Meltz, 2014 - Google Patents
No Harm, No Foul: Attempted Invasion of Privacy and the Tort of Intrusion upon SeclusionMeltz, 2014
View PDF- Document ID
- 14169943740570605182
- Author
- Meltz E
- Publication year
- Publication venue
- Fordham L. Rev.
External Links
Snippet
On November 3, 2014, Aksana Kutzmitskaya filed a complaint in New York State Supreme Court alleging that her former employers, two managing members and supervisors of a Manhattan apartment building where she lived and worked, installed spy cameras in her …
- 230000029578 entry into host 0 title description 85
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/22—Health care, e.g. hospitals; Social work
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/01—Social networking
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Meltz | No Harm, No Foul: Attempted Invasion of Privacy and the Tort of Intrusion upon Seclusion | |
Hirose | Privacy in public spaces: The reasonable expectation of privacy against the dragnet use of facial recognition technology | |
Freund | When cameras are rolling: Privacy implications of body-mounted cameras on police | |
Jain | The Interior Structure of Immigration Enforcement | |
Determann et al. | Intrusive monitoring: Employee privacy expectations are reasonable in Europe, destroyed in the United States | |
Bambauer | Other People's Papers | |
Paton-Simpson | Privacy and the reasonable paranoid: The protection of privacy in public places | |
Epstein | Privacy and the Third Hand: Lessons from the Common Law of Reasonable Expectations | |
Kim | Electronic Privacy and Employee Speech | |
Sprague | Orwell was an Optimist: the Evolution of Privacy in the United States and its De-evolution for American Employees | |
Taylor | Awareness, understanding and experiences of CCTV amongst teachers and pupils in three UK schools | |
Vishnuvajjala | Insecure communities: How an immigration enforcement program encourages battered women to stay silent | |
Moreham | Beyond information: physical privacy in english law | |
Logan | Policing police access to criminal justice data | |
Morrison | Privacy, accountability, and the cooperating defendant: Towards a new role for internet access to court records | |
Colb | A world without privacy: why property does not define the limits of the right against unreasonable searches and seizures | |
Solove et al. | Privacy, law enforcement, and national security | |
Campbell | Defining a Fourth Amendment Search: A Critique of the Supreme Court's Post-Katz Jurisprudence | |
Paton-Simpson | Private Circles and Public Squares: Invasion of Privacy by the Publication of Private Facts | |
Benton | Seeking warrants for unknown locations: the mismatch between digital pegs and territorial holes | |
Freedman | The right of privacy in the age of computer data and processing | |
Bell | Theatrical investigation: White-collar crime, undercover operations, and privacy | |
Lee | The unusual suspects: journalists as thieves | |
Bickel et al. | Seeing Past Privacy: Will the Development and Application of CCTV and Other Video Security Technology Compromise and Essential Constitutional Right in a Democracy, or Will the Courts Strike a Proper Balance | |
Kolaković-Bojović et al. | Crime Victims and the Right to Human Dignity-Challenges and Attitudes in Serbia |