Open Access. Powered by Scholars. Published by Universities.®
Washington and Lee University School of Law
Washington and Lee Journal of Civil Rights and Social Justice
- Keyword
-
- Surveillance (3)
- Hacking (2)
- Privacy (2)
- Abortion (1)
- Big data (1)
-
- Bitcoin (1)
- Blockchain (1)
- Collection (1)
- Consumer privacy (1)
- Data (1)
- Data privacy (1)
- Data protection (1)
- Digital token (1)
- Electronic Communications Privacy Act (1)
- Federal Trade Commission (1)
- Fourth Amendment (1)
- Katz (1)
- Liability (1)
- Location data (1)
- Magistrate (1)
- Personal Information (1)
- Personhood (1)
- Property (1)
- Regulation (1)
- Slavery (1)
- Stolen Data (1)
- Third party doctrine (1)
- Third-party Doctrine (1)
- Trespass doctrine (1)
Articles 1 - 7 of 7
Full-Text Articles in Law
Slavery.Ai, Emile Loza De Siles
Slavery.Ai, Emile Loza De Siles
Washington and Lee Journal of Civil Rights and Social Justice
The artificial intelligence market is swarming. Supercharged start-ups, global tech giants, and increasingly algorithmic governments target diverse use cases with new and stunningly innovative AI applications coming online every day. Where people are the computational subjects of those algorithmic machinations, however, there is no law, present or effective, to protect them against great and propagating harms. Consequently, people become data production units, the commoditized of the Data Industrial Complex and unfree, unpaid inputs to AI production.
This Article shares a new and provocative vision. It theorizes that unregulated AI systems and uses are giving rise to an emergent form of …
Fitting A Block Into A Sphere Mold: The Inadequacy Of Current Data Privacy Regulations In Protecting Data Privacy Within The Blockchain Space, Jenny Yang
Washington and Lee Journal of Civil Rights and Social Justice
Despite global imposition of data privacy laws and regulations, data privacy is a nonexistent luxury amongst the data-charged world we live in. Data privacy has long been established as a fundamental right. Entities have successfully established robust methodologies around existing data privacy laws and regulations to utilize past consumer behavior to predict, impact and manipulate current and future consumer behaviors. This phenomenon has been commonly coined as “corporate surveillance.” Emerging spaces arising through technological developments have greater access into consumer data to impact economic choices. Specifically, the blockchain space, through its unique open-source and permanent traits, has been able to …
A Miscarriage Of Justice: How Femtech Apps And Fog Data Evade Fourth Amendment Privacy Protections, Rachel Silver
A Miscarriage Of Justice: How Femtech Apps And Fog Data Evade Fourth Amendment Privacy Protections, Rachel Silver
Washington and Lee Journal of Civil Rights and Social Justice
After the fall of Roe v. Wade, states across the country have enacted extreme abortion bans. Anti-abortion states, emboldened by their new, unrestricted power to regulate women’s bodies, are only broadening the scope of abortion prosecutions. And modern technology provides law enforcement with unprecedented access to women’s most intimate information, including, for example, their menstrual cycle, weight, body temperature, sexual activity, mood, medications, and pregnancy details. Fourth Amendment law fails to protect this sensitive information stored on femtech apps from government searches. In a largely unregulated private market, femtech apps sell health and location data to third parties like Fog …
Do Not Touch My Data: Exploring A Disclosure-Based Framework To Address Data Access, Francis Morency
Do Not Touch My Data: Exploring A Disclosure-Based Framework To Address Data Access, Francis Morency
Washington and Lee Journal of Civil Rights and Social Justice
Companies have too much control over people’s information. In the data marketplace, companies package and sell individuals’ data, and these individuals have little to no bargaining power over the process. Companies may freely buy and sell people’s data in the private sector for targeted marketing and behavior manipulation. In the justice system, an unchecked data marketplace leaves black and brown communities vulnerable to serious data access issues caused by predictive sentencing, for example. Risk assessment algorithms in predictive sentencing rely on data on individuals and run all relevant data points to provide the likelihood that a defendant will recidivate low …
Wiretapping The Internet: Analyzing The Application Of The Federal Wiretap Act’S Party Exception Online, Hayden Driscoll
Wiretapping The Internet: Analyzing The Application Of The Federal Wiretap Act’S Party Exception Online, Hayden Driscoll
Washington and Lee Journal of Civil Rights and Social Justice
The federal Wiretap Act—originally enacted to curtail the government’s unbridled use of wiretaps to monitor telephonic communications—was amended in 1986 to provide a private right of action, extending the Act’s Fourth Amendment-like protections to private intrusions. Since the advent of the internet, plaintiffs have attempted to predicate claims of unauthorized online privacy intrusions on the Wiretap Act. In response, defendants claim they are parties to the communications at issue and should be absolved of liability under the Act’s party exception. The federal circuit courts of appeal disagree on how the party exception applies in the internet context. This Note evaluates …
Keeping The Zombies At Bay: Fourth Amendment Problems In The Fight Against Botnets, Danielle Potter
Keeping The Zombies At Bay: Fourth Amendment Problems In The Fight Against Botnets, Danielle Potter
Washington and Lee Journal of Civil Rights and Social Justice
You may not have heard of a botnet. If you have, you may have linked it to election shenanigans and nothing else. But if you are reading this on a computer or smartphone, there is a good chance you are in contact with a botnet right now.
Botnets, sometimes called “Zombie Armies,” are networks of devices linked by a computer virus and controlled by cybercriminals. Botnets operate on everyday devices owned by millions of Americans, and thus pose a substantial threat to individual device owners as well as the nation’s institutions and economy.
Accordingly, the United States government has been …
Bytes Bite: Why Corporate Data Breaches Should Give Standing To Affected Individuals, Caden Hayes
Bytes Bite: Why Corporate Data Breaches Should Give Standing To Affected Individuals, Caden Hayes
Washington and Lee Journal of Civil Rights and Social Justice
High-profile data hacks are not uncommon. In fact, according to the Privacy Rights Clearinghouse, there have been at least 7,961 data breaches, exposing over 10,000,000,000 accounts in total, since 2005. These shocking numbers are not particularly surprising when taking into account the value of information stolen. For example, cell phone numbers, as exposed in a Yahoo! hack, are worth $10 a piece on the black market, meaning the hackers stood to make $30,000,000,000 from that one hack. That dollar amount does not even consider copies the hackers could make and later resell. Yet while these hackers make astronomical payoffs, the …