Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Privacy Law

Series

2020

Institution
Keyword
Publication

Articles 1 - 30 of 51

Full-Text Articles in Law

Law Enforcement’S Use Of Facial Recognition Software In United States Cities, Samantha Jean Wunschel Dec 2020

Law Enforcement’S Use Of Facial Recognition Software In United States Cities, Samantha Jean Wunschel

Honors Program Theses and Projects

Facial recognition software is something we use every day, whether it’s a suggested tag on our Facebook post or a faster way to unlock our phones. As technology becomes increasingly pervasive in our lives, law enforcement has adapted to utilize the new tools available in accessory to their investigations and the legal process.


Dispute Settlement Under The African Continental Free Trade Area Agreement: A Preliminary Assessment, Olabisi D. Akinkugbe Nov 2020

Dispute Settlement Under The African Continental Free Trade Area Agreement: A Preliminary Assessment, Olabisi D. Akinkugbe

Articles, Book Chapters, & Popular Press

The African Continental Free Trade Area Agreement (AfCFTA) will add a new dispute settlement system to the plethora of judicial mechanisms designed to resolve trade disputes in Africa. Against the discontent of Member States and limited impact the existing highly legalized trade dispute settlement mechanisms have had on regional economic integration in Africa, this paper undertakes a preliminary assessment of the AfCFTA Dispute Settlement Mechanism (DSM). In particular, the paper situates the AfCFTA-DSM in the overall discontent and unsupportive practices of African States with highly legalized dispute settlement systems and similar WTO-Styled DSMs among other shortcomings. Notwithstanding the transplantation of …


Inescapable Surveillance, Matthew Tokson Nov 2020

Inescapable Surveillance, Matthew Tokson

Utah Law Faculty Scholarship

Until recently, Supreme Court precedent dictated that a person waives their Fourth Amendment rights in information they disclose to another party. The Court reshaped this doctrine in Carpenter v. United States, establishing that the Fourth Amendment protects cell phone location data even though it is revealed to others. The Court emphasized that consumers had little choice but to disclose their data, because cell phone use is virtually inescapable in modern society.

In the wake of Carpenter, many scholars and lower courts have endorsed inescapability as an important factor for determining Fourth Amendment rights. Under this approach, surveillance that people cannot …


Good Health And Good Privacy Go Hand-In-Hand (Originally Published By Jnslp), Jennifer Daskal Oct 2020

Good Health And Good Privacy Go Hand-In-Hand (Originally Published By Jnslp), Jennifer Daskal

Joint PIJIP/TLS Research Paper Series

No abstract provided.


The Internet Never Forgets: Image-Based Sexual Abuse And The Workplace, John Schriner, Melody Lee Rood Oct 2020

The Internet Never Forgets: Image-Based Sexual Abuse And The Workplace, John Schriner, Melody Lee Rood

Publications and Research

Image-based sexual abuse (IBSA), commonly known as revenge pornography, is a type of cyberharassment that often results in detrimental effects to an individual's career and livelihood. Although there exists valuable research concerning cyberharassment in the workplace generally, there is little written about specifically IBSA and the workplace. This chapter examines current academic research on IBSA, the issues with defining this type of abuse, victim blaming, workplace policy, and challenges to victim-survivors' redress. The authors explore monetary motivation for websites that host revenge pornography and unpack how the dark web presents new challenges to seeking justice. Additionally, this chapter presents recommendations …


The First Amendment And The Right(S) Of Publicity, Jennifer E. Rothman, Robert C. Post Oct 2020

The First Amendment And The Right(S) Of Publicity, Jennifer E. Rothman, Robert C. Post

All Faculty Scholarship

The right of publicity protects persons against unauthorized uses of their identity, most typically their names, images, or voices. The right is in obvious tension with freedom of speech. Yet courts seeking to reconcile the right with the First Amendment have to date produced only a notoriously confused muddle of inconsistent constitutional doctrine. In this Article, we suggest a way out of the maze. We propose a relatively straightforward framework for analyzing how the right of publicity should be squared with First Amendment principles.

At the root of contemporary constitutional confusion lies a failure to articulate the precise state interests …


Submission To The Justice And Electoral Committee On The Search And Surveillance Bill 2009, Samuel Beswick, William Fotherby Sep 2020

Submission To The Justice And Electoral Committee On The Search And Surveillance Bill 2009, Samuel Beswick, William Fotherby

All Faculty Publications

This submission to the Justice and Electoral Select Committee of the New Zealand Parliament addresses the surveillance regime created by the Search and Surveillance Bill 2009.


Privacy In Pandemic: Law, Technology, And Public Health In The Covid-19 Crisis, Tiffany Li Sep 2020

Privacy In Pandemic: Law, Technology, And Public Health In The Covid-19 Crisis, Tiffany Li

Faculty Scholarship

The COVID-19 pandemic has caused millions of deaths and disastrous consequences around the world, with lasting repercussions for every field of law, including privacy and technology. The unique characteristics of this pandemic have precipitated an increase in use of new technologies, including remote communications platforms, healthcare robots, and medical AI. Public and private actors are using new technologies, like heat sensing, and technologically-influenced programs, like contact tracing, alike in response, leading to a rise in government and corporate surveillance in sectors like healthcare, employment, education, and commerce. Advocates have raised the alarm for privacy and civil liberties violations, but the …


Cambridge Analytica's Black Box, Margaret Hu Aug 2020

Cambridge Analytica's Black Box, Margaret Hu

Faculty Publications

The Cambridge Analytica–Facebook scandal led to widespread concern over the methods deployed by Cambridge Analytica to target voters through psychographic profiling algorithms, built upon Facebook user data. The scandal ultimately led to a record-breaking $5 billion penalty imposed upon Facebook by the Federal Trade Commission (FTC) in July 2019. The FTC action, however, has been criticized as failing to adequately address the privacy and other harms emanating from Facebook’s release of approximately 87 million Facebook users’ data, which was exploited without user authorization. This Essay summarizes the FTC’s response to the Cambridge Analytica–Facebook scandal. It concludes that the scandal focuses …


The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin Aug 2020

The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin

Open Educational Resources

Using episodes from the show Black Mirror as a study tool - a show that features tales that explore techno-paranoia - the course analyzes legal and policy considerations of futuristic or hypothetical case studies. The case studies tap into the collective unease about the modern world and bring up a variety of fascinating key philosophical, legal, and economic-based questions.


How Legislations Of Tajikistan And Kyrgyzstan Regulate The Issue Of Validity Of A Consent For The Processing Of Personal Data, Faridun Yusufov Aug 2020

How Legislations Of Tajikistan And Kyrgyzstan Regulate The Issue Of Validity Of A Consent For The Processing Of Personal Data, Faridun Yusufov

English Language Institute

This research explores differences in legislations of Tajikistan and Kyrgyzstan and compares provisions contained therein about the validity of consent to process individual data which are also evaluated in terms of their compliance with elements of validity of the consent researched by some authors.


Is Data Localization A Solution For Schrems Ii?, Anupam Chander Jul 2020

Is Data Localization A Solution For Schrems Ii?, Anupam Chander

Georgetown Law Faculty Publications and Other Works

For the second time this decade, the Court of Justice of the European Union has struck a blow against the principal mechanisms for personal data transfer to the United States. In Data Protection Commissioner v Facebook Ireland, Maximillian Schrems, the Court declared the EU-US Privacy Shield invalid and placed significant hurdles to the process of transferring personal data from the European Union to the United States via the mechanism of Standard Contractual Clauses. Many have begun to suggest data localization as the solution to the problem of data transfer; that is, don’t transfer the data at all. I argue …


Cybersecurity-The Internet Of Things, Amy J. Ramson Jul 2020

Cybersecurity-The Internet Of Things, Amy J. Ramson

Open Educational Resources

With 38.5 billion smart devices in existence in 2020 and increasing every year, the potential for security breaches in the Internet of things is also escalating at a dramatic pace. The goal of this team activity is to facilitate team work, critical thinking, and presentation skills in the area of cybersecurity and the Internet of Things. Students will be grouped into two teams. As a team, they will analyze cases about security cameras and smart dolls through the questions presented in the activity. They will present their analysis to the class.


Teaching Information Privacy Law, Joseph A. Tomain Jul 2020

Teaching Information Privacy Law, Joseph A. Tomain

Articles by Maurer Faculty

Teaching information privacy law is exciting and challenging because of the fast pace of technological and legal development and because "information privacy law" sprawls across a vast array of disparate areas of substantive law that do not automatically connect. This Essay provides one approach to teaching this fascinating, doctrinally diverse, and rapidly moving area of law. Through the framework of ten key course themes, this pedagogical approach seeks to help students find a common thread that connects these various areas of law into a cohesive whole. This framework provides a way to think about not only privacy law, but also …


A New Compact For Sexual Privacy, Danielle K. Citron Jun 2020

A New Compact For Sexual Privacy, Danielle K. Citron

Faculty Scholarship

Intimate life is under constant surveillance. Firms track people’s periods, hot flashes, abortions, sexual assaults, sex toy use, sexual fantasies, and nude photos. Individuals hardly appreciate the extent of the monitoring, and even if they did, little can be done to curtail it. What is big business for firms is a big risk for individuals. The handling of intimate data undermines the values that sexual privacy secures—autonomy, dignity, intimacy, and equality. It can imperil people’s job, housing, insurance, and other crucial opportunities. More often, women and minorities shoulder a disproportionate amount of the burden.

Privacy law is failing us. Our …


Regulating Personal Data Usage In Covid-19 Control Conditions, Mark Findlay, Nydia Remolina May 2020

Regulating Personal Data Usage In Covid-19 Control Conditions, Mark Findlay, Nydia Remolina

Centre for AI & Data Governance

As the COVID-19 health pandemic ebbs and flows world-wide, governments and private companies across the globe are utilising AI-assisted surveillance, reporting, mapping and tracing technologies with the intention of slowing the spread of the virus. These technologies have capacity to amass and share personal data for community control and citizen safety motivations that empower state agencies and inveigle citizen co-operation which could only be imagined outside times of real and present personal danger. While not cavilling with the short-term necessity for these technologies and the data they control, process and share in the health regulation mission (provided that the technology …


Privacy's Constitutional Moment And The Limits Of Data Protection, Woodrow Hartzog, Neil M. Richards May 2020

Privacy's Constitutional Moment And The Limits Of Data Protection, Woodrow Hartzog, Neil M. Richards

Faculty Scholarship

America’s privacy bill has come due. Since the dawn of the Internet, Congress has repeatedly failed to build a robust identity for American privacy law. But now both California and the European Union have forced Congress’s hand by passing the California Consumer Privacy Act (CCPA) and the General Data Protection Regulation (GDPR). These data protection frameworks, structured around principles for Fair Information Processing called the “FIPs,” have industry and privacy advocates alike clamoring for a “U.S. GDPR.” States seemed poised to blanket the country with FIP-based laws if Congress fails to act. The United States is thus in the midst …


Ethics, Ai, Mass Data And Pandemic Challenges: Responsible Data Use And Infrastructure Application For Surveillance And Pre-Emptive Tracing Post-Crisis, Mark Findlay, Jia Yuan Loke, Nydia Remolina Leon, Yum Yin, Benjamin (Tan Renyan) Tham May 2020

Ethics, Ai, Mass Data And Pandemic Challenges: Responsible Data Use And Infrastructure Application For Surveillance And Pre-Emptive Tracing Post-Crisis, Mark Findlay, Jia Yuan Loke, Nydia Remolina Leon, Yum Yin, Benjamin (Tan Renyan) Tham

Research Collection Yong Pung How School Of Law

As the COVID-19 health pandemic rages governments and private companies across the globe are utilising AI-assisted surveillance, reporting, mapping and tracing technologies with the intention of slowing the spread of the virus. These technologies have the capacity to amass personal data and share for community control and citizen safety motivations that empower state agencies and inveigle citizen co-operation which could only be imagined outside such times of real and present danger. While not cavilling with the short-term necessity for these technologies and the data they control, process and share in the health regulation mission, this paper argues that this infrastructure …


A Third-Party Doctrine For Digital Metadata, H. Brian Holland Apr 2020

A Third-Party Doctrine For Digital Metadata, H. Brian Holland

Faculty Scholarship

For more than four decades, the third-party doctrine was understood as a bright-line, categorical rule: there is no legitimate privacy interest in any data that is voluntarily disclosed or conveyed to a third party. But this simple rule has dramatic effects in a world of ubiquitous networked computing, mobile technologies, and the commodification of information. The digital devices that facilitate our daily participation in modern society are connected through automated infrastructures that are designed to generate vast quantities of data, nearly all of which is captured, utilized, and stored by third-party service providers. Under a plain reading of the third-party …


Gdpr And The Importance Of Data To Ai Startups, James Bessen, Stephen Michael Impink, Lydia Reichensperger, Robert Seamans Apr 2020

Gdpr And The Importance Of Data To Ai Startups, James Bessen, Stephen Michael Impink, Lydia Reichensperger, Robert Seamans

Faculty Scholarship

What is the impact of the European Union’s General Data Protection Regime (“GDPR”) and data regulation on AI startups? How important is data to AI product development? We study these questions using unique survey data of commercial AI startups. AI startups rely on data for their product development. Given the scale and scope of their business models, these startups are particularly susceptible to policy changes impacting data collection, storage and use. We find that training data and frequent model refreshes are particularly important for AI startups that rely on neural nets and ensemble learning algorithms. We also find that firms …


Terms Of Service: The Use And Protection Of Genomic Information By Companies, Databases, And Law Enforcement, Sophia Kallas Mar 2020

Terms Of Service: The Use And Protection Of Genomic Information By Companies, Databases, And Law Enforcement, Sophia Kallas

Honors Theses

Private genomic companies have become a popular trend in the last two decades by providing customers with information regarding their ancestry and health risks. However, the profiles received from these companies can also be uploaded to public databases for various purposes, including locating other family members. Both testing companies and public databases have private interests, and both are at risk of law enforcement intervention for the purpose of forensic familial searching. There is little federal legislation protecting the privacy of an individual’s genetic profile. Consequently, it has been up to federal agencies, state laws, and judicial precedents to prevent the …


Candidate Privacy, Rebecca Green Mar 2020

Candidate Privacy, Rebecca Green

Faculty Publications

In the United States, we have long accepted that candidates for public office who have voluntarily stepped into the public eye sacrifice claims to privacy. This refrain is rooted deep within the American enterprise, emanating from the Framers' concept of the informed citizen as a bedrock of democracy. Voters must have full information about candidates to make their choices at the ballot box. Even as privacy rights for ordinary citizens have expanded, privacy theorists and courts continue to exempt candidates from privacy protections. This Article suggests that two disruptions warrant revisiting the privacy interests of candidates. The first is a …


Automation In Moderation, Hannah Bloch-Wehba Mar 2020

Automation In Moderation, Hannah Bloch-Wehba

Faculty Scholarship

This Article assesses recent efforts to encourage online platforms to use automated means to prevent the dissemination of unlawful online content before it is ever seen or distributed. As lawmakers in Europe and around the world closely scrutinize platforms’ “content moderation” practices, automation and artificial intelligence appear increasingly attractive options for ridding the Internet of many kinds of harmful online content, including defamation, copyright infringement, and terrorist speech. Proponents of these initiatives suggest that requiring platforms to screen user content using automation will promote healthier online discourse and will aid efforts to limit Big Tech’s power.

In fact, however, the …


Republican Attorneys General Association V. Las Vegas Metropolitan Police Department, 136 Nev. Adv. Op. 3 (Feb. 20, 2020), Nicholas Hagenkord Feb 2020

Republican Attorneys General Association V. Las Vegas Metropolitan Police Department, 136 Nev. Adv. Op. 3 (Feb. 20, 2020), Nicholas Hagenkord

Nevada Supreme Court Summaries

The Court determined that (1) the district court did not err in denying appellant Republican Attorneys General Association’s (RAGA) petition for a writ of mandamus under the Nevada Public Records Act (NPRA) seeking bodycam footage regarding juveniles and former State Senator Aaron Ford’s interactions with police; and (2) the district court abused its discretion in denying RAGA’s request for other requested records by not assessing whether these records contain any nonconfidential material.


Appendix B: Ohio Attorney General Facial Recognition Task Force Proposal On Monitoring, Auditing, Enforcement And Transparency, Brian E. Ray, Dennis Hirsch Jan 2020

Appendix B: Ohio Attorney General Facial Recognition Task Force Proposal On Monitoring, Auditing, Enforcement And Transparency, Brian E. Ray, Dennis Hirsch

Law Faculty Reports and Comments

Policy controls that govern agency activity generally contain at least two components: (1) a substantive policy; and (2) a governance structure for ensuring implementation of and compliance with that policy. Effective controls require both. This proposal focuses on the second component, the governance structure. Specifically, it addresses routine monitoring, annual audits, enforcement of the AG’s policies that govern the facial recognition system, and public transparency. Established facial recognition policies, including those that the Task Force has looked to as models, recognize the importance of establishing such a governance structure.

We have reviewed existing federal and state policy templates documents in …


News As Surveillance, Erin C. Carroll Jan 2020

News As Surveillance, Erin C. Carroll

Georgetown Law Faculty Publications and Other Works

As inhabitants of the Information Age, we are increasingly aware of the amount and kind of data that technology platforms collect on us. Far less publicized, however, is how much data news organizations collect on us as we read the news online and how they allow third parties to collect that personal data as well. A handful of studies by computer scientists reveal that, as a group, news websites are among the Internet’s worst offenders when it comes to tracking their visitors.

On the one hand, this surveillance is unsurprising. It is capitalism at work. The press’s business model has …


Reconsidering Confidential Settlements In The #Metoo Era, Minna J. Kotkin Jan 2020

Reconsidering Confidential Settlements In The #Metoo Era, Minna J. Kotkin

Faculty Scholarship

No abstract provided.


The Georgia Life Act: Limiting Women's State Constitutional Right To Privacy, Phoebe Varunok Jan 2020

The Georgia Life Act: Limiting Women's State Constitutional Right To Privacy, Phoebe Varunok

Upper Level Writing Requirement Research Papers

No abstract provided.


Hipaa Reform Or A Patchwork Scheme: A Look At Preemption, Scope, And The Inclusion Of A Private Right Of Action In A New Federal Data Privacy Law, David Cohen Jan 2020

Hipaa Reform Or A Patchwork Scheme: A Look At Preemption, Scope, And The Inclusion Of A Private Right Of Action In A New Federal Data Privacy Law, David Cohen

Upper Level Writing Requirement Research Papers

No abstract provided.


A Genetic Surveillance State: Are We One Buccal Swab Away From A Total Loss Of Genetic Privacy?, Catherine Arcabascio Jan 2020

A Genetic Surveillance State: Are We One Buccal Swab Away From A Total Loss Of Genetic Privacy?, Catherine Arcabascio

Faculty Scholarship

No abstract provided.