Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Privacy Law (6)
- Fourth Amendment (5)
- Internet Law (4)
- Communications Law (3)
- Constitutional Law (3)
-
- Comparative and Foreign Law (2)
- Entertainment, Arts, and Sports Law (2)
- First Amendment (2)
- International Trade Law (2)
- Supreme Court of the United States (2)
- Civil Rights and Discrimination (1)
- Computer Law (1)
- Consumer Protection Law (1)
- Courts (1)
- Criminal Law (1)
- Criminal Procedure (1)
- Disability Law (1)
- Education Law (1)
- Evidence (1)
- Intellectual Property Law (1)
- Law Enforcement and Corrections (1)
- Law and Economics (1)
- Legislation (1)
- National Security Law (1)
- State and Local Government Law (1)
- Institution
- Publication
-
- Michigan Telecommunications & Technology Law Review (4)
- Federal Communications Law Journal (2)
- Law and Contemporary Problems (2)
- Michigan Law Review (2)
- Duke Law Journal (1)
-
- Fordham Intellectual Property, Media and Entertainment Law Journal (1)
- Fordham Law Review (1)
- ILSA Journal of International & Comparative Law (1)
- Marquette Sports Law Review (1)
- San Diego Law Review (1)
- University of Richmond Law Review (1)
- Vanderbilt Journal of Entertainment & Technology Law (1)
- Vanderbilt Journal of Transnational Law (1)
- Vanderbilt Law Review (1)
Articles 1 - 20 of 20
Full-Text Articles in Law
The Battle Of The Music Industry: The Distribution Of Audio And Video Works Via The Internet, Music And More, David Balaban
The Battle Of The Music Industry: The Distribution Of Audio And Video Works Via The Internet, Music And More, David Balaban
Fordham Intellectual Property, Media and Entertainment Law Journal
No abstract provided.
Education Law, D. Patrick Lacy Jr., Kathleen S. Mehfoud
Education Law, D. Patrick Lacy Jr., Kathleen S. Mehfoud
University of Richmond Law Review
No abstract provided.
Constitutional Issues In Information Privacy, Fred H. Cate, Robert Litan
Constitutional Issues In Information Privacy, Fred H. Cate, Robert Litan
Michigan Telecommunications & Technology Law Review
The U.S. Constitution has been largely ignored in the recent flurry of privacy laws and regulations designed to protect personal information from incursion by the private sector despite the fact that many of these enactments and efforts to enforce them significantly implicate the First Amendment. Questions about the role of the Constitution have assumed new importance in the aftermath of the September 11, 2001 terrorist attacks on the World Trade Center and the Pentagon. Recent efforts to identify and apprehend terrorists and to protect against future attacks threaten to weaken constitutional protections against government intrusions into personal privacy. However, these …
The Patriot Act’S Impact On The Government’S Ability To Conduct Electronic Surveillance Of Ongoing Domestic Communications, Nathan C. Henderson
The Patriot Act’S Impact On The Government’S Ability To Conduct Electronic Surveillance Of Ongoing Domestic Communications, Nathan C. Henderson
Duke Law Journal
No abstract provided.
The Fourth Amendment In The Hallway: Do Tenants Have A Constitutionally Protected Privacy Interest In The Locked Common Areas Of Their Apartment Buildings?, Sean M. Lewis
Michigan Law Review
One afternoon, a police officer spots a man driving a Cadillac through a run·down neighborhood. His interest piqued, the officer decides to follow the vehicle. The Cadillac soon comes to rest in front of an apartment building, and the driver, Jimmy Barrios-Moriera, removes a shopping bag from the trunk and enters the building. The moment Barrios-Moriera disappears within the doorway, the officer sprints after him because he knows that the door to the apartment building will automatically lock when it closes. He manages to catch the door just in time and rushes in. Barrios-Moriera is already halfway up a flight …
An Equality Paradign For Preventing Genetic Discrimination, Anita Silvers, Michael A. Stein
An Equality Paradign For Preventing Genetic Discrimination, Anita Silvers, Michael A. Stein
Vanderbilt Law Review
On June 26, 2000, scientists announced at a White House news conference that they had completed mapping the human genome sequence, the human race's genetic blueprint. This pronouncement generated tremendous and well-deserved excitement. Genomics, the study and application of genetic information, promises to be an unparalleled tool for improving public health. Genetic testing can identify asymptomatic individuals who are at risk of becoming ill themselves or bestowing illness on their children. As a result, individuals who test positive can take prophylactic measures to slow or stop disease and can also reduce the births of progeny at high risk of compromised …
Corporate Cybersmear: Employers File John Doe Defamation Lawsuits Seeking The Identity Of Anonymous Employee Internet Posters, Margo E. K. Reder, Christine Neylon O'Brien
Corporate Cybersmear: Employers File John Doe Defamation Lawsuits Seeking The Identity Of Anonymous Employee Internet Posters, Margo E. K. Reder, Christine Neylon O'Brien
Michigan Telecommunications & Technology Law Review
Communications systems are now wide open and fully accessible, with no limits in range, scope or geography. Targeted audiences are accessible with pinpoint accuracy. Messages reach millions of readers with one click. There is a chat room for everyone. Most importantly, there is no limit on content. Therefore, employees can register their dissatisfaction by posting a message in a chat room. Moreover, the identity of the posting employee is not easily discoverable due to anonymous and pseudonymous communications capabilities. The nature of these online messages is qualitatively different from real-world communications. By way of example, newspapers have a responsibility regarding …
Marking Carnivore's Territory: Rethinking Pen Registers On The Internet, Anthony E. Orr
Marking Carnivore's Territory: Rethinking Pen Registers On The Internet, Anthony E. Orr
Michigan Telecommunications & Technology Law Review
"Carnivore" entered the online world's collective consciousness in June 2000 when the Federal Bureau of Investigation unveiled the Internet surveillance software program to telecommunications industry specialists. The FBI claims the program allows agents to scan the traffic of an Internet Service Provider (ISP) for messages or commands to or from a criminal suspect and then intercept only those messages, capturing copies of e-mails, web site downloads and other file transfers[...] A central issue in the controversy surrounding Carnivore is whether current law permits the FBI to employ the program in the Internet context. Bureau officials claim statutory authority for deployments …
Computer Searches And Seizures: Some Unresolved Issues, Susan W. Brenner, Barbara A. Frederiksen
Computer Searches And Seizures: Some Unresolved Issues, Susan W. Brenner, Barbara A. Frederiksen
Michigan Telecommunications & Technology Law Review
The goal of this article is to illustrate the issues that arise in the context of computer search and seizures by examining several areas in which the application of Fourth Amendment concepts to computer searches and/or seizures can be problematic. In order to illustrate this point, the article will build on a hypothetical. The hypothetical situation assumes law enforcement officers have lawfully obtained a warrant to search for and seize evidence concerning the commission of one or more crimes. It will also be assumed that computer technology played some role in the commission of these crimes, so computer equipment and …
Carnivore, The Fbi’S E-Mail Surveillance System: Devouring Criminals, Not Privacy, Griffin S. Dunham
Carnivore, The Fbi’S E-Mail Surveillance System: Devouring Criminals, Not Privacy, Griffin S. Dunham
Federal Communications Law Journal
On July 11, 2000, the FBI intorduced Carnivore, an Internet monitoring system. It was designed, and is used exclusively, to carry out court-ordered surveillance of electronic communications. It is a tangible, portable device, tantamount to a phone tap, that allows the FBI to intercept and collect criminal suspects' e-mail without their knowledge or consent. This Note addresses competing and parallel interests between the government and society to determine the legitimacy and necessity of Carnivore. The purpose of this Note is twofold: first, to demonstrate the need for Carnivore to enable law enforcement to keep up with criminals who utilize cyberspace …
The Fourth Amendment In The Twenty-First Century: Technology, Privacy, And Human Emotions, Andrew E. Taslitz
The Fourth Amendment In The Twenty-First Century: Technology, Privacy, And Human Emotions, Andrew E. Taslitz
Law and Contemporary Problems
Police and local political officials in Tampa FL argued that the FaceIt system promotes safety, but privacy advocates objected to the city's recording or utilizing facial images without the victims' consent, some staging protests against the FaceIt system. Privacy objects seem to be far more widely shared than this small protest might suggest.
Rights In Conflict: The First Amendment’S Third Century, Robert M. O'Neil
Rights In Conflict: The First Amendment’S Third Century, Robert M. O'Neil
Law and Contemporary Problems
O'Neil has witnesses the resolution, or at least the clarification, of many free speech and press issues. There are, however, persistent issues that deserve particularly close scrutiny. Three such issues are tensions between free expression and privacy, civility, and equality.
Indecent Exposures In An Electronic Regime, Natalie L. Regoli
Indecent Exposures In An Electronic Regime, Natalie L. Regoli
Federal Communications Law Journal
As the topic of data privacy is vast and the subject of much scrutiny, this Comment focuses narrowly on commercial cyber-activities relating to the nonconsensual Internet acquisition of personally identifiable user data. Beginning with a brief examination of the technology that has exacerbated privacy law's inadequacies, it briefly discusses failed attempts to safeguard privacy rights through the market and federal agency management. It then addresses current U.S. privacy legislation and the 1995 European Privacy Directive. Finally, this Comment proposes the creation of a new legislative system to effectively combat the surreptitious collection, storage, use, and sale of personal data.
We Can Do This The Easy Way Or The Hard Way: The Use Of Deceit To Induce Consent Searches, Rebecca Strauss
We Can Do This The Easy Way Or The Hard Way: The Use Of Deceit To Induce Consent Searches, Rebecca Strauss
Michigan Law Review
In October of 1995, Aaron Salvo was studying and living at Ashland College. College officials informed local FBI agents that they suspected Salvo of possible child molestation and related conduct based on incriminating electronic mail. FBI agents approached Salvo at his dormitory, asked to speak with him in private about the suspicious mail, and suggested they speak in Salvo's dorm room. Salvo agreed to speak with the officers, but declined to do so in his room because his roommate was there, and he did not want to get anyone else involved in the embarrassing nature of the upcoming conversation. Salvo …
Stop The Presses! First Amendment Limitations Of Professional Athletes' Publicity Rights , Erika T. Olander
Stop The Presses! First Amendment Limitations Of Professional Athletes' Publicity Rights , Erika T. Olander
Marquette Sports Law Review
No abstract provided.
A Safety Net In The E-Marketplace: The Safe Harbor Principles Offer Comprehensive Privacy Protection Without Stopping Data Flow, William J. Kambas
A Safety Net In The E-Marketplace: The Safe Harbor Principles Offer Comprehensive Privacy Protection Without Stopping Data Flow, William J. Kambas
ILSA Journal of International & Comparative Law
In May of 2000, the FTC, under Chairman Robert Pitofsky, concluded that industry self-regulation was not effective in protecting consumer privacy and in a report to Congress the FTC expressed the view "that legislation [was] necessary to ensure further implementation of consumer data protection devices."
Japan's Communications Interception Act: Unconstitutional Invasion Of Privacy Or Necessary Tool?, Lillian R. Gilmer
Japan's Communications Interception Act: Unconstitutional Invasion Of Privacy Or Necessary Tool?, Lillian R. Gilmer
Vanderbilt Journal of Transnational Law
In August 1999, Japan became the last of the G8 nations to pass legislation to allow law enforcement to wiretap communications. For some, passage of the law was long overdue; for others, its passage marked the beginning of an impermissible government encroachment on civil rights. This Note examines Japan's Communications Interception Act, the forces in Japanese society creating the need for the law, and the reasons why the law is being challenged. Part II examines the policy behind the law, its history, and public reaction to the law. Part III presents the history of organized crime in Japan, and a …
Privacy, Eh! The Impact Of Canada's Personal Information Protection And Electronic Documents Act On Transnational Business, Juliana M. Spaeth, Mark J. Plotkin, Sandra C. Sheets
Privacy, Eh! The Impact Of Canada's Personal Information Protection And Electronic Documents Act On Transnational Business, Juliana M. Spaeth, Mark J. Plotkin, Sandra C. Sheets
Vanderbilt Journal of Entertainment & Technology Law
In 2002, the requirements imposed by PIPEDA will extend to encompass all personal health information. PIPEDA will ultimately extend to the collection, use, or disclosure of all personal information in the course of any commercial activity within a province in 2004. This change in Canadian law carries significant consequences for the general business practices of American companies that conduct, or may conduct, business with Canadians. It is therefore crucial for lawyers with clients collecting personal data on- and offline to familiarize themselves with its requirements in order to counsel clients effectively about their current and future obligations under this privacy …
The Push To Private Religious Expression: Are We Missing Something?, Kathleen A. Brady
The Push To Private Religious Expression: Are We Missing Something?, Kathleen A. Brady
Fordham Law Review
No abstract provided.
Reasonable Expectations And The Erosion Of Privacy, Shaun B. Spencer
Reasonable Expectations And The Erosion Of Privacy, Shaun B. Spencer
San Diego Law Review
This Article examines how the prevailing legal conception of privacy facilitates the erosion of privacy. The law generally measures privacy by reference to society’s reasonable expectation of privacy. If we think of the universe of legally private matters as a sphere, the sphere will contract or (at least in theory) expand in accordance with changing social expectations. This expectation-driven conception of privacy in effect establishes a privacy marketplace, analogous in both a literal and metaphorical sense to a marketplace of ideas. In this marketplace, societal expectations of privacy fluctuate in response to changing social practices. For this reason, privacy is …