Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Schulich School of Law, Dalhousie University (18)
- UIC School of Law (13)
- Seattle University School of Law (11)
- The Catholic University of America, Columbus School of Law (8)
- Brooklyn Law School (6)
-
- University of Georgia School of Law (6)
- Fordham Law School (4)
- Notre Dame Law School (4)
- University of Washington School of Law (4)
- Vanderbilt University Law School (4)
- Washington and Lee University School of Law (4)
- American University Washington College of Law (3)
- Duke Law (3)
- Loyola Marymount University and Loyola Law School (3)
- Maurer School of Law: Indiana University (3)
- University of Miami Law School (3)
- University of Michigan Law School (3)
- University of Minnesota Law School (3)
- Chicago-Kent College of Law (2)
- Pace University (2)
- Pepperdine University (2)
- University of Cincinnati College of Law (2)
- William & Mary Law School (2)
- Brigham Young University Law School (1)
- Case Western Reserve University School of Law (1)
- Florida State University College of Law (1)
- Northwestern Pritzker School of Law (1)
- Southern Methodist University (1)
- St. John's University School of Law (1)
- St. Mary's University (1)
- Keyword
-
- Privacy (25)
- Technology (6)
- Fourth Amendment (5)
- Federal Trade Commission (4)
- Big Data (3)
-
- Data (3)
- Data Privacy (3)
- First Amendment (3)
- Surveillance (3)
- Big data (2)
- Cell phone records (2)
- Civil procedure (2)
- Consent (2)
- Copyright (2)
- Cybercrime (2)
- Electronic signature (2)
- European Union (2)
- Federal Communications Commission (2)
- General Data Protection Regulation (2)
- Gramm-Leach-Bliley Act (2)
- Informed consent (2)
- Internet (2)
- Law (2)
- Law reform (2)
- Newsworthiness (2)
- Parody (2)
- Patents & Technology (2)
- Personal information (2)
- Personally identifiable information (2)
- Police (2)
- Publication
-
- Canadian Journal of Law and Technology (18)
- UIC John Marshall Journal of Information Technology & Privacy Law (13)
- Catholic University Journal of Law and Technology (8)
- Seattle Journal for Social Justice (8)
- Fordham Urban Law Journal (4)
-
- Vanderbilt Journal of Entertainment & Technology Law (4)
- Washington and Lee Law Review Online (4)
- Duke Law & Technology Review (3)
- Indiana Law Journal (3)
- Journal of Intellectual Property Law (3)
- Minnesota Journal of Law, Science & Technology (3)
- Notre Dame Law Review (3)
- Seattle University Law Review (3)
- University of Miami Law Review (3)
- Brooklyn Journal of Corporate, Financial & Commercial Law (2)
- Chicago-Kent Law Review (2)
- Georgia Law Review (2)
- Journal of Law and Policy (2)
- Loyola of Los Angeles Law Review (2)
- Pepperdine Law Review (2)
- University of Michigan Journal of Law Reform (2)
- Washington Journal of Law, Technology & Arts (2)
- American University Business Law Review (1)
- American University Law Review (1)
- American University National Security Law Brief (1)
- BYU Law Review (1)
- Brooklyn Journal of International Law (1)
- Brooklyn Law Review (1)
- Buffalo Law Review (1)
- Florida State University Law Review (1)
Articles 1 - 30 of 126
Full-Text Articles in Law
Knowledge And Fourth Amendment Privacy, Matthew Tokson
Knowledge And Fourth Amendment Privacy, Matthew Tokson
Northwestern University Law Review
This Article examines the central role that knowledge plays in determining the Fourth Amendment’s scope. What people know about surveillance practices or new technologies often shapes the “reasonable expectations of privacy” that define the Fourth Amendment’s boundaries. From early decisions dealing with automobile searches to recent cases involving advanced information technologies, courts have relied on assessments of knowledge in a wide variety of Fourth Amendment contexts. Yet the analysis of knowledge in Fourth Amendment law is rarely if ever studied on its own.
This Article fills that gap. It starts by identifying the characteristics of Fourth Amendment knowledge. It finds, …
Solving The Information Security & Privacy Crisis By Expanding The Scope Of Top Management Personal Liability, Charles Cresson Wood
Solving The Information Security & Privacy Crisis By Expanding The Scope Of Top Management Personal Liability, Charles Cresson Wood
Journal of Legislation
While information security and privacy losses are now spiraling out of control, and have been demonstrably shown to threaten national sovereignty, military superiority, industrial infrastructure order, national economic competitiveness, the solvency of major businesses, faith and trust in the Internet as a platform for modern commerce, as well as political stability, the U.S. Congress has nonetheless to date refused to seriously address the root cause of these threats. The root cause is a legally reinforced incentive system that encourages, and further entrenches, top management decisions that provide inadequate resources for, and inadequate top management attention to, information security and privacy …
Cellphones And The Fourth Amendment: Why Cellphone Users Have A Reasonable Expectation Of Privacy In Their Location Information, Paul Cividanes
Cellphones And The Fourth Amendment: Why Cellphone Users Have A Reasonable Expectation Of Privacy In Their Location Information, Paul Cividanes
Journal of Law and Policy
The Fourth Amendment, which affords individuals protection from unreasonable searches and seizures, was ratified over two hundred years ago. As such, it was impossible for the Amendment’s framers to conceive the technologies that exist today. As technology progresses, courts are often faced with the task of deciding how the Fourth Amendment should apply in the modern world. As Fourth Amendment jurisprudence has developed, the Supreme Court has originated tests and doctrines for courts to use when hearing Fourth Amendment challenges to government action. One such test, the ‘reasonable expectation of privacy’ test, looks to see whether an individual has a …
Informed Consent For The Use And Storage Of Residual Dried Blood Samples From State-Mandated Newborn Genetic Screening Programs, Tufik Y. Shayeb
Informed Consent For The Use And Storage Of Residual Dried Blood Samples From State-Mandated Newborn Genetic Screening Programs, Tufik Y. Shayeb
Buffalo Law Review
No abstract provided.
Like A Bad Neighbor, Hackers Are There: The Need For Data Security Legislation And Cyber Insurance In Light Of Increasing Ftc Enforcement Actions, Jennifer Gordon
Like A Bad Neighbor, Hackers Are There: The Need For Data Security Legislation And Cyber Insurance In Light Of Increasing Ftc Enforcement Actions, Jennifer Gordon
Brooklyn Journal of Corporate, Financial & Commercial Law
Privacy has come to the forefront of the technology world as third party hackers are constantly attacking companies for their customers’ data. With increasing instances of compromised customer information, the Federal Trade Commission (FTC) has been bringing suit against companies for inadequate data security procedures. The FTC’s newfound authority to bring suit regarding cybersecurity breaches, based on the Third Circuit’s decision in FTC v. Wyndham Worldwide Corp., is a result of inaction—Congress has been unable to pass sufficient cybersecurity legislation, causing the FTC to step in and fill the void in regulation. In the absence of congressional action, this self-proclaimed …
“Hello…It’S Me. [Please Don’T Sue Me!]” Examining The Fcc’S Overbroad Calling Regulations Under The Tcpa, Marissa A. Potts
“Hello…It’S Me. [Please Don’T Sue Me!]” Examining The Fcc’S Overbroad Calling Regulations Under The Tcpa, Marissa A. Potts
Brooklyn Law Review
Americans have received unwanted telemarketing calls for decades. In response to a rapid increase in pre-recorded calls made using autodialer devices, Congress enacted the Telephone Consumer Protection Act (TCPA) in 1992. The TCPA imposes restrictions on calls made to consumers’ residences and wireless phones using autodialer devices, even if they are not telemarketing calls. Congress appointed the Federal Communications Commission (FCC) to prescribe rules and regulations to enforce the TCPA. In 2015, the FCC released an order that defined autodialer more broadly under the statute. Consequently, devices that have the potential to become autodialers in the future, even if they …
Police Body-Worn Camera Policy: Balancing The Tension Between Privacy And Public Access In State Law, Kyle J. Maury
Police Body-Worn Camera Policy: Balancing The Tension Between Privacy And Public Access In State Law, Kyle J. Maury
Notre Dame Law Review
Body camera implementation remains in its infancy stage. As such,
there is a dearth of legal scholarship analyzing the policy considerations associated
with body cameras. Instead of raising the issues involved and assessing
arguments for and against implementation, this Note assumes body cameras
are a force for good and are here to stay for the long haul. Consequently, the
goal of this Note is to analyze various issues involved in administering body
cameras against a backdrop of recently enacted state legislation—focusing
specifically on the tension between protecting privacy interests while also
ensuring public access to recordings. This Note examines these …
Standing Room Only: Solving The Injury-In-Fact Problem For Data Breach Plaintiffs, Nick Beatty
Standing Room Only: Solving The Injury-In-Fact Problem For Data Breach Plaintiffs, Nick Beatty
BYU Law Review
No abstract provided.
Recording A New Frontier In Evidence-Gathering: Police Body-Worn Cameras And Privacy Doctrines In Washington State, Katie Farden
Recording A New Frontier In Evidence-Gathering: Police Body-Worn Cameras And Privacy Doctrines In Washington State, Katie Farden
Seattle University Law Review
This Note contributes to a growing body of work that weighs the gains that communities stand to make from police body-worn cameras against the tangle of concerns about how cameras may infringe on individual liberties and tread on existing privacy laws. While police departments have quickly implemented cameras over the past few years, laws governing the use of the footage body-worn cameras capture still trail behind. Notably, admissibility rules for footage from an officer’s camera, and evidence obtained with the help of that footage, remain on the horizon. This Note focuses exclusively on Washington State’s laws. It takes a clinical …
Privatization Of The Judiciary, Eldar Haber
Privatization Of The Judiciary, Eldar Haber
Seattle University Law Review
The digital era invoked new challenges to judicial systems. The Internet enabled violation of privacy and intellectual property rights and enhanced the magnitude of criminal activity. Recognizing the inability of courts to handle a high magnitude of lawsuits, along with enforcement difficulties, policymakers worldwide chose to delegate quasi-judicial powers to online intermediaries that facilitate or enable such potential violations or infringements of rights. Search engines were first tasked to perform a quasi-judicial role under a notice-and-takedown regime to combat copyright infringement around the world. Recently, the European Union (EU) decided to delegate judicial authority to search engines by granting rights …
Privacy's Place At The Table: A Reflection On Richard Turkington's Approach To Valuing And Balancing Privacy Interests, Doris Deltosto Brogan
Privacy's Place At The Table: A Reflection On Richard Turkington's Approach To Valuing And Balancing Privacy Interests, Doris Deltosto Brogan
Villanova Law Review
No abstract provided.
The Georgia Open Records Law Electronic Signature Exception: The Intersection Of Privacy, Technology, And Open Records, Michael L. Van Cise
The Georgia Open Records Law Electronic Signature Exception: The Intersection Of Privacy, Technology, And Open Records, Michael L. Van Cise
Journal of Intellectual Property Law
No abstract provided.
Privacy Harmonization And The Developing World: The Impact Of The Eu's General Data Protection Regulation On Developing Economies, Tiffany Curtiss
Privacy Harmonization And The Developing World: The Impact Of The Eu's General Data Protection Regulation On Developing Economies, Tiffany Curtiss
Washington Journal of Law, Technology & Arts
Through strengthened third-party obligations for data protection, the European Union’s General Data Protection Regulation will export privacy norms. However, developing economies may want to consider a co-regulatory industry approach to data protection before adopting similar national legislation. The General Data Protection Regulation can be an ideal model for global harmonization of privacy laws, particularly for adoption among industries and willing participants. To benefit from a co-regulatory approach, however, a developing economy would need to invest in education and legal systems in order to capture the benefits of the growing e-commerce market that will undoubtedly be influenced by the General Data …
The Second Amendment Burden: Arming Courts With A Workable Standard For Reviewing Gun Safety Legislation, Melanie Kalmanson
The Second Amendment Burden: Arming Courts With A Workable Standard For Reviewing Gun Safety Legislation, Melanie Kalmanson
Florida State University Law Review
Two controversial topics; one framework. Jurisprudence surrounding the Second Amendment to the U.S. Constitution lacks a workable standard under which courts are to review gun control legislation. This Note presents an intersectional argument whereby the abortion “undue burden” framework is applied to Second Amendment legislation. Through this approach of applying the abortion framework to gun control legislation, like those recently proposed or discussed, this Note argues that these provisions would likely be constitutional. Though abortion is at the center of this discussion, this Note does not aim to contribute to discourse concerning reproductive rights and accepts prima facie the current-standing …
Equitable Recovery For Ashley Madison Hack Victims: The Federal Trade Commission As Executor Of A Narrow Right To Be Forgotten In The United States, Mackenzie Olson
Equitable Recovery For Ashley Madison Hack Victims: The Federal Trade Commission As Executor Of A Narrow Right To Be Forgotten In The United States, Mackenzie Olson
Washington Journal of Law, Technology & Arts
Events following the Ashley Madison data breach exposed the personal information of millions of users. Victims filed class action suits in multiple courts in the United States, seeking various forms of monetary and equitable relief. However, these plaintiffs have been unable to compel the removal of personal information from third-party Internet sites hosting the information previously circulated by hackers. Citizens of the European Union, by contrast, could likely compel the removal of such personal information. Unlike the United States, the European Union recognizes a “right to be forgotten”, which authorizes individuals to demand the removal of their personal information from …
Balancing A Right To Be Forgotten With A Right To Freedom Of Expression In The Wake Of Google Spain V. Aepd, Shaniqua Singleton
Balancing A Right To Be Forgotten With A Right To Freedom Of Expression In The Wake Of Google Spain V. Aepd, Shaniqua Singleton
Georgia Journal of International & Comparative Law
No abstract provided.
Police Body Worn Cameras And Privacy: Retaining Benefits While Reducing Public Concerns, Richard Lin
Police Body Worn Cameras And Privacy: Retaining Benefits While Reducing Public Concerns, Richard Lin
Duke Law & Technology Review
Recent high-profile incidents of police misconduct have led to calls for increased police accountability. One proposed reform is to equip police officers with body worn cameras, which provide more reliable evidence than eyewitness accounts. However, such cameras may pose privacy concerns for individuals who are recorded, as the footage may fall under open records statutes that would require the footage to be released upon request. Furthermore, storage of video data is costly, and redaction of video for release is time-consuming. While exempting all body camera video from release would take care of privacy issues, it would also prevent the public …
Controversy Over Information Privacy Arising From The Taiwan National Health Insurance Database Examining The Taiwan Taipei High Administrative Court Judgement No. 102-Su-36 (Tsai V. Nhia), Chen-Hung Chang
Pace International Law Review
This article examines the limitations of the application of traditional information privacy theory to disputes relating to modern technologies. If information privacy is understood as an individual’s right to full control over his information, activities involving the collection, process and use of personal data cannot be conducted without the data subject’s consent because his privacy rights would be affected as a result of such activities. Instead of the privacy interest approach, this article introduces a privacy harm approach to reconcile the defects of traditional privacy theory. The privacy interest approach helps identify situations in which an individual’s information privacy conflicts …
Cell Phone Searches After Riley: Establishing Probable Cause And Applying Search Warrant Exceptions, Erica L. Danielsen
Cell Phone Searches After Riley: Establishing Probable Cause And Applying Search Warrant Exceptions, Erica L. Danielsen
Pace Law Review
Part I of this note discusses the Fourth Amendment’s protection against unreasonable search and seizures and its probable cause requirement. The Fourth Amendment’s text remains the same since its enactment. However, interpretation of the Fourth Amendment continues to evolve in order to stay current with society. Interpretation of the Fourth Amendment also varies based on state constitutional law since states can provide its citizens with greater protection than the United States Constitution. This is why the United States Supreme Court, federal district courts, and state courts have all undergone thorough Fourth Amendment analyses when applying the true meaning of the …
That ‘70s Show: Why The 11th Circuit Was Wrong To Rely On Cases From The 1970s To Decide A Cell-Phone Tracking Case, David Oscar Markus, Nathan Freed Wessler
That ‘70s Show: Why The 11th Circuit Was Wrong To Rely On Cases From The 1970s To Decide A Cell-Phone Tracking Case, David Oscar Markus, Nathan Freed Wessler
University of Miami Law Review
In light of society's increasing reliance on technology, this article explores a critical question – that of the Fourth Amendment’s protection over privacy in the digital age. Specifically, this article addresses how the law currently fails to protect the privacy of one’s cell phone records and its ramifications. By highlighting the antiquated precedent leading up to the Eleventh Circuit’s ruling in United States v. Davis, this article calls on the judiciary to find a more appropriate balance for protecting the right to privacy in a modern society.
Cellphones, Stingrays, And Searches! An Inquiry Into The Legality Of Cellular Location Information, Jeremy H. D'Amico
Cellphones, Stingrays, And Searches! An Inquiry Into The Legality Of Cellular Location Information, Jeremy H. D'Amico
University of Miami Law Review
Can the Fourth Amendment protect an individual’s right privacy by preventing the disclosure of her location through cell site location information? Does it currently? Should it? Many court opinions answer these questions in both the affirmative and the negative. The rationale underlying each conclusion is disparate. Some rely on statutory regimes, others rely on the United States Supreme Court’s interpretation of reasonableness. However, Cell Site Location Information is a technology that requires uniformity in its interpretation. This note investigates the different interpretations of the Fourth Amendment as it relates to Cell Site Location Information. It explains the technology behind Cell …
Wearable Fitness Devices: Personal Health Data Privacy In Washington State, Steven Spann
Wearable Fitness Devices: Personal Health Data Privacy In Washington State, Steven Spann
Seattle University Law Review
Private entities are increasingly targeting individuals in the United States and around the world to gather personal data for such purposes as product development, market identification, and insurance risk assessment. While credit card records and online browsing histories have long been the medium through which this data is gathered, in more recent years, wearable fitness devices have added a new dimension to data production and collection. These devices are capable of gathering a significant amount of data regarding a person’s physical and physiological characteristics, thereby exposing these data producers to personal privacy infringement. Washington State lawmakers and citizens must be …
The Two Faces Of The Foreign Intelligence Surveillance Court, Emily Berman
The Two Faces Of The Foreign Intelligence Surveillance Court, Emily Berman
Indiana Law Journal
When former National Security Agency contractor Edward Snowden leaked a massive trove of information about secret intelligence-collection programs implemented under the Foreign Intelligence Surveillance Act in the summer of 2013, U.S. surveillance activities were thrust to the forefront of public debate. This debate included the question of whether and how to reform the Foreign Intelligence Surveillance Court (“FISA Court”), the statutorily created secret court that reviews government applications to conduct surveillance in the United States. This discussion, however, has underemphasized a critical feature of the way the FISA Court works. As this Article will show, since the terrorist attacks of …
Taking A Bite Out Of Michael Vick's Publicity Rights: An Analysis Of How Teh Right Of Publicity Should Be Treated After A Celebrity Is Convicted Of A Crime, Stephen Reginald Fowler
Taking A Bite Out Of Michael Vick's Publicity Rights: An Analysis Of How Teh Right Of Publicity Should Be Treated After A Celebrity Is Convicted Of A Crime, Stephen Reginald Fowler
Journal of Intellectual Property Law
No abstract provided.
Rights Of Publicity: A Practitioner's Enigma, Gil N. Peles Esq.
Rights Of Publicity: A Practitioner's Enigma, Gil N. Peles Esq.
Journal of Intellectual Property Law
No abstract provided.
Beyond Irbs: Ethical Guidelines For Data Research, Omer Tene, Jules Polonetsky
Beyond Irbs: Ethical Guidelines For Data Research, Omer Tene, Jules Polonetsky
Washington and Lee Law Review Online
No abstract provided.
Strategies For Protecting Privacy In Open Data And Proactive Disclosure, Teresa Scassa, Amy Conroy
Strategies For Protecting Privacy In Open Data And Proactive Disclosure, Teresa Scassa, Amy Conroy
Canadian Journal of Law and Technology
In this paper, the authors explore strategies for balancing privacy with transparency in the release of government data and information as part of the growing global open government movement. The issue is important because government data or information may take many forms, may contain many different types of personal information, and may be released in a range of contexts. The legal framework is complex: personal information is typically not released as open data or under access to information regimes; nevertheless, in some cases transparency requirements take precedence over the protection of personal information. The open courts principle, for example, places …
Electronic Devices At The Border: The Next Frontier Of Canadian Search And Seizure Law?, Robert J. Currie
Electronic Devices At The Border: The Next Frontier Of Canadian Search And Seizure Law?, Robert J. Currie
Canadian Journal of Law and Technology
Over the last several years the Supreme Court of Canada has developed its jurisprudence regarding the search and seizure of electronic devices, applying section 8 of the Canadian Charter of Rights and Freedoms in such a way as to assert and protect a significant amount of privacy in the devices and their data. Recent cases regarding the search of devices at Canada’s borders, however, do not reflect this case law. This is a situation made all the more complex by the generally attenuated expectation of privacy in the border context, and is worthy of inquiry.
Using a pending border case …
Aereo Dynamics: "User Rights" And The Future Of Internet Retransmission In Canada, Pradeepan K. Sarma
Aereo Dynamics: "User Rights" And The Future Of Internet Retransmission In Canada, Pradeepan K. Sarma
Canadian Journal of Law and Technology
2014’s U.S. Supreme Court decision Aereo made waves in the entertainment and technology industry when it ruled in favour of a coterie of cable companies against an upstart start-up, Aereo Inc., retransmitting broadcast television over the internet. Little attention, however, has been paid to its ramifications to the Canadian broadcasting regime, with its vastly different regulatory scheme and an underlying objective to promote the dissemination of Canadian content. Complicating matters further is the 2012 Canadian Supreme Court decision Cogeco, where the retransmission of broadcast signals had been re-articulated as a ’user right’. This paper uses the Aereo decision as a …