Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Law

Social Isolation And American Workers: Employee "Blogging" And Legal Reform, Rafael Gely, Leonard Bierman Apr 2007

Social Isolation And American Workers: Employee "Blogging" And Legal Reform, Rafael Gely, Leonard Bierman

Faculty Publications

This article further demonstrates that state common law exceptions to the employment-at-will doctrine are not providing significant redress to employees fired or otherwise disciplined for blogging.


A Copyright Conundrum: Protecting Email Privacy, Ned Snow Apr 2007

A Copyright Conundrum: Protecting Email Privacy, Ned Snow

Faculty Publications

The practice of email forwarding deprives email senders of privacy. Expression meant for only a specific recipient often finds its way into myriad inboxes or onto a public website, exposed for all to see. Simply by clicking the "forward" button, email recipients routinely strip email senders of expressive privacy. The common law condemns such conduct. Beginning over two-hundred-fifty years ago, courts recognized that authors of personal correspondence hold property rights in their expression. Under common-law copyright, authors held a right to control whether their correspondence was published to third parties. This common-law protection of private expression was nearly absolute, immune …


In Sickness, Health And Cyberspace: Protecting The Security Of Electronic Private Health Information, Sharona Hoffman, Andy Podgurski Jan 2007

In Sickness, Health And Cyberspace: Protecting The Security Of Electronic Private Health Information, Sharona Hoffman, Andy Podgurski

Faculty Publications

The electronic processing of health information provides considerable benefits to patients and health care providers at the same time that it creates serious risks to the confidentiality, integrity, and availability of the data. The Internet provides a conduit for rapid and uncontrolled dispersion and trafficking of illicitly-obtained private health information, with far-reaching consequences to the unsuspecting victims. In order to address such threats to electronic private health information, the U.S. Department of Health and Human Services enacted the HIPAA Security Rule, which thus far has received little attention in the legal literature. This article presents a critique of the Security …