Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 44 of 44

Full-Text Articles in Law

Family, Naomi R. Cahn Jan 2006

Family, Naomi R. Cahn

GW Law Faculty Publications & Other Works

Based on contemporary privacy law, this entry discusses two different aspects of family privacy: (1) the marital relationship and (2) the parent-child relationship. Marital privacy protects several aspects of married life. The first form of marital privacy protects the very decision of whom to marry. While state laws generally establish who may marry whom, the Supreme Court has established the quasi-fundamental nature of the right to marry. The second form of marital privacy involves the right to relational privacy. This constitutionally developed right to marital privacy protects the relationship from undue interference, particularly in the context of sexual decision-making.

There …


A Model Regime Of Privacy Protection, Daniel J. Solove Jan 2006

A Model Regime Of Privacy Protection, Daniel J. Solove

GW Law Faculty Publications & Other Works

A series of major security breaches at companies with sensitive personal information has sparked significant attention to the problems with privacy protection in the United States. Currently, the privacy protections in the United States are riddled with gaps and weak spots. Although most industrialized nations have comprehensive data protection laws, the United States has maintained a sectoral approach where certain industries are covered and others are not. In particular, emerging companies known as "commercial data brokers" have frequently slipped through the cracks of U.S. privacy law. In this article, the authors propose a Model Privacy Regime to address the problems …


A Model Regime Of Privacy Protection (Version 1.1), Daniel J. Solove, Chris Jay Hoofnagle Jan 2005

A Model Regime Of Privacy Protection (Version 1.1), Daniel J. Solove, Chris Jay Hoofnagle

GW Law Faculty Publications & Other Works

Privacy protection in the United States has often been criticized, but critics have too infrequently suggested specific proposals for reform. Recently, there has been significant legislative interest at both the federal and state levels in addressing the privacy of personal information. This was sparked when ChoicePoint, one of the largest data brokers in the United States with records on almost every adult American citizen, sold data on about 145,000 people to fraudulent businesses set up by identity thieves.

In the aftermath of the ChoicePoint debacle, both of us have been asked by Congressional legislative staffers, state legislative policymakers, journalists, academics, …


A Model Regime Of Privacy Protection (Version 2.0), Daniel J. Solove, Chris Jay Hoofnagle Jan 2005

A Model Regime Of Privacy Protection (Version 2.0), Daniel J. Solove, Chris Jay Hoofnagle

GW Law Faculty Publications & Other Works

This version incorporates and responds to the many comments that we received to Version 1.1, which we released on March 10, 2005.

Privacy protection in the United States has often been criticized, but critics have too infrequently suggested specific proposals for reform. Recently, there has been significant legislative interest at both the federal and state levels in addressing the privacy of personal information. This was sparked when ChoicePoint, one of the largest data brokers in the United States with records on almost every adult American citizen, sold data on about 145,000 people to fraudulent businesses set up by identity thieves. …


Melville's Billy Budd And Security In Times Of Crisis, Daniel J. Solove Jan 2005

Melville's Billy Budd And Security In Times Of Crisis, Daniel J. Solove

GW Law Faculty Publications & Other Works

During times of crisis, our leaders have made profound sacrifices in the name of security, ones that we later realized need not have been made. Examples include the Palmer Raids, the McCarthy Era anti-Communist movement, and the Japanese-American Internment. After September 11th, this tragic history repeated itself. The Bush Administration has curtailed civil liberties in many ways, including detaining people indefinitely without hearings or counsel. These events give Herman Melville's "Billy Budd" renewed relevance to our times. "Billy Budd" is a moving depiction of a profound sacrifice made in the name of security. This essay diverges from conventional readings that …


Reconstructing Electronic Surveillance Law, Daniel J. Solove Jan 2004

Reconstructing Electronic Surveillance Law, Daniel J. Solove

GW Law Faculty Publications & Other Works

After the September 11th attacks in 2001, Congress hastily passed the USA-Patriot Act which made several changes to electronic surveillance law. The Act has sparked a fierce debate. However, the pros and cons of the USA-Patriot Act are only one part of a much larger issue: How effective is the law that regulates electronic surveillance?

The USA-Patriot Act made a number of changes in electronic surveillance law, but the most fundamental problems with the law did not begin with the USA-Patriot Act. In this article, Professor Solove argues that electronic surveillance law suffers from significant problems that predate the USA-Patriot …


The Digital Person: Technology And Privacy In The Information Age (Introduction), Daniel J. Solove Jan 2004

The Digital Person: Technology And Privacy In The Information Age (Introduction), Daniel J. Solove

GW Law Faculty Publications & Other Works

THE DIGITAL PERSON: TECHNOLOGY AND PRIVACY IN THE INFORMATION AGE (ISBN: 0814798462) (NYU Press 2004) explores the social, political, and legal implications of the collection and use of personal information in computer databases. In the Information Age, our lives are documented in digital dossiers maintained by hundreds (perhaps thousands) of businesses and government agencies. These dossiers are composed of bits of our personal information, which when assembled together begin to paint a portrait of our personalities. The dossiers are increasingly used to make decisions about our lives - whether we get a loan, a mortgage, a license, or a job; …


The Origins And Growth Of Information Privacy Law, Daniel J. Solove Jan 2003

The Origins And Growth Of Information Privacy Law, Daniel J. Solove

GW Law Faculty Publications & Other Works

In recent years, information privacy has emerged as one of the central issues of our times. Today, we have hundreds of laws pertaining to privacy - the common law torts, criminal law, evidentiary privileges, constitutional law, at least twenty federal statutes, and numerous statutes in each of the fifty states. To understand the law of information privacy more completely, it is necessary to look to its origins and growth. This article provides a brief overview of the history of the development of information privacy law. In particular, it explores the way that the law has emerged in response to changes …


Identity Theft, Privacy, And The Architecture Of Vulnerability, Daniel J. Solove Jan 2003

Identity Theft, Privacy, And The Architecture Of Vulnerability, Daniel J. Solove

GW Law Faculty Publications & Other Works

This Article contrasts two models for understanding and protecting against privacy violations. Traditionally, privacy violations have been understood as invasive actions by particular wrongdoers who cause direct injury to victims. Victims experience embarrassment, mental distress, or harm to their reputations. Privacy is not infringed until these mental injuries materialize. Thus, the law responds when a person's deepest secrets are exposed, reputation is tarnished, or home is invaded. Under the traditional view, privacy is an individual right, remedied at the initiative of the individual.

In this Article, Professor Solove contends the traditional model does not adequately account for many of the …


The Virtues Of Knowing Less: Justifying Privacy Protections Against Disclosure, Daniel J. Solove Jan 2003

The Virtues Of Knowing Less: Justifying Privacy Protections Against Disclosure, Daniel J. Solove

GW Law Faculty Publications & Other Works

This Article develops justifications for protections against the disclosure of private information. An extensive body of scholarship has attacked such protections as anathema to the Information Age, where the free flow of information is championed as a fundamental value. This Article responds to two general critiques of disclosure protections: (1) that they inhibit freedom of speech, and (2) that they restrict information useful for judging others.

Regarding the free speech critique, the Article argues that not all speech is of equal value; speech of private concern is less valuable than speech of public concern. The difficulty, however, is distinguishing between …


Access And Aggregation: Privacy, Public Records, And The Constitution, Daniel J. Solove Jan 2002

Access And Aggregation: Privacy, Public Records, And The Constitution, Daniel J. Solove

GW Law Faculty Publications & Other Works

In this article, Professor Solove develops a theory to reconcile the tension between transparency and privacy in the context of public records. Federal and state governments maintain public records containing personal information spanning an individual's life from birth to death. The web of state and federal regulation that governs the accessibility of these records generally creates a default rule in open access to information. Solove contends that the ready availability of public records creates a significant problem for privacy because various bits of information when aggregated paint a detailed portrait of a person's life that Solove refers to as a …


Conceptualizing Privacy, Daniel J. Solove Jan 2002

Conceptualizing Privacy, Daniel J. Solove

GW Law Faculty Publications & Other Works

In this Article, Professor Solove develops a new approach for conceptualizing privacy. He begins by examining the existing discourse about conceptualizing privacy, exploring the conceptions of a wide array of jurists, legal scholars, philosophers, psychologists, and sociologists. Solove contends that the theories are too narrow or too broad. With a few exceptions, the discourse seeks to conceptualize privacy by isolating one or more common essential or core characteristics of privacy. Expounding upon Ludwig Wittgenstein's notion of family resemblance, Solove contends that privacy is better understood as drawing from a common pool of similar characteristics. Rather than search for an overarching …


Digital Dossiers And The Dissipation Of Fourth Amendment Privacy, Daniel J. Solove Jan 2002

Digital Dossiers And The Dissipation Of Fourth Amendment Privacy, Daniel J. Solove

GW Law Faculty Publications & Other Works

In this article, Professor Solove examines the increasing information flow from the private sector to the government, especially in light of the response to September 11, 2001. In today's Information Age, private sector entities are gathering an unprecedented amount of personal information about individuals, and the data is increasingly being accessed by government law enforcement officials. This government information gathering takes place outside the bounds of the Fourth Amendment, since the Supreme Court held in Smith v. Maryland and United States v. Miller that the Fourth Amendment does not apply to records held by third parties. Law enforcement officials can, …


Privacy And Power: Computer Databases And Metaphors For Information Privacy, Daniel J. Solove Jan 2001

Privacy And Power: Computer Databases And Metaphors For Information Privacy, Daniel J. Solove

GW Law Faculty Publications & Other Works

Journalists, politicians, jurists, and legal academics often describe the privacy problem created by the collection and use of personal information through computer databases and the Internet with the metaphor of Big Brother - the totalitarian government portrayed in George Orwell's Nineteen Eighty-Four. Professor Solove argues that this is the wrong metaphor. The Big Brother metaphor as well as much of the law that protects privacy emerges from a longstanding paradigm for conceptualizing privacy problems. Under this paradigm, privacy is invaded by uncovering one's hidden world, by surveillance, and by the disclosure of concealed information. The harm caused by such invasions …