Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2014

Privacy

Discipline
Institution
Publication
Publication Type
File Type

Articles 1 - 30 of 128

Full-Text Articles in Law

Private Letters And The Law: Edith Wharton’S Questions About Ownership And The Right To Publish Private Letters, Deborah Hecht Dec 2014

Private Letters And The Law: Edith Wharton’S Questions About Ownership And The Right To Publish Private Letters, Deborah Hecht

Touro Law Review

No abstract provided.


Cookie Monster: Balancing Internet Privacy With Commerce, Technology And Terrorism, Nichoel Forrett Dec 2014

Cookie Monster: Balancing Internet Privacy With Commerce, Technology And Terrorism, Nichoel Forrett

Touro Law Review

No abstract provided.


Lawrence V. Texas: The Decision And Its Implications For The Future, Martin A. Schwartz Dec 2014

Lawrence V. Texas: The Decision And Its Implications For The Future, Martin A. Schwartz

Touro Law Review

No abstract provided.


Profiling With Apologies, Sherry F. Colb Dec 2014

Profiling With Apologies, Sherry F. Colb

Sherry Colb

No abstract provided.


A World Without Privacy: Why Property Does Not Define The Limits Of The Right Against Unreasonable Searches And Seizures, Sherry F. Colb Dec 2014

A World Without Privacy: Why Property Does Not Define The Limits Of The Right Against Unreasonable Searches And Seizures, Sherry F. Colb

Sherry Colb

No abstract provided.


Standing Room Only: Why Fourth Amendment Exclusion And Standing Can No Longer Logically Coexist, Sherry F. Colb Dec 2014

Standing Room Only: Why Fourth Amendment Exclusion And Standing Can No Longer Logically Coexist, Sherry F. Colb

Sherry Colb

No abstract provided.


Domestic Violence And The Politics Of Privacy, By Kristin A. Kelly [Book Review], Cynthia Grant Bowman Dec 2014

Domestic Violence And The Politics Of Privacy, By Kristin A. Kelly [Book Review], Cynthia Grant Bowman

Cynthia Grant Bowman

No abstract provided.


Prying, Spying, And Lying: Intrusive Newsgathering And What The Law Should Do About It, Lyrissa Barnett Lidsky Dec 2014

Prying, Spying, And Lying: Intrusive Newsgathering And What The Law Should Do About It, Lyrissa Barnett Lidsky

Lyrissa Barnett Lidsky

The media's use of intrusive newsgathering techniques poses an increasing threat to individual privacy. Courts currently resolve the overwhelming majority of conflicts in favor of the media. This is not because the First Amendment bars the imposition of tort liability on the media for its newsgathering practices. It does not. Rather, tort law has failed to seize the opportunity to create meaninful privacy protection. After surveying the economic, philosophical, and practical obstacles to reform, this Article proposes to rejuvenate the tort of intrusion to tip the balance between privacy and the press back in privacy's direction. Working within the framework …


Promoting Innovation While Preventing Discrimination: Policy Goals For The Scored Society, Danielle K. Citron, Frank Pasquale Dec 2014

Promoting Innovation While Preventing Discrimination: Policy Goals For The Scored Society, Danielle K. Citron, Frank Pasquale

Faculty Scholarship

There are several normative theories of jurisprudence supporting our critique of the scored society, which complement the social theory and political economy presented in our 2014 article on that topic in the Washington Law Review. This response to Professor Tal Zarsky clarifies our antidiscrimination argument while showing that is only one of many bases for the critique of scoring practices. The concerns raised by Big Data may exceed the capacity of extant legal doctrines. Addressing the potential injustice may require the hard work of legal reform.


Privacy, Copyright, And Letters, Jeffrey Harrison Nov 2014

Privacy, Copyright, And Letters, Jeffrey Harrison

Jeffrey L Harrison

The focus of this Essay is the privacy of letters – the written manifestations of thoughts, intents, and the recollections of facts directed to a person or a narrowly defined audience. The importance of this privacy is captured in the novel Atonement by Ian McEwan and in the film based on the novel. The fulcrum from which the action springs is a letter that is read by someone to whom it was not addressed. The result is literally life-changing, even disastrous for a number of characters. One person dies, two people seemingly meant for each other are torn apart and …


The Logic And Experience Of Law: Lawrence V. Texas And The Politics Of Privacy, Danaya C. Wright Nov 2014

The Logic And Experience Of Law: Lawrence V. Texas And The Politics Of Privacy, Danaya C. Wright

Danaya C. Wright

The U.S. Supreme Court's June 2003 decision in Lawrence v. Texas may prove to be one of the most important civil rights cases of the twenty-first century. It may do for gay and lesbian people what Brown v. Board of Education did for African-Americans and Roe v. Wade did for women. While I certainly hope so, my enthusiasm is tempered by the fact that discrimination on the basis of race or gender has not disappeared. Will Lawrence signal meaningful change, or will its revolutionary possibilities be stifled by endless cycles of excuse and redefinition? The case is important, but I …


The Internet Of Things And Wearable Technology: Addressing Privacy And Security Concerns Without Derailing Innovation, Adam D. Thierer Nov 2014

The Internet Of Things And Wearable Technology: Addressing Privacy And Security Concerns Without Derailing Innovation, Adam D. Thierer

Adam Thierer

This paper highlights some of the opportunities presented by the rise of the so-called “Internet of Things” and wearable technology in particular, and encourages policymakers to allow these technologies to develop in a relatively unabated fashion. As with other new and highly disruptive digital technologies, however, the Internet of Things and wearable tech will challenge existing social, economic, and legal norms. In particular, these technologies raise a variety of privacy and safety concerns. Other technical barriers exist that could hold back IoT and wearable tech — including disputes over technical standards, system interoperability, and access to adequate spectrum to facilitate …


County Court, Westchester County, People V. Gant, Albert V. Messina Jr. Nov 2014

County Court, Westchester County, People V. Gant, Albert V. Messina Jr.

Touro Law Review

No abstract provided.


Comment On Home Mortgage Disclosure Act Proposed Rulemaking, David J. Reiss Oct 2014

Comment On Home Mortgage Disclosure Act Proposed Rulemaking, David J. Reiss

David J Reiss

The Consumer Financial Protection Bureau's Home Mortgage Disclosure Act proposed rulemaking (proposed Aug. 29, 2014) is a reasonable one. It increases the amount of information that is to be collected about important consumer products, such as reverse mortgages. It also increases the amount of important information it collects about all mortgages. At the same time, it releases lenders from having to determine borrowers’ intentions about how they will use their loan proceeds, something that can be hard to do and to document well. Finally, while the proposed rule raises some privacy concerns, the CFPB can address them.


Outed At School: Student Privacy Rights And Preventing Unwanted Disclosures Of Sexual Orientation, Evan Ettinghoff Oct 2014

Outed At School: Student Privacy Rights And Preventing Unwanted Disclosures Of Sexual Orientation, Evan Ettinghoff

Loyola of Los Angeles Law Review

Lesbian, gay, bisexual, transgender, and questioning (LGBTQ) individuals often identify their sexual orientation during their formative school years. During this time, they make important decisions about whether they will come out, to whom, and under what circumstances. However, some school officials have taken matters into their own hands, disclosing information about a student’s sexual orientation to parents or family members without the student’s permission, and without considering the student’s well-being and potential consequences at home. This Note explores a student’s constitutional right to privacy in their sexual orientation. It begins by examining the unique problems LGBTQ youth encounter while developing …


Celebrity Nude Photo Leak: Just One More Reminder That Privacy Does Not Exist Online And Legally, There’S Not Much We Can Do About It, Laurel O'Connor Oct 2014

Celebrity Nude Photo Leak: Just One More Reminder That Privacy Does Not Exist Online And Legally, There’S Not Much We Can Do About It, Laurel O'Connor

GGU Law Review Blog

No abstract provided.


Liberty, James E. Fleming, Linda C. Mcclain Oct 2014

Liberty, James E. Fleming, Linda C. Mcclain

Faculty Scholarship

"To secure the blessings of liberty," the Preamble to the US Constitution proclaims, "We the People . . . ordain and establish this Constitution." The Constitution is said to secure liberty through three principal strategies: the design of the Constitution as a whole; structural arrangements, most notably separation of powers andfederalism; and protection of rights. This chapter focuses on this third strategy of protecting liberty, in particular, through the Fifth and Fourteenth Amendments. We first examine the several approaches taken to the "Incorporation" of certain basic liberties "enumerated" in the Bill of Rights to apply to the state governments. We …


Csi Las Vegas: Privacy, Policing, And Profiteering In Casino Structured Intelligence, Jessica D. Gabel Oct 2014

Csi Las Vegas: Privacy, Policing, And Profiteering In Casino Structured Intelligence, Jessica D. Gabel

Jessica Gabel Cino

This Article argues that the intricate, vast amounts of consumer information compiled through casino structured intelligence require greater protection and oversight in the contexts of both bankruptcy and law enforcement. Section II examines the various types of casino technology and information gathering that casinos perform. Section III considers the available protections of private information in terms of security breaches, law enforcement sharing, and sales in the context of a bankruptcy. Section IV discusses additional safeguards and ethical concerns that should be considered as casinos continue to increase their data mining efforts. Finally, Section V concludes that, minimally, consumers are entitled …


Self, Privacy, And Power: Is It All Over?, Richard Warner, Robert H. Sloan Oct 2014

Self, Privacy, And Power: Is It All Over?, Richard Warner, Robert H. Sloan

All Faculty Scholarship

The realization of a multifaceted self is an ideal one strives to realize. One realizes such a self in large part through interaction with others in various social roles. Such realization requires a significant degree of informational privacy. Informational privacy is the ability to determine for yourself when others may collect and how they may use your information. The realization of multifaceted selves requires informational privacy in public. There is no contradiction here: informational privacy is a matter of control, and you can have such control in public. Current information processing practices greatly reduce privacy in public thereby threatening the …


A Joyful Heart Is Good Medicine: Sexuality Conversion Bans In The Courts, Wyatt Fore Oct 2014

A Joyful Heart Is Good Medicine: Sexuality Conversion Bans In The Courts, Wyatt Fore

Michigan Journal of Gender & Law

Led by California and New Jersey, states have begun to ban Sexual Orientation Change Efforts (SOCE) for minors. States have targeted SOCE, also called ‘gay conversion therapy,’ by regulating state licensure requirements for mental health professionals. Conservative legal groups have challenged these bans in federal court, alleging a variety of constitutional violations sounding in the First and Fourteenth Amendments. More specifically, these legal groups propose theories claiming that the bans infringe upon individuals’ freedom of speech, free exercise, and parental rights. In this Note, I survey the history of these bans, as well as court decisions that have rejected constitutional …


How Feminist Theory Became (Criminal) Law: Tracing The Path To Mandatory Criminal Intervention In Domestic Violence Cases, Claire Houston Oct 2014

How Feminist Theory Became (Criminal) Law: Tracing The Path To Mandatory Criminal Intervention In Domestic Violence Cases, Claire Houston

Michigan Journal of Gender & Law

Our popular understanding of domestic violence has shifted significantly over the past forty years, and with it, our legal response. We have moved from an interpretation of domestic violence as a private relationship problem managed through counseling techniques to an approach that configures domestic violence first and foremost as a public crime. Mandatory criminal intervention policies reflect and reinforce this interpretation. How we arrived at this point, and which understanding of domestic violence facilitated this shift, is the focus of this Article. I argue that the move to intense criminalization has been driven by a distinctly feminist interpretation of domestic …


Beyond The Schoolhouse Gates: The Unprecedented Expansion Of School Surveillance Authority Under Cyberbulling Laws, Emily Suski Oct 2014

Beyond The Schoolhouse Gates: The Unprecedented Expansion Of School Surveillance Authority Under Cyberbulling Laws, Emily Suski

Faculty Publications

For several years, states have grappled with the problem of cyberbullying and its sometimes devastating effects. Because cyberbullying often occurs between students, most states have understandably looked to schools to help address the problem. To that end, schools in forty-six states have the authority to intervene when students engage in cyberbullying. This solution seems all to the good unless a close examination of the cyberbullying laws and their implications is made. This Article explores some of the problematic implications of the cyberbullying laws. More specifically, it focuses on how the cyberbullying laws allow schools unprecedented surveillance authority over students. This …


The Internet Of Things: Building Trust And Maximizing Benefits Through Consumer Control, Julie Brill Oct 2014

The Internet Of Things: Building Trust And Maximizing Benefits Through Consumer Control, Julie Brill

Fordham Law Review

The Internet of Things is one of the fastest growing facets of a world that is becoming more data intensive. Connecting cars, appliances, and even clothing to the internet promises to deliver convenience, safety, and, through analysis of the torrent of additional data generated, potential solutions to some of our most intractable problems. But turning on this data flood also creates privacy and security risks for consumers, challenging us to consider how to apply basic privacy principles to the Internet of Things. A wide range of stakeholders—technologists, lawyers, industry leaders, and others—has a role to play in meeting this challenge.


"Smile, You're On Cellphone Camera!": Regulating Online Video Privacy In The Myspace Generation, Jacqueline D. Lipton Sep 2014

"Smile, You're On Cellphone Camera!": Regulating Online Video Privacy In The Myspace Generation, Jacqueline D. Lipton

Akron Law Faculty Publications

In the latest Batman movie, Bruce Wayne’s corporate right hand man, Lucius Fox, copes stoically with the death and destruction dogging his boss. Interestingly, the last straw for him is Bruce’s request that he use digital video surveillance created through the city’s cellphone network to spy on the people of Gotham City in order to locate the Joker. Does this tell us something about the increasing social importance of privacy, particularly in an age where digital video technology is ubiquitous and largely unregulated?

While much digital privacy law and commentary has focused on text files containing personal data, little attention …


“We, The Paparazzi”: Developing A Privacy Paradigm For Digital Video, Jacqueline D. Lipton Sep 2014

“We, The Paparazzi”: Developing A Privacy Paradigm For Digital Video, Jacqueline D. Lipton

Akron Law Faculty Publications

In January 2009, the Camera Phone Predator Alert bill was introduced into Congress. It raised serious concerns about privacy rights in the face of digital video technology. In so doing, it brought to light a worrying gap in current privacy regulation – the lack of rules relating to digital video privacy. To date, digital privacy regulation has focused on text records that contain personal data. Little attention has been paid to privacy in video files that may portray individuals in inappropriate contexts, or in an unflattering or embarrassing light. As digital video technology, including inexpensive cellphone cameras, is now becoming …


Repairing Online Reputation: A New Multi-Modal Regulatory Approach, Jacqueline D. Lipton Sep 2014

Repairing Online Reputation: A New Multi-Modal Regulatory Approach, Jacqueline D. Lipton

Akron Law Faculty Publications

In today’s interconnected digital society, high profile examples of online abuses abound. Cyberbullies launch attacks on the less powerful, often significantly damaging victims’ reputations. Outside of reputational damage, online harassment, bullying and stalking has led to severe emotional distress, loss of employment, physical assault and even death. Recent scholarship has identified this phenomenon but has done little more than note that current laws are ineffective in combating abusive online behaviors. This article moves the debate forward both by suggesting specific reforms to criminal and tort laws and, more importantly, by situating those reforms within a new multi-modal framework for combating …


Self-Defense Against Robots, A. Michael Froomkin, Zak Colangelo Aug 2014

Self-Defense Against Robots, A. Michael Froomkin, Zak Colangelo

A. Michael Froomkin

This paper examines when, under U.S. law, humans may use force against robots to protect themselves, their property, and their privacy. May a landowner legally shoot down a trespassing drone? May she hold a trespassing autonomous car as security against damage done or further torts? Is the fear that a drone may be operated by a paparazzo or a peeping Tom sufficient grounds to disable or interfere with it? How hard may you shove if the office robot rolls over your foot? This paper addresses all those issues and one more: what rules and standards we could put into place …


Proximity-Driven Liability, Bryant Walker Smith Aug 2014

Proximity-Driven Liability, Bryant Walker Smith

Faculty Publications

This working paper argues that commercial sellers’ growing information about, access to, and control over their products, product users, and product uses could significantly expand their point-of-sale and post-sale obligations toward people endangered by these products. The paper first describes how companies are embracing new technologies that expand their information, access, and control, with primary reference to the increasingly automated and connected motor vehicle. It next analyzes how this proximity to product, user, and use could impact product-related claims for breach of implied warranty, defect in design or information, post-sale failure to warn or update, and negligent enabling of a …


Featuring People In Ads (2014 Edition), Eric Goldman, Rebecca Tushnet Aug 2014

Featuring People In Ads (2014 Edition), Eric Goldman, Rebecca Tushnet

Faculty Publications

This is a book chapter from the 2014 edition of a casebook, Advertising & Marketing Law: Cases and Materials, by Rebecca Tushnet and Eric Goldman. This chapter examines the legal issues arising from featuring people in advertisements, including publicity rights and endorsement/testimonial guidelines.


16th Annual Open Government Summit: Access To Public Records Act & Open Meetings Act, 2014, Department Of Attorney General, State Of Rhode Island Aug 2014

16th Annual Open Government Summit: Access To Public Records Act & Open Meetings Act, 2014, Department Of Attorney General, State Of Rhode Island

School of Law Conferences, Lectures & Events

No abstract provided.