Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

University of Richmond

Journal

Discipline
Keyword
Publication Year
Publication

Articles 1 - 30 of 49

Full-Text Articles in Privacy Law

Disinformation And The Defamation Renaissance: A Misleading Promise Of “Truth”, Lili Levi Jun 2023

Disinformation And The Defamation Renaissance: A Misleading Promise Of “Truth”, Lili Levi

University of Richmond Law Review

Today, defamation litigation is experiencing a renaissance, with progressives and conservatives, public officials and celebrities, corporations and high school students all heading to the courthouse to use libel lawsuits as a social and political fix. Many of these suits reflect a powerful new rhetoric—reframing the goal of defamation law as fighting disinformation. Appeals to the need to combat falsity in public discourse have fueled efforts to reverse the Supreme Court’s press–protective constitutional limits on defamation law under the New York Times v. Sullivan framework. The anti–disinformation frame could tip the scales and generate a majority on the Court to dismantle …


Drones And Data: A Limited Impact On Privacy, David Sella-Villa May 2021

Drones And Data: A Limited Impact On Privacy, David Sella-Villa

University of Richmond Law Review

Concerns about drones and their impact on privacy are misplaced. Most of the scenarios discussed in the academic literature and policy commentary simply assume that drones operate in a unique way. These discussions of drones and privacy have left the antecedent question unexamined—precisely how do drones impact privacy? This Article is the first to clearly define the operational parameters of drones that impact privacy in a unique way. From this precise definition, we learn that drones operate in very few spaces that allow them to capture data inaccessible to other technologies. In short, how drones operate has a limited impact …


Katz V. United States: Back To The Future?, Michael Vitiello Jan 2018

Katz V. United States: Back To The Future?, Michael Vitiello

University of Richmond Law Review

No abstract provided.


Enhancing Cybersecurity In The Private Sector By Means Of Civil Liability Lawsuits - The Connie Francis Effect, Jeffrey F. Addicott Mar 2017

Enhancing Cybersecurity In The Private Sector By Means Of Civil Liability Lawsuits - The Connie Francis Effect, Jeffrey F. Addicott

University of Richmond Law Review

The purpose of this article is to explore the threats posed by

cybersecurity breaches, outline the steps taken by the government

to address those threats in the private sector economy, and

call attention to the ultimate solution, which will most certainly

spur private businesses to create a more secure cyber environment

for the American people-a Connie Francis-styled cyber civil

action lawsuit.


"I Want My File": Surveillance Data, Minimization, And Historical Accountability, Douglas Cox Mar 2017

"I Want My File": Surveillance Data, Minimization, And Historical Accountability, Douglas Cox

University of Richmond Law Review

No abstract provided.


Protecting The Digital Afterlife: Virginia's Privacy Expectation Afterlife And Choices Act, The Honorable Mark Obesnshain, The Honorable Jay Leftwich Jan 2015

Protecting The Digital Afterlife: Virginia's Privacy Expectation Afterlife And Choices Act, The Honorable Mark Obesnshain, The Honorable Jay Leftwich

Richmond Journal of Law and the Public Interest

This article examines Virginia’s Privacy Expectation Afterlife and Choices Act. Part I surveys federal legislation and proposed uniform legislation that attempts to protect digital assets and records. Part II examines opposition to proposed legislation and another proposed law: the Privacy Expectation Afterlife and Choices Act. Part III details Virginia’s final version of the Privacy Expectation Afterlife and Choices Act. Part V concludes the Article.


The Internet Of Things And Wearable Technology: Addressing Privacy And Security Concerns Without Derailing Innovation, Adam D. Thierer Jan 2015

The Internet Of Things And Wearable Technology: Addressing Privacy And Security Concerns Without Derailing Innovation, Adam D. Thierer

Richmond Journal of Law & Technology

The next great wave of Internet-enabled innovation has arrived, and it is poised to revolutionize the way humans interact with the world around them. This paper highlights some of the opportunities presented by the rise of the so-called Internet of Things (IoT) in general and wearable technology in particular and encourages policymakers to allow these technologies to develop in a relatively unabated fashion.


Welcome To The Machine: Privacy And Workplace Implications Of Predictive Analytics, Robert Sprague Jan 2015

Welcome To The Machine: Privacy And Workplace Implications Of Predictive Analytics, Robert Sprague

Richmond Journal of Law & Technology

Privacy is not simply an absence of information about us in the minds of others; rather it is the control we have over information about ourselves. The volume of information that people create themselves—the full range of communications from voice calls, e-mails and texts to uploaded pictures, video, and music—pales in comparison to the amount of digital information created about them each day.


Commercial Drones And Privacy: Can We Trust States With ‘Drone Federalism’?, Robert H. Gruber Jan 2015

Commercial Drones And Privacy: Can We Trust States With ‘Drone Federalism’?, Robert H. Gruber

Richmond Journal of Law & Technology

Judge Andrew Napolitano said recently of unmanned aircraft systems (“UAS”), or “drones,” that “[t]he first American patriot that shoots down one of these drones that comes too close to his children in his backyard will be an American hero.”


Wherever You Go, There You Are (With Your Mobile Device): Privacy Risks And Legal Complexities Associated With International ‘Bring Your Own Device’ Programs, Melinda L. Mclellan, James A. Sherer, Emily R. Fedeles Jan 2015

Wherever You Go, There You Are (With Your Mobile Device): Privacy Risks And Legal Complexities Associated With International ‘Bring Your Own Device’ Programs, Melinda L. Mclellan, James A. Sherer, Emily R. Fedeles

Richmond Journal of Law & Technology

The cross-use of mobile devices for personal and professional purposes—commonly referred to as “Bring Your Own Device” or “BYOD” for short—has created a new backdrop for doing business that was scarcely imaginable even ten years ago.


Dna Without Warrant: Decoding Privacy, Probable Cause And Personhood, Ken Strutin Jan 2015

Dna Without Warrant: Decoding Privacy, Probable Cause And Personhood, Ken Strutin

Richmond Journal of Law and the Public Interest

In Part I, this article explores the challenges to privacy, personhood and probable cause raised by DNA collection as identification sanctioned in Maryland v. King. Part II considers the presumed infallibility of DNA testing that undergirds the Supreme Court's embracement of genetic identification. Lastly, in Part III, this article will try to decipher the Court's Fourth Amendment logic in denying privacy to the information in human cells but embracing them in cell phones in Riley v. California


Merger And Acquisition Due Diligence: A Proposed Framework To Incorporate Data Privacy, Information Security, E-Discovery, And Information Governance Into Due Diligence Practices, James A. Sherer, Taylor M. Hoffman, Eugenio E. Ortiz Jan 2015

Merger And Acquisition Due Diligence: A Proposed Framework To Incorporate Data Privacy, Information Security, E-Discovery, And Information Governance Into Due Diligence Practices, James A. Sherer, Taylor M. Hoffman, Eugenio E. Ortiz

Richmond Journal of Law & Technology

Merger and Acquisition or “M&A” deals are both figuratively and literally big business, where the stakes for the organization are often the highest. While casual observers might expect that the importance attached to these deals makes each new deal the vanguard for incorporating metrics and practices regarding every efficiency and contingency, existing research demonstrates that this is decidedly not the case.


Dna Without Warrant: Decoding Privacy, Probable Cause And Personhood, Ken Strutin Jan 2015

Dna Without Warrant: Decoding Privacy, Probable Cause And Personhood, Ken Strutin

Richmond Public Interest Law Review

In Part I, this article explores the challenges to privacy, personhood and probable cause raised by DNA collection as identification sanctioned in Maryland v. King. Part II considers the presumed infallibility of DNA testing that undergirds the Supreme Court's embracement of genetic identification. Lastly, in Part III, this article will try to decipher the Court's Fourth Amendment logic in denying privacy to the information in human cells but embracing them in cell phones in Riley v. California


Protecting The Digital Afterlife: Virginia's Privacy Expectation Afterlife And Choices Act, Mark Obesnshain Jan 2015

Protecting The Digital Afterlife: Virginia's Privacy Expectation Afterlife And Choices Act, Mark Obesnshain

Richmond Public Interest Law Review

This article examines Virginia’s Privacy Expectation Afterlife and Choices Act. Part I surveys federal legislation and proposed uniform legislation that attempts to protect digital assets and records. Part II examines opposition to proposed legislation and another proposed law: the Privacy Expectation Afterlife and Choices Act. Part III details Virginia’s final version of the Privacy Expectation Afterlife and Choices Act. Part V concludes the Article.


Riley V. California: The New Katz Or Chimel?, Adam Lamparello, Charles Maclean Jan 2014

Riley V. California: The New Katz Or Chimel?, Adam Lamparello, Charles Maclean

Richmond Journal of Law & Technology

To declare that in the administration of the criminal law the end justifies the means—to declare that the Government may commit crimes in order to secure the conviction of a private criminal—would bring terrible retribution. Against that pernicious doctrine this Court should resolutely set its face.


Clapper V. Amnesty International And Data Privacy Litigation: Is A Change To The Law “Certainly Impending”?, John L. Jacobus, Benjamin B. Watson Jan 2014

Clapper V. Amnesty International And Data Privacy Litigation: Is A Change To The Law “Certainly Impending”?, John L. Jacobus, Benjamin B. Watson

Richmond Journal of Law & Technology

On December 19, 2013, the retailer Target announced that unauthorized third parties had gained access to its customer payment information. While Target originally estimated that the security breach affected 40 million of its customers, a subsequent investigation revealed that anywhere from 70 to 110 million people—almost one in three Americans—may have had their sensitive payment information stolen. In response, the retailer offered free credit monitoring services and assured affected customers that they would not be responsible for fraudulent charges made with their payment information.


Protecting The Ivory Tower: Sensible Security Or Invasion Of Privacy, Stephen D. Lichtenstein Jan 2011

Protecting The Ivory Tower: Sensible Security Or Invasion Of Privacy, Stephen D. Lichtenstein

Richmond Journal of Law and the Public Interest

Our beginning point is a recognition that the modern American college is not an insurer of the safety of its students. Whatever may have been its responsibility in an earlier era, the authoritarian role of today's college administrations has been notably diluted in recent decades. Trustees, administrators, and faculties have been required to yield to the expanding rights and privileges of their students. By constitutional amendment, written and unwritten law, and through the evolution of new customs, rights formerly possessed by college administrations have been transferred to students. College students today are no longer ninors; they are now regarded as …


Current And Emerging Transportation Technology: Final Nails In The Coffin Of The Dying Right Of Privacy?, James D. Phillips, Katharine E. Kohm Jan 2011

Current And Emerging Transportation Technology: Final Nails In The Coffin Of The Dying Right Of Privacy?, James D. Phillips, Katharine E. Kohm

Richmond Journal of Law & Technology

Transportation networks constitute “the circulatory system of our economy.” The distinct modes that constitute the American transportation system—air, rail, transit, highways, and waterways—impact the entire range of our daily activities. Just as the human body depends on its circulatory system for life and well being, the United States’ vitality would grind to a halting stop without a vibrant transportation system.


Do Not Track: Revising The Eu’S Data Protection Framework To Require Meaningful Consent For Behavioral Advertising, Matthew S. Kirsch Jan 2011

Do Not Track: Revising The Eu’S Data Protection Framework To Require Meaningful Consent For Behavioral Advertising, Matthew S. Kirsch

Richmond Journal of Law & Technology

The advertisements you see while browsing the Internet are rarely accidental. For instance, Alliance Data, one of many new companies in the booming data-marketing industry, can instantaneously recognize that a user visiting their client’s website is Joel Stein, a thirty-nine year-old, college educated male, who makes over $125,000 a year. Alliance Data also knows that Joel is likely to make purchases online, but only spends about $25 dollars a purchase. Using this information, and the specifics of over 100 of Joel’s past online purchases, Alliance Data creates advertisements specifically tailored to Joel and displays them as he continues to browse …


Re-Mapping Privacy Law: How The Google Maps Scandal Requires Tort Law Reform, Lindsey A. Strachan Jan 2011

Re-Mapping Privacy Law: How The Google Maps Scandal Requires Tort Law Reform, Lindsey A. Strachan

Richmond Journal of Law & Technology

In the Internet savvy and technology dependent world of today, it is difficult to imagine life without Google Maps. The pioneer web- mapping platform provides users with a number of free services, ranging from simple directions to high-resolution imagery of terrain. The service has revolutionized travel, providing guidance and resources to more than just the directionally challenged. Contributing to this notoriety was Google’s addition of “Street View” to the array of mapping functions in May of 2007. As its name implies, the Street View function allows users to view enhanced, 360-degree snapshots of homes, streets and other public property. According …


Protecting The Ivory Tower: Sensible Security Or Invasion Of Privacy, Stephen D. Lichtenstein Jan 2011

Protecting The Ivory Tower: Sensible Security Or Invasion Of Privacy, Stephen D. Lichtenstein

Richmond Public Interest Law Review

Our beginning point is a recognition that the modern American college is not an insurer of the safety of its students. Whatever may have been its responsibility in an earlier era, the authoritarian role of today's college administrations has been notably diluted in recent decades. Trustees, administrators, and faculties have been required to yield to the expanding rights and privileges of their students. By constitutional amendment, written and unwritten law, and through the evolution of new customs, rights formerly possessed by college administrations have been transferred to students. College students today are no longer ninors; they are now regarded as …


Changing Tides: A Lesser Expectation Of Privacy In A Post 9/11 World, Derek M. Alphran Jan 2009

Changing Tides: A Lesser Expectation Of Privacy In A Post 9/11 World, Derek M. Alphran

Richmond Journal of Law and the Public Interest

In sum, the Court has in recent years balanced the degree of government intrusion of the individual or place searched against the government's need for the search. This article addresses some of the questions posed by the evolution of the Fourth Amendment doctrine in light of terrorist concerns since 9/11. Part II will address the history of Fourth Amendment jurisprudence, from the Boyd Era of property protection and the use of general warrants to discover evidence of crime, to Olmstead and the development of the right of privacy under the Fourth Amendment. Part III will address the modern test under …


Entry And Service Of Protective Orders In Virginia: Are You Really Protected, Susheela Varky Jan 2009

Entry And Service Of Protective Orders In Virginia: Are You Really Protected, Susheela Varky

Richmond Journal of Law and the Public Interest

According to the Virginia Department of State Police, there has been a legislative effort in 2008 and 2009 over the past two years to ensure that essential data from protective orders1 is entered into the Virginia Criminal Information Network ("VCIN") immediately upon the order's issuance. While data entry may seem like a dull topic, the following story highlights the dire significance of this seemingly mundane task.


Entry And Service Of Protective Orders In Virginia: Are You Really Protected, Susheela Varky Jan 2009

Entry And Service Of Protective Orders In Virginia: Are You Really Protected, Susheela Varky

Richmond Public Interest Law Review

According to the Virginia Department of State Police, there has been a legislative effort in 2008 and 2009 over the past two years to ensure that essential data from protective orders1 is entered into the Virginia Criminal Information Network ("VCIN") immediately upon the order's issuance. While data entry may seem like a dull topic, the following story highlights the dire significance of this seemingly mundane task.


Changing Tides: A Lesser Expectation Of Privacy In A Post 9/11 World, Derek M. Alphran Jan 2009

Changing Tides: A Lesser Expectation Of Privacy In A Post 9/11 World, Derek M. Alphran

Richmond Public Interest Law Review

In sum, the Court has in recent years balanced the degree of government intrusion of the individual or place searched against the government's need for the search. This article addresses some of the questions posed by the evolution of the Fourth Amendment doctrine in light of terrorist concerns since 9/11. Part II will address the history of Fourth Amendment jurisprudence, from the Boyd Era of property protection and the use of general warrants to discover evidence of crime, to Olmstead and the development of the right of privacy under the Fourth Amendment. Part III will address the modern test under …


California's Database Breach Notification Security Act: The First State Breah Notification Law Is Is Not Yet A Suitable Template For National Identity Theft Legislation, Timothy H. Skinner Jan 2003

California's Database Breach Notification Security Act: The First State Breah Notification Law Is Is Not Yet A Suitable Template For National Identity Theft Legislation, Timothy H. Skinner

Richmond Journal of Law & Technology

Attacks on poorly-secured information systems containing personal information are nearing epidemic proportion. Hardly a month passes without a news story regarding a security breach that exposed hundreds or thousands of data subjects’ personal information. As dependence on e-Commerce continues to expand, personal information stolen from poorly secured systems is becoming a multi-billion-dollar industry.


Health Care Law, Peter M. Mellette, Emily W. G. Towey, J. Vaden Hunt Nov 2002

Health Care Law, Peter M. Mellette, Emily W. G. Towey, J. Vaden Hunt

University of Richmond Law Review

No abstract provided.


Technology Law, J. Douglas Cuthbertson, Glen L. Gross Nov 2002

Technology Law, J. Douglas Cuthbertson, Glen L. Gross

University of Richmond Law Review

No abstract provided.


Fbi Internet Surveillance: The Need For A Natural Rights Application Of The Fourth Amendment To Insure Internet Privacy, Catherine M. Barrett Jan 2002

Fbi Internet Surveillance: The Need For A Natural Rights Application Of The Fourth Amendment To Insure Internet Privacy, Catherine M. Barrett

Richmond Journal of Law & Technology

Last year, the Federal Bureau of Investigation (“FBI”) acknowledged that it used an Internet electronic surveillance system called Carnivore to investigate and prosecute criminal suspects in more than two dozen cases. Carnivore is a software program developed by the FBI that can be installed on the network of an Internet Service Provider (“ISP”), such as America Online, to monitor, intercept and collect e-mail messages and other Internet activity made and received by individuals suspected of criminal activity. To date, the full capability of Carnivore remains a secret—the FBI refuses to disclose the source code (computer language) that would reveal how …


United States V. Keystone Sanitation Company: E-Mail And The Attorney-Client Privilege, Karen M. Coon Jan 2001

United States V. Keystone Sanitation Company: E-Mail And The Attorney-Client Privilege, Karen M. Coon

Richmond Journal of Law & Technology

The rapid growth and sophistication of technology have changed the way people communicate. E-mail and the Internet have begun to affect the way attorneys communicate with their clients. E-mail is fast and convenient, but it is not without risks. The risk of illegal interception and the risk of inadvertent disclosure are serious issues that attorneys need to be aware of and try to prevent so that the attorney-client privilege is protected as much as possible. Although communicating with a client by e-mail may be risky, the risks posed by e-mail are no different from those posed by communicating by postal …