Most people seem to agree that individuals have too little privacy, and most proposals to address that problem focus on ways to give those users more information about, and more control over, how information about them is used. Yet in nearly all cases, information subjects are not the parties who make decisions about how information is collected, used, and disseminated; instead, outsiders make unilateral decisions to collect, use, and disseminate information about others. These potential privacy invaders, acting without input from information subjects, are the parties to whom proposals to protect privacy must be directed. This Article develops a theory of unilateral invasions of privacy rooted in the incentives of potential outside invad...
This Article proposes that there is, in fact, a constitutional doctrine that protects at least some ...
Privacy law has languished for decades while the other information law doctrines have flourished. Th...
Privacy is commonly studied as a private good: my personal data is mine to protect and control, and ...
Most people seem to agree that individuals have too little privacy, and most proposals to address th...
Discussions of information privacy typically rely on the idea that there is a trade off between priv...
Privacy relates to individuals and their ability to keep certain aspects of themselves away from oth...
Information technologies are reducing the costs of credible signaling, just as they have reduced the...
A number of laws govern information gathering, or surveillance, by private parties in the physical w...
This Article argues that the current interpretation given to the four-part invasion of privacy frame...
Previously, privacy rights had to be litigated under one of the four recognized tort claim of action...
An individual\u27s right to privacy in an electronic society has gained international attention as a...
This chapter reviews economic analyses of privacy. We begin by scrutinizing the “free market” critiq...
Much has been written about database privacy in the Internet Age, most of it critical of the way in ...
Encroachments on privacy through mass surveillance greatly resemble the pollution crisis in that the...
Businesses routinely buy and sell personal information about consumers. Many consumers find this obj...
This Article proposes that there is, in fact, a constitutional doctrine that protects at least some ...
Privacy law has languished for decades while the other information law doctrines have flourished. Th...
Privacy is commonly studied as a private good: my personal data is mine to protect and control, and ...
Most people seem to agree that individuals have too little privacy, and most proposals to address th...
Discussions of information privacy typically rely on the idea that there is a trade off between priv...
Privacy relates to individuals and their ability to keep certain aspects of themselves away from oth...
Information technologies are reducing the costs of credible signaling, just as they have reduced the...
A number of laws govern information gathering, or surveillance, by private parties in the physical w...
This Article argues that the current interpretation given to the four-part invasion of privacy frame...
Previously, privacy rights had to be litigated under one of the four recognized tort claim of action...
An individual\u27s right to privacy in an electronic society has gained international attention as a...
This chapter reviews economic analyses of privacy. We begin by scrutinizing the “free market” critiq...
Much has been written about database privacy in the Internet Age, most of it critical of the way in ...
Encroachments on privacy through mass surveillance greatly resemble the pollution crisis in that the...
Businesses routinely buy and sell personal information about consumers. Many consumers find this obj...
This Article proposes that there is, in fact, a constitutional doctrine that protects at least some ...
Privacy law has languished for decades while the other information law doctrines have flourished. Th...
Privacy is commonly studied as a private good: my personal data is mine to protect and control, and ...