Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

Case Western Reserve University School of Law

Privacy

Constitutional Law

Articles 1 - 6 of 6

Full-Text Articles in Law

Balancing Privacy, Autonomy, And Scientific Needs In Electronic Health Records Research, Sharona Hoffman, Andy Podgurski Jan 2012

Balancing Privacy, Autonomy, And Scientific Needs In Electronic Health Records Research, Sharona Hoffman, Andy Podgurski

Faculty Publications

The ongoing transition from paper medical files to electronic health records will provide unprecedented amounts of data for biomedical research, with the potential to catalyze significant advances in medical knowledge. But this potential can be fully realized only if the data available to researchers is representative of the patient population as a whole. Thus, allowing individual patients to exclude their health information, in keeping with traditional notions of informed consent, may compromise the research enterprise and the medical benefits it produces.

This Article analyzes the tension between realizing societal benefits from medical research and granting individual preferences for privacy. It ...


Dangerous Terrain: Mapping The Female Body In Gonzales V. Carhart, B. Jessie Hill Jan 2010

Dangerous Terrain: Mapping The Female Body In Gonzales V. Carhart, B. Jessie Hill

Faculty Publications

The body occupies an ambiguous position within the law. It is, in one sense, the quintessential object of state regulatory and police power, the object that the state acts both upon and for. At the same time, the body is often constructed in legal discourse as the site of personhood - our most intimate, sacred, and inviolate possession. The inherent tension between these two concepts of the body permeates the law, but it is perhaps nowhere more prominent than in the constitutional doctrine pertaining to abortion. Abortion is one of the most heavily regulated medical procedures in the United States, and ...


Privacy Is The Problem, Raymond Shih Ray Ku Jan 2010

Privacy Is The Problem, Raymond Shih Ray Ku

Faculty Publications

A local school district remotely activates laptop web cameras that allegedly record the activities of students, even in their bedrooms.1 The President authorizes the National Security Agency (NSA) to monitor the telephone calls and electronic communications of individuals within the United States on an unprecedented scale in the interest of national security.2 Even a cursory examination of the news suggests that the activities and communications of Americans are increasingly subject to government surveillance from every level of government. Whatever we may think about the necessity for this surveillance, we should question how such programs come into being; in ...


In Sickness, Health And Cyberspace: Protecting The Security Of Electronic Private Health Information, Sharona Hoffman, Andy Podgurski Jan 2007

In Sickness, Health And Cyberspace: Protecting The Security Of Electronic Private Health Information, Sharona Hoffman, Andy Podgurski

Faculty Publications

The electronic processing of health information provides considerable benefits to patients and health care providers at the same time that it creates serious risks to the confidentiality, integrity, and availability of the data. The Internet provides a conduit for rapid and uncontrolled dispersion and trafficking of illicitly-obtained private health information, with far-reaching consequences to the unsuspecting victims. In order to address such threats to electronic private health information, the U.S. Department of Health and Human Services enacted the HIPAA Security Rule, which thus far has received little attention in the legal literature. This article presents a critique of the ...


User Choices And Regret: Understanding Users' Decision Process About Consensually Acquired Spyware, Nataniel Good, Jens Grossklags, David Thaw, Aaron K. Perzanowski, Deirdre K. Mulligan, Joseph Konstan Jan 2006

User Choices And Regret: Understanding Users' Decision Process About Consensually Acquired Spyware, Nataniel Good, Jens Grossklags, David Thaw, Aaron K. Perzanowski, Deirdre K. Mulligan, Joseph Konstan

Faculty Publications

Spyware is software which monitors user actions, gathers personal data, and/or displays advertisements to users. While some spyware is installed surreptitiously, a surprising amount is installed on users’ computers with their active participation. In some cases, users agree to accept spyware as part of a software bundle as a cost associated with gaining functionality they desire. In many other cases, however, users are unaware that they installed spyware, or of the consequences of that installation. This lack of awareness occurs even when the functioning of the spyware is explicitly declared in the end user license agreement (EULA). We argue ...


Swingers: Morality Legislation & The Limits Of State Police Power, Raymond Shih Ray Ku Jan 1999

Swingers: Morality Legislation & The Limits Of State Police Power, Raymond Shih Ray Ku

Faculty Publications

This article examines whether Florida can legitimately convict the swingers pursuant to the Florida Constitution specifically, and principles of constitutional law in general, and concludes that it cannot.