Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of Michigan Law School (3)
- Brooklyn Law School (2)
- Maurer School of Law: Indiana University (2)
- The Catholic University of America, Columbus School of Law (2)
- University of Richmond (2)
-
- Vanderbilt University Law School (2)
- Washington and Lee University School of Law (2)
- Boston University School of Law (1)
- Emory University School of Law (1)
- Florida International University College of Law (1)
- Florida State University College of Law (1)
- Fordham Law School (1)
- Loyola Marymount University and Loyola Law School (1)
- Pepperdine University (1)
- Touro University Jacob D. Fuchsberg Law Center (1)
- University of San Diego (1)
- Publication Year
- Publication
-
- Indiana Law Journal (2)
- Michigan Telecommunications & Technology Law Review (2)
- Richmond Journal of Law & Technology (2)
- Brooklyn Journal of International Law (1)
- Brooklyn Law Review (1)
-
- Catholic University Journal of Law and Technology (1)
- Catholic University Law Review (1)
- Emory Law Journal (1)
- FIU Law Review (1)
- Faculty Scholarship (1)
- Fordham Intellectual Property, Media and Entertainment Law Journal (1)
- Journal of the National Association of Administrative Law Judiciary (1)
- Loyola of Los Angeles Law Review (1)
- San Diego International Law Journal (1)
- Scholarly Articles (1)
- Scholarly Publications (1)
- Touro Law Review (1)
- University of Michigan Journal of Law Reform (1)
- Vanderbilt Journal of Entertainment & Technology Law (1)
- Vanderbilt Law Review (1)
- Washington and Lee Journal of Civil Rights and Social Justice (1)
- Publication Type
Articles 1 - 24 of 24
Full-Text Articles in Entire DC Network
Data In Distress: Effectuating State Data Privacy Laws During Bankruptcy, Cameron Love
Data In Distress: Effectuating State Data Privacy Laws During Bankruptcy, Cameron Love
Emory Law Journal
In 2000, an online toy retailer, Toysmart.com, attempted to liquidate consumer data to pay creditors in its bankruptcy case. The attempted sale drew objections from the Federal Trade Commission and forty-seven state attorneys general. Five years later, Congress attempted to resolve privacy concerns in bankruptcy, amending the Bankruptcy Code to provide clear procedures for the liquidation of “personally identifiable information.” Recently, scholars have criticized these amendments, characterizing them as “limited,” “outdated,” and “privacy theater.” This Comment adds to these criticisms, arguing the amendments’ failure to mandate consideration of relevant nonbankruptcy law puts these permissive sales procedures on a collision course …
Do Not Touch My Data: Exploring A Disclosure-Based Framework To Address Data Access, Francis Morency
Do Not Touch My Data: Exploring A Disclosure-Based Framework To Address Data Access, Francis Morency
Washington and Lee Journal of Civil Rights and Social Justice
Companies have too much control over people’s information. In the data marketplace, companies package and sell individuals’ data, and these individuals have little to no bargaining power over the process. Companies may freely buy and sell people’s data in the private sector for targeted marketing and behavior manipulation. In the justice system, an unchecked data marketplace leaves black and brown communities vulnerable to serious data access issues caused by predictive sentencing, for example. Risk assessment algorithms in predictive sentencing rely on data on individuals and run all relevant data points to provide the likelihood that a defendant will recidivate low …
The Need For Curtains Of The Soul: Privacy Versus Transparency In The Instrumented World Of Algorithmic Artificial Intelligence, Michael Martin Losavio
The Need For Curtains Of The Soul: Privacy Versus Transparency In The Instrumented World Of Algorithmic Artificial Intelligence, Michael Martin Losavio
FIU Law Review
We approach a privacy singularity in pervasive data collection and inference that may reveal all about our lives. While privacy might not yet be dead, we struggle to maintain its shield for personal autonomy. Part of this contemporary challenge comes from the massive data sets generated every day everywhere. And then the powerful analytics that reveal all. This is further challenged by efforts at data transparency that may reveal too much of one’s life. Preservation of privacy, if we deem it important enough to preserve, must have a robust set of technical and legislative implementations on collection, storage, transmission and …
The Missing Regulatory State: Monitoring Businesses In An Age Of Surveillance, Rory V. Loo
The Missing Regulatory State: Monitoring Businesses In An Age Of Surveillance, Rory V. Loo
Vanderbilt Law Review
An irony of the information age is that the companies responsible for the most extensive surveillance of individuals in history-large platforms such as Amazon, Facebook, and Google-have themselves remained unusually shielded from being monitored by government regulators. But the legal literature on state information acquisition is dominated by the privacy problems of excess collection from individuals, not businesses. There has been little sustained attention to the problem of insufficient information collection from businesses. This Article articulates the administrative state's normative framework for monitoring businesses and shows how that framework is increasingly in tension with privacy concerns. One emerging complication is …
Privacy Remedies, Lauren H. Scholz
Privacy Remedies, Lauren H. Scholz
Indiana Law Journal
When consumers sue companies for privacy-intrusive practices, they are often unsuccessful. Many cases fail in federal court at the motion to dismiss phase because the plaintiff has not shown the privacy infringement has caused her concrete harm. This is a symptom of a broader issue: the failure of courts and commentators to describe the relationship between privacy rights and privacy remedies.
This Article contends that restitution is the normal measure of privacy remedies. Restitution measures relief by economic gain to the defendant. If a plaintiff can show the likely ability to recover in restitution, that should be sufficient to pass …
The Future Of Facial Recognition Is Not Fully Known: Developing Privacy And Security Regulatory Mechanisms For Facial Recognition In The Retail Sector, Elias Wright
Fordham Intellectual Property, Media and Entertainment Law Journal
In recent years, advances in facial recognition technology have resulted in a rapid expansion in the prevalence of private sector biometric technologies. Facial recognition, while providing new potentials for safety and security and personalized marketing by retailers implicates complicated questions about the nature of consumer privacy and surveillance where a “collection imperative” incentivize corporate actors to accumulate increasingly massive reservoirs of consumer data. However, the law has not yet fully developed to address the unique risks to consumers through the use of this technology. This Note examines existing regulatory mechanisms, finding that consumer sensitivities and the opaque nature of the …
Data Protection In An Increasingly Globalized World, Nicholas F. Palmieri Iii
Data Protection In An Increasingly Globalized World, Nicholas F. Palmieri Iii
Indiana Law Journal
With the rise of the internet in recent decades, it has become increasingly easy for various enterprises—including retailers, advertising agencies, and service providers—to acquire, use, and even share the personal details of their users. Such a trend is unlikely to decrease in the coming years; in fact, internet usage is only likely to increase as more and more people gain access to the internet. In the wakeof recent data breaches, including the now infamous breach of Equifax as well as the scandal involving Facebook and Cambridge Analytica, people are even more aware of the need for (and the risk of …
The Tortoise And The Hare Of International Data Privacy Law: Can The United States Catch Up To Rising Global Standards?, Matthew Humerick
The Tortoise And The Hare Of International Data Privacy Law: Can The United States Catch Up To Rising Global Standards?, Matthew Humerick
Catholic University Journal of Law and Technology
Technological developments spur the development of big data on a global scale. The breadth of data companies collect, maintain, process, and transmit affects nearly every country and organization around the world. Inherent to big data are issues of data protection and transfers to third countries. While many jurisdictions emphasize the importance of protecting consumer data, such as the European Union, others, like the United States, do not. To circumvent this issue, the United States and European Union contracted around data privacy standard discrepancies through the Safe Harbor Agreement, which eased cross-border data transfers. However, the Court of Justice of the …
Who Are The Real Cyberbullies: Hackers Or The Ftc? The Fairness Of The Ftc’S Authority In The Data Security Context, Jaclyn K. Haughom
Who Are The Real Cyberbullies: Hackers Or The Ftc? The Fairness Of The Ftc’S Authority In The Data Security Context, Jaclyn K. Haughom
Catholic University Law Review
As technology continues to be an integral part of daily life, there lies an ever-increasing threat of the personally identifiable information of consumers being lost, stolen, or accessed without authorization. The Federal Trade Commission (FTC) is the U.S. government’s primary consumer protection agency and the country’s lead enforcer against companies subject to data breaches. Although the FTC lacks explicit statutory authority to enforce against data breaches, the Commission has successfully relied on Section 5 of the FTC Act (FTCA) to exercise its consumer protection power in the data security context. However, as the FTC continues to take action against businesses …
Peeling Back The Student Privacy Pledge, Alexi Pfeffer-Gillett
Peeling Back The Student Privacy Pledge, Alexi Pfeffer-Gillett
Scholarly Articles
Education software is a multi-billion dollar industry that is rapidly growing. The federal government has encouraged this growth through a series of initiatives that reward schools for tracking and aggregating student data. Amid this increasingly digitized education landscape, parents and educators have begun to raise concerns about the scope and security of student data collection.
Industry players, rather than policymakers, have so far led efforts to protect student data. Central to these efforts is the Student Privacy Pledge, a set of standards that providers of digital education services have voluntarily adopted. By many accounts, the Pledge has been a success. …
“Hello…It’S Me. [Please Don’T Sue Me!]” Examining The Fcc’S Overbroad Calling Regulations Under The Tcpa, Marissa A. Potts
“Hello…It’S Me. [Please Don’T Sue Me!]” Examining The Fcc’S Overbroad Calling Regulations Under The Tcpa, Marissa A. Potts
Brooklyn Law Review
Americans have received unwanted telemarketing calls for decades. In response to a rapid increase in pre-recorded calls made using autodialer devices, Congress enacted the Telephone Consumer Protection Act (TCPA) in 1992. The TCPA imposes restrictions on calls made to consumers’ residences and wireless phones using autodialer devices, even if they are not telemarketing calls. Congress appointed the Federal Communications Commission (FCC) to prescribe rules and regulations to enforce the TCPA. In 2015, the FCC released an order that defined autodialer more broadly under the statute. Consequently, devices that have the potential to become autodialers in the future, even if they …
Protecting Personal Information: Achieving A Balance Between User Privacy And Behavioral Targeting, Patrick Myers
Protecting Personal Information: Achieving A Balance Between User Privacy And Behavioral Targeting, Patrick Myers
University of Michigan Journal of Law Reform
Websites and mobile applications provide immeasurable benefits to both users and companies. These services often collect vast amounts of personal information from the individuals that use them, including sensitive details such as Social Security numbers, credit card information, and physical location. Personal data collection and dissemination leave users vulnerable to various threats that arise from the invasion of their privacy, particularly because users are often ignorant of the existence or extent of these practices. Current privacy law does not provide users with adequate protection from the risks attendant to the collection and dissemination of their personal information. This Note advocates …
The Need For An International Convention On Data Privacy: Taking A Cue From The Cisg, Morgan Corley
The Need For An International Convention On Data Privacy: Taking A Cue From The Cisg, Morgan Corley
Brooklyn Journal of International Law
In light of the invalidation of the U.S.-EU Safe Harbor, along with the increase in sales of personal data as a commodity, data privacy has become a major concern amongst different nations. The lack of harmonization of data-privacy laws around the world continues to pose obstacles to the free flow of data across national borders. The free flow of data is, nonetheless, essential the international economy. As a result, nations continue to work together to try to create mechanisms by which data can be transferred across borders in a secure manner. This Note examines the current state of data-privacy law …
Need For Informed Consent In The Age Of Ubiquitous Human Testing, Caitlyn Kuhs
Need For Informed Consent In The Age Of Ubiquitous Human Testing, Caitlyn Kuhs
Loyola of Los Angeles Law Review
No abstract provided.
Data Privacy Regulation In The Age Of Smartphones, Matthew Hettrich
Data Privacy Regulation In The Age Of Smartphones, Matthew Hettrich
Touro Law Review
No abstract provided.
Sacrificing Privacy For Convenience: The Need For Stricter Ftc Regulations In An Age Of Smartphone Surveillance, Ashton Mckinnon
Sacrificing Privacy For Convenience: The Need For Stricter Ftc Regulations In An Age Of Smartphone Surveillance, Ashton Mckinnon
Journal of the National Association of Administrative Law Judiciary
This comment aims to focus on the most frequently used connector that consumers treasure not only for convenience but also as a lifelong necessity - the smartphone. The FTC needs to enforce federally mandated guidelines that will allow the consumer to use technology without the technology using the consumer. Part II of this comment focuses on the type of information that can be collected by various companies, service providers, and agencies from an individual's smartphone, and the intentions of these collectors behind use of this information. Part III evaluates how applications (apps) contribute to this scheme, and, specifically, apps' recordkeeping …
The Scope And Potential Of Ftc Data Protection, Woodrow Hartzog, Daniel J. Solove
The Scope And Potential Of Ftc Data Protection, Woodrow Hartzog, Daniel J. Solove
Faculty Scholarship
For more than fifteen years, the FTC has regulated privacy and data security through its authority to police deceptive and unfair trade practices as well as through powers conferred by specific statutes and international agreements. Recently, the FTC’s powers for data protection have been challenged by Wyndham Worldwide Corp. and LabMD. These recent cases raise a fundamental issue, and one that has surprisingly not been well explored: How broad are the FTC’s privacy and data security regulatory powers? How broad should they be?
In this Article, we address the issue of the scope of FTC authority in the areas of …
Note, Institutionally Appropriate Approaches To Privacy: Striking A Balance Between Judicial And Administrative Enforcement Of Privacy Law, Lauren Henry Scholz
Note, Institutionally Appropriate Approaches To Privacy: Striking A Balance Between Judicial And Administrative Enforcement Of Privacy Law, Lauren Henry Scholz
Scholarly Publications
No abstract provided.
Drawing The Line Between Competing Interests: Strengthening Online Data Privacy Protection In An Increasingly Networked World, Lori Chiu
San Diego International Law Journal
This article seeks to elucidate these issues and provide a roadmap for the U.S. government to create unified federal laws to provide the private sector with specific protocols regarding use and dissemination of consumer personal information. First, this article will provide an explanation of the U.S.’s current sector-by-sector approach to regulating personally identifying information and will provide a case study of the Federal Trade Commission’s (“FTC”) enforcement action against a social networking site in 2011 as one example of the FTC’s recent efforts at regulating online privacy. Next, this article will analyze the U.S.’s current challenge of judicial enforcement of …
Privacy Policies, Terms Of Service, And Ftc Enforcement: Broadening Unfairness Regulation For A New Era, G. S. Hans
Privacy Policies, Terms Of Service, And Ftc Enforcement: Broadening Unfairness Regulation For A New Era, G. S. Hans
Michigan Telecommunications & Technology Law Review
This Note examines website privacy policies in the context of FTC regulation. The relevant portion of Section 5 of the Federal Trade Commission Act, 15 U.S.C. § 45(a), uses the following language to define the scope of the agency's regulatory authority: "Unfair methods of competition in or affecting commerce, and unfair or deceptive acts or practices in or affecting commerce, are hereby declared unlawful." Specifically, this Note analyzes the FTC's power to regulate unfair practices (referred to as the FTC's "unfairness power") granted by Section 5, and also discusses the deception prong of Section 5, which allows the agency to …
A Path Toward User Control Of Online Profiling, Tracy A. Steindel
A Path Toward User Control Of Online Profiling, Tracy A. Steindel
Michigan Telecommunications & Technology Law Review
Online profiling is "the practice of tracking information about consumers' interests by monitoring their movements online." A primary purpose of online profiling is to "deliver advertising tailored to the individual's interests," a practice known as online behavioral advertising (OBA). In order to accomplish this, publishers and advertisers track a individual's online behavior using cookies and other means. Publishers and advertisers aggregate the information, often compile it with information from offline sources, and sort individuals into groups based on characteristics such as age, income, and hobbies. Advertisers can then purchase access to these consumer groups, controlling their selections with such specificity …
Current And Emerging Transportation Technology: Final Nails In The Coffin Of The Dying Right Of Privacy?, James D. Phillips, Katharine E. Kohm
Current And Emerging Transportation Technology: Final Nails In The Coffin Of The Dying Right Of Privacy?, James D. Phillips, Katharine E. Kohm
Richmond Journal of Law & Technology
Transportation networks constitute “the circulatory system of our economy.” The distinct modes that constitute the American transportation system—air, rail, transit, highways, and waterways—impact the entire range of our daily activities. Just as the human body depends on its circulatory system for life and well being, the United States’ vitality would grind to a halting stop without a vibrant transportation system.
Consumer Privacy On The Internet, Andrew Shen
Consumer Privacy On The Internet, Andrew Shen
Richmond Journal of Law & Technology
If we do not bear the loss of this privacy then the prices would be passed along to consumers anyway. We're between a rock and a hard place there's nowhere that we can go. But I think we can be more optimistic than that and I think we can preserve privacy and I think we can further growth of electronic commerce. So let me begin with the consumer perspective. I would like to start with a trend that Mike has already done a good job of starting us out on, and that is the current popularity of personalization and customization. …
Filling The Black Hole Of Cyberspace: Legal Protections For Online Privacy, R. Craig Tolliver
Filling The Black Hole Of Cyberspace: Legal Protections For Online Privacy, R. Craig Tolliver
Vanderbilt Journal of Entertainment & Technology Law
The Internet is a unique and wholly new medium of worldwide human communication. This pronouncement of the United States Supreme Court echoes what most of the American population has known for some time. The emergence of cyberspace has dramatically changed the nature of electronic communications, and consumers are conducting online transactions at a tremendous pace. While this revolution has obviously increased the amount and types of information available to American consumers, it has also achieved a different result: businesses now have access to an unprecedented amount of personal information. In turn, there exists a danger that this information will be …