Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

4,185 Full-Text Articles 3,994 Authors 3,103,715 Downloads 158 Institutions

All Articles in Privacy Law

Faceted Search

4,185 full-text articles. Page 119 of 133.

After United States V. Jones, After The Fourth Amendment Third Party Doctrine, Stephen E. Henderson 2012 University of Oklahoma College of Law

After United States V. Jones, After The Fourth Amendment Third Party Doctrine, Stephen E. Henderson

Stephen E Henderson

In United States v. Jones, the Supreme Court unanimously rejected the proposition that the Government can surreptitiously electronically track vehicle location for an entire month without Fourth Amendment restraint. While the Court's three opinions leave much uncertain, in one perspective they fit nicely within a long string of cases in which the Court is cautiously developing new standards of Fourth Amendment protection, including a rejection of a strong third party doctrine. This Article develops that perspective and provides a cautiously optimistic view of where search and seizure protections may be headed.

More detail:

United States v. Jones, in which the …


What Alex Kozinski And The Investigation Of Earl Bradley Teach About Searching And Seizing Computers And The Dangers Of Inevitable Discovery, Stephen E. Henderson 2012 University of Oklahoma College of Law

What Alex Kozinski And The Investigation Of Earl Bradley Teach About Searching And Seizing Computers And The Dangers Of Inevitable Discovery, Stephen E. Henderson

Stephen E Henderson

This paper tells two stories. One concerns the investigation of a Delaware physician named Earl B. Bradley that resulted in a conviction and sentence of fourteen consecutive life terms for the sexual abuse of children. The other concerns the computer problems, both judicial and extra-judicial, of Chief Judge Alex Kozinski of the United States Court of Appeals for the Ninth Circuit. Though in a sense unrelated, they share lessons about the practicalities of computers and their search that are worth telling. As courts continue to struggle with how to cabin the searches of computers in order to minimize privacy intrusion …


Drone Federalism: Civilian Drones And The Things They Carry, Margot E. Kaminski 2012 University of Colorado Law School

Drone Federalism: Civilian Drones And The Things They Carry, Margot E. Kaminski

Publications

Civilian drones are scheduled to be permitted in the national airspace as early as 2015. Many think Congress should establish the necessary nationwide regulations to govern both law enforcement and civilian drone use. That thinking, however, is wrong. This Essay suggests drone federalism instead: a state-based approach to privacy regulation that governs drone use by civilians, drawing on states’ experience regulating other forms of civilian-on-civilian surveillance. This approach will allow necessary experimentation in how to best balance privacy concerns against First Amendment rights in the imminent era of drone-use democratization. This Essay closes by providing some guidance to states as …


Natural Law, Slavery, And The Right To Privacy Tort, Anita L. Allen 2012 University of Pennsylvania Carey Law School

Natural Law, Slavery, And The Right To Privacy Tort, Anita L. Allen

All Faculty Scholarship

In 1905 the Supreme Court of Georgia became the first state high court to recognize a freestanding “right to privacy” tort in the common law. The landmark case was Pavesich v. New England Life Insurance Co. Must it be a cause for deep jurisprudential concern that the common law right to privacy in wide currency today originated in Pavesich’s explicit judicial interpretation of the requirements of natural law? Must it be an additional worry that the court which originated the common law privacy right asserted that a free white man whose photograph is published without his consent in …


Tax Glasnost' For Millionaires: Peeking Behind The Veil Of Ignorance Along The Publicity-Privacy Continuum, Marc Linder 2012 University of Iowa

Tax Glasnost' For Millionaires: Peeking Behind The Veil Of Ignorance Along The Publicity-Privacy Continuum, Marc Linder

Marc Linder

No abstract provided.


The Inalienable Right Of Publicity, Jennifer E. Rothman 2012 University of Pennsylvania Carey Law School

The Inalienable Right Of Publicity, Jennifer E. Rothman

All Faculty Scholarship

This article challenges the conventional wisdom that the right of publicity is universally and uncontroversially alienable. Courts and scholars have routinely described the right as a freely transferable property right, akin to patents or copyrights. Despite such broad claims of unfettered alienability, courts have limited the transferability of publicity rights in a variety of instances. No one has developed a robust account of why such limits should exist or what their contours should be. This article remedies this omission and concludes that the right of publicity must have significantly limited alienability to protect the rights of individuals to control the …


Information Escrows, Ian Ayres, Cait Unkovic 2012 Yale Law School

Information Escrows, Ian Ayres, Cait Unkovic

Michigan Law Review

A variety of information escrows - including allegation escrows, suspicion escrows, and shared-interest escrows - hold the promise of reducing the first-mover disadvantage that can deter people with socially valuable private information from disclosing that information to others. Information escrows allow people to transmit sensitive information to a trusted intermediary, an escrow agent, who only forwards the information under prespecified conditions. For example, an allegation escrow for sexual harassment might allow a victim to place a private complaint into escrow with instructions that the complaint be lodged with the proper authorities only if the escrow agent receives at least one …


Survey Of Recent European Union Privacy Developments, W. Gregory Voss 2012 Toulouse Business School

Survey Of Recent European Union Privacy Developments, W. Gregory Voss

W. Gregory Voss

The Spanish law implementing the European Union (EU) Data Protection Directive, advisory guidance on consent, facial recognition and biometric technologies from the European Union Article 29 Data Protection Working Party (WP29) , and proposals for EU data protection law reform are analyzed in this survey piece. EU legislative processes are illustrated by a specific occurence: Spanish Organic Law 15/1999 on the Protection of Personal Data is reviewed in the context of Court of Justice of the European Union (ECJ) joined cases, Asociación Nacional de Establecimientos Financieros de Crédito (ASNEF) v. Administración del Estado, and Federación de Comercio Electrónico y Marketing …


Limits Of The Federal Wiretap Act's Ability To Protect Against Wi-Fi Sniffing, Mani Potnuru 2012 University of Michigan Law School

Limits Of The Federal Wiretap Act's Ability To Protect Against Wi-Fi Sniffing, Mani Potnuru

Michigan Law Review

Adoption of Wi-Fi wireless technology continues to see explosive growth. However many users still operate their home Wi-Fi networks in unsecured mode or use publicly available unsecured Wi-Fi networks, thus exposing their communications to the dangers of "packet sniffing," a technique used for eavesdropping on a network. Some have argued that communications over unsecured Wi-Fi networks are "readily accessible to the general public" and that such communications are therefore excluded from the broad protections of the Federal Wiretap Act against intentional interception of electronic communications. This Note examines the Federal Wiretap Act and argues that the current Act's treatment of …


Four Easy Pieces To Balance Privacy And Accountability In Public Higher Education: A Response To Wrongdoing Ranging From Petty Corruption To The Sandusky And Penn State Tragedy, Robert E. Steinbuch 2012 University of Arkansas at Little Rock William H. Bowen School of Law

Four Easy Pieces To Balance Privacy And Accountability In Public Higher Education: A Response To Wrongdoing Ranging From Petty Corruption To The Sandusky And Penn State Tragedy, Robert E. Steinbuch

Faculty Scholarship

No abstract provided.


Warrantless Searches And Smartphones: Privacy In The Palm Of Your Hand?, Margaret M. Lawton 2012 University of the District of Columbia School of Law

Warrantless Searches And Smartphones: Privacy In The Palm Of Your Hand?, Margaret M. Lawton

University of the District of Columbia Law Review

Incident to a drug arrest, a police officer removes a smartphone from the pocket of the defendant. The smartphone may have incriminating evidence-phone numbers, pictures, text messages, and e-mails. But can the officer examine the smartphone on the scene or back at the station? Or does the officer need to show probable cause and obtain a warrant before examining the phone? If the phone were instead the arrestee's wallet or a cigarette package, under the search incident to lawful arrest exception to the Fourth Amendment's warrant requirement the officer could open and search inside either of these "containers." Anything found …


Looking Through The Prism Of Privacy And Trespass: Smartphones And The Fourth Amendment, Saby Ghoshray 2012 University of the District of Columbia School of Law

Looking Through The Prism Of Privacy And Trespass: Smartphones And The Fourth Amendment, Saby Ghoshray

University of the District of Columbia Law Review

Technology in the twenty-first century has dramatically changed our lives, but the law has not kept pace with technological advances. The treatment of smartphones in Fourth Amendment jurisprudence is no exception. This is made evident by the increasingly scattered outcomes of litigation involving the privacy interests of smartphone owners.' As the cross-jurisdictional inconsistencies of judicial decisions applying the Fourth Amendment to smartphones mount, I am drawn to seek answers from two foundational pillars of the Supreme Court's search and seizure jurisprudence: protection against invasions of privacy and the bulwark against trespass.


Access For All: A Review Of “Law Libraries, Government Transparency, And The Internet,” A Presentation By Daniel Schuman Of The Sunlight Foundation At The All-Sis Meeting, July 22, 2012, Susan David deMaine 2012 Indiana University Maurer School of Law

Access For All: A Review Of “Law Libraries, Government Transparency, And The Internet,” A Presentation By Daniel Schuman Of The Sunlight Foundation At The All-Sis Meeting, July 22, 2012, Susan David Demaine

Articles by Maurer Faculty

Attendees at the ALL-SIS Breakfast and Business Meeting at the AALL Annual Meeting had the pleasure of hearing from Daniel Schuman of the Sunlight Foundation speak on “Law Libraries, Government Transparency, and the Internet.” The Sunlight Foundation is a nonpartisan, nonprofit organization whose mission is to increase access to federal government information resources through advocacy and the development of information technology tools.


The Class Differential In Privacy Law, Michele E. Gilman 2012 University of Baltimore School of Law

The Class Differential In Privacy Law, Michele E. Gilman

All Faculty Scholarship

This article analyzes how privacy law fails the poor. Due to advanced technologies, all Americans are facing corporate and governmental surveillance. However, privacy law is focused on middle-class concerns about limiting the disclosure of personal data so that it is not misused. By contrast, along the welfare-to-work continuum, poor people face privacy intrusions at the time that the state or their employers gather data. This data collection tends to be stigmatizing and humiliating, and it thus not only compounds the harmful effects of living in poverty, but also dampens democratic participation by the poor. The poor interact with the government …


Privacy For Social Networking, Connie Davis Powell 2012 University of Arkansas at Little Rock William H. Bowen School of Law

Privacy For Social Networking, Connie Davis Powell

University of Arkansas at Little Rock Law Review

This article begins by considering the emergence of social networks as a major medium of communication and posits that the success of social networks is attributable to their users' willingness to share their information. Next, the article considers the expectation of privacy for users of social networks and whether such expectation is reasonable. In particular, the article discusses the privacy policies and legal terms governing the use of social networks, and tracks the evolution of such terms and policies as they slowly whittle away user control over time. The article then discusses public outcry regarding the disclosure of information contrary …


Walled Gardens Of Privacy Or “Binding Corporate Rules?”: A Critical Look At International Protection Of Online Privacy, Joanna Kulesza 2012 University of Arkansas at Little Rock William H. Bowen School of Law

Walled Gardens Of Privacy Or “Binding Corporate Rules?”: A Critical Look At International Protection Of Online Privacy, Joanna Kulesza

University of Arkansas at Little Rock Law Review

A growing concern in the era of cloud computing is protecting Internet users' privacy. This concern is compounded by the fact that there are no effective international solutions. This article considers the latest European Union (EU) proposed development in this area – a regulatory model based on amended Binding Corporate Rules (BCR) – as introduced by the EU Justice Commissioner. These planned changes would have worldwide effects on international companies' online activities in transboundary cyberspace.

After providing a background on the concept of defining privacy in general, the article describes the BCR proposal, and proceeds to consider the likelihood of …


Electronic Privacy And Employee Speech, Pauline T. Kim 2012 Washington University School of Law

Electronic Privacy And Employee Speech, Pauline T. Kim

Chicago-Kent Law Review

The boundary between work and private life is blurring as a result of changes in the organization of work and advances in technology. Current privacy law is ill-equipped to address these changes and as a result, employees' privacy in their electronic communications is only weakly protected from employer scrutiny. At the same time, the law increasingly protects certain socially valued forms of employee speech. In particular, collective speech, speech that enforces workplace regulations and speech that deters or reports employer wrong-doing are explicitly protected by law from employer reprisals. These two developments—weak protection of employee privacy and increased protection for …


The Progress Of Science And The Useful Arts: Misadventures In Canadian Law On Patent-Eligible Subject Matter, Ken Bousfield 2012 Schulich School of Law, Dalhousie University

The Progress Of Science And The Useful Arts: Misadventures In Canadian Law On Patent-Eligible Subject Matter, Ken Bousfield

Canadian Journal of Law and Technology

Patent-Eligible Subject-Matter in Canada

The law of patent-eligible subject-matter in Canada has become badly muddled. There has been repeated confusion of subject-matter issues with non-subject matter issues such as novelty, obviousness, and utility. There has also been repeated confusion within the following group of issues pertaining to whether subject-matter is patent-eligible: whether a claim is for a mere idea or aggregation or for a patentable invention; whether claimed subject-matter falls within science and the useful arts; and whether claimed subject-matter falls within the statutory classes listed in the definition of “invention”. Echoes of older UK-based cases, relating to statutory provisions …


Harvesting The "Forbidden Fruit" Of Biotechnology Research: Genetic Engineering, International Law And The Patentability Of Higher Life Forms In Canada, Eugene C. Lim 2012 University of Hong Kong

Harvesting The "Forbidden Fruit" Of Biotechnology Research: Genetic Engineering, International Law And The Patentability Of Higher Life Forms In Canada, Eugene C. Lim

Canadian Journal of Law and Technology

As the frontiers of science are constantly redefined by the emergence of new technology, patent law often has to struggle to keep pace with the changing conception of what constitutes a protectable “invention”. A key challenge facing patent law in the age of biotechnology lies in ascertaining the extent to which genetically engineered life forms should be protected. A major concern relates to whether such life forms should be excluded from patentability on grounds of ordre public, ethics and morality.

This article critically explores the extent to which patent law in Canada protects this “forbidden fruit” of biotechnological innovation, and …


A Delicate Balance: Defining The Line Between Open Civil Proceedings And The Protection Of Children In The Online Digital Era, Courtney Retter, Shaheen Shariff 2012 Schulich School of Law, Dalhousie University

A Delicate Balance: Defining The Line Between Open Civil Proceedings And The Protection Of Children In The Online Digital Era, Courtney Retter, Shaheen Shariff

Canadian Journal of Law and Technology

He thought of the telescreen with its never-sleeping ear. They could spy upon you night and day, but if you kept your head you could still outwit them. [. . .] They could lay bare in the utmost detail everything that you had done or said or thought; but the inner heart, whose workings were mysterious even to yourself, remained impregnable.

— George Orwell, 1984

On Thursday September 27, 2012, a few months after our paper was written, the Supreme Court of Canada solidified the rights of children victimized by cyberbullying in the landmark decision of AB (Litigation Guardian of) …


Digital Commons powered by bepress