Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 18 of 18

Full-Text Articles in Law

Pure Privacy, Jeffrey Bellin Jan 2021

Pure Privacy, Jeffrey Bellin

Faculty Publications

n 1890, Samuel Warren and Louis Brandeis began a storied legal tradition of trying to conceptualize privacy. Since that time, privacy's appeal has grown beyond those authors' wildest expectations, but its essence remains elusive. One of the rare points of agreement in boisterous academic privacy debates is that there is no consensus on what privacy means.

The modern trend is to embrace the ambiguity. Unable to settle on boundaries, scholars welcome a broad array of interests into an expanding theoretical framework. As a result, privacy is invoked in debates about COVID-19 contact tracing, police body cameras, marriage equality, facial recognition, …


The New Governors: The People, Rules And Processes Governing Online Speech, Kate Klonick Jan 2018

The New Governors: The People, Rules And Processes Governing Online Speech, Kate Klonick

Faculty Publications

Private online platforms have an increasingly essential role in free speech and participation in democratic culture. But while it might appear that any internet user can publish freely and instantly online, many platforms actively curate the content posted by their users. How and why these platforms operate to moderate speech is largely opaque.

This Article provides the first analysis of what these platforms are actually doing to moderate online speech under a regulatory and First Amendment framework. Drawing from original interviews, archived materials, and internal documents, this Article describes how three major online platforms — Facebook, Twitter, and YouTube — …


Keep Out! The Efficacy Of Trespass, Nuisance And Privacy Torts As Applied To Drones, Hillary B. Farber Jan 2017

Keep Out! The Efficacy Of Trespass, Nuisance And Privacy Torts As Applied To Drones, Hillary B. Farber

Faculty Publications

The drone industry is burgeoning and there is boundless excitement over the potential civil and commercial applications of these aerial observers. Drones are also fun recreational toys that have more capabilities than their predecessor - the remote controlled helicopter. But along with the benefits comes the potential for misuse. More and more frequently concerned spectators are reporting drones flying around the windows of homes, backyards, and at beaches and sporting events. In some places people are even shooting them down.

We have entered a new frontier of aerial observation with the unmanned aircraft. As is often the case with new …


Carpenter Privacy Case Vexes Justices, While Tech Giant Microsoft Battles Government In Second U.S. Supreme Court Privacy Case With International Implications, Richard J. Peltz-Steele Jan 2017

Carpenter Privacy Case Vexes Justices, While Tech Giant Microsoft Battles Government In Second U.S. Supreme Court Privacy Case With International Implications, Richard J. Peltz-Steele

Faculty Publications

Fall 2017 saw a major privacy case with international implications reach the U.S. Supreme Court this term, Carpenter v. United States. Now a second such case pits the Government against Big Tech in United States v. Microsoft. Carpenter is a criminal case involving federal seizure of cell phone location data from service providers. Arising under the “reasonable grounds” provision of the Stored Communications Act (SCA), the case accentuates Americans’ lack of constitutional protection for personal data in third-party hands, in contrast with emerging global privacy norms. The second major privacy case headed for Supreme Court decision in 2018 also arises …


The Positive Law Model Of The Fourth Amendment, William Baude, James Y. Stern May 2016

The Positive Law Model Of The Fourth Amendment, William Baude, James Y. Stern

Faculty Publications

For fifty years, courts have used a “reasonable expectation of privacy” standard to define “searches” under the Fourth Amendment. As others have recognized, that doctrine is subjective, unpredictable, and conceptually confused, but viable alternatives have been slow to emerge. This Article supplies one.

We argue that Fourth Amendment protection should be anchored in background positive law. The touchstone of the search-and-seizure analysis should be whether government officials have done something forbidden to private parties. It is those actions that should be subjected to Fourth Amendment reasonableness review and the presumptive requirement to obtain a warrant. In short, Fourth Amendment protection …


Beyond The Schoolhouse Gates: The Unprecedented Expansion Of School Surveillance Authority Under Cyberbulling Laws, Emily Suski Oct 2014

Beyond The Schoolhouse Gates: The Unprecedented Expansion Of School Surveillance Authority Under Cyberbulling Laws, Emily Suski

Faculty Publications

For several years, states have grappled with the problem of cyberbullying and its sometimes devastating effects. Because cyberbullying often occurs between students, most states have understandably looked to schools to help address the problem. To that end, schools in forty-six states have the authority to intervene when students engage in cyberbullying. This solution seems all to the good unless a close examination of the cyberbullying laws and their implications is made. This Article explores some of the problematic implications of the cyberbullying laws. More specifically, it focuses on how the cyberbullying laws allow schools unprecedented surveillance authority over students. This …


The New American Privacy, Richard J. Peltz-Steele Jan 2013

The New American Privacy, Richard J. Peltz-Steele

Faculty Publications

Conventional wisdom paints U.S. and European approaches to privacy at irreconcilable odds. But that portrayal overlooks a more nuanced reality of privacy in American law. The free speech imperative of U.S. constitutional law since the civil rights movement shows signs of tarnish. And in areas of law that have escaped constitutionalization, such as fair-use copyright and the freedom of information, developing personality norms resemble European-style balancing. Recent academic and political initiatives on privacy in the United States emphasize subject control and contextual analysis, reflecting popular thinking not so different after all from that which animates Europe’s 1995 directive and 2012 …


Eyes In The Sky: Constitutional And Regulatory Approaches To Domestic Drone Deployment, Hillary B. Farber Jan 2013

Eyes In The Sky: Constitutional And Regulatory Approaches To Domestic Drone Deployment, Hillary B. Farber

Faculty Publications

This article begins with a current look at the deployment of drones domestically, both in terms of their use and the procedure for attaining approval for flight. Part II examines the capabilities of drones. Part III considers the Supreme Court's current Fourth Amendment jurisprudence and its application to law enforcement's use of drones. Part IV reviews existing and proposed federal and state regulation of drones. Part V offers constitutional and legislative prescriptions for regulating drones.


Balancing Privacy, Autonomy, And Scientific Needs In Electronic Health Records Research, Sharona Hoffman, Andy Podgurski Jan 2012

Balancing Privacy, Autonomy, And Scientific Needs In Electronic Health Records Research, Sharona Hoffman, Andy Podgurski

Faculty Publications

The ongoing transition from paper medical files to electronic health records will provide unprecedented amounts of data for biomedical research, with the potential to catalyze significant advances in medical knowledge. But this potential can be fully realized only if the data available to researchers is representative of the patient population as a whole. Thus, allowing individual patients to exclude their health information, in keeping with traditional notions of informed consent, may compromise the research enterprise and the medical benefits it produces.

This Article analyzes the tension between realizing societal benefits from medical research and granting individual preferences for privacy. It …


Dangerous Terrain: Mapping The Female Body In Gonzales V. Carhart, B. Jessie Hill Jan 2010

Dangerous Terrain: Mapping The Female Body In Gonzales V. Carhart, B. Jessie Hill

Faculty Publications

The body occupies an ambiguous position within the law. It is, in one sense, the quintessential object of state regulatory and police power, the object that the state acts both upon and for. At the same time, the body is often constructed in legal discourse as the site of personhood - our most intimate, sacred, and inviolate possession. The inherent tension between these two concepts of the body permeates the law, but it is perhaps nowhere more prominent than in the constitutional doctrine pertaining to abortion. Abortion is one of the most heavily regulated medical procedures in the United States, …


Privacy Is The Problem, Raymond Shih Ray Ku Jan 2010

Privacy Is The Problem, Raymond Shih Ray Ku

Faculty Publications

A local school district remotely activates laptop web cameras that allegedly record the activities of students, even in their bedrooms.1 The President authorizes the National Security Agency (NSA) to monitor the telephone calls and electronic communications of individuals within the United States on an unprecedented scale in the interest of national security.2 Even a cursory examination of the news suggests that the activities and communications of Americans are increasingly subject to government surveillance from every level of government. Whatever we may think about the necessity for this surveillance, we should question how such programs come into being; in other words, …


From Privacy To Liberty: The Fourth Amendment After Lawrence, Thomas P. Crocker Oct 2009

From Privacy To Liberty: The Fourth Amendment After Lawrence, Thomas P. Crocker

Faculty Publications

This Article explores a conflict between the protections afforded interpersonal relations in Lawrence v. Texas and the vulnerability experienced under the Fourth Amendment by individuals who share their lives with others. Under the Supreme Court's third-party doctrine, we have no constitutionally protected expectation of privacy in what we reveal to other persons. The effect of this doctrine is to leave many aspects of ordinary life shared in the company of others constitutionally unprotected. In an increasingly socially networked world, the Fourth Amendment may fail to protect precisely those liberties-to live in the company of others free from state surveillance and …


In Sickness, Health And Cyberspace: Protecting The Security Of Electronic Private Health Information, Sharona Hoffman, Andy Podgurski Jan 2007

In Sickness, Health And Cyberspace: Protecting The Security Of Electronic Private Health Information, Sharona Hoffman, Andy Podgurski

Faculty Publications

The electronic processing of health information provides considerable benefits to patients and health care providers at the same time that it creates serious risks to the confidentiality, integrity, and availability of the data. The Internet provides a conduit for rapid and uncontrolled dispersion and trafficking of illicitly-obtained private health information, with far-reaching consequences to the unsuspecting victims. In order to address such threats to electronic private health information, the U.S. Department of Health and Human Services enacted the HIPAA Security Rule, which thus far has received little attention in the legal literature. This article presents a critique of the Security …


User Choices And Regret: Understanding Users' Decision Process About Consensually Acquired Spyware, Nathaniel Good, Jens Grossklags, David Thaw, Aaron K. Perzanowski, Deirdre K. Mulligan, Joseph Konstan Jan 2006

User Choices And Regret: Understanding Users' Decision Process About Consensually Acquired Spyware, Nathaniel Good, Jens Grossklags, David Thaw, Aaron K. Perzanowski, Deirdre K. Mulligan, Joseph Konstan

Faculty Publications

Spyware is software which monitors user actions, gathers personal data, and/or displays advertisements to users. While some spyware is installed surreptitiously, a surprising amount is installed on users’ computers with their active participation. In some cases, users agree to accept spyware as part of a software bundle as a cost associated with gaining functionality they desire. In many other cases, however, users are unaware that they installed spyware, or of the consequences of that installation. This lack of awareness occurs even when the functioning of the spyware is explicitly declared in the end user license agreement (EULA). We argue and …


Swingers: Morality Legislation & The Limits Of State Police Power, Raymond Shih Ray Ku Jan 1999

Swingers: Morality Legislation & The Limits Of State Police Power, Raymond Shih Ray Ku

Faculty Publications

This article examines whether Florida can legitimately convict the swingers pursuant to the Florida Constitution specifically, and principles of constitutional law in general, and concludes that it cannot.


Prying, Spying And Lying: Intrusive Newsgather And What The Law Should Do About Them, Lyrissa Lidsky Jan 1998

Prying, Spying And Lying: Intrusive Newsgather And What The Law Should Do About Them, Lyrissa Lidsky

Faculty Publications

The media's use of intrusive newsgathering techniques poses an increasing threat to individual privacy. Courts currently resolve the overwhelming majority of conflicts in favor of the media. This is not because the First Amendment bars the imposition of tort liability on the media for its newsgathering practices. It does not. Rather, tort law has failed to seize the opportunity to create meaninful privacy protection. After surveying the economic, philosophical, and practical obstacles to reform, this Article proposes to rejuvenate the tort of intrusion to tip the balance between privacy and the press back in privacy's direction. Working within the framework …


What's Competence Got To Do With It: The Right Not To Be Acquitted By Reason Of Insanity, Justine A. Dunlap Jan 1997

What's Competence Got To Do With It: The Right Not To Be Acquitted By Reason Of Insanity, Justine A. Dunlap

Faculty Publications

An acquittal by reason of insanity is sufficiently adverse and is in many ways more akin to a conviction than to an outright acquittal. Although not technically punishment, it involves substantial infringement of rights. The legal literature has devoted significant space to the issue of a criminal defendant’s competence to stand trial and to the issue of the insanity plea. The problem of a pretrial insanity acquittal of an incompetent defendant, on the other hand, has not been extensively examined. In undertaking that task, this article will, in Part II, review the law and practice of competency determinations. Part III …


Intrusion And The Investigative Reporter, Lyrissa Lidsky Jan 1992

Intrusion And The Investigative Reporter, Lyrissa Lidsky

Faculty Publications

Although sometimes reviled as muckrakers, investigative reporters play a valuable role in exposing societal ills and advancing reform. The success of investigative journalism is due, at least in part, to its use of novel newsgathering techniques. Yet some of these same techniques pose a threat to individual privacy. Current tort doctrine strikes an unsatisfactory balance between these competing interests. The qualified common-law privilege advocated by this Note, in contrast, would protect those newsgathering activities that promote the public welfare. Equally significantly, by sending a clear message to editors, media lawyers, and reporters about the scope of protected newsgathering activity, it …