Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Privacy Law

Series

2014

Institution
Keyword
Publication

Articles 31 - 60 of 74

Full-Text Articles in Law

Promoting Innovation While Preventing Discrimination: Policy Goals For The Scored Society, Frank A. Pasquale, Danielle Keats Citron Jan 2014

Promoting Innovation While Preventing Discrimination: Policy Goals For The Scored Society, Frank A. Pasquale, Danielle Keats Citron

Faculty Scholarship

There are several normative theories of jurisprudence supporting our critique of the scored society, which complement the social theory and political economy presented in our 2014 article on that topic in the Washington Law Review. This response to Professor Tal Zarsky clarifies our antidiscrimination argument while showing that is only one of many bases for the critique of scoring practices. The concerns raised by Big Data may exceed the capacity of extant legal doctrines. Addressing the potential injustice may require the hard work of legal reform.


Protecting Health Privacy In An Era Of Big Data Processing And Cloud Computing, Frank A. Pasquale, Tara Adams Ragone Jan 2014

Protecting Health Privacy In An Era Of Big Data Processing And Cloud Computing, Frank A. Pasquale, Tara Adams Ragone

Faculty Scholarship

This Article examines how new technologies generate privacy challenges for both healthcare providers and patients, and how American health privacy laws may be interpreted or amended to address these challenges. Given the current implementation of Meaningful Use rules for health information technology and the Omnibus HIPAA Rule in health care generally, the stage is now set for a distinctive law of “health information” to emerge. HIPAA has come of age of late, with more aggressive enforcement efforts targeting wayward healthcare providers and entities. Nevertheless, more needs to be done to assure that health privacy and all the values it is …


Here We Are Now, Entertain Us: Defining The Line Between Personal And Professional Context On Social Media, 35 Pace L. Rev. 398 (2014), Raizel Liebler, Keidra Chaney Jan 2014

Here We Are Now, Entertain Us: Defining The Line Between Personal And Professional Context On Social Media, 35 Pace L. Rev. 398 (2014), Raizel Liebler, Keidra Chaney

UIC Law Open Access Faculty Scholarship

Social media platforms such as Facebook, Twitter, and Instagram allow individuals and companies to connect directly and regularly with an audience of peers or with the public at large. These websites combine the audience-building platforms of mass media with the personal data and relationships of in-person social networks. Due to a combination of evolving user activity and frequent updates to functionality and user features, social media tools blur the line of whether a speaker is perceived as speaking to a specific and presumed private audience, a public expression of one’s own personal views, or a representative viewpoint of an entire …


The Child Independence Is Born: James Otis And Writs Of Assistance, James M. Farrell Jan 2014

The Child Independence Is Born: James Otis And Writs Of Assistance, James M. Farrell

Communication

This chapter is a reexamination of the Writs of Assistance speech by James Otis. In particular, it is a reconsideration of the evidence upon which rests the historical reputation of Otis’s address. Are the claims by historians who credit Otis with sparking the Revolutionary movement in colonial America warranted or not? That reassessment begins with a detailed review of the nature and function of writs of assistance within the political, legal, and economic environment of colonial Massachusetts. It then turns to an analysis of the legal dispute over writs of assistance in the 1761 trial. From there we will reconstruct …


Politics And The Public’S Right To Know, Lloyd Hitoshi Mayer Jan 2014

Politics And The Public’S Right To Know, Lloyd Hitoshi Mayer

Journal Articles

In the United States it is taken for granted that members of the public should have access to information about their government. This access takes many forms, including the ability to obtain copies of government documents, the ability to attend meetings of government officials, and the related obligations of government officials to document their activities and to reveal certain otherwise private information about themselves. This access also is often limited by countervailing concerns, such as the privacy of individual citizens and national security. Nevertheless, the presumption both at the federal level and in every state is to provide such access. …


Note, Institutionally Appropriate Approaches To Privacy: Striking A Balance Between Judicial And Administrative Enforcement Of Privacy Law, Lauren Henry Scholz Jan 2014

Note, Institutionally Appropriate Approaches To Privacy: Striking A Balance Between Judicial And Administrative Enforcement Of Privacy Law, Lauren Henry Scholz

Scholarly Publications

No abstract provided.


Intellectual Property’S Lessons For Information Privacy, Mark Bartholomew Jan 2014

Intellectual Property’S Lessons For Information Privacy, Mark Bartholomew

Journal Articles

There is an inherent tension between an individual’s desire to safeguard her personal information and the expressive rights of businesses seeking to communicate that information to others. This tension has multiplied as consumers generate and businesses collect more and more personal data online, forcing efforts to strike an appropriate balance between privacy and commercial speech. No consensus on this balance has been reached. Some privacy scholars bemoan what they see as a slanted playing field in favor of those wishing to profit from the private details of other people’s lives. Others contend that the right in free expression must always …


Employee Internet Privacy: A Proposed Act That Balances Legitimate Employer Rights And Employee Privacy, Susan Park Jan 2014

Employee Internet Privacy: A Proposed Act That Balances Legitimate Employer Rights And Employee Privacy, Susan Park

Management Faculty Publications and Presentations

When Justin Basset interviewed for a job in New York City in 2012, he expected to respond to questions one is typically asked in a job interview. However, his interview took a modern technological twist when the interviewer opened her computer and attempted to look at Mr. Basset’s Facebook profile on her computer. Unable to see the details of his profile because he had taken advantage of Facebook’s privacy options to limit public viewing, she asked for his login information to access his account. He declined and withdrew his application.1 In 2010, Robert Collins, a Maryland Department of Public …


Governing, Exchanging, Securing: Big Data And The Production Of Digital Knowledge, Bernard E. Harcourt Jan 2014

Governing, Exchanging, Securing: Big Data And The Production Of Digital Knowledge, Bernard E. Harcourt

Faculty Scholarship

The emergence of Big Data challenges the conventional boundaries between governing, exchange, and security. It ambiguates the lines between commerce and surveillance, between governing and exchanging, between democracy and the police state. The new digital knowledge reproduces consuming subjects who wittingly or unwittingly allow themselves to be watched, tracked, linked and predicted in a blurred amalgam of commercial and governmental projects. Linking back and forth from consumer data to government information to social media, these new webs of information become available to anyone who can purchase the information. How is it that governmental, commercial and security interests have converged, coincided, …


Digital Security In The Expository Society: Spectacle, Surveillance, And Exhibition In The Neoliberal Age Of Big Data, Bernard E. Harcourt Jan 2014

Digital Security In The Expository Society: Spectacle, Surveillance, And Exhibition In The Neoliberal Age Of Big Data, Bernard E. Harcourt

Faculty Scholarship

In 1827, Nicolaus Heinrich Julius, a professor at the University of Berlin, identified an important architectural mutation in nineteenth-century society that reflected a deep disruption in our technologies of knowledge and a profound transformation in relations of power across society: Antiquity, Julius observed, had discovered the architectural form of the spectacle; but modern times had operated a fundamental shift from spectacle to surveillance. Michel Foucault would elaborate this insight in his 1973 Collège de France lectures on The Punitive Society, where he would declare: “[T]his is precisely what happens in the modern era: the reversal of the spectacle into surveillance…. …


Hands Off Our Fingerprints: State, Local, Andindividual Defiance Of Federal Immigrationenforcement, Christine N. Cimini Jan 2014

Hands Off Our Fingerprints: State, Local, Andindividual Defiance Of Federal Immigrationenforcement, Christine N. Cimini

Articles

Secure Communities, though little-known outside law-enforcement circles, is one of the most powerful of the federal government’s immigration enforcement programs. Under Secure Communities, fingerprints collected by state and local law enforcement and provided to the Federal Bureau of Investigation for criminal background checks are automatically shared with the Department of Homeland Security, which checks the fingerprints against its immigration database. In the event of a match, an immigration detainer can be issued and an individual held after they would otherwise be entitled to release. Originally designed as a voluntary program in which local governments could choose to participate, the Department …


Privacy Harm Exceptionalism, Ryan Calo Jan 2014

Privacy Harm Exceptionalism, Ryan Calo

Articles

“Exceptionalism” refers to the belief that a person, place, or thing is qualitatively different from others in the same basic category. Thus, some have spoken of America’s exceptionalism as a nation. Early debates about the Internet focused on the prospect that existing laws and institutions would prove inadequate to govern the new medium of cyberspace. Scholars have made similar claims about other areas of law.

The focus of this short essay is the supposed exceptionalism of privacy. Rather than catalogue all the ways that privacy might differ from other concepts or areas of study, I intend to focus on the …


The Data Surveillance State In Europe And The United States, Joel R. Reidenberg Jan 2014

The Data Surveillance State In Europe And The United States, Joel R. Reidenberg

Faculty Scholarship

No abstract provided.


Rethinking Privacy, William H. Simon Jan 2014

Rethinking Privacy, William H. Simon

Faculty Scholarship

Anxiety about surveillance and data mining has led many to embrace implausibly expansive and rigid conceptions of privacy. The premises of some current privacy arguments do not fit well with the broader political commitments of those who make them. In particular, liberals seem to have lost touch with the reservations about privacy expressed in the social criticism of some decades ago. They seem unable to imagine that preoccupation with privacy might amount to a “pursuit of loneliness” or how “eyes on the street” might have reassuring connotations. Without denying the importance of the effort to define and secure privacy values, …


Systematic Government Access To Private-Sector Data Redux, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson Jan 2014

Systematic Government Access To Private-Sector Data Redux, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson

Articles by Maurer Faculty

No abstract provided.


Cause To Believe What? The Importance Of Defining A Search's Object--Or, How The Aba Would Analyze The Nsa Metadata Surveillance Program, Christopher Slobogin Jan 2014

Cause To Believe What? The Importance Of Defining A Search's Object--Or, How The Aba Would Analyze The Nsa Metadata Surveillance Program, Christopher Slobogin

Vanderbilt Law School Faculty Publications

Courts and scholars have devoted considerable attention to the definition of probable cause and reasonable suspicion. Since the demise of the mere evidence rule in the 1960s, however, they have rarely examined how these central Fourth Amendment concepts interact with the object of the search. That is unfortunate, because this interaction can have significant consequences. For instance, probable cause to believe that a search might lead to evidence of wrongdoing triggers a very different inquiry than probable cause to believe that a search will produce evidence of criminal activity. The failure to address the constraints that should be imposed on …


Private Law In The Gaps, Jeffrey A. Pojanowski Jan 2014

Private Law In The Gaps, Jeffrey A. Pojanowski

Journal Articles

Private law subjects like tort, contract, and property are traditionally taken to be at the core of the common law tradition, yet statutes increasingly intersect with these bodies of doctrine. This Article draws on recent work in private law theory and statutory interpretation to consider afresh what courts should do with private law in statutory gaps. In particular, it focuses on statutes touching on tort law, a field at the leading edge of private law theory. This Article's analysis unsettles some conventional wisdom about the intersection of private law and statutes. Many leading tort scholars and jurists embrace a regulatory …


Regulating The Internet Of Things: First Steps Toward Managing Discrimination, Privacy, Security, And Consent, Scott R. Peppet Jan 2014

Regulating The Internet Of Things: First Steps Toward Managing Discrimination, Privacy, Security, And Consent, Scott R. Peppet

Publications

The consumer "Internet of Things" is suddenly reality, not science fiction. Electronic sensors are now ubiquitous in our smartphones, cars, homes, electric systems, health-care devices, fitness monitors, and workplaces. These connected, sensor-based devices create new types and unprecedented quantities of detailed, high-quality information about our everyday actions, habits, personalities, and preferences. Much of this undoubtedly increases social welfare. For example, insurers can price automobile coverage more accurately by using sensors to measure exactly how you drive (e.g., Progressive 's Snapshot system), which should theoretically lower the overall cost of insurance. But the Internet of Things raises new and difficult questions …


A Corporate Right To Privacy, Elizabeth Pollman Jan 2014

A Corporate Right To Privacy, Elizabeth Pollman

All Faculty Scholarship

The debate over the scope of constitutional protections for corporations has exploded with commentary on recent or pending Supreme Court cases, but scholars have left unexplored some of the hardest questions for the future, and the ones that offer the greatest potential for better understanding the nature of corporate rights. This Article analyzes one of those questions — whether corporations have, or should have, a constitutional right to privacy. First, the Article examines the contours of the question in Supreme Court jurisprudence and provides the first scholarly treatment of the growing body of conflicting law in the lower courts on …


Toward A Closer Integration Of Law And Computer Science, Christopher S. Yoo Jan 2014

Toward A Closer Integration Of Law And Computer Science, Christopher S. Yoo

All Faculty Scholarship

Legal issues increasingly arise in increasingly complex technological contexts. Prominent recent examples include the Stop Online Piracy Act (SOPA) and the Protect Intellectual Property Act (PIPA), network neutrality, the increasing availability of location information, and the NSA’s surveillance program. Other emerging issues include data privacy, online video distribution, patent policy, and spectrum policy. In short, the rapid rate of technological change has increasingly shown that law and engineering can no longer remain compartmentalized into separate spheres. The logical response would be to embed the interaction between law and policy deeper into the fabric of both fields. An essential step would …


Failing Expectations: Fourth Amendment Doctrine In The Era Of Total Surveillance, Olivier Sylvain Jan 2014

Failing Expectations: Fourth Amendment Doctrine In The Era Of Total Surveillance, Olivier Sylvain

Faculty Scholarship

Today’s reasonable expectation test and the third-party doctrine have little to nothing to offer by way of privacy protection if users today are at least conflicted about whether transactional noncontent data should be shared with third parties, including law enforcement officials. This uncertainty about how to define public expectation as a descriptive matter has compelled courts to defer to legislatures to find out what public expectation ought to be more as a matter of prudence than doctrine. Courts and others presume that legislatures are far better than courts at defining public expectations about emergent technologies.This Essay argues that the reasonable …


Beyond Title Vii: Rethinking Race, Ex-Offender Status, And Employment Discrimination In The Information Age, Kimani Paul-Emile Jan 2014

Beyond Title Vii: Rethinking Race, Ex-Offender Status, And Employment Discrimination In The Information Age, Kimani Paul-Emile

Faculty Scholarship

More than sixty-five million people in the United States—more than one in four adults—have had some involvement with the criminal justice system that will appear on a criminal history report. A rapidly expanding, for-profit industry has developed to collect these records and compile them into electronic databases, offering employers an inexpensive and readily accessible means of screening prospective employees. Nine out of ten employers now inquire into the criminal history of job candidates, systematically denying individuals with a criminal record any opportunity to gain work experience or build their job qualifications. This is so despite the fact that many individuals …


Empirical Analysis Of Data Breach Litigation, Sasha Romanosky, David A. Hoffman, Alessandro Acquisti Jan 2014

Empirical Analysis Of Data Breach Litigation, Sasha Romanosky, David A. Hoffman, Alessandro Acquisti

All Faculty Scholarship

In recent years, many lawsuits have been filed by individuals seeking legal redress for harms caused by the loss or theft of their personal information. However, very little is known about the drivers, mechanics, and outcomes of those lawsuits, making it difficult to assess the effectiveness of litigation at balancing organizations’ usage of personal data with individual privacy rights. Using a unique and manually-collected database, we analyze court dockets for over 230 federal data breach lawsuits from 2000 to 2010. We investigate two questions: Which data breaches are being litigated, and which data breach lawsuits are settling. Our results suggest …


Intellectual Freedom And Privacy, Neil M. Richards, Joanna Cornwell Jan 2014

Intellectual Freedom And Privacy, Neil M. Richards, Joanna Cornwell

Scholarship@WashULaw

This essay offers an account of the complex ways intellectual freedom and privacy are interrelated. We pay particular attention to both the constitutional dimensions of these important values, as well as the important roles that social and professional norms play in their protection in practice. Our examination of these issues is divided into three parts. Part I lays out the law and legal theory governing privacy as it relates to intellectual freedom. Part II examines a special context in which law and professional norms operate together to protect intellectual freedom through privacy–the library. Finally, Part III discusses how government actions …


Privacy In Public, Joel R. Reidenberg Jan 2014

Privacy In Public, Joel R. Reidenberg

Faculty Scholarship

As government and private companies rapidly expand the infrastructure of surveillance from cameras on every street corner to facial recognition for photographs on social media sites, privacy doctrines built on seclusion are at odds with technological advances. This essay addresses a key conceptual problem in US privacy law identified by Justice Sotomayor in U.S. v. Jones and by Justice Scalia in Kyllo v. U.S.; namely that technological capabilities undermine the meaning of the third-party doctrine and the 4th Amendment's ‘reasonable expectation of privacy’ standard. The essay argues that the conceptual problem derives from the evolution of three stages of development …


Four Privacy Myths, Neil M. Richards Jan 2014

Four Privacy Myths, Neil M. Richards

Scholarship@WashULaw

Any discussion about privacy today inevitably confronts a series of common arguments about the futility of privacy in our digital age. "Privacy is Dead," we hear, and "people (especially young ones) don’t care about privacy." What’s more, privacy just protects bad behavior because those of us with "nothing to hide have nothing to fear." And anyway, the argument goes, new privacy laws would be bad policy since "privacy is bad for business."

There are other common claims, but these four are perhaps the most common. They are also myths, and in this essay I show why. First, privacy can’t be …


Big Data Ethics, Neil M. Richards, Jonathan H. King Jan 2014

Big Data Ethics, Neil M. Richards, Jonathan H. King

Scholarship@WashULaw

We are on the cusp of a “Big Data” Revolution, in which increasingly large datasets are mined for important predictions and often surprising insights. The predictions and decisions this revolution will enable will transform our society in ways comparable to the Industrial Revolution. We are now at a critical moment; big data uses today will be sticky and will settle both default norms and public notions of what is “no big deal” regarding big data predictions for years to come.

In this paper, we argue that big data, broadly defined, is producing increased powers of institutional awareness and power that …


Watching The Watchers, Neil M. Richards Jan 2014

Watching The Watchers, Neil M. Richards

Scholarship@WashULaw

In this essay from Wired Magazine (UK)'s special edition, The Wired World in 2014, Prof. Richards argues that sousveillance–watching the watchers–is an important development that will be on the rise in 2014.


Panel Iii: The Future Of The Press And Privacy, Amy Gajda, Clay Calvert, Tom Bivins, Amy Sanders, Stephen Ward Jan 2014

Panel Iii: The Future Of The Press And Privacy, Amy Gajda, Clay Calvert, Tom Bivins, Amy Sanders, Stephen Ward

Faculty Scholarship

No abstract provided.


The Ftc And The New Common Law Of Privacy, Daniel J. Solove, Woodrow Hartzog Jan 2014

The Ftc And The New Common Law Of Privacy, Daniel J. Solove, Woodrow Hartzog

Faculty Scholarship

One of the great ironies about information privacy law is that the primary regulation of privacy in the United States has barely been studied in a scholarly way. Since the late 1990s, the Federal Trade Commission (FTC) has been enforcing companies’ privacy policies through its authority to police unfair and deceptive trade practices. Despite over fifteen years of FTC enforcement, there is no meaningful body of judicial decisions to show for it. The cases have nearly all resulted in settlement agreements. Nevertheless, companies look to these agreements to guide their privacy practices. Thus, in practice, FTC privacy jurisprudence has become …