Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
- Publication Type
Articles 1 - 11 of 11
Full-Text Articles in Law
Newsroom: Logan On Drone Law, Roger Williams University School Of Law
Newsroom: Logan On Drone Law, Roger Williams University School Of Law
Life of the Law School (1993- )
No abstract provided.
Cybersecurity And Law Enforcement: The Cutting Edge : Symposium, Roger Williams University School Of Law
Cybersecurity And Law Enforcement: The Cutting Edge : Symposium, Roger Williams University School Of Law
School of Law Conferences, Lectures & Events
No abstract provided.
Spying Inc., Danielle K. Citron
Spying Inc., Danielle K. Citron
Faculty Scholarship
The latest spying craze is the “stalking app.” Once installed on someone’s cell phone, the stalking app provides continuous access to the person’s calls, texts, snap chats, photos, calendar updates, and movements. Domestic abusers and stalkers frequently turn to stalking apps because they are undetectable even to sophisticated phone owners.
Business is booming for stalking app providers, even though their entire enterprise is arguably illegal. Federal and state wiretapping laws ban the manufacture, sale, or advertisement of devices knowing their design makes them primarily useful for the surreptitious interception of electronic communications. But those laws are rarely, if ever, enforced. …
Secondary Data: A Primary Concern, Kelsey L. Zottnick
Secondary Data: A Primary Concern, Kelsey L. Zottnick
Vanderbilt Journal of Entertainment & Technology Law
This Note addresses privacy concerns implicated by rising secondary data mining. Secondary data mining is the use of personal information for a purpose other than the original. This complex technology drives billions of dollars in commercial industry yet remains largely unregulated. This Note examines the current state of the data mining industry and the behavioral fallacies that belie societal concerns about online privacy. Further, relevant federal, state, and constitutional laws appear outstripped by these technological advances. An analysis of potential privacy solutions examines the advantages and disadvantages of implementing each one through the privacy community, the federal government, and the …
Corporate Avatars And The Erosion Of The Populist Fourth Amendment, Avidan Cover
Corporate Avatars And The Erosion Of The Populist Fourth Amendment, Avidan Cover
Faculty Publications
The current state of Fourth Amendment jurisprudence leaves it to technology corporations to challenge court orders, subpoenas, and requests by the government for individual users’ information. The third-party doctrine denies people a reasonable expectation of privacy in data they transmit through telecommunications and Internet service providers. Third-party corporations become, by default, the people’s corporate avatars. Corporate avatars, however, do a poor job of representing individuals’ interests. Moreover, vesting the Fourth Amendment’s government-oversight functions in corporations fails to cohere with the Bill of Rights’ populist history and the Framers’ distrust of corporations.
This article examines how the third-party doctrine proves unsupportable …
Robots In The Home: What Will We Have Agreed To?, Margot E. Kaminski
Robots In The Home: What Will We Have Agreed To?, Margot E. Kaminski
Publications
A new technology can expose the cracks in legal doctrine. Sometimes a technology resists analogy. Sometimes, through analogies, it reveals inconsistencies in the law, or basic flaws in framing, or in the fit between different parts of the legal system. This Essay addresses robots in the home, and what they reveal about U.S. privacy law. Household robots might not themselves uproot U.S. privacy law, but they will reveal its inconsistencies, and show where it is most likely to fracture. Just as drones are serving as a legislative “privacy catalyst” — encouraging the enactment of new privacy laws as people realize …
State Labs Of Federalism And Law Enforcement 'Drone' Use, Chris Jenks
State Labs Of Federalism And Law Enforcement 'Drone' Use, Chris Jenks
Faculty Journal Articles and Book Chapters
This article reviews and assesses current state legislation regulating law enforcement use of unmanned aerial systems (UAS). The legislation runs the gamut of permissive to restrictive and even utilizes different terms for the same object of regulation, UAS. These laws are the confused and at times even contradictory extension of societal views about UAS. The article reviews the U.S. Supreme Court’s manned aircraft trilogy of cases, California v. Ciraolo, Florida v. Riley, and Dow Chemical v. U.S. and two significant technology based decisions, Kyllo v. U.S. and U.S. v. Jones, and applies them to current state efforts to regulate law …
From Anonymity To Identification, A. Michael Froomkin
From Anonymity To Identification, A. Michael Froomkin
Articles
This article examines whether anonymity online has a future. In the early days of the Internet, strong cryptography, anonymous remailers, and a relative lack of surveillance created an environment conducive to anonymous communication. Today, the outlook for online anonymity is poor. Several forces combine against it: ideologies that hold that anonymity is dangerous, or that identifying evil-doers is more important than ensuring a safe mechanism for unpopular speech; the profitability of identification in commerce; government surveillance; the influence of intellectual property interests and in requiring hardware and other tools that enforce identification; and the law at both national and supranational …
Digital Laws Evolve, Neil M. Richards
Digital Laws Evolve, Neil M. Richards
Scholarship@WashULaw
The essay from Wired Magazine (UK)'s special volume, "The Wired World in 2015," argues that although digital laws have lagged behind technological advances, they are starting to catch up, and this trend will continue in 2015. When it comes to privacy and technology, the law is catching up all over the world.
Taxation And Surveillance: An Agenda, Michael Hatfield
Taxation And Surveillance: An Agenda, Michael Hatfield
Articles
Among government agencies, the IRS likely has the surest legal claim to the most information about the most Americans: their hobbies, religious affiliations, reading activities, travel, and medical information are all potentially tax relevant. Privacy scholars have studied the arrival of Big Data, the internet-of-things, and the cooperation of private companies with the government in surveillance, but neither privacy nor tax scholars have considered how these technological advances should impact the U.S. tax system. As government agencies and private companies increasingly pursue what has been described as the “growing gush of data,” the use of these technologies in tax administration …
Digital Peepholes | Remote Activation Of Webcams: Technology, Law And Policy, Lori Andrews
Digital Peepholes | Remote Activation Of Webcams: Technology, Law And Policy, Lori Andrews
Lori B. Andrews