommunications & Technology Law Review

The goal of this article is to illustrate the issues that arise in the context of computer search and seizures by examining several areas in which the application of Fourth Amendment concepts to computer searches and/or seizures can be problematic. In order to illustrate this point, the article will build on a hypothetical. The hypothetical situation assumes law enforcement officers have lawfully obtained a warrant to search for and seize evidence concerning the commission of one or more crimes. It will also be assumed that computer technology played some role in the commission of these crimes, so computer equipment and …


Carnivore, The Fbi’S E-Mail Surveillance System: Devouring Criminals, Not Privacy, Griffin S. Dunham May 2002

Carnivore, The Fbi’S E-Mail Surveillance System: Devouring Criminals, Not Privacy, Griffin S. Dunham

Federal Communications Law Journal

On July 11, 2000, the FBI intorduced Carnivore, an Internet monitoring system. It was designed, and is used exclusively, to carry out court-ordered surveillance of electronic communications. It is a tangible, portable device, tantamount to a phone tap, that allows the FBI to intercept and collect criminal suspects' e-mail without their knowledge or consent. This Note addresses competing and parallel interests between the government and society to determine the legitimacy and necessity of Carnivore. The purpose of this Note is twofold: first, to demonstrate the need for Carnivore to enable law enforcement to keep up with criminals who utilize cyberspace …


The Fourth Amendment In The Twenty-First Century: Technology, Privacy, And Human Emotions, Andrew E. Taslitz Apr 2002

The Fourth Amendment In The Twenty-First Century: Technology, Privacy, And Human Emotions, Andrew E. Taslitz

Law and Contemporary Problems

Police and local political officials in Tampa FL argued that the FaceIt system promotes safety, but privacy advocates objected to the city's recording or utilizing facial images without the victims' consent, some staging protests against the FaceIt system. Privacy objects seem to be far more widely shared than this small protest might suggest.


Rights In Conflict: The First Amendment’S Third Century, Robert M. O'Neil Apr 2002

Rights In Conflict: The First Amendment’S Third Century, Robert M. O'Neil

Law and Contemporary Problems

O'Neil has witnesses the resolution, or at least the clarification, of many free speech and press issues. There are, however, persistent issues that deserve particularly close scrutiny. Three such issues are tensions between free expression and privacy, civility, and equality.


Indecent Exposures In An Electronic Regime, Natalie L. Regoli Mar 2002

Indecent Exposures In An Electronic Regime, Natalie L. Regoli

Federal Communications Law Journal

As the topic of data privacy is vast and the subject of much scrutiny, this Comment focuses narrowly on commercial cyber-activities relating to the nonconsensual Internet acquisition of personally identifiable user data. Beginning with a brief examination of the technology that has exacerbated privacy law's inadequacies, it briefly discusses failed attempts to safeguard privacy rights through the market and federal agency management. It then addresses current U.S. privacy legislation and the 1995 European Privacy Directive. Finally, this Comment proposes the creation of a new legislative system to effectively combat the surreptitious collection, storage, use, and sale of personal data.


We Can Do This The Easy Way Or The Hard Way: The Use Of Deceit To Induce Consent Searches, Rebecca Strauss Feb 2002

We Can Do This The Easy Way Or The Hard Way: The Use Of Deceit To Induce Consent Searches, Rebecca Strauss

Michigan Law Review

In October of 1995, Aaron Salvo was studying and living at Ashland College. College officials informed local FBI agents that they suspected Salvo of possible child molestation and related conduct based on incriminating electronic mail. FBI agents approached Salvo at his dormitory, asked to speak with him in private about the suspicious mail, and suggested they speak in Salvo's dorm room. Salvo agreed to speak with the officers, but declined to do so in his room because his roommate was there, and he did not want to get anyone else involved in the embarrassing nature of the upcoming conversation. Salvo …


Privacy And Personal Data Protection In The Information Age: A Comparative Evaluation, Emeka B. Obasi Jan 2002

Privacy And Personal Data Protection In The Information Age: A Comparative Evaluation, Emeka B. Obasi

LLM Theses and Essays

The United States and European economies are both information economies, however, they have different approaches in protecting personal information. This study examines in as much detail as possible, the relevant privacy laws in the two economic regions. The Europeans have a comprehensive legislation regulating personal information that vests considerable control on the data subject. Europeans characterize personal data as a fundamental human right. Americans, on the other hand, protect personal information by legislating for specific industries as the need arises and do not recognize privacy of personal information as a fundamental right. This study concludes the European approach is preferable, …


Reasonable Expectations And The Erosion Of Privacy, Shaun Spencer Jan 2002

Reasonable Expectations And The Erosion Of Privacy, Shaun Spencer

Faculty Publications

This Article examines how the prevailing legal conception of privacy facilitates the erosion of privacy. The law generally measures privacy by reference to society’s reasonable expectation of privacy. If we think of the universe of legally private matters as a sphere, the sphere will contract (or least in theory) expand in accordance with changing social expectations. This expectations-driven conception of privacy in effect establishes a privacy marketplace, analogous in both a literal and metaphorical sense to a marketplace of ideas. In this marketplace, societal expectations of privacy fluctuate in response to changing social practices. For this reason, privacy is susceptible …


A Safety Net In The E-Marketplace: The Safe Harbor Principles Offer Comprehensive Privacy Protection Without Stopping Data Flow, William J. Kambas Jan 2002

A Safety Net In The E-Marketplace: The Safe Harbor Principles Offer Comprehensive Privacy Protection Without Stopping Data Flow, William J. Kambas

ILSA Journal of International & Comparative Law

In May of 2000, the FTC, under Chairman Robert Pitofsky, concluded that industry self-regulation was not effective in protecting consumer privacy and in a report to Congress the FTC expressed the view "that legislation [was] necessary to ensure further implementation of consumer data protection devices."


Colloquium On Privacy & Security, Ann Bartow Jan 2002

Colloquium On Privacy & Security, Ann Bartow

Ann Bartow

On November 2-3, 2001, the University of Buffalo sponsored Digital Frontier: The Buffalo Summit 2001. The attendees included Gary M. Schober (Moderator), Shubha Ghosh (Organizer), Ann Bartow, Chris Hoofnagle, and Phyllis Borzi. The participants were drawn from a wide range of specialties, from lawyers and doctors to business-men and academics, in order to provide some perspective on our data-driven world. This session on Privacy and Security identified some of the trends in technology that threaten privacy rights, as well as those that may assists preserving privacy. The speakers also explored legal developments and political structure influencing cyber-privacy.


Japan's Communications Interception Act: Unconstitutional Invasion Of Privacy Or Necessary Tool?, Lillian R. Gilmer Jan 2002

Japan's Communications Interception Act: Unconstitutional Invasion Of Privacy Or Necessary Tool?, Lillian R. Gilmer

Vanderbilt Journal of Transnational Law

In August 1999, Japan became the last of the G8 nations to pass legislation to allow law enforcement to wiretap communications. For some, passage of the law was long overdue; for others, its passage marked the beginning of an impermissible government encroachment on civil rights. This Note examines Japan's Communications Interception Act, the forces in Japanese society creating the need for the law, and the reasons why the law is being challenged. Part II examines the policy behind the law, its history, and public reaction to the law. Part III presents the history of organized crime in Japan, and a …


Securing Our Infrastructure: Private/Public Information Sharing, Rena I. Steinzor Jan 2002

Securing Our Infrastructure: Private/Public Information Sharing, Rena I. Steinzor

Congressional Testimony

No abstract provided.


Privacy, Eh! The Impact Of Canada's Personal Information Protection And Electronic Documents Act On Transnational Business, Juliana M. Spaeth, Mark J. Plotkin, Sandra C. Sheets Jan 2002

Privacy, Eh! The Impact Of Canada's Personal Information Protection And Electronic Documents Act On Transnational Business, Juliana M. Spaeth, Mark J. Plotkin, Sandra C. Sheets

Vanderbilt Journal of Entertainment & Technology Law

In 2002, the requirements imposed by PIPEDA will extend to encompass all personal health information. PIPEDA will ultimately extend to the collection, use, or disclosure of all personal information in the course of any commercial activity within a province in 2004. This change in Canadian law carries significant consequences for the general business practices of American companies that conduct, or may conduct, business with Canadians. It is therefore crucial for lawyers with clients collecting personal data on- and offline to familiarize themselves with its requirements in order to counsel clients effectively about their current and future obligations under this privacy …


Reasonable Expectations And The Erosion Of Privacy, Shaun B. Spencer Jan 2002

Reasonable Expectations And The Erosion Of Privacy, Shaun B. Spencer

San Diego Law Review

This Article examines how the prevailing legal conception of privacy facilitates the erosion of privacy. The law generally measures privacy by reference to society’s reasonable expectation of privacy. If we think of the universe of legally private matters as a sphere, the sphere will contract or (at least in theory) expand in accordance with changing social expectations. This expectation-driven conception of privacy in effect establishes a privacy marketplace, analogous in both a literal and metaphorical sense to a marketplace of ideas. In this marketplace, societal expectations of privacy fluctuate in response to changing social practices. For this reason, privacy is …


Privacy Wrongs In Search Of Remedies, Joel R. Reidenberg Jan 2002

Privacy Wrongs In Search Of Remedies, Joel R. Reidenberg

Faculty Scholarship

The American legal system has generally rejected legal rights for data privacy and relies instead on market self-regulation and the litigation process to establish norms of appropriate behavior in society. Information privacy is protected only through an amalgam of narrowly targeted rules. The aggregation of these specific rights leaves many significant gaps and fewer clear remedies for violations of fair information practices. With an absence of well-established legal rights, privacy wrongs are currently in search of remedies. This Article first describes privacy rights and wrongs that frame the search for remedies in the United States. It explores public enforcement of, …


Human Identification Theory And The Identity Theft Problem, Lynn M. Lopucki Jan 2002

Human Identification Theory And The Identity Theft Problem, Lynn M. Lopucki

UF Law Faculty Publications

This paper builds on the theory of human identification proposed by Professor Roger Clarke and uses the product as the basis for a proposed solution to the identity theft problem. The expanded theory holds that all human identification fits a single model. The identifior matches the characteristics of a person observed in a first observation with the characteristics of a person observed in a second observation to determine whether they are the same person. From the theory it follows that a characteristic used for identification in the credit reporting system, such as social security number, mother's maiden name and date …


An Overview Of Canadian Privacy Law For Pharmaceutical And Device Manufacturers Operating In Canada, Erika Lietzan, John K. Fuson Jan 2002

An Overview Of Canadian Privacy Law For Pharmaceutical And Device Manufacturers Operating In Canada, Erika Lietzan, John K. Fuson

Faculty Publications

On April 13, 2000, the Canadian Parliament enacted by Royal Assent the Personal Information Protection and Electronic Documents Act (PIPEDA). The Act requires private organizations to comply with a code of “fair information practice,” which mandates individual consent for the collection, use, and disclosure of personal information. PIPEDA complements the Federal Privacy Act, which places similar obligations on government institutions. On January 1, 2002, the Act began to apply to personal information (including personal health information) collected, used, or disclosed by a federal work, undertaking, or business, and personal information (including personal health information) disclosed by any organization for consideration …


Stop The Presses! First Amendment Limitations Of Professional Athletes' Publicity Rights , Erika T. Olander Jan 2002

Stop The Presses! First Amendment Limitations Of Professional Athletes' Publicity Rights , Erika T. Olander

Marquette Sports Law Review

No abstract provided.


The Push To Private Religious Expression: Are We Missing Something?, Kathleen A. Brady Jan 2002

The Push To Private Religious Expression: Are We Missing Something?, Kathleen A. Brady

Fordham Law Review

No abstract provided.