Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Boston University School of Law (8)
- University of Maryland Francis King Carey School of Law (7)
- Maurer School of Law: Indiana University (5)
- University of Pennsylvania Carey Law School (3)
- Vanderbilt University Law School (3)
-
- Roger Williams University (2)
- Southern Methodist University (2)
- University at Buffalo School of Law (2)
- University of Miami Law School (2)
- University of New Hampshire (2)
- University of Washington School of Law (2)
- Chicago-Kent College of Law (1)
- City University of New York (CUNY) (1)
- Duke Law (1)
- Fordham Law School (1)
- Georgetown University Law Center (1)
- New York Law School (1)
- Seattle University School of Law (1)
- Singapore Management University (1)
- Technological University Dublin (1)
- Texas A&M University School of Law (1)
- University of Colorado Law School (1)
- University of Nebraska - Lincoln (1)
- William & Mary Law School (1)
- Keyword
-
- Privacy (21)
- Fourth Amendment (8)
- Surveillance (6)
- Data privacy (5)
- Data protection (5)
-
- United States v. Jones (5)
- Internet (3)
- Law (3)
- Privacy law (3)
- Social media (3)
- Big data (2)
- Cloud computing (2)
- Contracts (2)
- Cybersecurity (2)
- Data (2)
- FISA (2)
- First Amendment (2)
- International privacy law (2)
- NSA (2)
- Obscurity (2)
- Personal data (2)
- Security (2)
- Abortion rights (1)
- Agreements (1)
- Alternatives (1)
- Anonymity (1)
- Antitrust (1)
- Biometric identification (1)
- Biometry (1)
- Biorepository (1)
- Publication
-
- Faculty Scholarship (18)
- Articles (5)
- Articles by Maurer Faculty (5)
- All Faculty Scholarship (4)
- Law Faculty Scholarship (4)
-
- Vanderbilt Law School Faculty Publications (3)
- Faculty Journal Articles and Book Chapters (2)
- Journal Articles (2)
- Articles & Chapters (1)
- Faculty Publications (1)
- Georgetown Law Faculty Publications and Other Works (1)
- Nebraska College of Law: Faculty Publications (1)
- Publications (1)
- Publications and Research (1)
- Research Collection Yong Pung How School Of Law (1)
- Seattle University Law Review SUpra (1)
Articles 1 - 30 of 51
Full-Text Articles in Law
Judge Pauley’S Opinion In Clapper: Reset Button For Bulk Collection Debate?, Peter Margulies
Judge Pauley’S Opinion In Clapper: Reset Button For Bulk Collection Debate?, Peter Margulies
Law Faculty Scholarship
This article was originally found in Lawfare, available here: https://www.lawfareblog.com/judge-pauleys-opinion-clapper-reset-button-bulk-collection-debate
Desperately Seeking Substance (Not Slogans) In Review Group Report On Nsa Surveillance, Peter Margulies
Desperately Seeking Substance (Not Slogans) In Review Group Report On Nsa Surveillance, Peter Margulies
Law Faculty Scholarship
No abstract provided.
From Sex For Pleasure To Sex For Parenthood: How The Law Manufactures Mothers, Beth A. Burkstrand-Reid
From Sex For Pleasure To Sex For Parenthood: How The Law Manufactures Mothers, Beth A. Burkstrand-Reid
Nebraska College of Law: Faculty Publications
As soon as sperm enter a woman, so do law and politics, or so the decades-long disputes surrounding abortion suggest. Now, however, renewed debates surrounding contraceptives show legal and political interference with women’s sexual and reproductive autonomy may actually precede the sperm. This Article argues that, increasingly, women even thinking about having sex are defined socially and legally as “mothers.” Via this broad definition of who is a “mother,” the State extends its reach into women’s decision-making throughout their reproductive lifetime.
This Article argues that the State simultaneously devalues women’s choices to have sex for pleasure, which this Article calls …
From Privacy To Publicity: The Tort Of Appropriation In The Age Of Mass Consumption, Samantha Barbas
From Privacy To Publicity: The Tort Of Appropriation In The Age Of Mass Consumption, Samantha Barbas
Journal Articles
No abstract provided.
The Right To Quantitative Privacy, Danielle K. Citron, David Gray
The Right To Quantitative Privacy, Danielle K. Citron, David Gray
Faculty Scholarship
We are at the cusp of a historic shift in our conceptions of the Fourth Amendment driven by dramatic advances in surveillance technology. Governments and their private sector agents continue to invest billions of dollars in massive data-mining projects, advanced analytics, fusion centers, and aerial drones, all without serious consideration of the constitutional issues that these technologies raise. In United States v. Jones, the Supreme Court signaled an end to its silent acquiescence in this expanding surveillance state. In that case, five justices signed concurring opinions defending a revolutionary proposition: that citizens have Fourth Amendment interests in substantial quantities of …
The Singapore Personal Data Protection Act And An Assessment Of Future Trends In Data Privacy, Warren B. Chik
The Singapore Personal Data Protection Act And An Assessment Of Future Trends In Data Privacy, Warren B. Chik
Research Collection Yong Pung How School Of Law
In the first part of this paper, I will present and explain the Singapore Personal Data Protection Act (“PDPA”) in the context of legislative developments in the Asian region and against the well-established international baseline privacy standards. In the course of the above evaluation, reference will be made to the national laws and policy on data privacy prior to the enactment of the PDPA as well as current social and market practices in relation to personal data. In the second part of this paper, I will decipher and assess the future trends in data privacy reform and the future development …
Where's Waldo?: Geolocation, Mobile Apps, And Privacy, Lori Andrews
Where's Waldo?: Geolocation, Mobile Apps, And Privacy, Lori Andrews
All Faculty Scholarship
No abstract provided.
Fighting Cyber-Crime After United States V. Jones, Danielle K. Citron, David Gray, Liz Rinehart
Fighting Cyber-Crime After United States V. Jones, Danielle K. Citron, David Gray, Liz Rinehart
Faculty Scholarship
In a landmark non-decision last term, five Justices of the United States Supreme Court would have held that citizens possess a Fourth Amendment right to expect that certain quantities of information about them will remain private, even if they have no such expectations with respect to any of the information or data constituting that whole. This quantitative approach to evaluating and protecting Fourth Amendment rights is certainly novel and raises serious conceptual, doctrinal, and practical challenges. In other works, we have met these challenges by engaging in a careful analysis of this “mosaic theory” and by proposing that courts focus …
A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, Danielle K. Citron, David Gray
A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, Danielle K. Citron, David Gray
Faculty Scholarship
On January 23, 2012, the Supreme Court issued a landmark non-decision in United States v. Jones. In that case, officers used a GPS-enabled device to track a suspect’s public movements for four weeks, amassing a considerable amount of data in the process. Although ultimately resolved on narrow grounds, five Justices joined concurring opinions in Jones expressing sympathy for some version of the “mosaic theory” of Fourth Amendment privacy. This theory holds that we maintain reasonable expectations of privacy in certain quantities of information even if we do not have such expectations in the constituent parts. This Article examines and explores …
Privacy Laws And Privacy Levers: Online Surveillance Versus Economic Development In The People's Republic Of China, Ann Bartow
Law Faculty Scholarship
This essay describes and contextualizes the ongoing efforts by the Communist Party of China (CPC) to reconcile two dramatically competing interests: the desire to extensively monitor the communications of its citizenry, and a burning ambition to further develop its banking and financial industries, its high tech innovation capabilities, and its overall share of the “knowledge economy.” Monitoring and censoring communications, especially via “one to many” social networking platforms, is viewed as essential for the prevention of mass anti-Party political activities ranging from peaceful civil disobedience to armed insurrection and for the protection of the reputations of individual Party leaders. Mobile …
Striking A Balance Between Privacy And Online Commerce, Mark Bartholomew
Striking A Balance Between Privacy And Online Commerce, Mark Bartholomew
Journal Articles
It is becoming commonplace to note that privacy and online commerce are on a collision course. Corporate entities archive and monetize more and more personal information. Citizens increasingly resent the intrusive nature of such data collection and use. Just noticing this conflict, however, tells us little. In "Informing and Reforming the Marketplace of Ideas: The Public-Private Model for Data Production and the First Amendment" Professor Shubha Ghosh not only notes the tension between the costs and benefits of data commercialization, but suggests three normative perspectives for balancing privacy and commercial speech. This is valuable because without a rich theoretical framework …
Why Library Cards Offer More Privacy Rights Than Proof Of Citizenship: Librarian Ethics And Freedom Of Information Act Requestor Policies, Sarah Lamdan
Publications and Research
No abstract provided.
The Field In Ireland In 2014, Tom Dunne
The Field In Ireland In 2014, Tom Dunne
Articles
Repossessions are an important part of recovery in the housing market
From Lord Coke To Internet Privacy: The Past, Present, And Future Of Electronic Contracting, Juliet M. Moringiello, William L. Reynolds
From Lord Coke To Internet Privacy: The Past, Present, And Future Of Electronic Contracting, Juliet M. Moringiello, William L. Reynolds
Faculty Scholarship
Contract law is applied countless times every day, in every manner of transaction large or small. Rarely are those transactions reflected in an agreement produced by a lawyer; quite the contrary, almost all contracts are concluded by persons with no legal training and often by persons who do not have a great deal of education. In recent years, moreover, technological advances have provided novel methods of creating contracts. Those facts present practitioners of contract law with an interesting conundrum: The law must be sensible and stable if parties are to have confidence in the security of their arrangements; but contract …
Addressing The Harm Of Total Surveillance: A Reply To Professor Neil Richards, Danielle Keats Citron, David C. Gray
Addressing The Harm Of Total Surveillance: A Reply To Professor Neil Richards, Danielle Keats Citron, David C. Gray
Faculty Scholarship
In his insightful article The Dangers of Surveillance, 126 HARV. L. REV. 1934 (2013), Neil Richards offers a framework for evaluating the implications of government surveillance programs that is centered on protecting "intellectual privacy." Although we share his interest in recognizing and protecting privacy as a condition of personal and intellectual development, we worry in this essay that, as an organizing principle for policy, "intellectual privacy" is too narrow and politically fraught. Drawing on other work, we therefore recommend that judges, legislators, and executives focus instead on limiting the potential of surveillance technologies to effect programs of broad and indiscriminate …
A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, David C. Gray, Danielle Keats Citron
A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, David C. Gray, Danielle Keats Citron
Faculty Scholarship
On January 23, 2012, the Supreme Court issued a landmark non-decision in United States v. Jones. In that case, officers used a GPS-enabled device to track a suspect’s public movements for four weeks, amassing a considerable amount of data in the process. Although ultimately resolved on narrow grounds, five Justices joined concurring opinions in Jones expressing sympathy for some version of the “mosaic theory” of Fourth Amendment privacy. This theory holds that we maintain reasonable expectations of privacy in certain quantities of information even if we do not have such expectations in the constituent parts. This Article examines and …
Privacy, Antitrust, And Power, Frank Pasquale
Privacy, Antitrust, And Power, Frank Pasquale
Faculty Scholarship
When a dominant internet service collects information about its users, the situation is so far from the usual arm’s-length market transaction that neoclassical economic analysis is misleading. “Lack of surveillance” is not a product that individuals have varying preferences for and purchase accordingly. Rather, surveillance is an inevitable concomitant of life online. We need to tame the power that surveillance entails, rather than continuing to pursue illusory, surveillance-free alternatives on the platform level.
To the extent a company creates profiles of individuals and collects data on them, a third party ought to be collecting reports from the company on how …
The Future Of Hipaa In The Cloud, Frank Pasquale, Tara Adams Ragone
The Future Of Hipaa In The Cloud, Frank Pasquale, Tara Adams Ragone
Faculty Scholarship
This white paper examines how cloud computing generates new privacy challenges for both healthcare providers and patients, and how American health privacy laws may be interpreted or amended to address these challenges. Given the current implementation of Meaningful Use rules for health information technology and the Omnibus HIPAA Rule in health care generally, the stage is now set for a distinctive law of “health information” to emerge. HIPAA has come of age of late, with more aggressive enforcement efforts targeting wayward healthcare providers and entities. Nevertheless, more needs to be done to assure that health privacy and all the values …
The Right To Quantitative Privacy, David C. Gray, Danielle Keats Citron
The Right To Quantitative Privacy, David C. Gray, Danielle Keats Citron
Faculty Scholarship
We are at the cusp of a historic shift in our conceptions of the Fourth Amendment driven by dramatic advances in surveillance technology. Governments and their private sector agents continue to invest billions of dollars in massive data-mining projects, advanced analytics, fusion centers, and aerial drones, all without serious consideration of the constitutional issues that these technologies raise. In United States v. Jones, the Supreme Court signaled an end to its silent acquiescence in this expanding surveillance state. In that case, five justices signed concurring opinions defending a revolutionary proposition: that citizens have Fourth Amendment interests in substantial quantities of …
Rehnquist And Panvasive Searches, Christopher Slobogin
Rehnquist And Panvasive Searches, Christopher Slobogin
Vanderbilt Law School Faculty Publications
In the history of the Supreme Court, William Rehnquist may have been the least friendly justice toward the view that the Fourth Amendment should be read expansively. Even he, however, might have interpreted the amendment to place more restrictions on modern law enforcement techniques than current caselaw does. Relying on a 1974 article authored by Rehnquist, this essay, written for a symposium on Rehnquist and the Fourth Amendment, describes his views on the types of requirements the Fourth Amendment imposes on the police, how decriminalization can protect privacy, and most importantly, why Rehnquist might have been willing to regulate surveillance …
Patient Awareness And Approval For An Opt-Out Genomic Biorepository, Ellen Wright Clayton, Kyle B. Brothers, Matthew J. Westbrook, M. Francis Wright, John A. Myers, Daniel R. Morrison, Jennifer L. Madison, Jill M. Pulley
Patient Awareness And Approval For An Opt-Out Genomic Biorepository, Ellen Wright Clayton, Kyle B. Brothers, Matthew J. Westbrook, M. Francis Wright, John A. Myers, Daniel R. Morrison, Jennifer L. Madison, Jill M. Pulley
Vanderbilt Law School Faculty Publications
Aim: In this study, we sought to assess patient awareness and perceptions of an opt-out biorepository. Materials & methods: We conducted exit interviews with adult patients and parents of pediatric patients having their blood drawn as part of their clinical care at Vanderbilt University Medical Center (TN, USA). Results: 32.9% of all patients and parents of pediatric patients report having heard of the opt-out biorepository, while 92.4% approve of this research effort based on a brief description. Awareness that leftover blood could be used for research increased among adult patients during the study period, from 34.3 to 50.0%. Conclusion: These …
Community Control Over Camera Surveillance: A Response To Bennett Capers's "Crime, Surveillance, And Communities", Christopher Slobogin
Community Control Over Camera Surveillance: A Response To Bennett Capers's "Crime, Surveillance, And Communities", Christopher Slobogin
Vanderbilt Law School Faculty Publications
Professor Capers's article helps stimulate thinking about the way in which community views and individual rights interact. In my view, where police propose to conduct surveillance of groups, as occurs with camera surveillance (including the newly developing drone camera systems)', the affected group should be heavily involved in the authorization process. If the surveillance is authorized, care must be taken to ensure that all members of the group are equally affected by it unless and until individualized suspicion, proportionate to the intrusion, develops. That formula ensures that the interests of both the collective and the individual are protected.
Intellectual Property And Public Health – A White Paper, Ryan G. Vacca, James Ming Chen, Jay Dratler Jr., Thomas Folsom, Timothy S. Hall, Yaniv Heled, Frank A. Pasquale Iii, Elizabeth A. Reilly, Jeffrey Samuels, Katherine J. Strandburg, Kara W. Swanson, Andrew W. Torrance, Katharine A. Van Tassel
Intellectual Property And Public Health – A White Paper, Ryan G. Vacca, James Ming Chen, Jay Dratler Jr., Thomas Folsom, Timothy S. Hall, Yaniv Heled, Frank A. Pasquale Iii, Elizabeth A. Reilly, Jeffrey Samuels, Katherine J. Strandburg, Kara W. Swanson, Andrew W. Torrance, Katharine A. Van Tassel
Law Faculty Scholarship
On October 26, 2012, the University of Akron School of Law’s Center for Intellectual Property and Technology hosted its Sixth Annual IP Scholars Forum. In attendance were thirteen legal scholars with expertise and an interest in IP and public health who met to discuss problems and potential solutions at the intersection of these fields. This report summarizes this discussion by describing the problems raised, areas of agreement and disagreement between the participants, suggestions and solutions made by participants and the subsequent evaluations of these suggestions and solutions. Led by the moderator, participants at the Forum focused generally on three broad …
Petitions, Privacy, And Political Obscurity, Rebecca Green
Petitions, Privacy, And Political Obscurity, Rebecca Green
Faculty Publications
People who sign petitions must accept disclosure of their political views. This conclusion rests on the seemingly uncontroversial (if circular) premise that petition signing is a public activity. Courts have thus far shown little sympathy for individuals who take a public stand on an issue by signing a petition and then assert privacy claims after the fact. Democracy, after all, takes courage, as Justice Scalia wrote in the petitioning disclosure case Doe v. Reed. But signing a petition today brings consequences beyond public criticism. The real threat of disclosure for modern petition signers is not tangible harassment, but the loss …
"Pets Must Be On A Leash": How U.S. Law (And Industry Practice) Often Undermines And Even Forbids Valuable Privacy Enhancing Technology, A. Michael Froomkin
"Pets Must Be On A Leash": How U.S. Law (And Industry Practice) Often Undermines And Even Forbids Valuable Privacy Enhancing Technology, A. Michael Froomkin
Articles
No abstract provided.
Global Governance In The Information Age: The Terrorist Finance Tracking Program, Hannah Bloch-Wehba
Global Governance In The Information Age: The Terrorist Finance Tracking Program, Hannah Bloch-Wehba
Faculty Scholarship
Europe has long been deemed "more protective" of privacy than the United States. In the context of transatlantic cooperation in the war on terrorism, divergences in privacy law and policy have become ever more apparent. As has always been the case, the same technologies that pose new and vital privacy issues with regard to personal information and private data are those that are important sources for government actors, including law enforcement and intelligence agencies. Despite the increasing reliance by national agencies on information flowing from other nations, regulation of information transfer, processing and sharing has been achieved largely outside of …
A Private Underworld: The Naked Body In Law And Society, Lawrence M. Friedman, Joanna L. Grossman
A Private Underworld: The Naked Body In Law And Society, Lawrence M. Friedman, Joanna L. Grossman
Faculty Journal Articles and Book Chapters
In general, the literature on privacy stresses, quite naturally, our right to keep things private, or to make our own decisions. The individual, the citizen, is the center of gravity. There is a great deal of material on the limits of privacy, on threats to privacy, and the like. In this Article, the authors want to discuss what one might call mandatory privacy: those aspects of life that we are required to keep secret, hidden, or private, the things that we must keep private, whether we want to or not. This is a subject that has been mostly, though not …
The Business Of Privacy, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
The Business Of Privacy, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
Face-To-Data -- Another Developing Privacy Threat?, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Face-To-Data -- Another Developing Privacy Threat?, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
The Extraterritoriality Of Data Privacy Laws -- An Explosive Issue Yet To Detonate, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
The Extraterritoriality Of Data Privacy Laws -- An Explosive Issue Yet To Detonate, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.