Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Law (7)
- Internet Law (6)
- Science and Technology Law (4)
- Social and Behavioral Sciences (4)
- Communication (3)
-
- Communications Law (3)
- Constitutional Law (3)
- Labor and Employment Law (3)
- Law and Society (3)
- Sociology (3)
- Arts and Humanities (2)
- Business (2)
- Business Law, Public Responsibility, and Ethics (2)
- Communication Technology and New Media (2)
- Contracts (2)
- Fourth Amendment (2)
- Jurisprudence (2)
- Law and Economics (2)
- Marketing Law (2)
- Philosophy (2)
- Sexuality and the Law (2)
- Banking and Finance Law (1)
- Commercial Law (1)
- Consumer Protection Law (1)
- Criminal Law (1)
- E-Commerce (1)
- Economic Policy (1)
- Economics (1)
- Institution
- Publication Year
- Publication
- Publication Type
Articles 1 - 17 of 17
Full-Text Articles in Privacy Law
Survey Of (Mostly Outdated And Often Ineffective) Laws Affecting Work-Related Monitoring, Robert Sprague
Survey Of (Mostly Outdated And Often Ineffective) Laws Affecting Work-Related Monitoring, Robert Sprague
Chicago-Kent Law Review
This article reviews various laws that affect work-related monitoring. It reveals that most of our privacy laws were adopted well before smartphones and the Internet became ubiquitous; they still hunt for physical secluded locations; and, because they are based on reasonable expectations of privacy, they can easily be circumvented by employer policies that eliminate that expectation by informing workers they have no right to privacy in the workplace. This article concludes that the future—indeed the present—does not bode well for worker privacy.
Employee Electronic Communications In A Boundaryless World, Robert Sprague
Employee Electronic Communications In A Boundaryless World, Robert Sprague
Robert Sprague
One Hundred Twenty Years Of U.S. Privacy Law Scholarship: A Latent Semantic Analysis, Robert Sprague, Kevin Grauberger, Nicole Barberis
One Hundred Twenty Years Of U.S. Privacy Law Scholarship: A Latent Semantic Analysis, Robert Sprague, Kevin Grauberger, Nicole Barberis
Robert Sprague
This paper reports results from a research project aimed at identifying fundamental privacy law principles derived from the writings of legal scholars and commentators using probabilistic topic modeling, which is comprised of a suite of algorithms that attempt to discover hidden thematic structures in large archives of documents. Topic modeling algorithms are statistical methods that analyze the words of texts to discover topics (themes) contained within, how those topics are connected to each other, and how they change over time. A latent Dirichlet allocation process, which identifies sets of terms that more tightly co-occur, is incorporated into the topic modeling …
Self, Privacy, And Power: Is It All Over?, Richard Warner, Robert H. Sloan
Self, Privacy, And Power: Is It All Over?, Richard Warner, Robert H. Sloan
All Faculty Scholarship
The realization of a multifaceted self is an ideal one strives to realize. One realizes such a self in large part through interaction with others in various social roles. Such realization requires a significant degree of informational privacy. Informational privacy is the ability to determine for yourself when others may collect and how they may use your information. The realization of multifaceted selves requires informational privacy in public. There is no contradiction here: informational privacy is a matter of control, and you can have such control in public. Current information processing practices greatly reduce privacy in public thereby threatening the …
Amicus Brief -- Riley V. California And United States V. Wurie, Charles E. Maclean, Adam Lamparello
Amicus Brief -- Riley V. California And United States V. Wurie, Charles E. Maclean, Adam Lamparello
Adam Lamparello
Warrantless searches of cell phone memory—after a suspect has been arrested, and after law enforcement has seized the phone—would have been unconstitutional at the time the Fourth Amendment was adopted, and are unconstitutional now. Simply stated, they are unreasonable. And reasonableness—not a categorical warrant requirement—is the “touchstone of Fourth Amendment analysis.”
Self, Privacy, And Power: Is It All Over? (With R. Sloan), Richard Warner
Self, Privacy, And Power: Is It All Over? (With R. Sloan), Richard Warner
Richard Warner
The realization of a multifaceted self is an ideal one strives to realize. One realizes such a self in large part through interaction with others in various social roles. Such realization requires a significant degree of informational privacy. Informational privacy is the ability to determine for yourself when others may collect and how they may use your information. The realization of multifaceted selves requires informational privacy in public. There is no contradiction here: informational privacy is a matter of control, and you can have such control in public. Current information processing practices greatly reduce privacy in public thereby threatening the …
Flawed Transparency: Shared Data Collection And Disclosure Challenges For Google Glass And Similar Technologies, Jonathan I. Ezor
Flawed Transparency: Shared Data Collection And Disclosure Challenges For Google Glass And Similar Technologies, Jonathan I. Ezor
Jonathan I. Ezor
Current privacy law and best practices assume that the party collecting the data is able to describe and disclose its practices to those from and about whom the data are collected. With emerging technologies such as Google Glass, the information being collected by the wearer may be automatically shared to one or more third parties whose use may be substantially different from that of the wearer. Often, the wearer may not even know what information is being uploaded, and how it may be used. This paper will analyze the current state of U.S. law and compliance regarding personal information collection …
Do-Not-Track As Default, Joshua A.T. Fairfield
Do-Not-Track As Default, Joshua A.T. Fairfield
Joshua A.T. Fairfield
Do-Not-Track is a developing online legal and technological standard that permits consumers to express their desire not to be tracked by online advertisers. Do-Not-Track has the ability to change the relationship between consumers and advertisers in the information market. Everything will depend on implementation. The most effective way to allow users to achieve their privacy preferences is to implement Do-Not-Track as a default feature. The World Wide Web Consortium’s (W3C) standard setting body for Do-Not-Track has, however, endorsed a corrosive standard in its Tracking Preferences Expression (TPE) draft. This standard requires consumers to set their privacy preference by hand. This …
Cracks In The Foundation: The New Internet Regulation's Hidden Threat To Privacy And Commerce, Joshua A.T. Fairfield
Cracks In The Foundation: The New Internet Regulation's Hidden Threat To Privacy And Commerce, Joshua A.T. Fairfield
Joshua A.T. Fairfield
Scholarship to date has focused on the legal significance of the novelty of the Internet. This scholarship does not describe or predict actual Internet legislation. Instead of asking whether the Internet is so new as to merit new law, legislators and academics should re-evaluate the role of government in orchestrating collective action and change the relative weight of enforcement, deterrence, and incentives in Internet regulations. A perfect example of the need for this new approach is the recent CANSPAM Act of 2003, which was intended to protect personal privacy and legitimate businesses. However, the law threatens both of these interests, …
Invasion Of The Social Networks: Blurring The Line Between Personal Life And The Employment Relationship, Robert Sprague
Invasion Of The Social Networks: Blurring The Line Between Personal Life And The Employment Relationship, Robert Sprague
Robert Sprague
Over one-half billion people worldwide have registered accounts with Facebook, the most popular online social network. This article addresses some of the more significant employment-related legal issues arising from the growing popularity of online social networks. First, the need for employers to investigate the background of prospective employees is examined from the context of employers using online social networks to conduct those investigations. In particular, this article analyzes the degree to which job applicants have privacy rights in the information they post online. This article then examines the interrelationship between online social networks and employees, focusing on limitations faced by …
Undermined Norms: The Corrosive Effect Of Information Processing Technology On Informational Privacy, Richard Warner
Undermined Norms: The Corrosive Effect Of Information Processing Technology On Informational Privacy, Richard Warner
All Faculty Scholarship
Informational privacy is a matter of control; it consists in the ability to control when one’s personal information is collected, how it is used, and to whom it is distributed. The degree of control we once enjoyed has vanished. Advances in information processing technology now give others considerable power to determine when personal information is collected, how it is used, and to it is whom distributed. Privacy advocates sound the alarm in regard to both the governmental and private sectors. I focus exclusively on the later. Relying on the extensive privacy advocate literature, I assume we should try to regain …
Orwell Was An Optimist: The Evolution Of Privacy In The United States And Its De-Evolution For American Employees, Robert Sprague
Orwell Was An Optimist: The Evolution Of Privacy In The United States And Its De-Evolution For American Employees, Robert Sprague
Robert Sprague
This Article argues that the difficulties associated with understanding and applying rights to privacy in modern America, and its near extinction, particularly for employees, are a direct result of the conceptual approach used to determine whether a legal right to privacy exists. This approach was formally adopted in the latter part of the twentieth century and it makes privacy protection dependent upon any given situation, determined by whether there is a reasonable expectation of privacy for that given situation. This makes the current right to privacy in the United States contextual, fluid, and easily subject to elimination. One of the …
Minor Distractions: Children, Privacy And E-Commerce, Anita L. Allen
Minor Distractions: Children, Privacy And E-Commerce, Anita L. Allen
All Faculty Scholarship
No abstract provided.
Internet Privacy And Self-Regulation: Lessons From The Porn Wars, Tom Bell
Internet Privacy And Self-Regulation: Lessons From The Porn Wars, Tom Bell
Tom W. Bell
The availability and adequacy of technical remedies ought to play a crucial role in evaluating the propriety of state action with regard to both the inhibition of Internet pornography and the promotion of Internet privacy. Legislation that would have restricted Internet speech considered indecent or harmful to minors has already faced and failed that test. Several prominent organizations dedicated to preserving civiI Iiberties argued successfully that self -help technologies offered less-restrictive means of achieving the purported ends of such legislation, rendering it unconstitutional. Surprisingly, those same organizations have of late joined the call for subjecting another kind of speech—speech by …
Privacy-As-Data Control: Conceptual, Practical, And Moral Limits Of The Paradigm, Anita L. Allen
Privacy-As-Data Control: Conceptual, Practical, And Moral Limits Of The Paradigm, Anita L. Allen
All Faculty Scholarship
No abstract provided.
Coercing Privacy, Anita L. Allen
A Contractual Approach To Data Privacy, Stephanos Bibas
A Contractual Approach To Data Privacy, Stephanos Bibas
All Faculty Scholarship
No abstract provided.