Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Privacy

2014

Discipline
Institution
Publication
Publication Type
File Type

Articles 31 - 60 of 128

Full-Text Articles in Law

Riley V. California: What It Means For Metadata, Border Searches, And The Future Of Privacy, Adam Lamparello Jul 2014

Riley V. California: What It Means For Metadata, Border Searches, And The Future Of Privacy, Adam Lamparello

Adam Lamparello

Private information is no longer stored only in homes or other areas traditionally protected from warrantless intrusion. The private lives of many citizens are contained in a digital device no larger than the palm of their hand—and carried in public places. But that does not make the data within a cell phone any less private, just as the dialing of a phone number does not voluntarily waive an individual’s right to keep their call log or location private. Remember that we are not talking about individuals suspected of committing violent crimes. The Government is recording the calls and locations of …


Where Have You Been - Your Phone Knows (And So Might The Police), W. Jacob Henerey Jul 2014

Where Have You Been - Your Phone Knows (And So Might The Police), W. Jacob Henerey

South Carolina Law Review

No abstract provided.


Ubiquitous Privacy, Thomas P. Crocker Jul 2014

Ubiquitous Privacy, Thomas P. Crocker

Faculty Publications

No abstract provided.


Systematic Ict Surveillance By Employers: Are Your Personal Activities Private?, Arlene J. Nicholas Jul 2014

Systematic Ict Surveillance By Employers: Are Your Personal Activities Private?, Arlene J. Nicholas

Faculty and Staff - Articles & Papers

This paper reviews the various methods of information and communications technology (ICT) that is used by employers to peer into the work lives and, in some cases, private lives of employees. Some of the most common methods – such as computer and Internet monitoring, video surveillance, and global positioning systems (GPS) – have resulted in employee disciplines that have been challenged in courts. This paper provides background information on United States (U.S.) laws and court cases which, in this age of easily accessible information, mostly support the employer. Assessments regarding regulations and policies, which will need to be continually updated …


Deconstructing The Relationship Between Privacy And Security [Viewpoint], Gregory Conti, Lisa A. Shay, Woodrow Hartzog Jul 2014

Deconstructing The Relationship Between Privacy And Security [Viewpoint], Gregory Conti, Lisa A. Shay, Woodrow Hartzog

Faculty Scholarship

From a government or law-enforcement perspective, one common model of privacy and security postulates that security and privacy are opposite ends of a single continuum. While this model has appealing properties, it is overly simplistic. The relationship between privacy and security is not a binary operation in which one can be traded for the other until a balance is found. One fallacy common in privacy and security discourse is that trade-offs are effective or even necessary. Consider the remarks of New York Police Department Commissioner Ray Kelly shortly after the Boston Marathon bombing, “I'm a major proponent of cameras. I …


State V. Brossart: Adapting The Fourth Amendment For A Future With Drones, Thomas Bryan Jun 2014

State V. Brossart: Adapting The Fourth Amendment For A Future With Drones, Thomas Bryan

Catholic University Law Review

No abstract provided.


The Historical Significance, Modernization, And Future Of The Video Privacy Protection Act, Erika Williams Jun 2014

The Historical Significance, Modernization, And Future Of The Video Privacy Protection Act, Erika Williams

GGU Law Review Blog

In the twenty first century, we are accustomed to the privacy protections that prohibit video rental service companies from releasing our consumer service history to other sources without first obtaining our written, signed consent. However, most consumers likely do not know the historical significance of why we came to appreciate these privacy protections or what the exact terms of these privacy protections are.


Criminal Procedure Decisions In The October 2005 Term, Susan N. Herman Jun 2014

Criminal Procedure Decisions In The October 2005 Term, Susan N. Herman

Touro Law Review

No abstract provided.


A Cloudy Forecast: Divergence In The Cloud Computing Laws Of The United States, European Union, And China, Tina Cheng Jun 2014

A Cloudy Forecast: Divergence In The Cloud Computing Laws Of The United States, European Union, And China, Tina Cheng

Georgia Journal of International & Comparative Law

No abstract provided.


United States V. Jones: Big Brother And The "Common Good" Versus The Fourth Amendment And Your Right To Privacy, Melanie Reid Jun 2014

United States V. Jones: Big Brother And The "Common Good" Versus The Fourth Amendment And Your Right To Privacy, Melanie Reid

Tennessee Journal of Law and Policy

In the center of the town of Siena, Italy, lays the Palazzo Publico which was built between 1297 and 1310. Inside the Palazzo Publico is the Sala della Pace, the Hall of Peace, which houses an early piece of Italian secular arta fresco that illustrates the effect government has on the city, its people, and the countryside.' The painter, Ambrogio Lorenzetti, depicted the "Common Good" as a king, sitting tall and strong above a line of smaller-sized, everyday people who are slowly making their way towards the "Common Good." This picture represents the subordination of private interest to the common …


Court Of Appeals Of New York, People V. Burton, Diane Matero May 2014

Court Of Appeals Of New York, People V. Burton, Diane Matero

Touro Law Review

No abstract provided.


Webmail At Work: The Case For Protection Against Employer Monitoring, Marc A. Sherman May 2014

Webmail At Work: The Case For Protection Against Employer Monitoring, Marc A. Sherman

Touro Law Review

No abstract provided.


Prenatal Caretaking: Limits Of State Intervention With And Without Roe, Sharon E. Rush May 2014

Prenatal Caretaking: Limits Of State Intervention With And Without Roe, Sharon E. Rush

Sharon E. Rush

With or without Roe, difficult questions regarding the state's role in prenatal caretaking remain. Unless the Supreme Court addresses the assumptions underlying the abortion controversy, overruling Roe would not resolve the problem of allocating decisionmaking responsibility between the woman and the state during the woman's pregnancy. Fundamental constitutional questions about life and death, parental authority over the fetus, and the scope of the woman's right of privacy outside of abortion have not been answered by the Supreme Court.


Criminal Procedure Decisions From The October 2006 Term, Susan N. Herman May 2014

Criminal Procedure Decisions From The October 2006 Term, Susan N. Herman

Touro Law Review

No abstract provided.


Copyright Law, Privacy, And Illegal File Sharing: Defeating A Defendant's Claims Of Privacy Invasion, Daniel Gomez-Sanchez May 2014

Copyright Law, Privacy, And Illegal File Sharing: Defeating A Defendant's Claims Of Privacy Invasion, Daniel Gomez-Sanchez

Touro Law Review

No abstract provided.


Silence Is Golden...Except In Health Care Philanthropy, Stacey A. Tovino May 2014

Silence Is Golden...Except In Health Care Philanthropy, Stacey A. Tovino

University of Richmond Law Review

No abstract provided.


Using Copyright To Combat Revenge Porn, Amanda Levendowski May 2014

Using Copyright To Combat Revenge Porn, Amanda Levendowski

Georgetown Law Faculty Publications and Other Works

Over the past several years, the phenomenon of “revenge porn” – defined as sexually explicit images that are publicly shared online, without the consent of the pictured individual – has attracted national attention. Victims of revenge porn often suffer devastating consequences, including losing their jobs, but have had limited success using tort laws to prevent the spread of their images. Victims need a remedy that provides takedown procedures, civil liability for uploaders and websites, and the threat of money damages. Copyright law provides all of these remedies. Because an estimated 80 percent of revenge porn images are “selfies,” meaning that …


Do Androids Dream Of Electric Free Speech? Visions Of The Future Of Copyright, Privacy And The First Amendment In Science Fiction, Daxton R. Stewart Apr 2014

Do Androids Dream Of Electric Free Speech? Visions Of The Future Of Copyright, Privacy And The First Amendment In Science Fiction, Daxton R. Stewart

Daxton "Chip" Stewart

Science fiction authors have long projected the future of technology, including communication devices and the way in which future societies may use them. In this essay, these visions of future technology, and their implications on the future of media law and policy, are explored in three areas in particular – copyright, privacy, and the First Amendment. Themes examined include moving toward massively open copyright systems, problems of perpetual surveillance by the state, addressing rights of obscurity in public places threatened by wearable and implantable computing devices, and considering free speech rights of autonomous machines created by humans. In conclusion, the …


Back To Blood: The Sociopolitics And Law Of Compulsory Dna Testing Of Refugees, Edward S. Dove Apr 2014

Back To Blood: The Sociopolitics And Law Of Compulsory Dna Testing Of Refugees, Edward S. Dove

University of Massachusetts Law Review

Since October 2012, certain family members of refugees seeking reunification through the United States Refugee Admissions Priority Three program must undergo DNA testing to prove they are genetically related. The putative purposes of the policy include fraud prevention, enhanced national security, and greater efficiency in refugee claims processing. Upon close inspection, however, the new policy generates significant sociopolitical and legal concerns. The notion of what constitutes a family is significantly narrowed. Required DNA testing may violate domestic laws and international human rights instruments regarding voluntary informed consent, privacy, and anti-discrimination. Traditional legal solutions insufficiently remedy these concerns and cannot prevent …


Privacy In Public: “Google Glass” And “Creepshots”, Subhajit Basu Apr 2014

Privacy In Public: “Google Glass” And “Creepshots”, Subhajit Basu

Subhajit Basu

This article looks at two interrelated issues that we will be confronting since the invention of “Google Glass”. First, the development of a particular technology that is inevitable and sometimes autonomous and, second, potential victims of that innovation. I argue that the expansion of a technology like “Google Glass”, in particular the use of this technology for taking “creepshots”, blurs the line between what is considered public and private. “Creepshots” are covertly taken sexually indicative photographs, mostly of women, which are posted online without consent. In fact, it is the lack of consent that is the crucial component for a …


Cloud Computing E Protezione Dei Dati Nel Web 3.0 (Cloud Computing And Data Protection In The Web 3.0), Guido Noto La Diega Apr 2014

Cloud Computing E Protezione Dei Dati Nel Web 3.0 (Cloud Computing And Data Protection In The Web 3.0), Guido Noto La Diega

Guido Noto La Diega

‘Cloud computing’ in simplified terms can be understood as the storing, processing and use of data on remotely located computers accessed over the internet. This means that users can command almost unlimited computing power on demand, that they do not have to make major capital investments to fulfil their needs and that they can get to their data from anywhere with an internet connection (COM(2012) 529 final, unleashing the potential of cloud computing in Europe). The essay focuses on the problems of privacy and data security in european law and italian law from the perspective of cloud computing. Italian Abstract: …


To Read Or Not To Read: Privacy Within Social Networks, The Entitlement Of Employees To A Virtual “Private Zone” And The Balloon Theory, Shlomit Yanisky-Ravid Apr 2014

To Read Or Not To Read: Privacy Within Social Networks, The Entitlement Of Employees To A Virtual “Private Zone” And The Balloon Theory, Shlomit Yanisky-Ravid

Shlomit Yanisky-Ravid Professor of Law

Social networking has increasingly become the most common venue of self-expression in the digital era. Although social networks started as a social vehicle, they have recently become a major source for employers to track personal data ("screening") of applicants, employees or former employees.

This article addresses the questions of whether this casual business routine harms employees' rights to privacy with regard to data users post in social networks, what the drawbacks of this routine may be, and why and how privacy rights should be protected to secure private zones within the virtual sphere. The article suggests that a privacy right …


Globally Speaking—Honoring The Victims' Stories: Matsuda's Human Rights Praxis, Berta Esperanza Hernández-Truyol Apr 2014

Globally Speaking—Honoring The Victims' Stories: Matsuda's Human Rights Praxis, Berta Esperanza Hernández-Truyol

Michigan Law Review First Impressions

Globally speaking, international law and the vast majority of domestic legal systems strive to protect the right to freedom of expression. The United States' First Amendment provides an early historical protection of speech-a safeguard now embraced around the world. The extent of this protection, however, varies among states. The United States stands alone in excluding countervailing considerations of equality, dignitary, or privacy interests that would favor restrictions on speech. The gravamen of the argument supporting such American exceptionalism is that free expression is necessary in a democracy. Totalitarianism, the libertarian narrative goes, thrives on government control of information to the …


The Tools Of Political Dissent: A First Amendment Guide To Gun Registries, Thomas E. Kadri Apr 2014

The Tools Of Political Dissent: A First Amendment Guide To Gun Registries, Thomas E. Kadri

Michigan Law Review First Impressions

On December 23, 2012, a newspaper in upstate New York published a provocative map. On it appeared the names and addresses of thousands of gun owners in nearby counties, all precisely pinpointed for the world to browse. The source of this information: publicly available data drawn from the state’s gun registry. Legislators were quick to respond. Within a month, a new law offered gun owners the chance to permanently remove their identities from the registry with a simple call to their county clerk. The map raised interesting questions about broadcasting personal information, but a more fundamental question remains: Are these …


Hidden Home Videos: Surreptitious Video Surveillance In Divorce, Rebecca V. Lyon Apr 2014

Hidden Home Videos: Surreptitious Video Surveillance In Divorce, Rebecca V. Lyon

Chicago-Kent Law Review

In divorce court, often a very contentious and emotional court, parties frequently use what they can to gain the upper hand. The invention of new technology gives them an even wider arsenal. While tracking each other on the computer or checking phone records has become common, courts are now encountering instances where one spouse has placed hidden video cameras around the house to catch the other spouse doing something wrong. Under many state laws, courts have been forced to conclude that the surreptitious video recordings are not illegal. Perhaps more surprisingly, a few courts have concluded that the law either …


Will There Be A Neurolaw Revolution?, Adam Kolber Apr 2014

Will There Be A Neurolaw Revolution?, Adam Kolber

Indiana Law Journal

The central debate in the field of neurolaw has focused on two claims. Joshua Greene and Jonathan Cohen argue that we do not have free will and that advances in neuroscience will eventually lead us to stop blaming people for their actions. Stephen Morse, by contrast, argues that we have free will and that the kind of advances Greene and Cohen envision will not and should not affect the law. I argue that neither side has persuasively made the case for or against a revolution in the way the law treats responsibility.

There will, however, be a neurolaw revolution of …


Opening Remarks For The Keynote Address, William C. Hubbard Apr 2014

Opening Remarks For The Keynote Address, William C. Hubbard

South Carolina Law Review

No abstract provided.


The Right To Be Let Alone: The Kansas Right Of Privacy, J. Lyn Entrikin Apr 2014

The Right To Be Let Alone: The Kansas Right Of Privacy, J. Lyn Entrikin

Faculty Scholarship

No abstract provided.


Personal Curtilage: Fourth Amendment Security In Public, Andrew Guthrie Ferguson Apr 2014

Personal Curtilage: Fourth Amendment Security In Public, Andrew Guthrie Ferguson

William & Mary Law Review

Do citizens have any Fourth Amendment protection from senseenhancing surveillance technologies in public? This Article engages a timely question as new surveillance technologies have redefined expectations of privacy in public spaces. It proposes a new theory of Fourth Amendment security based on the ancient theory of curtilage protection for private property. Curtilage has long been understood as a legal fiction that expands the protection of the home beyond the formal structures of the house. Based on custom and law protecting against both nosy neighbors and the government, curtilage was defined by the actions the property owner took to signal a …


Privacy, Trusts And Cross-Border Transfers Of Personal Information: The Quebec Perspective In The Canadian Context, Eloise Gratton, Pierre-Christian Collins Hoffman Apr 2014

Privacy, Trusts And Cross-Border Transfers Of Personal Information: The Quebec Perspective In The Canadian Context, Eloise Gratton, Pierre-Christian Collins Hoffman

Dalhousie Law Journal

This paper argues that data protection laws apply to prevent the disclosure of certain information relating to trusts, which are increasingly being used .as business and investment vehicles. Given the broad scope of the concept of "personal information" found under both provincial and federal personal information protection statutes, arguments can be made that information relating to trust beneficiaries or trustees, where such beneficiaries or trustees are natural persons, enjoy some level of protection. Even where a trust contains an express choice of law clause providing that the laws of another province or country apply, Quebec conflict of laws rules may …