In the article I examine the legality of the not uncommon practice of surreptitiously recording telephone conversations, videotaping activities and accessing e-mail or voicemail communications by parties in domestic disputes. First, I examine the important values that are implicated by such activities. These values include conversation, communication and physical privacy. Conversation (and communication) privacy are valued on both intrinsic and instrumentalist grounds. These values run into countervailing values in domestic conflict cases. These include parental autonomy in child rearing and the best interests of the child. I argue that the pervasiveness of electronic surveillance and the emerging tradition in our legal system to grant "mat...
Argentine and American courts have a similar understanding of privacy and Privacy Right. However, th...
Section 14 of the Constitution provides for the right to privacy, which includes the right not to ha...
The conflict between individual privacy and the needs of law enforcement occurs at a number of point...
In the article I examine the legality of the not uncommon practice of surreptitiously recording tele...
The legality of electronic surveillance of conversations and accessing of e-mail is complicated. Sev...
This Article addresses the little-used but important doctrine of vicarious consent; in particular, t...
I argue that a person\u27s privacy interest in his email is the same as his privacy interest in a te...
Under current doctrines, parties to a communication enjoy robust constitutional protection against g...
American society has long considered certain conversations private amongst the participants in those...
In divorce court, often a very contentious and emotional court, parties frequently use what they can...
The extent to which American society should permit wiretapping and electronic eavesdropping has been...
Title III of the Federal Wiretap Act, as amended, remains the primary law guarding the privacy of p...
With the expanded use of wiretaps, courts will be faced in the coming years with questions concernin...
While it is now illegal to intentionally intercept cordless telephone conversations, cordless teleph...
This paper explores the legal system’s treatment of privacy along five dimensions. The dimensions fo...
Argentine and American courts have a similar understanding of privacy and Privacy Right. However, th...
Section 14 of the Constitution provides for the right to privacy, which includes the right not to ha...
The conflict between individual privacy and the needs of law enforcement occurs at a number of point...
In the article I examine the legality of the not uncommon practice of surreptitiously recording tele...
The legality of electronic surveillance of conversations and accessing of e-mail is complicated. Sev...
This Article addresses the little-used but important doctrine of vicarious consent; in particular, t...
I argue that a person\u27s privacy interest in his email is the same as his privacy interest in a te...
Under current doctrines, parties to a communication enjoy robust constitutional protection against g...
American society has long considered certain conversations private amongst the participants in those...
In divorce court, often a very contentious and emotional court, parties frequently use what they can...
The extent to which American society should permit wiretapping and electronic eavesdropping has been...
Title III of the Federal Wiretap Act, as amended, remains the primary law guarding the privacy of p...
With the expanded use of wiretaps, courts will be faced in the coming years with questions concernin...
While it is now illegal to intentionally intercept cordless telephone conversations, cordless teleph...
This paper explores the legal system’s treatment of privacy along five dimensions. The dimensions fo...
Argentine and American courts have a similar understanding of privacy and Privacy Right. However, th...
Section 14 of the Constitution provides for the right to privacy, which includes the right not to ha...
The conflict between individual privacy and the needs of law enforcement occurs at a number of point...