Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Privacy Law (396)
- Constitutional Law (151)
- Internet Law (133)
- Science and Technology Law (112)
- Fourth Amendment (106)
-
- Law and Society (87)
- First Amendment (82)
- Health Law and Policy (75)
- Intellectual Property Law (70)
- Computer Law (69)
- Social and Behavioral Sciences (67)
- Criminal Law (56)
- Communications Law (45)
- Civil Rights and Discrimination (42)
- Administrative Law (38)
- Law and Gender (37)
- Criminal Procedure (35)
- State and Local Government Law (35)
- Legislation (34)
- International Law (30)
- National Security Law (27)
- Supreme Court of the United States (26)
- Torts (26)
- Family Law (25)
- Human Rights Law (24)
- Civil Procedure (23)
- Consumer Protection Law (23)
- Labor and Employment Law (23)
- Law Enforcement and Corrections (23)
- Institution
-
- Boston University School of Law (113)
- George Washington University Law School (44)
- Roger Williams University (42)
- University of Colorado Law School (37)
- Georgetown University Law Center (36)
-
- University of Florida Levin College of Law (30)
- University of Pennsylvania Carey Law School (30)
- American University Washington College of Law (28)
- Schulich School of Law, Dalhousie University (27)
- University of Maryland Francis King Carey School of Law (23)
- Maurer School of Law: Indiana University (22)
- Fordham Law School (21)
- Vanderbilt University Law School (21)
- New York Law School (19)
- University of Massachusetts School of Law (18)
- University of Michigan Law School (18)
- University of Washington School of Law (16)
- William & Mary Law School (16)
- University of Pittsburgh School of Law (14)
- University of New Hampshire (13)
- Case Western Reserve University School of Law (12)
- University of Kentucky (12)
- University of Tennessee College of Law (12)
- University of Baltimore Law (11)
- University of Missouri School of Law (11)
- Pace University (10)
- University of Richmond (10)
- Chicago-Kent College of Law (9)
- University at Buffalo School of Law (9)
- University of Miami Law School (9)
- Publication Year
- Publication
-
- Faculty Scholarship (174)
- Faculty Publications (66)
- All Faculty Scholarship (52)
- Articles (52)
- GW Law Faculty Publications & Other Works (44)
-
- Georgetown Law Faculty Publications and Other Works (36)
- Publications (36)
- UF Law Faculty Publications (30)
- Journal Articles (26)
- Articles, Book Chapters, & Popular Press (25)
- School of Law Conferences, Lectures & Events (23)
- Articles by Maurer Faculty (22)
- Vanderbilt Law School Faculty Publications (21)
- Articles in Law Reviews & Other Academic Journals (19)
- Scholarly Works (19)
- Articles & Chapters (18)
- Law Faculty Scholarship (15)
- Life of the Law School (1993- ) (13)
- Law Faculty Publications (11)
- Elisabeth Haub School of Law Faculty Publications (9)
- Law Faculty Scholarly Articles (9)
- Scholarship Chronologically (8)
- Utah Law Faculty Scholarship (7)
- Cornell Law Faculty Publications (6)
- Faculty Publications & Other Works (6)
- Joint PIJIP/TLS Research Paper Series (6)
- Law Faculty Articles and Essays (6)
- Book Chapters (5)
- College of Law Faculty Scholarship (5)
- Faculty Articles (5)
Articles 31 - 60 of 900
Full-Text Articles in Law
Privacy And Property: Constitutional Concerns Of Dna Dragnet Testing, E. Wyatt Jones
Privacy And Property: Constitutional Concerns Of Dna Dragnet Testing, E. Wyatt Jones
Honors Projects
DNA dragnets have attracted both public and scholarly criticisms that have yet to be resolved by the Courts. This review will introduce a modern understanding of DNA analysis, a complete introduction to past and present Fourth and Fourteenth Amendment jurisprudence, and existing suggestions concerning similar issues in legal scholarship. Considering these contexts, this review concludes that a focus on privacy and property at once, with a particular sensitivity to the inseverable relationship between the two interests, is Constitutionally consistent with precedent and the most workable means of answering the question at hand.
Technology Integration In Higher Education And Student Privacy Beyond Learning Environments -- A Comparison Of The Uk And Us Perspective, Iria Giuffrida, Alex Hall
Technology Integration In Higher Education And Student Privacy Beyond Learning Environments -- A Comparison Of The Uk And Us Perspective, Iria Giuffrida, Alex Hall
Faculty Publications
Technology integration in higher education (HE) has brought immense innovation. While research is investigating the benefits of leveraging, through learning analytics, the data created by the greater presence of technology in HE, it is also analysing the privacy implications of vast universes of data now at the fingertips of HE administrators. This paper argues that student privacy challenges linked to technology integration occur not only within but also beyond learning environments, namely at the enterprise level. By analysing the UK and US legal frameworks surrounding how HE institutions respond to parents demanding disclosure of their adult children's personal data in …
Governing Smart Cities As Knowledge Commons - Introduction, Chapter 1 & Conclusion, Brett M. Frischmann, Michael J. Madison, Madelyn Sanfilippo
Governing Smart Cities As Knowledge Commons - Introduction, Chapter 1 & Conclusion, Brett M. Frischmann, Michael J. Madison, Madelyn Sanfilippo
Book Chapters
Smart city technology has its value and its place; it isn’t automatically or universally harmful. Urban challenges and opportunities addressed via smart technology demand systematic study, examining general patterns and local variations as smart city practices unfold around the world. Smart cities are complex blends of community governance institutions, social dilemmas that cities face, and dynamic relationships among information and data, technology, and human lives. Some of those blends are more typical and common. Some are more nuanced in specific contexts. This volume uses the Governing Knowledge Commons (GKC) framework to sort out relevant and important distinctions. The framework grounds …
The Tesla Meets The Fourth Amendment, Adam M. Gershowitz
The Tesla Meets The Fourth Amendment, Adam M. Gershowitz
Faculty Publications
Can police search a smart car’s computer without a warrant? Although the Supreme Court banned warrantless searches of cell phones incident to arrest in Riley v. California, the Court left the door open for warrantless searches under other exceptions to the warrant requirement. This is the first article to argue that the Fourth Amendment’s automobile exception currently permits the police to warrantlessly dig into a vehicle’s computer system and extract vast amounts of cell phone data. Just as the police can rip open seats or slash tires to search for drugs under the automobile exception, the police can warrantlessly …
Securing Patent Law, Charles Duan
Securing Patent Law, Charles Duan
Articles in Law Reviews & Other Academic Journals
A vigorous conversation about intellectual property rights and national security has largely focused on the defense role of those rights, as tools for responding to acts of foreign infringement. But intellectual property, and patents in particular, also play an arguably more important offense role. Foreign competitor nations can obtain and assert U.S. patents against U.S. firms and creators. Use of patents as an offense strategy can be strategically coordinated to stymie domestic innovation and technological progress. This Essay considers current and possible future practices of patent exploitation in this offense setting, with a particular focus on China given the nature …
Collective Data Rights And Their Possible Abuse, Asaf Lubin
Collective Data Rights And Their Possible Abuse, Asaf Lubin
Articles by Maurer Faculty
No abstract provided.
Political Advertising In Virtual Reality, Scott P. Bloomberg
Political Advertising In Virtual Reality, Scott P. Bloomberg
Faculty Publications
This Article is about how biometric data collected through VR technologies will greatly exacerbate existing problems with political ad microtargeting. Commercially available VR devices can—and in some cases, must—be integrated with sensors that track users’ eyes, faces, hands, and bodies. Political campaigns will be able to leverage this data to target ads with extraordinary precision. Indeed, targeting ads with biometric data may well be the next step in the evolution of microtargeted political messaging—a practice that has contributed to a rise in disinformation, filter-bubbles, and privacy invasions. If this sounds like science fiction, it is closer than you may think. …
Reflections On “Personal Responsibility” After Covid And Dobbs: Doubling Down On Privacy, Susan Frelich Appleton, Laura A. Rosenbury
Reflections On “Personal Responsibility” After Covid And Dobbs: Doubling Down On Privacy, Susan Frelich Appleton, Laura A. Rosenbury
Scholarship@WashULaw
This essay uses lenses of gender, race, marriage, and work to trace understandings of “personal responsibility” in laws, policies, and conversations about public support in the United States over three time periods: (I) the pre-COVID era, from the beginning of the American “welfare state” through the start of the Trump administration; (II) the pandemic years; and (III) the present post-pandemic period. We sought to explore the possibility that COVID and the assistance programs it inspired might have reshaped the notion of personal responsibility and unsettled assumptions about privacy and dependency. In fact, a mixed picture emerges. On the one hand, …
Brokered Abuse, Thomas E. Kadri
Brokered Abuse, Thomas E. Kadri
Scholarly Works
Data brokers are abuse enablers. These companies, which traffic information about people for profit, facilitate interpersonal abuse by making it easier to find and contact people. By thwarting people’s obscurity, brokers expose them to physical, psychological, financial, and reputational harm. To date, there have been four common legal responses to this situation: prohibiting abusive acts, mandating broker transparency, limiting data collection, and restricting data disclosure. Though these measures each have some merit, none is adequate, and several recent privacy laws have even made matters worse. Put simply, the current legal landscape is neither effective nor empathetic.
This Essay explores the …
Privacy And National Politics: Fingerprint And Dna Litigation In Japan And The United States Compared, Dongsheng Zang
Privacy And National Politics: Fingerprint And Dna Litigation In Japan And The United States Compared, Dongsheng Zang
Articles
Drawing cases from two related areas of law-fingerprint and DNA (deoxyribonucleic acid) data-this Article proposes a modified framework, built on the Balkin-Levinson emphasis on national politics: First, national politics understood as partisan rivalry cannot account for what I call doctrinal lock-in in this Article, where I will demonstrate that in different stages of American politics-the Lochner era, the New Deal era, and Civil Rights era-courts across the nation ruled predominantly in favor of public data collectors-state and federal law enforcement in fingerprint cases. From the 1990s, when DNA data became hot targets of law enforcement, the United States Supreme Court …
The Carpenter Test As A Transformation Of Fourth Amendment Law, Matthew Tokson
The Carpenter Test As A Transformation Of Fourth Amendment Law, Matthew Tokson
Utah Law Faculty Scholarship
For over fifty years, the Fourth Amendment’s scope has been largely dictated by the Katz test, which applies the Amendment’s protections only when the government has violated a person’s “reasonable expectation of privacy.” This vague standard is one of the most criticized doctrines in all of American law, and its lack of coherence has made Fourth Amendment search law notoriously confusing. Things have become even more complex following the Supreme Court’s landmark decision in Carpenter v. United States, which has spawned its own alternative test for determining the Fourth Amendment’s scope. The emerging Carpenter test looks to the revealing nature …
Data Is What Data Does: Regulating Use, Harm, And Risk Instead Of Sensitive Data, Daniel J. Solove
Data Is What Data Does: Regulating Use, Harm, And Risk Instead Of Sensitive Data, Daniel J. Solove
GW Law Faculty Publications & Other Works
Heightened protection for sensitive data is becoming quite trendy in privacy laws around the world. Originating in European Union (EU) data protection law and included in the EU’s General Data Protection Regulation (GDPR), sensitive data singles out certain categories of personal data for extra protection. Commonly recognized special categories of sensitive data include racial or ethnic origin, political opinions, religious or philosophical beliefs, trade union membership, health, sexual orientation and sex life, biometric data, and genetic data.
Although heightened protection for sensitive data appropriately recognizes that not all situations involving personal data should be protected uniformly, the sensitive data approach …
The Prediction Society: Algorithms And The Problems Of Forecasting The Future, Hideyuki Matsumi, Daniel J. Solove
The Prediction Society: Algorithms And The Problems Of Forecasting The Future, Hideyuki Matsumi, Daniel J. Solove
GW Law Faculty Publications & Other Works
Predictions about the future have been made since the earliest days of humankind, but today, we are living in a brave new world of prediction. Today’s predictions are produced by machine learning algorithms that analyze massive quantities of personal data. Increasingly, important decisions about people are being made based on these predictions.
Algorithmic predictions are a type of inference. Many laws struggle to account for inferences, and even when they do, the laws lump all inferences together. But as we argue in this Article, predictions are different from other inferences. Predictions raise several unique problems that current law is ill-suited …
An Essay About Privacy, Ronald Griffin
An Essay About Privacy, Ronald Griffin
Journal Publications
Jessye Norman was an American opera singer. She died on October 1, 2019. On October 2, 2019, my wife got a grim diagnosis that put me in a stupor and reminded me, now more than ever, that my generation (that did so much good in the world) stands in line waiting for the Grim Reaper’s call. In a seventy-years (that have gone by too fast) I have watched my peers run from the realms of privacy, spaces where people implemented life plans uninterrupted by neighbours that were discernible, palpable, and real to everybody, to a realm where there is none. …
Policing "Bad" Mothers, I. Bennett Capers
Policing "Bad" Mothers, I. Bennett Capers
Faculty Scholarship
Jessamine Chan’s The School for Good Mothers — a speculative novel about a mother who abandons her child for a few hours and is required to attend a school for good mothers to regain custody — may not be a great book, but it is a good yarn, and a page turner, and thought-provoking. Thought-provoking, because to measure her fitness to be a mother, the protagonist is assigned a robot doppelganger of her child — one that is sentient, one that seems almost real, one that might even pass the Turing test, and one that she is required not only …
Questions Of Intellectual Property And Fundamental Values In The Digital Age, Jessica Silbey
Questions Of Intellectual Property And Fundamental Values In The Digital Age, Jessica Silbey
Faculty Scholarship
Today's intellectual property debates, in both law and the larger society, are a bellwether of changing justice needs in the twenty-first century. As the digital age democratizes technological opportunities, it brings intellectual property law into mainstream everyday culture. This generates debates about the relationship between the constitutional interest in "the progress of science and useful arts" and other fundamental values, such as equality, privacy, and distributive justice. These values, which were not explicitly part of intellectual property regimes in prior eras, are especially challenged in today's internet world.
The article (which was presented as the annual Nies Lecture in April …
Privacy Implications Of Central Bank Digital Currency, Jiaying Jiang
Privacy Implications Of Central Bank Digital Currency, Jiaying Jiang
UF Law Faculty Publications
One hundred five countries, representing over 95 percent of global GDP, are exploring central bank digital currencies (CBDCs), a new form of digital money that is different from privately issued cryptocurrencies and stablecoins. As central banks worldwide grapple with CBDC design options, privacy has become a critical feature and concern. Many central banks, government agencies, NGOs, think tanks, and even the general public have already addressed the importance of privacy and called for privacy in CBDC systems. Some economists, computer scientists, engineers, and legal scholars have already moved forward to design a privacy-preserving CBDC.
However, when addressing the importance and …
Publicizing Corporate Secrets, Christopher J. Morten
Publicizing Corporate Secrets, Christopher J. Morten
Faculty Scholarship
Federal regulatory agencies in the United States hold a treasure trove of valuable information essential to a functional society. Yet little of this immense and nominally “public” resource is accessible to the public. That worrying phenomenon is particularly true for the valuable information that agencies hold on powerful private actors. Corporations regularly shield vast swaths of the information they share with federal regulatory agencies from public view, claiming that the information contains legally protected trade secrets (or other proprietary “confidential commercial information”). Federal agencies themselves have largely acceded to these claims and even fueled them, by construing restrictively various doctrines …
The Carceral Home, Kate Weisburd
The Carceral Home, Kate Weisburd
GW Law Faculty Publications & Other Works
In virtually all areas of law, the home is the ultimate constitutionally protected area, at least in theory. In practice, a range of modern institutions that target private life—from public housing to child welfare—have turned the home into a routinely surveilled space. Indeed, for the 4.5 million people on criminal court supervision, their home is their prison, or what I call a “carceral home.” Often in the name of decarceration, prison walls are replaced with restrictive rules that govern every aspect of private life and invasive surveillance technology that continuously records intimate information. While prisons have always been treated in …
Privacy Peg, Trade Hole: Why We (Still) Shouldn’T Put Data Privacy In Trade Law, Margot E. Kaminski, Kristina Irion, Svetlana Yakovleva
Privacy Peg, Trade Hole: Why We (Still) Shouldn’T Put Data Privacy In Trade Law, Margot E. Kaminski, Kristina Irion, Svetlana Yakovleva
Publications
No abstract provided.
Commentary On Reynolds V. Mcnichols, Aziza Ahmed
Commentary On Reynolds V. Mcnichols, Aziza Ahmed
Faculty Scholarship
The 1973 case Reynolds v McNichols concerns a woman who was repeatedly arrested on suspicion of and for “prostitution.” During these arrests, Roxanne Reynolds, the defendant, was subject to forced examination and treatment. The arrests and examinations were authorized by Section 735 of the Revised Municipal Code of the City and County of Denver, which directed the Department of Health and Hospitals “to use every available means to ascertain the existence of and investigate all suspected cases of communicable venereal disease, and to determine the sources of such infections.” Reynolds argued that the ordinance was unconstitutional because it was irrational, …
Sunshine Laws Behind The Clouds: Limited Transparency In A Time Of National Emergency, Ira P. Robbins
Sunshine Laws Behind The Clouds: Limited Transparency In A Time Of National Emergency, Ira P. Robbins
Articles in Law Reviews & Other Academic Journals
The COVID-19 pandemic dramatically changed the way citizens lived their lives, businesses operated, and governments functioned. With most people forced to stay home, the pandemic also disrupted how people received their news and other essential information. Public records and public meetings had to adapt to face the growing challenges in a locked-down world. While some governmental bodies were able to keep up with the threat that COVID-19 posed against transparency, others either failed to acclimate to the new normal or actively took advantage of the circumstances to limit how much the public knew not only about the crisis, but about …
Content Moderation As Surveillance, Hannah Bloch-Wehba
Content Moderation As Surveillance, Hannah Bloch-Wehba
Faculty Scholarship
Technology platforms are the new governments, and content moderation is the new law, or so goes a common refrain. As platforms increasingly turn toward new, automated mechanisms of enforcing their rules, the apparent power of the private sector seems only to grow. Yet beneath the surface lies a web of complex relationships between public and private authorities that call into question whether platforms truly possess such unilateral power. Law enforcement and police are exerting influence over platform content rules, giving governments a louder voice in supposedly “private” decisions. At the same time, law enforcement avails itself of the affordances of …
Throwing Stones In Glass Houses: Protecting Privacy Under The Law Of Nuisance, Cheng Lim Saw, Joon Wei Aaron Yoong
Throwing Stones In Glass Houses: Protecting Privacy Under The Law Of Nuisance, Cheng Lim Saw, Joon Wei Aaron Yoong
Research Collection Yong Pung How School Of Law
The limits of the law of nuisance were recently tested in the controversial decisions of Fearn v Tate Gallery Board of Trustees, both before the UK High Court and UK Court of Appeal. Against the backdrop of these decisions, this article argues that the tort of private nuisance can indeed, in appropriate cases, protect against invasions of privacy caused by overlooking – all within the present framework and ambit of the action. It is also proposed that a communitarian approach be adopted in fashioning the appropriate remedy for actions founded in nuisance.
The End Of Roe V Wade And New Legal Frontiers On The Constitutional Right To Abortion, I. Glenn Cohen, Melissa Murray, Lawrence O. Gostin
The End Of Roe V Wade And New Legal Frontiers On The Constitutional Right To Abortion, I. Glenn Cohen, Melissa Murray, Lawrence O. Gostin
Georgetown Law Faculty Publications and Other Works
On June 24, 2002, the US Supreme Court ended the constitutional right to abortion in Dobbs v Jackson Women’s Health Organization. The Court’s majority decision authored by Justice Samuel Alito was substantially the same as a draft opinion leaked a month earlier. The regulation of abortion will now be decided by the states, with about half currently or will soon ban or severely restrict abortion access. In this Viewpoint, we explain the Dobbs ruling and what it means for physicians, public health, and society.
We focus on new legal frontiers in the constitutional right to abortion, including medication abortion …
Regulating Harm: Tensions Between Data Privacy And Data Transparency, Kaitlyn Filip, Kat Albrecht
Regulating Harm: Tensions Between Data Privacy And Data Transparency, Kaitlyn Filip, Kat Albrecht
CJC Publications
In an era of massive digital data growth, data storage and dissemination has posed complex new problems for privacy regulations across agencies and institutions on a global scale. Laws about data privacy vary substantially by country, by state, and by industry. In formulating these policies, there exists a fundamental tension between a desire for data privacy and one for data transparency. This tension becomes particularly acute as new digital tools and access technologies have made these records more accessible and connectable than ever before. This tension is borne out in the enactment of law. Three states – California, Colorado, and …
24th Annual Open Government Summit 2022, Roger Williams University School Of Law, Rhode Island Office Of The Attorney General
24th Annual Open Government Summit 2022, Roger Williams University School Of Law, Rhode Island Office Of The Attorney General
School of Law Conferences, Lectures & Events
No abstract provided.
Resisting Face Surveillance With Copyright Law, Amanda Levendowski
Resisting Face Surveillance With Copyright Law, Amanda Levendowski
Georgetown Law Faculty Publications and Other Works
Face surveillance is animated by deep-rooted demographic and deployment biases that endanger marginalized communities and threaten the privacy of all. But current approaches have not prevented its adoption by law enforcement. Some companies have offered voluntary moratoria on selling the technology, leaving many others to fill in the gaps. Legislators have enacted regulatory oversight at the state and city levels, but a federal ban remains elusive. Both approaches require vast shifts in practical and political will, each with drawbacks. While we wait, face surveillance persists. This Article suggests a new possibility: face surveillance is fueled by unauthorized copies and reproductions …
The Relationship Between Privacy And Antitrust, Maurice Stucke
The Relationship Between Privacy And Antitrust, Maurice Stucke
Scholarly Works
This Essay recaps the policymakers’, enforcers’, and scholars’ thinking on the relationship between antitrust and privacy. Currently, the thinking is that improving privacy protection is a necessary, but not sufficient, step to address some of the risks posed by these data-opolies and deter data hoarding, a key source of their power.
The policies proposed in Europe, Asia, Australia, and North America as of early 2022 all assume that with more competition, privacy and well-being will be restored. In looking at the reforms proposed to date, policymakers and scholars have not fully addressed several fundamental issues.
One issue is whether more …
Designing Respectful Tech: What Is Your Relationship With Technology?, Noreen Y. Whysel
Designing Respectful Tech: What Is Your Relationship With Technology?, Noreen Y. Whysel
Publications and Research
According to research at the Me2B Alliance, people feel they have a relationship with technology. It’s emotional. It’s embodied. And it’s very personal. We are studying digital relationships to answer questions like “Do people have a relationship with technology?” “What does that relationship feel like?” And “Do people understand the commitments that they are making when they explore, enter into and dissolve these relationships?” There are parallels between messy human relationships and the kinds of relationships that people develop with technology. As with human relationships, we move through states of discovery, commitment and breakup with digital applications as well. Technology …