Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Privacy Law

Series

2022

Institution
Keyword
Publication

Articles 1 - 30 of 51

Full-Text Articles in Law

Content Moderation As Surveillance, Hannah Bloch-Wehba Oct 2022

Content Moderation As Surveillance, Hannah Bloch-Wehba

Faculty Scholarship

Technology platforms are the new governments, and content moderation is the new law, or so goes a common refrain. As platforms increasingly turn toward new, automated mechanisms of enforcing their rules, the apparent power of the private sector seems only to grow. Yet beneath the surface lies a web of complex relationships between public and private authorities that call into question whether platforms truly possess such unilateral power. Law enforcement and police are exerting influence over platform content rules, giving governments a louder voice in supposedly “private” decisions. At the same time, law enforcement avails itself of the affordances of …


Throwing Stones In Glass Houses: Protecting Privacy Under The Law Of Nuisance, Cheng Lim Saw, Joon Wei Aaron Yoong Aug 2022

Throwing Stones In Glass Houses: Protecting Privacy Under The Law Of Nuisance, Cheng Lim Saw, Joon Wei Aaron Yoong

Research Collection Yong Pung How School Of Law

The limits of the law of nuisance were recently tested in the controversial decisions of Fearn v Tate Gallery Board of Trustees, both before the UK High Court and UK Court of Appeal. Against the backdrop of these decisions, this article argues that the tort of private nuisance can indeed, in appropriate cases, protect against invasions of privacy caused by overlooking – all within the present framework and ambit of the action. It is also proposed that a communitarian approach be adopted in fashioning the appropriate remedy for actions founded in nuisance.


Data Privacy In The Time Of Plague, Cason Schmit, Brian N. Larson, Hye-Chung Kum Aug 2022

Data Privacy In The Time Of Plague, Cason Schmit, Brian N. Larson, Hye-Chung Kum

Faculty Scholarship

Data privacy is a life-or-death matter for public health. Beginning in late fall 2019, two series of events unfolded, one everyone talked about and one hardly anyone noticed: The greatest world-health crisis in at least 100 years, the COVID-19 pandemic; and the development of the Personal Data Protection Act Committee by the Uniform Law Commissioners (ULC) in the United States. By July 2021, each of these stories had reached a turning point. In the developed, Western world, most people who wanted to receive the vaccine against COVID- 19 could do so. Meanwhile, the ULC adopted the Uniform Personal Data Protection …


Four Privacy Stories And Two Hard Cases, A Comment On Skinner-Thompson's Privacy At The Margins, Jessica Silbey Jul 2022

Four Privacy Stories And Two Hard Cases, A Comment On Skinner-Thompson's Privacy At The Margins, Jessica Silbey

Faculty Scholarship

Scott Skinner-Thompson's new book, Privacy at the Margins, is what I would call a "fourth-generation" study of privacy law. Privacy's contours and justifications have been debated over the course of the twentieth century, first to establish it as a matter deserving legal protection (roughly the first half of the twentieth century), 2 then to iterate its various common law and constitutional variations (starting in the 1960s), 3 and since the computer and internet revolution of the 1990s, to reevaluate privacy's growing importance but waning presence in the digitally-networked age.4 The third-generation of privacy scholarship has been a fast-growing area …


Race And Regulation Podcast Episode 5 - Racial Equity And Data Privacy, Anita L. Allen Jun 2022

Race And Regulation Podcast Episode 5 - Racial Equity And Data Privacy, Anita L. Allen

Penn Program on Regulation Podcasts

In this episode, Anita Allen, an internationally renowned expert on the philosophical dimensions of privacy and data protection law, reveals how race-neutral privacy laws in the U.S. have failed to address the unequal burdens faced online by Black Americans, whose personal data are used in racially discriminatory ways. Professor Allen articulates what she terms an African American Online Equity Agenda to guide the development of race-conscious privacy regulations that can better promote racial justice in the modern digital economy.


Submission Of The Citizen Lab (Munk School Of Global Affairs, University Of Toronto) To The United Nations Working Group On Enforced Or Involuntary Disappearances, Siena Anstis, Ronald J. Deibert, Émilie Laflèche, Jonathon W. Penney Jun 2022

Submission Of The Citizen Lab (Munk School Of Global Affairs, University Of Toronto) To The United Nations Working Group On Enforced Or Involuntary Disappearances, Siena Anstis, Ronald J. Deibert, Émilie Laflèche, Jonathon W. Penney

Commissioned Reports, Studies and Public Policy Documents

No abstract provided.


24th Annual Open Government Summit 2022, Roger Williams University School Of Law, Rhode Island Office Of The Attorney General Jun 2022

24th Annual Open Government Summit 2022, Roger Williams University School Of Law, Rhode Island Office Of The Attorney General

School of Law Conferences, Lectures & Events

No abstract provided.


Gauging The Acceptance Of Contact Tracing Technology: An Empirical Study Of Singapore Residents’ Concerns With Sharing Their Information And Willingness To Trust, Ee-Ing Ong, Wee Ling Loo Jun 2022

Gauging The Acceptance Of Contact Tracing Technology: An Empirical Study Of Singapore Residents’ Concerns With Sharing Their Information And Willingness To Trust, Ee-Ing Ong, Wee Ling Loo

Research Collection Yong Pung How School Of Law

In response to the COVID-19 pandemic, governments began implementing various forms of contact tracing technology. Singapore’s implementation of its contact tracing technology, TraceTogether, however, was met with significant concern by its population, with regard to privacy and data security. This concern did not fit with the general perception that Singaporeans have a high level of trust in its government. We explore this disconnect, using responses to our survey (conducted pre-COVID-19) in which we asked participants about their level of concern with the government and business collecting certain categories of personal data. The results show that respondents had less concern with …


Three Observations About Justice Alito's Draft Opinion In Dobbs - Commentary, John M. Greabe May 2022

Three Observations About Justice Alito's Draft Opinion In Dobbs - Commentary, John M. Greabe

Law Faculty Scholarship

[Excerpt] "There is much to say about Justice Samuel Alito's draft opinion in Dobbs v. Jackson Women's Health Organization, which was leaked from the United States Supreme Court on May 2 [2022].

Obviously, the most significant direct consequence of the proposed decision, which overrules Roe v. Wade (1973) and Planned Parenthood v. Casey (1992) while upholding the constitutionality of a Mississippi law that outlaws most abortions after 15 weeks of pregnancy, would be the restriction or elimination of abortion services throughout much of the nation. This will have all sorts of attendant consequences, large and smaller, many of which …


Pov: What Rights Could Unravel Next, In Light Of Draft Opinion By Scotus Overturning Roe V. Wade, Robert L. Tsai May 2022

Pov: What Rights Could Unravel Next, In Light Of Draft Opinion By Scotus Overturning Roe V. Wade, Robert L. Tsai

Shorter Faculty Works

Beyond what Alito’s draft opinion in Dobbs v. Jackson Women’s Health Organization portends for the future of abortion rights is the striking method of analysis he employs in the reported draft. Despite his many efforts to reassure that the opinion “does not undermine” other constitutional rights “in any way,” it actually outlines a roadmap for the withdrawal of other cherished constitutional rights.


Is The End Of Roe V. Wade Near? Leaked Scotus Brief Says Yes, Nicole Huberfeld, Linda C. Mcclain May 2022

Is The End Of Roe V. Wade Near? Leaked Scotus Brief Says Yes, Nicole Huberfeld, Linda C. Mcclain

Shorter Faculty Works

Protesters on both sides of the abortion debate descended on the US Supreme Court Monday night and into Tuesday after a leaked secret draft of a US Supreme Court opinion indicated that a majority of justices support overturning Roe v. Wade, after almost 50 years of legalized abortion rights in America. If finalized, possibly as soon as this summer, the bombshell could trigger a cultural tsunami across American life, forcing some women to travel to another state for an abortion and putting the divisive issue at the heart of the fall midterm elections.


Evaluating The Constitutionality Of Marital Status Classifications In The Regulation Of Posthumous Reproduction And Postmortem Sperm Retrieval, Alison Jane Walker May 2022

Evaluating The Constitutionality Of Marital Status Classifications In The Regulation Of Posthumous Reproduction And Postmortem Sperm Retrieval, Alison Jane Walker

Connecticut Law Review

In Eisenstadt v. Baird, the Supreme Court held that a state law prohibiting the provision of contraceptives to unmarried persons violated the Fourteenth Amendment’s rational basis test because of the disparate treatment it afforded to married and unmarried individuals. Eisenstadt stands for an individual’s right to make their own procreative decisions, free from governmental intrusions which impose arbitrary classifications on privacy and freedom. This Note focuses on posthumous reproduction and, more specifically, postmortem sperm retrieval: the process of using a deceased male’s frozen sperm after his death to produce his biological children at the request of his spouse or intimate …


2l Brian Hills Honored With Iapp Annual Westin Scholar Award, James Owsley Boyd Apr 2022

2l Brian Hills Honored With Iapp Annual Westin Scholar Award, James Owsley Boyd

Keep Up With the Latest News from the Law School (blog)

No abstract provided.


Risk And Rights In Transatlantic Data Transfers: Eu Privacy Law, U.S. Surveillance, And The Search For Common Ground, Ira Rubinstein, Peter Margulies Apr 2022

Risk And Rights In Transatlantic Data Transfers: Eu Privacy Law, U.S. Surveillance, And The Search For Common Ground, Ira Rubinstein, Peter Margulies

Connecticut Law Review

Privacy advocates rightly view the Court of Justice of the European Union (CJEU) decision in Data Protection Commissioner v. Facebook Ireland Ltd. and Maximilian Schrems (Schrems II) as a landmark. But, one stakeholder’s landmark is another’s headache. The CJEU’s decision invalidated the EU-U.S. Privacy Shield agreement governing transatlantic transfers of personal data. Citing U.S. surveillance, the CJEU found that data transfers lacked adequate privacy protections under the EU’s General Data Protection Regulation (GDPR). The Schrems II decision thus clouded the future of data transfers that help drive the global economy. This Article offers a hybrid approach to safeguard privacy rights …


Understanding Chilling Effects, Jonathon W. Penney Apr 2022

Understanding Chilling Effects, Jonathon W. Penney

Articles & Book Chapters

With digital surveillance and censorship on the rise, the amount of data available unprecedented, and corporate and governmental actors increasingly employing emerging technologies like artificial intelligence and facial recognition technology for surveillance and data analytics, concerns about “chilling effects,” that is, the capacity for these activities to “chill” or deter people from exercising their rights and freedoms, have taken on greater urgency and importance. Yet, there remains a clear dearth in systematic theoretical and empirical work points. This has left significant gaps in understanding. This Article has attempted to fill that void, synthesizing theoretical and empirical insights from law, privacy, …


Whither Privacy Protection In The Law Of Nuisance, Cheng Lim Saw, Aaron Yoong Apr 2022

Whither Privacy Protection In The Law Of Nuisance, Cheng Lim Saw, Aaron Yoong

Research Collection Yong Pung How School Of Law

Privacy-related concerns often feature in disputes involving the tort of private nuisance. Despite the growing importance ascribed to the protection of an individual’s privacy in the modern world, English law has tended to shy away from allowing such concerns to influence the thinking behind the more traditional areas of law (like nuisance). This article examines and questions the various notions that underpin this English approach. Using the recent decisions of Giles Duncan Fearn v The Board of Trustees of the Tate Gallery [2019] EWHC 246 (Ch) and Giles Fearn v The Board of Trustees of the Tate Gallery [2020] EWCA …


Platforms, Encryption, And The Cfaa: The Case Of Whatsapp V Nso Group, Jonathon W. Penney, Bruce Schneier Mar 2022

Platforms, Encryption, And The Cfaa: The Case Of Whatsapp V Nso Group, Jonathon W. Penney, Bruce Schneier

Articles & Book Chapters

End-to-end encryption technology has gone mainstream. But this wider use has led hackers, cybercriminals, foreign governments, and other threat actors to employ creative and novel attacks to compromise or workaround these protections, raising important questions as to how the Computer Fraud and Abuse Act (CFAA), the primary federal anti-hacking statute, is best applied to these new encryption implementations. Now, after the Supreme Court recently narrowed the CFAA’s scope in Van Buren and suggested it favors a code-based approach to liability under the statute, understanding how best to theorize sophisticated code-based access barriers like end-to-end encryption, and their circumvention, is now …


Me, Myself And My Digital Double: Extending Sara Greene’S Stealing (Identity) From The Poor To The Challenges Of Identity Verification, Michele E. Gilman Mar 2022

Me, Myself And My Digital Double: Extending Sara Greene’S Stealing (Identity) From The Poor To The Challenges Of Identity Verification, Michele E. Gilman

All Faculty Scholarship

Identity is an essential part of the human condition. When one’s identity is stolen or when a state rejects a citizen’s identity, the consequences can be devastating to one’s notion of selfhood as well as undermine their economic security. In Stealing (Identity) from the Poor, Sara Greene explores the serious harms suffered by low-income people who are victimized by identity theft. She explains that our plutocratic regime of identity theft laws serves the interests of wealthier Americans at the expense of those experiencing poverty.

This Essay extends Greene’s analysis and framing to the harms of identity verification systems, particularly in …


Canadian Privacy Law And The Post-War Freedom Of Information Paradigm, Jonathon W. Penney Mar 2022

Canadian Privacy Law And The Post-War Freedom Of Information Paradigm, Jonathon W. Penney

Articles & Book Chapters

An overemphasis on technology among Canadian privacy scholars has neglected other important historical factors in the development of privacy law. The chapter aims to help fill that void through a case study examining how a broader Post War paradigm, centred on freedom of information, impacted on Canada's most important early privacy laws, including Canada's first privacy law - Part VI of the Canadian Human Rights Act (1977); the federal Privacy Act (1983); and the Personal Information Protection and Electronic Documents Act (PIPEDA)(2000). The case study suggests that despite wider concerns about privacy when each law was enacted, those concerns were …


Sociotechnical Safeguards For Genomic Data Privacy, Ellen W. Clayton, Zhiyu Wan, Et Al. Mar 2022

Sociotechnical Safeguards For Genomic Data Privacy, Ellen W. Clayton, Zhiyu Wan, Et Al.

Vanderbilt Law School Faculty Publications

Recent developments in a variety of sectors, including health care, research and the direct-to-consumer industry, have led to a dramatic increase in the amount of genomic data that are collected, used and shared. This state of affairs raises new and challenging concerns for personal privacy, both legally and technically. This Review appraises existing and emerging threats to genomic data privacy and discusses how well current legal frameworks and technical safeguards mitigate these concerns. It concludes with a discussion of remaining and emerging challenges and illustrates possible solutions that can balance protecting privacy and realizing the benefits that result from the …


Dismantling The “Black Opticon”: Privacy, Race Equity, And Online Data-Protection Reform, Anita L. Allen Feb 2022

Dismantling The “Black Opticon”: Privacy, Race Equity, And Online Data-Protection Reform, Anita L. Allen

All Faculty Scholarship

African Americans online face three distinguishable but related categories of vulnerability to bias and discrimination that I dub the “Black Opticon”: discriminatory oversurveillance, discriminatory exclusion, and discriminatory predation. Escaping the Black Opticon is unlikely without acknowledgement of privacy’s unequal distribution and privacy law’s outmoded and unduly race-neutral façade. African Americans could benefit from race-conscious efforts to shape a more equitable digital public sphere through improved laws and legal institutions. This Essay critically elaborates the Black Opticon triad and considers whether the Virginia Consumer Data Protection Act (2021), the federal Data Protection Act (2021), and new resources for the Federal Trade …


A Solution For The Third-Party Doctrine In A Time Of Data Sharing, Contact Tracing, And Mass Surveillance, Tonja Jacobi, Dustin Stonecipher Jan 2022

A Solution For The Third-Party Doctrine In A Time Of Data Sharing, Contact Tracing, And Mass Surveillance, Tonja Jacobi, Dustin Stonecipher

Faculty Articles

Today, information is shared almost constantly. People share their DNA to track their ancestry or for individualized health information; they instruct Alexa to purchase products or provide directions; and, now more than ever, they use videoconferencing technology in their homes. According to the third-party doctrine, the government can access all such information without a warrant or without infringing on Fourth Amendment privacy protections. This exposure of vast amounts of highly personal data to government intrusion is permissible because the Supreme Court has interpreted the third-party doctrine as a per se rule. However, that interpretation rests on an improper understanding of …


Anonymous Companies, William J. Moon Jan 2022

Anonymous Companies, William J. Moon

Faculty Scholarship

Hardly a day goes by without hearing about nefarious activities facilitated by anonymous “shell” companies. Often described as menaces to the financial system, the creation of business entities with no real operations in sun-drenched offshore jurisdictions offering “zero percent” tax rates remains in vogue among business titans, pop stars, multimillionaires, and royals. The trending headlines and academic accounts, however, have paid insufficient attention to the legal uses of anonymous companies that are both ubiquitous and almost infinite in their variations.

This Article identifies privacy as a functional feature of modern business entities by documenting the hidden virtues of anonymous companies—business …


“You Keep Using That Word”: Why Privacy Doesn’T Mean What Lawyers Think, Joshua A.T. Fairfield Jan 2022

“You Keep Using That Word”: Why Privacy Doesn’T Mean What Lawyers Think, Joshua A.T. Fairfield

Scholarly Articles

This article explores how the need to define privacy has impeded our ability to protect it in law.

The meaning of “privacy” is notoriously hard to pin down. This article contends that the problem is not with the word “privacy,” but with the act of trying to pin it down. The problem lies with the act of definition itself and is particularly acute when the words in question have deep-seated and longstanding common-language meanings, such as liberty, freedom, dignity, and certainly privacy. If one wishes to determine what words like these actually mean to people, definition is the wrong tool …


Making An Offer That Can't Be Refused: The Need For Reform In The Rules Governing Informed Consent And Doctor-Patient Agreements, Timothy C. Macdonnell Jan 2022

Making An Offer That Can't Be Refused: The Need For Reform In The Rules Governing Informed Consent And Doctor-Patient Agreements, Timothy C. Macdonnell

Scholarly Articles

On a daily basis, throughout the country, patients are required to sign informed consent forms regarding the care they receive from their doctors. Informed consent forms are an important part of ensuring patients are making an intelligent, autonomous decision regarding their healthcare based on the facts related to their particular situation. However, frequently these consent forms contain what amount to contract-like terms that require patients to permit doctors to substitute other healthcare providers to care for the patient under the doctor’s supervision (substituted caregiver terms). Often these terms are presented to patients on the eve of surgery and on a …


Persistent Surveillance, Andrew Guthrie Ferguson Jan 2022

Persistent Surveillance, Andrew Guthrie Ferguson

Articles in Law Reviews & Other Academic Journals

Persistent surveillance technologies grant police vast new investigative capabilities. The technologies both monitor targeted areas and generate databases of searchable information about people, places, and patterns that can be connected and accessed for criminal prosecutions.

In the face of this growing police surveillance, courts have struggled to make sense of a fragmented Fourth Amendment doctrine. The Supreme Court has offered some clues that “digital may be different” when it comes to surveillance, but lower courts have been left struggling to apply old law to new technologies. Warrantless use of persistent surveillance technologies raises hard questions about when a “search” occurs …


Negligence At The Breach: Information Fiduciaries And The Duty To Care For Data, Daniel M. Filler, David M. Haendler, Jordan L. Fischer Jan 2022

Negligence At The Breach: Information Fiduciaries And The Duty To Care For Data, Daniel M. Filler, David M. Haendler, Jordan L. Fischer

Connecticut Law Review

Personal data is a cost of admission for much of modern life. Employers, tech companies, advertisers, information brokers, and others collect huge quantities of data about us all. Yet outside of a few highly-regulated industries, American companies face few legal restrictions on how they manage and use that data. Until now, individuals have had very limited remedies when their data is stolen from data collectors. But change is afoot. In a significant recent decision, the Pennsylvania Supreme Court took a consequential step holding that entities collecting personal data owe a duty of reasonable care to protect data subjects against harm. …


Why Govern Broken Tools?, Ryan Calo Jan 2022

Why Govern Broken Tools?, Ryan Calo

Articles

In Assessing the Governance of Digital Contact Tracing in Response to COVID-19: Results of a Multi-National Study, Brian Hutler et al. ably compare two approaches to the governance of digital contract tracing (DCT). In this brief essay, I want to examine to what extent governance actually played a meaningful role in the failure of DCT. If DCT failed primarily for other reasons, then the authors’ normative suggestion to pursue “a new governance approach … for designing and implementing DCT technology going forward” may be misplaced.


Requiring What’S Not Required: Circuit Courts Are Disregarding Supreme Court Precedent And Revisiting Officer Inadvertence In Cyberlaw Cases, Michelle Zakarin Jan 2022

Requiring What’S Not Required: Circuit Courts Are Disregarding Supreme Court Precedent And Revisiting Officer Inadvertence In Cyberlaw Cases, Michelle Zakarin

Scholarly Works

As the age of technology has taken this country by surprise and left us with an inability to formally prepare our legal system to incorporate these advances, many courts are forced to adapt by applying pre-technology rules to new technological scenarios. One illustration is the plain view exception to the Fourth Amendment. Recently, the issue of officer inadvertence at the time of the search, a rule that the United States Supreme Court has specifically stated is not required in plain view inquiries, has been revisited in cyber law cases. It could be said that the courts interested in the existence …


The Privacy Paradox By Proxy: Considering Predictors Of Sharenting, Niamh Ní Bhroin, Thuy Dinh, Kira Thiel, Elisabeth Staksrud, Kjartan Ólafsson Jan 2022

The Privacy Paradox By Proxy: Considering Predictors Of Sharenting, Niamh Ní Bhroin, Thuy Dinh, Kira Thiel, Elisabeth Staksrud, Kjartan Ólafsson

Articles

Despite being worried that children may compromise their privacy by disclosing too much personal data online, many parents paradoxically share pictures and information about their children themselves, a practice called sharenting. In this article we utilise data from the EU Kids Online survey to investigate this paradox. We examine both how individual charac‐ teristics such as demographics and digital skills, and relational factors, including parental mediation styles, concerns about children’s privacy, and communication between parents and children influence sharenting practices. Counter‐intuitively, our findings show that parents with higher levels of digital skills are more likely to engage in sharenting. Furthermore, …