Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Boston University School of Law (5)
- Maurer School of Law: Indiana University (4)
- Brooklyn Law School (3)
- University of Pennsylvania Carey Law School (3)
- University of Baltimore Law (2)
-
- American University Washington College of Law (1)
- Chicago-Kent College of Law (1)
- Cornell University Law School (1)
- Schulich School of Law, Dalhousie University (1)
- Singapore Management University (1)
- Southern Methodist University (1)
- The Peter A. Allard School of Law (1)
- University at Buffalo School of Law (1)
- University of Colorado Law School (1)
- University of Maryland Francis King Carey School of Law (1)
- University of Michigan Law School (1)
- University of Montana (1)
- University of New Hampshire (1)
- University of Pittsburgh School of Law (1)
- University of Washington School of Law (1)
- Keyword
-
- Privacy (9)
- Cybersecurity (4)
- Data privacy (4)
- Data protection (4)
- International privacy law (4)
-
- First Amendment (2)
- Race (2)
- Search and seizure (2)
- 14th Amendment (1)
- Ad hoc balancing of interests (1)
- Administrative searches (1)
- Alabama (1)
- Anthropology (1)
- Arbitrary nature (1)
- Automobiles (1)
- Bandwidth (1)
- Bartnicki v. Vopper (1)
- Best practices (1)
- Bioethics (1)
- Broadcasting (1)
- Camara v. Municipal Court (1)
- Celebrity (1)
- Censorship (1)
- Civil liberties (1)
- Cloud bursting (1)
- Commercial speech (1)
- Confidentiality (1)
- Criminal justice (1)
- Criminal procedure (1)
- Cyber Stalking (1)
- Publication
-
- Faculty Scholarship (7)
- All Faculty Scholarship (6)
- Articles by Maurer Faculty (4)
- Articles (3)
- Shorter Faculty Works (2)
-
- All Faculty Publications (1)
- Amicus Briefs (1)
- Articles, Book Chapters, & Popular Press (1)
- Cornell Law Faculty Publications (1)
- Faculty Journal Articles and Book Chapters (1)
- Faculty Law Review Articles (1)
- Journal Articles (1)
- Law Faculty Scholarship (1)
- Publications (1)
- Research Collection Yong Pung How School Of Law (1)
Articles 1 - 30 of 32
Full-Text Articles in Law
Trademark Dilution And Corporate Personhood, Stacey Dogan
Trademark Dilution And Corporate Personhood, Stacey Dogan
Shorter Faculty Works
It’s become almost passé to decry our federal trademark dilution laws. The laws – first passed in 1995 and amended in 2006 – protect “famous trademarks” against uses that are likely to dilute their distinctiveness, without regard to any confusion among consumers or competition between the parties. Early critics warned that passage of the anti-dilution statute marked a turning point in trademark law: by giving famous trademark holders rights against even non-confusing uses of their marks, the law created “property”-like rights in trademarks. The initial commentary on the statute focused mainly on the costs associated with this increasingly absolutist approach …
Data Protection Laws And Marketing Practices, Warren B. Chik
Data Protection Laws And Marketing Practices, Warren B. Chik
Research Collection Yong Pung How School Of Law
Thepotential privacy implications of the incorporation of data protection laws inSingapore for unsolicited communications including telemarketing, junk mail andfaxes and SPAM are examined in this article.
A Moral Rights Theory Of Private Law, Andrew S. Gold
A Moral Rights Theory Of Private Law, Andrew S. Gold
Faculty Scholarship
No abstract provided.
Fiduciary Law In The Twenty-First Century, Tamar Frankel
Fiduciary Law In The Twenty-First Century, Tamar Frankel
Faculty Scholarship
How does one embrace the riches of the knowledge presented in this Conference? This Conference’s participants have presented the fiduciary relationship from so many points of view: interdisciplinary perspectives, current issues, and particular fascinating narrower topics. Does this event suggest that critics are correct, and that fiduciary law as a category is incoherent?1 Arguably, fiduciary relationships and the rules that govern them are too varied. Yet I maintain that the variety presented in this Conference leads to the opposite conclusion, and that the papers in this Conference provide support for my claim: that fiduciary law should be viewed and understood …
First-Class Objects, James Grimmelmann
First-Class Objects, James Grimmelmann
Cornell Law Faculty Publications
What is the difference between "James Grimmelmann" and "@grimmelm" and why should we care? Some computer systems, like Facebook and credit reporting agencies, are inherently "about" people. Others are not. This essay argues that the key technical difference is whether they use unique identifiers to refer to people in their databases. From this single distinction, a host of social and humanistic consequences follow. The essay taxonomizes them and teases out some of their implications for privacy law.
Big Brother Is Watching: The Reality Show You Didn't Audition For, J. Amy Dillard
Big Brother Is Watching: The Reality Show You Didn't Audition For, J. Amy Dillard
All Faculty Scholarship
In 1984, at the height of the Reagan-era war on drugs, the Supreme Court created a bright-line exception to Fourth Amendment protection by declaring that no person had a reasonable expectation of privacy in an area defined as an open field. When it created the exception, the Court ignored positive law and its own jurisprudence that the Fourth Amendment protects people, not places. The open fields doctrine allows law enforcement officers to enter posted, private areas that are not part of a house or its curtilage for brief surveillance. The Supreme Court has never “extended the open fields doctrine to …
Teens, Technology, And Cyberstalking: The Domestic Violence Wave Of The Future?, Andrew King-Ries
Teens, Technology, And Cyberstalking: The Domestic Violence Wave Of The Future?, Andrew King-Ries
Faculty Law Review Articles
The American criminal justice system, (therefore), is facing a future domestic violence crisis. Unfortunately, authorities-both parents and law enforcement-tend to minimize the seriousness of violence within adolescent relationships and to minimize the seriousness of stalking. In addition, given the prevalence and embrace of technology by teenagers, criminalizing "normal" teenage behavior seems counter-productive. While an effective criminal justice system response to this problem has yet to be developed, the first step will be for parents and law enforcement to recognize the risk and take it seriously. The second step will be to "renorm" unhealthy teenage relationship norms. It is possible that …
Collateral Consequences, Genetic Surveillance, And The New Biopolitics Of Race, Dorothy E. Roberts
Collateral Consequences, Genetic Surveillance, And The New Biopolitics Of Race, Dorothy E. Roberts
All Faculty Scholarship
This Article is part of a Howard Law Journal Symposium on “Collateral Consequences: Who Really Pays the Price for Criminal Justice?,” as well as my larger book project, Fatal Invention: How Science, Politics, and Big Business Re-create Race in the Twenty-First Century (The New Press, 2011). It considers state and federal government expansion of genetic surveillance as a collateral consequence of a criminal record in the context of a new biopolitics of race in America. Part I reviews the expansion of DNA data banking by states and the federal government, extending the collateral impact of a criminal record—in the form …
Cloud Computing: Architectural And Policy Implications, Christopher S. Yoo
Cloud Computing: Architectural And Policy Implications, Christopher S. Yoo
All Faculty Scholarship
Cloud computing has emerged as perhaps the hottest development in information technology. Despite all of the attention that it has garnered, existing analyses focus almost exclusively on the issues that surround data privacy without exploring cloud computing’s architectural and policy implications. This article offers an initial exploratory analysis in that direction. It begins by introducing key cloud computing concepts, such as service-oriented architectures, thin clients, and virtualization, and discusses the leading delivery models and deployment strategies that are being pursued by cloud computing providers. It next analyzes the economics of cloud computing in terms of reducing costs, transforming capital expenditures …
The Value Of Detective Stories, Amy Gajda
Network Accountability For The Domestic Intelligence Apparatus, Frank Pasquale, Danielle Keats Citron
Network Accountability For The Domestic Intelligence Apparatus, Frank Pasquale, Danielle Keats Citron
Faculty Scholarship
No abstract provided.
Ten Years After: Bartnicki V. Vopper As Laboratory For First Amendment Advocacy And Analysis, Eric Easton
Ten Years After: Bartnicki V. Vopper As Laboratory For First Amendment Advocacy And Analysis, Eric Easton
All Faculty Scholarship
How many ways can one approach a First Amendment analysis? What influences a lawyer or a judge to select one analytical approach over another? And what is the long-term effect of a court's choice of one over another? In Bartnicki v. Vopper, a 2001 case in which the U.S. Supreme Court considered federal and state statutes prohibiting the disclosure of illegally intercepted telephone conversations, we are privileged to have a small laboratory through which to study the first two questions. And, from the vantage point of ten years, we ought to be able to make some informed predictions as to …
Vulnerable Software: Product-Risk Norms And The Problem Of Unauthorized Access, Richard Warner, Robert H. Sloan
Vulnerable Software: Product-Risk Norms And The Problem Of Unauthorized Access, Richard Warner, Robert H. Sloan
All Faculty Scholarship
Unauthorized access to online information costs billions of dollars per year. Software vulnerabilities are a key. Software currently contains an unacceptable number of vulnerabilities. The standard solution notes that the typical software business strategy is to keep costs down and be the first to market even if that means the software has significant vulnerabilities. Many endorse the following remedy: make software developers liable for negligent or defective design. This remedy is unworkable. We offer an alternative based on an appeal to product-risk norms. Product-risk norms are social norms that govern the sale of products. A key feature of such norms …
William H. Sorrell, Attorney General Of Vermont, Et Al. V. Ims Health Inc., Et Al. - Amicus Brief In Support Of Petitioners, Kevin Outterson, David Orentlicher, Christopher T. Robertson, Frank A. Pasquale
William H. Sorrell, Attorney General Of Vermont, Et Al. V. Ims Health Inc., Et Al. - Amicus Brief In Support Of Petitioners, Kevin Outterson, David Orentlicher, Christopher T. Robertson, Frank A. Pasquale
Faculty Scholarship
On April 26, 2011, the US Supreme Court will hear oral arguments in the Vermont data mining case, Sorrell v. IMS Health Inc. Respondents claim this is the most important commercial speech case in a decade. Petitioner (the State of Vermont) argues this is the most important medical privacy case since Whalen v. Roe.
The is an amicus brief supporting Vermont, written by law professors and submitted on behalf of the New England Journal of Medicine
Supreme Court Amicus Brief Of Aarp And The National Legislative Association On Petition Drug Prices In Support Of Petitioners, William H. Sorrell V. Ims Health, Inc., No. 10-779 (Filed March 1, 2011), Sean Flynn, Meredith Jacob, Stacy Canan
Supreme Court Amicus Brief Of Aarp And The National Legislative Association On Petition Drug Prices In Support Of Petitioners, William H. Sorrell V. Ims Health, Inc., No. 10-779 (Filed March 1, 2011), Sean Flynn, Meredith Jacob, Stacy Canan
Amicus Briefs
This Court should refuse to apply the First Amendment to Vermont’s Prescription Confidentiality Law based on two essential facts. First, the regulation at issue is limited to the commercial use or private-channel distribution of confidential data. It is thus governed by cases of this Court upholding the regulation of uses of information in purely private settings that do not inform or contribute to the public sphere. Bartnicki v. Vopper, 532 U.S. 514, 526-27 n.10 (2001); Dun & Bradstreet, Inc. v. Greenmoss Builders, Inc., 472 U.S. 749 (1985). Second, it concerns the regulation of secondary uses of information where the government …
A Right Is Born: Celebrity, Property, And Postmodern Lawmaking, Mark Bartholomew
A Right Is Born: Celebrity, Property, And Postmodern Lawmaking, Mark Bartholomew
Journal Articles
This Article challenges the standard account of the creation of the right of publicity. In the legal literature, the prevailing narrative is of the right of publicity being intimately linked to the commodification of celebrity. Ultimately, however, there is more to the story of the right of publicity than the decision to protect something of economic value. It took decades after it had become clear that celebrities could be valuable commercial spokespersons for lawmakers to agree to make the right inheritable, separate from the dignitary right of privacy, and potentially applicable to any economic, secondary use that invoked the celebrity …
The Cambridge Companion To European Union Private Law, Daniela Caruso
The Cambridge Companion To European Union Private Law, Daniela Caruso
Shorter Faculty Works
Well into its teens by now, the private law of the European Union has its own companion. The very appearance of a publication of this sort is indeed a coming-of-age moment for a discipline whose existence was hard to fathom until the 1980s. Member states’ judges and lawyers have come full circle, from resisting European Union private law as an intrusion into a quintessentially national sphere, to embracing it as a natural consequence of market integration. The question is no longer whether or not to approximate the private laws of the member states. The question is how to do it. …
Pledge Your Body For Your Bread: Welfare, Drug Testing, And The Inferior Fourth Amendment, Jordan C. Budd
Pledge Your Body For Your Bread: Welfare, Drug Testing, And The Inferior Fourth Amendment, Jordan C. Budd
Law Faculty Scholarship
Proposals to subject welfare recipients to periodic drug testing have emerged over the last three years as a significant legislative trend across the United States. Since 2007, over half of the states have considered bills requiring aid recipients to submit to invasive extraction procedures as an ongoing condition of public assistance. The vast majority of the legislation imposes testing without regard to suspected drug use, reflecting the implicit assumption that the poor are inherently predisposed to culpable conduct and thus may be subject to class-based intrusions that would be inarguably impermissible if inflicted on the less destitute. These proposals are …
Wto-Compliant Protection Of Fundamental Rights: Lessons From The Eu Privacy Directive, Carla L. Reyes
Wto-Compliant Protection Of Fundamental Rights: Lessons From The Eu Privacy Directive, Carla L. Reyes
Faculty Journal Articles and Book Chapters
Nation states often create legislative schemes regulating services industries in order to protect fundamental rights such as human life, economic security, or human security. World Trade Organization members are constrained in their creation of such regulatory schemes by their obligations under the General Agreement on Trade in Services (‘GATS’). WTO members raised concerns about such constraints even before the creation of GATS. As a result, GATS contains clauses specifically designed to allow members enough regulatory latitude to protect important domestic social interests, such as fundamental rights, while simultaneously liberalising trade in services. WTO jurisprudence interpreting these clauses, however, has called …
Internet Access Rights: A Brief History And Intellectual Origins, Jonathon Penney
Internet Access Rights: A Brief History And Intellectual Origins, Jonathon Penney
Articles, Book Chapters, & Popular Press
If there is anything we have learned from recent protest movements around the world, and the heavy-handed government efforts to block, censor, suspend, and manipulate Internet connectivity, it is that access to the Internet, and its content, is anything but certain, especially when governments feel threatened. Despite these hard truths, the notion that people have a "right" to Internet access gained high-profile international recognition last year. In a report to the United Nations General Assembly in early 2011, Frank La Rue, the UN Special Rapporteur on Freedom of Expression, held that Internet access should be recognized as a "human right". …
Unraveling Privacy: The Personal Prospectus And The Threat Of A Full-Disclosure Future, Scott R. Peppet
Unraveling Privacy: The Personal Prospectus And The Threat Of A Full-Disclosure Future, Scott R. Peppet
Publications
Information technologies are reducing the costs of credible signaling, just as they have reduced the costs of data mining and economic sorting. The burgeoning informational privacy field has ignored this evolution, leaving it unprepared to deal with the consequences of these new signaling mechanisms. In an economy with robust signaling, those with valuable credentials, clean medical records, and impressive credit scores will want to disclose those traits to receive preferential economic treatment. Others may then find that they must also disclose private information to avoid the negative inferences attached to staying silent. This unraveling effect creates new types of privacy …
Associational Privacy And The First Amendment: Naacp V. Alabama, Privacy And Data Protection, Anita L. Allen
Associational Privacy And The First Amendment: Naacp V. Alabama, Privacy And Data Protection, Anita L. Allen
All Faculty Scholarship
No abstract provided.
When Machines Are Watching: How Warrantless Use Of Gps Surveillance Technology Violates The Fourth Amendment Right Against Unreasonable Searches, David Thaw, Priscilla Smith, Nabiha Syed, Albert Wong
When Machines Are Watching: How Warrantless Use Of Gps Surveillance Technology Violates The Fourth Amendment Right Against Unreasonable Searches, David Thaw, Priscilla Smith, Nabiha Syed, Albert Wong
Articles
Federal and state law enforcement officials throughout the nation are currently using Global Positioning System (GPS) technology for automated, prolonged surveillance without obtaining warrants. As a result, cases are proliferating in which criminal defendants are challenging law enforcement’s warrantless uses of GPS surveillance technology, and courts are looking for direction from the Supreme Court. Most recently, a split has emerged between the Ninth and D.C. Circuit Courts of Appeal on the issue. In United States v. Pineda-Moreno, the Ninth Circuit relied on United States v. Knotts — which approved the limited use of beeper technology without a warrant — to …
The Boundaries Of Privacy Harm, M. Ryan Calo
The Boundaries Of Privacy Harm, M. Ryan Calo
Articles
Just as a burn is an injury caused by heat, so is privacy harm a unique injury with specific boundaries and characteristics. This Essay describes privacy harm as falling into two related categories. The subjective category of privacy harm is the perception of unwanted observation. This category describes unwelcome mental states—anxiety, embarrassment, fear—that stem from the belief that one is being watched or monitored. Examples of subjective privacy harms include everything from a landlord eavesdropping on his tenants to generalized government surveillance.
The objective category of privacy harm is the unanticipated or coerced use of information concerning a person against …
Network Accountability For The Domestic Intelligence Apparatus, Danielle K. Citron, Frank Pasquale
Network Accountability For The Domestic Intelligence Apparatus, Danielle K. Citron, Frank Pasquale
Faculty Scholarship
A new domestic intelligence network has made vast amounts of data available to federal and state agencies and law enforcement officials. The network is anchored by “fusion centers,” novel sites of intergovernmental collaboration that generate and share intelligence and information. Several fusion centers have generated controversy for engaging in extraordinary measures that place citizens on watch lists, invade citizens’ privacy, and chill free expression. In addition to eroding civil liberties, fusion center overreach has resulted in wasted resources without concomitant gains in security.
While many scholars have assumed that this network represents a trade-off between security and civil liberties, our …
Let's Not Kill All The Privacy Laws (And Lawyers), Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Let's Not Kill All The Privacy Laws (And Lawyers), Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
Disentangling Administrative Searches, Eve Brensike Primus
Disentangling Administrative Searches, Eve Brensike Primus
Articles
Everyone who has been screened at an international border, scanned by an airport metal detector, or drug tested for public employment has been subjected to an administrative search. Since September 11th, the government has increasingly invoked the administrative search exception to justify more checkpoints, unprecedented subway searches, and extensive wiretaps. As science and technology advance, the frequency and scope of administrative searches will only expand. Formulating the boundaries and requirements of administrative search doctrine is therefore a matter of great importance. Yet the rules governing administrative searches are notoriously unclear. This Article seeks to refocus attention on administrative searches and …
Privacy -- An Elusive Concept, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Privacy -- An Elusive Concept, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
Moving Forward Together, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Moving Forward Together, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
Editorial, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Editorial, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.