Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Privacy Law

Discrimination

Institution
Publication Year
Publication
Publication Type

Articles 1 - 26 of 26

Full-Text Articles in Law

Confidentiality, Warning And Aids: A Proposal To Protect Patients, Third Parties And Physicians Apr 2022

Confidentiality, Warning And Aids: A Proposal To Protect Patients, Third Parties And Physicians

Touro Law Review

No abstract provided.


The Oslo Accords: A Modern-Day Story Of Occupation Told Through Violations Of The Right To Freedom Of Privacy, Catherine Demetrovich Jan 2022

The Oslo Accords: A Modern-Day Story Of Occupation Told Through Violations Of The Right To Freedom Of Privacy, Catherine Demetrovich

Indiana Law Journal

The Israeli-Palestinian conflict began in the early 1900s when the disputed land, what is now the West Bank and the Gaza Strip, fell under British rule. After the Six- Day War in 1967, Israel took control of the West Bank, Golan Heights, and the Gaza Strip. Since then, tensions between Israel and Palestine have continued to grow. This Note explores a modern-day occupation question: Israel’s control over Palestine’s information and communication technology (ICT) sector. Along with privacy and human rights violations, Israel’s control is in direct violation of the Oslo Accords— guaranteeing Palestinians limited self-governance in Gaza and the West …


Privacy In Pandemic: Law, Technology, And Public Health In The Covid-19 Crisis, Tiffany Li Sep 2020

Privacy In Pandemic: Law, Technology, And Public Health In The Covid-19 Crisis, Tiffany Li

Faculty Scholarship

The COVID-19 pandemic has caused millions of deaths and disastrous consequences around the world, with lasting repercussions for every field of law, including privacy and technology. The unique characteristics of this pandemic have precipitated an increase in use of new technologies, including remote communications platforms, healthcare robots, and medical AI. Public and private actors are using new technologies, like heat sensing, and technologically-influenced programs, like contact tracing, alike in response, leading to a rise in government and corporate surveillance in sectors like healthcare, employment, education, and commerce. Advocates have raised the alarm for privacy and civil liberties violations, but the …


Screened Out Of Housing: The Impact Of Misleading Tenant Screening Reports And The Potential For Criminal Expungement As A Model For Effectively Sealing Evictions, Katelyn Polk Apr 2020

Screened Out Of Housing: The Impact Of Misleading Tenant Screening Reports And The Potential For Criminal Expungement As A Model For Effectively Sealing Evictions, Katelyn Polk

Northwestern Journal of Law & Social Policy

Having an eviction record “blacklists” tenants from finding future housing. Even renters with mere eviction filings—not eviction orders—on their records face the harsh collateral consequences of eviction. This Note argues that eviction records should be sealed at filing and only released into the public record if a landlord prevails in court. Juvenile record expungement mechanisms in Illinois serve as a model for one way to protect people with eviction records. Recent updates to the Illinois juvenile expungement process provided for the automatic expungement of certain records and strengthened the confidentiality protections of juvenile records. Illinois protects juvenile records because it …


Warrantless Searches Of Electronic Devices At U.S. Borders: Securing The Nation Or Violating Digital Liberty?, Ahad Khilji Jan 2019

Warrantless Searches Of Electronic Devices At U.S. Borders: Securing The Nation Or Violating Digital Liberty?, Ahad Khilji

Catholic University Journal of Law and Technology

The steady increase of U.S. citizens traveling with smart phones and other electronic devices has been met with the rise of searches and seizures by CBP officers at U.S borders. Although only less than 0.1% of all travelers may actually be subjected to a search while entering the United States, when comparing the statistics between a six month period in 2016 with the same period in 2017, electronic device searches have almost doubled from 8,383 to 14,993. Approximately one million travelers to the U.S. are inspected by the CBP every day. Out of this population, nearly 2,500 electronic devices are …


Power, Process, And Automated Decision-Making, Ari Ezra Waldman Jan 2019

Power, Process, And Automated Decision-Making, Ari Ezra Waldman

Articles & Chapters

Many decisions that used to be made by humans are now made by machines. And yet, automated decision-making systems based on “big data” – powered algorithms and machine learning are just as prone to mistakes, biases, and arbitrariness as their human counterparts. The result is a technologically driven decision-making process that seems to defy interrogation, analysis, and accountability and, therefore, undermines due process. This should make algorithmic decision-making an illegitimate source of authority in a liberal democracy. This Essay argues that algorithmic decision-making is a product of the neoliberal project to undermine social values like equality, nondiscrimination, and human flourishing …


Justice Blackmun And Individual Rights, Diane P. Wood Oct 2017

Justice Blackmun And Individual Rights, Diane P. Wood

Dickinson Law Review (2017-Present)

Of the many contributions Justice Blackmun has made to American jurisprudence, surely his record in the area of individual rights stands out for its importance. Throughout his career on the Supreme Court, he has displayed concern for a wide variety of individual and civil rights. He has rendered decisions on matters ranging from the most personal interests in autonomy and freedom from interference from government in life’s private realms, to the increasingly complex problems posed by discrimination based upon race, sex, national origin, alienage, illegitimacy, sexual orientation, and other characteristics. As his views have become well known to the public, …


Can The Government Deport Immigrants Using Information It Encouraged Them To Provide?, Amanda Frost Jan 2017

Can The Government Deport Immigrants Using Information It Encouraged Them To Provide?, Amanda Frost

Articles in Law Reviews & Other Academic Journals

This Essay describes the legal and policy issues raised by any systematic effort to deport unauthorized immigrants based on information the government invited them to provide. Part I briefly surveys some of the major laws, regulations, and programs that encourage unauthorized immigrants to identify themselves. Part II analyzes the strengths and weaknesses of the statutory and constitutional arguments that immigrants could raise as a defense against deportations based on self-reported data. Part III explains that even if the government’s systematic use of such data to deport unauthorized immigrants is legal, doing so would be a poor policy choice for any …


Health Information Equity, Craig Konnoth Jan 2017

Health Information Equity, Craig Konnoth

Publications

In the last few years, numerous Americans’ health information has been collected and used for follow-on, secondary research. This research studies correlations between medical conditions, genetic or behavioral profiles, and treatments, to customize medical care to specific individuals. Recent federal legislation and regulations make it easier to collect and use the data of the low-income, unwell, and elderly for this purpose. This would impose disproportionate security and autonomy burdens on these individuals. Those who are well-off and pay out of pocket could effectively exempt their data from the publicly available information pot. This presents a problem which modern research ethics …


Paying For Privacy And The Personal Data Economy, Stacy-Ann Elvy Jan 2017

Paying For Privacy And The Personal Data Economy, Stacy-Ann Elvy

Articles & Chapters

Growing demands for privacy and increases in the quantity and variety of consumer data have engendered various business offerings to allow companies, and in some instances consumers, to capitalize on these developments. One such example is the emerging “personal data economy” (PDE) in which companies, such as Datacoup, purchase data directly from individuals. At the opposite end of the spectrum, the “pay-for-privacy” (PFP) model requires consumers to pay an additional fee to prevent their data from being collected and mined for advertising purposes. This Article conducts a simultaneous in-depth exploration of the impact of burgeoning PDE and PFP models. It …


Protecting Privacy To Prevent Discrimination, Jessica L. Roberts May 2015

Protecting Privacy To Prevent Discrimination, Jessica L. Roberts

William & Mary Law Review

A person cannot consider information that she does not have. Unlawful discrimination, therefore, frequently requires discriminators to have knowledge about protected status. This Article exploits that simple reality, arguing that protecting privacy can prevent discrimination by restricting access to the very information discriminators use to discriminate. Although information related to many antidiscrimination categories, like race and sex, may be immediately apparent upon meeting a person, privacy law can still do significant work to prevent discrimination on the basis of less visible traits such as genetic information, age, national origin, ethnicity, and religion, as well as in cases of racial or …


Outing Privacy, Scott Skinner-Thompson Jan 2015

Outing Privacy, Scott Skinner-Thompson

Publications

The government regularly outs information concerning people's sexuality, gender identity, and HIV status. Notwithstanding the implications of such outings, the Supreme Court has yet to resolve whether the Constitution contains a right to informational privacy - a right to limit the government's ability to collect and disseminate personal information.

This Article probes informational privacy theory and jurisprudence to better understand the judiciary's reluctance to fully embrace a constitutional right to informational privacy. The Article argues that while existing scholarly theories of informational privacy encourage us to broadly imagine the right and its possibilities, often focusing on informational privacy's ability to …


Promoting Innovation While Preventing Discrimination: Policy Goals For The Scored Society, Danielle K. Citron, Frank Pasquale Dec 2014

Promoting Innovation While Preventing Discrimination: Policy Goals For The Scored Society, Danielle K. Citron, Frank Pasquale

Faculty Scholarship

There are several normative theories of jurisprudence supporting our critique of the scored society, which complement the social theory and political economy presented in our 2014 article on that topic in the Washington Law Review. This response to Professor Tal Zarsky clarifies our antidiscrimination argument while showing that is only one of many bases for the critique of scoring practices. The concerns raised by Big Data may exceed the capacity of extant legal doctrines. Addressing the potential injustice may require the hard work of legal reform.


License To Discriminate: How A Washington Florist Is Making The Case For Applying Intermediary Scrutiny To Sexual Orientation, Kendra Lacour Oct 2014

License To Discriminate: How A Washington Florist Is Making The Case For Applying Intermediary Scrutiny To Sexual Orientation, Kendra Lacour

Seattle University Law Review

Over the past few decades, the debate over sexual orientation has risen to the forefront of civil rights issues. Though the focus has generally been on the right to marriage, peripheral issues associated with the right to marriage—and with sexual orientation generally—have become more common in recent years. As the number of states permitting same-sex marriage—along with states prohibiting discrimination on the basis of sexual orientation—increases, so too does the conflict between providers of public accommodations and those seeking their services. Never is this situation more problematic than when religious beliefs are cited as the basis for denying services to …


Regulating The Internet Of Things: First Steps Toward Managing Discrimination, Privacy, Security, And Consent, Scott R. Peppet Jan 2014

Regulating The Internet Of Things: First Steps Toward Managing Discrimination, Privacy, Security, And Consent, Scott R. Peppet

Publications

The consumer "Internet of Things" is suddenly reality, not science fiction. Electronic sensors are now ubiquitous in our smartphones, cars, homes, electric systems, health-care devices, fitness monitors, and workplaces. These connected, sensor-based devices create new types and unprecedented quantities of detailed, high-quality information about our everyday actions, habits, personalities, and preferences. Much of this undoubtedly increases social welfare. For example, insurers can price automobile coverage more accurately by using sensors to measure exactly how you drive (e.g., Progressive 's Snapshot system), which should theoretically lower the overall cost of insurance. But the Internet of Things raises new and difficult questions …


Beyond Title Vii: Rethinking Race, Ex-Offender Status, And Employment Discrimination In The Information Age, Kimani Paul-Emile Jan 2014

Beyond Title Vii: Rethinking Race, Ex-Offender Status, And Employment Discrimination In The Information Age, Kimani Paul-Emile

Faculty Scholarship

More than sixty-five million people in the United States—more than one in four adults—have had some involvement with the criminal justice system that will appear on a criminal history report. A rapidly expanding, for-profit industry has developed to collect these records and compile them into electronic databases, offering employers an inexpensive and readily accessible means of screening prospective employees. Nine out of ten employers now inquire into the criminal history of job candidates, systematically denying individuals with a criminal record any opportunity to gain work experience or build their job qualifications. This is so despite the fact that many individuals …


No Cause Of Action: Video Surveillance In New York City, Olivia J. Greer Jan 2012

No Cause Of Action: Video Surveillance In New York City, Olivia J. Greer

Michigan Telecommunications & Technology Law Review

In 2010, New York City Police Commissioner Raymond Kelly announced a new network of video surveillance in the City. The new network would be able to prevent future terrorist attacks by identifying suspicious behavior before catastrophic events could take place. Kelly told reporters, "If we're looking for a person in a red jacket, we can call up all the red jackets filmed in the last 30 days," and "[w]e're beginning to use software that can identify suspicious objects or behaviors." Gothamist later made a witticism of Kelly's statement, remarking, "Note to terrorists: red jackets are not a good look for …


Electronic Privacy And Employee Speech, Pauline Kim Jan 2012

Electronic Privacy And Employee Speech, Pauline Kim

Scholarship@WashULaw

The boundary between work and private life is blurring as a result of changes in the organization of work and advances in technology. Current privacy law is ill-equipped to address these changes and as a result, employees’ privacy in their electronic communications is only weakly protected from employer scrutiny. At the same time, the law increasingly protects certain socially valued forms of employee speech. In particular, collective speech, speech that enforces workplace regulations and speech that deters or reports employer wrong-doing are explicitly protected by law from employer reprisals. These two developments — weak protection of employee privacy and increased …


Collateral Consequences, Genetic Surveillance, And The New Biopolitics Of Race, Dorothy E. Roberts Apr 2011

Collateral Consequences, Genetic Surveillance, And The New Biopolitics Of Race, Dorothy E. Roberts

All Faculty Scholarship

This Article is part of a Howard Law Journal Symposium on “Collateral Consequences: Who Really Pays the Price for Criminal Justice?,” as well as my larger book project, Fatal Invention: How Science, Politics, and Big Business Re-create Race in the Twenty-First Century (The New Press, 2011). It considers state and federal government expansion of genetic surveillance as a collateral consequence of a criminal record in the context of a new biopolitics of race in America. Part I reviews the expansion of DNA data banking by states and the federal government, extending the collateral impact of a criminal record—in the form …


Regulating The Use Of Genetic Information: Perspective From The U.S. Experience, Pauline Kim Jan 2010

Regulating The Use Of Genetic Information: Perspective From The U.S. Experience, Pauline Kim

Scholarship@WashULaw

This essay comments on an empirical study documenting the policies, practices, and attitudes of Australian employers regarding the use of genetic information from the U.S. perspective. The U.S. Congress recently enacted the Genetic Information Nondiscrimination Act of 2008 (GINA), which, among other things, prohibits employment discrimination on the basis of genetic information and restricts employers’ access to their employees’ genetic information. Just as the Australian study found no evidence of systematic use of genetic testing or screening by employers, GINA was passed in the absence of any evidence of widespread employment discrimination on the basis of genetic characteristics. Although it …


Chi Iota Colony Of Alpha Epsilon Pi Fraternity V. City University Of New York, Clinton N. Daggan Jan 2008

Chi Iota Colony Of Alpha Epsilon Pi Fraternity V. City University Of New York, Clinton N. Daggan

NYLS Law Review

No abstract provided.


Controlling Identity: Plessy, Privacy, And Racial Defamation, Jonathan Kahn Jan 2005

Controlling Identity: Plessy, Privacy, And Racial Defamation, Jonathan Kahn

Faculty Scholarship

This Article explores the origins of privacy law in early twentieth century America in relation to the legal solidification of Jim Crow in the aftermath of Plessy v. Ferguson. It considers some distinctively southern aspects of the origins of the right to privacy and argues that by viewing privacy, racial defamation, and Jim Crow in relation to each other, we can gain new insights into each-coming to understand that Plessy was not just about controlling space, or property, or even equality but also about controlling identity itself, and coming to see that in its origins, the right to privacy had …


Sexual Orientation And The Paradox Of Heightened Scrutiny, Nan D. Hunter Jun 2004

Sexual Orientation And The Paradox Of Heightened Scrutiny, Nan D. Hunter

Michigan Law Review

In Lawrence v. Texas, the Supreme Court performed a double move, creating a dramatic discursive moment: it both decriminalized consensual homosexual relations between adults, and, simultaneously, authorized a new regime of heightened regulation of homosexuality. How that happened and what we can expect next are the subjects of this essay. The obvious point of departure for an analysis of Lawrence is its decriminalization of much sexual conduct. Justice Scalia began this project with his dire warning that "[s]tate laws against bigamy, samesex marriage, adult incest, prostitution, masturbation, adultery, fornication, bestiality, and obscenity are . . . sustainable only in …


Psychosocial Risks Of Storing And Using Human Tissues In Research, Jon F. Merz Jun 1997

Psychosocial Risks Of Storing And Using Human Tissues In Research, Jon F. Merz

RISK: Health, Safety & Environment (1990-2002)

Dr. Merz argues that genetics technology makes it more compelling that researchers plan more carefully for the collection and disposition of information derived from subjects' tissues and blood.


Honesty, Privacy, And Shame: When Gay People Talk About Other Gay People To Nongay People, David L. Chambers, Steven K. Homer Jan 1997

Honesty, Privacy, And Shame: When Gay People Talk About Other Gay People To Nongay People, David L. Chambers, Steven K. Homer

Michigan Journal of Gender & Law

There is a longstanding convention among lesbians and gay men in the United States: Do not reveal the sexuality of a gay person to a heterosexual person; unless you are certain that the gay person does not regard his sexuality as a secret. Lie if necessary to protect her secret. Violating the convention by "outing" another person is widely considered a serious social sin.


The Constitutionality Of Laws Forbidding Private Homosexual Conduct, Michigan Law Review Aug 1974

The Constitutionality Of Laws Forbidding Private Homosexual Conduct, Michigan Law Review

Michigan Law Review

The laws of forty-three states and the District of Columbia impose criminal penalties on consenting adults who engage in private homosexual conduct. Most of these laws are sodomy statutes, which also prohibit oral and anal intercourse between heterosexuals and sexual acts with animals. Two states have statutes explicitly limited to homosexual conduct. These statutes also prohibit nonconsensual homosexual activity and homosexual acts involving a minor, but this Note addresses only prohibitions on private consensual adult homosexual conduct.