Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Privacy Law

Series

2014

Institution
Keyword
Publication

Articles 1 - 30 of 70

Full-Text Articles in Law

Promoting Innovation While Preventing Discrimination: Policy Goals For The Scored Society, Danielle K. Citron, Frank Pasquale Dec 2014

Promoting Innovation While Preventing Discrimination: Policy Goals For The Scored Society, Danielle K. Citron, Frank Pasquale

Faculty Scholarship

There are several normative theories of jurisprudence supporting our critique of the scored society, which complement the social theory and political economy presented in our 2014 article on that topic in the Washington Law Review. This response to Professor Tal Zarsky clarifies our antidiscrimination argument while showing that is only one of many bases for the critique of scoring practices. The concerns raised by Big Data may exceed the capacity of extant legal doctrines. Addressing the potential injustice may require the hard work of legal reform.


Regulating Aerial Photography And Videography Proportionately: Some Thoughts On The Sal Seminar “Droning On About Journalism – Remotely Piloted Aircraft, Newsgathering, And Law”, Siyuan Chen Nov 2014

Regulating Aerial Photography And Videography Proportionately: Some Thoughts On The Sal Seminar “Droning On About Journalism – Remotely Piloted Aircraft, Newsgathering, And Law”, Siyuan Chen

Research Collection Yong Pung How School Of Law

The concept and practice of aerial photography and videography have been around for some time. But it was only in the last few years that such media production via remote means has achieved mainstream use. The convergence of cutting-edge technological developments in gyroscopic gimbals, far-range wireless transmissions, GPS-enablement in stabilisation, compact devices producing digital image quality and so forth has led to the proliferation of affordable camera-carrying “drones” that even hobbyists can pilot reasonably well with ease. Thus far, there have not been any reports of serious mishaps involving the use of these rotor-propelled copters. However, the controversial appellation inaccurately …


Celebrity Nude Photo Leak: Just One More Reminder That Privacy Does Not Exist Online And Legally, There’S Not Much We Can Do About It, Laurel O'Connor Oct 2014

Celebrity Nude Photo Leak: Just One More Reminder That Privacy Does Not Exist Online And Legally, There’S Not Much We Can Do About It, Laurel O'Connor

GGU Law Review Blog

No abstract provided.


Self, Privacy, And Power: Is It All Over?, Richard Warner, Robert H. Sloan Oct 2014

Self, Privacy, And Power: Is It All Over?, Richard Warner, Robert H. Sloan

All Faculty Scholarship

The realization of a multifaceted self is an ideal one strives to realize. One realizes such a self in large part through interaction with others in various social roles. Such realization requires a significant degree of informational privacy. Informational privacy is the ability to determine for yourself when others may collect and how they may use your information. The realization of multifaceted selves requires informational privacy in public. There is no contradiction here: informational privacy is a matter of control, and you can have such control in public. Current information processing practices greatly reduce privacy in public thereby threatening the …


Beyond The Schoolhouse Gates: The Unprecedented Expansion Of School Surveillance Authority Under Cyberbullying Laws, Emily F. Suski Oct 2014

Beyond The Schoolhouse Gates: The Unprecedented Expansion Of School Surveillance Authority Under Cyberbullying Laws, Emily F. Suski

Faculty Publications By Year

For several years, states have grappled with the problem of cyberbullying and its sometimes devastating effects. Because cyberbullying often occurs between students, most states have understandably looked to schools to help address the problem. To that end, schools in forty-six states have the authority to intervene when students engage in cyberbullying. This solution seems all to the good unless a close examination of the cyberbullying laws and their implications is made. This Article explores some of the problematic implications of the cyberbullying laws. More specifically, it focuses on how the cyberbullying laws allow schools unprecedented surveillance authority over students. This …


Interview On The Black Box Society, Lawrence Joseph, Frank A. Pasquale Sep 2014

Interview On The Black Box Society, Lawrence Joseph, Frank A. Pasquale

Faculty Scholarship

Hidden algorithms drive decisions at major Silicon Valley and Wall Street firms. Thanks to automation, those firms can approve credit, rank websites, and make myriad other decisions instantaneously. But what are the costs of their methods? And what exactly are they doing with their digital profiles of us?

Leaks, whistleblowers, and legal disputes have shed new light on corporate surveillance and the automated judgments it enables. Self-serving and reckless behavior is surprisingly common, and easy to hide in code protected by legal and real secrecy. Even after billions of dollars of fines have been levied, underfunded regulators may have only …


Summary Of Franchise Tax Board Of The State Of California V. Hyatt, 130 Nev. Adv. Op. 71, Stacy Newman, Jennifer Odell, Jaymes Orr, Patrick Phippen Sep 2014

Summary Of Franchise Tax Board Of The State Of California V. Hyatt, 130 Nev. Adv. Op. 71, Stacy Newman, Jennifer Odell, Jaymes Orr, Patrick Phippen

Nevada Supreme Court Summaries

The Court (1) affirmed the intentional tort and bad faith exceptions to discretionary-function immunity under NRS 41.032; (2) recognized the common law tort of publicity in a false light; (3) adopted the sliding-scale approach to proving a claim of intentional infliction of emotional distress; (4) determined comity does not demand granting immunity from suit to foreign state government agencies if immunity would be available under that state’s laws, but not under Nevada law; and (5) determined comity does not require extending statutory caps to foreign state government agencies even if provided by law to Nevada government agencies.


Doctor, Doctor, Mr. M.D.: Dr./Patient Privilege In Mt, Cynthia Ford Sep 2014

Doctor, Doctor, Mr. M.D.: Dr./Patient Privilege In Mt, Cynthia Ford

Faculty Journal Articles & Other Writings

No abstract provided.


The Meaning And Scope Of Personal Data Under The Singapore Data Protection Act, Warren B. Chik, Keep Ying Joey Pang Sep 2014

The Meaning And Scope Of Personal Data Under The Singapore Data Protection Act, Warren B. Chik, Keep Ying Joey Pang

Research Collection Yong Pung How School Of Law

It is important to examine and determine the meaning of “personal data” as it is the subject matter of the Singapore Data Protection regime. What constitutes “personal data” determines the scope of the Personal Data Protection Act. Although it is defined under the Act, the experience in other jurisdictions has shown that the elements of that (and other forms of ) definition can still give rise to some difficulty in its application to specific cases. In this paper, the authors aim to provide some guidance and recommendations for the interpretation of “personal data” within the context of legislative intent and …


More Than Meets The Eye With New Google Contact Lenses, Alec Wheatley Aug 2014

More Than Meets The Eye With New Google Contact Lenses, Alec Wheatley

GGU Law Review Blog

Technology informs privacy. This is the lesson we relearn every time a company puts out a new product that changes the way we interact with the world and each other. The recent disclosure of Google’s filings with the United States Patent and Trademark Office last year for a contact-embedded “image capture component” (read: camera) caused a flurry of commentary by privacy hawks and tech fans alike.

This raises the question: if the contacts are invisible to others so that it’s impossible to know if someone is wearing them, how can you know if they are being used to record you …


The Pclob On Human Rights & 702: Punt Or Long Game?, Peter Margulies Jul 2014

The Pclob On Human Rights & 702: Punt Or Long Game?, Peter Margulies

Law Faculty Scholarship

No abstract provided.


Systematic Ict Surveillance By Employers: Are Your Personal Activities Private?, Arlene J. Nicholas Jul 2014

Systematic Ict Surveillance By Employers: Are Your Personal Activities Private?, Arlene J. Nicholas

Faculty and Staff - Articles & Papers

This paper reviews the various methods of information and communications technology (ICT) that is used by employers to peer into the work lives and, in some cases, private lives of employees. Some of the most common methods – such as computer and Internet monitoring, video surveillance, and global positioning systems (GPS) – have resulted in employee disciplines that have been challenged in courts. This paper provides background information on United States (U.S.) laws and court cases which, in this age of easily accessible information, mostly support the employer. Assessments regarding regulations and policies, which will need to be continually updated …


Criminalizing Revenge Porn, Danielle K. Citron, Mary Anne Franks Jul 2014

Criminalizing Revenge Porn, Danielle K. Citron, Mary Anne Franks

Faculty Scholarship

Violations of sexual privacy, notably the non-consensual publication of sexually graphic images in violation of someone's trust, deserve criminal punishment. They deny subjects' ability to decide if and when they are sexually exposed to the public and undermine trust needed for intimate relationships. Then too they produce grave emotional and dignitary harms, exact steep financial costs, and increase the risks of physical assault. A narrowly and carefully crafted criminal statute can comport with the First Amendment. The criminalization of revenge porn is necessary to protect against devastating privacy invasions that chill self-expression and ruin lives.


Deconstructing The Relationship Between Privacy And Security [Viewpoint], Gregory Conti, Lisa A. Shay, Woodrow Hartzog Jul 2014

Deconstructing The Relationship Between Privacy And Security [Viewpoint], Gregory Conti, Lisa A. Shay, Woodrow Hartzog

Faculty Scholarship

From a government or law-enforcement perspective, one common model of privacy and security postulates that security and privacy are opposite ends of a single continuum. While this model has appealing properties, it is overly simplistic. The relationship between privacy and security is not a binary operation in which one can be traded for the other until a balance is found. One fallacy common in privacy and security discourse is that trade-offs are effective or even necessary. Consider the remarks of New York Police Department Commissioner Ray Kelly shortly after the Boston Marathon bombing, “I'm a major proponent of cameras. I …


Yale Symposium: Unpacking Nsa's Global Problem, Peter Margulies Apr 2014

Yale Symposium: Unpacking Nsa's Global Problem, Peter Margulies

Law Faculty Scholarship

No abstract provided.


A Thoery Of Redressive Justice, Andrew S. Gold Apr 2014

A Thoery Of Redressive Justice, Andrew S. Gold

Faculty Scholarship

No abstract provided.


Scandal - Early Supreme Court News Coverage And The Justice-Journalist Divide, Amy Gajda Apr 2014

Scandal - Early Supreme Court News Coverage And The Justice-Journalist Divide, Amy Gajda

Faculty Scholarship

No abstract provided.


The Right To Be Let Alone: The Kansas Right Of Privacy, J. Lyn Entrikin Apr 2014

The Right To Be Let Alone: The Kansas Right Of Privacy, J. Lyn Entrikin

Faculty Scholarship

No abstract provided.


The Singapore Do Not Call Register And The Text And Fax Exemption Order, Warren B. Chik Mar 2014

The Singapore Do Not Call Register And The Text And Fax Exemption Order, Warren B. Chik

Research Collection Yong Pung How School Of Law

The introduction of a text and fax exemption to the general “opt out” effect of the Do Not Call Registry have led to a debate over the effectiveness of the Registry in filtering out unwanted communication to telephone users. This article provides the background for the Registry and the reasons for the backlash as well as for the exemption. It will explain why the exemption is consistent with the existing policy towards, and legal treatment of text-based messages, but nevertheless question whether the distinction between voice and text-based messages is justified given the overall objective of the Personal Data Protection …


Of Relevance And Reform Under Section 215, Peter Margulies Feb 2014

Of Relevance And Reform Under Section 215, Peter Margulies

Law Faculty Scholarship

No abstract provided.


The 1 Percent Solution: Corporate Tax Returns Should Be Public (And How To Get There), Reuven S. Avi-Yonah, Ariel Siman Feb 2014

The 1 Percent Solution: Corporate Tax Returns Should Be Public (And How To Get There), Reuven S. Avi-Yonah, Ariel Siman

Articles

The justification for publishing corporate tax returns is that corporations are given immense benefits by the state that bestows upon them unlimited life and limited liability, and therefore they owe the public the information of how they treat the state that created them. Tax returns, like the financial disclosures that publicly traded corporations must file with the SEC, also provide useful information to shareholders, creditors, and the investing public.


Metadata: Piecing Together A Privacy Solution, Chris Conley Feb 2014

Metadata: Piecing Together A Privacy Solution, Chris Conley

Faculty Scholarship

Imagine the government is constantly monitoring you — keeping track of every person you call or email, every place you go, everything you buy, and more — all without getting a warrant. And when you challenge them, they claim you have no right to expect this kind of information to be private. Besides, they’re not actually listening to what you say or reading what you write, so what’s the big deal anyhow?

Unfortunately, this scenario is more real than imaginary. Government agencies ranging from the NSA to local police departments have taken advantage of weak or uncertain legal protections for …


Fisc Query Preapproval: Intelligence Burden Or Bump In The Road?, Peter Margulies Jan 2014

Fisc Query Preapproval: Intelligence Burden Or Bump In The Road?, Peter Margulies

Law Faculty Scholarship

No abstract provided.


Online Privacy. Initiative Statute. Jan 2014

Online Privacy. Initiative Statute.

Initiatives

Requires certain providers of Internet services or mobile applications to comply with a user’s instructions not to track user’s personal information, including contact information, government issued identification, financial information, online history, method of access, or location. Prohibits all providers from selling,sharing, or transferring user’s personal information after receiving instructions not to track. Prohibits providers serving public entities or private educational entities from using personal information for any purpose other than providing the service. Prohibits requiring user’s consent to track personal information as a condition of access to online service. Provides for fines and civil claims. Summary of estimate by Legislative …


Anonymity, Faceprints, And The Constitution, Kimberly L. Wehle Jan 2014

Anonymity, Faceprints, And The Constitution, Kimberly L. Wehle

All Faculty Scholarship

Part I defines anonymity and explains that respect for the capacity to remain physically and psychologically unknown to the government traces back to the Founding. With the advent and expansion of new technologies such as facial recognition technology (“FRT”), the ability to remain anonymous has eroded, leading to a litany of possible harms.

Part II reviews the existing Fourth and First Amendment doctrine that is available to stave off ubiquitous government surveillance and identifies anonymity as a constitutional value that warrants more explicit doctrinal protection. Although the Fourth Amendment has been construed to excise surveillance of public and third-party information …


Intellectual Property’S Lessons For Information Privacy, Mark Bartholomew Jan 2014

Intellectual Property’S Lessons For Information Privacy, Mark Bartholomew

Journal Articles

There is an inherent tension between an individual’s desire to safeguard her personal information and the expressive rights of businesses seeking to communicate that information to others. This tension has multiplied as consumers generate and businesses collect more and more personal data online, forcing efforts to strike an appropriate balance between privacy and commercial speech. No consensus on this balance has been reached. Some privacy scholars bemoan what they see as a slanted playing field in favor of those wishing to profit from the private details of other people’s lives. Others contend that the right in free expression must always …


When Enough Is Enough: Location Tracking, Machine Learning And The Mosaic Theory, Renee Mcdonald Hutchins, Steve Bellovin, Tony Jebara, Sebastian Zimmeck Jan 2014

When Enough Is Enough: Location Tracking, Machine Learning And The Mosaic Theory, Renee Mcdonald Hutchins, Steve Bellovin, Tony Jebara, Sebastian Zimmeck

Journal Articles

Since 1967, when it decided Katz v. United States, the Supreme Court has tied the right to be free of unwanted government scrutiny to the concept of reasonable expectations of privacy.1 An evaluation of reasonable expectations depends, among other factors, upon an assessment of the intrusiveness of government action. When making such assessment historically the Court considered police conduct with clear temporal, geographic, or substantive limits. However, in an era where new technologies permit the storage and compilation of vast amounts of personal data, things are becoming more complicated. A school of thought known as “mosaic theory” has stepped into …


Data Protection In The European Union: A Closer Look At The Current Patchwork Of Data Protection Laws And The Proposed Reform That Could Replace Them All, Christina Glon Jan 2014

Data Protection In The European Union: A Closer Look At The Current Patchwork Of Data Protection Laws And The Proposed Reform That Could Replace Them All, Christina Glon

Faculty Articles

Laws protecting a European's right to control the flow of their own personal data (also known as "data privacy") date back as early as 1950. In the 65 years since the Council of Europe declared that every person has the fundamental "right to respect for his private and family life, his home and his correspondence," a patchwork of conventions, directives, treaties and communications have been created to ensure the ongoing protection of this right. However, in recent years, this patchwork approach has been unable to keep up with the pace of technology and has created confusion and concern for the …


When Enough Is Enough: Location Tracking, Mosaic Theory, And Machine Learning, Steven M. Bellovin, Renée M. Hutchins, Tony Jebara, Sebastian Zimmeck Jan 2014

When Enough Is Enough: Location Tracking, Mosaic Theory, And Machine Learning, Steven M. Bellovin, Renée M. Hutchins, Tony Jebara, Sebastian Zimmeck

Faculty Scholarship

Since 1967, when it decided Katz v. United States, the Supreme Court has tied the right to be free of unwanted government scrutiny to the concept of reasonable xpectations of privacy.[1] An evaluation of reasonable expectations depends, among other factors, upon an assessment of the intrusiveness of government action. When making such assessment historically the Court has considered police conduct with clear temporal, geographic, or substantive limits. However, in an era where new technologies permit the storage and compilation of vast amounts of personal data, things are becoming more complicated. A school of thought known as “mosaic theory” …


Big Data's Other Privacy Problem, James Grimmelmann Jan 2014

Big Data's Other Privacy Problem, James Grimmelmann

Faculty Scholarship

Big Data has not one privacy problem, but two. We are accustomed to talking about surveillance of data subjects. But Big Data also enables disconcertingly close surveillance of its users. The questions we ask of Big Data can be intensely revealing, but, paradoxically, protecting subjects' privacy can require spying on users. Big Data is an ideology of technology, used to justify the centralization of information and power in data barons, pushing both subjects and users into a kind of feudal subordination. This short and polemical essay uses the Bloomberg Terminal scandal as a window to illuminate Big Data's other privacy …