Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 93

Full-Text Articles in Law

Coping With Coppa: Exploring Alternatives To The Children's Online Privacy Protection Act, Andrew Parra Jan 2024

Coping With Coppa: Exploring Alternatives To The Children's Online Privacy Protection Act, Andrew Parra

Indiana Journal of Law and Social Equality

The Children’s Online Privacy Protection Act of 1998 (COPPA) stands as one of the greatest protectors of children’s privacy for nearly twenty-five years. However, COPPA has struggled to keep pace with technological changes during this time, and the COVID-19 pandemic highlighted the shortcomings of COPPA regulations as children were forced to spend increased amounts of time in digital spaces. As the Federal Trade Commission (FTC) is set to make changes to COPPA, it is necessary to consider what changes would be most beneficial to protect children. This paper will explore the current regulatory framework, its strengths and weaknesses, and then …


The Trade Origins Of Privacy Law, Anupam Chander Jan 2024

The Trade Origins Of Privacy Law, Anupam Chander

Indiana Law Journal

The desire for trade propelled the growth of data privacy law across the world. Countries with strong privacy laws sought to ensure that their citizens’ privacy would not be compromised when their data traveled to other countries. Even before this vaunted Brussels Effect pushed privacy law across the world through the enticement of trade with the European Union, Brussels had to erect privacy law within the Union itself. And as the Union itself expanded, privacy law was a critical condition for accession.

But this coupling of privacy and trade leaves a puzzle: how did the U.S. avoid a comprehensive privacy …


The Rights Of Donor-Conceived Persons In Colorado: America's First Foray Into Abolishing Anonymous Gamete Donation, Madeline Ash Jan 2024

The Rights Of Donor-Conceived Persons In Colorado: America's First Foray Into Abolishing Anonymous Gamete Donation, Madeline Ash

Indiana Law Journal

On May 31, 2022, Colorado became the first state in the country to ban anonymous gamete (i.e., sperm and egg) donation through the enactment of the Donor- Conceived Persons and Families of Donor-Conceived Persons Protection Act. By 2043, donor-conceived Coloradans over the age of eighteen will gain access to the donor’s identifying information, such as the donor’s full name and permanent address, as well as their medical history. However, this newfound right to information also imposes heightened obligations on donor gamete agencies to obtain and track the data from their donors. Given the novelty of such legislation in the United …


Direct To Consumer Or Direct To All: Home Dna Tests And Lack Of Privacy Regulations In The United States, Karen J. Kukla Oct 2023

Direct To Consumer Or Direct To All: Home Dna Tests And Lack Of Privacy Regulations In The United States, Karen J. Kukla

IP Theory

Although the U.S. has some measures of privacy protection for genetic data, the lack of a comprehensive approach to protecting direct-to-consumer genetic testing results in privacy violations for both consumers and their relatives. This essay explores the critical need for the U.S. government to address these privacy violations and argues that the U.S. should approach the problem and strategize a solution similar to the European Union’s (EU) General Data Protection Regulation (GDPR). Part I identifies current United States law, both federal and state regulations that address DTC-GT and genetic privacy. Part II examines the lack of regulation surrounding current DTC-GT …


Encouraging Public Access To Pharmaceuticals Through Modified Protection Of Clinical Trial Data, Scott M. Nolan Ii Jul 2023

Encouraging Public Access To Pharmaceuticals Through Modified Protection Of Clinical Trial Data, Scott M. Nolan Ii

IP Theory

Part I of this Article investigates the development of pharmaceuticals and clinical trial data with a focus on patent and data protection. Part II evaluates the effects of protection and the challenges it poses to widespread public pharmaceutical access. Part III discusses two scholarly approaches to the public access issue that focus on clinical data protection and their associated challenges. In light of these scholarly works, Part IV suggests a new approach to clinical trial data protection that aims to improve public pharmaceutical access while maintaining the incentives to invent for drug developers.


Guilty Of Probable Cause: Public Arrest Records And Dignity In The Information Age, Nicholas Thompson Jan 2023

Guilty Of Probable Cause: Public Arrest Records And Dignity In The Information Age, Nicholas Thompson

Indiana Journal of Global Legal Studies

The United States is exceptional among Western nations in its treatment of criminal records. Today, an estimated one-third of Americans1 bear the “modern equivalent of branding”: the publicly-accessible criminal record.2 Far from remaining locked in digital limbo, these records serve a variety of purposes, from legitimate law enforcement use to extortion against arrestees seeking to scrub their mugshots from a Google search.3 It would be natural to assume that such records result from an individual’s commission of a crime, for which the individual is duly convicted and then marked with the brand of the state for the transgression. But the …


Layered Fiduciaries In The Information Age, Zhaoyi Li Jan 2023

Layered Fiduciaries In The Information Age, Zhaoyi Li

Indiana Law Journal

Technology companies such as Facebook have long been criticized for abusing customers’ personal information and monetizing user data in a manner contrary to customer expectations. Some commentators suggest fiduciary law could be used to restrict how these companies use their customers’ data.1 Under this framework, a new member of the fiduciary family called the “information fiduciary” was born. The concept of an information fiduciary is that a company providing network services to “collect, analyze, use, sell, and distribute personal information” owes customers and end-users a fiduciary duty to use the collected data to promote their interests, thereby assuming fiduciary liability …


Big Data, Big Gap: Working Towards A Hipaa Framework That Covers Big Data, Ryan Mueller Oct 2022

Big Data, Big Gap: Working Towards A Hipaa Framework That Covers Big Data, Ryan Mueller

Indiana Law Journal

One lasting impact of the Health Insurance Portability and Accountability Act (HIPAA) is the privacy protections it provides for our sensitive health information. In the era of Big Data, however, much of our health information exists outside the traditional doctor-patient dynamic. From wearable technology, to mobile applications, to social media and internet browsing, Big Data organizations collect swaths of data that shed light on sensitive health information. Big Data organizations largely fall outside of HIPAA’s current framework because of the stringent requirements for when the HIPAA protections apply, namely that the data must be held by a covered entity, and …


2l Brian Hills Honored With Iapp Annual Westin Scholar Award, James Owsley Boyd Apr 2022

2l Brian Hills Honored With Iapp Annual Westin Scholar Award, James Owsley Boyd

Keep Up With the Latest News from the Law School (blog)

No abstract provided.


The Law Of Employee Data: Privacy, Property, Governance, Matthew T. Bodie Apr 2022

The Law Of Employee Data: Privacy, Property, Governance, Matthew T. Bodie

Indiana Law Journal

The availability of data related to the employment relationship has ballooned into an unruly mass of performance metrics, personal characteristics, biometric recordings, and creative output. The law governing this collection of information has been awkwardly split between privacy regulations and intellectual property rights, with employees generally losing on both ends. This Article rejects a binary approach that either carves out private spaces ineffectually or renders data into isolated pieces of ownership. Instead, the law should implement a hybrid system that provides workers with continuing input and control without blocking efforts at joint production. In addition, employers should have fiduciary responsibilities …


Illusory Privacy, Thomas Haley Jan 2022

Illusory Privacy, Thomas Haley

Indiana Law Journal

For decades, regulators, consumer advocates, and privacy theorists have grappled with one of privacy’s most important questions: how to protect private information that consumers unwittingly give away with the click of an “I accept” button. Reform efforts remain mired in a morass of text, focusing on the increasing volume and complexity of firms’ terms of service and privacy policies. This Article moves beyond such existing approaches. By analyzing terms of service and privacy policies from hundreds of top websites—which this Article calls “platform terms”—this Article demonstrates that the prevailing “notice and consent” paradigm of privacy regulation cannot provide meaningful protection. …


Escaping Circularity: The Fourth Amendment And Property Law, João Marinotti Jan 2022

Escaping Circularity: The Fourth Amendment And Property Law, João Marinotti

Articles by Maurer Faculty

The Supreme Court’s “reasonable expectation of privacy” test under the Fourth Amendment has often been criticized as circular, and hence subjective and unpredictable. The Court is presumed to base its decisions on society’s expectations of privacy, while society’s expectations of privacy are themselves presumed to be based on the Court’s judgements. As a solution to this problem, property law has been repeatedly propounded as an allegedly independent, autonomous area of law from which the Supreme Court can glean reasonable expectations of privacy without falling back into tautological reasoning.

Such an approach presupposes that property law is not itself circular. If …


The Oslo Accords: A Modern-Day Story Of Occupation Told Through Violations Of The Right To Freedom Of Privacy, Catherine Demetrovich Jan 2022

The Oslo Accords: A Modern-Day Story Of Occupation Told Through Violations Of The Right To Freedom Of Privacy, Catherine Demetrovich

Indiana Law Journal

The Israeli-Palestinian conflict began in the early 1900s when the disputed land, what is now the West Bank and the Gaza Strip, fell under British rule. After the Six- Day War in 1967, Israel took control of the West Bank, Golan Heights, and the Gaza Strip. Since then, tensions between Israel and Palestine have continued to grow. This Note explores a modern-day occupation question: Israel’s control over Palestine’s information and communication technology (ICT) sector. Along with privacy and human rights violations, Israel’s control is in direct violation of the Oslo Accords— guaranteeing Palestinians limited self-governance in Gaza and the West …


The Reasonable Intelligence Agency, Asaf Lubin Jan 2022

The Reasonable Intelligence Agency, Asaf Lubin

Articles by Maurer Faculty

Article 57(2) of the First Additional Protocol to the Geneva Conventions requires parties to an armed conflict to “do everything feasible to verify” their objects of attack and take “all precautions” to minimize civilian casualties and unintentional damage to civilian property. This obligation has been interpreted in international law to require state parties to set up an “effective intelligence gathering system” that would properly identify targets using all technical means at the disposal of the combating forces.

But existing law has failed to define what “effective intelligence” looks like. Quite the opposite. Modern history is filled with examples of intelligence …


How The World's Largest Economies Regulate Data Privacy: Drawbacks, Benefits, & Proposed Solutions, Alexander J. Pantos Aug 2021

How The World's Largest Economies Regulate Data Privacy: Drawbacks, Benefits, & Proposed Solutions, Alexander J. Pantos

Indiana Journal of Global Legal Studies

National data privacy regimes are quickly gaining traction and ubiquity around the globe. Moving forward, countries will face a range of difficult decisions surrounding how best to engage internationally in cross border data flow, particularly in the context of personal information (PI).

This article takes a bird's-eye view of the current state of data privacy regimes in the world's four highest GDP regions. In part, this article hopes to provide a succinct analysis of these data privacy regimes, with a focus on the balance they strike between granting individuals rights in their data and placing responsibilities on businesses that deal …


Privacy Vs. Transparency: Handling Protected Materials In Agency Rulemaking, Christopher S. Yoo, Kellen Mccoy Jul 2021

Privacy Vs. Transparency: Handling Protected Materials In Agency Rulemaking, Christopher S. Yoo, Kellen Mccoy

Indiana Law Journal

Agencies conducting informal rulemaking proceedings increasingly confront conflicting duties with respect to protected materials included in information submitted in public rulemaking dockets. They must reconcile the broad commitment to openness and transparency reflected in federal law with the duty to protect confidential business information (CBI) and personally identifiable information (PII) against improper disclosure.

This Article presents an analysis of how agencies can best balance these often countervailing considerations. Part I explores the statutory duties to disclose and withhold information submitted in public rulemaking dockets placed on agencies. It also examines judicial decisions and other legal interpretations regarding the proper way …


What's The Harm? Federalism, The Separation Of Powers, And Standing In Data Breach Litigation, Grayson Wells Apr 2021

What's The Harm? Federalism, The Separation Of Powers, And Standing In Data Breach Litigation, Grayson Wells

Indiana Law Journal

This Comment will argue that the Supreme Court should analyze standing in data breach litigation under a standard that is deferential to state statutory and common law. Specifically, federal standing analysis should look to state law when determining whether an injury is concrete such that the injury-in-fact requirement is met. Some argue that allowing more data breach cases to proceed to the merits could lead to an explosion of successful litigation and settlements, burdening the federal courts and causing economic losses for the breached businesses. These concerns may be valid. But if state law provides a remedy to the harm …


Second Thoughts On Fda's Covid-Era Mental Health App Policy, Michael Mattioli Jan 2021

Second Thoughts On Fda's Covid-Era Mental Health App Policy, Michael Mattioli

Articles by Maurer Faculty

As the coronavirus pandemic swept across the globe in April 2020, the US Food and Drug Administration (FDA) made an unusual decision. The agency announced that it would relax its enforcement of compliance rules for “digital therapeutics”—smartphone apps designed to address mental health disorders. The measure was a response to widely reported upticks in symptoms of anxiety, depression, and substance abuse brought on by the pandemic. As an added benefit, the agency explained, digital therapeutics could promote social distancing by removing patients’ need to visit health care providers.

This essay explores the possible lasting effects of the FDA’s temporary suspension …


Maximizing The Value Of America’S Newest Resource, Low- Altitude Airspace: An Economic Analysis Of Aerial Trespass And Drones, Tyler Watson Oct 2020

Maximizing The Value Of America’S Newest Resource, Low- Altitude Airspace: An Economic Analysis Of Aerial Trespass And Drones, Tyler Watson

Indiana Law Journal

Recognizing that tort law is a unique area of law that was judicially created by rational human beings with an innate sense of economic justice, this Note seeks to apply positive economic theory—derived from ex post analyses of tort cases—to an ex ante analysis to predict how and to what extent the existing and proposed aerial trespass rules will further economic efficiency in the context of drones and airspace rights. Part I will provide (1) an overview of the Federal Aviation Administration’s (FAA) current regulatory framework and the development of the common law aerial trespass doctrine and (2) an overview …


The Fourth Amendment At Home, Thomas P. Crocker Oct 2020

The Fourth Amendment At Home, Thomas P. Crocker

Indiana Law Journal

A refuge, a domain of personal privacy, and the seat of familial life, the home holds a special place in Fourth Amendment jurisprudence. Supreme Court opinions are replete with statements affirming the special status of the home. Fourth Amendment text places special emphasis on securing protections for the home in addition to persons, papers, and effects against unwarranted government intrusion. Beyond the Fourth Amendment, the home has a unique place within constitutional structure. The home receives privacy protections in addition to sheltering other constitutional values protected by the Due Process Clause and the First Amendment. For example, under the Due …


Sharenting And The (Potential) Right To Be Forgotten, Keltie Haley Jul 2020

Sharenting And The (Potential) Right To Be Forgotten, Keltie Haley

Indiana Law Journal

Part I of this Note serves as an evaluation of parental use of social media and

further seeks to draw attention to the social and developmental impact parental

oversharing can have on children. Part II examines the tension between parents’

constitutional rights to direct the upbringing of their children, as well as their First

Amendment interest in online expression, and their children’s interest in personal

data security and privacy. Part III provides an overview of the European Union’s

right to be forgotten framework in the sharenting context and considers the

plausibility of implementing such a framework in the United States. …


Teaching Information Privacy Law, Joseph A. Tomain Jul 2020

Teaching Information Privacy Law, Joseph A. Tomain

Articles by Maurer Faculty

Teaching information privacy law is exciting and challenging because of the fast pace of technological and legal development and because "information privacy law" sprawls across a vast array of disparate areas of substantive law that do not automatically connect. This Essay provides one approach to teaching this fascinating, doctrinally diverse, and rapidly moving area of law. Through the framework of ten key course themes, this pedagogical approach seeks to help students find a common thread that connects these various areas of law into a cohesive whole. This framework provides a way to think about not only privacy law, but also …


Revenge Porn And The Aclu’S Inconsistent Approach, Elena Lentz Jan 2020

Revenge Porn And The Aclu’S Inconsistent Approach, Elena Lentz

Indiana Journal of Law and Social Equality

No abstract provided.


Examining The Anomalies, Explaining The Value: Should The Usa Freedom Act’S Metadata Program Be Extended?, Susan Landau, Asaf Lubin Jan 2020

Examining The Anomalies, Explaining The Value: Should The Usa Freedom Act’S Metadata Program Be Extended?, Susan Landau, Asaf Lubin

Articles by Maurer Faculty

Edward Snowden’s disclosure of National Security Agency (“NSA”) bulk collection of communications metadata was a highly disturbing shock to the American public. The intelligence community was surprised by the response, as it had largely not anticipated a strong negative public reaction to this surveillance program. Controversy over the bulk metadata collection led to the 2015 passage of the USA FREEDOM Act. The law mandated that the intelligence community would collect the Call Detail Records (“CDR”) from telephone service providers in strictly limited ways, not in bulk, and only under order from the Foreign Intelligence Surveillance Court. The new program initially …


Zoning For Families, Sara C. Bronin Jan 2020

Zoning For Families, Sara C. Bronin

Indiana Law Journal

Is a group of eight unrelated adults and three children living together and sharing meals, household expenses, and responsibilities—and holding themselves out to the world to have long-term commitments to each other—a family? Not according to most zoning codes—including that of Hartford, Connecticut, where the preceding scenario presented itself a few years ago. Zoning, which is the local regulation of land use, almost always defines family, limiting those who may live in a dwelling unit to those who satisfy the zoning code’s definition. Often times, this definition is drafted in a way that excludes many modern living arrangements and preferences. …


Boilerplate Indignity, Erik Encarnacion Oct 2019

Boilerplate Indignity, Erik Encarnacion

Indiana Law Journal

Commentators have long tried to sound the alarm about boilerplate contracts, pointing out threats ranging from the loss of privacy rights to the erosion of public law and democratic self-governance. This Article argues that this list of concerns misses something important: that imposing certain boilerplate terms on individuals is incompatible with their dignity. After explaining and defending the conception of dignity presupposed here, this Article shows how boilerplate accountability waivers—like arbitration clauses—prevent people from accessing the distinctive dignity-vindicating role of courts and degrade their status as legal persons. And because governments may legitimately protect dignity interests, proposed reforms like the …


The Federalism Challenges Of Protecting Medical Privacy In Workers' Compensation, Ani B. Satz Oct 2019

The Federalism Challenges Of Protecting Medical Privacy In Workers' Compensation, Ani B. Satz

Indiana Law Journal

Under current law, injured workers face a Hobson’s choice: They may file for workers’ compensation or maintain their medical privacy. The reason for this is that § 164.512(l) of the Health Insurance Portability and Accountability Act’s Privacy Rule (HPR) is widely misinterpreted by courts and legislatures as a wholesale waiver of privacy protections for injured workers. Section 164.512(l) excludes workers’ compensation from federal privacy protections that may frustrate the efficient administration of workers’ compensation claims. As the history and intent behind the HPR indicate, § 164.512(l) is premised on the assumption that states will protect workers’ privacy by creating and …


Drone Invasion: Unmanned Aerial Vehicles And The Right To Privacy, Rebecca L. Scharf Jul 2019

Drone Invasion: Unmanned Aerial Vehicles And The Right To Privacy, Rebecca L. Scharf

Indiana Law Journal

Since the birth of the concept of a legally recognized right to privacy in Samuel D. Warren and Louis D. Brandeis’ influential 1890 law review article, “The Right to Privacy,” common law—with the aid of influential scholars—has massaged the concept of privacy torts into actionable claims. But now, one of the most innovative technological advancements in recent years, the unmanned aerial vehicle, or drone, has created difficult challenges for plaintiffs and courts navigating common law privacy tort claims.

This Article explores the challenges of prosecution of the specific privacy tort of intrusion upon seclusion involving nongovernmental use of drone technology. …


Privacy Remedies, Lauren H. Scholz Apr 2019

Privacy Remedies, Lauren H. Scholz

Indiana Law Journal

When consumers sue companies for privacy-intrusive practices, they are often unsuccessful. Many cases fail in federal court at the motion to dismiss phase because the plaintiff has not shown the privacy infringement has caused her concrete harm. This is a symptom of a broader issue: the failure of courts and commentators to describe the relationship between privacy rights and privacy remedies.

This Article contends that restitution is the normal measure of privacy remedies. Restitution measures relief by economic gain to the defendant. If a plaintiff can show the likely ability to recover in restitution, that should be sufficient to pass …


Younger Generations Are Infected By Continuous Socialization To Accept Diminished Privacy: A Global Analysis Of How The United States' Constitutional Doctrine Is A Main Contributor To Eroded Privacy, Tiffany Kim Feb 2019

Younger Generations Are Infected By Continuous Socialization To Accept Diminished Privacy: A Global Analysis Of How The United States' Constitutional Doctrine Is A Main Contributor To Eroded Privacy, Tiffany Kim

Indiana Journal of Global Legal Studies

Since the nineteenth century, privacy concerns have increased with the growth of technology. The invention of instantaneous photography, coupled with the enlarged presence of press, was met with concerns of degraded privacy. Society has formed expectations of privacy, but as time passes, those expectations continue to diminish. Younger generations have been socialized to accept lessened levels of privacy in this digitalized world of mass data and connectivity.

Individual privacy expectations vary globally. The construction of China's government and culture produces a lesser expectation of individual privacy than that of the United States. As outlined in the U.S. Constitution, U.S. citizens …