Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Law

Failed Analogies: Justice Thomas’S Concurrence In Biden V. Knight First Amendment Institute, Sarah S. Seo Jan 2022

Failed Analogies: Justice Thomas’S Concurrence In Biden V. Knight First Amendment Institute, Sarah S. Seo

Fordham Intellectual Property, Media and Entertainment Law Journal

Twenty-six years ago, twenty-six words created the internet. Section 230 of the Communications Decency Act is a short, yet powerful, provision that notably protects social media platforms, among other interactive computer services, from liability for content created by third-party users. At the time of its enactment, Section 230 aimed to encourage the robust growth of the then-nascent internet while protecting it from government regulation. More recently, however, it has been wielded by Big Tech companies like Twitter and Facebook to prevent any liability for real-world harms that stem from virtual interactions conducted over their platforms.

Although the Supreme Court has …


Face The Facts, Or Is The Face A Fact?: Biometric Privacy In Publicly Available Data, Daniel Levin Jan 2022

Face The Facts, Or Is The Face A Fact?: Biometric Privacy In Publicly Available Data, Daniel Levin

Fordham Intellectual Property, Media and Entertainment Law Journal

Recent advances in biometric technologies have caused a stir among the privacy community. Specifically, facial recognition technologies facilitated through data scraping practices have called into question the basic precepts we had around exercising biometric privacy. Yet, in spite of emerging case law on the permissibility of data scraping, comparatively little attention has been given to the privacy implications endemic to such practices.

On the one hand, privacy proponents espouse the view that manipulating publicly available data from, for example, our social media profiles, derogates from users’ expectations around the kind of data they share with platforms (and the obligations such …


Democratizing Platform Privacy, Sari Mazzurco Jan 2021

Democratizing Platform Privacy, Sari Mazzurco

Fordham Intellectual Property, Media and Entertainment Law Journal

The online platform political economy—that is, the interrelationship of economic and political power in the exchange of online services for personal information—has endowed platforms with overwhelming power to determine consumers’ information privacy. Mainstream legal scholarship on information privacy has focused largely on an economic problem: individual consumers do not obtain their “optimal” level of privacy due to a bevy of market failures. This Article presents the political issue: that platforms’ hegemonic control over consumers’ information privacy renders the rules they impose illegitimate from a democratic perspective. It argues platform hegemony over consumers’ information privacy is a political problem, in the …


23andme: Attack Of The Clones And Other Concerns, Claire M. Amodio Jan 2021

23andme: Attack Of The Clones And Other Concerns, Claire M. Amodio

Fordham Intellectual Property, Media and Entertainment Law Journal

A few years ago, ancestry websites took the world by storm. People were fascinated with their history and heritage and wanted to find out more about where they came from. Then along came 23andMe, which allowed people to not only unearth their familial roots, but also bring to light unknown medical conditions or predispositions to certain medical issues. 23andMe then took the unprecedented step of teaming up with a pharmaceutical company to create drugs with its users’ genetic information. After this announcement, some users were caught off guard, having had no idea that their genetic information—something so sensitive and uniquely …


Data Scraping As A Cause Of Action: Limiting Use Of The Cfaa And Trespass In Online Copying Cases, Kathleen C. Riley Jan 2019

Data Scraping As A Cause Of Action: Limiting Use Of The Cfaa And Trespass In Online Copying Cases, Kathleen C. Riley

Fordham Intellectual Property, Media and Entertainment Law Journal

In recent years, online platforms have used claims such as the Computer Fraud and Abuse Act (“CFAA”) and trespass to curb data scraping, or copying of web content accomplished using robots or web crawlers. However, as the term “data scraping” implies, the content typically copied is data or information that is not protected by intellectual property law, and the means by which the copying occurs is not considered to be hacking. Trespass and the CFAA are both concerned with authorization, but in data scraping cases, these torts are used in such a way that implies that real property norms exist …


Privacy In Gaming, N. Cameron Russell, Joel R. Reidenberg, Sumyung Moon Jan 2019

Privacy In Gaming, N. Cameron Russell, Joel R. Reidenberg, Sumyung Moon

Fordham Intellectual Property, Media and Entertainment Law Journal

Video game platforms and business models are increasingly built on collection, use, and sharing of personal information for purposes of both functionality and revenue. This paper examines privacy issues and explores data practices, technical specifications, and policy statements of the most popular games and gaming platforms to provide an overview of the current privacy legal landscape for mobile gaming, console gaming, and virtual reality devices. The research observes how modern gaming aligns with information privacy notions and norms and how data practices and technologies specific to gaming may affect users and, in particular, child gamers.

After objectively selecting and analyzing …


Shopping For Privacy: How Technology In Brick-And-Mortar Retail Stores Poses Privacy Risks For Shoppers, Vincent Nguyen Jan 2019

Shopping For Privacy: How Technology In Brick-And-Mortar Retail Stores Poses Privacy Risks For Shoppers, Vincent Nguyen

Fordham Intellectual Property, Media and Entertainment Law Journal

As technology continues to rapidly advance, the American legal system has failed to protect individual shoppers from the technology implemented into retail stores, which poses significant privacy risks but does not violate the law. In particular, I examine the technologies implemented into many brick-and-mortar stores today, many of which the average everyday shopper has no idea exists. This Article criticizes these technologies, suggesting that many, if not all of them, are questionable in their legality taking advantage of their status in a legal gray zone. Because the American judicial system cannot adequately protect the individual shopper from these questionable privacy …


Implementing Privacy Policy: Who Should Do What?, David Hyman, William E. Kovacic Jan 2019

Implementing Privacy Policy: Who Should Do What?, David Hyman, William E. Kovacic

Fordham Intellectual Property, Media and Entertainment Law Journal

Academic scholarship on privacy has focused on the substantive rules and policies governing the protection of personal data. An extensive literature has debated alternative approaches for defining how private and public institutions can collect and use information about individuals. But, the attention given to the what of U.S. privacy regulation has overshadowed consideration of how and by whom privacy policy should be formulated and implemented.

U.S. privacy policy is an amalgam of activity by a myriad of federal, state, and local government agencies. But, the quality of substantive privacy law depends greatly on which agency or agencies are running the …


The Gdpr-Blockchain Paradox: Exempting Permissioned Blockchains From The Gdpr, Anisha Mirchandani Jan 2019

The Gdpr-Blockchain Paradox: Exempting Permissioned Blockchains From The Gdpr, Anisha Mirchandani

Fordham Intellectual Property, Media and Entertainment Law Journal

When considering the legal landscape emerging after the General Data Protection Regulation went into effect on May 25, 2018, the uncertainty surrounding the Regulation reaches its peak when it is applied to blockchain technology. While the goals of storing personal data on permissioned blockchains may align with the goals of accuracy and transparency emulated by the GDPR, the language of the Regulation makes it likely that blockchain technology, as a whole, violates the GDPR. Permissioned blockchains have promising use cases and developments that have not only streamlined data storage, but also allowed users to have increased control over who accesses …


The Future Of Facial Recognition Is Not Fully Known: Developing Privacy And Security Regulatory Mechanisms For Facial Recognition In The Retail Sector, Elias Wright Jan 2019

The Future Of Facial Recognition Is Not Fully Known: Developing Privacy And Security Regulatory Mechanisms For Facial Recognition In The Retail Sector, Elias Wright

Fordham Intellectual Property, Media and Entertainment Law Journal

In recent years, advances in facial recognition technology have resulted in a rapid expansion in the prevalence of private sector biometric technologies. Facial recognition, while providing new potentials for safety and security and personalized marketing by retailers implicates complicated questions about the nature of consumer privacy and surveillance where a “collection imperative” incentivize corporate actors to accumulate increasingly massive reservoirs of consumer data. However, the law has not yet fully developed to address the unique risks to consumers through the use of this technology. This Note examines existing regulatory mechanisms, finding that consumer sensitivities and the opaque nature of the …


Face Off: An Examination Of State Biometric Privacy Statutes & Data Harm Remedies, Maya E. Rivera Jan 2019

Face Off: An Examination Of State Biometric Privacy Statutes & Data Harm Remedies, Maya E. Rivera

Fordham Intellectual Property, Media and Entertainment Law Journal

As biometric authentication becomes an increasingly popular method of security among consumers, only three states currently have statutes detailing how such data may be collected, used, retained, and released. The Illinois Biometric Information Privacy Act is the only statute of the three that enshrines a private right of action for those who fail to properly handle biometric data. Both the Texas Capture or Use Biometric Identifier Act Information Act and the Washington Biometric Privacy Act allow for state Attorneys General to bring suit on behalf of aggrieved consumers. This Note examines these three statutes in the context of data security …


After The Gold Rush: The Boom Of The Internet Of Things, And The Busts Of Data-Security And Privacy, Dalmacio V. Posadas Jr. Jan 2017

After The Gold Rush: The Boom Of The Internet Of Things, And The Busts Of Data-Security And Privacy, Dalmacio V. Posadas Jr.

Fordham Intellectual Property, Media and Entertainment Law Journal

This Article addresses the impact that the lack of oversight of the Internet of Things has on digital privacy. While the Internet of Things is but one vehicle for technological innovation, it has created a broad glimpse into domestic life, thus triggering several privacy issues that the law is attempting to keep pace with. What the Internet of Things can reveal is beyond the control of the individual, as it collects information about every practical aspect of an individual’s life, and provides essentially unfettered access into the mind of its users. This Article proposes that the federal government and the …