Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Law

2017

Data

Institution
Publication
Publication Type
File Type

Articles 1 - 30 of 38

Full-Text Articles in Law

Breadcrumbs: Privacy As A Privilege, Prachi Bhardwaj Dec 2017

Breadcrumbs: Privacy As A Privilege, Prachi Bhardwaj

Capstones

Breadcrumbs: Privacy as a Privilege Abstract

By: Prachi Bhardwaj

In 2017, the world saw more data breaches than in any year prior. The count was more than the all-time high record in 2016, which was 40 percent more than the year before that.

That’s because consumer data is incredibly valuable today. In the last three decades, data storage has gone from being stored physically to being stored almost entirely digitally, which means consumer data is more accessible and applicable to business strategies. As a result, companies are gathering data in ways previously unknown to the average consumer, and hackers are …


Trending @ Rwu Law: Dean Yelnosky's Post: Show, Don't Tell 12-1-2017, Michael Yelnosky Dec 2017

Trending @ Rwu Law: Dean Yelnosky's Post: Show, Don't Tell 12-1-2017, Michael Yelnosky

Law School Blogs

No abstract provided.


Risk And Resilience In Health Data Infrastructure, W. Nicholson Price Ii Dec 2017

Risk And Resilience In Health Data Infrastructure, W. Nicholson Price Ii

Articles

Today’s health system runs on data. However, for a system that generates and requires so much data, the health care system is surprisingly bad at maintaining, connecting, and using those data. In the easy cases of coordinated care and stationary patients, the system works—sometimes. But when care is fragmented, fragmented data often result. Fragmented data create risks both to individual patients and to the system. For patients, fragmentation creates risks in care based on incomplete or incorrect information, and may also lead to privacy risks from a patched together system. For the system, data fragmentation hinders efforts to improve efficiency …


Regulating Black-Box Medicine, W. Nicholson Price Ii Dec 2017

Regulating Black-Box Medicine, W. Nicholson Price Ii

Michigan Law Review

Data drive modern medicine. And our tools to analyze those data are growing ever more powerful. As health data are collected in greater and greater amounts, sophisticated algorithms based on those data can drive medical innovation, improve the process of care, and increase efficiency. Those algorithms, however, vary widely in quality. Some are accurate and powerful, while others may be riddled with errors or based on faulty science. When an opaque algorithm recommends an insulin dose to a diabetic patient, how do we know that dose is correct? Patients, providers, and insurers face substantial difficulties in identifying high-quality algorithms; they …


Intellectual Property’S Lessons For Information Privacy, Mark Bartholomew Nov 2017

Intellectual Property’S Lessons For Information Privacy, Mark Bartholomew

Mark Bartholomew

There is an inherent tension between an individual’s desire to safeguard her personal information and the expressive rights of businesses seeking to communicate that information to others. This tension has multiplied as consumers generate and businesses collect more and more personal data online, forcing efforts to strike an appropriate balance between privacy and commercial speech. No consensus on this balance has been reached. Some privacy scholars bemoan what they see as a slanted playing field in favor of those wishing to profit from the private details of other people’s lives. Others contend that the right in free expression must always …


Artificial Intelligence In Health Care: Applications And Legal Implications, W. Nicholson Price Ii Nov 2017

Artificial Intelligence In Health Care: Applications And Legal Implications, W. Nicholson Price Ii

Articles

Artificial intelligence (AI) is rapidly moving to change the healthcare system. Driven by the juxtaposition of big data and powerful machine learning techniques—terms I will explain momentarily—innovators have begun to develop tools to improve the process of clinical care, to advance medical research, and to improve efficiency. These tools rely on algorithms, programs created from healthcare data that can make predictions or recommendations. However, the algorithms themselves are often too complex for their reasoning to be understood or even stated explicitly. Such algorithms may be best described as “black-box.” This article briefly describes the concept of AI in medicine, including …


Who Are The Real Cyberbullies: Hackers Or The Ftc? The Fairness Of The Ftc’S Authority In The Data Security Context, Jaclyn K. Haughom Nov 2017

Who Are The Real Cyberbullies: Hackers Or The Ftc? The Fairness Of The Ftc’S Authority In The Data Security Context, Jaclyn K. Haughom

Catholic University Law Review

As technology continues to be an integral part of daily life, there lies an ever-increasing threat of the personally identifiable information of consumers being lost, stolen, or accessed without authorization. The Federal Trade Commission (FTC) is the U.S. government’s primary consumer protection agency and the country’s lead enforcer against companies subject to data breaches. Although the FTC lacks explicit statutory authority to enforce against data breaches, the Commission has successfully relied on Section 5 of the FTC Act (FTCA) to exercise its consumer protection power in the data security context. However, as the FTC continues to take action against businesses …


Testimony @ House Energy And Commerce Subcommittee On Digital Commerce And Consumer Protection Hearing; "21st Century Trade Barriers: Protectionist Cross Border Data Flow Policies Impact On U.S. Jobs.", Jennifer Daskal Oct 2017

Testimony @ House Energy And Commerce Subcommittee On Digital Commerce And Consumer Protection Hearing; "21st Century Trade Barriers: Protectionist Cross Border Data Flow Policies Impact On U.S. Jobs.", Jennifer Daskal

Jennifer Daskal

Ttestimony at House Energy and Commerce Subcommittee on Digital Commerce and Consumer Protection Hearing; "21st Century Trade Barriers: Protectionist Cross Border Data Flow Policies Impact on U.S. Jobs." October 12, 2017

"The free movement of data across borders is critical to economic growth, has benefits for data security, and promotes privacy, speech, and associational rights. Yet, increasingly states are adopting a range of measures that restrict data flows to the United States and elsewhere and adopting costly data localization mandates, pursuant to which companies must store data locally.1 Such restrictions on the free movement of data harm U.S. business interests, …


A Revealed Preferences Approach To Ranking Law Schools, Brian L. Frye, Christopher J. Ryan Jr. Oct 2017

A Revealed Preferences Approach To Ranking Law Schools, Brian L. Frye, Christopher J. Ryan Jr.

Law Faculty Scholarly Articles

The U.S. News & World Report (U.S. News) “Best Law Schools Rankings” defines the market for legal education. Law schools compete to improve their standing in the U.S. News rankings and fear any decline. But the U.S. News rankings are controversial, at least in part because they rely on factors that are poor proxies for quality, like peer reputation and expenditures per student. While many alternative law school rankings exist, none have challenged the market dominance of the U.S. News rankings. Presumably the U.S. News rankings benefit from a first-mover advantage, other rankings fail to provide a clearly superior alternative, …


Session 3: Harnessing The Power Of Information And Insight To Improve Strategic Decision Making And Choice, Mary Beth Cantrell, Randall Kiser, Alexander Insam, Donald R. Philbin Jr. Sep 2017

Session 3: Harnessing The Power Of Information And Insight To Improve Strategic Decision Making And Choice, Mary Beth Cantrell, Randall Kiser, Alexander Insam, Donald R. Philbin Jr.

Pepperdine Dispute Resolution Law Journal

No abstract provided.


Law Library Blog (September 2017): Legal Beagle's Blog Archive, Roger Williams University School Of Law Sep 2017

Law Library Blog (September 2017): Legal Beagle's Blog Archive, Roger Williams University School Of Law

Law Library Newsletters/Blog

No abstract provided.


How University Title Ix Enforcement And Other Discipline Processes (Probably) Discriminate Against Minority Students, Ben Trachtenberg Sep 2017

How University Title Ix Enforcement And Other Discipline Processes (Probably) Discriminate Against Minority Students, Ben Trachtenberg

Nevada Law Journal

No abstract provided.


Trending @ Rwu Law: Dean Yelnosky's Post: Chelsea Manning, Professor David Coombs, And The "Wikileaks Trial" 08-28-2017, Edward Fitzpatrick, Roger Williams University School Of Law Aug 2017

Trending @ Rwu Law: Dean Yelnosky's Post: Chelsea Manning, Professor David Coombs, And The "Wikileaks Trial" 08-28-2017, Edward Fitzpatrick, Roger Williams University School Of Law

Law School Blogs

No abstract provided.


Data For The Algorithm As A Human Artifact: Implications For Legal [Re]Search, Susan Nevelow Mart Jul 2017

Data For The Algorithm As A Human Artifact: Implications For Legal [Re]Search, Susan Nevelow Mart

Research Data

These documents underlie and are cited in this empirical study: Susan Nevelow Mart, The Algorithm as a Human Artifact: Implications for Legal [Re]Search, 109 Law Libr. J. 387, 409 n.123 (2017), available at http://scholar.law.colorado.edu/articles/755/.

The ZIP file contains three files: one PDF document ("Tables for Charts 1-3"), and two SPSS files ("Data Archive" and "Syntax Archive" (SPSS version 24)). The "Syntax Archive" file may be viewed in a text editor (e.g., Notepad) as well as in SPSS.


Newroom: Rwu Law Sixth In Nation In Percentage Of Graduates Obtaining State Court Clerkships 6/2/2017, Roger Williams University School Of Law Jun 2017

Newroom: Rwu Law Sixth In Nation In Percentage Of Graduates Obtaining State Court Clerkships 6/2/2017, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


With Chelsea Manning's Release, Lead Trial Attorney Coombs Recalls Case: Rwu Law Professor David E. Coombs Revisits Issues In The Case, Looks Forward To Teaching Again Next Year 05-17-2017, Edward Fitzpatrick May 2017

With Chelsea Manning's Release, Lead Trial Attorney Coombs Recalls Case: Rwu Law Professor David E. Coombs Revisits Issues In The Case, Looks Forward To Teaching Again Next Year 05-17-2017, Edward Fitzpatrick

Life of the Law School (1993- )

No abstract provided.


Newsroom: As Manning Released, Trial Attorney Coombs Looks Back On Case, Looks Forward To Teaching Again At Rwu Law 05-17-2017, Edward Fitzpatrick May 2017

Newsroom: As Manning Released, Trial Attorney Coombs Looks Back On Case, Looks Forward To Teaching Again At Rwu Law 05-17-2017, Edward Fitzpatrick

Life of the Law School (1993- )

No abstract provided.


Data Driven Weed Management: Tracking Herbicide Resistance At The Landscape Scale, A. Bryan Endres, Natalie M. West, Jeffrey A. Evans, Lisa R. Schlessinger Apr 2017

Data Driven Weed Management: Tracking Herbicide Resistance At The Landscape Scale, A. Bryan Endres, Natalie M. West, Jeffrey A. Evans, Lisa R. Schlessinger

University of Arkansas at Little Rock Law Review

No abstract provided.


The Racist Algorithm?, Anupam Chander Apr 2017

The Racist Algorithm?, Anupam Chander

Michigan Law Review

Review of The Black Box Society: The Secret Algorithms That Control Money and Information by Frank Pasquale.


The Private Search Doctrine And The Evolution Of Fourth Amendment Jurisprudence In The Face Of New Technology: A Broad Or Narrow Exception?, Adam A. Bereston Mar 2017

The Private Search Doctrine And The Evolution Of Fourth Amendment Jurisprudence In The Face Of New Technology: A Broad Or Narrow Exception?, Adam A. Bereston

Catholic University Law Review

The advent of new technology has presented courts with unique challenges when analyzing searches and seizures under the Fourth Amendment. Out of necessity, the application of the Fourth Amendment has evolved to address privacy issues stemming from modern technology that could not have been anticipated by the Amendment’s drafters. As part of this evolution, the Supreme Court devised the “private search” doctrine, which upholds the constitutionality of warrantless police searches of items that were previously searched by a private party, so long as the police search does not exceed the scope of the private-party search. However, courts have struggled to …


How Many #Followers Do You Have?: Evaluating The Rise Of Social Media And Issues Concerning In Re Ctli’S Determination That Social Media Accounts Are Property Of The Estate, Patricia A. Leeson Mar 2017

How Many #Followers Do You Have?: Evaluating The Rise Of Social Media And Issues Concerning In Re Ctli’S Determination That Social Media Accounts Are Property Of The Estate, Patricia A. Leeson

Catholic University Law Review

With the rise of social media use, legal disputes have surfaced with litigants looking to the courts to determine issues of ownership and legal authority. As a matter of first impression, a U.S. Bankruptcy Court in Texas held that a Twitter and Facebook social media account were to be regarded as property of the estate pursuant to Section 541 of the Bankruptcy Code. The court analogized the social media accounts to subscriber lists because they provide valuable access to customers. Although the court addressed the question of whether social media applications are to be regarded as property in bankruptcy proceedings, …


Rise Of The Digital Regulator, Rory Van Loo Mar 2017

Rise Of The Digital Regulator, Rory Van Loo

Faculty Scholarship

The administrative state is leveraging algorithms to influence individuals’ private decisions. Agencies have begun to write rules to shape for-profit websites such as Expedia and have launched their own online tools such as the Consumer Financial Protection Bureau’s mortgage calculator. These digital intermediaries aim to guide people toward better schools, healthier food, and more savings. But enthusiasm for this regulatory paradigm rests on two questionable assumptions. First, digital intermediaries effectively police consumer markets. Second, they require minimal government involvement. Instead, some for-profit online advisers such as travel websites have become what many mortgage brokers were before the 2008 financial crisis. …


Keynote Address: The Digital Forevermore, Thomas J. Ridge Mar 2017

Keynote Address: The Digital Forevermore, Thomas J. Ridge

University of Richmond Law Review

No abstract provided.


Newsroom: Cybersecurity: Obama's Conflicted Legacy 02-17-2017, Peter Margulies Feb 2017

Newsroom: Cybersecurity: Obama's Conflicted Legacy 02-17-2017, Peter Margulies

Life of the Law School (1993- )

No abstract provided.


Data-Generating Patents, Brenda M. Simon, Ted Sichelman Feb 2017

Data-Generating Patents, Brenda M. Simon, Ted Sichelman

Northwestern University Law Review

Patents and trade secrets are often considered economic substitutes. Under this view, inventors can decide either to maintain an invention as a trade secret or to seek a patent and disclose to the public the details of the invention. However, a handful of scholars have recognized that because the patent disclosure requirements are not always rigorous, inventors may sometimes be able to keep certain aspects of an invention secret, yet still receive a patent to the invention as a whole. Here, we provide further insight into how trade secrets and patents may act as complements. Specifically, we introduce the concept …


Knowing Defense, Janet Moore, Andrew L.B. Davies Jan 2017

Knowing Defense, Janet Moore, Andrew L.B. Davies

Faculty Articles and Other Publications

The field of empirical research on public defense is in an early stage of development. Yet the field is also diverse, as a growing community of researchers applies training in disciplines ranging from law and criminology to economics and social psychology. These facts invite reflection on baseline questions about the field that may inform future work. For example, what factors shape our research agendas? What data, methods, and theories are in play? Do these new research agendas align with the research priorities of public defenders and the communities they serve? Should they do so? To begin exploring such questions, this …


Peeling Back The Student Privacy Pledge, Alexi Pfeffer-Gillett Jan 2017

Peeling Back The Student Privacy Pledge, Alexi Pfeffer-Gillett

Scholarly Articles

Education software is a multi-billion dollar industry that is rapidly growing. The federal government has encouraged this growth through a series of initiatives that reward schools for tracking and aggregating student data. Amid this increasingly digitized education landscape, parents and educators have begun to raise concerns about the scope and security of student data collection.

Industry players, rather than policymakers, have so far led efforts to protect student data. Central to these efforts is the Student Privacy Pledge, a set of standards that providers of digital education services have voluntarily adopted. By many accounts, the Pledge has been a success. …


The 'Smart' Fourth Amendment, Andrew Ferguson Jan 2017

The 'Smart' Fourth Amendment, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

“Smart” devices radiate data, detailing a continuous, intimate, and revealing pattern of daily life. Billions of sensors will soon collect data from smartphones, smart homes, smart cars, medical devices and an evolving assortment of consumer and commercial products. But, what are these data trails to the Fourth Amendment? Does data emanating from devices on or about our bodies, houses, things, and digital effects fall within the Fourth Amendment’s protection of “persons, homes, papers, or effects”? Does interception of this information violate a “reasonable expectation of privacy?”The “Internet of Things” and the growing proliferation of smart devices create new opportunities for …


Biometrics: The Future Is In Your Hands, Kelsey Sherman Jan 2017

Biometrics: The Future Is In Your Hands, Kelsey Sherman

Loyola of Los Angeles Law Review

No abstract provided.


An Expressive Theory Of Privacy Intrusions, Craig Konnoth Jan 2017

An Expressive Theory Of Privacy Intrusions, Craig Konnoth

Publications

The harms of privacy intrusions are numerous. They include discrimination, reputational harm, and chilling effects on speech, thought, and behavior. However, scholarship has yet to fully recognize a kind of privacy harm that this article terms "expressive."

Depending on where the search is taking place and who the actors involved are--a teacher in a school, the police on the street, a food inspector in a restaurant--victims and observers might infer different messages from the search. The search marks the importance of certain societal values such as law enforcement or food safety. It can also send messages about certain groups by …