Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Law

Regulating Spyware: The Limitations Of State Laboratories And The Case For Federal Preemption Of State Unfair Competition Laws, Peter S. Menell Dec 2017

Regulating Spyware: The Limitations Of State Laboratories And The Case For Federal Preemption Of State Unfair Competition Laws, Peter S. Menell

Peter Menell

Drawing on Justice Brandeis's oft-cited observation that states can serve as 'laboratories" of policy experimentation, this Article develops a framework for assessing the allocation of governance authority for regulating Internet activities. In particular, it focuses on whether states should be free to experiment with regulatory approaches or whether the federal government should have principal, if not exclusive (preemptive), regulatory authority over Internet-related activities. Using recent efforts to regulate spyware and adware as a case study, the analysis shows that the lack of harmonization of and uncertainty surrounding, state unfair competition law produces costly, confusing, multi-district litigation and pushes enterprises to …


Keeping The Government's Hands Off Our Bodies: Mapping A Feminist Legal Theory Approach To Privacy In Cross-Gender Prison Searches, Teresa A. Miller Nov 2017

Keeping The Government's Hands Off Our Bodies: Mapping A Feminist Legal Theory Approach To Privacy In Cross-Gender Prison Searches, Teresa A. Miller

Teresa A. Miller

The power of privacy is diminishing in the prison setting, and yet privacy is the legal theory prisoners rely upon most to resist searches by correctional officers. Incarcerated women in particular rely upon privacy to shield them from the kind of physical contact that male guards have been known to abuse. The kind of privacy that protects prisoners from searches by guards of the opposite sex derives from several sources, depending on the factual circumstances. Although some form of bodily privacy is embodied in the First, Fourth, Eighth, and Fourteenth Amendments, prisoners challenging the constitutionality of cross-gender searches most commonly …


Sex & Surveillance: Gender, Privacy & The Sexualization Of Power In Prison, Teresa A. Miller Nov 2017

Sex & Surveillance: Gender, Privacy & The Sexualization Of Power In Prison, Teresa A. Miller

Teresa A. Miller

In prison, surveillance is power and power is sexualized. Sex and surveillance, therefore, are profoundly linked. Whereas numerous penal scholars from Bentham to Foucault have theorized the force inherent in the visual monitoring of prisoners, the sexualization of power and the relationship between sex and surveillance is more academically obscure. This article criticizes the failure of federal courts to consider the strong and complex relationship between sex and surveillance in analyzing the constitutionality of prison searches, specifically, cross-gender searches. The analysis proceeds in four parts. Part One introduces the issues posed by sex and surveillance. Part Two describes the sexually …


Intellectual Property’S Lessons For Information Privacy, Mark Bartholomew Nov 2017

Intellectual Property’S Lessons For Information Privacy, Mark Bartholomew

Mark Bartholomew

There is an inherent tension between an individual’s desire to safeguard her personal information and the expressive rights of businesses seeking to communicate that information to others. This tension has multiplied as consumers generate and businesses collect more and more personal data online, forcing efforts to strike an appropriate balance between privacy and commercial speech. No consensus on this balance has been reached. Some privacy scholars bemoan what they see as a slanted playing field in favor of those wishing to profit from the private details of other people’s lives. Others contend that the right in free expression must always …


When Privacy Almost Won: Time, Inc. V. Hill (1967), Samantha Barbas Nov 2017

When Privacy Almost Won: Time, Inc. V. Hill (1967), Samantha Barbas

Samantha Barbas

Drawing on previously unexplored and unpublished archival papers of Richard Nixon, the plaintiffs’ lawyer in the case, and the justices of the Warren Court, this article tells the story of the seminal First Amendment case Time, Inc. v. Hill (1967). In Hill, the Supreme Court for the first time addressed the conflict between the right to privacy and freedom of the press. The Court constitutionalized tort liability for invasion of privacy, acknowledging that it raised First Amendment issues and must be governed by constitutional standards. Hill substantially diminished privacy rights; today it is difficult if not impossible to recover against …


The Laws Of Image, Samantha Barbas Nov 2017

The Laws Of Image, Samantha Barbas

Samantha Barbas

We live in an image society. Since the turn of the 20th century if not earlier, Americans have been awash in a sea of images throughout the visual landscape. We have become highly image-conscious, attuned to first impressions and surface appearances, and deeply concerned with our own personal images – our looks, reputations, and the impressions we make on others. The advent of this image-consciousness has been a familiar subject of commentary by social and cultural historians, yet its legal implications have not been explored. This article argues that one significant legal consequence of the image society was the evolution …


The Sidis Case And The Origins Of Modern Privacy Law, Samantha Barbas Nov 2017

The Sidis Case And The Origins Of Modern Privacy Law, Samantha Barbas

Samantha Barbas

The American press, it’s been said, is freer to invade personal privacy than perhaps any other in the world. The tort law of privacy, as a shield against unwanted media exposure of private life, is very weak. The usual reason given for the weakness of U.S. privacy law as a bar on the publication of private information is the strong tradition of First Amendment freedom. But “freedom of the press” alone cannot explain why liberty to publish has been interpreted as a right to print truly intimate matters or to thrust people into the spotlight against their will. Especially in …


Testimony @ House Energy And Commerce Subcommittee On Digital Commerce And Consumer Protection Hearing; "21st Century Trade Barriers: Protectionist Cross Border Data Flow Policies Impact On U.S. Jobs.", Jennifer Daskal Oct 2017

Testimony @ House Energy And Commerce Subcommittee On Digital Commerce And Consumer Protection Hearing; "21st Century Trade Barriers: Protectionist Cross Border Data Flow Policies Impact On U.S. Jobs.", Jennifer Daskal

Jennifer Daskal

Ttestimony at House Energy and Commerce Subcommittee on Digital Commerce and Consumer Protection Hearing; "21st Century Trade Barriers: Protectionist Cross Border Data Flow Policies Impact on U.S. Jobs." October 12, 2017

"The free movement of data across borders is critical to economic growth, has benefits for data security, and promotes privacy, speech, and associational rights. Yet, increasingly states are adopting a range of measures that restrict data flows to the United States and elsewhere and adopting costly data localization mandates, pursuant to which companies must store data locally.1 Such restrictions on the free movement of data harm U.S. business interests, …


Second Class For The Second Time: How The Commercial Speech Doctrine Stigmatizes Commercial Use Of Aggregated Public Records, Brian N. Larson, Genelle I. Belmas Oct 2017

Second Class For The Second Time: How The Commercial Speech Doctrine Stigmatizes Commercial Use Of Aggregated Public Records, Brian N. Larson, Genelle I. Belmas

Brian Larson

This Article argues that access to aggregated electronic public records for commercial use should receive protection under the First Amendment in the same measure as the speech acts the access supports. In other words, we view commercial access to aggregated public records as an essential means to valuable speech. For many, however, the taint of the commercial speech doctrine is turning all “information flows” into commercial ones. This, in turn, is threatening the access to government records.


Privacy And The Alaska Constitution: Failing To Fulfill The Promise, Erwin Chemerinsky Jun 2017

Privacy And The Alaska Constitution: Failing To Fulfill The Promise, Erwin Chemerinsky

Erwin Chemerinsky

No abstract provided.


Ispy: Threats To Individual And Institutional Privacy In The Digital World, Lori Andrews Apr 2017

Ispy: Threats To Individual And Institutional Privacy In The Digital World, Lori Andrews

Lori B. Andrews

What type of information is collected, who is viewing it, and what law librarians can do to protect their patrons and institutions.