Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

2013

Privacy Law

Institution
Keyword
Publication

Articles 1 - 30 of 51

Full-Text Articles in Law

Judge Pauley’S Opinion In Clapper: Reset Button For Bulk Collection Debate?, Peter Margulies Dec 2013

Judge Pauley’S Opinion In Clapper: Reset Button For Bulk Collection Debate?, Peter Margulies

Law Faculty Scholarship

This article was originally found in Lawfare, available here: https://www.lawfareblog.com/judge-pauleys-opinion-clapper-reset-button-bulk-collection-debate


Desperately Seeking Substance (Not Slogans) In Review Group Report On Nsa Surveillance, Peter Margulies Dec 2013

Desperately Seeking Substance (Not Slogans) In Review Group Report On Nsa Surveillance, Peter Margulies

Law Faculty Scholarship

No abstract provided.


From Sex For Pleasure To Sex For Parenthood: How The Law Manufactures Mothers, Beth A. Burkstrand-Reid Dec 2013

From Sex For Pleasure To Sex For Parenthood: How The Law Manufactures Mothers, Beth A. Burkstrand-Reid

Nebraska College of Law: Faculty Publications

As soon as sperm enter a woman, so do law and politics, or so the decades-long disputes surrounding abortion suggest. Now, however, renewed debates surrounding contraceptives show legal and political interference with women’s sexual and reproductive autonomy may actually precede the sperm. This Article argues that, increasingly, women even thinking about having sex are defined socially and legally as “mothers.” Via this broad definition of who is a “mother,” the State extends its reach into women’s decision-making throughout their reproductive lifetime.

This Article argues that the State simultaneously devalues women’s choices to have sex for pleasure, which this Article calls …


From Privacy To Publicity: The Tort Of Appropriation In The Age Of Mass Consumption, Samantha Barbas Dec 2013

From Privacy To Publicity: The Tort Of Appropriation In The Age Of Mass Consumption, Samantha Barbas

Journal Articles

No abstract provided.


The Right To Quantitative Privacy, Danielle K. Citron, David Gray Nov 2013

The Right To Quantitative Privacy, Danielle K. Citron, David Gray

Faculty Scholarship

We are at the cusp of a historic shift in our conceptions of the Fourth Amendment driven by dramatic advances in surveillance technology. Governments and their private sector agents continue to invest billions of dollars in massive data-mining projects, advanced analytics, fusion centers, and aerial drones, all without serious consideration of the constitutional issues that these technologies raise. In United States v. Jones, the Supreme Court signaled an end to its silent acquiescence in this expanding surveillance state. In that case, five justices signed concurring opinions defending a revolutionary proposition: that citizens have Fourth Amendment interests in substantial quantities of …


The Singapore Personal Data Protection Act And An Assessment Of Future Trends In Data Privacy, Warren B. Chik Oct 2013

The Singapore Personal Data Protection Act And An Assessment Of Future Trends In Data Privacy, Warren B. Chik

Research Collection Yong Pung How School Of Law

In the first part of this paper, I will present and explain the Singapore Personal Data Protection Act (“PDPA”) in the context of legislative developments in the Asian region and against the well-established international baseline privacy standards. In the course of the above evaluation, reference will be made to the national laws and policy on data privacy prior to the enactment of the PDPA as well as current social and market practices in relation to personal data. In the second part of this paper, I will decipher and assess the future trends in data privacy reform and the future development …


Where's Waldo?: Geolocation, Mobile Apps, And Privacy, Lori Andrews Jul 2013

Where's Waldo?: Geolocation, Mobile Apps, And Privacy, Lori Andrews

All Faculty Scholarship

No abstract provided.


Fighting Cyber-Crime After United States V. Jones, Danielle K. Citron, David Gray, Liz Rinehart Jul 2013

Fighting Cyber-Crime After United States V. Jones, Danielle K. Citron, David Gray, Liz Rinehart

Faculty Scholarship

In a landmark non-decision last term, five Justices of the United States Supreme Court would have held that citizens possess a Fourth Amendment right to expect that certain quantities of information about them will remain private, even if they have no such expectations with respect to any of the information or data constituting that whole. This quantitative approach to evaluating and protecting Fourth Amendment rights is certainly novel and raises serious conceptual, doctrinal, and practical challenges. In other works, we have met these challenges by engaging in a careful analysis of this “mosaic theory” and by proposing that courts focus …


A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, Danielle K. Citron, David Gray Apr 2013

A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, Danielle K. Citron, David Gray

Faculty Scholarship

On January 23, 2012, the Supreme Court issued a landmark non-decision in United States v. Jones. In that case, officers used a GPS-enabled device to track a suspect’s public movements for four weeks, amassing a considerable amount of data in the process. Although ultimately resolved on narrow grounds, five Justices joined concurring opinions in Jones expressing sympathy for some version of the “mosaic theory” of Fourth Amendment privacy. This theory holds that we maintain reasonable expectations of privacy in certain quantities of information even if we do not have such expectations in the constituent parts. This Article examines and explores …


Privacy Laws And Privacy Levers: Online Surveillance Versus Economic Development In The People's Republic Of China, Ann Bartow Jan 2013

Privacy Laws And Privacy Levers: Online Surveillance Versus Economic Development In The People's Republic Of China, Ann Bartow

Law Faculty Scholarship

This essay describes and contextualizes the ongoing efforts by the Communist Party of China (CPC) to reconcile two dramatically competing interests: the desire to extensively monitor the communications of its citizenry, and a burning ambition to further develop its banking and financial industries, its high tech innovation capabilities, and its overall share of the “knowledge economy.” Monitoring and censoring communications, especially via “one to many” social networking platforms, is viewed as essential for the prevention of mass anti-Party political activities ranging from peaceful civil disobedience to armed insurrection and for the protection of the reputations of individual Party leaders. Mobile …


Striking A Balance Between Privacy And Online Commerce, Mark Bartholomew Jan 2013

Striking A Balance Between Privacy And Online Commerce, Mark Bartholomew

Journal Articles

It is becoming commonplace to note that privacy and online commerce are on a collision course. Corporate entities archive and monetize more and more personal information. Citizens increasingly resent the intrusive nature of such data collection and use. Just noticing this conflict, however, tells us little. In "Informing and Reforming the Marketplace of Ideas: The Public-Private Model for Data Production and the First Amendment" Professor Shubha Ghosh not only notes the tension between the costs and benefits of data commercialization, but suggests three normative perspectives for balancing privacy and commercial speech. This is valuable because without a rich theoretical framework …


Why Library Cards Offer More Privacy Rights Than Proof Of Citizenship: Librarian Ethics And Freedom Of Information Act Requestor Policies, Sarah Lamdan Jan 2013

Why Library Cards Offer More Privacy Rights Than Proof Of Citizenship: Librarian Ethics And Freedom Of Information Act Requestor Policies, Sarah Lamdan

Publications and Research

No abstract provided.


The Field In Ireland In 2014, Tom Dunne Jan 2013

The Field In Ireland In 2014, Tom Dunne

Articles

Repossessions are an important part of recovery in the housing market


From Lord Coke To Internet Privacy: The Past, Present, And Future Of Electronic Contracting, Juliet M. Moringiello, William L. Reynolds Jan 2013

From Lord Coke To Internet Privacy: The Past, Present, And Future Of Electronic Contracting, Juliet M. Moringiello, William L. Reynolds

Faculty Scholarship

Contract law is applied countless times every day, in every manner of transaction large or small. Rarely are those transactions reflected in an agreement produced by a lawyer; quite the contrary, almost all contracts are concluded by persons with no legal training and often by persons who do not have a great deal of education. In recent years, moreover, technological advances have provided novel methods of creating contracts. Those facts present practitioners of contract law with an interesting conundrum: The law must be sensible and stable if parties are to have confidence in the security of their arrangements; but contract …


Addressing The Harm Of Total Surveillance: A Reply To Professor Neil Richards, Danielle Keats Citron, David C. Gray Jan 2013

Addressing The Harm Of Total Surveillance: A Reply To Professor Neil Richards, Danielle Keats Citron, David C. Gray

Faculty Scholarship

In his insightful article The Dangers of Surveillance, 126 HARV. L. REV. 1934 (2013), Neil Richards offers a framework for evaluating the implications of government surveillance programs that is centered on protecting "intellectual privacy." Although we share his interest in recognizing and protecting privacy as a condition of personal and intellectual development, we worry in this essay that, as an organizing principle for policy, "intellectual privacy" is too narrow and politically fraught. Drawing on other work, we therefore recommend that judges, legislators, and executives focus instead on limiting the potential of surveillance technologies to effect programs of broad and indiscriminate …


A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, David C. Gray, Danielle Keats Citron Jan 2013

A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, David C. Gray, Danielle Keats Citron

Faculty Scholarship

On January 23, 2012, the Supreme Court issued a landmark non-decision in United States v. Jones. In that case, officers used a GPS-enabled device to track a suspect’s public movements for four weeks, amassing a considerable amount of data in the process. Although ultimately resolved on narrow grounds, five Justices joined concurring opinions in Jones expressing sympathy for some version of the “mosaic theory” of Fourth Amendment privacy. This theory holds that we maintain reasonable expectations of privacy in certain quantities of information even if we do not have such expectations in the constituent parts. This Article examines and …


Privacy, Antitrust, And Power, Frank Pasquale Jan 2013

Privacy, Antitrust, And Power, Frank Pasquale

Faculty Scholarship

When a dominant internet service collects information about its users, the situation is so far from the usual arm’s-length market transaction that neoclassical economic analysis is misleading. “Lack of surveillance” is not a product that individuals have varying preferences for and purchase accordingly. Rather, surveillance is an inevitable concomitant of life online. We need to tame the power that surveillance entails, rather than continuing to pursue illusory, surveillance-free alternatives on the platform level.

To the extent a company creates profiles of individuals and collects data on them, a third party ought to be collecting reports from the company on how …


The Future Of Hipaa In The Cloud, Frank Pasquale, Tara Adams Ragone Jan 2013

The Future Of Hipaa In The Cloud, Frank Pasquale, Tara Adams Ragone

Faculty Scholarship

This white paper examines how cloud computing generates new privacy challenges for both healthcare providers and patients, and how American health privacy laws may be interpreted or amended to address these challenges. Given the current implementation of Meaningful Use rules for health information technology and the Omnibus HIPAA Rule in health care generally, the stage is now set for a distinctive law of “health information” to emerge. HIPAA has come of age of late, with more aggressive enforcement efforts targeting wayward healthcare providers and entities. Nevertheless, more needs to be done to assure that health privacy and all the values …


The Right To Quantitative Privacy, David C. Gray, Danielle Keats Citron Jan 2013

The Right To Quantitative Privacy, David C. Gray, Danielle Keats Citron

Faculty Scholarship

We are at the cusp of a historic shift in our conceptions of the Fourth Amendment driven by dramatic advances in surveillance technology. Governments and their private sector agents continue to invest billions of dollars in massive data-mining projects, advanced analytics, fusion centers, and aerial drones, all without serious consideration of the constitutional issues that these technologies raise. In United States v. Jones, the Supreme Court signaled an end to its silent acquiescence in this expanding surveillance state. In that case, five justices signed concurring opinions defending a revolutionary proposition: that citizens have Fourth Amendment interests in substantial quantities of …


Rehnquist And Panvasive Searches, Christopher Slobogin Jan 2013

Rehnquist And Panvasive Searches, Christopher Slobogin

Vanderbilt Law School Faculty Publications

In the history of the Supreme Court, William Rehnquist may have been the least friendly justice toward the view that the Fourth Amendment should be read expansively. Even he, however, might have interpreted the amendment to place more restrictions on modern law enforcement techniques than current caselaw does. Relying on a 1974 article authored by Rehnquist, this essay, written for a symposium on Rehnquist and the Fourth Amendment, describes his views on the types of requirements the Fourth Amendment imposes on the police, how decriminalization can protect privacy, and most importantly, why Rehnquist might have been willing to regulate surveillance …


Patient Awareness And Approval For An Opt-Out Genomic Biorepository, Ellen Wright Clayton, Kyle B. Brothers, Matthew J. Westbrook, M. Francis Wright, John A. Myers, Daniel R. Morrison, Jennifer L. Madison, Jill M. Pulley Jan 2013

Patient Awareness And Approval For An Opt-Out Genomic Biorepository, Ellen Wright Clayton, Kyle B. Brothers, Matthew J. Westbrook, M. Francis Wright, John A. Myers, Daniel R. Morrison, Jennifer L. Madison, Jill M. Pulley

Vanderbilt Law School Faculty Publications

Aim: In this study, we sought to assess patient awareness and perceptions of an opt-out biorepository. Materials & methods: We conducted exit interviews with adult patients and parents of pediatric patients having their blood drawn as part of their clinical care at Vanderbilt University Medical Center (TN, USA). Results: 32.9% of all patients and parents of pediatric patients report having heard of the opt-out biorepository, while 92.4% approve of this research effort based on a brief description. Awareness that leftover blood could be used for research increased among adult patients during the study period, from 34.3 to 50.0%. Conclusion: These …


Community Control Over Camera Surveillance: A Response To Bennett Capers's "Crime, Surveillance, And Communities", Christopher Slobogin Jan 2013

Community Control Over Camera Surveillance: A Response To Bennett Capers's "Crime, Surveillance, And Communities", Christopher Slobogin

Vanderbilt Law School Faculty Publications

Professor Capers's article helps stimulate thinking about the way in which community views and individual rights interact. In my view, where police propose to conduct surveillance of groups, as occurs with camera surveillance (including the newly developing drone camera systems)', the affected group should be heavily involved in the authorization process. If the surveillance is authorized, care must be taken to ensure that all members of the group are equally affected by it unless and until individualized suspicion, proportionate to the intrusion, develops. That formula ensures that the interests of both the collective and the individual are protected.


Intellectual Property And Public Health – A White Paper, Ryan G. Vacca, James Ming Chen, Jay Dratler Jr., Thomas Folsom, Timothy S. Hall, Yaniv Heled, Frank A. Pasquale Iii, Elizabeth A. Reilly, Jeffrey Samuels, Katherine J. Strandburg, Kara W. Swanson, Andrew W. Torrance, Katharine A. Van Tassel Jan 2013

Intellectual Property And Public Health – A White Paper, Ryan G. Vacca, James Ming Chen, Jay Dratler Jr., Thomas Folsom, Timothy S. Hall, Yaniv Heled, Frank A. Pasquale Iii, Elizabeth A. Reilly, Jeffrey Samuels, Katherine J. Strandburg, Kara W. Swanson, Andrew W. Torrance, Katharine A. Van Tassel

Law Faculty Scholarship

On October 26, 2012, the University of Akron School of Law’s Center for Intellectual Property and Technology hosted its Sixth Annual IP Scholars Forum. In attendance were thirteen legal scholars with expertise and an interest in IP and public health who met to discuss problems and potential solutions at the intersection of these fields. This report summarizes this discussion by describing the problems raised, areas of agreement and disagreement between the participants, suggestions and solutions made by participants and the subsequent evaluations of these suggestions and solutions. Led by the moderator, participants at the Forum focused generally on three broad …


Petitions, Privacy, And Political Obscurity, Rebecca Green Jan 2013

Petitions, Privacy, And Political Obscurity, Rebecca Green

Faculty Publications

People who sign petitions must accept disclosure of their political views. This conclusion rests on the seemingly uncontroversial (if circular) premise that petition signing is a public activity. Courts have thus far shown little sympathy for individuals who take a public stand on an issue by signing a petition and then assert privacy claims after the fact. Democracy, after all, takes courage, as Justice Scalia wrote in the petitioning disclosure case Doe v. Reed. But signing a petition today brings consequences beyond public criticism. The real threat of disclosure for modern petition signers is not tangible harassment, but the loss …


"Pets Must Be On A Leash": How U.S. Law (And Industry Practice) Often Undermines And Even Forbids Valuable Privacy Enhancing Technology, A. Michael Froomkin Jan 2013

"Pets Must Be On A Leash": How U.S. Law (And Industry Practice) Often Undermines And Even Forbids Valuable Privacy Enhancing Technology, A. Michael Froomkin

Articles

No abstract provided.


Global Governance In The Information Age: The Terrorist Finance Tracking Program, Hannah Bloch-Wehba Jan 2013

Global Governance In The Information Age: The Terrorist Finance Tracking Program, Hannah Bloch-Wehba

Faculty Scholarship

Europe has long been deemed "more protective" of privacy than the United States. In the context of transatlantic cooperation in the war on terrorism, divergences in privacy law and policy have become ever more apparent. As has always been the case, the same technologies that pose new and vital privacy issues with regard to personal information and private data are those that are important sources for government actors, including law enforcement and intelligence agencies. Despite the increasing reliance by national agencies on information flowing from other nations, regulation of information transfer, processing and sharing has been achieved largely outside of …


A Private Underworld: The Naked Body In Law And Society, Lawrence M. Friedman, Joanna L. Grossman Jan 2013

A Private Underworld: The Naked Body In Law And Society, Lawrence M. Friedman, Joanna L. Grossman

Faculty Journal Articles and Book Chapters

In general, the literature on privacy stresses, quite naturally, our right to keep things private, or to make our own decisions. The individual, the citizen, is the center of gravity. There is a great deal of material on the limits of privacy, on threats to privacy, and the like. In this Article, the authors want to discuss what one might call mandatory privacy: those aspects of life that we are required to keep secret, hidden, or private, the things that we must keep private, whether we want to or not. This is a subject that has been mostly, though not …


The Business Of Privacy, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson Jan 2013

The Business Of Privacy, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson

Articles by Maurer Faculty

No abstract provided.


Face-To-Data -- Another Developing Privacy Threat?, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson Jan 2013

Face-To-Data -- Another Developing Privacy Threat?, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson

Articles by Maurer Faculty

No abstract provided.


The Extraterritoriality Of Data Privacy Laws -- An Explosive Issue Yet To Detonate, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson Jan 2013

The Extraterritoriality Of Data Privacy Laws -- An Explosive Issue Yet To Detonate, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson

Articles by Maurer Faculty

No abstract provided.