Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Privacy (5)
- Accountability (1)
- Credit files (1)
- Credit reporting agencies (1)
- Credit reporting system (1)
-
- Doctor-patient relationship (1)
- Electronic mail (1)
- Electronic records (1)
- Email (1)
- FERPA (1)
- Fair Credit Reporting Act (1)
- Foreign students (1)
- HIPAA (1)
- Human identification (1)
- Identification (1)
- Identity (1)
- Identity theft (1)
- Medical records (1)
- Miranda (1)
- Password (1)
- Patient confidentiality (1)
- Philosophy (1)
- Physician-patient relationship (1)
- Police interrogations (1)
- Public Identity System (1)
- Public identity (1)
- Sixth Amendment (1)
- Social security numbers (1)
- Solove (1)
- Stalking (1)
Articles 1 - 12 of 12
Full-Text Articles in Law
Justice White And The Right Of Privacy, David D. Meyer
Justice White And The Right Of Privacy, David D. Meyer
Faculty Scholarship
No abstract provided.
Muddy Property: Generating And Protecting Information Privacy Norms In Bankruptcy, Edward J. Janger
Muddy Property: Generating And Protecting Information Privacy Norms In Bankruptcy, Edward J. Janger
Faculty Scholarship
No abstract provided.
Privacy Property, Information Costs, And The Anticommons, Edward J. Janger
Privacy Property, Information Costs, And The Anticommons, Edward J. Janger
Faculty Scholarship
No abstract provided.
Privacy Property, Information Costs And The Anticommons, Edward J. Janger
Privacy Property, Information Costs And The Anticommons, Edward J. Janger
Faculty Scholarship
No abstract provided.
Privacy As A Legal Principle Of Identity Maintenance, Jonathan Kahn
Privacy As A Legal Principle Of Identity Maintenance, Jonathan Kahn
Faculty Scholarship
This article considers how existing literature on privacy recognizes, constructs and otherwise implicates something the Anglo-American legal tradition recognizes as 'identity'. Integral to this concern is approaching privacy as a regulative principle for constructing and managing relations between the individual and three primary spheres of engagement: society, the market, and the state. Contemporary analyses of privacy tend to concentrate of how privacy protects the individual from state tyranny or the prying eyes of social busy bodies. Much less attention has been paid, however, to privacy as a principle for demarcating a space beyond the reach of market forces. As privacy …
Ferpa And The Immigration And Naturalization Service: A Guide For University Counsel On Federal Rules For Collecting, Maintaining And Releasing Information About Foreign Students, Laura A.W. Khatcheressian
Ferpa And The Immigration And Naturalization Service: A Guide For University Counsel On Federal Rules For Collecting, Maintaining And Releasing Information About Foreign Students, Laura A.W. Khatcheressian
Law Faculty Publications
The devastating terrorist attacks against the United States on September 11, 2001, destroyed the World Trade Center in New York City, badly damaged the Pentagon, and took the lives of thousands of individuals. As more details became available about the terrorists who hijacked four U.S. planes to carry out these deadly attacks, universities around the U.S. struggled with the news that several of the hijackers had entered the U.S. on, or had later applied for, "student" visas. University officials began to grapple with new questions presented by these attacks: What responsibilities do the universities have to report foreign students who …
Toward Taping, Christopher Slobogin
Toward Taping, Christopher Slobogin
Vanderbilt Law School Faculty Publications
Numerous authors, from all points on the political spectrum, have advocated that police interrogations be taped. But police rarely record custodial questioning, at least in full, and only a handful of courts have found this failure objectionable. This commentary outlines three different constitutional grounds for mandating that such recording become a routine practice. To set up the constitutional argument, the article first outlines why taping is needed despite the elaborate rules that now govern interrogation. Put simply, the reasoning is as follows: the Miranda regime has failed, voluntariness should once again be the focal point of interrogation regulation, and taping …
Message Deleted? Resolving Physician-Patient E-Mail Through Contract Law, Michael Mccann
Message Deleted? Resolving Physician-Patient E-Mail Through Contract Law, Michael Mccann
Law Faculty Scholarship
This article examines the impact of e-mail on the physician-patient relationship, and how contract law can resolve the uncertainties incumbent in this nascent form of communication. Significantly, courts have yet to indicate when the physician-patient relationship begins by e-mail, or to what extent e-mail affects the duties of the relationship. Instead of waiting for judicial guidance, physicians and patients can employ specialized contracts to clarify the role that e-mail plays in their relationship. As a result, more physicians and patients will regard e-mail correspondence as a valuable means of communication, and a tool for improving the quality of health care …
The Ninth Circuit’S Invasion Of The Tort Of Invasion Of Privacy, Harvey L. Zuckman
The Ninth Circuit’S Invasion Of The Tort Of Invasion Of Privacy, Harvey L. Zuckman
Scholarly Articles
The tort of invasion of privacy has had a short but tortuous development made even more tortuous by a number of recent rulings by the United States Court of Appeals for the Ninth Circuit. This common law tort does not begin with the normal judicial iterations that created and sculpted other torts. Rather, it began life as a law review article prompted by personal pique.
Privacy Isn't Everything: Accountability As A Personal And Social Good, Anita L. Allen
Privacy Isn't Everything: Accountability As A Personal And Social Good, Anita L. Allen
All Faculty Scholarship
No abstract provided.
Did Privacy Cause Identity Theft?, Lynn M. Lopucki
Did Privacy Cause Identity Theft?, Lynn M. Lopucki
UF Law Faculty Publications
This essay argues that the decline of public identities over the past three decades, combined with increasing secrecy in the process of identification, is the root cause of the burgeoning problem of identity theft. Identity theft is easy because impersonation increasingly takes place in private transactions that are invisible to the victim. The essay compares two proposed solutions: Professor Daniel Soloves' architectural approach and the author's Public Identity System. Both would make the identification process transparent to the person identified, put imposters at risk by requiring personal appearances, and ban the use of social security numbers as passwords. But the …
Public Area Surveillance And Police Work: The Impact Of Cctv On Police Behaviour And Autonomy, Benjamin J. Goold
Public Area Surveillance And Police Work: The Impact Of Cctv On Police Behaviour And Autonomy, Benjamin J. Goold
All Faculty Publications
Drawing on a recent study of the impact of closed circuit television (CCTV) cameras on policing practices in a large English police force, this paper considers whether the presence of surveillance cameras affects the working attitudes and behaviour of individual police officers. In particular, this paper asks whether CCTV makes the police more accountable or more cautious in the exercise of their discretion in public spaces. Although noting that in certain circumstances CCTV may inadvertently help to reduce incidences of police misconduct, this paper concludes by arguing that more needs to be done to prevent the police from interfering with …