Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Privacy Law (16)
- Science and Technology Law (9)
- Internet Law (7)
- Fourth Amendment (6)
- Intellectual Property Law (4)
-
- International Law (4)
- Law and Gender (4)
- Social and Behavioral Sciences (4)
- Communications Law (3)
- Computer Law (3)
- Constitutional Law (3)
- Health Law and Policy (3)
- Law and Society (3)
- Antitrust and Trade Regulation (2)
- Civil Law (2)
- Civil Procedure (2)
- Economics (2)
- Family Law (2)
- International Trade Law (2)
- Law and Economics (2)
- Legislation (2)
- State and Local Government Law (2)
- Supreme Court of the United States (2)
- Administrative Law (1)
- Business (1)
- Business Organizations Law (1)
- Civil Rights and Discrimination (1)
- Commercial Law (1)
- Comparative and Foreign Law (1)
- Institution
-
- American University Washington College of Law (4)
- Boston University School of Law (4)
- George Washington University Law School (3)
- William & Mary Law School (3)
- Roger Williams University (2)
-
- University of Washington School of Law (2)
- Vanderbilt University Law School (2)
- Bridgewater College (1)
- Butler University (1)
- Columbia Law School (1)
- Florida A&M University College of Law (1)
- Fordham Law School (1)
- Georgetown University Law Center (1)
- Maurer School of Law: Indiana University (1)
- Northern Illinois University (1)
- SJ Quinney College of Law, University of Utah (1)
- University of Colorado Law School (1)
- University of Florida Levin College of Law (1)
- University of Georgia School of Law (1)
- University of Maine School of Law (1)
- University of Michigan Law School (1)
- University of Pittsburgh School of Law (1)
- University of Tennessee College of Law (1)
- Washington University in St. Louis (1)
- Yeshiva University, Cardozo School of Law (1)
- Publication
-
- Faculty Scholarship (6)
- Articles (3)
- Faculty Publications (3)
- GW Law Faculty Publications & Other Works (3)
- Joint PIJIP/TLS Research Paper Series (3)
-
- Scholarly Works (2)
- School of Law Conferences, Lectures & Events (2)
- Vanderbilt Law School Faculty Publications (2)
- Articles by Maurer Faculty (1)
- Articles in Law Reviews & Other Academic Journals (1)
- Book Chapters (1)
- Georgetown Law Faculty Publications and Other Works (1)
- Graduate Scholarship and Professional Work (1)
- Honors Projects (1)
- Journal Publications (1)
- Law & Economics Working Papers (1)
- Northern Illinois Law Review Supplement (1)
- Popular Media (1)
- Publications (1)
- Scholarship@WashULaw (1)
- UF Law Faculty Publications (1)
- Utah Law Faculty Scholarship (1)
Articles 1 - 30 of 38
Full-Text Articles in Law
Defragging Feminist Cyberlaw, Amanda Levendowski
Defragging Feminist Cyberlaw, Amanda Levendowski
Georgetown Law Faculty Publications and Other Works
In 1996, Judge Frank Easterbrook famously observed that any effort to create a field called cyberlaw would be “doomed to be shallow and miss unifying principles.” He was wrong, but not for the reason other scholars have stated. Feminism is a unifying principle of cyberlaw, which alternately amplifies and abridges the feminist values of consent, safety, and accessibility. Cyberlaw simply hasn’t been understood that way—until now.
In computer science, “defragging” means bringing together disparate pieces of data so they are easier to access. Inspired by that process, this Article offers a new approach to cyberlaw that illustrates how feminist values …
Wrong Search At The Wrong Time: Keyword Search Warrants And The Fourth Amendment, Nicole Chan
Wrong Search At The Wrong Time: Keyword Search Warrants And The Fourth Amendment, Nicole Chan
Articles
This Note will advocate for the view that when presented with the issue, state and federal courts should establish that keyword search warrants are unconstitutional because they violate the Fourth Amendment. Keyword search warrants cannot meet the Fourth Amendment’s requirements of probable cause and particularity because the subjects of the search cannot be identified until after the search is completed. These warrants are unnecessary and have the potential of implicating millions of internet users who have no connection to a crime. This Note will contend that individuals have a reasonable expectation of privacy in their search history data, and that …
Continuous Reproductive Surveillance, Michael Ulrich, Leah R. Fowler
Continuous Reproductive Surveillance, Michael Ulrich, Leah R. Fowler
Faculty Scholarship
The Dobbs opinion emphasizes that the state’s interest in the fetus extends to “all stages of development.” This essay briefly explores whether state legislators, agencies, and courts could use the “all stages of development” language to expand reproductive surveillance by using novel developments in consumer health technologies to augment those efforts.
A Trusted Framework For Cross-Border Data Flows, Alex Joel
A Trusted Framework For Cross-Border Data Flows, Alex Joel
Joint PIJIP/TLS Research Paper Series
The German Marshall Fund of the United States (GMF), in cooperation with the Tech, Law and Security Program (TLS) of the American University Washington College of Law, and with support from Microsoft, convened a Global Taskforce to Promote Trusted Sharing of Data comprising experts from civil society, academia, and industry to submit proposals for harmonizing approaches to global data use and sharing. Former US Ambassador to the Organisation for Economic Co-operation and Development (OECD) and GMF Distinguished Fellow Karen Kornbluh and Microsoft Chief Privacy Officer and Corporate Vice President Julie Brill co-chaired the taskforce; TLS Senior Project Director Alex Joel …
Two Visions Of Digital Sovereignty, Sujit Raman
Two Visions Of Digital Sovereignty, Sujit Raman
Joint PIJIP/TLS Research Paper Series
No abstract provided.
Valuing Social Data, Amanda Parsons, Salomé Viljoen
Valuing Social Data, Amanda Parsons, Salomé Viljoen
Law & Economics Working Papers
Social data production is a unique form of value creation that characterizes informational capitalism. Social data production also presents critical challenges for the various legal regimes that are encountering it. This Article provides legal scholars and policymakers with the tools to comprehend this new form of value creation through two descriptive contributions. First, it presents a theoretical account of social data, a mode of production which is cultivated and exploited for two distinct (albeit related) forms of value: prediction value and exchange value. Second, it creates and defends a taxonomy of three “scripts” that companies follow to build up and …
Office Of Attorney General Peter F. Neronha, Attorney General: Access To Public Records Act, Open Meetings Act, Attorney General, State Of Rhode Island, Roger Williams University School Of Law
Office Of Attorney General Peter F. Neronha, Attorney General: Access To Public Records Act, Open Meetings Act, Attorney General, State Of Rhode Island, Roger Williams University School Of Law
School of Law Conferences, Lectures & Events
No abstract provided.
25th Annual Open Government Summit: Your Guide To The Access To Public Records Act & Open Meetings Act, Peter F. Neronha, Roger Williams University School Of Law
25th Annual Open Government Summit: Your Guide To The Access To Public Records Act & Open Meetings Act, Peter F. Neronha, Roger Williams University School Of Law
School of Law Conferences, Lectures & Events
No abstract provided.
Administrative Regulation Of Programmatic Policing: Why "Leaders Of A Beautiful Struggle" Is Both Right And Wrong, Christopher Slobogin
Administrative Regulation Of Programmatic Policing: Why "Leaders Of A Beautiful Struggle" Is Both Right And Wrong, Christopher Slobogin
Vanderbilt Law School Faculty Publications
In Leaders of a Beautiful Struggle v. Baltimore Police Department, the Fourth Circuit Court of Appeals held that Aerial Investigation Research (AIR), Baltimore's aerial surveillance program, violated the Fourth Amendment because it was not authorized by a warrant. AIR was constitutionaly problematic, but not for the reason given by the Fourth Circuit. AIR, like many other technologically-enhanced policing programs that rely on closed-circuit television (CCTV), automated license plate readers and the like, involves the collection and retention of information about huge numbers ofpeople. Because individualized suspicion does not exist with respect to any of these people's information, an individual-specific warrant …
National Telecommunications And Information Administration: Comments From Researchers At Boston University And The University Of Chicago, Ran Canetti, Aloni Cohen, Chris Conley, Mark Crovella, Stacey Dogan, Marco Gaboardi, Woodrow Hartzog, Rory Van Loo, Christopher Robertson, Katharine B. Silbaugh
National Telecommunications And Information Administration: Comments From Researchers At Boston University And The University Of Chicago, Ran Canetti, Aloni Cohen, Chris Conley, Mark Crovella, Stacey Dogan, Marco Gaboardi, Woodrow Hartzog, Rory Van Loo, Christopher Robertson, Katharine B. Silbaugh
Faculty Scholarship
These comments were composed by an interdisciplinary group of legal, computer science, and data science faculty and researchers at Boston University and the University of Chicago. This group collaborates on research projects that grapple with the legal, policy, and ethical implications of the use of algorithms and digital innovation in general, and more specifically regarding the use of online platforms, machine learning algorithms for classification, prediction, and decision making, and generative AI. Specific areas of expertise include the functionality and impact of recommendation systems; the development of Privacy Enhancing Technologies (PETs) and their relationship to privacy and data security laws; …
Femtechnodystopia, Leah R. Fowler, Michael Ulrich
Femtechnodystopia, Leah R. Fowler, Michael Ulrich
Faculty Scholarship
Reproductive rights, as we have long understood them, are dead. But at the same time history seems to be moving backward, technology moves relentlessly forward. Femtech products, a category of consumer technology addressing an array of “female” health needs, seem poised to fill gaps created by states and stakeholders eager to limit birth control and abortion access and increase pregnancy surveillance and fetal rights. Period and fertility tracking applications could supplement or replace other contraception. Early digital alerts to missed periods can improve the chances of obtaining a legal abortion in states with ever-shrinking windows of availability or prompt behavioral …
On The Danger Of Not Understanding Technology, Fredric I. Lederer
On The Danger Of Not Understanding Technology, Fredric I. Lederer
Popular Media
No abstract provided.
Are Third Parties Creating A Loophole For Police Investigations?, Alexandria N. Short
Are Third Parties Creating A Loophole For Police Investigations?, Alexandria N. Short
Northern Illinois Law Review Supplement
This article discusses the current case law and statutory law related to the privacy of information collected by third parties. At times, we see the private sector and law enforcement working together to solve crimes. However, that may not always be a good thing. This article offers a solution to these problems of uncertainty by suggesting a uniform code to regulate the private sector, or, in the alternative, a change to the Fourth Amendment that encompasses a more modern interpretation of the information that law enforcement should have access to.
Necessity, Proportionality, And Executive Order 14086, Alex Joel
Necessity, Proportionality, And Executive Order 14086, Alex Joel
Joint PIJIP/TLS Research Paper Series
No abstract provided.
A Game Theoretic Approach To Balance Privacy Risks And Familial Benefits, Ellen W. Clayton, Jia Guo, Murat Kantarcioglu, Et Al.
A Game Theoretic Approach To Balance Privacy Risks And Familial Benefits, Ellen W. Clayton, Jia Guo, Murat Kantarcioglu, Et Al.
Vanderbilt Law School Faculty Publications
As recreational genomics continues to grow in its popularity, many people are afforded the opportunity to share their genomes in exchange for various services, including third-party interpretation (TPI) tools, to understand their predisposition to health problems and, based on genome similarity, to find extended family members. At the same time, these services have increasingly been reused by law enforcement to track down potential criminals through family members who disclose their genomic information. While it has been observed that many potential users shy away from such data sharing when they learn that their privacy cannot be assured, it remains unclear how …
Confused About Copyright?, Sara Anne Hook
Confused About Copyright?, Sara Anne Hook
Graduate Scholarship and Professional Work
No abstract provided.
Who Owns Data? Constitutional Division In Cyberspace, Dongsheng Zang
Who Owns Data? Constitutional Division In Cyberspace, Dongsheng Zang
Articles
Privacy emerged as a concern as soon as the internet became commercial. In early 1995, Lawrence Lessig warned that the internet, though giving us extraordinary potential, was “not designed to protect individuals against this extraordinary potential for others to abuse.” The same technology can “destroy the very essence of what now defines individuality.” Lessig urged that “a constitutional balance will have to be drawn between these increasingly important interests in privacy, and the competing interest in collective security.” Lessig envisioned that creating property rights in data would help individuals by giving them control of their data. As utopian as property …
Privacy And Property: Constitutional Concerns Of Dna Dragnet Testing, E. Wyatt Jones
Privacy And Property: Constitutional Concerns Of Dna Dragnet Testing, E. Wyatt Jones
Honors Projects
DNA dragnets have attracted both public and scholarly criticisms that have yet to be resolved by the Courts. This review will introduce a modern understanding of DNA analysis, a complete introduction to past and present Fourth and Fourteenth Amendment jurisprudence, and existing suggestions concerning similar issues in legal scholarship. Considering these contexts, this review concludes that a focus on privacy and property at once, with a particular sensitivity to the inseverable relationship between the two interests, is Constitutionally consistent with precedent and the most workable means of answering the question at hand.
Technology Integration In Higher Education And Student Privacy Beyond Learning Environments -- A Comparison Of The Uk And Us Perspective, Iria Giuffrida, Alex Hall
Technology Integration In Higher Education And Student Privacy Beyond Learning Environments -- A Comparison Of The Uk And Us Perspective, Iria Giuffrida, Alex Hall
Faculty Publications
Technology integration in higher education (HE) has brought immense innovation. While research is investigating the benefits of leveraging, through learning analytics, the data created by the greater presence of technology in HE, it is also analysing the privacy implications of vast universes of data now at the fingertips of HE administrators. This paper argues that student privacy challenges linked to technology integration occur not only within but also beyond learning environments, namely at the enterprise level. By analysing the UK and US legal frameworks surrounding how HE institutions respond to parents demanding disclosure of their adult children's personal data in …
Governing Smart Cities As Knowledge Commons - Introduction, Chapter 1 & Conclusion, Brett M. Frischmann, Michael J. Madison, Madelyn Sanfilippo
Governing Smart Cities As Knowledge Commons - Introduction, Chapter 1 & Conclusion, Brett M. Frischmann, Michael J. Madison, Madelyn Sanfilippo
Book Chapters
Smart city technology has its value and its place; it isn’t automatically or universally harmful. Urban challenges and opportunities addressed via smart technology demand systematic study, examining general patterns and local variations as smart city practices unfold around the world. Smart cities are complex blends of community governance institutions, social dilemmas that cities face, and dynamic relationships among information and data, technology, and human lives. Some of those blends are more typical and common. Some are more nuanced in specific contexts. This volume uses the Governing Knowledge Commons (GKC) framework to sort out relevant and important distinctions. The framework grounds …
The Tesla Meets The Fourth Amendment, Adam M. Gershowitz
The Tesla Meets The Fourth Amendment, Adam M. Gershowitz
Faculty Publications
Can police search a smart car’s computer without a warrant? Although the Supreme Court banned warrantless searches of cell phones incident to arrest in Riley v. California, the Court left the door open for warrantless searches under other exceptions to the warrant requirement. This is the first article to argue that the Fourth Amendment’s automobile exception currently permits the police to warrantlessly dig into a vehicle’s computer system and extract vast amounts of cell phone data. Just as the police can rip open seats or slash tires to search for drugs under the automobile exception, the police can warrantlessly …
Privacy And National Politics: Fingerprint And Dna Litigation In Japan And The United States Compared, Dongsheng Zang
Privacy And National Politics: Fingerprint And Dna Litigation In Japan And The United States Compared, Dongsheng Zang
Articles
Drawing cases from two related areas of law-fingerprint and DNA (deoxyribonucleic acid) data-this Article proposes a modified framework, built on the Balkin-Levinson emphasis on national politics: First, national politics understood as partisan rivalry cannot account for what I call doctrinal lock-in in this Article, where I will demonstrate that in different stages of American politics-the Lochner era, the New Deal era, and Civil Rights era-courts across the nation ruled predominantly in favor of public data collectors-state and federal law enforcement in fingerprint cases. From the 1990s, when DNA data became hot targets of law enforcement, the United States Supreme Court …
Reflections On “Personal Responsibility” After Covid And Dobbs: Doubling Down On Privacy, Susan Frelich Appleton, Laura A. Rosenbury
Reflections On “Personal Responsibility” After Covid And Dobbs: Doubling Down On Privacy, Susan Frelich Appleton, Laura A. Rosenbury
Scholarship@WashULaw
This essay uses lenses of gender, race, marriage, and work to trace understandings of “personal responsibility” in laws, policies, and conversations about public support in the United States over three time periods: (I) the pre-COVID era, from the beginning of the American “welfare state” through the start of the Trump administration; (II) the pandemic years; and (III) the present post-pandemic period. We sought to explore the possibility that COVID and the assistance programs it inspired might have reshaped the notion of personal responsibility and unsettled assumptions about privacy and dependency. In fact, a mixed picture emerges. On the one hand, …
Collective Data Rights And Their Possible Abuse, Asaf Lubin
Collective Data Rights And Their Possible Abuse, Asaf Lubin
Articles by Maurer Faculty
No abstract provided.
Addressing Personal Data Collection As Unfair Methods Of Competition, Maurice E. Stucke
Addressing Personal Data Collection As Unfair Methods Of Competition, Maurice E. Stucke
Scholarly Works
Enforcers, policymakers, scholars, and the public are concerned about Google, Apple, Facebook, Amazon, and recently Microsoft and their influence. That influence comes in part from personal data. These companies are “data-opolies,” in that they are powerful firms that control our data. The data comes from their vital ecosystems of interlocking online platforms and services, which attract users; sellers; advertisers; website publishers; and software, app, and accessory developers.
The public sentiment is that a few companies, in possessing so much data, possess too much power. Something is amiss. Cutting across political lines, many Americans think Big Tech’s economic power is a …
Brokered Abuse, Thomas E. Kadri
Brokered Abuse, Thomas E. Kadri
Scholarly Works
Data brokers are abuse enablers. These companies, which traffic information about people for profit, facilitate interpersonal abuse by making it easier to find and contact people. By thwarting people’s obscurity, brokers expose them to physical, psychological, financial, and reputational harm. To date, there have been four common legal responses to this situation: prohibiting abusive acts, mandating broker transparency, limiting data collection, and restricting data disclosure. Though these measures each have some merit, none is adequate, and several recent privacy laws have even made matters worse. Put simply, the current legal landscape is neither effective nor empathetic.
This Essay explores the …
The Carpenter Test As A Transformation Of Fourth Amendment Law, Matthew Tokson
The Carpenter Test As A Transformation Of Fourth Amendment Law, Matthew Tokson
Utah Law Faculty Scholarship
For over fifty years, the Fourth Amendment’s scope has been largely dictated by the Katz test, which applies the Amendment’s protections only when the government has violated a person’s “reasonable expectation of privacy.” This vague standard is one of the most criticized doctrines in all of American law, and its lack of coherence has made Fourth Amendment search law notoriously confusing. Things have become even more complex following the Supreme Court’s landmark decision in Carpenter v. United States, which has spawned its own alternative test for determining the Fourth Amendment’s scope. The emerging Carpenter test looks to the revealing nature …
An Essay About Privacy, Ronald Griffin
An Essay About Privacy, Ronald Griffin
Journal Publications
Jessye Norman was an American opera singer. She died on October 1, 2019. On October 2, 2019, my wife got a grim diagnosis that put me in a stupor and reminded me, now more than ever, that my generation (that did so much good in the world) stands in line waiting for the Grim Reaper’s call. In a seventy-years (that have gone by too fast) I have watched my peers run from the realms of privacy, spaces where people implemented life plans uninterrupted by neighbours that were discernible, palpable, and real to everybody, to a realm where there is none. …
Policing "Bad" Mothers, I. Bennett Capers
Policing "Bad" Mothers, I. Bennett Capers
Faculty Scholarship
Jessamine Chan’s The School for Good Mothers — a speculative novel about a mother who abandons her child for a few hours and is required to attend a school for good mothers to regain custody — may not be a great book, but it is a good yarn, and a page turner, and thought-provoking. Thought-provoking, because to measure her fitness to be a mother, the protagonist is assigned a robot doppelganger of her child — one that is sentient, one that seems almost real, one that might even pass the Turing test, and one that she is required not only …
Privacy Implications Of Central Bank Digital Currency, Jiaying Jiang
Privacy Implications Of Central Bank Digital Currency, Jiaying Jiang
UF Law Faculty Publications
One hundred five countries, representing over 95 percent of global GDP, are exploring central bank digital currencies (CBDCs), a new form of digital money that is different from privately issued cryptocurrencies and stablecoins. As central banks worldwide grapple with CBDC design options, privacy has become a critical feature and concern. Many central banks, government agencies, NGOs, think tanks, and even the general public have already addressed the importance of privacy and called for privacy in CBDC systems. Some economists, computer scientists, engineers, and legal scholars have already moved forward to design a privacy-preserving CBDC.
However, when addressing the importance and …