Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2002

Privacy

Journal

Articles 1 - 20 of 20

Full-Text Articles in Law

The Battle Of The Music Industry: The Distribution Of Audio And Video Works Via The Internet, Music And More, David Balaban Dec 2002

The Battle Of The Music Industry: The Distribution Of Audio And Video Works Via The Internet, Music And More, David Balaban

Fordham Intellectual Property, Media and Entertainment Law Journal

No abstract provided.


Education Law, D. Patrick Lacy Jr., Kathleen S. Mehfoud Nov 2002

Education Law, D. Patrick Lacy Jr., Kathleen S. Mehfoud

University of Richmond Law Review

No abstract provided.


Constitutional Issues In Information Privacy, Fred H. Cate, Robert Litan Oct 2002

Constitutional Issues In Information Privacy, Fred H. Cate, Robert Litan

Michigan Telecommunications & Technology Law Review

The U.S. Constitution has been largely ignored in the recent flurry of privacy laws and regulations designed to protect personal information from incursion by the private sector despite the fact that many of these enactments and efforts to enforce them significantly implicate the First Amendment. Questions about the role of the Constitution have assumed new importance in the aftermath of the September 11, 2001 terrorist attacks on the World Trade Center and the Pentagon. Recent efforts to identify and apprehend terrorists and to protect against future attacks threaten to weaken constitutional protections against government intrusions into personal privacy. However, these …


The Patriot Act’S Impact On The Government’S Ability To Conduct Electronic Surveillance Of Ongoing Domestic Communications, Nathan C. Henderson Oct 2002

The Patriot Act’S Impact On The Government’S Ability To Conduct Electronic Surveillance Of Ongoing Domestic Communications, Nathan C. Henderson

Duke Law Journal

No abstract provided.


The Fourth Amendment In The Hallway: Do Tenants Have A Constitutionally Protected Privacy Interest In The Locked Common Areas Of Their Apartment Buildings?, Sean M. Lewis Oct 2002

The Fourth Amendment In The Hallway: Do Tenants Have A Constitutionally Protected Privacy Interest In The Locked Common Areas Of Their Apartment Buildings?, Sean M. Lewis

Michigan Law Review

One afternoon, a police officer spots a man driving a Cadillac through a run·down neighborhood. His interest piqued, the officer decides to follow the vehicle. The Cadillac soon comes to rest in front of an apartment building, and the driver, Jimmy Barrios-Moriera, removes a shopping bag from the trunk and enters the building. The moment Barrios-Moriera disappears within the doorway, the officer sprints after him because he knows that the door to the apartment building will automatically lock when it closes. He manages to catch the door just in time and rushes in. Barrios-Moriera is already halfway up a flight …


An Equality Paradign For Preventing Genetic Discrimination, Anita Silvers, Michael A. Stein Oct 2002

An Equality Paradign For Preventing Genetic Discrimination, Anita Silvers, Michael A. Stein

Vanderbilt Law Review

On June 26, 2000, scientists announced at a White House news conference that they had completed mapping the human genome sequence, the human race's genetic blueprint. This pronouncement generated tremendous and well-deserved excitement. Genomics, the study and application of genetic information, promises to be an unparalleled tool for improving public health. Genetic testing can identify asymptomatic individuals who are at risk of becoming ill themselves or bestowing illness on their children. As a result, individuals who test positive can take prophylactic measures to slow or stop disease and can also reduce the births of progeny at high risk of compromised …


Corporate Cybersmear: Employers File John Doe Defamation Lawsuits Seeking The Identity Of Anonymous Employee Internet Posters, Margo E. K. Reder, Christine Neylon O'Brien Jun 2002

Corporate Cybersmear: Employers File John Doe Defamation Lawsuits Seeking The Identity Of Anonymous Employee Internet Posters, Margo E. K. Reder, Christine Neylon O'Brien

Michigan Telecommunications & Technology Law Review

Communications systems are now wide open and fully accessible, with no limits in range, scope or geography. Targeted audiences are accessible with pinpoint accuracy. Messages reach millions of readers with one click. There is a chat room for everyone. Most importantly, there is no limit on content. Therefore, employees can register their dissatisfaction by posting a message in a chat room. Moreover, the identity of the posting employee is not easily discoverable due to anonymous and pseudonymous communications capabilities. The nature of these online messages is qualitatively different from real-world communications. By way of example, newspapers have a responsibility regarding …


Marking Carnivore's Territory: Rethinking Pen Registers On The Internet, Anthony E. Orr Jun 2002

Marking Carnivore's Territory: Rethinking Pen Registers On The Internet, Anthony E. Orr

Michigan Telecommunications & Technology Law Review

"Carnivore" entered the online world's collective consciousness in June 2000 when the Federal Bureau of Investigation unveiled the Internet surveillance software program to telecommunications industry specialists. The FBI claims the program allows agents to scan the traffic of an Internet Service Provider (ISP) for messages or commands to or from a criminal suspect and then intercept only those messages, capturing copies of e-mails, web site downloads and other file transfers[...] A central issue in the controversy surrounding Carnivore is whether current law permits the FBI to employ the program in the Internet context. Bureau officials claim statutory authority for deployments …


Computer Searches And Seizures: Some Unresolved Issues, Susan W. Brenner, Barbara A. Frederiksen Jun 2002

Computer Searches And Seizures: Some Unresolved Issues, Susan W. Brenner, Barbara A. Frederiksen

Michigan Telecommunications & Technology Law Review

The goal of this article is to illustrate the issues that arise in the context of computer search and seizures by examining several areas in which the application of Fourth Amendment concepts to computer searches and/or seizures can be problematic. In order to illustrate this point, the article will build on a hypothetical. The hypothetical situation assumes law enforcement officers have lawfully obtained a warrant to search for and seize evidence concerning the commission of one or more crimes. It will also be assumed that computer technology played some role in the commission of these crimes, so computer equipment and …


Carnivore, The Fbi’S E-Mail Surveillance System: Devouring Criminals, Not Privacy, Griffin S. Dunham May 2002

Carnivore, The Fbi’S E-Mail Surveillance System: Devouring Criminals, Not Privacy, Griffin S. Dunham

Federal Communications Law Journal

On July 11, 2000, the FBI intorduced Carnivore, an Internet monitoring system. It was designed, and is used exclusively, to carry out court-ordered surveillance of electronic communications. It is a tangible, portable device, tantamount to a phone tap, that allows the FBI to intercept and collect criminal suspects' e-mail without their knowledge or consent. This Note addresses competing and parallel interests between the government and society to determine the legitimacy and necessity of Carnivore. The purpose of this Note is twofold: first, to demonstrate the need for Carnivore to enable law enforcement to keep up with criminals who utilize cyberspace …


The Fourth Amendment In The Twenty-First Century: Technology, Privacy, And Human Emotions, Andrew E. Taslitz Apr 2002

The Fourth Amendment In The Twenty-First Century: Technology, Privacy, And Human Emotions, Andrew E. Taslitz

Law and Contemporary Problems

Police and local political officials in Tampa FL argued that the FaceIt system promotes safety, but privacy advocates objected to the city's recording or utilizing facial images without the victims' consent, some staging protests against the FaceIt system. Privacy objects seem to be far more widely shared than this small protest might suggest.


Rights In Conflict: The First Amendment’S Third Century, Robert M. O'Neil Apr 2002

Rights In Conflict: The First Amendment’S Third Century, Robert M. O'Neil

Law and Contemporary Problems

O'Neil has witnesses the resolution, or at least the clarification, of many free speech and press issues. There are, however, persistent issues that deserve particularly close scrutiny. Three such issues are tensions between free expression and privacy, civility, and equality.


Indecent Exposures In An Electronic Regime, Natalie L. Regoli Mar 2002

Indecent Exposures In An Electronic Regime, Natalie L. Regoli

Federal Communications Law Journal

As the topic of data privacy is vast and the subject of much scrutiny, this Comment focuses narrowly on commercial cyber-activities relating to the nonconsensual Internet acquisition of personally identifiable user data. Beginning with a brief examination of the technology that has exacerbated privacy law's inadequacies, it briefly discusses failed attempts to safeguard privacy rights through the market and federal agency management. It then addresses current U.S. privacy legislation and the 1995 European Privacy Directive. Finally, this Comment proposes the creation of a new legislative system to effectively combat the surreptitious collection, storage, use, and sale of personal data.


We Can Do This The Easy Way Or The Hard Way: The Use Of Deceit To Induce Consent Searches, Rebecca Strauss Feb 2002

We Can Do This The Easy Way Or The Hard Way: The Use Of Deceit To Induce Consent Searches, Rebecca Strauss

Michigan Law Review

In October of 1995, Aaron Salvo was studying and living at Ashland College. College officials informed local FBI agents that they suspected Salvo of possible child molestation and related conduct based on incriminating electronic mail. FBI agents approached Salvo at his dormitory, asked to speak with him in private about the suspicious mail, and suggested they speak in Salvo's dorm room. Salvo agreed to speak with the officers, but declined to do so in his room because his roommate was there, and he did not want to get anyone else involved in the embarrassing nature of the upcoming conversation. Salvo …


Stop The Presses! First Amendment Limitations Of Professional Athletes' Publicity Rights , Erika T. Olander Jan 2002

Stop The Presses! First Amendment Limitations Of Professional Athletes' Publicity Rights , Erika T. Olander

Marquette Sports Law Review

No abstract provided.


A Safety Net In The E-Marketplace: The Safe Harbor Principles Offer Comprehensive Privacy Protection Without Stopping Data Flow, William J. Kambas Jan 2002

A Safety Net In The E-Marketplace: The Safe Harbor Principles Offer Comprehensive Privacy Protection Without Stopping Data Flow, William J. Kambas

ILSA Journal of International & Comparative Law

In May of 2000, the FTC, under Chairman Robert Pitofsky, concluded that industry self-regulation was not effective in protecting consumer privacy and in a report to Congress the FTC expressed the view "that legislation [was] necessary to ensure further implementation of consumer data protection devices."


Japan's Communications Interception Act: Unconstitutional Invasion Of Privacy Or Necessary Tool?, Lillian R. Gilmer Jan 2002

Japan's Communications Interception Act: Unconstitutional Invasion Of Privacy Or Necessary Tool?, Lillian R. Gilmer

Vanderbilt Journal of Transnational Law

In August 1999, Japan became the last of the G8 nations to pass legislation to allow law enforcement to wiretap communications. For some, passage of the law was long overdue; for others, its passage marked the beginning of an impermissible government encroachment on civil rights. This Note examines Japan's Communications Interception Act, the forces in Japanese society creating the need for the law, and the reasons why the law is being challenged. Part II examines the policy behind the law, its history, and public reaction to the law. Part III presents the history of organized crime in Japan, and a …


Privacy, Eh! The Impact Of Canada's Personal Information Protection And Electronic Documents Act On Transnational Business, Juliana M. Spaeth, Mark J. Plotkin, Sandra C. Sheets Jan 2002

Privacy, Eh! The Impact Of Canada's Personal Information Protection And Electronic Documents Act On Transnational Business, Juliana M. Spaeth, Mark J. Plotkin, Sandra C. Sheets

Vanderbilt Journal of Entertainment & Technology Law

In 2002, the requirements imposed by PIPEDA will extend to encompass all personal health information. PIPEDA will ultimately extend to the collection, use, or disclosure of all personal information in the course of any commercial activity within a province in 2004. This change in Canadian law carries significant consequences for the general business practices of American companies that conduct, or may conduct, business with Canadians. It is therefore crucial for lawyers with clients collecting personal data on- and offline to familiarize themselves with its requirements in order to counsel clients effectively about their current and future obligations under this privacy …


The Push To Private Religious Expression: Are We Missing Something?, Kathleen A. Brady Jan 2002

The Push To Private Religious Expression: Are We Missing Something?, Kathleen A. Brady

Fordham Law Review

No abstract provided.


Reasonable Expectations And The Erosion Of Privacy, Shaun B. Spencer Jan 2002

Reasonable Expectations And The Erosion Of Privacy, Shaun B. Spencer

San Diego Law Review

This Article examines how the prevailing legal conception of privacy facilitates the erosion of privacy. The law generally measures privacy by reference to society’s reasonable expectation of privacy. If we think of the universe of legally private matters as a sphere, the sphere will contract or (at least in theory) expand in accordance with changing social expectations. This expectation-driven conception of privacy in effect establishes a privacy marketplace, analogous in both a literal and metaphorical sense to a marketplace of ideas. In this marketplace, societal expectations of privacy fluctuate in response to changing social practices. For this reason, privacy is …