Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 16 of 16

Full-Text Articles in Law

"Revenge Porn" Reform: A View From The Front Lines, Mary Anne Franks Jan 2017

"Revenge Porn" Reform: A View From The Front Lines, Mary Anne Franks

Articles

The legal and social landscape of "revenge porn" has changed dramatically in the last few years. Before 2013, only three states criminalized the unauthorized disclosure of sexually explicit images of adults and few people had ever heard the ternm "revenge porn." As of July 2017, thirty-eight states and Washington, D.C. had criminalized the conduct; federal criminal legislation on the issue had been introduced in Congress; Google, Facebook, and Twitter had banned nonconsensual pornography from their platforms; and the term "revenge porn" had been added to the Merriam- Webster Dictionary. I have had the privilege of playing a role in ...


Lessons Learned Too Well: Anonymity In A Time Of Surveillance, A. Michael Froomkin Jan 2017

Lessons Learned Too Well: Anonymity In A Time Of Surveillance, A. Michael Froomkin

Articles

It is no longer reasonable to assume that electronic communications can be kept private from governments or private-sector actors. In theory, encryption can protect the content of such communications, and anonymity can protect the communicator's identity. But online anonymity-one of the two most important tools that protect online communicative freedom-is under practical and legal attack all over the world. Choke-point regulation, online identification requirements, and data-retention regulations combine to make anonymity very difficult as a practical matter and, in many countries, illegal. Moreover, key internet intermediaries further stifle anonymity by requiring users to disclose their real names.

This Article ...


Democratic Surveillance, Mary Anne Franks Jan 2017

Democratic Surveillance, Mary Anne Franks

Articles

No abstract provided.


From Anonymity To Identification, A. Michael Froomkin Jan 2015

From Anonymity To Identification, A. Michael Froomkin

Articles

This article examines whether anonymity online has a future. In the early days of the Internet, strong cryptography, anonymous remailers, and a relative lack of surveillance created an environment conducive to anonymous communication. Today, the outlook for online anonymity is poor. Several forces combine against it: ideologies that hold that anonymity is dangerous, or that identifying evil-doers is more important than ensuring a safe mechanism for unpopular speech; the profitability of identification in commerce; government surveillance; the influence of intellectual property interests and in requiring hardware and other tools that enforce identification; and the law at both national and supranational ...


Regulating Mass Surveillance As Privacy Pollution: Learning From Environmental Impact Statements, A. Michael Froomkin Jan 2015

Regulating Mass Surveillance As Privacy Pollution: Learning From Environmental Impact Statements, A. Michael Froomkin

Articles

Encroachments on privacy through mass surveillance greatly resemble the pollution crisis in that they can be understood as imposing an externality on the surveilled. This Article argues that this resemblance also suggests a solution: requiring those conducting mass surveillance in and through public spaces to disclose their plans publicly via an updated form of environmental impact statement, thus requiring an impact analysis and triggering a more informed public conversation about privacy. The Article first explains how mass surveillance is polluting public privacy and surveys the limited and inadequate doctrinal tools available to respond to mass surveillance technologies. Then, it provides ...


Self-Defense Against Robots And Drones, A. Michael Froomkin, P. Zak Colangelo Jan 2015

Self-Defense Against Robots And Drones, A. Michael Froomkin, P. Zak Colangelo

Articles

Robots can pose-or can appear to pose-a threat to life, property, and privacy. May a landowner legally shoot down a trespassing drone? Can she hold a trespassing autonomous car as security against damage done or further torts? Is the fear that a drone may be operated by a paparazzo or Peeping Tom sufficient grounds to disable or interfere with it? How hard may you shove if the office robot rolls over your foot? This Article addresses all those issues and one more. what rules and standards we could put into place to make the resolution of those questions easier and ...


The Fourth Amendment In The Information Age, Ricardo J. Bascuas Jan 2013

The Fourth Amendment In The Information Age, Ricardo J. Bascuas

Articles

In 2013, the Supreme Court tacitly conceded that the expectations-of-privacy test used since 1967 to assess claims of Fourth Amendment violations was inadequate. It asserted that the previous property-based test for Fourth Amendment violations had never despite widespread agreement to the contrary been overruled. The Court compounded its artfulness by applying a new, significantly weaker trespass test that, like the expectations-of-privacy test, enjoys no legal pedigree. This new trespass test, which is to be applied together with the expectations-of-privacy test, suffers from the same defect as the test it purportedly supplements. It does not require the government to respect private ...


"Pets Must Be On A Leash": How U.S. Law (And Industry Practice) Often Undermines And Even Forbids Valuable Privacy Enhancing Technology, A. Michael Froomkin Jan 2013

"Pets Must Be On A Leash": How U.S. Law (And Industry Practice) Often Undermines And Even Forbids Valuable Privacy Enhancing Technology, A. Michael Froomkin

Articles

No abstract provided.


Hard To Believe: The High Cost Of A Biometric Identity Card, A. Michael Froomkin, Jonathan Weinberg Feb 2012

Hard To Believe: The High Cost Of A Biometric Identity Card, A. Michael Froomkin, Jonathan Weinberg

Short Works

No abstract provided.


Creating A Viral Federal Privacy Standard, A. Michael Froomkin Jan 2007

Creating A Viral Federal Privacy Standard, A. Michael Froomkin

Articles

No abstract provided.


The Death Of Privacy?, A. Michael Froomkin Jan 2000

The Death Of Privacy?, A. Michael Froomkin

Articles

The rapid deployment of privacy-destroying technologies by governments and businesses threatens to make informational privacy obsolete. The first part of this article describes a range of current technologies to which the law has yet to respond effectively. These include: routine collection of transactional data, growing automated surveillance in public places, deployment of facial recognition technology and other biometrics, cell-phone tracking, vehicle tracking, satellite monitoring, workplace surveillance, Internet tracking from cookies to "clicktrails", hardware-based identifiers, intellectual property-protecting "snitchware," and sense-enhanced searches that allow observers to see through everything from walls to clothes. The cumulative and reinforcing effect of these technologies may ...


The Constitution And Encryption Regulation: Do We Need A "New Privacy"?, A. Michael Froomkin Jan 1999

The Constitution And Encryption Regulation: Do We Need A "New Privacy"?, A. Michael Froomkin

Articles

No abstract provided.


Flood Control On The Information Ocean: Living With Anonymity, Digital Cash, And Distributed Databases, A. Michael Froomkin Jan 1996

Flood Control On The Information Ocean: Living With Anonymity, Digital Cash, And Distributed Databases, A. Michael Froomkin

Articles

No abstract provided.


The Essential Role Of Trusted Third Parties In Electronic Commerce, A. Michael Froomkin Jan 1996

The Essential Role Of Trusted Third Parties In Electronic Commerce, A. Michael Froomkin

Articles

No abstract provided.


It Came From Planet Clipper: The Battle Over Cryptographic Key "Escrow", A. Michael Froomkin Jan 1996

It Came From Planet Clipper: The Battle Over Cryptographic Key "Escrow", A. Michael Froomkin

Articles

No abstract provided.


The Metaphor Is The Key: Cryptography, The Clipper Chip, And The Constitution, A. Michael Froomkin Jan 1995

The Metaphor Is The Key: Cryptography, The Clipper Chip, And The Constitution, A. Michael Froomkin

Articles

No abstract provided.