Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2010

Privacy Law

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 86

Full-Text Articles in Law

Privacy Implications Of Smart Meters, Cheryl Dancey Balough Dec 2010

Privacy Implications Of Smart Meters, Cheryl Dancey Balough

Chicago-Kent Law Review

Many people worry about the erosion of privacy in our society given developments in technology, but that loss of privacy may take a quantum leap as electric "smart meters" make it possible for strangers to know on a real-time basis what is occurring in our houses and apartments. Perhaps the greatest concern is that current laws and regulations do not fully protect us from this unprecedented threat to two of our most basic rights—to be left alone in our own homes and to control personal information. Utility companies across the country are replacing conventional electric meters with smart meters designed …


Mainstreaming Privacy Torts, Danielle K. Citron Dec 2010

Mainstreaming Privacy Torts, Danielle K. Citron

Faculty Scholarship

In 1890, Samuel Warren and Louis Brandeis proposed a privacy tort and seventy years later, William Prosser conceived it as four wrongs. In both eras, privacy invasions primarily caused psychic and reputational wounds of a particular sort. Courts insisted upon significant proof due to those injuries’ alleged ethereal nature. Digital networks alter this calculus by exacerbating the injuries inflicted. Because humiliating personal information posted online has no expiration date, neither does individual suffering. Leaking databases of personal information and postings that encourage assaults invade privacy in ways that exact significant financial and physical harm. This dispels concerns that plaintiffs might …


Privacy Torts: Unreliable Remedies For Lgbt Plaintiffs, Anita L. Allen Oct 2010

Privacy Torts: Unreliable Remedies For Lgbt Plaintiffs, Anita L. Allen

Faculty Scholarship at Penn Carey Law

In the United States, both constitutional law and tort law recognize the right to privacy, understood as legal entitlement to an intimate life of one’s own free from undue interference by others and the state. Lesbian, gay, bisexual, and transgender (“LGBT”) persons have defended their interests in dignity, equality, autonomy, and intimate relationships in the courts by appealing to that right. In the constitutional arena, LGBT Americans have claimed the protection of state and federal privacy rights with a modicum of well-known success. Holding that homosexuals have the same right to sexual privacy as heterosexuals, Lawrence v. Texas symbolizes the …


Known And Unknown, Property And Contract: Comments On Hoofnagle And Moringiello, James Grimmelmann Oct 2010

Known And Unknown, Property And Contract: Comments On Hoofnagle And Moringiello, James Grimmelmann

Cornell Law Faculty Publications

In addition to gerund-noun-noun titles and a concern with the misaligned incentives of businesses that handle consumers' financial data, Chris Hoofnagle's Internalizing Identity Theft and Juliet Moringiello's Warranting Data Security share something else: hidden themes. Hoofnagle's paper is officially about an empirical study of identity theft, but behind the scenes it's also an exploration of where we draw the line between public information shared freely and secret information used to authenticate individuals. Moringiello's paper is officially a proposal for a new warranty of secure handling of payment information, but under the surface, it invites us to think about the relationship …


Approval Of New Pharmacogenomic Tests: Is The Canadian Regulatory Process Adequate?, Yann Joly, Emma Ramos-Paque Oct 2010

Approval Of New Pharmacogenomic Tests: Is The Canadian Regulatory Process Adequate?, Yann Joly, Emma Ramos-Paque

Canadian Journal of Law and Technology

In the first part of our analysis, we will examine the impact which pharmacogenomics is expected to have on drug research and development, on the drug approval process and on post-marketing surveillance and clinical practice. This will allow us to show how pharmacogenomic testing could be beneficial to drug companies, regulatory bodies, and patients. The second part of our analysis will focus on the regulatory framework applicable to the approval of pharmacoge- nomic tests in Canada, although we are aware of the fact that most manufacturers decide to approve their tests outside of Canada. As mentioned, the applicable regu- lations …


The Regulation Of Personal Health Record Systems In Canada, James Williams, Jens H. Weber-Jahnke Oct 2010

The Regulation Of Personal Health Record Systems In Canada, James Williams, Jens H. Weber-Jahnke

Canadian Journal of Law and Technology

This paper analyzes the regulatory regime for PHR systems in Canada. The first part of the paper consists of an introduction to some of the major issues associ- ated with these applications, with a focus on privacy, security, data quality, and interoperability. Following this preliminary discussion, the bulk of the analysis deals with the legal instruments that apply to PHR products developed by private sector organizations. Due to space constraints, the paper concentrates on legislative and regulatory instruments, deferring a discussion of the possible impacts of tort, product liability, and contract law on PHR systems. Despite this omission, it is …


The Admissibility Of Electronic Business Records, Ken Chasse Oct 2010

The Admissibility Of Electronic Business Records, Ken Chasse

Canadian Journal of Law and Technology

The business record provisions of the Evidence Acts determine a record’s admissibility by evidence of its history, which must be the product of “the usual and ordinary course of business” (or comparable “business activity” wording). The electronic record provisions determine a record’s admissibility by the, “integrity of the electronic records system in which it is recorded or stored.” The difference is, records management (RM) based on “paper records concepts” versus “electronic records systems concepts.” The former is subjective — each business determines its own “usual and ordinary course of business”; the latter, objective — in accor- dance with authoritative standards …


Interpreting Copyright Law And Internet Facts, Cameron Hutchison Oct 2010

Interpreting Copyright Law And Internet Facts, Cameron Hutchison

Canadian Journal of Law and Technology

This paper probes interpretation issues elicited by the impact of digital technologies and the Internet on copyright law. The purpose of the paper is to instill a coherent framework for analyzing copyright law when it encounters Internet or digital facts. In part one, I propose a methodology of statutory interpretation that helps suitably adapt statutory language to technological developments. In essence it is this: courts should examine the language of the operative provision in its statutory context and in light of its purpose. A contextual interpretation of a broadly conceived rule can reveal a legislative intention that certain kinds of …


Canada's Digital Economy Strategy: Toward An Openness Framework, Michael Geist Oct 2010

Canada's Digital Economy Strategy: Toward An Openness Framework, Michael Geist

Canadian Journal of Law and Technology

This essay is an expanded version of my submission to the digital economy consultation. It opens with general issues such as digital policy leadership, cost issues, and emphasizes the need for a principle-based strategy that embraces the benefits associated with “open,” whether open access, open spectrum or open data. It then provides specific recommendations on a wide range of issues including tele- communications policy, privacy, and copyright.


Personalization, Analytics, And Sponsored Services: The Challenges Of Applying Pipeda To Online Tracking And Profiling Activities, Eloïse Gratton Oct 2010

Personalization, Analytics, And Sponsored Services: The Challenges Of Applying Pipeda To Online Tracking And Profiling Activities, Eloïse Gratton

Canadian Journal of Law and Technology

No abstract provided.


Location Surveillance By Gps: Balancing An Employer's Business Interest With Employee Privacy, Kendra Rosenberg Oct 2010

Location Surveillance By Gps: Balancing An Employer's Business Interest With Employee Privacy, Kendra Rosenberg

Washington Journal of Law, Technology & Arts

Employers are increasingly using GPS tracking devices as business tools to monitor employee movements. Recent judicial decisions have found an employer’s interest in using location surveillance on employer-owned property generally trumps an employee’s privacy interests. However, employers deciding to use GPS should be aware of the potential limitations on tracking an employee based on state constitutional, statutory, and common law rights to privacy. This Article focuses on the permissible scope of an employer’s use of GPS to track employees in the workplace.


The Puzzle Of Brandeis, Privacy, And Speech, Neil M. Richards Oct 2010

The Puzzle Of Brandeis, Privacy, And Speech, Neil M. Richards

Vanderbilt Law Review

The Right to Privacy' and his dissent in Olmstead v. United States. In The Right to Privacy, Brandeis and Samuel Warren argued that intrusion into and public disclosure of private affairs by the press was deeply hurtful, and that the common law should be read to recognize a tort remedy for such violations. Their short article is considered by scholars to have established not just the privacy torts but the field of privacy law itself. Brandeis is also famous (though less so) for his Olmstead dissent-a document which introduced modern concepts of privacy into constitutional law, and ultimately led not …


Taking Out The Context: A Critical Analysis Of Associated Press V. Canterbury, Kevin Gillen Sep 2010

Taking Out The Context: A Critical Analysis Of Associated Press V. Canterbury, Kevin Gillen

West Virginia Law Review

No abstract provided.


Dying For Privacy: Pitting Public Access Against Familial Interests In The Era Of The Internet, Clay Calvert Aug 2010

Dying For Privacy: Pitting Public Access Against Familial Interests In The Era Of The Internet, Clay Calvert

NULR Online

I just killed my two kids. . . . I drowned them. . . . They are 2 and 4. . . . I just shot myself. . . . with a gun. . . . Please hurry.”

That was the dying declaration of 21-year-old Julia Murray on February 16, 2010, preserved for all of posterity on a 911 emergency telephone recording and available to anyone and everyone in Florida—from journalists and police to even voyeurs and perverts—under that state’s open records laws. Murray and one of her three children are gone (the second child survived the drowning …


Google Analytics: Analyzing The Latest Wave Of Legal Concerns For Google In The U.S. And The E.U., Raizel Liebler, Keidra Chaney Jul 2010

Google Analytics: Analyzing The Latest Wave Of Legal Concerns For Google In The U.S. And The E.U., Raizel Liebler, Keidra Chaney

Buffalo Intellectual Property Law Journal

No abstract provided.


From Scanning To Sexting: The Scope Of Protection Of Dignity-Based Privacy In Canadian Child Pornography Law, Andrea Slane Jul 2010

From Scanning To Sexting: The Scope Of Protection Of Dignity-Based Privacy In Canadian Child Pornography Law, Andrea Slane

Osgoode Hall Law Journal

The Canadian approach to privacy rights in one's body is embedded in the relationship between interests in privacy, bodily integrity, and human dignity. Clarifying these interests is complicated by Canada's middle-ground stance between the European "dignity-based" approach to privacy and the US "liberty-based" orientation. The Canadian approach is closer to the European model when intrusions upon the body are conceived as wholly or mostly non-consensual (e.g., strip searches, voyeurism, and most child pornography). However, once consent plays a potentially determinative rote, the US liberty-based approach gains ground. This reluctance to fully align dignity with privacy results in confusion about the …


Data Protection: The Challenges Facing Social Networking, Daniel B. Garrie, Maureen Duffy-Lewis, Rebecca Wong, Richard L. Gillespie Jun 2010

Data Protection: The Challenges Facing Social Networking, Daniel B. Garrie, Maureen Duffy-Lewis, Rebecca Wong, Richard L. Gillespie

Brigham Young University International Law & Management Review

No abstract provided.


Legal And Ethical Implications Of Corporate Social Networks, Gundars Kaupins, Susan Park Jun 2010

Legal And Ethical Implications Of Corporate Social Networks, Gundars Kaupins, Susan Park

Management Faculty Publications and Presentations

Corporate social networking sites provide employees and employers with considerable opportunity to share information and become friends. Unfortunately, American laws do not directly address social networking site usage. The National Labor Relations Act, civil rights laws, and various common law doctrines such as employment at-will and defamation provide the pattern for future social networking laws. Ethical considerations such as productivity, security, goodwill, privacy, accuracy, and discipline fairness also affect future laws. Corporate policies on corporate social networking should balance the employer‘s and employee‘s interests. Existing laws and ethical issues associated with social networking should impact social networking policies related to …


Canada's Current Position With Respect To Sound Marks Registration: A Need For Change?, Marie-Jeanne Provost Jun 2010

Canada's Current Position With Respect To Sound Marks Registration: A Need For Change?, Marie-Jeanne Provost

Canadian Journal of Law and Technology

This paper analyses and criticizes Canada’s position on sound marks registration in order to recommend the ways in which Canadian policy-makers could further act in order to advance this area of law. The first part of this paper exposes the fundamental concepts of trade-marks as they are necessary to the comprehension of the problems surrounding the registration of sound marks. In the second part, legal considerations associated with the registration of sound marks are discussed. More specifically, the visual requirement, the issue of “use,” the concept of distinctiveness and the question of overlap with copyright are assessed. In the third …


La Cyberintimidation: Analyse Juridique, Karen D. Levin Jun 2010

La Cyberintimidation: Analyse Juridique, Karen D. Levin

Canadian Journal of Law and Technology

Dans ce mémoire va être traitée une analyse juridique de la cyberintimidation. Dans une première partie, nous tenterons de définir le terme « cyberintimidation » et les enjeux qui s’y rattachent. En deuxième lieu, nous examinerons la motivation qui mène à la cyberintimidation, ainsi que la manière dans laquelle l’acte se produit. Troisièmement, nous évaluerons les provisions du droit criminel fédéral, des droits de la personne, et du droit des délits civils afin de déterminer l’efficacité de notre système juridique à détourner la cyberintimidation. Finalement, nous trancherons la question de réforme qui se propose au Canada, la comparant aux réformes …


Book Review - Intellectual Property Rights And The Life Science Industries: Past, Present, And Future, Chidi Oguamanam Jun 2010

Book Review - Intellectual Property Rights And The Life Science Industries: Past, Present, And Future, Chidi Oguamanam

Canadian Journal of Law and Technology

Our so-called post-industrial society is one whose axial feature is the interac- tion between computer-driven digital and life science-driven bio-technologies. The primary legal mechanism that undergirds the allocation of rights in this new infor- mation-centred epoch is intellectual property. Perhaps only a few industrial sectors have benefitted more from the dynamics of that interaction than the pharmaceutical industry. Perhaps also, only a few industrial sectors have fully appreciated and opti- mally exploited the power of intellectual property than that sector. How did that happen? How has it continued to unfold, and what does the future hold for the continued co-evolution …


Inadequate: The Apec Privacy Framework & Article 25 Of The European Data Protection Directive, Stuart Hargreaves Jun 2010

Inadequate: The Apec Privacy Framework & Article 25 Of The European Data Protection Directive, Stuart Hargreaves

Canadian Journal of Law and Technology

The EU and APEC approaches represent two different ways of thinking about the purpose of privacy rights in personal information (a.k.a. “informational privacy” or “data privacy”). The European approach sees integrity and control over information about oneself as inherent to human dignity; informational privacy is treated as a fundamental right subject only to limited restrictions. In contrast, the approach evinced by APEC is a market-oriented cost/benefit calculus; control over personal information is seen as a beneficial policy goal when it can increase consumer confi- dence and promote economic growth — the implication being that it can also more easily give …


Canadian Personal Data Protection Legislation And Electronic Health Records: Transfers Of Personal Health Information In It Outsourcing Agreements, Dara Lambie Jun 2010

Canadian Personal Data Protection Legislation And Electronic Health Records: Transfers Of Personal Health Information In It Outsourcing Agreements, Dara Lambie

Canadian Journal of Law and Technology

Personal data protection and privacy of personal health information in the electronic era is a broad topic that includes consent, security measures and access considerations. The focus of this article is on one component of the larger picture: data transfers of personal health information that occur in the context of informa- tion technology (“IT”) outsourcing. If the societal good envisioned by an inter-jurisdictional EHR is to be fully realized, then the necessity of outsourcing is a reality that must be addressed.


Fulfilling Government 2.0'S Promise With Robust Privacy Protections, Danielle K. Citron Jun 2010

Fulfilling Government 2.0'S Promise With Robust Privacy Protections, Danielle K. Citron

Faculty Scholarship

The public can now “friend” the White House and scores of agencies on social networks, virtual worlds, and video-sharing sites. The Obama Administration sees this trend as crucial to enhancing governmental transparency, public participation, and collaboration. As the President has underscored, government needs to tap into the public’s expertise because it doesn’t have all of the answers.

To be sure, Government 2.0 might improve civic engagement. But it also might produce privacy vulnerabilities because agencies often gain access to individuals’ social network profiles, photographs, videos, and contact lists when interacting with individuals online. Little would prevent agencies from using and …


The Anatomy Of A Search: Intrusiveness And The Fourth Amendment, Renee Mcdonald Hutchins May 2010

The Anatomy Of A Search: Intrusiveness And The Fourth Amendment, Renee Mcdonald Hutchins

Journal Articles

For more than two months beginning in late December of 2005, police officers in New York State continuously monitored the location and movements of Scott Weaver's van using a surreptitiously attached global positioning system ("GPS") device, known as a "Qball."' The reason Weaver was targeted for police surveillance has never been disclosed. 2 In addition, law enforcement made no attempt to justify the heightened scrutiny of Weaver by seeking the pre-authorization of a warrant from a neutral magistrate.3 Rather, for sixty-five days, the police subjected Weaver to intense surveillance without oversight, interruption, or explanation. 4 More than a year after …


Arrested Development: Arizona V. Gant And Article I, Section 7 Of The Washington State Constitution, Jacob R. Brown May 2010

Arrested Development: Arizona V. Gant And Article I, Section 7 Of The Washington State Constitution, Jacob R. Brown

Washington Law Review

In Arizona v. Gant, the United States Supreme Court held that the search of a vehicle incident to arrest is permissible in only two situations: (1) when the arrestee is unsecured and within reaching distance of the passenger compartment; or (2) when it is reasonable to believe that evidence relevant to the crime of arrest may be found in the vehicle. Because Gant expressed a standard more protective than that established by the Washington State Supreme Court, Gant induced a state of confusion in Washington, where it has long been maintained that article I, section 7 of the Washington …


How Different Are Young Adults From Older Adults When It Comes To Information Privacy Attitudes & Policies?, Chris Jay Hoofnagle, Jennifer King, Su Li, Joseph Turow Apr 2010

How Different Are Young Adults From Older Adults When It Comes To Information Privacy Attitudes & Policies?, Chris Jay Hoofnagle, Jennifer King, Su Li, Joseph Turow

Departmental Papers (ASC)

Media reports teem with stories of young people posting salacious photos online, writing about alcohol-fueled misdeeds on social networking sites, and publicizing other ill-considered escapades that may haunt them in the future. These anecdotes are interpreted as representing a generation-wide shift in attitude toward information privacy. Many commentators therefore claim that young people “are less concerned with maintaining privacy than older people are.” Surprisingly, though, few empirical investigations have explored the privacy attitudes of young adults. This report is among the first quantitative studies evaluating young adults’ attitudes. It demonstrates that the picture is more nuanced than portrayed in the …


Visionary Pragmatism And The Value Of Privacy In The Twenty-First Century, Danielle K. Citron, Leslie Henry Apr 2010

Visionary Pragmatism And The Value Of Privacy In The Twenty-First Century, Danielle K. Citron, Leslie Henry

Faculty Scholarship

Despite extensive scholarly, legislative, and judicial attention to privacy, our understanding of privacy and the interests it protects remains inadequate. At the crux of this problem is privacy’s protean nature: it means “so many different things to so many different people” that attempts to articulate just what it is, or why it is important, generally have failed or become unwieldy. As a result, important privacy problems remain unaddressed, often to society’s detriment.

In his newest book, Understanding Privacy, Daniel J. Solove aims to reverse this state of affairs with a pluralistic conception of privacy that recognizes the societal value of …


Privacy Revisited: Gps Tracking As Search And Seizure, Bennett L. Gershman Apr 2010

Privacy Revisited: Gps Tracking As Search And Seizure, Bennett L. Gershman

Pace Law Review

Part I of this Article discusses the facts in People v. Weaver, the majority and dissenting opinions in the Appellate Division, Third Department decision, and the majority and dissenting opinions in the Court of Appeals decision. Part II addresses the question that has yet to be decided by the U.S. Supreme Court—whether GPS tracking of a vehicle by law enforcement constitutes a search under the Fourth Amendment. Part III addresses the separate question that the Court of Appeals did not address in Weaver—whether the surreptitious attachment of a GPS device to a vehicle constitutes a seizure under the Fourth Amendment. …


Flexing Judicial Muscles: Did The Ninth Circuit Abandon Judicial Restraint In United States V. Comprehensive Druge Testing, Inc.?, Allen H. Quist Mar 2010

Flexing Judicial Muscles: Did The Ninth Circuit Abandon Judicial Restraint In United States V. Comprehensive Druge Testing, Inc.?, Allen H. Quist

Brigham Young University Journal of Public Law

No abstract provided.