Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Law (16)
- Internet Law (11)
- Communications Law (9)
- Social and Behavioral Sciences (8)
- Health Law and Policy (7)
-
- Arts and Humanities (6)
- Consumer Protection Law (6)
- Constitutional Law (5)
- Intellectual Property Law (5)
- Legislation (5)
- Science and Technology Law (5)
- Administrative Law (4)
- Library and Information Science (4)
- Privacy Law (4)
- Civil Law (3)
- Civil Rights and Discrimination (3)
- Commercial Law (3)
- Computer Sciences (3)
- Criminal Law (3)
- European Law (3)
- International Law (3)
- Labor and Employment Law (3)
- Law and Society (3)
- Philosophy (3)
- Physical Sciences and Mathematics (3)
- Political Science (3)
- Public Law and Legal Theory (3)
- Business (2)
- Criminal Procedure (2)
- Publication Year
- Publication
-
- Dr Rebecca Wong (6)
- Mireille Hildebrandt (5)
- Adam Lamparello (3)
- Andrew B. Serwin (3)
- Corey A Ciocchetti (3)
-
- Jacqueline D Lipton (3)
- Wilhelm Peekhaus (3)
- David E Clark (2)
- Elad Oreg (2)
- Jonathan I. Ezor (2)
- Serge Gutwirth (2)
- derek m Alphran (2)
- AALL/LexisNexis Call for Papers (1)
- Adam Thierer (1)
- Albert E Poirier Jr. (1)
- Amien Kacou (1)
- Andrew Askland (1)
- Angela Goodrum (1)
- Ann Bartow (1)
- Chris Peterson (1)
- Christina E. Wells (1)
- Christopher E Paxton (1)
- Dan Massoglia (1)
- Dennis D Hirsch (1)
- Deth Sao (1)
- Deven R. Desai (1)
- Dr. Dennis J Baker (1)
- Eric J. Miller (1)
- Gabrielle Z Kohlmeier (1)
- Guido Noto La Diega (1)
Articles 1 - 30 of 99
Full-Text Articles in Law
How Did You Know That? Protecting Privacy Interests Of Research Participants Via Certificates Of Confidentiality, Jonathan S. Miller
How Did You Know That? Protecting Privacy Interests Of Research Participants Via Certificates Of Confidentiality, Jonathan S. Miller
Jonathan S Miller
Answering novel medical hypotheses requires investigators to have robust and demographically diverse biospecimens and genetic data to facilitate their research. Doing so however also requires adequate participation by human subjects willing to consent to the donation and use of their biospecimens and genetic data for future unforeseen research. Although advances in scientific methodologies and technologies to understand the etiology of diseases and facilitate the development of improved therapeutics are critical to enhancing the common good; these advances pose informational risks associated with the re-identification of individuals. The conundrum exists about how to mitigate the privacy concerns associated with potential re-identification …
Federal Programs And The Real Costs Of Policing, Rachel A. Harmon
Federal Programs And The Real Costs Of Policing, Rachel A. Harmon
Rachel A. Harmon
Dozens of federal statutes authorize federal agencies to give money and power to local police departments and municipalities in order to improve public safety. While these federal programs encourage better coordination of police efforts and make pursuing public safety less financially costly for local communities, they also encourage harmful policing. Of course, policing often interferes with our interests in autonomy, privacy, and property, and those harms are often worthwhile in exchange for security and order. Federal public safety programs, however, are designed, implemented, and evaluated without reference to the nonbudgetary costs of policing. When those costs are high, federal programs …
Is There Anybody Out There? Analyzing The Regulation Of Children’S Privacy Online In The United States Of America And The European Union According To Eberlein Et Al. Tbgi Analytical Framework, Nachshon Goltz Mr.
Nachshon Goltz Mr.
This article analyzes the regulation of children’s privacy online, especially in the context of personal information collection as a commodity, in the United States of America and the European Union according to Eberlein et. al. Transnational Business Governance Framework. The article reviews the regulatory structure of this field in these two jurisdictions including global organizations, according to Elberlein et al components and questions. In the analysis, a map of the regulatory interactions within this global realm will be presented and discussed. Finally, conclusions are drawn and suggestions are made.
Developing And Testing A Surveillance Impact Assessment Methodology, David Wright, Michael Friedewald, Raphael Gellert
Developing And Testing A Surveillance Impact Assessment Methodology, David Wright, Michael Friedewald, Raphael Gellert
Michael Friedewald
With the increasing pervasiveness of surveillance, from big companies such as Google and Facebook, as well as from the intelligence agencies, such as the US National Security Agency (NSA) and the UK Government Communications Headquarters (GCHQ), there is a clear need for a surveillance impact assessment (SIA), a method that addresses not only issues of privacy and data protection, but also ethical, social, economic, and political issues.
The SAPIENT project, funded by the European Commission, and undertaken by a consortium of partners from several European countries, aimed to develop an SIA methodology, based on stake- holder needs and a set …
The Internet Of Things And Wearable Technology: Addressing Privacy And Security Concerns Without Derailing Innovation, Adam D. Thierer
The Internet Of Things And Wearable Technology: Addressing Privacy And Security Concerns Without Derailing Innovation, Adam D. Thierer
Adam Thierer
This paper highlights some of the opportunities presented by the rise of the so-called “Internet of Things” and wearable technology in particular, and encourages policymakers to allow these technologies to develop in a relatively unabated fashion. As with other new and highly disruptive digital technologies, however, the Internet of Things and wearable tech will challenge existing social, economic, and legal norms. In particular, these technologies raise a variety of privacy and safety concerns. Other technical barriers exist that could hold back IoT and wearable tech — including disputes over technical standards, system interoperability, and access to adequate spectrum to facilitate …
Cloud Computing E Protezione Dei Dati Nel Web 3.0 (Cloud Computing And Data Protection In The Web 3.0), Guido Noto La Diega
Cloud Computing E Protezione Dei Dati Nel Web 3.0 (Cloud Computing And Data Protection In The Web 3.0), Guido Noto La Diega
Guido Noto La Diega
‘Cloud computing’ in simplified terms can be understood as the storing, processing and use of data on remotely located computers accessed over the internet. This means that users can command almost unlimited computing power on demand, that they do not have to make major capital investments to fulfil their needs and that they can get to their data from anywhere with an internet connection (COM(2012) 529 final, unleashing the potential of cloud computing in Europe). The essay focuses on the problems of privacy and data security in european law and italian law from the perspective of cloud computing. Italian Abstract: …
Abidor V. Napolitano: Suspicionless Cell Phone And Laptop Searches At The Border Compromise The Fourth And First Amendments, Adam Lamparello, Charles Maclean
Abidor V. Napolitano: Suspicionless Cell Phone And Laptop Searches At The Border Compromise The Fourth And First Amendments, Adam Lamparello, Charles Maclean
Adam Lamparello
The article explores the December 31, 2013 Abidor decision where the federal district court upheld the ongoing application of the border search exception as applied to deep, forensic searches of laptops and other digital devices. That exception allows suspicionless searches of any persons, effects, and “closed containers” crossing a border into the United States, and laptops and external hard drives are generally considered “closed containers” under the border search exception. We argue that the border search exception, grounded as it is in pre-digital age fact patterns, should no longer serve as precedent for border searches of the immense memories of …
Amicus Brief -- Riley V. California And United States V. Wurie, Charles E. Maclean, Adam Lamparello
Amicus Brief -- Riley V. California And United States V. Wurie, Charles E. Maclean, Adam Lamparello
Adam Lamparello
Warrantless searches of cell phone memory—after a suspect has been arrested, and after law enforcement has seized the phone—would have been unconstitutional at the time the Fourth Amendment was adopted, and are unconstitutional now. Simply stated, they are unreasonable. And reasonableness—not a categorical warrant requirement—is the “touchstone of Fourth Amendment analysis.”
The Unc Law Library's Redaction Of Its Digitized Collection Of North Carolina Supreme Court Briefs: A Case Study, Nicole Downing
The Unc Law Library's Redaction Of Its Digitized Collection Of North Carolina Supreme Court Briefs: A Case Study, Nicole Downing
AALL/LexisNexis Call for Papers
This study evaluates the digital redaction process as undertaken by the University of North Carolina Kathrine R. Everett Law Library as part of digitizing their collection of North Carolina Supreme Court briefs. New privacy concerns are raised by digitizing court documents and making them available online. Libraries have an interest in digitizing their print collections of court documents for public access on the Internet, but have received no clear guidance on how to proceed in the face of legal concerns. The purpose of this research is to inform libraries of the legal, ethical, and practical situation surrounding redaction of digitized …
The Rise And Fall Of The Exclusionary Rule, Albert E. Poirier Jr.
The Rise And Fall Of The Exclusionary Rule, Albert E. Poirier Jr.
Albert E Poirier Jr.
The years between 1913 and 1967 saw a growing tendency on the part of the Supreme Court to allow the submission of evidence that had been gained unlawfully by the police or prosecutors. Since 1961, and particularly during the Rehnquist and Roberts Courts, the rules excluding evidence have steadily diminished. This paper seeks to review the history of the exclusionary rule.
Flawed Transparency: Shared Data Collection And Disclosure Challenges For Google Glass And Similar Technologies, Jonathan I. Ezor
Flawed Transparency: Shared Data Collection And Disclosure Challenges For Google Glass And Similar Technologies, Jonathan I. Ezor
Jonathan I. Ezor
Current privacy law and best practices assume that the party collecting the data is able to describe and disclose its practices to those from and about whom the data are collected. With emerging technologies such as Google Glass, the information being collected by the wearer may be automatically shared to one or more third parties whose use may be substantially different from that of the wearer. Often, the wearer may not even know what information is being uploaded, and how it may be used. This paper will analyze the current state of U.S. law and compliance regarding personal information collection …
Anonymity Is The Battlefield: Practical And Legal Considerations In The Fight For Free Expression On The Web, Dan Massoglia
Anonymity Is The Battlefield: Practical And Legal Considerations In The Fight For Free Expression On The Web, Dan Massoglia
Dan Massoglia
No abstract provided.
Privacy As A Tool For Antidiscrimination, Jessica Roberts
Privacy As A Tool For Antidiscrimination, Jessica Roberts
Jessica L. Roberts
Traditionally, laws that protect privacy and laws that prohibit discrimination have been considered distinct kinds of legal protections. This Essay challenges that binary on both practical and theoretical grounds. Using the Genetic Information Nondiscrimination Act (GINA) as a case study, it argues that lawmakers can use privacy law to further antidiscrimination goals. GINA, which prohibits genetic-information discrimination in health insurance and employment, does more than simply outlaw discriminatory conduct. It also prohibits employers from requiring—or even requesting—their employees’ genetic information. While GINA’s privacy and antidiscrimination protections have previously been viewed as discrete, this Essay reads them in concert, arguing that …
Snopa And The Ppa: Do You Know What It Means For You? If Snopa (Social Networking Online Protection Act) Or Ppa (Password Protection Act) Do Not Pass, The Snooping Could Cause You Trouble, Angela Goodrum
Angela Goodrum
No abstract provided.
Balance Or Trade-Off? Online Security Technologies And Fundamental Rights, Mireille Hildebrandt
Balance Or Trade-Off? Online Security Technologies And Fundamental Rights, Mireille Hildebrandt
Mireille Hildebrandt
In this contribution I argue that the image of the balance is often used to defend the idea of a trade-off. To understand the drawbacks of this line of thought I will explore the relationship between online security technologies and fundamental rights, notably privacy, non-discrimination, freedom of speech and due process. After discriminating between three types of online security technologies I will trace the reconfiguration of the notion of privacy in the era of smart environments. This will lead to an inquiry into the metaphor of the scale, building on the triple test regarding the justification of the limitation of …
Privacy, Transparency & Google's Blurred Glass, Jonathan I. Ezor
Privacy, Transparency & Google's Blurred Glass, Jonathan I. Ezor
Jonathan I. Ezor
No matter the context or jurisdiction, one concept underlies every view of the best practices in data privacy: transparency. The mandate to disclose what personal information is collected, how it is used, and with whom and for what purpose it is shared, is essential to enable informed consent to the collection, along with the other user rights that constitute privacy best practices. Google, which claims to support and offer transparency, is increasingly opaque about its many products and services and the information they collect for it, posing a significant privacy concern.
Amicus Brief: State V. Glover (Maine Supreme Judicial Court), Adam Lamparello, Charles Maclean
Amicus Brief: State V. Glover (Maine Supreme Judicial Court), Adam Lamparello, Charles Maclean
Adam Lamparello
When law enforcement seeks to obtain a warrantless, pre-arrest DNA sample from an individual, that individual has the right to say “No.” If silence is to become a “badge of guilt,” then the right to silence—under the United States and Maine Constitutions—might become a thing of the past. Allowing jurors to infer consciousness of guilt from a pre-arrest DNA sample violates the Fourth Amendment to the United States and Maine Constitutions.
Introduction To The Value Of Personal Data, Mireille Hildebrandt, Kieron O'Hara, Michael Waidner
Introduction To The Value Of Personal Data, Mireille Hildebrandt, Kieron O'Hara, Michael Waidner
Mireille Hildebrandt
This Chapter provides an introduction to and overview of the 2013 Yearbook of the Digital Enlightenment Forum, on the subject of the value of personal data. It discusses why we should care about the current monetization of our personal data and raises the issue of whether and, if so, how user-centric personal data ecosystems help to rebalance power asymmetries between individual citizens and large Personal Data Processing Systems.
Intellectual Property And Public Health – A White Paper, Ryan G. Vacca, Jim Chen, Jay Dratler Jr., Tom Folsom, Timothy Hall, Yaniv Heled, Frank Pasquale, Elizabeth Reilly, Jeff Samuels, Kathy Strandburg, Kara Swanson, Andrew Torrance, Katharine Van Tassel
Intellectual Property And Public Health – A White Paper, Ryan G. Vacca, Jim Chen, Jay Dratler Jr., Tom Folsom, Timothy Hall, Yaniv Heled, Frank Pasquale, Elizabeth Reilly, Jeff Samuels, Kathy Strandburg, Kara Swanson, Andrew Torrance, Katharine Van Tassel
Ryan G. Vacca
On October 26, 2012, the University of Akron School of Law’s Center for Intellectual Property and Technology hosted its Sixth Annual IP Scholars Forum. In attendance were thirteen legal scholars with expertise and an interest in IP and public health who met to discuss problems and potential solutions at the intersection of these fields. This report summarizes this discussion by describing the problems raised, areas of agreement and disagreement between the participants, suggestions and solutions made by participants and the subsequent evaluations of these suggestions and solutions.
Led by the moderator, participants at the Forum focused generally on three broad …
After Privacy: The Rise Of Facebook, The Fall Of Wikileaks, And Singapore’S Personal Data Protection Act 2012, Simon Chesterman
After Privacy: The Rise Of Facebook, The Fall Of Wikileaks, And Singapore’S Personal Data Protection Act 2012, Simon Chesterman
Simon Chesterman
This article discusses the changing ways in which information is produced, stored, and shared — exemplified by the rise of social-networking sites like Facebook and controversies over the activities of WikiLeaks — and the implications for privacy and data protection. Legal protections of privacy have always been reactive, but the coherence of any legal regime has also been undermined by the lack of a strong theory of what privacy is. There is more promise in the narrower field of data protection. Singapore, which does not recognise a right to privacy, has positioned itself as an e-commerce hub but had no …
Photo Radar Enforcement As A Slippery Slope, Andrew Askland
Photo Radar Enforcement As A Slippery Slope, Andrew Askland
Andrew Askland
No abstract provided.
Interoperable Electronic Healthcare Record: A Case For Adoption Of A National Standard To Stem The Ongoing Healthcare Crisis, Deth Sao, Amar Gupta, David A. Gantz
Interoperable Electronic Healthcare Record: A Case For Adoption Of A National Standard To Stem The Ongoing Healthcare Crisis, Deth Sao, Amar Gupta, David A. Gantz
Deth Sao
Interoperable electronic health records (EHR) have the capacity to deliver health care at optimal costs and quality in the United States, but current private and public initiatives have delayed nationwide implementation by failing to overcome several obstacles. These obstacles include: widespread reluctance in adopting health information technology (HIT); differing technical and semantic standards for communication between vendor systems; and legal challenges, which are mainly based on liability, privacy, and security concerns. This paper examines these challenges and the inadequacies of current HIT-EHR implementation strategies, questioning in particular the validity of privacy and security-based concerns. A comparison with the U.S. finance …
Right To Information Identity, Elad Oreg
Right To Information Identity, Elad Oreg
Elad Oreg
Inspired by the famous Warren&Brandeis conceptualization of the "right to privacy", this article tries to answer a different modern conceptual lacuna and present the argument for the need to conceptualize and recognize a new, independent legal principle of a "right to information-identity". This is the right of an individual to the functionality of the information platforms that enable others to identify and know him and to remember who and what he is. What was happening regarding privacy in the late 19th century happens now with identity. Changes in technology and social standards make the very notion of identity increasingly fluid, …
Understanding 'The Loop': Regulating The Next Generation Of War Machines, William Marra, Sonia Mcneil
Understanding 'The Loop': Regulating The Next Generation Of War Machines, William Marra, Sonia Mcneil
William Marra
The United States is in the midst of a national debate about the role drone aircraft should play in warfare abroad and law enforcement at home. Armed drones hunt enemies abroad 24 hours a day, seven days a week. Drones have begun to patrol our domestic skies too, on the lookout for suspicious activity. But contemporary drones are merely the “Model T” of robot technology. Today, humans are still very much “in the loop”: humans decide when to launch a drone, where it should fly, and whether it should take action against a suspect. But as drones develop greater autonomy, …
Data Protection: Idealisms And Realisms, Rebecca Wong Dr
Data Protection: Idealisms And Realisms, Rebecca Wong Dr
Dr Rebecca Wong
Following proposals to consider revising the Data Protection Directive 95/46/EC (DPD) in 2011, have the changes addressed the main areas of concern that have been the focus of much discussion? The areas of concern include the application of the Directive in the online age, particularly to social networking sites and cloud computing; the minimum/maximum standard approach by the EU Member States to data protection; the relevance and application of the data protection principles. These are some of the issues that were considered in the recent Art. 29 Working Party’s Opinion on the Future of Privacy. The article will use this …
De Rechtsstaat In Cyberspace?, Mireille Hildebrandt
De Rechtsstaat In Cyberspace?, Mireille Hildebrandt
Mireille Hildebrandt
Cyberspace is inmiddels overal. Wat tien jaar geleden misschien nog een aparte niet-fysieke wereld leek waar niemand wist dat je een hond was, gaat steeds meer lijken op een verzameling onderling verbonden dorpspleinen. Met dien verstande dat alles wat iedereen doet permanent wordt opgenomen, opgeslagen en doorzocht op betekenisvolle patronen. Steeds meer personen, organisaties maar ook dingen raken verbonden via het internet. De Internationale Telecommunicatie Unie sprak in 2005 van het ‘internet van de dingen’, om aan te geven dat binnen afzienbare tijd alles overal (‘everyware’) via draadloze identificatiesystemen traceerbaar is. Intussen raakt iedereen via de smartphone ‘always on(line)’. Deze …
Right To Information Identity, Elad Oreg
Right To Information Identity, Elad Oreg
Elad Oreg
Inspired by the famous Warren&Brandeis conceptualization of the "right to privacy", this article tries to answer a modern conceptual lacuna and present the argument for the need to conceptualize and recognize a new, independent legal principle of a "right to information-identity". This is the right of an individual to the functionality of the information platforms that enable others to identify and know him and to remember who and what he is. Changes in technology and social standards make the very notion of identity increasingly fluid, transforming the way it is treated and opening new and fascinating ways of relating to …
Personal Data Protection In The Era Of Cloud Computing. New Challenges For European Regulators., Panagiotis Kitsos, Paraskevi Pappas
Personal Data Protection In The Era Of Cloud Computing. New Challenges For European Regulators., Panagiotis Kitsos, Paraskevi Pappas
Panagiotis Kitsos
It is widely aknowledged that we are entering in an era of revolutionary changes in the field of Information and Communication Technologies . The spread of broadband internet connections has led internet to function not only as a communications network but also as a platform for new computing applications. The most recent application is the so called "cloud computing", which permits the running of software applications or the storage of data to be performed at remote servers which are connected to our computers through the Internet. Examples of these applications are the web-based email services, online computer back up, data …
Tragedy Of The Data Commons, Jane Yakowitz
Tragedy Of The Data Commons, Jane Yakowitz
Jane Yakowitz
Accurate data is vital to enlightened research and policymaking, particularly publicly available data that are redacted to protect the identity of individuals. Legal academics, however, are campaigning against data anonymization as a means to protect privacy, contending that the wealth of information available on the Internet enables malfeasors to reverse-engineer the data and identify research subjects. Privacy scholars advocate for stringent new legal restrictions on the collection and dissemination of research data. This Article challenges the dominant wisdom, arguing that properly de-identified data is not only safe, but of extraordinary social utility. It makes three core claims. First, legal scholars …
The Dao Of Privacy, Lara A. Ballard
The Dao Of Privacy, Lara A. Ballard
Lara A Ballard
It is widely believed in some Western circles that a single multilateral human rights treaty, based largely on European models for data protection, can standardize a right to privacy on a global basis. It is also widely believed that East Asia has no real tradition of privacy. Both of these beliefs are mistaken. This Article explores the underlying philosophical assumptions beneath Western concepts of privacy that currently prevail on both sides of the Atlantic, by examining privacy through the lens of classical Daoism and the Northeast Asian philosophical tradition. Taking a cue from Professor Julie Cohen’s Configuring the Networked Self, …