Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

2005

Privacy

Discipline
Institution
Publication
Publication Type

Articles 1 - 30 of 36

Full-Text Articles in Law

Getting Real About Privacy: Eccentric Expectations In The Post-9/11 World, Jeffrey A. Breinholt Sep 2005

Getting Real About Privacy: Eccentric Expectations In The Post-9/11 World, Jeffrey A. Breinholt

ExpressO

What if science developed technology that would eliminate violent crime on American streets entirely, without jeopardizing civil liberties or personal privacy? This article describes such a scenario, and uses it to take a critical look at some of legal commentary claiming that Americans are bound to lose their rights and privacy if they fail to object to modern tools of domestic security. It concludes that those who have criticize modern scientific applications to the security challenge are overlooking well-established legal doctrines, based on eccentric fears of technology and the nation's law enforcers.


Private Life After Death ? The Case Of Patient's Personal Data, Jean Herveg Sep 2005

Private Life After Death ? The Case Of Patient's Personal Data, Jean Herveg

Jean HERVEG

No abstract provided.


'Code' And The Slow Erosion Of Privacy, Bert-Jaap Koops, Ronald Leenes Sep 2005

'Code' And The Slow Erosion Of Privacy, Bert-Jaap Koops, Ronald Leenes

Michigan Telecommunications & Technology Law Review

The notion of software code replacing legal code as a mechanism to control human behavior--"code as law"--is often illustrated with examples in intellectual property and freedom of speech. This Article examines the neglected issue of the impact of "code as law" on privacy. To what extent is privacy-related "code" being used, either to undermine or to enhance privacy? On the basis of cases in the domains of law enforcement, national security, E-government, and commerce, it is concluded that technology rarely incorporates specific privacy-related norms. At the same time, however, technology very often does have clear effects on privacy, as it …


Home As A Legal Concept, Benjamin Barros Aug 2005

Home As A Legal Concept, Benjamin Barros

ExpressO

This article, which is the first comprehensive discussion of the American legal concept of home, makes two major contributions. First, the article systematically examines how homes are treated more favorably than other types of property in a wide range of legal contexts, including criminal law and procedure, torts, privacy, landlord-tenant, debtor-creditor, family law, and income taxation. Second, the article considers the normative issue of whether this favorable treatment is justified. The article draws from material on the psychological concept of home and the cultural history of home throughout this analysis, providing insight into the interests at stake in various legal …


7th Annual Open Government Summit: Access To Public Records Act & Open Meetings Act, 2005, Department Of Attorney General, State Of Rhode Island Aug 2005

7th Annual Open Government Summit: Access To Public Records Act & Open Meetings Act, 2005, Department Of Attorney General, State Of Rhode Island

School of Law Conferences, Lectures & Events

No abstract provided.


Privacies: Philosophical Evaluations, Linda C. Mcclain Jun 2005

Privacies: Philosophical Evaluations, Linda C. Mcclain

Faculty Scholarship

This fine collection of essays on privacy crosses disciplinary and national boundaries, bringing together 13 scholars from law, philosophy, political theory, and film studies to consider “various aspects of the problematic of the private.” As the editor, Beate Rössler, explains this “problematic,” current debates about the value and limits of privacy—such as the reach of information technology or the private lives of public figures—pose afresh more fundamental philosophical questions about privacy: What is the normative grounding for a right to privacy? How does such a right relate to identity and integrity? What is the demarcation in persons’ lives between the …


‘Code’ And The Slow Erosion Of Privacy, Ronald Leenes, Bert-Jaap Koops May 2005

‘Code’ And The Slow Erosion Of Privacy, Ronald Leenes, Bert-Jaap Koops

ExpressO

The notion of software code replacing legal code as a mechanism to control human behavior – ‘code as law’ – is often illustrated with examples in intellectual property and freedom of speech. This article examines the neglected issue of the impact of ‘code as law’ on privacy. To what extent is privacy-related ‘code’ being used, either to undermine or to enhance privacy? On the basis of cases in the domains of law enforcement, national security, E-government, and commerce, it is concluded that technology rarely incorporates specific privacy-related norms. At the same time, however, technology very often does have clear effects …


Reconciling Consent Searches And Fourth Amendment Jurisprudence: Incorporating Privacy Into The Test For Valid Consent Searches, David J. Housholder May 2005

Reconciling Consent Searches And Fourth Amendment Jurisprudence: Incorporating Privacy Into The Test For Valid Consent Searches, David J. Housholder

Vanderbilt Law Review

The Fourth Amendment states: The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

Perhaps the most significant exception to the requirements of the Fourth Amendment is the consent search, which requires no warrant, exigent circumstances, probable cause, or reasonable suspicion.

Some scholars have suggested that the Supreme Court's voluntariness standard for determining consensual searches misperceives …


Reviving A Natural Right: The Freedom Of Autonomy Amendment, Michael Anthony Lawrence Apr 2005

Reviving A Natural Right: The Freedom Of Autonomy Amendment, Michael Anthony Lawrence

ExpressO

America in the early twenty-first century is a place where oppressive state constitutional amendments discriminate against millions of gay Americans; where compassionate end-of-life choice is illegal in 49 states and where the one state where it is legal is being sued by the U.S. government; where hundreds of thousands are arrested yearly and tens of thousands are in prison for private possession or use of marijuana; where a woman’s right to maintain control over her own reproductive decisions hangs by a thread; and where religious freedom is under relentless attack.

Whatever became of the ideal that represented the very foundation …


Reviving A Natural Right: The Freedom Of Autonomy Amendment, Michael Anthony Lawrence Apr 2005

Reviving A Natural Right: The Freedom Of Autonomy Amendment, Michael Anthony Lawrence

ExpressO

Reviving a Natural Right: The Freedom of Autonomy Amendment

Michael Anthony Lawrence

Something is wrong in twenty-first century America when it comes to recognizing certain “self-evident truths” of freedom identified in its founding document nearly 23 decades ago. In particular, the United States today fails to uphold the core principle of the Declaration of Independence that “all men are created equal: that they are endowed by their Creator with certain inalienable rights: that among these are life, liberty and the pursuit of happiness.” This description was more than just an accidental well-turned phrase – as demonstrated by the historical record, …


Constitutional Law—The Fourth Amendment Challenge To Dna Sampling Of Arrestees Pursuant To The Justice For All Act Of 2004: A Proposed Modification To The Traditional Fourth Amendment Test Of Reasonableness, Kimberly A. Polanco Apr 2005

Constitutional Law—The Fourth Amendment Challenge To Dna Sampling Of Arrestees Pursuant To The Justice For All Act Of 2004: A Proposed Modification To The Traditional Fourth Amendment Test Of Reasonableness, Kimberly A. Polanco

University of Arkansas at Little Rock Law Review

No abstract provided.


Material Vulnerabilities: Data Privacy, Corporate Information Security And Securities Regulation, Andrea M. Matwyshyn Mar 2005

Material Vulnerabilities: Data Privacy, Corporate Information Security And Securities Regulation, Andrea M. Matwyshyn

ExpressO

This article undertakes a normative and empirical legal inquiry into the manner information security vulnerabilities are being addressed through law and in the marketplace. Specifically, this article questions the current legislative paradigm for information security regulation by presenting a critique grounded in information security and cryptography theory. Consequently, this article advocates shifting our regulatory approach to a process-based security paradigm that focuses on improving security of our system as a whole. Finally, this article argues that in order to accomplish this shift with least disruption to current legal and economic processes, expanding an existing set of well-functioning legal structures is …


Identity Crisis: United States V. Hiibel And The Continued Erosion Of Privacy Rights, Beth Rosenblum Mar 2005

Identity Crisis: United States V. Hiibel And The Continued Erosion Of Privacy Rights, Beth Rosenblum

Nevada Law Journal

No abstract provided.


Data Mining And Attention Consumption, Eric Goldman Jan 2005

Data Mining And Attention Consumption, Eric Goldman

Faculty Publications

This Essay challenges the prevailing hostility towards data mining and direct marketing. The Essay starts by defining data mining and shows that the only important step is how data is used, not its aggregation or sorting. The Essay then discusses one particular type of data use, the sending of direct marketing. The Essay establishes a model for calculating the private utility experienced by a direct marketing recipient. The model posits that utility is a function of the message's substantive content, the degree of attention consumed, and the recipient's reaction to receiving the message. The Essay concludes with some policy recommendations …


Transaction Surveillance By The Government, Christopher Slobogin Jan 2005

Transaction Surveillance By The Government, Christopher Slobogin

Vanderbilt Law School Faculty Publications

This symposium article is the second of two on regulation of government efforts to obtain recorded information for criminal prosecutions. More specifically, it explores the scope and regulation of "transaction surveillance," which it defines as government attempts to access already existing records, either physically or through data banks, and government efforts to obtain, in real-time or otherwise, "catalogic data" (the identifying signals of a transaction, such as the address of an email recipient). Transaction surveillance is a potent way of discovering and making inferences about a person's activities, character and identity. Yet, despite a bewildering array of statutorily created authorization …


Privacy And The Criminal Arrestee Or Suspect: In Search Of A Right, In Need Of A Rule, Sadiq Reza Jan 2005

Privacy And The Criminal Arrestee Or Suspect: In Search Of A Right, In Need Of A Rule, Sadiq Reza

Maryland Law Review

No abstract provided.


Family Privacy And Death: Antigone, War, And Medical Research, George J. Annas Jan 2005

Family Privacy And Death: Antigone, War, And Medical Research, George J. Annas

Faculty Scholarship

Death ends the doctor–patient relationship, and legally the patient's right of privacy dies with the patient. Other privacy interests survive, the most central of which are those of the patient's family to bury the body and to prevent the disclosure of some personal information, such as medical information, about the deceased relative. Just what privacy interests encompass and when they can be overridden by other interests — such as freedom of speech or the claims of public policy or medical research — are evolving.1 Family privacy concerning a family member who has died is at the forefront of a …


'Bend It Like Beckham' And 'Real Women Have Curves': Constructing Identity In Multicultural Coming-Of-Age Stories, Linda C. Mcclain Jan 2005

'Bend It Like Beckham' And 'Real Women Have Curves': Constructing Identity In Multicultural Coming-Of-Age Stories, Linda C. Mcclain

Faculty Scholarship

This Article looks at the coming-of-age stories in two recent films, Bend It Like Beckham and Real Women Have Curves, as an avenue to explore the question of constructing identity. Both films, arising out of the filmmakers' experiences, aim to offer representations of particular individuals in minority groups that challenge dominant representations. They also offer aspirational visions of how such individuals might find a way to construct a hybrid identity that allows them to negotiate their place within the various groups that claim them and within the broader society. How, the article asks, do the heroines in these films find …


Preserving Internet Expression While Protecting Our Children: Solutions Following Ashcroft V. Aclu, Steven E. Merlis Jan 2005

Preserving Internet Expression While Protecting Our Children: Solutions Following Ashcroft V. Aclu, Steven E. Merlis

Northwestern Journal of Technology and Intellectual Property

No abstract provided.


The Simplification Of International Data Privacy Rules, Joel R. Reidenberg Jan 2005

The Simplification Of International Data Privacy Rules, Joel R. Reidenberg

Faculty Scholarship

The variation and complexity of national data privacy rules pose significant challenges for international data flows. Data protection laws range from ad hoc narrow legal rights, like those found in the United States, to comprehensive fair information practice statutes like those found in Europe. Because data processing frequently occurs across national borders, multiple data protection laws might apply simultaneously to international data flows. At the same time, data protection regimes may prohibit the circumvention of national standards by processing personal information at a foreign site. Global information processing thus presents a data controller with important burdens and obstacles related to …


A Model Regime Of Privacy Protection (Version 2.0), Daniel J. Solove, Chris Jay Hoofnagle Jan 2005

A Model Regime Of Privacy Protection (Version 2.0), Daniel J. Solove, Chris Jay Hoofnagle

GW Law Faculty Publications & Other Works

This version incorporates and responds to the many comments that we received to Version 1.1, which we released on March 10, 2005.

Privacy protection in the United States has often been criticized, but critics have too infrequently suggested specific proposals for reform. Recently, there has been significant legislative interest at both the federal and state levels in addressing the privacy of personal information. This was sparked when ChoicePoint, one of the largest data brokers in the United States with records on almost every adult American citizen, sold data on about 145,000 people to fraudulent businesses set up by identity thieves. …


The Dangers Of Fighting Terrorism With Technocommunitarianism: Constitutional Protections Of Free Expression, Exploration, And Unmonitored Activity In Urban Spaces, Marc Jonathan Blitz Jan 2005

The Dangers Of Fighting Terrorism With Technocommunitarianism: Constitutional Protections Of Free Expression, Exploration, And Unmonitored Activity In Urban Spaces, Marc Jonathan Blitz

Fordham Urban Law Journal

Part I of this article examines how some commentators can plausibly argue that constitutional liberty and privacy protections do not protect the individual liberty and privacy that modern individuals have come to expect in many public spaces, particularly in urban environments. Constitutional liberalism, this section points out, makes this question a difficult one, because it is marked by scrupulous neutrality towards different visions of “the good life.” In other words, the constitutional order does not condemn those who choose a communitarian way of life and favor those who prefer individualism. Rather, it tolerates both of these (and other) preferences about …


Interest Analysis In Interjurisdictional Marriage Disputes, Tobias Barrington Wolff Jan 2005

Interest Analysis In Interjurisdictional Marriage Disputes, Tobias Barrington Wolff

University of Pennsylvania Law Review

Gay and lesbian couples are now entering into legally authorized marriages for the first time in our Nation's history. As has happened many times before when significant policy differences have emerged among the civil marriage laws of different states, these married couples will inevitably move about the country, and state courts will have to decide whether and for what purpose to give effect to their marriages when forum law would have prohibited them from marrying locally. The debate over this recognition problem is already fully joined. Thus far, however, that debate has most frequently been characterized by positions that are …


Confidentiality And Privacy Implications Of Functional Magnetic Resonance Imaging, Stacey A. Tovino Jan 2005

Confidentiality And Privacy Implications Of Functional Magnetic Resonance Imaging, Stacey A. Tovino

Scholarly Works

Advances in science and technology frequently raise new ethical, legal, and social issues, and developments in neuroscience and neuroimaging technology are no exception. Within the field of neuroethics, leading scientists, ethicists, and humanists are exploring the implications of efforts to image, study, treat, and enhance the human brain.

This article focuses on one aspect of neuroethics: the confidentiality and privacy implications of advances in functional magnetic resonance imaging (“fMRI”). Following a brief orientation to fMRI and an overview of some of its current and proposed uses, this article highlights key confidentiality and privacy issues raised by fMRI in the contexts …


Hospital Chaplaincy Under The Hipaa Privacy Rule: Health Care Or "Just Visiting The Sick?", Stacey A. Tovino Jan 2005

Hospital Chaplaincy Under The Hipaa Privacy Rule: Health Care Or "Just Visiting The Sick?", Stacey A. Tovino

Scholarly Works

Approximately seventy-nine percent of Americans believe that praying can help people recover from illness, injury or disease, and nearly seventy-seven percent of American patients would like spiritual issues discussed as part of their care. Despite Americans' strong beliefs in the health-related benefits of religious and spiritual practices and traditions, the preamble to the federal Department of Health and Human Services' ("HHS") health information privacy rule (the "Privacy Rule") explains that health care "does not include methods of healing that are solely spiritual" (the "preamble"). The preamble concludes that, "clergy or other religious practitioners that provide solely religious healing services are …


Sexuality And Sovereignty: The Global Limits And Possibilities Of Lawrence Symposium: Legal Rights In Historical Perspective: From The Margins To The Mainstream, Sonia K. Katyal Jan 2005

Sexuality And Sovereignty: The Global Limits And Possibilities Of Lawrence Symposium: Legal Rights In Historical Perspective: From The Margins To The Mainstream, Sonia K. Katyal

Faculty Scholarship

In the summer of 2003, the Supreme Court handed gay and lesbian activists a stunning victory in the decision of Lawrence v. Texas, which summarily overruled Bowers v. Hardwick. At issue was whether Texas' prohibition of same-sex sexual conduct violated the Due Process Clause of the U.S. Constitution. In a powerful, poetic, and strident opinion, Justice Kennedy, writing for a six-member majority, reversed Bowers, observing that individual decisions regarding physical intimacy between consenting adults, either of the same or opposite sex, are constitutionally protected, and thus fall outside of the reach of state intervention. Volumes can be written about the …


A Model Regime Of Privacy Protection (Version 1.1), Daniel J. Solove, Chris Jay Hoofnagle Jan 2005

A Model Regime Of Privacy Protection (Version 1.1), Daniel J. Solove, Chris Jay Hoofnagle

GW Law Faculty Publications & Other Works

Privacy protection in the United States has often been criticized, but critics have too infrequently suggested specific proposals for reform. Recently, there has been significant legislative interest at both the federal and state levels in addressing the privacy of personal information. This was sparked when ChoicePoint, one of the largest data brokers in the United States with records on almost every adult American citizen, sold data on about 145,000 people to fraudulent businesses set up by identity thieves.

In the aftermath of the ChoicePoint debacle, both of us have been asked by Congressional legislative staffers, state legislative policymakers, journalists, academics, …


Privacy And The Criminal Arrestee Or Suspect: In Search Of A Right, In Need Of A Rule, Sadiq Reza Jan 2005

Privacy And The Criminal Arrestee Or Suspect: In Search Of A Right, In Need Of A Rule, Sadiq Reza

Articles & Chapters

Criminal accusation stigmatizes. Merely having been accused of a crime lasts in the public eye, damaging one's reputation and threatening current and future employment, relationships, social status, and more. But vast numbers of criminal cases are dismissed soon after arrest, and countless accusations are unfounded orunprovable. Nevertheless, police officers and prosecutors routinely name criminal accusees to the public upon arrest or suspicion, with no obligation to publicize a defendant's exoneration, or the dismissal of his case, or a decision not to file charges against him at all. Other individuals caught up in the criminal process enjoy protections against the public …


Controlling Identity: Plessy, Privacy, And Racial Defamation, Jonathan Kahn Jan 2005

Controlling Identity: Plessy, Privacy, And Racial Defamation, Jonathan Kahn

Faculty Scholarship

This Article explores the origins of privacy law in early twentieth century America in relation to the legal solidification of Jim Crow in the aftermath of Plessy v. Ferguson. It considers some distinctively southern aspects of the origins of the right to privacy and argues that by viewing privacy, racial defamation, and Jim Crow in relation to each other, we can gain new insights into each-coming to understand that Plessy was not just about controlling space, or property, or even equality but also about controlling identity itself, and coming to see that in its origins, the right to privacy had …


Spyware And The Limits Of Surveillance Law, Patricia L. Bellia Jan 2005

Spyware And The Limits Of Surveillance Law, Patricia L. Bellia

Journal Articles

For policymakers, litigants, and commentators seeking to address the threats digital technology poses for privacy, electronic surveillance law remains a weapon of choice. The debate over how best to respond to the spyware problem provides only the most recent illustration of that fact. Although there is much controversy over how to define spyware, that label encompasses at least some software that monitors a computer user's electronic communications. Federal surveillance statutes thus present an intuitive fit for responding to the regulatory challenges of spyware, because those statutes bar the unauthorized acquisition of electronic communications and related data in some circumstances. Indeed, …