WHISTLEBLOWING AND THE POLICE

Most Americans are familiar with whistleblowers, people who go public with information about corruption, fraud and abuse in their own organizations. Whistleblowers are often seen on the nightly news and discussed in the morning newspapers. In December 2002, three whistleblowers were named Time magazine’s “Persons of the Year.” Whistleblowers have been the subject of The… continue reading

RACE AND CLASS DIMENSIONS OF THE WAR ON DRUGS: A HUMANITARIAN CRISIS

The U.S. war on drugs has been waged along class and race lines, both domestically and internationally. Rather than finding long-term solutions to the social development issues in target communities, drug policy has exacerbated problems of poverty and social marginalization. This paper examines how the war on drugs has prejudicially targeted poor people of color… continue reading

WHY THE HOMELESS ARE DENIED PERSONHOOD UNDER THE LAW: TOWARD CONTEXTUALIZING THE REASONABLENESS STANDARD IN SEARCH AND SEIZURE JURISPRUDENCE

The homeless have questionable and variable access to legitimate private space. They live over time with little consistent unperturbed space to develop and manifest their inner identity in outward actions. They have no free space to experiment, make mistakes, or just “be” themselves, to learn or grow in a comfortable environment. Unlike the homed, the… continue reading

PRIVACY AND JURY SELECTION: DOES THE CONSTITUTION PROTECT PROSPECTIVE JURORS FROM PERSONALLY INTRUSIVE VOIR DIRE QUESTIONS?

The cover story of a recent issue of Newsweek Magazine was entitled “The Scary New World of Identity Theft” and asked the question, “Are You A Victim?” The article informed an already concerned readership that identity theft is the “fastest-growing crime of this century” and that perpetrators steal approximately $53 billion per year through assuming… continue reading

FORGET BIG BROTHER AND BIG CORPORATION: WHAT ABOUT THE PERSONAL USES OF SURVEILLANCE TECHNOLOGY AS SEEN IN CASES SUCH AS TOM I. VOIRE?

Much of the attention to contemporary privacy invading technologies focuses on the actions of governments and large organizations. Yet the actions of big brother and big corporation must be seen alongside of those of little sister and brother, not to mention mom, dad, friends and strangers. Interpersonal uses of the technologies are a prominent and… continue reading

THE RIGHT TO DIGITAL PRIVACY: A EUROPEAN SURVEY

Much of the attention to contemporary privacy invading technologies focuses on the actions of governments and large organizations. Yet the actions of big brother and big corporation must be seen alongside of those of little sister and brother, not to mention mom, dad, friends and strangers. Interpersonal uses of the technologies are a prominent and… continue reading

PRIVACY: THE DELICATE ENTANGLEMENT OF SELF AND OTHER

Privacy is an entanglement of public, individual, and governmental interests. This article does not attempt to provide a compendium of United States Supreme Court cases charting a “right to privacy.” While some case law, both United States Supreme Court and other courts, is included, the purpose of the article is not to describe the development… continue reading

BINDING CORPORATE RULES FOR CROSS-BORDER DATA TRANSFER

Companies today confront unprecedented legal challenges when they seek to transfer personal data between different nations. Many nations have recently enacted “data protection” laws, designed to protect the personal information of individuals. Although protecting the personal information of individuals is surely a worthwhile goal, the enactment of these laws has nevertheless encumbered the ability of… continue reading

INTRODUCTION: CREATING LEGITIMATE DIGITAL PRIVACY RIGHTS FOR INTERNET USERS

Privacy has become a complex legal issue as technological advancements have created a multitude of ways, both physical and digital, that one’s privacy rights can be violated. Although the Supreme Court has declined to recognize a constitutional right to digital privacy, the increasing pervasiveness of digital privacy intrusions may encourage the Court to find that… continue reading