Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

2004

Privacy Law

Institution
Keyword
Publication

Articles 1 - 20 of 20

Full-Text Articles in Law

Privacy, Plaintiff, And Pseudonyms: The Anonymous Doe Plaintiff In The Information Age, Jayne S. Ressler Oct 2004

Privacy, Plaintiff, And Pseudonyms: The Anonymous Doe Plaintiff In The Information Age, Jayne S. Ressler

Faculty Scholarship

No abstract provided.


Domesticating Lawrence, David D. Meyer Jan 2004

Domesticating Lawrence, David D. Meyer

Faculty Scholarship

No abstract provided.


Hippocrates To Hipaa: A Foundation For A Federal Physician-Patient Privilege, 77 Temp. L. Rev. 505 (2004), Ralph Ruebner, Leslie Ann Reis Jan 2004

Hippocrates To Hipaa: A Foundation For A Federal Physician-Patient Privilege, 77 Temp. L. Rev. 505 (2004), Ralph Ruebner, Leslie Ann Reis

UIC Law Open Access Faculty Scholarship

No abstract provided.


Institutions Of Learning Or Havens For Illegal Activities: How The Supreme Court Views Libraries, 25 N. Ill. U. L. Rev. 1 (2004), Raizel Liebler Jan 2004

Institutions Of Learning Or Havens For Illegal Activities: How The Supreme Court Views Libraries, 25 N. Ill. U. L. Rev. 1 (2004), Raizel Liebler

UIC Law Open Access Faculty Scholarship

The role of libraries in American society is varied: libraries act as curators and repositories of American culture's recorded knowledge, as places to communicate with others, and as sources where one can gain information from books, magazines and other printed materials, as well as audio-video materials and the Internet. Courts in the United States have called libraries "the quintessential locus of the receipt of information, "'places that are "dedicated to quiet, to knowledge, and to beauty," and "a mighty resource in the free marketplace of ideas." These positive views of libraries are often in sharp contrast with views by some …


Cracks In The Foundation: The New Internet Regulation's Hidden Threat To Privacy And Commerce, Joshua A.T. Fairfield Jan 2004

Cracks In The Foundation: The New Internet Regulation's Hidden Threat To Privacy And Commerce, Joshua A.T. Fairfield

Scholarly Articles

Scholarship to date has focused on the legal significance of the novelty of the Internet. This scholarship does not describe or predict actual Internet legislation. Instead of asking whether the Internet is so new as to merit new law, legislators and academics should re-evaluate the role of government in orchestrating collective action and change the relative weight of enforcement, deterrence, and incentives in Internet regulations.

A perfect example of the need for this new approach is the recent CANSPAM Act of 2003, which was intended to protect personal privacy and legitimate businesses. However, the law threatens both of these interests, …


Race, Face, And Rawls, Anita L. Allen Jan 2004

Race, Face, And Rawls, Anita L. Allen

All Faculty Scholarship

No abstract provided.


Collateralizing Internet Privacy, Xuan-Thao Nguyen Jan 2004

Collateralizing Internet Privacy, Xuan-Thao Nguyen

Articles

Collateralizing privacy is a pervasive conduct committed by many on-line companies. Yet most don't even realize that they are engaging in collateralizing privacy. Worse yet, governmental agencies and consumer groups are not even aware of the violation of on-line consumer privacy by the collateralization of privacy. Professor Nguyen argues that collateralizing privacy occurs under the existing privacy regime and the architecture of article 9 of the Uniform Commercial Code. Professor Nguyen critiques the violation of privacy through collateralization dilemmas and proposes a solution involving modifications of the contents of the financing statement and security agreement in secured transactions where consumer …


Technology And The Internet: The Impending Destruction Of Privacy By Betrayers, Grudgers, Snoops, Spammers, Corporations And The Media, Clifford S. Fishman Jan 2004

Technology And The Internet: The Impending Destruction Of Privacy By Betrayers, Grudgers, Snoops, Spammers, Corporations And The Media, Clifford S. Fishman

Scholarly Articles

This Article reviews how the Internet and related developments-technological, social, and legal-have magnified the threat to privacy posed by private individuals, commercial enterprises, and the media. It offers a brief overview of the current threats to privacy from sources other than the government, and, in particular, the impact of the Internet in creating or magnifying those threats. Part I discusses the threat to privacy in general, examining how the Internet and developments in surveillance technology, in information storage and retrieval, in dissemination of information, sound, and images, and changes to the informal "social contract" that defines general standards have all …


Case Comments: Constitutional Law: Reaffirming Every Floridian’S Broad And Fundamental Right To Privacy, Diane Lourdes Dick Jan 2004

Case Comments: Constitutional Law: Reaffirming Every Floridian’S Broad And Fundamental Right To Privacy, Diane Lourdes Dick

Faculty Articles

In this article Professor Diane Lourdes Dick examines the Parental Notice of Abortion Act (the Act) that was passed in 1999 by the Florida Legislature, which required minors seeking an abortion to either notify a parent prior to the procedure or obtain court approval to waive parental notice. A minor choosing the latter option must demonstrate to a court that she is either mature enough to make the decision or that, despite a court's finding that she lacks sufficient maturity, parental notification is clearly not in her best interest. The statute has never been enforced and the right to privacy …


Protecting The Lady From Toledo: Post-Usa Patriot Act Electronic Surveillance At The Library, Susan Nevelow Mart Jan 2004

Protecting The Lady From Toledo: Post-Usa Patriot Act Electronic Surveillance At The Library, Susan Nevelow Mart

Publications

Library patrons are worried about the government looking over their shoulder while they read and surf the Internet. Because of the broad provisions of the USA PATRIOT Act, the lack of judicial and legislative oversight, the potential for content overcollection, and the ease with which applications for pen register, section 215 orders, or national security letters can be obtained, these fears cannot be dismissed.


Is Lawrence Libertarian?, Dale Carpenter Jan 2004

Is Lawrence Libertarian?, Dale Carpenter

Faculty Journal Articles and Book Chapters

The Supreme Court’s decision in Lawrence v. Texas is no doubt a shock to those pursuing an antihomosexual agenda. To most Americans, however, the decision is less an ipse dixit announcing radical social change than it is a belated recognition of what they had already learned about the humanity and dignity of gay people. Rather than radically changing constitutional principle, the Court has corrected its own erroneous understanding of the facts that underlay its application of constitutional principle in the past. Rather than leading the nation, the Court has caught up to it.

Part I of this essay lays out …


Access Denied: Improper Use Of The Computer Fraud And Abuse Act To Control Information On Publicly Accessible Internet Websites, Christine Galbraith Davik Jan 2004

Access Denied: Improper Use Of The Computer Fraud And Abuse Act To Control Information On Publicly Accessible Internet Websites, Christine Galbraith Davik

Faculty Publications

The Computer Fraud and Abuse Act (CFAA) was originally enacted in 1984 as a criminal statute to address hacking and the growing problem of computer crime. Recently, however, in an attempt to control competition and maintain market share, a number of companies have sought to prevent entities they deem unwelcome from obtaining data on their websites. Utilizing the civil action provisions of the CFAA, these companies have surprisingly succeeded in convincing federal courts that hacking includes accessing and using the factual information a company has chosen to post on a publicly available website. Despite the fact that many of the …


"Doublethink"Ing Privacy Under The Multi-State Antiterrorism Information Exchange, Thomas V. Burch Jan 2004

"Doublethink"Ing Privacy Under The Multi-State Antiterrorism Information Exchange, Thomas V. Burch

Scholarly Works

This Article examines the development of the Matrix program and analyzes its effect on what Justices Warren and Brandeis termed the individual's "right to be let alone." To understand the Matrix's effect on individual privacy, one must scrutinize the program in the context of United States history.From the Alien and Sedition Acts to the Red Squads of the 1960s and 1970.

Part II of this Article examines how civil liberties often suffer unnecessarily in times of national crisis. Part III then discusses how this truism applies in the current "war on terror" and details the development and operation of the …


The Unknown Past Of Lawrence V. Texas, Dale Carpenter Jan 2004

The Unknown Past Of Lawrence V. Texas, Dale Carpenter

Faculty Journal Articles and Book Chapters

This Article is an attempt to fill in some of the gaps in the public's knowledge of the case Lawrence v. Texas. Much of the rich post-arrest history of the case has been ignored. But for the courage, insight, and initiative of three men in particular, the arrest might have been another forgotten episode in what the author calls the under history of the Texas sodomy law, the history not told in appellate opinions or in most other accounts.

Section II reviews the "somewhat known" past, tracing the evolution of the Texas sodomy law from a statute so facially …


Cracks In The Foundation: The New Internet Legislation's Hidden Threat To Privacy And Commerce, Joshua Fairfield Jan 2004

Cracks In The Foundation: The New Internet Legislation's Hidden Threat To Privacy And Commerce, Joshua Fairfield

Articles by Maurer Faculty

Scholarship to date has focused on the legal significance of the novelty of the Internet. This scholarship does not describe or predict actual Internet legislation. Instead of asking whether the Internet is so new as to merit new law, legislators and academics should re-evaluate the role of government in orchestrating collective action and change the relative weight of enforcement, deterrence, and incentives in Internet regulations.

A perfect example of the need for this new approach is the recent CANSPAM Act of 2003, which was intended to protect personal privacy and legitimate businesses. However, the law threatens both of these interests, …


Edith Wharton, Privacy, And Publicity, Jessica Bulman-Pozen Jan 2004

Edith Wharton, Privacy, And Publicity, Jessica Bulman-Pozen

Faculty Scholarship

"It's the woman's soul, absolutely torn up by the roots-her whole self laid bare .... I don't mean to read another line; it's too much like listening at a keyhole." When Mrs. Touchett speaks these words in Edith Wharton's early novella, The Touchstone, we may wonder whether Wharton is mocking her own voyeuristic readership and grappling with her tenuous privacy as a professional female author. Despite her protestations, Mrs. Touchett has relished reading the letters of Mrs. Aubyn, a deceased novelist whose former lover, Stephen Glennard, has published her correspondence. It is precisely because these love letters (or "unloved letters" …


Fractured Freedoms: The United States’ Postmodern Approach To Protecting Privacy, Adam Todd Jan 2004

Fractured Freedoms: The United States’ Postmodern Approach To Protecting Privacy, Adam Todd

School of Law Faculty Publications

Privacy law in the United States can be characterized as postmodern. It is fragmented and reflects postmodern paradox. This article is particularly concerned with the threats to the freedoms that underlie the right to privacy in the United States caused by this postmodern approach-particularly the lack of comprehensive regulation or protections against violations of privacy. The weaknesses of the United States' fragmented approach are apparent when contrasted to the more comprehensive and centrally-regulated European approach, such as that found in the European Data Privacy Directive.

But one cannot simply state that the United States should borrow the comprehensive European approach. …


The Right Of Privacy Of Employees With Respect To Employer-Owned Computers And E-Mails, Charles Adams Jan 2004

The Right Of Privacy Of Employees With Respect To Employer-Owned Computers And E-Mails, Charles Adams

Articles, Chapters in Books and Other Contributions to Scholarly Works

No abstract provided.


The Domesticated Liberty Of Lawrence V. Texas, Katherine M. Franke Jan 2004

The Domesticated Liberty Of Lawrence V. Texas, Katherine M. Franke

Faculty Scholarship

In this Commentary, Professor Franke offers an account of the Supreme Court's decision in Lawrence v. Texas. She concludes that in overruling the earlier Bowers v. Hardwick decision, Justice Kennedy does not rely upon a robust form of freedom made available by the Court's earlier reproductive rights cases, but instead announces a kind of privatized liberty right that affords gay and lesbian couples the right to intimacy in the bedroom. In this sense, the rights-holders in Lawrence are people in relationships and the liberty right those couples enjoy does not extend beyond the domain of the private. Franke expresses …


The International Privacy Regime, Tim Wu Jan 2004

The International Privacy Regime, Tim Wu

Faculty Scholarship

Privacy has joined one of many areas of law understandable only by reference to the results of overlapping and conflicting national agendas. What has emerged as the de facto international regime is complex. Yet based on a few simplifying principles, we can nonetheless do much to understand it and predict its operation.

First, the idea that self-regulation by the internet community will be the driving force in privacy protection must be laid to rest. The experience of the last decade shows that nation-states, powerful nation-states in particular, drive the system of international privacy. The final mix of privacy protection that …