Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Privacy Law

Facebook V. Sullivan: Public Figures And Newsworthiness In Online Speech, Thomas E. Kadri, Kate Klonick Jan 2019

Facebook V. Sullivan: Public Figures And Newsworthiness In Online Speech, Thomas E. Kadri, Kate Klonick

Faculty Publications

In the United States, there are now two systems to adjudicate disputes about harmful speech. The first is older and more established: the legal system in which judges apply constitutional law to limit tort claims alleging injuries caused by speech. The second is newer and less familiar: the content-moderation system in which platforms like Facebook implement the rules that govern online speech. These platforms are not bound by the First Amendment. But, as it turns out, they rely on many of the tools used by courts to resolve tensions between regulating harmful speech and preserving free expression—particularly the entangled concepts …


Privacy And Court Records: Online Access And The Loss Of Practical Obscurity, David S. Ardia Jan 2017

Privacy And Court Records: Online Access And The Loss Of Practical Obscurity, David S. Ardia

Faculty Publications

Court records present a conundrum for privacy advocates. Public access to the courts has long been a fundamental tenant of American democracy, helping to ensure that our system of justice functions fairly and that citizens can observe the actions of their government. Yet court records contain an astonishing amount of private and sensitive information, ranging from social security numbers to the names of sexual assault victims. Until recently, the privacy harms that attended the public disclosure of court records were generally regarded as insignificant because court files were difficult to search and access. But this “practical obscurity” is rapidly disappearing …


The Pond Betwixt: Differences In The U.S.-Eu Data Protection/Safe Harbor Negotiation, Richard J. Peltz-Steele Jan 2015

The Pond Betwixt: Differences In The U.S.-Eu Data Protection/Safe Harbor Negotiation, Richard J. Peltz-Steele

Faculty Publications

This article analyzes the differing perspectives that animate US and EU conceptions of privacy in the context of data protection. It begins by briefly reviewing the two continental approaches to data protection and then explains how the two approaches arise in a context of disparate cultural traditions with respect to the role of law in society. In light of those disparities, Underpinning contemporary data protection regulation is the normative value that both US and EU societies place on personal privacy. Both cultures attribute modern privacy to the famous Warren-Brandeis article in 1890, outlining a "right to be let alone." But …


Cybergossip Or Securities Fraud? Some First Amendment Guidance In Drawing The Line., Lyrissa Lidsky, Michael Pike Jan 2001

Cybergossip Or Securities Fraud? Some First Amendment Guidance In Drawing The Line., Lyrissa Lidsky, Michael Pike

Faculty Publications

Fifteen-year-old Jonathan Lebed, the youngest person ever pursued by the SEC in an enforcement action, made over $800,000 in six months by promoting stocks on Internet message boards. Using several fictitious screen names, Jonathan posted hundreds of messages on Yahoo! Finance, hyping selected over-the-counter stocks and then promptly selling his pre-purchased shares as soon as the stock prices rose.

Publicly, the SEC painted a picture-perfect case of securities fraud. Yet, the SEC forced disgorgement of only $285,000 of Jonathan's profits, leaving many observers to wonder why the resolution of this supposedly clear-cut case left its teenaged perpetrator with over $500,000. …


Silencing John Doe: Defamation And Discourse In Cyberspace, Lyrissa Lidsky Jan 2000

Silencing John Doe: Defamation And Discourse In Cyberspace, Lyrissa Lidsky

Faculty Publications

John Doe has become a popular defamation defendant as corporations and their officers bring defamation suits for statements made about them in Internet discussion fora. These new suits are not even arguably about recovering money damages but instead are brought for symbolic reasons — some worthy, some not so worthy. If the only consequence of these suits were that Internet users were held accountable for their speech, the suits would be an unalloyed good. However, these suits threaten to suppress legitimate criticism along with intentional and reckless falsehoods, and existing First Amendment law doctrines are not responsive to the threat …


Prying, Spying And Lying: Intrusive Newsgather And What The Law Should Do About Them, Lyrissa Lidsky Jan 1998

Prying, Spying And Lying: Intrusive Newsgather And What The Law Should Do About Them, Lyrissa Lidsky

Faculty Publications

The media's use of intrusive newsgathering techniques poses an increasing threat to individual privacy. Courts currently resolve the overwhelming majority of conflicts in favor of the media. This is not because the First Amendment bars the imposition of tort liability on the media for its newsgathering practices. It does not. Rather, tort law has failed to seize the opportunity to create meaninful privacy protection. After surveying the economic, philosophical, and practical obstacles to reform, this Article proposes to rejuvenate the tort of intrusion to tip the balance between privacy and the press back in privacy's direction. Working within the framework …