The new intrusion

Research output: Contribution to journalArticle

15 Citations (Scopus)

Abstract

The tort of intrusion upon seclusion offers the best theory to target legitimate privacy harms in the Information age.This Article introduces a new taxonomy that organizes privacy regulations acrossfour key stages of information flow-Observation, capture (the creation of a record), dissemination, and use.Privacy scholars typically propose placing constraints on the dissemination and re-use of personal information, and these dominant modeis are at the heart of President Obama's Consumer Privacy Bill of Rights.But these restrictions conjlict with the First Amendment and other important shared values.Instead, Observation is the most promising stagefor legal intervention.Intrusion imposes liability for conduct-offensive observations.The tort is theoretically coherent and constitutionally sound because an individual's interests in seclusion co-exist comfortably with society's interests in data dissemination.This puts intrusion in stark contrast with other privacy modeis, where the alleged härm is a direct consequence of an increase in knowledge.The classic intrusion tort can adapt sensibly to new technologies when it is reduced to two essential elements: (1) an Observation, (2) that is offensive.This approach vindicates privacy law's historical roots in torts and offers a path to principled privacy regulation.

Original languageEnglish (US)
Pages (from-to)205-275
Number of pages71
JournalNotre Dame Law Review
Volume88
Issue number1
StatePublished - Nov 2012

Fingerprint

privacy
privacy law
regulation
information flow
bill
taxonomy
liability
amendment
new technology
president
society
Values

ASJC Scopus subject areas

  • Law

Cite this

The new intrusion. / Bambauer, Jane Roberta.

In: Notre Dame Law Review, Vol. 88, No. 1, 11.2012, p. 205-275.

Research output: Contribution to journalArticle

Bambauer, JR 2012, 'The new intrusion', Notre Dame Law Review, vol. 88, no. 1, pp. 205-275.
Bambauer, Jane Roberta. / The new intrusion. In: Notre Dame Law Review. 2012 ; Vol. 88, No. 1. pp. 205-275.
@article{708056b7db594040aead803d44507ddb,
title = "The new intrusion",
abstract = "The tort of intrusion upon seclusion offers the best theory to target legitimate privacy harms in the Information age.This Article introduces a new taxonomy that organizes privacy regulations acrossfour key stages of information flow-Observation, capture (the creation of a record), dissemination, and use.Privacy scholars typically propose placing constraints on the dissemination and re-use of personal information, and these dominant modeis are at the heart of President Obama's Consumer Privacy Bill of Rights.But these restrictions conjlict with the First Amendment and other important shared values.Instead, Observation is the most promising stagefor legal intervention.Intrusion imposes liability for conduct-offensive observations.The tort is theoretically coherent and constitutionally sound because an individual's interests in seclusion co-exist comfortably with society's interests in data dissemination.This puts intrusion in stark contrast with other privacy modeis, where the alleged h{\"a}rm is a direct consequence of an increase in knowledge.The classic intrusion tort can adapt sensibly to new technologies when it is reduced to two essential elements: (1) an Observation, (2) that is offensive.This approach vindicates privacy law's historical roots in torts and offers a path to principled privacy regulation.",
author = "Bambauer, {Jane Roberta}",
year = "2012",
month = "11",
language = "English (US)",
volume = "88",
pages = "205--275",
journal = "Notre Dame Law Review",
issn = "0745-3515",
publisher = "Notre Dame Law School",
number = "1",

}

TY - JOUR

T1 - The new intrusion

AU - Bambauer, Jane Roberta

PY - 2012/11

Y1 - 2012/11

N2 - The tort of intrusion upon seclusion offers the best theory to target legitimate privacy harms in the Information age.This Article introduces a new taxonomy that organizes privacy regulations acrossfour key stages of information flow-Observation, capture (the creation of a record), dissemination, and use.Privacy scholars typically propose placing constraints on the dissemination and re-use of personal information, and these dominant modeis are at the heart of President Obama's Consumer Privacy Bill of Rights.But these restrictions conjlict with the First Amendment and other important shared values.Instead, Observation is the most promising stagefor legal intervention.Intrusion imposes liability for conduct-offensive observations.The tort is theoretically coherent and constitutionally sound because an individual's interests in seclusion co-exist comfortably with society's interests in data dissemination.This puts intrusion in stark contrast with other privacy modeis, where the alleged härm is a direct consequence of an increase in knowledge.The classic intrusion tort can adapt sensibly to new technologies when it is reduced to two essential elements: (1) an Observation, (2) that is offensive.This approach vindicates privacy law's historical roots in torts and offers a path to principled privacy regulation.

AB - The tort of intrusion upon seclusion offers the best theory to target legitimate privacy harms in the Information age.This Article introduces a new taxonomy that organizes privacy regulations acrossfour key stages of information flow-Observation, capture (the creation of a record), dissemination, and use.Privacy scholars typically propose placing constraints on the dissemination and re-use of personal information, and these dominant modeis are at the heart of President Obama's Consumer Privacy Bill of Rights.But these restrictions conjlict with the First Amendment and other important shared values.Instead, Observation is the most promising stagefor legal intervention.Intrusion imposes liability for conduct-offensive observations.The tort is theoretically coherent and constitutionally sound because an individual's interests in seclusion co-exist comfortably with society's interests in data dissemination.This puts intrusion in stark contrast with other privacy modeis, where the alleged härm is a direct consequence of an increase in knowledge.The classic intrusion tort can adapt sensibly to new technologies when it is reduced to two essential elements: (1) an Observation, (2) that is offensive.This approach vindicates privacy law's historical roots in torts and offers a path to principled privacy regulation.

UR - http://www.scopus.com/inward/record.url?scp=84867830561&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84867830561&partnerID=8YFLogxK

M3 - Article

AN - SCOPUS:84867830561

VL - 88

SP - 205

EP - 275

JO - Notre Dame Law Review

JF - Notre Dame Law Review

SN - 0745-3515

IS - 1

ER -