Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Privacy Law (31)
- Science and Technology Law (10)
- Computer Law (9)
- First Amendment (9)
- Fourth Amendment (7)
-
- Constitutional Law (6)
- Health Law and Policy (6)
- Internet Law (6)
- Criminal Procedure (5)
- Legal Profession (5)
- Administrative Law (4)
- Criminal Law (4)
- Intellectual Property Law (4)
- Law Enforcement and Corrections (4)
- Legal Education (4)
- Social and Behavioral Sciences (4)
- Business Organizations Law (3)
- Communications Law (3)
- Human Rights Law (3)
- Law and Politics (3)
- Business (2)
- Civil Law (2)
- European Law (2)
- Evidence (2)
- Law and Economics (2)
- Law and Society (2)
- Legal History (2)
- Legislation (2)
- Library and Information Science (2)
- Institution
-
- Boston University School of Law (11)
- Roger Williams University (5)
- University of Colorado Law School (4)
- Georgetown University Law Center (3)
- American University Washington College of Law (2)
-
- Fordham Law School (2)
- Loyola University Chicago, School of Law (2)
- Penn State Dickinson Law (2)
- SJ Quinney College of Law, University of Utah (2)
- University of Florida Levin College of Law (2)
- University of Nebraska - Lincoln (2)
- University of New Hampshire (2)
- California Western School of Law (1)
- Columbia Law School (1)
- Emory University School of Law (1)
- Maurer School of Law: Indiana University (1)
- New York Law School (1)
- Schulich School of Law, Dalhousie University (1)
- St. John's University School of Law (1)
- Texas A&M University School of Law (1)
- Touro University Jacob D. Fuchsberg Law Center (1)
- University at Albany, State University of New York (1)
- University of Georgia School of Law (1)
- University of Maryland Francis King Carey School of Law (1)
- University of Michigan Law School (1)
- University of Pennsylvania Carey Law School (1)
- University of Tennessee College of Law (1)
- Vanderbilt University Law School (1)
- Western New England University School of Law (1)
- William & Mary Law School (1)
- Publication
-
- Faculty Scholarship (17)
- Life of the Law School (1993- ) (4)
- Publications (4)
- Georgetown Law Faculty Publications and Other Works (3)
- Scholarly Works (3)
-
- Articles (2)
- Articles in Law Reviews & Other Academic Journals (2)
- Faculty Publications (2)
- Faculty Publications & Other Works (2)
- Faculty Scholarly Works (2)
- Law Faculty Scholarship (2)
- Library Philosophy and Practice (e-journal) (2)
- UF Law Faculty Publications (2)
- Utah Law Faculty Scholarship (2)
- All Faculty Scholarship (1)
- Articles & Chapters (1)
- Articles by Maurer Faculty (1)
- Articles, Book Chapters, & Popular Press (1)
- Faculty Articles (1)
- Maryland Law Review Online (1)
- School of Law Conferences, Lectures & Events (1)
- University Libraries Faculty Scholarship (1)
- Vanderbilt Law School Faculty Publications (1)
Articles 31 - 58 of 58
Full-Text Articles in Law
The Right To Explanation, Explained, Margot E. Kaminski
The Right To Explanation, Explained, Margot E. Kaminski
Publications
Many have called for algorithmic accountability: laws governing decision-making by complex algorithms, or AI. The EU’s General Data Protection Regulation (GDPR) now establishes exactly this. The recent debate over the right to explanation (a right to information about individual decisions made by algorithms) has obscured the significant algorithmic accountability regime established by the GDPR. The GDPR’s provisions on algorithmic accountability, which include a right to explanation, have the potential to be broader, stronger, and deeper than the preceding requirements of the Data Protection Directive. This Essay clarifies, largely for a U.S. audience, what the GDPR actually requires, incorporating recently released …
Maps: Scaling Privacy Compliance Analysis To A Million Apps, Sebastian Zimmeck, Peter Story, Daniel Smullen, Abhilasha Ravichander, Ziqi Wang, Joel R. Reidenberg, N. Cameron Russell, Norman Sadeh
Maps: Scaling Privacy Compliance Analysis To A Million Apps, Sebastian Zimmeck, Peter Story, Daniel Smullen, Abhilasha Ravichander, Ziqi Wang, Joel R. Reidenberg, N. Cameron Russell, Norman Sadeh
Faculty Scholarship
The app economy is largely reliant on data collection as its primary revenue model. To comply with legal requirements, app developers are often obligated to notify users of their privacy practices in privacy policies. However, prior research has suggested that many developers are not accurately disclosing their apps’ privacy practices. Evaluating discrepancies between apps’ code and privacy policies enables the identification of potential compliance issues. In this study, we introduce the Mobile App Privacy System (MAPS) for conducting an extensive privacy census of Android apps. We designed a pipeline for retrieving and analyzing large app populations based on code analysis …
Apis And Your Privacy, N. Cameron Russell
Apis And Your Privacy, N. Cameron Russell
Faculty Scholarship
Application programming interfaces, or APIs, have been the topic of much recent discussion. Newsworthy events, including those involving Facebook’s API and Cambridge Analytica obtaining information about millions of Facebook users, have highlighted the technical capabilities of APIs for prominent websites and mobile applications. At the same time, media coverage of ways that APIs have been misused has sparked concern for potential privacy invasions and other issues of public policy. This paper seeks to educate consumers on how APIs work and how they are used within popular websites and mobile apps to gather, share, and utilize data.
APIs are used in …
Privacy In The Age Of Medical Big Data, W. Nicholson Price Ii, I. Glenn Cohen
Privacy In The Age Of Medical Big Data, W. Nicholson Price Ii, I. Glenn Cohen
Articles
Big data has become the ubiquitous watch word of medical innovation. The rapid development of machine-learning techniques and artificial intelligence in particular has promised to revolutionize medical practice from the allocation of resources to the diagnosis of complex diseases. But with big data comes big risks and challenges, among them significant questions about patient privacy. Here, we outline the legal and ethical challenges big data brings to patient privacy. We discuss, among other topics, how best to conceive of health privacy; the importance of equity, consent, and patient governance in data collection; discrimination in data uses; and how to handle …
The Federalism Challenges Of Protecting Medical Privacy In Workers' Compensation, Ani B. Satz
The Federalism Challenges Of Protecting Medical Privacy In Workers' Compensation, Ani B. Satz
Faculty Articles
This Article is the first to address the challenges of federalism in protecting medical privacy in workers’ compensation after the promulgation of the HPR and to propose legal change. The Article argues that workers’ compensation programs must align with the federal privacy protections of the HPR and proposes actions for the U.S. Department of Health and Human Services (HHS) and states to remedy departures. Part I discusses the complex relationship between the HPR and workers’ compensation. This relationship is often misunderstood by legislatures and courts, compounding the challenges of federalism in this area. Specifically, Part I addresses the HPR’s § …
Infracompetitive Privacy, Greg Day, Abbey R. Stemler
Infracompetitive Privacy, Greg Day, Abbey R. Stemler
Scholarly Works
One of the chief anticompetitive effects of modern business lies in antitrust’s blind spot. Platform-based companies (“platforms”) have innovated a business model whereby they offer consumers “free" and low-priced services in exchange for their personal information. With this data, platforms can design products, target consumers, and sell such information to third parties. The problem is that platforms can inflict greater costs on users and markets in the form of lost privacy than efficiencies generated from their low prices. Consumers, as examples, spend billions of dollars annually to remedy privacy breaches and, alarmingly, participate unwittingly in experiments designed to manipulate their …
Copyright’S Memory Hole, Jessica Silbey, Eric Goldman
Copyright’S Memory Hole, Jessica Silbey, Eric Goldman
Faculty Scholarship
There is growing interest in using copyright to protect the privacy and reputation of people depicted in copyrighted works. This pressure is driven by heightened concerns about privacy and reputation on the Internet, plus copyright’s plaintiff-favorable attributes compared to traditional privacy and reputation torts.
The Constitution authorizes copyright law because its exclusive rights benefit society by increasing our knowledge. Counterproductively, to advance privacy and reputation interests, copyright law is being misdeployed to suppress socially valuable works. This results in “memory holes” in society’s knowledge, analogous to those discussed in George Orwell’s dystopian novel 1984.
By referencing Constitutional considerations, the Article …
Discipline And Policing, Kate Levine
Discipline And Policing, Kate Levine
Faculty Publications
A prime focus of police-reform advocates is the transparency of police discipline. Indeed, transparency is one of, the most popular accountability solutions for a wide swath of policing problems. This Article examines the “transparency cure” as it applies to Police Disciplinary Records (“PDRs”). These records are part of an officer’s personnel file and contain reported wrongdoing from supervisors, Internal Affairs Bureaus, and Citizen Complaint Review Boards.
This Article argues that making PDRs public is worthy of skeptical examination. It problematizes the notion that transparency is a worthy end goal for those who desire to see police-reform in general. Transparency is …
A Secret Weapon?: Applying Privacy Doctrine To The Second Amendment, Jody L. Madeira
A Secret Weapon?: Applying Privacy Doctrine To The Second Amendment, Jody L. Madeira
Articles by Maurer Faculty
No abstract provided.
The Role Of Satellites And Smart Devices: Data Surprises And Security, Privacy, And Regulatory Challenges, Anne T. Mckenna, Amy C. Gaudion, Jenni L. Evans
The Role Of Satellites And Smart Devices: Data Surprises And Security, Privacy, And Regulatory Challenges, Anne T. Mckenna, Amy C. Gaudion, Jenni L. Evans
Faculty Scholarly Works
Strava, a popular social media platform and mobile app like Facebook but specifically designed for athletes, posts a “heatmap” with consensually-obtained details about users’ workouts and geolocation. Strava’s heatmap depicts aggregated data of user location and movement by synthesizing GPS satellite data points and movement data from users’ smart devices together with satellite imagery. In January of 2018, a 20-year-old student tweeted that Strava’s heatmap revealed U.S. forward operating bases. The tweet revealed a significant national security issue and flagged substantial privacy and civil liberty concerns.
Smart devices, software applications, and social media platforms aggregate consumer data from multiple data …
Turning Privacy Inside Out, Julie E. Cohen
Turning Privacy Inside Out, Julie E. Cohen
Georgetown Law Faculty Publications and Other Works
The problem of theorizing privacy moves on two levels, the first consisting of an inadequate conceptual vocabulary and the second consisting of an inadequate institutional grammar. Privacy rights are supposed to protect individual subjects, and so conventional ways of understanding privacy are subject-centered, but subject-centered approaches to theorizing privacy also wrestle with deeply embedded contradictions. And privacy’s most enduring institutional failure modes flow from its insistence on placing the individual and individualized control at the center. Strategies for rescuing privacy from irrelevance involve inverting both established ways of talking about privacy rights and established conventions for designing institutions to protect …
The Value Of Deviance: Understanding Contextual Privacy, Timothy Casey
The Value Of Deviance: Understanding Contextual Privacy, Timothy Casey
Faculty Scholarship
Recent decisions by the Supreme Court in Carpenter v. United States and the Illinois Supreme Court in Rosenbach v. Six Flags Entertainment Corporation signal a shift in the traditional understanding of what exactly is protected by a privacy interest. Carpenter distinguished between a police officer’s observation of a suspect’s location and a perpetual catalogue of a person’s movements obtained through cell site location information (CSLI). The pervasive and vast quantity of information from CSLI exposed a protected privacy interest. In Rosenbach, the Illinois Supreme Court found the unique and personal quality of biometric information meant that consent and disclosure requirements …
Global Platform Governance: Private Power In The Shadow Of The State, Hannah Bloch-Wehba
Global Platform Governance: Private Power In The Shadow Of The State, Hannah Bloch-Wehba
Faculty Scholarship
Online intermediaries—search engines, social media platforms, even e-commerce businesses—are increasingly required to make critical decisions about free expression, individual privacy, and property rights under domestic law. These requirements arise in contexts that include the right to be forgotten, hate speech, “terrorist” speech, and copyright and intellectual property. At the same time, these disputes about online speech are increasingly borderless. Many laws targeting online speech and privacy are explicitly extraterritorial in scope. Even when not, some courts have ruled that they have jurisdiction to enforce compliance on a global scale. And governments are also demanding that platforms remove content—on a global …
Functional Equivalence And Residual Rights Post-Carpenter: Framing A Test Consistent With Precedent And Original Meaning, Laura K. Donohue
Functional Equivalence And Residual Rights Post-Carpenter: Framing A Test Consistent With Precedent And Original Meaning, Laura K. Donohue
Georgetown Law Faculty Publications and Other Works
The Carpenter Court held that warrantless access to seven or more days of cell site location information (CSLI) constitutes a violation of the reasonable expectation of privacy that individuals have in the whole of their physical movements. But the grounds on which the Court drew a line characterize all sorts of digital records—including those at issue in Miller and Smith, belying the majority’s claim that the decision leaves third-party doctrine intact. Instead of avoiding Katz’s pitfalls, moreover, the Court emphasized voluntary assumption of risk, doubling down on the subjective nature of judicial determination. The decision will likely lead to …
Cops And Cars: How The Automobile Drove Fourth Amendment Law, Tracey Maclin
Cops And Cars: How The Automobile Drove Fourth Amendment Law, Tracey Maclin
UF Law Faculty Publications
This is an essay on Professor Sarah A. Seo’s new book, Policing the Open Road: How Cars Transformed American Freedom (Harvard Univ. Press 2019). I focus on Professor Seo’s analysis of Carroll v. United States, 267 U.S. 132 (1925) and Brinegar v. United States, 338 U.S. 160 (1949). Carroll is important not only because it was the Court’s first car case. Understanding Carroll (and Brinegar, which solidified and expanded Carroll’s holding) is essential because, nearly one hundred years later, its logic continues to direct how the modern Court resolves Fourth Amendment claims of motorists. Put simply, a majority of today’s …
Secrets Of The Deep: Defining Privacy Underwater, Annie Brett
Secrets Of The Deep: Defining Privacy Underwater, Annie Brett
UF Law Faculty Publications
The drones are coming, But not just to your neighborhood skies – to the world’s oceans. From recreational robots designed to autonomously follow divers and record video of them to low-cost, remotely operated submersibles that put ocean exploration in the hands of the general public to sophisticated military submersibles able to autonomously gather intelligence throughout the oceans, the underwater drone market is exploding. But unlike on land, this explosion has not been accompanied by similar discussion of privacy concerns. Instead, the ocean’s rapid shift away from an inaccessible operational sanctuary is one that is happening largely silently. And it is …
Gina, Big Data, And The Future Of Employee Privacy, Brad Areheart
Gina, Big Data, And The Future Of Employee Privacy, Brad Areheart
Scholarly Works
Threats to privacy abound in modern society, but individuals currently enjoy little meaningful legal protection for their privacy interests. We argue that the Genetic Information Nondiscrimination Act (GINA) offers a blueprint for preventing employers from breaching employee privacy. GINA has faced significant criticism since its enactment in 2008: commentators have dismissed the law as ill-conceived, unnecessary, and ineffective. While we concede that GINA may have failed to alleviate anxieties about medical genetic testing, we assert that it has unappreciated value as an employee-privacy statute. In the era of big data, protections for employee privacy are more pressing than protections against …
Right To Privacy, A Complicated Concept To Review, Ali Alibeigi, Abu Bakar Munir, Md Ershadul Karim
Right To Privacy, A Complicated Concept To Review, Ali Alibeigi, Abu Bakar Munir, Md Ershadul Karim
Library Philosophy and Practice (e-journal)
The Concept and definition of the privacy has been changed during the time affecting by different factors. At the same time, the boundaries of privacy may differ from one place to another affecting by the culture, religion, etc. Nonetheless, there is not a unique general accepted definition for the privacy. Privacy has been considered from different disciplines like sociology, psychology, law and philosophy. It is a multidisciplinary domain, having an easy concept but difficult to define. However, by reviewing all different viewpoints, it can be concluded that privacy is an individual tendency, wish and natural need to be away from …
Taking Data, Michael C. Pollack
Taking Data, Michael C. Pollack
Articles
Technological development has created new forms of information, altered expectations of privacy, and given law enforcement more tools to examine that information and intrude on that privacy. One crucial facet of these changes involves internet service providers (ISPs): as people expose more of their lives to their ISPs—all the websites they visit, people they communicate with, emails they send, files they store, and more—law enforcement efforts to access that data become more and more common. But scholars and policymakers alike recognize that the existing statutory frameworks governing those efforts are based on obsolete technology and strike balances that are difficult …
The Upside Of Deep Fakes, Jessica Silbey, Woodrow Hartzog
The Upside Of Deep Fakes, Jessica Silbey, Woodrow Hartzog
Faculty Scholarship
It’s bad. We know. The dawn of “deep fakes” — convincing videos and images of people doing things they never did or said — puts us all in jeopardy in several different ways. Professors Bobby Chesney and Danielle Citron have noted that now “false claims — even preposterous ones — can be peddled with unprecedented success today thanks to a combination of social media ubiquity and virality, cognitive biases, filter bubbles, and group polarization.” The scholars identify a host of harms from deep fakes, ranging from people being exploited, extorted, and sabotaged, to societal harms like the erosion of democratic …
A Skeptical View Of Information Fiduciaries, Lina M. Khan, David E. Pozen
A Skeptical View Of Information Fiduciaries, Lina M. Khan, David E. Pozen
Faculty Scholarship
The concept of “information fiduciaries” has surged to the forefront of debates on online-platform regulation. Developed by Professor Jack Balkin, the concept is meant to rebalance the relationship between ordinary individuals and the digital companies that accumulate, analyze, and sell their personal data for profit. Just as the law imposes special duties of care, confidentiality, and loyalty on doctors, lawyers, and accountants vis-à-vis their patients and clients, Balkin argues, so too should it impose special duties on corporations such as Facebook, Google, and Twitter vis-à-vis their end users. Over the past several years, this argument has garnered remarkably broad support …
The Inconsentability Of Facial Surveillance, Evan Selinger, Woodrow Hartzog
The Inconsentability Of Facial Surveillance, Evan Selinger, Woodrow Hartzog
Faculty Scholarship
Governments and companies often use consent to justify the use of facial recognition technologies for surveillance. Many proposals for regulating facial recognition technology incorporate consent rules as a way to protect those faces that are being tagged and tracked. But consent is a broken regulatory mechanism for facial surveillance. The individual risks of facial surveillance are impossibly opaque, and our collective autonomy and obscurity interests aren’t captured or served by individual decisions.
In this article, we argue that facial recognition technologies have a massive and likely fatal consent problem. We reconstruct some of Nancy Kim’s fundamental claims in Consentability: Consent …
Power, Process, And Automated Decision-Making, Ari Ezra Waldman
Power, Process, And Automated Decision-Making, Ari Ezra Waldman
Articles & Chapters
Many decisions that used to be made by humans are now made by machines. And yet, automated decision-making systems based on “big data” – powered algorithms and machine learning are just as prone to mistakes, biases, and arbitrariness as their human counterparts. The result is a technologically driven decision-making process that seems to defy interrogation, analysis, and accountability and, therefore, undermines due process. This should make algorithmic decision-making an illegitimate source of authority in a liberal democracy. This Essay argues that algorithmic decision-making is a product of the neoliberal project to undermine social values like equality, nondiscrimination, and human flourishing …
Chapter: “Health Law And Ethics”, Allison K. Hoffman, I. Glenn Cohen, William M. Sage
Chapter: “Health Law And Ethics”, Allison K. Hoffman, I. Glenn Cohen, William M. Sage
All Faculty Scholarship
Law and ethics are both essential attributes of a high-functioning health care system and powerful explainers of why the existing system is so difficult to improve. U.S. health law is not seamless; rather, it derives from multiple sources and is based on various theories that may be in tension with one another. There are state laws and federal laws, laws setting standards and laws providing funding, laws reinforcing professional prerogatives, laws furthering social goals, and laws promoting market competition. Complying with law is important, but health professionals also should understand that the legal and ethical constraints under which health systems …
The Left's Law-And-Order Agenda, Aya Gruber
Recording As Heckling, Scott Skinner-Thompson
Recording As Heckling, Scott Skinner-Thompson
Publications
A growing body of authority recognizes that citizen recording of police officers and public space is protected by the First Amendment. But the judicial and scholarly momentum behind the emerging “right to record” fails to fully incorporate recording’s cost to another important right that also furthers First Amendment principles: the right to privacy.
This Article helps fill that gap by comprehensively analyzing the First Amendment interests of both the right to record and the right to privacy in public while highlighting the role of technology in altering the First Amendment landscape. Recording information can be critical to future speech and, …
Byrd V United States: Unauthorized Drivers Of Rental Cars Have Fourth Amendment Rights? Not As Evident As It Seems, Tracey Maclin
Byrd V United States: Unauthorized Drivers Of Rental Cars Have Fourth Amendment Rights? Not As Evident As It Seems, Tracey Maclin
Faculty Scholarship
No discerning student of the Supreme Court would contend that Justice Anthony Kennedy broadly interpreted the Fourth Amendment during his thirty years on the Court. His majority opinions in Maryland v. King, Drayton v. United States and his willingness to join the three key sections of Justice Scalia’s opinion in Hudson v. Maryland, which held that suppression is never a remedy for knock-and-announce violations, are just a few examples of Justice Kennedy’s narrow view of the Fourth Amendment.
In light of his previous votes in search and seizure cases, surprisingly Justice Kennedy, in what would be his final Fourth Amendment …
The Pathologies Of Digital Consent, Neil M. Richards, Woodrow Hartzog
The Pathologies Of Digital Consent, Neil M. Richards, Woodrow Hartzog
Faculty Scholarship
Consent permeates both our law and our lives — especially in the digital context. Consent is the foundation of the relationships we have with search engines, social networks, commercial web sites, and any one of the dozens of other digitally mediated businesses we interact with regularly. We are frequently asked to consent to terms of service, privacy notices, the use of cookies, and so many other commercial practices. Consent is important, but it’s possible to have too much of a good thing. As a number of scholars have documented, while consent models permeate the digital consumer landscape, the practical conditions …