Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of Maryland Francis King Carey School of Law (3)
- Fordham Law School (2)
- Selected Works (2)
- The Catholic University of America, Columbus School of Law (2)
- Chicago-Kent College of Law (1)
-
- Cleveland State University (1)
- Columbia Law School (1)
- New York Law School (1)
- Schulich School of Law, Dalhousie University (1)
- Seattle University School of Law (1)
- SelectedWorks (1)
- St. Mary's University (1)
- University of Arkansas at Little Rock William H. Bowen School of Law (1)
- University of Michigan Law School (1)
- University of Pennsylvania Carey Law School (1)
- University of Richmond (1)
- Washington and Lee University School of Law (1)
- Publication
-
- Faculty Scholarship (3)
- Fordham Intellectual Property, Media and Entertainment Law Journal (2)
- All Faculty Scholarship (1)
- Articles, Book Chapters, & Popular Press (1)
- Catholic University Journal of Law and Technology (1)
-
- Catholic University Law Review (1)
- Chicago-Kent Law Review (1)
- Frank A. Pasquale (1)
- Jonathan I. Ezor (1)
- Journal of Business & Technology Law (1)
- Law Faculty Articles and Essays (1)
- Michigan Telecommunications & Technology Law Review (1)
- NYLS Law Review (1)
- Richmond Journal of Law & Technology (1)
- Scholarly Articles (1)
- Seattle Journal of Technology, Environmental & Innovation Law (1)
- St. Mary's Law Journal (1)
- University of Arkansas at Little Rock Law Review (1)
- W. Gregory Voss (1)
- Publication Type
Articles 1 - 22 of 22
Full-Text Articles in Law
Freedom Of Expression V. Social Responsibility On The Internet: Vivi Down Association V. Google, Raphael Cohen-Almagor, Natalina Stamile
Freedom Of Expression V. Social Responsibility On The Internet: Vivi Down Association V. Google, Raphael Cohen-Almagor, Natalina Stamile
Seattle Journal of Technology, Environmental & Innovation Law
The aim of the article is to reflect on Google’s social responsibility by analyzing a milestone court decision, Vivi Down Association v. Google, that took place in Italy, involving the posting of an offensive video clip on Google Video. It was a landmark decision because it refuted the assertion that the Internet knows no boundaries, that the Internet transcends national laws due to its international nature, and that Internet intermediaries, such as Google, are above the law. This case shows that when the legal authorities of a given country decide to assert their jurisdiction, Internet companies need to abide by …
Bipa: What Does It Stand For?, Paige Smith
Bipa: What Does It Stand For?, Paige Smith
Chicago-Kent Law Review
No abstract provided.
Hybrid Ip Rights For Software, Apis, And Guis: Understanding Copyright's Paradigm Shift, Howard Skaist
Hybrid Ip Rights For Software, Apis, And Guis: Understanding Copyright's Paradigm Shift, Howard Skaist
Catholic University Journal of Law and Technology
The non-literal scope of protection for software is intricate legally and is intricate technical. Thus, despite literally decades of court decisions and a mountain of legal scholar written on the subject in that time, it appears that there is still no consistent agreement about it, as evidenced by the Google v. Oracle which has percolated in the courts for nearly a decade and is now being heard by the US Supreme Court (oral argument was on October 7, 2020). However, the thesis of this article that a legal construct is capable of being formulated that is analytically consistent and that …
Just Plain Dumb?: How Digital Contact Tracing Apps Could’Ve Worked Better (And Why They Never Got The Chance), Brian E. Ray
Just Plain Dumb?: How Digital Contact Tracing Apps Could’Ve Worked Better (And Why They Never Got The Chance), Brian E. Ray
Law Faculty Articles and Essays
This essay describes how the privacy debate that emerged over digital contact tracing and Google’s and Apple’s decisions to strictly limit apps permitted to use their platforms resulted in undercutting their potential usefulness as a tool to combat the pandemic while still failing to engender trust in these tools as intended.
Bad Actors: Authenticity, Inauthenticity, Speech, And Capitalism, Sarah C. Haan
Bad Actors: Authenticity, Inauthenticity, Speech, And Capitalism, Sarah C. Haan
Scholarly Articles
“Authenticity” has evolved into an important value that guides social media companies’ regulation of online speech. It is enforced through rules and practices that include real-name policies, Terms of Service requiring users to present only accurate information about themselves, community guidelines that prohibit “coordinated inauthentic behavior,” verification practices, product features, and more.
This Article critically examines authenticity regulation by the social media industry, including companies’ claims that authenticity is a moral virtue, an expressive value, and a pragmatic necessity for online communication. It explains how authenticity regulation provides economic value to companies engaged in “information capitalism,” “data capitalism,” and “surveillance …
Privacy In Gaming, N. Cameron Russell, Joel R. Reidenberg, Sumyung Moon
Privacy In Gaming, N. Cameron Russell, Joel R. Reidenberg, Sumyung Moon
Fordham Intellectual Property, Media and Entertainment Law Journal
Video game platforms and business models are increasingly built on collection, use, and sharing of personal information for purposes of both functionality and revenue. This paper examines privacy issues and explores data practices, technical specifications, and policy statements of the most popular games and gaming platforms to provide an overview of the current privacy legal landscape for mobile gaming, console gaming, and virtual reality devices. The research observes how modern gaming aligns with information privacy notions and norms and how data practices and technologies specific to gaming may affect users and, in particular, child gamers.
After objectively selecting and analyzing …
Privacy And Legal Automation: The Dmca As A Case Study, Jonathon Penney
Privacy And Legal Automation: The Dmca As A Case Study, Jonathon Penney
Articles, Book Chapters, & Popular Press
Advances in artificial intelligence, machine learning, computing capacity, and big data analytics are creating exciting new possibilities for legal automation. At the same time, these changes pose serious risks for civil liberties and other societal interests. Yet, existing scholarship is narrow, leaving uncertainty on a range of issues, including a glaring lack of systematic empirical work as to how legal automation may impact people’s privacy and freedom. This article addresses this gap with an original empirical analysis of the Digital Millennium Copyright Act (DMCA), which today sits at the forefront of algorithmic law due to its automated enforcement of copyright …
From Innovation To Abuse: Does The Internet Still Need Section 230 Immunity?, Benjamin Volpe
From Innovation To Abuse: Does The Internet Still Need Section 230 Immunity?, Benjamin Volpe
Catholic University Law Review
In 1996, Congress passed the Communications Decency Act to allow the screening of offensive material from the internet, while preserving the continued development of the internet economy without burdensome regulation. However, for years, online intermediaries have successfully used the Act as a shield from liability when third parties use their online services to commit tortious or criminal acts. This Comment argues that a wholly-unregulated internet is no longer necessary to preserve the once-fledgling internet economy. After evaluating various approaches to intermediary liability, this Comment also argues that Congress should take a more comprehensive look at consumer protection online and establish …
Face Off: An Examination Of State Biometric Privacy Statutes & Data Harm Remedies, Maya E. Rivera
Face Off: An Examination Of State Biometric Privacy Statutes & Data Harm Remedies, Maya E. Rivera
Fordham Intellectual Property, Media and Entertainment Law Journal
As biometric authentication becomes an increasingly popular method of security among consumers, only three states currently have statutes detailing how such data may be collected, used, retained, and released. The Illinois Biometric Information Privacy Act is the only statute of the three that enshrines a private right of action for those who fail to properly handle biometric data. Both the Texas Capture or Use Biometric Identifier Act Information Act and the Washington Biometric Privacy Act allow for state Attorneys General to bring suit on behalf of aggrieved consumers. This Note examines these three statutes in the context of data security …
Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen
Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen
All Faculty Scholarship
Big Data is the vast quantities of information amenable to large-scale collection, storage, and analysis. Using such data, companies and researchers can deploy complex algorithms and artificial intelligence technologies to reveal otherwise unascertained patterns, links, behaviors, trends, identities, and practical knowledge. The information that comprises Big Data arises from government and business practices, consumer transactions, and the digital applications sometimes referred to as the “Internet of Things.” Individuals invisibly contribute to Big Data whenever they live digital lifestyles or otherwise participate in the digital economy, such as when they shop with a credit card, get treated at a hospital, apply …
The Right To Be Forgotten: Comparing U.S. And European Approaches, Samuel W. Royston
The Right To Be Forgotten: Comparing U.S. And European Approaches, Samuel W. Royston
St. Mary's Law Journal
This Article compares the European and United States stances regarding the right to be forgotten. Within that context, this Article explores the implications of technological advances on constitutional rights, specifically the intersection of the right to free speech and the right to privacy, commonly referred to as the "right to be forgotten" paradox. In the United States, the trend is to favor free speech, while Europe places an emphasis on human rights. Each approach is analyzed based on supporting case law. The consequences of each approach on society, both long- and short-term, are also discussed. This Article argues that a …
Welcome To The Machine: Privacy And Workplace Implications Of Predictive Analytics, Robert Sprague
Welcome To The Machine: Privacy And Workplace Implications Of Predictive Analytics, Robert Sprague
Richmond Journal of Law & Technology
Privacy is not simply an absence of information about us in the minds of others; rather it is the control we have over information about ourselves. The volume of information that people create themselves—the full range of communications from voice calls, e-mails and texts to uploaded pictures, video, and music—pales in comparison to the amount of digital information created about them each day.
Interview On The Black Box Society, Lawrence Joseph, Frank A. Pasquale
Interview On The Black Box Society, Lawrence Joseph, Frank A. Pasquale
Faculty Scholarship
Hidden algorithms drive decisions at major Silicon Valley and Wall Street firms. Thanks to automation, those firms can approve credit, rank websites, and make myriad other decisions instantaneously. But what are the costs of their methods? And what exactly are they doing with their digital profiles of us?
Leaks, whistleblowers, and legal disputes have shed new light on corporate surveillance and the automated judgments it enables. Self-serving and reckless behavior is surprisingly common, and easy to hide in code protected by legal and real secrecy. Even after billions of dollars of fines have been levied, underfunded regulators may have only …
Electronic Privacy Information Center V. National Security Agency: How Glomar Responses Benefit Businesses And Provide An Epic Blow To Individuals, Joshua R. Chazen
Electronic Privacy Information Center V. National Security Agency: How Glomar Responses Benefit Businesses And Provide An Epic Blow To Individuals, Joshua R. Chazen
Journal of Business & Technology Law
No abstract provided.
Digital Security In The Expository Society: Spectacle, Surveillance, And Exhibition In The Neoliberal Age Of Big Data, Bernard E. Harcourt
Digital Security In The Expository Society: Spectacle, Surveillance, And Exhibition In The Neoliberal Age Of Big Data, Bernard E. Harcourt
Faculty Scholarship
In 1827, Nicolaus Heinrich Julius, a professor at the University of Berlin, identified an important architectural mutation in nineteenth-century society that reflected a deep disruption in our technologies of knowledge and a profound transformation in relations of power across society: Antiquity, Julius observed, had discovered the architectural form of the spectacle; but modern times had operated a fundamental shift from spectacle to surveillance. Michel Foucault would elaborate this insight in his 1973 Collège de France lectures on The Punitive Society, where he would declare: “[T]his is precisely what happens in the modern era: the reversal of the spectacle into surveillance…. …
European Union Data Privacy Law Developments, W. Gregory Voss
European Union Data Privacy Law Developments, W. Gregory Voss
W. Gregory Voss
This article explores recent developments in European Union data privacy and data protection law, through an analysis of European Union advisory guidance, independent administrative agency enforcement action, case law, and legislative reform in the areas of digital technologies, the internet, telecommunications and personal data. In the first case, Article 29 Working Party guidance on anonymization techniques – so important in the field of big data – is discussed and distinguished from pseudonymization. Next, Google privacy policy enforcement action by various EU Member State data protection agencies (inter alia, France, Germany, Italy, the Netherlands and Spain) is chronicled, with lessons being …
Flawed Transparency: Shared Data Collection And Disclosure Challenges For Google Glass And Similar Technologies, Jonathan I. Ezor
Flawed Transparency: Shared Data Collection And Disclosure Challenges For Google Glass And Similar Technologies, Jonathan I. Ezor
Jonathan I. Ezor
Current privacy law and best practices assume that the party collecting the data is able to describe and disclose its practices to those from and about whom the data are collected. With emerging technologies such as Google Glass, the information being collected by the wearer may be automatically shared to one or more third parties whose use may be substantially different from that of the wearer. Often, the wearer may not even know what information is being uploaded, and how it may be used. This paper will analyze the current state of U.S. law and compliance regarding personal information collection …
Federal Search Commission? Access, Fairness, And Accountability In The Law Of Search, Oren Bracha, Frank Pasquale
Federal Search Commission? Access, Fairness, And Accountability In The Law Of Search, Oren Bracha, Frank Pasquale
Frank A. Pasquale
Should search engines be subject to the types of regulation now applied to personal data collectors, cable networks, or phone books? In this article, we make the case for some regulation of the ability of search engines to manipulate and structure their results. We demonstrate that the First Amendment, properly understood, does not prohibit such regulation. Nor will such interventions inevitably lead to the disclosure of important trade secrets. After setting forth normative foundations for evaluating search engine manipulation, we explain how neither market discipline nor technological advance is likely to stop it. Though savvy users and personalized search may …
Privacy For Social Networking, Connie Davis Powell
Privacy For Social Networking, Connie Davis Powell
University of Arkansas at Little Rock Law Review
This article begins by considering the emergence of social networks as a major medium of communication and posits that the success of social networks is attributable to their users' willingness to share their information. Next, the article considers the expectation of privacy for users of social networks and whether such expectation is reasonable. In particular, the article discusses the privacy policies and legal terms governing the use of social networks, and tracks the evolution of such terms and policies as they slowly whittle away user control over time. The article then discusses public outcry regarding the disclosure of information contrary …
Privacy Policies, Terms Of Service, And Ftc Enforcement: Broadening Unfairness Regulation For A New Era, G. S. Hans
Privacy Policies, Terms Of Service, And Ftc Enforcement: Broadening Unfairness Regulation For A New Era, G. S. Hans
Michigan Telecommunications & Technology Law Review
This Note examines website privacy policies in the context of FTC regulation. The relevant portion of Section 5 of the Federal Trade Commission Act, 15 U.S.C. § 45(a), uses the following language to define the scope of the agency's regulatory authority: "Unfair methods of competition in or affecting commerce, and unfair or deceptive acts or practices in or affecting commerce, are hereby declared unlawful." Specifically, this Note analyzes the FTC's power to regulate unfair practices (referred to as the FTC's "unfairness power") granted by Section 5, and also discusses the deception prong of Section 5, which allows the agency to …
The Google Dilemma, James Grimmelmann
Federal Search Commission? Access, Fairness, And Accountability In The Law Of Search, Oren Bracha, Frank Pasquale
Federal Search Commission? Access, Fairness, And Accountability In The Law Of Search, Oren Bracha, Frank Pasquale
Faculty Scholarship
Should search engines be subject to the types of regulation now applied to personal data collectors, cable networks, or phone books? In this article, we make the case for some regulation of the ability of search engines to manipulate and structure their results. We demonstrate that the First Amendment, properly understood, does not prohibit such regulation. Nor will such interventions inevitably lead to the disclosure of important trade secrets.
After setting forth normative foundations for evaluating search engine manipulation, we explain how neither market discipline nor technological advance is likely to stop it. Though savvy users and personalized search may …