Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Journal

2016

Privacy

Discipline
Institution
Publication

Articles 1 - 30 of 45

Full-Text Articles in Law

Knowledge And Fourth Amendment Privacy, Matthew Tokson Dec 2016

Knowledge And Fourth Amendment Privacy, Matthew Tokson

Northwestern University Law Review

This Article examines the central role that knowledge plays in determining the Fourth Amendment’s scope. What people know about surveillance practices or new technologies often shapes the “reasonable expectations of privacy” that define the Fourth Amendment’s boundaries. From early decisions dealing with automobile searches to recent cases involving advanced information technologies, courts have relied on assessments of knowledge in a wide variety of Fourth Amendment contexts. Yet the analysis of knowledge in Fourth Amendment law is rarely if ever studied on its own.

This Article fills that gap. It starts by identifying the characteristics of Fourth Amendment knowledge. It finds, …


The Impact Of Technological Developments On The Rules Of Attorney Ethics Regarding Attorney–Client Privilege, Confidentiality, And Social Media, Pamela A. Bresnahan, Lucian T. Pera Dec 2016

The Impact Of Technological Developments On The Rules Of Attorney Ethics Regarding Attorney–Client Privilege, Confidentiality, And Social Media, Pamela A. Bresnahan, Lucian T. Pera

St. Mary's Journal on Legal Malpractice & Ethics

This article focuses on the development of the law of ethics and technology. Emphasis is placed on how technological developments have affected the rules and means by which lawyers practice law and certain ethical pitfalls that have developed hand-in-hand with technological advancements. Topics examined include: (1) the ways by which electronic communication has increased the potential for the attorney–client privilege to be waived and the resulting impact on the present-day practice of law; (2) the effect of social media on lawyers’ ethical obligations, including counseling clients regarding the client’s use of social media and the lawyer’s own use of social …


The Tension Between Privacy And Security, Susan Maret, Antoon De Baets Nov 2016

The Tension Between Privacy And Security, Susan Maret, Antoon De Baets

Secrecy and Society

No abstract provided.


Humpty Dumpty Was Wrong - Consistency In Meaning Matters: Some Definitions Of Privacy, Publicity, Secrecy, And Other Family Members, Gary T. Marx Nov 2016

Humpty Dumpty Was Wrong - Consistency In Meaning Matters: Some Definitions Of Privacy, Publicity, Secrecy, And Other Family Members, Gary T. Marx

Secrecy and Society

No abstract provided.


The Non-Contractual Nature Of Privacy Policies And A New Critique Of The Notice And Choice Privacy Protection Model, Thomas B. Norton Nov 2016

The Non-Contractual Nature Of Privacy Policies And A New Critique Of The Notice And Choice Privacy Protection Model, Thomas B. Norton

Fordham Intellectual Property, Media and Entertainment Law Journal

Notice and Choice is the model for protecting privacy online in the United States. Under the model, users of online services are given notice about services information and privacy practices in the form of privacy policies. Based on this information, users can choose whether to use particular online services and whether to exercise any options for protecting their privacy that the services might offer. In theory, Notice and Choice seems like a sound regulatory mechanism. Indeed, state and federal regulatory agencies prefer the model as a basis for privacy enforcement action. But Notice and Choice faces harsh criticism from privacy …


Police Body-Worn Camera Policy: Balancing The Tension Between Privacy And Public Access In State Law, Kyle J. Maury Nov 2016

Police Body-Worn Camera Policy: Balancing The Tension Between Privacy And Public Access In State Law, Kyle J. Maury

Notre Dame Law Review

Body camera implementation remains in its infancy stage. As such,

there is a dearth of legal scholarship analyzing the policy considerations associated

with body cameras. Instead of raising the issues involved and assessing

arguments for and against implementation, this Note assumes body cameras

are a force for good and are here to stay for the long haul. Consequently, the

goal of this Note is to analyze various issues involved in administering body

cameras against a backdrop of recently enacted state legislation—focusing

specifically on the tension between protecting privacy interests while also

ensuring public access to recordings. This Note examines these …


Recording A New Frontier In Evidence-Gathering: Police Body-Worn Cameras And Privacy Doctrines In Washington State, Katie Farden Oct 2016

Recording A New Frontier In Evidence-Gathering: Police Body-Worn Cameras And Privacy Doctrines In Washington State, Katie Farden

Seattle University Law Review

This Note contributes to a growing body of work that weighs the gains that communities stand to make from police body-worn cameras against the tangle of concerns about how cameras may infringe on individual liberties and tread on existing privacy laws. While police departments have quickly implemented cameras over the past few years, laws governing the use of the footage body-worn cameras capture still trail behind. Notably, admissibility rules for footage from an officer’s camera, and evidence obtained with the help of that footage, remain on the horizon. This Note focuses exclusively on Washington State’s laws. It takes a clinical …


Balancing A Right To Be Forgotten With A Right To Freedom Of Expression In The Wake Of Google Spain V. Aepd, Shaniqua Singleton Sep 2016

Balancing A Right To Be Forgotten With A Right To Freedom Of Expression In The Wake Of Google Spain V. Aepd, Shaniqua Singleton

Georgia Journal of International & Comparative Law

No abstract provided.


That ‘70s Show: Why The 11th Circuit Was Wrong To Rely On Cases From The 1970s To Decide A Cell-Phone Tracking Case, David Oscar Markus, Nathan Freed Wessler Aug 2016

That ‘70s Show: Why The 11th Circuit Was Wrong To Rely On Cases From The 1970s To Decide A Cell-Phone Tracking Case, David Oscar Markus, Nathan Freed Wessler

University of Miami Law Review

In light of society's increasing reliance on technology, this article explores a critical question – that of the Fourth Amendment’s protection over privacy in the digital age. Specifically, this article addresses how the law currently fails to protect the privacy of one’s cell phone records and its ramifications. By highlighting the antiquated precedent leading up to the Eleventh Circuit’s ruling in United States v. Davis, this article calls on the judiciary to find a more appropriate balance for protecting the right to privacy in a modern society.


Cellphones, Stingrays, And Searches! An Inquiry Into The Legality Of Cellular Location Information, Jeremy H. D'Amico Aug 2016

Cellphones, Stingrays, And Searches! An Inquiry Into The Legality Of Cellular Location Information, Jeremy H. D'Amico

University of Miami Law Review

Can the Fourth Amendment protect an individual’s right privacy by preventing the disclosure of her location through cell site location information? Does it currently? Should it? Many court opinions answer these questions in both the affirmative and the negative. The rationale underlying each conclusion is disparate. Some rely on statutory regimes, others rely on the United States Supreme Court’s interpretation of reasonableness. However, Cell Site Location Information is a technology that requires uniformity in its interpretation. This note investigates the different interpretations of the Fourth Amendment as it relates to Cell Site Location Information. It explains the technology behind Cell …


Wearable Fitness Devices: Personal Health Data Privacy In Washington State, Steven Spann Jul 2016

Wearable Fitness Devices: Personal Health Data Privacy In Washington State, Steven Spann

Seattle University Law Review

Private entities are increasingly targeting individuals in the United States and around the world to gather personal data for such purposes as product development, market identification, and insurance risk assessment. While credit card records and online browsing histories have long been the medium through which this data is gathered, in more recent years, wearable fitness devices have added a new dimension to data production and collection. These devices are capable of gathering a significant amount of data regarding a person’s physical and physiological characteristics, thereby exposing these data producers to personal privacy infringement. Washington State lawmakers and citizens must be …


Reconsidering The History Of Open Courts In The Digital Age, Rory B. O'Sullivan, Catherine Connell Jul 2016

Reconsidering The History Of Open Courts In The Digital Age, Rory B. O'Sullivan, Catherine Connell

Seattle University Law Review

Article I, Section 10 of the Constitution of the State of Washington guarantees, “Justice in all cases shall be administered openly, and without unnecessary delay.” The Washington State Supreme Court has interpreted this clause to guarantee the public a right to attend legal proceedings and to access court documents separate and apart from the rights of the litigants themselves. Based on this interpretation, the court has struck down laws protecting the identity of both juvenile victims of sexual assault and individuals subject to involuntary commitment hearings. Its interpretation has also compromised the privacy rights of litigants wrongly named in legal …


The Wrong Of Publicity, Albert Vetere Jun 2016

The Wrong Of Publicity, Albert Vetere

Pace Intellectual Property, Sports & Entertainment Law Forum

The right of publicity has been, since at least 1977, a recognized concept. It was used, much like the other areas of intellectual property law to protect what a person had worked hard to create, in this case the concept of themselves. Their creativity in making themselves known and in having an "act" was worth protecting. However, the right of publicity has drastically changed since its conception. What is has become in the past almost forty years is a strange amalgamation of concepts, protected by laws that were never meant to be used to protect it in the first place. …


The Celebrity Behind The Brand International Protection Of The Right Of Publicity, Eliana Torres Jun 2016

The Celebrity Behind The Brand International Protection Of The Right Of Publicity, Eliana Torres

Pace Intellectual Property, Sports & Entertainment Law Forum

Part I of the article provides an overview of the right of publicity and its history. It presents the importance of this right, particularly for celebrities, and it focuses on the influence of the entertainment and sports industries in a global economy. Then, it analyzes the major differences in level of protection, scope and length, starting with the United States. Then it uses the standard in the United States and compares it with the protection offered in 22 selected jurisdictions based on a survey report by Kenyon & Kenyon titled Getting the Deal Through. Then, it addresses potential challenges to …


Copyright’S Other Functions, Margaret Chon Jun 2016

Copyright’S Other Functions, Margaret Chon

Chicago-Kent Journal of Intellectual Property

This response to a keynote speech by Judge Margaret McKeown explores some dimensions of copyright in addition to its dominant function as a set of market-facilitating exclusive rights. The recent possible trend towards protecting privacy and other non-commercial concerns via copyright law is not necessarily inconsistent with its historical usages, does not necessarily threaten freedom of expression and may further important privacy policies. The balance of these competing policies is shifting, especially in an environment of proliferating digital content where cyber civil rights may need further development in response to cyberbullying. It examines the specific case of non-consensual pornography as …


Review Essay: Sara M. Smyth, Cybercrime In Canadian Criminal Law, 2nd Edition (Toronton: Carswell, 2015), Christopher D. Ram Jun 2016

Review Essay: Sara M. Smyth, Cybercrime In Canadian Criminal Law, 2nd Edition (Toronton: Carswell, 2015), Christopher D. Ram

Canadian Journal of Law and Technology

Dr. Smyth’s book is ambitious in its scope, seeking to trace the criminology and evolution of information technologies and cybercrime as the basis of current Canadian legislation and jurisprudence. It is intended as a concise student reference text or resource for those who are new to the subject area, studying in criminology and other areas, as opposed to law. A list of concepts and issues for discussion appears at the conclusion of each chapter and there is a glossary of technical (but not legal) terms at the end of the book. It takes a neutral and professorial approach, seeking to …


Clapper Dethroned: Imminent Injury And Standing For Data Breach Lawsuits In Light Of Ashley Madison, Arthur R. Vorbrodt Jun 2016

Clapper Dethroned: Imminent Injury And Standing For Data Breach Lawsuits In Light Of Ashley Madison, Arthur R. Vorbrodt

Washington and Lee Law Review Online

No abstract provided.


Video-Streaming Records And The Video Privacy Protection Act: Broadening The Scope Of Personally Identifiable Information To Include Unique Device Identifiers Disclosed With Video Titles, Gregory M. Huffman May 2016

Video-Streaming Records And The Video Privacy Protection Act: Broadening The Scope Of Personally Identifiable Information To Include Unique Device Identifiers Disclosed With Video Titles, Gregory M. Huffman

Chicago-Kent Law Review

The Video Privacy Protection Act (“VPPA”) prohibits video tape service providers from disclosing their consumers’ video rental or sale records. Although the VPPA was originally enacted to regulate disclosures by brick-and-mortar video rental stores, litigators have more recently used the VPPA as a vehicle to regulate disclosures by online video content providers.

The application of the VPPA to video streaming via web browsers and mobile devices raises new questions of statutory interpretation. One key question is whether the scope of the VPPA is broad enough to cover a disclosure of a unique device identifier of a user’s device, rather than …


Unilateral Invasions Of Privacy, Roger Allan Ford Apr 2016

Unilateral Invasions Of Privacy, Roger Allan Ford

Notre Dame Law Review

Most people seem to agree that individuals have too little privacy, and most proposals to address that problem focus on ways to give those users more information about, and more control over, how information about them is used. Yet in nearly all cases, information subjects are not the parties who make decisions about how information is collected, used, and disseminated; instead, outsiders make unilateral decisions to collect, use, and disseminate information about others. These potential privacy invaders, acting without input from information subjects, are the parties to whom proposals to protect privacy must be directed. This Article develops a theory …


Reconsidering The Legal Definition Of Privacy, Michael Morgan Apr 2016

Reconsidering The Legal Definition Of Privacy, Michael Morgan

Brigham Young University Prelaw Review

No abstract provided.


Facebook V. Jefferson: How Our Emerging, Networked Society Undermines Ideas Of Security And Privacy, Roy Wyman Apr 2016

Facebook V. Jefferson: How Our Emerging, Networked Society Undermines Ideas Of Security And Privacy, Roy Wyman

South Carolina Law Review

No abstract provided.


Carrots And Sticks In Cyberspace: Addressing Key Issues In The Cybersecurity Information Sharing Act Of 2015, Jamil N. Jaffar Apr 2016

Carrots And Sticks In Cyberspace: Addressing Key Issues In The Cybersecurity Information Sharing Act Of 2015, Jamil N. Jaffar

South Carolina Law Review

No abstract provided.


Big Data Sustainability: An Environmental Management Systems Analogy, Dennis D. Hirsch, Jonathan H. King Mar 2016

Big Data Sustainability: An Environmental Management Systems Analogy, Dennis D. Hirsch, Jonathan H. King

Washington and Lee Law Review Online

Today, organizations globally wrestle with how to extract valuable insights from diverse data sets without invading privacy, causing discrimination, harming their brand, or otherwise undermining the sustainability of their big data projects. Leaders in these organizations are thus asking: What management approach should businesses employ sustainably to achieve the tremendous benefits of big data analytics, while minimizing the potential negative externalities?

This Paper argues that leaders can learn from environmental management practices developed to manage the negative externalities of the industrial revolution. First, it shows that, along with its many benefits, big data can create negative externalities that are structurally …


Elements Of A New Ethical Framework For Big Data Research, Effy Vayena, Urs Gasser, Alexandra Wood, David R. O'Brien, Micah Altman Mar 2016

Elements Of A New Ethical Framework For Big Data Research, Effy Vayena, Urs Gasser, Alexandra Wood, David R. O'Brien, Micah Altman

Washington and Lee Law Review Online

Emerging large-scale data sources hold tremendous potential for new scientific research into human biology, behaviors, and relationships. At the same time, big data research presents privacy and ethical challenges that the current regulatory framework is ill-suited to address. In light of the immense value of large-scale research data, the central question moving forward is not whether such data should be made available for research, but rather how the benefits can be captured in a way that respects fundamental principles of ethics and privacy.

In response, this Essay outlines elements of a new ethical framework for big data research. It argues …


Catching Smoke, Nailing Jell-O To A Wall: The Vanna White Case And The Limits Of Celebrity Rights, David S. Welkowitz Mar 2016

Catching Smoke, Nailing Jell-O To A Wall: The Vanna White Case And The Limits Of Celebrity Rights, David S. Welkowitz

Journal of Intellectual Property Law

No abstract provided.


Classification Standards For Health Information: Ethical And Practical Approaches, Craig Konnoth Mar 2016

Classification Standards For Health Information: Ethical And Practical Approaches, Craig Konnoth

Washington and Lee Law Review Online

Secondary health information research requires vast quantities of data in order to make clinical and health delivery breakthroughs. Restrictive policies that limit the use of such information threaten to stymie this research. While the Notice of Proposed Rulemaking (NPRM) for the new Common Rule permits patients to provide broad consent for the use of their information for research, that policy offers insufficient flexibility. This Article suggests a flexible consenting system that allows patients to consent to a range of privacy risks. The details of the system will be fleshed out in future work.


Selected Issues Concerning The Ethical Use Of Big Data Health Analytics, Lieke Jetten, Stephen Sharon Mar 2016

Selected Issues Concerning The Ethical Use Of Big Data Health Analytics, Lieke Jetten, Stephen Sharon

Washington and Lee Law Review Online

No abstract provided.


The Calm After The Storm: First Amendment Cases In The Supreme Court’S 2000-2001 Term, Joel Gora Mar 2016

The Calm After The Storm: First Amendment Cases In The Supreme Court’S 2000-2001 Term, Joel Gora

Touro Law Review

No abstract provided.


Good Cause Is Bad News: How The Good Cause Standard For Record Access Impacts Adult Adoptees Seeking Personal Information And A Proposal For Reform, Christopher G.A. Loriot Feb 2016

Good Cause Is Bad News: How The Good Cause Standard For Record Access Impacts Adult Adoptees Seeking Personal Information And A Proposal For Reform, Christopher G.A. Loriot

University of Massachusetts Law Review

There are many hurdles that adult adoptees face when seeking access to personal information contained in original birth records or adoption proceedings. One such hurdle is the widely-used good cause standard, which requires adoptees seeking information to show good cause to obtain access. This standard is problematic primarily for its vagueness. Very few jurisdictions that use this standard define “good cause” in any meaningful way, and case law interpreting good cause statutory language is inconsistent at best. Although it is meant to protect the privacy interests of all parties in an adoption proceeding, the good cause standard acts as a …


Litigating In The 21st Century: Amending Challenges For Cause In Light Of Big Data, Andrew Kasabian Feb 2016

Litigating In The 21st Century: Amending Challenges For Cause In Light Of Big Data, Andrew Kasabian

Pepperdine Law Review

The amount of data generated daily is growing exponentially. The majority of this data is unstructured data. Big Data analytics provides the capability to analyze sets of unrelated data to find hidden and meaningful correlations and predict an individual’s future actions. Therefore, Big Data can alter trial preparation by opening up new sets of information for lawyers to analyze in the jury selection process. Privacy concerns may follow Big Data’s incorporation because Big Data aggregates an individual’s information and predicts future actions. This Comment details how Big Data will provide a net benefit to trial preparation. In order to protect …