Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 15 of 15

Full-Text Articles in Law

Wrong Search At The Wrong Time: Keyword Search Warrants And The Fourth Amendment, Nicole Chan Oct 2023

Wrong Search At The Wrong Time: Keyword Search Warrants And The Fourth Amendment, Nicole Chan

Articles

This Note will advocate for the view that when presented with the issue, state and federal courts should establish that keyword search warrants are unconstitutional because they violate the Fourth Amendment. Keyword search warrants cannot meet the Fourth Amendment’s requirements of probable cause and particularity because the subjects of the search cannot be identified until after the search is completed. These warrants are unnecessary and have the potential of implicating millions of internet users who have no connection to a crime. This Note will contend that individuals have a reasonable expectation of privacy in their search history data, and that …


Pandemic Surveillance Discrimination, Christian Sundquist Jan 2021

Pandemic Surveillance Discrimination, Christian Sundquist

Articles

The COVID-19 pandemic has laid bare the abiding tension between surveillance and privacy. Public health epidemiology has long utilized a variety of surveillance methods—such as contact tracing, quarantines, and mandatory reporting laws—to control the spread of disease during past epidemics and pandemics. Officials have typically justified the resulting intrusions on privacy as necessary for the greater public good by helping to stave off larger health crisis. The nature and scope of public health surveillance in the battle against COVID-19, however, has significantly changed with the advent of new technologies. Digital surveillance tools, often embedded in wearable technology, have greatly increased …


Artificial Intelligence In Health Care: Applications And Legal Implications, W. Nicholson Price Ii Nov 2017

Artificial Intelligence In Health Care: Applications And Legal Implications, W. Nicholson Price Ii

Articles

Artificial intelligence (AI) is rapidly moving to change the healthcare system. Driven by the juxtaposition of big data and powerful machine learning techniques—terms I will explain momentarily—innovators have begun to develop tools to improve the process of clinical care, to advance medical research, and to improve efficiency. These tools rely on algorithms, programs created from healthcare data that can make predictions or recommendations. However, the algorithms themselves are often too complex for their reasoning to be understood or even stated explicitly. Such algorithms may be best described as “black-box.” This article briefly describes the concept of AI in medicine, including …


Privacy, Vulnerability, And Affordance, Ryan Calo Jan 2017

Privacy, Vulnerability, And Affordance, Ryan Calo

Articles

This essay begins to unpack the complex, sometimes contradictory relationship between privacy and vulnerability. I begin by exploring how the law conceives of vulnerability — essentially, as a binary status meriting special consideration where present. Recent literature recognizes vulnerability not as a status but as a state — a dynamic and manipulable condition that everyone experiences to different degrees and at different times. I then discuss various ways in which vulnerability and privacy intersect. I introduce an analytic distinction between vulnerability rendering, i.e., making a person more vulnerable, and the exploitation of vulnerability whether manufactured or native. I also describe …


Riley V. California And The Beginning Of The End For The Third-Party Search Doctrine, David A. Harris Jan 2016

Riley V. California And The Beginning Of The End For The Third-Party Search Doctrine, David A. Harris

Articles

In Riley v. California, the Supreme Court decided that when police officers seize a smart phone, they may not search through its contents -- the data found by looking into the call records, calendars, pictures and so forth in the phone -- without a warrant. In the course of the decision, the Court said that the rule applied not just to data that was physically stored on the device, but also to data stored "in the cloud" -- in remote sites -- but accessed through the device. This piece of the decision may, at last, allow a re-examination of …


Push, Pull, And Spill: A Transdisciplinary Case Study In Municipal Open Government, Jan Whittington, Ryan Calo, Mike Simon, Jesse Woo, Meg Young, Perter Schmiedeskamp Jan 2015

Push, Pull, And Spill: A Transdisciplinary Case Study In Municipal Open Government, Jan Whittington, Ryan Calo, Mike Simon, Jesse Woo, Meg Young, Perter Schmiedeskamp

Articles

Municipal open data raises hopes and concerns. The activities of cities produce a wide array of data, data that is vastly enriched by ubiquitous computing. Municipal data is opened as it is pushed to, pulled by, and spilled to the public through online portals, requests for public records, and releases by cities and their vendors, contractors, and partners. By opening data, cities hope to raise public trust and prompt innovation. Municipal data, however, is often about the people who live, work, and travel in the city. By opening data, cities raise concern for privacy and social justice.

This article presents …


Self-Defense Against Robots And Drones, A. Michael Froomkin, P. Zak Colangelo Jan 2015

Self-Defense Against Robots And Drones, A. Michael Froomkin, P. Zak Colangelo

Articles

Robots can pose-or can appear to pose-a threat to life, property, and privacy. May a landowner legally shoot down a trespassing drone? Can she hold a trespassing autonomous car as security against damage done or further torts? Is the fear that a drone may be operated by a paparazzo or Peeping Tom sufficient grounds to disable or interfere with it? How hard may you shove if the office robot rolls over your foot? This Article addresses all those issues and one more. what rules and standards we could put into place to make the resolution of those questions easier and …


Regulating Mass Surveillance As Privacy Pollution: Learning From Environmental Impact Statements, A. Michael Froomkin Jan 2015

Regulating Mass Surveillance As Privacy Pollution: Learning From Environmental Impact Statements, A. Michael Froomkin

Articles

Encroachments on privacy through mass surveillance greatly resemble the pollution crisis in that they can be understood as imposing an externality on the surveilled. This Article argues that this resemblance also suggests a solution: requiring those conducting mass surveillance in and through public spaces to disclose their plans publicly via an updated form of environmental impact statement, thus requiring an impact analysis and triggering a more informed public conversation about privacy. The Article first explains how mass surveillance is polluting public privacy and surveys the limited and inadequate doctrinal tools available to respond to mass surveillance technologies. Then, it provides …


From Anonymity To Identification, A. Michael Froomkin Jan 2015

From Anonymity To Identification, A. Michael Froomkin

Articles

This article examines whether anonymity online has a future. In the early days of the Internet, strong cryptography, anonymous remailers, and a relative lack of surveillance created an environment conducive to anonymous communication. Today, the outlook for online anonymity is poor. Several forces combine against it: ideologies that hold that anonymity is dangerous, or that identifying evil-doers is more important than ensuring a safe mechanism for unpopular speech; the profitability of identification in commerce; government surveillance; the influence of intellectual property interests and in requiring hardware and other tools that enforce identification; and the law at both national and supranational …


Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo Jan 2015

Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo

Articles

In 1986, Congress passed the Stored Communications Act (“SCA”) to provide additional protections for individuals’ private communications content held in electronic storage by third parties. Acting out of direct concern for the implications of the Third-Party Records Doctrine — a judicially created doctrine that generally eliminates Fourth Amendment protections for information entrusted to third parties — Congress sought to tailor the SCA to electronic communications sent via and stored by third parties. Yet, because Congress crafted the SCA with language specific to the technology of 1986, courts today have struggled to apply the SCA consistently with regard to similar private …


Surveillance At The Source, David Thaw Jan 2014

Surveillance At The Source, David Thaw

Articles

Contemporary discussion concerning surveillance focuses predominantly on government activity. These discussions are important for a variety of reasons, but generally ignore a critical aspect of the surveillance-harm calculus – the source from which government entities derive the information they use. The source of surveillance data is the information "gathering" activity itself, which is where harms like "chilling" of speech and behavior begin.

Unlike the days where satellite imaging, communications intercepts, and other forms of information gathering were limited to advanced law enforcement, military, and intelligence activities, private corporations now play a dominant role in the collection of information about individuals' …


"Pets Must Be On A Leash": How U.S. Law (And Industry Practice) Often Undermines And Even Forbids Valuable Privacy Enhancing Technology, A. Michael Froomkin Jan 2013

"Pets Must Be On A Leash": How U.S. Law (And Industry Practice) Often Undermines And Even Forbids Valuable Privacy Enhancing Technology, A. Michael Froomkin

Articles

No abstract provided.


Disentangling Administrative Searches, Eve Brensike Primus Jan 2011

Disentangling Administrative Searches, Eve Brensike Primus

Articles

Everyone who has been screened at an international border, scanned by an airport metal detector, or drug tested for public employment has been subjected to an administrative search. Since September 11th, the government has increasingly invoked the administrative search exception to justify more checkpoints, unprecedented subway searches, and extensive wiretaps. As science and technology advance, the frequency and scope of administrative searches will only expand. Formulating the boundaries and requirements of administrative search doctrine is therefore a matter of great importance. Yet the rules governing administrative searches are notoriously unclear. This Article seeks to refocus attention on administrative searches and …


Mapping Online Privacy, Jacqueline D. Lipton Jan 2010

Mapping Online Privacy, Jacqueline D. Lipton

Articles

Privacy scholars have recently outlined difficulties in applying existing concepts of personal privacy to the maturing Internet. With Web 2.0 technologies, more people have more opportunities to post information about themselves and others online, often with scant regard for individual privacy. Shifting notions of 'reasonable expectations of privacy' in the context of blogs, wikis, and online social networks create challenges for privacy regulation. Courts and commentators struggle with Web 2.0 privacy incursions without the benefit of a clear regulatory framework. This article offers a map of privacy that might help delineate at least the outer boundaries of Web 2.0 privacy. …


'We, The Paparazzi': Developing A Privacy Paradigm For Digital Video, Jacqueline D. Lipton Jan 2009

'We, The Paparazzi': Developing A Privacy Paradigm For Digital Video, Jacqueline D. Lipton

Articles

In January 2009, the Camera Phone Predator Alert bill was introduced into Congress. It raised serious concerns about privacy rights in the face of digital video technology. In so doing, it brought to light a worrying gap in current privacy regulation - the lack of rules relating to digital video privacy. To date, digital privacy regulation has focused on text records that contain personal data. Little attention has been paid to privacy in video files that may portray individuals in inappropriate contexts, or in an unflattering or embarrassing light. As digital video technology, including inexpensive cellphone cameras, is now becoming …