Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

SelectedWorks

Privacy

Discipline
Publication Year
Publication

Articles 1 - 30 of 99

Full-Text Articles in Law

How Did You Know That? Protecting Privacy Interests Of Research Participants Via Certificates Of Confidentiality, Jonathan S. Miller Aug 2015

How Did You Know That? Protecting Privacy Interests Of Research Participants Via Certificates Of Confidentiality, Jonathan S. Miller

Jonathan S Miller

Answering novel medical hypotheses requires investigators to have robust and demographically diverse biospecimens and genetic data to facilitate their research. Doing so however also requires adequate participation by human subjects willing to consent to the donation and use of their biospecimens and genetic data for future unforeseen research. Although advances in scientific methodologies and technologies to understand the etiology of diseases and facilitate the development of improved therapeutics are critical to enhancing the common good; these advances pose informational risks associated with the re-identification of individuals. The conundrum exists about how to mitigate the privacy concerns associated with potential re-identification …


Federal Programs And The Real Costs Of Policing, Rachel A. Harmon Jun 2015

Federal Programs And The Real Costs Of Policing, Rachel A. Harmon

Rachel A. Harmon

Dozens of federal statutes authorize federal agencies to give money and power to local police departments and municipalities in order to improve public safety. While these federal programs encourage better coordination of police efforts and make pursuing public safety less financially costly for local communities, they also encourage harmful policing. Of course, policing often interferes with our interests in autonomy, privacy, and property, and those harms are often worthwhile in exchange for security and order. Federal public safety programs, however, are designed, implemented, and evaluated without reference to the nonbudgetary costs of policing. When those costs are high, federal programs …


Is There Anybody Out There? Analyzing The Regulation Of Children’S Privacy Online In The United States Of America And The European Union According To Eberlein Et Al. Tbgi Analytical Framework, Nachshon Goltz Mr. Apr 2015

Is There Anybody Out There? Analyzing The Regulation Of Children’S Privacy Online In The United States Of America And The European Union According To Eberlein Et Al. Tbgi Analytical Framework, Nachshon Goltz Mr.

Nachshon Goltz Mr.

This article analyzes the regulation of children’s privacy online, especially in the context of personal information collection as a commodity, in the United States of America and the European Union according to Eberlein et. al. Transnational Business Governance Framework. The article reviews the regulatory structure of this field in these two jurisdictions including global organizations, according to Elberlein et al components and questions. In the analysis, a map of the regulatory interactions within this global realm will be presented and discussed. Finally, conclusions are drawn and suggestions are made.


Developing And Testing A Surveillance Impact Assessment Methodology, David Wright, Michael Friedewald, Raphael Gellert Jan 2015

Developing And Testing A Surveillance Impact Assessment Methodology, David Wright, Michael Friedewald, Raphael Gellert

Michael Friedewald

With the increasing pervasiveness of surveillance, from big companies such as Google and Facebook, as well as from the intelligence agencies, such as the US National Security Agency (NSA) and the UK Government Communications Headquarters (GCHQ), there is a clear need for a surveillance impact assessment (SIA), a method that addresses not only issues of privacy and data protection, but also ethical, social, economic, and political issues.

The SAPIENT project, funded by the European Commission, and undertaken by a consortium of partners from several European countries, aimed to develop an SIA methodology, based on stake- holder needs and a set …


The Internet Of Things And Wearable Technology: Addressing Privacy And Security Concerns Without Derailing Innovation, Adam D. Thierer Nov 2014

The Internet Of Things And Wearable Technology: Addressing Privacy And Security Concerns Without Derailing Innovation, Adam D. Thierer

Adam Thierer

This paper highlights some of the opportunities presented by the rise of the so-called “Internet of Things” and wearable technology in particular, and encourages policymakers to allow these technologies to develop in a relatively unabated fashion. As with other new and highly disruptive digital technologies, however, the Internet of Things and wearable tech will challenge existing social, economic, and legal norms. In particular, these technologies raise a variety of privacy and safety concerns. Other technical barriers exist that could hold back IoT and wearable tech — including disputes over technical standards, system interoperability, and access to adequate spectrum to facilitate …


Cloud Computing E Protezione Dei Dati Nel Web 3.0 (Cloud Computing And Data Protection In The Web 3.0), Guido Noto La Diega Apr 2014

Cloud Computing E Protezione Dei Dati Nel Web 3.0 (Cloud Computing And Data Protection In The Web 3.0), Guido Noto La Diega

Guido Noto La Diega

‘Cloud computing’ in simplified terms can be understood as the storing, processing and use of data on remotely located computers accessed over the internet. This means that users can command almost unlimited computing power on demand, that they do not have to make major capital investments to fulfil their needs and that they can get to their data from anywhere with an internet connection (COM(2012) 529 final, unleashing the potential of cloud computing in Europe). The essay focuses on the problems of privacy and data security in european law and italian law from the perspective of cloud computing. Italian Abstract: …


Abidor V. Napolitano: Suspicionless Cell Phone And Laptop Searches At The Border Compromise The Fourth And First Amendments, Adam Lamparello, Charles Maclean Jan 2014

Abidor V. Napolitano: Suspicionless Cell Phone And Laptop Searches At The Border Compromise The Fourth And First Amendments, Adam Lamparello, Charles Maclean

Adam Lamparello

The article explores the December 31, 2013 Abidor decision where the federal district court upheld the ongoing application of the border search exception as applied to deep, forensic searches of laptops and other digital devices. That exception allows suspicionless searches of any persons, effects, and “closed containers” crossing a border into the United States, and laptops and external hard drives are generally considered “closed containers” under the border search exception. We argue that the border search exception, grounded as it is in pre-digital age fact patterns, should no longer serve as precedent for border searches of the immense memories of …


Amicus Brief -- Riley V. California And United States V. Wurie, Charles E. Maclean, Adam Lamparello Jan 2014

Amicus Brief -- Riley V. California And United States V. Wurie, Charles E. Maclean, Adam Lamparello

Adam Lamparello

Warrantless searches of cell phone memory—after a suspect has been arrested, and after law enforcement has seized the phone—would have been unconstitutional at the time the Fourth Amendment was adopted, and are unconstitutional now. Simply stated, they are unreasonable. And reasonableness—not a categorical warrant requirement—is the “touchstone of Fourth Amendment analysis.”


The Unc Law Library's Redaction Of Its Digitized Collection Of North Carolina Supreme Court Briefs: A Case Study, Nicole Downing Jan 2014

The Unc Law Library's Redaction Of Its Digitized Collection Of North Carolina Supreme Court Briefs: A Case Study, Nicole Downing

AALL/LexisNexis Call for Papers

This study evaluates the digital redaction process as undertaken by the University of North Carolina Kathrine R. Everett Law Library as part of digitizing their collection of North Carolina Supreme Court briefs. New privacy concerns are raised by digitizing court documents and making them available online. Libraries have an interest in digitizing their print collections of court documents for public access on the Internet, but have received no clear guidance on how to proceed in the face of legal concerns. The purpose of this research is to inform libraries of the legal, ethical, and practical situation surrounding redaction of digitized …


The Rise And Fall Of The Exclusionary Rule, Albert E. Poirier Jr. Jan 2014

The Rise And Fall Of The Exclusionary Rule, Albert E. Poirier Jr.

Albert E Poirier Jr.

The years between 1913 and 1967 saw a growing tendency on the part of the Supreme Court to allow the submission of evidence that had been gained unlawfully by the police or prosecutors. Since 1961, and particularly during the Rehnquist and Roberts Courts, the rules excluding evidence have steadily diminished. This paper seeks to review the history of the exclusionary rule.


Flawed Transparency: Shared Data Collection And Disclosure Challenges For Google Glass And Similar Technologies, Jonathan I. Ezor Oct 2013

Flawed Transparency: Shared Data Collection And Disclosure Challenges For Google Glass And Similar Technologies, Jonathan I. Ezor

Jonathan I. Ezor

Current privacy law and best practices assume that the party collecting the data is able to describe and disclose its practices to those from and about whom the data are collected. With emerging technologies such as Google Glass, the information being collected by the wearer may be automatically shared to one or more third parties whose use may be substantially different from that of the wearer. Often, the wearer may not even know what information is being uploaded, and how it may be used. This paper will analyze the current state of U.S. law and compliance regarding personal information collection …


Anonymity Is The Battlefield: Practical And Legal Considerations In The Fight For Free Expression On The Web, Dan Massoglia Sep 2013

Anonymity Is The Battlefield: Practical And Legal Considerations In The Fight For Free Expression On The Web, Dan Massoglia

Dan Massoglia

No abstract provided.


Privacy As A Tool For Antidiscrimination, Jessica Roberts Jul 2013

Privacy As A Tool For Antidiscrimination, Jessica Roberts

Jessica L. Roberts

Traditionally, laws that protect privacy and laws that prohibit discrimination have been considered distinct kinds of legal protections. This Essay challenges that binary on both practical and theoretical grounds. Using the Genetic Information Nondiscrimination Act (GINA) as a case study, it argues that lawmakers can use privacy law to further antidiscrimination goals. GINA, which prohibits genetic-information discrimination in health insurance and employment, does more than simply outlaw discriminatory conduct. It also prohibits employers from requiring—or even requesting—their employees’ genetic information. While GINA’s privacy and antidiscrimination protections have previously been viewed as discrete, this Essay reads them in concert, arguing that …


Snopa And The Ppa: Do You Know What It Means For You? If Snopa (Social Networking Online Protection Act) Or Ppa (Password Protection Act) Do Not Pass, The Snooping Could Cause You Trouble, Angela Goodrum May 2013

Snopa And The Ppa: Do You Know What It Means For You? If Snopa (Social Networking Online Protection Act) Or Ppa (Password Protection Act) Do Not Pass, The Snooping Could Cause You Trouble, Angela Goodrum

Angela Goodrum

No abstract provided.


Balance Or Trade-Off? Online Security Technologies And Fundamental Rights, Mireille Hildebrandt May 2013

Balance Or Trade-Off? Online Security Technologies And Fundamental Rights, Mireille Hildebrandt

Mireille Hildebrandt

In this contribution I argue that the image of the balance is often used to defend the idea of a trade-off. To understand the drawbacks of this line of thought I will explore the relationship between online security technologies and fundamental rights, notably privacy, non-discrimination, freedom of speech and due process. After discriminating between three types of online security technologies I will trace the reconfiguration of the notion of privacy in the era of smart environments. This will lead to an inquiry into the metaphor of the scale, building on the triple test regarding the justification of the limitation of …


Privacy, Transparency & Google's Blurred Glass, Jonathan I. Ezor Feb 2013

Privacy, Transparency & Google's Blurred Glass, Jonathan I. Ezor

Jonathan I. Ezor

No matter the context or jurisdiction, one concept underlies every view of the best practices in data privacy: transparency. The mandate to disclose what personal information is collected, how it is used, and with whom and for what purpose it is shared, is essential to enable informed consent to the collection, along with the other user rights that constitute privacy best practices. Google, which claims to support and offer transparency, is increasingly opaque about its many products and services and the information they collect for it, posing a significant privacy concern.


Amicus Brief: State V. Glover (Maine Supreme Judicial Court), Adam Lamparello, Charles Maclean Jan 2013

Amicus Brief: State V. Glover (Maine Supreme Judicial Court), Adam Lamparello, Charles Maclean

Adam Lamparello

When law enforcement seeks to obtain a warrantless, pre-arrest DNA sample from an individual, that individual has the right to say “No.” If silence is to become a “badge of guilt,” then the right to silence—under the United States and Maine Constitutions—might become a thing of the past. Allowing jurors to infer consciousness of guilt from a pre-arrest DNA sample violates the Fourth Amendment to the United States and Maine Constitutions.


Introduction To The Value Of Personal Data, Mireille Hildebrandt, Kieron O'Hara, Michael Waidner Jan 2013

Introduction To The Value Of Personal Data, Mireille Hildebrandt, Kieron O'Hara, Michael Waidner

Mireille Hildebrandt

This Chapter provides an introduction to and overview of the 2013 Yearbook of the Digital Enlightenment Forum, on the subject of the value of personal data. It discusses why we should care about the current monetization of our personal data and raises the issue of whether and, if so, how user-centric personal data ecosystems help to rebalance power asymmetries between individual citizens and large Personal Data Processing Systems.


Intellectual Property And Public Health – A White Paper, Ryan G. Vacca, Jim Chen, Jay Dratler Jr., Tom Folsom, Timothy Hall, Yaniv Heled, Frank Pasquale, Elizabeth Reilly, Jeff Samuels, Kathy Strandburg, Kara Swanson, Andrew Torrance, Katharine Van Tassel Jan 2013

Intellectual Property And Public Health – A White Paper, Ryan G. Vacca, Jim Chen, Jay Dratler Jr., Tom Folsom, Timothy Hall, Yaniv Heled, Frank Pasquale, Elizabeth Reilly, Jeff Samuels, Kathy Strandburg, Kara Swanson, Andrew Torrance, Katharine Van Tassel

Ryan G. Vacca

On October 26, 2012, the University of Akron School of Law’s Center for Intellectual Property and Technology hosted its Sixth Annual IP Scholars Forum. In attendance were thirteen legal scholars with expertise and an interest in IP and public health who met to discuss problems and potential solutions at the intersection of these fields. This report summarizes this discussion by describing the problems raised, areas of agreement and disagreement between the participants, suggestions and solutions made by participants and the subsequent evaluations of these suggestions and solutions.

Led by the moderator, participants at the Forum focused generally on three broad …


After Privacy: The Rise Of Facebook, The Fall Of Wikileaks, And Singapore’S Personal Data Protection Act 2012, Simon Chesterman Dec 2012

After Privacy: The Rise Of Facebook, The Fall Of Wikileaks, And Singapore’S Personal Data Protection Act 2012, Simon Chesterman

Simon Chesterman

This article discusses the changing ways in which information is produced, stored, and shared — exemplified by the rise of social-networking sites like Facebook and controversies over the activities of WikiLeaks — and the implications for privacy and data protection. Legal protections of privacy have always been reactive, but the coherence of any legal regime has also been undermined by the lack of a strong theory of what privacy is. There is more promise in the narrower field of data protection. Singapore, which does not recognise a right to privacy, has positioned itself as an e-commerce hub but had no …


Photo Radar Enforcement As A Slippery Slope, Andrew Askland Apr 2012

Photo Radar Enforcement As A Slippery Slope, Andrew Askland

Andrew Askland

No abstract provided.


Interoperable Electronic Healthcare Record: A Case For Adoption Of A National Standard To Stem The Ongoing Healthcare Crisis, Deth Sao, Amar Gupta, David A. Gantz Jan 2012

Interoperable Electronic Healthcare Record: A Case For Adoption Of A National Standard To Stem The Ongoing Healthcare Crisis, Deth Sao, Amar Gupta, David A. Gantz

Deth Sao

Interoperable electronic health records (EHR) have the capacity to deliver health care at optimal costs and quality in the United States, but current private and public initiatives have delayed nationwide implementation by failing to overcome several obstacles. These obstacles include: widespread reluctance in adopting health information technology (HIT); differing technical and semantic standards for communication between vendor systems; and legal challenges, which are mainly based on liability, privacy, and security concerns. This paper examines these challenges and the inadequacies of current HIT-EHR implementation strategies, questioning in particular the validity of privacy and security-based concerns. A comparison with the U.S. finance …


Right To Information Identity, Elad Oreg Jan 2012

Right To Information Identity, Elad Oreg

Elad Oreg

Inspired by the famous Warren&Brandeis conceptualization of the "right to privacy", this article tries to answer a different modern conceptual lacuna and present the argument for the need to conceptualize and recognize a new, independent legal principle of a "right to information-identity". This is the right of an individual to the functionality of the information platforms that enable others to identify and know him and to remember who and what he is. What was happening regarding privacy in the late 19th century happens now with identity. Changes in technology and social standards make the very notion of identity increasingly fluid, …


Understanding 'The Loop': Regulating The Next Generation Of War Machines, William Marra, Sonia Mcneil Jan 2012

Understanding 'The Loop': Regulating The Next Generation Of War Machines, William Marra, Sonia Mcneil

William Marra

The United States is in the midst of a national debate about the role drone aircraft should play in warfare abroad and law enforcement at home. Armed drones hunt enemies abroad 24 hours a day, seven days a week. Drones have begun to patrol our domestic skies too, on the lookout for suspicious activity. But contemporary drones are merely the “Model T” of robot technology. Today, humans are still very much “in the loop”: humans decide when to launch a drone, where it should fly, and whether it should take action against a suspect. But as drones develop greater autonomy, …


Data Protection: Idealisms And Realisms, Rebecca Wong Dr Jan 2012

Data Protection: Idealisms And Realisms, Rebecca Wong Dr

Dr Rebecca Wong

Following proposals to consider revising the Data Protection Directive 95/46/EC (DPD) in 2011, have the changes addressed the main areas of concern that have been the focus of much discussion? The areas of concern include the application of the Directive in the online age, particularly to social networking sites and cloud computing; the minimum/maximum standard approach by the EU Member States to data protection; the relevance and application of the data protection principles. These are some of the issues that were considered in the recent Art. 29 Working Party’s Opinion on the Future of Privacy. The article will use this …


De Rechtsstaat In Cyberspace?, Mireille Hildebrandt Dec 2011

De Rechtsstaat In Cyberspace?, Mireille Hildebrandt

Mireille Hildebrandt

Cyberspace is inmiddels overal. Wat tien jaar geleden misschien nog een aparte niet-fysieke wereld leek waar niemand wist dat je een hond was, gaat steeds meer lijken op een verzameling onderling verbonden dorpspleinen. Met dien verstande dat alles wat iedereen doet permanent wordt opgenomen, opgeslagen en doorzocht op betekenisvolle patronen. Steeds meer personen, organisaties maar ook dingen raken verbonden via het internet. De Internationale Telecommunicatie Unie sprak in 2005 van het ‘internet van de dingen’, om aan te geven dat binnen afzienbare tijd alles overal (‘everyware’) via draadloze identificatiesystemen traceerbaar is. Intussen raakt iedereen via de smartphone ‘always on(line)’. Deze …


Right To Information Identity, Elad Oreg Oct 2011

Right To Information Identity, Elad Oreg

Elad Oreg

Inspired by the famous Warren&Brandeis conceptualization of the "right to privacy", this article tries to answer a modern conceptual lacuna and present the argument for the need to conceptualize and recognize a new, independent legal principle of a "right to information-identity". This is the right of an individual to the functionality of the information platforms that enable others to identify and know him and to remember who and what he is. Changes in technology and social standards make the very notion of identity increasingly fluid, transforming the way it is treated and opening new and fascinating ways of relating to …


Personal Data Protection In The Era Of Cloud Computing. New Challenges For European Regulators., Panagiotis Kitsos, Paraskevi Pappas May 2011

Personal Data Protection In The Era Of Cloud Computing. New Challenges For European Regulators., Panagiotis Kitsos, Paraskevi Pappas

Panagiotis Kitsos

It is widely aknowledged that we are entering in an era of revolutionary changes in the field of Information and Communication Technologies . The spread of broadband internet connections has led internet to function not only as a communications network but also as a platform for new computing applications. The most recent application is the so called "cloud computing", which permits the running of software applications or the storage of data to be performed at remote servers which are connected to our computers through the Internet. Examples of these applications are the web-based email services, online computer back up, data …


Tragedy Of The Data Commons, Jane Yakowitz Feb 2011

Tragedy Of The Data Commons, Jane Yakowitz

Jane Yakowitz

Accurate data is vital to enlightened research and policymaking, particularly publicly available data that are redacted to protect the identity of individuals. Legal academics, however, are campaigning against data anonymization as a means to protect privacy, contending that the wealth of information available on the Internet enables malfeasors to reverse-engineer the data and identify research subjects. Privacy scholars advocate for stringent new legal restrictions on the collection and dissemination of research data. This Article challenges the dominant wisdom, arguing that properly de-identified data is not only safe, but of extraordinary social utility. It makes three core claims. First, legal scholars …


The Dao Of Privacy, Lara A. Ballard Feb 2011

The Dao Of Privacy, Lara A. Ballard

Lara A Ballard

It is widely believed in some Western circles that a single multilateral human rights treaty, based largely on European models for data protection, can standardize a right to privacy on a global basis. It is also widely believed that East Asia has no real tradition of privacy. Both of these beliefs are mistaken. This Article explores the underlying philosophical assumptions beneath Western concepts of privacy that currently prevail on both sides of the Atlantic, by examining privacy through the lens of classical Daoism and the Northeast Asian philosophical tradition. Taking a cue from Professor Julie Cohen’s Configuring the Networked Self, …