Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

First Amendment

2015

Institution
Keyword
Publication
Publication Type

Articles 1 - 26 of 26

Full-Text Articles in Privacy Law

Table Of Contents Dec 2015

Table Of Contents

Catholic University Journal of Law and Technology

No abstract provided.


Alternative Restrictions Of Sex Offenders' Social Media Use & The Freedom Of Speech, Norah M. Sloss Dec 2015

Alternative Restrictions Of Sex Offenders' Social Media Use & The Freedom Of Speech, Norah M. Sloss

Catholic University Journal of Law and Technology

No abstract provided.


Submarine Cables, Cybersecurity And International Law: An Intersectional Analysis, Tara Davenport Dec 2015

Submarine Cables, Cybersecurity And International Law: An Intersectional Analysis, Tara Davenport

Catholic University Journal of Law and Technology

No abstract provided.


When Privacy Almost Won: Time, Inc. V. Hill (1967), Samantha Barbas Dec 2015

When Privacy Almost Won: Time, Inc. V. Hill (1967), Samantha Barbas

Journal Articles

Drawing on previously unexplored and unpublished archival papers of Richard Nixon, the plaintiffs’ lawyer in the case, and the justices of the Warren Court, this article tells the story of the seminal First Amendment case Time, Inc. v. Hill (1967). In Hill, the Supreme Court for the first time addressed the conflict between the right to privacy and freedom of the press. The Court constitutionalized tort liability for invasion of privacy, acknowledging that it raised First Amendment issues and must be governed by constitutional standards. Hill substantially diminished privacy rights; today it is difficult if not impossible to recover against …


The First Amendment And The Rpas, Caren M. Morrison Nov 2015

The First Amendment And The Rpas, Caren M. Morrison

Caren Myers Morrison

No abstract provided.


By Any Other Name: Image Advertising And The Commercial Speech Doctrine In Jordan V. Jewel, Kelly Miller Oct 2015

By Any Other Name: Image Advertising And The Commercial Speech Doctrine In Jordan V. Jewel, Kelly Miller

Loyola of Los Angeles Entertainment Law Review

This Comment focuses on the commercial speech doctrine as applied to modern advertising strategies, specifically, corporate image advertising. It centers on the recent litigation between basketball superstar Michael Jordan and a Chicago-area grocery chain, Jewel-Osco. When Michael Jordan was inducted into the Basketball Hall of Fame, Jewel-Osco was invited to submit a congratulatory ad for a commemorative issue of Sports Illustrated devoted exclusively to Jordan’s career and accomplishments. Because Jordan had spent the bulk of his storied professional basketball career with the Chicago Bulls, the ad seemed a natural fit. Jordan, who did not give permission for his name to …


A New Test To Reconcile The Right Of Publicity With Core First Amendment Values, Nat Stern, Mark Joseph Stern Oct 2015

A New Test To Reconcile The Right Of Publicity With Core First Amendment Values, Nat Stern, Mark Joseph Stern

Scholarly Publications

No abstract provided.


Section 230 Of The Communications Decency Act: The True Culprit Of Internet Defamation, Heather Saint Oct 2015

Section 230 Of The Communications Decency Act: The True Culprit Of Internet Defamation, Heather Saint

Loyola of Los Angeles Entertainment Law Review

This Note highlights the growing concern of Internet defamation and the lack of viable legal remedies available to its victims. Internet defamation is internet speech with the purpose to disparage another’s reputation. At common law, a victim of alleged defamation has the right to file suit against not only the original speaker of the defamatory statements, but the person or entity to give that statement further publication as well. In certain cases even the distributor, such as a newspaper stand, can be held liable for a defamation claim. However, liability due to defamatory speech on the Internet is quite different. …


The Constitution And Informational Privacy, Or How So-Called Conservatives Countenance Governmental Intrustion Into A Person's Private Affairs, 18 J. Marshall L. Rev. 871 (1985), Michael P. Seng Aug 2015

The Constitution And Informational Privacy, Or How So-Called Conservatives Countenance Governmental Intrustion Into A Person's Private Affairs, 18 J. Marshall L. Rev. 871 (1985), Michael P. Seng

Michael P. Seng

No abstract provided.


The Difficulty Of Balancing The Doctrine Of Prior Restraint With The Right Of Privacy, Bridgette Nunez Aug 2015

The Difficulty Of Balancing The Doctrine Of Prior Restraint With The Right Of Privacy, Bridgette Nunez

Touro Law Review

No abstract provided.


The Supreme Court And The Press: Freedom Or Privilege?, Sandra Bradley Jul 2015

The Supreme Court And The Press: Freedom Or Privilege?, Sandra Bradley

Akron Law Review

This comment will examine the Supreme Court's spring, 1978 decisions as they affected first amendment rights, and will assess their impact upon the press. Particular emphasis will be placed on Zurcher v. Stanford Daily as it affects first amendment, as well as fourth amendment, protections.


Unwanted Publicity, The News Media, And The Constitution: Where Privacy Rights Compete With The First Amendment, Ernest D. Giglio Jul 2015

Unwanted Publicity, The News Media, And The Constitution: Where Privacy Rights Compete With The First Amendment, Ernest D. Giglio

Akron Law Review

It is ironic that while recent legal history records the emergence of a constitutional right to privacy, the Supreme Court, in a line of cases from New York Times to Firestone, has restricted the common law tort of privacy. The legal issues are particularly complex and admittedly difficult to reconcile when the public disclosure tort comes in conflict with first amendment privileges. Expansion of the privacy tort need not necessarily impose an unreasonable burden on the news media, provided the Supreme Court distinguishes between defamation and privacy invasion and establishes and applies to the latter wrong its own legal principles.


Bad News: Privacy Ruling To Increase Press Litigation, The Florida Star V. B.J.F., Mary Ellen Hockwalt Jul 2015

Bad News: Privacy Ruling To Increase Press Litigation, The Florida Star V. B.J.F., Mary Ellen Hockwalt

Akron Law Review

This note analyzes the history and precedent upon which the Court relied in reaching Florida Star's "harsh outcome." Next, the note discusses how the Court, by refusing to extend its holding beyond the facts of the case and give broad Constitutional protection to publications of truth, failed to provide lower courts with any guidance in deciding future invasion of privacy actions. Finally, the note examines the Court's balancing test: weighing the privacy interests of a crime victim against the newspaper's freedom to print truthful information.


Charting The Course For Use Of Small Unmanned Aerial Systems In Newsgathering, Mickey H. Osterreicher Jul 2015

Charting The Course For Use Of Small Unmanned Aerial Systems In Newsgathering, Mickey H. Osterreicher

Pepperdine Law Review

News organizations and individual journalists eagerly anticipate safely utilizing Small Unmanned Aerial Systems (sUAS) for newsgathering purposes as lawmakers integrate sUAS into the National Air Space (NAS). For now, these potential users may be flying over an "unchartered" regulatory landscape while the FAA struggles to complete its administrative rulemaking. In order to better understand how media organizations and individual journalists intend to use sUAS for newsgathering purposes, the National Press Photographers Association (NPPA) developed a survey consisting of twenty-one multiple choice questions, with space for elaboration, and three questions seeking narrative responses. The survey was distributed via email to approximately …


Here We Are Now, Entertain Us: Defining The Line Between Personal And Professional Context On Social Media, Raizel Liebler, Keidra Chaney May 2015

Here We Are Now, Entertain Us: Defining The Line Between Personal And Professional Context On Social Media, Raizel Liebler, Keidra Chaney

Pace Law Review

Social media platforms such as Facebook, Twitter, and Instagram allow individuals and companies to connect directly and regularly with an audience of peers or with the public at large. These websites combine the audience-building platforms of mass media with the personal data and relationships of in-person social networks. Due to a combination of evolving user activity and frequent updates to functionality and user features, social media tools blur the line of whether a speaker is perceived as speaking to a specific and presumed private audience, a public expression of one’s own personal views, or a representative viewpoint of an entire …


Social Justice, Social Norms And The Governance Of Social Media, Tal Z. Zarsky May 2015

Social Justice, Social Norms And The Governance Of Social Media, Tal Z. Zarsky

Pace Law Review

This article proceeds as follows: Part II briefly addresses the theoretical arguments regarding the pros and cons of various governance strategies, focusing on the advantages, disadvantages and pitfalls of reliance on private parties. In Part III, the article describes, in general terms, the above-mentioned empirical study, explaining its methodology, the specific challenges to its design and implementation, and how these were met. The discussion specifically centers on a survey taken to establish the nature of social norms. Part IV presents a specific test case: whether pseudonymity should be permitted in social media or should “real names” be mandatory. Part V …


The Need To Criminalize Revenge Porn: How A Law Protecting Victims Can Avoid Running Afoul Of The First Amendment, Adrienne N. Kitchen Jan 2015

The Need To Criminalize Revenge Porn: How A Law Protecting Victims Can Avoid Running Afoul Of The First Amendment, Adrienne N. Kitchen

Chicago-Kent Law Review

Revenge porn occurs when someone posts sexually explicit images of their former paramour on the web, often with contact information for the victim’s work and home. There are thousands, perhaps tens of thousands, of victims. Victims lose or quit their jobs; they are harassed by strangers; some change their name or alter their appearance. Some victims resort to suicide; others are stalked, assaulted, or killed. Civil suits fail to remove the images or deter perpetrators. Current criminal laws are insufficient in several common instances. These shortcomings mean there is a need to criminalize revenge porn.

Revenge porn is obscene and …


Without A Pilot: Navigating The Space Between The First Amendment And State And Federal Directives Affecting Drone Journalism, Leah M. Davis Jan 2015

Without A Pilot: Navigating The Space Between The First Amendment And State And Federal Directives Affecting Drone Journalism, Leah M. Davis

Georgia Law Review

A new player in American airspace, the drone, creates greater opportunities for news gathering. But with new opportunities, come new rules. Current legislatures, regulators and courts face the challenge of creating and enforcing a legal framework by which this new technology can be integrated into American airspace. The debate surrounding proper drone directives is influenced by competing policies of privacy, security, and First Amendment concerns. This Note surveys past and present state and federal directives on drone use, and argues for the creation of a separate set of guidelines for Press drones. Separate directives would ensure that news outlets are …


The Pond Betwixt: Differences In The U.S.-Eu Data Protection/Safe Harbor Negotiation, Richard J. Peltz-Steele Jan 2015

The Pond Betwixt: Differences In The U.S.-Eu Data Protection/Safe Harbor Negotiation, Richard J. Peltz-Steele

Faculty Publications

This article analyzes the differing perspectives that animate US and EU conceptions of privacy in the context of data protection. It begins by briefly reviewing the two continental approaches to data protection and then explains how the two approaches arise in a context of disparate cultural traditions with respect to the role of law in society. In light of those disparities, Underpinning contemporary data protection regulation is the normative value that both US and EU societies place on personal privacy. Both cultures attribute modern privacy to the famous Warren-Brandeis article in 1890, outlining a "right to be let alone." But …


Outing Privacy, Scott Skinner-Thompson Jan 2015

Outing Privacy, Scott Skinner-Thompson

Publications

The government regularly outs information concerning people's sexuality, gender identity, and HIV status. Notwithstanding the implications of such outings, the Supreme Court has yet to resolve whether the Constitution contains a right to informational privacy - a right to limit the government's ability to collect and disseminate personal information.

This Article probes informational privacy theory and jurisprudence to better understand the judiciary's reluctance to fully embrace a constitutional right to informational privacy. The Article argues that while existing scholarly theories of informational privacy encourage us to broadly imagine the right and its possibilities, often focusing on informational privacy's ability to …


Can A One-Star Review Get You Sued? The Right To Anonymous Speech On The Internet And The Future Of Internet “Unmasking” Statutes, 48 J. Marshall L. Rev. 693 (2015), Jesse Lively Jan 2015

Can A One-Star Review Get You Sued? The Right To Anonymous Speech On The Internet And The Future Of Internet “Unmasking” Statutes, 48 J. Marshall L. Rev. 693 (2015), Jesse Lively

UIC Law Review

No abstract provided.


Regulating Real-World Surveillance, Margot E. Kaminski Jan 2015

Regulating Real-World Surveillance, Margot E. Kaminski

Publications

A number of laws govern information gathering, or surveillance, by private parties in the physical world. But we lack a compelling theory of privacy harm that accounts for the state's interest in enacting these laws. Without a theory of privacy harm, these laws will be enacted piecemeal. Legislators will have a difficult time justifying the laws to constituents; the laws will not be adequately tailored to legislative interest; and courts will find it challenging to weigh privacy harms against other strong values, such as freedom of expression.

This Article identifies the government interest in enacting laws governing surveillance by private …


Book Review. Balancing Privacy And Free Speech: Unwanted Attention In The Age Of Social Media By Mark Tunick, Kimberly Mattioli Jan 2015

Book Review. Balancing Privacy And Free Speech: Unwanted Attention In The Age Of Social Media By Mark Tunick, Kimberly Mattioli

Articles by Maurer Faculty

No abstract provided.


Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo Jan 2015

Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo

Articles

In 1986, Congress passed the Stored Communications Act (“SCA”) to provide additional protections for individuals’ private communications content held in electronic storage by third parties. Acting out of direct concern for the implications of the Third-Party Records Doctrine — a judicially created doctrine that generally eliminates Fourth Amendment protections for information entrusted to third parties — Congress sought to tailor the SCA to electronic communications sent via and stored by third parties. Yet, because Congress crafted the SCA with language specific to the technology of 1986, courts today have struggled to apply the SCA consistently with regard to similar private …


The First Amendment And The Rpas, Caren M. Morrison Jan 2015

The First Amendment And The Rpas, Caren M. Morrison

Faculty Publications By Year

No abstract provided.


Regulating Drones Under The First And Fourth Amendments, Stephen E. Henderson, Joseph Thai, Marc Jonathan Blitz, James Grimsley Dec 2014

Regulating Drones Under The First And Fourth Amendments, Stephen E. Henderson, Joseph Thai, Marc Jonathan Blitz, James Grimsley

Stephen E Henderson

The FAA Modernization and Reform Act of 2012 requires the Federal Aviation Administration to integrate unmanned aerial vehicles (UAVs), or drones, into the national airspace system by September of this year. Yet perhaps because of their chilling accuracy in targeted killings abroad, perhaps because of an increasing consciousness of diminishing privacy more generally, and perhaps simply because of a fear of the unknown, divergent UAV-restrictive legislation has been proposed in Congress and enacted in a number of states. Ultimately, given UAV utility and cost effectiveness over a vast range of tasks, widespread commercial use seems certain. So it is imperative …