Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Legal Writing and Research (8)
- Constitutional Law (6)
- Criminal Procedure (5)
- Fourth Amendment (5)
- Labor and Employment Law (4)
-
- International Law (3)
- Internet Law (3)
- Comparative and Foreign Law (2)
- European Law (2)
- Immigration Law (2)
- Legal Studies (2)
- National Security Law (2)
- Social and Behavioral Sciences (2)
- Administrative Law (1)
- Civil Procedure (1)
- Commercial Law (1)
- Communications Law (1)
- Computer Law (1)
- Computer Sciences (1)
- Criminal Law (1)
- Criminology and Criminal Justice (1)
- Databases and Information Systems (1)
- Environmental Law (1)
- Evidence (1)
- Family Law (1)
- First Amendment (1)
- Health Law and Policy (1)
- Human Rights Law (1)
- Keyword
-
- Privacy (10)
- Privacy Rights (8)
- Right to privacy (8)
- Law and Technology (6)
- Criminal Law and Procedure (3)
-
- Employment (3)
- Science and Technology (3)
- Surveillance (3)
- Data (2)
- Data mining (2)
- Employment Practice (2)
- Fourth Amendment (2)
- Privacy Law (2)
- 215 program (1)
- ABA Standards for Criminal Justice: Law Enforcement Access to Third Party Records (1)
- AIDS Virus (1)
- Abortion rights (1)
- Big Data (1)
- Children's rights (1)
- Citizenship (1)
- Commercial speech (1)
- Comparative law (1)
- Comprehensive immigration reform (1)
- Computer Law (1)
- Confidentiality (1)
- Constitution (1)
- Constitutional Law (1)
- Copyright (1)
- Cyber crime (1)
- Cyberspace Law (1)
Articles 1 - 24 of 24
Full-Text Articles in Privacy Law
Your Right To Privacy: A Selective Bibliography, Sandra Klein
Your Right To Privacy: A Selective Bibliography, Sandra Klein
Sandra S. Klein
An awareness of relevant contemporary legal thought in the area of privacy is especially important today in light of what appears to be an increasing hostility to .the notion of individual privacy. The following bibliography considers privacy in terms of concept and application, and should prove useful to scholars, practitioners, and those seeking to gain more knowledge about this very important and complicated area of law.
Abortion/Reproductive Rights, Sandra Klein
Abortion/Reproductive Rights, Sandra Klein
Sandra S. Klein
The issue of a woman's right to choose whether or not to continue with a pregnancy has proven to be complicated for many reasons, not the least of which is the implications for a person's right to do with her body as she sees fit. The bibliography that follows provides the researcher with an in depth look at this issue, with an emphasis on the privacy aspects.
The Right To Die As An Issue Of Privacy: A Selective Bibliography, Sandra Klein
The Right To Die As An Issue Of Privacy: A Selective Bibliography, Sandra Klein
Sandra S. Klein
The issue of whether or not an individual has the right to choose when he or she will die, is a very controversial one for many reasons. Further complicating the issue is the question of who, if anyone, has the right to decide for those who are unable to choose for themselves. The bibliography which follows includes articles which discuss this topic from a right to privacy perspective, and should prove useful to those researchers who are new to the subject, as well as to those who are already familiar with the many complex issues involved.
Your Right To Privacy And Children's Rights/Family Law: A Selective Bibliography, Sandra Klein
Your Right To Privacy And Children's Rights/Family Law: A Selective Bibliography, Sandra Klein
Sandra S. Klein
In a society increasingly aware of real or perceived social inequities, it is not surprising to note a greater concern for the rights of children and their families. It is also apparent that privacy issues are an integral subset of the larger social sphere of interests. Privacy aspects can be seen to be involved pervasively throughout the area of law dealing with children and families, especially in view of the fact that there is obvious potential for conflict not only between families and the state, but between children and the families of which they are a part
Your Right To Privacy And The Aids Virus: A Selective Bibliography, Sandra Klein
Your Right To Privacy And The Aids Virus: A Selective Bibliography, Sandra Klein
Sandra S. Klein
The AIDS (Acquired Immune Deficiency Syndrome) virus has had a profound impact upon the lives of people everywhere. One aspect of this impact can be seen in the invasion into areas that had hitherto been believed by most to be private: sexual activity/preferences, medical records/testing, etc. An intensely personal and private tragedy has become, because of its nature~ a matter of public concern. The bibliography which follows addresses the privacy concerns of those infected with the AIDS virus.
Sexual Freedom And Your Right To Privacy: A Selective Bibliography, Sandra Klein
Sexual Freedom And Your Right To Privacy: A Selective Bibliography, Sandra Klein
Sandra S. Klein
Like so many other privacy issues, concern over sexual freedom took on more than intellectual overtones with the advent of greater public discussion. As courts and government appeared to enter the most private domain of all, the bedroom, the public's interest in privacy issues dealing with sexual freedom increased dramatically. This bibliography should serve as a valuable tool for researchers who have an interest in this highly controversial area of social concern.
Drug Testing/Use, Sandra Klein
Drug Testing/Use, Sandra Klein
Sandra S. Klein
Drug testing is one of the most controversial of recent privacy issues. The bibliography which follows provides the reader with access to a wide range of discussion on this topic which is, or should be, of interest to everyone. Whether in our private lives, or on the job, drug use and drug testing will have an impact on every one of us.
Employee/Employer, Sandra Klein
Employee/Employer, Sandra Klein
Sandra S. Klein
The issue of privacy as it relates to employment in general is one of great concern, both to employers and employees. Both groups are faced with increasing threats to their individual or corporate privacy. Given that such threats carry personal, economic and social consequences, it is not surprising that many people are concerned. The bibliography which follows provides the reader with many sources which should prove useful to those well-versed in the subject, as well as to those who are looking at this issue for the first time.
Ruling Shows Europe Still Vexed Over Nsa Spying Leaving Us Companies In Legal Limbo, Caren Morrison
Ruling Shows Europe Still Vexed Over Nsa Spying Leaving Us Companies In Legal Limbo, Caren Morrison
Caren Myers Morrison
No abstract provided.
The Greening Of Canadian Cyber Laws: What Environmental Law Can Teach And Cyber Law Can Learn, Sara Smyth
The Greening Of Canadian Cyber Laws: What Environmental Law Can Teach And Cyber Law Can Learn, Sara Smyth
Sara Smyth
This article examines whether Canadian environmental law and policy could serve as a model for cyber crime regulation. A wide variety of offences are now committed through digital technologies, including thievery, identity theft, fraud, the misdirection of communications, intellectual property theft, espionage, system disruption, the destruction of data, money laundering, hacktivism, and terrorism, among others. The focus of this Article is on the problem of data security breaches, which target businesses and consumers. Following the Introduction, Part I provides an overview of the parallels that can be drawn between threats in the natural environment and on the Internet. Both disciplines …
Welcome To The Machine: Privacy And Workplace Implications Of Predictive Analytics, Robert Sprague
Welcome To The Machine: Privacy And Workplace Implications Of Predictive Analytics, Robert Sprague
Robert Sprague
Immigration Surveillance, Anil Kalhan
Immigration Surveillance, Anil Kalhan
Anil Kalhan
In recent years, immigration enforcement levels have soared, yielding a widely noted increase in the number of noncitizens removed from the United States. Less visible, however, has been an attendant sea change in the underlying nature of immigration governance itself, hastened by new surveillance and dataveillance technologies. Like many other areas of contemporary governance, immigration control has rapidly become an information-centered and technology-driven enterprise. At virtually every stage of the process of migrating or traveling to, from, and within the United States, both noncitizens and U.S. citizens are now subject to collection and analysis of extensive quantities of personal information …
Privacy, Copyright, And Letters, Jeffrey Harrison
Privacy, Copyright, And Letters, Jeffrey Harrison
Jeffrey L Harrison
The focus of this Essay is the privacy of letters – the written manifestations of thoughts, intents, and the recollections of facts directed to a person or a narrowly defined audience. The importance of this privacy is captured in the novel Atonement by Ian McEwan and in the film based on the novel. The fulcrum from which the action springs is a letter that is read by someone to whom it was not addressed. The result is literally life-changing, even disastrous for a number of characters. One person dies, two people seemingly meant for each other are torn apart and …
Hate Crimes In Cyberspace, Danielle Citron
Hate Crimes In Cyberspace, Danielle Citron
Danielle Keats Citron
Most Internet users are familiar with trolling—aggressive, foul-mouthed posts designed to elicit angry responses in a site’s comments. Less familiar but far more serious is the way some use networked technologies to target real people, subjecting them, by name and address, to vicious, often terrifying, online abuse. In an in-depth investigation of a problem that is too often trivialized by lawmakers and the media, Danielle Keats Citron exposes the startling extent of personal cyber-attacks and proposes practical, lawful ways to prevent and punish online harassment. A refutation of those who claim that these attacks are legal, or at least impossible …
Light In The Darkness: How Leatpr Standards Guide Legislators In Regulating Law Enforcement Access To Cell Site Location Records, Susan Freiwald
Light In The Darkness: How Leatpr Standards Guide Legislators In Regulating Law Enforcement Access To Cell Site Location Records, Susan Freiwald
Susan Freiwald
This article measures the new ABA Standards for Criminal Justice: Law Enforcement Access to Third Party Records (LEATPR Standards) success by assessing the guidance they provide legislators interested in updating pertinent law regarding one specific type of data. Scholars should not expect the Standards to yield the same conclusions they would have furnished had they been able to draft a set of standards by themselves. The Standards emerged after years of painstaking consensus building and compromise no individual committee member got entirely what he wanted. Nonetheless, not every product of a committee turns out to have been worth the effort, …
Nothing To Fear Or Nowhere To Hide: Competing Visions Of The Nsa's 215 Program, Susan Freiwald
Nothing To Fear Or Nowhere To Hide: Competing Visions Of The Nsa's 215 Program, Susan Freiwald
Susan Freiwald
Despite Intelligence Community leaders’ assurances, the detailed knowledge of the NSA metadata program (the 215 program) that flowed from the Snowden revelations did not assuage concerns about the program. Three groups, the American Civil Liberties Union, the Electronic Frontier Foundation, and the Electronic Privacy Information Center, brought immediate legal challenges with mixed results in the lower courts. The conflict, in the courts, Congress, and the press, has revealed that the proponents and opponents of Section 215 view the program in diametrically opposed ways. Program proponents see a vital intelligence program operating within legal limits, which has suffered a few compliance …
Defining ‘Personal Data’ In The European Union And U.S., Paul Schwartz
Defining ‘Personal Data’ In The European Union And U.S., Paul Schwartz
Paul M. Schwartz
No abstract provided.
Immigration Policing And Federalism Through The Lens Of Technology, Surveillance, And Privacy, Anil Kalhan
Immigration Policing And Federalism Through The Lens Of Technology, Surveillance, And Privacy, Anil Kalhan
Anil Kalhan
With the deployment of technology, federal programs to enlist state and local police assistance with immigration enforcement are undergoing a sea change. For example, even as it forcefully has urged invalidation of Arizona’s S.B. 1070 and similar state laws, the Obama administration has presided over the largest expansion of state and local immigration policing in U.S. history with its implementation of the “Secure Communities” program, which integrates immigration and criminal history database systems in order to automatically ascertain the immigration status of every individual who is arrested and booked by state and local police nationwide. By 2012, over one fifth …
William H. Sorrell, Attorney General Of Vermont, Et Al. V. Ims Health Inc., Et Al. - Amicus Brief In Support Of Petitioners, Kevin Outterson, David Orentlicher, Christopher Robertson, Frank Pasquale
William H. Sorrell, Attorney General Of Vermont, Et Al. V. Ims Health Inc., Et Al. - Amicus Brief In Support Of Petitioners, Kevin Outterson, David Orentlicher, Christopher Robertson, Frank Pasquale
Frank A. Pasquale
On April 26, 2011, the US Supreme Court will hear oral arguments in the Vermont data mining case, Sorrell v. IMS Health Inc. Respondents claim this is the most important commercial speech case in a decade. Petitioner (the State of Vermont) argues this is the most important medical privacy case since Whalen v. Roe. The is an amicus brief supporting Vermont, written by law professors and submitted on behalf of the New England Journal of Medicine
Addressing The Harm Of Total Surveillance: A Reply To Professor Neil Richards, Danielle Citron, David Gray
Addressing The Harm Of Total Surveillance: A Reply To Professor Neil Richards, Danielle Citron, David Gray
David C. Gray
In his insightful article The Dangers of Surveillance, 126 HARV. L. REV. 1934 (2013), Neil Richards offers a framework for evaluating the implications of government surveillance programs that is centered on protecting "intellectual privacy." Although we share his interest in recognizing and protecting privacy as a condition of personal and intellectual development, we worry in this essay that, as an organizing principle for policy, "intellectual privacy" is too narrow and politically fraught. Drawing on other work, we therefore recommend that judges, legislators, and executives focus instead on limiting the potential of surveillance technologies to effect programs of broad and indiscriminate …
The Davis Good Faith Rule And Getting Answers To The Questions Jones Left Open, Susan Freiwald
The Davis Good Faith Rule And Getting Answers To The Questions Jones Left Open, Susan Freiwald
Susan Freiwald
The Supreme Court’s decision in United States v. Jones clearly established that use of GPS tracking surveillance constitutes a search under the Fourth Amendment. But the Court left many other questions unanswered about the nature and scope of the constitutional privacy right in location data. A review of lower court decisions in the wake of Jones reveals that, rather than begin to answer the questions that Jones left open, courts are largely avoiding substantive Fourth Amendment analysis of location data privacy. Instead, they are finding that officers who engaged in GPS tracking and related surveillance operated in good faith, based …
Workplace Data: Law & Litigation (With 2014 Supplement), Robert Sprague
Workplace Data: Law & Litigation (With 2014 Supplement), Robert Sprague
Robert Sprague
Workplace Data: Law and Litigation provides an overview of legal issues associated with employment-related electronically stored information (ESI), focusing on discovery issues in particular. Written for employment and labor law practitioners, this new treatise offers a comprehensive overview of today’s discovery challenges, a detailed statute-by-statute analysis of data retention requirements in federal workplace-related laws, a summary of emerging workplace social media and other technology-related issues and a guide to data protection privacy laws in North America, Europe, Asia and Oceania.
Giving Credit Where Credit Is Due: A Comment On The Theoretical Foundation And Historical Origin Of The Tort Remedy For Invasion Of Privacy, Alberto Bernabe
Giving Credit Where Credit Is Due: A Comment On The Theoretical Foundation And Historical Origin Of The Tort Remedy For Invasion Of Privacy, Alberto Bernabe
Alberto Bernabe
Intrusive Monitoring: Employee Privacy Expectations Are Reasonable In Europe, Destroyed In The United States, Lothar Determann, Robert Sprague
Intrusive Monitoring: Employee Privacy Expectations Are Reasonable In Europe, Destroyed In The United States, Lothar Determann, Robert Sprague
Robert Sprague
This Article examines the contrasting policy and legal frameworks relating to data privacy in the United States and the European Union, with a particular focus on workplace privacy and intrusive surveillance technologies and practices. It examines the U.S. perspective on modern work-related employer monitoring practices, the laws giving rise to possible employee privacy rights, and specific types of employer monitoring that may lead to actionable invasions of employee privacy rights. This article then addresses the issue of employee privacy from the EU perspective, beginning with an overview of the formation of authority to protect individual privacy rights, followed by an …