Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Privacy Law

Series

2017

Institution
Keyword
Publication

Articles 31 - 60 of 71

Full-Text Articles in Law

Access To Data Across Borders: The Critical Role For Congress To Play Now, Jennifer Daskal Jan 2017

Access To Data Across Borders: The Critical Role For Congress To Play Now, Jennifer Daskal

Articles in Law Reviews & Other Academic Journals

No abstract provided.


"Revenge Porn" Reform: A View From The Front Lines, Mary Anne Franks Jan 2017

"Revenge Porn" Reform: A View From The Front Lines, Mary Anne Franks

Articles

The legal and social landscape of "revenge porn" has changed dramatically in the last few years. Before 2013, only three states criminalized the unauthorized disclosure of sexually explicit images of adults and few people had ever heard the ternm "revenge porn." As of July 2017, thirty-eight states and Washington, D.C. had criminalized the conduct; federal criminal legislation on the issue had been introduced in Congress; Google, Facebook, and Twitter had banned nonconsensual pornography from their platforms; and the term "revenge porn" had been added to the Merriam- Webster Dictionary. I have had the privilege of playing a role in many …


Social Justice And Silicon Valley: A Perspective On The Apple-Fbi Case And The “Going Dark” Debate, Charles J. Dunlap Jr. Jan 2017

Social Justice And Silicon Valley: A Perspective On The Apple-Fbi Case And The “Going Dark” Debate, Charles J. Dunlap Jr.

Faculty Scholarship

No abstract provided.


Workplace Freakonomics, Matthew T. Bodie Jan 2017

Workplace Freakonomics, Matthew T. Bodie

All Faculty Scholarship

Data analytics has revolutionized our economy, and employment is no exception. Sometimes called people analytics or HR analytics, the study of worker behavior and activity now includes the collection of massive amounts of data that is then crunched by algorithms looking for both expected and unexpected patterns. This work is akin to the "freakonomics" approach, which asks unusual questions and is prepared to find answers that may upset conventional wisdom. This paper explores the possibility of a "workplace freakonomics" approach to using big data in the workplace, and considers the legal and ethical ramifications for wide-ranging explorations of employee data.


Carpenter V. United States: Brief Of Scholars Of Criminal Procedure And Privacy As Amici Curiae In Support Of Petitioner, Andrew Ferguson Jan 2017

Carpenter V. United States: Brief Of Scholars Of Criminal Procedure And Privacy As Amici Curiae In Support Of Petitioner, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

Amici curiae are forty-two scholars engaged in significant research and/or teaching on criminal procedure and privacy law. This brief addresses issues that are within amici’s particular areas of scholarly expertise. They have a shared interest in clarifying the law of privacy in the digital era, and believe that a review of scholarly literature on the topic is helpful to answering the question in this case. This brief is co-authored by Harry Sandick, Kathrina Szymborski, & Jared Buszin of Patterson Belknap Webb & Tyler LLP.Carpenter v. United States presents an opportunity to reconsider the Fourth Amendment in the digital age. Cell …


Privacy, Poverty, And Big Data: A Matrix Of Vulnerabilities For Poor Americans, Mary Madden, Michele E. Gilman, Karen Levy, Alice Marwick Jan 2017

Privacy, Poverty, And Big Data: A Matrix Of Vulnerabilities For Poor Americans, Mary Madden, Michele E. Gilman, Karen Levy, Alice Marwick

All Faculty Scholarship

This Article examines the matrix of vulnerabilities that low-income people face as a result of the collection and aggregation of big data and the application of predictive analytics. On one hand, big data systems could reverse growing economic inequality by expanding access to opportunities for low-income people. On the other hand, big data could widen economic gaps by making it possible to prey on low-income people or to exclude them from opportunities due to biases entrenched in algorithmic decision-making tools. New kinds of “networked privacy” harms, in which users are simultaneously held liable for their own behavior and the actions …


The Law And Policy Of People Analytics, Matthew T. Bodie, Miriam A. Cherry, Marcia L. Mccormick, Jintong Tang Jan 2017

The Law And Policy Of People Analytics, Matthew T. Bodie, Miriam A. Cherry, Marcia L. Mccormick, Jintong Tang

Faculty Publications

(Excerpt)

Recently, leading technology companies such as Google and IBM have started experimenting with "people analytics," a new data-driven approach to human resources management. People analytics is just one example of the phenomenon of "big data," in which analyses of huge sets of quantitative information are used to guide a variety of decisions. Applying big data to workplace situations could lead to more effective work outcomes, as in Moneyball, where the Oakland A's baseball franchise used statistics to assemble a winning team on a shoestring budget. People analytics is the name given to this new approach to personnel management …


Teaching The Hipaa Privacy Rule, Stacey A. Tovino Jan 2017

Teaching The Hipaa Privacy Rule, Stacey A. Tovino

Scholarly Works

Twenty years ago, President Clinton signed the Health Insurance Portability and Accountability Act of 1996 (HIPAA) into law. Over the past two decades, the federal Department of Health and Human Services (HHS) has published several sets of rules implementing the Administrative Simplification provisions within HIPAA as well as the Health Information Technology for Economic and Clinical (HITECH) Act within the American Recovery and Reinvestment Act (ARRA). These rules include, but certainly are not limited to, a final rule published on January 25, 2013, governing the use and disclosure of protected health information by covered entities and their business associates (the …


Copyright To The Rescue: Should Copyright Protect Privacy?, Deidre Keller Jan 2017

Copyright To The Rescue: Should Copyright Protect Privacy?, Deidre Keller

Journal Publications

While some courts have held that “[i]t is universally recognized . . . that the protection of privacy is not the function of our copyright law,” the remedies afforded copyright owners make pursuing copyright claims an attractive option to privacy plaintiffs. Copyright remedies include the removal of digital copies from the internet and the destruction of physical copies. The extent to which copyright ought to protect privacy interests has been considered in various jurisdictions recently but has not been treated comprehensively by contemporary legal scholars in the United States. This piece seeks to undertake that treatment.

Part II of this …


Internet Surveillance, Regulation, And Chilling Effects Online: A Comparative Case Study, Jonathon Penney Jan 2017

Internet Surveillance, Regulation, And Chilling Effects Online: A Comparative Case Study, Jonathon Penney

Articles, Book Chapters, & Popular Press

With internet regulation and censorship on the rise, states increasingly engaging in online surveillance, and state cyber-policing capabilities rapidly evolving globally, concerns about regulatory “chilling effects” online — the idea that laws, regulations, or state surveillance can deter people from exercising their freedoms or engaging in legal activities on the internet have taken on greater urgency and public importance. But just as notions of “chilling effects” are not new, neither is skepticism about their legal, theoretical, and empirical basis; in fact, the concept remains largely un-interrogated with significant gaps in understanding, particularly with respect to chilling effects online. This work …


Trust: A Model For Disclosure In Patent Law, Ari Ezra Waldman Jan 2017

Trust: A Model For Disclosure In Patent Law, Ari Ezra Waldman

Articles & Chapters

How to draw the line between public and private is a foundational, first-principles question of privacy law, but the answer has implications for intellectual property, as well. This project is the first in a series of papers about first-person disclosures of information in the privacy and intellectual property law contexts, and it defines the boundary between public and non-public information through the lens of social science — namely, principles of trust.

Patent law’s “public use” bar confronts the question of whether legal protection should extend to information previously disclosed to a small group of people. I present evidence that shows …


The Fourth Amendment In A Digital World, Laura K. Donohue Jan 2017

The Fourth Amendment In A Digital World, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

Fourth Amendment doctrines created in the 1970s and 1980s no longer reflect how the world works. The formal legal distinctions on which they rely—(a) private versus public space, (b) personal information versus third party data, (c) content versus non-content, and (d) domestic versus international—are failing to protect the privacy interests at stake. Simultaneously, reduced resource constraints are accelerating the loss of rights. The doctrine has yet to catch up with the world in which we live. A necessary first step for the Court is to reconsider the theoretical underpinning of the Fourth Amendment, to allow for the evolution of a …


The Judicial Legacy Of Louis Brandeis And The Nature Of American Constitutionalism, Edward A. Purcell Jr. Jan 2017

The Judicial Legacy Of Louis Brandeis And The Nature Of American Constitutionalism, Edward A. Purcell Jr.

Articles & Chapters

No abstract provided.


The Rise Of Cybersecurity And Its Impact On Data Protection, Fred H. Cate, Christopher Kuner, Dan Jerker B. Svantesson, Orla Lynskey, Christopher Millard Jan 2017

The Rise Of Cybersecurity And Its Impact On Data Protection, Fred H. Cate, Christopher Kuner, Dan Jerker B. Svantesson, Orla Lynskey, Christopher Millard

Articles by Maurer Faculty

No abstract provided.


Machine Learning With Personal Data: Is Data Protection Law Smart Enough To Meet The Challenge?, Fred H. Cate, Christopher Kuner, Dan Jerker B. Svantesson, Orla Lynskey, Christopher Millard Jan 2017

Machine Learning With Personal Data: Is Data Protection Law Smart Enough To Meet The Challenge?, Fred H. Cate, Christopher Kuner, Dan Jerker B. Svantesson, Orla Lynskey, Christopher Millard

Articles by Maurer Faculty

No abstract provided.


Cybersecurity Stovepiping, David Thaw Jan 2017

Cybersecurity Stovepiping, David Thaw

Articles

Most readers of this Article probably have encountered – and been frustrated by – password complexity requirements. Such requirements have become a mainstream part of contemporary culture: "the more complex your password is, the more secure you are, right?" So the cybersecurity experts tell us… and policymakers have accepted this "expertise" and even adopted such requirements into law and regulation.

This Article asks two questions. First, do complex passwords actually achieve the goals many experts claim? Does using the password "Tr0ub4dor&3" or the passphrase "correcthorsebatterystaple" actually protect your account? Second, if not, then why did such requirements become so widespread? …


Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri Jan 2017

Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri

Articles

Much legal and technical scholarship discusses the differing views of the United States and European Union toward privacy concepts and regulation. A substantial amount of effort in recent years, in both research and policy, focuses on attempting to reconcile these viewpoints searching for a common framework with a common level of protection for citizens from both sides of Atlantic. Reconciliation, we argue, misunderstands the nature of the challenge facing effective cross-border data flows. No such reconciliation can occur without abdication of some sovereign authority of nations, that would require the adoption of an international agreement with typical tools of international …


Internet Surveillance, Regulation, And Chilling Effects Online: A Comparative Case Study, Jonathon Penney Jan 2017

Internet Surveillance, Regulation, And Chilling Effects Online: A Comparative Case Study, Jonathon Penney

Articles, Book Chapters, & Popular Press

With internet regulation and censorship on the rise, states increasingly engaging in online surveillance, and state cyber-policing capabilities rapidly evolving globally, concerns about regulatory “chilling effects” online — the idea that laws, regulations, or state surveillance can deter people from exercising their freedoms or engaging in legal activities on the internet have taken on greater urgency and public importance. But just as notions of “chilling effects” are not new, neither is skepticism about their legal, theoretical, and empirical basis; in fact, the concept remains largely un-interrogated with significant gaps in understanding, particularly with respect to chilling effects online. This work …


Can The Government Deport Immigrants Using Information It Encouraged Them To Provide?, Amanda Frost Jan 2017

Can The Government Deport Immigrants Using Information It Encouraged Them To Provide?, Amanda Frost

Articles in Law Reviews & Other Academic Journals

This Essay describes the legal and policy issues raised by any systematic effort to deport unauthorized immigrants based on information the government invited them to provide. Part I briefly surveys some of the major laws, regulations, and programs that encourage unauthorized immigrants to identify themselves. Part II analyzes the strengths and weaknesses of the statutory and constitutional arguments that immigrants could raise as a defense against deportations based on self-reported data. Part III explains that even if the government’s systematic use of such data to deport unauthorized immigrants is legal, doing so would be a poor policy choice for any …


Privacy And The Right To Record, Margot E. Kaminski Jan 2017

Privacy And The Right To Record, Margot E. Kaminski

Publications

Many U.S. laws protect privacy by governing recording. Recently, however, courts have recognized a First Amendment “right to record.” This Article addresses how courts should handle privacy laws in light of the developing First Amendment right to record.

The privacy harms addressed by recording laws are situated harms. Recording changes the way people behave in physical spaces by altering the nature of those spaces. Thus, recording laws can be placed within a long line of First Amendment case law that recognizes a valid government interest in managing the qualities of rivalrous physical space, so as not to allow one person’s …


An Expressive Theory Of Privacy Intrusions, Craig Konnoth Jan 2017

An Expressive Theory Of Privacy Intrusions, Craig Konnoth

Publications

The harms of privacy intrusions are numerous. They include discrimination, reputational harm, and chilling effects on speech, thought, and behavior. However, scholarship has yet to fully recognize a kind of privacy harm that this article terms "expressive."

Depending on where the search is taking place and who the actors involved are--a teacher in a school, the police on the street, a food inspector in a restaurant--victims and observers might infer different messages from the search. The search marks the importance of certain societal values such as law enforcement or food safety. It can also send messages about certain groups by …


Privacy's Trust Gap, Neil M. Richards, Woodrow Hartzog Jan 2017

Privacy's Trust Gap, Neil M. Richards, Woodrow Hartzog

Faculty Scholarship

It can be easy to get depressed about the state of privacy these days. In an age of networked digital information, many of us feel disempowered by the various governments, companies, and criminals trying to peer into our lives to collect our digital data trails. When so much is in flux, the way we think about an issue matters a great deal. Yet while new technologies abound, our ideas and thinking — as well as our laws — have lagged in grappling with the new problems raised by the digital revolution. In their important new book, Obfuscation: A User’s Guide …


Trusting Big Data Research, Neil M. Richards, Woodrow Hartzog Jan 2017

Trusting Big Data Research, Neil M. Richards, Woodrow Hartzog

Faculty Scholarship

Although it might puzzle or even infuriate data scientists, suspicion about big data is understandable. The concept doesn’t seem promising to most people. It seems scary. This is partly because big data research is shrouded in mystery. People are unsure about organizations’ motives and methods. What do companies think they know about us? Are they keeping their insights safe from hackers? Are they selling their insights to unscrupulous parties? Most importantly, do organizations use our personal information against us? Big data research will only overcome its suspicious reputation when people can trust it.

Some scholars and commentators have proposed review …


The Inadequate, Invaluable Fair Information Practices, Woodrow Hartzog Jan 2017

The Inadequate, Invaluable Fair Information Practices, Woodrow Hartzog

Faculty Scholarship

For the past thirty years, the general advice for those seeking to collect, use, and share people’s personal data in a responsible way was relatively straightforward: follow the fair information practices, often called the “FIPs.” These general guidelines were designed to ensure that data processors are accountable for their actions and that data subjects are safe, secure, and endowed with control over their personal information. The FIPs have proven remarkably sturdy against the backdrop of near-constant technological change. Yet in the age of social media, big data, and artificial intelligence, the FIPs have been pushed to their breaking point. We …


Sharenting: Children's Privacy In The Age Of Social Media, Stacey B. Steinberg Jan 2017

Sharenting: Children's Privacy In The Age Of Social Media, Stacey B. Steinberg

UF Law Faculty Publications

Through sharenting, or online sharing about parenting, parents now shape their children’s digital identity long before these young people open their first email. The disclosures parents make online are sure to follow their children into adulthood. Indeed, social media and blogging have dramatically changed the landscape facing today’s children as they come of age.

Children have an interest in privacy. Yet a parent’s right to control the upbringing of his or her children and a parent’s right to free speech may trump this interest. When parents share information about their children online, they do so without their children’s consent. These …


Keeping Up With New Legal Titles, Franklin L. Runge Jan 2017

Keeping Up With New Legal Titles, Franklin L. Runge

Law Faculty Scholarly Articles

In this book review, Franklin L. Runge discusses The Future of Foreign Intelligence: Privacy and Surveillance in a Digital Age (2016) by Laura K. Donohue.


Privacy, Vulnerability, And Affordance, Ryan Calo Jan 2017

Privacy, Vulnerability, And Affordance, Ryan Calo

Articles

This essay begins to unpack the complex, sometimes contradictory relationship between privacy and vulnerability. I begin by exploring how the law conceives of vulnerability — essentially, as a binary status meriting special consideration where present. Recent literature recognizes vulnerability not as a status but as a state — a dynamic and manipulable condition that everyone experiences to different degrees and at different times. I then discuss various ways in which vulnerability and privacy intersect. I introduce an analytic distinction between vulnerability rendering, i.e., making a person more vulnerable, and the exploitation of vulnerability whether manufactured or native. I also describe …


Paying For Privacy And The Personal Data Economy, Stacy-Ann Elvy Jan 2017

Paying For Privacy And The Personal Data Economy, Stacy-Ann Elvy

Articles & Chapters

Growing demands for privacy and increases in the quantity and variety of consumer data have engendered various business offerings to allow companies, and in some instances consumers, to capitalize on these developments. One such example is the emerging “personal data economy” (PDE) in which companies, such as Datacoup, purchase data directly from individuals. At the opposite end of the spectrum, the “pay-for-privacy” (PFP) model requires consumers to pay an additional fee to prevent their data from being collected and mined for advertising purposes. This Article conducts a simultaneous in-depth exploration of the impact of burgeoning PDE and PFP models. It …


Democratic Surveillance, Mary Anne Franks Jan 2017

Democratic Surveillance, Mary Anne Franks

Articles

No abstract provided.


The Use Of Information And Communications Technology In Criminal Procedure In The Usa, Stephen C. Thaman Jan 2017

The Use Of Information And Communications Technology In Criminal Procedure In The Usa, Stephen C. Thaman

All Faculty Scholarship

In this chapter, the author discusses the three types of criminal surveillance and the subsequent data mining used to synthesize and compare the results of surveillance techniques. In addition, the author examines how the aforementioned procedures should be viewed in light of United States case law involving the privacy of American citizens.