The Privacy-Proof Plaintiff: Ub T First, Let Me Share Your #Selfie, 23 J
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Section 7: Criminal Offense, Criminal Responsibility, and Commission of a Criminal Offense
63 Section 7: Criminal Offense, Criminal Responsibility, and Commission of a Criminal Offense Article 15: Criminal Offense A criminal offense is an unlawful act: (a) that is prescribed as a criminal offense by law; (b) whose characteristics are specified by law; and (c) for which a penalty is prescribed by law. Commentary This provision reiterates some of the aspects of the principle of legality and others relating to the purposes and limits of criminal legislation. Reference should be made to Article 2 (“Purpose and Limits of Criminal Legislation”) and Article 3 (“Principle of Legality”) and their accompanying commentaries. Article 16: Criminal Responsibility A person who commits a criminal offense is criminally responsible if: (a) he or she commits a criminal offense, as defined under Article 15, with intention, recklessness, or negligence as defined in Article 18; IOP573A_ModelCodes_Part1.indd 63 6/25/07 10:13:18 AM 64 • General Part, Section (b) no lawful justification exists under Articles 20–22 of the MCC for the commission of the criminal offense; (c) there are no grounds excluding criminal responsibility for the commission of the criminal offense under Articles 2–26 of the MCC; and (d) there are no other statutorily defined grounds excluding criminal responsibility. Commentary When a person is found criminally responsible for the commission of a criminal offense, he or she can be convicted of this offense, and a penalty or penalties may be imposed upon him or her as provided for in the MCC. Article 16 lays down the elements required for a finding of criminal responsibility against a person. -
Much Ado About Newsgathering: Personal Privacy, Law Enforcement, and the Law of Unintended Consequences for Anti-Paparazzi Legislation
MUCH ADO ABOUT NEWSGATHERING: PERSONAL PRIVACY, LAW ENFORCEMENT, AND THE LAW OF UNINTENDED CONSEQUENCES FOR ANTI-PAPARAZZI LEGISLATION ANDREW D. MORTONt Experience should teach us to be most on our guard to protect liberty when the Government's purposes are beneficent. Men born to freedom are naturally alert to repel invasion of their liberty by evil-minded rulers. The greatest dan- gers to liberty lurk in insidiousI encroachment by men of zeal, well-meaning but without understanding. INTRODUCTION: BALANCING THE INDIVIDUAL RIGHT TO PRIVACY WITH LEGITIMATE LAW ENFORCEMENT SURVEILLANCE Horror, not humor, brought actors Michael J. Fox and Paul Reiser to testify before a hearing of the United States House Judiciary Committee last summer.2 Fox described the "mercenary tactics of tabloid photographers" who turned his wedding into a "nightmare" as helicopters recklessly jock- eyed for position above the ceremony, then "fired away with high-powered cameras" on the couple's honeymoon suite.3 When Reiser's son was born prematurely, disguised journalists infiltrated the hospital with hidden cam- eras to steal a photo of the infant, and after returning home, the child was photographed in the privacy of the family's backyard by "resourceful" jour- t B.A. 1991, M.P.P. Candidate 2000, University of Maryland; J.D. Candidate 2000, Uni- versity of Pennsylvania. This Comment is dedicated to the memory of Alan Rubinstein- gifted attorney, and the father-in-law I have known only through the many whose lives he touched. I am deeply indebted to Ed Pease, Diana Schacht, the staff and members of the U.S. -
Hostile Work Environment and the Objective Reason-Ableness Conundrum
Boston College Law Review Volume 36 Article 2 Issue 2 Number 2 3-1-1995 Hostile Work Environment and the Objective Reason-Ableness Conundrum: Deriving a Workable Framework from Tort Law for Addressing Knowing Harassment of Hypersensitive Employees Frank S. Ravitch Follow this and additional works at: http://lawdigitalcommons.bc.edu/bclr Part of the Labor and Employment Law Commons, and the Torts Commons Recommended Citation Frank S. Ravitch, Hostile Work Environment and the Objective Reason-Ableness Conundrum: Deriving a Workable Framework from Tort Law for Addressing Knowing Harassment of Hypersensitive Employees, 36 B.C.L. Rev. 257 (1995), http://lawdigitalcommons.bc.edu/ bclr/vol36/iss2/2 This Article is brought to you for free and open access by the Law Journals at Digital Commons @ Boston College Law School. It has been accepted for inclusion in Boston College Law Review by an authorized editor of Digital Commons @ Boston College Law School. For more information, please contact [email protected]. HOSTILE WORK ENVIRONMENT AND THE OBJECTIVE REASONABLENESS CONUNDRUM: DERIVING A WORKABLE FRAMEWORK FROM TORT LAW FOR ADDRESSING KNOWING HARASSMENT OF HYPERSENSITIVE EMPLOYEESt FRANK S. RAVITCH* Ms. Smith works for a supervisor who does not believe women belong in the workplace. He wants to force her out, but based on the company's harassment policy, he knows he cannot subject her to con- duct that a reasonable person would find severe or pervasive, because that would be illegal discrimination, and his employer would likely take action against him. However, he also knows that she is particularly sensitive to loud noise. She cannot function around loud noise, and becomes extremely nervous. -
Microblogging Tool That Allows Users to Post Brief, 140-Character Messages -- Called "Tweets" -- and Follow Other Users' Activities
MICRO-BLOGGING AND PERFORMANCE APPS AND SITES Instagram lets users snap, edit, and share photos and 15-second videos, either publicly or with a private network of followers. It unites the most popular features of social media sites: sharing, seeing, and commenting on photos. It also lets you apply fun filters and effects to your photos, making them look high-quality and artistic. What parents need to know • Teens are on the lookout for "likes." Similar to the way they use Facebook, teens may measure the "success" of their photos -- even their self-worth -- by the number of likes or comments they receive. Posting a photo or video can be problematic if teens are posting to validate their popularity. • Public photos are the default. Photos and videos shared on Instagram are public unless privacy settings are adjusted. Hashtags and location information can make photos even more visible to communities beyond a teen's followers if his or her account is public. • Private messaging is now an option. Instagram Direct allows users to send "private messages" to up to 15 mutual friends. These pictures don't show up on their public feeds. Although there's nothing wrong with group chats, kids may be more likely to share inappropriate stuff with their inner circles. Tumblr is like a cross between a blog and Twitter: It's a streaming scrapbook of text, photos, and/or videos and audio clips. Users create and follow short blogs, or "tumblogs," that can be seen by anyone online (if made public). Many teens have tumblogs for personal use: sharing photos, videos, musings, and things they find funny with their friends. -
A Revolutionary Approach to the Eggshell Plaintiff Rule Steve Calandrillo University of Washington School of Law
CORE Metadata, citation and similar papers at core.ac.uk Provided by UW Law Digital Commons (University of Washington) University of Washington School of Law UW Law Digital Commons Articles Faculty Publications 2013 Eggshell Economics: A Revolutionary Approach to the Eggshell Plaintiff Rule Steve Calandrillo University of Washington School of Law Dustin E. Buehler Follow this and additional works at: https://digitalcommons.law.uw.edu/faculty-articles Part of the Torts Commons Recommended Citation Steve Calandrillo and Dustin E. Buehler, Eggshell Economics: A Revolutionary Approach to the Eggshell Plaintiff Rule, 74 Ohio St. L.J. 375 (2013), https://digitalcommons.law.uw.edu/faculty-articles/130 This Article is brought to you for free and open access by the Faculty Publications at UW Law Digital Commons. It has been accepted for inclusion in Articles by an authorized administrator of UW Law Digital Commons. For more information, please contact [email protected]. Eggshell Economics: A Revolutionary Approach to the Eggshell Plaintiff Rule STEVE P. CALANDRILLO* & DUSTIN E. BUEHLER† For more than a century, courts have universally applied the eggshell plaintiff rule, which holds tortfeasors liable for the full extent of the harm inflicted on vulnerable “eggshell” victims. Liability attaches even when the victim’s condition and the scope of her injuries were completely unforeseeable ex ante. This Article explores the implications of this rule by providing a pioneering economic analysis of eggshell liability. It argues that the eggshell plaintiff rule misaligns parties’ incentives in a socially undesirable way. The rule subjects injurers to unfair surprise, fails to incentivize socially optimal behavior when injurers have imperfect information about expected accident losses, and fails to account for risk aversion, moral hazard, and judgment-proof problems. -
11 Sites and Apps Kids Are Heading to After Facebook Remember
11 Sites and Apps Kids Are Heading to After Facebook Remember MySpace? Not so long ago, practically every teen in the world was on it –- and then many left for Facebook. Now, as Facebook's popularity among teens is starting to wane, you might be wondering what the new "it" social network is. But the days of a one-stop shop for all social networking needs are over. Instead, teens are dividing their attention between an array of apps. You don't need to know the ins and outs of every app and site that's "hot" right now (and frankly, if you did, they wouldn't be trendy anymore). But knowing the basics -- what they are, why they're popular, and the problems that can crop up when they're not used responsibly. 11 Social Media Tools Parents Need to Know About Now Twitter Instagram Snapchat Tumblr Google+ Vine Wanelo Kik Messenger Ooovoo Pheed Ask.fm 1. Twitter is a microblogging site that allows users to post brief, 140-character messages -- called "tweets" -- and follow other users' activities. Why it's popular Teens like using it to share quick tidbits about their lives with friends. What parents need to know Public tweets are the norm for teens. Though you can choose to keep your tweets private, most teens report having public accounts. Updates appear immediately. Even though you can remove tweets, your followers can still read what you wrote until it's gone. This can get kids in trouble if they say something in the heat of the moment. -
Building Relatedness Through Hashtags: Social
BUILDING RELATEDNESS THROUGH HASHTAGS: SOCIAL INFLUENCE AND MOTIVATION WITHIN SOCIAL MEDIA-BASED ONLINE DISCUSSION FORUMS by LUCAS JOHN JENSEN (Under the Direction of Lloyd Rieber) ABSTRACT With the rise of online education, instructors are searching for ways to motivate students to engage in meaningful discussions with one another online and build a sense of community in the digital classroom. This study explores how student motivation is affected when social media tools are used as a substitute for traditional online discussion forums hosted in Learning Management Systems. The main research question for this study was as follows: What factors influence student motivation in a hashtag-based discussion forum? To investigate this question, the following subquestions guided the research: a. How do participants engage in the hashtag discussion assignment? b. What motivational and social influence factors affect participants' activity when they post to the Twitter hashtag? c. How do previous experience with and attitudes toward social media and online discussion forums affect participant motivation in the hashtag-based discussion forum? Drawing on the motivational theories of Self-Determination Theory and Social Influence Theory, as well as the concept of Personal Learning Environments, it was expected that online learners would be more motivated to participate in online discussions if they felt a sense of autonomy over the discussion, and if the discussion took place in an environment similar to the social media environment they experience in their personal lives. Participants in the course were undergraduate students in an educational technology course at a large Southeastern public university. Surveys were administered at the beginning and end of the semester to determine the participants’ patterns of technology and social media usage, attitudes toward social media and online discussion forums, and to determine motivation levels and social influence factors. -
INTRUSIVE MONITORING: EMPLOYEE PRIVACY EXPECTATIONS ARE REASONABLE in EUROPE, DESTROYED in the UNITED STATES Lothar Determannt & Robert Spragueu
INTRUSIVE MONITORING: EMPLOYEE PRIVACY EXPECTATIONS ARE REASONABLE IN EUROPE, DESTROYED IN THE UNITED STATES Lothar Determannt & Robert SpragueU TABLE OF CONTENTS I. INTRODUCTION ................. ...................... 980 II. EMPLOYER MONITORING AND EMPLOYEE PRIVACY-U.S. PERSPECTIVE ............................ 981 A. WORK-RELATED EMPLOYER MONITORING........................................981 B. WORK-RELATED EMPLOYEE PRIVACY ................ ....... 986 1. Work-Related Rights to Privag Under the Constitution.....................986 2. Work-Related Rights to Privag Under the Common Law..................990 3. Statutog Rjghts to Privag................................. 993 a) The Electronic Communications Privacy Act ............... 995 C. INTRUSIVE WORKPLACE MONITORING AND EMPLOYEE PRIVACY................................................ 1001 1. Employer Access to PersonalWeb-Based Applications..................... 1007 2. Webcams ...................................... 1009 3. GPS ..................................... 1012 D. WORKPLACE PRIVACY TRENDS IN THE UNITED STATES............... 1016 III. EMPLOYER MONITORING AND EMPLOYEE PRIVACY-EUROPEAN PERSPECTIVE .. ................... 1018 A. LAWS IN EUROPE-OVERVIEW ................ ............. 1019 B. CIVIL RIGHTS PROTECTIONS FOR PRIVACY AT THE EUROPEAN LEVEL............................. .......... 1019 ( 2011 Lothar Determann & Robert Sprague. t Dr. iur habil, Privatdozent, Freie Universitat Berlin; Adjunct Professor, University of California, Berkeley School of Law and Hastings College -
Thou Shalt Take Thy Victim As Thou Findest Him: Religious Conviction As a Pre-Existing State Not Subject to the Avoidable Consequences Doctrine
File: 5 Loomis.doc Created on: 12/14/06 4:44 PM Last Printed: 12/23/06 1:33 PM 2007] 473 THOU SHALT TAKE THY VICTIM AS THOU FINDEST HIM: RELIGIOUS CONVICTION AS A PRE-EXISTING STATE NOT SUBJECT TO THE AVOIDABLE CONSEQUENCES DOCTRINE Anne C. Loomis* INTRODUCTION As Gwendolyn Robbins’ seventy-year old father drove along a high- way in upstate New York, his car veered off the road at sixty-five miles per hour and turned over in a culvert on nearby farmland.1 After a long day of driving from New York City to Plattsburgh and back, he fell asleep at the wheel.2 Gwendolyn was a passenger in the car, and she suffered a severely damaged left hip and an injury to her right knee.3 Gwendolyn was faced with a choice: she could accept well-recognized and established surgical procedures, which would offer her the prospect of a good recovery and near-normal life; or, she could refuse these procedures and accept the inevi- table necrotic development in the bone structure of her injured limbs, which would ultimately lead to a wheelchair-bound life.4 For Gwendolyn, there was no question which option to take: the wheelchair-bound life. Gwendolyn was a devout Jehovah’s Witness, and she refused the surgical procedures because her religion prohibited blood transfusions, which the surgeries would require.5 When a defendant injures a plaintiff, tort law normally applies the “Avoidable Consequences Doctrine,” or the duty to mitigate damages. The plaintiff is expected to take reasonable steps to minimize her anticipated losses. -
I. A. Intellectual Approaches to Tort Law 1. Corrective Justice 2. Economic Approach/Deterrence Approach 3. Compensation Approac
Torts, Sharkey Fall 2006, Dave Fillingame I. INTRODUCTION A. Intellectual Approaches to Tort Law 1. Corrective Justice 2. Economic Approach/Deterrence Approach 3. Compensation Approach B. Holmes: Two theories of common-law liability: 1. Criminalist (Negligence) 2. “A man acts at his own peril” (strict liability) 3. Judge People by an Objective not a Subjective Standard of Care C. Judge v. Jury in Torts II. INTENTIONAL TORTS A. Elements B. Physical Harms 1. Battery a. Eggshell Skull Rule (Vosburg v. Putney) b. Intent to Act v. Intent to Harm c. “Substantial Certainty” Test (Garratt v. Dailey) d. “Playing Piano” (White v. University of Idaho) e. “Transferred” Intent 2. Defenses to Battery: Consent a. Consent b. Consent: Implied License c. Consent to Illegal Acts 3. Defenses to Battery: Insanity 4. Defenses to Battery: Self-Defense and Defense of Others a. Can be used as a defense when innocent bystanders harmed b. Can be used in defense of third-parties c. Must be proportional force 5. Defenses to Battery: Necessity C. Trespass to Land 1. No Damage is Required, Unauthorized Entry on Land is Enough a. An unfounded claim of right does not make a willful entry innocent. b. Quarum Clausum Fregit 2. Use of Deadly Force in Protection of Property a. Posner: We Must Create Incentives to Protect Tulips and Peacocks. b. Use Reasonable Force: Katko v. Briney (Iowa 1971) 3. Defense of Privilege a. Privilege of Necessity b. “General Average Contribution” c. Conditional (Incomplete) Privilege Vincent v. Lake Erie (Minn. 1910) d. The privilege exists only so long as the necessity does. -
Social Media Advice for Teachers and Parents
11 Sites and Apps Kids Are Heading to After Facebook Kelly Schryver Senior Content Specialist at Common Sense Media Advice for teachers and parents Kelly Schryver talks about the use of social networking sites by teenagers, but the use of some sites by younger children is becoming more common... Teachers and parents of all aged children need to be mindful of their use of social media. Remember MySpace? Not so long ago, practically every teen in the world was on it –- and then many left for Facebook. Now, as Facebook's popularity is starting to wane, you might be wondering what the new "it" social network is. But the days of a one-stop shop for all social networking needs are over. Instead, teens are dividing their attention between an array of apps and tools that let them write, share, video chat, and even shop for the latest trends. You don't need to know the ins and outs of every app and site that's "hot" right now (and frankly, if you did, they wouldn't be trendy anymore). But knowing the basics -- what they are, why they're popular, and the problems that can crop up when they're not used responsibly -- can make the difference between a positive and negative experience for your students. 11 Social Media Tools Parents and Teachers Need to Know About Now Ctrl+Click below to go direct to information about the social networking site you are interested in. Twitter Instagram Snapchat Tumblr Google+ Vine Wanelo Kik Messenger Ooovoo Pheed Ask.fm 1. -
Tumblr Evaluation
Content and Usability Report Autum Hosler English 420 Final Project Professor Daniel Tripp Penn State University table of contents. introduction.! 1 accessibility.! 2 tutorials.! 2 help page.! 3 usability.! 6 posts editor layout.! 6 messages.! 7 notifications.! 8 tracked tags.! 8 tag character limit.! 9 additional suggestions.! 10 dashboard customization.! 10 blacklisting.! 11 tag features.! 11 replies.! 12 chat.! 12 conclusion.! 13 Tumblr Content and Usability Report! i introduction. At the request of Mr. Karp, CEO of Tumblr, Inc., this report examines tumblr.com. Specifically, it seeks to assess the usability, accessibility, and design of the website from the standpoint of both new and everyday users. It also makes suggestions as to possible improvements for the website in order to make it easier and more enjoyable for its users. This report observes that several changes have recently been made to the layout of tumblr.com which are actually detrimental to its functionality, while other features that should be changed have been left untouched. Overall, this report recommends that several changes be made to the layout and design of tumblr.com in order to improve its functionality for its users. This report will address three main areas of concern pertaining to tumblr.com. The first topic addressed will be accessibility. This category will assess the ease with which a new tumblr user can navigate and learn the site and make suggestions as to how tumblr can become more accessible to potential new users. The second topic addressed will be usability. This category will assess the main features of the tumblr website that are used most frequently by regular users and make suggestions as to how to improve these features for easier use.