The Right to Privacy Jody Blanke, Professor Computer Information Systems and Law.

Slides:



Advertisements
Similar presentations
A Brief History of Information Privacy IC211. Colonial America Eavesdropping “listen[ing] under walls or windows, or the eaves of a house, to hearken.
Advertisements

US Constitution and Right to Privacy Generally only protects against government action Doesn’t obligate government to do something, but rather to refrain.
William G. Madsen, Madsen, Prestley & Parenteau LLC A. Robert Fischer, Jackson Lewis LLC CBIA’s Mid-Year HR Update Workplace Privacy.
© 2012 Lathrop & Gage LLP Presented by: Lincoln D. Bandlow, Esq. Lathrop & Gage LLP 1888 Century Park East, Suite 1000 Los Angeles, CA
A closer look at privacy How Brandeis’s theories have affected media law.
13.1 Chapter 13 Privacy © 2003 by West Legal Studies in Business/A Division of Thomson Learning.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2007 Lorrie Cranor 1 Privacy Law.
Introduction To Privacy Law Richard Warner. Informational Privacy Our focus will be on informational privacy. Informational privacy consists in the ability.
CS294-1 Deeply Embedded Networks Privacy Discussion 11/25/03 David Culler University of California, Berkeley.
1 Privacy & Publicity 15 Minutes of Fame (or not) Steve Baron March 23, 2006.
CyLab Usable Privacy and Security Laboratory 1 Privacy Policy, Law and Technology Privacy Law September 9, 2010.
Information Privacy Policy in Canada Presented By: Sue Wu.
Invasion of Privacy – What you are (and are not) entitled to in the eyes of the law Image courtesy of privacy-please/
INVASION OF PRIVACY What is freedom of the press? Should there be limits on the press? Are there aspects of the media essential to freedom of the press?
Invasion of Privacy Law for High School Student Journalists An introduction to invasion of privacy law for high school student journalists and their advisers.
The Bill of Rights and the 14 th amendment What you should understand about their relationship…
Hosking, Campbell and Beyond The protection of privacy in the common law.
PRIVACY LAW JOUR3060 Communication Law & Regulation.
(Edited) WORKPLACE PRIVACY.
The Privacy Torts Public Disclosure of a Private Fact Intrusion False Light Appropriation.
Business Law and the Regulation of Business Chapter 7: Intentional Torts By Richard A. Mann & Barry S. Roberts.
Privacy and Ubiquitous Computing Deirdre K. Mulligan Acting Clinical Professor of Law Director Samuelson Law, Technology & Public Policy Clinic, Boalt.
Copyright © 2010 – Jeffrey Pittman. Introduction The following slides expand the textbook coverage of the topic “Invasion of Privacy” Privacy Law - Jeffrey.
Current Best Practices and Precedents Existing UAV Guidelines/Best Practices.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
The right to be left alone.  Journalists believe they have the right to publish what they think the public needs to know. (First Amendment)  Individuals.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
Building a Privacy Foundation. Setting the Standard for Privacy Health Insurance Portability and Accountability Act (HIPAA) Patient Bill of Rights Federal.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
The Right to Privacy. No where in the Constitution are the words “right to privacy”
Tort Law Jody Blanke Professor of Computer Information Systems and Law.
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
The “Penumbra” of Rights.  Can your right to privacy be defined? ◦ The government typically has looked at privacy as behavior or activity free of an.
14.1 Chapter 14 Privacy © 2003 by West Legal Studies in Business/A Division of Thomson Learning.
Invasion of Privacy in Digital Media Basic Concepts.
Student Financial Assistance. Session 55-2 Session 55 Internet Privacy Laws.
Privacy Jody Blanke Distinguished Professor of Computer Information Systems and Law Mercer University.
The Privacy Torts Public Disclosure of a Private Fact Intrusion False Light Appropriation.
1-1 CHAPTER 7 MATERIALS TO SUPPLEMENT TEXTBOOK J. Pittman, Instructor.
Tort Law Jody Blanke Professor of Computer Information Systems and Law.
Jody Blanke Professor of Computer Information Systems and Law
Jody Blanke, Professor Computer Information Systems and Law 1.
Workplace Torts: Defamation Defamation Requirements: –Defamatory Comments –Disclosure to 3rd Party (“Publication”) –Harm to Good Name Privilege -- Communication.
The Right of Privacy and the Right of Publicity It’s not just about tabloids and fame Heather Briston Special Collections and University Archives University.
Plaisance, Ch. 7 “Privacy”. Concepts of privacy The right to be left alone Limited access to the self--the ability to shield oneself from unwanted access.
The Twelve Most Important Public Employment Law Developments Ever Bob Joyce PANC Asheville October 5, 2015.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
Privacy. Some Web Science Issues Kieron O’Hara 29 November 2011.
LAW RIGHT TO PRIVACY NOTES 1. Def: Right protecting citizens from unreasonable interference by government 2. No right to privacy in the Constitution.
Invasion of Privacy. Beginnings  As a right became recognized in 20 th c. Introduced by Louis Brandeis (future SC judge)  Began in US  Two types 
Jen Polin and Allison Kodroff.   The School District adopted the Student Activities Drug Testing Policy  Requires all students who participate in after.
Korematsu v. United States (1944)
Privacy and the Law.
TeamSpot Activities.
STATES AREN’T DUNN DISAGREEING ON THE FOURTH AMENDMENT
Introduction to the Law BUS 346
The Right to Privacy Jody Blanke
Ethics and media.
The Right to Privacy Jody Blanke
Image courtesy of Invasion of Privacy – What you are (and are not) entitled to in the eyes of the law.
The Law of Journalism & Mass Communication
Privacy What does it mean to you?.
By Richard A. Mann & Barry S. Roberts
2010 Georgia Ballot Amemdment
Privacy=Secret CHIHUA WANG.
Introduction to the Law BAA 604
Tort Law Jody Blanke Ernest L. Baskin, Jr. Distinguished
The Right to Privacy I Foundations of the Right
Tort Law Jody Blanke Ernest L. Baskin, Jr. Distinguished
Introduction to Privacy Part I
Presentation transcript:

The Right to Privacy Jody Blanke, Professor Computer Information Systems and Law

Right to Privacy Origins in 1890 article by Samuel Warren and Louis Brandeis First state to recognize right in civil case Georgia – 1905

U.S. Constitution Does not contain the word “privacy” 1965 case held that “zones of privacy” emanate from the “penumbras” of the 1 st, 3 rd, 4 th, 5 th and 9 th Amendments 1967 case held that an electronic listening device violated the 4 th Amendment

U.S. Constitution (cont.) 1968 case introduced the notion of the “reasonable” expectation of privacy rule 1977 case identified two “privacy” interests: the interest in avoiding disclosure of personal matters, and the interest in independence in making certain kinds of important decisions

State Constitutions Ten state constitutions contain the word “privacy” Ala., Ariz., Calif., Fla., Haw., Ill., La., Mont., S.C., Wash. Many provide for a right greater than that protected by the U.S. Constitution

Invasion of Privacy Tort Intrusion upon seclusion Publication of embarrassing private facts False light Appropriation of name or likeness

Privacy and the Web Self regulation “Opt-in” vs. “opt-out” European Union Directive Safe Harbor agreement Privacy policies Toysmart