Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Privacy Law

University of Michigan Law School

Articles 1 - 30 of 168

Full-Text Articles in Law

Aerial Trespass And The Fourth Amendment, Randall F. Khalil May 2023

Aerial Trespass And The Fourth Amendment, Randall F. Khalil

Michigan Law Review

Since 1973, courts have analyzed aerial surveillance under the Fourth Amendment by applying the test from Katz v. United States, which states that a search triggers the Fourth Amendment when a government actor violates a person’s “reasonable expectation of privacy.” The Supreme Court applied Katz to aerial surveillance three times throughout the 1980s, yet this area of the law remains unsettled and outcomes are unpredictable. In 2012, the Supreme Court recognized an alternative to the Katz test in Jones v. United States, which held that a search triggers the Fourth Amendment when a government actor physically intrudes into …


Giving The Fourth Amendment Meaning: Creating An Adversarial Warrant Proceeding To Protect From Unreasonable Searches And Seizures, Ben Mordechai-Strongin Apr 2023

Giving The Fourth Amendment Meaning: Creating An Adversarial Warrant Proceeding To Protect From Unreasonable Searches And Seizures, Ben Mordechai-Strongin

University of Michigan Journal of Law Reform

For at least the past 40 years, police and prosecutors have had free reign in conducting illegal searches and seizures nominally barred by the Fourth Amendment. The breadth of exceptions to the warrant requirement, the lax interpretation of probable cause, and especially the “good faith” doctrine announced in U.S. v. Leon have led to severe violations of privacy rights, trauma to those wrongly searched or seized, and a court system overburdened by police misconduct cases. Most scholars analyzing the issue agree that the rights guaranteed by the Fourth Amendment—to be free from unreasonable search and seizure—have been severely eroded or …


Unprecedented Precedent And Original Originalism: How The Supreme Court’S Decision In Dobbs Threatens Privacy And Free Speech Rights, Leonard Niehoff Jan 2023

Unprecedented Precedent And Original Originalism: How The Supreme Court’S Decision In Dobbs Threatens Privacy And Free Speech Rights, Leonard Niehoff

Articles

The U.S. Supreme Court’s decision in Dobbs v. Jackson Women’s Health Organization has drawn considerable attention because of its reversal of Roe v. Wade and its rejection of a woman’s constitutional right to terminate her pregnancy. The Dobbs majority, and some of the concurring opinions, emphasized that the ruling was a narrow one. Nevertheless, there are reasons to think the influence of Dobbs may extend far beyond the specific constitutional issue the case addresses.

This article explains why Dobbs could have significant and unanticipated implications for the law of privacy and the law of free expression. I argue that two …


Remarks, Andrea Dennis Jun 2022

Remarks, Andrea Dennis

University of Michigan Journal of Law Reform

Over the course of one week, the Michigan Journal of Law Reform presented its annual Symposium, this year titled Reimagining Police Surveillance: Protecting Activism and Ending Technologies of Oppression. During this week, the Journal explored complicated questions surrounding the expansion of police surveillance technologies, including how police and federal agencies utilize their extensive resources to identify and surveil public protest, the ways in which technology employed by police is often flawed and disparately impacts people of color, and potential reforms of police surveillance technology. Before delving into these complicated questions, I presented remarks on the history of police surveillance …


Suspect Development Systems: Databasing Marginality And Enforcing Discipline, Rashida Richardson, Amba Kak Jun 2022

Suspect Development Systems: Databasing Marginality And Enforcing Discipline, Rashida Richardson, Amba Kak

University of Michigan Journal of Law Reform

Algorithmic accountability law—focused on the regulation of data-driven systems like artificial intelligence (AI) or automated decision-making (ADM) tools—is the subject of lively policy debates, heated advocacy, and mainstream media attention. Concerns have moved beyond data protection and individual due process to encompass a broader range of group-level harms such as discrimination and modes of democratic participation. While a welcome and long overdue shift, the current discourse ignores systems like databases, which are viewed as technically “rudimentary” and often siloed from regulatory scrutiny and public attention. Additionally, burgeoning regulatory proposals like algorithmic impact assessments are not structured to surface important –yet …


Fighting Global Surveillance: Lessons From The American Muslim Community, Danna Z. Elmasry Jun 2022

Fighting Global Surveillance: Lessons From The American Muslim Community, Danna Z. Elmasry

University of Michigan Journal of Law Reform

The United States government has been spying on its citizens through a massive surveillance infrastructure that is unrestricted to a particular target or suspicion of wrongdoing. The statutory and regulatory authorities responsible for this infrastructure are sprawling and often secret. Built-in limitations and oversight mechanisms are riddled with loopholes or inaccessible due to exceedingly high thresholds. Litigation challenges to surveillance overreach often fail at standing. Under the current doctrine, plaintiffs must show that their own communications have been surveilled by a specific surveillance program. This Note contributes to surveillance reform by proposing a private right of action that sets the …


“Bang!”: Shotspotter Gunshot Detection Technology, Predictive Policing, And Measuring Terry’S Reach, Harvey Gee Jun 2022

“Bang!”: Shotspotter Gunshot Detection Technology, Predictive Policing, And Measuring Terry’S Reach, Harvey Gee

University of Michigan Journal of Law Reform

ShotSpotter technology is a rapid identification and response system used in ninety American cities that is designed to detect gunshots and dispatch police. ShotSpotter is one of many powerful surveillance tools used by local police departments to purportedly help fight crime, but they often do so at the expense of infringing upon privacy rights and civil liberties. This Article expands the conversation about ShotSpotter technology considerably by examining the adjacent Fourth Amendment issues emanating from its use. For example, law enforcement increasingly relies on ShotSpotter to create reasonable suspicion where it does not exist. In practice, the use of ShotSpotter …


Mental Health Mobile Apps And The Need To Update Federal Regulations To Protect Users, Kewa Jiang Apr 2022

Mental Health Mobile Apps And The Need To Update Federal Regulations To Protect Users, Kewa Jiang

Michigan Technology Law Review

With greater societal emphasis on the need for better mental health services coupled with COVID-19 limits, mental health mobile applications have significantly risen in variety, availability, and accessibility. As more consumers use mental health mobile applications, more data is generated and collected by mobile application companies. However, consumers may have the false assumption that the data collected is protected under HIPAA or have an expectation of privacy protection higher than current regulations afford. This Note examines HIPAA, Health Breach Notification Rule, and section 5 of the Federal Trade Commission Act, as well as how these regulations fall short of protecting …


Another Katz Moment?: Privacy, Property, And A Dna Database, Claire Mena Apr 2022

Another Katz Moment?: Privacy, Property, And A Dna Database, Claire Mena

University of Michigan Journal of Law Reform

The Fourth Amendment protects the “right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures.” The understanding of these words seems to shift as new technologies emerge. As law enforcement’s arsenal of surveillance techniques has grown to include GPS tracking, cell phones, and cell site location information (CSLI), the Supreme Court has applied Fourth Amendment protections to these modern tools. Law enforcement continues to use one pervasive surveillance technique without limitations: the routine collection of DNA. In 2013, the Supreme Court in Maryland v. King held that law enforcement may routinely …


Unfair Collection: Reclaiming Control Of Publicly Available Personal Information From Data Scrapers, Andrew M. Parks Mar 2022

Unfair Collection: Reclaiming Control Of Publicly Available Personal Information From Data Scrapers, Andrew M. Parks

Michigan Law Review

Rising enthusiasm for consumer data protection in the United States has resulted in several states advancing legislation to protect the privacy of their residents’ personal information. But even the newly enacted California Privacy Rights Act (CPRA)—the most comprehensive data privacy law in the country— leaves a wide-open gap for internet data scrapers to extract, share, and monetize consumers’ personal information while circumventing regulation. Allowing scrapers to evade privacy regulations comes with potentially disastrous consequences for individuals and society at large.

This Note argues that even publicly available personal information should be protected from bulk collection and misappropriation by data scrapers. …


Privacy Frameworks For Smart Cities, Lindsey Tonsager, Jayne Ponder Jan 2022

Privacy Frameworks For Smart Cities, Lindsey Tonsager, Jayne Ponder

Journal of Law and Mobility

This paper identifies some of the core privacy considerations raised by smart cities – government surveillance and data security in Part I. Then, Part II proposes a set of core principles for smart cities to consider in the development and deployment of smart cities to address privacy concerns. These principles include: (A) human-centric approaches to smart cities design and implementation, (B) transparency for city residents, (C) privacy by design, (D) anonymization and deidentification, (E) data minimization and purpose specification, (F) trusted data sharing, and (G) cybersecurity resilience.


Data Privacy, Human Rights, And Algorithmic Opacity, Sylvia Lu Jan 2022

Data Privacy, Human Rights, And Algorithmic Opacity, Sylvia Lu

Fellow, Adjunct, Lecturer, and Research Scholar Works

Decades ago, it was difficult to imagine a reality in which artificial intelligence (AI) could penetrate every corner of our lives to monitor our innermost selves for commercial interests. Within just a few decades, the private sector has seen a wild proliferation of AI systems, many of which are more powerful and penetrating than anticipated. In many cases, AI systems have become “the power behind the throne,” tracking user activities and making fateful decisions through predictive analysis of personal information. Despite the growing power of AI, proprietary algorithmic systems can be technically complex, legally claimed as trade secrets, and managerially …


Individuals As Gatekeepers Against Data Misuse, Ying Hu Dec 2021

Individuals As Gatekeepers Against Data Misuse, Ying Hu

Michigan Technology Law Review

This article makes a case for treating individual data subjects as gatekeepers against misuse of personal data. Imposing gatekeeper responsibility on individuals is most useful where (a) the primary wrongdoers engage in data misuse intentionally or recklessly; (b) misuse of personal data is likely to lead to serious harm; and (c) one or more individuals are able to detect and prevent data misuse at a reasonable cost.

As gatekeepers, individuals should have a legal duty to take reasonable measures to prevent data misuse where they are aware of facts indicating that the person seeking personal data from them is highly …


Problematic Interactions Between Ai And Health Privacy, W. Nicholson Price Ii Nov 2021

Problematic Interactions Between Ai And Health Privacy, W. Nicholson Price Ii

Articles

Problematic Interactions Between AI and Health Privacy Nicholson Price, University of Michigan Law SchoolFollow Abstract The interaction of artificial intelligence (AI) and health privacy is a two-way street. Both directions are problematic. This Essay makes two main points. First, the advent of artificial intelligence weakens the legal protections for health privacy by rendering deidentification less reliable and by inferring health information from unprotected data sources. Second, the legal rules that protect health privacy nonetheless detrimentally impact the development of AI used in the health system by introducing multiple sources of bias: collection and sharing of data by a small set …


The Privacy Cost Of Currency, Karin Thrasher Apr 2021

The Privacy Cost Of Currency, Karin Thrasher

Michigan Journal of International Law

Banknotes, or cash, can be used continuously by any person for nearly every transaction and provide anonymity for the parties. However, as digitization increases, the role and form of money is changing. In response to pressure produced by the increase in new forms of money and the potential for a cashless society, states are exploring potential substitutes to cash. Governments have begun to investigate the intersection of digitization and fiat currency: Central Bank Digital Currencies (“CBDC”).

States have begun researching and developing CBDCs to serve in lieu of cash. Central banks are analyzing the potential for a CBDC that could …


The Sacred Fourth Amendment Text, Christopher Slobogin Oct 2020

The Sacred Fourth Amendment Text, Christopher Slobogin

Michigan Law Review Online

The Supreme Court’s jurisprudence governing the Fourth Amendment’s “threshold”—a word meant to refer to the types of police actions that trigger the amendment’s warrant and reasonableness requirements—has confounded scholars and students alike since Katz v. United States. Before that 1967 decision, the Court’s decisions on the topic were fairly straightforward, based primarily on whether the police trespassed on the target’s property or property over which the target had control. After that decision—which has come to stand for the proposition that a Fourth Amendment search occurs if police infringe an expectation of privacy that society is prepared to recognize as …


How Definitive Is Fourth Amendment Textualism?, Evan H. Caminker Oct 2020

How Definitive Is Fourth Amendment Textualism?, Evan H. Caminker

Michigan Law Review Online

Professor Jeffrey Bellin’s excellent article advances a comprehensive and straightforward textual approach to determining what policing activities constitute “searches” triggering the protections of the Fourth Amendment. Bellin’s thesis is that a text-based approach to interpreting the Amendment is superior to the Supreme Court’s current approach, which ever since Katz v. United States has defined “search” primarily by reference to a non-textual “reasonable expectation of privacy” standard. After soundly criticizing the ungrounded and highly subjective nature of the Katz test, Bellin declares that the Court should instead simply follow where the text leads: the Amendment protects people from a search, meaning …


Exploring Lawful Hacking As A Possible Answer To The "Going Dark" Debate, Carlos Liguori May 2020

Exploring Lawful Hacking As A Possible Answer To The "Going Dark" Debate, Carlos Liguori

Michigan Technology Law Review

The debate on government access to encrypted data, popularly known as the “going dark” debate, has intensified over the years. On the one hand, law enforcement authorities have been pushing for mandatory exceptional access mechanisms on encryption systems in order to enable criminal investigations of both data in transit and at rest. On the other hand, both technical and industry experts argue that this solution compromises the security of encrypted systems and, thus, the privacy of their users. Some claim that other means of investigation could provide the information authorities seek without weakening encryption, with lawful hacking being one of …


Healthy Data Protection, Lothar Determann May 2020

Healthy Data Protection, Lothar Determann

Michigan Technology Law Review

Modern medicine is evolving at a tremendous speed. On a daily basis, we learn about new treatments, drugs, medical devices, and diagnoses. Both established technology companies and start-ups focus on health-related products and services in competition with traditional healthcare businesses. Telemedicine and electronic health records have the potential to improve the effectiveness of treatments significantly. Progress in the medical field depends above all on data, specifically health information. Physicians, researchers, and developers need health information to help patients by improving diagnoses, customizing treatments and finding new cures.

Yet law and policymakers are currently more focused on the fact that health …


The Right To Be And Become: Black Home-Educators As Child Privacy Protectors, Najarian R. Peters Jan 2020

The Right To Be And Become: Black Home-Educators As Child Privacy Protectors, Najarian R. Peters

Michigan Journal of Race and Law

The right to privacy is one of the most fundamental rights in American jurisprudence. In 1890, Samuel D. Warren and Louis D. Brandeis conceptualized the right to privacy as the right to be let alone and inspired privacy jurisprudence that tracked their initial description. Warren and Brandeis conceptualized further that this right was not exclusively meant to protect one’s body or physical property. Privacy rights were protective of “the products and the processes of the mind” and the “inviolate personality.” Privacy was further understood to protect the ability to “live one’s life as one chooses, free from assault, intrusion or …


Who Gets To Operate On Herbie? Right To Repair Legislation In The Context Of Automated Vehicles, Jennifer J. Huseby Jan 2020

Who Gets To Operate On Herbie? Right To Repair Legislation In The Context Of Automated Vehicles, Jennifer J. Huseby

Journal of Law and Mobility

You bought it, you own it, but do you have the right to repair it? As right-to-repair remains a hot topic in the context of consumer electronics such as smartphones, one must consider the ramifications it may have for the automated vehicle (“AV”) industry. As the backdrop for one of the first legislative victories for right-to-repair, the automobile industry has continued to push for the expansion of right-to-repair to cover increased access to telematics and exceptions to proprietary software controls. However, as we revisit the issue for more highly connected and automated vehicles, it is important to assess the unique …


Location Tracking And Digital Data: Can Carpenter Build A Stable Privacy Doctrine?, Evan H. Caminker Jun 2019

Location Tracking And Digital Data: Can Carpenter Build A Stable Privacy Doctrine?, Evan H. Caminker

Articles

In Carpenter v United States, the Supreme Court struggled to modernize twentieth-century search and seizure precedents for the “Cyber Age.” Twice previously this decade the Court had tweaked Fourth Amendment doctrine to keep pace with advancing technology, requiring a search warrant before the government can either peruse the contents of a cell phone seized incident to arrest or use a GPS tracker to follow a car’s long-term movements.


Digital Colonialism: The 21st Century Scramble For Africa Through The Extraction And Control Of User Data And The Limitations Of Data Protection Laws, Danielle Coleman May 2019

Digital Colonialism: The 21st Century Scramble For Africa Through The Extraction And Control Of User Data And The Limitations Of Data Protection Laws, Danielle Coleman

Michigan Journal of Race and Law

As Western technology companies increasingly rely on user data globally, extensive data protection laws and regulations emerged to ensure ethical use of that data. These same protections, however, do not exist uniformly in the resource-rich, infrastructure-poor African countries, where Western tech seeks to establish its presence. These conditions provide an ideal landscape for digital colonialism.

Digital colonialism refers to a modern-day “Scramble for Africa” where largescale tech companies extract, analyze, and own user data for profit and market influence with nominal benefit to the data source. Under the guise of altruism, large scale tech companies can use their power and …


Privacy Preserving Social Norm Nudges, Yifat Nahmias Jan 2019

Privacy Preserving Social Norm Nudges, Yifat Nahmias

Michigan Technology Law Review

Nudges comprise a key component of the regulatory toolbox. Both the public and private sectors use nudges extensively in various domains, ranging from environmental regulation to health, food and financial regulation. This article focuses on a particular type of nudge: social norm nudges. It discusses, for the first time, the privacy risks of such nudges. Social norm nudges induce behavioral change by capitalizing on people’s desire to fit in with others, on their predisposition to social conformity, and on their susceptibility to the way information is framed. In order to design effective social norm nudges, personal information about individuals and …


Privacy In The Age Of Medical Big Data, W. Nicholson Price Ii, I. Glenn Cohen Jan 2019

Privacy In The Age Of Medical Big Data, W. Nicholson Price Ii, I. Glenn Cohen

Articles

Big data has become the ubiquitous watch word of medical innovation. The rapid development of machine-learning techniques and artificial intelligence in particular has promised to revolutionize medical practice from the allocation of resources to the diagnosis of complex diseases. But with big data comes big risks and challenges, among them significant questions about patient privacy. Here, we outline the legal and ethical challenges big data brings to patient privacy. We discuss, among other topics, how best to conceive of health privacy; the importance of equity, consent, and patient governance in data collection; discrimination in data uses; and how to handle …


Forensic Border Searches After Carpenter Require Probable Cause And A Warrant, Christopher I. Pryby Jan 2019

Forensic Border Searches After Carpenter Require Probable Cause And A Warrant, Christopher I. Pryby

Michigan Law Review

Under the border search doctrine, courts have upheld the federal government's practice of searching people and their possessions upon entry into or exit from the United States, without any requirement of suspicion, as reasonable under the Fourth Amendment. Since the advent of electronic devices with large storage capacities, courts have grappled with whether this definition of reasonableness continues to apply. So far, courts have consistently characterized “nonforensic” border inspections of electronic devices (for example, paging through photos on a phone) as “routine” searches that, like inspecting luggage brought across international lines, require no suspicion. But there is a circuit split …


Secret Searches: The Sca's Standing Conundrum, Aviv S. Halpern Jan 2019

Secret Searches: The Sca's Standing Conundrum, Aviv S. Halpern

Michigan Law Review

The Stored Communications Act (“SCA”) arms federal law enforcement agencies with the ability to use a special type of warrant to access users’ electronically stored communications. In some circumstances, SCA warrants can require service providers to bundle and produce a user’s electronically stored communications without ever disclosing the existence of the warrant to the individual user until charges are brought. Users that are charged will ultimately receive notice of the search after the fact through their legal proceedings. Users that are never charged, however, may never know that their communications were obtained and searched. This practice effectively makes the provisions …


Shadow Health Records Meet New Data Privacy Laws, W. Nicholson Price Ii, Margot E. Kaminski, Timo Minssen, Kayte Spector-Bagdady Jan 2019

Shadow Health Records Meet New Data Privacy Laws, W. Nicholson Price Ii, Margot E. Kaminski, Timo Minssen, Kayte Spector-Bagdady

Articles

Large sets of health data can enable innovation and quality measurement but can also create technical challenges and privacy risks. When entities such as health plans and health care providers handle personal health information, they are often subject to data privacy regulation. But amid a flood of new forms of health data, some third parties have figured out ways to avoid some data privacy laws, developing what we call “shadow health records”—collections of health data outside the health system that provide detailed pictures of individual health—that allow both innovative research and commercial targeting despite data privacy rules. Now that space …


The Language-Game Of Privacy, Joshua A.T. Fairfield Apr 2018

The Language-Game Of Privacy, Joshua A.T. Fairfield

Michigan Law Review

A review of Ronald J. Krotoszynski, Jr., Privacy Revisited: A Global Perspective on the Right to Be Left Alone.


Risk And Resilience In Health Data Infrastructure, W. Nicholson Price Ii Dec 2017

Risk And Resilience In Health Data Infrastructure, W. Nicholson Price Ii

Articles

Today’s health system runs on data. However, for a system that generates and requires so much data, the health care system is surprisingly bad at maintaining, connecting, and using those data. In the easy cases of coordinated care and stationary patients, the system works—sometimes. But when care is fragmented, fragmented data often result. Fragmented data create risks both to individual patients and to the system. For patients, fragmentation creates risks in care based on incomplete or incorrect information, and may also lead to privacy risks from a patched together system. For the system, data fragmentation hinders efforts to improve efficiency …