Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Roger Williams University (26)
- Selected Works (15)
- University of Pennsylvania Carey Law School (15)
- St. Mary's University (10)
- Pepperdine University (9)
-
- University of Pittsburgh School of Law (9)
- Schulich School of Law, Dalhousie University (7)
- SelectedWorks (7)
- Maurer School of Law: Indiana University (5)
- New York Law School (5)
- Seattle University School of Law (5)
- University of Michigan Law School (5)
- Boston University School of Law (4)
- University of Maryland Francis King Carey School of Law (4)
- University of Miami Law School (4)
- University of Wollongong (3)
- American University Washington College of Law (2)
- BLR (2)
- City University of New York (CUNY) (2)
- Cleveland State University (2)
- Embry-Riddle Aeronautical University (2)
- Georgetown University Law Center (2)
- Georgia State University College of Law (2)
- Pace University (2)
- Penn State Dickinson Law (2)
- University of Maine School of Law (2)
- University of Washington School of Law (2)
- Brooklyn Law School (1)
- Florida A&M University College of Law (1)
- Fordham Law School (1)
- Publication Year
- Publication
-
- School of Law Conferences, Lectures & Events (20)
- All Faculty Scholarship (16)
- Articles (9)
- Faculty Scholarship (8)
- St. Mary's Law Journal (8)
-
- Articles, Book Chapters, & Popular Press (5)
- Journal of the National Association of Administrative Law Judiciary (5)
- Professor Katina Michael (5)
- Life of the Law School (1993- ) (4)
- Pepperdine Law Review (4)
- Seattle University Law Review (4)
- Articles & Chapters (3)
- Associate Professor Katina Michael (3)
- Indiana Law Journal (3)
- Michigan Law Review (3)
- Cleveland State Law Review (2)
- Dickinson Law Review (2017-Present) (2)
- Elisabeth Haub School of Law Faculty Publications (2)
- ExpressO (2)
- Faculty Publications (2)
- Georgetown Law Faculty Publications and Other Works (2)
- Georgia State University Law Review (2)
- Journal of Digital Forensics, Security and Law (2)
- Maine Law Review (2)
- Maryland Law Review (2)
- NYLS Law Review (2)
- Reports & Public Policy Documents (2)
- St. Mary's Journal on Legal Malpractice & Ethics (2)
- Susan Freiwald (2)
- University of Miami Law Review (2)
- Publication Type
- File Type
Articles 31 - 60 of 178
Full-Text Articles in Law
Law School News: Rwu Law Dean Seeking To Build On Culture Of Service, Innovation 12/09/2020, Barry Bridges, Roger Williams University School Of Law
Law School News: Rwu Law Dean Seeking To Build On Culture Of Service, Innovation 12/09/2020, Barry Bridges, Roger Williams University School Of Law
Life of the Law School (1993- )
No abstract provided.
Reflections On The Use Of Facial Recognition Technology During Covid-19, Gary Kok Yew Chan
Reflections On The Use Of Facial Recognition Technology During Covid-19, Gary Kok Yew Chan
Research Collection Yong Pung How School Of Law
During the COVID-10 pandemic, infected persons have been quarantined in segregated facilities. Individuals who have been in contact with the infected persons may be subject to self-isolation measures or stay-home notices. Technological tools such as proximity and contact tracing apps are used to identify those who have been in close contact with infected persons. The contact tracing QR code used in Singapore's SafeEntry requires the submission of personal information (including names and identification numbers) prior to entry into certain public places such as malls, factories and restaurants. Robots, in addition to designated human officers, have been delpoyed to maintain social …
Cryptography, Passwords, Privacy, And The Fifth Amendment, Gary C. Kessler, Ann M. Phillips
Cryptography, Passwords, Privacy, And The Fifth Amendment, Gary C. Kessler, Ann M. Phillips
Journal of Digital Forensics, Security and Law
Military-grade cryptography has been widely available at no cost for personal and commercial use since the early 1990s. Since the introduction of Pretty Good Privacy (PGP), more and more people encrypt files and devices, and we are now at the point where our smartphones are encrypted by default. While this ostensibly provides users with a high degree of privacy, compelling a user to provide a password has been interpreted by some courts as a violation of our Fifth Amendment protections, becoming an often insurmountable hurdle to law enforcement lawfully executing a search warrant. This paper will explore some of the …
The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin
The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin
Open Educational Resources
Using episodes from the show Black Mirror as a study tool - a show that features tales that explore techno-paranoia - the course analyzes legal and policy considerations of futuristic or hypothetical case studies. The case studies tap into the collective unease about the modern world and bring up a variety of fascinating key philosophical, legal, and economic-based questions.
22nd Annual Open Government Summit: Office Of The Attorney General: Access To Public Records Act & Open Meetings Act, Attorney General State Of Rhode Island
22nd Annual Open Government Summit: Office Of The Attorney General: Access To Public Records Act & Open Meetings Act, Attorney General State Of Rhode Island
School of Law Conferences, Lectures & Events
No abstract provided.
Sharenting And The (Potential) Right To Be Forgotten, Keltie Haley
Sharenting And The (Potential) Right To Be Forgotten, Keltie Haley
Indiana Law Journal
Part I of this Note serves as an evaluation of parental use of social media and
further seeks to draw attention to the social and developmental impact parental
oversharing can have on children. Part II examines the tension between parents’
constitutional rights to direct the upbringing of their children, as well as their First
Amendment interest in online expression, and their children’s interest in personal
data security and privacy. Part III provides an overview of the European Union’s
right to be forgotten framework in the sharenting context and considers the
plausibility of implementing such a framework in the United States. …
Privacy Dependencies, Solon Barocas, Karen Levy
Privacy Dependencies, Solon Barocas, Karen Levy
Washington Law Review
This Article offers a comprehensive survey of privacy dependencies—the many ways that our privacy depends on the decisions and disclosures of other people. What we do and what we say can reveal as much about others as it does about ourselves, even when we don’t realize it or when we think we’re sharing information about ourselves alone. We identify three bases upon which our privacy can depend: our social ties, our similarities to others, and our differences from others. In a tie-based dependency, an observer learns about one person by virtue of her social relationships with others—family, friends, or other …
Real You Meets Virtual You: It Is Time For Consumers To Regain Power Online, Neeka Hodaie
Real You Meets Virtual You: It Is Time For Consumers To Regain Power Online, Neeka Hodaie
Seattle Journal for Social Justice
No abstract provided.
The Limits And Possibilities Of Data-Driven Antitrafficking Efforts, Jennifer Musto Ph.D.
The Limits And Possibilities Of Data-Driven Antitrafficking Efforts, Jennifer Musto Ph.D.
Georgia State University Law Review
An examination of technology in the countertrafficking space reveals recurring tensions between law enforcement and rights-based approaches. It also illuminates assumptions, such as the one that posits more law enforcement-focused, nonstate-actor-supported data-driven efforts are necessary to securing justice for people in trafficking situations. However, a closer look at how technology is used and by whom also invites us to ask different questions and to leverage the power of our all-too-human creative potential in thinking about how to value and prioritize data ethics, transparency, and accountability in future countertrafficking work.
Smart Homes: The Next Fourth Amendment Frontier, Christina A. Robinson
Smart Homes: The Next Fourth Amendment Frontier, Christina A. Robinson
University of Miami Race & Social Justice Law Review
Under the third-party search doctrine, an individual does not have a reasonable expectation of privacy in information he or she voluntarily discloses to third parties. “Always on” in-home technology creates recordings of unsuspecting consumers in their most intimate spaces and sends them to third party companies and their affiliates, which makes this information subject to warrantless search by law enforcement under the third- search doctrine. The third-party search doctrine is ill-suited to the digital age, where consumers are routinely required to volunteer information to third parties in order to access digital content. This Note suggests that a warrant should be …
Criminalizing Asylum: Dna Testing Asylum Seekers Violates Privacy Rights, Scarlett L. Montenegro
Criminalizing Asylum: Dna Testing Asylum Seekers Violates Privacy Rights, Scarlett L. Montenegro
American University Journal of Gender, Social Policy & the Law
Introduction.
On June 16, 2015, President Trump announced his 2016 presidential campaign and claimed that Mexicans are criminals who “[h]ave lots of problems . . . they’re bringing drugs. They’re bringing crime. They’re rapists . . . It’s coming from all over . . . Latin America.” President Trump has publicly expressed his hostility towards immigrants by calling them “animals” and blaming them for drugs and gangs in the United States. While in office, President Trump tweeted that immigrants were invading the United States and suggested that “we must immediately, with no Judges or Court Cases, bring them back from …
Identity Manipulation: Responding To Advances In Artificial Intelligence And Robotics, Suzie Dunn
Identity Manipulation: Responding To Advances In Artificial Intelligence And Robotics, Suzie Dunn
Articles, Book Chapters, & Popular Press
Advances in artificial intelligence (AI) and robotics technologies have destabilized our ability to control our identity. Today, it is increasingly accessible for the average person to appropriate the voice, image, and body of another individual through the use of technology. Deepfake videos swap new faces into existing videos, facial re-enactment allows for the face of one person to be superimposed on the face of someone else in a real time video, artificial speech synthesis can clone another person’s voice, and 3D printing and modern robotics can reproduce life-size copies of living people. These are all examples of the ways technology …
Politics Of Adversarial Machine Learning, Kendra Albert, Jonathon Penney, Bruce Schneier, Ram Shankar Siva Kumar
Politics Of Adversarial Machine Learning, Kendra Albert, Jonathon Penney, Bruce Schneier, Ram Shankar Siva Kumar
Articles, Book Chapters, & Popular Press
In addition to their security properties, adversarial machine-learning attacks and defenses have political dimensions. They enable or foreclose certain options for both the subjects of the machine learning systems and for those who deploy them, creating risks for civil liberties and human rights. In this paper, we draw on insights from science and technology studies, anthropology, and human rights literature, to inform how defenses against adversarial attacks can be used to suppress dissent and limit attempts to investigate machine learning systems. To make this concrete, we use real-world examples of how attacks such as perturbation, model inversion, or membership inference …
United States V. Touset, Katelyn James
A New Frontier Facing Attorneys And Paralegals: The Promise & Challenges Of Artificial Intelligence As Applied To Law & Legal Decision-Making, Marissa Moran
Publications and Research
Artificial Intelligence/AI invisibly navigates and informs our lives today and may also be used to determine a client’s legal fate. Through executive order, statements by a U.S. Supreme Court justice and a Congressional Commission on AI, all three branches of the United States government have addressed the use of AI to resolve societal and legal matters. Pursuant to the American Bar Association Model Rules of Professional Conduct[i] and New York Rules of Professional Conduct (NYRPC), [ii] the legal profession recognizes the need for competency in technology which requires both substantive knowledge of law and competent use of technology for …
Saving America’S Privacy Rights: Why Carpenter V. United States Was Wrongly Decided And Why Courts Should Be Promoting Legislative Reform Rather Than Extending Existing Privacy Jurisprudence, David Stone
St. Mary's Law Journal
Privacy rights are under assault, but the Supreme Court’s judicial intervention into the issue, starting with Katz v. United States and leading to the Carpenter v. United States decision has created an inconsistent, piecemeal common law of privacy that forestalls a systematic public policy resolution by Congress and the states. In order to reach a satisfactory and longlasting resolution of the problem consistent with separation of powers principles, the states should consider a constitutional amendment that reduces the danger of pervasive technologyaided surveillance and monitoring, together with a series of statutes addressing each new issue posed by technological change as …
Zoning For Families, Sara C. Bronin
Zoning For Families, Sara C. Bronin
Indiana Law Journal
Is a group of eight unrelated adults and three children living together and sharing meals, household expenses, and responsibilities—and holding themselves out to the world to have long-term commitments to each other—a family? Not according to most zoning codes—including that of Hartford, Connecticut, where the preceding scenario presented itself a few years ago. Zoning, which is the local regulation of land use, almost always defines family, limiting those who may live in a dwelling unit to those who satisfy the zoning code’s definition. Often times, this definition is drafted in a way that excludes many modern living arrangements and preferences. …
Privative Copyright, Shyamkrishna Balganesh
Privative Copyright, Shyamkrishna Balganesh
All Faculty Scholarship
“Privative” copyright claims are infringement actions brought by authors for the unauthorized public dissemination of works that are private, unpublished, and revelatory of the author’s personal identity. Driven by considerations of authorial autonomy, dignity, and personality rather than monetary value, these claims are almost as old as Anglo-American copyright law itself. Yet modern thinking has attempted to undermine their place within copyright law and sought to move them into the domain of privacy law. This Article challenges the dominant view and argues that privative copyright claims form a legitimate part of the copyright landscape. It shows how privative copyright claims …
21st Century-Style Truth Decay: Deep Fakes And The Challenge For Privacy, Free Expression, And National Security, Robert Chesney, Danielle Keats Citron
21st Century-Style Truth Decay: Deep Fakes And The Challenge For Privacy, Free Expression, And National Security, Robert Chesney, Danielle Keats Citron
Maryland Law Review
No abstract provided.
Rights On Publicity As Remarkably Insignificant, R. George Wright
Rights On Publicity As Remarkably Insignificant, R. George Wright
Cleveland State Law Review
This Article introduces the right of publicity through a brief consideration of high-profile cases involving, respectively, Paris Hilton, human cannonball Hugo Zacchini, and the famous actress Olivia de Havilland. With this background understanding, the Article considers the supposed risks to freedom of speech posed by recognizing rights of publicity in a private party. From there, the Article addresses the nagging concern that the publicity rights cases promote a harmful "celebrification" of culture. Finally, the Article considers whether allowing for meaningful damage recoveries in publicity rights cases appropriately compensates victims in ways promoting the broad public interest.
Law School News: A Spring Break That Teaches - And Gives Back 03/11/2019, Edward Fitzpatrick
Law School News: A Spring Break That Teaches - And Gives Back 03/11/2019, Edward Fitzpatrick
Life of the Law School (1993- )
No abstract provided.
When A Tent Is Your Castle: Constitutional Protection Against Unreasonable Searches Of Makeshift Dwellings Of Unhoused Persons, Evanie Parr
Seattle University Law Review
This Note will argue that all jurisdictions should follow the Washington State Court of Appeals, Division II in validating makeshift dwellings used by people experiencing homelessness as spaces protected from unwarranted police intrusions by shifting evaluations of “reasonable expectations of privacy” to a more equitable standard that appreciates the realities of economic disparity. This approach to constitutional protections against unreasonable searches and seizures is imperative to protect the rights of people experiencing homelessness, given that such individuals are regularly subjected to invasions of privacy and heightened exposure to the criminal justice system.
Younger Generations Are Infected By Continuous Socialization To Accept Diminished Privacy: A Global Analysis Of How The United States' Constitutional Doctrine Is A Main Contributor To Eroded Privacy, Tiffany Kim
Indiana Journal of Global Legal Studies
Since the nineteenth century, privacy concerns have increased with the growth of technology. The invention of instantaneous photography, coupled with the enlarged presence of press, was met with concerns of degraded privacy. Society has formed expectations of privacy, but as time passes, those expectations continue to diminish. Younger generations have been socialized to accept lessened levels of privacy in this digitalized world of mass data and connectivity.
Individual privacy expectations vary globally. The construction of China's government and culture produces a lesser expectation of individual privacy than that of the United States. As outlined in the U.S. Constitution, U.S. citizens …
"You Have The Data"...The Writ Of Habeas Data And Other Data Protection Rights: Is The United States Falling Behind?, Sarah L. Lode
"You Have The Data"...The Writ Of Habeas Data And Other Data Protection Rights: Is The United States Falling Behind?, Sarah L. Lode
Indiana Law Journal
In Part I of this Note, I will discuss the writ of habeas data that has been developed primarily, but not exclusively, in Latin American countries. I will discuss the intricacies of the writ, how it evolved, and how it is applied today. Using Argentina as an example, I will discuss how the writ would be used by an Argentine citizen to protect her personal data. Part II summarizes the previously employed data protection scheme in the European Union, the Data Protection Directive (“the Directive”), and will also discuss the new EU data protection regulation, the General Data Protection Regulation …
Chapter: “Health Law And Ethics”, Allison K. Hoffman, I. Glenn Cohen, William M. Sage
Chapter: “Health Law And Ethics”, Allison K. Hoffman, I. Glenn Cohen, William M. Sage
All Faculty Scholarship
Law and ethics are both essential attributes of a high-functioning health care system and powerful explainers of why the existing system is so difficult to improve. U.S. health law is not seamless; rather, it derives from multiple sources and is based on various theories that may be in tension with one another. There are state laws and federal laws, laws setting standards and laws providing funding, laws reinforcing professional prerogatives, laws furthering social goals, and laws promoting market competition. Complying with law is important, but health professionals also should understand that the legal and ethical constraints under which health systems …
Revenge Porn, Thomas Lonardo, Tricia P. Martland, Rhode Island Bar Journal
Revenge Porn, Thomas Lonardo, Tricia P. Martland, Rhode Island Bar Journal
Life of the Law School (1993- )
No abstract provided.
20th Annual Open Government Summit: Access To Public Records Act And Open Meetings Act, 2018, Department Of Attorney General, State Of Rhode Island
20th Annual Open Government Summit: Access To Public Records Act And Open Meetings Act, 2018, Department Of Attorney General, State Of Rhode Island
School of Law Conferences, Lectures & Events
10
A Status Update For Texas Voir Dire: Advocating For Pre-Trial Internet Investigation Of Prospective Jurors, Luke A. Harle
A Status Update For Texas Voir Dire: Advocating For Pre-Trial Internet Investigation Of Prospective Jurors, Luke A. Harle
St. Mary's Law Journal
The Internet provides trial attorneys an additional tool to investigate the backgrounds of prospective jurors during voir dire. Online searches of a person’s name and social media accounts can reveal information that could be used as grounds for a challenge for cause or to facilitate intelligent use of peremptory strikes. Texas lawmakers have not yet provided any official guidance as to whether attorneys can investigate prospective jurors online or how they might do so, should it be allowed. Texas’s current voir dire structure, judicial opinions, and ethics opinions, together, support the notion that Texas trial attorneys should be given opportunities …
Big Brother Is Watching: When Should Georgia Get Involved In Issues Of Family Privacy To Protect Children’S Liberties?, Michelle Wilco
Big Brother Is Watching: When Should Georgia Get Involved In Issues Of Family Privacy To Protect Children’S Liberties?, Michelle Wilco
Georgia State University Law Review
Alecia Faith Pennington (Faith) did not officially exist until she was nineteen. Faith’s conservative, religious parents, Lisa and James, raised their nine children on the family farm just outside Kerrville, Texas, and kept their family as self-sufficient and separate from the rest of the world as possible.
The family was very insular; the parents home schooled all of the children, and the family rarely left their home, with the rare exception of going to church. Lisa and James also prohibited their children from using the Internet until they were eighteen, at which point they were only allowed limited access to …
Designing Without Privacy, Ari Ezra Waldman
Designing Without Privacy, Ari Ezra Waldman
Articles & Chapters
In Privacy on the Ground, the law and information scholars Kenneth Bamberger and Deirdre Mulligan showed that empowered chief privacy officers (CPOs) are pushing their companies to take consumer privacy seriously, integrating privacy into the designs of new technologies. But their work was just the beginning of a larger research agenda. CPOs may set policies at the top, but they alone cannot embed robust privacy norms into the corporate ethos, practice, and routine. As such, if we want the mobile apps, websites, robots, and smart devices we use to respect our privacy, we need to institutionalize privacy throughout the corporations …