Jump to ContentJump to Main Navigation
PrivacyThe Lost Right$
Users without a subscription are not able to see the full content.

Jon L. Mills

Print publication date: 2008

Print ISBN-13: 9780195367355

Published to Oxford Scholarship Online: January 2009

DOI: 10.1093/acprof:oso/9780195367355.001.0001

Show Summary Details
Page of

PRINTED FROM OXFORD SCHOLARSHIP ONLINE (www.oxfordscholarship.com). (c) Copyright Oxford University Press, 2019. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in OSO for personal use. date: 19 September 2019

Legal Tools for Privacy Protection

Legal Tools for Privacy Protection

(p.105) CHAPTER IV Legal Tools for Privacy Protection

Jon L. Mills

Oxford University Press

Protections for intrusions into the four spheres of privacy have different legal foundations. The traditional protections take the form of constitutional and tort law. But limitations to protections for individual privacy under each of these approaches exist. This chapter examines the boundaries of privacy protection under each legal approach. As well as the traditional legal approaches discussed, it examines federal and state statutory protections for privacy. Other legal tools for remedying privacy invasions, such as property and contract theory, as well as common law remedies, are analyzed.

Keywords:   tort, property, First Amendment, constitutional privacy, communication, privacy statutes, computer, public record, relational privacy

Oxford Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs , and if you can't find the answer there, please contact us .