text
stringlengths 0
118
|
---|
21. Time, Inc. v. Hill, 385 U.S. 374,413 (1967) (Fortas, J., dissenting).
|
22. Doe v. Bolton, 410 U.S. 179, 213 (1973) (Douglas, J., concurring) (citations
|
omitted) (quoting Kent v. Dulles, 357 U.S. 116, 126 (1958)).
|
23. Gavison, “Privacy and the Limits of Law,” 438.
|
24. See, e.g., O’Brien, Privacy, Law, and Public Policy, 5; Gerety, “Redefining
|
Privacy,” 263.
|
25. Anita L. Allen, Uneasy Access: Privacy for Women in a Free Society 7 (1988).
|
26. Ferdinand Schoeman, “Privacy: Philosophical Dimensions of the Litera
|
ture,” in Philosophical Dimensions o f Privacy: An Anthology 1, 14 (Ferdinand David
|
Schoeman ed., 1984).
|
27. See Bloustein, “Privacy as an Aspect of Human Dignity,” 970.
|
28. E. L. Godkin, “Libel and Its Legal Remedy,” 12 Journal of Social Science 69,
|
80 (1880).
|
29. E. L. Godkin, “The Rights of the Citizen, IV—To His Own Reputation,”
|
Scribner's Magazine, July-Dee. 1890, at 65. For a discussion of this article’s influ
|
ence on Warren and Brandeis, see Richard C. Turkington & Anita L. Allen, Pri
|
vacy Law: Cases and Materials 40-41 (1999).
|
30. Sissela Bok, Secrets: On the Ethics of Concealment and Revelation 10-11 (1983).
|
31. Hyman Gross, “The Concept of Privacy,” 43 New York University Law Re
|
view 34, 35-36 (1967) (emphasis removed).
|
Notes to Pages 19-24
|
205
|
32. Ernest Van Den Haag, “On Privacy,” in Nomos XIII: Privacy 149, 149
|
(J. Roland Pennock & J. W. Chapman eds., 1971).
|
33. Allen, Uneasy Access, 10. For additional proponents of limited-access concep
|
tions, see Edward Shils, “Privacy: Its Constitution and Vicissitudes,” 31 Law and
|
Contemporary Problems 281, 281 (1966) (privacy “is constituted by the absence of in
|
teraction or communication or perception within contexts in which such interaction,
|
communication, or perception is practicable”); Adam Carlyle Breckenridge, The
|
Right to Privacy 1 (1970) (“Privacy, in my view, is the rightful claim of the individual
|
to determine the extent to which he wishes to share of himself with others”).
|
34. O’Brien, Privacy, Law, and Public Policy, 15, 16.
|
35. Gavison, “Privacy and the Limits of Law,” 423,426, 433.
|
36. Id. at 433.
|
37. Gavison openly recognizes that her theory excludes these things. See id.
|
at 436.
|
38. Id.
|
39. Richard A. Posner, TheEconomics o f Justice 272-73 (1981).
|
. 40. Richard A^ Posner, Economic Analysis of Law 46 (5 th ed. 1998).
|
41. Posner, Economics o f Justice, 234.
|
42. Id. at 271. Posner’s conception of privacy is infused with his own normative
|
assessment of privacy as a form of deception. According to Posner, the “economist
|
sees a parallel to the efforts of sellers to conceal defects in their products.” Posner,
|
Economic Analysis of Law, 46.
|
43. Sidney M. Jourard, “Some Psychological Aspects of Privacy,” 31 Law and
|
Contemporary Problems 307, 307 (1966).
|
44. Griswold v. Connecticut, 381 U.S. 479 (1965); Roe v. Wade, 410 U.S. 113
|
(1973).
|
45. 429 U.S. 589, 599-600 (1977).
|
46. William J. Stuntz, “Privacy’s Problem and the Law of Criminal Procedure,”
|
93 Michigan Law Review 1016, 1022 (1995).
|
47. Katz v. United States, 389 U.S. 347, 351 (1967).
|
48. 486 U.S. 35,40(1988).
|
49. 488 U.S. 445, 450-51 (1989); see also California v. Ciraolo, 476 U.S. 207
|
(1986) (holding that the Fourth Amendment did not apply to surveillance of prop
|
erty from airplane flying at 1,000 feet); Dow Chem. Co. v. United States, 476 U.S.
|
227 (1986) (holding that the Fourth Amendment did not apply to aerial surveil
|
lance of property with high-tech camera that could enlarge objects so that objects
|
half an inch in diameter could be seen).
|
50. Edward J. Bloustein, Individual and Group Privacy 123-86 (1978).
|
51. See, e.g., Arnold Simmel, “Privacy Is Not an Isolated Freedom,” in Nomos
|
XIII: Privacy 71, 81 (J. Roland Pennock & J. W. Chapman eds., 1971).
|
52. See Shils, “Privacy,” 305.
|
53. Kenneth L. Karst, “ ‘The Files’: Legal Controls over the Accuracy and Ac
|
cessibility of Stored Personal Data,” 31 Law and Contemporary Problems 342, 344
|
(1966).
|
54. Amitai Etzioni, The Limits o f Privacy 196 (1999).
|
55. Judith Wagner DeCew, In Pursuit o f Privacy: Law, Ethics, and the Rise ofTech
|
nology 48 (1997).
|
56. Inness, Privacy, Intimacy, and Isolation, 6.
|
206
|
Notes to Pages 24-27
|
57. Stanley I. Benn, “Privacy, Freedom, and Respect for Persons,” in Nornos
|
XIII: Privacy 2 (J. Roland Pennock & J.W. Chapman eds., 1971).
|
58. Alan Westin, Privacy and Freedom 1 (1967).
|
59. See, e.g., Breckenridge, Right to Privacy, 1 (noting that privacy is “the in
|
dividual’s right to control dissemination of information about himself”); Execu
|
tive Office of the President, Office of Science and Technology, Privacy and Be
|
havioral Research 2 (Washington, D.C., G.P.O. 1967) (“The right to privacy is the
|
right of the individual to decide for himself how much he will share with others
|
his thoughts, his feelings, and the facts of his personal life”); Randall P. Ben-
|
zanson, “The Right to Privacy Revisited: Privacy, News, and Social Change,
|
1890-1990,” 80 California Law Review 1133, 1135 (1992) (“I will advance a con
|
cept of privacy based on the individual’s control of information”); Oscar M.
|
Ruebhausen & Orville G. Brim, Jr., “Privacy and Behavioral Research,” 65 Co
|
lumbia Law Review 1184, 1189 (1965) (“The essence of privacy is no more, and
|
certainly no less, than the freedom of the individual to pick and choose for him
|
self the time and circumstances under which, and most importantly, the extent to
|
which, his attitudes, beliefs, behavior and opinions are to be shared with or with
|
held from others”); Ian Goldberg, Austin Hill, & Adam Shostack, “Trust, Ethics,
|
and Privacy,” 81 Boston University Law Review 407, 418 (2001) (“We build our
|
own definition of privacy on what we consider the most elegant definition, ‘in
|
formational self-determination,’ which refers to a person’s ability to control the
|
flow of his own personal information”). Anne Wells Branscomb focuses almost
|
exclusively on the importance of control over information for privacy. See Anne
|
Wells Branscomb, Who Owns Information? From Privacy to Public Access (1994).
|
60. Miller, Assault on Privacy, 25.
|
61. Fried, “Privacy,” 482-83.
|
62. President Clinton’s Information Infrastructure Task Force (HTF), Principles
|
for Providing and Using Personal Information 5 (1995).
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.