Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Privacy Law (13)
- Fourth Amendment (7)
- Constitutional Law (6)
- Internet Law (6)
- Criminal Procedure (4)
-
- Civil Rights and Discrimination (3)
- Health Law and Policy (3)
- Science and Technology Law (3)
- Criminal Law (2)
- Law and Society (2)
- Medicine and Health Sciences (2)
- Administrative Law (1)
- Agriculture Law (1)
- Bioethics and Medical Ethics (1)
- Computer Law (1)
- Environmental Law (1)
- Evidence (1)
- First Amendment (1)
- Health and Medical Administration (1)
- Intellectual Property Law (1)
- Jurisprudence (1)
- Law Enforcement and Corrections (1)
- Law and Race (1)
- National Security Law (1)
- Pharmaceutics and Drug Design (1)
- Pharmacy and Pharmaceutical Sciences (1)
- Public Health (1)
- Torts (1)
- Publication Year
Articles 1 - 24 of 24
Full-Text Articles in Law
The Automated Fourth Amendment, Maneka Sinha
The Automated Fourth Amendment, Maneka Sinha
Faculty Scholarship
Courts routinely defer to police officer judgments in reasonable suspicion and probable cause determinations. Increasingly, though, police officers outsource these threshold judgments to new forms of technology that purport to predict and detect crime and identify those responsible. These policing technologies automate core police determinations about whether crime is occurring and who is responsible. Criminal procedure doctrine has failed to insist on some level of scrutiny of—or skepticism about—the reliability of this technology. Through an original study analyzing numerous state and federal court opinions, this Article exposes the implications of law enforcement’s reliance on these practices given the weighty interests …
Black Lives Monitored, Chaz Arnett
Black Lives Monitored, Chaz Arnett
Faculty Scholarship
The police killing of George Floyd added fuel to the simmering flames of racial injustice in America following a string of similarly violent executions during a global pandemic that disproportionately ravaged the health and economic security of Black families and communities. The confluence of these painful realities exposed deep vulnerabilities and renewed a reckoning with the long unfulfilled promise of racial equality, inspiring large-scale protests around the country and across the globe. As with prior movements for racial justice, from slavery abolition to the civil rights movement’s demand to end Jim Crow, protests have been met with extreme force, either …
Automated License Plate Readers: The Difficult Balance Of Solving Crime And Protecting Individual Privacy, Lauren Fash
Automated License Plate Readers: The Difficult Balance Of Solving Crime And Protecting Individual Privacy, Lauren Fash
Maryland Law Review Online
No abstract provided.
The Continuing Battle Over Privacy Vs. Security, Ellen Cornelius
The Continuing Battle Over Privacy Vs. Security, Ellen Cornelius
Homeland Security Publications
No abstract provided.
When Enough Is Enough: Location Tracking, Mosaic Theory, And Machine Learning, Steven M. Bellovin, Renée M. Hutchins, Tony Jebara, Sebastian Zimmeck
When Enough Is Enough: Location Tracking, Mosaic Theory, And Machine Learning, Steven M. Bellovin, Renée M. Hutchins, Tony Jebara, Sebastian Zimmeck
Faculty Scholarship
Since 1967, when it decided Katz v. United States, the Supreme Court has tied the right to be free of unwanted government scrutiny to the concept of reasonable xpectations of privacy.[1] An evaluation of reasonable expectations depends, among other factors, upon an assessment of the intrusiveness of government action. When making such assessment historically the Court has considered police conduct with clear temporal, geographic, or substantive limits. However, in an era where new technologies permit the storage and compilation of vast amounts of personal data, things are becoming more complicated. A school of thought known as “mosaic theory” …
Big Data's Other Privacy Problem, James Grimmelmann
Big Data's Other Privacy Problem, James Grimmelmann
Faculty Scholarship
Big Data has not one privacy problem, but two. We are accustomed to talking about surveillance of data subjects. But Big Data also enables disconcertingly close surveillance of its users. The questions we ask of Big Data can be intensely revealing, but, paradoxically, protecting subjects' privacy can require spying on users. Big Data is an ideology of technology, used to justify the centralization of information and power in data barons, pushing both subjects and users into a kind of feudal subordination. This short and polemical essay uses the Bloomberg Terminal scandal as a window to illuminate Big Data's other privacy …
Addressing The Harm Of Total Surveillance: A Reply To Professor Neil Richards, Danielle Keats Citron, David C. Gray
Addressing The Harm Of Total Surveillance: A Reply To Professor Neil Richards, Danielle Keats Citron, David C. Gray
Faculty Scholarship
In his insightful article The Dangers of Surveillance, 126 HARV. L. REV. 1934 (2013), Neil Richards offers a framework for evaluating the implications of government surveillance programs that is centered on protecting "intellectual privacy." Although we share his interest in recognizing and protecting privacy as a condition of personal and intellectual development, we worry in this essay that, as an organizing principle for policy, "intellectual privacy" is too narrow and politically fraught. Drawing on other work, we therefore recommend that judges, legislators, and executives focus instead on limiting the potential of surveillance technologies to effect programs of broad and indiscriminate …
A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, David C. Gray, Danielle Keats Citron
A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, David C. Gray, Danielle Keats Citron
Faculty Scholarship
On January 23, 2012, the Supreme Court issued a landmark non-decision in United States v. Jones. In that case, officers used a GPS-enabled device to track a suspect’s public movements for four weeks, amassing a considerable amount of data in the process. Although ultimately resolved on narrow grounds, five Justices joined concurring opinions in Jones expressing sympathy for some version of the “mosaic theory” of Fourth Amendment privacy. This theory holds that we maintain reasonable expectations of privacy in certain quantities of information even if we do not have such expectations in the constituent parts. This Article examines and …
Privacy, Antitrust, And Power, Frank Pasquale
Privacy, Antitrust, And Power, Frank Pasquale
Faculty Scholarship
When a dominant internet service collects information about its users, the situation is so far from the usual arm’s-length market transaction that neoclassical economic analysis is misleading. “Lack of surveillance” is not a product that individuals have varying preferences for and purchase accordingly. Rather, surveillance is an inevitable concomitant of life online. We need to tame the power that surveillance entails, rather than continuing to pursue illusory, surveillance-free alternatives on the platform level.
To the extent a company creates profiles of individuals and collects data on them, a third party ought to be collecting reports from the company on how …
Intellectual Property And Public Health – A White Paper, Ryan G. Vacca, James Ming Chen, Jay Dratler Jr., Thomas Folsom, Timothy S. Hall, Yaniv Heled, Frank A. Pasquale, Elizabeth A. Reilly, Jeffery Samuels, Katherine J. Strandburg, Kara W. Swanson, Andrew W. Torrance, Katharine A. Van Tassel
Intellectual Property And Public Health – A White Paper, Ryan G. Vacca, James Ming Chen, Jay Dratler Jr., Thomas Folsom, Timothy S. Hall, Yaniv Heled, Frank A. Pasquale, Elizabeth A. Reilly, Jeffery Samuels, Katherine J. Strandburg, Kara W. Swanson, Andrew W. Torrance, Katharine A. Van Tassel
Faculty Scholarship
On October 26, 2012, the University of Akron School of Law’s Center for Intellectual Property and Technology hosted its Sixth Annual IP Scholars Forum. In attendance were thirteen legal scholars with expertise and an interest in IP and public health who met to discuss problems and potential solutions at the intersection of these fields. This report summarizes this discussion by describing the problems raised, areas of agreement and disagreement between the participants, suggestions and solutions made by participants and the subsequent evaluations of these suggestions and solutions. Led by the moderator, participants at the Forum focused generally on three broad …
Fighting Cybercrime After United States V. Jones, David C. Gray, Danielle Keats Citron, Liz Clark Rinehart
Fighting Cybercrime After United States V. Jones, David C. Gray, Danielle Keats Citron, Liz Clark Rinehart
Faculty Scholarship
In a landmark non-decision last term, five Justices of the United States Supreme Court would have held that citizens possess a Fourth Amendment right to expect that certain quantities of information about them will remain private, even if they have no such expectations with respect to any of the information or data constituting that whole. This quantitative approach to evaluating and protecting Fourth Amendment rights is certainly novel and raises serious conceptual, doctrinal, and practical challenges. In other works, we have met these challenges by engaging in a careful analysis of this “mosaic theory” and by proposing that courts focus …
Agricultural Secrecy: Going Dark Down On The Farm: How Legalized Secrecy Gives Agribusiness A Federally Funded Free Ride, Rena I. Steinzor, Yee Huang
Agricultural Secrecy: Going Dark Down On The Farm: How Legalized Secrecy Gives Agribusiness A Federally Funded Free Ride, Rena I. Steinzor, Yee Huang
Faculty Scholarship
This briefing paper examines the agricultural secrecy granted by section 1619 of the 2008 Farm Bill, its implications for transparency and oversight, and its impact on other federal agencies such as the U.S. Environmental Protection Agency (EPA). In an era of fiscal responsibility, tight budgets, and increasing pressure on the environment, the public has a right to know whether the U.S. Department of Agriculture (USDA) is making the best decisions about how to allocate public funds.
Each year, agricultural producers in the United States receive billions of dollars in federal payments: crop subsidies, crop insurance, conservation payments, disaster payments, loans, …
The Anatomy Of A Search: Intrusiveness And The Fourth Amendment, Renée Mcdonald Hutchins
The Anatomy Of A Search: Intrusiveness And The Fourth Amendment, Renée Mcdonald Hutchins
Faculty Scholarship
No abstract provided.
William H. Sorrell, Attorney General Of Vermont, Et Al. V. Ims Health Inc., Et Al. - Amicus Brief In Support Of Petitioners, Kevin Outterson, David Orentlicher, Christopher T. Robertson, Frank A. Pasquale
William H. Sorrell, Attorney General Of Vermont, Et Al. V. Ims Health Inc., Et Al. - Amicus Brief In Support Of Petitioners, Kevin Outterson, David Orentlicher, Christopher T. Robertson, Frank A. Pasquale
Faculty Scholarship
On April 26, 2011, the US Supreme Court will hear oral arguments in the Vermont data mining case, Sorrell v. IMS Health Inc. Respondents claim this is the most important commercial speech case in a decade. Petitioner (the State of Vermont) argues this is the most important medical privacy case since Whalen v. Roe.
The is an amicus brief supporting Vermont, written by law professors and submitted on behalf of the New England Journal of Medicine
Full-Body Scanners: Tsa's New "Optional" System For Airport Searches, Stuart A. Hindman
Full-Body Scanners: Tsa's New "Optional" System For Airport Searches, Stuart A. Hindman
Student Articles and Papers
While the world of commercial air transportation has seen major improvements in many technologies over the last decade, nothing has caused a stir quite like the implementation of full-body scanners (FBS) as a one of the first lines of defense in aviation security at U.S. airports. FBS and “enhanced” pat-downs have been the source of much debate and scrutiny among passengers, flight crews, privacy rights groups, and federal authorities in charge of airport screening. The paper begins with a general overview of the law as it pertains to airport searches and privacy rights. In Part II, the technology behind the …
Legal Implications Of The Use Of Social Media: Minimizing The Legal Risks For Employers And Employees, Damian R. Laplaca, Noah Winkeller
Legal Implications Of The Use Of Social Media: Minimizing The Legal Risks For Employers And Employees, Damian R. Laplaca, Noah Winkeller
Proxy
No abstract provided.
Beyond Innovation And Competition: The Need For Qualified Transparency In Internet Intermediaries, Frank Pasquale
Beyond Innovation And Competition: The Need For Qualified Transparency In Internet Intermediaries, Frank Pasquale
Faculty Scholarship
Internet service providers and search engines have mapped the web, accelerated e-commerce, and empowered new communities. They also pose new challenges for law. Individuals are rapidly losing the ability to affect their own image on the web - or even to know what data are presented about them. When web users attempt to find information or entertainment, they have little assurance that a carrier or search engine is not biasing the presentation of results in accordance with its own commercial interests.
Technology’s impact on privacy and democratic culture needs to be at the center of internet policy-making. Yet before they …
Richmond Medical Center For Women V. Herring: Prohibiting Partial Birth Abortion But Keeping Constitutional Rights Intact, Kathleen Morris
Richmond Medical Center For Women V. Herring: Prohibiting Partial Birth Abortion But Keeping Constitutional Rights Intact, Kathleen Morris
Maryland Law Review Online
No abstract provided.
Federal Search Commission? Access, Fairness, And Accountability In The Law Of Search, Oren Bracha, Frank Pasquale
Federal Search Commission? Access, Fairness, And Accountability In The Law Of Search, Oren Bracha, Frank Pasquale
Faculty Scholarship
Should search engines be subject to the types of regulation now applied to personal data collectors, cable networks, or phone books? In this article, we make the case for some regulation of the ability of search engines to manipulate and structure their results. We demonstrate that the First Amendment, properly understood, does not prohibit such regulation. Nor will such interventions inevitably lead to the disclosure of important trade secrets.
After setting forth normative foundations for evaluating search engine manipulation, we explain how neither market discipline nor technological advance is likely to stop it. Though savvy users and personalized search may …
Tied Up In Knotts? Gps Technology And The Fourth Amendment, Renée Mcdonald Hutchins
Tied Up In Knotts? Gps Technology And The Fourth Amendment, Renée Mcdonald Hutchins
Faculty Scholarship
Judicial and scholarly assessment of emerging technology seems poised to drive the Fourth Amendment down one of three paths. The first would simply relegate the amendment to a footnote in history books by limiting its reach to harms that the framers specifically envisioned. A modified version of this first approach would dispense with expansive constitutional notions of privacy and replace them with legislative fixes. A third path offers the amendment continued vitality but requires the U.S. Supreme Court to overhaul its Fourth Amendment analysis. Fortunately, a fourth alternative is available to cabin emerging technologies within the existing doctrinal framework. Analysis …
Reservoirs Of Danger: The Evolution Of Public And Private Law At The Dawn Of The Information Age, Danielle Keats Citron
Reservoirs Of Danger: The Evolution Of Public And Private Law At The Dawn Of The Information Age, Danielle Keats Citron
Faculty Scholarship
A defining problem at the dawn of the Information Age will be securing computer databases of ultra-sensitive personal information. These reservoirs of data fuel our Internet economy but endanger individuals when their information escapes into the hands of cyber-criminals. This juxtaposition of opportunities for rapid economic growth and novel dangers recalls similar challenges society and law faced at the outset of the Industrial Age. Then, reservoirs collected water to power textile mills: the water was harmless in repose but wrought havoc when it escaped. After initially resisting Rylands v. Fletcher’s strict liability standard as undermining economic development, American courts …
Securing Our Infrastructure: Private/Public Information Sharing, Rena I. Steinzor
Securing Our Infrastructure: Private/Public Information Sharing, Rena I. Steinzor
Congressional Testimony
No abstract provided.
Privacy In Genetics Research, Barbara Fuller, Mary Jo Ellis Kahn, P. A. Barr, L. Biesecker, E. Crowley, J. Garber, M. K. Mansoura, Patricia Murphy, J. Murray, J. Phillips, Karen H. Rothenberg, Mark Rothstein, J. Stopfer, Gary Swergold, B. Weber, Francis Collins, Kathy Hudson
Privacy In Genetics Research, Barbara Fuller, Mary Jo Ellis Kahn, P. A. Barr, L. Biesecker, E. Crowley, J. Garber, M. K. Mansoura, Patricia Murphy, J. Murray, J. Phillips, Karen H. Rothenberg, Mark Rothstein, J. Stopfer, Gary Swergold, B. Weber, Francis Collins, Kathy Hudson
Faculty Scholarship
No abstract provided.
Psychosocial, Legal, And Ethical Dimensions Of Ultrasound Imaging In Pregnancy, Karen H. Rothenberg
Psychosocial, Legal, And Ethical Dimensions Of Ultrasound Imaging In Pregnancy, Karen H. Rothenberg
Faculty Scholarship
No abstract provided.