Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 15 of 15

Full-Text Articles in Law

Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael Dec 2012

Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael

Associate Professor Katina Michael

The boom of the internet and the explosion of new technologies have brought with them new challenges and thus new connotations of privacy. Clearly, when people deal with e-government and e-business, they do not only need the right to be let alone, but also to be let in secret. Not only do they need freedom of movement, but also to be assured of the secrecy of their information. Solove [6] has critiqued traditional definitions of privacy and argued that they do not address privacy issues created by new online technologies. Austin [7] also asserts: “[w]e do need to sharpen and …


Privacy- The Times They Are A-Changin', M.G. Michael, Katina Michael Dec 2012

Privacy- The Times They Are A-Changin', M.G. Michael, Katina Michael

Professor Katina Michael

This special section is dedicated to privacy in the information age. Since the rise of mobile social media in particular and the advent of cloud computing few can dispute that the times have changed. Privacy is now understood in context, and within a framework that is completely different to what it once was. The right to be let alone physically seemingly has been replaced by the right to give away as much information as you want virtually. What safeguards can be introduced into such a society? We cannot claim to wish for privacy as a right if we ourselves do …


Glogging Your Every Move, Lisa Wachsmuth, Katina Michael Nov 2012

Glogging Your Every Move, Lisa Wachsmuth, Katina Michael

Professor Katina Michael

"It is one thing to lug technologies around, another thing to wear them, and even more intrusive to bear them... But that's the direction in which we're headed."

"I think we're entering an era of person-view systems which will show things on ground level and will be increasingly relayed to others via social media.

"We've got people wearing recording devices on their fingers, in their caps or sunglasses - there are huge legal and ethical implications here."


The Policy Against Federal Funding For Abortions Extends Into The Realm Of Free Speech After Rust V. Sullivan, Loye M. Barton Nov 2012

The Policy Against Federal Funding For Abortions Extends Into The Realm Of Free Speech After Rust V. Sullivan, Loye M. Barton

Pepperdine Law Review

No abstract provided.


California's Constitutional Right To Privacy, J. Clark Kelso Nov 2012

California's Constitutional Right To Privacy, J. Clark Kelso

Pepperdine Law Review

No abstract provided.


The Private Club Exemption From Civil Rights Legislation - Sanctioned Discrimination Or Justified Protection Of Right To Associate, Margaret E. Koppen Nov 2012

The Private Club Exemption From Civil Rights Legislation - Sanctioned Discrimination Or Justified Protection Of Right To Associate, Margaret E. Koppen

Pepperdine Law Review

No abstract provided.


The Inalienable Right Of Publicity, Jennifer E. Rothman Nov 2012

The Inalienable Right Of Publicity, Jennifer E. Rothman

All Faculty Scholarship

This article challenges the conventional wisdom that the right of publicity is universally and uncontroversially alienable. Courts and scholars have routinely described the right as a freely transferable property right, akin to patents or copyrights. Despite such broad claims of unfettered alienability, courts have limited the transferability of publicity rights in a variety of instances. No one has developed a robust account of why such limits should exist or what their contours should be. This article remedies this omission and concludes that the right of publicity must have significantly limited alienability to protect the rights of individuals to control the …


Substance And Method In The Year 2000, Akhil Reed Amar Oct 2012

Substance And Method In The Year 2000, Akhil Reed Amar

Pepperdine Law Review

No abstract provided.


14th Annual Open Government Summit: Access To Public Records Act & Open Meetings Act, 2012, Department Of Attorney General, State Of Rhode Island Jul 2012

14th Annual Open Government Summit: Access To Public Records Act & Open Meetings Act, 2012, Department Of Attorney General, State Of Rhode Island

School of Law Conferences, Lectures & Events

No abstract provided.


Privacy Rights: The Virtue Of Protecting A False Reputation, John A. Humbach May 2012

Privacy Rights: The Virtue Of Protecting A False Reputation, John A. Humbach

Elisabeth Haub School of Law Faculty Publications

What is the virtue of protecting a false reputation? The thesis of this paper is that there is none. There is none, at least, that justifies the suppression of free speech. Yet, there is a growing trend to see the protection of reputation from truth as a key function of the so-called “right of privacy.”

Unfortunately, people often do things that they are not proud of or do not want others to know about. Often, however, these are precisely the things that others want or need to know. For our own protection, each of us is better off being aware …


Social Implications Of Technology: Past, Present, And Future, Karl D. Stephan, Katina Michael, M.G. Michael, Laura Jacob, Emily Anesta Apr 2012

Social Implications Of Technology: Past, Present, And Future, Karl D. Stephan, Katina Michael, M.G. Michael, Laura Jacob, Emily Anesta

Professor Katina Michael

The social implications of a wide variety of technologies are the subject matter of the IEEE Society on Social Implications of Technology (SSIT). This paper reviews the SSIT’s contributions since the Society’s founding in 1982, and surveys the outlook for certain key technologies that may have significant social impacts in the future. Military and security technologies, always of significant interest to SSIT, may become more autonomous with less human intervention, and this may have both good and bad consequences. We examine some current trends such as mobile, wearable, and pervasive computing, and find both dangers and opportunities in these trends. …


Book Review: Securing The Cloud: Cloud Computer Security Techniques And Tactics, Katina Michael Apr 2012

Book Review: Securing The Cloud: Cloud Computer Security Techniques And Tactics, Katina Michael

Associate Professor Katina Michael

With so much buzz around Cloud Computing, books like this one written by Winkler are much in demand. Winkler’s experience in the computing business shines through and as readers we are spoiled with a great deal of useful strategic information- a jam packed almost 300 page volume on securing the cloud.


Information Revolution: “Choice Of Control” To “Choice And Control”, Subhajit Basu, Christina Munns Mar 2012

Information Revolution: “Choice Of Control” To “Choice And Control”, Subhajit Basu, Christina Munns

Subhajit Basu

Please do not cite without permission of the authors.

In this article, we critically analyse whether the ‘privacy framework’ for health records is ‘fit-for-purpose’ for the NHS’s ‘information revolution’ and argue that the NHS’s ‘proxy-individual’ information-guardian role could inadvertently mask individuals’ intended roles, effectively circumventing autonomy-based laws by limiting the power of individuals to be autonomous. We suggest that moving ‘choice of control’ to individuals will render ‘privacy’ redundant whilst validating ‘confidentiality’ via consent from empowered individuals. This power shift would expose the overdue need for options to increase levels of individual ‘control/privacy,’ moving from the NHS’s paternal ‘proxy-individual’ conception …


Personal Environmental Information: The Promise And Perils Of The Emerging Capacity To Identify Individual Environmental Harms, Katrina Fischer Kuh Jan 2012

Personal Environmental Information: The Promise And Perils Of The Emerging Capacity To Identify Individual Environmental Harms, Katrina Fischer Kuh

Elisabeth Haub School of Law Faculty Publications

This Article begins from the premise that successful regulation of environmentally significant individual behaviors could achieve meaningful environmental benefits and argues that (1) technology is increasingly making information about individual environmental behaviors and associated harms more accessible; (2) better information about environmentally significant individual behaviors could substantially enhance fledgling efforts to regulate those behaviors; and (3) use of technology-enabled personal environmental information in support of regulation will require the resolution of myriad privacy concerns. The Article seeks to generate and inform a discussion about the appropriate balance between access to personal environmental information and privacy by identifying how regulation can …


Location Privacy Under Dire Threat As Uberveillance Stalks The Streets, Katina Michael, Roger Clarke Jan 2012

Location Privacy Under Dire Threat As Uberveillance Stalks The Streets, Katina Michael, Roger Clarke

Associate Professor Katina Michael

Location tracking and monitoring applications have proliferated with the arrival of smart phones that are equipped with onboard global positioning system (GPS) chipsets. It is now possible to locate a smart phone user down to 10 metres of accuracy on average. Innovators have been quick to capitalise on this emerging market by introducing novel pedestrian tracking technologies which can denote the geographic path of a mobile user. At the same time there is contention by law enforcement personnel over the need for a warrant process to track an individual in a public space. This paper considers the future of location …