Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Selected Works (4)
- Schulich School of Law, Dalhousie University (3)
- University of Michigan Law School (3)
- Chicago-Kent College of Law (1)
- Cleveland State University (1)
-
- Fordham Law School (1)
- Georgetown University Law Center (1)
- Loyola Marymount University and Loyola Law School (1)
- New York Law School (1)
- Osgoode Hall Law School of York University (1)
- Seattle University School of Law (1)
- The Catholic University of America, Columbus School of Law (1)
- University of Florida Levin College of Law (1)
- University of Maryland Francis King Carey School of Law (1)
- University of Missouri School of Law (1)
- University of Pittsburgh School of Law (1)
- Valparaiso University (1)
- Publication
-
- Articles, Book Chapters, & Popular Press (3)
- Michigan Telecommunications & Technology Law Review (2)
- All Faculty Scholarship (1)
- Articles (1)
- Articles & Chapters (1)
-
- Catholic University Journal of Law and Technology (1)
- Faculty Publications (1)
- Faculty Scholarship (1)
- Georgetown Law Faculty Publications and Other Works (1)
- Homeland Security Publications (1)
- Law Faculty Articles and Essays (1)
- Law Faculty Publications (1)
- Lorrie F Cranor (1)
- Loyola of Los Angeles Law Review (1)
- Omri Y Marian (1)
- PhD Dissertations (1)
- Richard Warner (1)
- Seattle University Law Review (1)
- UF Law Faculty Publications (1)
- Ulf Maunsbach (1)
- University of Michigan Journal of Law Reform (1)
- Publication Type
Articles 1 - 24 of 24
Full-Text Articles in Law
Implications For The Future Of Global Data Security And Privacy: The Territorial Application Of The Stored Communications Act And The Microsoft Case, Russell Hsiao
Catholic University Journal of Law and Technology
No abstract provided.
Are They Worth Reading? An In-Depth Analysis Of Online Trackers’ Privacy Policies, Candice Hoke, Lorrie Faith Cranor, Pedro Giovanni Leon, Alyssa Au
Are They Worth Reading? An In-Depth Analysis Of Online Trackers’ Privacy Policies, Candice Hoke, Lorrie Faith Cranor, Pedro Giovanni Leon, Alyssa Au
Lorrie F Cranor
We analyzed the privacy policies of 75 online tracking companies with the goal of assessing whether they contain information relevant for users to make privacy decisions. We compared privacy policies from large companies, companies that are members of self-regulatory organizations, and nonmember companies and found that many of them are silent with regard to important consumer-relevant practices including the collection and use of sensitive information and linkage of tracking data with personally-identifiable information. We evaluated these policies against self-regulatory guidelines and found that many policies are not fully compliant. Furthermore, the overly general requirements established in those guidelines allow companies …
The Continuing Battle Over Privacy Vs. Security, Ellen Cornelius
The Continuing Battle Over Privacy Vs. Security, Ellen Cornelius
Homeland Security Publications
No abstract provided.
A Conceptual Framework For The Regulation Of Cryptocurrencies, Omri Y. Marian
A Conceptual Framework For The Regulation Of Cryptocurrencies, Omri Y. Marian
Omri Y Marian
This Essay proposes a conceptual framework for the regulation of transactions involving cryptocurrencies. Cryptocurrencies offer tremendous opportunities for innovation and development but are also uniquely suited to facilitate illicit behavior. The regulatory framework suggested herein is intended to support (or at least not impair) cryptocurrencies’ innovative potential. At the same time, it aims to disrupt cryptocurrencies’ criminal utility. To achieve these purposes, this Essay proposes a regulatory framework that imposes costs on the characteristics of cryptocurrencies that make them especially useful for criminal behavior (in particular, anonymity) but does not impose costs on characteristics that are at the core of …
Authorized Investigation: A Temperate Alternative To Cyber Insecurity, Casey M. Bruner
Authorized Investigation: A Temperate Alternative To Cyber Insecurity, Casey M. Bruner
Seattle University Law Review
This Note aims to show that legal structures created to protect the Internet in its original form are completely insufficient to protect what the Internet has become. This antiquated legal framework is exacerbating the problem. The breadth of activity that the current law restricts severely limits the remedies that cyberattack victims can pursue, and it must be updated. While full hack-back may prove necessary in the long run, I argue for a more temperate initial response to the problem—I call this response “authorized investigation.” Specifically, the Computer Fraud and Abuse Act should be amended to allow victims access to their …
Internet Giants As Quasi-Governmental Actors And The Limits Of Contractual Consent, D. A. Jeremy Telman
Internet Giants As Quasi-Governmental Actors And The Limits Of Contractual Consent, D. A. Jeremy Telman
Law Faculty Publications
Although the government’s data-mining program relied heavily on information and technology that the government received from private companies, relatively little of the public outrage generated by Edward Snowden’s revelations was directed at those private companies. We argue that the mystique of the Internet giants and the myth of contractual consent combine to mute criticisms that otherwise might be directed at the real data-mining masterminds. As a result, consumers are deemed to have consented to the use of their private information in ways that they would not agree to had they known the purposes to which their information would be put …
Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg
Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg
Michigan Telecommunications & Technology Law Review
This Article reveals interdependent legal and technical loopholes that the US intelligence community could use to circumvent constitutional and statutory safeguards for Americans. These loopholes involve the collection of Internet traffic on foreign territory, and leave Americans as unprotected as foreigners by current United States (US) surveillance laws. This Article will also describe how modern Internet protocols can be manipulated to deliberately divert American’s traffic abroad, where traffic can then be collected under a more permissive legal regime (Executive Order 12333) that is overseen solely by the executive branch of the US government. Although the media has reported on some …
Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey
Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey
Michigan Telecommunications & Technology Law Review
The third-party doctrine is a long-standing tenant of Fourth Amendment law that allows law enforcement officers to utilize information that was released to a third party without the probable cause required for a traditional search warrant. This has allowed law enforcement agents to use confidential informants, undercover agents, and access bank records of suspected criminals. However, in a digital age where exponentially more information is shared with Internet Service Providers, e-mail hosts, and social media “friends,” the traditional thirdparty doctrine ideas allow law enforcement officers access to a cache of personal information and data with a standard below probable cause. …
Reputational Privacy And The Internet: A Matter For Law?, Elizabeth Anne Kirley
Reputational Privacy And The Internet: A Matter For Law?, Elizabeth Anne Kirley
PhD Dissertations
Reputation - we all have one. We do not completely comprehend its workings and are mostly unaware of its import until it is gone. When we lose it, our traditional laws of defamation, privacy, and breach of confidence rarely deliver the vindication and respite we seek due, primarily, to legal systems that cobble new media methods of personal injury onto pre-Internet laws. This dissertation conducts an exploratory study of the relevance of law to loss of individual reputation perpetuated on the Internet. It deals with three interrelated concepts: reputation, privacy, and memory. They are related in that the increasing lack …
Are They Worth Reading? An In-Depth Analysis Of Online Trackers’ Privacy Policies, Candice Hoke, Lorrie Faith Cranor, Pedro Giovanni Leon, Alyssa Au
Are They Worth Reading? An In-Depth Analysis Of Online Trackers’ Privacy Policies, Candice Hoke, Lorrie Faith Cranor, Pedro Giovanni Leon, Alyssa Au
Law Faculty Articles and Essays
We analyzed the privacy policies of 75 online tracking companies with the goal of assessing whether they contain information relevant for users to make privacy decisions. We compared privacy policies from large companies, companies that are members of self-regulatory organizations, and nonmember companies and found that many of them are silent with regard to important consumer-relevant practices including the collection and use of sensitive information and linkage of tracking data with personally-identifiable information. We evaluated these policies against self-regulatory guidelines and found that many policies are not fully compliant. Furthermore, the overly general requirements established in those guidelines allow companies …
Information Technology And The Law - Privacy, Ulf Maunsbach
Information Technology And The Law - Privacy, Ulf Maunsbach
Ulf Maunsbach
No abstract provided.
The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan
The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan
Richard Warner
We focus on privacy in public. The notion dates back over a century, at least to the work of the German sociologist, Georg Simmel. Simmel observed that people voluntarily limit their knowledge of each other as they interact in a wide variety of social and commercial roles, thereby making certain information private relative to the interaction even if it is otherwise publicly available. Current governmental surveillance in the US (and elsewhere) reduces privacy in public. But to what extent?
The question matters because adequate self-realization requires adequate privacy in public. That in turn depends on informational norms, social norms that …
Social Media And The Job Market: How To Reconcile Applicant Privacy With Employer Needs, Peter B. Baumhart
Social Media And The Job Market: How To Reconcile Applicant Privacy With Employer Needs, Peter B. Baumhart
University of Michigan Journal of Law Reform
In the modern technological age, social media allows us to communicate vast amounts of personal information to countless people instantaneously. This information is valuable to more than just our “friends” and “followers,” however. Prospective employers can use this personal data to inform hiring decisions, thereby maximizing fit and minimizing potential liability. The question then arises, how best to acquire this information? For job applicants, the counter-question is how best to protect the privacy of their social media accounts. As these two competing desires begin to clash, it is important to find a method to mediate the conflict. Existing privacy law, …
Privacy As Trust: Sharing Personal Information In A Networked World, Ari Ezra Waldman
Privacy As Trust: Sharing Personal Information In A Networked World, Ari Ezra Waldman
Articles & Chapters
This Article is the first in a series on the legal and sociological aspects of privacy, arguing that private contexts are defined by relationships of trust among individuals. The argument reorients privacy scholarship from an individual right to social relationships of disclosure. This has implications for a wide variety of vexing problems of modern privacy law, from limited disclosures to “revenge porn.”
The common everyday understanding is that privacy is about choice, autonomy, and individual freedom. It encompasses the individual’s right to determine what he will keep hidden and what, how, and when he will disclose to the public. Privacy …
The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan
The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan
All Faculty Scholarship
We focus on privacy in public. The notion dates back over a century, at least to the work of the German sociologist, Georg Simmel. Simmel observed that people voluntarily limit their knowledge of each other as they interact in a wide variety of social and commercial roles, thereby making certain information private relative to the interaction even if it is otherwise publicly available. Current governmental surveillance in the US (and elsewhere) reduces privacy in public. But to what extent?
The question matters because adequate self-realization requires adequate privacy in public. That in turn depends on informational norms, social norms that …
The Cycles Of Global Telecommunication Censorship And Surveillance, Jonathon Penney
The Cycles Of Global Telecommunication Censorship And Surveillance, Jonathon Penney
Articles, Book Chapters, & Popular Press
Internet censorship and surveillance is on the rise globally and cyber-warfare increasing in scope and intensity. To help understand these new threats commentators have grasped at historical analogies often with little regard for historical complexity or international perspective. Unfortunately, helpful new works on telecommunications history have focused primarily on U.S. history with little focus on international developments. There is thus a need for further internationally oriented investigation of telecommunications technologies, and their history. This essay attempts to help fill that void, drawing on case studies wherein global telecommunications technologies have been disrupted or censored — telegram censorship and surveillance, high …
Law As An Ally Or Enemy In The War On Cyberbullying: Exploring The Contested Terrain Of Privacy And Other Legal Concepts In The Age Of Technology And Social Media, A. Wayne Mackay
Articles, Book Chapters, & Popular Press
This article focuses on the role and limits of law as a response to cyberbullying. The problem of cyberbullying engages many of our most fundamental legal concepts and provides an interesting case study. Even when there is general agreement that the problem merits a legal response, there are significant debates about what that response should be. Which level and what branch of government can and should best respond? What is the most appropriate legal process for pursuing cyberbullies—traditional legal avenues or more creative restorative approaches? How should the rights and responsibilities of perpetrators, victims and even bystanders be balanced? Among …
The Cycles Of Global Telecommunication Censorship And Surveillance, Jonathon Penney
The Cycles Of Global Telecommunication Censorship And Surveillance, Jonathon Penney
Articles, Book Chapters, & Popular Press
Internet censorship and surveillance is on the rise globally and cyber-warfare increasing in scope and intensity. To help understand these new threats commentators have grasped at historical analogies often with little regard for historical complexity or international perspective. Unfortunately, helpful new works on telecommunications history have focused primarily on U.S. history with little focus on international developments. There is thus a need for further internationally oriented investigation of telecommunications technologies, and their history. This essay attempts to help fill that void, drawing on case studies wherein global telecommunications technologies have been disrupted or censored — telegram censorship and surveillance, high …
Disagreeable Privacy Policies: Mismatches Between Meaning And Users’ Understanding, Joel R. Reidenberg, Travis Breaux, Lorrie F. Cranor, Brian M. French, Amanda Grannis, James T. Graves, Fei Liu, Aleecia Mcdonald, Thomas B. Norton, Rohan Ramanath, N. Cameron Russell, Norman Sadeh, Florian Schaub
Disagreeable Privacy Policies: Mismatches Between Meaning And Users’ Understanding, Joel R. Reidenberg, Travis Breaux, Lorrie F. Cranor, Brian M. French, Amanda Grannis, James T. Graves, Fei Liu, Aleecia Mcdonald, Thomas B. Norton, Rohan Ramanath, N. Cameron Russell, Norman Sadeh, Florian Schaub
Faculty Scholarship
Privacy policies are verbose, difficult to understand, take too long to read, and may be the least-read items on most websites even as users express growing concerns about information collection practices. For all their faults, though, privacy policies remain the single most important source of information for users to attempt to learn how companies collect, use, and share data. Likewise, these policies form the basis for the self-regulatory notice and choice framework that is designed and promoted as a replacement for regulation. The underlying value and legitimacy of notice and choice depends, however, on the ability of users to understand …
Data Breach (Regulatory) Effects, David Thaw
Privacy And The New Press, Lyrissa Lidsky
Privacy And The New Press, Lyrissa Lidsky
Faculty Publications
In The First Amendment Bubble, Professor Amy Gajda comprehensively examines privacy threats posed by digital media and “quasi-journalists” and demonstrates how their intrusive practices threaten existing press freedoms.
The Dawn Of Social Intelligence (Socint), Laura K. Donohue
The Dawn Of Social Intelligence (Socint), Laura K. Donohue
Georgetown Law Faculty Publications and Other Works
More information about citizens’ lives is recorded than ever before. Because the data is digitized, it can be accessed, analyzed, shared, and combined with other information to generate new knowledge. In a post-9/11 environment, the legal standards impeding access to such data have fallen. Simultaneously, the advent of global communications and cloud computing, along with network convergence, have expanded the scope of information available. The U.S. government has begun to collect and to analyze the associated data.
The result is the emergence of what can be termed “social intelligence” (SOCINT), which this Article defines as the collection of digital data …
Dear Yahoo: A Comment On In Re Yahoo Mail Litigation, Nareen Melkonian
Dear Yahoo: A Comment On In Re Yahoo Mail Litigation, Nareen Melkonian
Loyola of Los Angeles Law Review
No abstract provided.
A Conceptual Framework For The Regulation Of Cryptocurrencies, Omri Y. Marian
A Conceptual Framework For The Regulation Of Cryptocurrencies, Omri Y. Marian
UF Law Faculty Publications
This Essay proposes a conceptual framework for the regulation of transactions involving cryptocurrencies. Cryptocurrencies offer tremendous opportunities for innovation and development but are also uniquely suited to facilitate illicit behavior. The regulatory framework suggested herein is intended to support (or at least not impair) cryptocurrencies’ innovative potential. At the same time, it aims to disrupt cryptocurrencies’ criminal utility. To achieve these purposes, this Essay proposes a regulatory framework that imposes costs on the characteristics of cryptocurrencies that make them especially useful for criminal behavior (in particular, anonymity) but does not impose costs on characteristics that are at the core of …