Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Privacy Law (19)
- Constitutional Law (10)
- Intellectual Property Law (9)
- Fourth Amendment (7)
- Internet Law (7)
-
- Science and Technology Law (7)
- First Amendment (6)
- Civil Rights and Discrimination (5)
- Criminal Procedure (5)
- Health Law and Policy (4)
- National Security Law (4)
- Supreme Court of the United States (4)
- Administrative Law (3)
- Communications Law (3)
- Criminal Law (3)
- International Law (3)
- Labor and Employment Law (3)
- Law and Society (3)
- Legislation (3)
- Comparative and Foreign Law (2)
- Evidence (2)
- Family Law (2)
- International Trade Law (2)
- Juvenile Law (2)
- Law and Economics (2)
- State and Local Government Law (2)
- Torts (2)
- Architecture (1)
- Business Organizations Law (1)
- Institution
-
- Selected Works (10)
- SelectedWorks (8)
- University of Michigan Law School (8)
- Boston University School of Law (7)
- George Washington University Law School (4)
-
- University of Maryland Francis King Carey School of Law (3)
- Vanderbilt University Law School (3)
- Duke Law (2)
- Fordham Law School (2)
- Nova Southeastern University (2)
- Schulich School of Law, Dalhousie University (2)
- BLR (1)
- Case Western Reserve University School of Law (1)
- Chicago-Kent College of Law (1)
- Cleveland State University (1)
- Cornell University Law School (1)
- Florida A&M University College of Law (1)
- Marquette University Law School (1)
- Northwestern Pritzker School of Law (1)
- Penn State Law (1)
- Roger Williams University (1)
- Seattle University School of Law (1)
- Texas A&M University School of Law (1)
- The University of San Francisco (1)
- U.S. Naval War College (1)
- University of Baltimore Law (1)
- University of Colorado Law School (1)
- University of Kentucky (1)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (1)
- University of Oklahoma College of Law (1)
- Publication
-
- Faculty Scholarship (7)
- GW Law Faculty Publications & Other Works (4)
- Michigan Law Review First Impressions (3)
- Robert Sprague (3)
- Scholarship Chronologically (3)
-
- All Faculty Scholarship (2)
- Faculty Publications (2)
- ILSA Journal of International & Comparative Law (2)
- Jean HERVEG (2)
- Journal Articles (2)
- Stephen E Henderson (2)
- Allyson Haynes Stuart (1)
- Amien Kacou (1)
- Book Chapters (1)
- Canadian Journal of Law and Technology (1)
- Cleveland State Law Review (1)
- College of Law Faculty Scholarship (1)
- Cornell Law Faculty Publications (1)
- Dalhousie Law Journal (1)
- Deven R. Desai (1)
- Duke Journal of Comparative & International Law (1)
- Duke Journal of Gender Law & Policy (1)
- Erin Espedal (1)
- ExpressO (1)
- Florida A & M University Law Review (1)
- Fordham Intellectual Property, Media and Entertainment Law Journal (1)
- Fordham Urban Law Journal (1)
- Gabrielle Z Kohlmeier (1)
- International Law Studies (1)
- Jeffery L Johnson (1)
- Publication Type
- File Type
Articles 1 - 30 of 74
Full-Text Articles in Law
Surveillance Of Emergent Associations: Freedom Of Association In A Network Society, Katherine J. Strandburg
Surveillance Of Emergent Associations: Freedom Of Association In A Network Society, Katherine J. Strandburg
Katherine J. Strandburg
Recent events have combined to bring of the prospect of using communications traffic data to ferret out suspect groups and investigate their membership and structure to the forefront of debate. While such “relational surveillance” has been around for years, efforts are being made to update traffic analysis to incorporate insights from “social network analysis” -- a means of analyzing relational structures developed by sociologists.1-13 Interest in employing social network analysis for law enforcement purposes was given a huge boost after September 11, 2001 when attention focused on tracking terrorist networks.5,7,9,11,12,14-17 Traffic data, when stored, aggregated, and analyzed using sophisticated computer …
The Nanny State — It Takes A Village, Timothy Zick
The Nanny State — It Takes A Village, Timothy Zick
Popular Media
No abstract provided.
The Confidentiality Of Seismic Data, Michael P. Simms, Van Penick
The Confidentiality Of Seismic Data, Michael P. Simms, Van Penick
Dalhousie Law Journal
The authors review the common law, common contractual language and statutory law relating to the confidentiality of seismic information. The extent of the rights of the Canada-Newfoundland and Labrador and Canada-Nova Scotia Offshore Petroleum Boards to receive, use and make seismic data public is considered in light of freedom of information and protection of privacy legislation. The authors discuss the different treatment of specified user and speculative seismic data, and explore copyright.
Getting Under Your Skin--Literally: Rfid In The Employment Context, Marisa Anne Pagnattaro
Getting Under Your Skin--Literally: Rfid In The Employment Context, Marisa Anne Pagnattaro
marisa pagnattaro
This article explores the legal ramifications of the use of radio frequency identification chips (“RFID”) by employers. RFID is an automated data-capture technology that can be used to identify, track and store information contained on a tiny computer chip, which uses electromagnetic energy in the form of radio waves to communicate information. These chips can be implanted under an employee’s skin, worn in an employee’s clothing or in an identification badge. Part I presents a brief history of RFID, as well as novel and interesting uses in the workplace. This section also discusses security and safety concerns regarding the use …
The Risky Business Of Lifestyle Genetic Testing: Protecting Against Harmful Disclosure Of Genetic Information, Gabrielle Z. Kohlmeier
The Risky Business Of Lifestyle Genetic Testing: Protecting Against Harmful Disclosure Of Genetic Information, Gabrielle Z. Kohlmeier
Gabrielle Z Kohlmeier
The technological and scientific advances of nutrigenetic testing imply that the future is here, but unfortunately the legal protections are not. Nutrigenetics—the newly developing science correlating diet and genotypes—promises an easier way to escape the consequences of unhealthy lifestyles. And a large contingent of Americans, including cost-conscious employers and health insurers, are seeking such high-tech solutions. Web-based nutrigenetic testing, purportedly offering custom-tailored plans without a trip to the doctor’s office, thus captures a wide audience. The enthusiasm for nutrigenetics may obfuscate the unusual problems surrounding protection of genetic information, particularly in a market context. Upon providing genetic material, an individual …
Second Draft Of The Public's Right To Fair Use - 2007, Wendy J. Gordon
Second Draft Of The Public's Right To Fair Use - 2007, Wendy J. Gordon
Scholarship Chronologically
Under provocative titles like "fared use" and "the end of friction," commentators argue about whether or not the doctrine of "fair use" should exist in a world of instantaneous transactions. As collecting societies like the Copyright Clearance Center become more powerful, and technologies like the internet have made it possible to purchase digital copies by clicking a mouse, the suggestion is sometimes made that fair use could or should disappear. Courts like the Second and Sixth Circuits have flirted with foreclosing fair use if a licensing market is present or possible. The presence of 'traditional, reasonable, or likely to be …
Draft Of The Public's Right To Fair Use - 2007, Wendy J. Gordon
Draft Of The Public's Right To Fair Use - 2007, Wendy J. Gordon
Scholarship Chronologically
Under provocative titles like "fared use" and "the end of friction," commentators argue about whether or not the doctrine of "fair use" should exist in a world of instantaneous transactions. As collecting societies like the Copyright Clearance Center become more powerful, and technologies like the internet have made it possible to purchase digital copies by clicking a mouse, the suggestion is sometimes made that fair use could or should disappear. Courts like the Second and Sixth Circuits have flirted with foreclosing fair use if a licensing market is present or possible. The presence of 'traditional, reasonable, or likely to be …
9th Annual Open Government Summit: The Access To Public Records Act & The Open Meetings Act, 2007, Department Of Attorney General, State Of Rhode Island
9th Annual Open Government Summit: The Access To Public Records Act & The Open Meetings Act, 2007, Department Of Attorney General, State Of Rhode Island
School of Law Conferences, Lectures & Events
No abstract provided.
Immunity From The Focused Attention Of Others: A Conceptual And Normative Model Of Personal And Legal Privacy, Jeffery L. Johnson
Immunity From The Focused Attention Of Others: A Conceptual And Normative Model Of Personal And Legal Privacy, Jeffery L. Johnson
Jeffery L Johnson
The article defends an analysis of privacy as those areas of a person’s life where s/he is entitled to immunity from the illegitimate focused attention of others. It goes on to argue that such a model encompasses the concept of privacy in colloquial and legal contexts. The article concludes with an analysis of the normative value of privacy.
Property, Persona, And Publicity, Deven R. Desai
Property, Persona, And Publicity, Deven R. Desai
Deven R. Desai
This article focuses on two interconnected problems posed by the growth of online creation. First, unlike analog creations, important digital creations such as emails are mediated and controlled by second parties. Thus although these creations are core intellectual property, they are not treated as such and service providers terminate or deny access to people’s property all the time. In addition, when one dies, some service providers refuse to grant heirs access to this property. The uneven and unclear management of these creations means that historians and society in general will lose access to perhaps the greatest chronicling of human experience …
Domestic Security And Maintenance Of Liberty: Striking The Balance, Paul Mchale
Domestic Security And Maintenance Of Liberty: Striking The Balance, Paul Mchale
International Law Studies
No abstract provided.
Second Class For The Second Time: How The Commercial Speech Doctrine Stigmatizes Commercial Use Of Aggregated Public Records, Brian N. Larson, Genelle I. Belmas
Second Class For The Second Time: How The Commercial Speech Doctrine Stigmatizes Commercial Use Of Aggregated Public Records, Brian N. Larson, Genelle I. Belmas
Faculty Scholarship
This Article argues that access to aggregated electronic public records for commercial use should receive protection under the First Amendment in the same measure as the speech acts the access supports. In other words, we view commercial access to aggregated public records as an essential means to valuable speech. For many, however, the taint of the commercial speech doctrine is turning all “information flows” into commercial ones. This, in turn, is threatening the access to government records.
Draft Of Fair Use And Face-To-Face Bargaining - 2007, Wendy J. Gordon
Draft Of Fair Use And Face-To-Face Bargaining - 2007, Wendy J. Gordon
Scholarship Chronologically
Alex has a ten-year-old cassette of a favorite movie. Unfortunately, she does not have a video cassette player. She wants to copy the movie onto her iPod. To do this, she borrows a VCR from a friend, runs a cable to a video capture port on my computer, reformats the file into something the iPod can read, and sends the file to the iPod, which she will use to watch the movie in the future. After the file is securely on the iPod, she will delete all records of the movie from my computer. Destroy the original VHS copy seems …
A Balancing Act Between Crime Prevention And Privacy Protection, Marcel Stuessi
A Balancing Act Between Crime Prevention And Privacy Protection, Marcel Stuessi
Marcel Stüssi
How should individuals who live their lives with complete integrity, enjoy family harmony and pursue an honourable occupation be unmasked as potential, internationally operating terrorists and perpetrators of other serious crimes if not by secretly listening to their telephone calls, opening and reading the content of their letters or e-mail messages, and exchanging that data across frontiers and between Governments?
As pointed out in Part VII, Paragraph 1.4 to 1.6, this dilemma becomes apparent when considering the State’s duty to prevent terrorism and serious crime on the one hand, and have respect for privacy and individual liberties on the other. …
Sox And Whistleblowing, Terry Morehead Dworkin
Sox And Whistleblowing, Terry Morehead Dworkin
Michigan Law Review
The language of the Sarbanes-Oxley Act ("SOX") leaves no doubt that Congress intended whistleblowing to be an integral part of its enforcement mechanisms. The Act attempts to encourage and protect whistleblowers in a variety of ways, including providing for anonymous whistleblowing, establishing criminal penalties for retaliation against whistleblowers, and clearly defining whistleblowing channels. Unfortunately, these provisions give the illusion of protection for whistleblowers without effectively providing it. There is increasing evidence that virtually no whistleblower who has suffered retaliation and pursued remedies under SOX has been successful. Additionally, social science research and studies of whistleblowing laws indicate that SOX is …
A Copyright Conundrum: Protecting Email Privacy, Ned Snow
A Copyright Conundrum: Protecting Email Privacy, Ned Snow
Faculty Publications
The practice of email forwarding deprives email senders of privacy. Expression meant for only a specific recipient often finds its way into myriad inboxes or onto a public website, exposed for all to see. Simply by clicking the "forward" button, email recipients routinely strip email senders of expressive privacy. The common law condemns such conduct. Beginning over two-hundred-fifty years ago, courts recognized that authors of personal correspondence hold property rights in their expression. Under common-law copyright, authors held a right to control whether their correspondence was published to third parties. This common-law protection of private expression was nearly absolute, immune …
The Nsa Phone Call Database: The Problematic Acquisition And Mining Of Call Records In The United States, Canada, The United Kingdom, And Australia, Andrew P. Macarthur
The Nsa Phone Call Database: The Problematic Acquisition And Mining Of Call Records In The United States, Canada, The United Kingdom, And Australia, Andrew P. Macarthur
Duke Journal of Comparative & International Law
No abstract provided.
Mission Creep: Public Health Surveillance And Medical Privacy, Wendy K. Mariner
Mission Creep: Public Health Surveillance And Medical Privacy, Wendy K. Mariner
Faculty Scholarship
The National Security Agency's domestic surveillance program has parallels in the growth of disease surveillance for public health purposes. This article explores whether laws requiring health providers to report to government names and identifiable information about patients with infectious or chronic diseases may be vulnerable to challenge as an invasion of privacy. A shift in the use of disease surveillance data from investigating disease outbreaks to data mining and analysis for research, budgeting, and policy planning, as well as bioterrorism, tests the boundaries of liberty and privacy. The Supreme Court has not reviewed a disease reporting law. Its few related …
Nevada Needs A Privacy Act: How Nevadans Are Particularly At Risk For Identity Theft, Amy S. Scarborough
Nevada Needs A Privacy Act: How Nevadans Are Particularly At Risk For Identity Theft, Amy S. Scarborough
Nevada Law Journal
No abstract provided.
Data Protection, Breach Notification, And The Interplay Between State And Federal Law: The Experiments Need More Time, Flora J. Garcia
Data Protection, Breach Notification, And The Interplay Between State And Federal Law: The Experiments Need More Time, Flora J. Garcia
Fordham Intellectual Property, Media and Entertainment Law Journal
No abstract provided.
Letting Katz Out Of The Bag: Cognitive Freedom And Fourth Amendment Fidelity, Christian Halliburton
Letting Katz Out Of The Bag: Cognitive Freedom And Fourth Amendment Fidelity, Christian Halliburton
Erin Espedal
Emerging surveillance technologies now allow operators to collect information located within the brain of an individual, allow the collection of forensic evidence regarding cerebral and cognitive processes, and are even beginning to be able to predict human intentions. While science has not yet produced a mind-reading machine per se, the devices referred to as “cognitive camera technologies” are substantial steps in the direction of that inevitable result. One such technique, a proprietary method called Brain Fingerprinting, is used as an example of the strong trend towards increasingly invasive and ever more powerful surveillance methods, and provides an entrée to a …
Online Privacy Policies: Contracting Away Control Over Personal Information?, Allyson W. Haynes
Online Privacy Policies: Contracting Away Control Over Personal Information?, Allyson W. Haynes
Allyson Haynes Stuart
Individuals disclose personal information to websites in the course of everyday transactions. The treatment of that personal information is of great importance, as highlighted by the recent spate of data breaches and the surge in identity theft. When websites share such personal information with third parties, the threat of its use for illegal purposes increases. The current law allows website companies to protect themselves from liability for sharing or selling visitors’ personal information to third parties by focusing on disclosures in privacy policies, not on substantive treatment of personal information. Because of the low likelihood that a visitor will read …
Hudson And Samson: The Roberts Court Confronts Privacy, Dignity, And The Fourth Amendment, John D. Castiglione
Hudson And Samson: The Roberts Court Confronts Privacy, Dignity, And The Fourth Amendment, John D. Castiglione
ExpressO
This article critically analyzes Samson v. California and Hudson v. Michigan, which were the Roberts Court's first major Fourth Amendment decisions. In Samson, the Court upheld a California law allowing government officials to search parolees without any suspicion of wrongdoing. In Hudson, to the surprise of almost every observer, the Court held that knock-and-announce violations do not carry with them a remedy of exclusion. What was most notable about Hudson was not only that it rejected what every state and every federal court, save one, believed to be the proper remedy for knock-and-announce violations, but that it called into question …
Newsgathering In Light Of Hipaa, Alexander A. Boni-Saenz
Newsgathering In Light Of Hipaa, Alexander A. Boni-Saenz
All Faculty Scholarship
This short piece examines the interaction between the Health Insurance Portability and Accountability Act (HIPAA), a federal law designed to protect the privacy of individuals’ health information, and state Freedom of Information (FOI) laws, which are designed to ensure public access to government documents. It describes three recent cases from different states that addressed difficult issues about where and how to draw the line between the public’s right to know and individuals’ rights to keep their medical information secret. It concludes that questions about the interaction of state FOI laws and HIPAA should be guided by the framework suggested in …
Standing Room Only: Why Fourth Amendment Exclusion And Standing Can No Longer Logically Coexist, Sherry F. Colb
Standing Room Only: Why Fourth Amendment Exclusion And Standing Can No Longer Logically Coexist, Sherry F. Colb
Cornell Law Faculty Publications
No abstract provided.
Constitutional Etiquette And The Fate Of "Supreme Court Tv", Bruce Peabody
Constitutional Etiquette And The Fate Of "Supreme Court Tv", Bruce Peabody
Michigan Law Review First Impressions
In traditional media outlets, on the Internet, and throughout the halls of Congress, debate about whether the Supreme Court should be required to televise its public proceedings is becoming more audible and focused. To date, these discussions have included such topics as the potential effects of broadcasting the Court, the constitutionality of Senator Arlen Specter’s current congressional initiative, S. 344, and how the public would use or abuse televised sessions of our highest tribunal.
The Right Legislation For The Wrong Reasons, Tony Mauro
The Right Legislation For The Wrong Reasons, Tony Mauro
Michigan Law Review First Impressions
Senator Arlen Specter took a bold and long-overdue step on January 22, 2007, when he introduced legislation that would require the Supreme Court to allow television coverage of its proceedings. But instead of making his case with a straightforward appeal to the public’s right to know, Specter has introduced arguments in favor of his bill that seem destined to antagonize the Court, drive it into the shadows, or both. Chances of passage might improve if Specter adjusts his tactics.
Biometrics: Weighing Convenience And National Security Against Your Privacy, Lauren D. Adkins
Biometrics: Weighing Convenience And National Security Against Your Privacy, Lauren D. Adkins
Michigan Telecommunications & Technology Law Review
The biometric identifier relies on an individual's unique biological information such as a hand, iris, fingerprint, facial or voice print. When used for verification purposes, a "one-to-one" match is generated in under one second. Biometric technology can substantially improve national security by identifying and verifying individuals in a number of different contexts, providing security in ways that exceed current identification technology and limiting access to areas where security breaches are especially high, such as airport tarmacs and critical infrastructure facilities. At the same time, a legitimate public concern exists concerning the misuse of biometric technology to invade or violate personal …
Birth Certificates, Elizabeth Samuels
Birth Certificates, Elizabeth Samuels
All Faculty Scholarship
Birth certificates in the United States, which are issued by the states, have two different sections, and each section involves different privacy concerns. The first section, the legal record of birth, is always available to the adult whose birth it registers; access by other persons varies widely from state to state, ranging from a short list of specified relatives to the public at large. The second section of the certificate - which records health and medical information about the parents, the birth, and the infant - is used only for data collection and analysis, under regulations that protect the privacy …
Immunity From The Focused Attention Of Others: A Conceptual And Normative Model Of Personal And Legal Privacy, Jeffrey L. Johnson
Immunity From The Focused Attention Of Others: A Conceptual And Normative Model Of Personal And Legal Privacy, Jeffrey L. Johnson
Florida A & M University Law Review
No abstract provided.