Baumhart, Peter B.
January 2015
University of Michigan Journal of Law Reform;Winter2015, Vol. 48 Issue 2, p503
Academic Journal
In the modern technological age, social media allows us to communicate vast amounts of personal information to countless people instantaneously. This information is valuable to more than just our "friends" and "followers," however. Prospective employers can use this personal data to inform hiring decisions, thereby maximizing fit and minimizing potential liability. The question then arises, how best to acquire this information? For job applicants, the counter-question is how best to protect the privacy of their social media accounts. As these two competing desires begin to clash, it is important to find a method to mediate the conflict. Existing privacy law, whether rooted in constitutional, statutory, or common law, is insufficient to cope with the practice, and pending legislation also fails to adequately account for the legitimate interests of both parties. This Note advocates a novel solution: a modified information escrow that would provide employers with the relevant information they seek while keeping private the substantive content of applicants' social media accounts.


Related Articles

  • PRIVACY IN THE POST-MODERN ERA - AN UNREALIZED IDEAL? Greer, Damon // Sedona Conference Journal;Sep2011, Vol. 12, p189 

    The article focuses on online data protection law in the U.S. The author states that online privacy in the U.S. has received enforcement from the Federal Trade Commission (FTC), and deliberations in the Congress to develop online privacy legislation to protect consumers who use the Internet for...

  • The Place Where There is No Darkness: Privacy and Protest in the Age of Social Media. Carius, William // New England Journal on Criminal & Civil Confinement;Winter2014, Vol. 40 Issue 1, p135 

    As social networks become increasingly intertwined with our daily lives, the question has arisen of what to do when those networks are in posses-sion of potentially incriminating or legally desirable information. This is most obvious in cases where social networks, such as Twitter, are...

  • Facebook Isn't Your Space Anymore: Discovery of Social Networking Websites.  // Kansas Law Review;2010, Vol. 59 Issue 5, p1279 

    The article discusses the legislation surrounding the access of social networking sites in Kansas in 2010. It notes tackles the intrinsic purpose of these sites and its challenges to privacy. It evaluates the conditions of the rapid growth of the use of these sites and the issues on the...

  • Shaping a privacy remedy from the action formerly described as breach of confidence. Gibbons, Thomas // Communications Law: Journal of Computer, Media & Telecommunicati;2005, Vol. 10 Issue 2, p39 

    The article presents information on the creation of a common law regarding right to privacy in Great Britain. The court has confirmed the relevance of underlying principles based on the personality concerns of individuals rather than commercial or property rights. It has also started to develop...

  • Privacy Rights and Abortion Outing: A Proposal for Using Common-Law Torts To Protect Abortion Patients and Staff. Clapman, Alice // Yale Law Journal;Apr2003, Vol. 112 Issue 6, p1545 

    Examines the possibility of using common-law privacy rights to cover gaps left by other forms of legal protection for abortion in the U.S.. Discussion on various privacy interests at stake in the debate over abortion outing; Conflicting interests of anti-abortion protestors; Explanation on...

  • Get a Handle on Social Media Content. Lifschitz, Judah; Carry, George // ENR: Engineering News-Record;4/15/2013, Vol. 270 Issue 11, p1 

    The article discusses social media use by employees and its impact on engineering industry business entities as of April 2013, focusing on privacy and data security issues, various social media-related court decisions, and the risks associated with electronically stored information (ESI). Online...

  • With "Friends" Like These, Who Needs Enemies? Passwords, Privacy, and the Discovery of Social Media Content. Browning, John G. // American Journal of Trial Advocacy;Spring2013, Vol. 36 Issue 3, p505 

    The emergence of social media has expanded the bounds of discovery and the information sought by parties. Yet there is no unanimity in opinion among the courts when determining whether to compel production of a party's social media login and password credentials. This Article examines the...

  • LOOKING BEHIND THE CURTAIN. Rogers, Jeremy // Claims;Jul2015, Vol. 63 Issue 7, p24 

    The article discusses a recent estimate which found that around 1,40 minutes in a day spent on social media by claimant. The counsel now instruct claimants to limit social media use, increase privacy settings to the highest levels and decline any new "friend" requests. Topics discussed includes...

  • Social Media Hazards. Daniels, Julie // Facts & Findings;May/Jun2011, Vol. 37 Issue 6, p16 

    The article offers information on the potential hazards of social media. It mentions that employees and companies have to be aware that the use of social media and online postings is discoverable in a litigation context. It states that a company may also have a responsibility to protect...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics