The Limits of Torts Privacy
Electronic copy available at: http://ssrn.com/abstract=1862264 L EGAL S TUDIES R ESEARCH P APER S ERIES PAPER N O. 1 1-0 6-0 6 June 2011 T HE L IMITS OF T ORT PRIVACY by Neil M. Richards Professor of Law Electronic copy available at: http://ssrn.com/abstract=1862264Electronic copy available at: http://ssrn.com/abstract=1862264 DO NOT DELETE 6/20/2011 3:35 PM 357 […]
Sticky Policies An Approach for Privacy Management across Multiple Parties
Sticky Policies: An Approach for Privacy Management across Multiple Parties Authors: Siani Pearson and Marco Casassa Mont Cloud and Security Research Lab, Long Down Avenue, Stoke Gifford, Bristol. BS34 8QZ. Phone: +44 117 3128438/ 3128794 FAX: +44 1173129250 Email: [email protected] ; marco.casassa- [email protected] Abstract Organisations often have good privacy procedures in place for protection of […]
Social_Network_Theory_of_Privacy
72 U. Chi. L. Rev. 919 University of Chicago Law Review Summer 2005 Article *919 A SOCIAL NETWORKS THEORY OF PRIVACY Lior Jacob Strahilevitz [FNd1] Copyright © 2005 University of Chicago; Lior Jacob Strahilevitz What facts are public and what facts are private? I t is the fundamental, first-principles question in privacy law, and a necessary element in the two most important privacy torts, public disclosure of private facts and intrusion upon secl usion. This paper argues that insights from the literature on social networks and information disse […]
Repairing_Online_Reputation
Repairing Online Reputation: A New Multi-Modal Regulatory Approach Jacqueline D Lipton, Ph.D. * Abstract In today’s interconnected digital society, high pro file examples of online abuses abound. Cyberbullies lau nch attacks on the less powerful, often significantly d amaging victims’ reputations. Outside of reputational dam age, online harassment, bullying and stalking has led to severe emotional distress, loss of employment, physical assault and even death. Recent scholarship has identified this phenomenon b ut has done little more than note that current […]
Relational_Surveillance_Final
1 FREEDOM OF ASSOCIATION IN A NETWORKED WORLD: FIRST AMENDMENT REGULATION OF RELATIONAL SURVEILLANCE Katherine J. Strandburg * Abstract: Recent controversies about the National Security Ag ency’s war- rantless wiretapping of international calls have ov ershadowed equally dis- turbing allegations that the government has acquire d access to a huge da- tabase of domestic call traffic data, revealing inf ormation about times, dates, and numbers called. Although communication c ontent tradition- ally has been the primar y focus of concern about […]
Privacy’s-Other-Path
Privacy’s Other Path: Recovering the Law of Confidentiality NEIL M. R ICHARDS *&D ANIEL J. S OLOVE ** The familiar legend of privacy law holds that Samuel Warren and Louis Brandeis “invented” the right to privacy in 1890, and that William Prosser aided its develop- ment by recognizing four privacy torts in 1960. In this […]
Privacy_Government
SOLO 10.DOC 9/3/02 8:49 AM DIGITAL DOSSIERS AND THE DISSIPATION OF FOURTH AMENDMENT PRIVACY DANIEL J. S OLOVE * I. INTRODUCTION …………………………………………………………………… 1084 II. GOVERNMENT INFORMATION GATHERING AND THE PRIVATE SECTOR …………………………………………………………… 1089 A. T HIRD PARTY RECORDS AND THE GOVERNMENT ……………………….. 1089 B. G OVERNMENT -PRIVATE SECTOR INFORMATION FLOWS ………………. 1095 C. T HE […]
On Privacy Liberty in the Digital Revolution
ON PRIVACY: LIBERTY IN THE DIGITAL REVOL UTION Christina M. Gagnier * Cite as 11 J. HIGH TECH . L. 229 (2011) In the dorm room of some college freshman Political Science major at Any College U.S.A is a copy of John Stuart Mill’s On Liberty shoved under the bed. 1 Mill’s On Liberty , […]
Just_Click_Submit_ The_Collection,_Dissemination_and_Tagging_of
J UST C LICK S UBMIT T HE C OLLECTION , D ISSEMINATION AND T AGGING OF P ERSONALLY IDENTIFYING INFORMATION As the twenty-first century bustles forward, the e-commerce becomes an ever more dangerous place. On a daily basis, websites collect vast amounts of pe rsonally identifying information (PII) and mine it in sophisticated databases […]
First_Generation_Laws
1 PRIVACY INVASIVE GEO -MASHUPS: PRIVACY 2.0 AND THE LIMITS OF FIRST GENERATION INFORMATI ON PRIVACY LAWS Mark Burdon † ABSTRACT Online technological advances are pioneering the wider distribution of geospatial information for general mapping purposes. The use of popular web – based applications, such as Google Maps, is ensuring that mapping based applications are […]