Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

University of Michigan Law School

Privacy

Discipline
Publication Year
Publication
Publication Type

Articles 61 - 90 of 92

Full-Text Articles in Law

Confidentiality Of Educational Records And Child Protective Proceedings, Frank E. Vandervort Jan 2007

Confidentiality Of Educational Records And Child Protective Proceedings, Frank E. Vandervort

Book Chapters

The Federal Family Education Rights and Privacy Act (FERPA), which provides funding for state educational programming, requires that student records be disclosed to a nonparent only with the written consent of the child’s parent, unless the disclosure falls within one of the several exceptions detailed in the statute. One of the exemptions provided for in the federal law permits a school to disclose information to “state or local officials or authorities to whom [that] information is allowed to be reported or disclosed pursuant to state statute,” if that official certifies in writing “that the information will not be disclosed to …


'Code' And The Slow Erosion Of Privacy, Bert-Jaap Koops, Ronald Leenes Sep 2005

'Code' And The Slow Erosion Of Privacy, Bert-Jaap Koops, Ronald Leenes

Michigan Telecommunications & Technology Law Review

The notion of software code replacing legal code as a mechanism to control human behavior--"code as law"--is often illustrated with examples in intellectual property and freedom of speech. This Article examines the neglected issue of the impact of "code as law" on privacy. To what extent is privacy-related "code" being used, either to undermine or to enhance privacy? On the basis of cases in the domains of law enforcement, national security, E-government, and commerce, it is concluded that technology rarely incorporates specific privacy-related norms. At the same time, however, technology very often does have clear effects on privacy, as it …


From The Cluetrain To The Panopticon: Isp Activity Characterization And Control Of Internet Communications, Eric Evans Apr 2004

From The Cluetrain To The Panopticon: Isp Activity Characterization And Control Of Internet Communications, Eric Evans

Michigan Telecommunications & Technology Law Review

If ISPs are exposed to liability for forwarding others' messages--messages originating with other ISPs or with the ISP's own users--the norm of universal mutual message forwarding that underlies the present operation of the Internet will be threatened. This Note will argue that society presently confronts a choice between a common carrier Internet characterized by universal mutual message forwarding and a monitored and controlled Internet. Part I will describe the underlying rules that govern ISPs' liability for their users' actions. Part II will argue that the present statutory regime governing ISPs' liability for users' copyright infringement includes elements that provide ISPs …


Restructuring The Marital Bedroom: The Role Of The Privacy Doctrine In Advocating The Legalization Of Same-Sex Marriage, Nadine A. Gartner Jan 2004

Restructuring The Marital Bedroom: The Role Of The Privacy Doctrine In Advocating The Legalization Of Same-Sex Marriage, Nadine A. Gartner

Michigan Journal of Gender & Law

Part I of this paper examines the reasons underlying queer rights advocates' reluctance to insert privacy arguments into the case for legalizing same-sex marriage. Part II illustrates that, due to such disinclination, advocates transformed notions of privacy into concepts of liberty. Part III argues that, after the Lawrence decision, proponents of same-sex marriage can and should use privacy-based arguments to fortify their claims.


The Need For Revisions To The Law Of Wiretapping And Interception Of Email, Robert A. Pikowsky Oct 2003

The Need For Revisions To The Law Of Wiretapping And Interception Of Email, Robert A. Pikowsky

Michigan Telecommunications & Technology Law Review

I argue that a person's privacy interest in his email is the same as his privacy interest in a telephone conversation. Moreover, the privacy interest in email remains unchanged regardless of whether it is intercepted in transmission or covertly accessed from the recipient's mailbox. If one accepts this assumption, it follows that the level of protection against surveillance by law enforcement officers should be the same[...] As technology continues to blur the distinction between wire and electronic communication, it becomes apparent that a new methodology must be developed in order to provide logical and consistent protection to private communications. The …


Constitutional Issues In Information Privacy, Fred H. Cate, Robert Litan Oct 2002

Constitutional Issues In Information Privacy, Fred H. Cate, Robert Litan

Michigan Telecommunications & Technology Law Review

The U.S. Constitution has been largely ignored in the recent flurry of privacy laws and regulations designed to protect personal information from incursion by the private sector despite the fact that many of these enactments and efforts to enforce them significantly implicate the First Amendment. Questions about the role of the Constitution have assumed new importance in the aftermath of the September 11, 2001 terrorist attacks on the World Trade Center and the Pentagon. Recent efforts to identify and apprehend terrorists and to protect against future attacks threaten to weaken constitutional protections against government intrusions into personal privacy. However, these …


The Fourth Amendment In The Hallway: Do Tenants Have A Constitutionally Protected Privacy Interest In The Locked Common Areas Of Their Apartment Buildings?, Sean M. Lewis Oct 2002

The Fourth Amendment In The Hallway: Do Tenants Have A Constitutionally Protected Privacy Interest In The Locked Common Areas Of Their Apartment Buildings?, Sean M. Lewis

Michigan Law Review

One afternoon, a police officer spots a man driving a Cadillac through a run·down neighborhood. His interest piqued, the officer decides to follow the vehicle. The Cadillac soon comes to rest in front of an apartment building, and the driver, Jimmy Barrios-Moriera, removes a shopping bag from the trunk and enters the building. The moment Barrios-Moriera disappears within the doorway, the officer sprints after him because he knows that the door to the apartment building will automatically lock when it closes. He manages to catch the door just in time and rushes in. Barrios-Moriera is already halfway up a flight …


Corporate Cybersmear: Employers File John Doe Defamation Lawsuits Seeking The Identity Of Anonymous Employee Internet Posters, Margo E. K. Reder, Christine Neylon O'Brien Jun 2002

Corporate Cybersmear: Employers File John Doe Defamation Lawsuits Seeking The Identity Of Anonymous Employee Internet Posters, Margo E. K. Reder, Christine Neylon O'Brien

Michigan Telecommunications & Technology Law Review

Communications systems are now wide open and fully accessible, with no limits in range, scope or geography. Targeted audiences are accessible with pinpoint accuracy. Messages reach millions of readers with one click. There is a chat room for everyone. Most importantly, there is no limit on content. Therefore, employees can register their dissatisfaction by posting a message in a chat room. Moreover, the identity of the posting employee is not easily discoverable due to anonymous and pseudonymous communications capabilities. The nature of these online messages is qualitatively different from real-world communications. By way of example, newspapers have a responsibility regarding …


Marking Carnivore's Territory: Rethinking Pen Registers On The Internet, Anthony E. Orr Jun 2002

Marking Carnivore's Territory: Rethinking Pen Registers On The Internet, Anthony E. Orr

Michigan Telecommunications & Technology Law Review

"Carnivore" entered the online world's collective consciousness in June 2000 when the Federal Bureau of Investigation unveiled the Internet surveillance software program to telecommunications industry specialists. The FBI claims the program allows agents to scan the traffic of an Internet Service Provider (ISP) for messages or commands to or from a criminal suspect and then intercept only those messages, capturing copies of e-mails, web site downloads and other file transfers[...] A central issue in the controversy surrounding Carnivore is whether current law permits the FBI to employ the program in the Internet context. Bureau officials claim statutory authority for deployments …


Computer Searches And Seizures: Some Unresolved Issues, Susan W. Brenner, Barbara A. Frederiksen Jun 2002

Computer Searches And Seizures: Some Unresolved Issues, Susan W. Brenner, Barbara A. Frederiksen

Michigan Telecommunications & Technology Law Review

The goal of this article is to illustrate the issues that arise in the context of computer search and seizures by examining several areas in which the application of Fourth Amendment concepts to computer searches and/or seizures can be problematic. In order to illustrate this point, the article will build on a hypothetical. The hypothetical situation assumes law enforcement officers have lawfully obtained a warrant to search for and seize evidence concerning the commission of one or more crimes. It will also be assumed that computer technology played some role in the commission of these crimes, so computer equipment and …


We Can Do This The Easy Way Or The Hard Way: The Use Of Deceit To Induce Consent Searches, Rebecca Strauss Feb 2002

We Can Do This The Easy Way Or The Hard Way: The Use Of Deceit To Induce Consent Searches, Rebecca Strauss

Michigan Law Review

In October of 1995, Aaron Salvo was studying and living at Ashland College. College officials informed local FBI agents that they suspected Salvo of possible child molestation and related conduct based on incriminating electronic mail. FBI agents approached Salvo at his dormitory, asked to speak with him in private about the suspicious mail, and suggested they speak in Salvo's dorm room. Salvo agreed to speak with the officers, but declined to do so in his room because his roommate was there, and he did not want to get anyone else involved in the embarrassing nature of the upcoming conversation. Salvo …


The Emergence Of Website Privacy Norms, Steven A. Hetcher Jun 2001

The Emergence Of Website Privacy Norms, Steven A. Hetcher

Michigan Telecommunications & Technology Law Review

Part I of the Article will first look at the original privacy norms that emerged at the Web's inception in the early 1990s. Two groups have been the main contributors to the emergence of these norms; the thousands of commercial websites on the early Web, on the one hand, and the millions of users of the early Web, on the other hand. The main structural feature of these norms was that websites benefitted through the largely unrestricted collection of personal data while consumers suffered injury due to the degradation of their personal privacy from this data collection. In other words, …


Criminalization Of True Anonymity In Cyberspace, The, George F. Du Pont Jun 2001

Criminalization Of True Anonymity In Cyberspace, The, George F. Du Pont

Michigan Telecommunications & Technology Law Review

The question of whether a state or the federal government can create a narrowly tailored restriction on cyberspace anonymity without violating the First Amendment remains unresolved[...]The Supreme Court has not directly addressed the issue, but it may soon consider the constitutionality of criminalizing certain kinds of cyber-anonymity in light of the unique nature of cyberspace. This comment explores the various forms of anonymity, examines the First Amendment status of anonymity in and outside of cyberspace, analyzes relevant scholarly commentary, and concludes that a narrowly tailored legislative restriction on "true" anonymity in cyberspace would not violate the First Amendment.


Establishing A Legitimate Expectation Of Privacy In Clickstream Data, Gavin Skok Jun 2000

Establishing A Legitimate Expectation Of Privacy In Clickstream Data, Gavin Skok

Michigan Telecommunications & Technology Law Review

This Article argues that Web users should enjoy a legitimate expectation of privacy in clickstream data. Fourth Amendment jurisprudence as developed over the last half-century does not support an expectation of privacy. However, reference to the history of the Fourth Amendment and the intent of its drafters reveals that government investigation and monitoring of clickstream data is precisely the type of activity the Framers sought to limit. Courts must update outdated methods of expectation of privacy analysis to address the unique challenges posed by the Internet in order to fulfill the Amendment's purpose. Part I provides an overview of the …


The Secrecy Interest In Contract Law, Omri Ben-Shahar, Lisa Bernstein Jan 2000

The Secrecy Interest In Contract Law, Omri Ben-Shahar, Lisa Bernstein

Articles

A long and distinguished line of law-and-economics articles has established that in many circumstances fully compensatory expectation damages are a desirable remedy for breach of contract because they induce both efficient performance and efficient breach. The expectation measure, which seeks to put the breached-against party in the position she would have been in had the contract been performed, has, therefore, rightly been chosen as the dominant contract default rule. It does a far better job of regulating breach-or-perform incentives than its leading competitors-the restitution measure, the reliance measure, and specific performance. This Essay does not directly take issue with the …


Recovering The Original Fourth Amendment, Thomas Y. Davies Dec 1999

Recovering The Original Fourth Amendment, Thomas Y. Davies

Michigan Law Review

Claims regarding the original or intended meaning of constitutional texts are commonplace in constitutional argument and analysis. All such claims are subject to an implicit validity criterion - only historically authentic assertions should matter. The rub is that the original meaning commonly attributed to a constitutional text may not be authentic. The historical Fourth Amendment is a case in point. If American judges, lawyers, or law teachers were asked what the Framers intended when they adopted the Fourth Amendment, they would likely answer that the Framers intended that all searches and seizures conducted by government officers must be reasonable given …


Building A Community Through Workplace E-Mail: The New Privacy Frontier, Peter Schnaitman Jun 1999

Building A Community Through Workplace E-Mail: The New Privacy Frontier, Peter Schnaitman

Michigan Telecommunications & Technology Law Review

The relatively new technology of electronic mail (e-mail) presents an entirely new issue of workplace privacy. Currently, whether a person has a privacy interest in their workplace e-mail communications is as unsettled an issue as it has been since the technology emerged in the early part of this decade as the preferred mode of communication in the workplace. Indeed, e-mail may soon be the preferred mode of communication in general. This comment will argue that all e-mail users have a privacy interest in workplace e-mail communications and that the current law does not afford e-mail users any type of protection …


Review Of The Repeal Of Reticence: A History Of America's Cultural And Legal Struggles Over Free Speech, Obscenity, Sexual Liberation, And Modern Art, Donald J. Herzog Jan 1999

Review Of The Repeal Of Reticence: A History Of America's Cultural And Legal Struggles Over Free Speech, Obscenity, Sexual Liberation, And Modern Art, Donald J. Herzog

Reviews

Our public sphere, which should have displayed and preserved the grandeur and beauty of our civic ideals and moral excellences, is instead inane and vacuous when it is not utterly mean, ugly, or indecent (p. 4). Troubled by the tawdry nonsense circulating in the public sphere-and she wrote before learned enquiries into whether the President's genitals had any distinguishing characteristics- Rochelle Gurstein turns to history to understand how we arrived at such a sorry destination. Hers is a tale of decline: The Victorians "we moderns" so routinelyd eridef or theirP uritanicalr epressivenessu nderstoodf ull well that certain things have to …


Honesty, Privacy, And Shame: When Gay People Talk About Other Gay People To Nongay People, David L. Chambers, Steven K. Homer Jan 1997

Honesty, Privacy, And Shame: When Gay People Talk About Other Gay People To Nongay People, David L. Chambers, Steven K. Homer

Michigan Journal of Gender & Law

There is a longstanding convention among lesbians and gay men in the United States: Do not reveal the sexuality of a gay person to a heterosexual person; unless you are certain that the gay person does not regard his sexuality as a secret. Lie if necessary to protect her secret. Violating the convention by "outing" another person is widely considered a serious social sin.


The 'Right To Die': On Drawing (And Erasing) Lines, Yale Kamisar Jan 1996

The 'Right To Die': On Drawing (And Erasing) Lines, Yale Kamisar

Articles

Until this year, no state or federal appellate court had ever held that there was a right to assisted suicide no matter how narrow the circumstances or stringent the conditions. In 1996, however, within the span of a single month, two federal courts of appeals so held; in an 8-3 majority of the Ninth Circuit (sitting en banc) in Compassion in Dying v. Washington and a three-judge panel of the Second Circuit in Quill v. Vacco. What heartened proponents of a right to physician-assisted suicide even more, and pleased those resistant to the idea even less, was that the two …


Whose Genes Are These Anyway?: Familial Conflicts Over Access To Genetic Information, Sonia M. Suter Jun 1993

Whose Genes Are These Anyway?: Familial Conflicts Over Access To Genetic Information, Sonia M. Suter

Michigan Law Review

This Note argues first that courts and legislatures should follow a presumption against mandating disclosure of a person's genetic information to third parties. Second, genetic testing for the benefit of a third party should not, and constitutionally cannot, be compelled. Part I presents an overview of genetics and discusses the special legal and ethical issues genetic testing poses. Part II examines the issue of nonconsensual disclosure to family members, who could potentially use the information from tests that have already been performed. This Part concludes that there should be a presumption against disclosure. Part III examines a related, but different, …


Progressive And Conservative Constitutionalism, Robin West Feb 1990

Progressive And Conservative Constitutionalism, Robin West

Michigan Law Review

The article's central thesis is that the understandings of the constitutional tradition most central to both paradigms are determined by sometimes implicit, but more often explicit, political dispositions toward various forms of social and private power, and the normative authority to which social and private power gives rise. Very broadly, conservative constitutionalists view private or social normative authority as the legitimate and best source of guidance for state action; accordingly, they view both the Constitution and constitutional adjudication as means of preserving and protecting that authority and the power that undergirds it against either legislative or judicial encroachment. Progressive constitutionalists, …


Surrogate Motherhood From The Perspective Of Family Law, Carl E. Schneider Jan 1990

Surrogate Motherhood From The Perspective Of Family Law, Carl E. Schneider

Articles

One of the things that I find most puzzling about the question of surrogate motherhood is how easily many people answer it. One of the things that I have most admired about today's comments is their tone of constraint and their sense of complexity. I myself am sympathetic to the argument that the unhappiness of infertile couples is profound and that surrogacy contracts offer them the hope of an equally profound happiness. And I am prepared to believe that many surrogate mothers perform their part of the bargain without grief and even with gratification. Yet these benefits of surrogacy are …


Privacy In A Public Society: Human Rights In Conflict, David Clark Esseks May 1989

Privacy In A Public Society: Human Rights In Conflict, David Clark Esseks

Michigan Law Review

A Review of Privacy in a Public Society: Human Rights in Conflict by Richard F. Hixson


State-Interest Analysis In Fourteenth-Amendment "Privacy" Law: An Essay On The Constitutionalization Of Social Issues, Carl E. Schneider Jan 1988

State-Interest Analysis In Fourteenth-Amendment "Privacy" Law: An Essay On The Constitutionalization Of Social Issues, Carl E. Schneider

Articles

Asked to resolve a social issue, Americans today turn readily to rights and to the Constitution that is understood to embody them. Many "vice" issues have long been thought particularly apt for a rights analysis. A constitutional resolution of vice issues is therefore inevitably a possibility, and its wisdom is inevitably a question. In this essay, I want to address that question by investigating an area of the law that has been recently constitutionalized family law. Family law is an example worth studying because rights thinking has won a considerable prominence in it: The Constitution has been used to transform …


Privacy In Confucian And Taoist Thought, Christina B. Whitman Jan 1985

Privacy In Confucian And Taoist Thought, Christina B. Whitman

Book Chapters

Only three aspects of the broad concept "privacy" will be explored in this essay: privacy as providing a sphere for intimate personal relationships with family and friends, privacy as freedom from surveillance for purposes of gathering personal information, and privacy as freedom from interference by government or social controls. These concepts describe quite different concerns. They are often grouped together under the single term "privacy," but not without some strain... A comparison between a modern Western value and its counterpart, if any, in very early Confucian and Taoist belief is inevitably somewhat strained. But it serves a purpose. If nothing …


The Constitution And Contempt Of Court, Ronald Goldfarb Dec 1962

The Constitution And Contempt Of Court, Ronald Goldfarb

Michigan Law Review

Few legal devices find conflict within the lines of our Constitution with the ubiquity of the contempt power. These conflicts involve issues concerning the governmental power structure such as the separation of powers and the delicate balancing of federal-state relations. In addition, there are civil rights issues attributable to the conflict between the use of the contempt power and such vital procedural protections as the right to trial by jury, freedom from self-incrimination, double jeopardy, and indictment-to name only the most recurrent and controversial examples. Aside from these problems, there are other civil liberties issues, such as those involving freedom …


Banking-Disclosure Of Records-The Duty Of A Bank As To Customer Information, Robert B. Wessling S.Ed. Apr 1962

Banking-Disclosure Of Records-The Duty Of A Bank As To Customer Information, Robert B. Wessling S.Ed.

Michigan Law Review

The purpose of this comment, therefore, is to describe the scope of the banker's duty as to customer information as best it can be discerned in light of the increasing exchange of credit information and increasing resort to such information by government agencies-particularly the Internal Revenue Service. In the process, it is hoped that attention will be drawn to the uncertainty which exists in this area, perhaps prompting action by the states or the banks themselves to clarify the scope of the duty and to encourage uniform treatment of customer information in a manner consistent with this duty.


Torts - Privacy - Collection Method, Frederic Brace S.Ed. Feb 1958

Torts - Privacy - Collection Method, Frederic Brace S.Ed.

Michigan Law Review

Plaintiff disputed the debt which the defendant corporation asserted against her. Defendant made no attempt to recover this asserted debt by legal action but instead sent a letter to the personnel director of plaintiff's employer. This letter stated that plaintiff had refused to cooperate in reaching an amicable settlement and requested the assistance of the personnel director in collecting this "honest debt." Plaintiff was then summoned to the office of her superior and informed that the letter would be placed in her file and remain there until the asserted indebtedness had been settled. Plaintiff sought damages for an invasion of …


Legislation - Federal Criminal Procedure - Modification Of Jencks Decision, Raymond J. Dittrich, Jr. S.Ed. Jan 1957

Legislation - Federal Criminal Procedure - Modification Of Jencks Decision, Raymond J. Dittrich, Jr. S.Ed.

Michigan Law Review

Defendant was convicted of a violation of 18 U.S.C. §1001. During the trial, the court denied defendant's motion to order the government to produce for defendant's inspection reports submitted by government witnesses to government agents. The reports dealt with the same subject about which these witnesses later testified. The court of appeals affirmed the decision. On certiorari to the United States Supreme Court, held, reversed, one justice dissenting. The government has a privilege to refuse to surrender statements made by its prospective witnesses, but it may claim the privilege only at the expense of a dismissal of its case …