Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2015

Privacy Law

Institution
Keyword
Publication
Publication Type
File Type

Articles 241 - 254 of 254

Full-Text Articles in Law

That's Unfair! Or Is It? Big Data, Discrimination And The Ftc's Unfairness Authority, Dennis D. Hirsch Jan 2015

That's Unfair! Or Is It? Big Data, Discrimination And The Ftc's Unfairness Authority, Dennis D. Hirsch

Kentucky Law Journal

No abstract provided.


Data Privacy As A Civil Right: The Eu Gets It?, Raymond Shih Ray Ku Jan 2015

Data Privacy As A Civil Right: The Eu Gets It?, Raymond Shih Ray Ku

Kentucky Law Journal

No abstract provided.


Surveillance At The Source, David Thaw Jan 2015

Surveillance At The Source, David Thaw

Kentucky Law Journal

Contemporary discussions concerning surveillance focus predominantly on government activity. These discussions are important for a variety of reasons, but they generally ignore a critical aspect of the surveillance--harm calculus--the source from which government entities derive the information they use. The source of surveillance data is the information "gathering" activity itself which is where harms like "chilling" of speech and behavior begin.

Unlike the days where satellite imaging, communications intercepts, and other forms of information gathering were limited to advanced law enforcement, military, and intelligence activities, private corporations now play a dominant role in the collection of information about individuals' activities. …


Privacy And Health Information: The United States And The European Union, Leslie Francis Jan 2015

Privacy And Health Information: The United States And The European Union, Leslie Francis

Kentucky Law Journal

No abstract provided.


The Social Origins Of The Personality Torts, Samantha Barbas Jan 2015

The Social Origins Of The Personality Torts, Samantha Barbas

Journal Articles

No abstract provided.


Confronting Totalitarianism At Home: The Roots Of European Privacy Protections, Hannah Bloch-Wehba Jan 2015

Confronting Totalitarianism At Home: The Roots Of European Privacy Protections, Hannah Bloch-Wehba

Faculty Scholarship

In the last several years, a consensus has developed that a wide gulf exists between European and American privacy law, although division still exists on whether European law is “more protective” or simply “home to different intuitive sensibilities” than American law. Existing research on the development of European privacy law has focused on two areas: nineteenth-century traditions of honor and dueling, which gave rise to a concept of privacy linked to dignity, and the totalitarian dictatorships of the twentieth century, in reaction to which privacy protected liberty. This Article offers a contrasting view by showing that European privacy law in …


Privacy As Trust: Sharing Personal Information In A Networked World, Ari Ezra Waldman Jan 2015

Privacy As Trust: Sharing Personal Information In A Networked World, Ari Ezra Waldman

Articles & Chapters

This Article is the first in a series on the legal and sociological aspects of privacy, arguing that private contexts are defined by relationships of trust among individuals. The argument reorients privacy scholarship from an individual right to social relationships of disclosure. This has implications for a wide variety of vexing problems of modern privacy law, from limited disclosures to “revenge porn.”

The common everyday understanding is that privacy is about choice, autonomy, and individual freedom. It encompasses the individual’s right to determine what he will keep hidden and what, how, and when he will disclose to the public. Privacy …


Amplifying Abuse: The Fusion Of Cyberharassment And Discrimination, Ari Ezra Waldman Jan 2015

Amplifying Abuse: The Fusion Of Cyberharassment And Discrimination, Ari Ezra Waldman

Articles & Chapters

Cyberharassment devastates its victims. Anxiety, panic attacks, and fear are common effects; post-traumatic stress disorder, anorexia and bulimia, and clinical depression are common diagnoses. Targets of online hate and abuse have gone into hiding, changed schools, and quit jobs to prevent further abuse. Some lives are devastated in adolescence and are never able to recover. Some lives come to tragic, premature ends. Danielle Keats Citron not only teases out these effects in her masterful work, Hate Crimes in Cyberspace; she also makes the profound conclusion that these personal effects are part of a larger social cancer that breeds sexism, subjugation, …


Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo Jan 2015

Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo

Articles

In 1986, Congress passed the Stored Communications Act (“SCA”) to provide additional protections for individuals’ private communications content held in electronic storage by third parties. Acting out of direct concern for the implications of the Third-Party Records Doctrine — a judicially created doctrine that generally eliminates Fourth Amendment protections for information entrusted to third parties — Congress sought to tailor the SCA to electronic communications sent via and stored by third parties. Yet, because Congress crafted the SCA with language specific to the technology of 1986, courts today have struggled to apply the SCA consistently with regard to similar private …


Cases For Lecture 2; Privacy, Macerata 11 March 2015, Ulf Maunsbach Dec 2014

Cases For Lecture 2; Privacy, Macerata 11 March 2015, Ulf Maunsbach

Ulf Maunsbach

No abstract provided.


Introduction À Quelques Aspects Du Droit Américain, W. Gregory Voss Dec 2014

Introduction À Quelques Aspects Du Droit Américain, W. Gregory Voss

W. Gregory Voss

This is an introduction (in French) to my contributions on U.S. law for the workshop -- "Les défis du numérique dans l'entreprise en Europe" ("The Challenges of Digital Technologies in Europe") held at the Toulouse Business School on February 27, 2015. One of my contributions, which is unpublished -- "Les conditions générales d’utilisation des sites web soumis au droit américain et quelques protections pour les consommateurs" -- is available on this website. Another -- "Les données personnelles dans l'entreprise vues au travers du prisme du droit américain" -- was published in the October 2015 issue of the Revue Lamy Droit …


Information Superhighway Patrol, Raizel Liebler Dec 2014

Information Superhighway Patrol, Raizel Liebler

Raizel Liebler

Mary Anne Franks discusses some of the legal points of regulating cyber harassment and why it's important to have real protection in the "virtual" world.


Regulating Drones Under The First And Fourth Amendments, Stephen E. Henderson, Joseph Thai, Marc Jonathan Blitz, James Grimsley Dec 2014

Regulating Drones Under The First And Fourth Amendments, Stephen E. Henderson, Joseph Thai, Marc Jonathan Blitz, James Grimsley

Stephen E Henderson

The FAA Modernization and Reform Act of 2012 requires the Federal Aviation Administration to integrate unmanned aerial vehicles (UAVs), or drones, into the national airspace system by September of this year. Yet perhaps because of their chilling accuracy in targeted killings abroad, perhaps because of an increasing consciousness of diminishing privacy more generally, and perhaps simply because of a fear of the unknown, divergent UAV-restrictive legislation has been proposed in Congress and enacted in a number of states. Ultimately, given UAV utility and cost effectiveness over a vast range of tasks, widespread commercial use seems certain. So it is imperative …


Digital Peepholes | Remote Activation Of Webcams: Technology, Law And Policy, Lori Andrews Dec 2014

Digital Peepholes | Remote Activation Of Webcams: Technology, Law And Policy, Lori Andrews

Lori B. Andrews

A comprehensive report concerning the many ways that webcams can be used against those who possess them. Digital Peepholes also provides in depth legal analysis of the legality of private companies and the government using people’s webcams to spy on them. A must read for anyone concerned with privacy or anyone with a webcam built in to their devices!