Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Boston University School of Law (9)
- Maurer School of Law: Indiana University (6)
- University of Maryland Francis King Carey School of Law (6)
- Fordham Law School (4)
- Roger Williams University (4)
-
- University of Pennsylvania Carey Law School (4)
- Washington University in St. Louis (4)
- Brooklyn Law School (3)
- Columbia Law School (3)
- Singapore Management University (3)
- University of Washington School of Law (3)
- Golden Gate University School of Law (2)
- Notre Dame Law School (2)
- Schulich School of Law, Dalhousie University (2)
- Boise State University (1)
- Chicago-Kent College of Law (1)
- Duke Law (1)
- Emory University School of Law (1)
- Florida State University College of Law (1)
- Georgia State University College of Law (1)
- Salve Regina University (1)
- UC Law SF (1)
- UIC School of Law (1)
- University at Buffalo School of Law (1)
- University of Arkansas at Little Rock William H. Bowen School of Law (1)
- University of Baltimore Law (1)
- University of Colorado Law School (1)
- University of Michigan Law School (1)
- University of Montana (1)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (1)
- Keyword
-
- Privacy (30)
- Surveillance (15)
- Big Data (7)
- First Amendment (6)
- Fourth Amendment (5)
-
- Internet (5)
- Data privacy (4)
- Data protection (4)
- FISA (4)
- NSA (4)
- Big data (3)
- Discrimination (3)
- FTC (3)
- 215 Collection (2)
- Constitution (2)
- Constitutional law (2)
- Contract (2)
- Copyright (2)
- Cyberlaw (2)
- Data (2)
- Data mining (2)
- Data security (2)
- Disclosure (2)
- Facebook (2)
- Google (2)
- Innovation (2)
- Intellectual property (2)
- Internet metadata collection (2)
- Invasion of privacy (2)
- Personal data (2)
- Publication
-
- Faculty Scholarship (27)
- All Faculty Scholarship (6)
- Articles by Maurer Faculty (6)
- Articles (4)
- Journal Articles (4)
-
- Law Faculty Scholarship (4)
- Scholarship@WashULaw (4)
- Research Collection Yong Pung How School Of Law (3)
- Articles, Book Chapters, & Popular Press (2)
- GGU Law Review Blog (2)
- Communication (1)
- Faculty Articles (1)
- Faculty Journal Articles & Other Writings (1)
- Faculty Publications By Year (1)
- Faculty and Staff - Articles & Papers (1)
- Initiatives (1)
- Management Faculty Publications and Presentations (1)
- Nevada Supreme Court Summaries (1)
- Publications (1)
- Scholarly Publications (1)
- UIC Law Open Access Faculty Scholarship (1)
- Vanderbilt Law School Faculty Publications (1)
Articles 31 - 60 of 74
Full-Text Articles in Law
Promoting Innovation While Preventing Discrimination: Policy Goals For The Scored Society, Frank A. Pasquale, Danielle Keats Citron
Promoting Innovation While Preventing Discrimination: Policy Goals For The Scored Society, Frank A. Pasquale, Danielle Keats Citron
Faculty Scholarship
There are several normative theories of jurisprudence supporting our critique of the scored society, which complement the social theory and political economy presented in our 2014 article on that topic in the Washington Law Review. This response to Professor Tal Zarsky clarifies our antidiscrimination argument while showing that is only one of many bases for the critique of scoring practices. The concerns raised by Big Data may exceed the capacity of extant legal doctrines. Addressing the potential injustice may require the hard work of legal reform.
Protecting Health Privacy In An Era Of Big Data Processing And Cloud Computing, Frank A. Pasquale, Tara Adams Ragone
Protecting Health Privacy In An Era Of Big Data Processing And Cloud Computing, Frank A. Pasquale, Tara Adams Ragone
Faculty Scholarship
This Article examines how new technologies generate privacy challenges for both healthcare providers and patients, and how American health privacy laws may be interpreted or amended to address these challenges. Given the current implementation of Meaningful Use rules for health information technology and the Omnibus HIPAA Rule in health care generally, the stage is now set for a distinctive law of “health information” to emerge. HIPAA has come of age of late, with more aggressive enforcement efforts targeting wayward healthcare providers and entities. Nevertheless, more needs to be done to assure that health privacy and all the values it is …
Here We Are Now, Entertain Us: Defining The Line Between Personal And Professional Context On Social Media, 35 Pace L. Rev. 398 (2014), Raizel Liebler, Keidra Chaney
Here We Are Now, Entertain Us: Defining The Line Between Personal And Professional Context On Social Media, 35 Pace L. Rev. 398 (2014), Raizel Liebler, Keidra Chaney
UIC Law Open Access Faculty Scholarship
Social media platforms such as Facebook, Twitter, and Instagram allow individuals and companies to connect directly and regularly with an audience of peers or with the public at large. These websites combine the audience-building platforms of mass media with the personal data and relationships of in-person social networks. Due to a combination of evolving user activity and frequent updates to functionality and user features, social media tools blur the line of whether a speaker is perceived as speaking to a specific and presumed private audience, a public expression of one’s own personal views, or a representative viewpoint of an entire …
The Child Independence Is Born: James Otis And Writs Of Assistance, James M. Farrell
The Child Independence Is Born: James Otis And Writs Of Assistance, James M. Farrell
Communication
This chapter is a reexamination of the Writs of Assistance speech by James Otis. In particular, it is a reconsideration of the evidence upon which rests the historical reputation of Otis’s address. Are the claims by historians who credit Otis with sparking the Revolutionary movement in colonial America warranted or not? That reassessment begins with a detailed review of the nature and function of writs of assistance within the political, legal, and economic environment of colonial Massachusetts. It then turns to an analysis of the legal dispute over writs of assistance in the 1761 trial. From there we will reconstruct …
Politics And The Public’S Right To Know, Lloyd Hitoshi Mayer
Politics And The Public’S Right To Know, Lloyd Hitoshi Mayer
Journal Articles
In the United States it is taken for granted that members of the public should have access to information about their government. This access takes many forms, including the ability to obtain copies of government documents, the ability to attend meetings of government officials, and the related obligations of government officials to document their activities and to reveal certain otherwise private information about themselves. This access also is often limited by countervailing concerns, such as the privacy of individual citizens and national security. Nevertheless, the presumption both at the federal level and in every state is to provide such access. …
Note, Institutionally Appropriate Approaches To Privacy: Striking A Balance Between Judicial And Administrative Enforcement Of Privacy Law, Lauren Henry Scholz
Note, Institutionally Appropriate Approaches To Privacy: Striking A Balance Between Judicial And Administrative Enforcement Of Privacy Law, Lauren Henry Scholz
Scholarly Publications
No abstract provided.
Intellectual Property’S Lessons For Information Privacy, Mark Bartholomew
Intellectual Property’S Lessons For Information Privacy, Mark Bartholomew
Journal Articles
There is an inherent tension between an individual’s desire to safeguard her personal information and the expressive rights of businesses seeking to communicate that information to others. This tension has multiplied as consumers generate and businesses collect more and more personal data online, forcing efforts to strike an appropriate balance between privacy and commercial speech. No consensus on this balance has been reached. Some privacy scholars bemoan what they see as a slanted playing field in favor of those wishing to profit from the private details of other people’s lives. Others contend that the right in free expression must always …
Employee Internet Privacy: A Proposed Act That Balances Legitimate Employer Rights And Employee Privacy, Susan Park
Employee Internet Privacy: A Proposed Act That Balances Legitimate Employer Rights And Employee Privacy, Susan Park
Management Faculty Publications and Presentations
When Justin Basset interviewed for a job in New York City in 2012, he expected to respond to questions one is typically asked in a job interview. However, his interview took a modern technological twist when the interviewer opened her computer and attempted to look at Mr. Basset’s Facebook profile on her computer. Unable to see the details of his profile because he had taken advantage of Facebook’s privacy options to limit public viewing, she asked for his login information to access his account. He declined and withdrew his application.1 In 2010, Robert Collins, a Maryland Department of Public …
Governing, Exchanging, Securing: Big Data And The Production Of Digital Knowledge, Bernard E. Harcourt
Governing, Exchanging, Securing: Big Data And The Production Of Digital Knowledge, Bernard E. Harcourt
Faculty Scholarship
The emergence of Big Data challenges the conventional boundaries between governing, exchange, and security. It ambiguates the lines between commerce and surveillance, between governing and exchanging, between democracy and the police state. The new digital knowledge reproduces consuming subjects who wittingly or unwittingly allow themselves to be watched, tracked, linked and predicted in a blurred amalgam of commercial and governmental projects. Linking back and forth from consumer data to government information to social media, these new webs of information become available to anyone who can purchase the information. How is it that governmental, commercial and security interests have converged, coincided, …
Digital Security In The Expository Society: Spectacle, Surveillance, And Exhibition In The Neoliberal Age Of Big Data, Bernard E. Harcourt
Digital Security In The Expository Society: Spectacle, Surveillance, And Exhibition In The Neoliberal Age Of Big Data, Bernard E. Harcourt
Faculty Scholarship
In 1827, Nicolaus Heinrich Julius, a professor at the University of Berlin, identified an important architectural mutation in nineteenth-century society that reflected a deep disruption in our technologies of knowledge and a profound transformation in relations of power across society: Antiquity, Julius observed, had discovered the architectural form of the spectacle; but modern times had operated a fundamental shift from spectacle to surveillance. Michel Foucault would elaborate this insight in his 1973 Collège de France lectures on The Punitive Society, where he would declare: “[T]his is precisely what happens in the modern era: the reversal of the spectacle into surveillance…. …
Hands Off Our Fingerprints: State, Local, Andindividual Defiance Of Federal Immigrationenforcement, Christine N. Cimini
Hands Off Our Fingerprints: State, Local, Andindividual Defiance Of Federal Immigrationenforcement, Christine N. Cimini
Articles
Secure Communities, though little-known outside law-enforcement circles, is one of the most powerful of the federal government’s immigration enforcement programs. Under Secure Communities, fingerprints collected by state and local law enforcement and provided to the Federal Bureau of Investigation for criminal background checks are automatically shared with the Department of Homeland Security, which checks the fingerprints against its immigration database. In the event of a match, an immigration detainer can be issued and an individual held after they would otherwise be entitled to release. Originally designed as a voluntary program in which local governments could choose to participate, the Department …
Privacy Harm Exceptionalism, Ryan Calo
Privacy Harm Exceptionalism, Ryan Calo
Articles
“Exceptionalism” refers to the belief that a person, place, or thing is qualitatively different from others in the same basic category. Thus, some have spoken of America’s exceptionalism as a nation. Early debates about the Internet focused on the prospect that existing laws and institutions would prove inadequate to govern the new medium of cyberspace. Scholars have made similar claims about other areas of law.
The focus of this short essay is the supposed exceptionalism of privacy. Rather than catalogue all the ways that privacy might differ from other concepts or areas of study, I intend to focus on the …
The Data Surveillance State In Europe And The United States, Joel R. Reidenberg
The Data Surveillance State In Europe And The United States, Joel R. Reidenberg
Faculty Scholarship
No abstract provided.
Rethinking Privacy, William H. Simon
Rethinking Privacy, William H. Simon
Faculty Scholarship
Anxiety about surveillance and data mining has led many to embrace implausibly expansive and rigid conceptions of privacy. The premises of some current privacy arguments do not fit well with the broader political commitments of those who make them. In particular, liberals seem to have lost touch with the reservations about privacy expressed in the social criticism of some decades ago. They seem unable to imagine that preoccupation with privacy might amount to a “pursuit of loneliness” or how “eyes on the street” might have reassuring connotations. Without denying the importance of the effort to define and secure privacy values, …
Systematic Government Access To Private-Sector Data Redux, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Systematic Government Access To Private-Sector Data Redux, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
Cause To Believe What? The Importance Of Defining A Search's Object--Or, How The Aba Would Analyze The Nsa Metadata Surveillance Program, Christopher Slobogin
Cause To Believe What? The Importance Of Defining A Search's Object--Or, How The Aba Would Analyze The Nsa Metadata Surveillance Program, Christopher Slobogin
Vanderbilt Law School Faculty Publications
Courts and scholars have devoted considerable attention to the definition of probable cause and reasonable suspicion. Since the demise of the mere evidence rule in the 1960s, however, they have rarely examined how these central Fourth Amendment concepts interact with the object of the search. That is unfortunate, because this interaction can have significant consequences. For instance, probable cause to believe that a search might lead to evidence of wrongdoing triggers a very different inquiry than probable cause to believe that a search will produce evidence of criminal activity. The failure to address the constraints that should be imposed on …
Private Law In The Gaps, Jeffrey A. Pojanowski
Private Law In The Gaps, Jeffrey A. Pojanowski
Journal Articles
Private law subjects like tort, contract, and property are traditionally taken to be at the core of the common law tradition, yet statutes increasingly intersect with these bodies of doctrine. This Article draws on recent work in private law theory and statutory interpretation to consider afresh what courts should do with private law in statutory gaps. In particular, it focuses on statutes touching on tort law, a field at the leading edge of private law theory. This Article's analysis unsettles some conventional wisdom about the intersection of private law and statutes. Many leading tort scholars and jurists embrace a regulatory …
Regulating The Internet Of Things: First Steps Toward Managing Discrimination, Privacy, Security, And Consent, Scott R. Peppet
Regulating The Internet Of Things: First Steps Toward Managing Discrimination, Privacy, Security, And Consent, Scott R. Peppet
Publications
The consumer "Internet of Things" is suddenly reality, not science fiction. Electronic sensors are now ubiquitous in our smartphones, cars, homes, electric systems, health-care devices, fitness monitors, and workplaces. These connected, sensor-based devices create new types and unprecedented quantities of detailed, high-quality information about our everyday actions, habits, personalities, and preferences. Much of this undoubtedly increases social welfare. For example, insurers can price automobile coverage more accurately by using sensors to measure exactly how you drive (e.g., Progressive 's Snapshot system), which should theoretically lower the overall cost of insurance. But the Internet of Things raises new and difficult questions …
A Corporate Right To Privacy, Elizabeth Pollman
A Corporate Right To Privacy, Elizabeth Pollman
All Faculty Scholarship
The debate over the scope of constitutional protections for corporations has exploded with commentary on recent or pending Supreme Court cases, but scholars have left unexplored some of the hardest questions for the future, and the ones that offer the greatest potential for better understanding the nature of corporate rights. This Article analyzes one of those questions — whether corporations have, or should have, a constitutional right to privacy. First, the Article examines the contours of the question in Supreme Court jurisprudence and provides the first scholarly treatment of the growing body of conflicting law in the lower courts on …
Toward A Closer Integration Of Law And Computer Science, Christopher S. Yoo
Toward A Closer Integration Of Law And Computer Science, Christopher S. Yoo
All Faculty Scholarship
Legal issues increasingly arise in increasingly complex technological contexts. Prominent recent examples include the Stop Online Piracy Act (SOPA) and the Protect Intellectual Property Act (PIPA), network neutrality, the increasing availability of location information, and the NSA’s surveillance program. Other emerging issues include data privacy, online video distribution, patent policy, and spectrum policy. In short, the rapid rate of technological change has increasingly shown that law and engineering can no longer remain compartmentalized into separate spheres. The logical response would be to embed the interaction between law and policy deeper into the fabric of both fields. An essential step would …
Failing Expectations: Fourth Amendment Doctrine In The Era Of Total Surveillance, Olivier Sylvain
Failing Expectations: Fourth Amendment Doctrine In The Era Of Total Surveillance, Olivier Sylvain
Faculty Scholarship
Today’s reasonable expectation test and the third-party doctrine have little to nothing to offer by way of privacy protection if users today are at least conflicted about whether transactional noncontent data should be shared with third parties, including law enforcement officials. This uncertainty about how to define public expectation as a descriptive matter has compelled courts to defer to legislatures to find out what public expectation ought to be more as a matter of prudence than doctrine. Courts and others presume that legislatures are far better than courts at defining public expectations about emergent technologies.This Essay argues that the reasonable …
Beyond Title Vii: Rethinking Race, Ex-Offender Status, And Employment Discrimination In The Information Age, Kimani Paul-Emile
Beyond Title Vii: Rethinking Race, Ex-Offender Status, And Employment Discrimination In The Information Age, Kimani Paul-Emile
Faculty Scholarship
More than sixty-five million people in the United States—more than one in four adults—have had some involvement with the criminal justice system that will appear on a criminal history report. A rapidly expanding, for-profit industry has developed to collect these records and compile them into electronic databases, offering employers an inexpensive and readily accessible means of screening prospective employees. Nine out of ten employers now inquire into the criminal history of job candidates, systematically denying individuals with a criminal record any opportunity to gain work experience or build their job qualifications. This is so despite the fact that many individuals …
Empirical Analysis Of Data Breach Litigation, Sasha Romanosky, David A. Hoffman, Alessandro Acquisti
Empirical Analysis Of Data Breach Litigation, Sasha Romanosky, David A. Hoffman, Alessandro Acquisti
All Faculty Scholarship
In recent years, many lawsuits have been filed by individuals seeking legal redress for harms caused by the loss or theft of their personal information. However, very little is known about the drivers, mechanics, and outcomes of those lawsuits, making it difficult to assess the effectiveness of litigation at balancing organizations’ usage of personal data with individual privacy rights. Using a unique and manually-collected database, we analyze court dockets for over 230 federal data breach lawsuits from 2000 to 2010. We investigate two questions: Which data breaches are being litigated, and which data breach lawsuits are settling. Our results suggest …
Intellectual Freedom And Privacy, Neil M. Richards, Joanna Cornwell
Intellectual Freedom And Privacy, Neil M. Richards, Joanna Cornwell
Scholarship@WashULaw
This essay offers an account of the complex ways intellectual freedom and privacy are interrelated. We pay particular attention to both the constitutional dimensions of these important values, as well as the important roles that social and professional norms play in their protection in practice. Our examination of these issues is divided into three parts. Part I lays out the law and legal theory governing privacy as it relates to intellectual freedom. Part II examines a special context in which law and professional norms operate together to protect intellectual freedom through privacy–the library. Finally, Part III discusses how government actions …
Privacy In Public, Joel R. Reidenberg
Privacy In Public, Joel R. Reidenberg
Faculty Scholarship
As government and private companies rapidly expand the infrastructure of surveillance from cameras on every street corner to facial recognition for photographs on social media sites, privacy doctrines built on seclusion are at odds with technological advances. This essay addresses a key conceptual problem in US privacy law identified by Justice Sotomayor in U.S. v. Jones and by Justice Scalia in Kyllo v. U.S.; namely that technological capabilities undermine the meaning of the third-party doctrine and the 4th Amendment's ‘reasonable expectation of privacy’ standard. The essay argues that the conceptual problem derives from the evolution of three stages of development …
Four Privacy Myths, Neil M. Richards
Four Privacy Myths, Neil M. Richards
Scholarship@WashULaw
Any discussion about privacy today inevitably confronts a series of common arguments about the futility of privacy in our digital age. "Privacy is Dead," we hear, and "people (especially young ones) don’t care about privacy." What’s more, privacy just protects bad behavior because those of us with "nothing to hide have nothing to fear." And anyway, the argument goes, new privacy laws would be bad policy since "privacy is bad for business."
There are other common claims, but these four are perhaps the most common. They are also myths, and in this essay I show why. First, privacy can’t be …
Big Data Ethics, Neil M. Richards, Jonathan H. King
Big Data Ethics, Neil M. Richards, Jonathan H. King
Scholarship@WashULaw
We are on the cusp of a “Big Data” Revolution, in which increasingly large datasets are mined for important predictions and often surprising insights. The predictions and decisions this revolution will enable will transform our society in ways comparable to the Industrial Revolution. We are now at a critical moment; big data uses today will be sticky and will settle both default norms and public notions of what is “no big deal” regarding big data predictions for years to come.
In this paper, we argue that big data, broadly defined, is producing increased powers of institutional awareness and power that …
Watching The Watchers, Neil M. Richards
Watching The Watchers, Neil M. Richards
Scholarship@WashULaw
In this essay from Wired Magazine (UK)'s special edition, The Wired World in 2014, Prof. Richards argues that sousveillance–watching the watchers–is an important development that will be on the rise in 2014.
Panel Iii: The Future Of The Press And Privacy, Amy Gajda, Clay Calvert, Tom Bivins, Amy Sanders, Stephen Ward
Panel Iii: The Future Of The Press And Privacy, Amy Gajda, Clay Calvert, Tom Bivins, Amy Sanders, Stephen Ward
Faculty Scholarship
No abstract provided.
The Ftc And The New Common Law Of Privacy, Daniel J. Solove, Woodrow Hartzog
The Ftc And The New Common Law Of Privacy, Daniel J. Solove, Woodrow Hartzog
Faculty Scholarship
One of the great ironies about information privacy law is that the primary regulation of privacy in the United States has barely been studied in a scholarly way. Since the late 1990s, the Federal Trade Commission (FTC) has been enforcing companies’ privacy policies through its authority to police unfair and deceptive trade practices. Despite over fifteen years of FTC enforcement, there is no meaningful body of judicial decisions to show for it. The cases have nearly all resulted in settlement agreements. Nevertheless, companies look to these agreements to guide their privacy practices. Thus, in practice, FTC privacy jurisprudence has become …