Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Privacy Law (30)
- Science and Technology Law (10)
- Computer Law (9)
- First Amendment (9)
- Fourth Amendment (7)
-
- Constitutional Law (6)
- Internet Law (6)
- Criminal Procedure (5)
- Health Law and Policy (5)
- Legal Profession (5)
- Administrative Law (4)
- Criminal Law (4)
- Intellectual Property Law (4)
- Law Enforcement and Corrections (4)
- Legal Education (4)
- Social and Behavioral Sciences (4)
- Business Organizations Law (3)
- Communications Law (3)
- Human Rights Law (3)
- Law and Politics (3)
- Business (2)
- Civil Law (2)
- European Law (2)
- Evidence (2)
- Law and Economics (2)
- Law and Society (2)
- Legal History (2)
- Legislation (2)
- Library and Information Science (2)
- Institution
-
- Boston University School of Law (11)
- Roger Williams University (5)
- University of Colorado Law School (4)
- Georgetown University Law Center (3)
- American University Washington College of Law (2)
-
- Fordham Law School (2)
- Loyola University Chicago, School of Law (2)
- Penn State Dickinson Law (2)
- SJ Quinney College of Law, University of Utah (2)
- University of Florida Levin College of Law (2)
- University of Nebraska - Lincoln (2)
- University of New Hampshire (2)
- California Western School of Law (1)
- Columbia Law School (1)
- Maurer School of Law: Indiana University (1)
- New York Law School (1)
- Schulich School of Law, Dalhousie University (1)
- St. John's University School of Law (1)
- Texas A&M University School of Law (1)
- Touro University Jacob D. Fuchsberg Law Center (1)
- University at Albany, State University of New York (1)
- University of Georgia School of Law (1)
- University of Maryland Francis King Carey School of Law (1)
- University of Michigan Law School (1)
- University of Pennsylvania Carey Law School (1)
- University of Tennessee College of Law (1)
- Vanderbilt University Law School (1)
- Western New England University School of Law (1)
- William & Mary Law School (1)
- Yeshiva University, Cardozo School of Law (1)
- Publication
-
- Faculty Scholarship (17)
- Life of the Law School (1993- ) (4)
- Publications (4)
- Georgetown Law Faculty Publications and Other Works (3)
- Scholarly Works (3)
-
- Articles (2)
- Articles in Law Reviews & Other Academic Journals (2)
- Faculty Publications (2)
- Faculty Publications & Other Works (2)
- Faculty Scholarly Works (2)
- Law Faculty Scholarship (2)
- Library Philosophy and Practice (e-journal) (2)
- UF Law Faculty Publications (2)
- Utah Law Faculty Scholarship (2)
- All Faculty Scholarship (1)
- Articles & Chapters (1)
- Articles by Maurer Faculty (1)
- Articles, Book Chapters, & Popular Press (1)
- Maryland Law Review Online (1)
- School of Law Conferences, Lectures & Events (1)
- University Libraries Faculty Scholarship (1)
- Vanderbilt Law School Faculty Publications (1)
Articles 1 - 30 of 57
Full-Text Articles in Law
Law School News: Among The Trailblazers 12/02/2019, Michael M. Bowden
Law School News: Among The Trailblazers 12/02/2019, Michael M. Bowden
Life of the Law School (1993- )
No abstract provided.
Deep Fakes: A Looming Challenge For Privacy, Democracy, And National Security, Danielle K. Citron, Robert Chesney
Deep Fakes: A Looming Challenge For Privacy, Democracy, And National Security, Danielle K. Citron, Robert Chesney
Faculty Scholarship
Harmful lies are nothing new. But the ability to distort reality has taken an exponential leap forward with “deep fake” technology. This capability makes it possible to create audio and video of real people saying and doing things they never said or did. Machine learning techniques are escalating the technology’s sophistication, making deep fakes ever more realistic and increasingly resistant to detection. Deep-fake technology has characteristics that enable rapid and widespread diffusion, putting it into the hands of both sophisticated and unsophisticated actors. While deep-fake technology will bring with it certain benefits, it also will introduce many harms. The marketplace …
Cops And Cars: How The Automobile Drove Fourth Amendment Law, Tracey Maclin
Cops And Cars: How The Automobile Drove Fourth Amendment Law, Tracey Maclin
Faculty Scholarship
This is an essay on Professor Sarah A. Seo’s new book, Policing the Open Road: How Cars Transformed American Freedom (Harvard Univ. Press 2019). I focus on Professor Seo’s analysis of Carroll v. United States, 267 U.S. 132 (1925) and Brinegar v. United States, 338 U.S. 160 (1949). Carroll is important not only because it was the Court’s first car case. Understanding Carroll (and Brinegar, which solidified and expanded Carroll’s holding) is essential because, nearly one hundred years later, its logic continues to direct how the modern Court resolves Fourth Amendment claims of motorists. Put simply, a majority of today’s …
Catching Killers With Consumer Genetic Information, Angela Hackstadt
Catching Killers With Consumer Genetic Information, Angela Hackstadt
University Libraries Faculty Scholarship
In April 2018, Joseph James D'Angelo was arrested as a suspect in the Golden State Killer case. DNA evidence collected at a 1980 crime scene finally shed light on the murderer's identity in early 2018 when investigators turned to GEDMatch, a service that allows users to upload and share DNA data obtained from consumer genetic tests. Consumer genetic testing, DNA collection, and familial DNA searching all raise ethical and privacy concerns. If investigators are using genetic genealogy to solve cold cases, where does that leave consumers?
Law School News: Logan To Serve As Adviser On Restatement Third Of Torts 11-07-2019, Michael M. Bowden
Law School News: Logan To Serve As Adviser On Restatement Third Of Torts 11-07-2019, Michael M. Bowden
Life of the Law School (1993- )
No abstract provided.
Data Scams, Roger Allan Ford
Data Scams, Roger Allan Ford
Law Faculty Scholarship
Targeting platforms like Google and Facebook are usually seen as presenting tradeoffs between utility and privacy. This Article identifies and describes a different, non-privacy cost of targeting platforms: they make it easier for malicious actors to scam others. They do this by making it easier for scammers to reach the most promising victims, hide from law-enforcement authorities and others, and develop better scams. Technology offers potential solutions, since the same data and targeting tools that enable scams could help detect and prevent them, though neither platforms nor law-enforcement officials have both the incentives and expertise needed to develop and deploy …
Linn Foster Freedman Room Dedication At Rwu School Of Law 11-01-2019, Roger Williams University School Of Law, Michael M. Bowden
Linn Foster Freedman Room Dedication At Rwu School Of Law 11-01-2019, Roger Williams University School Of Law, Michael M. Bowden
School of Law Conferences, Lectures & Events
No abstract provided.
Digital Health Privacy In Active-Aging Settings: Will The Law Let You Age Well?, Tara Sklar, Richard Carmona, Kathie Insel, Christopher Robertson
Digital Health Privacy In Active-Aging Settings: Will The Law Let You Age Well?, Tara Sklar, Richard Carmona, Kathie Insel, Christopher Robertson
Faculty Scholarship
What is privacy and how are our interpretations of it changing with advances in technology? This question, and concerns around potentially violating a person’s right to privacy, have been emerging across industries around the world. Senior living providers have increased their exposure to privacy risks with the shift to implementing sensors throughout their communities. Typically located in digital health devices that can be worn on the body or placed in the environment, these sensors are capable of collecting and tracking data relevant to a person’s health and well-being on a continuous monitoring basis.
There are privacy laws and a growing …
The Missing Regulatory State: Monitoring Businesses In An Age Of Surveillance, Rory Van Loo
The Missing Regulatory State: Monitoring Businesses In An Age Of Surveillance, Rory Van Loo
Faculty Scholarship
An irony of the information age is that the companies responsible for the most extensive surveillance of individuals in history—large platforms such as Amazon, Facebook, and Google—have themselves remained unusually shielded from being monitored by government regulators. But the legal literature on state information acquisition is dominated by the privacy problems of excess collection from individuals, not businesses. There has been little sustained attention to the problem of insufficient information collection from businesses. This Article articulates the administrative state’s normative framework for monitoring businesses and shows how that framework is increasingly in tension with privacy concerns. One emerging complication is …
Law School News: Throw Out The Old Thinking 9-30-2019, Michael M. Bowden
Law School News: Throw Out The Old Thinking 9-30-2019, Michael M. Bowden
Life of the Law School (1993- )
No abstract provided.
Review Of Ian Kerr And Jane Bailey, The Implications Of Digital Rights Management For Privacy And Freedom Of Expression, 2 Journal Of Information, Communication & Ethics In Society 87 (2004), Ann Bartow
Law Faculty Scholarship
Ian Kerr, who passed away far too young in 2019, was an incisive scholar and a much treasured colleague. The wit that sparkled in his papers was matched only by his warmth toward his friends, of whom there were many. He and his many co-authors wrote with deep insight and an equally deep humanity about copyright, artificial intelligence, privacy, torts, and much much more.
Ian was also a valued contributor to the Jotwell Technology Law section. His reviews here display the same playful generosity that characterized everything else he did. In tribute to his memory, we are publishing a memorial …
Towards Standard Information Privacy, Innovations Of The New General Data Protection Regulation, Ali Alibeigi, Abu Bakar Munir, Md Ershadulkarim, Adeleh Asemi
Towards Standard Information Privacy, Innovations Of The New General Data Protection Regulation, Ali Alibeigi, Abu Bakar Munir, Md Ershadulkarim, Adeleh Asemi
Library Philosophy and Practice (e-journal)
Protection of personal data in recent decades became more crucial affecting by emergence of the new technologies especially computer, internet, information and communications technology. However, Europeans felt this necessity at time and provided for up-to-date and supportive laws. The General Data Protection Regulation (GDPR) is the latest legislation in EU to protect personal data of individuals based on the recent technological advancements. However, its’ domestic and international output still is debatable. This doctrinal legal study by using descriptive methods, aimed to evaluate the GDPR through analyzing and interpreting its’ provisions by especial focus on its’ innovations. The results show that …
Catalyzing Privacy Law, Anupam Chander, Margot E. Kaminski, William Mcgeveran
Catalyzing Privacy Law, Anupam Chander, Margot E. Kaminski, William Mcgeveran
Georgetown Law Faculty Publications and Other Works
The United States famously lacks a comprehensive federal data privacy law. In the past year, however, over half the states have proposed broad privacy bills or have established task forces to propose possible privacy legislation. Meanwhile, congressional committees are holding hearings on multiple privacy bills. What is catalyzing this legislative momentum? Some believe that Europe’s General Data Protection Regulation (GDPR), which came into force in 2018, is the driving factor. But with the California Consumer Privacy Act (CCPA) which took effect in January 2020, California has emerged as an alternate contender in the race to set the new standard for …
Automated License Plate Readers: The Difficult Balance Of Solving Crime And Protecting Individual Privacy, Lauren Fash
Automated License Plate Readers: The Difficult Balance Of Solving Crime And Protecting Individual Privacy, Lauren Fash
Maryland Law Review Online
No abstract provided.
The Normative Fourth Amendment, Matthew Tokson
The Normative Fourth Amendment, Matthew Tokson
Utah Law Faculty Scholarship
For decades, courts have used a “reasonable expectation of privacy” standard to determine whether a government action is a Fourth Amendment search. Scholars have convincingly argued that this test is incoherent, arbitrary, and incapable of protecting privacy against modern forms of surveillance. Yet few alternatives have been proposed, and those alternatives pose many of the same problems as the current standard.
This Article offers a new theoretical approach for determining the scope of the Fourth Amendment. It develops a normative model of Fourth Amendment searches, one that explicitly addresses the balance between law enforcement effectiveness and citizens’ interests inherent in …
Data Re-Use And The Problem Of Group Identity, Leslie Francis, John G. Francis
Data Re-Use And The Problem Of Group Identity, Leslie Francis, John G. Francis
Utah Law Faculty Scholarship
Reusing existing data sets of health information for public health or medical research has much to recommend it. Much data repurposing in medical or public health research or practice involves information that has been stripped of individual identifiers but some does not. In some cases, there may have been consent to the reuse but in other cases consent may be absent and people may be entirely unaware of how the data about them are being used. Data sets are also being combined and may contain information with very different sources, consent histories, and individual identifiers. Much of the ethical and …
Deputizing Family: Loved Ones As A Regulatory Tool In The "Drug War" And Beyond, Matthew J.B. Lawrence
Deputizing Family: Loved Ones As A Regulatory Tool In The "Drug War" And Beyond, Matthew J.B. Lawrence
Faculty Scholarly Works
Many laws use family members as a regulatory tool to influence the decisions or behavior of their loved ones, i.e., they deputize family. Involuntary treatment laws for substance use disorder are a clear example; such laws empower family members to use information shared by their loved ones to petition to force their loved ones into treatment without consent. Whether such deputization is helpful or harmful for a patient’s health is a crucial and dubious question discussed in existing literature, but use of family members as a regulatory tool implicates important considerations beyond direct medical impacts that have not been as …
Law School News: A Spring Break That Teaches - And Gives Back 03/11/2019, Edward Fitzpatrick
Law School News: A Spring Break That Teaches - And Gives Back 03/11/2019, Edward Fitzpatrick
Life of the Law School (1993- )
No abstract provided.
In Defense Of The American Community Survey, Michael Lewyn
In Defense Of The American Community Survey, Michael Lewyn
Scholarly Works
Discusses policy and constitutional arguments against the ACS, a yearly survey administered by the Census Bureau.
Consumer Protection—Exploring Private Causes Of Action For Victims Of Data Breaches, Justin H. Dion, Nicholas M. Smith
Consumer Protection—Exploring Private Causes Of Action For Victims Of Data Breaches, Justin H. Dion, Nicholas M. Smith
Faculty Scholarship
Data breaches are becoming a norm in modern life. Every year it seems that bigger and bigger attacks are launched, and more and more individuals are harmed. The law has responded by increasing states’ ability to prosecute cybercriminals. A glaring hole exists in this protection though. The state is largely an unharmed party. The real harm is done to individual citizens affected by the breaches. Their data is compromised, their identities are stolen, and their livelihoods are placed at risk. This Article will analyze the issue and propose a solution for increased consumer protection in addition to the current criminal …
Data Subjects' Privacy Rights: Regulation Of Personal Data Retention And Erasure, Alexander Tsesis
Data Subjects' Privacy Rights: Regulation Of Personal Data Retention And Erasure, Alexander Tsesis
Faculty Publications & Other Works
The European Union's right to erasure came into effect May 25, 2018, as Article 17 of the General Data Protection Regulation ("GDPR"). Unlike the U.S. "marketplace of ideas" model of free speech, the GDPR gives greater weight to data subjects' privacy interests than to audiences' curiosity about others' intimate lives. The U.S. and EU models advance human thirst for knowledge through open and uninhibited debates, whereas the internet marketplace tends to favor social media companies' commercial interests: put more specifically, free speech is not entirely harmonious with the interests of social media intermediaries whose algorithms tend to favor companies' bottom …
Marketplace Of Ideas, Privacy, And The Digital Audience, Alexander Tsesis
Marketplace Of Ideas, Privacy, And The Digital Audience, Alexander Tsesis
Faculty Publications & Other Works
The availability of almost limitless sets of digital information has opened a vast marketplace of ideas. Information service providers like Facebook and Twitter provide users with an array of personal information about products, friends, acquaintances, and strangers. While this data enriches the lives of those who share content on the internet, it comes at the expense of privacy. Social media companies disseminate news, advertisements, and political messages, while also capitalizing on consumers' private shopping, surfing, and traveling habits. Companies like Cambridge Analytica, Amazon, and Apple rely on algorithmic programs to mash up and scrape enormous amounts of online and otherwise …
Policing, Databases, And Surveilance: Five Regulatory Categories, Christopher Slobogin
Policing, Databases, And Surveilance: Five Regulatory Categories, Christopher Slobogin
Vanderbilt Law School Faculty Publications
Databases are full of personal information that law enforcement might find useful. Government access to these databases can be divided into five categories: suspect-driven; profile-driven; event-driven; program-driven and volunteer-driven. This chapter recommends that, in addition to any restrictions imposed by the Fourth Amendment (which currently are minimal), each type of access should be subject to its own regulatory regime. Suspect-driven access should depend on justification proportionate to the intrusion. Profile-driven access should likewise abide by a proportionality principle but should also be subject to transparency, vetting, and universality restrictions. Event-driven access should be cabined by the time and place of …
The Ironic Privacy Act, Margaret Hu
The Ironic Privacy Act, Margaret Hu
Faculty Publications
This Article contends that the Privacy Act of 1974, a law intended to engender trust in government records, can be implemented in a way that inverts its intent. Specifically, pursuant to the Privacy Act's reporting requirements, in September 2017, the U.S. Department of Homeland Security (DHS) notified the public that record systems would be modified to encompass the collection of social media data. The notification justified the collection of social media data as a part of national security screening and immigration vetting procedures. However, the collection will encompass social media data on both citizens and noncitizens, and was not explicitly …
The Exclusionary Rule In The Age Of Blue Data, Andrew Ferguson
The Exclusionary Rule In The Age Of Blue Data, Andrew Ferguson
Articles in Law Reviews & Other Academic Journals
In Herring v. United States, Chief Justice John Roberts reframed the Supreme Court’s understanding of the exclusionary rule: “As laid out in our cases, the exclusionary rule serves to deter deliberate, reckless, or grossly negligent conduct, or in some circumstances recurring or systemic negligence.” The open question remains: how can defendants demonstrate sufficient recurring or systemic negligence to warrant exclusion? The Supreme Court has never answered the question, although the absence of systemic or recurring problems has figured prominently in two recent exclusionary rule decisions. Without the ability to document recurring failures, or patterns of police misconduct, courts can dismiss …
The Left's Law-And-Order Agenda, Aya Gruber
Power, Process, And Automated Decision-Making, Ari Ezra Waldman
Power, Process, And Automated Decision-Making, Ari Ezra Waldman
Articles & Chapters
Many decisions that used to be made by humans are now made by machines. And yet, automated decision-making systems based on “big data” – powered algorithms and machine learning are just as prone to mistakes, biases, and arbitrariness as their human counterparts. The result is a technologically driven decision-making process that seems to defy interrogation, analysis, and accountability and, therefore, undermines due process. This should make algorithmic decision-making an illegitimate source of authority in a liberal democracy. This Essay argues that algorithmic decision-making is a product of the neoliberal project to undermine social values like equality, nondiscrimination, and human flourishing …
Gina, Big Data, And The Future Of Employee Privacy, Brad Areheart
Gina, Big Data, And The Future Of Employee Privacy, Brad Areheart
Scholarly Works
Threats to privacy abound in modern society, but individuals currently enjoy little meaningful legal protection for their privacy interests. We argue that the Genetic Information Nondiscrimination Act (GINA) offers a blueprint for preventing employers from breaching employee privacy. GINA has faced significant criticism since its enactment in 2008: commentators have dismissed the law as ill-conceived, unnecessary, and ineffective. While we concede that GINA may have failed to alleviate anxieties about medical genetic testing, we assert that it has unappreciated value as an employee-privacy statute. In the era of big data, protections for employee privacy are more pressing than protections against …
Privacy And Legal Automation: The Dmca As A Case Study, Jonathon Penney
Privacy And Legal Automation: The Dmca As A Case Study, Jonathon Penney
Articles, Book Chapters, & Popular Press
Advances in artificial intelligence, machine learning, computing capacity, and big data analytics are creating exciting new possibilities for legal automation. At the same time, these changes pose serious risks for civil liberties and other societal interests. Yet, existing scholarship is narrow, leaving uncertainty on a range of issues, including a glaring lack of systematic empirical work as to how legal automation may impact people’s privacy and freedom. This article addresses this gap with an original empirical analysis of the Digital Millennium Copyright Act (DMCA), which today sits at the forefront of algorithmic law due to its automated enforcement of copyright …
Recording As Heckling, Scott Skinner-Thompson
Recording As Heckling, Scott Skinner-Thompson
Publications
A growing body of authority recognizes that citizen recording of police officers and public space is protected by the First Amendment. But the judicial and scholarly momentum behind the emerging “right to record” fails to fully incorporate recording’s cost to another important right that also furthers First Amendment principles: the right to privacy.
This Article helps fill that gap by comprehensively analyzing the First Amendment interests of both the right to record and the right to privacy in public while highlighting the role of technology in altering the First Amendment landscape. Recording information can be critical to future speech and, …