Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Privacy Law (37)
- Constitutional Law (13)
- Internet Law (13)
- Law and Society (8)
- Science and Technology Law (7)
-
- Criminal Law (6)
- Fourth Amendment (6)
- First Amendment (5)
- Intellectual Property Law (5)
- Computer Law (4)
- Computer Sciences (4)
- Health Law and Policy (4)
- Information Security (4)
- Physical Sciences and Mathematics (4)
- Social and Behavioral Sciences (4)
- Civil Rights and Discrimination (3)
- Comparative and Foreign Law (3)
- Consumer Protection Law (3)
- International Law (3)
- Administrative Law (2)
- Air and Space Law (2)
- Civil Law (2)
- Communication (2)
- Communication Technology and New Media (2)
- Communications Law (2)
- Databases and Information Systems (2)
- Family Law (2)
- Labor and Employment Law (2)
- Law Enforcement and Corrections (2)
- Institution
-
- Boston University School of Law (6)
- Roger Williams University (5)
- University of Colorado Law School (4)
- Georgetown University Law Center (3)
- New York Law School (3)
-
- University of Massachusetts School of Law (3)
- American University Washington College of Law (2)
- Schulich School of Law, Dalhousie University (2)
- St. John's University School of Law (2)
- University of Florida Levin College of Law (2)
- University of Missouri-Kansas City School of Law (2)
- University of New Hampshire (2)
- University of Pittsburgh School of Law (2)
- William & Mary Law School (2)
- California Western School of Law (1)
- Case Western Reserve University School of Law (1)
- Chicago-Kent College of Law (1)
- Florida A&M University College of Law (1)
- Florida State University College of Law (1)
- Macalester College (1)
- Maurer School of Law: Indiana University (1)
- University of Baltimore Law (1)
- University of Kentucky (1)
- University of Miami Law School (1)
- University of Michigan Law School (1)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (1)
- University of Richmond (1)
- University of Washington School of Law (1)
- Publication
-
- Faculty Publications (7)
- Faculty Scholarship (6)
- Articles (5)
- Publications (4)
- Articles & Chapters (3)
-
- Georgetown Law Faculty Publications and Other Works (3)
- Life of the Law School (1993- ) (3)
- All Faculty Scholarship (2)
- Articles in Law Reviews & Other Academic Journals (2)
- Articles, Book Chapters, & Popular Press (2)
- Faculty Works (2)
- Law Faculty Scholarship (2)
- UF Law Faculty Publications (2)
- Articles by Maurer Faculty (1)
- Briefs (1)
- Journal Publications (1)
- Law Faculty Scholarly Articles (1)
- Law Student Publications (1)
- Political Science Honors Projects (1)
- Pro Bono Collaborative Staff Publications (1)
- Scholarly Publications (1)
- Scholarly Works (1)
- Scholarship Chronologically (1)
- School of Law Conferences, Lectures & Events (1)
Articles 1 - 30 of 54
Full-Text Articles in Law
Orwell's 1984 And A Fourth Amendment Cybersurveillance Nonintrusion Test, Margaret Hu
Orwell's 1984 And A Fourth Amendment Cybersurveillance Nonintrusion Test, Margaret Hu
Faculty Publications
This Article describes a cybersurveillance nonintrusion test under the Fourth Amendment that is grounded in evolving customary law to replace the reasonable expectation of privacy test formulated in Katz v. United States. To illustrate how customary law norms are shaping modern Fourth Amendment jurisprudence, this Article examines the recurrence of judicial references to George Orwell’s novel, 1984, within the Fourth Amendment context when federal courts have assessed the constitutionality of modern surveillance methods. The Supreme Court has indicated that the Fourth Amendment privacy doctrine must now evolve to impose meaningful limitations on the intrusiveness of new surveillance technologies. …
Artificial Intelligence In Health Care: Applications And Legal Implications, W. Nicholson Price Ii
Artificial Intelligence In Health Care: Applications And Legal Implications, W. Nicholson Price Ii
Articles
Artificial intelligence (AI) is rapidly moving to change the healthcare system. Driven by the juxtaposition of big data and powerful machine learning techniques—terms I will explain momentarily—innovators have begun to develop tools to improve the process of clinical care, to advance medical research, and to improve efficiency. These tools rely on algorithms, programs created from healthcare data that can make predictions or recommendations. However, the algorithms themselves are often too complex for their reasoning to be understood or even stated explicitly. Such algorithms may be best described as “black-box.” This article briefly describes the concept of AI in medicine, including …
The Pro Bono Collaborative Project Spotlight: Rwu Law Street Law: Teaching Teens About The Law And Inspiring Future Lawyers 11-16-2017, Roger Williams University School Of Law
The Pro Bono Collaborative Project Spotlight: Rwu Law Street Law: Teaching Teens About The Law And Inspiring Future Lawyers 11-16-2017, Roger Williams University School Of Law
Pro Bono Collaborative Staff Publications
No abstract provided.
Data Collection And The Regulatory State, Ahmed Ghappour
Data Collection And The Regulatory State, Ahmed Ghappour
Faculty Scholarship
The following remarks were given on January 27, 2017 during the Connecticut Law Review’s symposium, “Privacy, Security & Power: The State of Digital Surveillance.” Hillary Greene, the Zephaniah Swift Professor of Law at the University of Connecticut School of Law, offered introductory remarks and moderated the panel. The panel included Dr. Cooper, Associate Professor of Law and Director of the Program on Economics & Privacy at Antonin Scalia Law School at George Mason University, Professor Ghappour, Visiting Assistant Professor at UC Hastings College of the Law, Attorney Lieber, Senior Privacy Policy Counsel at Google, and Dr. Wu, Professor of Law …
Comments To The Federal Trade Commission On The Can-Spam Rule Review, 16 C.F.R. Part 316, Project No. R711010, Roger Allan Ford
Comments To The Federal Trade Commission On The Can-Spam Rule Review, 16 C.F.R. Part 316, Project No. R711010, Roger Allan Ford
Law Faculty Scholarship
These comments respond to the Federal Trade Commission’s request for public comment on the CAN-SPAM Rule, 16 C.F.R. Part 316.
The CAN-SPAM Act set a minimum baseline for consumer protections that senders of unsolicited commercial email must respect. These protections have been largely effective at giving consumers the ability to manage how a large group of companies uses their email addresses for marketing. At the same time, the Act has had little effect on the volume of unsolicited commercial email or on the amount of email sent by scammers and fraudsters. The Act and its implementing Rule, then, have been …
Brief Of Scholars Of The History And Original Meaning Of The Fourth Amendment As Amici Curiae In Support Of Petitioner, Margaret Hu
Briefs
No abstract provided.
We Need To Talk About Police Disciplinary Records, Kate Levine
We Need To Talk About Police Disciplinary Records, Kate Levine
Faculty Publications
In March 2017, an employee of New York’s Civilian Complaint Review Board leaked the disciplinary record of Daniel Pantaleo to the media. Pantaleo, the police officer who choked Eric Garner to death in the video that went public and horrified many citizens, is under federal investigation after a Staten Island grand jury refused to indict him for Garner’s death. Legal Aid Society attorneys had unsuccessfully sought the release of his records in the courts for years. The leak of his records is the public face of an important but rarely discussed issue facing police, legislators, judges, lawyers, and scholars who …
19th Annual Open Government Summit: Access To Public Records Act & Open Meetings Act, 2017, Department Of Attorney General, State Of Rhode Island
19th Annual Open Government Summit: Access To Public Records Act & Open Meetings Act, 2017, Department Of Attorney General, State Of Rhode Island
School of Law Conferences, Lectures & Events
No abstract provided.
The Doctor Requirement: Griswold, Privacy, And At-Home Reproductive Care, Yvonne F. Lindgren
The Doctor Requirement: Griswold, Privacy, And At-Home Reproductive Care, Yvonne F. Lindgren
Faculty Works
Supreme Court privacy jurisprudence has traditionally offered greater protection to activities when exercised within the home. This is true in common law as well as across a broad range of constitutional claims. For example, common law privacy identifies the home as a location of solitude and repose, often conceptualized as the “right to be let alone.” Speech, or the right to be free of unwanted messages, is enhanced when the claimant is within the confines of her or his home. Fourth Amendment protections against search and seizure and the notion of the reasonable expectation of privacy are enhanced when the …
Copyright Owners' Putative Interests In Privacy, Reputation, And Control: A Reply To Goold, Wendy J. Gordon
Copyright Owners' Putative Interests In Privacy, Reputation, And Control: A Reply To Goold, Wendy J. Gordon
Faculty Scholarship
My own view is that Goold overstates the explanatory role of tort law. But even were that not the case, the courts need to reach some kind of “settled” understanding on these various interests before a cause of action is created or definitively rejected, and that no such consensus on the three matters mentioned yet exists, whether they are viewed as forms of tort or otherwise. Goold’s work may nevertheless be an important step toward reaching closure on these and other open questions in copyright law.
I Know What You Did Last Summer: A User’S Guide For Internet Investigations, Sean O'Brien, Quinn O'Brien
I Know What You Did Last Summer: A User’S Guide For Internet Investigations, Sean O'Brien, Quinn O'Brien
Faculty Works
Coauthored with licensed private investigator Quinn O'Brien, this article provides important ethical considerations, practice tips, and technical advice about the preparation, execution, preservation, and follow-up investigation of subjects using the Internet.
Copyright Owners' Putative Interests In Privacy, Reputation, And Control: A Reply To Goold - Draft - 05-15-2017, Wendy J. Gordon
Copyright Owners' Putative Interests In Privacy, Reputation, And Control: A Reply To Goold - Draft - 05-15-2017, Wendy J. Gordon
Scholarship Chronologically
Patrick Goold’s interesting new article, Unbundling the “Tort” of Copyright Infringement (“Unbundling”) centers on a key lack of clarity that Professor Goold perceives in the cause of action for copyright infringement. The lack of clarity, he argues, afflicts threshold definitions of what constitutes actionable copying.
Why New Hampshire Must Update Rape Shield Laws, Amy Vorenberg
Why New Hampshire Must Update Rape Shield Laws, Amy Vorenberg
Law Faculty Scholarship
[Excerpt] “Recent research indicates that New Hampshire has some of the highest rates of sexual assault in the nation; nearly one in four New Hampshire women and one in 20 New Hampshire men will experience sexual assault. Although reporting a crime can be hard for anyone, sexual assault victims have particular reasons for not reporting. After an assault, a rape victim typically feels embarrassment, shame and fears reprisal (most of these crimes are committed by an acquaintance). The deeply personal nature of rape makes it uniquely traumatizing and confusing.”
Ispy: Threats To Individual And Institutional Privacy In The Digital World, Lori Andrews
Ispy: Threats To Individual And Institutional Privacy In The Digital World, Lori Andrews
All Faculty Scholarship
What type of information is collected, who is viewing it, and what law librarians can do to protect their patrons and institutions.
Female Autonomy: An Analysis Of Privacy And Equality Doctrine For Reproductive Rights, Elizabeth Levi
Female Autonomy: An Analysis Of Privacy And Equality Doctrine For Reproductive Rights, Elizabeth Levi
Political Science Honors Projects
What is the constitutional basis for women’s equality? Recently, scholars have suggested that as the right to privacy has floundered against the political undoing of women's access to abortion, equal protection arguments have grown stronger. This thesis investigates the feminist utility and limits of the equality and privacy arguments. Taking liberal feminism and feminist legal theory as analytical lenses, I offer interpretations of gender discrimination, reproductive rights, and marriage equality case law. By this framework, I argue that while an equality argument is less inherently oppressive towards women than the privacy doctrine, equality doctrine has been constructed thus far to …
Searching Places Unknown: Law Enforcement Jurisdiction On The Dark Web, Ahmed Ghappour
Searching Places Unknown: Law Enforcement Jurisdiction On The Dark Web, Ahmed Ghappour
Faculty Scholarship
The use of hacking tools by law enforcement to pursue criminal suspects who have anonymized their communications on the dark web presents a looming flashpoint between criminal procedure and international law. Criminal actors who use the dark web (for instance, to commit crimes or to evade authorities) obscure digital footprints left behind with third parties, rendering existing surveillance methods obsolete. In response, law enforcement has implemented hacking techniques that deploy surveillance software over the Internet to directly access and control criminals’ devices. The practical reality of the underlying technologies makes it inevitable that foreign-located computers will be subject to remote …
Newroom: From The Bronx To Haiti: Asb 3-16-2017, Roger Williams University School Of Law
Newroom: From The Bronx To Haiti: Asb 3-16-2017, Roger Williams University School Of Law
Life of the Law School (1993- )
No abstract provided.
Newsroom: Cybersecurity: Obama's Conflicted Legacy 02-17-2017, Peter Margulies
Newsroom: Cybersecurity: Obama's Conflicted Legacy 02-17-2017, Peter Margulies
Life of the Law School (1993- )
No abstract provided.
Newsroom: Logan On Trump And Libel Law 01-03-2017, Roger Williams University School Of Law
Newsroom: Logan On Trump And Libel Law 01-03-2017, Roger Williams University School Of Law
Life of the Law School (1993- )
No abstract provided.
The Judicial Legacy Of Louis Brandeis And The Nature Of American Constitutionalism, Edward A. Purcell Jr.
The Judicial Legacy Of Louis Brandeis And The Nature Of American Constitutionalism, Edward A. Purcell Jr.
Articles & Chapters
No abstract provided.
Paying For Privacy And The Personal Data Economy, Stacy-Ann Elvy
Paying For Privacy And The Personal Data Economy, Stacy-Ann Elvy
Articles & Chapters
Growing demands for privacy and increases in the quantity and variety of consumer data have engendered various business offerings to allow companies, and in some instances consumers, to capitalize on these developments. One such example is the emerging “personal data economy” (PDE) in which companies, such as Datacoup, purchase data directly from individuals. At the opposite end of the spectrum, the “pay-for-privacy” (PFP) model requires consumers to pay an additional fee to prevent their data from being collected and mined for advertising purposes. This Article conducts a simultaneous in-depth exploration of the impact of burgeoning PDE and PFP models. It …
Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski
Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski
Publications
Article III standing is difficult to achieve in the context of data security and data privacy claims. Injury in fact must be "concrete," "particularized," and "actual or imminent"--all characteristics that are challenging to meet with information harms. This Article suggests looking to an unusual source for clarification on privacy and standing: recent national security surveillance litigation. There we can find significant discussions of what rises to the level of Article III injury in fact. The answers may be surprising: the interception of sensitive information; the seizure of less sensitive information and housing of it in a database for analysis; and …
Protecting Homeowners' Privacy Rights In The Age Of Drones: The Role Of Community Associations, Hillary B. Farber, Marvin J. Nodiff
Protecting Homeowners' Privacy Rights In The Age Of Drones: The Role Of Community Associations, Hillary B. Farber, Marvin J. Nodiff
Faculty Publications
Homeowners' notions of privacy in their dwellings and surroundings are under attack from the threat of pervasive surveillance by small civilian drones equipped with highly sophisticated visual and data-gathering capabilities. Streamlined rules recently issued by the Federal Aviation Administration ("FAA') have unleashed technological innovation that promises great societal benefits. However, the new rules expose homeowners to unwanted snooping because they lack limits on the distance drones may operate from residential dwellings or time of operations. Indeed, our society should not expect a federal agency to deal effectively with the widely diverse issues of drone technology facing the states, given the …
Keep Out! The Efficacy Of Trespass, Nuisance And Privacy Torts As Applied To Drones, Hillary B. Farber
Keep Out! The Efficacy Of Trespass, Nuisance And Privacy Torts As Applied To Drones, Hillary B. Farber
Faculty Publications
The drone industry is burgeoning and there is boundless excitement over the potential civil and commercial applications of these aerial observers. Drones are also fun recreational toys that have more capabilities than their predecessor - the remote controlled helicopter. But along with the benefits comes the potential for misuse. More and more frequently concerned spectators are reporting drones flying around the windows of homes, backyards, and at beaches and sporting events. In some places people are even shooting them down.
We have entered a new frontier of aerial observation with the unmanned aircraft. As is often the case with new …
Carpenter Privacy Case Vexes Justices, While Tech Giant Microsoft Battles Government In Second U.S. Supreme Court Privacy Case With International Implications, Richard J. Peltz-Steele
Carpenter Privacy Case Vexes Justices, While Tech Giant Microsoft Battles Government In Second U.S. Supreme Court Privacy Case With International Implications, Richard J. Peltz-Steele
Faculty Publications
Fall 2017 saw a major privacy case with international implications reach the U.S. Supreme Court this term, Carpenter v. United States. Now a second such case pits the Government against Big Tech in United States v. Microsoft. Carpenter is a criminal case involving federal seizure of cell phone location data from service providers. Arising under the “reasonable grounds” provision of the Stored Communications Act (SCA), the case accentuates Americans’ lack of constitutional protection for personal data in third-party hands, in contrast with emerging global privacy norms. The second major privacy case headed for Supreme Court decision in 2018 also arises …
Performative Privacy, Scott Skinner-Thompson
Performative Privacy, Scott Skinner-Thompson
Publications
Broadly speaking, privacy doctrine suggests that the right to privacy is non-existent once one enters the public realm. Although some scholars contend that privacy ought to exist in public, “public privacy” has been defended largely with reference to other, ancillary values privacy may serve. For instance, public privacy may be necessary to make the freedom of association meaningful in practice.
This Article identifies a new dimension of public privacy, supplementing extant justifications for the right, by arguing that many efforts to maintain privacy while in “public” are properly conceptualized as forms of performative, expressive resistance against an ever-pervasive surveillance society. …
The Criminal Justice Black Box, Samuel R. Wiseman
The Criminal Justice Black Box, Samuel R. Wiseman
Scholarly Publications
"Big data "-- the collection and statistical analysis of numerous digital data points -- has transformed the commercial and policy realms, changing firms' understanding of consumer behavior and improving problems ranging from traffic congestion to drug interactions. In the criminal justice field, police now use data from widely dispersed monitoring equipment, crime databases, and statistical analysis to predict where and when crimes will occur, and police body cameras have the potential to both provide key evidence and reduce misconduct. But in many jurisdictions, digital access to basic criminal court records remains surprisingly limited, and, in contrast to the civil context, …
Protecting Privacy In The Era Of Smart Toys: Does Hello Barbie Have A Duty To Report, Corinne Moini
Protecting Privacy In The Era Of Smart Toys: Does Hello Barbie Have A Duty To Report, Corinne Moini
Law Student Publications
“‘Yay, you’re here!’ Barbie said eagerly. ‘This is so exciting. What’s your name?’…’I just know we’re going to be great friends.’” With a simple greeting, Hello Barbie has infiltrated your child’s life. Each time your child wishes to engage, they simply press on Barbie’s belt buckle and speak. Unlike other talking toys, the button on Barbie’s belt is not to play one of the pre-recorded statements that are installed in the toy. Instead, the button is used to record and transmit what your child says to an online storage cloud where it will be reviewed and used to create an …
Access To Data Across Borders: The Critical Role For Congress To Play Now, Jennifer Daskal
Access To Data Across Borders: The Critical Role For Congress To Play Now, Jennifer Daskal
Articles in Law Reviews & Other Academic Journals
No abstract provided.
Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri
Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri
Articles
Much legal and technical scholarship discusses the differing views of the United States and European Union toward privacy concepts and regulation. A substantial amount of effort in recent years, in both research and policy, focuses on attempting to reconcile these viewpoints searching for a common framework with a common level of protection for citizens from both sides of Atlantic. Reconciliation, we argue, misunderstands the nature of the challenge facing effective cross-border data flows. No such reconciliation can occur without abdication of some sovereign authority of nations, that would require the adoption of an international agreement with typical tools of international …