Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

2018

Privacy Law

Institution
Keyword
Publication

Articles 1 - 30 of 59

Full-Text Articles in Law

Privacy's Double Standards: Public Disclosure Tort Case Chart (2006-2016), Scott Skinner-Thompson Dec 2018

Privacy's Double Standards: Public Disclosure Tort Case Chart (2006-2016), Scott Skinner-Thompson

Research Data

This document, Privacy's Double Standards: Public Disclosure Tort Case Chart (2006-2016), 93 Wash. L. Rev. Online 2051 (2018), https://www.law.uw.edu/wlr/online-edition/scott-skinner-thompson, was published as an electronic supplement to the empirical study, Scott Skinner-Thompson, Privacy’s Double Standards, 93 Wash. L. Rev. 2051 (2018), available at https://scholar.law.colorado.edu/articles/1218/.


Protecting Consumers' Personal Data In The Digital World: Challenges And Changes, Man Yip Dec 2018

Protecting Consumers' Personal Data In The Digital World: Challenges And Changes, Man Yip

Research Collection Yong Pung How School Of Law

At the Personal Data Protection Seminar 2017, Dr Yaacob Ibrahim, Minister for Communications and Information, said that Singapore must “aspire towards a high standard of data protection that strengthens trust with the public, gives confidence to customers whose data is collected and used, while providing an environment for companies to thrive in the digital economy”.


Protecting Consumers' Personal Data In The Digital World: Challenges And Changes, Man Yip Dec 2018

Protecting Consumers' Personal Data In The Digital World: Challenges And Changes, Man Yip

Research Collection Yong Pung How School Of Law

At the Personal Data Protection Seminar 2017, Dr Yaacob Ibrahim, Minister for Communications and Information, said that Singapore must “aspire towards a high standard of data protection that strengthens trust with the public, gives confidence to customers whose data is collected and used, while providing an environment for companies to thrive in the digital economy”.


Dean's Desk: Iu Maurer Programs Supporting Careers In Cybersecurity, Austen L. Parrish Nov 2018

Dean's Desk: Iu Maurer Programs Supporting Careers In Cybersecurity, Austen L. Parrish

Austen Parrish (2014-2022)

A recent Bureau of Labor Statistics report estimated a near 30 percent growth in coming years for information security professionals, far outpacing most other job types. While Indiana University has long recognized the importance of data security and privacy, multiple new initiatives are ensuring that the next generation of chief information security officers, systems analysts, privacy professionals and others will come from our law school.

One of the ways the law school is leading the way is through the university’s new master of science in cybersecurity risk management. That degree program combines the resources of three of IU’s top-ranked schools …


Revenge Porn, Thomas Lonardo, Tricia P. Martland, Rhode Island Bar Journal Nov 2018

Revenge Porn, Thomas Lonardo, Tricia P. Martland, Rhode Island Bar Journal

Life of the Law School (1993- )

No abstract provided.


Clark Cty. Sch. Dist. V. Las Vegas Review Journal, Nev. Adv. Op. 84 (Oct. 25, 2018) (En Banc), Edgar Cervantes Oct 2018

Clark Cty. Sch. Dist. V. Las Vegas Review Journal, Nev. Adv. Op. 84 (Oct. 25, 2018) (En Banc), Edgar Cervantes

Nevada Supreme Court Summaries

The Court determined that the interest of individuals who participate in an internal investigation by a state agency regarding the inappropriate behavior of an elected official should be considered before publishing their identity or identifying information on public records. The Court adopted the Cameranesi test to determine the scope of redactions of names of persons identified in an investigative report with nontrivial privacy claims.


Pub. Emps.’ Ret. Sys. Of Nev., A Pub. Agency V. Nev. Pol’Y Res. Inst. Inc., 134 Nev. Adv. Op. 81 (Oct. 18, 2018) (En Banc), Daniel Brady Oct 2018

Pub. Emps.’ Ret. Sys. Of Nev., A Pub. Agency V. Nev. Pol’Y Res. Inst. Inc., 134 Nev. Adv. Op. 81 (Oct. 18, 2018) (En Banc), Daniel Brady

Nevada Supreme Court Summaries

The Court determined that the Nevada Public Records Act requires the government agency to disclose the requested information if: (1) it can be found by searching a database for existing information, (2) it is readily accessible and not confidential, and (3) the alleged risks of disclosure do not outweigh the benefits of the public’s interest in the records.


A Poor Mother's Right To Privacy: A Review, Danielle K. Citron Sep 2018

A Poor Mother's Right To Privacy: A Review, Danielle K. Citron

Faculty Scholarship

Collecting personal data is a feature of daily life. Businesses, advertisers, agencies, and law enforcement amass massive reservoirs of our personal data. This state of affairs—what I am calling the “collection imperative”—is justified in the name of efficiency, convenience, and security. The unbridled collection of personal data, meanwhile, leads to abuses. Public and private entities have disproportionate power over individuals and groups whose information they have amassed. Nowhere is that power disparity more evident than for the state’s surveillance of the indigent. Poor mothers, in particular, have vanishingly little privacy. Whether or not poor mothers receive subsidized prenatal care, the …


Rwu First Amendment Blog: David Logan's Blog: Discovering Trump 06-22-2018, David A. Logan Jun 2018

Rwu First Amendment Blog: David Logan's Blog: Discovering Trump 06-22-2018, David A. Logan

Law School Blogs

No abstract provided.


Brief Of Amicus Curiae, In Re Opinions & Orders Of This Court Addressing Bulk Collection Of Data Under The Foreign Intelligence Surveillance Act, No. Misc. 13-08 (Fisa Ct. June 13, 2018), Laura K. Donohue Jun 2018

Brief Of Amicus Curiae, In Re Opinions & Orders Of This Court Addressing Bulk Collection Of Data Under The Foreign Intelligence Surveillance Act, No. Misc. 13-08 (Fisa Ct. June 13, 2018), Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

No abstract provided.


Bulk Biometric Metadata Collection, Margaret Hu Jun 2018

Bulk Biometric Metadata Collection, Margaret Hu

Faculty Publications

Smart police body cameras and smart glasses worn by law enforcement increasingly reflect state-of-the-art surveillance technology, such as the integration of live-streaming video with facial recognition and artificial intelligence tools, including automated analytics. This Article explores how these emerging cybersurveillance technologies risk the potential for bulk biometric metadata collection. Such collection is likely to fall outside the scope of the types of bulk metadata collection protections regulated by the USA FREEDOM Act of 2015. The USA FREEDOM Act was intended to bring the practice of bulk telephony metadata collection conducted by the National Security Agency (“NSA”) under tighter regulation. In …


The New Utilities: Private Power, Social Infrastructure, And The Revival Of The Public Utility Concept, K. Sabeel Rahman May 2018

The New Utilities: Private Power, Social Infrastructure, And The Revival Of The Public Utility Concept, K. Sabeel Rahman

Faculty Scholarship

No abstract provided.


The Surveillance Gap: The Harms Of Extreme Privacy And Data Marginalization, Michele Gilman, Rebecca Green Apr 2018

The Surveillance Gap: The Harms Of Extreme Privacy And Data Marginalization, Michele Gilman, Rebecca Green

Faculty Publications

We live in an age of unprecedented surveillance, enhanced by modern technology, prompting some to suggest that privacy is dead. Previous scholarship suggests that no subset of the population feels this phenomenon more than marginalized communities. Those who rely on public benefits, for example, must turn over personal information and submit to government surveillance far more routinely than wealthier citizens who enjoy greater opportunity to protect their privacy and the ready funds to secure it. This article illuminates the other end of the spectrum, arguing that many individuals who may value government and nonprofit services and legal protections fail to …


Humans Forget, Machines Remember: Artificial Intelligence And The Right To Be Forgotten, Tiffany Li, Eduard Fosch Villaronga, Peter Kieseberg Apr 2018

Humans Forget, Machines Remember: Artificial Intelligence And The Right To Be Forgotten, Tiffany Li, Eduard Fosch Villaronga, Peter Kieseberg

Faculty Scholarship

To understand the Right to be Forgotten in context of artificial intelligence, it is necessary to first delve into an overview of the concepts of human and AI memory and forgetting. Our current law appears to treat human and machine memory alike – supporting a fictitious understanding of memory and forgetting that does not comport with reality. (Some authors have already highlighted the concerns on the perfect remembering.) This Article will examine the problem of AI memory and the Right to be Forgotten, using this example as a model for understanding the failures of current privacy law to reflect the …


Techno-Policing, I. Bennett Capers Apr 2018

Techno-Policing, I. Bennett Capers

Faculty Scholarship

No abstract provided.


Privacy, Press, And The Right To Be Forgotten In The United States, Amy Gajda Mar 2018

Privacy, Press, And The Right To Be Forgotten In The United States, Amy Gajda

Faculty Scholarship

No abstract provided.


Risk And Anxiety: A Theory Of Data Breach Harms, Danielle K. Citron, Daniel Solove Mar 2018

Risk And Anxiety: A Theory Of Data Breach Harms, Danielle K. Citron, Daniel Solove

Faculty Scholarship

In lawsuits about data breaches, the issue of harm has confounded courts. Harm is central to whether plaintiffs have standing to sue in federal court and whether their claims are viable. Plaintiffs have argued that data breaches create a risk of future injury from identity theft or fraud and that breaches cause them to experience anxiety about this risk. Courts have been reaching wildly inconsistent conclusions on the issue of harm, with most courts dismissing data breach lawsuits for failure to allege harm. A sound and principled approach to harm has yet to emerge, resulting in a lack of consensus …


Sfr Inv.'S Pool 1, Llc V. First Horizon Home Loans, 134 Nev. Adv. Op. 4 (Feb. 1, 2018), Brendan Mcleod Feb 2018

Sfr Inv.'S Pool 1, Llc V. First Horizon Home Loans, 134 Nev. Adv. Op. 4 (Feb. 1, 2018), Brendan Mcleod

Nevada Supreme Court Summaries

The Court determined that, under provisions of NRS 116.31162, when an HOA records a notice of a foreclosure sale, any subsequent buyer who purchases the property is subject to that notice that a foreclosure may be imminent.


Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick Jan 2018

Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick

All Faculty Scholarship

Across the Internet, mistaken and malicious routing announcements impose significant costs on users and network operators. To make routing announcements more reliable and secure, Internet coordination bodies have encouraged network operators to adopt the Resource Public Key Infrastructure (“RPKI”) framework. Despite this encouragement, RPKI’s adoption rates are low, especially in North America.

This report presents the results of a year-long investigation into the hypothesis—widespread within the network operator community—that legal issues pose barriers to RPKI adoption and are one cause of the disparities between North America and other regions of the world. On the basis of interviews and analysis of …


Planet Netsweeper, Jakub Dalek, Lex Gill, Bill Marczak, Sarah Mckune, Naser Noor, Joshua Oliver, Jonathon Penney, Adam Senft, Ronald Deibert Jan 2018

Planet Netsweeper, Jakub Dalek, Lex Gill, Bill Marczak, Sarah Mckune, Naser Noor, Joshua Oliver, Jonathon Penney, Adam Senft, Ronald Deibert

Reports & Public Policy Documents

Internet filtering technologies play a critical role in shaping access to information online. Whether we are connecting to the Internet from our homes, coffee shops, libraries, or places of work, software that inspects, manages, and/or blocks our communications has become commonplace. When used at the level of large, consumer-facing Internet Service Providers (ISPs), Internet filtering technologies can have significant human rights impacts. A growing number of governments employ Internet filtering systems at this scale in order to undertake national-level censorship of the Internet. Filtered content ranges from pornography, hate speech, and speech promoting or inciting violence, to political opposition websites, …


Tactful Inattention: Erving Goffman, Privacy In The Digital Age, And The Virtue Of Averting One's Eyes, Elizabeth De Armond Jan 2018

Tactful Inattention: Erving Goffman, Privacy In The Digital Age, And The Virtue Of Averting One's Eyes, Elizabeth De Armond

All Faculty Scholarship

No abstract provided.


Microsoft Ireland, The Cloud Act, And International Lawmaking 2.0, Jennifer Daskal Jan 2018

Microsoft Ireland, The Cloud Act, And International Lawmaking 2.0, Jennifer Daskal

Articles in Law Reviews & Other Academic Journals

On March 23, President Trump signed the CLOUD Act, 1 thereby mooting one of the most closely watched Supreme Court cases this term: the Microsoft Ireland case. 2 This essay examines these extraordinary and fast-moving developments, explaining how the Act resolves the Supreme Court case and addresses the complicated questions of jurisdiction over data in the cloud. The developments represent a classic case of international lawmaking via domestic regulation, as mediated by major multinational corporations that manage so much of the world's data.


Ferpa Close-Up: When Video Captures Violence And Injury, Richard J. Peltz-Steele, Kitty L. Cone Jan 2018

Ferpa Close-Up: When Video Captures Violence And Injury, Richard J. Peltz-Steele, Kitty L. Cone

Faculty Publications

Federal privacy law is all to often misconstrued or perverted to preclude the disclosure of video recordings that capture students victimized by violent crime or tortious injury. This misuse of federal law impedes transparency and accountability and, in many cases, even jeopardizes the health, safety, and lives of children. When properly construed, however, federal law is no bar to disclosure and, at least in public schools, works in tandem with freedom of information laws to ensure disclosure. This Article posits that without unequivocal guidance from federal administrative authorities, uncertainty regarding the disclosure of such recordings will continue to linger, jeopardizing …


Sexual Privacy, Danielle Keats Citron Jan 2018

Sexual Privacy, Danielle Keats Citron

Faculty Scholarship

Those who wish to control and expose the identities of women and people from marginalized communities routinely do so by invading their privacy. People are secretly recorded in bedrooms and public bathrooms, and “up their skirts.” They are coerced into sharing nude photographs and filming sex acts under the threat of public disclosure of their nude images. People’s nude images are posted online without permission. Machine-learning technology is used to create digitally manipulated “deep fake” sex videos that swap people’s faces into pornography.

At the heart of these abuses is an invasion of sexual privacy—the behaviors and expectations that manage …


Reading Reflection Privacy And Security, Paul Sujith Rayi Jan 2018

Reading Reflection Privacy And Security, Paul Sujith Rayi

School of Information Studies - Post-doc and Student Scholarship

No abstract provided.


Bulk Biometric Metadata Collection, Margaret Hu Jan 2018

Bulk Biometric Metadata Collection, Margaret Hu

Scholarly Articles

Smart police body cameras and smart glasses worn by law enforcement increasingly reflect state-of-the-art surveillance technology, such as the integration of live-streaming video with facial recognition and artificial intelligence tools, including automated analytics. This Article explores how these emerging cybersurveillance technologies risk the potential for bulk biometric metadata collection. Such collection is likely to fall outside the scope of the types of bulk metadata collection protections regulated by the USA FREEDOM Act of 2015. The USA FREEDOM Act was intended to bring the practice of bulk telephony metadata collection conducted by the National Security Agency (“NSA”) under tighter regulation. In …


Borders And Bits, Jennifer Daskal Jan 2018

Borders And Bits, Jennifer Daskal

Articles in Law Reviews & Other Academic Journals

Our personal data is everywhere and anywhere, moving across national borders in ways that defy normal expectations of how things and people travel from Point A to Point B. Yet, whereas data transits the globe without any intrinsic ties to territory, the governments that seek to access or regulate this data operate with territorial-based limits. This Article tackles the inherent tension between how governments and data operate, the jurisdictional conflicts that have emerged, and the power that has been delegated to the multinational corporations that manage our data across borders as a result. It does so through the lens of …


Protecting Consumer Data Privacy With Arbitration, Erin O'Hara O'Connor Jan 2018

Protecting Consumer Data Privacy With Arbitration, Erin O'Hara O'Connor

Scholarly Publications

No abstract provided.


Is It Time For A Universal Genetic Forensic Database?, J. W. Hazel, Ellen Wright Clayton, B. A. Malin, Christopher Slobogin Jan 2018

Is It Time For A Universal Genetic Forensic Database?, J. W. Hazel, Ellen Wright Clayton, B. A. Malin, Christopher Slobogin

Vanderbilt Law School Faculty Publications

The ethical objections to mandating forensic profiling of newborns and/or compelling every citizen or visitor to submit to a buccal swab or to spit in a cup when they have done nothing wrong are not trivial. But newborns are already subject to compulsory medical screening, and people coming from foreign countries to the United States already submit to fingerprinting. It is also worth noting that concerns about coercion or invasions of privacy did not give pause to legislatures (or, for that matter, even the European Court) when authorizing compelled DNA sampling from arrestees, who should not forfeit genetic privacy interests …


Who Knows What, And When?: A Survey Of The Privacy Policies Proffered By U.S. Direct-To-Consumer Genetic Testing Companies, Christopher Slobogin, James W. Hazel Jan 2018

Who Knows What, And When?: A Survey Of The Privacy Policies Proffered By U.S. Direct-To-Consumer Genetic Testing Companies, Christopher Slobogin, James W. Hazel

Vanderbilt Law School Faculty Publications

Direct-to-consumer genetic testing (DTC-GT) companies have proliferated in the past several years. Based on an analysis of genetic material submitted by consumers, these companies offer a wide array of services, ranging from providing information about health and ancestry to identification of surreptitiously-gatheredb iological materials ent in by suspicious spouses. Federal and state laws are ambiguous about the types of disclosures these companies must make about how the genetic information they obtain is collected, used, and shared. In an effort to assist in developing such laws, this Article reports a survey of the privacy policies these companies purport to follow. It …