Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Intellectual Property Law

Georgetown University Law Center

Privacy

Articles 1 - 14 of 14

Full-Text Articles in Law

The Trade Origins Of Privacy Law, Anupam Chander Jan 2024

The Trade Origins Of Privacy Law, Anupam Chander

Georgetown Law Faculty Publications and Other Works

The desire for trade propelled the growth of data privacy law across the world. Countries with strong privacy laws sought to ensure that their citizens’ privacy would not be compromised when their data traveled to other countries. Even before this vaunted Brussels Effect pushed privacy law across the world through the enticement of trade with the European Union, Brussels had to erect privacy law within the Union itself. And as the Union itself expanded, privacy law was a critical condition for accession.

But this coupling of privacy and trade leaves a puzzle: how did the U.S. avoid a comprehensive privacy …


Unavoidability In U.S. Privacy Law, Laura M. Moy Jan 2024

Unavoidability In U.S. Privacy Law, Laura M. Moy

Georgetown Law Faculty Publications and Other Works

Why is U.S. privacy law structured the way it is, with a series of sectoral laws rather than a cross-sectoral law or laws? Why does U.S. privacy law protect information shared in certain contexts—such as information shared with an attorney, a healthcare provider, or a financial provider—rather than particular types of information? One possibility is that sectoral laws apply to contexts in which people typically share highly “sensitive” information containing intimate secrets or with the potential to harm them financially or psychologically.

But this Article argues that there is something else at play—that in fact, an under-discussed and underappreciated factor …


Defragging Feminist Cyberlaw, Amanda Levendowski Nov 2023

Defragging Feminist Cyberlaw, Amanda Levendowski

Georgetown Law Faculty Publications and Other Works

In 1996, Judge Frank Easterbrook famously observed that any effort to create a field called cyberlaw would be “doomed to be shallow and miss unifying principles.” He was wrong, but not for the reason other scholars have stated. Feminism is a unifying principle of cyberlaw, which alternately amplifies and abridges the feminist values of consent, safety, and accessibility. Cyberlaw simply hasn’t been understood that way—until now.

In computer science, “defragging” means bringing together disparate pieces of data so they are easier to access. Inspired by that process, this Article offers a new approach to cyberlaw that illustrates how feminist values …


Resisting Face Surveillance With Copyright Law, Amanda Levendowski May 2022

Resisting Face Surveillance With Copyright Law, Amanda Levendowski

Georgetown Law Faculty Publications and Other Works

Face surveillance is animated by deep-rooted demographic and deployment biases that endanger marginalized communities and threaten the privacy of all. But current approaches have not prevented its adoption by law enforcement. Some companies have offered voluntary moratoria on selling the technology, leaving many others to fill in the gaps. Legislators have enacted regulatory oversight at the state and city levels, but a federal ban remains elusive. Both approaches require vast shifts in practical and political will, each with drawbacks. While we wait, face surveillance persists. This Article suggests a new possibility: face surveillance is fueled by unauthorized copies and reproductions …


Facing Injustice: How Face Recognition Technology May Increase The Incidence Of Misidentifications And Wrongful Convictions, Laura M. Moy Dec 2021

Facing Injustice: How Face Recognition Technology May Increase The Incidence Of Misidentifications And Wrongful Convictions, Laura M. Moy

Georgetown Law Faculty Publications and Other Works

Does law enforcement use of face recognition technology paired with eyewitness identifications increase the incidence of wrongful convictions in U.S. criminal law? This Article explores this critical question and posits that the answer may be yes. Facial recognition is frequently used by law enforcement agencies to help generate investigative leads that are then presented to eyewitnesses for positive identification. But erroneous eyewitness accounts are the number one cause of wrongful convictions, and the use of face recognition to generate investigative leads may create the conditions for erroneous eyewitness identifications to take place. This is because face recognition technology is designed …


Achieving Privacy: Costs Of Compliance And Enforcement Of Data Protection Regulation, Anupam Chander, Meaza Abraham, Sandeep Chandy, Yuan Fang, Dayoung Park, Isabel Yu Mar 2021

Achieving Privacy: Costs Of Compliance And Enforcement Of Data Protection Regulation, Anupam Chander, Meaza Abraham, Sandeep Chandy, Yuan Fang, Dayoung Park, Isabel Yu

Georgetown Law Faculty Publications and Other Works

Is privacy a luxury for the rich world? Remarkably, there is a dearth of literature evaluating whether data privacy is too costly for companies to implement, or too expensive for governments to enforce. This paper is the first to offer a review of surveys of costs of compliance, and to summarize national budgets for enforcement. The study shows that while privacy may indeed prove costly for companies to implement, it is not too costly for governments to enforce. This study will help inform governments as they fashion and implement privacy laws to address the “privacy enforcement gap”—the disparity between the …


Trademarks As Surveillance Transparency, Amanda Levendowski Jan 2021

Trademarks As Surveillance Transparency, Amanda Levendowski

Georgetown Law Faculty Publications and Other Works

We know very little about the technologies that watch us. From cell site simulators to predictive policing algorithms, the lack of transparency around surveillance technologies makes it difficult for the public to engage in meaningful oversight. Legal scholars have critiqued various corporate and law enforcement justifications for surveillance opacity, including contract and intellectual property law. But the public needs a free, public, and easily accessible source of information about corporate technologies that might be used to watch us. To date, the literature has overlooked a free, extensive, and easily accessible source of information about surveillance technologies hidden in plain sight: …


From Lex Informatica To The Control Revolution, Julie E. Cohen Jan 2021

From Lex Informatica To The Control Revolution, Julie E. Cohen

Georgetown Law Faculty Publications and Other Works

Legal scholarship on the encounter between networked digital technologies and law has focused principally on how legal and policy processes should respond to new technological developments and has spent much less time considering what that encounter might signify for the shape of legal institutions themselves. This essay focuses on the latter question. Within fields like technology studies, labor history, and economic sociology, there is a well-developed tradition of studying the ways that new information technologies and the “control revolution” they enabled—in brief, a quantum leap in the capacity for highly granular oversight and management—have elicited long-term, enduring changes in the …


Turning Privacy Inside Out, Julie E. Cohen Jan 2019

Turning Privacy Inside Out, Julie E. Cohen

Georgetown Law Faculty Publications and Other Works

The problem of theorizing privacy moves on two levels, the first consisting of an inadequate conceptual vocabulary and the second consisting of an inadequate institutional grammar. Privacy rights are supposed to protect individual subjects, and so conventional ways of understanding privacy are subject-centered, but subject-centered approaches to theorizing privacy also wrestle with deeply embedded contradictions. And privacy’s most enduring institutional failure modes flow from its insistence on placing the individual and individualized control at the center. Strategies for rescuing privacy from irrelevance involve inverting both established ways of talking about privacy rights and established conventions for designing institutions to protect …


The Biopolitical Public Domain: The Legal Construction Of The Surveillance Economy, Julie E. Cohen Jun 2018

The Biopolitical Public Domain: The Legal Construction Of The Surveillance Economy, Julie E. Cohen

Georgetown Law Faculty Publications and Other Works

Within the political economy of informational capitalism, commercial surveillance practices are tools for resource extraction. That process requires an enabling legal construct, which this essay identifies and explores. Contemporary practices of personal information processing constitute a new type of public domain — a repository of raw materials that are there for the taking and that are framed as inputs to particular types of productive activity. As a legal construct, the biopolitical public domain shapes practices of appropriation and use of personal information in two complementary and interrelated ways. First, it constitutes personal information as available and potentially valuable: as a …


Information Privacy Litigation As Bellwether For Institutional Change, Julie E. Cohen Jan 2017

Information Privacy Litigation As Bellwether For Institutional Change, Julie E. Cohen

Georgetown Law Faculty Publications and Other Works

Information privacy litigation is controversial and headline-grabbing. New class complaints are filed seemingly every few weeks. Legal scholars vie with one another to articulate more comprehensive theories of harm that such lawsuits might vindicate. Large information businesses and defense counsel bemoan the threats that information privacy litigation poses to corporate bottom lines and to “innovation” more generally. For all that, though, the track record of litigation achievements on the information privacy front is stunningly poor. This essay examines emerging conventions for disposing of information privacy claims, including denial of standing, enforcement of boilerplate waivers, denial of class certification, and the …


Using Copyright To Combat Revenge Porn, Amanda Levendowski May 2014

Using Copyright To Combat Revenge Porn, Amanda Levendowski

Georgetown Law Faculty Publications and Other Works

Over the past several years, the phenomenon of “revenge porn” – defined as sexually explicit images that are publicly shared online, without the consent of the pictured individual – has attracted national attention. Victims of revenge porn often suffer devastating consequences, including losing their jobs, but have had limited success using tort laws to prevent the spread of their images. Victims need a remedy that provides takedown procedures, civil liability for uploaders and websites, and the threat of money damages. Copyright law provides all of these remedies. Because an estimated 80 percent of revenge porn images are “selfies,” meaning that …


What Privacy Is For, Julie E. Cohen May 2013

What Privacy Is For, Julie E. Cohen

Georgetown Law Faculty Publications and Other Works

Privacy has an image problem. Over and over again, regardless of the forum in which it is debated, it is cast as old-fashioned at best and downright harmful at worst — anti-progressive, overly costly, and inimical to the welfare of the body politic. Yet the perception of privacy as antiquated and socially retrograde is wrong. It is the result of a conceptual inversion that relates to the way in which the purpose of privacy has been conceived. Like the broader tradition of liberal political theory within which it is situated, legal scholarship has conceptualized privacy as a form of protection …


Copyright And The Jurisprudence Of Self-Help, Julie E. Cohen Jan 1998

Copyright And The Jurisprudence Of Self-Help, Julie E. Cohen

Georgetown Law Faculty Publications and Other Works

The proposed draft of Article 2B grants broad rights to enforce electronically contract provisions governing access to and use of digital works. Purveyors of digital works may engage in electronic self-help following breach of contract, and may also elect to foreclose unauthorized uses ex ante, via electronic “regulation of performance.” This Article examines these provisions in light of existing law authorizing self-help repossession of tangible chattels, leading academic justifications for self-help repossession, and federal copyright law and policy. It concludes that the provisions authorize an unprecedented degree of intrusion into private homes and offices, that they lack a sound theoretical …