Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Law and Society

Privacy

Institution
Publication Year
Publication
Publication Type
File Type

Articles 61 - 90 of 178

Full-Text Articles in Law

Are Privacy Laws Deficient?, Woodrow Hartzog Jan 2018

Are Privacy Laws Deficient?, Woodrow Hartzog

Faculty Scholarship

Privacy law around the world is deficient because it ignores design. Lawmakers have attempted to establish limits on the collection, use, and distribution of personal information. But they have largely overlooked the power of design. They have discounted the role that design plays in facilitating the conduct and harm privacy law is meant to prevent. Design pitches and picks privacy winners and losers, with people as data subjects and surveillance objects often on the losing side.


Why Courts Fail To Protect Privacy: Race, Age, Bias, And Technology, Christopher Robertson, Bernard Chao, Ian Farrell, Catherine Durso Jan 2018

Why Courts Fail To Protect Privacy: Race, Age, Bias, And Technology, Christopher Robertson, Bernard Chao, Ian Farrell, Catherine Durso

Faculty Scholarship

The Fourth Amendment protects against unreasonable “searches and seizures,” but in the digital age of stingray devices and IP tracking, what constitutes a search or seizure? The Supreme Court has held that the threshold question is supposed to depend on and reflect the “reasonable expectations” of ordinary members of the public concerning their own privacy. For example, the police now exploit the “third party” doctrine to access data held by email and cell phone providers, without securing a warrant, on the Supreme Court’s intuition that the public has no expectation of privacy in that information. Is that assumption correct? If …


Innovation And Tradition: A Survey Of Intellectual Property And Technology Legal Clinics, Cynthia L. Dahl, Victoria F. Phillips Jan 2018

Innovation And Tradition: A Survey Of Intellectual Property And Technology Legal Clinics, Cynthia L. Dahl, Victoria F. Phillips

All Faculty Scholarship

For artists, nonprofits, community organizations and small-business clients of limited means, securing intellectual property rights and getting counseling involving patent, copyright and trademark law are critical to their success and growth. These clients need expert IP and technology legal assistance, but very often cannot afford services in the legal marketplace. In addition, legal services and state bar pro bono programs have generally been ill-equipped to assist in these more specialized areas. An expanding community of IP and Technology clinics has emerged across the country to meet these needs. But while law review articles have described and examined other sectors of …


The Gdpr’S Version Of Algorithmic Accountability, Margot Kaminski Jan 2018

The Gdpr’S Version Of Algorithmic Accountability, Margot Kaminski

Publications

No abstract provided.


Criminal Employment Law, Benjamin Levin Jan 2018

Criminal Employment Law, Benjamin Levin

Scholarship@WashULaw

This Article diagnoses a phenomenon, “criminal employment law,” which exists at the nexus of employment law and the criminal justice system. Courts and legislatures discourage employers from hiring workers with criminal records and encourage employers to discipline workers for non-work-related criminal misconduct. In analyzing this phenomenon, my goals are threefold: (1) to examine how criminal employment law works; (2) to hypothesize why criminal employment law has proliferated; and (3) to assess what is wrong with criminal employment law. This Article examines the ways in which the laws that govern the workplace create incentives for employers not to hire individuals with …


Are Anti-Bullying Laws Effective?, Ari Ezra Waldman Jan 2018

Are Anti-Bullying Laws Effective?, Ari Ezra Waldman

Articles & Chapters

Since 2010, when several high profile bullying-related suicides brought bullying and cyberharassment into the national consciousness, all 50 states have passed laws that address bullying among the nation’s youth. This essay is the first in a series of three projects on federal, state, municipal, and individual school approaches to bullying. There are only 4 published studies on the relationships between law and bullying rates. This Essay adds several features to the discourse. It offers a comprehensive analysis of the contents of state anti-bullying laws, using a 16-item list of guidelines from the United States Department of Education as a frame. …


The Pro Bono Collaborative Project Spotlight: Rwu Law Street Law: Teaching Teens About The Law And Inspiring Future Lawyers 11-16-2017, Roger Williams University School Of Law Nov 2017

The Pro Bono Collaborative Project Spotlight: Rwu Law Street Law: Teaching Teens About The Law And Inspiring Future Lawyers 11-16-2017, Roger Williams University School Of Law

Pro Bono Collaborative Staff Publications

No abstract provided.


Blethen Maine Newspapers, Inc. V. State: Balancing The Public's Right To Know Against The Privacy Rights Of Victims Of Sexual Abuse, Kenleigh A. Nicoletta Nov 2017

Blethen Maine Newspapers, Inc. V. State: Balancing The Public's Right To Know Against The Privacy Rights Of Victims Of Sexual Abuse, Kenleigh A. Nicoletta

Maine Law Review

In Blethen Maine Newspapers, Inc. v. State, a sharply divided Maine Supreme Judicial Court, sitting as the Law Court, held that release of records relating to Attorney General G. Steven Rowe's investigation of alleged sexual abuse by Catholic priests was warranted under Maine's Freedom of Access Act (FOAA). Although such investigative records are designated confidential by statute, the majority held that the public's interest in the contents of the records mandated their disclosure after all information identifying persons other than the deceased priests had been redacted. The concurrence asserted that the majority had reached the correct conclusion, but in so …


Second Class For The Second Time: How The Commercial Speech Doctrine Stigmatizes Commercial Use Of Aggregated Public Records, Brian N. Larson, Genelle I. Belmas Oct 2017

Second Class For The Second Time: How The Commercial Speech Doctrine Stigmatizes Commercial Use Of Aggregated Public Records, Brian N. Larson, Genelle I. Belmas

Brian Larson

This Article argues that access to aggregated electronic public records for commercial use should receive protection under the First Amendment in the same measure as the speech acts the access supports. In other words, we view commercial access to aggregated public records as an essential means to valuable speech. For many, however, the taint of the commercial speech doctrine is turning all “information flows” into commercial ones. This, in turn, is threatening the access to government records.


Justice Blackmun And Individual Rights, Diane P. Wood Oct 2017

Justice Blackmun And Individual Rights, Diane P. Wood

Dickinson Law Review (2017-Present)

Of the many contributions Justice Blackmun has made to American jurisprudence, surely his record in the area of individual rights stands out for its importance. Throughout his career on the Supreme Court, he has displayed concern for a wide variety of individual and civil rights. He has rendered decisions on matters ranging from the most personal interests in autonomy and freedom from interference from government in life’s private realms, to the increasingly complex problems posed by discrimination based upon race, sex, national origin, alienage, illegitimacy, sexual orientation, and other characteristics. As his views have become well known to the public, …


Yershov V. Gannett: Rethinking The Vppa In The 21st Century, Ariel A. Pardee Sep 2017

Yershov V. Gannett: Rethinking The Vppa In The 21st Century, Ariel A. Pardee

Maine Law Review

Almost anyone with a smartphone can recall a time when an online advertisement followed them from webpage to webpage, or mobile browser to mobile application, or even jumped from a mobile device to a desktop web browser. While some people see it as a harmless—or even helpful—quirk of the online world, others find it creepy and intrusive. In the absence of significant government regulation of online advertising practices, particularly aggrieved individuals have sought relief in the courts by alleging violations of ill-fitting statutes drafted decades ago. This note explores just such a case, Yershov v. Gannett, in which the First …


19th Annual Open Government Summit: Access To Public Records Act & Open Meetings Act, 2017, Department Of Attorney General, State Of Rhode Island Jul 2017

19th Annual Open Government Summit: Access To Public Records Act & Open Meetings Act, 2017, Department Of Attorney General, State Of Rhode Island

School of Law Conferences, Lectures & Events

No abstract provided.


The Freedom From Sexploitation Agenda: Policy And Legislative Recommendations To Curb Sexual Exploitation, Dawn Hawkins Jul 2017

The Freedom From Sexploitation Agenda: Policy And Legislative Recommendations To Curb Sexual Exploitation, Dawn Hawkins

Dignity: A Journal of Analysis of Exploitation and Violence

No abstract provided.


Newroom: From The Bronx To Haiti: Asb 3-16-2017, Roger Williams University School Of Law Mar 2017

Newroom: From The Bronx To Haiti: Asb 3-16-2017, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


Privacy, Poverty, And Big Data: A Matrix Of Vulnerabilities For Poor Americans, Mary Madden, Michele E. Gilman, Karen Levy, Alice Marwick Jan 2017

Privacy, Poverty, And Big Data: A Matrix Of Vulnerabilities For Poor Americans, Mary Madden, Michele E. Gilman, Karen Levy, Alice Marwick

All Faculty Scholarship

This Article examines the matrix of vulnerabilities that low-income people face as a result of the collection and aggregation of big data and the application of predictive analytics. On one hand, big data systems could reverse growing economic inequality by expanding access to opportunities for low-income people. On the other hand, big data could widen economic gaps by making it possible to prey on low-income people or to exclude them from opportunities due to biases entrenched in algorithmic decision-making tools. New kinds of “networked privacy” harms, in which users are simultaneously held liable for their own behavior and the actions …


Trust: A Model For Disclosure In Patent Law, Ari Ezra Waldman Jan 2017

Trust: A Model For Disclosure In Patent Law, Ari Ezra Waldman

Articles & Chapters

How to draw the line between public and private is a foundational, first-principles question of privacy law, but the answer has implications for intellectual property, as well. This project is the first in a series of papers about first-person disclosures of information in the privacy and intellectual property law contexts, and it defines the boundary between public and non-public information through the lens of social science — namely, principles of trust.

Patent law’s “public use” bar confronts the question of whether legal protection should extend to information previously disclosed to a small group of people. I present evidence that shows …


Cybersecurity Stovepiping, David Thaw Jan 2017

Cybersecurity Stovepiping, David Thaw

Articles

Most readers of this Article probably have encountered – and been frustrated by – password complexity requirements. Such requirements have become a mainstream part of contemporary culture: "the more complex your password is, the more secure you are, right?" So the cybersecurity experts tell us… and policymakers have accepted this "expertise" and even adopted such requirements into law and regulation.

This Article asks two questions. First, do complex passwords actually achieve the goals many experts claim? Does using the password "Tr0ub4dor&3" or the passphrase "correcthorsebatterystaple" actually protect your account? Second, if not, then why did such requirements become so widespread? …


Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri Jan 2017

Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri

Articles

Much legal and technical scholarship discusses the differing views of the United States and European Union toward privacy concepts and regulation. A substantial amount of effort in recent years, in both research and policy, focuses on attempting to reconcile these viewpoints searching for a common framework with a common level of protection for citizens from both sides of Atlantic. Reconciliation, we argue, misunderstands the nature of the challenge facing effective cross-border data flows. No such reconciliation can occur without abdication of some sovereign authority of nations, that would require the adoption of an international agreement with typical tools of international …


Democratic Surveillance, Mary Anne Franks Jan 2017

Democratic Surveillance, Mary Anne Franks

Articles

No abstract provided.


The Impact Of Technological Developments On The Rules Of Attorney Ethics Regarding Attorney–Client Privilege, Confidentiality, And Social Media, Pamela A. Bresnahan, Lucian T. Pera Dec 2016

The Impact Of Technological Developments On The Rules Of Attorney Ethics Regarding Attorney–Client Privilege, Confidentiality, And Social Media, Pamela A. Bresnahan, Lucian T. Pera

St. Mary's Journal on Legal Malpractice & Ethics

This article focuses on the development of the law of ethics and technology. Emphasis is placed on how technological developments have affected the rules and means by which lawyers practice law and certain ethical pitfalls that have developed hand-in-hand with technological advancements. Topics examined include: (1) the ways by which electronic communication has increased the potential for the attorney–client privilege to be waived and the resulting impact on the present-day practice of law; (2) the effect of social media on lawyers’ ethical obligations, including counseling clients regarding the client’s use of social media and the lawyer’s own use of social …


Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen Dec 2016

Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen

All Faculty Scholarship

Big Data is the vast quantities of information amenable to large-scale collection, storage, and analysis. Using such data, companies and researchers can deploy complex algorithms and artificial intelligence technologies to reveal otherwise unascertained patterns, links, behaviors, trends, identities, and practical knowledge. The information that comprises Big Data arises from government and business practices, consumer transactions, and the digital applications sometimes referred to as the “Internet of Things.” Individuals invisibly contribute to Big Data whenever they live digital lifestyles or otherwise participate in the digital economy, such as when they shop with a credit card, get treated at a hospital, apply …


18th Annual Open Government Summit: Access To Public Records Act & Open Meetings Act, 2016, Department Of Attorney General, State Of Rhode Island Jul 2016

18th Annual Open Government Summit: Access To Public Records Act & Open Meetings Act, 2016, Department Of Attorney General, State Of Rhode Island

School of Law Conferences, Lectures & Events

No abstract provided.


13th Annual Diversity Symposium Dinner 04-07-2016, Roger Williams University School Of Law Apr 2016

13th Annual Diversity Symposium Dinner 04-07-2016, Roger Williams University School Of Law

School of Law Conferences, Lectures & Events

No abstract provided.


Commentary, Critical Legal Theory In Intellectual Property And Information Law Scholarship, Cardozo Arts & Entertainment Law Journal Spring Symposium, Sonia K. Katyal, Peter Goodrich Apr 2016

Commentary, Critical Legal Theory In Intellectual Property And Information Law Scholarship, Cardozo Arts & Entertainment Law Journal Spring Symposium, Sonia K. Katyal, Peter Goodrich

Sonia Katyal

The very definition and scope of CLS (critical legal studies) is itself subject to debate. Some scholars characterize CLS as scholarship that employs a particular methodology—more of a “means” than an “end.” On the other hand, some scholars contend that CLS scholarship demonstrates a collective commitment to a political end goal—an emancipation of sorts —through the identification of, and resistance to, exploitative power structures that are reinforced through law and legal institutions. After a brief golden age, CLS scholarship was infamously marginalized in legal academia and its sub-disciplines. But CLS themes now appear to be making a resurgence—at least in …


Unilateral Invasions Of Privacy, Roger Allan Ford Apr 2016

Unilateral Invasions Of Privacy, Roger Allan Ford

Notre Dame Law Review

Most people seem to agree that individuals have too little privacy, and most proposals to address that problem focus on ways to give those users more information about, and more control over, how information about them is used. Yet in nearly all cases, information subjects are not the parties who make decisions about how information is collected, used, and disseminated; instead, outsiders make unilateral decisions to collect, use, and disseminate information about others. These potential privacy invaders, acting without input from information subjects, are the parties to whom proposals to protect privacy must be directed. This Article develops a theory …


The History, Means, And Effects Of Structural Surveillance, Jeffrey L. Vagle Feb 2016

The History, Means, And Effects Of Structural Surveillance, Jeffrey L. Vagle

All Faculty Scholarship

The focus on the technology of surveillance, while important, has had the unfortunate side effect of obscuring the study of surveillance generally, and tends to minimize the exploration of other, less technical means of surveillance that are both ubiquitous and self-reinforcing—what I refer to as structural surveillance— and their effects on marginalized and disenfranchised populations. This Article proposes a theoretical framework for the study of structural surveillance which will act as a foundation for follow-on research in its effects on political participation.


Chilling Effects: Online Surveillance And Wikipedia Use, Jonathon Penney Jan 2016

Chilling Effects: Online Surveillance And Wikipedia Use, Jonathon Penney

Articles, Book Chapters, & Popular Press

This article discusses the results of the first empirical study providing evidence of regulatory “chilling effects” of Wikipedia users associated with online government surveillance. The study explores how traffic to Wikipedia articles on topics that raise privacy concerns for Wikipedia users decreased after the widespread publicity about NSA/PRISM surveillance revelations in June 2013. Using an interdisciplinary research design, the study tests the hypothesis, based on chilling effects theory, that traffic to privacy-sensitive Wikipedia articles reduced after the mass surveillance revelations. The Article finds not only a statistically significant immediate decline in traffic for these Wikipedia articles after June 2013, but …


Fourth Amendment Implications Of Police-Worn Body Cameras, Erik Nielsen Jan 2016

Fourth Amendment Implications Of Police-Worn Body Cameras, Erik Nielsen

St. Mary's Law Journal

Abstract forthcoming.


Riley V. California And The Beginning Of The End For The Third-Party Search Doctrine, David A. Harris Jan 2016

Riley V. California And The Beginning Of The End For The Third-Party Search Doctrine, David A. Harris

Articles

In Riley v. California, the Supreme Court decided that when police officers seize a smart phone, they may not search through its contents -- the data found by looking into the call records, calendars, pictures and so forth in the phone -- without a warrant. In the course of the decision, the Court said that the rule applied not just to data that was physically stored on the device, but also to data stored "in the cloud" -- in remote sites -- but accessed through the device. This piece of the decision may, at last, allow a re-examination of …


The Right To Be Forgotten: Comparing U.S. And European Approaches, Samuel W. Royston Jan 2016

The Right To Be Forgotten: Comparing U.S. And European Approaches, Samuel W. Royston

St. Mary's Law Journal

This Article compares the European and United States stances regarding the right to be forgotten. Within that context, this Article explores the implications of technological advances on constitutional rights, specifically the intersection of the right to free speech and the right to privacy, commonly referred to as the "right to be forgotten" paradox. In the United States, the trend is to favor free speech, while Europe places an emphasis on human rights. Each approach is analyzed based on supporting case law. The consequences of each approach on society, both long- and short-term, are also discussed. This Article argues that a …