Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

PDF

2019

Privacy

Discipline
Institution
Publication

Articles 1 - 30 of 57

Full-Text Articles in Law

Law School News: Among The Trailblazers 12/02/2019, Michael M. Bowden Dec 2019

Law School News: Among The Trailblazers 12/02/2019, Michael M. Bowden

Life of the Law School (1993- )

No abstract provided.


Deep Fakes: A Looming Challenge For Privacy, Democracy, And National Security, Danielle K. Citron, Robert Chesney Dec 2019

Deep Fakes: A Looming Challenge For Privacy, Democracy, And National Security, Danielle K. Citron, Robert Chesney

Faculty Scholarship

Harmful lies are nothing new. But the ability to distort reality has taken an exponential leap forward with “deep fake” technology. This capability makes it possible to create audio and video of real people saying and doing things they never said or did. Machine learning techniques are escalating the technology’s sophistication, making deep fakes ever more realistic and increasingly resistant to detection. Deep-fake technology has characteristics that enable rapid and widespread diffusion, putting it into the hands of both sophisticated and unsophisticated actors. While deep-fake technology will bring with it certain benefits, it also will introduce many harms. The marketplace …


Cops And Cars: How The Automobile Drove Fourth Amendment Law, Tracey Maclin Dec 2019

Cops And Cars: How The Automobile Drove Fourth Amendment Law, Tracey Maclin

Faculty Scholarship

This is an essay on Professor Sarah A. Seo’s new book, Policing the Open Road: How Cars Transformed American Freedom (Harvard Univ. Press 2019). I focus on Professor Seo’s analysis of Carroll v. United States, 267 U.S. 132 (1925) and Brinegar v. United States, 338 U.S. 160 (1949). Carroll is important not only because it was the Court’s first car case. Understanding Carroll (and Brinegar, which solidified and expanded Carroll’s holding) is essential because, nearly one hundred years later, its logic continues to direct how the modern Court resolves Fourth Amendment claims of motorists. Put simply, a majority of today’s …


Catching Killers With Consumer Genetic Information, Angela Hackstadt Nov 2019

Catching Killers With Consumer Genetic Information, Angela Hackstadt

University Libraries Faculty Scholarship

In April 2018, Joseph James D'Angelo was arrested as a suspect in the Golden State Killer case. DNA evidence collected at a 1980 crime scene finally shed light on the murderer's identity in early 2018 when investigators turned to GEDMatch, a service that allows users to upload and share DNA data obtained from consumer genetic tests. Consumer genetic testing, DNA collection, and familial DNA searching all raise ethical and privacy concerns. If investigators are using genetic genealogy to solve cold cases, where does that leave consumers?


Law School News: Logan To Serve As Adviser On Restatement Third Of Torts 11-07-2019, Michael M. Bowden Nov 2019

Law School News: Logan To Serve As Adviser On Restatement Third Of Torts 11-07-2019, Michael M. Bowden

Life of the Law School (1993- )

No abstract provided.


Data Scams, Roger Allan Ford Nov 2019

Data Scams, Roger Allan Ford

Law Faculty Scholarship

Targeting platforms like Google and Facebook are usually seen as presenting tradeoffs between utility and privacy. This Article identifies and describes a different, non-privacy cost of targeting platforms: they make it easier for malicious actors to scam others. They do this by making it easier for scammers to reach the most promising victims, hide from law-enforcement authorities and others, and develop better scams. Technology offers potential solutions, since the same data and targeting tools that enable scams could help detect and prevent them, though neither platforms nor law-enforcement officials have both the incentives and expertise needed to develop and deploy …


Linn Foster Freedman Room Dedication At Rwu School Of Law 11-01-2019, Roger Williams University School Of Law, Michael M. Bowden Nov 2019

Linn Foster Freedman Room Dedication At Rwu School Of Law 11-01-2019, Roger Williams University School Of Law, Michael M. Bowden

School of Law Conferences, Lectures & Events

No abstract provided.


Digital Health Privacy In Active-Aging Settings: Will The Law Let You Age Well?, Tara Sklar, Richard Carmona, Kathie Insel, Christopher Robertson Nov 2019

Digital Health Privacy In Active-Aging Settings: Will The Law Let You Age Well?, Tara Sklar, Richard Carmona, Kathie Insel, Christopher Robertson

Faculty Scholarship

What is privacy and how are our interpretations of it changing with advances in technology? This question, and concerns around potentially violating a person’s right to privacy, have been emerging across industries around the world. Senior living providers have increased their exposure to privacy risks with the shift to implementing sensors throughout their communities. Typically located in digital health devices that can be worn on the body or placed in the environment, these sensors are capable of collecting and tracking data relevant to a person’s health and well-being on a continuous monitoring basis.

There are privacy laws and a growing …


The Missing Regulatory State: Monitoring Businesses In An Age Of Surveillance, Rory Van Loo Oct 2019

The Missing Regulatory State: Monitoring Businesses In An Age Of Surveillance, Rory Van Loo

Faculty Scholarship

An irony of the information age is that the companies responsible for the most extensive surveillance of individuals in history—large platforms such as Amazon, Facebook, and Google—have themselves remained unusually shielded from being monitored by government regulators. But the legal literature on state information acquisition is dominated by the privacy problems of excess collection from individuals, not businesses. There has been little sustained attention to the problem of insufficient information collection from businesses. This Article articulates the administrative state’s normative framework for monitoring businesses and shows how that framework is increasingly in tension with privacy concerns. One emerging complication is …


Law School News: Throw Out The Old Thinking 9-30-2019, Michael M. Bowden Sep 2019

Law School News: Throw Out The Old Thinking 9-30-2019, Michael M. Bowden

Life of the Law School (1993- )

No abstract provided.


Review Of Ian Kerr And Jane Bailey, The Implications Of Digital Rights Management For Privacy And Freedom Of Expression, 2 Journal Of Information, Communication & Ethics In Society 87 (2004), Ann Bartow Sep 2019

Review Of Ian Kerr And Jane Bailey, The Implications Of Digital Rights Management For Privacy And Freedom Of Expression, 2 Journal Of Information, Communication & Ethics In Society 87 (2004), Ann Bartow

Law Faculty Scholarship

Ian Kerr, who passed away far too young in 2019, was an incisive scholar and a much treasured colleague. The wit that sparkled in his papers was matched only by his warmth toward his friends, of whom there were many. He and his many co-authors wrote with deep insight and an equally deep humanity about copyright, artificial intelligence, privacy, torts, and much much more.

Ian was also a valued contributor to the Jotwell Technology Law section. His reviews here display the same playful generosity that characterized everything else he did. In tribute to his memory, we are publishing a memorial …


Towards Standard Information Privacy, Innovations Of The New General Data Protection Regulation, Ali Alibeigi, Abu Bakar Munir, Md Ershadulkarim, Adeleh Asemi Sep 2019

Towards Standard Information Privacy, Innovations Of The New General Data Protection Regulation, Ali Alibeigi, Abu Bakar Munir, Md Ershadulkarim, Adeleh Asemi

Library Philosophy and Practice (e-journal)

Protection of personal data in recent decades became more crucial affecting by emergence of the new technologies especially computer, internet, information and communications technology. However, Europeans felt this necessity at time and provided for up-to-date and supportive laws. The General Data Protection Regulation (GDPR) is the latest legislation in EU to protect personal data of individuals based on the recent technological advancements. However, its’ domestic and international output still is debatable. This doctrinal legal study by using descriptive methods, aimed to evaluate the GDPR through analyzing and interpreting its’ provisions by especial focus on its’ innovations. The results show that …


Catalyzing Privacy Law, Anupam Chander, Margot E. Kaminski, William Mcgeveran Aug 2019

Catalyzing Privacy Law, Anupam Chander, Margot E. Kaminski, William Mcgeveran

Georgetown Law Faculty Publications and Other Works

The United States famously lacks a comprehensive federal data privacy law. In the past year, however, over half the states have proposed broad privacy bills or have established task forces to propose possible privacy legislation. Meanwhile, congressional committees are holding hearings on multiple privacy bills. What is catalyzing this legislative momentum? Some believe that Europe’s General Data Protection Regulation (GDPR), which came into force in 2018, is the driving factor. But with the California Consumer Privacy Act (CCPA) which took effect in January 2020, California has emerged as an alternate contender in the race to set the new standard for …


Automated License Plate Readers: The Difficult Balance Of Solving Crime And Protecting Individual Privacy, Lauren Fash Jun 2019

Automated License Plate Readers: The Difficult Balance Of Solving Crime And Protecting Individual Privacy, Lauren Fash

Maryland Law Review Online

No abstract provided.


The Normative Fourth Amendment, Matthew Tokson May 2019

The Normative Fourth Amendment, Matthew Tokson

Utah Law Faculty Scholarship

For decades, courts have used a “reasonable expectation of privacy” standard to determine whether a government action is a Fourth Amendment search. Scholars have convincingly argued that this test is incoherent, arbitrary, and incapable of protecting privacy against modern forms of surveillance. Yet few alternatives have been proposed, and those alternatives pose many of the same problems as the current standard.

This Article offers a new theoretical approach for determining the scope of the Fourth Amendment. It develops a normative model of Fourth Amendment searches, one that explicitly addresses the balance between law enforcement effectiveness and citizens’ interests inherent in …


Data Re-Use And The Problem Of Group Identity, Leslie Francis, John G. Francis Apr 2019

Data Re-Use And The Problem Of Group Identity, Leslie Francis, John G. Francis

Utah Law Faculty Scholarship

Reusing existing data sets of health information for public health or medical research has much to recommend it. Much data repurposing in medical or public health research or practice involves information that has been stripped of individual identifiers but some does not. In some cases, there may have been consent to the reuse but in other cases consent may be absent and people may be entirely unaware of how the data about them are being used. Data sets are also being combined and may contain information with very different sources, consent histories, and individual identifiers. Much of the ethical and …


Deputizing Family: Loved Ones As A Regulatory Tool In The "Drug War" And Beyond, Matthew J.B. Lawrence Apr 2019

Deputizing Family: Loved Ones As A Regulatory Tool In The "Drug War" And Beyond, Matthew J.B. Lawrence

Faculty Scholarly Works

Many laws use family members as a regulatory tool to influence the decisions or behavior of their loved ones, i.e., they deputize family. Involuntary treatment laws for substance use disorder are a clear example; such laws empower family members to use information shared by their loved ones to petition to force their loved ones into treatment without consent. Whether such deputization is helpful or harmful for a patient’s health is a crucial and dubious question discussed in existing literature, but use of family members as a regulatory tool implicates important considerations beyond direct medical impacts that have not been as …


Law School News: A Spring Break That Teaches - And Gives Back 03/11/2019, Edward Fitzpatrick Mar 2019

Law School News: A Spring Break That Teaches - And Gives Back 03/11/2019, Edward Fitzpatrick

Life of the Law School (1993- )

No abstract provided.


In Defense Of The American Community Survey, Michael Lewyn Jan 2019

In Defense Of The American Community Survey, Michael Lewyn

Scholarly Works

Discusses policy and constitutional arguments against the ACS, a yearly survey administered by the Census Bureau.


Consumer Protection—Exploring Private Causes Of Action For Victims Of Data Breaches, Justin H. Dion, Nicholas M. Smith Jan 2019

Consumer Protection—Exploring Private Causes Of Action For Victims Of Data Breaches, Justin H. Dion, Nicholas M. Smith

Faculty Scholarship

Data breaches are becoming a norm in modern life. Every year it seems that bigger and bigger attacks are launched, and more and more individuals are harmed. The law has responded by increasing states’ ability to prosecute cybercriminals. A glaring hole exists in this protection though. The state is largely an unharmed party. The real harm is done to individual citizens affected by the breaches. Their data is compromised, their identities are stolen, and their livelihoods are placed at risk. This Article will analyze the issue and propose a solution for increased consumer protection in addition to the current criminal …


Data Subjects' Privacy Rights: Regulation Of Personal Data Retention And Erasure, Alexander Tsesis Jan 2019

Data Subjects' Privacy Rights: Regulation Of Personal Data Retention And Erasure, Alexander Tsesis

Faculty Publications & Other Works

The European Union's right to erasure came into effect May 25, 2018, as Article 17 of the General Data Protection Regulation ("GDPR"). Unlike the U.S. "marketplace of ideas" model of free speech, the GDPR gives greater weight to data subjects' privacy interests than to audiences' curiosity about others' intimate lives. The U.S. and EU models advance human thirst for knowledge through open and uninhibited debates, whereas the internet marketplace tends to favor social media companies' commercial interests: put more specifically, free speech is not entirely harmonious with the interests of social media intermediaries whose algorithms tend to favor companies' bottom …


Marketplace Of Ideas, Privacy, And The Digital Audience, Alexander Tsesis Jan 2019

Marketplace Of Ideas, Privacy, And The Digital Audience, Alexander Tsesis

Faculty Publications & Other Works

The availability of almost limitless sets of digital information has opened a vast marketplace of ideas. Information service providers like Facebook and Twitter provide users with an array of personal information about products, friends, acquaintances, and strangers. While this data enriches the lives of those who share content on the internet, it comes at the expense of privacy. Social media companies disseminate news, advertisements, and political messages, while also capitalizing on consumers' private shopping, surfing, and traveling habits. Companies like Cambridge Analytica, Amazon, and Apple rely on algorithmic programs to mash up and scrape enormous amounts of online and otherwise …


Policing, Databases, And Surveilance: Five Regulatory Categories, Christopher Slobogin Jan 2019

Policing, Databases, And Surveilance: Five Regulatory Categories, Christopher Slobogin

Vanderbilt Law School Faculty Publications

Databases are full of personal information that law enforcement might find useful. Government access to these databases can be divided into five categories: suspect-driven; profile-driven; event-driven; program-driven and volunteer-driven. This chapter recommends that, in addition to any restrictions imposed by the Fourth Amendment (which currently are minimal), each type of access should be subject to its own regulatory regime. Suspect-driven access should depend on justification proportionate to the intrusion. Profile-driven access should likewise abide by a proportionality principle but should also be subject to transparency, vetting, and universality restrictions. Event-driven access should be cabined by the time and place of …


The Ironic Privacy Act, Margaret Hu Jan 2019

The Ironic Privacy Act, Margaret Hu

Faculty Publications

This Article contends that the Privacy Act of 1974, a law intended to engender trust in government records, can be implemented in a way that inverts its intent. Specifically, pursuant to the Privacy Act's reporting requirements, in September 2017, the U.S. Department of Homeland Security (DHS) notified the public that record systems would be modified to encompass the collection of social media data. The notification justified the collection of social media data as a part of national security screening and immigration vetting procedures. However, the collection will encompass social media data on both citizens and noncitizens, and was not explicitly …


The Exclusionary Rule In The Age Of Blue Data, Andrew Ferguson Jan 2019

The Exclusionary Rule In The Age Of Blue Data, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

In Herring v. United States, Chief Justice John Roberts reframed the Supreme Court’s understanding of the exclusionary rule: “As laid out in our cases, the exclusionary rule serves to deter deliberate, reckless, or grossly negligent conduct, or in some circumstances recurring or systemic negligence.” The open question remains: how can defendants demonstrate sufficient recurring or systemic negligence to warrant exclusion? The Supreme Court has never answered the question, although the absence of systemic or recurring problems has figured prominently in two recent exclusionary rule decisions. Without the ability to document recurring failures, or patterns of police misconduct, courts can dismiss …


The Left's Law-And-Order Agenda, Aya Gruber Jan 2019

The Left's Law-And-Order Agenda, Aya Gruber

Publications

No abstract provided.


Power, Process, And Automated Decision-Making, Ari Ezra Waldman Jan 2019

Power, Process, And Automated Decision-Making, Ari Ezra Waldman

Articles & Chapters

Many decisions that used to be made by humans are now made by machines. And yet, automated decision-making systems based on “big data” – powered algorithms and machine learning are just as prone to mistakes, biases, and arbitrariness as their human counterparts. The result is a technologically driven decision-making process that seems to defy interrogation, analysis, and accountability and, therefore, undermines due process. This should make algorithmic decision-making an illegitimate source of authority in a liberal democracy. This Essay argues that algorithmic decision-making is a product of the neoliberal project to undermine social values like equality, nondiscrimination, and human flourishing …


Gina, Big Data, And The Future Of Employee Privacy, Brad Areheart Jan 2019

Gina, Big Data, And The Future Of Employee Privacy, Brad Areheart

Scholarly Works

Threats to privacy abound in modern society, but individuals currently enjoy little meaningful legal protection for their privacy interests. We argue that the Genetic Information Nondiscrimination Act (GINA) offers a blueprint for preventing employers from breaching employee privacy. GINA has faced significant criticism since its enactment in 2008: commentators have dismissed the law as ill-conceived, unnecessary, and ineffective. While we concede that GINA may have failed to alleviate anxieties about medical genetic testing, we assert that it has unappreciated value as an employee-privacy statute. In the era of big data, protections for employee privacy are more pressing than protections against …


Privacy And Legal Automation: The Dmca As A Case Study, Jonathon Penney Jan 2019

Privacy And Legal Automation: The Dmca As A Case Study, Jonathon Penney

Articles, Book Chapters, & Popular Press

Advances in artificial intelligence, machine learning, computing capacity, and big data analytics are creating exciting new possibilities for legal automation. At the same time, these changes pose serious risks for civil liberties and other societal interests. Yet, existing scholarship is narrow, leaving uncertainty on a range of issues, including a glaring lack of systematic empirical work as to how legal automation may impact people’s privacy and freedom. This article addresses this gap with an original empirical analysis of the Digital Millennium Copyright Act (DMCA), which today sits at the forefront of algorithmic law due to its automated enforcement of copyright …


Recording As Heckling, Scott Skinner-Thompson Jan 2019

Recording As Heckling, Scott Skinner-Thompson

Publications

A growing body of authority recognizes that citizen recording of police officers and public space is protected by the First Amendment. But the judicial and scholarly momentum behind the emerging “right to record” fails to fully incorporate recording’s cost to another important right that also furthers First Amendment principles: the right to privacy.

This Article helps fill that gap by comprehensively analyzing the First Amendment interests of both the right to record and the right to privacy in public while highlighting the role of technology in altering the First Amendment landscape. Recording information can be critical to future speech and, …