Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Law

2020

Privacy

Institution
Publication
Publication Type

Articles 1 - 30 of 85

Full-Text Articles in Law

An Australian Conundrum: Genomic Technology, Data, And The Covidsafe App, David Morrison, Patrick T. Quirk Dec 2020

An Australian Conundrum: Genomic Technology, Data, And The Covidsafe App, David Morrison, Patrick T. Quirk

Pace International Law Review

This paper examines the difficulties that have arisen in Australia in the use of its contact-tracing app. We examine the privacy implications around the use of the app, the wider economic imperative, and the balancing of those concerns against the health threat of the COVID-19 pandemic. We posit that default options are superior in times of emergency and rather than begging for the adoption of lifesaving technology, we suggest that the evidence gathered by behavioral economists provides an apposite and powerful alternative worthy of consideration.


The Jones Trespass Doctrine And The Need For A Reasonable Solution To Unreasonable Protection, Geoffrey Corn Dec 2020

The Jones Trespass Doctrine And The Need For A Reasonable Solution To Unreasonable Protection, Geoffrey Corn

Arkansas Law Review

Each day that Houston drivers exit from Interstate 45 to drive to downtown Houston, they pass an odd sight. Nestled within some bushes is an encampment of tents. This encampment is very clearly located on public property adjacent to the interstate highway, and equally clearly populated by homeless individuals. While local police ostensibly tolerate this presence, at least temporarily, the sight frequently evokes an image in my mind of a police search of those tents. This thought is especially prominent on the days I am driving to my law school, South Texas College of Law Houston, to teach my federal …


Law School News: Rwu Law Dean Seeking To Build On Culture Of Service, Innovation 12/09/2020, Barry Bridges, Roger Williams University School Of Law Dec 2020

Law School News: Rwu Law Dean Seeking To Build On Culture Of Service, Innovation 12/09/2020, Barry Bridges, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


Trading Privacy For Promotion? Fourth Amendment Implications Of Employers Using Wearable Sensors To Assess Worker Performance, George M. Dery Iii Dec 2020

Trading Privacy For Promotion? Fourth Amendment Implications Of Employers Using Wearable Sensors To Assess Worker Performance, George M. Dery Iii

Northwestern Journal of Law & Social Policy

This Article considers the Fourth Amendment implications of a study on a passive monitoring system where employees shared data from wearables, phone applications, and position beacons that provided private information such as weekend phone use, sleep patterns in the bedroom, and emotional states. The study’s authors hope to use the data collected to create a new system for objectively assessing employee performance that will replace the current system which is plagued by the inherent bias of self-reporting and peer-review and which is labor intensive and inefficient. The researchers were able to successfully link the data collected with the quality of …


Ring, Amazon Calling: The State Action Doctrine & The Fourth Amendment, Grace Egger Dec 2020

Ring, Amazon Calling: The State Action Doctrine & The Fourth Amendment, Grace Egger

Washington Law Review Online

Video doorbells have proliferated across the United States and Amazon owns one of the most popular video doorbell companies on the market—Ring. While many view the Ring video doorbell as useful technology that protects the home and promotes safer neighborhoods, the product reduces consumer privacy without much recourse. For example, Ring partners with cities and law enforcement agencies across the United States thereby creating a mass surveillance network in which law enforcement agencies can watch neighborhoods and access Ring data without the user’s knowledge or consent. Because Amazon is not a state actor, it is able to circumvent the due …


The Thickness Of Blood: Article I, Section 7, Law Enforcement, And Commercial Dna Databases, Hannah Parman Dec 2020

The Thickness Of Blood: Article I, Section 7, Law Enforcement, And Commercial Dna Databases, Hannah Parman

Washington Law Review

Law enforcement agencies increasingly use online commercial and open source DNA databases to identify suspects in cases that have long since gone cold. By uploading crime scene DNA to one of these websites, investigators can find family members who have used the website and build a family tree leading back to the owner of the original DNA. This is called “familial DNA searching.” The highest profile use of this investigative method to date occurred in California, but law enforcement in Washington State has been quick to begin utilizing the method as well. However, article I, section 7 of the Washington …


Inescapable Surveillance, Matthew Tokson Nov 2020

Inescapable Surveillance, Matthew Tokson

Utah Law Faculty Scholarship

Until recently, Supreme Court precedent dictated that a person waives their Fourth Amendment rights in information they disclose to another party. The Court reshaped this doctrine in Carpenter v. United States, establishing that the Fourth Amendment protects cell phone location data even though it is revealed to others. The Court emphasized that consumers had little choice but to disclose their data, because cell phone use is virtually inescapable in modern society.

In the wake of Carpenter, many scholars and lower courts have endorsed inescapability as an important factor for determining Fourth Amendment rights. Under this approach, surveillance that people cannot …


Secret Surveillance Scores: Pay No Attention To What's Behind The Curtain, Allison Piper Geber Nov 2020

Secret Surveillance Scores: Pay No Attention To What's Behind The Curtain, Allison Piper Geber

Northern Illinois University Law Review

This Comment discusses the potential and actual misuse of consumers' secret surveillance scores in e-commerce, employment, and housing situations, as evidenced in a 2019 FTC complaint. The calculation and use of these secret surveillance scores are currently unregulated. The Comment presents two main arguments: First, secret surveillance scores are equivalent to credit scores used in the financial credit reporting industry and should thus undergo similar regulation. Second, the collection of consumer data points to calculate secret surveillance scores highlights the need for broad, nationwide consumer digital data privacy legislation. The collection and use of secret surveillance scores are akin to …


The Future Of The Public Trust: The Muddied Waters Of Rockweed Management In Maine, Sarah M. Reiter, Dillon Post, Lisa Wedding, Aaron L. Strong Oct 2020

The Future Of The Public Trust: The Muddied Waters Of Rockweed Management In Maine, Sarah M. Reiter, Dillon Post, Lisa Wedding, Aaron L. Strong

Ocean and Coastal Law Journal

Seaweeds, or more properly, intertidal macroalgae have never been easy to classify—by law or by science: they are not part of the animal kingdom, nor part of the plant kingdom (and scientific controversies about their phylogenetic placement abound), they are not completely on terra firma, nor completely submerged in ocean water. One such organism that exists at the space in between land and sea—the brown alga commonly known as Rockweed (Ascophyllum nodosum) presents an intriguing legal question with implications that extend far beyond the shoreline. Recently, in Ross v. Acadian Seaplants Ltd. , the Supreme Judicial Court of Maine (Court) …


Access For The Future: Improving Maine's Implementation Of The Public Trust Doctrine Through Municipal Controls To Ensure Coastal Access For Continuing Benefit To Maine's People And Economy, Allison M. Kuhns Oct 2020

Access For The Future: Improving Maine's Implementation Of The Public Trust Doctrine Through Municipal Controls To Ensure Coastal Access For Continuing Benefit To Maine's People And Economy, Allison M. Kuhns

Ocean and Coastal Law Journal

The public trust doctrine generally guarantees the public access to the shoreline, which is held in trust for the public by the state. In Maine, a pre-Revolutionary War ordinance limits the public trust doctrine by granting private landowners rights to the same shoreline areas. Access to the shoreline area is subject to frequent legal battles and court decisions have not cured the conflict between the public's rights and the private landowners' rights. Maine's economy relies heavily on public access to the shoreline. This comment suggests that the public's rights should be protected. First, the public trust doctrine does not violate …


Good Health And Good Privacy Go Hand-In-Hand (Originally Published By Jnslp), Jennifer Daskal Oct 2020

Good Health And Good Privacy Go Hand-In-Hand (Originally Published By Jnslp), Jennifer Daskal

Joint PIJIP/TLS Research Paper Series

No abstract provided.


Keeping The Zombies At Bay: Fourth Amendment Problems In The Fight Against Botnets, Danielle Potter Oct 2020

Keeping The Zombies At Bay: Fourth Amendment Problems In The Fight Against Botnets, Danielle Potter

Washington and Lee Journal of Civil Rights and Social Justice

You may not have heard of a botnet. If you have, you may have linked it to election shenanigans and nothing else. But if you are reading this on a computer or smartphone, there is a good chance you are in contact with a botnet right now.

Botnets, sometimes called “Zombie Armies,” are networks of devices linked by a computer virus and controlled by cybercriminals. Botnets operate on everyday devices owned by millions of Americans, and thus pose a substantial threat to individual device owners as well as the nation’s institutions and economy.

Accordingly, the United States government has been …


Law And Covid-19, Aurelio Gurrea-Martinez, Yihan Goh, Mark Findlay Oct 2020

Law And Covid-19, Aurelio Gurrea-Martinez, Yihan Goh, Mark Findlay

Research Collection Yong Pung How School Of Law

This book is a collection of essays from scholars at Singapore Management University School of Law analysing the challenges and implications of COVID-19 from the perspective of different areas of law, including private law, corporate law, insolvency law, data protection, financial laws, public law, privacy law, commercial law, constitutional law, law and technology, and dispute resolution. It also analyses how the COVID-19 pandemic will affect the judicial system, the study of law, and the future of the legal profession. Beyond considerations of the pandemic’s influence on law and legal service delivery the authors consider how law can help facilitate the …


Algorithmic Personalized Pricing, Pascale Chapdelaine Oct 2020

Algorithmic Personalized Pricing, Pascale Chapdelaine

Law Publications

Price is an essential term at the heart of supplier-consumer transactions and relationships increasingly taking place in “micro-marketplace chambers,” where points of comparison with similar relevant products may be difficult to discern and time-consuming to make. This article critically reviews recent legal and economic academic literature, policy reports on algorithmic personalized pricing (i.e. setting prices according to consumers’ personal characteristics to target their willingness to pay), as well as recent developments in privacy regulation, competition law, and policy discourse, to derive the guiding norms that should inform the regulation of this practice, predominantly from a consumer protection perspective. Looking more …


The Fourth Amendment At Home, Thomas P. Crocker Oct 2020

The Fourth Amendment At Home, Thomas P. Crocker

Indiana Law Journal

A refuge, a domain of personal privacy, and the seat of familial life, the home holds a special place in Fourth Amendment jurisprudence. Supreme Court opinions are replete with statements affirming the special status of the home. Fourth Amendment text places special emphasis on securing protections for the home in addition to persons, papers, and effects against unwarranted government intrusion. Beyond the Fourth Amendment, the home has a unique place within constitutional structure. The home receives privacy protections in addition to sheltering other constitutional values protected by the Due Process Clause and the First Amendment. For example, under the Due …


The First Amendment And The Right(S) Of Publicity, Jennifer E. Rothman, Robert C. Post Oct 2020

The First Amendment And The Right(S) Of Publicity, Jennifer E. Rothman, Robert C. Post

All Faculty Scholarship

The right of publicity protects persons against unauthorized uses of their identity, most typically their names, images, or voices. The right is in obvious tension with freedom of speech. Yet courts seeking to reconcile the right with the First Amendment have to date produced only a notoriously confused muddle of inconsistent constitutional doctrine. In this Article, we suggest a way out of the maze. We propose a relatively straightforward framework for analyzing how the right of publicity should be squared with First Amendment principles.

At the root of contemporary constitutional confusion lies a failure to articulate the precise state interests …


The United States: Big Data, Little Regulation, Megan Valent Sep 2020

The United States: Big Data, Little Regulation, Megan Valent

University of Miami Business Law Review

In the United States today, there is no single law to address the privacy concerns associated with the collection of consumer data. Lawmakers have introduced policies that seek to address data privacy at the federal level, but Congress has not yet acted to create a comprehensive law to protect consumers. On the contrary, in 2016, the European Union passed its General Data Protection Regulation to address the dangers associated with “Big Data” and to give consumers control over their data.

Unfortunately, in the United States consumers are often unaware of how their data is being handled and what is done …


Reflections On The Use Of Facial Recognition Technology During Covid-19, Gary Kok Yew Chan Sep 2020

Reflections On The Use Of Facial Recognition Technology During Covid-19, Gary Kok Yew Chan

Research Collection Yong Pung How School Of Law

During the COVID-10 pandemic, infected persons have been quarantined in segregated facilities. Individuals who have been in contact with the infected persons may be subject to self-isolation measures or stay-home notices. Technological tools such as proximity and contact tracing apps are used to identify those who have been in close contact with infected persons. The contact tracing QR code used in Singapore's SafeEntry requires the submission of personal information (including names and identification numbers) prior to entry into certain public places such as malls, factories and restaurants. Robots, in addition to designated human officers, have been delpoyed to maintain social …


Privacy In Pandemic: Law, Technology, And Public Health In The Covid-19 Crisis, Tiffany Li Sep 2020

Privacy In Pandemic: Law, Technology, And Public Health In The Covid-19 Crisis, Tiffany Li

Faculty Scholarship

The COVID-19 pandemic has caused millions of deaths and disastrous consequences around the world, with lasting repercussions for every field of law, including privacy and technology. The unique characteristics of this pandemic have precipitated an increase in use of new technologies, including remote communications platforms, healthcare robots, and medical AI. Public and private actors are using new technologies, like heat sensing, and technologically-influenced programs, like contact tracing, alike in response, leading to a rise in government and corporate surveillance in sectors like healthcare, employment, education, and commerce. Advocates have raised the alarm for privacy and civil liberties violations, but the …


Cryptography, Passwords, Privacy, And The Fifth Amendment, Gary C. Kessler, Ann M. Phillips Aug 2020

Cryptography, Passwords, Privacy, And The Fifth Amendment, Gary C. Kessler, Ann M. Phillips

Journal of Digital Forensics, Security and Law

Military-grade cryptography has been widely available at no cost for personal and commercial use since the early 1990s. Since the introduction of Pretty Good Privacy (PGP), more and more people encrypt files and devices, and we are now at the point where our smartphones are encrypted by default. While this ostensibly provides users with a high degree of privacy, compelling a user to provide a password has been interpreted by some courts as a violation of our Fifth Amendment protections, becoming an often insurmountable hurdle to law enforcement lawfully executing a search warrant. This paper will explore some of the …


The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin Aug 2020

The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin

Open Educational Resources

Using episodes from the show Black Mirror as a study tool - a show that features tales that explore techno-paranoia - the course analyzes legal and policy considerations of futuristic or hypothetical case studies. The case studies tap into the collective unease about the modern world and bring up a variety of fascinating key philosophical, legal, and economic-based questions.


Fixing Informational Asymmetry Through Trademark Search, Jessica Silbey Aug 2020

Fixing Informational Asymmetry Through Trademark Search, Jessica Silbey

Faculty Scholarship

I call this paper a “Levendowski special.” It follows the signature format of much of Professor Levendowski’s prior work which, as in the latest article, recruits a legal tool typically aimed at one set of problems for the purpose of cleverly addressing a different set of problems. Her past articles harnessed copyright law to “fix artificial intelligence’s implicit bias” (2018) and to “combat revenge porn.” (2014). This paper draws on Professor Levendowski’s expertise working in private practice as a trademark attorney to address the problem of surveillance technology opacity. It is a primer on how to investigate trademark …


Law And Authors: A Legal Handbook For Writers (Introduction), Jacqueline D. Lipton Aug 2020

Law And Authors: A Legal Handbook For Writers (Introduction), Jacqueline D. Lipton

Book Chapters

Drawing on a wealth of experience in legal scholarship and publishing, Professor Jacqueline D. Lipton provides a useful legal guide for writers whatever their levels of expertise or categories of work (fiction, nonfiction, academic, journalism, freelance content development). This introductory chapter outlines the key legal and business issues authors are likely to face during the course of their careers, and emphasizes that most legal problems have solutions so law should never be an excuse to avoid writing something that an author feels strongly about creating. The larger work draws from case studies and hypothetical examples to address issues of copyright …


22nd Annual Open Government Summit: Office Of The Attorney General: Access To Public Records Act & Open Meetings Act, Attorney General State Of Rhode Island Jul 2020

22nd Annual Open Government Summit: Office Of The Attorney General: Access To Public Records Act & Open Meetings Act, Attorney General State Of Rhode Island

School of Law Conferences, Lectures & Events

No abstract provided.


Is Data Localization A Solution For Schrems Ii?, Anupam Chander Jul 2020

Is Data Localization A Solution For Schrems Ii?, Anupam Chander

Georgetown Law Faculty Publications and Other Works

For the second time this decade, the Court of Justice of the European Union has struck a blow against the principal mechanisms for personal data transfer to the United States. In Data Protection Commissioner v Facebook Ireland, Maximillian Schrems, the Court declared the EU-US Privacy Shield invalid and placed significant hurdles to the process of transferring personal data from the European Union to the United States via the mechanism of Standard Contractual Clauses. Many have begun to suggest data localization as the solution to the problem of data transfer; that is, don’t transfer the data at all. I argue …


The First Amendment And Data Privacy: Securing Data Privacy Laws That Withstand Constitutional Muster, Kathryn Peyton Jul 2020

The First Amendment And Data Privacy: Securing Data Privacy Laws That Withstand Constitutional Muster, Kathryn Peyton

Pepperdine Law Review

Given the growing ubiquity of digital technology’s presence in people’s lives today, it is becoming increasingly more necessary to secure data privacy protections. People interact with technology constantly, ranging from when engaging in business activates, such as corresponding through emails or doing research online, to more innocuous activities like driving, shopping, or talking with friends and family. The advances in technology have made possible the creation of digital trails whenever someone interacts with such technology. Companies aggregate data from data trails and use predictive analytics to create detailed profiles about citizen-consumers. This information is typically used for profit generating purposes. …


Cybersecurity-Cybercrime-The Legal Environment, Amy J. Ramson Jul 2020

Cybersecurity-Cybercrime-The Legal Environment, Amy J. Ramson

Open Educational Resources

This presentation covers the legal environment of cybercrime to date. It addresses: the challenges of law enforcement; federal government vs. sate jurisdiction of cybercrime; law enforcement department and agencies which handle cybercrime; criminal statutes and privacy statutes.


Sharenting And The (Potential) Right To Be Forgotten, Keltie Haley Jul 2020

Sharenting And The (Potential) Right To Be Forgotten, Keltie Haley

Indiana Law Journal

Part I of this Note serves as an evaluation of parental use of social media and

further seeks to draw attention to the social and developmental impact parental

oversharing can have on children. Part II examines the tension between parents’

constitutional rights to direct the upbringing of their children, as well as their First

Amendment interest in online expression, and their children’s interest in personal

data security and privacy. Part III provides an overview of the European Union’s

right to be forgotten framework in the sharenting context and considers the

plausibility of implementing such a framework in the United States. …


Modern Privacy Advocacy: An Approach At War With Privacy Itself?, Justin "Gus" Hurwitz, Jamil N. Jaffer Jun 2020

Modern Privacy Advocacy: An Approach At War With Privacy Itself?, Justin "Gus" Hurwitz, Jamil N. Jaffer

Pepperdine Law Review

This Article argues that the modern concept of privacy itself, particularly as framed by some of its most ardent advocates today, is fundamentally incoherent. The Article highlights that many common arguments made in support of privacy, while initially seeming to protect this critical value, nonetheless undermine it in the long run. Using both recent and older examples of applying classic privacy advocacy positions to key technological innovations, the authors demonstrate how these positions, while seemingly privacy-enhancing at the time, actually resulted in outcomes that were less beneficial for consumers and citizens, including from a purely privacy-focused perspective. As a result, …


Can Pipeda ‘Face’ The Challenge? An Analysis Of The Adequacy Of Canada’S Private Sector Privacy Legislation Against Facial Recognition Technology, Tunca Bolca Jun 2020

Can Pipeda ‘Face’ The Challenge? An Analysis Of The Adequacy Of Canada’S Private Sector Privacy Legislation Against Facial Recognition Technology, Tunca Bolca

Canadian Journal of Law and Technology

Facial recognition technology is one of the most intrusive and privacy threatening technologies available today. The literature around this technology mainly focuses on its use by the public sector as a mass surveillance tool; however, the private sector uses of facial recognition technologies also raise significant privacy concerns. This paper aims to identify and examine the privacy implications of the private sector uses of facial recognition technologies and the adequacy of Canada’s federal private sector privacy legislation, the Personal Information Protection and Electronic Documents Act (PIPEDA), in addressing these privacy concerns. Facial templates produced and recorded by these technologies are …