Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

4,165 Full-Text Articles 3,975 Authors 3,103,715 Downloads 157 Institutions

All Articles in Privacy Law

Faceted Search

4,165 full-text articles. Page 91 of 132.

False Light Invasion Of Privacy In Docudramas: The Oxymoron Which Must Be Solved, Matthew Stohl 2015 The University of Akron

False Light Invasion Of Privacy In Docudramas: The Oxymoron Which Must Be Solved, Matthew Stohl

Akron Law Review

According to Giardello, boxing historians, and even Rubin “Hurricane” Carter, himself, the opening sequence of The Hurricane — which purports to tell the “true story” of Carter’s unjust imprisonment — was not only far from being accurate, it was a complete falsity. In reality, the fight was a lopsided Giardello victory, to the delight of the 6,000 fans in attendance.

Joey Giardello, who knew nothing of the movie until the day he saw it in the theater, filed suit on February 16, 2000 against Universal Pictures claiming that the film inaccurately portrayed him as a weak fighter and the beneficiary …


Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu 2015 Washington and Lee University School of Law

Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu

Pepperdine Law Review

This Article highlights some of the critical distinctions between small data surveillance and big data cybersurveillance as methods of intelligence gathering. Specifically, in the intelligence context, it appears that “collect-it-all” tools in a big data world can now potentially facilitate the construction, by the intelligence community, of other individuals' digital avatars. The digital avatar can be understood as a virtual representation of our digital selves and may serve as a potential proxy for an actual person. This construction may be enabled through processes such as the data fusion of biometric and biographic data, or the digital data fusion of the …


Standing And Covert Surveillance, Christopher Slobogin 2015 Pepperdine University

Standing And Covert Surveillance, Christopher Slobogin

Pepperdine Law Review

This Article describes and analyzes standing doctrine as it applies to covert government surveillance, focusing on practices thought to be conducted by the National Security Agency. Primarily because of its desire to avoid judicial incursions into the political process, the Supreme Court has construed its standing doctrine in a way that makes challenges to covert surveillance very difficult. Properly understood, however, such challenges do not call for judicial trenching on the power of the legislative and executive branches. Instead, they ask the courts to ensure that the political branches function properly. This political process theory of standing can rejuvenate the …


Lawyers Who Lie On-Line: How Should The Legal Profession Respond To Ebay Ethics, 18 J. Marshall J. Computer & Info. L. 875 (2000), Mark E. Wojcik 2015 John Marshall Law School

Lawyers Who Lie On-Line: How Should The Legal Profession Respond To Ebay Ethics, 18 J. Marshall J. Computer & Info. L. 875 (2000), Mark E. Wojcik

Mark E. Wojcik

A recent scandal erupted in the press when a painting that was offered for sale on an Internet auction site was believed to be a lost contemporary masterpiece. The seller appeared to be a married man who was cleaning junk out of his garage, including a painting that his wife would not let him hang in the house. A bidding frenzy drove the price from the opening bid of 25 cents to more than $135,000 from a buyer in the Netherlands. After the sale was finished (it was ended by EBay when they learned he bid on the painting himself …


Trading Privacy For Angry Birds: A Call For Courts To Reevaluate Privacy Expectations In Modern Smartphones, Jeremy Andrew Ciarabellini 2015 Seattle University School of Law

Trading Privacy For Angry Birds: A Call For Courts To Reevaluate Privacy Expectations In Modern Smartphones, Jeremy Andrew Ciarabellini

Seattle University Law Review

Of all the smartphone uses, the calling function is probably used the least. Rather, individuals more commonly use their smartphone for surfing the web, checking Facebook, and playing games. Highlighting the “smart” in smartphone, these phones often know more about their users’ daily activities than the users. Without requiring any sort of input, smartphones can tell the user how many steps they walk each day, when it is time to leave for work (also, of course, determining the traveling time with the most up-to-date traffic reports), and when an item recently ordered on Amazon will be delivered. Smartphone users may …


Authorized Investigation: A Temperate Alternative To Cyber Insecurity, Casey M. Bruner 2015 Seattle University School of Law

Authorized Investigation: A Temperate Alternative To Cyber Insecurity, Casey M. Bruner

Seattle University Law Review

This Note aims to show that legal structures created to protect the Internet in its original form are completely insufficient to protect what the Internet has become. This antiquated legal framework is exacerbating the problem. The breadth of activity that the current law restricts severely limits the remedies that cyberattack victims can pursue, and it must be updated. While full hack-back may prove necessary in the long run, I argue for a more temperate initial response to the problem—I call this response “authorized investigation.” Specifically, the Computer Fraud and Abuse Act should be amended to allow victims access to their …


Charting The Course For Use Of Small Unmanned Aerial Systems In Newsgathering, Mickey H. Osterreicher 2015 Pepperdine University

Charting The Course For Use Of Small Unmanned Aerial Systems In Newsgathering, Mickey H. Osterreicher

Pepperdine Law Review

News organizations and individual journalists eagerly anticipate safely utilizing Small Unmanned Aerial Systems (sUAS) for newsgathering purposes as lawmakers integrate sUAS into the National Air Space (NAS). For now, these potential users may be flying over an "unchartered" regulatory landscape while the FAA struggles to complete its administrative rulemaking. In order to better understand how media organizations and individual journalists intend to use sUAS for newsgathering purposes, the National Press Photographers Association (NPPA) developed a survey consisting of twenty-one multiple choice questions, with space for elaboration, and three questions seeking narrative responses. The survey was distributed via email to approximately …


Two Wrongs Don't Make A Fourth Amendment Right: Samson Court Errs In Choosing Proper Analytical Framework, Errs In Result, Parolees Lose Fourth Amendment Protection, Rachael A. Lynch 2015 The University of Akron

Two Wrongs Don't Make A Fourth Amendment Right: Samson Court Errs In Choosing Proper Analytical Framework, Errs In Result, Parolees Lose Fourth Amendment Protection, Rachael A. Lynch

Akron Law Review

This Note will follow the Fourth Amendment from its origins to its modern application to parolee rights, as evidenced by the Samson Court. Part II focuses on the Fourth Amendment, from the circumstances surrounding its adoption to modern court cases that have applied its tenets to prisoners, probationers, and, finally, parolees. Part III details the Supreme Court’s decision in Samson v. California, including a thorough discussion of the facts that gave rise to the case and lower court decisions. Part IV explores the problems with the Court’s framework and suggests other possible frameworks the Court could have used to come …


Internet Giants As Quasi-Governmental Actors And The Limits Of Contractual Consent, D. A. Jeremy Telman 2015 Valparaiso University School of Law

Internet Giants As Quasi-Governmental Actors And The Limits Of Contractual Consent, D. A. Jeremy Telman

Law Faculty Publications

Although the government’s data-mining program relied heavily on information and technology that the government received from private companies, relatively little of the public outrage generated by Edward Snowden’s revelations was directed at those private companies. We argue that the mystique of the Internet giants and the myth of contractual consent combine to mute criticisms that otherwise might be directed at the real data-mining masterminds. As a result, consumers are deemed to have consented to the use of their private information in ways that they would not agree to had they known the purposes to which their information would be put …


Defining Foreign Affairs In Section 702 Of The Fisa Amendments Act: The Virtues And Deficits Of Post-Snowden Dialogue On U.S. Surveillance Policy, Peter Margulies 2015 Roger Williams University School of Law

Defining Foreign Affairs In Section 702 Of The Fisa Amendments Act: The Virtues And Deficits Of Post-Snowden Dialogue On U.S. Surveillance Policy, Peter Margulies

Law Faculty Scholarship

No abstract provided.


Examining Crack Cocaine Sentencing In A Post-Kimbrough World, Michael B. Cassidy 2015 The University of Akron

Examining Crack Cocaine Sentencing In A Post-Kimbrough World, Michael B. Cassidy

Akron Law Review

This article examines Kimbrough’s effect on crack cocaine sentencing. Part I discusses the rise of crack cocaine use in the United States during the 1980s. Part II provides a short history on modern federal sentencing, including the Sentencing Reform Act, the Commission’s Guidelines, and its reports to Congress concerning the 100-to-1 ratio. Part III examines the Supreme Court’s recent Sixth Amendment jurisprudence through its seminal cases, Apprendi and Blakely. In Part IV, this article analyzes the Court’s Booker holding as well as Kimbrough and Gall v. United States, two cases that clarified Booker and its application to crack cocaine cases. …


How Privacy Killed Katz: A Tale Of Cognitive Freedom And The Property Of Personhood As Fourth Amendment Norm, Christian M. Halliburton 2015 The University of Akron

How Privacy Killed Katz: A Tale Of Cognitive Freedom And The Property Of Personhood As Fourth Amendment Norm, Christian M. Halliburton

Akron Law Review

With each passing day, new technologies push the horizons of official government investigative and surveillance activity deeper and deeper into the mind and consciousness of the surveilled subject. While law enforcement agencies have always relied on observing the behavior and activity of suspicious targets, and there has been little judicial ink spent preserving the confidentiality of such observable activity, the law has been slow to respond to rapid increases in the capacity or scope of official observation that the advance of technologically sophisticated surveillance techniques helped facilitate. The sampling of techniques at the center of this Article allow the operators …


The Right To Silence As Protecting Mental Control, Dov Fox 2015 The University of Akron

The Right To Silence As Protecting Mental Control, Dov Fox

Akron Law Review

This Article examines the idea that individuals have a moral and constitutional right of control over the use of their thoughts vis-à-vis the state. As a point of departure, I consider the prospect of a forensic neuroimaging device that was capable of eliciting recall and recognition from a criminal suspect without the suspect’s having even to answer an interrogator’s question. Reflection on government access to this sort of interrogation technique suggests that the state should be prohibited from either extracting a person’s thoughts without her consent or making use of her compelled thoughts to lay criminal blame upon her. Though …


The Article 2b Symposium: A Foreword, 16 J. Marshall J. Computer & Info. L. 205 (1998), Ann Lousin 2015 John Marshall Law School

The Article 2b Symposium: A Foreword, 16 J. Marshall J. Computer & Info. L. 205 (1998), Ann Lousin

Ann M. Lousin

No abstract provided.


Foreword: Uniform Computer Information Transaction Act, 18 J. Marshall J. Computer & Info. L. 275 (2000), Ann Lousin 2015 John Marshall Law School

Foreword: Uniform Computer Information Transaction Act, 18 J. Marshall J. Computer & Info. L. 275 (2000), Ann Lousin

Ann M. Lousin

No abstract provided.


Coming To A Car Dealership Near You: Standardizing Event Data Recorder Technology Use In Automobiles, Kara Ryan 2015 IIT Chicago-Kent College of Law

Coming To A Car Dealership Near You: Standardizing Event Data Recorder Technology Use In Automobiles, Kara Ryan

Chicago-Kent Law Review

Event Data Recorders are receiving more attention as owners of automobiles have begun to realize that their driving histories are recorded. Event Data Recorders are the “black boxes” in automobiles that are installed in the vast majority of vehicles currently on the road. In the majority of states, the restrictions on what information can be retrieved from Event Data Recorders and used by police officers, advertising firms, and insurance companies remains a gray area. State laws governing Event Data Recorder technology greatly fluctuates by jurisdiction. If Event Data Recorder information falls into the wrong hands, the possession of the data …


Session Ii: Historical Perspectives On Privacy In American Law, 29 J. Marshall J. Computer & Info. L. 319 (2012), Steven D. Schwinn, Alberto Bernabe, Kathryn Kolbert, Adam D. Moore, Marc Rotenberg 2015 John Marshall Law School

Session Ii: Historical Perspectives On Privacy In American Law, 29 J. Marshall J. Computer & Info. L. 319 (2012), Steven D. Schwinn, Alberto Bernabe, Kathryn Kolbert, Adam D. Moore, Marc Rotenberg

Steven D. Schwinn

No abstract provided.


Picketing And Privacy: Can I Patrol On The Street Where You Live?, 7 S. Ill. U. L.J. 463 (1982), Edward Arnolds, Michael P. Seng 2015 John Marshall Law School

Picketing And Privacy: Can I Patrol On The Street Where You Live?, 7 S. Ill. U. L.J. 463 (1982), Edward Arnolds, Michael P. Seng

Michael P. Seng

No abstract provided.


Wide Right: How Isp Immunity And Current Laws Are Off The Mark In Protecting The Modern Athlete On Social Media, Dominick J. Mingione 2015 Pace University

Wide Right: How Isp Immunity And Current Laws Are Off The Mark In Protecting The Modern Athlete On Social Media, Dominick J. Mingione

Pace Intellectual Property, Sports & Entertainment Law Forum

“[Y]our tranny looking dad is a disgrace to American football,” “I would rape the shit out of her,” and “[The] [B]ears are easier than you on prom night,” are just a sampling of some of the alarmingly harassing tweets received by Chloe Trestman between the night of November 9, 2014 and November 10, 2014. Who is Chloe Trestman, and what could she have possibly done to warrant such abuse? Chloe’s father is Marc Trestman, the head coach of the Chicago Bears. And the twitter vitriol, or “twitriol,” directed toward Chloe was in response to the Bears’ blowout loss to their …


Session I: The Legacy Of Justice Arthur Goldberg, 29 J. Marshall J. Computer & Info. L. 285 (2012), Samuel R. Olken, Gerald Berendt, Gilbert A. Cornfield, Gilbert Feldman, David Stebenne, Milton I. Shadur 2015 John Marshall Law School

Session I: The Legacy Of Justice Arthur Goldberg, 29 J. Marshall J. Computer & Info. L. 285 (2012), Samuel R. Olken, Gerald Berendt, Gilbert A. Cornfield, Gilbert Feldman, David Stebenne, Milton I. Shadur

Samuel R. Olken

No abstract provided.


Digital Commons powered by bepress