-
1
-
-
84873922179
-
Nader v.gen.motors corp
-
767, N.Y.
-
Nader v.Gen.Motors Corp., 255 N.E.2d 765, 767 (N.Y.1970).
-
(1970)
N.E.2d
, vol.255
, pp. 765
-
-
-
3
-
-
84873920796
-
Pearson v.dodd
-
705, D.C.Cir.
-
"Where diere is intrusion, die intruder should generally be liable whatever the content of what he learns." Pearson v.Dodd, 410 F.2d 701, 705 (D.C.Cir.1969).The tort "consists solely of an intendonal interference widi his interest in solitude or seclusion, either as to his person or as to his private affairs or concerns, of a kind that would be highly offensive to a reasonable man."
-
(1969)
F.2d
, vol.410
, pp. 701
-
-
-
4
-
-
0003889357
-
-
Restatement (Second) of Torts § 652B cmt.a (1977)."The intrusion itself makes the defendant subject to liability, even diough there is no publication or other use of any kind of the photograph or information oudined."
-
(1977)
Restatement (Second) of Torts § 652B Cmt.A
-
-
-
5
-
-
84873927293
-
Fletcher v.price chopper foods of trumann, inc
-
876, 8th Cir.
-
See, e.g., Fletcher v.Price Chopper Foods of Trumann, Inc., 220 F.3d 871, 876 (8th Cir.2000) (holding that "unauthorized release of medical information does not constitute highly offensive conduct when diat information could have been obtained by proper means");
-
(2000)
F.3d
, vol.220
, pp. 871
-
-
-
6
-
-
84873936378
-
Remsburg v.docusearch, inc
-
1009, N.H.
-
Remsburg v.Docusearch, Inc., 816 A.2d 1001, 1009 (N.H.2003) (holding that because work address information is "readily observable by members of die public," no cause of action for intrusion upon seclusion can be maintained).These opinions miss die heart of die tort, and are anomalous.Some courts also use die tort of intrusion to address harassing behavior diat fits die tort of intentional infliction of emotional distress better, as when a debt collector makes incessant, hostile phone calls to a person believed to be the debtor.
-
(2003)
A.2d
, vol.816
, pp. 1001
-
-
-
7
-
-
84873890017
-
Norris v.moskin stores, inc
-
323, Ala.
-
See, e.g., Norris v.Moskin Stores, Inc., 132 So.2d 321, 323 (Ala.1961) (recognizing a claim for invasion of privacy based on wrongful intrusion when a creditor takes unreasonable actions to collect on a debt).These, too, are not representative of die tort.Moreover, statutes that outlaw similar behavior (so-called "trespass by telephone" statutes) are on constitutionally infirm ground.
-
(1961)
So.2d
, vol.132
, pp. 321
-
-
-
8
-
-
84873904634
-
People v.pierre-louis
-
*4
-
See, e.g., People v.Pierre-Louis, 2011 N.Y.Slip Op.21254, at *4 (2011) (holding diat repeated calls to a district attorney could not be banned because of the First Amendment's free speech guarantee).
-
(2011)
N.Y.Slip Op.
, vol.2011
, pp. 21254
-
-
-
10
-
-
77955321939
-
Mainstreaming privacy torts
-
1805
-
see also Danielle Keats Citron, MainstreamingPrivacy Torts, 98 Cal.L.Rev.1805, 1805 (2010);
-
(2010)
Cal.L.Rev.
, vol.98
, pp. 1805
-
-
Keats Citron, D.1
-
11
-
-
0347989497
-
Information privacy in cyberspace transactions
-
1231
-
Jerry Kang, Information Privacy in Cyberspace Transactions, 50 Stan.L.Rev.1193, 1231 (1998);
-
(1998)
Stan.L.Rev.
, vol.50
, pp. 1193
-
-
Kang, J.1
-
12
-
-
0347945330
-
Information privacy/information property
-
1304
-
Jessica Litman, Information Privacy/Information Property, 52 Stan.L.Rev.1283, 1304 & n.94 (2000);
-
(2000)
Stan.L.Rev.
, vol.52
, Issue.94
, pp. 1283
-
-
Litman, J.1
-
13
-
-
79953846603
-
Prossers privacy law: A mixed legacy
-
1918
-
Neil M.Richards & Daniel J.Solove, Prossers Privacy Law: A Mixed Legacy, 98 Cal.L.Rev.1887, 1918 (2010);
-
(2010)
Cal.L.Rev.
, vol.98
, pp. 1887
-
-
Richards, N.M.1
Solove, D.J.2
-
14
-
-
0347358112
-
Privacy and democracy in cyberspace
-
1634
-
Paul M.Schwartz, Privacy and Democracy in Cyberspace, 52 Vand.L.Rev.1607, 1634 (1999).
-
(1999)
Vand.L.Rev.
, vol.52
, pp. 1607
-
-
Schwartz, P.M.1
-
15
-
-
2642572012
-
Property, privacy, and personal data
-
2095
-
Paul M.Schwartz, Property, Privacy, and Personal Data, 117 Harv.L.Rev.2055, 2095 (2004).
-
(2004)
Harv.L.Rev.
, vol.117
, pp. 2055
-
-
Schwartz, P.M.1
-
16
-
-
0040458027
-
Restoring americans' privacy in electronic commerce
-
788
-
Joel R.Reidenberg, Restoring Americans' Privacy in Electronic Commerce, 14 Berkeley Tech.LJ.771, 788 (1999).
-
(1999)
Berkeley Tech.LJ.
, vol.14
, pp. 771
-
-
Reidenberg, J.R.1
-
17
-
-
22944455856
-
Reconciling data privacy and the first amendment
-
1165, 1171-72
-
Neil M.Richards, Reconciling Data Privacy and the First Amendment, 52 UCLA L.Rev.1149, 1165, 1171-72 (2005).The First Circuit adopted Richards's strategy, and ruled that prescription data held by a large data aggregator could be regulated for the same reasons that beef jerky can.
-
(2005)
UCLA L.Rev.
, vol.52
, pp. 1149
-
-
Richards, N.M.1
-
18
-
-
84873894145
-
IMS health inc.v.ayotte
-
53, 1st Cir.
-
IMS Health Inc.v.Ayotte, 550 F.3d 42, 53 (1st Cir.2008).
-
(2008)
F.3d
, vol.550
, pp. 42
-
-
-
19
-
-
84866657382
-
The opinion was effectively overruled by the supreme court's decision in sor-rell v.ims health inc
-
The opinion was effectively overruled by the Supreme Court's decision in Sor-rell v.IMS Health Inc., 131 S.Ct.2653 (2011).
-
(2011)
S.Ct.
, vol.131
, pp. 2653
-
-
-
20
-
-
84873912636
-
Commercial privacy bill of rights act of 2011, s.799
-
Commercial Privacy Bill of Rights Act of 2011, S.799, 112th Cong.(2011);
-
(2011)
112th Cong.
-
-
-
21
-
-
84948710470
-
-
Press Release, Feb.23, [hereinafter Consumer Privacy Bill of Rights]
-
Press Release, White House, Fact Sheet: Plan to Protect Privacy in die Internet Age by Adopting a Consumer Privacy Bill of Rights (Feb.23, 2012) [hereinafter Consumer Privacy Bill of Rights], available at http://www. whitehouse.gov/the-press-office/2012/ 02/23/fact-sheet-plan-protect-privacy- internet-age-adoptingonsumer-privacy-b?utm-source=wh.gov&utm-medium= shorturl&utm-campaign=shorturl.
-
(2012)
White House, Fact Sheet: Plan to Protect Privacy in Die Internet Age by Adopting A Consumer Privacy Bill of Rights
-
-
-
22
-
-
0036045758
-
Conceptualizing privacy
-
1151
-
Daniel J.Solove, Conceptualizing Privacy, 90 Cal.L.Rev.1087, 1151 (2002).
-
(2002)
Cal.L.Rev.
, vol.90
, pp. 1087
-
-
Solove, D.J.1
-
23
-
-
33947432567
-
Bringing privacy law out of the closet: A tort theory of liability for intrusions in public places
-
1054
-
Other scholars laud the intrusion tort, though none fully develop it Andrew Jay McClurg touted die virtues of intrusion and gave definition to die aims of die tort, but ultimately gave up on die tort as helpful for any actions taken in public diat are voluntarily revealed.Andrew Jay McClurg, Bringing Privacy Law Out of the Closet: A Tort Theory of Liability for Intrusions in Public Places, 73 N.C.L.Rev.989, 1054 (1995).Lyrissa Lidsky proposes die expansion of die intrusion tort dirough die creation of a newsgadierer's privilege, which could take pressure off courts diat might be reluctant to impose intrusion liability for fear of interfering witii die news media's important functions.
-
(1995)
N.C.L.Rev.
, vol.73
, pp. 989
-
-
Jay McClurg, A.1
-
24
-
-
0042043904
-
Prying spying and lying: Intrusive newsgathering and what the law should do about it
-
173
-
Lyrissa Barnett Lidsky, Prying Spying and Lying: Intrusive Newsgathering and What the Law Should Do About It, 73 Tul.L.Rev.173, 173 (1998).More recendy, in describing die limitations on die tort of public disclosure, Neil Richards has concluded diat "die law should focus on preventing unwanted collections or accumulations of information, radier dian preventing die dissemination of already-collected information" and recommends turning to die tort of intrusion to do so.
-
(1998)
Tul.L.Rev.
, vol.73
, pp. 173
-
-
Barnett Lidsky, L.1
-
25
-
-
84873934624
-
Europe approves new cookie law
-
Nov.11, 11:13 AM
-
Europe is experiencing increasing difficulty enforcing its strict data privacy laws without forcing European websites and devices to adopt needlessly clunky interfaces.Marisa Taylor, Europe Approves New Cookie Law, Wall St.J.(Nov.11, 2009, 11:13 AM), http://blogs.wsj.com/digits/2009/ll/ll/europe- approves-new-cookie-law/?mod=.The European Union is struggling to enact and make sense of the Privacy and Electronic Communications Directive (E-Directive), which requires all European countries to enact laws requiring websites to obtain consent before placing cookies on computer users' machines.Implementation of die Directive has been so difficult that the Information Commissioner's Office in the United Kingdom issued a press release announcing diat enforcement would not begin for another year.
-
(2009)
Wall St.J.
-
-
Taylor, M.1
-
27
-
-
84873917573
-
Cookie law shambles really takes the biscuit
-
May 27, 10:31 AM
-
see also Siobhain Butterworth, Cookie Law Shambles Really Takes the Biscuit, Guardian (May 27, 2011, 10:31 AM) http://www.guardian.co.uk/law/ butterworth-and-bowcott-on-law/2011/may/27/cookie-law-shambles-web-browsers.
-
(2011)
Guardian
-
-
Butterworth, S.1
-
28
-
-
84873927735
-
-
(last visited Sept.11, 2012)
-
Some commentators have criticized the cookie law, arguing that enforcement is bound to be either arbitrary and capricious or a fool's errand.See, e.g., The Stupid EU Cookie Law in 2 '/2 Minutes, http://www.youtube.com/watch?v=ARWJAOjVPAc (last visited Sept.11, 2012).
-
The Stupid EU Cookie Law in 2 '/2 Minutes
-
-
-
29
-
-
0000320829
-
The right to privacy
-
Samuel D.Warren & Louis D.Brandeis, The Right to Privacy, 4 Harv.L.Rev.193 (1890) (arguing that the common law allowed for a general right to privacy).
-
(1890)
Harv.L.Rev.
, vol.4
, pp. 193
-
-
Warren, S.D.1
Brandeis, L.D.2
-
30
-
-
84873906406
-
-
[hereinafter HEW Report]
-
The HEW Report, drafted in 1973 and heralded as the seminal source of fair information practices, has a subsection titled "Too Much Data." U.S.Dept.of Health, Educ.& Welfare, Records, Computers and the Rights of Citizens 13 (1973) [hereinafter HEW Report].
-
(1973)
The HEW Report, Drafted in 1973 and Heralded As the Seminal Source of Fair Information Practices, Has A Subsection Titled "too Much Data." U.S.Dept.of Health, Educ.& Welfare, Records, Computers and the Rights of Citizens
, pp. 13
-
-
-
31
-
-
79953138427
-
The boundaries of privacy harm
-
9
-
See M.Ryan Calo, The Boundaries of Privacy Harm, 86 Ind.LJ.1, 9 n.41 (2011);
-
(2011)
Ind.LJ.
, vol.86
, Issue.41
, pp. 1
-
-
Ryan Calo, M.1
-
32
-
-
78751541477
-
Mapping online privacy
-
482-84
-
see also Jacqueline D.Lipton, Mapping Online Privacy, 104 Nw.U.L.Rev.477, 482-84 (2010) (acknowledging that many privacy responses, including the European Union's Data Protection Directive are ill equipped to respond to privacy issues inherent to user-generated Web content);
-
(2010)
Nw.U.L.Rev.
, vol.104
, pp. 477
-
-
Lipton, J.D.1
-
33
-
-
84978045500
-
Privacy and utility in data sets
-
forthcoming
-
Felix T.Wu, Privacy and Utility in Data Sets, 84 U.Colo.L.Rev (forthcoming 2013).
-
(2013)
U.Colo.L.Rev
, vol.84
-
-
Wu, F.T.1
-
34
-
-
0347315060
-
Freedom of speech and information privacy: The troubling implications of a right to stop people from speaking about you
-
See generally Eugene Volokh, Freedom of Speech and Information Privacy: The Troubling Implications of a Right to Stop People from Speaking About You, 52 Stan.L.Rev.1049 (2000) (arguing that broad information privacy rules are not easily defensible under existing free speech law).
-
(2000)
Stan.L.Rev.
, vol.52
, pp. 1049
-
-
Volokh, E.1
-
36
-
-
84923486508
-
Privacy and the limits of law
-
423
-
Ruth Gavison, Privacy and the Limits of Law, 89 Yale LJ.421, 423 (1980).
-
(1980)
Yale LJ.
, vol.89
, pp. 421
-
-
Gavison, R.1
-
37
-
-
0003187764
-
Directive 95/46/ec, of the european parliament and of die council of 24 october 1995 on die protecdon of individuals widi regard to die processing of personal data and on the free movement of such data, art.13(2)
-
42 (last visited Oct.11, 2012) [hereinafter EU Data Protection Directive]
-
This matches the European Union Data Protection Directive, which imposes limitations when data is "used for taking measures or decisions regarding any particular individual." Directive 95/46/EC, of the European Parliament and of die Council of 24 October 1995 on die Protecdon of Individuals widi Regard to die Processing of Personal Data and on the Free Movement of Such Data, art.13(2), 1995 OJ.(L 281) 31, 42, available at http://eur-lex.europa.eu/ LexUriServ/LexUriServ.do?uri=CELEX:31995L0046:en:HTML (last visited Oct.11, 2012) [hereinafter EU Data Protection Directive].
-
OJ.(L 281)
, vol.1995
, pp. 31
-
-
-
38
-
-
6744224366
-
-
18 U.S.C.§§ 2510-2522 (2006).
-
(2006)
U.S.C.
, vol.18
, pp. 2510-2522
-
-
-
40
-
-
84873893767
-
Pub.l.no.104-191
-
Pub.L.No.104-191, 110 Stat.1936
-
Stat.
, vol.110
, pp. 1936
-
-
-
41
-
-
84873934995
-
-
codified as amended in scattered sections of 18, 26, 29, and 42 U.S.C
-
codified as amended in scattered sections of 18, 26, 29, and 42 U.S.C.
-
-
-
-
42
-
-
84873914858
-
Pub.l.no.101-336
-
(codified in scattered sections of 42 U.S.C)
-
Pub.L.No.101-336,104 Stat.327 (codified in scattered sections of 42 U.S.C).
-
Stat.
, vol.104
, pp. 327
-
-
-
43
-
-
33644925852
-
A taxonomy of privacy
-
491-99
-
Daniel Solove's taxonomy of privacy problems can map direcdy onto these four stages.Surveillance (clandesdne observation), idendficadon, and fruitful interrogations occur at die "observation" stage.Daniel J.Solove, A Taxonomy of Privacy, 154 U.Pa.L.Rev.477, 491-99 (2006) (explaining that "idendficadon" is die attachment of an identity to a previously anonymous piece of information, so it allows an observadon about the identified person for the first time, even if die information were already observed in anonymized form).Aggregation occurs at die "capture" stage since die stage includes the presumed indefinite storage of a record.
-
(2006)
U.Pa.L.Rev.
, vol.154
, pp. 477
-
-
Solove, D.J.1
-
45
-
-
32844467792
-
Privacy in atlantis
-
232
-
Jerry Kang & Benedikt Buchner, Privacy in Atlantis, 18 Harv.J.L.& Tech.229, 232 (2004) (indicating that die property right approach would result in personal data being exchanged dirough free market interactions).
-
(2004)
Harv.J.L.& Tech.
, vol.18
, pp. 229
-
-
Buchner, K.J.B.1
-
46
-
-
0347684347
-
The death of privacy?
-
1461
-
A.Michael Froomkin, The Death of Privacy?, 52 Stan.L.Rev.1461,1461 (2000);
-
(2000)
Stan.L.Rev.
, vol.52
, pp. 1461
-
-
Michael Froomkin, A.1
-
47
-
-
0010060393
-
Fair information practices and the architecture of privacy (what larry doesn't get)
-
33
-
Marc Roten-berg, Fair Information Practices and the Architecture of Privacy (What Larry Doesn't Get), 2001 Stan.Tech.L.Rev.1, 33 (2001) (noting the effort to protect an individual's privacy);
-
(2001)
Stan.Tech.L.Rev.
, vol.2001
, pp. 1
-
-
Roten-Berg, M.1
-
48
-
-
84902583614
-
Proposal for a regulation of the european parliament and of the council on the protection of individuals with regard to die processing of personal data and on die free movement of such data, at 9
-
56 draft (Nov.29, 2011)
-
Proposal for a Regulation of the European Parliament and of the Council on the Protection of Individuals with Regard to die Processing of Personal Data and on die Free Movement of Such Data, at 9, COM (2012) 56 draft (Nov.29, 2011).
-
(2012)
COM
-
-
-
49
-
-
0000839286
-
Privacy
-
See generally William L.Prosser, Privacy, 48 Cal.L.Rev.383 (1960) (describing four types of privacy invasion);
-
(1960)
Cal.L.Rev.
, vol.48
, pp. 383
-
-
Prosser, W.L.1
-
50
-
-
0346089944
-
Property rights in personal information: An economic defense of privacy
-
2397
-
Richard S.Murphy, Property Rights in Personal Information: An Economic Defense of Privacy, 84 Geo.L.Rev.2381, 2397 (1996);
-
(1996)
Geo.L.Rev.
, vol.84
, pp. 2381
-
-
Murphy, R.S.1
-
51
-
-
70350006050
-
-
Daniel Solove, The Future of Reputation 122-29 (2007) (arguing that tort law continues to play an important role as a deterrent for individuals who spread rumors or spill secrets);
-
(2007)
The Future of Reputation
, pp. 122-129
-
-
Solove, D.1
-
52
-
-
71649091450
-
Recasting privacy torts in a spaceless world
-
Patricia Sanchez Abril, Recasting Privacy Torts in a Spaceless World, 21 Harv.J.L.& Tech.1 (2007) (reconstructing the tort of public disclosure to avoid the "scattershot" nature of existing precedent).
-
(2007)
Harv.J.L.& Tech.
, vol.21
, pp. 1
-
-
Sanchez Abril, P.1
-
53
-
-
84873915723
-
-
Bernard Williams ed., Josefine Nauckoff trans., Cambridge Univ.Press, (1887).
-
citing Friedrich Nietzsche, The Gay Science 194-95 (Bernard Williams ed., Josefine Nauckoff trans., Cambridge Univ.Press 2001) (1887).
-
(2001)
The Gay Science
, pp. 194-195
-
-
Nietzsche, F.1
-
54
-
-
56249120918
-
-
Ian Ayres, Super Crunchers 197 (2007) (citing studies diat found most people were willing to disclose their social security numbers in exchange for fifty-cent-off coupons);
-
(2007)
Super Crunchers
, pp. 197
-
-
Ayres, I.1
-
55
-
-
84873908870
-
The privacy hoax
-
Oct.14
-
Eric Goldman, The Privacy Hoax, Forbes, Oct.14, 2002, at 42, available at http://www.forbes.com/forbes/2002/1014/042.html.But as with real property, a right to information property would allow some Americans to be data holdouts.
-
(2002)
Forbes
, pp. 42
-
-
Goldman, E.1
-
56
-
-
79953718623
-
-
FTC Staff Rep.
-
See FTC Staff Rep., Protecting Consumer Privacy in an Era of Rapid Change 6-7 (2010), available at http://www.ftc.gov/os/2010/12/101201privacy report.pdf.This is particularly odd since the Federal Trade Commission's consumer protection duties requires the FTC and the plaintiffs' bar to detect fraud and identify likely victims, both of which are improbable without the aid of data.
-
(2010)
Protecting Consumer Privacy in An Era of Rapid Change
, pp. 6-7
-
-
-
58
-
-
84900676432
-
-
Press Release, July 21
-
see also Press Release, Fed.Trade Comm'n, FTC Announces Settlement with Bankrupt Website, Toysmart.com, Regarding Alleged Privacy Policy Violations (July 21, 2000), available at http://www.ftc.gov/opa/2000/07/ toysmart2.shtm.
-
(2000)
Fed.Trade comm'N, FTC Announces Settlement with Bankrupt Website, Toysmart.com, Regarding Alleged Privacy Policy Violations
-
-
-
59
-
-
22744437687
-
The two western cultures of privacy: Dignity versus liberty
-
1155-60
-
James Q.Whitman, The Two Western Cultures of Privacy: Dignity Versus Liberty, 113 Yale L.J.1151, 1155-60 (2004).
-
(2004)
Yale L.J.
, vol.113
, pp. 1151
-
-
Whitman, J.Q.1
-
60
-
-
0004001507
-
-
The inherent value of information is expressed by the influential writings by John Stuart Mill: Wrong opinions and practices gradually yield to fact and argument: but facts and arguments, to produce any effect on the mind, must be brought before it.Very few facts are able to tell their own story, without comments to bring out their meaning.The whole strength and value, then, of human judgment, depending on the one property, that it can be set right when it is wrong, reliance can be placed on it only when the means of setting it right are kept constantly at hand.John Stuart Mill, On Liberty 39 (1869).
-
(1869)
On Liberty
, pp. 39
-
-
Stuart Mill, J.1
-
61
-
-
84873936584
-
Google could have caught swine flu early
-
Apr.29, 3:40 PM
-
Internet search terms can reveal epidemiological trends faster than die Center for Disease Control.See Alexis Madrigal, Google Could Have Caught Swine Flu Early, Wired (Apr.29, 2009, 3:40 PM), http://www.wired.com/wiredscience/ 2009/04/google-could-have-caught-swine-flu-early;
-
(2009)
Wired
-
-
Madrigal, A.1
-
62
-
-
84873883809
-
Google flu trends do not match cdc data
-
May 17, 9:15 AM
-
Melinda Wenner, Google Flu Trends Do Not Match CDC Data, Popular Mechanics (May 17, 2010, 9:15 AM), http://www.popularmechanics.com/science/ health/med-tech/google-flu-trends-cdc-data.The flu can infect an area without causing the fever and respiratory problems that are typically Googled.What Google Flu Trends tracks is better understood as tracking flu-like symptoms rather than actual confirmed influenza outbreaks.
-
(2010)
Popular Mechanics
-
-
Wenner, M.1
-
63
-
-
84873930897
-
Sending the police before there's a crime
-
Aug.15
-
Backlogs of crime victim reports and odier data have allowed experimental law enforcement programs to use analytics to predict more accurately where larceny and other crimes are most likely to happen and when.The most cutting-edge programs can provide predictions as focused as a one square-block area.See Erica Goode, Sending the Police Before There's a Crime, N.Y.Times, Aug.15, 2011, at All, available at hup://www.nytimes.com/2011/08/16/us/16police. html.
-
(2011)
N.Y.Times
-
-
Goode, E.1
-
64
-
-
84873925233
-
Baseball set for data deluge as player monitoring goes hi-tech
-
Mar.31, 5:00 PM
-
Baseball, which has rewarded fans and team owners who have the patience and aptitude for statistics, is about to undergo another data renaissance with the help of a new technology called Fieldf/x, which records every single motion of each player at every game.If it works as promised, the corrective statistics made popular by MoneybaU may prove to be completely outmoded.Also, baseball's league awards and pay structure might become one of the most meritocratic systems known to exist.Ira Boudway, Baseball Set for Data Deluge as Player Monitoring Goes Hi-Tech, Bloomberg (Mar.31, 2011, 5:00 PM), http://www. bloomberg.com/news/2011-03-31/baseball-is-set-for-deluge-in-data-as-monitoring- of-players-goes-hi-tech.html.
-
(2011)
Bloomberg
-
-
Boudway, I.1
-
65
-
-
84873935875
-
Obama mines for voters with high-tech tools
-
Mar.8
-
See Jim Rutenberg & Jeff Zeleny, Obama Mines for Voters with High-Tech Tools, N.Y.Times, Mar.8, 2012, at Al, available at http://www.nytimes.com/2012/03/08/us/politics/obamaampaigns-vast-effort-to-re- enlist-08-supporters.html?pagewanted= all.
-
(2012)
N.Y.Times
-
-
Zeleny, R.J.J.1
-
66
-
-
84866657382
-
Sorrell v.ims health, inc
-
2667
-
Sorrell v.IMS Health, Inc., 131 S.Ct.2653, 2667 (2011) ("Facts, after all, are the beginning point for much of the speech that is most essential to advance human knowledge and to conduct human affairs.There is thus a strong argument that pre-scriber-identifying information is speech for First Amendment purposes.").Lawrence Lessig and Neil Richards have argued diat personal data is not "expression" and dierefore should not be the basis for First Amendment protection.
-
(2011)
S.Ct.
, vol.131
, pp. 2653
-
-
-
67
-
-
84857169059
-
Orwell's armchair
-
forthcoming
-
Derek E.Bambauer, Orwell's Armchair, 79 U.Chi.L.Rev.(forthcoming 2012).Moreover, a test diat assigns less protection to expressions diat have a higher proportion of dry factual information puts undue emphasis on die proportion of an expression diat is made from opinion and point-of-view.
-
(2012)
U.Chi.L.Rev.
, vol.79
-
-
Bambauer, D.E.1
-
68
-
-
84871740218
-
Bartnicki v.vopper
-
527-28
-
See Bartnicki v.Vopper, 532 U.S.514, 527-28 (2001).
-
(2001)
U.S.
, vol.532
, pp. 514
-
-
-
69
-
-
79953853136
-
Warren and brandeis redux: Finding (more) privacy protection in intellectual property lore
-
14-23
-
Rochelle Cooper Dreyfuss, Warren and Brandeis Redux: Finding (More) Privacy Protection in Intellectual Property Lore, 1999 Stan.Tech.L.Rev.8, 14-23 (1999);
-
(1999)
Stan.Tech.L.Rev.
, vol.1999
, pp. 8
-
-
Cooper Dreyfuss, R.1
-
70
-
-
0039790776
-
Information as speech, information as goods: Some thoughts on marketplaces and the bill of rights
-
717
-
Diane Leenheer Zimmerman, Information As Speech, Information As Goods: Some Thoughts On Marketplaces and the Bill of Rights, 33 Wm.fe Mary L.Rev.665, 717 (1992) (discussing the effect the right of publicity has on speech).Right of publicity claims are often lumped under the banner' of "misappropriation. " I distinguish for die purposes of this Article between die tort claim of misappropriation, which protects ordinary people from receiving unwanted and unconsented exposure when dieir images or names are used to sell commercial products, from intellectual property claims for the right of publicity, which are concerned widi die commercial mining and exploitation of celebrity's fame widiout die celebrity's permission.
-
(1992)
Wm.Fe Mary L.Rev.
, vol.33
, pp. 665
-
-
Leenheer Zimmerman, D.1
-
71
-
-
84873893229
-
Carson v.here's fohnny portable toilets, inc
-
836, 6di Cir.
-
For the contrast, see, for example, Carson v.Here's fohnny Portable Toilets, Inc., 698 F.2d 831, 836 (6di Cir.1983) (permitting recovery when Johnny Carson's celebrity was exploited to market port-a-potties).
-
(1983)
F.2d
, vol.698
, pp. 831
-
-
-
72
-
-
84873900146
-
Parks v.laface records
-
441, 6th Cir.
-
Parks v.LaFace Records, 329 F.3d 437, 441 (6th Cir.2003).
-
(2003)
F.3d
, vol.329
, pp. 437
-
-
-
73
-
-
33847388923
-
Eldred v.ashcroft
-
205-06, 214-15
-
see also Eldred v.Ashcroft, 537 U.S.186, 205-06, 214-15 (2003);
-
(2003)
U.S.
, vol.537
, pp. 186
-
-
-
74
-
-
22844448277
-
Diamond v.chakrabarty
-
307
-
Diamond v.Chakrabarty, 447 U.S.303, 307 (1980).
-
(1980)
U.S.
, vol.447
, pp. 303
-
-
-
75
-
-
84873893114
-
-
Under a labor desert theory, it is very likely the data aggregator who will be seen to invest effort in creating a usable and probative set of personal information since personal information is only as valuable as its data quality.To understand the effort required to create and maintain usable data, see Thomas C.Redman, Data Driven 53-86 (2008).
-
(2008)
Data Driven
, pp. 53-86
-
-
Redman, T.C.1
-
76
-
-
84864066009
-
Int'l news.serv.v.associated press
-
216
-
See Int'l News.Serv.v.Associated Press, 248 U.S.215, 216 (1918).But again, this exception rests on a labor desert theory that aims to reward the production of information.
-
(1918)
U.S.
, vol.248
, pp. 215
-
-
-
77
-
-
4143088681
-
-
see also Lawrence Lessig, Free Culture 10 (2004) (arguing that the change in creative property laws aimed at eliminating piracy can also eliminate "our culture of values");
-
(2004)
Free Culture
, pp. 10
-
-
Lessig, L.1
-
78
-
-
84873935082
-
The staff attorney for the electronic frontier foundation, proposes a statute requiring consent to be obtained before de-identified data can be released.natasha singer, data privacy, put to the test
-
May 1
-
Lee Tien, the staff attorney for the Electronic Frontier Foundation, proposes a statute requiring consent to be obtained before de-identified data can be released.Natasha Singer, Data Privacy, Put to the Test, N.Y.Times, May 1, 2011, at BU3, available at http://www.nytimes.com/2011/05/01/business/01stream. html.
-
(2011)
N.Y.Times
-
-
Tien, L.1
-
79
-
-
84873927495
-
The birth of the gerrymander
-
Sept.
-
The Birth of the Gerrymander, Mass.Hist.Soc.(Sept.2008), http://www.masshist.org/objects/2008september.cfm.
-
(2008)
Mass.Hist.Soc.
-
-
-
81
-
-
84897688723
-
Solomonic bargaining: Dividing a iuegal entitlement to facilitate coasean trade
-
1031-32
-
Ian Ayres & Eric Talley, Solomonic Bargaining: Dividing a Iuegal Entitlement to Facilitate Coasean Trade, 104 Yale L.J.1027, 1031-32 (1995).
-
(1995)
Yale L.J.
, vol.104
, pp. 1027
-
-
Talley, A.I.E.1
-
82
-
-
0003774434
-
-
5th ed.
-
Much of this example is borrowed from Richard Posner.Richard Posner, Economic Analysis of Law 37-38 (5th ed.1998).
-
(1998)
Economic Analysis of Law
, pp. 37-38
-
-
Posner, R.1
-
83
-
-
84925971879
-
The economics of privacy
-
406
-
This example is similar to Richard Posner's example of the sexually abusive school teacher.Richard Posner, The Economics of Privacy, 71 Am.Econ.Rev.405, 406 (1981).
-
(1981)
Am.Econ.Rev.
, vol.71
, pp. 405
-
-
Posner, R.1
-
84
-
-
84873898274
-
(Name here) is a liar and a cheat
-
Feb.16
-
Lizette Alvarez, (Name Here) Is a Liar and a Cheat, N.Y.Times, Feb.16, 2006, at Gl, available at http://www.nytimes.com/2006/02/16/fashion/ diursdaystyles/16WEB.html?pagewanted=all.
-
(2006)
N.Y.Times
-
-
Alvarez, L.1
-
85
-
-
33748591184
-
Monongahela nav.co.v.united states
-
326-27
-
Moreover, sometimes property rights are extinguished.Eminent domain provides relief when hold-outs are judged to be counter-productive.See Monongahela Nav.Co.v.United States, 148 U.S.312, 326-27 (1893);
-
(1893)
U.S.
, vol.148
, pp. 312
-
-
-
86
-
-
84898893853
-
Some seeing crimson at harvard's 'land grab
-
Jun.17
-
see also Sam Rimer, Some Seeing Crimson at Harvard's 'Land Grab, 'N.Y.Times, Jun.17, 1997, at A16, available at http://www.nytimes.com/1997/06/ 17/us/some-seeing-crimson-at-harvard-land-grab.html.
-
(1997)
'N.y.Times
-
-
Rimer, S.1
-
87
-
-
84866657523
-
Sipple v.chronicle publ'g co
-
Ct.App.
-
Sipple v.Chronicle Publ'g Co., 201 Cal.Rptr.665 (Ct.App.1984).
-
(1984)
Cal.Rptr.
, vol.201
, pp. 665
-
-
-
88
-
-
84873922710
-
Private lives
-
Feb.13, 1
-
Dan Morain, Private Lives, L.A.Times, Feb.13, 1989, § 5, at 1, available at http://articles.latimes.com/1989-02-13/news/vw-1568-l-gay-big-deal: jeiTy-ford.
-
(1989)
L.A.Times
, pp. 5
-
-
Morain, D.1
-
90
-
-
0001609162
-
Property rules, liability rules, and inalienability: One view of the cathedral
-
1122
-
If not, providing Sipple with an entitlement of any sort (let alone a property right) would not be economically efficient.Guido Calabresi & A.Douglas Melamed, Property Rules, Liability Rules, and Inalienability: One View of the Cathedral, 85 Harv.L.Rev.1089, 1122 (1972).Speculation about the value of personal information also suffers from the problem of assessment costs.
-
(1972)
Harv.L.Rev.
, vol.85
, pp. 1089
-
-
Douglas C.G.Melamed, A.1
-
91
-
-
85029548038
-
Thornhill v.alabama
-
102
-
Thornhill v.Alabama, 310 U.S.88, 102 (1940).
-
(1940)
U.S.
, vol.310
, pp. 88
-
-
-
92
-
-
0042421849
-
Fairness versus welfare
-
977
-
This is the basic welfare economics model.Louis Kaplow & Steven Shavell, Fairness Versus Welfare, 114 Harv.L.Rev.961, 977 (2001).Paul Ohm, too, uses a utilitarian model and advises regulators to compare the risks of unfettered information flow to its likely costs in privacy.
-
(2001)
Harv.L.Rev.
, vol.114
, pp. 961
-
-
Shavell, K.L.S.1
-
93
-
-
77957594024
-
Broken promises of privacy: Responding to the surprising failure of anonymization
-
1768
-
Paul Ohm, Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization, 57 UCLA L.Rev.1701, 1768 (2010).Note that this model is flexible as to what types of "harm" are accounted.Thus, it is not necessary to come up with one unifying theory of what constitutes a privacy harm.I tend to agree with Daniel Solove that diis is a futile task.
-
(2010)
UCLA L.Rev.
, vol.57
, pp. 1701
-
-
Ohm, P.1
-
95
-
-
77956223243
-
George's behavior is a criminal violation of the federal computer fraud and abuse act
-
George's behavior is a criminal violation of the federal Computer Fraud and Abuse Act, 18 U.S.C.§ 1030 (2006).A Michigan resident is facing a possible five year sentence for using his wife's password to log into her Gmail account, in violation of Michigan state anti-hacking law.
-
(2006)
U.S.C.
, vol.18
, pp. 1030
-
-
-
96
-
-
84873925904
-
Clara walker: Leon walker "violated my privacy
-
Jan.5, 4:14 PM
-
Sara Wilson, Clara Walker: Leon Walker "Violated My Privacy,'Huffington Post (Jan.5, 2011, 4:14 PM), http://www.huffingtonpost.com/ 2011/01/05/clara-walker-leon-walker-n-804924.html.
-
(2011)
'Huffington Post
-
-
Wilson, S.1
-
97
-
-
0347140048
-
How to make a new tort: Three paradoxes
-
1544-47
-
Anita Bernstein, How to Make a New Tort: Three Paradoxes, 75 Tex.L.Rev.1539, 1544-47 (1997).
-
(1997)
Tex.L.Rev.
, vol.75
, pp. 1539
-
-
Bernstein, A.1
-
98
-
-
84873926433
-
Van alstyne v.rochester tel.corp
-
730-31, App.Div.
-
See, e.g., Van Alstyne v.Rochester Tel.Corp., 296 N.Y.S.726, 730-31 (App.Div.1937) (imposing liability for the poisoning of two dogs when telephone company trespassed by leaving small bits of cable insulation containing lead, which were then consumed by the dogs).
-
(1937)
N.Y.S.
, vol.296
, pp. 726
-
-
-
99
-
-
84863545760
-
Wiretap law needs update
-
June 1
-
David Rutgers, Wiretap Law Needs Update, Balt.SuN.June 1, 2010, at A13, available at http://articles.baltimoresun.com/2010-06-01/news/bs-ed-maryland- wiretap)-ping-20100601-l-wiretapping-search-warrant-mr-graber;
-
(2010)
Balt.SuN.
-
-
Rutgers, D.1
-
100
-
-
84873924273
-
The mythical right to obscurity: A pragmatic defense of no privacy in public
-
forthcoming
-
Heidi Reamer Anderson, The Mythical Right to Obscurity: A Pragmatic Defense of No Privacy in Public, 7 ISJLP (forthcoming 2012), available at http://papers.ssrn.com/sol3/papers.cfm?abstract-id=175 9374.
-
(2012)
ISJLP
, vol.7
-
-
Reamer Anderson, H.1
-
101
-
-
84873900455
-
De may v.roberts
-
Mich.
-
SeeDe May v.Roberts, 9 N.W.146 (Mich.1881) (presenting the factual basis of this example);
-
(1881)
N.W.
, vol.9
, pp. 146
-
-
-
102
-
-
84873897014
-
Sanchez-scott v.aha pharmaceuticals
-
see also Sanchez-Scott v.Aha Pharmaceuticals, 86 Cal.App.4th 365 (2001), in which a pharmaceutical sales representative intruded on a patient's seclusion when he observed a breast examination because the patient's consent to his presence was predicated on the false assurance that the sales representative was a doctor.
-
(2001)
Cal.App.4th
, vol.86
, pp. 365
-
-
-
104
-
-
0347376771
-
The fundamental role of privacy and confidence in the network
-
Joel R.Reidenberg & Francoise Garnet-Pol, The Fundamental Role of Privacy and Confidence in the Network, 30 Wake Forest L.Rev.105 (1995) (arguing that privacy on the internet is necessary in order to promote trust and exploration);
-
(1995)
Wake Forest L.Rev.
, vol.30
, pp. 105
-
-
Reidenberg, J.R.1
Garnet-Pol, F.2
-
105
-
-
0347315050
-
Examined lives: Informational privacy and the subject as object
-
1377
-
Julie E.Cohen, Examined Lives: Informational Privacy and the Subject as Object, 52 Stan.L.Rev.1373, 1377 (2000).
-
(2000)
Stan.L.Rev.
, vol.52
, pp. 1373
-
-
Cohen, J.E.1
-
107
-
-
84873922179
-
Nader v.gen.motors corp.
-
768, N.Y.
-
Nader v.Gen.Motors Corp., 255 N.E.2d 765, 768 (N.Y.1970).
-
(1970)
N.E.2d
, vol.255
, pp. 765
-
-
-
108
-
-
84873900628
-
Barber v.time inc.
-
Mo.
-
Barber v.Time Inc., 159 S.W.2d 291 (Mo.1942) (imposing liability and punitive damages on Time Magazine for taking and publishing a photograph of a patient with a rare physical ailment after she explicidy denied consent).
-
(1942)
S.W.2d
, vol.159
, pp. 291
-
-
-
109
-
-
6744224366
-
-
18 U.S.C.§§ 2510-2522 (2006).
-
(2006)
U.S.C.
, vol.18
, pp. 2510-2522
-
-
-
110
-
-
84873907417
-
Op-ed., why we need the tabloids
-
July 20
-
Ryan Linkof elegandy makes diis point in a recent op-ed in die New York Times.Watching die painfully choreographed, and highly policed, red-carpet arrival of Prince William and Kate Middleton at a recent Los Angeles polo match reminded me why intrusive journalistic tactics are often called upon.They exist to break down die barriers of access that keep social elites at a remove from ordinary people.The tabloids, throughout history, on both sides of the Atlantic, have been predicated on chipping away at that division.They play a fundamental role in democratic cultures, especially in societies characterized by the pull between the demands of a mass society and the persistence of social and economic inequality.Ryan Linkof, Op-Ed., Why We Need the Tabloids, N.Y.Times, July 20, 2011, at A27, available at http://www.nytimes.com/2011/07/20/opinion/201inkof. html?-r=0.
-
(2011)
N.Y.Times
-
-
Linkof, R.1
-
111
-
-
84873915425
-
Op-ed., john edwards indictment a vindication for national enquirer
-
June 3
-
Emily Miller, Op-Ed., John Edwards Indictment a Vindication for National Enquirer, Wash.Times, June 3, 2011.http://www.washingtontimes.com/news/2011/jun/ 3/millerjohn-edwards-indictment-vindication-nationa/.
-
(2011)
Wash.Times
-
-
Miller, E.1
-
112
-
-
84873923387
-
Helton v.united states
-
D.D.C.
-
Helton v.United States, 191 F.Supp.2d 179 (D.D.C.2002).
-
(2002)
F.Supp.2d
, vol.191
, pp. 179
-
-
-
113
-
-
84873891048
-
DeBlasio v.pignoli
-
825, Pa.Commw.Ct.
-
DeBlasio v.Pignoli, 918 A.2d 822, 825 (Pa.Commw.Ct.2007).
-
(2007)
A.2d
, vol.918
, pp. 822
-
-
-
114
-
-
84873927085
-
Kjerstad v.ravellette publ'ns, inc.
-
422-23, S.D.
-
Kjerstad v.Ravellette Publ'ns, Inc., 517 N.W.2d 419, 422-23 (S.D.1994).
-
(1994)
N.W.2d
, vol.517
, pp. 419
-
-
-
115
-
-
84873901420
-
Hougum v.valley mem'l homes
-
818, N.D.
-
Hougum v.Valley Mem'l Homes, 574 N.W.2d 812, 818 (N.D.1998).
-
(1998)
N.W.2d
, vol.574
, pp. 812
-
-
-
116
-
-
77949751892
-
In re marriage of tigges
-
827, Iowa
-
In re Marriage of Tigges, 758 N.W.2d 824, 827 (Iowa 2008).
-
(2008)
N.W.2d
, vol.758
, pp. 824
-
-
-
117
-
-
77949725745
-
Shulman v.group w prods., inc.
-
491, Cal.
-
The quiet conversation between the accident victim and the doctor that came to the scene is afforded seclusion, because the conversation might have been heard only with die help of microphones.Shulman v.Group W Prods., Inc., 955 P.2d 469, 491 (Cal.1998).
-
(1998)
P.2d
, vol.955
, pp. 469
-
-
-
118
-
-
84873926659
-
Kramer v.downey
-
Tex.App.
-
The Nader line of reasoning has been followed in other jurisdictions as well.Kramer v.Downey, 680 S.W.2d 524 (Tex.App.1984) (holding that incessant observation by a scorned ex-lover, even though she stayed on public property to do so, was an intrusion upon seclusion justifying a jury damages award).
-
(1984)
S.W.2d
, vol.680
, pp. 524
-
-
-
119
-
-
84873925913
-
Nader v.gen.motors corp.
-
570-71, N.Y.
-
Nader v.Gen.Motors Corp., 255 N.E.2d 560, 570-71 (N.Y.1970).
-
(1970)
N.E.2d
, vol.255
, pp. 560
-
-
-
120
-
-
84873919558
-
Zimmerman v.wilson
-
3d Cir.
-
Zimmerman v.Wilson, 81 F.2d 847 (3d Cir.1936);
-
(1936)
F.2d
, vol.81
, pp. 847
-
-
-
121
-
-
84873897967
-
State ex rel.clemens v.witthaus
-
Mo., (en banc)
-
State ex rel.Clemens v.Witthaus, 228 S.W.2d 4 (Mo.1950) (en banc);
-
(1950)
S.W.2d
, vol.228
, pp. 4
-
-
-
122
-
-
84873936774
-
Frey v.dixon
-
N.J.Ch.
-
Frey v.Dixon, 58 A.2d 86 (N.J.Ch.1948);
-
(1948)
A.2d
, vol.58
, pp. 86
-
-
-
123
-
-
84873899315
-
Bednarik v.bednarik
-
N.J.Ch.
-
Bednarik v.Bednarik, 16 A.2d 80 (N.J.Ch.1940);
-
(1940)
A.2d
, vol.16
, pp. 80
-
-
-
124
-
-
84873888289
-
Brex v.smith
-
N.J.Ch.
-
Brex v.Smith, 146 A.34 (N.J.Ch.1929).
-
(1929)
A.
, vol.146
, pp. 34
-
-
-
127
-
-
84863550350
-
Kelly v.borough of carlisle
-
3d Cir.
-
See Kelly v.Borough of Carlisle, 622 F.3d 248 (3d Cir.2010);
-
(2010)
F.3d
, vol.622
, pp. 248
-
-
-
128
-
-
84873895610
-
Pomykacz v.borough of w.wildwood
-
513, D.NJ.
-
Pomykacz v.Borough of W.Wildwood, 438 F.Supp.2d 504, 513 n.14 (D.NJ.2006) ("An argument can be made that the act of photographing, in the abstract, is not sufficiendy expressive or communicative and therefore not within die scope of First Amendment protection-even when the subject of die photography is a public servant."
-
(2006)
F.Supp.2d
, vol.438
, Issue.14
, pp. 504
-
-
-
129
-
-
84873915641
-
Tenafly eruv ass'n, inc.v.borough of tenafly
-
160, 3d Cir.
-
citing Tenafly Eruv Ass'n, Inc.v.Borough of Tenafly, 309 F.3d 144,160 (3d Cir.2002))
-
(2002)
F.3d
, vol.309
, pp. 144
-
-
-
130
-
-
0041625701
-
Protecting investigative journalism
-
1146
-
C.Thomas Dienes, Protecting Investigative Journalism, 67 Geo.Wash.L.Rev.1139, 1146 (1999).
-
(1999)
Geo.Wash.L.Rev.
, vol.67
, pp. 1139
-
-
Thomas Dienes, C.1
-
131
-
-
84873906674
-
Sorrell v.ims health inc.
-
2667
-
Perhaps in light of Justice Kennedy's reasoning in Sorrell v.IMS, the right to mechanical capture can be tested again.Sorrell v.IMS Health Inc., 131 S.Ct.2653, 2667 (2011) ("Facts, after all, are the beginning point for much of the speech that is most essential to advance human knowledge and to conduct human affairs.There is dius a strong argument diat prescriber-identifying information is speech for First Amendment purposes.").
-
(2011)
S.Ct.
, vol.131
, pp. 2653
-
-
-
132
-
-
84893412598
-
-
249, 9th Cir.
-
Dietemann v.Time, Inc., 449 F.2d 245, 249 (9th Cir.1971) (internal quotation marks omitted);
-
(1971)
Dietemann Time v. Inc
, vol.449
, pp. 245
-
-
-
133
-
-
77949725745
-
Shulman v.group w prods., inc.
-
495, Cal.
-
Shulman v.Group W Prods., Inc., 955 P.2d 469, 495 (Cal.1998) (internal quotation marks omitted);
-
(1998)
P.2d
, vol.955
, pp. 469
-
-
-
134
-
-
84873933099
-
Shevin v.sunbeam television corp.
-
727, Fla.
-
Shevin v.Sunbeam Television Corp., 351 So.2d 723, 727 (Fla.1977).
-
(1977)
So.2d
, vol.351
, pp. 723
-
-
-
135
-
-
79751513581
-
Pervasive image capture and the first amendment: Memory, discourse, and the right to record
-
337
-
Seth Kreimer makes a powerful case for First Amendment protection of image capture.Sedi F.Kreimer, Pervasive Image Capture and the First Amendment: Memory, Discourse, and the Right to Record, 159 U.Pa.L.Rev.335, 337 (2011).
-
(2011)
U.Pa.L.Rev.
, vol.159
, pp. 335
-
-
Kreimer, S.F.1
-
136
-
-
84873890605
-
John pike memes go viral: Pepper-spraying uc davis cop becomes internet sensation
-
Nov.21, 8:22 PM
-
Robin Wilkey, John Pike Memes Go Viral: Pepper-Spraying UC Davis Cop Becomes Internet Sensation, The Huffington Post (Nov.21, 2011, 8:22 PM), http://www.huf-fingtonpost.com/2011/1 l/21/john-pike-memes-go-viral-n-l106616. html.
-
(2011)
The Huffington Post
-
-
Wilkey, R.1
-
137
-
-
84863538163
-
Glik v.cunniffe
-
82, 1st Cir.
-
See Glik v.Cunniffe, 655 F.3d 78, 82 (1st Cir.2011) ("Gathering information about government officials in a form diat can readily be disseminated to odiers serves a cardinal First Amendment interest in protecting and promoting 'die free discussion of governmental affairs.'"
-
(2011)
F.3d
, vol.655
, pp. 78
-
-
-
138
-
-
79961228054
-
Mills v.alabama
-
218
-
quoting Mills v.Alabama, 384 U.S.214, 218 (1966)).The U.S.District Court for die Eastern District of Pennsylvania recognized a First Amendment right to videotape public officers performing dieir public duties.
-
(1966)
U.S.
, vol.384
, pp. 214
-
-
-
139
-
-
84873913021
-
Robinson v.fetterman
-
541, E.D.Pa.
-
Robinson v.Fetterman, 378 F.Supp.2d 534, 541 (E.D.Pa.2005).The Third Circuit declined to follow Robinson when a recording was made during a traffic stop because Uiese stops are inherendy dangerous for police, and because die recording was not clearly made for a political or expressive purpose.
-
(2005)
F.Supp.2d
, vol.378
, pp. 534
-
-
-
140
-
-
84863550350
-
Kelly v.borough of carlisle
-
262, 3d Cir.
-
Kelly v.Borough of Carlisle, 622 F.3d 248, 262 (3d Cir.2010);
-
(2010)
F.3d
, vol.622
, pp. 248
-
-
-
141
-
-
84873895610
-
Pomykacz v.borough of w.wildwood
-
513, D.N.J.
-
see also Pomykacz v.Borough of W.Wildwood, 438 F.Supp.2d 504, 513 n.14 (D.N.J.2006) ("[Videotaping or photographing die police in die performance of their dudes on public property may be a protected activity." (emphasis added)
-
(2006)
F.Supp.2d
, vol.438
, Issue.14
, pp. 504
-
-
-
142
-
-
84873886070
-
Gilles v.davis
-
212, 3d Cir.
-
quoting Gilles v.Davis, 427 F.3d 197, 212 n.14 (3d Cir.2005)).
-
(2005)
F.3d
, vol.427
, Issue.14
, pp. 197
-
-
-
143
-
-
84873905174
-
Hamberger v.eastman
-
242, N.H.
-
Hamberger v.Eastman, 206 A.2d 239, 242 (N.H.1964).
-
(1964)
A.2d
, vol.206
, pp. 239
-
-
-
144
-
-
84873920127
-
Video voyeurism prevention act
-
See, e.g., Video Voyeurism Prevention Act, 18 U.S.C.§ 1801 (2006);
-
(2006)
U.S.C.
, vol.18
, pp. 1801
-
-
-
147
-
-
84873935717
-
-
18 U.S.C.§ 1801.
-
U.S.C.
, vol.18
, pp. 1801
-
-
-
148
-
-
84873936295
-
Daily times democrat v.graham
-
Ala.
-
The tort of public disclosure of private facts has been used to effect a limitation at the point of capture when a momentary accidental nudity was captured without consent.Daily Times Democrat v.Graham, 162 So.2d 474 (Ala.1964).
-
(1964)
So.2d
, vol.162
, pp. 474
-
-
-
149
-
-
84873897652
-
McNa-mara v.freedom newspapers, inc.
-
Tex.App.
-
But see McNa-mara v.Freedom Newspapers, Inc., 802 S.W.2d 901 (Tex.App.1991) (finding that the First Amendment provided immunity to a newspaper that published a photograph of a high school soccer player whose genitalia were accidentally exposed).The exposure of nude body parts may be a necessary (but not sufficient) condition for recovery based on images of people in sexually compromising positions.
-
(1991)
S.W.2d
, vol.802
, pp. 901
-
-
-
150
-
-
84873890379
-
Borton v.unisys corp.
-
*9, E.D.Pa.
-
See Borton v.Unisys Corp., 1991 WL 915, *9 (E.D.Pa.1991) (where a photograph taken while an employee cupped his hands over another employee's breast without consent was not depicting anything sufficiendy "private" because none of the crucial body parts were exposed).
-
(1991)
WL
, vol.1991
, pp. 915
-
-
-
151
-
-
84873920594
-
Marriage under glass: Intimate exposures
-
Nov.19
-
Lyle Rexer, Marriage Under Glass: Intimate Exposures, N.Y.Times, Nov.19, 2000, at AR1, available at http://www.nytimes.com/2000/ll/19/arts/art- architecture-mar-riage-under-glass-intimate-exposures.html?pagewanted= all&src=pm.
-
(2000)
N.Y.Times
-
-
Rexer, L.1
-
152
-
-
84873904590
-
The prosecution of linda tripp, editorial
-
Dec.19
-
The Prosecution of Linda Tripp, Editorial, N.Y.Times, Dec.19, 1999, at WK12, available at http://www.nytimes.com/1999/12/19/opinion/die-prosecution-of- linda-tripp.html.
-
(1999)
N.Y.Times
-
-
-
153
-
-
84873893321
-
Hearing is likely to hinge on the question of consent
-
(London), May 19
-
Hotel door data was expected to play a role in die rape prosecution of Dominique Strauss-Kahn, die Chief of die International Monetary Fund.Angelique Chrisafis & Ed Pilkington, Hearing is Likely to Hinge on the Question of Consent, Guardian (London), May 19, 2011, at 23, available at http://www.guardian.co.uk/world/2011/may/18/strauss-kahn-defence-likely-consent.
-
(2011)
Guardian
, pp. 23
-
-
Pilkington, C.A.E.1
-
154
-
-
0347684347
-
TheDeath of privacy!
-
1542
-
A.Michael Froomkin, TheDeath of Privacy!, 52 Stan.L.Rev.1461, 1542 (2000).Froomkin did not believe that existing tort laws, including intrusion upon seclusion, could be expanded to meet privacy demands such as closed circuit television monitoring because the tort traditionally excluded any surveillance or observations performed in public spaces.
-
(2000)
Stan.L.Rev.
, vol.52
, pp. 1461
-
-
Michael Froomkin, A.1
-
155
-
-
84873936114
-
In re doubleclick inc.privacy litig.
-
503-04, S.D.N.Y.
-
For a more detailed description of the technology, see In re DoubleClick Inc.Privacy Litig., 154 F.Supp.2d 497, 503-04 (S.D.N.Y.2001).
-
(2001)
F.Supp.2d
, vol.154
, pp. 497
-
-
-
156
-
-
84873891825
-
United states v.larson
-
563, A.F.Ct.Crim.App.
-
One military court opinion suggested that people cannot have a subjective expectation of privacy in data files that they do not know exist."The military judge concluded the appellant had no expectation of privacy in the contents of the computer.We find no abuse of discretion in his ruling.There is no evidence the appellant was aware the Internet history files existed, and we are unconvinced the appellant could entertain a subjective expectation of privacy in them without such knowledge." United States v.Larson, 64 MJ.559, 563 (A.F.Ct.Crim.App.2006).This poor reasoning is probably an example of bad facts making bad law.Since the defendant was sanctioned for soliciting sex from somebody he believed to be a fourteen-year-old (but was in fact a law enforcement officer), the court was motivated to make every determination against him.
-
(2006)
MJ.
, vol.64
, pp. 559
-
-
-
157
-
-
84873895155
-
The perils of being pandora
-
Feb.15
-
Matthew Lasar, The Perils of Being Pandora, Ass Technica (Feb.15, 2011), http://arstechnica.com/media/news/2011 /02/the-perils-of-pandora.ars.
-
(2011)
Ass Technica
-
-
Lasar, M.1
-
158
-
-
85023832436
-
Nearly undetectable tracking device raises concern
-
July 12, 3:05 PM
-
Stefanie Olsen, Nearly Undetectable Tracking Device Raises Concern, CNet (July 12, 2000, 3:05 PM), http://news.cnet.com/2100-1017-243077.html.
-
(2000)
CNet
-
-
Olsen, S.1
-
159
-
-
84873928496
-
Can advertisers learn that "no means no"?
-
For a description of current cookie-setting practices, see Chris Jay Hoofnagle et al., Can Advertisers Learn That "No Means No"?, BNA Privacy & Security Law Report (2011).
-
(2011)
BNA Privacy & Security Law Report
-
-
Jay Hoofnagle, C.1
-
160
-
-
84873885425
-
-
The computer user and the website (or its advertising intermediaries) are "users" under the Electronic Communications Privacy Act, and the communications recorded by die cookies are covered communications; dius, accessing die cookies without consent would be an offense under 18 U.S.C.§ 2701A (2006).
-
(2006)
U.S.C.§ 2701A
, vol.18
-
-
-
161
-
-
84873918028
-
In re doubleclick
-
In re DoubleClick, 154 F.Supp.2d at 507-08.
-
F.Supp.2d
, vol.154
, pp. 507-508
-
-
-
162
-
-
84873888804
-
-
The Computer Fraud and Abuse Act oudaws die intentional access of information and causing damage to an end user's computer.18 U.S.C.§ 1030A(5)(B), (2)(C) (2006).
-
(2006)
U.S.C.§ 1030A(5)(B), (2)(C)
, vol.18
-
-
-
163
-
-
84873925357
-
In re pharmatrak, inc.privacy litigation
-
1st Cir.
-
In re Pharmatrak, Inc.Privacy Litigation, 329 F.3d 9 (1st Cir.2003);
-
(2003)
F.3d
, vol.329
, pp. 9
-
-
-
164
-
-
84873927738
-
Chance v.avenue a, inc.
-
W.D.Wash.
-
Chance v.Avenue A, Inc., 165 F.Supp.2d 1153 (W.D.Wash.2001);
-
(2001)
F.Supp.2d
, vol.165
, pp. 1153
-
-
-
165
-
-
84873936114
-
In re doubleclick
-
In re DoubleClick, 154 F.Supp.2d at 497;
-
F.Supp.2d
, vol.154
, pp. 497
-
-
-
167
-
-
84873902004
-
Avenue a
-
Avenue A, 165 F.Supp.2d at 1160;
-
F.Supp.2d
, vol.165
, pp. 1160
-
-
-
168
-
-
84873888373
-
In re doubleclick
-
In re DoubleClick, 154 F.Supp.2d at 522.
-
F.Supp.2d
, vol.154
, pp. 522
-
-
-
169
-
-
84873931433
-
United states v.caceres
-
750
-
United States v.Caceres, 440 U.S.741, 750 (1979) (confirming the Wiretap Act adopts the one-party consent rule).The Wiretap Act does oudaw interceptions that are made for a tortious purpose, regardless of whether a party has consented to the interception, but courts have distinguished between tortious purposes and tortious means.The interception cannot be the basis for relief under the "tortious purpose" clause.
-
(1979)
U.S.
, vol.440
, pp. 741
-
-
-
170
-
-
84873928292
-
Sussman v.am.broad.co.
-
1202-03, 9th Cir.
-
Sussman v.Am.Broad.Co., 186 F.3d 1200, 1202-03 (9th Cir.1999).
-
(1999)
F.3d
, vol.186
, pp. 1200
-
-
-
171
-
-
84873890297
-
Avenue a
-
Avenue A, 165 F.Supp.2d at 1161;
-
F.Supp.2d
, vol.165
, pp. 1161
-
-
-
172
-
-
84873911145
-
In re doubleclick
-
519
-
In re DoubleClick, 154 F.Supp.2d at 510, 519.
-
F.Supp.2d
, vol.154
, pp. 510
-
-
-
173
-
-
84873908873
-
Avenue a
-
Avenue A, 165 F.Supp.2d at 1163.
-
F.Supp.2d
, vol.165
, pp. 1163
-
-
-
174
-
-
84873903925
-
Suit alleges disney, other top sites spied on users
-
August 14, 3:33 PM
-
Greg Sandoval, Suit Alleges Disney, Other Top Sites Spied on Users, CNet (August 14, 2010, 3:33 PM), http://news.cnet.com/8301-31001-3-20013672-261.html;
-
(2010)
CNet
-
-
Sandoval, G.1
-
175
-
-
84873909976
-
Christopher sheean on the latest google class action
-
December 8, 9:41 PM
-
Christopher Sheean on the Latest Google Class Action, Point of Law (December 8, 2010, 9:41 PM), http://www.pointoflaw.com/archives/2010/12/chris- sheean-on.php.
-
(2010)
Point of Law
-
-
-
176
-
-
77949760775
-
-
This is a collapsed version of the Second Restatement definition of intrusion upon seclusion.The Restatement defines die tortfeasor as: "[o]ne who intentionally intrudes, physically or otherwise, upon the solitude or seclusion of anodier or his private affairs or concerns, is subject to liability to the other for invasion of his privacy, if the intrusion would be highly offensive to a reasonable person." Restatement (Second) of Torts § 652B (1977).Here, the observation event incorporates die inten-tionality and the intrusion elements, and the requirement tiiat the observation event be offensive incorporates both the "offensiveness" element as well as considering whether die plaintiff had "seclusion" in die first place.
-
(1977)
Restatement (Second) of Torts
-
-
-
177
-
-
84873919258
-
In re northwest airlines privacy litig.
-
*5, D.Minn.
-
In re Northwest Airlines Privacy Litig., 2004 WL 1278459, at *5 (D.Minn.2004) (finding that the plaintiffs' intrusion claim failed because "[i]n this instance, Plaintiffs voluntarily provided their personal information to Northwest");
-
(2004)
WL
, vol.2004
, pp. 1278459
-
-
-
178
-
-
77949718771
-
Dwyer v.am.express co.
-
1354, 111.App.
-
Dwyer v.Am.Express Co., 652 N.E.2d 1351, 1354 (111.App.1995) ("By using the American Express card, a cardholder is voluntarily, and necessarily, giving information to defendants ....").
-
(1995)
N.E.2d
, vol.652
, pp. 1351
-
-
-
179
-
-
84873920127
-
Video voyeurism prevention act
-
Cameras installed in a restroom, or used to take up-skirt photographs, would be another matter.See, e.g., Video Voyeurism Prevention Act, 18 U.S.C.§ 1801 (2006);
-
(2006)
U.S.C.
, vol.18
, pp. 1801
-
-
-
180
-
-
84873892744
-
Speer v.ohio dept.rehab.& corn
-
Ohio Ct.App.
-
Speer v.Ohio Dept.Rehab.& Corn, 624 N.E.2d 251 (Ohio Ct.App.1993).
-
(1993)
N.E.2d
, vol.624
, pp. 251
-
-
-
181
-
-
78751608943
-
Fixing ram copies
-
1083-84
-
Aaron Perzanowski, Fixing RAM Copies, 104 Nw.U.L.Rev.1067, 1083-84 (2010).
-
(2010)
Nw.U.L.Rev.
, vol.104
, pp. 1067
-
-
Perzanowski, A.1
-
182
-
-
84873888487
-
Tragedy of the data commons
-
3-4
-
Jane Yakowitz, Tragedy of the Data Commons, 25 Harv.J.L.& Tech.1, 3-4 (2011).
-
(2011)
Harv.J.L.& Tech.
, vol.25
, pp. 1
-
-
Yakowitz, J.1
-
183
-
-
84865029187
-
-
Privacy advocates, the advertising industry, and the Federal Trade Commission are locked in debate over whether an IP address, or the information contained in a cookie, is "personally identifiable information." Fed.Trade Comm'n, Protecting Consumer Privacy in an Era of Rapid Change: Recommendations for Businesses and Policymakers 18 (2012), available at http://ftc.gov/os/2012/03/120326privacyreport.pdf.The New Intrusion sidesteps this debate because, once a party accesses a cookie in order to communicate or interact with the end user for a purpose collateral or in tension with the original purpose for which it was generated, it is irrelevant that the advertiser does not know the name of the user, or does not know the user in a meaningful way.This is consistent with the goals that underlie the intrusion tort; since intrusion protects a person's seclusion from observation, it makes no difference whether a peeping torn actually knows the person he observes.It is the act of observing that violates the rights of the observed.
-
(2012)
Protecting Consumer Privacy in An Era of Rapid Change: Recommendations for Businesses and Policymakers
, pp. 18
-
-
-
184
-
-
84873909383
-
The really smart phone
-
Apr.22, 7:34 PM
-
Robert Lee Hotz, The Really Smart Phone, Wall St.J.(Apr.22, 2011, 7:34 PM), http://online.wsj.com/article/SB10001424052748704547604576263261679848814. html?KEYWORDS=%22The+Really+Smart+Phone%22 ("[Cellphone] data can reveal subde symptoms of mental illness, foretell movements in die Dow Jones Industrial Average, and chart die spread of political ideas as they move through a community ....").
-
(2011)
Wall St.J.
-
-
Lee Hotz, R.1
-
185
-
-
84873905841
-
-
(last visited Oct.11, 2012)
-
Thus far, GPS studies have relied on vehicles carrying GPS logging devices with the intent diat the data would be analyzed by the municipality or city conducting the studies.But the studies are enormously useful for studying travel time and delays, for assessing die effects (in traffic time) of construction or route alterations, and for evaluating whether traffic signals are timed correctly.These types of studies could become inexpensive and widespread standard practices for all jurisdictions if researchers are able to access the log data of commercial GPS providers.See GeoS-tats, TravTime, http://www.geostats.com/product-trav.htm (last visited Oct.11, 2012) (discussing die use of GPS to collect, analyze, and report traffic data).However, aggregated data is used for law enforcement purposes, such as to help determine where to establish speed traps.Such use is often perceived as violating the privacy of the GPS device-users.
-
TravTime
-
-
-
186
-
-
84873888198
-
TomTom user data sold to dutch police, used to determine ideal locations for speed traps
-
Apr.27, 1:53 PM
-
Tim Stevens, TomTom User Data Sold to Dutch Police, Used to Determine Ideal Locations for Speed Traps, Engadget (Apr.27, 2011, 1:53 PM), http://www.engadget.com/2011/04/27/tomtom-user-data-sold-to-danish-police-used- to-determine-ideal (discussing how the Dutch police force is using TomTom navigation devices to determine where speed traps and cameras should be placed).It is possible diat die issue underlying the privacy concerns is diat law enforcement might have die wrong motivation in establishing speed traps.Data-assisted speed traps might do more to increase revenues and citation rates than they do to improve traffic safety.In diat case, a person might feel tricked for his or her unwitting contribution to die dataset diat enabled die police to create the speed trap.There are categories of government data uses diat can be carefully cabined or prohibited altogedier dirough use restrictions, but die capture of anonymized GPS data is not inherendy harmful.
-
(2011)
Engadget
-
-
Stevens, T.1
-
187
-
-
84873890794
-
Council directive 95/46, art.6(1)(b)
-
(EU)
-
"Further processing of data for historical, statistical or scientific purposes shall not be considered as incompatible provided that Member States provide appropriate safeguards." Council Directive 95/46, art.6(1)(b), 1995 O.J.(L 281) 40 (EU).Note, though, diat die required "safeguards" demand that the data pose no risk of reiden-tification-a standard diat is impossible to meet-and forces data holders to choose between risking sanction or halting standard practices.
-
O.J.(L 281)
, vol.1995
, pp. 40
-
-
-
188
-
-
84873919833
-
-
Press Release, Feb.23
-
"Respect for Context" is defined as so: "[cjonsumers have a right to expect that organizations will collect, use, and disclose personal data in ways diat are consistent with the context in which consumers provide the data." Press Release, The White House, Office of the Press Sec'y, We Can't Wait: Obama Administration Unveils Blueprint for a "Privacy Bill of Rights" to Protect Consumers Online (Feb.23, 2012), http://www.whitehouse. gov/die-press-office/2012/02/23/we-can-t-wait-obama-administration-unveils- blueprint-privacy-bill-rights.
-
(2012)
The White House, Office of the Press sec'Y, We Can't Wait: Obama Administration Unveils Blueprint for A "privacy Bill of Rights" to Protect Consumers Online
-
-
-
189
-
-
78751647463
-
Smith v.maryland
-
744
-
Smith v.Maryland, 442 U.S.735, 744 (1979).
-
(1979)
U.S.
, vol.442
, pp. 735
-
-
-
190
-
-
84873908083
-
-
The more lenient warrant requirements adopted in the Stored Communications Act (SCA) diat apply to routing data do not require probable cause.18 U.S.C.§ 2703(d) (2006).If web-tracking data is "unexposed" and deserving of full Fourth Amendment protection, die procedural protections of die SCA will not be constitu-tionally sufficient.
-
(2006)
U.S.C.§ 2703(d)
, vol.18
-
-
-
191
-
-
84859015072
-
Against notice skepticism, in privacy (and elsewhere)
-
1034-35
-
For a description of visceral notice, see M.Ryan Calo, Against Notice Skepticism, in Privacy (and Elsewhere), 87 Notre Dame L.Rev.1027, 1034-35 (2012).
-
(2012)
Notre Dame L.Rev.
, vol.87
, pp. 1027
-
-
Ryan Calo, M.1
-
192
-
-
77956141828
-
-
I do not wish to speculate about social norms widi respect to behavioral advertising since the empirical evidence is so mixed.Survey after survey confirms diat, considered in isolation, Americans want to surf die Internet widiout creating a record of dieir transactions and activities.One study reports diat ninety-two percent of Americans believe diere should be a law requiring "websites and advertising compa- nies to delete all stored information about an individual, if requested to do so." Joseph Turow et al., Americans Reject Tailored Advertising and Three Activities That Enable It, 3 (2009), http://ssm.com/abstract=1478214;
-
(2009)
Americans Reject Tailored Advertising and Three Activities That Enable It
, pp. 3
-
-
Turow, J.1
-
193
-
-
78650215027
-
Americans' attitudes about internet behavioral advertising practices
-
see also Aleecia M.McDonald & Lorie F.Cranor, Americans' Attitudes About Internet Behavioral Advertising Practices, WPES '10: Proceedings of the 9th Annual ACM Workshop on Privacy in the Electronic Society 63 (2010), available at http://dl.acm.org/citation.cfm?id=1866929.However, these studies repeat a flaw diat undermines the credibility of die findings: diey do not ask respondents whether they would prefer an alternative reality where the same online content contains about twice die amount of (non-targeted) advertising, or where diey pay for content.The handful of studies that do force survey respondents to state dieir preferences in the context of privacy tradeoffs find that a majority of Internet-users prefer free content with targeted ads over odier types of privacy-protecting options like pay walls or increased quantity of advertising, though some of these studies too have methodological flaws.
-
(2010)
WPES '10: Proceedings of the 9th Annual ACM Workshop on Privacy in the Electronic Society
, pp. 63
-
-
McDonald, A.M.1
Cranor, L.F.2
-
194
-
-
84873937222
-
-
11
-
Karl W.Lendenmann, PreferenceCen-tral, Consumer Perspectives on Online Advertising-2010, at 2-3, 11 (2010), available at http://www.slideshare.net/ mfredactie/preference-central-surveyfull report.Note that die phrasing of the question, and the ordering of die answer options, are objectionable.The survey does not offer respondents die option to view die same content widi more advertising; the closest is an option for "somewhat limited online information or less functional services."
-
(2010)
PreferenceCen-tral, Consumer Perspectives on Online Advertising-2010
, pp. 2-3
-
-
Lendenmann, K.W.1
-
195
-
-
84873899322
-
53% of mobile users happy to hand over location data for discounts
-
Aug.17, 1:25 PM
-
see also Jacqui Cheng, 53% of Mobile Users Happy to Hand Over Location Data For Discounts, Ars Technica (Aug.17, 2011, 1:25 PM), http://arstechnica. com/gadgets/2011/08/53-of-mobile-users-happy-to-hand-over-location-data-for- coupons ("[M]ore dian half of all consumers are willing to exchange dieir mobile location data for content diat is relevant to them at die moment....");
-
(2011)
Ars Technica
-
-
Cheng, J.1
-
196
-
-
84873924981
-
Behavioral targeting attitudes
-
July 29
-
David Hallerman, Behavioral Targeting Attitudes, eMarketer (July 29, 2008), http://www.emarketer.com/Article.aspx?1006456&R=1006456 (finding that fifty-five percent of respondents are "very" or "somewhat" comfortable with behavioral advertising).
-
(2008)
EMarketer
-
-
Hallerman, D.1
-
197
-
-
84873897602
-
Informed choice in the law of torts
-
31
-
John H.Mansfield, Informed Choice in the Law of Torts, 22 La.L.Rev.17, 31 (1961) ("Consent is die right term to use when die plaintiff was willing that a certain event occur, probably some conduct on die part of die defendant, because he desired an invasion of a normally protected interest.").
-
(1961)
La.L.Rev.
, vol.22
, pp. 17
-
-
Mansfield, J.H.1
-
198
-
-
84862629850
-
AT&t mobility llc v.concepcion
-
1753
-
However, in light of die recent Supreme Court holding in Concepcion, websites might enjoy de facto immunity from intrusion claims by requiring all visitors to arbitrate dieir claims individually.AT&T Mobility LLC v.Concepcion, 131 S.Ct.1740, 1753 (2011).
-
(2011)
S.Ct.
, vol.131
, pp. 1740
-
-
-
200
-
-
76049128005
-
Technoconsen(t)sus
-
551-54
-
Groundwork for diese questions has already been laid by Andrea Matwyshyn.Andrea Matwyshyn, Technoconsen(t)sus, 85 Wash.U.L.Rev.529, 551-54 (2008).
-
(2008)
Wash.U.L.Rev.
, vol.85
, pp. 529
-
-
Matwyshyn, A.1
-
201
-
-
84873895114
-
-
Dec.10, (unpublished article)
-
Christine Jolls has begun this very inquiry.Christine Jolls, Rationality and Consent in Privacy Law, (Dec.10, 2010) (unpublished article), available at http://www.law.yale.edu/faculty/CJolls.htm.
-
(2010)
Rationality and Consent in Privacy Law
-
-
Jolls, C.1
-
202
-
-
84873884770
-
-
July 12, 12:12 AM
-
For example, die privacy policy for AudienceScience claims that die site will replace any cookie of a user who opts out of information-collection with a new cookie instructing the website to stop collecting information.What actually happens, according to Stanford researchers, is that AudienceScience keeps a
-
(2011)
Tracking the Trackers: Early Results, Stanford Center for Internet & Society
-
-
Mayer, J.1
-
203
-
-
77954654234
-
In re jetblue airways corp.privacy litig.
-
330, E.D.N.Y.
-
In re JetBlue Airways Corp.Privacy Litig., 379 F.Supp.2d 299, 330 (E.D.N.Y.2005);
-
(2005)
F.Supp.2d
, vol.379
, pp. 299
-
-
-
204
-
-
84855384798
-
Dyer v.northwest airlines corp.
-
1200, D.N.D.
-
Dyer v.Northwest Airlines Corp., 334 F.Supp.2d 1196, 1200 (D.N.D.2004).
-
(2004)
F.Supp.2d
, vol.334
, pp. 1196
-
-
-
205
-
-
84873905240
-
Feld v.feld
-
78, D.D.C.
-
See Feld v.Feld, 783 F.Supp.2d 76, 78 (D.D.C.2011).
-
(2011)
F.Supp.2d
, vol.783
, pp. 76
-
-
-
206
-
-
71949096865
-
Law's expressive value in combating cyber gender harassment
-
393
-
Danielle Keats Citron, Law's Expressive Value in Combating Cyber Gender Harassment, 108 Mich.L.Rev.373, 393 (2009).
-
(2009)
Mich.L.Rev.
, vol.108
, pp. 373
-
-
Keats Citron, D.1
-
207
-
-
84862629850
-
Anodier potential impediment is the recent u.s.supreme court case at&t mobility v.conception
-
Anodier potential impediment is the recent U.S.Supreme Court case AT&T Mobility v.Conception, 131 S.Ct.1740 (2011), which held that class action waivers in standard-form contracts are enforceable.Id.at 1753.The parameters of that holding are still quite unclear.
-
(2011)
S.Ct.
, vol.131
, pp. 1740
-
-
-
208
-
-
84857185212
-
After class: Aggregate litigation in the wake o/at&t mobility v.concepcion
-
639-40
-
See Myrium Gilles & Gary Friedman, After Class: Aggregate Litigation in the Wake o/AT&T Mobility v.Concepcion, 79 U.Chi.L.Rev.623, 639-40 (2012).
-
(2012)
U.Chi.L.Rev.
, vol.79
, pp. 623
-
-
Friedman, G.M.G.1
-
209
-
-
84873888567
-
Turn names evidon preferred provider of compliance services
-
May 4
-
A new firm called Evidon is offering the behavioral marketing industry's first "assurance platform." It organizes industry best practices that would, if followed, receive Evidon's trusted seal of approval.Turn Names Evidon Preferred Provider of Compliance Services, PRWeb (May 4, 2011), http://www.prweb.com/releases/prweb2011/ 5/prweb8377655.htm.
-
(2011)
PRWeb
-
-
-
210
-
-
84873898393
-
Stupid eu cookie law will hand the advantage to the us, kill our startups stone dead
-
Mar.9
-
Mike Butcher, Stupid EU Cookie Law Will Hand the Advantage to the US, Kill Our Startups Stone Dead, TechCrunch Europe (Mar.9, 2011), http://eu.techcrunch.com/2011/03/09/stupid-eu-cookie-law-will-hand-the- advantage-to-the-us-kill-our-startups-stone-dead/.The European cookie law would require any website that uses Google Analytics to keep track of the number of visitors to a website, who would also have to comply with die opt-in consent requirements.
-
(2011)
TechCrunch Europe
-
-
Butcher, M.1
-
211
-
-
0003699139
-
-
See Jeffrey Rosen, The Unwanted Gaze 120 (2000) (discussing shame as a basis for harm);
-
(2000)
The Unwanted Gaze
, pp. 120
-
-
Rosen, J.1
-
214
-
-
84873889804
-
Mug-shot industry will dig up your past, charge you to bury it again
-
Aug.2, 1:52 PM
-
David Kravets, Mug-Shot Industry Will Dig Up Your Past, Charge You to Bury It Again, Wired (Aug.2, 2011, 1:52 PM), http://www.wired.com/threadevel/ 2011/08/mugshots/.
-
(2011)
Wired
-
-
Kravets, D.1
-
215
-
-
84873909736
-
Sex list rating female university student's lovers becomes internet sensation
-
Oct.8, 11:49 PM
-
Sex List Rating Female University Student's Lovers Becomes Internet Sensation, MailOnline (Oct.8, 2010, 11:49 PM), http://www.dailymail.co.uk/news/ article-131 8575/Duke-University-alumni-Karen-Owens-sex-list-internet-sensation. html (" [A] student has been left devastated after an elaborate sex list she created ...became an internet sensation.").
-
(2010)
MailOnline
-
-
-
216
-
-
84856611038
-
Online right "to be forgotten" confirmed by eu
-
Mar.17, 12:53 PM
-
Matt Warman, Online Right "To Be Forgotten" Confirmed by EU, The Telegraph (Mar.17, 2011, 12:53 PM), http://www.telegraph.co.uk/technology/ internet/8388033/Online-right-to-be-forgotten-confirmed-by-EU.html ("Under die new [EU] legisla- tion, users could sue websites for invading their privacy and would have a right to be entirely "forgotten" online.").
-
(2011)
The Telegraph
-
-
Warman, M.1
-
217
-
-
84861405523
-
The law of reputation and the interest of the audience
-
But see Laura A.Heymann, The Law of Reputation and the Interest of the Audience, 52 B.C.L.Rev.1341 (2011) (arguing that legal frameworks for reputational interests must account for the public's interest in access to the information).
-
(2011)
B.C.L.Rev.
, vol.52
, pp. 1341
-
-
Heymann, L.A.1
-
218
-
-
84873900224
-
Facebook is using you
-
Feb.5
-
Lori Andrews, Facebook Is Using You, N.Y.Times, Feb.5, 2012, at SR7, available at http://www.nytimes.com/2012/02/05/opinion/sunday/facebook-is-using- you.html?-r=l&pagewanted=all.
-
(2012)
N.Y.Times
-
-
Andrews, L.1
-
219
-
-
84873915697
-
The regulation of reputational information
-
295-96, B.Szoka & A.Marcus eds.
-
See Eric Goldman, The Regulation of Reputational Information, in The Next Digital Decade: Essays on the Future of the Internet 293, 295-96 (B.Szoka & A.Marcus eds., 2010) (discussing in detail the value that reputational information adds to consumer trust and well-functioning markets).
-
(2010)
The Next Digital Decade: Essays on the Future of the Internet
, pp. 293
-
-
Goldman, E.1
-
220
-
-
77957056012
-
Subway fracas escalates into test of the internet's power to shame
-
July 7
-
Jonathan Krim, Subway Fracas Escalates Into Test of the Internet's Power to Shame, Wash.Post (July 7, 2005), http://www.washingtonpost.com/wp-dyn/ content/article/2005/07/06/AR2005070601953.html;
-
(2005)
Wash.Post
-
-
Krim, J.1
-
222
-
-
84873902039
-
Vosburg v.putney
-
Wis.
-
Vosburg v.Putney, 50 N.W.403 (Wis.1891).Or, perhaps she is more similar to the accident victim whose loss of life or limb was caused by non-negligence.Either way, we traditionally let die chips fall where they may.
-
(1891)
N.W.
, vol.50
, pp. 403
-
-
-
223
-
-
0347033951
-
Review essay, three concepts of privacy
-
2089-90
-
Robert Post raises a similar objection to Jeffrey Rosen's claim that Bill Clinton's sexual exploits ought to have been kept private.Robert C.Post, Review Essay, Three Concepts of Privacy, 89 Geo.L.J.2087, 2089-90 (2001)
-
(2001)
Geo.L.J.
, vol.89
, pp. 2087
-
-
Post, R.C.1
-
225
-
-
84873897569
-
Sheetz v.the morning call, inc.
-
3d Cir.
-
See Sheetz v.The Morning Call, Inc., 946 F.2d 202 (3d Cir.1991).Another example, discussed in Part II, supra, is a police officer's use of a state wiretap statute to prevent a citizen from recording an interaction the citizen believes to be corrupt or unethical.
-
(1991)
F.2d
, vol.946
, pp. 202
-
-
-
226
-
-
84897414919
-
Am.civil liberties union of 111.v.alvarez
-
7th Cir.
-
Am.Civil Liberties Union of 111.v.Alvarez, 679 F.3d 583 (7th Cir.2012).
-
(2012)
F.3d
, vol.679
, pp. 583
-
-
-
227
-
-
84900152989
-
McCormick v.england
-
435, S.C.Ct.App.
-
McCormick v.England, 494 S.E.2d 431, 435 (S.C.Ct.App.1997) ("Being a fiduciary relationship, mutual trust and confidence are essential."). Courts look for a degree of kinship between the parties, or disparities in age, health, or mental conditions, or disparities in training and experience in order to determine whedier two people are in a fiduciary relationship.
-
(1997)
S.E.2d
, vol.494
, pp. 431
-
-
-
228
-
-
84900211633
-
Pottinger v.pottinger
-
1137, 111.App.Ct.
-
See Pottinger v.Pottinger, 605 N.E.2d 1130, 1137 (111.App.Ct.1992).
-
(1992)
N.E.2d
, vol.605
, pp. 1130
-
-
-
229
-
-
30044439823
-
Tarasoff v.regents of univ.of cal.
-
347, Cal.
-
Tarasoff v.Regents of Univ.of Cal., 551 P.2d 334, 347 (Cal.1976) (invoking duty to warn likely victim of psychotfierapy patient);
-
(1976)
P.2d
, vol.551
, pp. 334
-
-
-
230
-
-
0029648982
-
Pate v.threlkel
-
282, Fla.
-
Pate v.Threlkel, 661 So.2d 278, 282 (Fla.1995) (invoking duty to warn patients' children about genetic conditions).
-
(1995)
So.2d
, vol.661
, pp. 278
-
-
-
231
-
-
37149021036
-
Privacy's other path: Recovering the law of confidentiality
-
The tort of confidentiality does not enjoy the recognition that Prosser's privacy torts do, and it does not appear in the Second Restatement.But many jurisdictions recognize and enforce the duty of confidentiality in contexts ranging from doctors to bankers to accountants.Neil M.Richards & Daniel J.Solove, Privacy's Other Path: Recovering the Law of Confidentiality, 96 Geo.L.J.123 (2007).I am in agreement with Richards and Solove, and with Susan Gilles and Danielle Citron as well, that a clearer and more robust tort of breach of confidentiality could allow the common law to react to harmful disseminations of personal information.
-
(2007)
Geo.L.J.
, vol.96
, pp. 123
-
-
Richards, N.M.1
Solove, D.J.2
-
232
-
-
0038266512
-
Promises betrayed: Breach of confidence as a remedy for invasions of privacy
-
4
-
Susan Gilles, Promises Betrayed: Breach of Confidence As a Remedy for Invasions of Privacy, 43 Buff.L.Rev.1, 4 (1995).The tort of public disclosure of private facts occasionally provides recourse for confidentiality-style harms.The disclosure tort has imposed responsibility on the police force to hold information about accident and crime victims in confidence, as well as the information from cooperative witnesses.
-
(1995)
Buff.L.Rev.
, vol.43
, pp. 1
-
-
Gilles, S.1
-
233
-
-
84870051861
-
Catsouras v.dep't of cal.highway patrol
-
Ct.App.
-
See Catsouras v.Dep't of Cal.Highway Patrol, 104 Cal.Rptr.3d 352 (Ct.App.2010) (providing recovery to a decedent's family when a paramedic took pictures at the scene of a deadly accident and sent the pictures to friends and acquaintances on Halloween).On die other hand, police are not expected to keep die confidences of suspects.
-
(2010)
Cal.Rptr.3d
, vol.104
, pp. 352
-
-
-
234
-
-
84873936718
-
Wilson v.freitas
-
Haw.Ct.App.
-
Wilson v.Freitas, 214 P.3d 1110 (Haw.Ct.App.2009).
-
(2009)
P.3d
, vol.214
, pp. 1110
-
-
-
235
-
-
33644850653
-
Health insurance portability and accountability act of 1996, pub.l.no.104-191, § 1173
-
2024-26
-
Health Insurance Portability and Accountability Act of 1996, Pub.L.No.104-191, § 1173,110 Stat.1936, 2024-26
-
Stat.
, vol.110
, pp. 1936
-
-
-
236
-
-
84873925041
-
-
codified as amended in scattered sections of 18, 26, 29, and 42 U.S.C.
-
codified as amended in scattered sections of 18, 26, 29, and 42 U.S.C..
-
-
-
-
237
-
-
79958139351
-
Fair credit reporting act
-
Fair Credit Reporting Act, 15 U.S.C.§ 1601 (2006).
-
(2006)
U.S.C.
, vol.15
, pp. 1601
-
-
-
238
-
-
84857933127
-
Family educational rights and privacy act
-
Family Educational Rights and Privacy Act, 20 U.S.C.§ 1232g (2006).
-
(2006)
U.S.C.
, vol.20
-
-
-
239
-
-
80052741344
-
Telecommunications act of 1996
-
Telecommunications Act of 1996, 47 U.S.C.§ 222 (2006);
-
(2006)
U.S.C.
, vol.47
, pp. 222
-
-
-
240
-
-
84873933767
-
Stored communications act
-
Stored Communications Act, 18 U.S.C.§ 2702 (2006) (stating that business records may be disclosed to non-government tiiird parties, but the contents of electronic communications may not).
-
(2006)
U.S.C.
, vol.18
, pp. 2702
-
-
-
241
-
-
79958119249
-
Gramm-leach-bliley act
-
Gramm-Leach-Bliley Act, 15 U.S.C.§ 6801.
-
U.S.C.
, vol.15
, pp. 6801
-
-
-
243
-
-
79953885112
-
Reunifying privacy law
-
2007
-
Lior Jacob Strahilevitz, Reunifying Privacy Law, 98 Cal.L.Rev.2007, 2007 (2010).
-
(2010)
Cal.L.Rev.
, vol.98
, pp. 2007
-
-
Jacob Strahilevitz, L.1
-
244
-
-
0037431045
-
The cost ofhipaa compliance
-
1424
-
Peter Kilbridge, The Cost ofHIPAA Compliance, 348 N.Eng.J.Med.1423, 1424 (2003).
-
(2003)
N.Eng.J.Med.
, vol.348
, pp. 1423
-
-
Kilbridge, P.1
-
246
-
-
84861992716
-
Video privacy protection act of 1988
-
Video Privacy Protection Act of 1988, 18 U.S.C.§ 2710 (2006).
-
(2006)
U.S.C.
, vol.18
, pp. 2710
-
-
-
247
-
-
84878755689
-
The bork tapes saga
-
(last visited Oct 24, 2012)
-
Michael Dolan, The Bork Tapes Saga, The Am.Porch, http://www.theamerican porch.com/bork2.htm (last visited Oct 24, 2012).
-
The Am.Porch
-
-
Dolan, M.1
-
248
-
-
84873929942
-
Why robert bork (indirectly) kept netflix offfacebook
-
July 26
-
Adam Clark Estes, Why Robert Bork (Indirectly) Kept Netflix OffFacebook, Atlantic Wire (July 26, 2011), http://www.theadanticwire.com/technology/2011/07/ why-rob-ert-bork-indirectly-kept-netflix-facebook/40408 (discussing how the VPAA discouraged Netflix from launching Facebook integration in the U.S.).
-
(2011)
Atlantic Wire
-
-
Clark Estes, A.1
-
250
-
-
84873899113
-
Miller v.motorola, inc.
-
903, 111.
-
In most jurisdictions the "publicity" element requires disclosure to the general public, but in some states disclosure to an especially important audience will suffice.See Miller v.Motorola, Inc., 560 N.E.2d 900, 903 (111.1990) (finding that disclosure to the plaintiff's work colleagues was sufficient to fulfill the "publicity" element).
-
(1990)
N.E.2d
, vol.560
, pp. 900
-
-
-
251
-
-
84873890505
-
-
D.NJ.
-
729 F.Supp.376 (D.NJ.1990).In the case, the plaintiff's HIV status was initially disclosed to a police officer, who then told other people in his department for no health-or public safety-related reason.
-
(1990)
F.Supp.
, vol.729
, pp. 376
-
-
-
252
-
-
25144444373
-
A social networks theory of privacy
-
Dor Jacob Strahilevitz has shown that courts' determinations in disclosure cases tend to track theories of social networks.If a personal fact is shared with a support group made up of 20 members, the fact is treated as more private than if it is shared with 20 unconnected friends.Strahilevitz's social network theory is quite use- ful in explaining which contexts might have a modicum of implied use restriction.See Lior Jacob Strahilevitz, A Social Networks Theory of Privacy, 72 U.Chi.L.Rev.919 (2005).
-
(2005)
U.Chi.L.Rev.
, vol.72
, pp. 919
-
-
Jacob Strahilevitz, L.1
-
253
-
-
0010032880
-
Insider trading, secret agents, evidentiary privileges, and the production of information
-
313
-
And, because of the first factor, disclosure torts would avoid imposing liability when the plaintiff puts no effort into keeping the information private.This reasoning lines up with Judge Frank Easterbrook's argument that reasonable restrictions on information will limit certain types of information that have the effect of diminishing the overall quality and quantity of publicly available information.Frank H.Easter-brook, Insider Trading, Secret Agents, Evidentiary Privileges, and the Production of Information, 1981 Sup.Ct.Rev.309, 313 (1981).
-
(1981)
Sup.Ct.Rev.
, vol.1981
, pp. 309
-
-
Easter F.H.-Brook1
-
255
-
-
84873887451
-
Doe v.se.pa.transp.auth.
-
1140, 3d Cir.
-
Doe v.Se.Pa.Transp.Auth., 72 F.3d 1133, 1140 (3d Cir.1995);
-
(1995)
F.3d
, vol.72
, pp. 1133
-
-
-
256
-
-
0025715914
-
Doe v.borough of barrington
-
381, D.N.J.
-
Doe v.Borough of Barrington, 729 F.Supp.376, 381 (D.N.J.1990);
-
(1990)
F.Supp.
, vol.729
, pp. 376
-
-
-
257
-
-
84864913590
-
Rethinking hiv-exposure crimes
-
forthcoming
-
Margo Kaplan, Rethinking HIV-Exposure Crimes, 87 Ind.L.J.(forthcoming 2012).
-
(2012)
Ind.L.J.
, vol.87
-
-
Kaplan, M.1
-
258
-
-
84866657523
-
Sipple v.chronicle publ'g co.
-
670, Ct.App.
-
See Sipple v.Chronicle Publ'g Co., 201 Cal.Rptr.665, 670 (Ct.App.1984) (finding the disclosure of Sipple's sexual orientation was a matter of public concern because the newspaper story was exploring the possible homophobia of President Ford).Sipple's parents disowned him after the national news coverage broke, showing the high stakes when this sort of information is released.
-
(1984)
Cal.Rptr.
, vol.201
, pp. 665
-
-
-
260
-
-
84873885090
-
Children's hosp.& res.ctr.oakland v.workers' comp.appeals bd.
-
*1, Cal.Ct.App.Oct.8
-
Children's Hosp.& Res.Ctr.Oakland v.Workers' Comp.Appeals Bd., 2010 WL 3936050, at *1 (Cal.Ct.App.Oct.8, 2010).
-
(2010)
WL
, vol.2010
, pp. 3936050
-
-
-
261
-
-
84873929062
-
Klepetko v.reisman
-
App.Div
-
Klepetko v.Reisman, 839 N.Y.S.2d 101 (App.Div 2007).
-
(2007)
N.Y.S.2d
, vol.839
, pp. 101
-
-
-
262
-
-
84873896537
-
Yonaty v.mincolla
-
N.Y.App.Div.
-
But see Yonaty v.Mincolla, 945 N.Y.S.2d 774 (N.Y.App.Div.2012) (declining to follow Klepetko).
-
(2012)
N.Y.S.2d
, vol.945
, pp. 774
-
-
-
263
-
-
84873908181
-
A deep dive into consumers' habits: Unregulated firms' use of shadowy tactics can upend credit scores
-
July 17
-
Ylan Q.Mui, A Deep Dive into Consumers' Habits: Unregulated Firms' Use of Shadowy Tactics can Upend Credit Scores, Wash.Post, July 17, 2011, at Al.
-
(2011)
Wash.Post
-
-
Mui, Y.Q.1
-
264
-
-
84873922960
-
You score, you win: The consequences of giving credit where credit is due
-
July
-
Michael Turner et al., You Score, You Win: The Consequences of Giving Credit Where Credit Is Due, Pol.& Econ.Res.Council (July 2008), available at http://perc.net/files/downloads/web-layout-you-score.pdf (discussing the use of utility bills in assessing creditworthiness).
-
(2008)
Pol.& Econ.Res.Council
-
-
Turner, M.1
-
265
-
-
84873885248
-
Full utility credit reporting: Risks to low income consumers
-
December
-
This phenomenon is completely overlooked by the National Consumer Law Center, which concluded that utility credit reporting would adversely affect low-income credit applicants.John Howat, Full Utility Credit Reporting: Risks to Low Income Consumers, Nat'l Consumer Law Ctr.1 (December 2009), available at http://www.nclc.org/images/pdf/credit-reports/credit-reports-full-utility-dec 2009.pdf.The report argues diat, because fourteen percent of households in the lowest income quindle missed a payment on dieir udlity bill (compared to just over two percent for die highest income quintile), a credit measure diat takes utility bills into account will disproportionately harm die poor.
-
(2009)
Nat'l Consumer Law Ctr.
, pp. 1
-
-
Howat, J.1
-
266
-
-
84873914551
-
-
Udlity credit reports, like all reports used to make credit and hiring decisions, ought to be paired with regulation allowing for consumers to check for the accuracy of their records, and to challenge any report believed to contain inaccurate informa-don.The Fair Credit Reporting Act serves as a model for such a scheme.15 U.S.C.§§ 1681e(b), 1681iA(l) (2006).
-
(2006)
U.S.C.§§ 1681e(b), 1681iA(l)
, vol.15
-
-
-
267
-
-
78751663503
-
Title vii of the civil rights act of 1964
-
Title VII of the Civil Rights Act of 1964, 42 U.S.C.§ 2000e (2006).
-
(2006)
U.S.C.
, vol.42
-
-
-
268
-
-
0010014616
-
-
I include just a smattering of the scholarship here.See generally Richard Epstein, Forbidden Grounds (1991) (discussing die application of the antidiscrimination principle to employment relationships in the public and private sectors);
-
(1991)
Forbidden Grounds
-
-
Epstein, R.1
-
269
-
-
84935413026
-
Race, reform, and retrenchment: Transformation and legitimation in antidiscrimination law
-
Kimberle' Williams Crenshaw, Race, Reform, and Retrenchment: Transformation and Legitimation in Antidiscrimination Law, 101 Harv.L.Rev.1331 (1988) (arguing that antidiscrimination law, has been fairly successful in eliminating the symbolic manifestations of racial oppression, but has not been able to preclude the continued subordination of Blacks);
-
(1988)
Harv.L.Rev.
, vol.101
, pp. 1331
-
-
Williams Crenshaw, K.1
-
271
-
-
0032008797
-
Protecting genetic difference
-
659-63
-
The one exception seems to be the topic of genetic privacy, which inspires privacy and discrimination scholars to synchronize their efforts.See, e.g., Michael S.Yesley, Protecting Genetic Difference, 13 Berkeley Tech.LJ.653, 659-63 (1998) (discussing various states' laws regarding genetic privacy and genetic discrimination).
-
(1998)
Berkeley Tech.LJ.
, vol.13
, pp. 653
-
-
Yesley, M.S.1
-
272
-
-
1542401733
-
An introduction to privacy in economics and politics
-
630
-
George J.Stigler, An Introduction to Privacy in Economics and Politics, 9 J.Legal Stud.623, 630 (1980).
-
(1980)
J.Legal Stud.
, vol.9
, pp. 623
-
-
Stigler, G.J.1
-
274
-
-
79960511924
-
The potential effects of workplace financial education based on the relationship between personal financial wellness and worker job productivity
-
[pincite]
-
So-hyun Joo & E.Thomas Garman, The Potential Effects of Workplace Financial Education Based on the Relationship Between Personal Financial Wellness and Worker Job Productivity, 2 Pers.Fins.& Worker Productivity 163 [pincite] (1998).
-
(1998)
Pers.Fins.& Worker Productivity
, vol.2
, pp. 163
-
-
Thomas J.S.Garman, E.1
-
275
-
-
68349146604
-
Whom to hire: Rampant misrepresentations of credentials mandate the prudent employer make informed hiring decisions
-
840-42
-
See John E.Matejkovic & Margaret E.Matejkovic, Whom to Hire: Rampant Misrepresentations of Credentials Mandate the Prudent Employer Make Informed Hiring Decisions, 39 Creighton L.Rev.827, 840-42 (2005);
-
(2005)
Creighton L.Rev.
, vol.39
, pp. 827
-
-
Matejkovic, J.E.1
Matejkovic, M.E.2
-
276
-
-
52849139561
-
The tort of negligent hiring and the use of selection devices: The employee's right of privacy and the employer's need to know
-
5-8
-
Cathie A.Shattuck, The Tort of Negligent Hiring and the Use of Selection Devices: The Employee's Right of Privacy and the Employer's Need to Know, 11 Indus.Rel.LJ.2, 5-8 (1989).
-
(1989)
Indus.Rel.LJ.
, vol.11
, pp. 2
-
-
Shattuck, C.A.1
-
277
-
-
84873884942
-
Note, helping employers help themselves: Resolving the conflict between the fair credit reporting act and title vii
-
See generally Meredidi J.Fried, Note, Helping Employers Help Themselves: Resolving the Conflict Between the Fair Credit Reporting Act and Title VII, 69 Fordham L.Rev.209 (2000) (discussing employer liability for sexual harassment and employer obligations under the Fair Credit Reporting Act).
-
(2000)
Fordham L.Rev.
, vol.69
, pp. 209
-
-
Fried, M.J.1
-
279
-
-
84155192491
-
An equilibrium-adjustment theory of the fourth amendment
-
525-42
-
Orin S.Kerr, An Equilibrium-Adjustment Theory of the Fourth Amendment, 125 Harv.L.Rev.476, 525-42 (2011).
-
(2011)
Harv.L.Rev.
, vol.125
, pp. 476
-
-
Kerr, O.S.1
-
280
-
-
0001331917
-
Anomalies: The endowment effect, loss aversion, and status quo bias
-
197-99
-
Daniel Kahneman et al., Anomalies: The Endowment Effect, Loss Aversion, and Status Quo Bias, 5 J.Econ.Persp.193, 197-99 (1991).
-
(1991)
J.Econ.Persp.
, vol.5
, pp. 193
-
-
Kahneman, D.1
-
282
-
-
84873911555
-
-
Harold N.Fowler trans.
-
1 Plato with an Engush Translation 563 (Harold N.Fowler trans., 1913).
-
(1913)
Plato with An Engush Translation
, vol.1
, pp. 563
-
-
-
284
-
-
84873906674
-
Sorrell v.ims health inc.
-
2672
-
Sorrell v.IMS Health Inc., 131 S.Ct.2653, 2672 (2011).
-
(2011)
S.Ct.
, vol.131
, pp. 2653
-
-
|