Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Privacy Law (10)
- Constitutional Law (9)
- First Amendment (8)
- Criminal Procedure (7)
- Evidence (6)
-
- Internet Law (6)
- State and Local Government Law (6)
- Civil Rights and Discrimination (5)
- Criminal Law (4)
- Fourth Amendment (4)
- Labor and Employment Law (4)
- Law and Gender (4)
- Law and Society (4)
- Legislation (4)
- Science and Technology Law (4)
- Communications Law (3)
- Computer Law (3)
- Elder Law (3)
- Health Law and Policy (3)
- Law Enforcement and Corrections (3)
- Medical Jurisprudence (3)
- Courts (2)
- Entertainment, Arts, and Sports Law (2)
- Family Law (2)
- Fourteenth Amendment (2)
- Gaming Law (2)
- National Security Law (2)
- Administrative Law (1)
- Contracts (1)
- Institution
-
- Pepperdine University (11)
- University of Michigan Law School (7)
- Marquette University Law School (3)
- University of Maryland Francis King Carey School of Law (3)
- American University Washington College of Law (2)
-
- Chicago-Kent College of Law (2)
- Cornell University Law School (2)
- Fordham Law School (2)
- University of Miami Law School (2)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (2)
- University of the District of Columbia School of Law (2)
- Northern Illinois University (1)
- Touro University Jacob D. Fuchsberg Law Center (1)
- University of Arkansas at Little Rock William H. Bowen School of Law (1)
- University of Georgia School of Law (1)
- University of South Carolina (1)
- Vanderbilt University Law School (1)
- Publication
-
- Pepperdine Law Review (11)
- Marquette Elder's Advisor (3)
- Maryland Law Review (3)
- Michigan Telecommunications & Technology Law Review (3)
- Cornell Journal of Law and Public Policy (2)
-
- Fordham Law Review (2)
- UNLV Gaming Law Journal (2)
- University of Michigan Journal of Law Reform Caveat (2)
- University of the District of Columbia Law Review (2)
- American University Business Law Review (1)
- American University International Law Review (1)
- Chicago-Kent Law Review (1)
- Georgia Law Review (1)
- Michigan Journal of Gender & Law (1)
- Michigan Law Review (1)
- Northern Illinois University Law Review (1)
- Seventh Circuit Review (1)
- South Carolina Law Review (1)
- Touro Law Review (1)
- University of Arkansas at Little Rock Law Review (1)
- University of Miami Law Review (1)
- University of Miami National Security & Armed Conflict Law Review (1)
- Vanderbilt Journal of Entertainment & Technology Law (1)
Articles 1 - 30 of 44
Full-Text Articles in Law
Natural Law, Slavery, And The Right To Privacy Tort, Anita L. Allen
Natural Law, Slavery, And The Right To Privacy Tort, Anita L. Allen
Fordham Law Review
In 1905 the Supreme Court of Georgia became the first state high court to recognize a freestanding “right to privacy” tort in the common law. The landmark case was Pavesich v. New England Life Insurance Co. Must it be a cause for deep jurisprudential concern that the common law right to privacy in wide currency today originated in Pavesich’s explicit judicial interpretation of the requirements of natural law? Must it be an additional worry that the court which originated the common law privacy right asserted that a free white man whose photograph is published without his consent in a …
Valuing Privacy, Youngjae Lee
Medical Evidence In Cases Of Intrauterine Drug And Alcohol Exposure , Judith Larsen, Robert M. Horowitz, Ira J. Chasnoff
Medical Evidence In Cases Of Intrauterine Drug And Alcohol Exposure , Judith Larsen, Robert M. Horowitz, Ira J. Chasnoff
Pepperdine Law Review
No abstract provided.
The Policy Against Federal Funding For Abortions Extends Into The Realm Of Free Speech After Rust V. Sullivan, Loye M. Barton
The Policy Against Federal Funding For Abortions Extends Into The Realm Of Free Speech After Rust V. Sullivan, Loye M. Barton
Pepperdine Law Review
No abstract provided.
California's Constitutional Right To Privacy, J. Clark Kelso
California's Constitutional Right To Privacy, J. Clark Kelso
Pepperdine Law Review
No abstract provided.
The Private Club Exemption From Civil Rights Legislation - Sanctioned Discrimination Or Justified Protection Of Right To Associate, Margaret E. Koppen
The Private Club Exemption From Civil Rights Legislation - Sanctioned Discrimination Or Justified Protection Of Right To Associate, Margaret E. Koppen
Pepperdine Law Review
No abstract provided.
Psychotherapist And Patient In The California Supreme Court: Ground Lost And Ground Regained, Stanley Mosk
Psychotherapist And Patient In The California Supreme Court: Ground Lost And Ground Regained, Stanley Mosk
Pepperdine Law Review
No abstract provided.
Substance And Method In The Year 2000, Akhil Reed Amar
Substance And Method In The Year 2000, Akhil Reed Amar
Pepperdine Law Review
No abstract provided.
Limits Of The Federal Wiretap Act's Ability To Protect Against Wi-Fi Sniffing, Mani Potnuru
Limits Of The Federal Wiretap Act's Ability To Protect Against Wi-Fi Sniffing, Mani Potnuru
Michigan Law Review
Adoption of Wi-Fi wireless technology continues to see explosive growth. However many users still operate their home Wi-Fi networks in unsecured mode or use publicly available unsecured Wi-Fi networks, thus exposing their communications to the dangers of "packet sniffing," a technique used for eavesdropping on a network. Some have argued that communications over unsecured Wi-Fi networks are "readily accessible to the general public" and that such communications are therefore excluded from the broad protections of the Federal Wiretap Act against intentional interception of electronic communications. This Note examines the Federal Wiretap Act and argues that the current Act's treatment of …
Warrantless Searches And Smartphones: Privacy In The Palm Of Your Hand?, Margaret M. Lawton
Warrantless Searches And Smartphones: Privacy In The Palm Of Your Hand?, Margaret M. Lawton
University of the District of Columbia Law Review
Incident to a drug arrest, a police officer removes a smartphone from the pocket of the defendant. The smartphone may have incriminating evidence-phone numbers, pictures, text messages, and e-mails. But can the officer examine the smartphone on the scene or back at the station? Or does the officer need to show probable cause and obtain a warrant before examining the phone? If the phone were instead the arrestee's wallet or a cigarette package, under the search incident to lawful arrest exception to the Fourth Amendment's warrant requirement the officer could open and search inside either of these "containers." Anything found …
Looking Through The Prism Of Privacy And Trespass: Smartphones And The Fourth Amendment, Saby Ghoshray
Looking Through The Prism Of Privacy And Trespass: Smartphones And The Fourth Amendment, Saby Ghoshray
University of the District of Columbia Law Review
Technology in the twenty-first century has dramatically changed our lives, but the law has not kept pace with technological advances. The treatment of smartphones in Fourth Amendment jurisprudence is no exception. This is made evident by the increasingly scattered outcomes of litigation involving the privacy interests of smartphone owners.' As the cross-jurisdictional inconsistencies of judicial decisions applying the Fourth Amendment to smartphones mount, I am drawn to seek answers from two foundational pillars of the Supreme Court's search and seizure jurisprudence: protection against invasions of privacy and the bulwark against trespass.
The Fourth Amendment And The Stored Communications Act: Why The Warrantless Gathering Of Historical Cell Site Location Information Poses No Threat To Privacy , Kyle Malone
Pepperdine Law Review
No abstract provided.
E-Ethics, Michael K. Mcchrystal
E-Ethics, Michael K. Mcchrystal
Marquette Elder's Advisor
The fit between laws regulating professional ethics and the means of conducting business, particularly telecommunications and computer technology, has become tenuous. Here, McChrystal examines recent legal decisions concerning electronic transmission of information and discusses the impact of Internet messages and e-mail on attorney-client privilege.
Privacy And Pension Plan Records: Is Self-Regulation Sufficient?, Michael J. Francis
Privacy And Pension Plan Records: Is Self-Regulation Sufficient?, Michael J. Francis
Marquette Elder's Advisor
The confidentiality of employee' pension information is being threatened by changes in the design of qualified retirement plans and advances in data-processing and Internet technology. Despite the passage of recent laws aimed at protecting privacy, the author suggest that more may need to be done to ensure that personal financial information remains secure.
Guardianship Actions Against Individuals Who Have Selected An Agent As Power Of Attorney: When Should The Court Say "No?", Linda S. Ershow-Levenberg
Guardianship Actions Against Individuals Who Have Selected An Agent As Power Of Attorney: When Should The Court Say "No?", Linda S. Ershow-Levenberg
Marquette Elder's Advisor
This article discusses the need for guardianship for presumably incapacitated individuals who already have designated someone to have their power of attorney or to be their healthcare representative. Noting that the privacy and liberty of an individual will be affected by appointing a guardian, the author proposes that guardians not be unnecessarily appointed when currently in-place representatives already fulfill needed services.
Do Automobile Passengers Have A Legitimate Expectation Of Privacy? An Analysis Of Reasonable Expectation Under The Fourth Amendment - People V. Howard, Lisa Belrose
Touro Law Review
No abstract provided.
Wilson V. Layne: Increasing The Scope Of The Fourth Amendment Right To Privacy, Ashlea Wright
Wilson V. Layne: Increasing The Scope Of The Fourth Amendment Right To Privacy, Ashlea Wright
Pepperdine Law Review
No abstract provided.
Walled Gardens Of Privacy Or “Binding Corporate Rules?”: A Critical Look At International Protection Of Online Privacy, Joanna Kulesza
Walled Gardens Of Privacy Or “Binding Corporate Rules?”: A Critical Look At International Protection Of Online Privacy, Joanna Kulesza
University of Arkansas at Little Rock Law Review
A growing concern in the era of cloud computing is protecting Internet users' privacy. This concern is compounded by the fact that there are no effective international solutions. This article considers the latest European Union (EU) proposed development in this area – a regulatory model based on amended Binding Corporate Rules (BCR) – as introduced by the EU Justice Commissioner. These planned changes would have worldwide effects on international companies' online activities in transboundary cyberspace.
After providing a background on the concept of defining privacy in general, the article describes the BCR proposal, and proceeds to consider the likelihood of …
Eyephones: A Fourth Amendment Inquiry Into Mobile Iris Scanning, Christopher R. Jones
Eyephones: A Fourth Amendment Inquiry Into Mobile Iris Scanning, Christopher R. Jones
South Carolina Law Review
No abstract provided.
Major League Security: Overcoming Legal Challenges Of Sporting Event Security Systems, Jorge Martinez
Major League Security: Overcoming Legal Challenges Of Sporting Event Security Systems, Jorge Martinez
University of Miami National Security & Armed Conflict Law Review
This article will discuss emerging threats to major sporting events and suggest methods to defend fans and athletes through strengthening security systems and procedures. One problem with strengthening security systems, however, is that in many cases, increased security means less personal privacy. This article will briefly review security measures that have traditionally been in place, juxtapose newly developed security measures, assess the effectiveness and constitutionality of each measure, and propose a working security system to be used at such events. Ultimately, an ideal security system of the future will have to incorporate developments in various fields and will take time …
Keep Your Nose Out Of My Business-A Look At Dog Sniffs In Public Places Versus The Home, Michael Mayer
Keep Your Nose Out Of My Business-A Look At Dog Sniffs In Public Places Versus The Home, Michael Mayer
University of Miami Law Review
No abstract provided.
Electronic Privacy And Employee Speech, Pauline T. Kim
Electronic Privacy And Employee Speech, Pauline T. Kim
Chicago-Kent Law Review
The boundary between work and private life is blurring as a result of changes in the organization of work and advances in technology. Current privacy law is ill-equipped to address these changes and as a result, employees' privacy in their electronic communications is only weakly protected from employer scrutiny. At the same time, the law increasingly protects certain socially valued forms of employee speech. In particular, collective speech, speech that enforces workplace regulations and speech that deters or reports employer wrong-doing are explicitly protected by law from employer reprisals. These two developments—weak protection of employee privacy and increased protection for …
That’S The Ticket: Arguing For A Narrower Interpretation Of The Exceptions Clause In The Driver’S Privacy Protection Act, Katherine Hutchinson
That’S The Ticket: Arguing For A Narrower Interpretation Of The Exceptions Clause In The Driver’S Privacy Protection Act, Katherine Hutchinson
Seventh Circuit Review
The Driver's Privacy Protection Act of 1994 restricts states from disclosing personal identifying information contained in an individual's motor vehicle record without that person's express consent. The DPPA was a response to tragic incidents in which such information was released to members of the public who used it to locate people and commit crimes against them. However, Congress inserted into the Act a list of fourteen exceptions under which certain parties may still access these state records for specific "permissible uses." These exceptions recognized the need for such disclosure in the interests of the legitimate operational needs of government and …
Csi Las Vegas: Privacy, Policing, And Profiteering In Casino Structured Intelligence, Jessica D. Gabel
Csi Las Vegas: Privacy, Policing, And Profiteering In Casino Structured Intelligence, Jessica D. Gabel
UNLV Gaming Law Journal
This Article argues that the intricate, vast amounts of consumer information compiled through casino structured intelligence require greater protection and oversight in the contexts of both bankruptcy and law enforcement. Section II examines the various types of casino technology and information gathering that casinos perform. Section III considers the available protections of private information in terms of security breaches, law enforcement sharing, and sales in the context of a bankruptcy. Section IV discusses additional safeguards and ethical concerns that should be considered as casinos continue to increase their data mining efforts. Finally, Section V concludes that, minimally, consumers are entitled …
Patron Data Privacy And Security In The Casino Industry: A Case For A U.S. Data Privacy Statute, Chandeni K. Gill
Patron Data Privacy And Security In The Casino Industry: A Case For A U.S. Data Privacy Statute, Chandeni K. Gill
UNLV Gaming Law Journal
This Note discusses the recent surge in patron data collected by casino player tracking systems and the increasing need to protect the confidentiality and security of patron Personally Identifiable Information (PII) through the implementation of federal privacy legislation. Part I discusses the rise of the casino player tracking database systems. Part II explains and defines PII. Part III outlines current U.S. privacy laws applicable to the casino industry, describes casino liability standards, and examines patron remedies for a potential breach in the security of patron PII. Part IV assesses the strengths and weaknesses of U.S. privacy laws applicable to the …
Watching The Watchmen: The People's Attempt To Hold On-Duty Law Enforcement Officers Accountable For Misconduct And The Illinois Law That Stands In Their Way, Robert J. Tomei Jr.
Watching The Watchmen: The People's Attempt To Hold On-Duty Law Enforcement Officers Accountable For Misconduct And The Illinois Law That Stands In Their Way, Robert J. Tomei Jr.
Northern Illinois University Law Review
In the days when police brutality and public official corruption pump through the veins of society as a fermenting virus, a critical analysis of a controversial law curtailing efforts to intensify public awareness of government official transgressions is undertaken. In the great State of Illinois, legislative amendments to the Illinois Eavesdropping Act have established a moratorium on the audio recording, without prior consent, of any judge, state's attorney or law enforcement officer while in the performance of his or her official duties, regardless of whether or not the public official(s) had any objective, justifiable or reasonable expectation of privacy when …
Beyond The (Current) Fourth Amendment: Protecting Third-Party Information, Third Parties, And The Rest Of Us Too, Stephen E. Henderson
Beyond The (Current) Fourth Amendment: Protecting Third-Party Information, Third Parties, And The Rest Of Us Too, Stephen E. Henderson
Pepperdine Law Review
For at least thirty years the Supreme Court has adhered to its third-party doctrine in interpreting the Fourth Amendment, meaning that so far as a disclosing party is concerned, information in the hands of a third party receives no Fourth Amendment protection. The doctrine was controversial when adopted, has been the target of sustained criticism, and is the predominant reason that the Katz revolution has not been the revolution many hoped it would be. Some forty years after Katz the Court's search jurisprudence largely remains tied to property conceptions. As I have demonstrated elsewhere, however, the doctrine is not the …
Is It Better To Be Safe Than Sorry?: Free Speech And The Precautionary Principle, Frederick Schauer
Is It Better To Be Safe Than Sorry?: Free Speech And The Precautionary Principle, Frederick Schauer
Pepperdine Law Review
No abstract provided.
International Travel With A "Digital Briefcase": If Customs Officials Can Search A Laptop, Will The Right Against Self-Incrimination Contravene This Authority?, Ashley H. Verdon
International Travel With A "Digital Briefcase": If Customs Officials Can Search A Laptop, Will The Right Against Self-Incrimination Contravene This Authority?, Ashley H. Verdon
Pepperdine Law Review
No abstract provided.
Gina, Privacy, And Antisubordination, Bradley A. Areheart
Gina, Privacy, And Antisubordination, Bradley A. Areheart
Georgia Law Review
This Essay briefly considers both the current and
optimal role of privacy in employment discrimination
jurisprudence. The recently-passed Genetic Information
Nondiscrimination Act (GINA) is illustrative of a possible
trend in employment discrimination toward privacy. In
particular, GINA includes a prohibition on the use of
genetic information in all employment decisions, affording
a measure of genetic privacy to potential and current
employees.
GINA stands in contrast to prior employment
discrimination statutes, which have often encouraged or
required employers to be knowledgeable of and consider a
particular identity trait through policies such as
reasonable accommodation, affirmative action, and the
disparate impact doctrine. …