Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Privacy

2012

Journal

Discipline
Institution
Publication

Articles 1 - 30 of 44

Full-Text Articles in Law

Natural Law, Slavery, And The Right To Privacy Tort, Anita L. Allen Dec 2012

Natural Law, Slavery, And The Right To Privacy Tort, Anita L. Allen

Fordham Law Review

In 1905 the Supreme Court of Georgia became the first state high court to recognize a freestanding “right to privacy” tort in the common law. The landmark case was Pavesich v. New England Life Insurance Co. Must it be a cause for deep jurisprudential concern that the common law right to privacy in wide currency today originated in Pavesich’s explicit judicial interpretation of the requirements of natural law? Must it be an additional worry that the court which originated the common law privacy right asserted that a free white man whose photograph is published without his consent in a …


Valuing Privacy, Youngjae Lee Dec 2012

Valuing Privacy, Youngjae Lee

Fordham Law Review

No abstract provided.


Medical Evidence In Cases Of Intrauterine Drug And Alcohol Exposure , Judith Larsen, Robert M. Horowitz, Ira J. Chasnoff Nov 2012

Medical Evidence In Cases Of Intrauterine Drug And Alcohol Exposure , Judith Larsen, Robert M. Horowitz, Ira J. Chasnoff

Pepperdine Law Review

No abstract provided.


The Policy Against Federal Funding For Abortions Extends Into The Realm Of Free Speech After Rust V. Sullivan, Loye M. Barton Nov 2012

The Policy Against Federal Funding For Abortions Extends Into The Realm Of Free Speech After Rust V. Sullivan, Loye M. Barton

Pepperdine Law Review

No abstract provided.


California's Constitutional Right To Privacy, J. Clark Kelso Nov 2012

California's Constitutional Right To Privacy, J. Clark Kelso

Pepperdine Law Review

No abstract provided.


The Private Club Exemption From Civil Rights Legislation - Sanctioned Discrimination Or Justified Protection Of Right To Associate, Margaret E. Koppen Nov 2012

The Private Club Exemption From Civil Rights Legislation - Sanctioned Discrimination Or Justified Protection Of Right To Associate, Margaret E. Koppen

Pepperdine Law Review

No abstract provided.


Psychotherapist And Patient In The California Supreme Court: Ground Lost And Ground Regained, Stanley Mosk Nov 2012

Psychotherapist And Patient In The California Supreme Court: Ground Lost And Ground Regained, Stanley Mosk

Pepperdine Law Review

No abstract provided.


Substance And Method In The Year 2000, Akhil Reed Amar Oct 2012

Substance And Method In The Year 2000, Akhil Reed Amar

Pepperdine Law Review

No abstract provided.


Limits Of The Federal Wiretap Act's Ability To Protect Against Wi-Fi Sniffing, Mani Potnuru Oct 2012

Limits Of The Federal Wiretap Act's Ability To Protect Against Wi-Fi Sniffing, Mani Potnuru

Michigan Law Review

Adoption of Wi-Fi wireless technology continues to see explosive growth. However many users still operate their home Wi-Fi networks in unsecured mode or use publicly available unsecured Wi-Fi networks, thus exposing their communications to the dangers of "packet sniffing," a technique used for eavesdropping on a network. Some have argued that communications over unsecured Wi-Fi networks are "readily accessible to the general public" and that such communications are therefore excluded from the broad protections of the Federal Wiretap Act against intentional interception of electronic communications. This Note examines the Federal Wiretap Act and argues that the current Act's treatment of …


Warrantless Searches And Smartphones: Privacy In The Palm Of Your Hand?, Margaret M. Lawton Sep 2012

Warrantless Searches And Smartphones: Privacy In The Palm Of Your Hand?, Margaret M. Lawton

University of the District of Columbia Law Review

Incident to a drug arrest, a police officer removes a smartphone from the pocket of the defendant. The smartphone may have incriminating evidence-phone numbers, pictures, text messages, and e-mails. But can the officer examine the smartphone on the scene or back at the station? Or does the officer need to show probable cause and obtain a warrant before examining the phone? If the phone were instead the arrestee's wallet or a cigarette package, under the search incident to lawful arrest exception to the Fourth Amendment's warrant requirement the officer could open and search inside either of these "containers." Anything found …


Looking Through The Prism Of Privacy And Trespass: Smartphones And The Fourth Amendment, Saby Ghoshray Sep 2012

Looking Through The Prism Of Privacy And Trespass: Smartphones And The Fourth Amendment, Saby Ghoshray

University of the District of Columbia Law Review

Technology in the twenty-first century has dramatically changed our lives, but the law has not kept pace with technological advances. The treatment of smartphones in Fourth Amendment jurisprudence is no exception. This is made evident by the increasingly scattered outcomes of litigation involving the privacy interests of smartphone owners.' As the cross-jurisdictional inconsistencies of judicial decisions applying the Fourth Amendment to smartphones mount, I am drawn to seek answers from two foundational pillars of the Supreme Court's search and seizure jurisprudence: protection against invasions of privacy and the bulwark against trespass.


The Fourth Amendment And The Stored Communications Act: Why The Warrantless Gathering Of Historical Cell Site Location Information Poses No Threat To Privacy , Kyle Malone Sep 2012

The Fourth Amendment And The Stored Communications Act: Why The Warrantless Gathering Of Historical Cell Site Location Information Poses No Threat To Privacy , Kyle Malone

Pepperdine Law Review

No abstract provided.


E-Ethics, Michael K. Mcchrystal Aug 2012

E-Ethics, Michael K. Mcchrystal

Marquette Elder's Advisor

The fit between laws regulating professional ethics and the means of conducting business, particularly telecommunications and computer technology, has become tenuous. Here, McChrystal examines recent legal decisions concerning electronic transmission of information and discusses the impact of Internet messages and e-mail on attorney-client privilege.


Privacy And Pension Plan Records: Is Self-Regulation Sufficient?, Michael J. Francis Aug 2012

Privacy And Pension Plan Records: Is Self-Regulation Sufficient?, Michael J. Francis

Marquette Elder's Advisor

The confidentiality of employee' pension information is being threatened by changes in the design of qualified retirement plans and advances in data-processing and Internet technology. Despite the passage of recent laws aimed at protecting privacy, the author suggest that more may need to be done to ensure that personal financial information remains secure.


Guardianship Actions Against Individuals Who Have Selected An Agent As Power Of Attorney: When Should The Court Say "No?", Linda S. Ershow-Levenberg Aug 2012

Guardianship Actions Against Individuals Who Have Selected An Agent As Power Of Attorney: When Should The Court Say "No?", Linda S. Ershow-Levenberg

Marquette Elder's Advisor

This article discusses the need for guardianship for presumably incapacitated individuals who already have designated someone to have their power of attorney or to be their healthcare representative. Noting that the privacy and liberty of an individual will be affected by appointing a guardian, the author proposes that guardians not be unnecessarily appointed when currently in-place representatives already fulfill needed services.


Do Automobile Passengers Have A Legitimate Expectation Of Privacy? An Analysis Of Reasonable Expectation Under The Fourth Amendment - People V. Howard, Lisa Belrose Aug 2012

Do Automobile Passengers Have A Legitimate Expectation Of Privacy? An Analysis Of Reasonable Expectation Under The Fourth Amendment - People V. Howard, Lisa Belrose

Touro Law Review

No abstract provided.


Wilson V. Layne: Increasing The Scope Of The Fourth Amendment Right To Privacy, Ashlea Wright Jul 2012

Wilson V. Layne: Increasing The Scope Of The Fourth Amendment Right To Privacy, Ashlea Wright

Pepperdine Law Review

No abstract provided.


Walled Gardens Of Privacy Or “Binding Corporate Rules?”: A Critical Look At International Protection Of Online Privacy, Joanna Kulesza Jul 2012

Walled Gardens Of Privacy Or “Binding Corporate Rules?”: A Critical Look At International Protection Of Online Privacy, Joanna Kulesza

University of Arkansas at Little Rock Law Review

A growing concern in the era of cloud computing is protecting Internet users' privacy. This concern is compounded by the fact that there are no effective international solutions. This article considers the latest European Union (EU) proposed development in this area – a regulatory model based on amended Binding Corporate Rules (BCR) – as introduced by the EU Justice Commissioner. These planned changes would have worldwide effects on international companies' online activities in transboundary cyberspace.

After providing a background on the concept of defining privacy in general, the article describes the BCR proposal, and proceeds to consider the likelihood of …


Eyephones: A Fourth Amendment Inquiry Into Mobile Iris Scanning, Christopher R. Jones Jul 2012

Eyephones: A Fourth Amendment Inquiry Into Mobile Iris Scanning, Christopher R. Jones

South Carolina Law Review

No abstract provided.


Major League Security: Overcoming Legal Challenges Of Sporting Event Security Systems, Jorge Martinez Jul 2012

Major League Security: Overcoming Legal Challenges Of Sporting Event Security Systems, Jorge Martinez

University of Miami National Security & Armed Conflict Law Review

This article will discuss emerging threats to major sporting events and suggest methods to defend fans and athletes through strengthening security systems and procedures. One problem with strengthening security systems, however, is that in many cases, increased security means less personal privacy. This article will briefly review security measures that have traditionally been in place, juxtapose newly developed security measures, assess the effectiveness and constitutionality of each measure, and propose a working security system to be used at such events. Ultimately, an ideal security system of the future will have to incorporate developments in various fields and will take time …


Keep Your Nose Out Of My Business-A Look At Dog Sniffs In Public Places Versus The Home, Michael Mayer Jul 2012

Keep Your Nose Out Of My Business-A Look At Dog Sniffs In Public Places Versus The Home, Michael Mayer

University of Miami Law Review

No abstract provided.


Electronic Privacy And Employee Speech, Pauline T. Kim Jun 2012

Electronic Privacy And Employee Speech, Pauline T. Kim

Chicago-Kent Law Review

The boundary between work and private life is blurring as a result of changes in the organization of work and advances in technology. Current privacy law is ill-equipped to address these changes and as a result, employees' privacy in their electronic communications is only weakly protected from employer scrutiny. At the same time, the law increasingly protects certain socially valued forms of employee speech. In particular, collective speech, speech that enforces workplace regulations and speech that deters or reports employer wrong-doing are explicitly protected by law from employer reprisals. These two developments—weak protection of employee privacy and increased protection for …


That’S The Ticket: Arguing For A Narrower Interpretation Of The Exceptions Clause In The Driver’S Privacy Protection Act, Katherine Hutchinson May 2012

That’S The Ticket: Arguing For A Narrower Interpretation Of The Exceptions Clause In The Driver’S Privacy Protection Act, Katherine Hutchinson

Seventh Circuit Review

The Driver's Privacy Protection Act of 1994 restricts states from disclosing personal identifying information contained in an individual's motor vehicle record without that person's express consent. The DPPA was a response to tragic incidents in which such information was released to members of the public who used it to locate people and commit crimes against them. However, Congress inserted into the Act a list of fourteen exceptions under which certain parties may still access these state records for specific "permissible uses." These exceptions recognized the need for such disclosure in the interests of the legitimate operational needs of government and …


Csi Las Vegas: Privacy, Policing, And Profiteering In Casino Structured Intelligence, Jessica D. Gabel Apr 2012

Csi Las Vegas: Privacy, Policing, And Profiteering In Casino Structured Intelligence, Jessica D. Gabel

UNLV Gaming Law Journal

This Article argues that the intricate, vast amounts of consumer information compiled through casino structured intelligence require greater protection and oversight in the contexts of both bankruptcy and law enforcement. Section II examines the various types of casino technology and information gathering that casinos perform. Section III considers the available protections of private information in terms of security breaches, law enforcement sharing, and sales in the context of a bankruptcy. Section IV discusses additional safeguards and ethical concerns that should be considered as casinos continue to increase their data mining efforts. Finally, Section V concludes that, minimally, consumers are entitled …


Patron Data Privacy And Security In The Casino Industry: A Case For A U.S. Data Privacy Statute, Chandeni K. Gill Apr 2012

Patron Data Privacy And Security In The Casino Industry: A Case For A U.S. Data Privacy Statute, Chandeni K. Gill

UNLV Gaming Law Journal

This Note discusses the recent surge in patron data collected by casino player tracking systems and the increasing need to protect the confidentiality and security of patron Personally Identifiable Information (PII) through the implementation of federal privacy legislation. Part I discusses the rise of the casino player tracking database systems. Part II explains and defines PII. Part III outlines current U.S. privacy laws applicable to the casino industry, describes casino liability standards, and examines patron remedies for a potential breach in the security of patron PII. Part IV assesses the strengths and weaknesses of U.S. privacy laws applicable to the …


Watching The Watchmen: The People's Attempt To Hold On-Duty Law Enforcement Officers Accountable For Misconduct And The Illinois Law That Stands In Their Way, Robert J. Tomei Jr. Apr 2012

Watching The Watchmen: The People's Attempt To Hold On-Duty Law Enforcement Officers Accountable For Misconduct And The Illinois Law That Stands In Their Way, Robert J. Tomei Jr.

Northern Illinois University Law Review

In the days when police brutality and public official corruption pump through the veins of society as a fermenting virus, a critical analysis of a controversial law curtailing efforts to intensify public awareness of government official transgressions is undertaken. In the great State of Illinois, legislative amendments to the Illinois Eavesdropping Act have established a moratorium on the audio recording, without prior consent, of any judge, state's attorney or law enforcement officer while in the performance of his or her official duties, regardless of whether or not the public official(s) had any objective, justifiable or reasonable expectation of privacy when …


Beyond The (Current) Fourth Amendment: Protecting Third-Party Information, Third Parties, And The Rest Of Us Too, Stephen E. Henderson Mar 2012

Beyond The (Current) Fourth Amendment: Protecting Third-Party Information, Third Parties, And The Rest Of Us Too, Stephen E. Henderson

Pepperdine Law Review

For at least thirty years the Supreme Court has adhered to its third-party doctrine in interpreting the Fourth Amendment, meaning that so far as a disclosing party is concerned, information in the hands of a third party receives no Fourth Amendment protection. The doctrine was controversial when adopted, has been the target of sustained criticism, and is the predominant reason that the Katz revolution has not been the revolution many hoped it would be. Some forty years after Katz the Court's search jurisprudence largely remains tied to property conceptions. As I have demonstrated elsewhere, however, the doctrine is not the …


Is It Better To Be Safe Than Sorry?: Free Speech And The Precautionary Principle, Frederick Schauer Feb 2012

Is It Better To Be Safe Than Sorry?: Free Speech And The Precautionary Principle, Frederick Schauer

Pepperdine Law Review

No abstract provided.


International Travel With A "Digital Briefcase": If Customs Officials Can Search A Laptop, Will The Right Against Self-Incrimination Contravene This Authority?, Ashley H. Verdon Feb 2012

International Travel With A "Digital Briefcase": If Customs Officials Can Search A Laptop, Will The Right Against Self-Incrimination Contravene This Authority?, Ashley H. Verdon

Pepperdine Law Review

No abstract provided.


Gina, Privacy, And Antisubordination, Bradley A. Areheart Jan 2012

Gina, Privacy, And Antisubordination, Bradley A. Areheart

Georgia Law Review

This Essay briefly considers both the current and
optimal role of privacy in employment discrimination
jurisprudence. The recently-passed Genetic Information
Nondiscrimination Act (GINA) is illustrative of a possible
trend in employment discrimination toward privacy. In
particular, GINA includes a prohibition on the use of
genetic information in all employment decisions, affording
a measure of genetic privacy to potential and current
employees.
GINA stands in contrast to prior employment
discrimination statutes, which have often encouraged or
required employers to be knowledgeable of and consider a
particular identity trait through policies such as
reasonable accommodation, affirmative action, and the
disparate impact doctrine. …