Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Vanderbilt University Law School (4)
- The Catholic University of America, Columbus School of Law (3)
- University of Miami Law School (3)
- Pepperdine University (2)
- West Virginia University (2)
-
- Case Western Reserve University School of Law (1)
- Chicago-Kent College of Law (1)
- Cleveland State University (1)
- Florida State University College of Law (1)
- Georgia State University College of Law (1)
- Loyola Marymount University and Loyola Law School (1)
- Ministry of Higher and Secondary Specialized Education of the Republic of Uzbekistan (1)
- Schulich School of Law, Dalhousie University (1)
- Southern Methodist University (1)
- St. John's University School of Law (1)
- St. Mary's University (1)
- The University of Akron (1)
- Touro University Jacob D. Fuchsberg Law Center (1)
- University at Buffalo School of Law (1)
- University of Baltimore Law (1)
- University of Michigan Law School (1)
- University of Richmond (1)
- University of South Carolina (1)
- Washington and Lee University School of Law (1)
- Publication
-
- Catholic University Journal of Law and Technology (2)
- Vanderbilt Journal of Entertainment & Technology Law (2)
- Vanderbilt Law Review (2)
- West Virginia Law Review (2)
- Akron Law Review (1)
-
- Buffalo Law Review (1)
- Catholic University Law Review (1)
- Chicago-Kent Law Review (1)
- Cleveland State Law Review (1)
- Dalhousie Law Journal (1)
- Florida State University Law Review (1)
- Georgia State University Law Review (1)
- Journal of Law, Technology, & the Internet (1)
- Journal of the National Association of Administrative Law Judiciary (1)
- Loyola of Los Angeles Law Review (1)
- Michigan Law Review (1)
- Pepperdine Law Review (1)
- Review of law sciences (1)
- SMU Law Review (1)
- South Carolina Journal of International Law and Business (1)
- St. John's Law Review (1)
- St. Mary's Law Journal (1)
- Touro Law Review (1)
- University of Baltimore Law Review (1)
- University of Miami Business Law Review (1)
- University of Miami International and Comparative Law Review (1)
- University of Miami Law Review (1)
- University of Richmond Law Review (1)
- Washington and Lee Journal of Civil Rights and Social Justice (1)
Articles 1 - 30 of 33
Full-Text Articles in Entire DC Network
Evolving Autonomous Vehicle Technology And The Erosion Of Privacy, Raquel Toral
Evolving Autonomous Vehicle Technology And The Erosion Of Privacy, Raquel Toral
University of Miami Business Law Review
No abstract provided.
The First Amendment In The Second Gilded Age, Jack M. Balkin
The First Amendment In The Second Gilded Age, Jack M. Balkin
Buffalo Law Review
How do we pay for the digital public sphere? In the Second Gilded Age, the answer is primarily through digital surveillance and through finding ever new ways to make money out of personal data. Digital capitalism in the Second Gilded Age features an implicit bargain: a seemingly unlimited freedom to speak in exchange for the right to surveil and manipulate end users.To protect freedom of speech in the Second Gilded Age we must distinguish the values of free speech from the judicially created doctrines of the First Amendment. That is because the practical freedom to speak online depends on a …
Privacy Spaces, Bert-Jaap Koops
Privacy Spaces, Bert-Jaap Koops
West Virginia Law Review
Privacy literature contains conceptualizations of privacy in relation to role-playing and identity construction, and in relation to access control and boundary-management. In this paper, I combine both strands to introduce the concept of privacy spaces: spaces in which you can play, in your own way, the relevant role(s) you have in social life. Drawing from privacy conceptions in legal scholarship, philosophy, sociology, anthropology, human geography, and psychology, a systematic overview of traditional privacy spaces is offered, including mental bubbles, the body, personal space, personal writings, the home, private conversation space, cars, stalls, intimacy bubbles, professional black boxes, coffee house spaces, …
Better Late Than Never: Bringing The Data Security Regulatory Environment Into The Modern Era, Jacob Holden
Better Late Than Never: Bringing The Data Security Regulatory Environment Into The Modern Era, Jacob Holden
West Virginia Law Review
No abstract provided.
Tactful Inattention: Erving Goffman, Privacy In The Digital Age, And The Virtue Of Averting One's Eyes, Elizabeth De Armond
Tactful Inattention: Erving Goffman, Privacy In The Digital Age, And The Virtue Of Averting One's Eyes, Elizabeth De Armond
St. John's Law Review
(Excerpt)
This Article suggests that we would benefit if we would protect privacy by sometimes requiring tactful inattention by potential users rather than total secrecy by the target. That is, some legal privacy protections should stop emphasizing secrecy and instead emphasize the appropriate uses of personally identifiable and often sensitive information by gelling tactful inattention into legal standards. Culturally, such an expansion may be difficult, as we tend to a “finders-keepers” attitude towards data. However, given technology’s ability to dissolve routine barriers, if we require others to leave some information out of some equations, we may be able to retain …
Property, Persons, And Institutionalized Police Interdiction In Byrd V. United States, Eric J. Miller
Property, Persons, And Institutionalized Police Interdiction In Byrd V. United States, Eric J. Miller
Loyola of Los Angeles Law Review
During a fairly routine traffic stop of a motorist driving a rental car, two State Troopers in Harrisburg, Pennsylvania, discovered that the driver, Terrence Byrd, was not the listed renter. The Court ruled that Byrd nonetheless retained a Fourth Amendment right to object to the search. The Court did not address, however, why the Troopers stopped Byrd in the first place. A close examination of the case filings reveal suggests that Byrd was stopped on the basis of his race. The racial feature ofthe stop is obscured by the Court’s current property-basedinterpretation of the Fourth Amendment’s right to privacy.
Although …
Common Sense: Rethinking The New Common Rule's Week Protections For Human Subjects, Ahsin Azim
Common Sense: Rethinking The New Common Rule's Week Protections For Human Subjects, Ahsin Azim
Vanderbilt Law Review
Since 1991, the Federal Policy for the Protection of Human Subjects, known as the "Common Rule," has protected the identifiable private information of human subjects who participate in federally funded research initiatives. Although the research landscape has drastically changed since 1991, the Common Rule has remained mostly unchanged since its promulgation. In an effort to modernize the Common Rule, the Federal Policy for the Protection of Human Subjects Final Rule ("Final Rule') was published on January 19, 2017. The Final Rule, however, decreases human-subject protections by increasing access to identifiable data with limited administrative oversight. Accordingly, the Final Rule demands …
Genderfucking Non-Disclosure: Sexual Fraud, Transgender Bodies, And Messy Identities, Florence Ashley
Genderfucking Non-Disclosure: Sexual Fraud, Transgender Bodies, And Messy Identities, Florence Ashley
Dalhousie Law Journal
If I don't tell you that I was assigned male at birth, as a transgender person, can I go to jail for sexual assault by fraud? In some jurisdictionslike England or Israel, the answer is: yes. Previous arguments against this criminalisation have focused on the realness of trans people's genders: since trans men are men and trans women are women, it is not misleading for them to present as they do. Highlighting the limitationsofthis position, which doesn't fully account for the messiness ofgendered experiences, the author puts forward an argument against the criminalisation of (trans)gender history non-disclosure rooted in privacy. …
Trafficking Technology: A Look At Different Approaches To Ending Technology-Facilitated Human Trafficking, David Barney
Trafficking Technology: A Look At Different Approaches To Ending Technology-Facilitated Human Trafficking, David Barney
Pepperdine Law Review
In 2018, many believe that slavery is an antiquated concept. But as with anything else, if it has not become extinct, it has evolved with time. Human trafficking is no different. Each year, millions of men, women and children are trafficked in the United States, and internationally, and forced to work against their will. Through the rise of technology and an increasingly globalized world, traffickers have learned to use technology as a tool to help facilitate the trafficking of persons and to sell those victims to others they never could have reached before. But what are we doing about it? …
Mining For Children’S Data In Today’S Digital World, Damin Park
Mining For Children’S Data In Today’S Digital World, Damin Park
Journal of the National Association of Administrative Law Judiciary
No abstract provided.
The Race For Privacy: Technological Evolution Outpacing Judicial Interpretations Of The Fourth Amendment: Playpen, The Dark Web, And Governmental Hacking, Wade Williams
Florida State University Law Review
Despite complying with the new amendments to Federal Rule of Criminal Procedure 41, the Federal Bureau of Investigation's (FBI) broad authorization to remotely access computers at anytime and anywhere within the United States is at odds with the reasonableness and particularity requirements of the Fourth Amendment. The exponential growth of technology has made life in the twenty-first century something our ancestors would envy, but the idea of allowing the government to perform unknown and undetected searches across the United States, especially in the hidden world of cyberspace, would have our founding fathers turning in their graves. Recognition is owed to …
Privacy Regulation In The Age Of Biometrics That Deal With A New World Order Of Information, Michael Monajemi
Privacy Regulation In The Age Of Biometrics That Deal With A New World Order Of Information, Michael Monajemi
University of Miami International and Comparative Law Review
No abstract provided.
Historical Aspects Of Ensuring The Protection Of Personal Confidential Information, X. Paulaniyazov
Historical Aspects Of Ensuring The Protection Of Personal Confidential Information, X. Paulaniyazov
Review of law sciences
This article examines some of the historical problems and ways of solving these problems, in the field of privacy and protection of personal private confidential information.
Self-Destruct Apps: Spoliation By Design?, Agnieszka Mcpeak
Self-Destruct Apps: Spoliation By Design?, Agnieszka Mcpeak
Akron Law Review
The Federal Rules of Civil Procedure are at risk of being out of sync with current technology trends. In particular, ephemeralmessaging applications, or “self-destruct apps,” are changing the way we conceptualize digital records. These apps embrace the industry goal of “privacy by design,” a positive trend in minimizing the amount of data that is created and stored. Civil discovery, on the other hand, contemplates data retention and preservation, particularly as to electronically stored information. This Article identifies the conflict between privacy by design—particularly self-destruct apps—and the civil discovery rules. It cautions against treating self-destruct apps as spoliation by design and …
A Status Update For Texas Voir Dire: Advocating For Pre-Trial Internet Investigation Of Prospective Jurors, Luke A. Harle
A Status Update For Texas Voir Dire: Advocating For Pre-Trial Internet Investigation Of Prospective Jurors, Luke A. Harle
St. Mary's Law Journal
The Internet provides trial attorneys an additional tool to investigate the backgrounds of prospective jurors during voir dire. Online searches of a person’s name and social media accounts can reveal information that could be used as grounds for a challenge for cause or to facilitate intelligent use of peremptory strikes. Texas lawmakers have not yet provided any official guidance as to whether attorneys can investigate prospective jurors online or how they might do so, should it be allowed. Texas’s current voir dire structure, judicial opinions, and ethics opinions, together, support the notion that Texas trial attorneys should be given opportunities …
Against Notice And Choice: The Manifest Failure Of The Proceduralist Paradigm To Protect Privacy Online (Or Anywhere Else), John A. Rothchild
Against Notice And Choice: The Manifest Failure Of The Proceduralist Paradigm To Protect Privacy Online (Or Anywhere Else), John A. Rothchild
Cleveland State Law Review
Notice and choice are the foundational principles underlying the regulation of privacy in online transactions and in most other situations in which individuals interact with the government and commercial interests. These principles mean that before collecting personally identifiable information (PII) from an individual, the collector must provide the individual with a disclosure (notice) of what PII it proposes to collect and how it proposes to use that information. That knowledge enables the individual to make a rational decision (choice) about whether to allow that collection of information, generally by declining to enter into the transaction or, in some situations, by …
Big Brother Is Watching: When Should Georgia Get Involved In Issues Of Family Privacy To Protect Children’S Liberties?, Michelle Wilco
Big Brother Is Watching: When Should Georgia Get Involved In Issues Of Family Privacy To Protect Children’S Liberties?, Michelle Wilco
Georgia State University Law Review
Alecia Faith Pennington (Faith) did not officially exist until she was nineteen. Faith’s conservative, religious parents, Lisa and James, raised their nine children on the family farm just outside Kerrville, Texas, and kept their family as self-sufficient and separate from the rest of the world as possible.
The family was very insular; the parents home schooled all of the children, and the family rarely left their home, with the rare exception of going to church. Lisa and James also prohibited their children from using the Internet until they were eighteen, at which point they were only allowed limited access to …
The Struggle To Define Privacy Rights And Liabilities In A Digital World And The Unfortunate Role Of Constitutional Standing, Juan Olano
University of Miami Law Review
Today’s world runs on data. The creation and improvement of technological products and services depend on the exchange of data between people and companies. As people’s lives become more digitized, companies can collect, store, and analyze more data, and in turn, create better technology. But, because consumer data can be very sensitive (think Social Security numbers, GPS location, fingerprint recognition, etc.) this cyclical exchange comes with serious privacy risks; especially in light of more frequent and sophisticated cyberattacks. This creates a face-off between technological growth and privacy rights. While it makes sense that people should be willing to subside some …
Information And The Regulatory Landscape: A Growing Need To Reconsider Existing Legal Frameworks, Anjanette H. Raymond
Information And The Regulatory Landscape: A Growing Need To Reconsider Existing Legal Frameworks, Anjanette H. Raymond
Washington and Lee Journal of Civil Rights and Social Justice
No abstract provided.
The Language-Game Of Privacy, Joshua A.T. Fairfield
The Language-Game Of Privacy, Joshua A.T. Fairfield
Michigan Law Review
A review of Ronald J. Krotoszynski, Jr., Privacy Revisited: A Global Perspective on the Right to Be Left Alone.
Being Forced To Code In The Technology Era As A Violation Of The First Amendment Protection Against Compelled Speech, Adrianna Oddo
Being Forced To Code In The Technology Era As A Violation Of The First Amendment Protection Against Compelled Speech, Adrianna Oddo
Catholic University Law Review
Over the past several decades, technological advancements led several courts to hold that computer code is protected as speech under the First Amendment of the Constitution. However, after fourteen people were killed in the 2015 San Bernardino massacre the U.S. Government sought to ignore those findings when it ordered Apple, Inc. to write a computer code to bypass the encryption software on the shooter’s cell phone. To access this particular phone Apple would need to write a code that could potentially compromise its customers’ data and personal information. Apple vehemently opposed the Government’s order and claimed that compelling it to …
Survey Of (Mostly Outdated And Often Ineffective) Laws Affecting Work-Related Monitoring, Robert Sprague
Survey Of (Mostly Outdated And Often Ineffective) Laws Affecting Work-Related Monitoring, Robert Sprague
Chicago-Kent Law Review
This article reviews various laws that affect work-related monitoring. It reveals that most of our privacy laws were adopted well before smartphones and the Internet became ubiquitous; they still hunt for physical secluded locations; and, because they are based on reasonable expectations of privacy, they can easily be circumvented by employer policies that eliminate that expectation by informing workers they have no right to privacy in the workplace. This article concludes that the future—indeed the present—does not bode well for worker privacy.
Borders And Bits, Jennifer Daskal
Borders And Bits, Jennifer Daskal
Vanderbilt Law Review
Our personal data is everywhere and anywhere, moving across national borders in ways that defy normal expectations of how things and people travel from Point A to Point B. Yet, whereas data transits the globe without any intrinsic ties to territory, the governments that seek to access or regulate this data operate with territorial-based limits. This Article tackles the inherent tension between how governments and data operate, the jurisdictional conflicts that have emerged, and the power that has been delegated to the multinational corporations that manage our data across borders as a result. It does so through the lens of …
Smart Baby Monitors: The Modern Nanny Or A Home Invader, Sarah Ensenat
Smart Baby Monitors: The Modern Nanny Or A Home Invader, Sarah Ensenat
Catholic University Journal of Law and Technology
Smart baby monitors exist to help parents protect and watch over their children. The smart baby monitors act as a second set of eyes when parents cannot be in the same room as their children. Low-tech hackers take advantage of gaps in the security of smart baby monitors. A hacker violates a consumer’s privacy by gaining access to private information, viewing the home and its occupants, and even speaking to children through the monitor.
This comment advocates for stricter security legislation for smart baby monitors. Without new legislation, manufacturers of smart baby monitors do not apply or invest in the …
Nit Vs. Tor: A Struggle For The Right To Internet Anonymity, Richard E. Byrne Iii
Nit Vs. Tor: A Struggle For The Right To Internet Anonymity, Richard E. Byrne Iii
University of Baltimore Law Review
No abstract provided.
Privacy And Outrage, Jordan M. Blanke
Privacy And Outrage, Jordan M. Blanke
Journal of Law, Technology, & the Internet
It is not an understatement that technology has dramatically altered virtually every aspect of our life in recent years. While technology has always driven change, these changes are occurring more rapidly and more extensively than ever before. We are fully entrenched in the world of Big Data, the Internet of Things, and Smart Cities – and we are never going back. As always, society and its laws must evolve, but it is not always an easy process.
The notion of privacy has certainly changed in our data-driven world and continues to change daily. While it has always been difficult to …
Katz V. United States: Back To The Future?, Michael Vitiello
Katz V. United States: Back To The Future?, Michael Vitiello
University of Richmond Law Review
No abstract provided.
"I Call Alexa To The Stand": The Privacy Implications Of Anthropomorphizing Virtual Assistants Accompanying Smart-Home Technology, Christopher B. Burkett
"I Call Alexa To The Stand": The Privacy Implications Of Anthropomorphizing Virtual Assistants Accompanying Smart-Home Technology, Christopher B. Burkett
Vanderbilt Journal of Entertainment & Technology Law
This Note offers a solution to the unique privacy issues posed by the increasingly humanlike interactions users have with virtual assistants, such as Amazon's Alexa, which accompany smart-home technology. These interactions almost certainly result in the users engaging in the cognitive phenomenon of anthropomorphism--more specifically, an assignment of agency. This is a phenomenon that has heretofore been ignored in the legal context, but both the rapidity of technological advancement and inadequacy of current applicable legal doctrine necessitate its consideration now. Since users view these anthropomorphized virtual assistants as persons rather than machines, the law should treat them as such. To …
A Drone’S Eye View: Why And How The Federal Aviation Administration Should Regulate Hobbyist Drone Use, Alexandria Tomanelli
A Drone’S Eye View: Why And How The Federal Aviation Administration Should Regulate Hobbyist Drone Use, Alexandria Tomanelli
Touro Law Review
No abstract provided.
A Free Ride: Data Brokers'rent-Seeking Behavior And The Future Of Data Inequality, Krishnamurty Muralidhar, Laura Palk
A Free Ride: Data Brokers'rent-Seeking Behavior And The Future Of Data Inequality, Krishnamurty Muralidhar, Laura Palk
Vanderbilt Journal of Entertainment & Technology Law
Historically, researchers obtained data from independent studies and government data. However, as public outcry for privacy regarding the government's maintenance of data has increased, the discretionary release of government data has decreased or become so anonymized that its relevance is limited. Research necessarily requires access to complete and accurate data. As such, researchers are turning to data brokers for the same, and often more, data than they can obtain from the government. Data brokers base their products and services on data gathered from a variety of free public sources and via the government-created Internet. Data brokers then recategorize the existing …