Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 19 of 19

Full-Text Articles in Law

Second Class For The Second Time: How The Commercial Speech Doctrine Stigmatizes Commercial Use Of Aggregated Public Records, Brian N. Larson, Genelle I. Belmas Jul 2007

Second Class For The Second Time: How The Commercial Speech Doctrine Stigmatizes Commercial Use Of Aggregated Public Records, Brian N. Larson, Genelle I. Belmas

Faculty Scholarship

This Article argues that access to aggregated electronic public records for commercial use should receive protection under the First Amendment in the same measure as the speech acts the access supports. In other words, we view commercial access to aggregated public records as an essential means to valuable speech. For many, however, the taint of the commercial speech doctrine is turning all “information flows” into commercial ones. This, in turn, is threatening the access to government records.


Mission Creep: Public Health Surveillance And Medical Privacy, Wendy K. Mariner Apr 2007

Mission Creep: Public Health Surveillance And Medical Privacy, Wendy K. Mariner

Faculty Scholarship

The National Security Agency's domestic surveillance program has parallels in the growth of disease surveillance for public health purposes. This article explores whether laws requiring health providers to report to government names and identifiable information about patients with infectious or chronic diseases may be vulnerable to challenge as an invasion of privacy. A shift in the use of disease surveillance data from investigating disease outbreaks to data mining and analysis for research, budgeting, and policy planning, as well as bioterrorism, tests the boundaries of liberty and privacy. The Supreme Court has not reviewed a disease reporting law. Its few related …


Newsgathering In Light Of Hipaa, Alexander A. Boni-Saenz Feb 2007

Newsgathering In Light Of Hipaa, Alexander A. Boni-Saenz

All Faculty Scholarship

This short piece examines the interaction between the Health Insurance Portability and Accountability Act (HIPAA), a federal law designed to protect the privacy of individuals’ health information, and state Freedom of Information (FOI) laws, which are designed to ensure public access to government documents. It describes three recent cases from different states that addressed difficult issues about where and how to draw the line between the public’s right to know and individuals’ rights to keep their medical information secret. It concludes that questions about the interaction of state FOI laws and HIPAA should be guided by the framework suggested in …


Biometrics: Weighing Convenience And National Security Against Your Privacy, Lauren D. Adkins Jan 2007

Biometrics: Weighing Convenience And National Security Against Your Privacy, Lauren D. Adkins

Michigan Telecommunications & Technology Law Review

The biometric identifier relies on an individual's unique biological information such as a hand, iris, fingerprint, facial or voice print. When used for verification purposes, a "one-to-one" match is generated in under one second. Biometric technology can substantially improve national security by identifying and verifying individuals in a number of different contexts, providing security in ways that exceed current identification technology and limiting access to areas where security breaches are especially high, such as airport tarmacs and critical infrastructure facilities. At the same time, a legitimate public concern exists concerning the misuse of biometric technology to invade or violate personal …


Immunity From The Focused Attention Of Others: A Conceptual And Normative Model Of Personal And Legal Privacy, Jeffrey L. Johnson Jan 2007

Immunity From The Focused Attention Of Others: A Conceptual And Normative Model Of Personal And Legal Privacy, Jeffrey L. Johnson

Florida A & M University Law Review

No abstract provided.


Tied Up In Knotts? Gps And The Fourth Amendment, Renee Mcdonald Hutchins Jan 2007

Tied Up In Knotts? Gps And The Fourth Amendment, Renee Mcdonald Hutchins

Journal Articles

Judicial and scholarly assessment of emerging technology seems poised to drive the Fourth Amendment down one of three paths. The first would simply relegate the amendment to a footnote in history books by limiting its reach to harms that the framers specifically envisioned. A modified version of this first approach would dispense with expansive constitutional notions of privacy and replace them with legislative fixes. A third path offers the amendment continued vitality but requires the U.S. Supreme Court to overhaul its Fourth Amendment analysis. Fortunately, a fourth alternative is available to cabin emerging technologies within the existing doctrinal framework. Analysis …


Reservoirs Of Danger: The Evolution Of Public And Private Law At The Dawn Of The Information Age, Danielle Keats Citron Jan 2007

Reservoirs Of Danger: The Evolution Of Public And Private Law At The Dawn Of The Information Age, Danielle Keats Citron

Faculty Scholarship

A defining problem at the dawn of the Information Age will be securing computer databases of ultra-sensitive personal information. These reservoirs of data fuel our Internet economy but endanger individuals when their information escapes into the hands of cyber-criminals. This juxtaposition of opportunities for rapid economic growth and novel dangers recalls similar challenges society and law faced at the outset of the Industrial Age. Then, reservoirs collected water to power textile mills: the water was harmless in repose but wrought havoc when it escaped. After initially resisting Rylands v. Fletcher’s strict liability standard as undermining economic development, American courts …


Privacy, Crime And Terror: Legal Rights And Security In A Time Of Peril By Stanley A. Cohen (Markham: Lexisnexis Butterworths, 2005), Teresa Scassa Jan 2007

Privacy, Crime And Terror: Legal Rights And Security In A Time Of Peril By Stanley A. Cohen (Markham: Lexisnexis Butterworths, 2005), Teresa Scassa

Canadian Journal of Law and Technology

It is now trite to say that the events of September 11, 2001 have had a profound impact on our national security, in terms of its institutional and normative dimensions, and also in terms of a more general public anxiety. The hastily enacted Anti-terrorism Act of 2001 brought about significant changes to a wide range of statutes including, among others, the Criminal Code, the Official Secrets Act, the Canada Evidence Act, and the Proceeds of Crime (Money Laundering) Act. An early conference and resultant book on the Anti-terrorism Act raised serious concerns about the potential impact of the changes on …


Structural Rights In Privacy, Harry Surden Jan 2007

Structural Rights In Privacy, Harry Surden

Publications

This Essay challenges the view that privacy interests are protected primarily by law. Based upon the understanding that society relies upon nonlegal devices such as markets, norms, and structure to regulate human behavior, this Essay calls attention to a class of regulatory devices known as latent structural constraints and provides a positive account of their role in regulating privacy. Structural constraints are physical or technological barriers which regulate conduct; they can be either explicit or latent. An example of an explicit structural constraint is a fence which is designed to prevent entry onto real property, thereby effectively enforcing property rights. …


The Headscarf As Threat: A Comparison Of German And U.S. Legal Discourses, Robert A. Kahn Jan 2007

The Headscarf As Threat: A Comparison Of German And U.S. Legal Discourses, Robert A. Kahn

Vanderbilt Journal of Transnational Law

This Article compares how U.S. and German judges conceptualize the harm the headscarf poses to society. The examples are the 2003 Ludin case, in which the German Federal Constitutional Court held that the civil service, in the absence of state regulation, could not reject a woman from a civil service teaching position solely because she would not remove her headscarf while teaching, and State v. Freeman, in which a Florida court held that a woman could not pose for a driver's license photograph wearing a garment (the niqab) that covered all of her face except her eyes. While judges and …


Towards A Right To Privacy In Transnational Intelligence Networks, Francesca Bignami Jan 2007

Towards A Right To Privacy In Transnational Intelligence Networks, Francesca Bignami

Michigan Journal of International Law

Privacy is one of the most critical liberal rights to come under pressure from transnational intelligence gathering. This Article explores the many ways in which transnational intelligence networks intrude upon privacy and considers some of the possible forms of legal redress. Part II lays bare the different types of transnational intelligence networks that exist today. Part III begins the analysis of the privacy problem by examining the national level, where, over the past forty years, a legal framework has been developed to promote the right to privacy in domestic intelligence gathering. Part IV turns to the privacy problem transnationally, when …


Reservoirs Of Danger: The Evolution Of Public And Private Law At The Dawn Of The Information Age, Danielle K. Citron Jan 2007

Reservoirs Of Danger: The Evolution Of Public And Private Law At The Dawn Of The Information Age, Danielle K. Citron

Faculty Scholarship

A defining problem at the dawn of the Information Age will be securing computer databases of ultra-sensitive personal information. These reservoirs of data fuel our Internet economy but endanger individuals when their information escapes into the hands of cyber-criminals. This juxtaposition of opportunities for rapid economic growth and novel dangers recalls similar challenges society and law faced at the outset of the Industrial Age. Then, reservoirs collected water to power textile mills: the water was harmless in repose but wrought havoc when it escaped. After initially resisting Rylands v. Fletcher's strict liability standard as undermining economic development, American courts and …


Medicine And Public Health: Crossing Legal Boundaries, Wendy K. Mariner Jan 2007

Medicine And Public Health: Crossing Legal Boundaries, Wendy K. Mariner

Faculty Scholarship

In 2006, New York City began a mandatory reporting system for laboratories to submit blood sugar (A1c) test results (primarily for diabetes) to the city's Department of Health and Mental Hygiene without the patient's consent. This article examines whether this new program is an innovative way to improve New Yorkers' health, an invasion of medical privacy, or usurpation of the physician's role. The registry is an example of public health initiatives in chronic diseases, which challenge the limits of laws governing medicine care and public health programs by blurring the historical boundaries between them.


Confidentiality Of Educational Records And Child Protective Proceedings, Frank E. Vandervort Jan 2007

Confidentiality Of Educational Records And Child Protective Proceedings, Frank E. Vandervort

Book Chapters

The Federal Family Education Rights and Privacy Act (FERPA), which provides funding for state educational programming, requires that student records be disclosed to a nonparent only with the written consent of the child’s parent, unless the disclosure falls within one of the several exceptions detailed in the statute. One of the exemptions provided for in the federal law permits a school to disclose information to “state or local officials or authorities to whom [that] information is allowed to be reported or disclosed pursuant to state statute,” if that official certifies in writing “that the information will not be disclosed to …


Special Project+ Privacy, Melody R. Barron Jan 2007

Special Project+ Privacy, Melody R. Barron

Vanderbilt Law Review

Privacy has long been a matter of particular concern in the minds of Americans. Indeed, privacy concerns were at the crux of the American Revolution. The earliest days of colonial life saw creation of laws protecting the individual against eavesdropping, and the sanctity of one's home. The Bill of Rights also reflects privacy interests. As America grew, technological advances in the dissemination of information caused public demands for protection of privacy rights; I Each year, the Vanderbilt Law Review publishes one issue with notes devoted solely to a topic of current interest. These notes collectively constitute the Special Project.


Fired For Blogging: Are There Legal Protections For Employees Who Blog?, Robert Sprague Dec 2006

Fired For Blogging: Are There Legal Protections For Employees Who Blog?, Robert Sprague

Robert Sprague

No abstract provided.


From Taylorism To The Omnipticon: Expanding Employee Surveillance Beyond The Workplace, Robert Sprague Dec 2006

From Taylorism To The Omnipticon: Expanding Employee Surveillance Beyond The Workplace, Robert Sprague

Robert Sprague

No abstract provided.


The Technology Of Surveillance: Will The Supreme Court's Expectations Ever Resemble Society's?, Stephen E. Henderson Dec 2006

The Technology Of Surveillance: Will The Supreme Court's Expectations Ever Resemble Society's?, Stephen E. Henderson

Stephen E Henderson

For law students studying criminal procedure—or at least for those cramming for the exam—it becomes a mantra: government conduct only implicates the Fourth Amendment protection against unreasonable searches if it invades a “reasonable expectation of privacy.” This is not the contemporary definition of the word “search,” nor was it the definition at the time of the founding. But, via a well-intentioned concurrence by Justice Harlan in the famous 1967 case of Katz v. United States, it became the Court’s definition.
This lack of fealty to the English language left some questions. For example, is determining whether someone has a “reasonable …


Beyond The (Current) Fourth Amendment: Protecting Third-Party Information, Third Parties, And The Rest Of Us Too, Stephen E. Henderson Dec 2006

Beyond The (Current) Fourth Amendment: Protecting Third-Party Information, Third Parties, And The Rest Of Us Too, Stephen E. Henderson

Stephen E Henderson

For at least thirty years the Supreme Court has adhered to its third-party doctrine in interpreting the Fourth Amendment, meaning that so far as a disclosing party is concerned, information in the hands of a third party receives no Fourth Amendment protection. The doctrine was controversial when adopted, has been the target of sustained criticism, and is the predominant reason that the Katz revolution has not been the revolution many hoped it would be. Some forty years after Katz the Court's search jurisprudence largely remains tied to property conceptions. As I have demonstrated elsewhere, however, the doctrine is not the …