Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Law

No Direction Home: Will The Law Keep Pace With Human Tracking Technology To Protect Individual Privacy And Stop Geoslavery, William A. Herbert Jul 2006

No Direction Home: Will The Law Keep Pace With Human Tracking Technology To Protect Individual Privacy And Stop Geoslavery, William A. Herbert

Publications and Research

Increasingly, public and private employers are utilizing human tracking devices to monitor employee movement and conduct. Due to the propensity of American labor law to give greater weight toemployer property interests over most employee privacy expectations, there are currently few limitations on the use of human tracking in employment. The scope and nature of current legal principles regarding individual privacy are not sufficient to respond to the rapid development and use of human tracking technology. The academic use of the phrase “geoslavery” to describe the abusive use of such technology underscores its power. This article examines the use of such …


Fixing Fisa For Long War: Regulating Warrantless Surveillance In The Age Of Terrorism, Adam Burton Jun 2006

Fixing Fisa For Long War: Regulating Warrantless Surveillance In The Age Of Terrorism, Adam Burton

The University of New Hampshire Law Review

[Excerpt] “The English poet W.H. Auden once claimed that “Peeping Toms are never praised, like novelists or bird watchers, for the keenness of their observations.” Perhaps Auden would have modified his maxim had he lived in the age of terrorism. A certain degree of government surveillance of even intimate communications is expected, encouraged, and indeed praised when the government’s efforts lead to the prevention of catastrophe. However, it is also expected that the government will minimize these intrusions, will conduct surveillance only on legitimate targets, and will follow the procedural safeguards that the representatives of the people have enacted in …


Personal Medical Information: Privacy Or Personal Data Protection?, Wilhelm Peekhaus Apr 2006

Personal Medical Information: Privacy Or Personal Data Protection?, Wilhelm Peekhaus

Canadian Journal of Law and Technology

Some of the existing literature concerning the privacy of health information seems to suggest that medical information has a particularly special nature; either through its oft-cited association with dignity or the need for its ‘‘unobstructed’’ use by health care practitioners for a variety of reasons. It is against such a backdrop that this paper will review and compare a number of legislative mechanisms that have been designed to meet the challenge of safeguarding the privacy of personal information without completely hindering the continued flow of information required by economic and health care systems. An attempt will be made to situate …


Revisiting The American Action For Public Disclosure Of Facts, Brian C. Murchison Jan 2006

Revisiting The American Action For Public Disclosure Of Facts, Brian C. Murchison

Scholarly Articles

None available.


Lost In Translation? Data Mining, National Security And The Adverse Inference Problem, Anita Ramasastry Jan 2006

Lost In Translation? Data Mining, National Security And The Adverse Inference Problem, Anita Ramasastry

Articles

To the extent that we permit data mining programs to proceed, they must provide adequate due process and redress mechanisms that permit individuals to clear their names. A crucial criteria for such a mechanism is to allow access to information that was used to make adverse assessments so that errors may be corrected. While some information may have to be kept secret for national security purposes, a degree of transparency is needed when individuals are trying to protect their right to travel or access government services free from suspicion.

Part II of this essay briefly outlines the government's ability to …


Equal Protection In The World Of Art And Obscenity: The Art Photographer's Latent Struggle With Obscenity Standards In Contemporary America, Elaine Wang Jan 2006

Equal Protection In The World Of Art And Obscenity: The Art Photographer's Latent Struggle With Obscenity Standards In Contemporary America, Elaine Wang

Vanderbilt Journal of Entertainment & Technology Law

Part I of this article describes the initial hurdles that all visual art forms, including photography, face with respect to First Amendment protection given the power of visual imagery and the three-pronged test for obscenity set forth in Miller v. California. Of particular relevance is the "serious artistic value" prong of the Miller test and the problems inherent in determining who is to judge as well as how one might judge whether a work, particularly a photograph that may be construed to have a non-artistic function, possesses "serious artistic value."

Part II addresses the overall approach to photography in three …


A Feeling Of Unease About Privacy Law, Ann Bartow Jan 2006

A Feeling Of Unease About Privacy Law, Ann Bartow

Law Faculty Scholarship

This essay responds to Daniel Solove's recent article, A Taxonomy of Privacy. I have read many of Daniel Solove's privacy-related writings, and he has made many important scholarly contributions to the field. As with his previous works about privacy and the law, it is an interesting and substantive piece of work. Where it falls short, in my estimation, is in failing to label and categorize the very real harms of privacy invasions in an adequately compelling manner. Most commentators agree that compromising a person's privacy will chill certain behaviors and change others, but a powerful list of the reasons why …


The Privacy Gambit: Toward A Game Theoretic Approach To International Data Protection, Horace E. Anderson Jr. Jan 2006

The Privacy Gambit: Toward A Game Theoretic Approach To International Data Protection, Horace E. Anderson Jr.

Vanderbilt Journal of Entertainment & Technology Law

This article briefly explores several scenarios in which economic actors compete and cooperate in order to capture the value in personal information. The focus then shifts to one particular scenario: the ongoing interaction between the United States and the European Union in attempting to construct data protection regimes that serve the philosophies and citizens of each jurisdiction as well as provide a strategic economic advantage. A game theoretic model is presented to explain the course of dealings between the two actors, including both unilateral and bilateral actions. Part I ends with an exploration of opportunities for seizing competitive advantage, and …


Seeking Privacy: Examining A Role For The Fiduciary In Protecting Personal Information, Marcey L. Grigsby Jan 2006

Seeking Privacy: Examining A Role For The Fiduciary In Protecting Personal Information, Marcey L. Grigsby

NYLS Law Review

No abstract provided.


Privacy, Princesses, And Paparazzi, Barbara Mcdonald Jan 2006

Privacy, Princesses, And Paparazzi, Barbara Mcdonald

NYLS Law Review

No abstract provided.


Patients And Biobanks, Ellen Wright Clayton Jan 2006

Patients And Biobanks, Ellen Wright Clayton

Vanderbilt Law School Faculty Publications

The question about the privacy of medical information can be stated simply: To what extent can and should patients control what the medical record contains and who has access to it and for what purposes? Patients often have apparently conflicting views on this subject. On the one hand, we, as patients, say that we prize privacy and that we fear that information will be used to harm us. On the other hand, we value the benefits that come from improved communication among providers, such as having our visits covered by third party payers and advances in medical science, which often …