Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Privacy

Privacy Law

Chicago-Kent Law Review

Articles 1 - 10 of 10

Full-Text Articles in Law

Discussing Privacy In Sec Subpoena Practice After Carpenter V. United States, William A. Ballentine Apr 2021

Discussing Privacy In Sec Subpoena Practice After Carpenter V. United States, William A. Ballentine

Chicago-Kent Law Review

No abstract provided.


Survey Of (Mostly Outdated And Often Ineffective) Laws Affecting Work-Related Monitoring, Robert Sprague Mar 2018

Survey Of (Mostly Outdated And Often Ineffective) Laws Affecting Work-Related Monitoring, Robert Sprague

Chicago-Kent Law Review

This article reviews various laws that affect work-related monitoring. It reveals that most of our privacy laws were adopted well before smartphones and the Internet became ubiquitous; they still hunt for physical secluded locations; and, because they are based on reasonable expectations of privacy, they can easily be circumvented by employer policies that eliminate that expectation by informing workers they have no right to privacy in the workplace. This article concludes that the future—indeed the present—does not bode well for worker privacy.


Video-Streaming Records And The Video Privacy Protection Act: Broadening The Scope Of Personally Identifiable Information To Include Unique Device Identifiers Disclosed With Video Titles, Gregory M. Huffman May 2016

Video-Streaming Records And The Video Privacy Protection Act: Broadening The Scope Of Personally Identifiable Information To Include Unique Device Identifiers Disclosed With Video Titles, Gregory M. Huffman

Chicago-Kent Law Review

The Video Privacy Protection Act (“VPPA”) prohibits video tape service providers from disclosing their consumers’ video rental or sale records. Although the VPPA was originally enacted to regulate disclosures by brick-and-mortar video rental stores, litigators have more recently used the VPPA as a vehicle to regulate disclosures by online video content providers.

The application of the VPPA to video streaming via web browsers and mobile devices raises new questions of statutory interpretation. One key question is whether the scope of the VPPA is broad enough to cover a disclosure of a unique device identifier of a user’s device, rather than …


Habeas Data: Comparative Constitutional Interventions From Latin America Against Neoliberal States Of Insecurity And Surveillance, Marc Tizoc Gonzalez Apr 2015

Habeas Data: Comparative Constitutional Interventions From Latin America Against Neoliberal States Of Insecurity And Surveillance, Marc Tizoc Gonzalez

Chicago-Kent Law Review

To cultivate the next twenty years of LatCrit theory, praxis, and community, the afterword looks back to LatCrit’s Critical Global Classroom (2003–04) (CGC), an ABA-accredited summer study-abroad program. The CGC invited U.S. law students to study comparative constitutionalism, law and society, and truth and reconciliation movements while sojourning Chile, Argentina, and South Africa under the question: “Shall the recent history of the Global South become the imminent fate of the Global North?” While enrolled in the 2004 CGC, the author learned about the extraordinary constitutional writ of habeas data, which various Latin American countries adopted as they reconstituted their …


The Need To Criminalize Revenge Porn: How A Law Protecting Victims Can Avoid Running Afoul Of The First Amendment, Adrienne N. Kitchen Jan 2015

The Need To Criminalize Revenge Porn: How A Law Protecting Victims Can Avoid Running Afoul Of The First Amendment, Adrienne N. Kitchen

Chicago-Kent Law Review

Revenge porn occurs when someone posts sexually explicit images of their former paramour on the web, often with contact information for the victim’s work and home. There are thousands, perhaps tens of thousands, of victims. Victims lose or quit their jobs; they are harassed by strangers; some change their name or alter their appearance. Some victims resort to suicide; others are stalked, assaulted, or killed. Civil suits fail to remove the images or deter perpetrators. Current criminal laws are insufficient in several common instances. These shortcomings mean there is a need to criminalize revenge porn.

Revenge porn is obscene and …


Hidden Home Videos: Surreptitious Video Surveillance In Divorce, Rebecca V. Lyon Apr 2014

Hidden Home Videos: Surreptitious Video Surveillance In Divorce, Rebecca V. Lyon

Chicago-Kent Law Review

In divorce court, often a very contentious and emotional court, parties frequently use what they can to gain the upper hand. The invention of new technology gives them an even wider arsenal. While tracking each other on the computer or checking phone records has become common, courts are now encountering instances where one spouse has placed hidden video cameras around the house to catch the other spouse doing something wrong. Under many state laws, courts have been forced to conclude that the surreptitious video recordings are not illegal. Perhaps more surprisingly, a few courts have concluded that the law either …


Electronic Privacy And Employee Speech, Pauline T. Kim Jun 2012

Electronic Privacy And Employee Speech, Pauline T. Kim

Chicago-Kent Law Review

The boundary between work and private life is blurring as a result of changes in the organization of work and advances in technology. Current privacy law is ill-equipped to address these changes and as a result, employees' privacy in their electronic communications is only weakly protected from employer scrutiny. At the same time, the law increasingly protects certain socially valued forms of employee speech. In particular, collective speech, speech that enforces workplace regulations and speech that deters or reports employer wrong-doing are explicitly protected by law from employer reprisals. These two developments—weak protection of employee privacy and increased protection for …


Privacy Implications Of Smart Meters, Cheryl Dancey Balough Dec 2010

Privacy Implications Of Smart Meters, Cheryl Dancey Balough

Chicago-Kent Law Review

Many people worry about the erosion of privacy in our society given developments in technology, but that loss of privacy may take a quantum leap as electric "smart meters" make it possible for strangers to know on a real-time basis what is occurring in our houses and apartments. Perhaps the greatest concern is that current laws and regulations do not fully protect us from this unprecedented threat to two of our most basic rights—to be left alone in our own homes and to control personal information. Utility companies across the country are replacing conventional electric meters with smart meters designed …


Best Practices And The State Of Information Security, Kevin Cronin Jun 2009

Best Practices And The State Of Information Security, Kevin Cronin

Chicago-Kent Law Review

The forces of globalization, together with widely available industry standards and best practices, and heightened state legislative activity, are driving the U.S. towards a more unified approach to data security. But the success of this unified approach requires more than free market efficiency and innovation. In order to maintain a state of evolutionary equilibrium in the global information economy, the U.S. must move from a fragmented approach towards data security and privacy standards, towards a more comprehensive set of standards with new penalties and effective enforcement, to better reflect the inherent value of personal data in today's global marketplace.


Coding Privacy, Lilian Edwards Jun 2009

Coding Privacy, Lilian Edwards

Chicago-Kent Law Review

Lawrence Lessig famously and usefully argues that cyberspace is regulated not just by law but also by norms, markets and architecture or "code." His insightful work might also lead the unwary to conclude, however, that code is inherently anti-privacy, and thus that an increasingly digital world must therefore also be increasingly devoid of privacy. This paper argues briefly that since technology is a neutral tool, code can be designed as much to fight for privacy as against it, and that what matters now is to look at what incentivizes the creation of pro- rather than anti-privacy code in the mainstream …