Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

First Amendment

2017

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 31

Full-Text Articles in Privacy Law

The Scrivener’S Secrets Seen Through The Spyglass: Gchq And The International Right To Journalistic Expression, Matthew B. Hurowitz Dec 2017

The Scrivener’S Secrets Seen Through The Spyglass: Gchq And The International Right To Journalistic Expression, Matthew B. Hurowitz

Brooklyn Journal of International Law

As part of the U.K.’s electronic surveillance program, the Government Communications Headquarters (GCHQ), started in 1909 to combat German Spies, now collects metadata from both foreigners and its own citizens. Through the express statutory authority of the Regulation of Investigatory Powers Act of 2000 (RIPA), and a loophole in section 94 of the Telecommunications Act of 1984, the GCHQ collects metadata, which is all of the information that is extrinsic to the actual contents of a communication. The GCHQ can request an authorization from a public authority—a member of its own staff—to collect traffic data, service use information, or subscriber …


When Privacy Almost Won: Time, Inc. V. Hill (1967), Samantha Barbas Nov 2017

When Privacy Almost Won: Time, Inc. V. Hill (1967), Samantha Barbas

Samantha Barbas

Drawing on previously unexplored and unpublished archival papers of Richard Nixon, the plaintiffs’ lawyer in the case, and the justices of the Warren Court, this article tells the story of the seminal First Amendment case Time, Inc. v. Hill (1967). In Hill, the Supreme Court for the first time addressed the conflict between the right to privacy and freedom of the press. The Court constitutionalized tort liability for invasion of privacy, acknowledging that it raised First Amendment issues and must be governed by constitutional standards. Hill substantially diminished privacy rights; today it is difficult if not impossible to recover against …


The Sidis Case And The Origins Of Modern Privacy Law, Samantha Barbas Nov 2017

The Sidis Case And The Origins Of Modern Privacy Law, Samantha Barbas

Samantha Barbas

The American press, it’s been said, is freer to invade personal privacy than perhaps any other in the world. The tort law of privacy, as a shield against unwanted media exposure of private life, is very weak. The usual reason given for the weakness of U.S. privacy law as a bar on the publication of private information is the strong tradition of First Amendment freedom. But “freedom of the press” alone cannot explain why liberty to publish has been interpreted as a right to print truly intimate matters or to thrust people into the spotlight against their will. Especially in …


Second Class For The Second Time: How The Commercial Speech Doctrine Stigmatizes Commercial Use Of Aggregated Public Records, Brian N. Larson, Genelle I. Belmas Oct 2017

Second Class For The Second Time: How The Commercial Speech Doctrine Stigmatizes Commercial Use Of Aggregated Public Records, Brian N. Larson, Genelle I. Belmas

Brian Larson

This Article argues that access to aggregated electronic public records for commercial use should receive protection under the First Amendment in the same measure as the speech acts the access supports. In other words, we view commercial access to aggregated public records as an essential means to valuable speech. For many, however, the taint of the commercial speech doctrine is turning all “information flows” into commercial ones. This, in turn, is threatening the access to government records.


Photography And The Right To Privacy: The French And American Approaches, W. J. Wagner Sep 2017

Photography And The Right To Privacy: The French And American Approaches, W. J. Wagner

The Catholic Lawyer

No abstract provided.


Disentangling The Right Of Publicity, Eric E. Johnson Jun 2017

Disentangling The Right Of Publicity, Eric E. Johnson

Northwestern University Law Review

Despite the increasing importance attached to the right of publicity, its doctrinal scope has yet to be clearly articulated. The right of publicity supposedly allows a cause of action for the commercial exploitation of a person’s name, voice, or image. The inconvenient reality, however, is that only a tiny fraction of such instances are truly actionable. This Article tackles the mismatch between the blackletter doctrine and the shape of the case law, and it aims to elucidate, in straightforward terms, what the right of publicity actually is.

This Article explains how, in the absence of a clear enunciation of its …


Is Your Health Data Really Private? The Need To Update Hipaa Regulations To Incorporate Third-Party And Non-Covered Entities, Latena Hazard May 2017

Is Your Health Data Really Private? The Need To Update Hipaa Regulations To Incorporate Third-Party And Non-Covered Entities, Latena Hazard

Catholic University Journal of Law and Technology

This note argues that the current framework that governs health care applications and consumer privacy is slacking and outlines strategies to ensure protection against third party accessibility of information that consumers deem private.


Table Of Contents May 2017

Table Of Contents

Catholic University Journal of Law and Technology

No abstract provided.


Masthead May 2017

Masthead

Catholic University Journal of Law and Technology

No abstract provided.


Protecting Privacy In The Era Of Smart Toys: Does Hello Barbie Have A Duty To Report, Corinne Moini May 2017

Protecting Privacy In The Era Of Smart Toys: Does Hello Barbie Have A Duty To Report, Corinne Moini

Catholic University Journal of Law and Technology

No abstract provided.


#Cautionbusinesses: Using Competitors' Hashtags Could Possibly Lead To Trademark Infringement, Debbie Chu May 2017

#Cautionbusinesses: Using Competitors' Hashtags Could Possibly Lead To Trademark Infringement, Debbie Chu

Catholic University Journal of Law and Technology

No abstract provided.


Section 337 Of The Tariff Act Of 1930 And Its Impacts On China, Yiqing Yin May 2017

Section 337 Of The Tariff Act Of 1930 And Its Impacts On China, Yiqing Yin

Catholic University Journal of Law and Technology

337 of the Tariff Act of 1930 (“Section 337”) is one of the statutes that prohibit unfair trade or unfair competition in importation, and it aims at protecting intellectual property at the United States borders. Because of the international impacts of Section 337 and the injunctive nature of its remedies, the application of the statute has profound impacts on the trade between U.S. and other countries.

China is a country that has enormous trade with the U.S and imports large amounts of goods to the U.S. each year. Moreover, the weak intellectual property protection in China has been a serious …


Examining The Legalization Of Daily Fantasy Sports, Mark Dourmashkin May 2017

Examining The Legalization Of Daily Fantasy Sports, Mark Dourmashkin

Catholic University Journal of Law and Technology

No abstract provided.


Candidate Appearances, Equal Time, And The Fcc's Online Public File Database: Empirical Data On Tv Station Compliance During The 2016 Presidential Primary, Christopher Terry May 2017

Candidate Appearances, Equal Time, And The Fcc's Online Public File Database: Empirical Data On Tv Station Compliance During The 2016 Presidential Primary, Christopher Terry

Catholic University Journal of Law and Technology

Following the appearances of presidential candidates Donald Trump, Bernie Sanders and Hillary Clinton on episodes of Saturday Night Live, local television affiliates were required to upload documents related to the appearances to the FCC’s online public file database. After discussing the FCC’s database, the Bona Fide News Exception and the modern application of Section 315’s Equal Time Requirements, this study examines the compliance by the local NBC affiliates in the top 100 television markets with the public file requirements for candidate appearances and subsequent equal time requests as a test of station compliance with the requirements of the FCC’s online …


How Might The Supreme Court, If It Reviews The Federal Communication's 2015 Open Internet Order, Utilize The Chevron And Arbitrary And Capricious Tests?, John B. Meisel May 2017

How Might The Supreme Court, If It Reviews The Federal Communication's 2015 Open Internet Order, Utilize The Chevron And Arbitrary And Capricious Tests?, John B. Meisel

Catholic University Journal of Law and Technology

The article focuses on two Supreme Court decisions, King v. Burwell and FCC v. Fox Televisions Stations, Inc., that provide diametrically different models for how deferential a court should be when it reviews administrative action. The former case addresses how deferential a court should be for an agency’s statutory interpretation of an ambiguous statute for a question that has significant economic and political effects but Congress had not expressly delegated the question to the agency. The latter case addresses how deferential a court should be when an agency’s changes a policy that is within its statutory authority. These two …


Nobody Puts Blockchain In A Corner: The Disruptive Role Of Blockchain Technology In The Financial Services Industry And Current Regulatory Issues, Elizabeth Sara Ross May 2017

Nobody Puts Blockchain In A Corner: The Disruptive Role Of Blockchain Technology In The Financial Services Industry And Current Regulatory Issues, Elizabeth Sara Ross

Catholic University Journal of Law and Technology

This Note examines the disruptive effects that distributed ledger technology will have on payment systems and the financial services industry. It discusses how financial technology companies and banks will need to adapt to ensure that American consumers and banks, as well as the American economy at large, remain secure and efficient within an increasingly online and global financial system. This Note argues that the disjointed digital currency licensing regimes and complex landscape of state-by-state money transmission licensing directly threaten to stifle innovation, capital formation, consumer protection, and national cybersecurity. To ensure the U.S. remains competitive in the global financial revolution, …


Looking Backward, Moving Forward: What Must Be Remembered When Resolving The Right To Be Forgotten, Katherine Stewart May 2017

Looking Backward, Moving Forward: What Must Be Remembered When Resolving The Right To Be Forgotten, Katherine Stewart

Brooklyn Journal of International Law

In May 2014, the European Court of Justice decided Google Spain v. AEPD and González and granted citizens the right to be forgotten, rather, the right to request any search engine offering services to European consumers to remove certain results displayed after a search of a citizen’s name. This decision has also resulted in an ongoing battle between Google and the Commission Nationale de l’Infomatique et des Libertés (CNIL), France’s data protection authority. The CNIL believes that Google must apply the right to be forgotten to all domains worldwide, including Google.com. Google, however, has been reluctant to do so, given …


Table Of Contents Jan 2017

Table Of Contents

Catholic University Journal of Law and Technology

No abstract provided.


Targeted Advertising And The First Amendment: Student Privacy Vs. Protected Speech, Marco Crocetti Jan 2017

Targeted Advertising And The First Amendment: Student Privacy Vs. Protected Speech, Marco Crocetti

Catholic University Journal of Law and Technology

No abstract provided.


Masthead Jan 2017

Masthead

Catholic University Journal of Law and Technology

No abstract provided.


Manhattan_Project.Exe: A Nuclear Option For The Digital Age, David Laton Jan 2017

Manhattan_Project.Exe: A Nuclear Option For The Digital Age, David Laton

Catholic University Journal of Law and Technology

This article explores the possible implications and consequences arising from the use of an artificial intelligence construct as a weapon of mass destruction. The digital age has ushered in many technological advances, as well as certain dangers. Chief among these pitfalls is the lack of reliable security found in critical information technology systems. These security gaps can give cybercriminals unauthorized access to highly sensitive computer networks that control the very infrastructure of the United States. Cyberattacks are rising in both frequency and severity and the response by the U.S. has been ineffective. A cyber-weapon of mass destruction (CWMD) implementing an …


Newsroom: Logan On Trump And Libel Law 01-03-2017, Roger Williams University School Of Law Jan 2017

Newsroom: Logan On Trump And Libel Law 01-03-2017, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


Privacy And Court Records: Online Access And The Loss Of Practical Obscurity, David S. Ardia Jan 2017

Privacy And Court Records: Online Access And The Loss Of Practical Obscurity, David S. Ardia

Faculty Publications

Court records present a conundrum for privacy advocates. Public access to the courts has long been a fundamental tenant of American democracy, helping to ensure that our system of justice functions fairly and that citizens can observe the actions of their government. Yet court records contain an astonishing amount of private and sensitive information, ranging from social security numbers to the names of sexual assault victims. Until recently, the privacy harms that attended the public disclosure of court records were generally regarded as insignificant because court files were difficult to search and access. But this “practical obscurity” is rapidly disappearing …


The Price Of Free Mobile Apps Under The Video Privacy Protection Act, Suzanne L. Riopel Jan 2017

The Price Of Free Mobile Apps Under The Video Privacy Protection Act, Suzanne L. Riopel

American University Business Law Review

No abstract provided.


"Free Speech, First Amendment, And New Media For Cons And Festivals" From Pop Culture Business Handbook For Cons And Festivals, Jon Garon Jan 2017

"Free Speech, First Amendment, And New Media For Cons And Festivals" From Pop Culture Business Handbook For Cons And Festivals, Jon Garon

Faculty Scholarship

This article is part of a series of book excerpts from The Pop Culture Business Handbook for Cons and Festivals, which provides the business, strategy, and legal reference guide for fan conventions, film festivals, musical festivals, and cultural events.Although most events are organized by private parties, the location of these events in public venues and the crowd management issues involving free speech make First Amendment and free speech issues a critical component of event management. This excerpt provides a framework for understanding the legal and security issues involving free speech at public events.


Performative Privacy, Scott Skinner-Thompson Jan 2017

Performative Privacy, Scott Skinner-Thompson

Publications

Broadly speaking, privacy doctrine suggests that the right to privacy is non-existent once one enters the public realm. Although some scholars contend that privacy ought to exist in public, “public privacy” has been defended largely with reference to other, ancillary values privacy may serve. For instance, public privacy may be necessary to make the freedom of association meaningful in practice.

This Article identifies a new dimension of public privacy, supplementing extant justifications for the right, by arguing that many efforts to maintain privacy while in “public” are properly conceptualized as forms of performative, expressive resistance against an ever-pervasive surveillance society. …


Session On "Geoblocking Tools And The Law" At Law, Borders, And Speech Conference At Stanford Law School, Marketa Trimble Jan 2017

Session On "Geoblocking Tools And The Law" At Law, Borders, And Speech Conference At Stanford Law School, Marketa Trimble

Boyd Briefs / Road Scholars

Professor Marketa Trimble appeared on a panel at the Law, Borders, and Speech Conference hosted by The Center for Internet and Society at Stanford Law School on October 24, 2016. The session defined and discussed geoblocking and its implications for internet users, government, and private companies.

A video of the session is available here. Additionally, Professor Trimble's presentation is available here.


Revenge Porn And Narrowing The Cda: Litigating A Web-Based Tort In Washington, Jessy R. Nations Jan 2017

Revenge Porn And Narrowing The Cda: Litigating A Web-Based Tort In Washington, Jessy R. Nations

Washington Journal of Law, Technology & Arts

Effective September 2015, the Washington State Legislature passed two statutes which created both civil and criminal liability against individuals who distribute "intimate images" of others without their consent. These statutes were created to combat the modern phenomenon colloquially known as "revenge porn." Revenge porn is the non-consensual distribution of nude or sexually explicit photographs or videos, created with the intent to humiliate or harass the person these images depict. In addition to causing emotional damage to the victim, revenge porn can also produce broader consequences such as loss of employment and stalking. Traditionally, litigating these kinds of offenses has been …


Highway To The Danger Drone: Reconciling First Amendment Rights Of Drone Owners And Privacy Rights Of Individuals In Creating A Comprehensive Statutory Scheme In Rhode Island, David M. Remillard Jan 2017

Highway To The Danger Drone: Reconciling First Amendment Rights Of Drone Owners And Privacy Rights Of Individuals In Creating A Comprehensive Statutory Scheme In Rhode Island, David M. Remillard

Roger Williams University Law Review

No abstract provided.


Privacy And The Right To Record, Margot E. Kaminski Jan 2017

Privacy And The Right To Record, Margot E. Kaminski

Publications

Many U.S. laws protect privacy by governing recording. Recently, however, courts have recognized a First Amendment “right to record.” This Article addresses how courts should handle privacy laws in light of the developing First Amendment right to record.

The privacy harms addressed by recording laws are situated harms. Recording changes the way people behave in physical spaces by altering the nature of those spaces. Thus, recording laws can be placed within a long line of First Amendment case law that recognizes a valid government interest in managing the qualities of rivalrous physical space, so as not to allow one person’s …