Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2007

Privacy

Discipline
Institution
Publication
Publication Type
File Type

Articles 1 - 30 of 74

Full-Text Articles in Law

Surveillance Of Emergent Associations: Freedom Of Association In A Network Society, Katherine J. Strandburg Dec 2007

Surveillance Of Emergent Associations: Freedom Of Association In A Network Society, Katherine J. Strandburg

Katherine J. Strandburg

Recent events have combined to bring of the prospect of using communications traffic data to ferret out suspect groups and investigate their membership and structure to the forefront of debate. While such “relational surveillance” has been around for years, efforts are being made to update traffic analysis to incorporate insights from “social network analysis” -- a means of analyzing relational structures developed by sociologists.1-13 Interest in employing social network analysis for law enforcement purposes was given a huge boost after September 11, 2001 when attention focused on tracking terrorist networks.5,7,9,11,12,14-17 Traffic data, when stored, aggregated, and analyzed using sophisticated computer …


The Nanny State — It Takes A Village, Timothy Zick Oct 2007

The Nanny State — It Takes A Village, Timothy Zick

Popular Media

No abstract provided.


The Confidentiality Of Seismic Data, Michael P. Simms, Van Penick Oct 2007

The Confidentiality Of Seismic Data, Michael P. Simms, Van Penick

Dalhousie Law Journal

The authors review the common law, common contractual language and statutory law relating to the confidentiality of seismic information. The extent of the rights of the Canada-Newfoundland and Labrador and Canada-Nova Scotia Offshore Petroleum Boards to receive, use and make seismic data public is considered in light of freedom of information and protection of privacy legislation. The authors discuss the different treatment of specified user and speculative seismic data, and explore copyright.


Getting Under Your Skin--Literally: Rfid In The Employment Context, Marisa Anne Pagnattaro Sep 2007

Getting Under Your Skin--Literally: Rfid In The Employment Context, Marisa Anne Pagnattaro

marisa pagnattaro

This article explores the legal ramifications of the use of radio frequency identification chips (“RFID”) by employers. RFID is an automated data-capture technology that can be used to identify, track and store information contained on a tiny computer chip, which uses electromagnetic energy in the form of radio waves to communicate information. These chips can be implanted under an employee’s skin, worn in an employee’s clothing or in an identification badge. Part I presents a brief history of RFID, as well as novel and interesting uses in the workplace. This section also discusses security and safety concerns regarding the use …


The Risky Business Of Lifestyle Genetic Testing: Protecting Against Harmful Disclosure Of Genetic Information, Gabrielle Z. Kohlmeier Sep 2007

The Risky Business Of Lifestyle Genetic Testing: Protecting Against Harmful Disclosure Of Genetic Information, Gabrielle Z. Kohlmeier

Gabrielle Z Kohlmeier

The technological and scientific advances of nutrigenetic testing imply that the future is here, but unfortunately the legal protections are not. Nutrigenetics—the newly developing science correlating diet and genotypes—promises an easier way to escape the consequences of unhealthy lifestyles. And a large contingent of Americans, including cost-conscious employers and health insurers, are seeking such high-tech solutions. Web-based nutrigenetic testing, purportedly offering custom-tailored plans without a trip to the doctor’s office, thus captures a wide audience. The enthusiasm for nutrigenetics may obfuscate the unusual problems surrounding protection of genetic information, particularly in a market context. Upon providing genetic material, an individual …


Second Draft Of The Public's Right To Fair Use - 2007, Wendy J. Gordon Aug 2007

Second Draft Of The Public's Right To Fair Use - 2007, Wendy J. Gordon

Scholarship Chronologically

Under provocative titles like "fared use" and "the end of friction," commentators argue about whether or not the doctrine of "fair use" should exist in a world of instantaneous transactions. As collecting societies like the Copyright Clearance Center become more powerful, and technologies like the internet have made it possible to purchase digital copies by clicking a mouse, the suggestion is sometimes made that fair use could or should disappear. Courts like the Second and Sixth Circuits have flirted with foreclosing fair use if a licensing market is present or possible. The presence of 'traditional, reasonable, or likely to be …


Draft Of The Public's Right To Fair Use - 2007, Wendy J. Gordon Aug 2007

Draft Of The Public's Right To Fair Use - 2007, Wendy J. Gordon

Scholarship Chronologically

Under provocative titles like "fared use" and "the end of friction," commentators argue about whether or not the doctrine of "fair use" should exist in a world of instantaneous transactions. As collecting societies like the Copyright Clearance Center become more powerful, and technologies like the internet have made it possible to purchase digital copies by clicking a mouse, the suggestion is sometimes made that fair use could or should disappear. Courts like the Second and Sixth Circuits have flirted with foreclosing fair use if a licensing market is present or possible. The presence of 'traditional, reasonable, or likely to be …


9th Annual Open Government Summit: The Access To Public Records Act & The Open Meetings Act, 2007, Department Of Attorney General, State Of Rhode Island Aug 2007

9th Annual Open Government Summit: The Access To Public Records Act & The Open Meetings Act, 2007, Department Of Attorney General, State Of Rhode Island

School of Law Conferences, Lectures & Events

No abstract provided.


Immunity From The Focused Attention Of Others: A Conceptual And Normative Model Of Personal And Legal Privacy, Jeffery L. Johnson Aug 2007

Immunity From The Focused Attention Of Others: A Conceptual And Normative Model Of Personal And Legal Privacy, Jeffery L. Johnson

Jeffery L Johnson

The article defends an analysis of privacy as those areas of a person’s life where s/he is entitled to immunity from the illegitimate focused attention of others. It goes on to argue that such a model encompasses the concept of privacy in colloquial and legal contexts. The article concludes with an analysis of the normative value of privacy.


Property, Persona, And Publicity, Deven R. Desai Aug 2007

Property, Persona, And Publicity, Deven R. Desai

Deven R. Desai

This article focuses on two interconnected problems posed by the growth of online creation. First, unlike analog creations, important digital creations such as emails are mediated and controlled by second parties. Thus although these creations are core intellectual property, they are not treated as such and service providers terminate or deny access to people’s property all the time. In addition, when one dies, some service providers refuse to grant heirs access to this property. The uneven and unclear management of these creations means that historians and society in general will lose access to perhaps the greatest chronicling of human experience …


Domestic Security And Maintenance Of Liberty: Striking The Balance, Paul Mchale Aug 2007

Domestic Security And Maintenance Of Liberty: Striking The Balance, Paul Mchale

International Law Studies

No abstract provided.


Second Class For The Second Time: How The Commercial Speech Doctrine Stigmatizes Commercial Use Of Aggregated Public Records, Brian N. Larson, Genelle I. Belmas Jul 2007

Second Class For The Second Time: How The Commercial Speech Doctrine Stigmatizes Commercial Use Of Aggregated Public Records, Brian N. Larson, Genelle I. Belmas

Faculty Scholarship

This Article argues that access to aggregated electronic public records for commercial use should receive protection under the First Amendment in the same measure as the speech acts the access supports. In other words, we view commercial access to aggregated public records as an essential means to valuable speech. For many, however, the taint of the commercial speech doctrine is turning all “information flows” into commercial ones. This, in turn, is threatening the access to government records.


Draft Of Fair Use And Face-To-Face Bargaining - 2007, Wendy J. Gordon Jun 2007

Draft Of Fair Use And Face-To-Face Bargaining - 2007, Wendy J. Gordon

Scholarship Chronologically

Alex has a ten-year-old cassette of a favorite movie. Unfortunately, she does not have a video cassette player. She wants to copy the movie onto her iPod. To do this, she borrows a VCR from a friend, runs a cable to a video capture port on my computer, reformats the file into something the iPod can read, and sends the file to the iPod, which she will use to watch the movie in the future. After the file is securely on the iPod, she will delete all records of the movie from my computer. Destroy the original VHS copy seems …


A Balancing Act Between Crime Prevention And Privacy Protection, Marcel Stuessi Jun 2007

A Balancing Act Between Crime Prevention And Privacy Protection, Marcel Stuessi

Marcel Stüssi

How should individuals who live their lives with complete integrity, enjoy family harmony and pursue an honourable occupation be unmasked as potential, internationally operating terrorists and perpetrators of other serious crimes if not by secretly listening to their telephone calls, opening and reading the content of their letters or e-mail messages, and exchanging that data across frontiers and between Governments?

As pointed out in Part VII, Paragraph 1.4 to 1.6, this dilemma becomes apparent when considering the State’s duty to prevent terrorism and serious crime on the one hand, and have respect for privacy and individual liberties on the other. …


Sox And Whistleblowing, Terry Morehead Dworkin Jun 2007

Sox And Whistleblowing, Terry Morehead Dworkin

Michigan Law Review

The language of the Sarbanes-Oxley Act ("SOX") leaves no doubt that Congress intended whistleblowing to be an integral part of its enforcement mechanisms. The Act attempts to encourage and protect whistleblowers in a variety of ways, including providing for anonymous whistleblowing, establishing criminal penalties for retaliation against whistleblowers, and clearly defining whistleblowing channels. Unfortunately, these provisions give the illusion of protection for whistleblowers without effectively providing it. There is increasing evidence that virtually no whistleblower who has suffered retaliation and pursued remedies under SOX has been successful. Additionally, social science research and studies of whistleblowing laws indicate that SOX is …


A Copyright Conundrum: Protecting Email Privacy, Ned Snow Apr 2007

A Copyright Conundrum: Protecting Email Privacy, Ned Snow

Faculty Publications

The practice of email forwarding deprives email senders of privacy. Expression meant for only a specific recipient often finds its way into myriad inboxes or onto a public website, exposed for all to see. Simply by clicking the "forward" button, email recipients routinely strip email senders of expressive privacy. The common law condemns such conduct. Beginning over two-hundred-fifty years ago, courts recognized that authors of personal correspondence hold property rights in their expression. Under common-law copyright, authors held a right to control whether their correspondence was published to third parties. This common-law protection of private expression was nearly absolute, immune …


The Nsa Phone Call Database: The Problematic Acquisition And Mining Of Call Records In The United States, Canada, The United Kingdom, And Australia, Andrew P. Macarthur Apr 2007

The Nsa Phone Call Database: The Problematic Acquisition And Mining Of Call Records In The United States, Canada, The United Kingdom, And Australia, Andrew P. Macarthur

Duke Journal of Comparative & International Law

No abstract provided.


Mission Creep: Public Health Surveillance And Medical Privacy, Wendy K. Mariner Apr 2007

Mission Creep: Public Health Surveillance And Medical Privacy, Wendy K. Mariner

Faculty Scholarship

The National Security Agency's domestic surveillance program has parallels in the growth of disease surveillance for public health purposes. This article explores whether laws requiring health providers to report to government names and identifiable information about patients with infectious or chronic diseases may be vulnerable to challenge as an invasion of privacy. A shift in the use of disease surveillance data from investigating disease outbreaks to data mining and analysis for research, budgeting, and policy planning, as well as bioterrorism, tests the boundaries of liberty and privacy. The Supreme Court has not reviewed a disease reporting law. Its few related …


Nevada Needs A Privacy Act: How Nevadans Are Particularly At Risk For Identity Theft, Amy S. Scarborough Mar 2007

Nevada Needs A Privacy Act: How Nevadans Are Particularly At Risk For Identity Theft, Amy S. Scarborough

Nevada Law Journal

No abstract provided.


Data Protection, Breach Notification, And The Interplay Between State And Federal Law: The Experiments Need More Time, Flora J. Garcia Mar 2007

Data Protection, Breach Notification, And The Interplay Between State And Federal Law: The Experiments Need More Time, Flora J. Garcia

Fordham Intellectual Property, Media and Entertainment Law Journal

No abstract provided.


Letting Katz Out Of The Bag: Cognitive Freedom And Fourth Amendment Fidelity, Christian Halliburton Feb 2007

Letting Katz Out Of The Bag: Cognitive Freedom And Fourth Amendment Fidelity, Christian Halliburton

Erin Espedal

Emerging surveillance technologies now allow operators to collect information located within the brain of an individual, allow the collection of forensic evidence regarding cerebral and cognitive processes, and are even beginning to be able to predict human intentions. While science has not yet produced a mind-reading machine per se, the devices referred to as “cognitive camera technologies” are substantial steps in the direction of that inevitable result. One such technique, a proprietary method called Brain Fingerprinting, is used as an example of the strong trend towards increasingly invasive and ever more powerful surveillance methods, and provides an entrée to a …


Online Privacy Policies: Contracting Away Control Over Personal Information?, Allyson W. Haynes Feb 2007

Online Privacy Policies: Contracting Away Control Over Personal Information?, Allyson W. Haynes

Allyson Haynes Stuart

Individuals disclose personal information to websites in the course of everyday transactions. The treatment of that personal information is of great importance, as highlighted by the recent spate of data breaches and the surge in identity theft. When websites share such personal information with third parties, the threat of its use for illegal purposes increases. The current law allows website companies to protect themselves from liability for sharing or selling visitors’ personal information to third parties by focusing on disclosures in privacy policies, not on substantive treatment of personal information. Because of the low likelihood that a visitor will read …


Hudson And Samson: The Roberts Court Confronts Privacy, Dignity, And The Fourth Amendment, John D. Castiglione Feb 2007

Hudson And Samson: The Roberts Court Confronts Privacy, Dignity, And The Fourth Amendment, John D. Castiglione

ExpressO

This article critically analyzes Samson v. California and Hudson v. Michigan, which were the Roberts Court's first major Fourth Amendment decisions. In Samson, the Court upheld a California law allowing government officials to search parolees without any suspicion of wrongdoing. In Hudson, to the surprise of almost every observer, the Court held that knock-and-announce violations do not carry with them a remedy of exclusion. What was most notable about Hudson was not only that it rejected what every state and every federal court, save one, believed to be the proper remedy for knock-and-announce violations, but that it called into question …


Newsgathering In Light Of Hipaa, Alexander A. Boni-Saenz Feb 2007

Newsgathering In Light Of Hipaa, Alexander A. Boni-Saenz

All Faculty Scholarship

This short piece examines the interaction between the Health Insurance Portability and Accountability Act (HIPAA), a federal law designed to protect the privacy of individuals’ health information, and state Freedom of Information (FOI) laws, which are designed to ensure public access to government documents. It describes three recent cases from different states that addressed difficult issues about where and how to draw the line between the public’s right to know and individuals’ rights to keep their medical information secret. It concludes that questions about the interaction of state FOI laws and HIPAA should be guided by the framework suggested in …


Standing Room Only: Why Fourth Amendment Exclusion And Standing Can No Longer Logically Coexist, Sherry F. Colb Feb 2007

Standing Room Only: Why Fourth Amendment Exclusion And Standing Can No Longer Logically Coexist, Sherry F. Colb

Cornell Law Faculty Publications

No abstract provided.


Constitutional Etiquette And The Fate Of "Supreme Court Tv", Bruce Peabody Jan 2007

Constitutional Etiquette And The Fate Of "Supreme Court Tv", Bruce Peabody

Michigan Law Review First Impressions

In traditional media outlets, on the Internet, and throughout the halls of Congress, debate about whether the Supreme Court should be required to televise its public proceedings is becoming more audible and focused. To date, these discussions have included such topics as the potential effects of broadcasting the Court, the constitutionality of Senator Arlen Specter’s current congressional initiative, S. 344, and how the public would use or abuse televised sessions of our highest tribunal.


The Right Legislation For The Wrong Reasons, Tony Mauro Jan 2007

The Right Legislation For The Wrong Reasons, Tony Mauro

Michigan Law Review First Impressions

Senator Arlen Specter took a bold and long-overdue step on January 22, 2007, when he introduced legislation that would require the Supreme Court to allow television coverage of its proceedings. But instead of making his case with a straightforward appeal to the public’s right to know, Specter has introduced arguments in favor of his bill that seem destined to antagonize the Court, drive it into the shadows, or both. Chances of passage might improve if Specter adjusts his tactics.


Biometrics: Weighing Convenience And National Security Against Your Privacy, Lauren D. Adkins Jan 2007

Biometrics: Weighing Convenience And National Security Against Your Privacy, Lauren D. Adkins

Michigan Telecommunications & Technology Law Review

The biometric identifier relies on an individual's unique biological information such as a hand, iris, fingerprint, facial or voice print. When used for verification purposes, a "one-to-one" match is generated in under one second. Biometric technology can substantially improve national security by identifying and verifying individuals in a number of different contexts, providing security in ways that exceed current identification technology and limiting access to areas where security breaches are especially high, such as airport tarmacs and critical infrastructure facilities. At the same time, a legitimate public concern exists concerning the misuse of biometric technology to invade or violate personal …


Birth Certificates, Elizabeth Samuels Jan 2007

Birth Certificates, Elizabeth Samuels

All Faculty Scholarship

Birth certificates in the United States, which are issued by the states, have two different sections, and each section involves different privacy concerns. The first section, the legal record of birth, is always available to the adult whose birth it registers; access by other persons varies widely from state to state, ranging from a short list of specified relatives to the public at large. The second section of the certificate - which records health and medical information about the parents, the birth, and the infant - is used only for data collection and analysis, under regulations that protect the privacy …


Immunity From The Focused Attention Of Others: A Conceptual And Normative Model Of Personal And Legal Privacy, Jeffrey L. Johnson Jan 2007

Immunity From The Focused Attention Of Others: A Conceptual And Normative Model Of Personal And Legal Privacy, Jeffrey L. Johnson

Florida A & M University Law Review

No abstract provided.