Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2015

Privacy

Discipline
Institution
Publication
Publication Type
File Type

Articles 121 - 150 of 150

Full-Text Articles in Law

Regulating Real-World Surveillance, Margot E. Kaminski Jan 2015

Regulating Real-World Surveillance, Margot E. Kaminski

Publications

A number of laws govern information gathering, or surveillance, by private parties in the physical world. But we lack a compelling theory of privacy harm that accounts for the state's interest in enacting these laws. Without a theory of privacy harm, these laws will be enacted piecemeal. Legislators will have a difficult time justifying the laws to constituents; the laws will not be adequately tailored to legislative interest; and courts will find it challenging to weigh privacy harms against other strong values, such as freedom of expression.

This Article identifies the government interest in enacting laws governing surveillance by private …


Corporate Avatars And The Erosion Of The Populist Fourth Amendment, Avidan Cover Jan 2015

Corporate Avatars And The Erosion Of The Populist Fourth Amendment, Avidan Cover

Faculty Publications

The current state of Fourth Amendment jurisprudence leaves it to technology corporations to challenge court orders, subpoenas, and requests by the government for individual users’ information. The third-party doctrine denies people a reasonable expectation of privacy in data they transmit through telecommunications and Internet service providers. Third-party corporations become, by default, the people’s corporate avatars. Corporate avatars, however, do a poor job of representing individuals’ interests. Moreover, vesting the Fourth Amendment’s government-oversight functions in corporations fails to cohere with the Bill of Rights’ populist history and the Framers’ distrust of corporations.

This article examines how the third-party doctrine proves unsupportable …


Book Review. Balancing Privacy And Free Speech: Unwanted Attention In The Age Of Social Media By Mark Tunick, Kimberly Mattioli Jan 2015

Book Review. Balancing Privacy And Free Speech: Unwanted Attention In The Age Of Social Media By Mark Tunick, Kimberly Mattioli

Articles by Maurer Faculty

No abstract provided.


The Substance Of Self-Government, James E. Fleming Jan 2015

The Substance Of Self-Government, James E. Fleming

Faculty Scholarship

In Democratic Rights: The Substance of Self-Government, Corey Brettschneider develops an attractive and powerful conception of self-government - the value theory of democracy - that encompasses both substantive rights like privacy and procedural rights. Although he argues, following Habermas and Rawls, that substantive rights and procedural rights are "co-original," the structure of his theory may lead him to reduce the former into the latter and not fully to account for personal self-government in his conception of democratic self-government. The wages of his democratic justifications for substantive rights may be a surprising anxiety or unwarranted tension concerning judicial review protecting such …


Surveillance As Loss Of Obscurity, Woodrow Hartzog, Evan Selinger Jan 2015

Surveillance As Loss Of Obscurity, Woodrow Hartzog, Evan Selinger

Faculty Scholarship

Everyone seems concerned about government surveillance, yet we have a hard time agreeing when and why it is a problem and what we should do about it. When is surveillance in public unjustified? Does metadata raise privacy concerns? Should encrypted devices have a backdoor for law enforcement officials? Despite increased attention, surveillance jurisprudence and theory still struggle for coherence. A common thread for modern surveillance problems has been difficult to find.

In this article we argue that the concept of ‘obscurity,’ which deals with the transaction costs involved in finding or understanding information, is the key to understanding and uniting …


Picturing Moral Arguments In A Fraught Legal Arena: Fetuses, Photographic Phantoms And Ultrasounds, Jessica Silbey Jan 2015

Picturing Moral Arguments In A Fraught Legal Arena: Fetuses, Photographic Phantoms And Ultrasounds, Jessica Silbey

Faculty Scholarship

This article investigates the movement in the U.S. that seeks to regulate the abortion decision by mandating ultrasounds prior to the procedure. The article argues that this reform effort is misguided not only because it is ineffective, but also because ultrasounds provide misleading information and are part of shaming practices that degrade the dignity of women. Both of these problems violate the main tenets of Planned Parenthood of Southern Pennsylvania v. Casey (1992). Central to the article’s argument and novelty is that the pro-ultrasound movement’s mistake is both legal and cultural. It misunderstands the nature of visual technology by failing …


Internet Giants As Quasi-Governmental Actors And The Limits Of Contractual Consent, Nancy Kim, D.A. Jeremy Telman Jan 2015

Internet Giants As Quasi-Governmental Actors And The Limits Of Contractual Consent, Nancy Kim, D.A. Jeremy Telman

Faculty Scholarship

Although the government’s data-mining program relied heavily on information and technology that the government received from private companies, relatively little of the public outrage generated by Edward Snowden’s revelations was directed at those private companies. We argue that the mystique of the Internet giants and the myth of contractual consent combine to mute criticisms that otherwise might be directed at the real data-mining masterminds. As a result, consumers are deemed to have consented to the use of their private information in ways that they would not agree to had they known the purposes to which their information would be put …


Robots In The Home: What Will We Have Agreed To?, Margot E. Kaminski Jan 2015

Robots In The Home: What Will We Have Agreed To?, Margot E. Kaminski

Publications

A new technology can expose the cracks in legal doctrine. Sometimes a technology resists analogy. Sometimes, through analogies, it reveals inconsistencies in the law, or basic flaws in framing, or in the fit between different parts of the legal system. This Essay addresses robots in the home, and what they reveal about U.S. privacy law. Household robots might not themselves uproot U.S. privacy law, but they will reveal its inconsistencies, and show where it is most likely to fracture. Just as drones are serving as a legislative “privacy catalyst” — encouraging the enactment of new privacy laws as people realize …


Environmental Privacy, Katrina F. Kuh Jan 2015

Environmental Privacy, Katrina F. Kuh

Utah Law Review

The purpose of this Article is not to anticipate whether or how the Fourth Amendment might apply to specific efforts to collect information about environmentally significant individual behaviors. The purpose is to discern the considerations that have proven salient in balancing environmental regulation and privacy to date that may likewise be relevant to navigating privacy concerns that arise with respect to policy directed to environmentally significant individual behaviors.

In this regard, the Article’s survey suggests that neither the fact that environmentally significant individual behaviors must be aggregated to produce environmental harm nor the fact that individuals, as opposed to commercial …


Self-Defense Against Robots And Drones, A. Michael Froomkin, P. Zak Colangelo Jan 2015

Self-Defense Against Robots And Drones, A. Michael Froomkin, P. Zak Colangelo

Articles

Robots can pose-or can appear to pose-a threat to life, property, and privacy. May a landowner legally shoot down a trespassing drone? Can she hold a trespassing autonomous car as security against damage done or further torts? Is the fear that a drone may be operated by a paparazzo or Peeping Tom sufficient grounds to disable or interfere with it? How hard may you shove if the office robot rolls over your foot? This Article addresses all those issues and one more. what rules and standards we could put into place to make the resolution of those questions easier and …


Neuroprediction: New Technology, Old Problems, Stephen J. Morse Jan 2015

Neuroprediction: New Technology, Old Problems, Stephen J. Morse

All Faculty Scholarship

Neuroprediction is the use of structural or functional brain or nervous system variables to make any type of prediction, including medical prognoses and behavioral forecasts, such as an indicator of future dangerous behavior. This commentary will focus on behavioral predictions, but the analysis applies to any context. The general thesis is that using neurovariables for prediction is a new technology, but that it raises no new ethical issues, at least for now. Only if neuroscience achieves the ability to “read” mental content will genuinely new ethical issues be raised, but that is not possible at present.


Disagreeable Privacy Policies: Mismatches Between Meaning And Users’ Understanding, Joel R. Reidenberg, Travis Breaux, Lorrie F. Cranor, Brian M. French, Amanda Grannis, James T. Graves, Fei Liu, Aleecia Mcdonald, Thomas B. Norton, Rohan Ramanath, N. Cameron Russell, Norman Sadeh, Florian Schaub Jan 2015

Disagreeable Privacy Policies: Mismatches Between Meaning And Users’ Understanding, Joel R. Reidenberg, Travis Breaux, Lorrie F. Cranor, Brian M. French, Amanda Grannis, James T. Graves, Fei Liu, Aleecia Mcdonald, Thomas B. Norton, Rohan Ramanath, N. Cameron Russell, Norman Sadeh, Florian Schaub

Faculty Scholarship

Privacy policies are verbose, difficult to understand, take too long to read, and may be the least-read items on most websites even as users express growing concerns about information collection practices. For all their faults, though, privacy policies remain the single most important source of information for users to attempt to learn how companies collect, use, and share data. Likewise, these policies form the basis for the self-regulatory notice and choice framework that is designed and promoted as a replacement for regulation. The underlying value and legitimacy of notice and choice depends, however, on the ability of users to understand …


The Scope And Potential Of Ftc Data Protection, Woodrow Hartzog, Daniel J. Solove Jan 2015

The Scope And Potential Of Ftc Data Protection, Woodrow Hartzog, Daniel J. Solove

Faculty Scholarship

For more than fifteen years, the FTC has regulated privacy and data security through its authority to police deceptive and unfair trade practices as well as through powers conferred by specific statutes and international agreements. Recently, the FTC’s powers for data protection have been challenged by Wyndham Worldwide Corp. and LabMD. These recent cases raise a fundamental issue, and one that has surprisingly not been well explored: How broad are the FTC’s privacy and data security regulatory powers? How broad should they be?

In this Article, we address the issue of the scope of FTC authority in the areas of …


Data Breach (Regulatory) Effects, David Thaw Jan 2015

Data Breach (Regulatory) Effects, David Thaw

Articles

No abstract provided.


Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo Jan 2015

Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo

Articles

In 1986, Congress passed the Stored Communications Act (“SCA”) to provide additional protections for individuals’ private communications content held in electronic storage by third parties. Acting out of direct concern for the implications of the Third-Party Records Doctrine — a judicially created doctrine that generally eliminates Fourth Amendment protections for information entrusted to third parties — Congress sought to tailor the SCA to electronic communications sent via and stored by third parties. Yet, because Congress crafted the SCA with language specific to the technology of 1986, courts today have struggled to apply the SCA consistently with regard to similar private …


Can Americans Resist Surveillance?, Ryan Calo Jan 2015

Can Americans Resist Surveillance?, Ryan Calo

Articles

This Essay analyzes the ability of everyday Americans to resist and alter the conditions of government surveillance. Americans appear to have several avenues of resistance or reform. We can vote for privacy-friendly politicians, challenge surveillance in court, adopt encryption or other technologies, and put market pressure on companies not to cooperate with law enforcement.

In practice, however, many of these avenues are limited. Reform-minded officials lack the capacity for real oversight. Litigants lack standing to invoke the Constitution in court. Encryption is not usable and can turn citizens into targets. Citizens can extract promises from companies to push back against …


Marital Supremacy And The Constitution Of The Nonmarital Family, Serena Mayeri Jan 2015

Marital Supremacy And The Constitution Of The Nonmarital Family, Serena Mayeri

All Faculty Scholarship

Despite a transformative half century of social change, marital status still matters. The marriage equality movement has drawn attention to the many benefits conferred in law by marriage at a time when the “marriage gap” between affluent and poor Americans widens and rates of nonmarital childbearing soar. This Essay explores the contested history of marital supremacy—the legal privileging of marriage—through the lens of the “illegitimacy” cases of the 1960s and 1970s. Often remembered as a triumph for nonmarital families, these decisions defined the constitutional harm of illegitimacy classifications as the unjust punishment of innocent children for the “sins” of their …


Privacy And The New Press, Lyrissa Lidsky Jan 2015

Privacy And The New Press, Lyrissa Lidsky

Faculty Publications

In The First Amendment Bubble, Professor Amy Gajda comprehensively examines privacy threats posed by digital media and “quasi-journalists” and demonstrates how their intrusive practices threaten existing press freedoms.


The Dawn Of Social Intelligence (Socint), Laura K. Donohue Jan 2015

The Dawn Of Social Intelligence (Socint), Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

More information about citizens’ lives is recorded than ever before. Because the data is digitized, it can be accessed, analyzed, shared, and combined with other information to generate new knowledge. In a post-9/‌11 environment, the legal standards impeding access to such data have fallen. Simultaneously, the advent of global communications and cloud computing, along with network convergence, have expanded the scope of information available. The U.S. government has begun to collect and to analyze the associated data.

The result is the emergence of what can be termed “social intelligence” (SOCINT), which this Article defines as the collection of digital data …


An Overview Of Privacy Law, Daniel J. Solove, Paul M. Schwartz Jan 2015

An Overview Of Privacy Law, Daniel J. Solove, Paul M. Schwartz

GW Law Faculty Publications & Other Works

Chapter 2 of PRIVACY LAW FUNDAMENTALS provides a brief overview of information privacy law – the scope and types of law. The chapter contains an historical timeline of major developments in the law of privacy and data security.

PRIVACY LAW FUNDAMENTALS is a distilled guide to the essential elements of U.S. data privacy law. In an easily-digestible format, the book covers core concepts, key laws, and leading cases.

Professors Daniel Solove and Paul Schwartz clearly and concisely distill all relevant information about privacy law into this short volume. PRIVACY LAW FUNDAMENTALS is designed to be like Strunk and White’s Elements …


Unfair And Deceptive Robots, Woodrow Hartzog Jan 2015

Unfair And Deceptive Robots, Woodrow Hartzog

Faculty Scholarship

Robots, like household helpers, personal digital assistants, automated cars, and personal drones are or will soon be available to consumers. These robots raise common consumer protection issues, such as fraud, privacy, data security, and risks to health, physical safety and finances. Robots also raise new consumer protection issues, or at least call into question how existing consumer protection regimes might be applied to such emerging technologies. Yet it is unclear which legal regimes should govern these robots and what consumer protection rules for robots should look like.

The thesis of the Article is that the FTC’s grant of authority and …


Dear Yahoo: A Comment On In Re Yahoo Mail Litigation, Nareen Melkonian Jan 2015

Dear Yahoo: A Comment On In Re Yahoo Mail Litigation, Nareen Melkonian

Loyola of Los Angeles Law Review

No abstract provided.


Regulating Mass Surveillance As Privacy Pollution: Learning From Environmental Impact Statements, A. Michael Froomkin Jan 2015

Regulating Mass Surveillance As Privacy Pollution: Learning From Environmental Impact Statements, A. Michael Froomkin

Articles

Encroachments on privacy through mass surveillance greatly resemble the pollution crisis in that they can be understood as imposing an externality on the surveilled. This Article argues that this resemblance also suggests a solution: requiring those conducting mass surveillance in and through public spaces to disclose their plans publicly via an updated form of environmental impact statement, thus requiring an impact analysis and triggering a more informed public conversation about privacy. The Article first explains how mass surveillance is polluting public privacy and surveys the limited and inadequate doctrinal tools available to respond to mass surveillance technologies. Then, it provides …


From Anonymity To Identification, A. Michael Froomkin Jan 2015

From Anonymity To Identification, A. Michael Froomkin

Articles

This article examines whether anonymity online has a future. In the early days of the Internet, strong cryptography, anonymous remailers, and a relative lack of surveillance created an environment conducive to anonymous communication. Today, the outlook for online anonymity is poor. Several forces combine against it: ideologies that hold that anonymity is dangerous, or that identifying evil-doers is more important than ensuring a safe mechanism for unpopular speech; the profitability of identification in commerce; government surveillance; the influence of intellectual property interests and in requiring hardware and other tools that enforce identification; and the law at both national and supranational …


Amplifying Abuse: The Fusion Of Cyberharassment And Discrimination, Ari Ezra Waldman Jan 2015

Amplifying Abuse: The Fusion Of Cyberharassment And Discrimination, Ari Ezra Waldman

Articles & Chapters

Cyberharassment devastates its victims. Anxiety, panic attacks, and fear are common effects; post-traumatic stress disorder, anorexia and bulimia, and clinical depression are common diagnoses. Targets of online hate and abuse have gone into hiding, changed schools, and quit jobs to prevent further abuse. Some lives are devastated in adolescence and are never able to recover. Some lives come to tragic, premature ends. Danielle Keats Citron not only teases out these effects in her masterful work, Hate Crimes in Cyberspace; she also makes the profound conclusion that these personal effects are part of a larger social cancer that breeds sexism, subjugation, …


A Conceptual Framework For The Regulation Of Cryptocurrencies, Omri Y. Marian Jan 2015

A Conceptual Framework For The Regulation Of Cryptocurrencies, Omri Y. Marian

UF Law Faculty Publications

This Essay proposes a conceptual framework for the regulation of transactions involving cryptocurrencies. Cryptocurrencies offer tremendous opportunities for innovation and development but are also uniquely suited to facilitate illicit behavior. The regulatory framework suggested herein is intended to support (or at least not impair) cryptocurrencies’ innovative potential. At the same time, it aims to disrupt cryptocurrencies’ criminal utility. To achieve these purposes, this Essay proposes a regulatory framework that imposes costs on the characteristics of cryptocurrencies that make them especially useful for criminal behavior (in particular, anonymity) but does not impose costs on characteristics that are at the core of …


Push, Pull, And Spill: A Transdisciplinary Case Study In Municipal Open Government, Jan Whittington, Ryan Calo, Mike Simon, Jesse Woo, Meg Young, Perter Schmiedeskamp Jan 2015

Push, Pull, And Spill: A Transdisciplinary Case Study In Municipal Open Government, Jan Whittington, Ryan Calo, Mike Simon, Jesse Woo, Meg Young, Perter Schmiedeskamp

Articles

Municipal open data raises hopes and concerns. The activities of cities produce a wide array of data, data that is vastly enriched by ubiquitous computing. Municipal data is opened as it is pushed to, pulled by, and spilled to the public through online portals, requests for public records, and releases by cities and their vendors, contractors, and partners. By opening data, cities hope to raise public trust and prompt innovation. Municipal data, however, is often about the people who live, work, and travel in the city. By opening data, cities raise concern for privacy and social justice.

This article presents …


Confronting Totalitarianism At Home: The Roots Of European Privacy Protections, Hannah Bloch-Wehba Jan 2015

Confronting Totalitarianism At Home: The Roots Of European Privacy Protections, Hannah Bloch-Wehba

Faculty Scholarship

In the last several years, a consensus has developed that a wide gulf exists between European and American privacy law, although division still exists on whether European law is “more protective” or simply “home to different intuitive sensibilities” than American law. Existing research on the development of European privacy law has focused on two areas: nineteenth-century traditions of honor and dueling, which gave rise to a concept of privacy linked to dignity, and the totalitarian dictatorships of the twentieth century, in reaction to which privacy protected liberty. This Article offers a contrasting view by showing that European privacy law in …


Cases For Lecture 2; Privacy, Macerata 11 March 2015, Ulf Maunsbach Dec 2014

Cases For Lecture 2; Privacy, Macerata 11 March 2015, Ulf Maunsbach

Ulf Maunsbach

No abstract provided.


Digital Peepholes | Remote Activation Of Webcams: Technology, Law And Policy, Lori Andrews Dec 2014

Digital Peepholes | Remote Activation Of Webcams: Technology, Law And Policy, Lori Andrews

Lori B. Andrews

A comprehensive report concerning the many ways that webcams can be used against those who possess them. Digital Peepholes also provides in depth legal analysis of the legality of private companies and the government using people’s webcams to spy on them. A must read for anyone concerned with privacy or anyone with a webcam built in to their devices!