Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Privacy Law

Series

2016

Institution
Keyword
Publication

Articles 31 - 55 of 55

Full-Text Articles in Law

Classification Standards For Health Information: Ethical And Practical Approaches, Craig Konnoth Jan 2016

Classification Standards For Health Information: Ethical And Practical Approaches, Craig Konnoth

Publications

Secondary health information research requires vast quantities of data in order to make clinical and health delivery breakthroughs. Restrictive policies that limit the use of such information threaten to stymie this research. While the Notice of Proposed Rulemaking (NPRM) for the new Common Rule permits patients to provide broad consent for the use of their information for research, that policy offers insufficient flexibility. This Article suggests a flexible consenting system that allows patients to consent to a range of privacy risks. The details of the system will be fleshed out in future work.


When The Default Is No Penalty: Negotiating Privacy At The Ntia, Margot E. Kaminski Jan 2016

When The Default Is No Penalty: Negotiating Privacy At The Ntia, Margot E. Kaminski

Publications

Consumer privacy protection is largely within the purview of the Federal Trade Commission. In recent years, however, the National Telecommunications and Information Administration (NTIA) at the Department of Commerce has hosted multistakeholder negotiations on consumer privacy issues. The NTIA process has addressed mobile apps, facial recognition, and most recently, drones. It is meant to serve as a venue for industry self-regulation. Drawing on the literature on co-regulation and on penalty defaults, I suggest that the NTIA process struggles to successfully extract industry expertise and participation against a dearth of federal data privacy law and enforcement. This problem is most exacerbated …


Community Economic Development, Legal Clinic Program Jan 2016

Community Economic Development, Legal Clinic Program

Course Descriptions and Information

This clinic emphasizes transactional practice skills. This clinic provides short term counseling in a broad range of small business matters such as corporations, limited liability companies, partnerships, intellectual property, copyright, trademark, privacy law, nonprofit organizations, art groups as well as the legal requirements for starting a small business. Students provide direct legal assistance, counseling, representation, community legal education, and informational materials to new and mature for-profit and non-profit organizations, individuals and community groups seeking to better the economic, social, equitable and cultural well-being of low income communities.


Laird V. Tatum And Article Iii Standing In Surveillance Cases, Jeffrey L. Vagle Jan 2016

Laird V. Tatum And Article Iii Standing In Surveillance Cases, Jeffrey L. Vagle

All Faculty Scholarship

Plaintiffs seeking to challenge government surveillance programs have faced long odds in federal courts, due mainly to a line of Supreme Court cases that have set a very high bar to Article III standing in these cases. The origins of this jurisprudence can be directly traced to Laird v. Tatum, a 1972 case where the Supreme Court considered the question of who could sue the government over a surveillance program, holding in a 5-4 decision that chilling effects arising “merely from the individual’s knowledge” of likely government surveillance did not constitute adequate injury to meet Article III standing requirements.


U.S. Discovery And Foreign Blocking Statutes, Vivian Grosswald Curran Jan 2016

U.S. Discovery And Foreign Blocking Statutes, Vivian Grosswald Curran

Articles

What is the reality between U.S. discovery and the foreign blocking statutes that impede it in France and other civil law states? How should we understand their interface at a time when companies are multinational in composition as well as in their areas of commerce? U.S. courts grapple with the challenge of understanding why they should adhere to strictures that seem to compromise constitutional or quasi-constitutional rights of American plaintiffs, while French and German lawyers and judges struggle with the challenges U.S. discovery poses to values of privacy and fair trial procedure in their legal systems. This article seeks to …


The Atlantic Divide On Privacy And Speech, Neil M. Richards, Kirsty Hughes Jan 2016

The Atlantic Divide On Privacy And Speech, Neil M. Richards, Kirsty Hughes

Scholarship@WashULaw

When does a right to privacy become a right of censorship? Conversely when does freedom of speech become a carte blanche to violate the dignity and autonomy of others? Discussions of privacy throughout the world frequently boil down to these questions. Despite the parallel relationships between privacy and speech in the United Kingdom and America, and despite their shared legal heritage, the two legal systems have struck the balance in radically different ways. In the United States, decisions balancing privacy and the First Amendment have invariably favoured the free speech interest, at least where a press defendant published lawfully-obtained “newsworthy” …


Taking Trust Seriously In Privacy Law, Neil M. Richards, Woodrow Hartzog Jan 2016

Taking Trust Seriously In Privacy Law, Neil M. Richards, Woodrow Hartzog

Scholarship@WashULaw

Trust is beautiful. The willingness to accept vulnerability to the actions of others is the essential ingredient for friendship, commerce, transportation, and virtually every other activity that involves other people. It allows us to build things, and it allows us to grow. Trust is everywhere, but particularly at the core of the information relationships that have come to characterize our modern, digital lives. Relationships between people and their ISPs, social networks, and hired professionals are typically understood in terms of privacy. But the way we have talked about privacy has a pessimism problem – privacy is conceptualized in negative terms, …


People Analytics And The Regulation Of Information Under The Fair Credit Reporting Act, Pauline Kim, Erika Hanson Jan 2016

People Analytics And The Regulation Of Information Under The Fair Credit Reporting Act, Pauline Kim, Erika Hanson

Scholarship@WashULaw

People analytics — the use of big data and computer algorithms to make personnel decisions — has been drawing increasing public and scholarly scrutiny. Concerns have been raised that the data collection intrudes on individual privacy, and that algorithms can produce unfair or discriminatory results. This symposium contribution considers whether the Fair Credit Reporting Act’s regulation of consumer information used for employment purposes can respond these concerns. The FCRA establishes certain procedural requirements, and these can sometimes help individual workers challenge inaccurate information about them. However, the statute does little to curb intrusive data collection practices or to address the …


Big Data And The Future For Privacy, Neil M. Richards, Jonathan H. King Jan 2016

Big Data And The Future For Privacy, Neil M. Richards, Jonathan H. King

Scholarship@WashULaw

In our inevitable big data future, critics and skeptics argue that privacy will have no place. We disagree. When properly understood, privacy rules will be an essential and valuable part of our digital future, especially if we wish to retain the human values on which our political, social, and economic institutions have been built. In this paper, we make three simple points. First, we need to think differently about "privacy." Privacy is not merely about keeping secrets, but about the rules we use to regulate information, which is and always has been in intermediate states between totally secret and known …


After Snowden: Regulating Technology-Aided Surveillance In The Digital Age, David Cole Jan 2016

After Snowden: Regulating Technology-Aided Surveillance In The Digital Age, David Cole

Georgetown Law Faculty Publications and Other Works

Imagine a state that compels its citizens to inform it at all times of where they are, who they are with, what they are doing, who they are talking to, how they spend their time and money, and even what they are interested in. None of us would want to live there. Human rights groups would condemn the state for denying the most basic elements of human dignity and freedom. Student groups would call for boycotts to show solidarity. We would pity the offending state's citizens for their inability to enjoy the rights and privileges we know to be essential …


Lawn Signs: A Fourth Amendment For Constitutional Curmudgeons, Andrew Ferguson Jan 2016

Lawn Signs: A Fourth Amendment For Constitutional Curmudgeons, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

What is the constitutional significance of the proverbial "keep off the grass" sign? This question — asked by curmudgeonly neighbors everywhere — has been given new currency in a recent decision by the United States Supreme Court. Indeed, Florida v. Jardines might have bestowed constitutional curmudgeons with significant new Fourth Amendment protections. By expressing expectations regarding — and control over — access to property, "the people" may be able to claim greater Fourth Amendment protections not only for their homes, but also for their persons, papers, and effects. This article launches a constitutionally grounded, but lighthearted campaign of citizen education …


Chilling Effects: Online Surveillance And Wikipedia Use, Jonathon Penney Jan 2016

Chilling Effects: Online Surveillance And Wikipedia Use, Jonathon Penney

Articles, Book Chapters, & Popular Press

This article discusses the results of the first empirical study providing evidence of regulatory “chilling effects” of Wikipedia users associated with online government surveillance. The study explores how traffic to Wikipedia articles on topics that raise privacy concerns for Wikipedia users decreased after the widespread publicity about NSA/PRISM surveillance revelations in June 2013. Using an interdisciplinary research design, the study tests the hypothesis, based on chilling effects theory, that traffic to privacy-sensitive Wikipedia articles reduced after the mass surveillance revelations. The Article finds not only a statistically significant immediate decline in traffic for these Wikipedia articles after June 2013, but …


Cross-Cutting Conflicts: Developments In The Use Of Norwich Orders In Internet Defamation Cases, Robert Currie Jan 2016

Cross-Cutting Conflicts: Developments In The Use Of Norwich Orders In Internet Defamation Cases, Robert Currie

Articles, Book Chapters, & Popular Press

The anonymity afforded to those wishing to post commentary on the internet has given rise to a number of procedural issues in Canadian case law. This paper focuses on one such issue: the need for prospective plaintiffs in defamation actions to "unmask" anonymous commentators in order to be able to bring proceedings against them. It tracks the increasing use of the "Norwich order," A.K.A an order for pre-action discovery, as a means of accomplishing this objective, by examining the leading case of Warman v. Fournier and analyzing how this issue has played out in litigation to date. It also considers …


Electronic Devices At The Border: The Next Frontier Of Canadian Search And Seizure Law?, Robert Currie Jan 2016

Electronic Devices At The Border: The Next Frontier Of Canadian Search And Seizure Law?, Robert Currie

Articles, Book Chapters, & Popular Press

Over the last several years the Supreme Court of Canada has developed its jurisprudence regarding the search and seizure of electronic devices, applying section 8 of the Canadian Charter of Rights and Freedoms in such a way as to assert and protect a significant amount of privacy in the devices and their data. Recent cases regarding the search of devices at Canada’s borders, however, do not reflect this case law. This is a situation made all the more complex by the generally attenuated expectation of privacy in the border context, and is worthy of inquiry. Using a pending border case …


The Present Of Newsworthiness, Amy Gajda Jan 2016

The Present Of Newsworthiness, Amy Gajda

Faculty Scholarship

No abstract provided.


The Internet Of Heirlooms And Disposable Things, Woodrow Hartzog, Evan Selinger Jan 2016

The Internet Of Heirlooms And Disposable Things, Woodrow Hartzog, Evan Selinger

Faculty Scholarship

The Internet of Things (“IoT”) is here, and we seem to be going all in. We are trying to put a microchip in nearly every object that is not nailed down and even a few that are. Soon, your cars, toasters, toys, and even your underwear will be wired up to make your lives better. The general thought seems to be that “Internet connectivity makes good objects great.” While the IoT might be incredibly useful, we should proceed carefully. Objects are not necessarily better simply because they are connected to the Internet. Often, the Internet can make objects worse and …


Taking Trust Seriously In Privacy Law, Neil Richards, Woodrow Hartzog Jan 2016

Taking Trust Seriously In Privacy Law, Neil Richards, Woodrow Hartzog

Faculty Scholarship

Trust is beautiful. The willingness to accept vulnerability to the actions of others is the essential ingredient for friendship, commerce, transportation, and virtually every other activity that involves other people. It allows us to build things, and it allows us to grow. Trust is everywhere, but particularly at the core of the information relationships that have come to characterize our modern, digital lives. Relationships between people and their ISPs, social networks, and hired professionals are typically understood in terms of privacy. But the way we have talked about privacy has a pessimism problem – privacy is conceptualized in negative terms, …


Anonymization And Risk, Ira S. Rubinstein, Woodrow Hartzog Jan 2016

Anonymization And Risk, Ira S. Rubinstein, Woodrow Hartzog

Faculty Scholarship

Perfect anonymization of data sets that contain personal information has failed. But the process of protecting data subjects in shared information remains integral to privacy practice and policy. While the deidentification debate has been vigorous and productive, there is no clear direction for policy. As a result, the law has been slow to adapt a holistic approach to protecting data subjects when data sets are released to others. Currently, the law is focused on whether an individual can be identified within a given set. We argue that the best way to move data release policy past the alleged failures of …


The Privacy Policymaking Of State Attorneys General, Danielle Keats Citron Jan 2016

The Privacy Policymaking Of State Attorneys General, Danielle Keats Citron

Faculty Scholarship

No abstract provided.


A Time Of Turmoil, Fred H. Cate, Christopher Kuner, Dan Jerker B. Svantesson, Orla Lynsky, Christopher Millard Jan 2016

A Time Of Turmoil, Fred H. Cate, Christopher Kuner, Dan Jerker B. Svantesson, Orla Lynsky, Christopher Millard

Articles by Maurer Faculty

No abstract provided.


Big Data And The Fourth Estate: Protecting The Development Of News Media Monitoring Databases, Joseph A. Tomain Jan 2016

Big Data And The Fourth Estate: Protecting The Development Of News Media Monitoring Databases, Joseph A. Tomain

Articles by Maurer Faculty

No abstract provided.


Chilling Effects: Online Surveillance And Wikipedia Use, Jonathon Penney Jan 2016

Chilling Effects: Online Surveillance And Wikipedia Use, Jonathon Penney

Articles, Book Chapters, & Popular Press

This article discusses the results of the first empirical study providing evidence of regulatory “chilling effects” of Wikipedia users associated with online government surveillance. The study explores how traffic to Wikipedia articles on topics that raise privacy concerns for Wikipedia users decreased after the widespread publicity about NSA/PRISM surveillance revelations in June 2013. Using an interdisciplinary research design, the study tests the hypothesis, based on chilling effects theory, that traffic to privacy-sensitive Wikipedia articles reduced after the mass surveillance revelations. The Article finds not only a statistically significant immediate decline in traffic for these Wikipedia articles after June 2013, but …


Authority And Authors And Codes, Michael J. Madison Jan 2016

Authority And Authors And Codes, Michael J. Madison

Articles

Contests over the meaning and application of the federal Computer Fraud and Abuse Act (“CFAA”) expose long-standing, complex questions about the sources and impacts of the concept of authority in law and culture. Accessing a computer network “without authorization” and by “exceeding authorized access” is forbidden by the CFAA. Courts are divided in their interpretation of this language in the statute. This Article first proposes to address the issue with an insight from social science research. Neither criminal nor civil liability under the CFAA should attach unless the alleged violator has transgressed some border or boundary that is rendered visible …


Riley V. California And The Beginning Of The End For The Third-Party Search Doctrine, David A. Harris Jan 2016

Riley V. California And The Beginning Of The End For The Third-Party Search Doctrine, David A. Harris

Articles

In Riley v. California, the Supreme Court decided that when police officers seize a smart phone, they may not search through its contents -- the data found by looking into the call records, calendars, pictures and so forth in the phone -- without a warrant. In the course of the decision, the Court said that the rule applied not just to data that was physically stored on the device, but also to data stored "in the cloud" -- in remote sites -- but accessed through the device. This piece of the decision may, at last, allow a re-examination of …


Data Privacy And Inmate Recidivism, Chad Squitieri Jan 2016

Data Privacy And Inmate Recidivism, Chad Squitieri

Scholarly Articles

Private companies are awarded contracts to provide Internet technologies within jails and prisons. These correctional contractors often argue that their services can reduce recidivism rates by, for example, providing inmates with access to video messaging services where inmates can communicate with loved ones who are otherwise unable to travel to communicate in person. A close examination of the privacy policies offered by correctional contractors, however, reveals how efforts to reduce recidivism rates are undermined.

As this Essay will explain, correctional contractors collect sensitive data about inmates and the loved ones with whom they communicate. If this data is stolen or …