Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Privacy Law (15)
- Internet Law (9)
- National Security Law (6)
- Science and Technology Law (6)
- Constitutional Law (5)
-
- First Amendment (4)
- Fourth Amendment (4)
- Computer Law (3)
- Consumer Protection Law (2)
- Law and Society (2)
- Legal Studies (2)
- Social and Behavioral Sciences (2)
- Air and Space Law (1)
- Business Organizations Law (1)
- Civil Law (1)
- Communications Law (1)
- Comparative and Foreign Law (1)
- Computer Sciences (1)
- Criminal Law (1)
- Databases and Information Systems (1)
- Education Law (1)
- Immigration Law (1)
- Information Security (1)
- International Law (1)
- Jurisprudence (1)
- Legislation (1)
- Litigation (1)
- Military, War, and Peace (1)
- Physical Sciences and Mathematics (1)
- Institution
-
- Roger Williams University (4)
- Boston University School of Law (3)
- Columbia Law School (3)
- Georgetown University Law Center (2)
- University of Massachusetts School of Law (2)
-
- Washington University in St. Louis (2)
- Chicago-Kent College of Law (1)
- Fordham Law School (1)
- University of Pittsburgh School of Law (1)
- University of South Carolina (1)
- University of Washington School of Law (1)
- University of the District of Columbia School of Law (1)
- Vanderbilt University Law School (1)
Articles 1 - 23 of 23
Full-Text Articles in Law
Promoting Innovation While Preventing Discrimination: Policy Goals For The Scored Society, Danielle K. Citron, Frank Pasquale
Promoting Innovation While Preventing Discrimination: Policy Goals For The Scored Society, Danielle K. Citron, Frank Pasquale
Faculty Scholarship
There are several normative theories of jurisprudence supporting our critique of the scored society, which complement the social theory and political economy presented in our 2014 article on that topic in the Washington Law Review. This response to Professor Tal Zarsky clarifies our antidiscrimination argument while showing that is only one of many bases for the critique of scoring practices. The concerns raised by Big Data may exceed the capacity of extant legal doctrines. Addressing the potential injustice may require the hard work of legal reform.
Making Smart Decisions About Surveillance: A Guide For Communities, Chris Conley, Matthew Cagle, Peter Bibring, Jessica Farris, Linda Lye, Mitra Ebadolahi, Nicole Ozer
Making Smart Decisions About Surveillance: A Guide For Communities, Chris Conley, Matthew Cagle, Peter Bibring, Jessica Farris, Linda Lye, Mitra Ebadolahi, Nicole Ozer
Faculty Scholarship
California communities are increasingly grappling with whether to deploy new surveillance technologies ranging from drones to license plate readers to facial recognition. This is understandable, since public safety budgets are tight, technology vendors promise the ability to do more with less, and federal agencies or industry sponsors may even offer funding.
But surveillance can be both less effective and far more costly to local agencies and to the community at large than initially imagined, leaving communities saddled with long-term bills for surveillance that doesn't end up making the community safer. Surveillance can also be easily misused, leading to the erosion …
Self, Privacy, And Power: Is It All Over?, Richard Warner, Robert H. Sloan
Self, Privacy, And Power: Is It All Over?, Richard Warner, Robert H. Sloan
All Faculty Scholarship
The realization of a multifaceted self is an ideal one strives to realize. One realizes such a self in large part through interaction with others in various social roles. Such realization requires a significant degree of informational privacy. Informational privacy is the ability to determine for yourself when others may collect and how they may use your information. The realization of multifaceted selves requires informational privacy in public. There is no contradiction here: informational privacy is a matter of control, and you can have such control in public. Current information processing practices greatly reduce privacy in public thereby threatening the …
Beyond The Schoolhouse Gates: The Unprecedented Expansion Of School Surveillance Authority Under Cyberbulling Laws, Emily Suski
Beyond The Schoolhouse Gates: The Unprecedented Expansion Of School Surveillance Authority Under Cyberbulling Laws, Emily Suski
Faculty Publications
For several years, states have grappled with the problem of cyberbullying and its sometimes devastating effects. Because cyberbullying often occurs between students, most states have understandably looked to schools to help address the problem. To that end, schools in forty-six states have the authority to intervene when students engage in cyberbullying. This solution seems all to the good unless a close examination of the cyberbullying laws and their implications is made. This Article explores some of the problematic implications of the cyberbullying laws. More specifically, it focuses on how the cyberbullying laws allow schools unprecedented surveillance authority over students. This …
The Pclob On Human Rights & 702: Punt Or Long Game?, Peter Margulies
The Pclob On Human Rights & 702: Punt Or Long Game?, Peter Margulies
Law Faculty Scholarship
No abstract provided.
Fisa Surveillance And Aliens, Amit K. Chhabra
Yale Symposium: Unpacking Nsa's Global Problem, Peter Margulies
Yale Symposium: Unpacking Nsa's Global Problem, Peter Margulies
Law Faculty Scholarship
No abstract provided.
Of Relevance And Reform Under Section 215, Peter Margulies
Of Relevance And Reform Under Section 215, Peter Margulies
Law Faculty Scholarship
No abstract provided.
Metadata: Piecing Together A Privacy Solution, Chris Conley
Metadata: Piecing Together A Privacy Solution, Chris Conley
Faculty Scholarship
Imagine the government is constantly monitoring you — keeping track of every person you call or email, every place you go, everything you buy, and more — all without getting a warrant. And when you challenge them, they claim you have no right to expect this kind of information to be private. Besides, they’re not actually listening to what you say or reading what you write, so what’s the big deal anyhow?
Unfortunately, this scenario is more real than imaginary. Government agencies ranging from the NSA to local police departments have taken advantage of weak or uncertain legal protections for …
Fisc Query Preapproval: Intelligence Burden Or Bump In The Road?, Peter Margulies
Fisc Query Preapproval: Intelligence Burden Or Bump In The Road?, Peter Margulies
Law Faculty Scholarship
No abstract provided.
When Enough Is Enough: Location Tracking, Machine Learning And The Mosaic Theory, Renee Mcdonald Hutchins, Steve Bellovin, Tony Jebara, Sebastian Zimmeck
When Enough Is Enough: Location Tracking, Machine Learning And The Mosaic Theory, Renee Mcdonald Hutchins, Steve Bellovin, Tony Jebara, Sebastian Zimmeck
Journal Articles
Since 1967, when it decided Katz v. United States, the Supreme Court has tied the right to be free of unwanted government scrutiny to the concept of reasonable expectations of privacy.1 An evaluation of reasonable expectations depends, among other factors, upon an assessment of the intrusiveness of government action. When making such assessment historically the Court considered police conduct with clear temporal, geographic, or substantive limits. However, in an era where new technologies permit the storage and compilation of vast amounts of personal data, things are becoming more complicated. A school of thought known as “mosaic theory” has stepped into …
Keep Your Eyes On Eyes In The Sky, Hillary B. Farber
Keep Your Eyes On Eyes In The Sky, Hillary B. Farber
Faculty Publications
To date, eight states have passed bills regulating domestic drone use by government and private individuals. This leaves us with a question: If a city of more than 60,000 residents and a global company with a customer base in the hundreds of millions are racing to the sky, how are we as a commonwealth of 6.6 million to truly launch ourselves into the debate and protect what little privacy we have left?
Your View: ‘Do Not Track’ Should Apply To Drivers, Too, Hillary B. Farber
Your View: ‘Do Not Track’ Should Apply To Drivers, Too, Hillary B. Farber
Faculty Publications
Location tracking data can reveal quite a bit of information about a person when it is all pieced together. Just by knowing where and when a person frequents certain places we can know about his/her recreational habits, religious affiliations, professional affiliations, relationship status, personal health and hygiene, social preferences and contacts, and so much more. That is why it is so important to regulate the use of location tracking technology. There are a variety of efforts afoot to rein in government use of such technology – this op-ed is concerned with automated license plate readers.
Digital Security In The Expository Society: Spectacle, Surveillance, And Exhibition In The Neoliberal Age Of Big Data, Bernard E. Harcourt
Digital Security In The Expository Society: Spectacle, Surveillance, And Exhibition In The Neoliberal Age Of Big Data, Bernard E. Harcourt
Faculty Scholarship
In 1827, Nicolaus Heinrich Julius, a professor at the University of Berlin, identified an important architectural mutation in nineteenth-century society that reflected a deep disruption in our technologies of knowledge and a profound transformation in relations of power across society: Antiquity, Julius observed, had discovered the architectural form of the spectacle; but modern times had operated a fundamental shift from spectacle to surveillance. Michel Foucault would elaborate this insight in his 1973 Collège de France lectures on The Punitive Society, where he would declare: “[T]his is precisely what happens in the modern era: the reversal of the spectacle into surveillance…. …
Rethinking Privacy, William H. Simon
Rethinking Privacy, William H. Simon
Faculty Scholarship
Anxiety about surveillance and data mining has led many to embrace implausibly expansive and rigid conceptions of privacy. The premises of some current privacy arguments do not fit well with the broader political commitments of those who make them. In particular, liberals seem to have lost touch with the reservations about privacy expressed in the social criticism of some decades ago. They seem unable to imagine that preoccupation with privacy might amount to a “pursuit of loneliness” or how “eyes on the street” might have reassuring connotations. Without denying the importance of the effort to define and secure privacy values, …
Bulk Metadata Collection: Statutory And Constitutional Considerations, Laura K. Donohue
Bulk Metadata Collection: Statutory And Constitutional Considerations, Laura K. Donohue
Georgetown Law Faculty Publications and Other Works
The National Security Agency’s bulk collection of telephony metadata runs contrary to Congress’s intent in enacting the 1978 Foreign Intelligence Surveillance Act. The program also violates the statute in three ways: the requirement that records sought be “relevant to an authorized investigation;” the requirement that information could be obtained via subpoena duces tecum; and the steps required for use of pen registers and trap and trace devices. Additionally, the program gives rise to serious constitutional concerns. Efforts by the government to save the program on grounds of third party doctrine are unpersuasive in light of the unique circumstances of …
Cause To Believe What? The Importance Of Defining A Search's Object--Or, How The Aba Would Analyze The Nsa Metadata Surveillance Program, Christopher Slobogin
Cause To Believe What? The Importance Of Defining A Search's Object--Or, How The Aba Would Analyze The Nsa Metadata Surveillance Program, Christopher Slobogin
Vanderbilt Law School Faculty Publications
Courts and scholars have devoted considerable attention to the definition of probable cause and reasonable suspicion. Since the demise of the mere evidence rule in the 1960s, however, they have rarely examined how these central Fourth Amendment concepts interact with the object of the search. That is unfortunate, because this interaction can have significant consequences. For instance, probable cause to believe that a search might lead to evidence of wrongdoing triggers a very different inquiry than probable cause to believe that a search will produce evidence of criminal activity. The failure to address the constraints that should be imposed on …
Intellectual Freedom And Privacy, Neil M. Richards, Joanna Cornwell
Intellectual Freedom And Privacy, Neil M. Richards, Joanna Cornwell
Scholarship@WashULaw
This essay offers an account of the complex ways intellectual freedom and privacy are interrelated. We pay particular attention to both the constitutional dimensions of these important values, as well as the important roles that social and professional norms play in their protection in practice. Our examination of these issues is divided into three parts. Part I lays out the law and legal theory governing privacy as it relates to intellectual freedom. Part II examines a special context in which law and professional norms operate together to protect intellectual freedom through privacy–the library. Finally, Part III discusses how government actions …
Watching The Watchers, Neil M. Richards
Watching The Watchers, Neil M. Richards
Scholarship@WashULaw
In this essay from Wired Magazine (UK)'s special edition, The Wired World in 2014, Prof. Richards argues that sousveillance–watching the watchers–is an important development that will be on the rise in 2014.
Surveillance At The Source, David Thaw
Surveillance At The Source, David Thaw
Articles
Contemporary discussion concerning surveillance focuses predominantly on government activity. These discussions are important for a variety of reasons, but generally ignore a critical aspect of the surveillance-harm calculus – the source from which government entities derive the information they use. The source of surveillance data is the information "gathering" activity itself, which is where harms like "chilling" of speech and behavior begin.
Unlike the days where satellite imaging, communications intercepts, and other forms of information gathering were limited to advanced law enforcement, military, and intelligence activities, private corporations now play a dominant role in the collection of information about individuals' …
The Trickle-Down War, Rosa Brooks
The Trickle-Down War, Rosa Brooks
Georgetown Law Faculty Publications and Other Works
The history of the European nation-state, wrote political sociologist Charles Tilly, is inextricably bound up with the history of warfare. To oversimplify Tilly’s nuanced and complex arguments, the story goes something like this: As power-holders (originally bandits and local strongmen) sought to expand their power, they needed capital to pay for weapons, soldiers and supplies. The need for capital and new recruits drove the creation of taxation systems and census mechanisms, and the need for more effective systems of taxation and recruitment necessitated better roads, better communications and better record keeping. This in turn enabled the creation of larger and …
Privacy Harm Exceptionalism, Ryan Calo
Privacy Harm Exceptionalism, Ryan Calo
Articles
“Exceptionalism” refers to the belief that a person, place, or thing is qualitatively different from others in the same basic category. Thus, some have spoken of America’s exceptionalism as a nation. Early debates about the Internet focused on the prospect that existing laws and institutions would prove inadequate to govern the new medium of cyberspace. Scholars have made similar claims about other areas of law.
The focus of this short essay is the supposed exceptionalism of privacy. Rather than catalogue all the ways that privacy might differ from other concepts or areas of study, I intend to focus on the …
Governing, Exchanging, Securing: Big Data And The Production Of Digital Knowledge, Bernard E. Harcourt
Governing, Exchanging, Securing: Big Data And The Production Of Digital Knowledge, Bernard E. Harcourt
Faculty Scholarship
The emergence of Big Data challenges the conventional boundaries between governing, exchange, and security. It ambiguates the lines between commerce and surveillance, between governing and exchanging, between democracy and the police state. The new digital knowledge reproduces consuming subjects who wittingly or unwittingly allow themselves to be watched, tracked, linked and predicted in a blurred amalgam of commercial and governmental projects. Linking back and forth from consumer data to government information to social media, these new webs of information become available to anyone who can purchase the information. How is it that governmental, commercial and security interests have converged, coincided, …