Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Privacy Law

Journal

2016

Institution
Keyword
Publication

Articles 1 - 30 of 126

Full-Text Articles in Law

Knowledge And Fourth Amendment Privacy, Matthew Tokson Dec 2016

Knowledge And Fourth Amendment Privacy, Matthew Tokson

Northwestern University Law Review

This Article examines the central role that knowledge plays in determining the Fourth Amendment’s scope. What people know about surveillance practices or new technologies often shapes the “reasonable expectations of privacy” that define the Fourth Amendment’s boundaries. From early decisions dealing with automobile searches to recent cases involving advanced information technologies, courts have relied on assessments of knowledge in a wide variety of Fourth Amendment contexts. Yet the analysis of knowledge in Fourth Amendment law is rarely if ever studied on its own.

This Article fills that gap. It starts by identifying the characteristics of Fourth Amendment knowledge. It finds, …


Solving The Information Security & Privacy Crisis By Expanding The Scope Of Top Management Personal Liability, Charles Cresson Wood Dec 2016

Solving The Information Security & Privacy Crisis By Expanding The Scope Of Top Management Personal Liability, Charles Cresson Wood

Journal of Legislation

While information security and privacy losses are now spiraling out of control, and have been demonstrably shown to threaten national sovereignty, military superiority, industrial infrastructure order, national economic competitiveness, the solvency of major businesses, faith and trust in the Internet as a platform for modern commerce, as well as political stability, the U.S. Congress has nonetheless to date refused to seriously address the root cause of these threats. The root cause is a legally reinforced incentive system that encourages, and further entrenches, top management decisions that provide inadequate resources for, and inadequate top management attention to, information security and privacy …


Cellphones And The Fourth Amendment: Why Cellphone Users Have A Reasonable Expectation Of Privacy In Their Location Information, Paul Cividanes Dec 2016

Cellphones And The Fourth Amendment: Why Cellphone Users Have A Reasonable Expectation Of Privacy In Their Location Information, Paul Cividanes

Journal of Law and Policy

The Fourth Amendment, which affords individuals protection from unreasonable searches and seizures, was ratified over two hundred years ago. As such, it was impossible for the Amendment’s framers to conceive the technologies that exist today. As technology progresses, courts are often faced with the task of deciding how the Fourth Amendment should apply in the modern world. As Fourth Amendment jurisprudence has developed, the Supreme Court has originated tests and doctrines for courts to use when hearing Fourth Amendment challenges to government action. One such test, the ‘reasonable expectation of privacy’ test, looks to see whether an individual has a …


Informed Consent For The Use And Storage Of Residual Dried Blood Samples From State-Mandated Newborn Genetic Screening Programs, Tufik Y. Shayeb Dec 2016

Informed Consent For The Use And Storage Of Residual Dried Blood Samples From State-Mandated Newborn Genetic Screening Programs, Tufik Y. Shayeb

Buffalo Law Review

No abstract provided.


Like A Bad Neighbor, Hackers Are There: The Need For Data Security Legislation And Cyber Insurance In Light Of Increasing Ftc Enforcement Actions, Jennifer Gordon Dec 2016

Like A Bad Neighbor, Hackers Are There: The Need For Data Security Legislation And Cyber Insurance In Light Of Increasing Ftc Enforcement Actions, Jennifer Gordon

Brooklyn Journal of Corporate, Financial & Commercial Law

Privacy has come to the forefront of the technology world as third party hackers are constantly attacking companies for their customers’ data. With increasing instances of compromised customer information, the Federal Trade Commission (FTC) has been bringing suit against companies for inadequate data security procedures. The FTC’s newfound authority to bring suit regarding cybersecurity breaches, based on the Third Circuit’s decision in FTC v. Wyndham Worldwide Corp., is a result of inaction—Congress has been unable to pass sufficient cybersecurity legislation, causing the FTC to step in and fill the void in regulation. In the absence of congressional action, this self-proclaimed …


“Hello…It’S Me. [Please Don’T Sue Me!]” Examining The Fcc’S Overbroad Calling Regulations Under The Tcpa, Marissa A. Potts Dec 2016

“Hello…It’S Me. [Please Don’T Sue Me!]” Examining The Fcc’S Overbroad Calling Regulations Under The Tcpa, Marissa A. Potts

Brooklyn Law Review

Americans have received unwanted telemarketing calls for decades. In response to a rapid increase in pre-recorded calls made using autodialer devices, Congress enacted the Telephone Consumer Protection Act (TCPA) in 1992. The TCPA imposes restrictions on calls made to consumers’ residences and wireless phones using autodialer devices, even if they are not telemarketing calls. Congress appointed the Federal Communications Commission (FCC) to prescribe rules and regulations to enforce the TCPA. In 2015, the FCC released an order that defined autodialer more broadly under the statute. Consequently, devices that have the potential to become autodialers in the future, even if they …


The Right Of Privacy Nov 2016

The Right Of Privacy

The Catholic Lawyer

No abstract provided.


Police Body-Worn Camera Policy: Balancing The Tension Between Privacy And Public Access In State Law, Kyle J. Maury Nov 2016

Police Body-Worn Camera Policy: Balancing The Tension Between Privacy And Public Access In State Law, Kyle J. Maury

Notre Dame Law Review

Body camera implementation remains in its infancy stage. As such,

there is a dearth of legal scholarship analyzing the policy considerations associated

with body cameras. Instead of raising the issues involved and assessing

arguments for and against implementation, this Note assumes body cameras

are a force for good and are here to stay for the long haul. Consequently, the

goal of this Note is to analyze various issues involved in administering body

cameras against a backdrop of recently enacted state legislation—focusing

specifically on the tension between protecting privacy interests while also

ensuring public access to recordings. This Note examines these …


Standing Room Only: Solving The Injury-In-Fact Problem For Data Breach Plaintiffs, Nick Beatty Oct 2016

Standing Room Only: Solving The Injury-In-Fact Problem For Data Breach Plaintiffs, Nick Beatty

BYU Law Review

No abstract provided.


Recording A New Frontier In Evidence-Gathering: Police Body-Worn Cameras And Privacy Doctrines In Washington State, Katie Farden Oct 2016

Recording A New Frontier In Evidence-Gathering: Police Body-Worn Cameras And Privacy Doctrines In Washington State, Katie Farden

Seattle University Law Review

This Note contributes to a growing body of work that weighs the gains that communities stand to make from police body-worn cameras against the tangle of concerns about how cameras may infringe on individual liberties and tread on existing privacy laws. While police departments have quickly implemented cameras over the past few years, laws governing the use of the footage body-worn cameras capture still trail behind. Notably, admissibility rules for footage from an officer’s camera, and evidence obtained with the help of that footage, remain on the horizon. This Note focuses exclusively on Washington State’s laws. It takes a clinical …


Privatization Of The Judiciary, Eldar Haber Oct 2016

Privatization Of The Judiciary, Eldar Haber

Seattle University Law Review

The digital era invoked new challenges to judicial systems. The Internet enabled violation of privacy and intellectual property rights and enhanced the magnitude of criminal activity. Recognizing the inability of courts to handle a high magnitude of lawsuits, along with enforcement difficulties, policymakers worldwide chose to delegate quasi-judicial powers to online intermediaries that facilitate or enable such potential violations or infringements of rights. Search engines were first tasked to perform a quasi-judicial role under a notice-and-takedown regime to combat copyright infringement around the world. Recently, the European Union (EU) decided to delegate judicial authority to search engines by granting rights …


Privacy's Place At The Table: A Reflection On Richard Turkington's Approach To Valuing And Balancing Privacy Interests, Doris Deltosto Brogan Oct 2016

Privacy's Place At The Table: A Reflection On Richard Turkington's Approach To Valuing And Balancing Privacy Interests, Doris Deltosto Brogan

Villanova Law Review

No abstract provided.


The Georgia Open Records Law Electronic Signature Exception: The Intersection Of Privacy, Technology, And Open Records, Michael L. Van Cise Oct 2016

The Georgia Open Records Law Electronic Signature Exception: The Intersection Of Privacy, Technology, And Open Records, Michael L. Van Cise

Journal of Intellectual Property Law

No abstract provided.


Privacy Harmonization And The Developing World: The Impact Of The Eu's General Data Protection Regulation On Developing Economies, Tiffany Curtiss Oct 2016

Privacy Harmonization And The Developing World: The Impact Of The Eu's General Data Protection Regulation On Developing Economies, Tiffany Curtiss

Washington Journal of Law, Technology & Arts

Through strengthened third-party obligations for data protection, the European Union’s General Data Protection Regulation will export privacy norms. However, developing economies may want to consider a co-regulatory industry approach to data protection before adopting similar national legislation. The General Data Protection Regulation can be an ideal model for global harmonization of privacy laws, particularly for adoption among industries and willing participants. To benefit from a co-regulatory approach, however, a developing economy would need to invest in education and legal systems in order to capture the benefits of the growing e-commerce market that will undoubtedly be influenced by the General Data …


The Second Amendment Burden: Arming Courts With A Workable Standard For Reviewing Gun Safety Legislation, Melanie Kalmanson Oct 2016

The Second Amendment Burden: Arming Courts With A Workable Standard For Reviewing Gun Safety Legislation, Melanie Kalmanson

Florida State University Law Review

Two controversial topics; one framework. Jurisprudence surrounding the Second Amendment to the U.S. Constitution lacks a workable standard under which courts are to review gun control legislation. This Note presents an intersectional argument whereby the abortion “undue burden” framework is applied to Second Amendment legislation. Through this approach of applying the abortion framework to gun control legislation, like those recently proposed or discussed, this Note argues that these provisions would likely be constitutional. Though abortion is at the center of this discussion, this Note does not aim to contribute to discourse concerning reproductive rights and accepts prima facie the current-standing …


Equitable Recovery For Ashley Madison Hack Victims: The Federal Trade Commission As Executor Of A Narrow Right To Be Forgotten In The United States, Mackenzie Olson Oct 2016

Equitable Recovery For Ashley Madison Hack Victims: The Federal Trade Commission As Executor Of A Narrow Right To Be Forgotten In The United States, Mackenzie Olson

Washington Journal of Law, Technology & Arts

Events following the Ashley Madison data breach exposed the personal information of millions of users. Victims filed class action suits in multiple courts in the United States, seeking various forms of monetary and equitable relief. However, these plaintiffs have been unable to compel the removal of personal information from third-party Internet sites hosting the information previously circulated by hackers. Citizens of the European Union, by contrast, could likely compel the removal of such personal information. Unlike the United States, the European Union recognizes a “right to be forgotten”, which authorizes individuals to demand the removal of their personal information from …


Balancing A Right To Be Forgotten With A Right To Freedom Of Expression In The Wake Of Google Spain V. Aepd, Shaniqua Singleton Sep 2016

Balancing A Right To Be Forgotten With A Right To Freedom Of Expression In The Wake Of Google Spain V. Aepd, Shaniqua Singleton

Georgia Journal of International & Comparative Law

No abstract provided.


Police Body Worn Cameras And Privacy: Retaining Benefits While Reducing Public Concerns, Richard Lin Sep 2016

Police Body Worn Cameras And Privacy: Retaining Benefits While Reducing Public Concerns, Richard Lin

Duke Law & Technology Review

Recent high-profile incidents of police misconduct have led to calls for increased police accountability. One proposed reform is to equip police officers with body worn cameras, which provide more reliable evidence than eyewitness accounts. However, such cameras may pose privacy concerns for individuals who are recorded, as the footage may fall under open records statutes that would require the footage to be released upon request. Furthermore, storage of video data is costly, and redaction of video for release is time-consuming. While exempting all body camera video from release would take care of privacy issues, it would also prevent the public …


Controversy Over Information Privacy Arising From The Taiwan National Health Insurance Database Examining The Taiwan Taipei High Administrative Court Judgement No. 102-Su-36 (Tsai V. Nhia), Chen-Hung Chang Aug 2016

Controversy Over Information Privacy Arising From The Taiwan National Health Insurance Database Examining The Taiwan Taipei High Administrative Court Judgement No. 102-Su-36 (Tsai V. Nhia), Chen-Hung Chang

Pace International Law Review

This article examines the limitations of the application of traditional information privacy theory to disputes relating to modern technologies. If information privacy is understood as an individual’s right to full control over his information, activities involving the collection, process and use of personal data cannot be conducted without the data subject’s consent because his privacy rights would be affected as a result of such activities. Instead of the privacy interest approach, this article introduces a privacy harm approach to reconcile the defects of traditional privacy theory. The privacy interest approach helps identify situations in which an individual’s information privacy conflicts …


Cell Phone Searches After Riley: Establishing Probable Cause And Applying Search Warrant Exceptions, Erica L. Danielsen Aug 2016

Cell Phone Searches After Riley: Establishing Probable Cause And Applying Search Warrant Exceptions, Erica L. Danielsen

Pace Law Review

Part I of this note discusses the Fourth Amendment’s protection against unreasonable search and seizures and its probable cause requirement. The Fourth Amendment’s text remains the same since its enactment. However, interpretation of the Fourth Amendment continues to evolve in order to stay current with society. Interpretation of the Fourth Amendment also varies based on state constitutional law since states can provide its citizens with greater protection than the United States Constitution. This is why the United States Supreme Court, federal district courts, and state courts have all undergone thorough Fourth Amendment analyses when applying the true meaning of the …


That ‘70s Show: Why The 11th Circuit Was Wrong To Rely On Cases From The 1970s To Decide A Cell-Phone Tracking Case, David Oscar Markus, Nathan Freed Wessler Aug 2016

That ‘70s Show: Why The 11th Circuit Was Wrong To Rely On Cases From The 1970s To Decide A Cell-Phone Tracking Case, David Oscar Markus, Nathan Freed Wessler

University of Miami Law Review

In light of society's increasing reliance on technology, this article explores a critical question – that of the Fourth Amendment’s protection over privacy in the digital age. Specifically, this article addresses how the law currently fails to protect the privacy of one’s cell phone records and its ramifications. By highlighting the antiquated precedent leading up to the Eleventh Circuit’s ruling in United States v. Davis, this article calls on the judiciary to find a more appropriate balance for protecting the right to privacy in a modern society.


Cellphones, Stingrays, And Searches! An Inquiry Into The Legality Of Cellular Location Information, Jeremy H. D'Amico Aug 2016

Cellphones, Stingrays, And Searches! An Inquiry Into The Legality Of Cellular Location Information, Jeremy H. D'Amico

University of Miami Law Review

Can the Fourth Amendment protect an individual’s right privacy by preventing the disclosure of her location through cell site location information? Does it currently? Should it? Many court opinions answer these questions in both the affirmative and the negative. The rationale underlying each conclusion is disparate. Some rely on statutory regimes, others rely on the United States Supreme Court’s interpretation of reasonableness. However, Cell Site Location Information is a technology that requires uniformity in its interpretation. This note investigates the different interpretations of the Fourth Amendment as it relates to Cell Site Location Information. It explains the technology behind Cell …


Wearable Fitness Devices: Personal Health Data Privacy In Washington State, Steven Spann Jul 2016

Wearable Fitness Devices: Personal Health Data Privacy In Washington State, Steven Spann

Seattle University Law Review

Private entities are increasingly targeting individuals in the United States and around the world to gather personal data for such purposes as product development, market identification, and insurance risk assessment. While credit card records and online browsing histories have long been the medium through which this data is gathered, in more recent years, wearable fitness devices have added a new dimension to data production and collection. These devices are capable of gathering a significant amount of data regarding a person’s physical and physiological characteristics, thereby exposing these data producers to personal privacy infringement. Washington State lawmakers and citizens must be …


The Two Faces Of The Foreign Intelligence Surveillance Court, Emily Berman Jul 2016

The Two Faces Of The Foreign Intelligence Surveillance Court, Emily Berman

Indiana Law Journal

When former National Security Agency contractor Edward Snowden leaked a massive trove of information about secret intelligence-collection programs implemented under the Foreign Intelligence Surveillance Act in the summer of 2013, U.S. surveillance activities were thrust to the forefront of public debate. This debate included the question of whether and how to reform the Foreign Intelligence Surveillance Court (“FISA Court”), the statutorily created secret court that reviews government applications to conduct surveillance in the United States. This discussion, however, has underemphasized a critical feature of the way the FISA Court works. As this Article will show, since the terrorist attacks of …


Taking A Bite Out Of Michael Vick's Publicity Rights: An Analysis Of How Teh Right Of Publicity Should Be Treated After A Celebrity Is Convicted Of A Crime, Stephen Reginald Fowler Jun 2016

Taking A Bite Out Of Michael Vick's Publicity Rights: An Analysis Of How Teh Right Of Publicity Should Be Treated After A Celebrity Is Convicted Of A Crime, Stephen Reginald Fowler

Journal of Intellectual Property Law

No abstract provided.


Rights Of Publicity: A Practitioner's Enigma, Gil N. Peles Esq. Jun 2016

Rights Of Publicity: A Practitioner's Enigma, Gil N. Peles Esq.

Journal of Intellectual Property Law

No abstract provided.


Beyond Irbs: Ethical Guidelines For Data Research, Omer Tene, Jules Polonetsky Jun 2016

Beyond Irbs: Ethical Guidelines For Data Research, Omer Tene, Jules Polonetsky

Washington and Lee Law Review Online

No abstract provided.


Strategies For Protecting Privacy In Open Data And Proactive Disclosure, Teresa Scassa, Amy Conroy Jun 2016

Strategies For Protecting Privacy In Open Data And Proactive Disclosure, Teresa Scassa, Amy Conroy

Canadian Journal of Law and Technology

In this paper, the authors explore strategies for balancing privacy with transparency in the release of government data and information as part of the growing global open government movement. The issue is important because government data or information may take many forms, may contain many different types of personal information, and may be released in a range of contexts. The legal framework is complex: personal information is typically not released as open data or under access to information regimes; nevertheless, in some cases transparency requirements take precedence over the protection of personal information. The open courts principle, for example, places …


Electronic Devices At The Border: The Next Frontier Of Canadian Search And Seizure Law?, Robert J. Currie Jun 2016

Electronic Devices At The Border: The Next Frontier Of Canadian Search And Seizure Law?, Robert J. Currie

Canadian Journal of Law and Technology

Over the last several years the Supreme Court of Canada has developed its jurisprudence regarding the search and seizure of electronic devices, applying section 8 of the Canadian Charter of Rights and Freedoms in such a way as to assert and protect a significant amount of privacy in the devices and their data. Recent cases regarding the search of devices at Canada’s borders, however, do not reflect this case law. This is a situation made all the more complex by the generally attenuated expectation of privacy in the border context, and is worthy of inquiry.

Using a pending border case …


Aereo Dynamics: "User Rights" And The Future Of Internet Retransmission In Canada, Pradeepan K. Sarma Jun 2016

Aereo Dynamics: "User Rights" And The Future Of Internet Retransmission In Canada, Pradeepan K. Sarma

Canadian Journal of Law and Technology

2014’s U.S. Supreme Court decision Aereo made waves in the entertainment and technology industry when it ruled in favour of a coterie of cable companies against an upstart start-up, Aereo Inc., retransmitting broadcast television over the internet. Little attention, however, has been paid to its ramifications to the Canadian broadcasting regime, with its vastly different regulatory scheme and an underlying objective to promote the dissemination of Canadian content. Complicating matters further is the 2012 Canadian Supreme Court decision Cogeco, where the retransmission of broadcast signals had been re-articulated as a ’user right’. This paper uses the Aereo decision as a …