Open Access. Powered by Scholars. Published by Universities.®
- Institution
Articles 1 - 6 of 6
Full-Text Articles in Law
When Privacy Almost Won: Time, Inc. V. Hill (1967), Samantha Barbas
When Privacy Almost Won: Time, Inc. V. Hill (1967), Samantha Barbas
Journal Articles
Drawing on previously unexplored and unpublished archival papers of Richard Nixon, the plaintiffs’ lawyer in the case, and the justices of the Warren Court, this article tells the story of the seminal First Amendment case Time, Inc. v. Hill (1967). In Hill, the Supreme Court for the first time addressed the conflict between the right to privacy and freedom of the press. The Court constitutionalized tort liability for invasion of privacy, acknowledging that it raised First Amendment issues and must be governed by constitutional standards. Hill substantially diminished privacy rights; today it is difficult if not impossible to recover against …
The Pond Betwixt: Differences In The U.S.-Eu Data Protection/Safe Harbor Negotiation, Richard J. Peltz-Steele
The Pond Betwixt: Differences In The U.S.-Eu Data Protection/Safe Harbor Negotiation, Richard J. Peltz-Steele
Faculty Publications
This article analyzes the differing perspectives that animate US and EU conceptions of privacy in the context of data protection. It begins by briefly reviewing the two continental approaches to data protection and then explains how the two approaches arise in a context of disparate cultural traditions with respect to the role of law in society. In light of those disparities, Underpinning contemporary data protection regulation is the normative value that both US and EU societies place on personal privacy. Both cultures attribute modern privacy to the famous Warren-Brandeis article in 1890, outlining a "right to be let alone." But …
Outing Privacy, Scott Skinner-Thompson
Outing Privacy, Scott Skinner-Thompson
Publications
The government regularly outs information concerning people's sexuality, gender identity, and HIV status. Notwithstanding the implications of such outings, the Supreme Court has yet to resolve whether the Constitution contains a right to informational privacy - a right to limit the government's ability to collect and disseminate personal information.
This Article probes informational privacy theory and jurisprudence to better understand the judiciary's reluctance to fully embrace a constitutional right to informational privacy. The Article argues that while existing scholarly theories of informational privacy encourage us to broadly imagine the right and its possibilities, often focusing on informational privacy's ability to …
Regulating Real-World Surveillance, Margot E. Kaminski
Regulating Real-World Surveillance, Margot E. Kaminski
Publications
A number of laws govern information gathering, or surveillance, by private parties in the physical world. But we lack a compelling theory of privacy harm that accounts for the state's interest in enacting these laws. Without a theory of privacy harm, these laws will be enacted piecemeal. Legislators will have a difficult time justifying the laws to constituents; the laws will not be adequately tailored to legislative interest; and courts will find it challenging to weigh privacy harms against other strong values, such as freedom of expression.
This Article identifies the government interest in enacting laws governing surveillance by private …
Book Review. Balancing Privacy And Free Speech: Unwanted Attention In The Age Of Social Media By Mark Tunick, Kimberly Mattioli
Book Review. Balancing Privacy And Free Speech: Unwanted Attention In The Age Of Social Media By Mark Tunick, Kimberly Mattioli
Articles by Maurer Faculty
No abstract provided.
Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo
Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo
Articles
In 1986, Congress passed the Stored Communications Act (“SCA”) to provide additional protections for individuals’ private communications content held in electronic storage by third parties. Acting out of direct concern for the implications of the Third-Party Records Doctrine — a judicially created doctrine that generally eliminates Fourth Amendment protections for information entrusted to third parties — Congress sought to tailor the SCA to electronic communications sent via and stored by third parties. Yet, because Congress crafted the SCA with language specific to the technology of 1986, courts today have struggled to apply the SCA consistently with regard to similar private …