Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Privacy

2012

Discipline
Institution
Publication
Publication Type
File Type

Articles 1 - 30 of 127

Full-Text Articles in Law

Drone Federalism: Civilian Drones And The Things They Carry, Margot E. Kaminski Dec 2012

Drone Federalism: Civilian Drones And The Things They Carry, Margot E. Kaminski

Publications

Civilian drones are scheduled to be permitted in the national airspace as early as 2015. Many think Congress should establish the necessary nationwide regulations to govern both law enforcement and civilian drone use. That thinking, however, is wrong. This Essay suggests drone federalism instead: a state-based approach to privacy regulation that governs drone use by civilians, drawing on states’ experience regulating other forms of civilian-on-civilian surveillance. This approach will allow necessary experimentation in how to best balance privacy concerns against First Amendment rights in the imminent era of drone-use democratization. This Essay closes by providing some guidance to states as …


Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael Dec 2012

Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael

Associate Professor Katina Michael

The boom of the internet and the explosion of new technologies have brought with them new challenges and thus new connotations of privacy. Clearly, when people deal with e-government and e-business, they do not only need the right to be let alone, but also to be let in secret. Not only do they need freedom of movement, but also to be assured of the secrecy of their information. Solove [6] has critiqued traditional definitions of privacy and argued that they do not address privacy issues created by new online technologies. Austin [7] also asserts: “[w]e do need to sharpen and …


Virtual Parentalism, Joshua A.T. Fairfield Dec 2012

Virtual Parentalism, Joshua A.T. Fairfield

Joshua A.T. Fairfield

Parents, not Laws, ultimately protect children both online and offline. If legislation places adults at legal risk because of the presence of children in virtual worlds, adults will exit those worlds, and children will be isolated into separate spaces. This will not improve safety for children. Instead, this Article suggests that Congress enact measures that encourage filtering technology and parental tools that will both protect children in virtual worlds, and protectfree speech online.


Privacy- The Times They Are A-Changin', M.G. Michael, Katina Michael Dec 2012

Privacy- The Times They Are A-Changin', M.G. Michael, Katina Michael

Professor Katina Michael

This special section is dedicated to privacy in the information age. Since the rise of mobile social media in particular and the advent of cloud computing few can dispute that the times have changed. Privacy is now understood in context, and within a framework that is completely different to what it once was. The right to be let alone physically seemingly has been replaced by the right to give away as much information as you want virtually. What safeguards can be introduced into such a society? We cannot claim to wish for privacy as a right if we ourselves do …


After Privacy: The Rise Of Facebook, The Fall Of Wikileaks, And Singapore’S Personal Data Protection Act 2012, Simon Chesterman Dec 2012

After Privacy: The Rise Of Facebook, The Fall Of Wikileaks, And Singapore’S Personal Data Protection Act 2012, Simon Chesterman

Simon Chesterman

This article discusses the changing ways in which information is produced, stored, and shared — exemplified by the rise of social-networking sites like Facebook and controversies over the activities of WikiLeaks — and the implications for privacy and data protection. Legal protections of privacy have always been reactive, but the coherence of any legal regime has also been undermined by the lack of a strong theory of what privacy is. There is more promise in the narrower field of data protection. Singapore, which does not recognise a right to privacy, has positioned itself as an e-commerce hub but had no …


The Irony Of Privacy Class Action Litigation, Eric Goldman Dec 2012

The Irony Of Privacy Class Action Litigation, Eric Goldman

Faculty Publications

In the past few years, publicized privacy violations have regularly spawned class action lawsuits in the United States, even when the company made a good faith mistake and no victim suffered any quantifiable harm. Privacy advocates often cheer these lawsuits because they generally favor vigorous enforcement of privacy violations, but this essay encourages privacy advocates to reconsider their support for privacy class action litigation. By its nature, class action litigation uses tactics that privacy advocates disavow. Thus, using class action litigation to remediate privacy violations proves to be unintentionally ironic.


Natural Law, Slavery, And The Right To Privacy Tort, Anita L. Allen Dec 2012

Natural Law, Slavery, And The Right To Privacy Tort, Anita L. Allen

Fordham Law Review

In 1905 the Supreme Court of Georgia became the first state high court to recognize a freestanding “right to privacy” tort in the common law. The landmark case was Pavesich v. New England Life Insurance Co. Must it be a cause for deep jurisprudential concern that the common law right to privacy in wide currency today originated in Pavesich’s explicit judicial interpretation of the requirements of natural law? Must it be an additional worry that the court which originated the common law privacy right asserted that a free white man whose photograph is published without his consent in a …


Valuing Privacy, Youngjae Lee Dec 2012

Valuing Privacy, Youngjae Lee

Fordham Law Review

No abstract provided.


Medical Evidence In Cases Of Intrauterine Drug And Alcohol Exposure , Judith Larsen, Robert M. Horowitz, Ira J. Chasnoff Nov 2012

Medical Evidence In Cases Of Intrauterine Drug And Alcohol Exposure , Judith Larsen, Robert M. Horowitz, Ira J. Chasnoff

Pepperdine Law Review

No abstract provided.


Glogging Your Every Move, Lisa Wachsmuth, Katina Michael Nov 2012

Glogging Your Every Move, Lisa Wachsmuth, Katina Michael

Professor Katina Michael

"It is one thing to lug technologies around, another thing to wear them, and even more intrusive to bear them... But that's the direction in which we're headed."

"I think we're entering an era of person-view systems which will show things on ground level and will be increasingly relayed to others via social media.

"We've got people wearing recording devices on their fingers, in their caps or sunglasses - there are huge legal and ethical implications here."


The Policy Against Federal Funding For Abortions Extends Into The Realm Of Free Speech After Rust V. Sullivan, Loye M. Barton Nov 2012

The Policy Against Federal Funding For Abortions Extends Into The Realm Of Free Speech After Rust V. Sullivan, Loye M. Barton

Pepperdine Law Review

No abstract provided.


California's Constitutional Right To Privacy, J. Clark Kelso Nov 2012

California's Constitutional Right To Privacy, J. Clark Kelso

Pepperdine Law Review

No abstract provided.


The Private Club Exemption From Civil Rights Legislation - Sanctioned Discrimination Or Justified Protection Of Right To Associate, Margaret E. Koppen Nov 2012

The Private Club Exemption From Civil Rights Legislation - Sanctioned Discrimination Or Justified Protection Of Right To Associate, Margaret E. Koppen

Pepperdine Law Review

No abstract provided.


Psychotherapist And Patient In The California Supreme Court: Ground Lost And Ground Regained, Stanley Mosk Nov 2012

Psychotherapist And Patient In The California Supreme Court: Ground Lost And Ground Regained, Stanley Mosk

Pepperdine Law Review

No abstract provided.


To Drink The Cup Of Fury: Funeral Picketing, Public Discourse And The First Amendment, Steven J. Heyman Nov 2012

To Drink The Cup Of Fury: Funeral Picketing, Public Discourse And The First Amendment, Steven J. Heyman

All Faculty Scholarship

In Snyder v. Phelps, the Supreme Court held that the Westboro Baptist Church had a First Amendment right to picket the funeral of a young soldier killed in Iraq. This decision reinforces a position that has become increasingly prevalent in First Amendment jurisprudence – the view that the state may not regulate public discourse to protect individuals from emotional or dignitary injury. In this Article, I argue that this view is deeply problematic for two reasons: it unduly sacrifices the value of individual personality and it tends to undermine the sphere of public discourse itself by negating the practical and …


The Inalienable Right Of Publicity, Jennifer E. Rothman Nov 2012

The Inalienable Right Of Publicity, Jennifer E. Rothman

All Faculty Scholarship

This article challenges the conventional wisdom that the right of publicity is universally and uncontroversially alienable. Courts and scholars have routinely described the right as a freely transferable property right, akin to patents or copyrights. Despite such broad claims of unfettered alienability, courts have limited the transferability of publicity rights in a variety of instances. No one has developed a robust account of why such limits should exist or what their contours should be. This article remedies this omission and concludes that the right of publicity must have significantly limited alienability to protect the rights of individuals to control the …


To Drink The Cup Of Fury: Funeral Picketing, Public Discourse And The First Amendment, Steven J. Heyman Oct 2012

To Drink The Cup Of Fury: Funeral Picketing, Public Discourse And The First Amendment, Steven J. Heyman

Steven J. Heyman

In Snyder v. Phelps, the Supreme Court held that the Westboro Baptist Church had a First Amendment right to picket the funeral of a young soldier killed in Iraq. This decision reinforces a position that has become increasingly prevalent in First Amendment jurisprudence – the view that the state may not regulate public discourse to protect individuals from emotional or dignitary injury. In this Article, I argue that this view is deeply problematic for two reasons: it unduly sacrifices the value of individual personality and it tends to undermine the sphere of public discourse itself by negating the practical and …


Survey Of Recent European Union Privacy Developments, W. Gregory Voss Oct 2012

Survey Of Recent European Union Privacy Developments, W. Gregory Voss

W. Gregory Voss

The Spanish law implementing the European Union (EU) Data Protection Directive, advisory guidance on consent, facial recognition and biometric technologies from the European Union Article 29 Data Protection Working Party (WP29) , and proposals for EU data protection law reform are analyzed in this survey piece. EU legislative processes are illustrated by a specific occurence: Spanish Organic Law 15/1999 on the Protection of Personal Data is reviewed in the context of Court of Justice of the European Union (ECJ) joined cases, Asociación Nacional de Establecimientos Financieros de Crédito (ASNEF) v. Administración del Estado, and Federación de Comercio Electrónico y Marketing …


Implementación De Políticas Corporativas Sobre Internet Y Redes Sociales En México, Rodolfo C. Rivas Rea Esq. Oct 2012

Implementación De Políticas Corporativas Sobre Internet Y Redes Sociales En México, Rodolfo C. Rivas Rea Esq.

Rodolfo C. Rivas

The author analyzes and describes the necessary elements of a successful social media and Internet corporate policy; through citing common pitfalls and learning lessons from different jurisdictions across the world. The author then offers general guidelines on policies for Mexican enterprises under Mexican legislation.///////////////////////////////////////////////////////////////////////////////////////El autor analiza y describe los elementos necesarios de una política corporativa sobre internet y redes sociales exitosa, citando los errores más comunes y aprendiendo lecciones de las legislaciones de distintos países.


Substance And Method In The Year 2000, Akhil Reed Amar Oct 2012

Substance And Method In The Year 2000, Akhil Reed Amar

Pepperdine Law Review

No abstract provided.


Brief Of Aarp And The National Legislative Association On Prescription Drug Prices As Amici Curiae In Support Of Petitioners, Sean Flynn Oct 2012

Brief Of Aarp And The National Legislative Association On Prescription Drug Prices As Amici Curiae In Support Of Petitioners, Sean Flynn

Sean Flynn

This brief was written in support of Vermont’s Prescription Confidentiality Law, which regulates the confidentiality of prescription records and protects them from being used by pharmaceutical companies as a “targeting tool” to identify doctors most susceptible to sales messages.


Who's In Charge Here? Information Privacy In A Social Networking World, Lisa Di Valentino Oct 2012

Who's In Charge Here? Information Privacy In A Social Networking World, Lisa Di Valentino

FIMS Presentations

No abstract provided.


Limits Of The Federal Wiretap Act's Ability To Protect Against Wi-Fi Sniffing, Mani Potnuru Oct 2012

Limits Of The Federal Wiretap Act's Ability To Protect Against Wi-Fi Sniffing, Mani Potnuru

Michigan Law Review

Adoption of Wi-Fi wireless technology continues to see explosive growth. However many users still operate their home Wi-Fi networks in unsecured mode or use publicly available unsecured Wi-Fi networks, thus exposing their communications to the dangers of "packet sniffing," a technique used for eavesdropping on a network. Some have argued that communications over unsecured Wi-Fi networks are "readily accessible to the general public" and that such communications are therefore excluded from the broad protections of the Federal Wiretap Act against intentional interception of electronic communications. This Note examines the Federal Wiretap Act and argues that the current Act's treatment of …


Warrantless Searches And Smartphones: Privacy In The Palm Of Your Hand?, Margaret M. Lawton Sep 2012

Warrantless Searches And Smartphones: Privacy In The Palm Of Your Hand?, Margaret M. Lawton

University of the District of Columbia Law Review

Incident to a drug arrest, a police officer removes a smartphone from the pocket of the defendant. The smartphone may have incriminating evidence-phone numbers, pictures, text messages, and e-mails. But can the officer examine the smartphone on the scene or back at the station? Or does the officer need to show probable cause and obtain a warrant before examining the phone? If the phone were instead the arrestee's wallet or a cigarette package, under the search incident to lawful arrest exception to the Fourth Amendment's warrant requirement the officer could open and search inside either of these "containers." Anything found …


Looking Through The Prism Of Privacy And Trespass: Smartphones And The Fourth Amendment, Saby Ghoshray Sep 2012

Looking Through The Prism Of Privacy And Trespass: Smartphones And The Fourth Amendment, Saby Ghoshray

University of the District of Columbia Law Review

Technology in the twenty-first century has dramatically changed our lives, but the law has not kept pace with technological advances. The treatment of smartphones in Fourth Amendment jurisprudence is no exception. This is made evident by the increasingly scattered outcomes of litigation involving the privacy interests of smartphone owners.' As the cross-jurisdictional inconsistencies of judicial decisions applying the Fourth Amendment to smartphones mount, I am drawn to seek answers from two foundational pillars of the Supreme Court's search and seizure jurisprudence: protection against invasions of privacy and the bulwark against trespass.


The Benefit Of Adopting Comprehensive Standards Of Monitoring Employee Technology Use In The Workplace, Karin M. Mika Sep 2012

The Benefit Of Adopting Comprehensive Standards Of Monitoring Employee Technology Use In The Workplace, Karin M. Mika

Law Faculty Articles and Essays

This article will examine issues as they relate to the privacy of employees’ lives given that nearly everything can be discovered by some form of electronic monitoring. It will posit that most laws as they exist today do little to apprise either the employer or the employee as to what type of electronic monitoring of personal communications is acceptable. It will further propose that most employer policies related to scrutinizing employee electronic communications are vague and unsuitable. The article will conclude that, given the leeway employers tend to be given (often justifiably so) in monitoring employees there is little chance …


Agricultural Secrecy: Going Dark Down On The Farm: How Legalized Secrecy Gives Agribusiness A Federally Funded Free Ride, Rena I. Steinzor, Yee Huang Sep 2012

Agricultural Secrecy: Going Dark Down On The Farm: How Legalized Secrecy Gives Agribusiness A Federally Funded Free Ride, Rena I. Steinzor, Yee Huang

Rena I. Steinzor

This briefing paper examines the agricultural secrecy granted by section 1619 of the 2008 Farm Bill, its implications for transparency and oversight, and its impact on other federal agencies such as the U.S. Environmental Protection Agency (EPA). In an era of fiscal responsibility, tight budgets, and increasing pressure on the environment, the public has a right to know whether the U.S. Department of Agriculture (USDA) is making the best decisions about how to allocate public funds. Each year, agricultural producers in the United States receive billions of dollars in federal payments: crop subsidies, crop insurance, conservation payments, disaster payments, loans, …


The Fourth Amendment And The Stored Communications Act: Why The Warrantless Gathering Of Historical Cell Site Location Information Poses No Threat To Privacy , Kyle Malone Sep 2012

The Fourth Amendment And The Stored Communications Act: Why The Warrantless Gathering Of Historical Cell Site Location Information Poses No Threat To Privacy , Kyle Malone

Pepperdine Law Review

No abstract provided.


The Drones Are Coming! Will The Fourth Amendment Stop The Threat To Our Privacy., Robert Molko Sep 2012

The Drones Are Coming! Will The Fourth Amendment Stop The Threat To Our Privacy., Robert Molko

Robert Molko

The Drones are coming!

Will the Fourth Amendment Stop their Threat to our Privacy?

Local police have begun to use drones and are planning to expand their use of to survey communities for criminal activity.

On February 14, 2012, President Obama signed the “FAA Modernization and Reform Act of 2012″ into law; it requires the FAA to expedite the process to authorize both public and private use of drones in the national navigable airspace.

The Fourth Amendment of the U.S. Constitution protects our privacy from unreasonable intrusions by the government and we have come to depend on that.

Today, in …


Access For All: A Review Of “Law Libraries, Government Transparency, And The Internet,” A Presentation By Daniel Schuman Of The Sunlight Foundation At The All-Sis Meeting, July 22, 2012, Susan David Demaine Sep 2012

Access For All: A Review Of “Law Libraries, Government Transparency, And The Internet,” A Presentation By Daniel Schuman Of The Sunlight Foundation At The All-Sis Meeting, July 22, 2012, Susan David Demaine

Articles by Maurer Faculty

Attendees at the ALL-SIS Breakfast and Business Meeting at the AALL Annual Meeting had the pleasure of hearing from Daniel Schuman of the Sunlight Foundation speak on “Law Libraries, Government Transparency, and the Internet.” The Sunlight Foundation is a nonpartisan, nonprofit organization whose mission is to increase access to federal government information resources through advocacy and the development of information technology tools.