Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 16 of 16

Full-Text Articles in Law

4th Annual Computer & Technology Law Institute, Office Of Continuing Legal Education At The University Of Kentucky College Of Law Nov 2002

4th Annual Computer & Technology Law Institute, Office Of Continuing Legal Education At The University Of Kentucky College Of Law

Continuing Legal Education Materials

Materials from the 4th Annual Computer & Technology Law Institute held by UK/CLE in November 2002.


Sneak And Peak Search Warrants, Donald E. Wilkes Jr. Sep 2002

Sneak And Peak Search Warrants, Donald E. Wilkes Jr.

Popular Media

In his recent article "Taking Liberty with Freedom," author Richard P. Moore reminds us that the USA Patriot Act, signed by President Bush last Oct. 26 in the wake of the Sept. 11 terrorist attacks, "gives the government the kind of sweeping powers of arrest, detention, surveillance, investigation, deportation, and search and seizure that ... assault ... our most basic freedoms."

I want to examine here a single section of the USA Patriot Act--section 213, definitely one of the most sinister provisions of this monstrous statute.


Privacy And The Post-September 11 Immigration Detainees: The Wrong Way To A Right (And Other Wrongs), Sadiq Reza Jul 2002

Privacy And The Post-September 11 Immigration Detainees: The Wrong Way To A Right (And Other Wrongs), Sadiq Reza

Faculty Scholarship

In forthcoming work, I argue that this common-law privacy right should indeed attach to individuals arrested for or suspected of crime.9 I also argue that support for the right exists in a variety of judicial, statutory, and other sources, and that legislation to formally protect the right is warranted and constitutional. The reasoning is simple: being publicly named in connection with criminal allegations is stigmatizing, and the resultant personal harm-social, professional, emotional, other-lasts, and is difficult to justify when it is visited upon someone who is acquitted of the charges or against whom the charges are dismissed. Equally troubling is …


An Equity Paradigm For Preventing Genetic Discrimination, Anita Silvers, Michael Ashley Stein Jan 2002

An Equity Paradigm For Preventing Genetic Discrimination, Anita Silvers, Michael Ashley Stein

Faculty Publications

No abstract provided.


Privacy And Personal Data Protection In The Information Age: A Comparative Evaluation, Emeka B. Obasi Jan 2002

Privacy And Personal Data Protection In The Information Age: A Comparative Evaluation, Emeka B. Obasi

LLM Theses and Essays

The United States and European economies are both information economies, however, they have different approaches in protecting personal information. This study examines in as much detail as possible, the relevant privacy laws in the two economic regions. The Europeans have a comprehensive legislation regulating personal information that vests considerable control on the data subject. Europeans characterize personal data as a fundamental human right. Americans, on the other hand, protect personal information by legislating for specific industries as the need arises and do not recognize privacy of personal information as a fundamental right. This study concludes the European approach is preferable, …


Reasonable Expectations And The Erosion Of Privacy, Shaun Spencer Jan 2002

Reasonable Expectations And The Erosion Of Privacy, Shaun Spencer

Faculty Publications

This Article examines how the prevailing legal conception of privacy facilitates the erosion of privacy. The law generally measures privacy by reference to society’s reasonable expectation of privacy. If we think of the universe of legally private matters as a sphere, the sphere will contract (or least in theory) expand in accordance with changing social expectations. This expectations-driven conception of privacy in effect establishes a privacy marketplace, analogous in both a literal and metaphorical sense to a marketplace of ideas. In this marketplace, societal expectations of privacy fluctuate in response to changing social practices. For this reason, privacy is susceptible …


Securing Our Infrastructure: Private/Public Information Sharing, Rena I. Steinzor Jan 2002

Securing Our Infrastructure: Private/Public Information Sharing, Rena I. Steinzor

Congressional Testimony

No abstract provided.


Privacy Wrongs In Search Of Remedies, Joel R. Reidenberg Jan 2002

Privacy Wrongs In Search Of Remedies, Joel R. Reidenberg

Faculty Scholarship

The American legal system has generally rejected legal rights for data privacy and relies instead on market self-regulation and the litigation process to establish norms of appropriate behavior in society. Information privacy is protected only through an amalgam of narrowly targeted rules. The aggregation of these specific rights leaves many significant gaps and fewer clear remedies for violations of fair information practices. With an absence of well-established legal rights, privacy wrongs are currently in search of remedies. This Article first describes privacy rights and wrongs that frame the search for remedies in the United States. It explores public enforcement of, …


Human Identification Theory And The Identity Theft Problem, Lynn M. Lopucki Jan 2002

Human Identification Theory And The Identity Theft Problem, Lynn M. Lopucki

UF Law Faculty Publications

This paper builds on the theory of human identification proposed by Professor Roger Clarke and uses the product as the basis for a proposed solution to the identity theft problem. The expanded theory holds that all human identification fits a single model. The identifior matches the characteristics of a person observed in a first observation with the characteristics of a person observed in a second observation to determine whether they are the same person. From the theory it follows that a characteristic used for identification in the credit reporting system, such as social security number, mother's maiden name and date …


Brandeis & Warren's 'The Right To Privacy And The Birth Of The Right To Privacy', Ben Bratman Jan 2002

Brandeis & Warren's 'The Right To Privacy And The Birth Of The Right To Privacy', Ben Bratman

Articles

Privacy law and conceptions of a right to privacy have, of course, evolved considerably since 1890 when future Supreme Court Justice Louis Brandeis and Boston attorney Samuel Warren penned their now ageless article, The Right to Privacy, 4 Harv. L. Rev. 193, in which they argued the law should recognize such a right and impose liability in tort for intrusions on it. But quite apart from any argument about how attenuated the link might be between Brandeis and Warren's specific proposals and the current state of privacy law, is it fair to say, as so many scholars and judges repeatedly …


An Overview Of Canadian Privacy Law For Pharmaceutical And Device Manufacturers Operating In Canada, Erika Lietzan, John K. Fuson Jan 2002

An Overview Of Canadian Privacy Law For Pharmaceutical And Device Manufacturers Operating In Canada, Erika Lietzan, John K. Fuson

Faculty Publications

On April 13, 2000, the Canadian Parliament enacted by Royal Assent the Personal Information Protection and Electronic Documents Act (PIPEDA). The Act requires private organizations to comply with a code of “fair information practice,” which mandates individual consent for the collection, use, and disclosure of personal information. PIPEDA complements the Federal Privacy Act, which places similar obligations on government institutions. On January 1, 2002, the Act began to apply to personal information (including personal health information) collected, used, or disclosed by a federal work, undertaking, or business, and personal information (including personal health information) disclosed by any organization for consideration …


Access And Aggregation: Privacy, Public Records, And The Constitution, Daniel J. Solove Jan 2002

Access And Aggregation: Privacy, Public Records, And The Constitution, Daniel J. Solove

GW Law Faculty Publications & Other Works

In this article, Professor Solove develops a theory to reconcile the tension between transparency and privacy in the context of public records. Federal and state governments maintain public records containing personal information spanning an individual's life from birth to death. The web of state and federal regulation that governs the accessibility of these records generally creates a default rule in open access to information. Solove contends that the ready availability of public records creates a significant problem for privacy because various bits of information when aggregated paint a detailed portrait of a person's life that Solove refers to as a …


Conceptualizing Privacy, Daniel J. Solove Jan 2002

Conceptualizing Privacy, Daniel J. Solove

GW Law Faculty Publications & Other Works

In this Article, Professor Solove develops a new approach for conceptualizing privacy. He begins by examining the existing discourse about conceptualizing privacy, exploring the conceptions of a wide array of jurists, legal scholars, philosophers, psychologists, and sociologists. Solove contends that the theories are too narrow or too broad. With a few exceptions, the discourse seeks to conceptualize privacy by isolating one or more common essential or core characteristics of privacy. Expounding upon Ludwig Wittgenstein's notion of family resemblance, Solove contends that privacy is better understood as drawing from a common pool of similar characteristics. Rather than search for an overarching …


Digital Dossiers And The Dissipation Of Fourth Amendment Privacy, Daniel J. Solove Jan 2002

Digital Dossiers And The Dissipation Of Fourth Amendment Privacy, Daniel J. Solove

GW Law Faculty Publications & Other Works

In this article, Professor Solove examines the increasing information flow from the private sector to the government, especially in light of the response to September 11, 2001. In today's Information Age, private sector entities are gathering an unprecedented amount of personal information about individuals, and the data is increasingly being accessed by government law enforcement officials. This government information gathering takes place outside the bounds of the Fourth Amendment, since the Supreme Court held in Smith v. Maryland and United States v. Miller that the Fourth Amendment does not apply to records held by third parties. Law enforcement officials can, …


Privacy And The Post-September 11 Immigration Detainees: The Wrong Way To A Right (And Other Wrongs), Sadiq Reza Jan 2002

Privacy And The Post-September 11 Immigration Detainees: The Wrong Way To A Right (And Other Wrongs), Sadiq Reza

Articles & Chapters

No abstract provided.


The Magic Lantern Revealed: A Report Of The Fbi's New Key Logging Trojan And Analysis Of Its Possible Treatment In A Dynamic Legal Landscape, Woodrow Hartzog Jan 2002

The Magic Lantern Revealed: A Report Of The Fbi's New Key Logging Trojan And Analysis Of Its Possible Treatment In A Dynamic Legal Landscape, Woodrow Hartzog

Faculty Scholarship

Magic Lantern presents several difficult legal questions that are left unanswered due to new or non-existent statutes and case law directly pertaining to the unique situation that Magic Lantern creates. 25 The first concern is statutory. It is unclear what laws, if any, will apply when Magic Lantern is put into use.26 The recent terrorist attacks in the United States have brought the need for information as a matter of national security to the forefront. Congress recently passed legislation (i.e. USA PATRIOT Act) 27 that dramatically modifies current surveillance law, thus further complicating the untested waters of a …