Open Access. Powered by Scholars. Published by Universities.®

Business Law, Public Responsibility, and Ethics Commons

Open Access. Powered by Scholars. Published by Universities.®

Privacy Law

Institution
Keyword
Publication Year
Publication
Publication Type

Articles 1 - 30 of 30

Full-Text Articles in Business Law, Public Responsibility, and Ethics

Swipe Right Into A Disciplinary Hearing: How The Use Of Dating Apps Could Earn An Attorney More Than A Bad First Date, Zachary S. Aman Jan 2023

Swipe Right Into A Disciplinary Hearing: How The Use Of Dating Apps Could Earn An Attorney More Than A Bad First Date, Zachary S. Aman

Catholic University Journal of Law and Technology

The Model Rules of Professional Conduct seek to police the conduct of attorneys. Each jurisdiction adopts its own rules of professional conduct to apply to the attorneys licensed within it. Notably, the model rules prohibit any sexual relationship between the attorney and client unless that relationship precedes the attorney-client relationship. Traditionally, defining a "sexual relationship" was simple, particularly if the attorney and client engaged in sexual intercourse. The introduction of dating apps, however, has blurred the line.

This article outlines the inherent risks of attorneys using dating apps at a time when most newly-licensed attorneys make up the majority of …


New Frontiers In Technology: Can Traditional Intellectual Property Rights Laws Be Adapted And Applied To Nfts?, Mariyah S. Wakhariya Jan 2023

New Frontiers In Technology: Can Traditional Intellectual Property Rights Laws Be Adapted And Applied To Nfts?, Mariyah S. Wakhariya

Catholic University Journal of Law and Technology

A decade ago, ‘NFTs’ were rarely heard of or known to anyone, unless they worked in or kept up with the tech world. However, they are not new - they have been around for almost two decades. Their popularity has grown over the past few years. ‘NFT’ stands for ‘non-fungible token’. An NFT is a digital file with a unique identity that is verified on a blockchain and is therefore not interchangeable - i.e., a kind of crypto asset, like an authentication certificate for digital artifacts. In theory, NFTs can represent almost any real or intangible property. These days, it …


Learning From Mistakes: A Guide To Expanding The Oversight Board, Kevin Frazier Jan 2023

Learning From Mistakes: A Guide To Expanding The Oversight Board, Kevin Frazier

Catholic University Journal of Law and Technology

More than 4.4 billion people use social media. A few platforms attract a significant number of those users—for example, 2.9 billion people use Facebook, 2.3 billion use YouTube, and 1.2 billion use WeChat. How these major platforms govern themselves with respect to content moderation has an impact on billions of users and may lead to policy changes across other platforms that affect billions more. That is why it is so important to analyze Meta’s Oversight Board—an independent body created for the purpose of “promot[ing] free expression by making principled, independent decisions regarding content on Facebook and Instagram by issuing recommendations …


Small Business Cybersecurity: A Loophole To Consumer Data, Matthew R. Espinosa May 2022

Small Business Cybersecurity: A Loophole To Consumer Data, Matthew R. Espinosa

The Scholar: St. Mary's Law Review on Race and Social Justice

Small businesses and small minority owned businesses are vital to our nation’s economy; therefore legislation, regulation, and policy has been created in order to assist them in overcoming their economic stability issues and ensure they continue to serve the communities that rely on them. However, there is not a focus on regulating nor assisting small businesses to ensure their cybersecurity standards are up to par despite them increasingly becoming a victim of cyberattacks that yield high consequences. The external oversight and assistance is necessary for small businesses due to their lack of knowledge in implementing effective cybersecurity policies, the fiscal …


The Application Of The Right To Be Forgotten In The Machine Learning Context: From The Perspective Of European Laws, Zeyu Zhao Jan 2022

The Application Of The Right To Be Forgotten In The Machine Learning Context: From The Perspective Of European Laws, Zeyu Zhao

Catholic University Journal of Law and Technology

The right to be forgotten has been evolving for decades along with the progress of different statutes and cases and, finally, independently enacted by the General Data Protection Regulation, making it widely applied across Europe. However, the related provisions in the regulation fail to enable machine learning systems to realistically forget the personal information which is stored and processed therein.

This failure is not only because existing European rules do not stipulate standard codes of conduct and corresponding responsibilities for the parties involved, but they also cannot accommodate themselves to the new environment of machine learning, where specific information can …


Personal Data Privacy And Protective Federal Legislation: An Exploration Of Constituent Position On The Need For Legislation To Control Data Reliant Organizations Collecting And Monetizing Internet-Obtained Personal Data, Giovanni De Meo Aug 2021

Personal Data Privacy And Protective Federal Legislation: An Exploration Of Constituent Position On The Need For Legislation To Control Data Reliant Organizations Collecting And Monetizing Internet-Obtained Personal Data, Giovanni De Meo

Dissertations

In the past twenty years, the business of online personal data collection has grown at the same rapid pace as the internet itself, fostering a multibillion-dollar personal data collection and commercialization industry. Unlike many other large industries, there has been no major federal legislation enacted to monitor or control the activities of organizations dealing in this flourishing industry. The combination of these factors together with the lack of prior research encouraged this research designed to understand how much voters know about this topic and whether there is interest in seeing legislation enacted to protect individual personal data privacy.

To address …


Developing A Measure Of Social, Ethical, And Legal Content For Intelligent Cognitive Assistants, Clovia Hamilton, William Swart, Gerald M. Stokes Jan 2021

Developing A Measure Of Social, Ethical, And Legal Content For Intelligent Cognitive Assistants, Clovia Hamilton, William Swart, Gerald M. Stokes

Technology & Society Faculty Publications

We address the issue of consumer privacy against the backdrop of the national priority of maintaining global leadership in artificial intelligence, the ongoing research in Artificial Cognitive Assistants, and the explosive growth in the development and application of Voice Activated Personal Assistants (VAPAs) such as Alexa and Siri, spurred on by the needs and opportunities arising out of the COVID-19 global pandemic. We first review the growth and associated legal issues of the of VAPAs in private homes, banks, healthcare, and education. We then summarize the policy guidelines for the development of VAPAs. Then, we classify these into five major …


Privacy-As-Property: A New Fundamental Approach To The Right To Privacy And The Impact This Will Have On The Law And Corporations, Sevion Dacosta Jan 2021

Privacy-As-Property: A New Fundamental Approach To The Right To Privacy And The Impact This Will Have On The Law And Corporations, Sevion Dacosta

CMC Senior Theses

The most popular conception of the right to privacy stems from Warren and Brandeis’s description of privacy as “the right to be left alone.” This theory ultimately points to a more fundamental approach to the right to privacy rooted in property rights. This fundamental approach - which I call privacy-as-property - is what I establish in this paper. I argue that the Lockean concept of property that “every man has a property in his own person” provides the foundation for the right to privacy. Privacy-as-property begins with the fundamental right to control oneself. Because of this intrinsic right, your property …


An Analysis Of Technological Components In Relation To Privacy In A Smart City, Kayla Rutherford, Ben Lands, A. J. Stiles Nov 2020

An Analysis Of Technological Components In Relation To Privacy In A Smart City, Kayla Rutherford, Ben Lands, A. J. Stiles

James Madison Undergraduate Research Journal (JMURJ)

A smart city is an interconnection of technological components that store, process, and wirelessly transmit information to enhance the efficiency of applications and the individuals who use those applications. Over the course of the 21st century, it is expected that an overwhelming majority of the world’s population will live in urban areas and that the number of wireless devices will increase. The resulting increase in wireless data transmission means that the privacy of data will be increasingly at risk. This paper uses a holistic problem-solving approach to evaluate the security challenges posed by the technological components that make up a …


The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin Aug 2020

The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin

Open Educational Resources

Using episodes from the show Black Mirror as a study tool - a show that features tales that explore techno-paranoia - the course analyzes legal and policy considerations of futuristic or hypothetical case studies. The case studies tap into the collective unease about the modern world and bring up a variety of fascinating key philosophical, legal, and economic-based questions.


What Consumers Don’T Know They’Re Giving Away (Data And Privacy Concerns), Bayleigh Reeves May 2020

What Consumers Don’T Know They’Re Giving Away (Data And Privacy Concerns), Bayleigh Reeves

Marketing Undergraduate Honors Theses

The modern world leverages technology and information captured by it in ways the inventors of these technologies likely never imagined. Phones and other devices are gathering information about consumers in the background when they do not even realize it. Pew Research Center found that about 77% of Americans own a smartphone and 88% use the internet. This mass access to technology and information tracking raises many privacy concerns. Basic demographic information is being tracked as well as more in-depth information like shopping tendencies, financial information, and information about known associates. While most of this data is being used for marketing …


Screened Out Of Housing: The Impact Of Misleading Tenant Screening Reports And The Potential For Criminal Expungement As A Model For Effectively Sealing Evictions, Katelyn Polk Apr 2020

Screened Out Of Housing: The Impact Of Misleading Tenant Screening Reports And The Potential For Criminal Expungement As A Model For Effectively Sealing Evictions, Katelyn Polk

Northwestern Journal of Law & Social Policy

Having an eviction record “blacklists” tenants from finding future housing. Even renters with mere eviction filings—not eviction orders—on their records face the harsh collateral consequences of eviction. This Note argues that eviction records should be sealed at filing and only released into the public record if a landlord prevails in court. Juvenile record expungement mechanisms in Illinois serve as a model for one way to protect people with eviction records. Recent updates to the Illinois juvenile expungement process provided for the automatic expungement of certain records and strengthened the confidentiality protections of juvenile records. Illinois protects juvenile records because it …


Domestic Asset Tracing And Recovery Of Hidden Assets And The Spoils Of Financial Crime, Nathan Wadlinger, Carl Pacini, Nicole Stowell, William Hopwood, Debra Sinclair Jun 2018

Domestic Asset Tracing And Recovery Of Hidden Assets And The Spoils Of Financial Crime, Nathan Wadlinger, Carl Pacini, Nicole Stowell, William Hopwood, Debra Sinclair

St. Mary's Law Journal

Abstract forthcoming


Playing With Real Property Inside Augmented Reality: Pokemon Go, Trespass, And Law's Limitations, Donald J. Kochan Dec 2017

Playing With Real Property Inside Augmented Reality: Pokemon Go, Trespass, And Law's Limitations, Donald J. Kochan

Donald J. Kochan

This symposium essay uses the popular game Pokémon Go as a case study for evaluating conflicts that arise when augmented reality is layered over the real property of non-consenting owners. It focuses on the challenges augmented reality technologies pose to the meaning and enforcement of formal and informal trespass norms, first examining physical trespass issues (and enforcement difficulties) associated with game players who sometimes break physical property boundaries.

The essay then undertakes a thought experiment regarding possible recognition of a new, different type of trespass—one to augmented space. Pollock and Maitland called trespass the “fertile mother of all actions,” often …


Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen Dec 2016

Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen

All Faculty Scholarship

Big Data is the vast quantities of information amenable to large-scale collection, storage, and analysis. Using such data, companies and researchers can deploy complex algorithms and artificial intelligence technologies to reveal otherwise unascertained patterns, links, behaviors, trends, identities, and practical knowledge. The information that comprises Big Data arises from government and business practices, consumer transactions, and the digital applications sometimes referred to as the “Internet of Things.” Individuals invisibly contribute to Big Data whenever they live digital lifestyles or otherwise participate in the digital economy, such as when they shop with a credit card, get treated at a hospital, apply …


Digital Self-Ownership: A Publicity-Rights Framework For Determining Employee Social Media Rights, Susan Park, Patricia Sánchez Abril Oct 2016

Digital Self-Ownership: A Publicity-Rights Framework For Determining Employee Social Media Rights, Susan Park, Patricia Sánchez Abril

Management Faculty Publications and Presentations

Imagine an upandcoming company hires you as one of its first employees. Passionate about your employer, you put in long hours doing everything from marketing to accounting to event planning. You are also proud of your employer's product, so you begin to publicize it to your friends through your social network accounts. (In fact, the company's founder is also one of your Facebook friends.) You tell your friends about the product launch, invite them to marketing events, and eventually blog about your industry, amassing a significant social media following while creating buzz about your employer. But one day, during layoffs …


Legal And Ethical Issues Associated With Employee Use Of Social Networks, Gundars Kaupins, Susan Park Dec 2014

Legal And Ethical Issues Associated With Employee Use Of Social Networks, Gundars Kaupins, Susan Park

Susan Park

Social networking sites such as Facebook and Twitter can help employees enhance a company’s marketing, recruiting, security, and safety. However, employee’s use of social networking sites and employers’ access of those sites can result in illegal and unethical behavior, such as discrimination and privacy invasions. Companies must gauge whether and how to rely upon employees’ use of personal social networking sites and how much freedom employees should have in using networks inside and outside of the companies. This research summarizes the latest legal and ethical issues regarding employee use of social networks and provides recommended corporate policies.


Systematic Ict Surveillance By Employers: Are Your Personal Activities Private?, Arlene J. Nicholas Jul 2014

Systematic Ict Surveillance By Employers: Are Your Personal Activities Private?, Arlene J. Nicholas

Faculty and Staff - Articles & Papers

This paper reviews the various methods of information and communications technology (ICT) that is used by employers to peer into the work lives and, in some cases, private lives of employees. Some of the most common methods – such as computer and Internet monitoring, video surveillance, and global positioning systems (GPS) – have resulted in employee disciplines that have been challenged in courts. This paper provides background information on United States (U.S.) laws and court cases which, in this age of easily accessible information, mostly support the employer. Assessments regarding regulations and policies, which will need to be continually updated …


The Child Independence Is Born: James Otis And Writs Of Assistance, James M. Farrell Jan 2014

The Child Independence Is Born: James Otis And Writs Of Assistance, James M. Farrell

Communication

This chapter is a reexamination of the Writs of Assistance speech by James Otis. In particular, it is a reconsideration of the evidence upon which rests the historical reputation of Otis’s address. Are the claims by historians who credit Otis with sparking the Revolutionary movement in colonial America warranted or not? That reassessment begins with a detailed review of the nature and function of writs of assistance within the political, legal, and economic environment of colonial Massachusetts. It then turns to an analysis of the legal dispute over writs of assistance in the 1761 trial. From there we will reconstruct …


Policing The Social Media Water Cooler: Recent Nlrb Decisions Should Make Employers Think Twice Before Terminating An Employee For Comments Posted On Social Media Sites, Eric Raphan, Sean Kirby Jan 2014

Policing The Social Media Water Cooler: Recent Nlrb Decisions Should Make Employers Think Twice Before Terminating An Employee For Comments Posted On Social Media Sites, Eric Raphan, Sean Kirby

Journal of Business & Technology Law

No abstract provided.


Maryland's Social Networking Law: No "Friend" To Employers And Employees, Alexander Borman Jan 2014

Maryland's Social Networking Law: No "Friend" To Employers And Employees, Alexander Borman

Journal of Business & Technology Law

No abstract provided.


Employee Internet Privacy: A Proposed Act That Balances Legitimate Employer Rights And Employee Privacy, Susan Park Jan 2014

Employee Internet Privacy: A Proposed Act That Balances Legitimate Employer Rights And Employee Privacy, Susan Park

Management Faculty Publications and Presentations

When Justin Basset interviewed for a job in New York City in 2012, he expected to respond to questions one is typically asked in a job interview. However, his interview took a modern technological twist when the interviewer opened her computer and attempted to look at Mr. Basset’s Facebook profile on her computer. Unable to see the details of his profile because he had taken advantage of Facebook’s privacy options to limit public viewing, she asked for his login information to access his account. He declined and withdrew his application.1 In 2010, Robert Collins, a Maryland Department of Public …


Legal And Ethical Implications Of Corporate Social Networks, Gundars Kaupins, Susan Park Jun 2010

Legal And Ethical Implications Of Corporate Social Networks, Gundars Kaupins, Susan Park

Management Faculty Publications and Presentations

Corporate social networking sites provide employees and employers with considerable opportunity to share information and become friends. Unfortunately, American laws do not directly address social networking site usage. The National Labor Relations Act, civil rights laws, and various common law doctrines such as employment at-will and defamation provide the pattern for future social networking laws. Ethical considerations such as productivity, security, goodwill, privacy, accuracy, and discipline fairness also affect future laws. Corporate policies on corporate social networking should balance the employer‘s and employee‘s interests. Existing laws and ethical issues associated with social networking should impact social networking policies related to …


Legal And Ethical Issues Associated With Employee Use Of Social Networks, Gundars Kaupins, Susan Park Jan 2010

Legal And Ethical Issues Associated With Employee Use Of Social Networks, Gundars Kaupins, Susan Park

Management Faculty Publications and Presentations

Social networking sites such as Facebook and Twitter can help employees enhance a company’s marketing, recruiting, security, and safety. However, employee’s use of social networking sites and employers’ access of those sites can result in illegal and unethical behavior, such as discrimination and privacy invasions. Companies must gauge whether and how to rely upon employees’ use of personal social networking sites and how much freedom employees should have in using networks inside and outside of the companies. This research summarizes the latest legal and ethical issues regarding employee use of social networks and provides recommended corporate policies.


Welfare, Dialectic, And Mediation In Corporate Law, William W. Bratton Jan 2005

Welfare, Dialectic, And Mediation In Corporate Law, William W. Bratton

All Faculty Scholarship

No abstract provided.


Some Ethical Reflections On Cyberstalking, Frances Grodzinsky, Herman T. Tavani Mar 2002

Some Ethical Reflections On Cyberstalking, Frances Grodzinsky, Herman T. Tavani

School of Computer Science & Engineering Faculty Publications

The present study examines a range of moral issues associated with recent cyberstalking cases. Particular attention is centered on the Amy Boyer/ Liam Youens case of cyberstalking, which raises a host of considerations that we believe have a significant impact for ethical behavior on the Internet. Among the questions we consider are those having to do with personal privacy and the use of certain kinds of Internet search facilities to stalk individuals in cyberspace. Also considered are questions having to do with legal liability and (possible) moral responsibility that Internet Service Providers (ISPs) have for stalking crimes that occur in …


Minor Distractions: Children, Privacy And E-Commerce, Anita L. Allen Jan 2001

Minor Distractions: Children, Privacy And E-Commerce, Anita L. Allen

All Faculty Scholarship

No abstract provided.


Social Issues Of Genome Innovation And Intellectual Property, Elaine Alma Draper Jun 1996

Social Issues Of Genome Innovation And Intellectual Property, Elaine Alma Draper

RISK: Health, Safety & Environment (1990-2002)

Dr. Draper's focus is the use of personal information derived from genome research. She identifies several potential problems, including access to and control of genetic information, employment discrimination and social stratification. She also recommends possible solutions.


A Contractual Approach To Data Privacy, Stephanos Bibas Jan 1994

A Contractual Approach To Data Privacy, Stephanos Bibas

All Faculty Scholarship

No abstract provided.


Rethinking The Rules Against Corporate Privacy Rights: Some Conceptual Quandries For The Common Law, Anita L. Allen Jan 1987

Rethinking The Rules Against Corporate Privacy Rights: Some Conceptual Quandries For The Common Law, Anita L. Allen

All Faculty Scholarship

No abstract provided.