[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Meltz, 2014 - Google Patents

No Harm, No Foul: Attempted Invasion of Privacy and the Tort of Intrusion upon Seclusion

Meltz, 2014

View PDF
Document ID
14169943740570605182
Author
Meltz E
Publication year
Publication venue
Fordham L. Rev.

External Links

Snippet

On November 3, 2014, Aksana Kutzmitskaya filed a complaint in New York State Supreme Court alleging that her former employers, two managing members and supervisors of a Manhattan apartment building where she lived and worked, installed spy cameras in her …
Continue reading at ir.lawnet.fordham.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/22Health care, e.g. hospitals; Social work
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
    • G06Q50/01Social networking

Similar Documents

Publication Publication Date Title
Meltz No Harm, No Foul: Attempted Invasion of Privacy and the Tort of Intrusion upon Seclusion
Hirose Privacy in public spaces: The reasonable expectation of privacy against the dragnet use of facial recognition technology
Freund When cameras are rolling: Privacy implications of body-mounted cameras on police
Jain The Interior Structure of Immigration Enforcement
Determann et al. Intrusive monitoring: Employee privacy expectations are reasonable in Europe, destroyed in the United States
Bambauer Other People's Papers
Paton-Simpson Privacy and the reasonable paranoid: The protection of privacy in public places
Epstein Privacy and the Third Hand: Lessons from the Common Law of Reasonable Expectations
Kim Electronic Privacy and Employee Speech
Sprague Orwell was an Optimist: the Evolution of Privacy in the United States and its De-evolution for American Employees
Taylor Awareness, understanding and experiences of CCTV amongst teachers and pupils in three UK schools
Vishnuvajjala Insecure communities: How an immigration enforcement program encourages battered women to stay silent
Moreham Beyond information: physical privacy in english law
Logan Policing police access to criminal justice data
Morrison Privacy, accountability, and the cooperating defendant: Towards a new role for internet access to court records
Colb A world without privacy: why property does not define the limits of the right against unreasonable searches and seizures
Solove et al. Privacy, law enforcement, and national security
Campbell Defining a Fourth Amendment Search: A Critique of the Supreme Court's Post-Katz Jurisprudence
Paton-Simpson Private Circles and Public Squares: Invasion of Privacy by the Publication of Private Facts
Benton Seeking warrants for unknown locations: the mismatch between digital pegs and territorial holes
Freedman The right of privacy in the age of computer data and processing
Bell Theatrical investigation: White-collar crime, undercover operations, and privacy
Lee The unusual suspects: journalists as thieves
Bickel et al. Seeing Past Privacy: Will the Development and Application of CCTV and Other Video Security Technology Compromise and Essential Constitutional Right in a Democracy, or Will the Courts Strike a Proper Balance
Kolaković-Bojović et al. Crime Victims and the Right to Human Dignity-Challenges and Attitudes in Serbia