Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Roger Williams University (26)
- University of Pennsylvania Carey Law School (15)
- University of Pittsburgh School of Law (9)
- Schulich School of Law, Dalhousie University (7)
- Boston University School of Law (4)
-
- New York Law School (3)
- City University of New York (CUNY) (2)
- Georgetown University Law Center (2)
- Pace University (2)
- University of Maryland Francis King Carey School of Law (2)
- Florida A&M University College of Law (1)
- Fordham Law School (1)
- Maurer School of Law: Indiana University (1)
- Singapore Management University (1)
- Texas A&M University School of Law (1)
- University of Baltimore Law (1)
- University of Colorado Law School (1)
- University of Georgia School of Law (1)
- University of Massachusetts School of Law (1)
- University of Miami Law School (1)
- University of Michigan Law School (1)
- University of Missouri School of Law (1)
- University of Nebraska - Lincoln (1)
- University of New Hampshire (1)
- Washington University in St. Louis (1)
- Publication Year
- Publication
-
- School of Law Conferences, Lectures & Events (20)
- All Faculty Scholarship (16)
- Articles (9)
- Faculty Scholarship (8)
- Articles, Book Chapters, & Popular Press (5)
-
- Life of the Law School (1993- ) (4)
- Articles & Chapters (3)
- Elisabeth Haub School of Law Faculty Publications (2)
- Faculty Publications (2)
- Georgetown Law Faculty Publications and Other Works (2)
- Reports & Public Policy Documents (2)
- Articles by Maurer Faculty (1)
- Book Chapters (1)
- Journal Publications (1)
- Law Faculty Scholarship (1)
- Law Library Newsletters/Blog (1)
- Open Educational Resources (1)
- Pro Bono Collaborative Staff Publications (1)
- Publications (1)
- Publications and Research (1)
- Research Collection Yong Pung How School Of Law (1)
- Reviews (1)
- Scholarly Works (1)
- Scholarship@WashULaw (1)
- University of Nebraska-Lincoln Libraries: Conference Presentations and Speeches (1)
Articles 1 - 30 of 87
Full-Text Articles in Law
Regulating Social Media Through Family Law, Katharine B. Silbaugh, Adi Caplan-Bricker
Regulating Social Media Through Family Law, Katharine B. Silbaugh, Adi Caplan-Bricker
Faculty Scholarship
Social media afflicts minors with depression, anxiety, sleeplessness, addiction, suicidality, and eating disorders. States are legislating at a breakneck pace to protect children. Courts strike down every attempt to intervene on First Amendment grounds. This Article clears a path through this stalemate by leveraging two underappreciated frameworks: the latent regulatory power of parental authority arising out of family law, and a hidden family law within First Amendment jurisprudence. These two projects yield novel insights. First, the recent cases offer a dangerous understanding of the First Amendment, one that should not survive the family law reasoning we provide. First Amendment jurisprudence …
The Automated Fourth Amendment, Maneka Sinha
The Automated Fourth Amendment, Maneka Sinha
Faculty Scholarship
Courts routinely defer to police officer judgments in reasonable suspicion and probable cause determinations. Increasingly, though, police officers outsource these threshold judgments to new forms of technology that purport to predict and detect crime and identify those responsible. These policing technologies automate core police determinations about whether crime is occurring and who is responsible. Criminal procedure doctrine has failed to insist on some level of scrutiny of—or skepticism about—the reliability of this technology. Through an original study analyzing numerous state and federal court opinions, this Article exposes the implications of law enforcement’s reliance on these practices given the weighty interests …
Office Of Attorney General Peter F. Neronha, Attorney General: Access To Public Records Act, Open Meetings Act, Attorney General, State Of Rhode Island, Roger Williams University School Of Law
Office Of Attorney General Peter F. Neronha, Attorney General: Access To Public Records Act, Open Meetings Act, Attorney General, State Of Rhode Island, Roger Williams University School Of Law
School of Law Conferences, Lectures & Events
No abstract provided.
25th Annual Open Government Summit: Your Guide To The Access To Public Records Act & Open Meetings Act, Peter F. Neronha, Roger Williams University School Of Law
25th Annual Open Government Summit: Your Guide To The Access To Public Records Act & Open Meetings Act, Peter F. Neronha, Roger Williams University School Of Law
School of Law Conferences, Lectures & Events
No abstract provided.
An Essay About Privacy, Ronald Griffin
An Essay About Privacy, Ronald Griffin
Journal Publications
Jessye Norman was an American opera singer. She died on October 1, 2019. On October 2, 2019, my wife got a grim diagnosis that put me in a stupor and reminded me, now more than ever, that my generation (that did so much good in the world) stands in line waiting for the Grim Reaper’s call. In a seventy-years (that have gone by too fast) I have watched my peers run from the realms of privacy, spaces where people implemented life plans uninterrupted by neighbours that were discernible, palpable, and real to everybody, to a realm where there is none. …
Resisting Face Surveillance With Copyright Law, Amanda Levendowski
Resisting Face Surveillance With Copyright Law, Amanda Levendowski
Georgetown Law Faculty Publications and Other Works
Face surveillance is animated by deep-rooted demographic and deployment biases that endanger marginalized communities and threaten the privacy of all. But current approaches have not prevented its adoption by law enforcement. Some companies have offered voluntary moratoria on selling the technology, leaving many others to fill in the gaps. Legislators have enacted regulatory oversight at the state and city levels, but a federal ban remains elusive. Both approaches require vast shifts in practical and political will, each with drawbacks. While we wait, face surveillance persists. This Article suggests a new possibility: face surveillance is fueled by unauthorized copies and reproductions …
Dismantling The “Black Opticon”: Privacy, Race Equity, And Online Data-Protection Reform, Anita L. Allen
Dismantling The “Black Opticon”: Privacy, Race Equity, And Online Data-Protection Reform, Anita L. Allen
All Faculty Scholarship
African Americans online face three distinguishable but related categories of vulnerability to bias and discrimination that I dub the “Black Opticon”: discriminatory oversurveillance, discriminatory exclusion, and discriminatory predation. Escaping the Black Opticon is unlikely without acknowledgement of privacy’s unequal distribution and privacy law’s outmoded and unduly race-neutral façade. African Americans could benefit from race-conscious efforts to shape a more equitable digital public sphere through improved laws and legal institutions. This Essay critically elaborates the Black Opticon triad and considers whether the Virginia Consumer Data Protection Act (2021), the federal Data Protection Act (2021), and new resources for the Federal Trade …
Submission To The Province Of Nova Scotia On Its Review Of The Intimate Images And Cyber-Protection Act - Leaf, Suzie Dunn, Rosel Kim
Submission To The Province Of Nova Scotia On Its Review Of The Intimate Images And Cyber-Protection Act - Leaf, Suzie Dunn, Rosel Kim
Reports & Public Policy Documents
The Women’s Legal Education and Action Fund (LEAF) commends the Nova Scotia government for reviewing its Intimate Images and Cyber-protection Act (the Act) and seeking public input for this review. Nova Scotia has been, and continues to be, a leader in Canada for its role in advancing innovative laws and supports for people targeted by technology-facilitated violence (TFV), digital abuse, and the non-consensual distribution of intimate images (NCDII). As these forms of harmful behaviour evolve and become better understood, it is important to revisit this legislation to assess whether it is providing meaningful and accessible responses to such serious social …
23rd Annual Open Government Summit: Access To Public Records Act, Open Meetings Act Powerpoint Presentation 07-30-2021, Office Of Attorney General State Of Rhode Island, Peter F. Neronha
23rd Annual Open Government Summit: Access To Public Records Act, Open Meetings Act Powerpoint Presentation 07-30-2021, Office Of Attorney General State Of Rhode Island, Peter F. Neronha
School of Law Conferences, Lectures & Events
No abstract provided.
Law Library Blog (January 2021): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Blog (January 2021): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Newsletters/Blog
No abstract provided.
Privacy In Pandemic: Law, Technology, And Public Health In The Covid-19 Crisis, Tiffany C. Li
Privacy In Pandemic: Law, Technology, And Public Health In The Covid-19 Crisis, Tiffany C. Li
Law Faculty Scholarship
The COVID-19 pandemic has caused millions of deaths and disastrous consequences around the world, with lasting repercussions for every field of law, including privacy and technology. The unique characteristics of this pandemic have precipitated an increase in use of new technologies, including remote communications platforms, healthcare robots, and medical Al. Public and private actors alike are using new technologies, like heat sensing, and technologically influenced programs, like contact tracing, leading to a rise in government and corporate surveillance in sectors like healthcare, employment, education, and commerce. Advocates have raised the alarm for privacy and civil liberties violations, but the emergency …
Submission To The Toronto Police Services Board’S Use Of New Artificial Intelligence Technologies Policy- Leaf And The Citizen Lab, Suzie Dunn, Kristen Mj Thomasen, Kate Robertson, Pam Hrick, Cynthia Khoo, Rosel Kim, Ngozi Okidegbe, Christopher Parsons
Submission To The Toronto Police Services Board’S Use Of New Artificial Intelligence Technologies Policy- Leaf And The Citizen Lab, Suzie Dunn, Kristen Mj Thomasen, Kate Robertson, Pam Hrick, Cynthia Khoo, Rosel Kim, Ngozi Okidegbe, Christopher Parsons
Reports & Public Policy Documents
We write as a group of experts in the legal regulation of artificial intelligence (AI), technology-facilitated violence, equality, and the use of AI systems by law enforcement in Canada. We have experience working within academia and legal practice, and are affiliated with LEAF and the Citizen Lab who support this letter.
We reviewed the Toronto Police Services Board Use of New Artificial Intelligence Technologies Policy and provide comments and recommendations focused on the following key observations:
1. Police use of AI technologies must not be seen as inevitable
2. A commitment to protecting equality and human rights must be integrated …
Pandemic Surveillance Discrimination, Christian Sundquist
Pandemic Surveillance Discrimination, Christian Sundquist
Articles
The COVID-19 pandemic has laid bare the abiding tension between surveillance and privacy. Public health epidemiology has long utilized a variety of surveillance methods—such as contact tracing, quarantines, and mandatory reporting laws—to control the spread of disease during past epidemics and pandemics. Officials have typically justified the resulting intrusions on privacy as necessary for the greater public good by helping to stave off larger health crisis. The nature and scope of public health surveillance in the battle against COVID-19, however, has significantly changed with the advent of new technologies. Digital surveillance tools, often embedded in wearable technology, have greatly increased …
The Republic Of Letters And The Origins Of Scientific Knowledge Commons, Michael J. Madison
The Republic Of Letters And The Origins Of Scientific Knowledge Commons, Michael J. Madison
Book Chapters
The knowledge commons framework, deployed here in a review of the early network of scientific communication known as the Republic of Letters, combines a historical sensibility regarding the character of scientific research and communications with a modern approach to analyzing institutions for knowledge governance. Distinctions and intersections between public purposes and privacy interests are highlighted. Lessons from revisiting the Republic of Letters as knowledge commons may be useful in advancing contemporary discussions of Open Science.
Digital Gatekeepers, Thomas E. Kadri
Digital Gatekeepers, Thomas E. Kadri
Scholarly Works
If in William Blackstone's time we might have thought of a person's home as their castle, in Mark Zuckerberg's time we might say that their website is too. Under cyber-trespass laws like the Computer Fraud and Abuse Act, courts have treated online platforms as digital gatekeepers--as property owners that may permit and restrict access to websites much like landowners may do with private land in the real world. If platforms withhold their consent through words or inference, cyber-trespass laws let them enforce their preferences about who may access their services and gather information from the internet. Concerned about reputations and …
Law School News: Rwu Law Dean Seeking To Build On Culture Of Service, Innovation 12/09/2020, Barry Bridges, Roger Williams University School Of Law
Law School News: Rwu Law Dean Seeking To Build On Culture Of Service, Innovation 12/09/2020, Barry Bridges, Roger Williams University School Of Law
Life of the Law School (1993- )
No abstract provided.
Reflections On The Use Of Facial Recognition Technology During Covid-19, Gary Kok Yew Chan
Reflections On The Use Of Facial Recognition Technology During Covid-19, Gary Kok Yew Chan
Research Collection Yong Pung How School Of Law
During the COVID-10 pandemic, infected persons have been quarantined in segregated facilities. Individuals who have been in contact with the infected persons may be subject to self-isolation measures or stay-home notices. Technological tools such as proximity and contact tracing apps are used to identify those who have been in close contact with infected persons. The contact tracing QR code used in Singapore's SafeEntry requires the submission of personal information (including names and identification numbers) prior to entry into certain public places such as malls, factories and restaurants. Robots, in addition to designated human officers, have been delpoyed to maintain social …
The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin
The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin
Open Educational Resources
Using episodes from the show Black Mirror as a study tool - a show that features tales that explore techno-paranoia - the course analyzes legal and policy considerations of futuristic or hypothetical case studies. The case studies tap into the collective unease about the modern world and bring up a variety of fascinating key philosophical, legal, and economic-based questions.
22nd Annual Open Government Summit: Office Of The Attorney General: Access To Public Records Act & Open Meetings Act, Attorney General State Of Rhode Island
22nd Annual Open Government Summit: Office Of The Attorney General: Access To Public Records Act & Open Meetings Act, Attorney General State Of Rhode Island
School of Law Conferences, Lectures & Events
No abstract provided.
Identity Manipulation: Responding To Advances In Artificial Intelligence And Robotics, Suzie Dunn
Identity Manipulation: Responding To Advances In Artificial Intelligence And Robotics, Suzie Dunn
Articles, Book Chapters, & Popular Press
Advances in artificial intelligence (AI) and robotics technologies have destabilized our ability to control our identity. Today, it is increasingly accessible for the average person to appropriate the voice, image, and body of another individual through the use of technology. Deepfake videos swap new faces into existing videos, facial re-enactment allows for the face of one person to be superimposed on the face of someone else in a real time video, artificial speech synthesis can clone another person’s voice, and 3D printing and modern robotics can reproduce life-size copies of living people. These are all examples of the ways technology …
Politics Of Adversarial Machine Learning, Kendra Albert, Jonathon Penney, Bruce Schneier, Ram Shankar Siva Kumar
Politics Of Adversarial Machine Learning, Kendra Albert, Jonathon Penney, Bruce Schneier, Ram Shankar Siva Kumar
Articles, Book Chapters, & Popular Press
In addition to their security properties, adversarial machine-learning attacks and defenses have political dimensions. They enable or foreclose certain options for both the subjects of the machine learning systems and for those who deploy them, creating risks for civil liberties and human rights. In this paper, we draw on insights from science and technology studies, anthropology, and human rights literature, to inform how defenses against adversarial attacks can be used to suppress dissent and limit attempts to investigate machine learning systems. To make this concrete, we use real-world examples of how attacks such as perturbation, model inversion, or membership inference …
A New Frontier Facing Attorneys And Paralegals: The Promise & Challenges Of Artificial Intelligence As Applied To Law & Legal Decision-Making, Marissa Moran
Publications and Research
Artificial Intelligence/AI invisibly navigates and informs our lives today and may also be used to determine a client’s legal fate. Through executive order, statements by a U.S. Supreme Court justice and a Congressional Commission on AI, all three branches of the United States government have addressed the use of AI to resolve societal and legal matters. Pursuant to the American Bar Association Model Rules of Professional Conduct[i] and New York Rules of Professional Conduct (NYRPC), [ii] the legal profession recognizes the need for competency in technology which requires both substantive knowledge of law and competent use of technology for …
Privative Copyright, Shyamkrishna Balganesh
Privative Copyright, Shyamkrishna Balganesh
All Faculty Scholarship
“Privative” copyright claims are infringement actions brought by authors for the unauthorized public dissemination of works that are private, unpublished, and revelatory of the author’s personal identity. Driven by considerations of authorial autonomy, dignity, and personality rather than monetary value, these claims are almost as old as Anglo-American copyright law itself. Yet modern thinking has attempted to undermine their place within copyright law and sought to move them into the domain of privacy law. This Article challenges the dominant view and argues that privative copyright claims form a legitimate part of the copyright landscape. It shows how privative copyright claims …
Law School News: A Spring Break That Teaches - And Gives Back 03/11/2019, Edward Fitzpatrick
Law School News: A Spring Break That Teaches - And Gives Back 03/11/2019, Edward Fitzpatrick
Life of the Law School (1993- )
No abstract provided.
Chapter: “Health Law And Ethics”, Allison K. Hoffman, I. Glenn Cohen, William M. Sage
Chapter: “Health Law And Ethics”, Allison K. Hoffman, I. Glenn Cohen, William M. Sage
All Faculty Scholarship
Law and ethics are both essential attributes of a high-functioning health care system and powerful explainers of why the existing system is so difficult to improve. U.S. health law is not seamless; rather, it derives from multiple sources and is based on various theories that may be in tension with one another. There are state laws and federal laws, laws setting standards and laws providing funding, laws reinforcing professional prerogatives, laws furthering social goals, and laws promoting market competition. Complying with law is important, but health professionals also should understand that the legal and ethical constraints under which health systems …
Revenge Porn, Thomas Lonardo, Tricia P. Martland, Rhode Island Bar Journal
Revenge Porn, Thomas Lonardo, Tricia P. Martland, Rhode Island Bar Journal
Life of the Law School (1993- )
No abstract provided.
20th Annual Open Government Summit: Access To Public Records Act And Open Meetings Act, 2018, Department Of Attorney General, State Of Rhode Island
20th Annual Open Government Summit: Access To Public Records Act And Open Meetings Act, 2018, Department Of Attorney General, State Of Rhode Island
School of Law Conferences, Lectures & Events
10
Designing Without Privacy, Ari Ezra Waldman
Designing Without Privacy, Ari Ezra Waldman
Articles & Chapters
In Privacy on the Ground, the law and information scholars Kenneth Bamberger and Deirdre Mulligan showed that empowered chief privacy officers (CPOs) are pushing their companies to take consumer privacy seriously, integrating privacy into the designs of new technologies. But their work was just the beginning of a larger research agenda. CPOs may set policies at the top, but they alone cannot embed robust privacy norms into the corporate ethos, practice, and routine. As such, if we want the mobile apps, websites, robots, and smart devices we use to respect our privacy, we need to institutionalize privacy throughout the corporations …
Are Privacy Laws Deficient?, Woodrow Hartzog
Are Privacy Laws Deficient?, Woodrow Hartzog
Faculty Scholarship
Privacy law around the world is deficient because it ignores design. Lawmakers have attempted to establish limits on the collection, use, and distribution of personal information. But they have largely overlooked the power of design. They have discounted the role that design plays in facilitating the conduct and harm privacy law is meant to prevent. Design pitches and picks privacy winners and losers, with people as data subjects and surveillance objects often on the losing side.
Why Courts Fail To Protect Privacy: Race, Age, Bias, And Technology, Christopher Robertson, Bernard Chao, Ian Farrell, Catherine Durso
Why Courts Fail To Protect Privacy: Race, Age, Bias, And Technology, Christopher Robertson, Bernard Chao, Ian Farrell, Catherine Durso
Faculty Scholarship
The Fourth Amendment protects against unreasonable “searches and seizures,” but in the digital age of stingray devices and IP tracking, what constitutes a search or seizure? The Supreme Court has held that the threshold question is supposed to depend on and reflect the “reasonable expectations” of ordinary members of the public concerning their own privacy. For example, the police now exploit the “third party” doctrine to access data held by email and cell phone providers, without securing a warrant, on the Supreme Court’s intuition that the public has no expectation of privacy in that information. Is that assumption correct? If …