Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

2018

Privacy

Discipline
Institution
Publication

Articles 1 - 30 of 31

Full-Text Articles in Law

Privacy's Double Standards: Public Disclosure Tort Case Chart (2006-2016), Scott Skinner-Thompson Dec 2018

Privacy's Double Standards: Public Disclosure Tort Case Chart (2006-2016), Scott Skinner-Thompson

Research Data

This document, Privacy's Double Standards: Public Disclosure Tort Case Chart (2006-2016), 93 Wash. L. Rev. Online 2051 (2018), https://www.law.uw.edu/wlr/online-edition/scott-skinner-thompson, was published as an electronic supplement to the empirical study, Scott Skinner-Thompson, Privacy’s Double Standards, 93 Wash. L. Rev. 2051 (2018), available at https://scholar.law.colorado.edu/articles/1218/.


Revenge Porn, Thomas Lonardo, Tricia P. Martland, Rhode Island Bar Journal Nov 2018

Revenge Porn, Thomas Lonardo, Tricia P. Martland, Rhode Island Bar Journal

Life of the Law School (1993- )

No abstract provided.


A Poor Mother's Right To Privacy: A Review, Danielle K. Citron Sep 2018

A Poor Mother's Right To Privacy: A Review, Danielle K. Citron

Faculty Scholarship

Collecting personal data is a feature of daily life. Businesses, advertisers, agencies, and law enforcement amass massive reservoirs of our personal data. This state of affairs—what I am calling the “collection imperative”—is justified in the name of efficiency, convenience, and security. The unbridled collection of personal data, meanwhile, leads to abuses. Public and private entities have disproportionate power over individuals and groups whose information they have amassed. Nowhere is that power disparity more evident than for the state’s surveillance of the indigent. Poor mothers, in particular, have vanishingly little privacy. Whether or not poor mothers receive subsidized ...


20th Annual Open Government Summit: Access To Public Records Act And Open Meetings Act, 2018, Department Of Attorney General, State Of Rhode Island Jul 2018

20th Annual Open Government Summit: Access To Public Records Act And Open Meetings Act, 2018, Department Of Attorney General, State Of Rhode Island

School of Law Conferences, Lectures & Events

10


Technology Regulation By Default: Platforms, Privacy, And The Cfpb, Rory Van Loo Jul 2018

Technology Regulation By Default: Platforms, Privacy, And The Cfpb, Rory Van Loo

Faculty Scholarship

In the absence of a technology-focused regulator, diverse administrative agencies have been forced to develop regulatory models for governing their sphere of the data economy. These largely uncoordinated efforts offer a laboratory of regulatory experimentation on governance architecture. This symposium essay explores what the Consumer Financial Protection Bureau (CFPB) has done in its first several years to regulate financial technology (“fintech”), in the context of broader technology-related concerns identified in the literature. It begins with a survey of what the CFPB has undertaken using more traditional administrative agency tools—enforcement and rulemaking—in areas such as privacy, consumer control over ...


Rwu First Amendment Blog: David Logan's Blog: Discovering Trump 06-22-2018, David A. Logan Jun 2018

Rwu First Amendment Blog: David Logan's Blog: Discovering Trump 06-22-2018, David A. Logan

Law School Blogs

No abstract provided.


Constitutional Shapeshifting: Giving The Fourth Amendment Substance In The Technology Driven World Of Criminal Investigation, Gerald S. Reamey Jun 2018

Constitutional Shapeshifting: Giving The Fourth Amendment Substance In The Technology Driven World Of Criminal Investigation, Gerald S. Reamey

Faculty Articles

For the first hundred years of the Fourth Amendment's life, gains in the technology of surveillance were modest. With the advent of miniaturization and ever-increasing sophistication and capability of surveillance and detection devices, the Supreme Court has struggled to adapt its understanding of "search" to the constantly evolving devices and methods that challenge contemporary understanding of privacy. In response to surveillance innovations, the Court has taken varying positions, focusing first on property-based intrusions by government, then shifting to privacy expectations, and, more recently, resurrecting the view that a trespass to property can define search.

This article surveys this constitutional ...


We’Ve Come A Long Way (Baby)! Or Have We? Evolving Intellectual Freedom Issues In The Us And Florida, L. Bryan Cooper, A.D. Beman-Cavallaro May 2018

We’Ve Come A Long Way (Baby)! Or Have We? Evolving Intellectual Freedom Issues In The Us And Florida, L. Bryan Cooper, A.D. Beman-Cavallaro

Works of the FIU Libraries

This paper analyzes a shifting landscape of intellectual freedom (IF) in and outside Florida for children, adolescents, teens and adults. National ideals stand in tension with local and state developments, as new threats are visible in historical, legal, and technological context. Examples include doctrinal shifts, legislative bills, electronic surveillance and recent attempts to censor books, classroom texts, and reading lists.

Privacy rights for minors in Florida are increasingly unstable. New assertions of parental rights are part of a larger conservative animus. Proponents of IF can identify a lessening of ideals and standards that began after doctrinal fruition in the 1960s ...


Corporate Social Responsibility And Social Media Corporations: Incorporating Human Rights Through Rankings, Self-Regulation And Shareholder Resolutions, Erika George Apr 2018

Corporate Social Responsibility And Social Media Corporations: Incorporating Human Rights Through Rankings, Self-Regulation And Shareholder Resolutions, Erika George

Utah Law Faculty Scholarship

This article examines the emergence and evolution of selected ranking and reporting frameworks in the expanding realm of business and human rights advocacy. It explores how indicators in the form of rankings and reports evaluating the conduct of transnational corporate actors can serve as regulatory tools with potential to bridge a global governance gap that often places human rights at risk. This article examines the relationship of transnational corporations in the Internet communications technology sector (ICT sector) to human rights and the risks presented to the right to freedom of expression and the right to privacy when ICT sector companies ...


Humans Forget, Machines Remember: Artificial Intelligence And The Right To Be Forgotten, Tiffany Li, Eduard Fosch Villaronga, Peter Kieseberg Apr 2018

Humans Forget, Machines Remember: Artificial Intelligence And The Right To Be Forgotten, Tiffany Li, Eduard Fosch Villaronga, Peter Kieseberg

Faculty Scholarship

To understand the Right to be Forgotten in context of artificial intelligence, it is necessary to first delve into an overview of the concepts of human and AI memory and forgetting. Our current law appears to treat human and machine memory alike – supporting a fictitious understanding of memory and forgetting that does not comport with reality. (Some authors have already highlighted the concerns on the perfect remembering.) This Article will examine the problem of AI memory and the Right to be Forgotten, using this example as a model for understanding the failures of current privacy law to reflect the realities ...


Risk And Anxiety: A Theory Of Data Breach Harms, Danielle K. Citron, Daniel Solove Mar 2018

Risk And Anxiety: A Theory Of Data Breach Harms, Danielle K. Citron, Daniel Solove

Faculty Scholarship

In lawsuits about data breaches, the issue of harm has confounded courts. Harm is central to whether plaintiffs have standing to sue in federal court and whether their claims are viable. Plaintiffs have argued that data breaches create a risk of future injury from identity theft or fraud and that breaches cause them to experience anxiety about this risk. Courts have been reaching wildly inconsistent conclusions on the issue of harm, with most courts dismissing data breach lawsuits for failure to allege harm. A sound and principled approach to harm has yet to emerge, resulting in a lack of consensus ...


Is It Time For A Universal Genetic Forensic Database?, Christopher Slobogin, Ellen Wright Clayton, J. W. Hazel, B. A. Malin Jan 2018

Is It Time For A Universal Genetic Forensic Database?, Christopher Slobogin, Ellen Wright Clayton, J. W. Hazel, B. A. Malin

Vanderbilt Law School Faculty Publications

The ethical objections to mandating forensic profiling of newborns and/or compelling every citizen or visitor to submit to a buccal swab or to spit in a cup when they have done nothing wrong are not trivial. But newborns are already subject to compulsory medical screening, and people coming from foreign countries to the United States already submit to fingerprinting. It is also worth noting that concerns about coercion or invasions of privacy did not give pause to legislatures (or, for that matter, even the European Court) when authorizing compelled DNA sampling from arrestees, who should not forfeit genetic privacy ...


Ferpa Close-Up: When Video Captures Violence And Injury, Richard J. Peltz-Steele, Kitty L. Cone Jan 2018

Ferpa Close-Up: When Video Captures Violence And Injury, Richard J. Peltz-Steele, Kitty L. Cone

Faculty Publications

Federal privacy law is all to often misconstrued or perverted to preclude the disclosure of video recordings that capture students victimized by violent crime or tortious injury. This misuse of federal law impedes transparency and accountability and, in many cases, even jeopardizes the health, safety, and lives of children. When properly construed, however, federal law is no bar to disclosure and, at least in public schools, works in tandem with freedom of information laws to ensure disclosure. This Article posits that without unequivocal guidance from federal administrative authorities, uncertainty regarding the disclosure of such recordings will continue to linger, jeopardizing ...


The Gdpr’S Version Of Algorithmic Accountability, Margot Kaminski Jan 2018

The Gdpr’S Version Of Algorithmic Accountability, Margot Kaminski

Articles

No abstract provided.


Data Collection, Ehrs, And Poverty Determinations, Craig Konnoth Jan 2018

Data Collection, Ehrs, And Poverty Determinations, Craig Konnoth

Articles

Collecting and deploying poverty-related data is an important starting point for leveraging data regarding social determinants of health in precision medicine. However, we must rethink how we collect and deploy such data. Current modes of collection yield imprecise data that is unsuited for research. Better data can be collected by cross-referencing other sources such as employers and public benefit programs, and by incentivizing and encouraging patients and providers to provide more accurate information. Data thus collected can be used to provide appropriate individual-level clinical and non-clinical care, and to systematically determine what share of social resources healthcare should consume.


Criminal Employment Law, Benjamin Levin Jan 2018

Criminal Employment Law, Benjamin Levin

Articles

This Article diagnoses a phenomenon, “criminal employment law,” which exists at the nexus of employment law and the criminal justice system. Courts and legislatures discourage employers from hiring workers with criminal records and encourage employers to discipline workers for non-work-related criminal misconduct. In analyzing this phenomenon, my goals are threefold: (1) to examine how criminal employment law works; (2) to hypothesize why criminal employment law has proliferated; and (3) to assess what is wrong with criminal employment law. This Article examines the ways in which the laws that govern the workplace create incentives for employers not to hire individuals with ...


Privacy's Double Standards, Scott Skinner-Thompson Jan 2018

Privacy's Double Standards, Scott Skinner-Thompson

Articles

Where the right to privacy exists, it should be available to all people. If not universally available, then privacy rights should be particularly accessible to marginalized individuals who are subject to greater surveillance and are less able to absorb the social costs of privacy violations. But in practice, there is evidence that people of privilege tend to fare better when they bring privacy tort claims than do non-privileged individuals. This disparity occurs despite doctrine suggesting that those who occupy prominent and public social positions are entitled to diminished privacy tort protections.

This Article unearths disparate outcomes in public disclosure tort ...


Equality At Stake: Connecting The Privacy/Vulnerability Cycle To The Debate About Publicly Accessible Online Court Records, Jacquelyn A. Burkell, Jane Bailey Jan 2018

Equality At Stake: Connecting The Privacy/Vulnerability Cycle To The Debate About Publicly Accessible Online Court Records, Jacquelyn A. Burkell, Jane Bailey

FIMS Publications

A considerable amount has been written about the privacy implications of publishing court and tribunal records online. In this article the authors examine the linkages between privacy and vulnerability for members of marginalized communities and, drawing on Calo’s “vicious cycle” of privacy and vulnerability, suggest that publicly accessible online court records represent an equality issue as well. Drawing on social science research and privacy theory, the authors demonstrate the potentially disproportionate effect of online court records on members of marginalized communities. They then examine Canadian case law, legislation and policy that impose restrictions on public disclosure of information from ...


"We Only Spy On Foreigners": The Myth Of A Universal Right To Privacy And The Practice Of Foreign Mass Surveillance, Asaf Lubin Jan 2018

"We Only Spy On Foreigners": The Myth Of A Universal Right To Privacy And The Practice Of Foreign Mass Surveillance, Asaf Lubin

Articles by Maurer Faculty

The digital age brought with it a new epoch in global political life, one neatly coined by Professor Philip Howard as the “pax technica.” In this new world order, government and industry are “tightly bound” in technological and security arrangements that serve to push forward an information and cyber revolution of unparalleled magnitude. While the rise of information technologies tells a miraculous story of triumph over the physical constraints that once shackled mankind, these very technologies are also the cause of grave concern. Intelligence agencies have been recently involved in the exercise of global indiscriminate surveillance, which purports to go ...


Reading Reflection Privacy And Security, Paul Sujith Rayi Jan 2018

Reading Reflection Privacy And Security, Paul Sujith Rayi

School of Information Studies - Post-doc and Student Scholarship

No abstract provided.


Microsoft Ireland, The Cloud Act, And International Lawmaking 2.0, Jennifer Daskal Jan 2018

Microsoft Ireland, The Cloud Act, And International Lawmaking 2.0, Jennifer Daskal

Articles in Law Reviews & Other Academic Journals

On March 23, President Trump signed the CLOUD Act, 1 thereby mooting one of the most closely watched Supreme Court cases this term: the Microsoft Ireland case. 2 This essay examines these extraordinary and fast-moving developments, explaining how the Act resolves the Supreme Court case and addresses the complicated questions of jurisdiction over data in the cloud. The developments represent a classic case of international lawmaking via domestic regulation, as mediated by major multinational corporations that manage so much of the world's data.


Defamation And Privacy In The Social Media Age: What Would Justice Brennan Think?, Stephen Wermiel Jan 2018

Defamation And Privacy In The Social Media Age: What Would Justice Brennan Think?, Stephen Wermiel

Articles in Law Reviews & Other Academic Journals

No abstract provided.


Borders And Bits, Jennifer Daskal Jan 2018

Borders And Bits, Jennifer Daskal

Articles in Law Reviews & Other Academic Journals

Our personal data is everywhere and anywhere, moving across national borders in ways that defy normal expectations of how things and people travel from Point A to Point B. Yet, whereas data transits the globe without any intrinsic ties to territory, the governments that seek to access or regulate this data operate with territorial-based limits. This Article tackles the inherent tension between how governments and data operate, the jurisdictional conflicts that have emerged, and the power that has been delegated to the multinational corporations that manage our data across borders as a result. It does so through the lens of ...


Saving Face: Unfolding The Screen Of Chinese Privacy Law, Tiffany Li, Jill Bronfman, Zhou Zhou Jan 2018

Saving Face: Unfolding The Screen Of Chinese Privacy Law, Tiffany Li, Jill Bronfman, Zhou Zhou

Faculty Scholarship

Privacy is often a subjective value, taking on meaning from specific social, historical, and cultural contexts. Western privacy scholars have so far generally limited academic study to focus on Western ideals of privacy. However, privacy – or some notion of it – can be found in almost every culture and every nation, including the growing economic powerhouse that is the People’s Republic of China. Focusing on China as a case study of non-Western privacy norms is important today, given the rapid rise of the Chinese economy and its corresponding impact on worldwide cultural norms and law. Simply put, it is naïve ...


Four Principles For Digital Expression (You Won't Believe #3!), Danielle K. Citron, Neil Richards Jan 2018

Four Principles For Digital Expression (You Won't Believe #3!), Danielle K. Citron, Neil Richards

Faculty Scholarship

At the dawn of the Internet’s emergence, the Supreme Court rhapsodized about its potential as a tool for free expression and political liberation. In ACLU v. Reno (1997), the Supreme Court adopted a bold vision of Internet expression to strike down a federal law - the Communications Decency Act - that restricted digital expression to forms that were merely “decent.” Far more than the printing press, the Court explained, the mid-90s Internet enabled anyone to become a town crier. Communication no longer required the permission of powerful entities. With a network connection, the powerless had as much luck reaching a mass ...


Tactful Inattention: Erving Goffman, Privacy In The Digital Age, And The Virtue Of Averting One's Eyes, Elizabeth De Armond Jan 2018

Tactful Inattention: Erving Goffman, Privacy In The Digital Age, And The Virtue Of Averting One's Eyes, Elizabeth De Armond

All Faculty Scholarship

No abstract provided.


Innovation And Tradition: A Survey Of Intellectual Property And Technology Legal Clinics, Cynthia L. Dahl, Victoria F. Phillips Jan 2018

Innovation And Tradition: A Survey Of Intellectual Property And Technology Legal Clinics, Cynthia L. Dahl, Victoria F. Phillips

Faculty Scholarship at Penn Law

For artists, nonprofits, community organizations and small-business clients of limited means, securing intellectual property rights and getting counseling involving patent, copyright and trademark law are critical to their success and growth. These clients need expert IP and technology legal assistance, but very often cannot afford services in the legal marketplace. In addition, legal services and state bar pro bono programs have generally been ill-equipped to assist in these more specialized areas. An expanding community of IP and Technology clinics has emerged across the country to meet these needs. But while law review articles have described and examined other sectors of ...


Cancer's Ip, Jacob S. Sherkow Jan 2018

Cancer's Ip, Jacob S. Sherkow

Articles & Chapters

The state of publicly funded science is in peril. Instead, new biomedical research efforts — in particular, the recent funding of a “Cancer Moonshot” — have focused on employing public-private partnerships, joint ventures between private industry and public agencies, as being more politically palatable. Yet, public-private partnerships like the Cancer Moonshot center on the production of public goods: scientific information. Using private incentives in this context presents numerous puzzles for both intellectual property law and information policy. This Article examines whether—and to what extent — intellectual property and information policy can be appropriately tailored to the goals of public-private partnerships. It shows ...


Designing Without Privacy, Ari Ezra Waldman Jan 2018

Designing Without Privacy, Ari Ezra Waldman

Articles & Chapters

In Privacy on the Ground, the law and information scholars Kenneth Bamberger and Deirdre Mulligan showed that empowered chief privacy officers (CPOs) are pushing their companies to take consumer privacy seriously, integrating privacy into the designs of new technologies. But their work was just the beginning of a larger research agenda. CPOs may set policies at the top, but they alone cannot embed robust privacy norms into the corporate ethos, practice, and routine. As such, if we want the mobile apps, websites, robots, and smart devices we use to respect our privacy, we need to institutionalize privacy throughout the corporations ...


Are Anti-Bullying Laws Effective?, Ari Ezra Waldman Jan 2018

Are Anti-Bullying Laws Effective?, Ari Ezra Waldman

Articles & Chapters

Since 2010, when several high profile bullying-related suicides brought bullying and cyberharassment into the national consciousness, all 50 states have passed laws that address bullying among the nation’s youth. This essay is the first in a series of three projects on federal, state, municipal, and individual school approaches to bullying. There are only 4 published studies on the relationships between law and bullying rates. This Essay adds several features to the discourse. It offers a comprehensive analysis of the contents of state anti-bullying laws, using a 16-item list of guidelines from the United States Department of Education as a ...