Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Privacy

2011

Discipline
Institution
Publication
Publication Type
File Type

Articles 1 - 30 of 71

Full-Text Articles in Law

De Rechtsstaat In Cyberspace?, Mireille Hildebrandt Dec 2011

De Rechtsstaat In Cyberspace?, Mireille Hildebrandt

Mireille Hildebrandt

Cyberspace is inmiddels overal. Wat tien jaar geleden misschien nog een aparte niet-fysieke wereld leek waar niemand wist dat je een hond was, gaat steeds meer lijken op een verzameling onderling verbonden dorpspleinen. Met dien verstande dat alles wat iedereen doet permanent wordt opgenomen, opgeslagen en doorzocht op betekenisvolle patronen. Steeds meer personen, organisaties maar ook dingen raken verbonden via het internet. De Internationale Telecommunicatie Unie sprak in 2005 van het ‘internet van de dingen’, om aan te geven dat binnen afzienbare tijd alles overal (‘everyware’) via draadloze identificatiesystemen traceerbaar is. Intussen raakt iedereen via de smartphone ‘always on(line)’. Deze …


Smartphone, Dumb Regulations: Mixed Signals In Mobile Privacy, Christian Levis Dec 2011

Smartphone, Dumb Regulations: Mixed Signals In Mobile Privacy, Christian Levis

Fordham Intellectual Property, Media and Entertainment Law Journal

The smartphone has turned a user’s location into valuable information. Users of smart devices can use location-based mobile services to get driving directions, check into social networks, or even see which of their friends are around. But the use of this technology, and the new type of data created by it, raises privacy concerns as to who has access to one's location-based information. Because the only legislation covering this technology, the Electronic Communications Privacy Act, is more than twenty-five years old, courts encounter problems when trying to use it to resolve these privacy issues, often reaching illogical results. This Note …


Sex, Privacy And Public Health In A Casual Encounters Culture, Mary D. Fan Dec 2011

Sex, Privacy And Public Health In A Casual Encounters Culture, Mary D. Fan

Articles

The regulation of sex and disease is a cultural and political flashpoint and recurring challenge that law's antiquated arsenal has been hard- pressed to effectively address. Compelling data demonstrate the need for attention—for example, one in four women aged fourteen to nineteen is infected with at least one sexually transmitted disease ("STD"); managing STDs costs an estimated $15.9 billion annually; and syphilis, once near eradication, is on the rise again, as are the rates of HIV diagnosis among people aged fifteen to twenty-four. Public health officials on the front lines have called for paradigm changes to tackle the enormous challenge. …


Cloud Computing Providers And Data Security Law: Building Trust With United States Companies, Jared A. Harshbarger Esq. Nov 2011

Cloud Computing Providers And Data Security Law: Building Trust With United States Companies, Jared A. Harshbarger Esq.

Jared A. Harshbarger

Cloud computing and software-as-a-service (SaaS) models are revolutionizing the information technology industry. As these services become more prevalent, data security and privacy concerns will also rise among consumers and the companies who consider using them. Cloud computing providers must establish a sufficient level of trust with their potential customers in order to ease initial fears - and ensure certain compliance obligations will be met - at least to the extent that any such inquiring customer will feel comfortable enough to ultimately take the irreversible step of releasing their sensitive data and personal information into the cloud.


Students' Fourth Amendment Rights In Schools: Strip Searches, Drug Tests, And More, Emily Gold Waldman Nov 2011

Students' Fourth Amendment Rights In Schools: Strip Searches, Drug Tests, And More, Emily Gold Waldman

Touro Law Review

No abstract provided.


Appellate Division, Third Department: People V. Hardy, Whitney Montgomery Oct 2011

Appellate Division, Third Department: People V. Hardy, Whitney Montgomery

Touro Law Review

No abstract provided.


Right To Information Identity, Elad Oreg Oct 2011

Right To Information Identity, Elad Oreg

Elad Oreg

Inspired by the famous Warren&Brandeis conceptualization of the "right to privacy", this article tries to answer a modern conceptual lacuna and present the argument for the need to conceptualize and recognize a new, independent legal principle of a "right to information-identity". This is the right of an individual to the functionality of the information platforms that enable others to identify and know him and to remember who and what he is. Changes in technology and social standards make the very notion of identity increasingly fluid, transforming the way it is treated and opening new and fascinating ways of relating to …


A Conflict Of Interests: Privacy, Truth, And Compulsory Dna Testing For Argentina’S Children Of The Disappeared, Elizabeth B. Ludwin King Oct 2011

A Conflict Of Interests: Privacy, Truth, And Compulsory Dna Testing For Argentina’S Children Of The Disappeared, Elizabeth B. Ludwin King

Cornell International Law Journal

From 1976 to 1983, Argentina was ruled by a military dictatorship that disappeared an estimated 30,000 suspected subversives, including parents of young children and pregnant women. Their children, either disappeared along with their parents or born in clandestine detention centers, were then taken from their parents and adopted, often by couples who were sympathetic with the government and knew of the children's origins. This Article addresses Argentina's newest effort to identify these now-adult children: compulsory DNA testing in cases where the raising parents are suspected of having knowingly adopted their children illegally. It argues that, although the mandatory testing permissibly …


10th Annual Conference On Recent Developments In Intellectual Property Law & Policy, Marc Greenberg, William T. Gallagher, Chester Chuang Sep 2011

10th Annual Conference On Recent Developments In Intellectual Property Law & Policy, Marc Greenberg, William T. Gallagher, Chester Chuang

Intellectual Property Law

Welcome to the 10 Annual Conference on Recent Developments in Intellectual Property Law andPolicy, presented by the Intellectual Property Law Center of Golden Gate University School of Law.


An Illusory Expectation Of Privacy: The Ecpa Is Insufficient To Provide Meaningful Protection For Advanced Communication Tools, Sara E. Brown Sep 2011

An Illusory Expectation Of Privacy: The Ecpa Is Insufficient To Provide Meaningful Protection For Advanced Communication Tools, Sara E. Brown

West Virginia Law Review

No abstract provided.


13th Annual Open Government Summit: Access To Public Records Act & Open Meetings Act, 2011, Department Of Attorney General, State Of Rhode Island Aug 2011

13th Annual Open Government Summit: Access To Public Records Act & Open Meetings Act, 2011, Department Of Attorney General, State Of Rhode Island

School of Law Conferences, Lectures & Events

No abstract provided.


Protecting Anonymous Expression: The Internet's Role In Washington State's Disclosure Laws And The Direct Democracy Process, Karen Cullinane Jul 2011

Protecting Anonymous Expression: The Internet's Role In Washington State's Disclosure Laws And The Direct Democracy Process, Karen Cullinane

University of Michigan Journal of Law Reform

This Note proposes that the Washington State Legislature amend its Public Records Act to exempt from public disclosure personal information legally required to be disclosed by signers of referendum petitions. This Note also proposes that the Washington State Legislature designate an electronic system, to be detailed in its election law, by which referendum petitions can be checked for fraud without violating the right to anonymous expression protected by the First Amendment. Part I describes Washington State's referendum process and the path of Doe v. Reed, the case animating the reform presented in this Note. Part II illustrates how the rise …


The Boundaries Of Privacy Harm, M. Ryan Calo Jul 2011

The Boundaries Of Privacy Harm, M. Ryan Calo

Indiana Law Journal

Just as a burn is an injury caused by heat, so is privacy harm a unique injury with specific boundaries and characteristics. This Essay describes privacy harm as falling into two related categories. The subjective category of privacy harm is the perception of unwanted observation. This category describes unwelcome mental states—anxiety, embarrassment, fear—that stem from the belief that one is being watched or monitored. Examples of subjective privacy harms include everything from a landlord eavesdropping on his tenants to generalized government surveillance.

The objective category of privacy harm is the unanticipated or coerced use of information concerning a person against …


Lawrence V. Texas: The Decision And Its Implications For The Future, Martin A. Schwartz Jun 2011

Lawrence V. Texas: The Decision And Its Implications For The Future, Martin A. Schwartz

Martin A. Schwartz

No abstract provided.


Personal Data Protection In The Era Of Cloud Computing. New Challenges For European Regulators., Panagiotis Kitsos, Paraskevi Pappas May 2011

Personal Data Protection In The Era Of Cloud Computing. New Challenges For European Regulators., Panagiotis Kitsos, Paraskevi Pappas

Panagiotis Kitsos

It is widely aknowledged that we are entering in an era of revolutionary changes in the field of Information and Communication Technologies . The spread of broadband internet connections has led internet to function not only as a communications network but also as a platform for new computing applications. The most recent application is the so called "cloud computing", which permits the running of software applications or the storage of data to be performed at remote servers which are connected to our computers through the Internet. Examples of these applications are the web-based email services, online computer back up, data …


Text Offenders: Privacy, Text Messages, And The Failure Of The Title Iii Minimization Requirement, Seth M. Hyatt May 2011

Text Offenders: Privacy, Text Messages, And The Failure Of The Title Iii Minimization Requirement, Seth M. Hyatt

Vanderbilt Law Review

For the past forty years, theory and practice in electronic surveillance have enjoyed an uneasy coexistence. In theory, under ("Title III"), government agents must use wire and electronic taps sparingly, and only under strict judicial supervision. In practice, however, federal courts have recognized countless loopholes and exceptions, leading critics to wonder whether Title III meaningfully limits state investigatory power.

Nowhere is this tension more apparent than in the context of "minimization." Under Title III, government agents conducting electronic surveillance must "minimize the interception of communications not otherwise subject to interception under this chapter." They must not listen in on any …


¿Viva La Data Protection? Chile As A Touchstone For The Future Of Information Privacy, Nicola Carah Menaldo Apr 2011

¿Viva La Data Protection? Chile As A Touchstone For The Future Of Information Privacy, Nicola Carah Menaldo

University of Miami International and Comparative Law Review

This article attempts to uncover a puzzle: although the traditional levers for strong privacy protection are present in Chile - a history of dictatorship, an information technology revolution, and strong trade with the European Union - its data protection laws are in fact very weak. What explains this apparent disconnect? This article challenges the conventional wisdom that Chile's weak data protection regime is the result of weak democratic institutions, collective action problems, or the prioritization of credit data protections. Instead, it argues that Chile's stunted regime results from a political culture in which privacy protections, generally, are traded off for …


Re-Mapping Privacy Law: How The Google Maps Scandal Requires Tort Law Reform, Lindsey A. Strachan Apr 2011

Re-Mapping Privacy Law: How The Google Maps Scandal Requires Tort Law Reform, Lindsey A. Strachan

Law Student Publications

This Comment explores how the law should handle such privacy claims. In analyzing both the photographic privacy claims as well as the Wi-Fi data privacy claims, this paper argues that current tort law is inadequate for such technologically advanced legal issues. Section II explores the background of Google Maps Street View and current privacy law, while Section III looks at the holes in current privacy torts in the context of the images displayed on Street View. Section IV examines the privacy implications surrounding the Wi-Fi scandal, and finally, Section V reviews the solution and provides a conclusion.


Collateral Consequences, Genetic Surveillance, And The New Biopolitics Of Race, Dorothy E. Roberts Apr 2011

Collateral Consequences, Genetic Surveillance, And The New Biopolitics Of Race, Dorothy E. Roberts

All Faculty Scholarship

This Article is part of a Howard Law Journal Symposium on “Collateral Consequences: Who Really Pays the Price for Criminal Justice?,” as well as my larger book project, Fatal Invention: How Science, Politics, and Big Business Re-create Race in the Twenty-First Century (The New Press, 2011). It considers state and federal government expansion of genetic surveillance as a collateral consequence of a criminal record in the context of a new biopolitics of race in America. Part I reviews the expansion of DNA data banking by states and the federal government, extending the collateral impact of a criminal record—in the form …


Cloud Computing: Architectural And Policy Implications, Christopher S. Yoo Apr 2011

Cloud Computing: Architectural And Policy Implications, Christopher S. Yoo

All Faculty Scholarship

Cloud computing has emerged as perhaps the hottest development in information technology. Despite all of the attention that it has garnered, existing analyses focus almost exclusively on the issues that surround data privacy without exploring cloud computing’s architectural and policy implications. This article offers an initial exploratory analysis in that direction. It begins by introducing key cloud computing concepts, such as service-oriented architectures, thin clients, and virtualization, and discusses the leading delivery models and deployment strategies that are being pursued by cloud computing providers. It next analyzes the economics of cloud computing in terms of reducing costs, transforming capital expenditures …


Home Is Where The Crime Is, I. Bennett Capers Apr 2011

Home Is Where The Crime Is, I. Bennett Capers

Michigan Law Review

Think of home. Go on. Maybe not your parents' home, which for this reviewer would be enough to induce heavy breathing and general anxiety. Rather, think about the concept of home. Think about the idea of home. Think about Home with a capital letter. Think of home as in The Wizard of Oz and Dorothy's famous "There's no place like home." Think "home sweet home." Or "home is where the heart is." Go on. Of course, there may be other associations that come to mind when one thinks of home. There's security. Safety. Control. Home rule. After all, in the …


How United States V. Jones Can Restore Our Faith In The Fourth Amendment, Erica Goldberg Mar 2011

How United States V. Jones Can Restore Our Faith In The Fourth Amendment, Erica Goldberg

Michigan Law Review First Impressions

United States v. Jones, issued in January of this year, is a landmark case that has the potential to restore a property-based interpretation of the Fourth Amendment to prominence. In 1967, the Supreme Court abandoned its previous Fourth Amendment framework, which had viewed the prohibition on unreasonable searches in light of property and trespass laws, and replaced it with a rule protecting the public’s reasonable expectations of privacy. Although the Court may have intended this reasonable expectations test to provide more protection than a test rooted in property law, the new test in fact made the Justices’ subjective views about …


The Anatomy Of A Search: Intrusiveness And The Fourth Amendment, Renée Mcdonald Hutchins Mar 2011

The Anatomy Of A Search: Intrusiveness And The Fourth Amendment, Renée Mcdonald Hutchins

Faculty Scholarship

No abstract provided.


Brief Of Aarp And The National Legislative Association On Prescription Drug Prices As Amici Curiae In Support Of Petitioners, Sean Flynn Mar 2011

Brief Of Aarp And The National Legislative Association On Prescription Drug Prices As Amici Curiae In Support Of Petitioners, Sean Flynn

Amicus Briefs

This brief was written in support of Vermont’s Prescription Confidentiality Law, which regulates the confidentiality of prescription records and protects them from being used by pharmaceutical companies as a “targeting tool” to identify doctors most susceptible to sales messages.


Tragedy Of The Data Commons, Jane Yakowitz Feb 2011

Tragedy Of The Data Commons, Jane Yakowitz

Jane Yakowitz

Accurate data is vital to enlightened research and policymaking, particularly publicly available data that are redacted to protect the identity of individuals. Legal academics, however, are campaigning against data anonymization as a means to protect privacy, contending that the wealth of information available on the Internet enables malfeasors to reverse-engineer the data and identify research subjects. Privacy scholars advocate for stringent new legal restrictions on the collection and dissemination of research data. This Article challenges the dominant wisdom, arguing that properly de-identified data is not only safe, but of extraordinary social utility. It makes three core claims. First, legal scholars …


The Dao Of Privacy, Lara A. Ballard Feb 2011

The Dao Of Privacy, Lara A. Ballard

Lara A Ballard

It is widely believed in some Western circles that a single multilateral human rights treaty, based largely on European models for data protection, can standardize a right to privacy on a global basis. It is also widely believed that East Asia has no real tradition of privacy. Both of these beliefs are mistaken. This Article explores the underlying philosophical assumptions beneath Western concepts of privacy that currently prevail on both sides of the Atlantic, by examining privacy through the lens of classical Daoism and the Northeast Asian philosophical tradition. Taking a cue from Professor Julie Cohen’s Configuring the Networked Self, …


Reconsidering A Parent’S ‘Apparent’ Authority In Intergenerational Co-Residence: The Need For A Paradigm Shift In Evaluating Parental Consent To Search Adult Children’S Bedrooms, Hillary B. Farber Feb 2011

Reconsidering A Parent’S ‘Apparent’ Authority In Intergenerational Co-Residence: The Need For A Paradigm Shift In Evaluating Parental Consent To Search Adult Children’S Bedrooms, Hillary B. Farber

Hillary B. Farber

Intergenerational households are the fastest growing living arrangement in the country. The foreclosure crisis, high unemployment rate, and exorbitant health care costs are causing adults across the generational spectrum to make choices based on their newly realized financial circumstances. An important social effect caused by the weakened economy is that more adult children are moving back into their parent’s home, and aging parents are increasingly seeking refuge in their adult child’s home.

Firmly established precedent makes clear that a parent’s consent to a police search of a minor child’s bedroom for evidence of a minor’s criminal activity is a reasonable …


Protecting Privacy; A Manifestation Of Civic Rights, Hossien Maleky Zadeh Feb 2011

Protecting Privacy; A Manifestation Of Civic Rights, Hossien Maleky Zadeh

hossien Maleky Zadeh

Protecting Privacy; A Manifestation of Civic Rights Written by Hossein Maleky Zadeh; PhD student of Criminal Law and Criminology at the National Academy of Sciences of Armenia Everyone likes to be, in special domains, out of the range of any kind of offensive and control not only by government but also by his most sincere persons; he/she also likes that this right be legally recognized and the violators be punished; such a domain and realm is, in fact, "Privacy"; protecting individuals' Privacy is one of the manifestations of Civic Rights which, by virtue of International and Regional Conventions, has been …


¿Viva La Data Protection? Chile As A Touchstone For The Future Of Information Privacy, Nicola C. Menaldo Feb 2011

¿Viva La Data Protection? Chile As A Touchstone For The Future Of Information Privacy, Nicola C. Menaldo

Nicola C. Menaldo

This paper attempts to uncover a puzzle: although the traditional levers for strong privacy protection are present in Chile – a history of dictatorship, an information technology revolution, and strong trade with the European Union – its data protection laws are in fact very weak. What explains this apparent disconnect? This paper challenges the conventional wisdom: that Chile's weak data protection regime is the result of weak democratic institutions, collective action problems, or the prioritization of credit data protections. Instead, it argues that Chile's stunted regime results from a political culture in which privacy protections, generally, are traded off for …


Fragile Merchandise: A Comparative Analysis Of The Privacy Rights For Public Figures, Scott Shackelford Feb 2011

Fragile Merchandise: A Comparative Analysis Of The Privacy Rights For Public Figures, Scott Shackelford

Scott Shackelford

Over a century after Warren and Brandeis first presented the right to U.S. jurists for their consideration, privacy has become a central player in U.S. law. But nations around the world, in particular the common and civil law nations of Europe that share similar legal cultures with the United States, are grappling with how best to strike a balance between the competing rights of privacy and freedom of expression—both of which are critical to the functioning of democratic society. Existing literature has not fully drawn from this reservoir of international experience to inform the debate about U.S. privacy rights. This …