Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

External Link

Discipline
Keyword
Publication Year
Publication

Articles 1 - 24 of 24

Full-Text Articles in Privacy Law

Your Right To Privacy: A Selective Bibliography, Sandra Klein Dec 2015

Your Right To Privacy: A Selective Bibliography, Sandra Klein

Sandra S. Klein

An awareness of relevant contemporary legal thought in the area of privacy is especially important today in light of what appears to be an increasing hostility to .the notion of individual privacy. The following bibliography considers privacy in terms of concept and application, and should prove useful to scholars, practitioners, and those seeking to gain more knowledge about this very important and complicated area of law.


Abortion/Reproductive Rights, Sandra Klein Dec 2015

Abortion/Reproductive Rights, Sandra Klein

Sandra S. Klein

The issue of a woman's right to choose whether or not to continue with a pregnancy has proven to be complicated for many reasons, not the least of which is the implications for a person's right to do with her body as she sees fit. The bibliography that follows provides the researcher with an in depth look at this issue, with an emphasis on the privacy aspects.


The Right To Die As An Issue Of Privacy: A Selective Bibliography, Sandra Klein Dec 2015

The Right To Die As An Issue Of Privacy: A Selective Bibliography, Sandra Klein

Sandra S. Klein

The issue of whether or not an individual has the right to choose when he or she will die, is a very controversial one for many reasons. Further complicating the issue is the question of who, if anyone, has the right to decide for those who are unable to choose for themselves. The bibliography which follows includes articles which discuss this topic from a right to privacy perspective, and should prove useful to those researchers who are new to the subject, as well as to those who are already familiar with the many complex issues involved.


Your Right To Privacy And Children's Rights/Family Law: A Selective Bibliography, Sandra Klein Dec 2015

Your Right To Privacy And Children's Rights/Family Law: A Selective Bibliography, Sandra Klein

Sandra S. Klein

In a society increasingly aware of real or perceived social inequities, it is not surprising to note a greater concern for the rights of children and their families. It is also apparent that privacy issues are an integral subset of the larger social sphere of interests. Privacy aspects can be seen to be involved pervasively throughout the area of law dealing with children and families, especially in view of the fact that there is obvious potential for conflict not only between families and the state, but between children and the families of which they are a part


Your Right To Privacy And The Aids Virus: A Selective Bibliography, Sandra Klein Dec 2015

Your Right To Privacy And The Aids Virus: A Selective Bibliography, Sandra Klein

Sandra S. Klein

The AIDS (Acquired Immune Deficiency Syndrome) virus has had a profound impact upon the lives of people everywhere. One aspect of this impact can be seen in the invasion into areas that had hitherto been believed by most to be private: sexual activity/preferences, medical records/testing, etc. An intensely personal and private tragedy has become, because of its nature~ a matter of public concern. The bibliography which follows addresses the privacy concerns of those infected with the AIDS virus.


Sexual Freedom And Your Right To Privacy: A Selective Bibliography, Sandra Klein Dec 2015

Sexual Freedom And Your Right To Privacy: A Selective Bibliography, Sandra Klein

Sandra S. Klein

Like so many other privacy issues, concern over sexual freedom took on more than intellectual overtones with the advent of greater public discussion. As courts and government appeared to enter the most private domain of all, the bedroom, the public's interest in privacy issues dealing with sexual freedom increased dramatically. This bibliography should serve as a valuable tool for researchers who have an interest in this highly controversial area of social concern.


Drug Testing/Use, Sandra Klein Dec 2015

Drug Testing/Use, Sandra Klein

Sandra S. Klein

Drug testing is one of the most controversial of recent privacy issues. The bibliography which follows provides the reader with access to a wide range of discussion on this topic which is, or should be, of interest to everyone. Whether in our private lives, or on the job, drug use and drug testing will have an impact on every one of us.


Employee/Employer, Sandra Klein Dec 2015

Employee/Employer, Sandra Klein

Sandra S. Klein

The issue of privacy as it relates to employment in general is one of great concern, both to employers and employees. Both groups are faced with increasing threats to their individual or corporate privacy. Given that such threats carry personal, economic and social consequences, it is not surprising that many people are concerned. The bibliography which follows provides the reader with many sources which should prove useful to those well-versed in the subject, as well as to those who are looking at this issue for the first time.


Ruling Shows Europe Still Vexed Over Nsa Spying Leaving Us Companies In Legal Limbo, Caren Morrison Dec 2015

Ruling Shows Europe Still Vexed Over Nsa Spying Leaving Us Companies In Legal Limbo, Caren Morrison

Caren Myers Morrison

No abstract provided.


The Greening Of Canadian Cyber Laws: What Environmental Law Can Teach And Cyber Law Can Learn, Sara Smyth Aug 2015

The Greening Of Canadian Cyber Laws: What Environmental Law Can Teach And Cyber Law Can Learn, Sara Smyth

Sara Smyth

This article examines whether Canadian environmental law and policy could serve as a model for cyber crime regulation. A wide variety of offences are now committed through digital technologies, including thievery, identity theft, fraud, the misdirection of communications, intellectual property theft, espionage, system disruption, the destruction of data, money laundering, hacktivism, and terrorism, among others. The focus of this Article is on the problem of data security breaches, which target businesses and consumers. Following the Introduction, Part I provides an overview of the parallels that can be drawn between threats in the natural environment and on the Internet. Both disciplines …


Welcome To The Machine: Privacy And Workplace Implications Of Predictive Analytics, Robert Sprague Apr 2015

Welcome To The Machine: Privacy And Workplace Implications Of Predictive Analytics, Robert Sprague

Robert Sprague

Predictive analytics use a method known as data mining to identify trends, patterns, or relationships among data, which can then be used to develop a predictive model. Data mining itself relies upon big data, which is “big” not solely because of its size but also because its analytical potential is qualitatively different. “Big data” analysis allows organizations, including government and businesses, to combine diverse digital datasets and then use statistics and other data mining techniques to extract from them both hidden information and surprising correlations. These data are not necessarily tracking transactional records of atomized behavior, such as the purchasing …


Immigration Surveillance, Anil Kalhan Nov 2014

Immigration Surveillance, Anil Kalhan

Anil Kalhan

In recent years, immigration enforcement levels have soared, yielding a widely noted increase in the number of noncitizens removed from the United States. Less visible, however, has been an attendant sea change in the underlying nature of immigration governance itself, hastened by new surveillance and dataveillance technologies. Like many other areas of contemporary governance, immigration control has rapidly become an information-centered and technology-driven enterprise. At virtually every stage of the process of migrating or traveling to, from, and within the United States, both noncitizens and U.S. citizens are now subject to collection and analysis of extensive quantities of personal information …


Privacy, Copyright, And Letters, Jeffrey Harrison Nov 2014

Privacy, Copyright, And Letters, Jeffrey Harrison

Jeffrey L Harrison

The focus of this Essay is the privacy of letters – the written manifestations of thoughts, intents, and the recollections of facts directed to a person or a narrowly defined audience. The importance of this privacy is captured in the novel Atonement by Ian McEwan and in the film based on the novel. The fulcrum from which the action springs is a letter that is read by someone to whom it was not addressed. The result is literally life-changing, even disastrous for a number of characters. One person dies, two people seemingly meant for each other are torn apart and …


Hate Crimes In Cyberspace, Danielle Citron Jul 2014

Hate Crimes In Cyberspace, Danielle Citron

Danielle Keats Citron

Most Internet users are familiar with trolling—aggressive, foul-mouthed posts designed to elicit angry responses in a site’s comments. Less familiar but far more serious is the way some use networked technologies to target real people, subjecting them, by name and address, to vicious, often terrifying, online abuse. In an in-depth investigation of a problem that is too often trivialized by lawmakers and the media, Danielle Keats Citron exposes the startling extent of personal cyber-attacks and proposes practical, lawful ways to prevent and punish online harassment. A refutation of those who claim that these attacks are legal, or at least impossible …


Light In The Darkness: How Leatpr Standards Guide Legislators In Regulating Law Enforcement Access To Cell Site Location Records, Susan Freiwald Jun 2014

Light In The Darkness: How Leatpr Standards Guide Legislators In Regulating Law Enforcement Access To Cell Site Location Records, Susan Freiwald

Susan Freiwald

This article measures the new ABA Standards for Criminal Justice: Law Enforcement Access to Third Party Records (LEATPR Standards) success by assessing the guidance they provide legislators interested in updating pertinent law regarding one specific type of data. Scholars should not expect the Standards to yield the same conclusions they would have furnished had they been able to draft a set of standards by themselves. The Standards emerged after years of painstaking consensus building and compromise no individual committee member got entirely what he wanted. Nonetheless, not every product of a committee turns out to have been worth the effort, …


Nothing To Fear Or Nowhere To Hide: Competing Visions Of The Nsa's 215 Program, Susan Freiwald Dec 2013

Nothing To Fear Or Nowhere To Hide: Competing Visions Of The Nsa's 215 Program, Susan Freiwald

Susan Freiwald

Despite Intelligence Community leaders’ assurances, the detailed knowledge of the NSA metadata program (the 215 program) that flowed from the Snowden revelations did not assuage concerns about the program. Three groups, the American Civil Liberties Union, the Electronic Frontier Foundation, and the Electronic Privacy Information Center, brought immediate legal challenges with mixed results in the lower courts. The conflict, in the courts, Congress, and the press, has revealed that the proponents and opponents of Section 215 view the program in diametrically opposed ways. Program proponents see a vital intelligence program operating within legal limits, which has suffered a few compliance …


Defining ‘Personal Data’ In The European Union And U.S., Paul Schwartz Dec 2013

Defining ‘Personal Data’ In The European Union And U.S., Paul Schwartz

Paul M. Schwartz

No abstract provided.


Immigration Policing And Federalism Through The Lens Of Technology, Surveillance, And Privacy, Anil Kalhan Nov 2013

Immigration Policing And Federalism Through The Lens Of Technology, Surveillance, And Privacy, Anil Kalhan

Anil Kalhan

With the deployment of technology, federal programs to enlist state and local police assistance with immigration enforcement are undergoing a sea change. For example, even as it forcefully has urged invalidation of Arizona’s S.B. 1070 and similar state laws, the Obama administration has presided over the largest expansion of state and local immigration policing in U.S. history with its implementation of the “Secure Communities” program, which integrates immigration and criminal history database systems in order to automatically ascertain the immigration status of every individual who is arrested and booked by state and local police nationwide. By 2012, over one fifth …


William H. Sorrell, Attorney General Of Vermont, Et Al. V. Ims Health Inc., Et Al. - Amicus Brief In Support Of Petitioners, Kevin Outterson, David Orentlicher, Christopher Robertson, Frank Pasquale Aug 2013

William H. Sorrell, Attorney General Of Vermont, Et Al. V. Ims Health Inc., Et Al. - Amicus Brief In Support Of Petitioners, Kevin Outterson, David Orentlicher, Christopher Robertson, Frank Pasquale

Frank A. Pasquale

On April 26, 2011, the US Supreme Court will hear oral arguments in the Vermont data mining case, Sorrell v. IMS Health Inc. Respondents claim this is the most important commercial speech case in a decade. Petitioner (the State of Vermont) argues this is the most important medical privacy case since Whalen v. Roe. The is an amicus brief supporting Vermont, written by law professors and submitted on behalf of the New England Journal of Medicine


Addressing The Harm Of Total Surveillance: A Reply To Professor Neil Richards, Danielle Citron, David Gray Jun 2013

Addressing The Harm Of Total Surveillance: A Reply To Professor Neil Richards, Danielle Citron, David Gray

David C. Gray

In his insightful article The Dangers of Surveillance, 126 HARV. L. REV. 1934 (2013), Neil Richards offers a framework for evaluating the implications of government surveillance programs that is centered on protecting "intellectual privacy." Although we share his interest in recognizing and protecting privacy as a condition of personal and intellectual development, we worry in this essay that, as an organizing principle for policy, "intellectual privacy" is too narrow and politically fraught. Drawing on other work, we therefore recommend that judges, legislators, and executives focus instead on limiting the potential of surveillance technologies to effect programs of broad and indiscriminate …


The Davis Good Faith Rule And Getting Answers To The Questions Jones Left Open, Susan Freiwald Dec 2012

The Davis Good Faith Rule And Getting Answers To The Questions Jones Left Open, Susan Freiwald

Susan Freiwald

The Supreme Court’s decision in United States v. Jones clearly established that use of GPS tracking surveillance constitutes a search under the Fourth Amendment. But the Court left many other questions unanswered about the nature and scope of the constitutional privacy right in location data. A review of lower court decisions in the wake of Jones reveals that, rather than begin to answer the questions that Jones left open, courts are largely avoiding substantive Fourth Amendment analysis of location data privacy. Instead, they are finding that officers who engaged in GPS tracking and related surveillance operated in good faith, based …


Workplace Data: Law & Litigation (With 2014 Supplement), Robert Sprague Dec 2012

Workplace Data: Law & Litigation (With 2014 Supplement), Robert Sprague

Robert Sprague

Workplace Data: Law and Litigation provides an overview of legal issues associated with employment-related electronically stored information (ESI), focusing on discovery issues in particular. Written for employment and labor law practitioners, this new treatise offers a comprehensive overview of today’s discovery challenges, a detailed statute-by-statute analysis of data retention requirements in federal workplace-related laws, a summary of emerging workplace social media and other technology-related issues and a guide to data protection privacy laws in North America, Europe, Asia and Oceania.


Giving Credit Where Credit Is Due: A Comment On The Theoretical Foundation And Historical Origin Of The Tort Remedy For Invasion Of Privacy, Alberto Bernabe Dec 2011

Giving Credit Where Credit Is Due: A Comment On The Theoretical Foundation And Historical Origin Of The Tort Remedy For Invasion Of Privacy, Alberto Bernabe

Alberto Bernabe

This article discusses the origin of the cause of action for damages for invasion to privacy


Intrusive Monitoring: Employee Privacy Expectations Are Reasonable In Europe, Destroyed In The United States, Lothar Determann, Robert Sprague Dec 2010

Intrusive Monitoring: Employee Privacy Expectations Are Reasonable In Europe, Destroyed In The United States, Lothar Determann, Robert Sprague

Robert Sprague

This Article examines the contrasting policy and legal frameworks relating to data privacy in the United States and the European Union, with a particular focus on workplace privacy and intrusive surveillance technologies and practices. It examines the U.S. perspective on modern work-related employer monitoring practices, the laws giving rise to possible employee privacy rights, and specific types of employer monitoring that may lead to actionable invasions of employee privacy rights. This article then addresses the issue of employee privacy from the EU perspective, beginning with an overview of the formation of authority to protect individual privacy rights, followed by an …