Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Privacy Law (14)
- Fourth Amendment (7)
- Internet Law (5)
- Constitutional Law (4)
- Communications Law (3)
-
- Computer Law (3)
- Criminal Law (3)
- Civil Rights and Discrimination (2)
- Comparative and Foreign Law (2)
- Entertainment, Arts, and Sports Law (2)
- First Amendment (2)
- Immigration Law (2)
- Intellectual Property Law (2)
- International Trade Law (2)
- National Security Law (2)
- Supreme Court of the United States (2)
- Civil Law (1)
- Consumer Protection Law (1)
- Contracts (1)
- Courts (1)
- Criminal Procedure (1)
- Disability Law (1)
- Education Law (1)
- Evidence (1)
- Food and Drug Law (1)
- Genetics and Genomics (1)
- Judges (1)
- Law Enforcement and Corrections (1)
- Law and Economics (1)
- Institution
-
- University of Michigan Law School (6)
- Duke Law (3)
- Fordham Law School (3)
- George Washington University Law School (3)
- Vanderbilt University Law School (3)
-
- Boston University School of Law (2)
- Maurer School of Law: Indiana University (2)
- University of Georgia School of Law (2)
- Marquette University Law School (1)
- New York Law School (1)
- Nova Southeastern University (1)
- Selected Works (1)
- SelectedWorks (1)
- University of Florida Levin College of Law (1)
- University of Kentucky (1)
- University of Maryland Francis King Carey School of Law (1)
- University of Massachusetts School of Law (1)
- University of Missouri School of Law (1)
- University of Pittsburgh School of Law (1)
- University of Richmond (1)
- University of San Diego (1)
- William & Mary Law School (1)
- Publication
-
- Michigan Telecommunications & Technology Law Review (4)
- Faculty Publications (3)
- Faculty Scholarship (3)
- GW Law Faculty Publications & Other Works (3)
- Federal Communications Law Journal (2)
-
- Law and Contemporary Problems (2)
- Michigan Law Review (2)
- Ann Bartow (1)
- Articles (1)
- Articles & Chapters (1)
- Congressional Testimony (1)
- Continuing Legal Education Materials (1)
- Duke Law Journal (1)
- Fordham Intellectual Property, Media and Entertainment Law Journal (1)
- Fordham Law Review (1)
- ILSA Journal of International & Comparative Law (1)
- Jean HERVEG (1)
- LLM Theses and Essays (1)
- Marquette Sports Law Review (1)
- Popular Media (1)
- San Diego Law Review (1)
- UF Law Faculty Publications (1)
- University of Richmond Law Review (1)
- Vanderbilt Journal of Entertainment & Technology Law (1)
- Vanderbilt Journal of Transnational Law (1)
- Vanderbilt Law Review (1)
- Publication Type
Articles 1 - 30 of 38
Full-Text Articles in Law
The Battle Of The Music Industry: The Distribution Of Audio And Video Works Via The Internet, Music And More, David Balaban
The Battle Of The Music Industry: The Distribution Of Audio And Video Works Via The Internet, Music And More, David Balaban
Fordham Intellectual Property, Media and Entertainment Law Journal
No abstract provided.
Education Law, D. Patrick Lacy Jr., Kathleen S. Mehfoud
Education Law, D. Patrick Lacy Jr., Kathleen S. Mehfoud
University of Richmond Law Review
No abstract provided.
4th Annual Computer & Technology Law Institute, Office Of Continuing Legal Education At The University Of Kentucky College Of Law
4th Annual Computer & Technology Law Institute, Office Of Continuing Legal Education At The University Of Kentucky College Of Law
Continuing Legal Education Materials
Materials from the 4th Annual Computer & Technology Law Institute held by UK/CLE in November 2002.
Constitutional Issues In Information Privacy, Fred H. Cate, Robert Litan
Constitutional Issues In Information Privacy, Fred H. Cate, Robert Litan
Michigan Telecommunications & Technology Law Review
The U.S. Constitution has been largely ignored in the recent flurry of privacy laws and regulations designed to protect personal information from incursion by the private sector despite the fact that many of these enactments and efforts to enforce them significantly implicate the First Amendment. Questions about the role of the Constitution have assumed new importance in the aftermath of the September 11, 2001 terrorist attacks on the World Trade Center and the Pentagon. Recent efforts to identify and apprehend terrorists and to protect against future attacks threaten to weaken constitutional protections against government intrusions into personal privacy. However, these …
The Patriot Act’S Impact On The Government’S Ability To Conduct Electronic Surveillance Of Ongoing Domestic Communications, Nathan C. Henderson
The Patriot Act’S Impact On The Government’S Ability To Conduct Electronic Surveillance Of Ongoing Domestic Communications, Nathan C. Henderson
Duke Law Journal
No abstract provided.
An Equality Paradign For Preventing Genetic Discrimination, Anita Silvers, Michael A. Stein
An Equality Paradign For Preventing Genetic Discrimination, Anita Silvers, Michael A. Stein
Vanderbilt Law Review
On June 26, 2000, scientists announced at a White House news conference that they had completed mapping the human genome sequence, the human race's genetic blueprint. This pronouncement generated tremendous and well-deserved excitement. Genomics, the study and application of genetic information, promises to be an unparalleled tool for improving public health. Genetic testing can identify asymptomatic individuals who are at risk of becoming ill themselves or bestowing illness on their children. As a result, individuals who test positive can take prophylactic measures to slow or stop disease and can also reduce the births of progeny at high risk of compromised …
The Fourth Amendment In The Hallway: Do Tenants Have A Constitutionally Protected Privacy Interest In The Locked Common Areas Of Their Apartment Buildings?, Sean M. Lewis
Michigan Law Review
One afternoon, a police officer spots a man driving a Cadillac through a run·down neighborhood. His interest piqued, the officer decides to follow the vehicle. The Cadillac soon comes to rest in front of an apartment building, and the driver, Jimmy Barrios-Moriera, removes a shopping bag from the trunk and enters the building. The moment Barrios-Moriera disappears within the doorway, the officer sprints after him because he knows that the door to the apartment building will automatically lock when it closes. He manages to catch the door just in time and rushes in. Barrios-Moriera is already halfway up a flight …
Sneak And Peak Search Warrants, Donald E. Wilkes Jr.
Sneak And Peak Search Warrants, Donald E. Wilkes Jr.
Popular Media
In his recent article "Taking Liberty with Freedom," author Richard P. Moore reminds us that the USA Patriot Act, signed by President Bush last Oct. 26 in the wake of the Sept. 11 terrorist attacks, "gives the government the kind of sweeping powers of arrest, detention, surveillance, investigation, deportation, and search and seizure that ... assault ... our most basic freedoms."
I want to examine here a single section of the USA Patriot Act--section 213, definitely one of the most sinister provisions of this monstrous statute.
Privacy And The Post-September 11 Immigration Detainees: The Wrong Way To A Right (And Other Wrongs), Sadiq Reza
Privacy And The Post-September 11 Immigration Detainees: The Wrong Way To A Right (And Other Wrongs), Sadiq Reza
Faculty Scholarship
In forthcoming work, I argue that this common-law privacy right should indeed attach to individuals arrested for or suspected of crime.9 I also argue that support for the right exists in a variety of judicial, statutory, and other sources, and that legislation to formally protect the right is warranted and constitutional. The reasoning is simple: being publicly named in connection with criminal allegations is stigmatizing, and the resultant personal harm-social, professional, emotional, other-lasts, and is difficult to justify when it is visited upon someone who is acquitted of the charges or against whom the charges are dismissed. Equally troubling is …
Corporate Cybersmear: Employers File John Doe Defamation Lawsuits Seeking The Identity Of Anonymous Employee Internet Posters, Margo E. K. Reder, Christine Neylon O'Brien
Corporate Cybersmear: Employers File John Doe Defamation Lawsuits Seeking The Identity Of Anonymous Employee Internet Posters, Margo E. K. Reder, Christine Neylon O'Brien
Michigan Telecommunications & Technology Law Review
Communications systems are now wide open and fully accessible, with no limits in range, scope or geography. Targeted audiences are accessible with pinpoint accuracy. Messages reach millions of readers with one click. There is a chat room for everyone. Most importantly, there is no limit on content. Therefore, employees can register their dissatisfaction by posting a message in a chat room. Moreover, the identity of the posting employee is not easily discoverable due to anonymous and pseudonymous communications capabilities. The nature of these online messages is qualitatively different from real-world communications. By way of example, newspapers have a responsibility regarding …
Marking Carnivore's Territory: Rethinking Pen Registers On The Internet, Anthony E. Orr
Marking Carnivore's Territory: Rethinking Pen Registers On The Internet, Anthony E. Orr
Michigan Telecommunications & Technology Law Review
"Carnivore" entered the online world's collective consciousness in June 2000 when the Federal Bureau of Investigation unveiled the Internet surveillance software program to telecommunications industry specialists. The FBI claims the program allows agents to scan the traffic of an Internet Service Provider (ISP) for messages or commands to or from a criminal suspect and then intercept only those messages, capturing copies of e-mails, web site downloads and other file transfers[...] A central issue in the controversy surrounding Carnivore is whether current law permits the FBI to employ the program in the Internet context. Bureau officials claim statutory authority for deployments …
Computer Searches And Seizures: Some Unresolved Issues, Susan W. Brenner, Barbara A. Frederiksen
Computer Searches And Seizures: Some Unresolved Issues, Susan W. Brenner, Barbara A. Frederiksen
Michigan Telecommunications & Technology Law Review
The goal of this article is to illustrate the issues that arise in the context of computer search and seizures by examining several areas in which the application of Fourth Amendment concepts to computer searches and/or seizures can be problematic. In order to illustrate this point, the article will build on a hypothetical. The hypothetical situation assumes law enforcement officers have lawfully obtained a warrant to search for and seize evidence concerning the commission of one or more crimes. It will also be assumed that computer technology played some role in the commission of these crimes, so computer equipment and …
Carnivore, The Fbi’S E-Mail Surveillance System: Devouring Criminals, Not Privacy, Griffin S. Dunham
Carnivore, The Fbi’S E-Mail Surveillance System: Devouring Criminals, Not Privacy, Griffin S. Dunham
Federal Communications Law Journal
On July 11, 2000, the FBI intorduced Carnivore, an Internet monitoring system. It was designed, and is used exclusively, to carry out court-ordered surveillance of electronic communications. It is a tangible, portable device, tantamount to a phone tap, that allows the FBI to intercept and collect criminal suspects' e-mail without their knowledge or consent. This Note addresses competing and parallel interests between the government and society to determine the legitimacy and necessity of Carnivore. The purpose of this Note is twofold: first, to demonstrate the need for Carnivore to enable law enforcement to keep up with criminals who utilize cyberspace …
The Fourth Amendment In The Twenty-First Century: Technology, Privacy, And Human Emotions, Andrew E. Taslitz
The Fourth Amendment In The Twenty-First Century: Technology, Privacy, And Human Emotions, Andrew E. Taslitz
Law and Contemporary Problems
Police and local political officials in Tampa FL argued that the FaceIt system promotes safety, but privacy advocates objected to the city's recording or utilizing facial images without the victims' consent, some staging protests against the FaceIt system. Privacy objects seem to be far more widely shared than this small protest might suggest.
Rights In Conflict: The First Amendment’S Third Century, Robert M. O'Neil
Rights In Conflict: The First Amendment’S Third Century, Robert M. O'Neil
Law and Contemporary Problems
O'Neil has witnesses the resolution, or at least the clarification, of many free speech and press issues. There are, however, persistent issues that deserve particularly close scrutiny. Three such issues are tensions between free expression and privacy, civility, and equality.
Indecent Exposures In An Electronic Regime, Natalie L. Regoli
Indecent Exposures In An Electronic Regime, Natalie L. Regoli
Federal Communications Law Journal
As the topic of data privacy is vast and the subject of much scrutiny, this Comment focuses narrowly on commercial cyber-activities relating to the nonconsensual Internet acquisition of personally identifiable user data. Beginning with a brief examination of the technology that has exacerbated privacy law's inadequacies, it briefly discusses failed attempts to safeguard privacy rights through the market and federal agency management. It then addresses current U.S. privacy legislation and the 1995 European Privacy Directive. Finally, this Comment proposes the creation of a new legislative system to effectively combat the surreptitious collection, storage, use, and sale of personal data.
We Can Do This The Easy Way Or The Hard Way: The Use Of Deceit To Induce Consent Searches, Rebecca Strauss
We Can Do This The Easy Way Or The Hard Way: The Use Of Deceit To Induce Consent Searches, Rebecca Strauss
Michigan Law Review
In October of 1995, Aaron Salvo was studying and living at Ashland College. College officials informed local FBI agents that they suspected Salvo of possible child molestation and related conduct based on incriminating electronic mail. FBI agents approached Salvo at his dormitory, asked to speak with him in private about the suspicious mail, and suggested they speak in Salvo's dorm room. Salvo agreed to speak with the officers, but declined to do so in his room because his roommate was there, and he did not want to get anyone else involved in the embarrassing nature of the upcoming conversation. Salvo …
Privacy And Personal Data Protection In The Information Age: A Comparative Evaluation, Emeka B. Obasi
Privacy And Personal Data Protection In The Information Age: A Comparative Evaluation, Emeka B. Obasi
LLM Theses and Essays
The United States and European economies are both information economies, however, they have different approaches in protecting personal information. This study examines in as much detail as possible, the relevant privacy laws in the two economic regions. The Europeans have a comprehensive legislation regulating personal information that vests considerable control on the data subject. Europeans characterize personal data as a fundamental human right. Americans, on the other hand, protect personal information by legislating for specific industries as the need arises and do not recognize privacy of personal information as a fundamental right. This study concludes the European approach is preferable, …
Reasonable Expectations And The Erosion Of Privacy, Shaun Spencer
Reasonable Expectations And The Erosion Of Privacy, Shaun Spencer
Faculty Publications
This Article examines how the prevailing legal conception of privacy facilitates the erosion of privacy. The law generally measures privacy by reference to society’s reasonable expectation of privacy. If we think of the universe of legally private matters as a sphere, the sphere will contract (or least in theory) expand in accordance with changing social expectations. This expectations-driven conception of privacy in effect establishes a privacy marketplace, analogous in both a literal and metaphorical sense to a marketplace of ideas. In this marketplace, societal expectations of privacy fluctuate in response to changing social practices. For this reason, privacy is susceptible …
A Safety Net In The E-Marketplace: The Safe Harbor Principles Offer Comprehensive Privacy Protection Without Stopping Data Flow, William J. Kambas
A Safety Net In The E-Marketplace: The Safe Harbor Principles Offer Comprehensive Privacy Protection Without Stopping Data Flow, William J. Kambas
ILSA Journal of International & Comparative Law
In May of 2000, the FTC, under Chairman Robert Pitofsky, concluded that industry self-regulation was not effective in protecting consumer privacy and in a report to Congress the FTC expressed the view "that legislation [was] necessary to ensure further implementation of consumer data protection devices."
Colloquium On Privacy & Security, Ann Bartow
Colloquium On Privacy & Security, Ann Bartow
Ann Bartow
On November 2-3, 2001, the University of Buffalo sponsored Digital Frontier: The Buffalo Summit 2001. The attendees included Gary M. Schober (Moderator), Shubha Ghosh (Organizer), Ann Bartow, Chris Hoofnagle, and Phyllis Borzi. The participants were drawn from a wide range of specialties, from lawyers and doctors to business-men and academics, in order to provide some perspective on our data-driven world. This session on Privacy and Security identified some of the trends in technology that threaten privacy rights, as well as those that may assists preserving privacy. The speakers also explored legal developments and political structure influencing cyber-privacy.
Japan's Communications Interception Act: Unconstitutional Invasion Of Privacy Or Necessary Tool?, Lillian R. Gilmer
Japan's Communications Interception Act: Unconstitutional Invasion Of Privacy Or Necessary Tool?, Lillian R. Gilmer
Vanderbilt Journal of Transnational Law
In August 1999, Japan became the last of the G8 nations to pass legislation to allow law enforcement to wiretap communications. For some, passage of the law was long overdue; for others, its passage marked the beginning of an impermissible government encroachment on civil rights. This Note examines Japan's Communications Interception Act, the forces in Japanese society creating the need for the law, and the reasons why the law is being challenged. Part II examines the policy behind the law, its history, and public reaction to the law. Part III presents the history of organized crime in Japan, and a …
Securing Our Infrastructure: Private/Public Information Sharing, Rena I. Steinzor
Securing Our Infrastructure: Private/Public Information Sharing, Rena I. Steinzor
Congressional Testimony
No abstract provided.
Privacy, Eh! The Impact Of Canada's Personal Information Protection And Electronic Documents Act On Transnational Business, Juliana M. Spaeth, Mark J. Plotkin, Sandra C. Sheets
Privacy, Eh! The Impact Of Canada's Personal Information Protection And Electronic Documents Act On Transnational Business, Juliana M. Spaeth, Mark J. Plotkin, Sandra C. Sheets
Vanderbilt Journal of Entertainment & Technology Law
In 2002, the requirements imposed by PIPEDA will extend to encompass all personal health information. PIPEDA will ultimately extend to the collection, use, or disclosure of all personal information in the course of any commercial activity within a province in 2004. This change in Canadian law carries significant consequences for the general business practices of American companies that conduct, or may conduct, business with Canadians. It is therefore crucial for lawyers with clients collecting personal data on- and offline to familiarize themselves with its requirements in order to counsel clients effectively about their current and future obligations under this privacy …
Reasonable Expectations And The Erosion Of Privacy, Shaun B. Spencer
Reasonable Expectations And The Erosion Of Privacy, Shaun B. Spencer
San Diego Law Review
This Article examines how the prevailing legal conception of privacy facilitates the erosion of privacy. The law generally measures privacy by reference to society’s reasonable expectation of privacy. If we think of the universe of legally private matters as a sphere, the sphere will contract or (at least in theory) expand in accordance with changing social expectations. This expectation-driven conception of privacy in effect establishes a privacy marketplace, analogous in both a literal and metaphorical sense to a marketplace of ideas. In this marketplace, societal expectations of privacy fluctuate in response to changing social practices. For this reason, privacy is …
Privacy Wrongs In Search Of Remedies, Joel R. Reidenberg
Privacy Wrongs In Search Of Remedies, Joel R. Reidenberg
Faculty Scholarship
The American legal system has generally rejected legal rights for data privacy and relies instead on market self-regulation and the litigation process to establish norms of appropriate behavior in society. Information privacy is protected only through an amalgam of narrowly targeted rules. The aggregation of these specific rights leaves many significant gaps and fewer clear remedies for violations of fair information practices. With an absence of well-established legal rights, privacy wrongs are currently in search of remedies. This Article first describes privacy rights and wrongs that frame the search for remedies in the United States. It explores public enforcement of, …
Human Identification Theory And The Identity Theft Problem, Lynn M. Lopucki
Human Identification Theory And The Identity Theft Problem, Lynn M. Lopucki
UF Law Faculty Publications
This paper builds on the theory of human identification proposed by Professor Roger Clarke and uses the product as the basis for a proposed solution to the identity theft problem. The expanded theory holds that all human identification fits a single model. The identifior matches the characteristics of a person observed in a first observation with the characteristics of a person observed in a second observation to determine whether they are the same person. From the theory it follows that a characteristic used for identification in the credit reporting system, such as social security number, mother's maiden name and date …
An Overview Of Canadian Privacy Law For Pharmaceutical And Device Manufacturers Operating In Canada, Erika Lietzan, John K. Fuson
An Overview Of Canadian Privacy Law For Pharmaceutical And Device Manufacturers Operating In Canada, Erika Lietzan, John K. Fuson
Faculty Publications
On April 13, 2000, the Canadian Parliament enacted by Royal Assent the Personal Information Protection and Electronic Documents Act (PIPEDA). The Act requires private organizations to comply with a code of “fair information practice,” which mandates individual consent for the collection, use, and disclosure of personal information. PIPEDA complements the Federal Privacy Act, which places similar obligations on government institutions. On January 1, 2002, the Act began to apply to personal information (including personal health information) collected, used, or disclosed by a federal work, undertaking, or business, and personal information (including personal health information) disclosed by any organization for consideration …
Stop The Presses! First Amendment Limitations Of Professional Athletes' Publicity Rights , Erika T. Olander
Stop The Presses! First Amendment Limitations Of Professional Athletes' Publicity Rights , Erika T. Olander
Marquette Sports Law Review
No abstract provided.
The Push To Private Religious Expression: Are We Missing Something?, Kathleen A. Brady
The Push To Private Religious Expression: Are We Missing Something?, Kathleen A. Brady
Fordham Law Review
No abstract provided.