Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

Privacy

Discipline
Institution
Publication Year
Publication

Articles 61 - 90 of 903

Full-Text Articles in Law

Resisting Face Surveillance With Copyright Law, Amanda Levendowski May 2022

Resisting Face Surveillance With Copyright Law, Amanda Levendowski

Georgetown Law Faculty Publications and Other Works

Face surveillance is animated by deep-rooted demographic and deployment biases that endanger marginalized communities and threaten the privacy of all. But current approaches have not prevented its adoption by law enforcement. Some companies have offered voluntary moratoria on selling the technology, leaving many others to fill in the gaps. Legislators have enacted regulatory oversight at the state and city levels, but a federal ban remains elusive. Both approaches require vast shifts in practical and political will, each with drawbacks. While we wait, face surveillance persists. This Article suggests a new possibility: face surveillance is fueled by unauthorized copies and reproductions …


The Relationship Between Privacy And Antitrust, Maurice Stucke Mar 2022

The Relationship Between Privacy And Antitrust, Maurice Stucke

Scholarly Works

This Essay recaps the policymakers’, enforcers’, and scholars’ thinking on the relationship between antitrust and privacy. Currently, the thinking is that improving privacy protection is a necessary, but not sufficient, step to address some of the risks posed by these data-opolies and deter data hoarding, a key source of their power.

The policies proposed in Europe, Asia, Australia, and North America as of early 2022 all assume that with more competition, privacy and well-being will be restored. In looking at the reforms proposed to date, policymakers and scholars have not fully addressed several fundamental issues.

One issue is whether more …


Designing Respectful Tech: What Is Your Relationship With Technology?, Noreen Y. Whysel Feb 2022

Designing Respectful Tech: What Is Your Relationship With Technology?, Noreen Y. Whysel

Publications and Research

According to research at the Me2B Alliance, people feel they have a relationship with technology. It’s emotional. It’s embodied. And it’s very personal. We are studying digital relationships to answer questions like “Do people have a relationship with technology?” “What does that relationship feel like?” And “Do people understand the commitments that they are making when they explore, enter into and dissolve these relationships?” There are parallels between messy human relationships and the kinds of relationships that people develop with technology. As with human relationships, we move through states of discovery, commitment and breakup with digital applications as well. Technology …


Dismantling The “Black Opticon”: Privacy, Race Equity, And Online Data-Protection Reform, Anita L. Allen Feb 2022

Dismantling The “Black Opticon”: Privacy, Race Equity, And Online Data-Protection Reform, Anita L. Allen

All Faculty Scholarship

African Americans online face three distinguishable but related categories of vulnerability to bias and discrimination that I dub the “Black Opticon”: discriminatory oversurveillance, discriminatory exclusion, and discriminatory predation. Escaping the Black Opticon is unlikely without acknowledgement of privacy’s unequal distribution and privacy law’s outmoded and unduly race-neutral façade. African Americans could benefit from race-conscious efforts to shape a more equitable digital public sphere through improved laws and legal institutions. This Essay critically elaborates the Black Opticon triad and considers whether the Virginia Consumer Data Protection Act (2021), the federal Data Protection Act (2021), and new resources for the Federal Trade …


Liberal Feminist Jurisprudence: Foundational, Enduring, Adaptive, Linda C. Mcclain, Brittany K. Hacker Feb 2022

Liberal Feminist Jurisprudence: Foundational, Enduring, Adaptive, Linda C. Mcclain, Brittany K. Hacker

Faculty Scholarship

Liberal feminism remains a significant strand of feminist jurisprudence in the U.S. Rooted in 19th and 20th century liberal and feminist political theory and women’s rights advocacy, it emphasizes autonomy, dignity, and equality. Liberal feminism’s focus remains to challenge unjust gender-based restrictions based on assumptions about men’s and women’s proper spheres and roles. Second wave liberal legal feminism, evident in Ruth Bader Ginsburg’s constitutional litigation, challenged pervasive sex-based discrimination in law and social institutions and shifted the Supreme Court’s interpretation of the Equal Protection Clause to a more skeptical review of gender-based classifications. Liberal feminists have developed robust conceptions of …


What To Do With Leftovers: Collecting Earmarked Donations Through Mobile Payment Apps, Mary Scott Polk Jan 2022

What To Do With Leftovers: Collecting Earmarked Donations Through Mobile Payment Apps, Mary Scott Polk

GGU Tax & Estate Planning Review

With the rise in mobile payment applications, charitable donations using these platforms are increasing; equally, the use of a conduit between a donor and a charity to solicit and collect donations for the charity’s benefit is growing. If a charity is overfunded or the charitable purpose is no longer available, the conduit is caught holding a pool of designated donations without the ability to contact the donors for permission for a similar or alternate use. Using the Internal Revenue Code requirements, the authority and regulations are not apparent for a charitable contribution through a conduit, particularly not for a conduit’s …


Self-Control Of Personal Data And The Constitution In East Asia, Dongsheng Zang Jan 2022

Self-Control Of Personal Data And The Constitution In East Asia, Dongsheng Zang

Articles

No abstract provided.


Platforms, Encryption, And The Cfaa: The Case Of Whatsapp V Nso Group, Jonathon Penney, Bruce Schneier Jan 2022

Platforms, Encryption, And The Cfaa: The Case Of Whatsapp V Nso Group, Jonathon Penney, Bruce Schneier

Articles, Book Chapters, & Popular Press

End-to-end encryption technology has gone mainstream. But this wider use has led hackers, cybercriminals, foreign governments, and other threat actors to employ creative and novel attacks to compromise or workaround these protections, raising important questions as to how the Computer Fraud and Abuse Act (CFAA), the primary federal anti-hacking statute, is best applied to these new encryption implementations. Now, after the Supreme Court recently narrowed the CFAA’s scope in Van Buren and suggested it favors a code-based approach to liability under the statute, understanding how best to theorize sophisticated code-based access barriers like end-to-end encryption, and their circumvention, is now …


Fourth Amendment Privacy In Public: A Fundamental Theory With Application To Location Tracking, Jordan Wallace-Wolf Jan 2022

Fourth Amendment Privacy In Public: A Fundamental Theory With Application To Location Tracking, Jordan Wallace-Wolf

Faculty Scholarship

When we walk out our front door, we are in public and other people may look at us. But intuitively, we don’t open ourselves up to unlimited scrutiny just by going outside. We retain some privacy, even in public. What is the source of this residual public-privacy, and how should the law recognize it without degrading the open character of public space?

The answer given by commentators, and most recently by the Supreme Court in Carpenter v. U.S., comes in the form of two related claims. The first is the chilling theory of the Fourth Amendment. According to this idea, …


Escaping Circularity: The Fourth Amendment And Property Law, João Marinotti Jan 2022

Escaping Circularity: The Fourth Amendment And Property Law, João Marinotti

Articles by Maurer Faculty

The Supreme Court’s “reasonable expectation of privacy” test under the Fourth Amendment has often been criticized as circular, and hence subjective and unpredictable. The Court is presumed to base its decisions on society’s expectations of privacy, while society’s expectations of privacy are themselves presumed to be based on the Court’s judgements. As a solution to this problem, property law has been repeatedly propounded as an allegedly independent, autonomous area of law from which the Supreme Court can glean reasonable expectations of privacy without falling back into tautological reasoning.

Such an approach presupposes that property law is not itself circular. If …


Submission To The Province Of Nova Scotia On Its Review Of The Intimate Images And Cyber-Protection Act - Leaf, Suzie Dunn, Rosel Kim Jan 2022

Submission To The Province Of Nova Scotia On Its Review Of The Intimate Images And Cyber-Protection Act - Leaf, Suzie Dunn, Rosel Kim

Reports & Public Policy Documents

The Women’s Legal Education and Action Fund (LEAF) commends the Nova Scotia government for reviewing its Intimate Images and Cyber-protection Act (the Act) and seeking public input for this review. Nova Scotia has been, and continues to be, a leader in Canada for its role in advancing innovative laws and supports for people targeted by technology-facilitated violence (TFV), digital abuse, and the non-consensual distribution of intimate images (NCDII). As these forms of harmful behaviour evolve and become better understood, it is important to revisit this legislation to assess whether it is providing meaningful and accessible responses to such serious social …


Understanding Chilling Effects, Jonathon Penney Jan 2022

Understanding Chilling Effects, Jonathon Penney

Articles, Book Chapters, & Popular Press

With digital surveillance and censorship on the rise, the amount of data available online unprecedented, and corporate and governmental actors increasingly employing emerging technologies like artificial intelligence (AI), machine learning, and facial recognition technology (FRT) for surveillance and data analytics, concerns about “chilling effects”, that is, the capacity for these activities “chill” or deter people from exercising their rights and freedoms have taken on greater urgency and importance. Yet, there remains a clear dearth in systematic theoretical and empirical work point. This has left significant gaps in understanding. This article has attempted to fill that void, synthesizing theoretical and empirical …


Telephone Pole Cameras Under Fourth Amendment Law, Matthew Tokson Jan 2022

Telephone Pole Cameras Under Fourth Amendment Law, Matthew Tokson

Utah Law Faculty Scholarship

In a series of recent cases, police officers have mounted sophisticated surveillance cameras on telephone poles and pointed them at the homes of people suspected of a crime. These cameras often operate for months or even years without judicial oversight, collecting vast quantities of video footage on suspects and their activities near the home. Pole camera surveillance raises important Fourth Amendment questions that have divided courts and puzzled scholars.

These questions are complicated because Fourth Amendment law is complicated. This is especially the case today as Fourth Amendment law is in a transitional phase, caught between older and newer paradigms …


Cannibalizing The Constitution: On Terrorism, The Second Amendment, And The Threat To Civil Liberties, Francesca Laguardia Jan 2022

Cannibalizing The Constitution: On Terrorism, The Second Amendment, And The Threat To Civil Liberties, Francesca Laguardia

JCLC Online

This article explores the links between internet radicalization, access to weapons, and the current threat from terrorists who have been radicalized online. The prevalence of domestic terrorism, domestic hate groups, and online incitement and radicalization have led to considerable focus on the tension between counterterror efforts and the First Amendment. Many scholars recommend rethinking the extent of First Amendment protection, as well as Fourth, Fifth, and Sixth Amendment protections, and some judges appear to be listening. Yet the Second Amendment has avoided this consideration, despite the fact that easy access to weapons is a necessary ingredient for the level of …


Data Privacy, Human Rights, And Algorithmic Opacity, Sylvia Lu Jan 2022

Data Privacy, Human Rights, And Algorithmic Opacity, Sylvia Lu

Fellow, Adjunct, Lecturer, and Research Scholar Works

Decades ago, it was difficult to imagine a reality in which artificial intelligence (AI) could penetrate every corner of our lives to monitor our innermost selves for commercial interests. Within just a few decades, the private sector has seen a wild proliferation of AI systems, many of which are more powerful and penetrating than anticipated. In many cases, AI systems have become “the power behind the throne,” tracking user activities and making fateful decisions through predictive analysis of personal information. Despite the growing power of AI, proprietary algorithmic systems can be technically complex, legally claimed as trade secrets, and managerially …


Legislating Data Loyalty, Woodrow Hartzog, Neil Richards Jan 2022

Legislating Data Loyalty, Woodrow Hartzog, Neil Richards

Faculty Scholarship

Lawmakers looking to embolden privacy law have begun to consider imposing duties of loyalty on organizations trusted with people’s data and online experiences. The idea behind loyalty is simple: organizations should not process data or design technologies that conflict with the best interests of trusting parties. But the logistics and implementation of data loyalty need to be developed if the concept is going to be capable of moving privacy law beyond its “notice and consent” roots to confront people’s vulnerabilities in their relationship with powerful data collectors.

In this short Essay, we propose a model for legislating data loyalty. Our …


Smart Meters As A Catalyst For Privacy Law, Matthew Tokson Jan 2022

Smart Meters As A Catalyst For Privacy Law, Matthew Tokson

Utah Law Faculty Scholarship

Smart utility meters raise several puzzling legal questions—and answering them can help point the way toward the future of Fourth Amendment and civil privacy law. This forum essay addresses two such issues: use restrictions on collected data, and voluntary data disclosure.

First, more than any other current technology, smart meters compel the development of use restrictions on collected data. The benefits of smart meters are potentially enormous, such that categorically prohibiting public utilities from collecting smart meter data is likely beyond the pale. Yet allowing law enforcement agents to obtain detailed or intimate data about the home without a warrant …


The New Bailments, Danielle D'Onfro Jan 2022

The New Bailments, Danielle D'Onfro

Scholarship@WashULaw

The rise of cloud computing has dramatically changed how consumers and firms store their belongings. Property that owners once managed directly now exists primarily on infrastructure maintained by intermediaries. Consumers entrust their photos to Apple instead of scrapbooks; businesses put their documents on Amazon’s servers instead of in file cabinets; seemingly everything runs in the cloud. Were these belongings tangible, the relationship between owner and intermediary would be governed by the common-law doctrine of bailment. Bailments are mandatory relationships formed when one party entrusts their property to another. Within this relationship, the bailees owe the bailors a duty of care …


Four Privacy Stories And Two Hard Cases, Jessica Silbey Jan 2022

Four Privacy Stories And Two Hard Cases, Jessica Silbey

Faculty Scholarship

In the context of reviewing Scott Skinner's book "Privacy at the Margins" (Cambridge University Press, 2021), this article discusses four "privacy stories" (justifications for and explanation of the application of privacy law) that need substantiation and reinterpretation for the 21st century and for what I call "fourth generation" privacy law and scholarship. The article then considers these stories (and Skinner's analysis of them) in light of two "hard" cases, one he discusses in his book and one recently decided by the Massachusetts Supreme Judicial Court, both concerning privacy in taking and dissemination of photographs.


Yes, Alito, There Is A Right To Privacy: Why The Leaked Dobbs Opinion Is Doctrinally Unsound, Nancy C. Marcus Jan 2022

Yes, Alito, There Is A Right To Privacy: Why The Leaked Dobbs Opinion Is Doctrinally Unsound, Nancy C. Marcus

Faculty Scholarship

On June 24, 2022, the Supreme Court released the final Dobbs majority opinion, which is substantially identical to the draft opinion. Consequently, the critique contained in this essay applies equally to the final Dobbs opinion.

On May 2, 2022, a draft majority opinion dated February 2022 and authored by Justice Alito in Dobbs v. Jackson Women’s Health Organization was leaked to the public. This Essay addresses the doctrinal infirmities of the underlying analysis of the draft Dobbs opinion, as well as the resulting dangers posed for the protection of fundamental privacy rights and liberties in contexts even beyond abortion.

The …


Privacy Aspects Of Direct-To-Consumer Artificial Intelligence/Machine Learning Health Apps, Sara Gerke, Delaram Rezaeikhonakdar Jan 2022

Privacy Aspects Of Direct-To-Consumer Artificial Intelligence/Machine Learning Health Apps, Sara Gerke, Delaram Rezaeikhonakdar

Faculty Scholarly Works

Direct-To-Consumer Artificial Intelligence/Machine Learning health apps (DTC AI/ML health apps) are increasingly being made available for download in app stores. However, such apps raise challenges, one of which is providing adequate protection of consumers' privacy. This article analyzes the privacy aspects of DTC AI/ML health apps and suggests how consumers' privacy could be better protected in the United States. In particular, it discusses the Health Insurance Portability and Accountability Act of 1996 (HIPAA), the Federal Trade Commission (FTC) Act, the FTC's Health Breach Notification Rule, the California Consumer Privacy Act of 2018, the California Privacy Rights Act of 2020, the …


Managing And Monitoring The Menopausal Body, Naomi R. Cahn, Bridget J. Crawford, Emily Gold Waldman Jan 2022

Managing And Monitoring The Menopausal Body, Naomi R. Cahn, Bridget J. Crawford, Emily Gold Waldman

Elisabeth Haub School of Law Faculty Publications

This Essay explores how menopausal bodies are managed and monitored through both menopausal hormone therapy (MHT) and the burgeoning market for technology-driven menopause products and services. While each of these allegedly improves the menopause experience, a closer investigation reveals a more complex interaction of profit motives and traditional notions of gender identity. The Essay identifies problems with—and suggests some solutions for reforming—current practices of monitoring and managing the menopausal body.

Careful consideration of menopause brings this Essay into ongoing conversations about theorizing beyond the gender binary and stereotypical notions of femininity. Purveyors of both MHT and menopause-related digital products and …


Appealing Compelled Disclosures In Discovery That Threaten First Amendment Rights, Richard L. Heppner Jr. Jan 2022

Appealing Compelled Disclosures In Discovery That Threaten First Amendment Rights, Richard L. Heppner Jr.

Law Faculty Publications

Last year, the Supreme Court held in Americans for Prosperity Foundation v. Bonta that a California anti-fraud policy compelling charities to disclose the identities of their major donors violated the First Amendment. That holding stems from the 1958 case NAACP v. Alabama where the Court held that a discovery order compelling the NAACP to disclose the names of its members violated the First Amendment right of free association because of the members’ justifiable fear of retaliation.

In the over sixty years since NAACP v. Alabama, the Court has only decided a handful of cases about how compelled disclosures of …


Breached! Why Data Security Law Fails And How To Improve It (Chapter 1), Daniel J. Solove, Woodrow Hartzog Jan 2022

Breached! Why Data Security Law Fails And How To Improve It (Chapter 1), Daniel J. Solove, Woodrow Hartzog

GW Law Faculty Publications & Other Works

Digital connections permeate our lives—and so do data breaches. Given that we must be online for basic communication, finance, healthcare, and more, it is remarkable how difficult it is to secure our personal information. Despite the passage of many data security laws, data breaches are increasing at a record pace. In their book, BREACHED! WHY DATA SECURITY LAW FAILS AND HOW TO IMPROVE IT (Oxford University Press 2022), Professors Daniel Solove and Woodrow Hartzog argue that the law fails because, ironically, it focuses too much on the breach itself.

Drawing insights from many fascinating stories about data breaches, Solove and …


The Surprising Virtues Of Data Loyalty, Woodrow Hartzog, Neil M. Richards Jan 2022

The Surprising Virtues Of Data Loyalty, Woodrow Hartzog, Neil M. Richards

Faculty Scholarship

Lawmakers in the United States and Europe are seriously considering imposing duties of data loyalty that implement ideas from privacy law scholarship, but critics claim such duties are unnecessary, unworkable, overly individualistic, and indeterminately vague. This paper takes those criticisms seriously, and its analysis of them reveals that duties of data loyalty have surprising virtues. Loyalty, it turns out, can support collective well-being by embracing privacy’s relational turn; it can be a powerful state of mind for reenergizing privacy reform; it prioritizes human values rather than potentially empty formalism; and it offers solutions that are flexible and clear rather than …


Navigating The Identity Thicket: Trademark's Lost Theory Of Personality, The Right Of Publicity, And Preemption, Jennifer E. Rothman Jan 2022

Navigating The Identity Thicket: Trademark's Lost Theory Of Personality, The Right Of Publicity, And Preemption, Jennifer E. Rothman

All Faculty Scholarship

Both trademark and unfair competition laws and state right of publicity laws protect against unauthorized uses of a person’s identity. Increasingly, however, these rights are working at odds with one another, and can point in different directions with regard to who controls a person’s name, likeness, and broader indicia of identity. This creates what I call an "identity thicket" of overlapping and conflicting rights over a person’s identity. Current jurisprudence provides little to no guidance on the most basic questions surrounding this thicket, such as what right to use a person’s identity, if any, flows from the transfer of marks …


Persistent Surveillance, Andrew Guthrie Ferguson Jan 2022

Persistent Surveillance, Andrew Guthrie Ferguson

Articles in Law Reviews & Other Academic Journals

Persistent surveillance technologies grant police vast new investigative capabilities. The technologies both monitor targeted areas and generate databases of searchable information about people, places, and patterns that can be connected and accessed for criminal prosecutions.

In the face of this growing police surveillance, courts have struggled to make sense of a fragmented Fourth Amendment doctrine. The Supreme Court has offered some clues that “digital may be different” when it comes to surveillance, but lower courts have been left struggling to apply old law to new technologies. Warrantless use of persistent surveillance technologies raises hard questions about when a “search” occurs …


An Overview Of Privacy Law In 2022, Daniel J. Solove, Paul M. Schwartz Jan 2022

An Overview Of Privacy Law In 2022, Daniel J. Solove, Paul M. Schwartz

GW Law Faculty Publications & Other Works

Chapter 1 of PRIVACY LAW FUNDAMENTALS (6th edition, IAPP 2022) provides an overview of information privacy law circa 2022. The chapter summarizes the common themes in privacy laws and discusses the various types of laws (federal, constitutional, state, international). It contains a list and brief summary of the most significant U.S. federal privacy laws. The heart of the chapter is an historical timeline of major developments in the law of privacy and data security, including key cases, enactments of laws, major regulatory developments, influential publications, and other significant events. The chapter also contains a curated list of important treatises and …


Adopting Social Media In Family And Adoption Law, Stacey B. Steinberg, Meredith Burgess, Karla Herrera Jan 2022

Adopting Social Media In Family And Adoption Law, Stacey B. Steinberg, Meredith Burgess, Karla Herrera

UF Law Faculty Publications

Social media has dramatically changed the landscape facing families brought together through adoption. Just as adoptive families thirty years ago could not have predicted the impact of DNA technology on post-adoption family life, adoptive families are only now beginning to grasp the impact of social media connectivity on the lives of their growing children. This change is both related to social media’s impact on family life and fundamental shifts in our understandings about privacy more generally. Understanding the legal rights of parents and children in these circumstances is both a novel and underexplored issue for family law, constitutional law, and …


Privacy Pretexts, Rory Van Loo Jan 2022

Privacy Pretexts, Rory Van Loo

Faculty Scholarship

Data privacy’s ethos lies in protecting the individual from institutions. Increasingly, however, institutions are deploying privacy arguments in ways that harm individuals. Platforms like Amazon, Facebook, and Google wall off information from competitors in the name of privacy. Financial institutions under investigation justify withholding files from the Consumer Financial Protection Bureau by saying they must protect sensitive customer data. In these and other ways, the private sector is exploiting privacy to avoid competition and accountability. This Article highlights the breadth of privacy pretexts and uncovers their moral structure. Like most pretexts, there is an element of truth to the claims. …