Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

Privacy Law

2010

Institution
Keyword
Publication

Articles 1 - 30 of 30

Full-Text Articles in Law

Mainstreaming Privacy Torts, Danielle K. Citron Dec 2010

Mainstreaming Privacy Torts, Danielle K. Citron

Faculty Scholarship

In 1890, Samuel Warren and Louis Brandeis proposed a privacy tort and seventy years later, William Prosser conceived it as four wrongs. In both eras, privacy invasions primarily caused psychic and reputational wounds of a particular sort. Courts insisted upon significant proof due to those injuries’ alleged ethereal nature. Digital networks alter this calculus by exacerbating the injuries inflicted. Because humiliating personal information posted online has no expiration date, neither does individual suffering. Leaking databases of personal information and postings that encourage assaults invade privacy in ways that exact significant financial and physical harm. This dispels concerns that plaintiffs might …


Location-Based Services: Time For A Privacy Check-In, Chris Conley, Nicole Ozer, Hari O'Connell, Ellen Ginsburg, Tamar Gubins Nov 2010

Location-Based Services: Time For A Privacy Check-In, Chris Conley, Nicole Ozer, Hari O'Connell, Ellen Ginsburg, Tamar Gubins

Faculty Scholarship

Need to get directions when you are lost? Want to know if your friends are in the neighborhood? Location-based services – applications and websites that provide services based on your current location – can put this information and more in the palm of your hand.

But outdated privacy laws and varying corporate practices could mean that sensitive information about who you are, where you go, what you do, and who you know end up being shared, sold, or turned over to the government.

Can location-based services protect your privacy? Do they? And what can we do to improve the situation? …


Privacy Torts: Unreliable Remedies For Lgbt Plaintiffs, Anita L. Allen Oct 2010

Privacy Torts: Unreliable Remedies For Lgbt Plaintiffs, Anita L. Allen

All Faculty Scholarship

In the United States, both constitutional law and tort law recognize the right to privacy, understood as legal entitlement to an intimate life of one’s own free from undue interference by others and the state. Lesbian, gay, bisexual, and transgender (“LGBT”) persons have defended their interests in dignity, equality, autonomy, and intimate relationships in the courts by appealing to that right. In the constitutional arena, LGBT Americans have claimed the protection of state and federal privacy rights with a modicum of well-known success. Holding that homosexuals have the same right to sexual privacy as heterosexuals, Lawrence v. Texas symbolizes the …


Known And Unknown, Property And Contract: Comments On Hoofnagle And Moringiello, James Grimmelmann Oct 2010

Known And Unknown, Property And Contract: Comments On Hoofnagle And Moringiello, James Grimmelmann

Cornell Law Faculty Publications

In addition to gerund-noun-noun titles and a concern with the misaligned incentives of businesses that handle consumers' financial data, Chris Hoofnagle's Internalizing Identity Theft and Juliet Moringiello's Warranting Data Security share something else: hidden themes. Hoofnagle's paper is officially about an empirical study of identity theft, but behind the scenes it's also an exploration of where we draw the line between public information shared freely and secret information used to authenticate individuals. Moringiello's paper is officially a proposal for a new warranty of secure handling of payment information, but under the surface, it invites us to think about the relationship …


Free Speech And The Myth Of The Internet As An Unintermediated Experience, Christopher S. Yoo Sep 2010

Free Speech And The Myth Of The Internet As An Unintermediated Experience, Christopher S. Yoo

All Faculty Scholarship

In recent years, a growing number of commentators have raised concerns that the decisions made by Internet intermediaries — including last-mile network providers, search engines, social networking sites, and smartphones — are inhibiting free speech and have called for restrictions on their ability to prioritize or exclude content. Such calls ignore the fact that when mass communications are involved, intermediation helps end users to protect themselves from unwanted content and allows them to sift through the avalanche of desired content that grows ever larger every day. Intermediation also helps solve a number of classic economic problems associated with the Internet. …


Dying For Privacy: Pitting Public Access Against Familial Interests In The Era Of The Internet, Clay Calvert Aug 2010

Dying For Privacy: Pitting Public Access Against Familial Interests In The Era Of The Internet, Clay Calvert

NULR Online

I just killed my two kids. . . . I drowned them. . . . They are 2 and 4. . . . I just shot myself. . . . with a gun. . . . Please hurry.”

That was the dying declaration of 21-year-old Julia Murray on February 16, 2010, preserved for all of posterity on a 911 emergency telephone recording and available to anyone and everyone in Florida—from journalists and police to even voyeurs and perverts—under that state’s open records laws. Murray and one of her three children are gone (the second child survived the drowning …


Personal Autonomy: Towards A New Taxonomy For Privacy Law, Yvonne F. Lindgren Jul 2010

Personal Autonomy: Towards A New Taxonomy For Privacy Law, Yvonne F. Lindgren

Faculty Works

In 1965 the Supreme Court in Griswold v. Connecticut protected the right of married couples to receive contraceptives as a right of privacy. Since that time, scholarship in the area of privacy law has coalesced around two main themes: First, commentators have classified privacy cases to present a unified concept broad enough to encompass many contexts — from tort, to Fourth and Fifth Amendment search and seizure, to decisional autonomy case law. Second, there is vigorous debate whether decisional autonomy is properly sourced in privacy law. These inquiries leave unanswered an important question: What, if anything, has been the lasting …


Legal And Ethical Implications Of Corporate Social Networks, Gundars Kaupins, Susan Park Jun 2010

Legal And Ethical Implications Of Corporate Social Networks, Gundars Kaupins, Susan Park

Management Faculty Publications and Presentations

Corporate social networking sites provide employees and employers with considerable opportunity to share information and become friends. Unfortunately, American laws do not directly address social networking site usage. The National Labor Relations Act, civil rights laws, and various common law doctrines such as employment at-will and defamation provide the pattern for future social networking laws. Ethical considerations such as productivity, security, goodwill, privacy, accuracy, and discipline fairness also affect future laws. Corporate policies on corporate social networking should balance the employer‘s and employee‘s interests. Existing laws and ethical issues associated with social networking should impact social networking policies related to …


Fulfilling Government 2.0'S Promise With Robust Privacy Protections, Danielle K. Citron Jun 2010

Fulfilling Government 2.0'S Promise With Robust Privacy Protections, Danielle K. Citron

Faculty Scholarship

The public can now “friend” the White House and scores of agencies on social networks, virtual worlds, and video-sharing sites. The Obama Administration sees this trend as crucial to enhancing governmental transparency, public participation, and collaboration. As the President has underscored, government needs to tap into the public’s expertise because it doesn’t have all of the answers.

To be sure, Government 2.0 might improve civic engagement. But it also might produce privacy vulnerabilities because agencies often gain access to individuals’ social network profiles, photographs, videos, and contact lists when interacting with individuals online. Little would prevent agencies from using and …


The Anatomy Of A Search: Intrusiveness And The Fourth Amendment, Renee Mcdonald Hutchins May 2010

The Anatomy Of A Search: Intrusiveness And The Fourth Amendment, Renee Mcdonald Hutchins

Journal Articles

For more than two months beginning in late December of 2005, police officers in New York State continuously monitored the location and movements of Scott Weaver's van using a surreptitiously attached global positioning system ("GPS") device, known as a "Qball."' The reason Weaver was targeted for police surveillance has never been disclosed. 2 In addition, law enforcement made no attempt to justify the heightened scrutiny of Weaver by seeking the pre-authorization of a warrant from a neutral magistrate.3 Rather, for sixty-five days, the police subjected Weaver to intense surveillance without oversight, interruption, or explanation. 4 More than a year after …


Visionary Pragmatism And The Value Of Privacy In The Twenty-First Century, Danielle K. Citron, Leslie Henry Apr 2010

Visionary Pragmatism And The Value Of Privacy In The Twenty-First Century, Danielle K. Citron, Leslie Henry

Faculty Scholarship

Despite extensive scholarly, legislative, and judicial attention to privacy, our understanding of privacy and the interests it protects remains inadequate. At the crux of this problem is privacy’s protean nature: it means “so many different things to so many different people” that attempts to articulate just what it is, or why it is important, generally have failed or become unwieldy. As a result, important privacy problems remain unaddressed, often to society’s detriment.

In his newest book, Understanding Privacy, Daniel J. Solove aims to reverse this state of affairs with a pluralistic conception of privacy that recognizes the societal value of …


Undermined Norms: The Corrosive Effect Of Information Processing Technology On Informational Privacy, Richard Warner Mar 2010

Undermined Norms: The Corrosive Effect Of Information Processing Technology On Informational Privacy, Richard Warner

All Faculty Scholarship

Informational privacy is a matter of control; it consists in the ability to control when one’s personal information is collected, how it is used, and to whom it is distributed. The degree of control we once enjoyed has vanished. Advances in information processing technology now give others considerable power to determine when personal information is collected, how it is used, and to it is whom distributed. Privacy advocates sound the alarm in regard to both the governmental and private sectors. I focus exclusively on the later. Relying on the extensive privacy advocate literature, I assume we should try to regain …


Liberating Copyright: Thinking Beyond Free Speech, Jennifer E. Rothman Mar 2010

Liberating Copyright: Thinking Beyond Free Speech, Jennifer E. Rothman

All Faculty Scholarship

Scholars have often turned to the First Amendment to limit the scope of ever-expanding copyright law. This approach has mostly failed to convince courts that independent review is merited and has offered little to individuals engaged in personal rather than political or cultural expression. In this Article, I consider the value of an alternative paradigm using the lens of substantive due process and liberty to evaluate users’ rights. A liberty-based approach uses this other developed body of constitutional law to demarcate justifiable personal, identity-based uses of copyrighted works. Uses that are essential for mental integrity, intimacy promotion, communication, or religious …


Stories Told And Untold: Confidentiality Laws And The Master Narrative Of Child Welfare, Matthew I. Fraidin Jan 2010

Stories Told And Untold: Confidentiality Laws And The Master Narrative Of Child Welfare, Matthew I. Fraidin

Journal Articles

In most states, child welfare hearings and records are sealed or confidential. This means that by law, court hearings and records may not be observed. The same laws and court rules also preclude those who are authorized to enter and watch from discussing anything learned or observed in a closed courtroom or from a sealed court record with anyone not involved in the case. It is the restriction on speech—on telling stories about child welfare—with which this Article is concerned. I will argue in this Article that the insights of narrative theory and agenda-setting studies help us understand the damaging …


Google Analytics: Analyzing The Latest Wave Of Legal Concerns For Google In The U.S. And The E.U., 7 Buff. Intell. Prop. L.J. 135 (2010), Raizel Liebler, Keidra Chaney Jan 2010

Google Analytics: Analyzing The Latest Wave Of Legal Concerns For Google In The U.S. And The E.U., 7 Buff. Intell. Prop. L.J. 135 (2010), Raizel Liebler, Keidra Chaney

UIC Law Open Access Faculty Scholarship

The next wave of concern regarding Google involves web analytics. Web analytics is the measurement, collection, analysis, and reporting of Internet data for the purposes of understanding and optimizing web usage. The concerns of web analytics use touches on issues of online user privacy, government use of personal information, and information on website user activity. While Google Analytics is not the sole web analytics product on the market, it is widely used by corporate, non-profit, and government organizations. The product has been reported to have a 59% market share among web analytics vendors in a 2008 study.

Web analytics technology …


Privacy As Product Safety, James Grimmelmann Jan 2010

Privacy As Product Safety, James Grimmelmann

Cornell Law Faculty Publications

Online social media confound many of our familiar expectations about privacy. Contrary to popular myth, users of social software like Facebook do care about privacy, deserve it, and have trouble securing it for themselves. Moreover, traditional database-focused privacy regulations on the Fair Information Practices model, while often worthwhile, fail to engage with the distinctively social aspects of these online services.

Instead, online privacy law should take inspiration from a perhaps surprising quarter: product-safety law. A web site that directs users' personal information in ways they don't expect is a defectively designed product, and many concepts from products liability law could …


Cctv And Human Rights, Benjamin J. Goold Jan 2010

Cctv And Human Rights, Benjamin J. Goold

All Faculty Publications

This chapter provides a brief overview of the human rights implications of closed circuit television (CCTV) surveillance, and aims to help CCTV managers and operators develop public area surveillance policies and practices that are consistent with a commitment to the protection of individual rights and a respect for civil liberties.


Keynote Address, Dean Spade Jan 2010

Keynote Address, Dean Spade

Faculty Articles

This article challenges the traditional methods taken by progressive lawyers and activists. It argues that superficial changes to a marginalizing system simply create “window dressing” that serves to reinforce the status quo. This article is a provocative call to radicalize legal practice, to be critical of all movements, and always question who is being excluded. It highlights that what may appear like making things better may actually be a contribution to the legitimization of the system that one intends to challenge.


A Fourth Amendment For The Poor Alone: Subconstitutional Status And The Myth Of The Inviolate Home, Jordan C. Budd Jan 2010

A Fourth Amendment For The Poor Alone: Subconstitutional Status And The Myth Of The Inviolate Home, Jordan C. Budd

Law Faculty Scholarship

For much of our nation’s history, the poor have faced pervasive discrimination in the exercise of fundamental rights. Nowhere has the impairment been more severe than in the area of privacy. This Article considers the enduring legacy of this tradition with respect to the Fourth Amendment right to domestic privacy. Far from a matter of receding historical interest, the diminution of the poor’s right to privacy has accelerated in recent years and now represents a powerful theme within the jurisprudence of poverty. Triggering this development has been a series of challenges to aggressive administrative practices adopted by localities in the …


How Much Surveillance Is Too Much? Some Thoughts On Surveillance, Democracy, And The Political Value Of Privacy, Benjamin J. Goold Jan 2010

How Much Surveillance Is Too Much? Some Thoughts On Surveillance, Democracy, And The Political Value Of Privacy, Benjamin J. Goold

All Faculty Publications

Over the past decade it has become increasingly common to speak of the emergence of a surveillance society. Surveillance is an almost inescapable part of 21st century life. There is a very real danger that individual privacy - as it is currently understood - may soon become a thing of the past. Some would argue privacy is already dead and we have no choice but to accept our newly transparent lives. For many, surveillance has become part of daily life during visit banks, stores, shopping malls, and many public streets and parks. Travel through airports subjects our bodies to physical …


The Death Of The Public Disclosure Tort: A Historical Perspective, Samantha Barbas Jan 2010

The Death Of The Public Disclosure Tort: A Historical Perspective, Samantha Barbas

Journal Articles

In 1890, Samuel Warren and Louis Brandeis, in their famous Harvard Law Review article The Right to Privacy, called for a new legal right that would allow the victims of truthful but embarrassing press publicity to recover damages for emotional harm. Currently, in most states, it constitutes a tort if the disclosure of “matter concerning the private life of another” would be highly offensive to a reasonable person and the matter is not “of legitimate concern to the public,” or newsworthy. However, because courts generally consider virtually everything that appears in the news media to be newsworthy, the public disclosure …


Beyond Fair Use, Gideon Parchomovsky, Philip J. Weiser Jan 2010

Beyond Fair Use, Gideon Parchomovsky, Philip J. Weiser

Publications

For centuries, the fair use doctrine has been the main--if not the exclusive--bastion of user rights. Originating in the English courts of equity, the doctrine permitted users, under appropriate circumstances, to employ copyrighted content without the rightsholder's consent. In the current digital media environment, however, the uncertainty that shrouds fair use and the proliferation of technological protection measures undermine the doctrine and its role in copyright policy. Notably, the enactment of the Digital Millennium Copyright Act, which prohibits the circumvention of technological protection measures even for fair use purposes, has diminished the ability of fair use to counterbalance a copyright …


Foreword: On Publishing Anonymously, Anthony C. Infanti Jan 2010

Foreword: On Publishing Anonymously, Anthony C. Infanti

Articles

In this foreword to the fall 2010 issue of the Pittsburgh Tax Review, I explain the troubling set of circumstances that led to our decision to publish one of the articles anonymously. All of the articles in this issue share a focus on suggestions for state and local tax reform in Pennsylvania. The circumstances surrounding the decision to publish this one article anonymously raise a host of questions regarding the extent to which tax professionals are free to make suggestions for tax reform without being subject to employer censorship.


Substitution Effects: A Problematic Justification For The Third-Party Doctrine Of The Fourth Amendment, Blake Ellis Reid Jan 2010

Substitution Effects: A Problematic Justification For The Third-Party Doctrine Of The Fourth Amendment, Blake Ellis Reid

Publications

In the past half-century, the Supreme Court has crafted a vein of jurisprudence virtually eliminating Fourth Amendment protection in information turned over to third parties - regardless of any subjective expectation of privacy or confidentiality in the information on the part of the revealer. This so-called “third-party” doctrine of the Fourth Amendment has become increasingly controversial in light of the growing societal reliance on the Internet in the United States, where nearly every transaction requires a user to turn information over to at least one third party: the Internet service provider (“ISP”).

Citing the scholarship that has criticized the third-party …


Legal And Ethical Issues Associated With Employee Use Of Social Networks, Gundars Kaupins, Susan Park Jan 2010

Legal And Ethical Issues Associated With Employee Use Of Social Networks, Gundars Kaupins, Susan Park

Management Faculty Publications and Presentations

Social networking sites such as Facebook and Twitter can help employees enhance a company’s marketing, recruiting, security, and safety. However, employee’s use of social networking sites and employers’ access of those sites can result in illegal and unethical behavior, such as discrimination and privacy invasions. Companies must gauge whether and how to rely upon employees’ use of personal social networking sites and how much freedom employees should have in using networks inside and outside of the companies. This research summarizes the latest legal and ethical issues regarding employee use of social networks and provides recommended corporate policies.


People Can Be So Fake: A New Dimension To Privacy And Technology Scholarship, M. Ryan Calo Jan 2010

People Can Be So Fake: A New Dimension To Privacy And Technology Scholarship, M. Ryan Calo

Articles

This article updates the traditional discussion of privacy and technology, focused since the days of Warren and Brandeis on the capacity of technology to manipulate information. It proposes a novel dimension to the impact of anthropomorphic or social design on privacy.

Technologies designed to imitate people-through voice, animation, and natural language-are increasingly commonplace, showing up in our cars, computers, phones, and homes. A rich literature in communications and psychology suggests that we are hardwired to react to such technology as though a person were actually present.

Social interfaces accordingly capture our attention, improve interactivity, and can free up our hands …


Mapping Online Privacy, Jacqueline D. Lipton Jan 2010

Mapping Online Privacy, Jacqueline D. Lipton

Articles

Privacy scholars have recently outlined difficulties in applying existing concepts of personal privacy to the maturing Internet. With Web 2.0 technologies, more people have more opportunities to post information about themselves and others online, often with scant regard for individual privacy. Shifting notions of 'reasonable expectations of privacy' in the context of blogs, wikis, and online social networks create challenges for privacy regulation. Courts and commentators struggle with Web 2.0 privacy incursions without the benefit of a clear regulatory framework. This article offers a map of privacy that might help delineate at least the outer boundaries of Web 2.0 privacy. …


Sex In And Out Of Intimacy, Laura Rosenbury, Jennifer Rothman Jan 2010

Sex In And Out Of Intimacy, Laura Rosenbury, Jennifer Rothman

All Faculty Scholarship

The state has long attempted to regulate sexual activity by channeling sex into various forms of state-supported intimacy. Although commentators and legal scholars of diverse political perspectives generally believe such regulation is declining, the freedom to engage in diverse sexual activities has not been established as a matter of law. Instead, courts have extended legal protection to consensual sexual acts only to the extent such acts support other state interests, most often marriage and procreation. Although Lawrence v. Texas altered some aspects of that vision, it reinscribed others by suggesting that sexual activity should be protected from state interference only …


Cloud Computing: Storm Warning For Privacy?, Nicole Ozer, Chris Conley Jan 2010

Cloud Computing: Storm Warning For Privacy?, Nicole Ozer, Chris Conley

Faculty Scholarship

“Cloud computing” - the ability to create, store, and manipulate data through Web-based services - is growing in popularity. Cloud computing itself may not transform society; for most consumers, it is simply an appealing alternative tool for creating and storing the same records and documents that people have created for years. However, outdated laws and varying corporate practices mean that documents created and stored in the cloud may not have the same protections as the same documents stored in a filing cabinet or on a home computer. Can cloud computing services protect the privacy of their consumers? Do they? And …


The So-Called Right To Privacy, Jamal Greene Jan 2010

The So-Called Right To Privacy, Jamal Greene

Faculty Scholarship

The constitutional right to privacy has been a conservative bugaboo ever since Justice Douglas introduced it into the United States Reports in Griswold v. Connecticut. Reference to the "so-called" right to privacy has become code for the view that the right is doctrinally recognized but not in fact constitutionally enshrined. This Article argues that the constitutional right to privacy is no more. The two rights most associated historically with the right to privacy are abortion and intimate sexual conduct, yet Gonzales v. Carhart and Lawrence v. Texas made clear that neither of these rights is presently justified by its …