Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Seattle University School of Law (67)
- The Catholic University of America, Columbus School of Law (55)
- UIC School of Law (33)
- Selected Works (16)
- University of Colorado Law School (16)
-
- Brooklyn Law School (9)
- New York Law School (9)
- Maurer School of Law: Indiana University (8)
- University of Michigan Law School (8)
- University at Buffalo School of Law (7)
- Vanderbilt University Law School (7)
- University of Pennsylvania Carey Law School (6)
- University of Washington School of Law (6)
- American University Washington College of Law (5)
- Cleveland State University (5)
- Roger Williams University (5)
- Texas A&M University School of Law (5)
- University of Maryland Francis King Carey School of Law (5)
- Pace University (4)
- Pepperdine University (4)
- Touro University Jacob D. Fuchsberg Law Center (4)
- Washington and Lee University School of Law (4)
- Chicago-Kent College of Law (3)
- Florida State University College of Law (3)
- Georgetown University Law Center (3)
- Loyola Marymount University and Loyola Law School (3)
- Notre Dame Law School (3)
- The University of Akron (3)
- University of Georgia School of Law (3)
- University of Missouri School of Law (3)
- Keyword
-
- Privacy (85)
- First Amendment (64)
- First amendment (22)
- Freedom of speech (21)
- Free speech (20)
-
- Internet (16)
- Defamation (13)
- Surveillance (12)
- Social media (10)
- Facebook (9)
- Supreme Court (9)
- Anonymity (8)
- Commercial speech (7)
- Fourth Amendment (7)
- Freedom of expression (7)
- Freedom of the press (7)
- Media (7)
- Technology (7)
- Copyright (6)
- HIPAA (6)
- Torts (6)
- Artificial intelligence (5)
- Constitutional law (5)
- Data protection (5)
- Free Speech (5)
- Information (5)
- Law (5)
- Public figure (5)
- Right of publicity (5)
- Right to privacy (5)
- Publication Year
- Publication
-
- Seattle University Law Review (67)
- Catholic University Journal of Law and Technology (55)
- UIC John Marshall Journal of Information Technology & Privacy Law (18)
- Publications (16)
- UIC Law Review (13)
-
- Faculty Scholarship (10)
- All Faculty Scholarship (9)
- Faculty Publications (6)
- NYLS Law Review (6)
- Journal Articles (4)
- Michigan Telecommunications & Technology Law Review (4)
- Touro Law Review (4)
- Vanderbilt Journal of Entertainment & Technology Law (4)
- Washington Law Review (4)
- Akron Law Review (3)
- Articles (3)
- Articles & Chapters (3)
- Articles by Maurer Faculty (3)
- Brooklyn Journal of International Law (3)
- Brooklyn Law Review (3)
- Buffalo Law Review (3)
- Cleveland State Law Review (3)
- Georgetown Law Faculty Publications and Other Works (3)
- Indiana Law Journal (3)
- Pace Law Review (3)
- Pepperdine Law Review (3)
- Stephen E Henderson (3)
- University of Richmond Law Review (3)
- American University National Security Law Brief (2)
- Chicago-Kent Law Review (2)
- Publication Type
- File Type
Articles 331 - 357 of 357
Full-Text Articles in Privacy Law
Cryptography And The First Amendment: The Right To Be Unheard, 14 J. Marshall J. Computer & Info. L. 325 (1996), Phillip E. Reiman
Cryptography And The First Amendment: The Right To Be Unheard, 14 J. Marshall J. Computer & Info. L. 325 (1996), Phillip E. Reiman
UIC John Marshall Journal of Information Technology & Privacy Law
The author proposes that current technology has made cryptography an important element in maintaining a society's right to free speech. Cryptography is the process of using secret codes to protect information. This protection increases society's privacy because cryptographers can limit the amount of information that is seen by others. The world is becoming a place where there is virtually no privacy. Everyone is open to surveillance through the Internet, use of a credit card or being filmed on a security camera. Cryptography is a means in which a person can protect his privacy. Through this protection, the author states that …
The Newsworthiness Defense To The Public Disclosure Tort, Geoff Dendy
The Newsworthiness Defense To The Public Disclosure Tort, Geoff Dendy
Kentucky Law Journal
No abstract provided.
Revealing The Constitutional Infirmities Of The "Crime Victims Protection Act," Florida's New Privacy Statute For Sexual Assault Victims, Brett Jarad Berlin
Revealing The Constitutional Infirmities Of The "Crime Victims Protection Act," Florida's New Privacy Statute For Sexual Assault Victims, Brett Jarad Berlin
Florida State University Law Review
No abstract provided.
Business Information And "Personal Data": Some Common-Law Observations About The Eu Draft Data Protection Directive, James Maxeiner
Business Information And "Personal Data": Some Common-Law Observations About The Eu Draft Data Protection Directive, James Maxeiner
All Faculty Scholarship
Discusses the public interest in the free flow of information.
Computer Networks, Libel And The First Amendment, 11 Computer L.J. 555 (1992), Terri A. Cutrera
Computer Networks, Libel And The First Amendment, 11 Computer L.J. 555 (1992), Terri A. Cutrera
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Rust V. Sullivan: The Supreme Court Upholds The Title X Abortion-Counseling Gag Rule, Scott E. Johnson
Rust V. Sullivan: The Supreme Court Upholds The Title X Abortion-Counseling Gag Rule, Scott E. Johnson
West Virginia Law Review
No abstract provided.
Draft Of From Privacy To Publicity - 1991, Wendy J. Gordon
Draft Of From Privacy To Publicity - 1991, Wendy J. Gordon
Scholarship Chronologically
In defense of a "right 'to be let alone'", Warren and Brandeis published their landmark article, The Right to Privacy, approximately one hundred years ago. Over seventy years later, the American Law Institute endorsed a tort right in defense of privacy, and also included in its section on privacy rights a cause of action to redress "appropriation" of one's "name or likeness". Since then courts have used various bases to grant celebrities rights to protect their commercial identities from commercial exploitation by others. Although most states now recognize a right of publicity either by judicial decision or statute, the cause …
Florida Star V. B.J.F.: The Rape Of The Right To Privacy, 23 J. Marshall L. Rev. 731 (1990), Barbara Lynn Pedersen
Florida Star V. B.J.F.: The Rape Of The Right To Privacy, 23 J. Marshall L. Rev. 731 (1990), Barbara Lynn Pedersen
UIC Law Review
No abstract provided.
Forgetting The Constitution, Robert F. Nagel
Stare Decisis And The Supreme Court's Decision To Reconsider Runyon V. Mccrary, Camille Townsend
Stare Decisis And The Supreme Court's Decision To Reconsider Runyon V. Mccrary, Camille Townsend
Loyola University Chicago Law Journal
No abstract provided.
Privacy, Pornography, And The Supreme Court, 21 J. Marshall L. Rev. 755 (1988), Richard F. Hixson
Privacy, Pornography, And The Supreme Court, 21 J. Marshall L. Rev. 755 (1988), Richard F. Hixson
UIC Law Review
No abstract provided.
The Clergy-Penitent Privilege And The Child Abuse Reporting Statute: Is The Secret Sacred, 19 J. Marshall L. Rev. 1031 (1986), Kathryn Keegan
The Clergy-Penitent Privilege And The Child Abuse Reporting Statute: Is The Secret Sacred, 19 J. Marshall L. Rev. 1031 (1986), Kathryn Keegan
UIC Law Review
No abstract provided.
Video Games And The First Amendment: Are Restrictive Regulations Constitutional?, 5 Computer L.J. 493 (1985), Lisa E. Kranitz
Video Games And The First Amendment: Are Restrictive Regulations Constitutional?, 5 Computer L.J. 493 (1985), Lisa E. Kranitz
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Property And Personal Privacy: Interrelationship, Abandonment And Confusion In The Path Of Judicial Review, 18 J. Marshall L. Rev. 847 (1985), Kenneth Mott, Lovette Mott
Property And Personal Privacy: Interrelationship, Abandonment And Confusion In The Path Of Judicial Review, 18 J. Marshall L. Rev. 847 (1985), Kenneth Mott, Lovette Mott
UIC Law Review
No abstract provided.
The Constitution And Informational Privacy, Or How So-Called Conservatives Countenance Governmental Intrustion Into A Person's Private Affairs, 18 J. Marshall L. Rev. 871 (1985), Michael P. Seng
UIC Law Review
No abstract provided.
Identifying The Rape Victim: A Constitutional Clash Between The First Amendment And The Right To Privacy, 18 J. Marshall L. Rev. 987 (1985), Ellen B. Fishbein
Identifying The Rape Victim: A Constitutional Clash Between The First Amendment And The Right To Privacy, 18 J. Marshall L. Rev. 987 (1985), Ellen B. Fishbein
UIC Law Review
No abstract provided.
Chapski V. Copley Press: Modification Of The Illinois Innocent Construction Rule, 17 J. Marshall L. Rev. 233 (1984), John A. Mclaughlin
Chapski V. Copley Press: Modification Of The Illinois Innocent Construction Rule, 17 J. Marshall L. Rev. 233 (1984), John A. Mclaughlin
UIC Law Review
No abstract provided.
The Ambush Interview: A False Light Invasion Of Privacy, Kevin F. O'Neill
The Ambush Interview: A False Light Invasion Of Privacy, Kevin F. O'Neill
Law Faculty Articles and Essays
The ''ambush" interview is a controversial investigative reporting technique permeating both national and local television news programming. In the typical ambush interview, a reporter and his news crew intercept an unsuspecting newsworthy subject on the street and bombard him with incriminating accusations ostensibly framed as questions. The ambush interviewee inevitably appears guilty before the viewing audience. This is due to a variety of forces, including the subject's severe credibility disadvantage and the accusatory nature of the reporter's questions. This Note applies a false light invasion of privacy analysis to the ambush technique and examines the nexus between the technique and …
Involuntary Commitment: The Move Toward Dangerousness, 15 J. Marshall L. Rev. 83 (1982), Robert Weissbourd
Involuntary Commitment: The Move Toward Dangerousness, 15 J. Marshall L. Rev. 83 (1982), Robert Weissbourd
UIC Law Review
No abstract provided.
Privacy, Appropriation, And The First Amendment: A Human Cannonball's Rather Rough Landing, Richard G. Wilkins
Privacy, Appropriation, And The First Amendment: A Human Cannonball's Rather Rough Landing, Richard G. Wilkins
BYU Law Review
No abstract provided.
Constitutional Privilege To Republish Defamation, Leslie Levin
Constitutional Privilege To Republish Defamation, Leslie Levin
Faculty Articles and Papers
Underlying the development of the law of defamation is a tension between two broad societal interests: protecting the reputation of individuals and safeguarding the free flow of discussion and information. The common law heavily favored the protection of reputation, offering only limited concessions to the competing interest. In recent years, however, the Supreme Court has refashioned the law of defamation to conform to a first amendment mandate that "debate on public issues should be uninhibited, robust and wide-open." In New York Times Co. v. Sullivan and subsequent cases, the Court established that public officials and public figures may not recover …
Personality Testing By The Schools: A Possible Invasion Of Privacy, Angelika Hoyman
Personality Testing By The Schools: A Possible Invasion Of Privacy, Angelika Hoyman
IUSTITIA
Contemporary critics, concerned with the maintenance of personal privacy, have termed the use of personality tests a "white glove rack and screw" . Monroe H. Freedman, Dean of Hofstra University School of Law, while testifying before a congressional subcommittee, compared the use of psychological tests to the administration of truth serums and found both to be an affront to personal dignity.
Nevertheless, the 1960's witnessed a three-fold increase in the number of school counselors employed in most schools and a nation-wide survey of these counselors indicated that at least one-third of their time was spent in dealing with the personal …
Recent Cases, Robert L. Teicher, Timothy C. Maguire
Recent Cases, Robert L. Teicher, Timothy C. Maguire
Vanderbilt Law Review
In the 1930 decision of State ex rel. LaFollette v. Kohler, the Wisconsin Supreme Court rejected the earliest free speech challenge to a candidate expenditure limitation. The court held that the state's interest in protecting the integrity of its electoral process outweighed the individual's right of communicating with the public without governmental infringement." The court's identification of the communicative effect of campaign spending anticipated the United States Supreme Court's ruling in Stromberg v. California" that communicative conduct was entitled to protection from government infringement. The Court, however, hampered the effectuation of this protection by failing to define conclusively the point …
Book Notes, Law Review Staff
Book Notes, Law Review Staff
Vanderbilt Law Review
Book Notes --
The Strength of Government--By McGeorge Bundy Cambridge:Harvard University Press, 1968. Pp. xii, 107. $3.75.
Towards a Global Federalism-- By William 0. Douglas. New York: New York University Press, 1968. Pp. xi, 177, $7.95.
Democracy, Dissent, and Disorder: The Issues and the Law-- By Robert F. Drinan New York: The Seabury Press, 1969. Pp. 152,$4.95.
The End of Obscenity: The Trials of Lady Chatterly, Tropic of Cancer, and Fanny Hill --By Charles Rembar New York: Random House, Inc., 1968. Pp. xii, 528. $8.95.
Justice on Trial-- By A.L. Todd Chicago: The University of Chicago Press, 1964. Pp. ix, …
The First Amendment And Protection Of Reputation And Privacy--New York Times Co. V. Sullivan And How It Grew, William O. Bertelsman
The First Amendment And Protection Of Reputation And Privacy--New York Times Co. V. Sullivan And How It Grew, William O. Bertelsman
Kentucky Law Journal
No abstract provided.
Freedom Of Silence: Constitutional Protection Against Governmental Intrusions In Political Affairs, Charles B. Nutting
Freedom Of Silence: Constitutional Protection Against Governmental Intrusions In Political Affairs, Charles B. Nutting
Michigan Law Review
Paradoxically enough, the "right" to be silent has been vociferously asserted by some of our most loquacious citizens. The current activities of Congressional investigating committees and the possible enactment of laws regulating participation in certain political affairs make timely a consideration of the basis for the assertion of the "right" and an attempt to determine the extent to which it may be said truly to be protected against intrusions by the state or national governments. It is proposed first to consider the question of secrecy in connection with the elective process itself and later to extend the inquiry into problems …