Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

First Amendment

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 331 - 357 of 357

Full-Text Articles in Privacy Law

Cryptography And The First Amendment: The Right To Be Unheard, 14 J. Marshall J. Computer & Info. L. 325 (1996), Phillip E. Reiman Jan 1996

Cryptography And The First Amendment: The Right To Be Unheard, 14 J. Marshall J. Computer & Info. L. 325 (1996), Phillip E. Reiman

UIC John Marshall Journal of Information Technology & Privacy Law

The author proposes that current technology has made cryptography an important element in maintaining a society's right to free speech. Cryptography is the process of using secret codes to protect information. This protection increases society's privacy because cryptographers can limit the amount of information that is seen by others. The world is becoming a place where there is virtually no privacy. Everyone is open to surveillance through the Internet, use of a credit card or being filmed on a security camera. Cryptography is a means in which a person can protect his privacy. Through this protection, the author states that …


The Newsworthiness Defense To The Public Disclosure Tort, Geoff Dendy Jan 1996

The Newsworthiness Defense To The Public Disclosure Tort, Geoff Dendy

Kentucky Law Journal

No abstract provided.


Revealing The Constitutional Infirmities Of The "Crime Victims Protection Act," Florida's New Privacy Statute For Sexual Assault Victims, Brett Jarad Berlin Oct 1995

Revealing The Constitutional Infirmities Of The "Crime Victims Protection Act," Florida's New Privacy Statute For Sexual Assault Victims, Brett Jarad Berlin

Florida State University Law Review

No abstract provided.


Business Information And "Personal Data": Some Common-Law Observations About The Eu Draft Data Protection Directive, James Maxeiner May 1995

Business Information And "Personal Data": Some Common-Law Observations About The Eu Draft Data Protection Directive, James Maxeiner

All Faculty Scholarship

Discusses the public interest in the free flow of information.


Freedom Of Speech And Press Jan 1995

Freedom Of Speech And Press

Touro Law Review

No abstract provided.


Computer Networks, Libel And The First Amendment, 11 Computer L.J. 555 (1992), Terri A. Cutrera Jan 1992

Computer Networks, Libel And The First Amendment, 11 Computer L.J. 555 (1992), Terri A. Cutrera

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Rust V. Sullivan: The Supreme Court Upholds The Title X Abortion-Counseling Gag Rule, Scott E. Johnson Sep 1991

Rust V. Sullivan: The Supreme Court Upholds The Title X Abortion-Counseling Gag Rule, Scott E. Johnson

West Virginia Law Review

No abstract provided.


Draft Of From Privacy To Publicity - 1991, Wendy J. Gordon Jun 1991

Draft Of From Privacy To Publicity - 1991, Wendy J. Gordon

Scholarship Chronologically

In defense of a "right 'to be let alone'", Warren and Brandeis published their landmark article, The Right to Privacy, approximately one hundred years ago. Over seventy years later, the American Law Institute endorsed a tort right in defense of privacy, and also included in its section on privacy rights a cause of action to redress "appropriation" of one's "name or likeness". Since then courts have used various bases to grant celebrities rights to protect their commercial identities from commercial exploitation by others. Although most states now recognize a right of publicity either by judicial decision or statute, the cause …


Florida Star V. B.J.F.: The Rape Of The Right To Privacy, 23 J. Marshall L. Rev. 731 (1990), Barbara Lynn Pedersen Jan 1990

Florida Star V. B.J.F.: The Rape Of The Right To Privacy, 23 J. Marshall L. Rev. 731 (1990), Barbara Lynn Pedersen

UIC Law Review

No abstract provided.


Forgetting The Constitution, Robert F. Nagel Jan 1989

Forgetting The Constitution, Robert F. Nagel

Publications

No abstract provided.


Stare Decisis And The Supreme Court's Decision To Reconsider Runyon V. Mccrary, Camille Townsend Jan 1988

Stare Decisis And The Supreme Court's Decision To Reconsider Runyon V. Mccrary, Camille Townsend

Loyola University Chicago Law Journal

No abstract provided.


Privacy, Pornography, And The Supreme Court, 21 J. Marshall L. Rev. 755 (1988), Richard F. Hixson Jan 1988

Privacy, Pornography, And The Supreme Court, 21 J. Marshall L. Rev. 755 (1988), Richard F. Hixson

UIC Law Review

No abstract provided.


The Clergy-Penitent Privilege And The Child Abuse Reporting Statute: Is The Secret Sacred, 19 J. Marshall L. Rev. 1031 (1986), Kathryn Keegan Jan 1986

The Clergy-Penitent Privilege And The Child Abuse Reporting Statute: Is The Secret Sacred, 19 J. Marshall L. Rev. 1031 (1986), Kathryn Keegan

UIC Law Review

No abstract provided.


Video Games And The First Amendment: Are Restrictive Regulations Constitutional?, 5 Computer L.J. 493 (1985), Lisa E. Kranitz Jan 1985

Video Games And The First Amendment: Are Restrictive Regulations Constitutional?, 5 Computer L.J. 493 (1985), Lisa E. Kranitz

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Property And Personal Privacy: Interrelationship, Abandonment And Confusion In The Path Of Judicial Review, 18 J. Marshall L. Rev. 847 (1985), Kenneth Mott, Lovette Mott Jan 1985

Property And Personal Privacy: Interrelationship, Abandonment And Confusion In The Path Of Judicial Review, 18 J. Marshall L. Rev. 847 (1985), Kenneth Mott, Lovette Mott

UIC Law Review

No abstract provided.


The Constitution And Informational Privacy, Or How So-Called Conservatives Countenance Governmental Intrustion Into A Person's Private Affairs, 18 J. Marshall L. Rev. 871 (1985), Michael P. Seng Jan 1985

The Constitution And Informational Privacy, Or How So-Called Conservatives Countenance Governmental Intrustion Into A Person's Private Affairs, 18 J. Marshall L. Rev. 871 (1985), Michael P. Seng

UIC Law Review

No abstract provided.


Identifying The Rape Victim: A Constitutional Clash Between The First Amendment And The Right To Privacy, 18 J. Marshall L. Rev. 987 (1985), Ellen B. Fishbein Jan 1985

Identifying The Rape Victim: A Constitutional Clash Between The First Amendment And The Right To Privacy, 18 J. Marshall L. Rev. 987 (1985), Ellen B. Fishbein

UIC Law Review

No abstract provided.


Chapski V. Copley Press: Modification Of The Illinois Innocent Construction Rule, 17 J. Marshall L. Rev. 233 (1984), John A. Mclaughlin Jan 1984

Chapski V. Copley Press: Modification Of The Illinois Innocent Construction Rule, 17 J. Marshall L. Rev. 233 (1984), John A. Mclaughlin

UIC Law Review

No abstract provided.


The Ambush Interview: A False Light Invasion Of Privacy, Kevin F. O'Neill Jan 1983

The Ambush Interview: A False Light Invasion Of Privacy, Kevin F. O'Neill

Law Faculty Articles and Essays

The ''ambush" interview is a controversial investigative reporting technique permeating both national and local television news programming. In the typical ambush interview, a reporter and his news crew intercept an unsuspecting newsworthy subject on the street and bombard him with incriminating accusations ostensibly framed as questions. The ambush interviewee inevitably appears guilty before the viewing audience. This is due to a variety of forces, including the subject's severe credibility disadvantage and the accusatory nature of the reporter's questions. This Note applies a false light invasion of privacy analysis to the ambush technique and examines the nexus between the technique and …


Involuntary Commitment: The Move Toward Dangerousness, 15 J. Marshall L. Rev. 83 (1982), Robert Weissbourd Jan 1982

Involuntary Commitment: The Move Toward Dangerousness, 15 J. Marshall L. Rev. 83 (1982), Robert Weissbourd

UIC Law Review

No abstract provided.


Privacy, Appropriation, And The First Amendment: A Human Cannonball's Rather Rough Landing, Richard G. Wilkins Sep 1977

Privacy, Appropriation, And The First Amendment: A Human Cannonball's Rather Rough Landing, Richard G. Wilkins

BYU Law Review

No abstract provided.


Constitutional Privilege To Republish Defamation, Leslie Levin Jan 1977

Constitutional Privilege To Republish Defamation, Leslie Levin

Faculty Articles and Papers

Underlying the development of the law of defamation is a tension between two broad societal interests: protecting the reputation of individuals and safeguarding the free flow of discussion and information. The common law heavily favored the protection of reputation, offering only limited concessions to the competing interest. In recent years, however, the Supreme Court has refashioned the law of defamation to conform to a first amendment mandate that "debate on public issues should be uninhibited, robust and wide-open." In New York Times Co. v. Sullivan and subsequent cases, the Court established that public officials and public figures may not recover …


Personality Testing By The Schools: A Possible Invasion Of Privacy, Angelika Hoyman Apr 1976

Personality Testing By The Schools: A Possible Invasion Of Privacy, Angelika Hoyman

IUSTITIA

Contemporary critics, concerned with the maintenance of personal privacy, have termed the use of personality tests a "white glove rack and screw" . Monroe H. Freedman, Dean of Hofstra University School of Law, while testifying before a congressional subcommittee, compared the use of psychological tests to the administration of truth serums and found both to be an affront to personal dignity.

Nevertheless, the 1960's witnessed a three-fold increase in the number of school counselors employed in most schools and a nation-wide survey of these counselors indicated that at least one-third of their time was spent in dealing with the personal …


Recent Cases, Robert L. Teicher, Timothy C. Maguire Oct 1975

Recent Cases, Robert L. Teicher, Timothy C. Maguire

Vanderbilt Law Review

In the 1930 decision of State ex rel. LaFollette v. Kohler, the Wisconsin Supreme Court rejected the earliest free speech challenge to a candidate expenditure limitation. The court held that the state's interest in protecting the integrity of its electoral process outweighed the individual's right of communicating with the public without governmental infringement." The court's identification of the communicative effect of campaign spending anticipated the United States Supreme Court's ruling in Stromberg v. California" that communicative conduct was entitled to protection from government infringement. The Court, however, hampered the effectuation of this protection by failing to define conclusively the point …


Book Notes, Law Review Staff May 1970

Book Notes, Law Review Staff

Vanderbilt Law Review

Book Notes --

The Strength of Government--By McGeorge Bundy Cambridge:Harvard University Press, 1968. Pp. xii, 107. $3.75.

Towards a Global Federalism-- By William 0. Douglas. New York: New York University Press, 1968. Pp. xi, 177, $7.95.

Democracy, Dissent, and Disorder: The Issues and the Law-- By Robert F. Drinan New York: The Seabury Press, 1969. Pp. 152,$4.95.

The End of Obscenity: The Trials of Lady Chatterly, Tropic of Cancer, and Fanny Hill --By Charles Rembar New York: Random House, Inc., 1968. Pp. xii, 528. $8.95.

Justice on Trial-- By A.L. Todd Chicago: The University of Chicago Press, 1964. Pp. ix, …


The First Amendment And Protection Of Reputation And Privacy--New York Times Co. V. Sullivan And How It Grew, William O. Bertelsman Jan 1968

The First Amendment And Protection Of Reputation And Privacy--New York Times Co. V. Sullivan And How It Grew, William O. Bertelsman

Kentucky Law Journal

No abstract provided.


Freedom Of Silence: Constitutional Protection Against Governmental Intrusions In Political Affairs, Charles B. Nutting Dec 1948

Freedom Of Silence: Constitutional Protection Against Governmental Intrusions In Political Affairs, Charles B. Nutting

Michigan Law Review

Paradoxically enough, the "right" to be silent has been vociferously asserted by some of our most loquacious citizens. The current activities of Congressional investigating committees and the possible enactment of laws regulating participation in certain political affairs make timely a consideration of the basis for the assertion of the "right" and an attempt to determine the extent to which it may be said truly to be protected against intrusions by the state or national governments. It is proposed first to consider the question of secrecy in connection with the elective process itself and later to extend the inquiry into problems …