Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Privacy

2008

Journal

Discipline
Institution
Publication

Articles 1 - 23 of 23

Full-Text Articles in Law

Leave Me Alone! The Delicate Balance Of Privacy And Commercial Speech In The Evolving Do-Not-Call Registry, Andrew L. Sullivant Dec 2008

Leave Me Alone! The Delicate Balance Of Privacy And Commercial Speech In The Evolving Do-Not-Call Registry, Andrew L. Sullivant

Federal Communications Law Journal

In 2004, the Tenth Circuit held that although the newly enacted do-not-call registry restricted commercial speech, the restriction was narrowly tailored and thus fell within the bounds of the Constitution. Since that decision, the Federal Trade Commission has amended the do-not-call registry to abolish the provision that required individuals to re-register every five years, and in 2008, Congress passed the amendment. This Note argues that the five-year reregistration requirement is a substantial factor in the registry's narrow tailoring. By removing the requirement, questions as to the restriction's constitutionality reemerge.


Unfair Warning: Breach Notification In The Fcc’S Enhanced Telephone Records Safeguards, Stephen L. Markus Oct 2008

Unfair Warning: Breach Notification In The Fcc’S Enhanced Telephone Records Safeguards, Stephen L. Markus

Cornell Journal of Law and Public Policy

No abstract provided.


Towards An Equality-Enhancing Conception Of Privacy, Jane Bailey Oct 2008

Towards An Equality-Enhancing Conception Of Privacy, Jane Bailey

Dalhousie Law Journal

Canadian jurisprudence has explicitly recognized the impact of child pornography on the privacy rights of the children abused in its production. In contrast, it has generally not analyzed other forms of harmful expression, such as hate propaganda and obscenity,to be violations of the privacy rights of those targeted. In a previous article, the author suggested that this distinction in the jurisprudence reflected the relative ease with which the privacy interests of the individual children whose abuse is documented inchild pornography meshed with the prevalent Western approach toprivacy as a negative individual liberty against intrusion. Noting the historic role that the …


Say Cheese! Examining The Constitutionality Of Photostops, Molly Bruder Aug 2008

Say Cheese! Examining The Constitutionality Of Photostops, Molly Bruder

American University Law Review

No abstract provided.


Gonzales V. Carhart: Continuing The Class Critique Of The Reproductive Rights Doctrine And Movement, Pamela Bridgwater Jul 2008

Gonzales V. Carhart: Continuing The Class Critique Of The Reproductive Rights Doctrine And Movement, Pamela Bridgwater

South Carolina Law Review

No abstract provided.


The Problems With The Reporter's Privilege, Eliason D. Eliason Jun 2008

The Problems With The Reporter's Privilege, Eliason D. Eliason

American University Law Review

No abstract provided.


Reforming Fourth Amendment Privacy Doctrine, Jim Harper Jun 2008

Reforming Fourth Amendment Privacy Doctrine, Jim Harper

American University Law Review

No abstract provided.


The Newest Way To Screen Job Applicants: A Social Networker's Nightmare, Carly Brandenburg Jun 2008

The Newest Way To Screen Job Applicants: A Social Networker's Nightmare, Carly Brandenburg

Federal Communications Law Journal

Social networking is an easy way to share information with friends, family, and the company that just offered you an interview. Employers are utilizing all of the tools available to them as they strive to hire the right people, and this means that social networkers may need to self censor in order to protect their information from falling into the wrong hands. This Note questions whether social networkers can legally expect or enjoy any right to privacy with respect to their online postings.


Privacy Protection: When Is “Adequate” Actually Adequate?, Nikhil S. Palekar Apr 2008

Privacy Protection: When Is “Adequate” Actually Adequate?, Nikhil S. Palekar

Duke Journal of Comparative & International Law

No abstract provided.


Missing Privacy Through Individuation: The Treatment Of Privacy Law In The Canadian Case Law On Hate, Obscenity, And Child Pornography, Jane Bailey Apr 2008

Missing Privacy Through Individuation: The Treatment Of Privacy Law In The Canadian Case Law On Hate, Obscenity, And Child Pornography, Jane Bailey

Dalhousie Law Journal

Privacy is approached differently in the Canadian case law on child pornography than in hate propaganda and obscenity cases. Privacy analyses in all three contexts focus considerable attention on the interests of the individuals accused, particularly in relation to minimizing state intrusion on private spheres of activity However, the privacy interests of the.equality-seeking communities targeted by these forms of communication are more directly addressed in child pornography cases than in hate propaganda and obscenity cases. One possible explanation for this difference is that hate propaganda and obscenity simply do not affect the privacy interests of targeted groups and their members. …


When Mobile Phones Are Rfid-Equipped - Finding E.U.-U.S. Solutions To Protect Consumer Privacy And Facilitate Mobile Commerce, Nancy J. King Jan 2008

When Mobile Phones Are Rfid-Equipped - Finding E.U.-U.S. Solutions To Protect Consumer Privacy And Facilitate Mobile Commerce, Nancy J. King

Michigan Telecommunications & Technology Law Review

New mobile phones have been designed to include delivery of mobile advertising and other useful location-based services, but have they also been designed to protect consumers' privacy? One of the key enabling technologies for these new types of phones and new mobile services is Radio Frequency Identification (RFID), a wireless communication technology that enables the unique identification of tagged objects. In the case of RFID-enabled mobile phones, the personal nature of the devices makes it very likely that, by locating a phone, businesses will also be able to locate its owner. Consumers are currently testing new RFID-enabled phones around the …


The 2007 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andy Jones, Craig Valli, Glenn S. Dardick, Iain Sutherland Jan 2008

The 2007 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andy Jones, Craig Valli, Glenn S. Dardick, Iain Sutherland

Journal of Digital Forensics, Security and Law

All organisations, whether in the public or private sector, increasingly use computers and other devices that contain computer hard disks for the storage and processing of information relating to their business, their employees or their customers. Individual home users also increasingly use computers and other devices containing computer hard disks for the storage and processing of information relating to their private, personal affairs. It continues to be clear that the majority of organisations and individual home users still remain ignorant or misinformed of the volume and type of information that is stored on the hard disks that these devices contain …


Steganography: Forensic, Security, And Legal Issues, Merrill Warkentin, Ernst Bekkering, Mark B. Schmidt Jan 2008

Steganography: Forensic, Security, And Legal Issues, Merrill Warkentin, Ernst Bekkering, Mark B. Schmidt

Journal of Digital Forensics, Security and Law

Steganography has long been regarded as a tool used for illicit and destructive purposes such as crime and warfare. Currently, digital tools are widely available to ordinary computer users also. Steganography software allows both illicit and legitimate users to hide messages so that they will not be detected in transit. This article provides a brief history of steganography, discusses the current status in the computer age, and relates this to forensic, security, and legal issues. The paper concludes with recommendations for digital forensics investigators, IT staff, individual users, and other stakeholders.


The Lactating Angel Or Activist? Public Breatsfeeding As Symbolic Speech, Elizabeth Hildebrand Matherne Jan 2008

The Lactating Angel Or Activist? Public Breatsfeeding As Symbolic Speech, Elizabeth Hildebrand Matherne

Michigan Journal of Gender & Law

The only way to combat this stigma against public breastfeeding is through the act of breastfeeding in public. The author proposes that breastfeeding is a powerful act of symbolic speech vital for discarding one of the lingering shackles of women's inequality that triggers first amendment protection. Breastfeeding in public addresses this stigma by treating two ills at once: 1) greater public exposure to the practice decreases the severity of society's reactions, and 2) the less stares and confrontation that publicly nursing mothers receive, the more likely they will be to breastfeed, whenever or wherever their baby is hungry. This will …


Reexamining Student Privacy Laws In Response To The Virginia Tech Tragedy, Matthew Alex Ward Jan 2008

Reexamining Student Privacy Laws In Response To The Virginia Tech Tragedy, Matthew Alex Ward

Journal of Health Care Law and Policy

No abstract provided.


Welfare, Privacy, And Feminism, Michele E. Gilman Jan 2008

Welfare, Privacy, And Feminism, Michele E. Gilman

University of Baltimore Law Forum

Feminism has long been concerned with privacy. Second-wave feminists assailed the divide between the public and the private spheres that trapped women in the home, excluded them from the workforce, and subjected them to domestic abuse. Second-wave feminists also argued in favor of a sphere of privacy that would allow women to make reproductive choices without state interference. These were powerful critiques of existing power structures, but they tended to overlook the experiences of poor women. As a condition of receiving welfare benefits, poor women have been subjected to drug tests, and they continue to face unannounced home inspections by …


Privacy On Planet Google: Using The Theory Of "Contextual Integrity" To Clarify The Privacy Threats Of Google's Quest For The Perfect Search Engine, Michael Zimmer Jan 2008

Privacy On Planet Google: Using The Theory Of "Contextual Integrity" To Clarify The Privacy Threats Of Google's Quest For The Perfect Search Engine, Michael Zimmer

Journal of Business & Technology Law

No abstract provided.


Analysis Of Information Remaining On Hand Held Devices Offered For Sale On The Second Hand, Andy Jones, Craig Valli, Iain Sutherland Jan 2008

Analysis Of Information Remaining On Hand Held Devices Offered For Sale On The Second Hand, Andy Jones, Craig Valli, Iain Sutherland

Journal of Digital Forensics, Security and Law

The ownership and use of mobile phones, Personal Digital Assistants and other hand held devices is now ubiquitous both for home and business use. The majority of these devices have a high initial cost, a relatively short period before they become obsolescent and a relatively low second hand value. As a result of this, when the devices are replaced, there are indications that they tend to be discarded. As technology has continued to develop, it has led to an increasing diversity in the number and type of devices that are available, and the processing power and the storage capacity of …


Intentional Sex Torts, Deana Pollard Sacks Jan 2008

Intentional Sex Torts, Deana Pollard Sacks

Fordham Law Review

Intentional tort law generally protects personal autonomy and self-determination vigorously by requiring fair disclosure before consent to physical contact is considered voluntary and valid. A glaring exception exists regarding consent to sexual relations. Although American law historically has provided remedies for fraudulent or other tortious inducement of sexual relations, current sex tort jurisprudence offers virtually no protection. The law’s contemporary “caveat emptor” approach to cases of sexual autonomy infringement is inappropriate because it departs from fundamental principles of intentional tort doctrine. In addition, the current law supports a “false” norm that sexual misappropriation is acceptable. Current law fails to protect …


The Fair Use Doctrine And Trackjacking: Beautiful Animal Or Destroyer Of Worlds?, S. Wayne Clemons, Jr. Jan 2008

The Fair Use Doctrine And Trackjacking: Beautiful Animal Or Destroyer Of Worlds?, S. Wayne Clemons, Jr.

Vanderbilt Journal of Entertainment & Technology Law

"Trackjacking" is the unauthorized replacement of the original soundtrack of an audiovisual recording, such as a movie or television show, with another that is designed to alter substantially the plot and/or characters of the original work. While trackjacking is a creative and entertaining form of art, it may also constitute copyright infringement if the original work is one that is copyrighted. However, if certain criteria are met, the "fair use" doctrine provides a mechanism for courts to excuse what otherwise would be considered copyright infringement. Because the unique nature of trackjacking allows the new work to be distributed in such …


Six Clicks Of Separation: The Legal Ramifications Of Employers Using Social Networking Sites To Research Applicants, Ian Byrnside Jan 2008

Six Clicks Of Separation: The Legal Ramifications Of Employers Using Social Networking Sites To Research Applicants, Ian Byrnside

Vanderbilt Journal of Entertainment & Technology Law

As social networking sites like Facebook.com and MySpace.com continue to grow in popularity, college students and other job applicants voluntarily divulge an increasing amount of personal information on them, often unaware of the potential negative effects it may have on their search for employment. Employers are beginning to take note of this trend and are increasingly using applicants' social networking profiles to supplement traditional application information. Many applicants feel that employers should not base employment decisions on social networking profiles in any way and believe that it is illegal for employers to do so. Yet, it appears that employers that …


You Are Being Watched: The Need For Notice In Employer Electronic Monitoring, Mindy C. Calisti Jan 2008

You Are Being Watched: The Need For Notice In Employer Electronic Monitoring, Mindy C. Calisti

Kentucky Law Journal

No abstract provided.


Which Washington: Constitutions In Conflict?, Jonathan F. Duncan, Kristina V. Giddings Jan 2008

Which Washington: Constitutions In Conflict?, Jonathan F. Duncan, Kristina V. Giddings

Marquette Sports Law Review

No abstract provided.