Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 42

Full-Text Articles in Law

Understanding Chilling Effects, Jonathon Penney Jan 2022

Understanding Chilling Effects, Jonathon Penney

Articles, Book Chapters, & Popular Press

With digital surveillance and censorship on the rise, the amount of data available online unprecedented, and corporate and governmental actors increasingly employing emerging technologies like artificial intelligence (AI), machine learning, and facial recognition technology (FRT) for surveillance and data analytics, concerns about “chilling effects”, that is, the capacity for these activities “chill” or deter people from exercising their rights and freedoms have taken on greater urgency and importance. Yet, there remains a clear dearth in systematic theoretical and empirical work point. This has left significant gaps in understanding. This article has attempted to fill that void, synthesizing theoretical and empirical …


No Exit: Ten Years Of "Privacy Vs. Speech" Post-Sorrell, G. S. Hans Jan 2021

No Exit: Ten Years Of "Privacy Vs. Speech" Post-Sorrell, G. S. Hans

Vanderbilt Law School Faculty Publications

A decade has passed since the U.S. Supreme Court held in Sorrell vs. IMS Health that a Vermont privacy law violated the First Amendment. Somewhat surprisingly, the debate about the intersection between privacy laws and free speech protections has not progressed much in the intervening years. If anything, the concerns that some privacy advocates had following Sorrell-that the First Amendment could be used as a tool to overturn privacy regulations-have extended to other areas of economic regulation. As a public interest attorney working on technology law and policy, I entered into practice not long after Sorrell was decided, when it …


Agonistic Privacy & Equitable Democracy, Scott Skinner-Thompson Jan 2021

Agonistic Privacy & Equitable Democracy, Scott Skinner-Thompson

Publications

This Essay argues that legal privacy protections—which enable individuals to control their visibility within public space—play a vital role in disrupting the subordinating, antidemocratic impacts of surveillance and should be at the forefront of efforts to reform the operation of both digital and physical public space. Robust privacy protections are a touchstone for empowering members of different marginalized groups with the ability to safely participate in both the physical and digital public squares, while also preserving space for vibrant subaltern counterpublics. By increasing heterogeneity within the public sphere, privacy can also help decrease polarization by breaking down echo chambers and …


The First Amendment And The Right(S) Of Publicity, Jennifer E. Rothman, Robert C. Post Oct 2020

The First Amendment And The Right(S) Of Publicity, Jennifer E. Rothman, Robert C. Post

All Faculty Scholarship

The right of publicity protects persons against unauthorized uses of their identity, most typically their names, images, or voices. The right is in obvious tension with freedom of speech. Yet courts seeking to reconcile the right with the First Amendment have to date produced only a notoriously confused muddle of inconsistent constitutional doctrine. In this Article, we suggest a way out of the maze. We propose a relatively straightforward framework for analyzing how the right of publicity should be squared with First Amendment principles.

At the root of contemporary constitutional confusion lies a failure to articulate the precise state interests …


News As Surveillance, Erin C. Carroll Jan 2020

News As Surveillance, Erin C. Carroll

Georgetown Law Faculty Publications and Other Works

As inhabitants of the Information Age, we are increasingly aware of the amount and kind of data that technology platforms collect on us. Far less publicized, however, is how much data news organizations collect on us as we read the news online and how they allow third parties to collect that personal data as well. A handful of studies by computer scientists reveal that, as a group, news websites are among the Internet’s worst offenders when it comes to tracking their visitors.

On the one hand, this surveillance is unsurprising. It is capitalism at work. The press’s business model has …


The Internet As A Speech Machine And Other Myths Confounding Section 230 Reform, Danielle K. Citron, Mary Anne Franks Jan 2020

The Internet As A Speech Machine And Other Myths Confounding Section 230 Reform, Danielle K. Citron, Mary Anne Franks

Faculty Scholarship

A robust public debate is currently underway about the responsibility of online platforms. We have long called for this discussion, but only recently has it been seriously taken up by legislators and the public. The debate begins with a basic question: should platforms should be responsible for user-generated content? If so, under what circumstances? What exactly would such responsibility look like? Under consideration is Section 230 of the Communications Decency Act—a provision originally designed to encourage tech companies to clean up “offensive” online content. The public discourse around Section 230, however, is riddled with misconceptions. As an initial matter, many …


Platforms And The Fall Of The Fourth Estate: Looking Beyond The First Amendment To Protect Watchdog Journalism, Erin C. Carroll Jan 2020

Platforms And The Fall Of The Fourth Estate: Looking Beyond The First Amendment To Protect Watchdog Journalism, Erin C. Carroll

Georgetown Law Faculty Publications and Other Works

Journalists see the First Amendment as an amulet, and with good reason. It has long protected the Fourth Estate—an independent institutional press—in its exercise of editorial discretion to check government power. This protection helped the Fourth Estate flourish in the second half of the twentieth century and ably perform its constitutional watchdog role.

But in the last two decades, the media ecology has changed. The Fourth Estate has been subsumed by a Networked Press in which journalists are joined by engineers, algorithms, audience, and other human and non-human actors in creating and distributing news. The Networked Press’s most powerful members …


Symposium: The California Consumer Privacy Act, Margot Kaminski, Jacob Snow, Felix Wu, Justin Hughes Jan 2020

Symposium: The California Consumer Privacy Act, Margot Kaminski, Jacob Snow, Felix Wu, Justin Hughes

Publications

This symposium discussion of the Loyola of Los Angeles Law Review focuses on the newly enacted California Consumer Privacy Act (CPPA), a statute signed into state law by then-Governor Jerry Brown on June 28, 2018 and effective as of January 1, 2020. The panel was held on February 20, 2020.

The panelists discuss how businesses are responding to the new law and obstacles for consumers to make effective use of the law’s protections and rights. Most importantly, the panelists grapple with questions courts are likely to have to address, including the definition of personal information under the CCPA, the application …


Deep Fakes: A Looming Challenge For Privacy, Democracy, And National Security, Danielle K. Citron, Robert Chesney Dec 2019

Deep Fakes: A Looming Challenge For Privacy, Democracy, And National Security, Danielle K. Citron, Robert Chesney

Faculty Scholarship

Harmful lies are nothing new. But the ability to distort reality has taken an exponential leap forward with “deep fake” technology. This capability makes it possible to create audio and video of real people saying and doing things they never said or did. Machine learning techniques are escalating the technology’s sophistication, making deep fakes ever more realistic and increasingly resistant to detection. Deep-fake technology has characteristics that enable rapid and widespread diffusion, putting it into the hands of both sophisticated and unsophisticated actors. While deep-fake technology will bring with it certain benefits, it also will introduce many harms. The marketplace …


The Right Of Publicity's Intellectual Property Turn, Jennifer E. Rothman Apr 2019

The Right Of Publicity's Intellectual Property Turn, Jennifer E. Rothman

All Faculty Scholarship

The Article is adapted from a keynote lecture about my book, THE RIGHT OF PUBLICITY: PRIVACY REIMAGINED FOR A PUBLIC WORLD (Harvard Univ. Press 2018), delivered at Columbia Law School for its symposium, “Owning Personality: The Expanding Right of Publicity.” The book challenges the conventional historical and theoretical understanding of the right of publicity. By uncovering the history of the right of publicity’s development, the book reveals solutions to current clashes with free speech, individual liberty, and copyright law, as well as some opportunities for better protecting privacy in the digital age.

The lecture (as adapted for this Article) explores …


The Deliberative Privacy Principle, B. Jessie Hill Jan 2019

The Deliberative Privacy Principle, B. Jessie Hill

Faculty Publications

In this article, I propose that there is a deep connection among at least three seemingly disparate types of constitutional rights claims. Those three rights claims are the right to make the abortion decision for any reason one chooses; the right against compelled ideological speech; and the right of religious institutions to freely hire and fire their ministers (also known as the “ministerial exception”). In particular, there is a thread that unites all of these types of claims. That unifying thread is the concept of deliberative privacy. The connection among these rights claims has not been previously made explicit by …


Recording As Heckling, Scott Skinner-Thompson Jan 2019

Recording As Heckling, Scott Skinner-Thompson

Publications

A growing body of authority recognizes that citizen recording of police officers and public space is protected by the First Amendment. But the judicial and scholarly momentum behind the emerging “right to record” fails to fully incorporate recording’s cost to another important right that also furthers First Amendment principles: the right to privacy.

This Article helps fill that gap by comprehensively analyzing the First Amendment interests of both the right to record and the right to privacy in public while highlighting the role of technology in altering the First Amendment landscape. Recording information can be critical to future speech and, …


Robotic Speakers And Human Listeners, Helen Norton Jan 2018

Robotic Speakers And Human Listeners, Helen Norton

Publications

In their new book, Robotica, Ron Collins and David Skover assert that we protect speech not so much because of its value to speakers but instead because of its affirmative value to listeners. If we assume that the First Amendment is largely, if not entirely, about serving listeners’ interests—in other words, that it’s listeners all the way down—what would a listener-centered approach to robotic speech require? This short symposium essay briefly discusses the complicated and sometimes even dark side of robotic speech from a listener-centered perspective.


The Right Of Publicity: Privacy Reimagined For New York?, Jennifer E. Rothman Jan 2018

The Right Of Publicity: Privacy Reimagined For New York?, Jennifer E. Rothman

All Faculty Scholarship

This essay is based on a featured lecture that I gave as part of the Cardozo Arts & Entertainment Law Journal’s 2 symposium on a proposed right of publicity law in New York. The essay draws from my recent book, The Right of Publicity: Privacy Reimagined for a Public World, published by Harvard University Press. Insights from the book suggest that New York should not upend more than one hundred years of established privacy law in the state, nor jeopardize its citizens’ ownership over their own names, likenesses, and voices by replacing these privacy laws with a new and independent …


Newsroom: Logan On Trump And Libel Law 01-03-2017, Roger Williams University School Of Law Jan 2017

Newsroom: Logan On Trump And Libel Law 01-03-2017, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


"Free Speech, First Amendment, And New Media For Cons And Festivals" From Pop Culture Business Handbook For Cons And Festivals, Jon Garon Jan 2017

"Free Speech, First Amendment, And New Media For Cons And Festivals" From Pop Culture Business Handbook For Cons And Festivals, Jon Garon

Faculty Scholarship

This article is part of a series of book excerpts from The Pop Culture Business Handbook for Cons and Festivals, which provides the business, strategy, and legal reference guide for fan conventions, film festivals, musical festivals, and cultural events.Although most events are organized by private parties, the location of these events in public venues and the crowd management issues involving free speech make First Amendment and free speech issues a critical component of event management. This excerpt provides a framework for understanding the legal and security issues involving free speech at public events.


Privacy And The Right To Record, Margot E. Kaminski Jan 2017

Privacy And The Right To Record, Margot E. Kaminski

Publications

Many U.S. laws protect privacy by governing recording. Recently, however, courts have recognized a First Amendment “right to record.” This Article addresses how courts should handle privacy laws in light of the developing First Amendment right to record.

The privacy harms addressed by recording laws are situated harms. Recording changes the way people behave in physical spaces by altering the nature of those spaces. Thus, recording laws can be placed within a long line of First Amendment case law that recognizes a valid government interest in managing the qualities of rivalrous physical space, so as not to allow one person’s …


Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski Jan 2017

Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski

Publications

Article III standing is difficult to achieve in the context of data security and data privacy claims. Injury in fact must be "concrete," "particularized," and "actual or imminent"--all characteristics that are challenging to meet with information harms. This Article suggests looking to an unusual source for clarification on privacy and standing: recent national security surveillance litigation. There we can find significant discussions of what rises to the level of Article III injury in fact. The answers may be surprising: the interception of sensitive information; the seizure of less sensitive information and housing of it in a database for analysis; and …


Performative Privacy, Scott Skinner-Thompson Jan 2017

Performative Privacy, Scott Skinner-Thompson

Publications

Broadly speaking, privacy doctrine suggests that the right to privacy is non-existent once one enters the public realm. Although some scholars contend that privacy ought to exist in public, “public privacy” has been defended largely with reference to other, ancillary values privacy may serve. For instance, public privacy may be necessary to make the freedom of association meaningful in practice.

This Article identifies a new dimension of public privacy, supplementing extant justifications for the right, by arguing that many efforts to maintain privacy while in “public” are properly conceptualized as forms of performative, expressive resistance against an ever-pervasive surveillance society. …


Making News: Balancing Newsworthiness And Privacy In The Age Of Algorithms, Erin C. Carroll Jan 2017

Making News: Balancing Newsworthiness And Privacy In The Age Of Algorithms, Erin C. Carroll

Georgetown Law Faculty Publications and Other Works

In deciding privacy lawsuits against media defendants, courts have for decades deferred to the media. They have given it wide berth to determine what is newsworthy and so, what is protected under the First Amendment. And in doing so, they have often spoken reverently of the editorial process and journalistic decision-making.

Yet, in just the last several years, news production and consumption has changed dramatically. As we get more of our news from digital and social media sites, the role of information gatekeeper is shifting from journalists to computer engineers, programmers, and app designers. The algorithms that the latter write …


Privacy Petitions And Institutional Legitimacy, Lauren Henry Scholz Feb 2016

Privacy Petitions And Institutional Legitimacy, Lauren Henry Scholz

Scholarly Publications

This Article argues that a petitions process for privacy concerns arising from new technologies would substantially aid in gauging privacy social norms and legitimating regulation of new technologies. An accessible, transparent petitions process would empower individuals who have privacy concerns by making their proposals for change more visible. Moreover, data accumulated from such a petitions process would provide the requisite information to enable institutions to incorporate social norms into privacy policy development. Hearing and responding to privacy petitions would build trust with the public regarding the role of government and large companies in shaping the modern privacy technical infrastructure. This …


When Privacy Almost Won: Time, Inc. V. Hill (1967), Samantha Barbas Dec 2015

When Privacy Almost Won: Time, Inc. V. Hill (1967), Samantha Barbas

Journal Articles

Drawing on previously unexplored and unpublished archival papers of Richard Nixon, the plaintiffs’ lawyer in the case, and the justices of the Warren Court, this article tells the story of the seminal First Amendment case Time, Inc. v. Hill (1967). In Hill, the Supreme Court for the first time addressed the conflict between the right to privacy and freedom of the press. The Court constitutionalized tort liability for invasion of privacy, acknowledging that it raised First Amendment issues and must be governed by constitutional standards. Hill substantially diminished privacy rights; today it is difficult if not impossible to recover against …


The Pond Betwixt: Differences In The U.S.-Eu Data Protection/Safe Harbor Negotiation, Richard J. Peltz-Steele Jan 2015

The Pond Betwixt: Differences In The U.S.-Eu Data Protection/Safe Harbor Negotiation, Richard J. Peltz-Steele

Faculty Publications

This article analyzes the differing perspectives that animate US and EU conceptions of privacy in the context of data protection. It begins by briefly reviewing the two continental approaches to data protection and then explains how the two approaches arise in a context of disparate cultural traditions with respect to the role of law in society. In light of those disparities, Underpinning contemporary data protection regulation is the normative value that both US and EU societies place on personal privacy. Both cultures attribute modern privacy to the famous Warren-Brandeis article in 1890, outlining a "right to be let alone." But …


Regulating Real-World Surveillance, Margot E. Kaminski Jan 2015

Regulating Real-World Surveillance, Margot E. Kaminski

Publications

A number of laws govern information gathering, or surveillance, by private parties in the physical world. But we lack a compelling theory of privacy harm that accounts for the state's interest in enacting these laws. Without a theory of privacy harm, these laws will be enacted piecemeal. Legislators will have a difficult time justifying the laws to constituents; the laws will not be adequately tailored to legislative interest; and courts will find it challenging to weigh privacy harms against other strong values, such as freedom of expression.

This Article identifies the government interest in enacting laws governing surveillance by private …


Outing Privacy, Scott Skinner-Thompson Jan 2015

Outing Privacy, Scott Skinner-Thompson

Publications

The government regularly outs information concerning people's sexuality, gender identity, and HIV status. Notwithstanding the implications of such outings, the Supreme Court has yet to resolve whether the Constitution contains a right to informational privacy - a right to limit the government's ability to collect and disseminate personal information.

This Article probes informational privacy theory and jurisprudence to better understand the judiciary's reluctance to fully embrace a constitutional right to informational privacy. The Article argues that while existing scholarly theories of informational privacy encourage us to broadly imagine the right and its possibilities, often focusing on informational privacy's ability to …


Anonymity, Faceprints, And The Constitution, Kimberly L. Wehle Jan 2014

Anonymity, Faceprints, And The Constitution, Kimberly L. Wehle

All Faculty Scholarship

Part I defines anonymity and explains that respect for the capacity to remain physically and psychologically unknown to the government traces back to the Founding. With the advent and expansion of new technologies such as facial recognition technology (“FRT”), the ability to remain anonymous has eroded, leading to a litany of possible harms.

Part II reviews the existing Fourth and First Amendment doctrine that is available to stave off ubiquitous government surveillance and identifies anonymity as a constitutional value that warrants more explicit doctrinal protection. Although the Fourth Amendment has been construed to excise surveillance of public and third-party information …


Intellectual Property’S Lessons For Information Privacy, Mark Bartholomew Jan 2014

Intellectual Property’S Lessons For Information Privacy, Mark Bartholomew

Journal Articles

There is an inherent tension between an individual’s desire to safeguard her personal information and the expressive rights of businesses seeking to communicate that information to others. This tension has multiplied as consumers generate and businesses collect more and more personal data online, forcing efforts to strike an appropriate balance between privacy and commercial speech. No consensus on this balance has been reached. Some privacy scholars bemoan what they see as a slanted playing field in favor of those wishing to profit from the private details of other people’s lives. Others contend that the right in free expression must always …


Online Privacy And The First Amendment: An Opt-In Approach To Data Processing, Joseph A. Tomain Jan 2014

Online Privacy And The First Amendment: An Opt-In Approach To Data Processing, Joseph A. Tomain

Articles by Maurer Faculty

An individual has little to no ability to prevent online commercial actors from collecting, using, or disclosing data about her. This lack of individual choice is problematic in the Big Data era because individual privacy interests are threatened by the ever increasing number of actors processing data, as well as the ever increasing amount and types of data being processed. This Article argues that online commercial actors should be required to receive an individual’s opt-in consent prior to data processing as a way of protecting individual privacy. I analyze whether an opt-in requirement is constitutionally permissible under the First Amendment …


Warrant Canaries Beyond The First Amendment: A Comment, Jonathon Penney Jan 2014

Warrant Canaries Beyond The First Amendment: A Comment, Jonathon Penney

Articles, Book Chapters, & Popular Press

Warrant canaries have emerged as an intriguing tool for Internet companies to provide some measure of transparency for users while also complying with national security laws. Though there is at least a reasonable argument for the legality of warrant canaries in the U.S. based primarily on First Amendment "compelled speech" doctrine, the same cannot be said for the use of warrant canaries in other "Five Eyes” intelligence agency countries — United Kingdom, Canada, New Zealand, and Australia — where the legality of warrant canaries has yet to be examined in either cases or scholarship. This comment, which provides an overview …


Warrant Canaries Beyond The First Amendment: A Comment, Jonathon Penney Jan 2014

Warrant Canaries Beyond The First Amendment: A Comment, Jonathon Penney

Articles, Book Chapters, & Popular Press

Warrant canaries have emerged as an intriguing tool for Internet companies to provide some measure of transparency for users while also complying with national security laws. Though there is at least a reasonable argument for the legality of warrant canaries in the U.S. based primarily on First Amendment "compelled speech" doctrine, the same cannot be said for the use of warrant canaries in other "Five Eyes” intelligence agency countries — United Kingdom, Canada, New Zealand, and Australia — where the legality of warrant canaries has yet to be examined in either cases or scholarship. This comment, which provides an overview …