Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

Privacy Law

2011

Institution
Keyword
Publication

Articles 1 - 30 of 32

Full-Text Articles in Law

Trademark Dilution And Corporate Personhood, Stacey Dogan Dec 2011

Trademark Dilution And Corporate Personhood, Stacey Dogan

Shorter Faculty Works

It’s become almost passé to decry our federal trademark dilution laws. The laws – first passed in 1995 and amended in 2006 – protect “famous trademarks” against uses that are likely to dilute their distinctiveness, without regard to any confusion among consumers or competition between the parties. Early critics warned that passage of the anti-dilution statute marked a turning point in trademark law: by giving famous trademark holders rights against even non-confusing uses of their marks, the law created “property”-like rights in trademarks. The initial commentary on the statute focused mainly on the costs associated with this increasingly absolutist approach …


Data Protection Laws And Marketing Practices, Warren B. Chik Sep 2011

Data Protection Laws And Marketing Practices, Warren B. Chik

Research Collection Yong Pung How School Of Law

Thepotential privacy implications of the incorporation of data protection laws inSingapore for unsolicited communications including telemarketing, junk mail andfaxes and SPAM are examined in this article.


A Moral Rights Theory Of Private Law, Andrew S. Gold May 2011

A Moral Rights Theory Of Private Law, Andrew S. Gold

Faculty Scholarship

No abstract provided.


Fiduciary Law In The Twenty-First Century, Tamar Frankel May 2011

Fiduciary Law In The Twenty-First Century, Tamar Frankel

Faculty Scholarship

How does one embrace the riches of the knowledge presented in this Conference? This Conference’s participants have presented the fiduciary relationship from so many points of view: interdisciplinary perspectives, current issues, and particular fascinating narrower topics. Does this event suggest that critics are correct, and that fiduciary law as a category is incoherent?1 Arguably, fiduciary relationships and the rules that govern them are too varied. Yet I maintain that the variety presented in this Conference leads to the opposite conclusion, and that the papers in this Conference provide support for my claim: that fiduciary law should be viewed and understood …


First-Class Objects, James Grimmelmann Apr 2011

First-Class Objects, James Grimmelmann

Cornell Law Faculty Publications

What is the difference between "James Grimmelmann" and "@grimmelm" and why should we care? Some computer systems, like Facebook and credit reporting agencies, are inherently "about" people. Others are not. This essay argues that the key technical difference is whether they use unique identifiers to refer to people in their databases. From this single distinction, a host of social and humanistic consequences follow. The essay taxonomizes them and teases out some of their implications for privacy law.


Big Brother Is Watching: The Reality Show You Didn't Audition For, J. Amy Dillard Apr 2011

Big Brother Is Watching: The Reality Show You Didn't Audition For, J. Amy Dillard

All Faculty Scholarship

In 1984, at the height of the Reagan-era war on drugs, the Supreme Court created a bright-line exception to Fourth Amendment protection by declaring that no person had a reasonable expectation of privacy in an area defined as an open field. When it created the exception, the Court ignored positive law and its own jurisprudence that the Fourth Amendment protects people, not places. The open fields doctrine allows law enforcement officers to enter posted, private areas that are not part of a house or its curtilage for brief surveillance. The Supreme Court has never “extended the open fields doctrine to …


Teens, Technology, And Cyberstalking: The Domestic Violence Wave Of The Future?, Andrew King-Ries Apr 2011

Teens, Technology, And Cyberstalking: The Domestic Violence Wave Of The Future?, Andrew King-Ries

Faculty Law Review Articles

The American criminal justice system, (therefore), is facing a future domestic violence crisis. Unfortunately, authorities-both parents and law enforcement-tend to minimize the seriousness of violence within adolescent relationships and to minimize the seriousness of stalking. In addition, given the prevalence and embrace of technology by teenagers, criminalizing "normal" teenage behavior seems counter-productive. While an effective criminal justice system response to this problem has yet to be developed, the first step will be for parents and law enforcement to recognize the risk and take it seriously. The second step will be to "renorm" unhealthy teenage relationship norms. It is possible that …


Collateral Consequences, Genetic Surveillance, And The New Biopolitics Of Race, Dorothy E. Roberts Apr 2011

Collateral Consequences, Genetic Surveillance, And The New Biopolitics Of Race, Dorothy E. Roberts

All Faculty Scholarship

This Article is part of a Howard Law Journal Symposium on “Collateral Consequences: Who Really Pays the Price for Criminal Justice?,” as well as my larger book project, Fatal Invention: How Science, Politics, and Big Business Re-create Race in the Twenty-First Century (The New Press, 2011). It considers state and federal government expansion of genetic surveillance as a collateral consequence of a criminal record in the context of a new biopolitics of race in America. Part I reviews the expansion of DNA data banking by states and the federal government, extending the collateral impact of a criminal record—in the form …


Cloud Computing: Architectural And Policy Implications, Christopher S. Yoo Apr 2011

Cloud Computing: Architectural And Policy Implications, Christopher S. Yoo

All Faculty Scholarship

Cloud computing has emerged as perhaps the hottest development in information technology. Despite all of the attention that it has garnered, existing analyses focus almost exclusively on the issues that surround data privacy without exploring cloud computing’s architectural and policy implications. This article offers an initial exploratory analysis in that direction. It begins by introducing key cloud computing concepts, such as service-oriented architectures, thin clients, and virtualization, and discusses the leading delivery models and deployment strategies that are being pursued by cloud computing providers. It next analyzes the economics of cloud computing in terms of reducing costs, transforming capital expenditures …


The Value Of Detective Stories, Amy Gajda Apr 2011

The Value Of Detective Stories, Amy Gajda

Faculty Scholarship

No abstract provided.


Network Accountability For The Domestic Intelligence Apparatus, Frank Pasquale, Danielle Keats Citron Jan 2011

Network Accountability For The Domestic Intelligence Apparatus, Frank Pasquale, Danielle Keats Citron

Faculty Scholarship

No abstract provided.


Ten Years After: Bartnicki V. Vopper As Laboratory For First Amendment Advocacy And Analysis, Eric Easton Jan 2011

Ten Years After: Bartnicki V. Vopper As Laboratory For First Amendment Advocacy And Analysis, Eric Easton

All Faculty Scholarship

How many ways can one approach a First Amendment analysis? What influences a lawyer or a judge to select one analytical approach over another? And what is the long-term effect of a court's choice of one over another? In Bartnicki v. Vopper, a 2001 case in which the U.S. Supreme Court considered federal and state statutes prohibiting the disclosure of illegally intercepted telephone conversations, we are privileged to have a small laboratory through which to study the first two questions. And, from the vantage point of ten years, we ought to be able to make some informed predictions as to …


Vulnerable Software: Product-Risk Norms And The Problem Of Unauthorized Access, Richard Warner, Robert H. Sloan Jan 2011

Vulnerable Software: Product-Risk Norms And The Problem Of Unauthorized Access, Richard Warner, Robert H. Sloan

All Faculty Scholarship

Unauthorized access to online information costs billions of dollars per year. Software vulnerabilities are a key. Software currently contains an unacceptable number of vulnerabilities. The standard solution notes that the typical software business strategy is to keep costs down and be the first to market even if that means the software has significant vulnerabilities. Many endorse the following remedy: make software developers liable for negligent or defective design. This remedy is unworkable. We offer an alternative based on an appeal to product-risk norms. Product-risk norms are social norms that govern the sale of products. A key feature of such norms …


William H. Sorrell, Attorney General Of Vermont, Et Al. V. Ims Health Inc., Et Al. - Amicus Brief In Support Of Petitioners, Kevin Outterson, David Orentlicher, Christopher T. Robertson, Frank A. Pasquale Jan 2011

William H. Sorrell, Attorney General Of Vermont, Et Al. V. Ims Health Inc., Et Al. - Amicus Brief In Support Of Petitioners, Kevin Outterson, David Orentlicher, Christopher T. Robertson, Frank A. Pasquale

Faculty Scholarship

On April 26, 2011, the US Supreme Court will hear oral arguments in the Vermont data mining case, Sorrell v. IMS Health Inc. Respondents claim this is the most important commercial speech case in a decade. Petitioner (the State of Vermont) argues this is the most important medical privacy case since Whalen v. Roe.

The is an amicus brief supporting Vermont, written by law professors and submitted on behalf of the New England Journal of Medicine


Supreme Court Amicus Brief Of Aarp And The National Legislative Association On Petition Drug Prices In Support Of Petitioners, William H. Sorrell V. Ims Health, Inc., No. 10-779 (Filed March 1, 2011), Sean Flynn, Meredith Jacob, Stacy Canan Jan 2011

Supreme Court Amicus Brief Of Aarp And The National Legislative Association On Petition Drug Prices In Support Of Petitioners, William H. Sorrell V. Ims Health, Inc., No. 10-779 (Filed March 1, 2011), Sean Flynn, Meredith Jacob, Stacy Canan

Amicus Briefs

This Court should refuse to apply the First Amendment to Vermont’s Prescription Confidentiality Law based on two essential facts. First, the regulation at issue is limited to the commercial use or private-channel distribution of confidential data. It is thus governed by cases of this Court upholding the regulation of uses of information in purely private settings that do not inform or contribute to the public sphere. Bartnicki v. Vopper, 532 U.S. 514, 526-27 n.10 (2001); Dun & Bradstreet, Inc. v. Greenmoss Builders, Inc., 472 U.S. 749 (1985). Second, it concerns the regulation of secondary uses of information where the government …


A Right Is Born: Celebrity, Property, And Postmodern Lawmaking, Mark Bartholomew Jan 2011

A Right Is Born: Celebrity, Property, And Postmodern Lawmaking, Mark Bartholomew

Journal Articles

This Article challenges the standard account of the creation of the right of publicity. In the legal literature, the prevailing narrative is of the right of publicity being intimately linked to the commodification of celebrity. Ultimately, however, there is more to the story of the right of publicity than the decision to protect something of economic value. It took decades after it had become clear that celebrities could be valuable commercial spokespersons for lawmakers to agree to make the right inheritable, separate from the dignitary right of privacy, and potentially applicable to any economic, secondary use that invoked the celebrity …


The Cambridge Companion To European Union Private Law, Daniela Caruso Jan 2011

The Cambridge Companion To European Union Private Law, Daniela Caruso

Shorter Faculty Works

Well into its teens by now, the private law of the European Union has its own companion. The very appearance of a publication of this sort is indeed a coming-of-age moment for a discipline whose existence was hard to fathom until the 1980s. Member states’ judges and lawyers have come full circle, from resisting European Union private law as an intrusion into a quintessentially national sphere, to embracing it as a natural consequence of market integration. The question is no longer whether or not to approximate the private laws of the member states. The question is how to do it. …


Pledge Your Body For Your Bread: Welfare, Drug Testing, And The Inferior Fourth Amendment, Jordan C. Budd Jan 2011

Pledge Your Body For Your Bread: Welfare, Drug Testing, And The Inferior Fourth Amendment, Jordan C. Budd

Law Faculty Scholarship

Proposals to subject welfare recipients to periodic drug testing have emerged over the last three years as a significant legislative trend across the United States. Since 2007, over half of the states have considered bills requiring aid recipients to submit to invasive extraction procedures as an ongoing condition of public assistance. The vast majority of the legislation imposes testing without regard to suspected drug use, reflecting the implicit assumption that the poor are inherently predisposed to culpable conduct and thus may be subject to class-based intrusions that would be inarguably impermissible if inflicted on the less destitute. These proposals are …


Wto-Compliant Protection Of Fundamental Rights: Lessons From The Eu Privacy Directive, Carla L. Reyes Jan 2011

Wto-Compliant Protection Of Fundamental Rights: Lessons From The Eu Privacy Directive, Carla L. Reyes

Faculty Journal Articles and Book Chapters

Nation states often create legislative schemes regulating services industries in order to protect fundamental rights such as human life, economic security, or human security. World Trade Organization members are constrained in their creation of such regulatory schemes by their obligations under the General Agreement on Trade in Services (‘GATS’). WTO members raised concerns about such constraints even before the creation of GATS. As a result, GATS contains clauses specifically designed to allow members enough regulatory latitude to protect important domestic social interests, such as fundamental rights, while simultaneously liberalising trade in services. WTO jurisprudence interpreting these clauses, however, has called …


Internet Access Rights: A Brief History And Intellectual Origins, Jonathon Penney Jan 2011

Internet Access Rights: A Brief History And Intellectual Origins, Jonathon Penney

Articles, Book Chapters, & Popular Press

If there is anything we have learned from recent protest movements around the world, and the heavy-handed government efforts to block, censor, suspend, and manipulate Internet connectivity, it is that access to the Internet, and its content, is anything but certain, especially when governments feel threatened. Despite these hard truths, the notion that people have a "right" to Internet access gained high-profile international recognition last year. In a report to the United Nations General Assembly in early 2011, Frank La Rue, the UN Special Rapporteur on Freedom of Expression, held that Internet access should be recognized as a "human right". …


Unraveling Privacy: The Personal Prospectus And The Threat Of A Full-Disclosure Future, Scott R. Peppet Jan 2011

Unraveling Privacy: The Personal Prospectus And The Threat Of A Full-Disclosure Future, Scott R. Peppet

Publications

Information technologies are reducing the costs of credible signaling, just as they have reduced the costs of data mining and economic sorting. The burgeoning informational privacy field has ignored this evolution, leaving it unprepared to deal with the consequences of these new signaling mechanisms. In an economy with robust signaling, those with valuable credentials, clean medical records, and impressive credit scores will want to disclose those traits to receive preferential economic treatment. Others may then find that they must also disclose private information to avoid the negative inferences attached to staying silent. This unraveling effect creates new types of privacy …


Associational Privacy And The First Amendment: Naacp V. Alabama, Privacy And Data Protection, Anita L. Allen Jan 2011

Associational Privacy And The First Amendment: Naacp V. Alabama, Privacy And Data Protection, Anita L. Allen

All Faculty Scholarship

No abstract provided.


When Machines Are Watching: How Warrantless Use Of Gps Surveillance Technology Violates The Fourth Amendment Right Against Unreasonable Searches, David Thaw, Priscilla Smith, Nabiha Syed, Albert Wong Jan 2011

When Machines Are Watching: How Warrantless Use Of Gps Surveillance Technology Violates The Fourth Amendment Right Against Unreasonable Searches, David Thaw, Priscilla Smith, Nabiha Syed, Albert Wong

Articles

Federal and state law enforcement officials throughout the nation are currently using Global Positioning System (GPS) technology for automated, prolonged surveillance without obtaining warrants. As a result, cases are proliferating in which criminal defendants are challenging law enforcement’s warrantless uses of GPS surveillance technology, and courts are looking for direction from the Supreme Court. Most recently, a split has emerged between the Ninth and D.C. Circuit Courts of Appeal on the issue. In United States v. Pineda-Moreno, the Ninth Circuit relied on United States v. Knotts — which approved the limited use of beeper technology without a warrant — to …


The Boundaries Of Privacy Harm, M. Ryan Calo Jan 2011

The Boundaries Of Privacy Harm, M. Ryan Calo

Articles

Just as a burn is an injury caused by heat, so is privacy harm a unique injury with specific boundaries and characteristics. This Essay describes privacy harm as falling into two related categories. The subjective category of privacy harm is the perception of unwanted observation. This category describes unwelcome mental states—anxiety, embarrassment, fear—that stem from the belief that one is being watched or monitored. Examples of subjective privacy harms include everything from a landlord eavesdropping on his tenants to generalized government surveillance.

The objective category of privacy harm is the unanticipated or coerced use of information concerning a person against …


Network Accountability For The Domestic Intelligence Apparatus, Danielle K. Citron, Frank Pasquale Jan 2011

Network Accountability For The Domestic Intelligence Apparatus, Danielle K. Citron, Frank Pasquale

Faculty Scholarship

A new domestic intelligence network has made vast amounts of data available to federal and state agencies and law enforcement officials. The network is anchored by “fusion centers,” novel sites of intergovernmental collaboration that generate and share intelligence and information. Several fusion centers have generated controversy for engaging in extraordinary measures that place citizens on watch lists, invade citizens’ privacy, and chill free expression. In addition to eroding civil liberties, fusion center overreach has resulted in wasted resources without concomitant gains in security.

While many scholars have assumed that this network represents a trade-off between security and civil liberties, our …


Let's Not Kill All The Privacy Laws (And Lawyers), Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson Jan 2011

Let's Not Kill All The Privacy Laws (And Lawyers), Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson

Articles by Maurer Faculty

No abstract provided.


Disentangling Administrative Searches, Eve Brensike Primus Jan 2011

Disentangling Administrative Searches, Eve Brensike Primus

Articles

Everyone who has been screened at an international border, scanned by an airport metal detector, or drug tested for public employment has been subjected to an administrative search. Since September 11th, the government has increasingly invoked the administrative search exception to justify more checkpoints, unprecedented subway searches, and extensive wiretaps. As science and technology advance, the frequency and scope of administrative searches will only expand. Formulating the boundaries and requirements of administrative search doctrine is therefore a matter of great importance. Yet the rules governing administrative searches are notoriously unclear. This Article seeks to refocus attention on administrative searches and …


Privacy -- An Elusive Concept, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson Jan 2011

Privacy -- An Elusive Concept, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson

Articles by Maurer Faculty

No abstract provided.


Moving Forward Together, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson Jan 2011

Moving Forward Together, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson

Articles by Maurer Faculty

No abstract provided.


Editorial, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson Jan 2011

Editorial, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson

Articles by Maurer Faculty

No abstract provided.