Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Privacy Law (70)
- Constitutional Law (26)
- Internet Law (26)
- Fourth Amendment (25)
- Science and Technology Law (23)
-
- First Amendment (15)
- Computer Law (14)
- Law and Society (13)
- Social and Behavioral Sciences (13)
- Communications Law (12)
- Criminal Law (12)
- National Security Law (11)
- Supreme Court of the United States (8)
- Law Enforcement and Corrections (7)
- Comparative and Foreign Law (6)
- Family Law (6)
- Legal Studies (6)
- Computer Sciences (5)
- Criminal Procedure (5)
- Human Rights Law (5)
- Intellectual Property Law (5)
- Juvenile Law (5)
- Law and Gender (5)
- Physical Sciences and Mathematics (5)
- Administrative Law (4)
- Consumer Protection Law (4)
- Contracts (4)
- Courts (4)
- Criminology and Criminal Justice (4)
- Institution
-
- Selected Works (21)
- The University of Akron (12)
- University of Michigan Law School (7)
- University of Tennessee College of Law (6)
- William & Mary Law School (6)
-
- Boston University School of Law (5)
- SelectedWorks (5)
- University of Maryland Francis King Carey School of Law (5)
- Washington and Lee University School of Law (5)
- Schulich School of Law, Dalhousie University (4)
- Chicago-Kent College of Law (3)
- Fordham Law School (3)
- New York Law School (3)
- Northwestern Pritzker School of Law (3)
- Pepperdine University (3)
- Roger Williams University (3)
- University of Colorado Law School (3)
- University of Miami Law School (3)
- University of Washington School of Law (3)
- Loyola Marymount University and Loyola Law School (2)
- Maurer School of Law: Indiana University (2)
- Northern Illinois University (2)
- Seattle University School of Law (2)
- St. John's University School of Law (2)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (2)
- University of Pennsylvania Carey Law School (2)
- University of Pittsburgh School of Law (2)
- American University Washington College of Law (1)
- Brigham Young University (1)
- Brooklyn Law School (1)
- Publication
-
- Akron Law Review (12)
- Articles (9)
- Faculty Scholarship (9)
- Faculty Publications (5)
- All Faculty Scholarship (4)
-
- Maryland Law Review (4)
- Washington and Lee Law Review (4)
- William & Mary Law Review (4)
- Articles & Chapters (3)
- Articles, Book Chapters, & Popular Press (3)
- Charles J. Russo (3)
- College of Law Faculty Scholarship (3)
- Michigan Telecommunications & Technology Law Review (3)
- Northwestern University Law Review (3)
- Paul M. Schwartz (3)
- Publications (3)
- Scholarly Works (3)
- Chicago-Kent Law Review (2)
- Fordham Intellectual Property, Media and Entertainment Law Journal (2)
- Journal of the National Association of Administrative Law Judiciary (2)
- Loyola of Los Angeles Law Review (2)
- Michigan Law Review First Impressions (2)
- Nevada Law Journal (2)
- Northern Illinois Law Review Supplement (2)
- Robert Sprague (2)
- Seattle University Law Review (2)
- Ulf Maunsbach (2)
- Articles by Maurer Faculty (1)
- Articles in Law Reviews & Other Academic Journals (1)
- Brigham Young University Prelaw Review (1)
- Publication Type
- File Type
Articles 121 - 150 of 150
Full-Text Articles in Law
Regulating Real-World Surveillance, Margot E. Kaminski
Regulating Real-World Surveillance, Margot E. Kaminski
Publications
A number of laws govern information gathering, or surveillance, by private parties in the physical world. But we lack a compelling theory of privacy harm that accounts for the state's interest in enacting these laws. Without a theory of privacy harm, these laws will be enacted piecemeal. Legislators will have a difficult time justifying the laws to constituents; the laws will not be adequately tailored to legislative interest; and courts will find it challenging to weigh privacy harms against other strong values, such as freedom of expression.
This Article identifies the government interest in enacting laws governing surveillance by private …
Corporate Avatars And The Erosion Of The Populist Fourth Amendment, Avidan Cover
Corporate Avatars And The Erosion Of The Populist Fourth Amendment, Avidan Cover
Faculty Publications
The current state of Fourth Amendment jurisprudence leaves it to technology corporations to challenge court orders, subpoenas, and requests by the government for individual users’ information. The third-party doctrine denies people a reasonable expectation of privacy in data they transmit through telecommunications and Internet service providers. Third-party corporations become, by default, the people’s corporate avatars. Corporate avatars, however, do a poor job of representing individuals’ interests. Moreover, vesting the Fourth Amendment’s government-oversight functions in corporations fails to cohere with the Bill of Rights’ populist history and the Framers’ distrust of corporations.
This article examines how the third-party doctrine proves unsupportable …
Book Review. Balancing Privacy And Free Speech: Unwanted Attention In The Age Of Social Media By Mark Tunick, Kimberly Mattioli
Book Review. Balancing Privacy And Free Speech: Unwanted Attention In The Age Of Social Media By Mark Tunick, Kimberly Mattioli
Articles by Maurer Faculty
No abstract provided.
The Substance Of Self-Government, James E. Fleming
The Substance Of Self-Government, James E. Fleming
Faculty Scholarship
In Democratic Rights: The Substance of Self-Government, Corey Brettschneider develops an attractive and powerful conception of self-government - the value theory of democracy - that encompasses both substantive rights like privacy and procedural rights. Although he argues, following Habermas and Rawls, that substantive rights and procedural rights are "co-original," the structure of his theory may lead him to reduce the former into the latter and not fully to account for personal self-government in his conception of democratic self-government. The wages of his democratic justifications for substantive rights may be a surprising anxiety or unwarranted tension concerning judicial review protecting such …
Surveillance As Loss Of Obscurity, Woodrow Hartzog, Evan Selinger
Surveillance As Loss Of Obscurity, Woodrow Hartzog, Evan Selinger
Faculty Scholarship
Everyone seems concerned about government surveillance, yet we have a hard time agreeing when and why it is a problem and what we should do about it. When is surveillance in public unjustified? Does metadata raise privacy concerns? Should encrypted devices have a backdoor for law enforcement officials? Despite increased attention, surveillance jurisprudence and theory still struggle for coherence. A common thread for modern surveillance problems has been difficult to find.
In this article we argue that the concept of ‘obscurity,’ which deals with the transaction costs involved in finding or understanding information, is the key to understanding and uniting …
Picturing Moral Arguments In A Fraught Legal Arena: Fetuses, Photographic Phantoms And Ultrasounds, Jessica Silbey
Picturing Moral Arguments In A Fraught Legal Arena: Fetuses, Photographic Phantoms And Ultrasounds, Jessica Silbey
Faculty Scholarship
This article investigates the movement in the U.S. that seeks to regulate the abortion decision by mandating ultrasounds prior to the procedure. The article argues that this reform effort is misguided not only because it is ineffective, but also because ultrasounds provide misleading information and are part of shaming practices that degrade the dignity of women. Both of these problems violate the main tenets of Planned Parenthood of Southern Pennsylvania v. Casey (1992). Central to the article’s argument and novelty is that the pro-ultrasound movement’s mistake is both legal and cultural. It misunderstands the nature of visual technology by failing …
Internet Giants As Quasi-Governmental Actors And The Limits Of Contractual Consent, Nancy Kim, D.A. Jeremy Telman
Internet Giants As Quasi-Governmental Actors And The Limits Of Contractual Consent, Nancy Kim, D.A. Jeremy Telman
Faculty Scholarship
Although the government’s data-mining program relied heavily on information and technology that the government received from private companies, relatively little of the public outrage generated by Edward Snowden’s revelations was directed at those private companies. We argue that the mystique of the Internet giants and the myth of contractual consent combine to mute criticisms that otherwise might be directed at the real data-mining masterminds. As a result, consumers are deemed to have consented to the use of their private information in ways that they would not agree to had they known the purposes to which their information would be put …
Robots In The Home: What Will We Have Agreed To?, Margot E. Kaminski
Robots In The Home: What Will We Have Agreed To?, Margot E. Kaminski
Publications
A new technology can expose the cracks in legal doctrine. Sometimes a technology resists analogy. Sometimes, through analogies, it reveals inconsistencies in the law, or basic flaws in framing, or in the fit between different parts of the legal system. This Essay addresses robots in the home, and what they reveal about U.S. privacy law. Household robots might not themselves uproot U.S. privacy law, but they will reveal its inconsistencies, and show where it is most likely to fracture. Just as drones are serving as a legislative “privacy catalyst” — encouraging the enactment of new privacy laws as people realize …
Environmental Privacy, Katrina F. Kuh
Environmental Privacy, Katrina F. Kuh
Utah Law Review
The purpose of this Article is not to anticipate whether or how the Fourth Amendment might apply to specific efforts to collect information about environmentally significant individual behaviors. The purpose is to discern the considerations that have proven salient in balancing environmental regulation and privacy to date that may likewise be relevant to navigating privacy concerns that arise with respect to policy directed to environmentally significant individual behaviors.
In this regard, the Article’s survey suggests that neither the fact that environmentally significant individual behaviors must be aggregated to produce environmental harm nor the fact that individuals, as opposed to commercial …
Self-Defense Against Robots And Drones, A. Michael Froomkin, P. Zak Colangelo
Self-Defense Against Robots And Drones, A. Michael Froomkin, P. Zak Colangelo
Articles
Robots can pose-or can appear to pose-a threat to life, property, and privacy. May a landowner legally shoot down a trespassing drone? Can she hold a trespassing autonomous car as security against damage done or further torts? Is the fear that a drone may be operated by a paparazzo or Peeping Tom sufficient grounds to disable or interfere with it? How hard may you shove if the office robot rolls over your foot? This Article addresses all those issues and one more. what rules and standards we could put into place to make the resolution of those questions easier and …
Neuroprediction: New Technology, Old Problems, Stephen J. Morse
Neuroprediction: New Technology, Old Problems, Stephen J. Morse
All Faculty Scholarship
Neuroprediction is the use of structural or functional brain or nervous system variables to make any type of prediction, including medical prognoses and behavioral forecasts, such as an indicator of future dangerous behavior. This commentary will focus on behavioral predictions, but the analysis applies to any context. The general thesis is that using neurovariables for prediction is a new technology, but that it raises no new ethical issues, at least for now. Only if neuroscience achieves the ability to “read” mental content will genuinely new ethical issues be raised, but that is not possible at present.
Disagreeable Privacy Policies: Mismatches Between Meaning And Users’ Understanding, Joel R. Reidenberg, Travis Breaux, Lorrie F. Cranor, Brian M. French, Amanda Grannis, James T. Graves, Fei Liu, Aleecia Mcdonald, Thomas B. Norton, Rohan Ramanath, N. Cameron Russell, Norman Sadeh, Florian Schaub
Disagreeable Privacy Policies: Mismatches Between Meaning And Users’ Understanding, Joel R. Reidenberg, Travis Breaux, Lorrie F. Cranor, Brian M. French, Amanda Grannis, James T. Graves, Fei Liu, Aleecia Mcdonald, Thomas B. Norton, Rohan Ramanath, N. Cameron Russell, Norman Sadeh, Florian Schaub
Faculty Scholarship
Privacy policies are verbose, difficult to understand, take too long to read, and may be the least-read items on most websites even as users express growing concerns about information collection practices. For all their faults, though, privacy policies remain the single most important source of information for users to attempt to learn how companies collect, use, and share data. Likewise, these policies form the basis for the self-regulatory notice and choice framework that is designed and promoted as a replacement for regulation. The underlying value and legitimacy of notice and choice depends, however, on the ability of users to understand …
The Scope And Potential Of Ftc Data Protection, Woodrow Hartzog, Daniel J. Solove
The Scope And Potential Of Ftc Data Protection, Woodrow Hartzog, Daniel J. Solove
Faculty Scholarship
For more than fifteen years, the FTC has regulated privacy and data security through its authority to police deceptive and unfair trade practices as well as through powers conferred by specific statutes and international agreements. Recently, the FTC’s powers for data protection have been challenged by Wyndham Worldwide Corp. and LabMD. These recent cases raise a fundamental issue, and one that has surprisingly not been well explored: How broad are the FTC’s privacy and data security regulatory powers? How broad should they be?
In this Article, we address the issue of the scope of FTC authority in the areas of …
Data Breach (Regulatory) Effects, David Thaw
Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo
Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo
Articles
In 1986, Congress passed the Stored Communications Act (“SCA”) to provide additional protections for individuals’ private communications content held in electronic storage by third parties. Acting out of direct concern for the implications of the Third-Party Records Doctrine — a judicially created doctrine that generally eliminates Fourth Amendment protections for information entrusted to third parties — Congress sought to tailor the SCA to electronic communications sent via and stored by third parties. Yet, because Congress crafted the SCA with language specific to the technology of 1986, courts today have struggled to apply the SCA consistently with regard to similar private …
Can Americans Resist Surveillance?, Ryan Calo
Can Americans Resist Surveillance?, Ryan Calo
Articles
This Essay analyzes the ability of everyday Americans to resist and alter the conditions of government surveillance. Americans appear to have several avenues of resistance or reform. We can vote for privacy-friendly politicians, challenge surveillance in court, adopt encryption or other technologies, and put market pressure on companies not to cooperate with law enforcement.
In practice, however, many of these avenues are limited. Reform-minded officials lack the capacity for real oversight. Litigants lack standing to invoke the Constitution in court. Encryption is not usable and can turn citizens into targets. Citizens can extract promises from companies to push back against …
Marital Supremacy And The Constitution Of The Nonmarital Family, Serena Mayeri
Marital Supremacy And The Constitution Of The Nonmarital Family, Serena Mayeri
All Faculty Scholarship
Despite a transformative half century of social change, marital status still matters. The marriage equality movement has drawn attention to the many benefits conferred in law by marriage at a time when the “marriage gap” between affluent and poor Americans widens and rates of nonmarital childbearing soar. This Essay explores the contested history of marital supremacy—the legal privileging of marriage—through the lens of the “illegitimacy” cases of the 1960s and 1970s. Often remembered as a triumph for nonmarital families, these decisions defined the constitutional harm of illegitimacy classifications as the unjust punishment of innocent children for the “sins” of their …
Privacy And The New Press, Lyrissa Lidsky
Privacy And The New Press, Lyrissa Lidsky
Faculty Publications
In The First Amendment Bubble, Professor Amy Gajda comprehensively examines privacy threats posed by digital media and “quasi-journalists” and demonstrates how their intrusive practices threaten existing press freedoms.
The Dawn Of Social Intelligence (Socint), Laura K. Donohue
The Dawn Of Social Intelligence (Socint), Laura K. Donohue
Georgetown Law Faculty Publications and Other Works
More information about citizens’ lives is recorded than ever before. Because the data is digitized, it can be accessed, analyzed, shared, and combined with other information to generate new knowledge. In a post-9/11 environment, the legal standards impeding access to such data have fallen. Simultaneously, the advent of global communications and cloud computing, along with network convergence, have expanded the scope of information available. The U.S. government has begun to collect and to analyze the associated data.
The result is the emergence of what can be termed “social intelligence” (SOCINT), which this Article defines as the collection of digital data …
An Overview Of Privacy Law, Daniel J. Solove, Paul M. Schwartz
An Overview Of Privacy Law, Daniel J. Solove, Paul M. Schwartz
GW Law Faculty Publications & Other Works
Chapter 2 of PRIVACY LAW FUNDAMENTALS provides a brief overview of information privacy law – the scope and types of law. The chapter contains an historical timeline of major developments in the law of privacy and data security.
PRIVACY LAW FUNDAMENTALS is a distilled guide to the essential elements of U.S. data privacy law. In an easily-digestible format, the book covers core concepts, key laws, and leading cases.
Professors Daniel Solove and Paul Schwartz clearly and concisely distill all relevant information about privacy law into this short volume. PRIVACY LAW FUNDAMENTALS is designed to be like Strunk and White’s Elements …
Unfair And Deceptive Robots, Woodrow Hartzog
Unfair And Deceptive Robots, Woodrow Hartzog
Faculty Scholarship
Robots, like household helpers, personal digital assistants, automated cars, and personal drones are or will soon be available to consumers. These robots raise common consumer protection issues, such as fraud, privacy, data security, and risks to health, physical safety and finances. Robots also raise new consumer protection issues, or at least call into question how existing consumer protection regimes might be applied to such emerging technologies. Yet it is unclear which legal regimes should govern these robots and what consumer protection rules for robots should look like.
The thesis of the Article is that the FTC’s grant of authority and …
Dear Yahoo: A Comment On In Re Yahoo Mail Litigation, Nareen Melkonian
Dear Yahoo: A Comment On In Re Yahoo Mail Litigation, Nareen Melkonian
Loyola of Los Angeles Law Review
No abstract provided.
Regulating Mass Surveillance As Privacy Pollution: Learning From Environmental Impact Statements, A. Michael Froomkin
Regulating Mass Surveillance As Privacy Pollution: Learning From Environmental Impact Statements, A. Michael Froomkin
Articles
Encroachments on privacy through mass surveillance greatly resemble the pollution crisis in that they can be understood as imposing an externality on the surveilled. This Article argues that this resemblance also suggests a solution: requiring those conducting mass surveillance in and through public spaces to disclose their plans publicly via an updated form of environmental impact statement, thus requiring an impact analysis and triggering a more informed public conversation about privacy. The Article first explains how mass surveillance is polluting public privacy and surveys the limited and inadequate doctrinal tools available to respond to mass surveillance technologies. Then, it provides …
From Anonymity To Identification, A. Michael Froomkin
From Anonymity To Identification, A. Michael Froomkin
Articles
This article examines whether anonymity online has a future. In the early days of the Internet, strong cryptography, anonymous remailers, and a relative lack of surveillance created an environment conducive to anonymous communication. Today, the outlook for online anonymity is poor. Several forces combine against it: ideologies that hold that anonymity is dangerous, or that identifying evil-doers is more important than ensuring a safe mechanism for unpopular speech; the profitability of identification in commerce; government surveillance; the influence of intellectual property interests and in requiring hardware and other tools that enforce identification; and the law at both national and supranational …
Amplifying Abuse: The Fusion Of Cyberharassment And Discrimination, Ari Ezra Waldman
Amplifying Abuse: The Fusion Of Cyberharassment And Discrimination, Ari Ezra Waldman
Articles & Chapters
Cyberharassment devastates its victims. Anxiety, panic attacks, and fear are common effects; post-traumatic stress disorder, anorexia and bulimia, and clinical depression are common diagnoses. Targets of online hate and abuse have gone into hiding, changed schools, and quit jobs to prevent further abuse. Some lives are devastated in adolescence and are never able to recover. Some lives come to tragic, premature ends. Danielle Keats Citron not only teases out these effects in her masterful work, Hate Crimes in Cyberspace; she also makes the profound conclusion that these personal effects are part of a larger social cancer that breeds sexism, subjugation, …
A Conceptual Framework For The Regulation Of Cryptocurrencies, Omri Y. Marian
A Conceptual Framework For The Regulation Of Cryptocurrencies, Omri Y. Marian
UF Law Faculty Publications
This Essay proposes a conceptual framework for the regulation of transactions involving cryptocurrencies. Cryptocurrencies offer tremendous opportunities for innovation and development but are also uniquely suited to facilitate illicit behavior. The regulatory framework suggested herein is intended to support (or at least not impair) cryptocurrencies’ innovative potential. At the same time, it aims to disrupt cryptocurrencies’ criminal utility. To achieve these purposes, this Essay proposes a regulatory framework that imposes costs on the characteristics of cryptocurrencies that make them especially useful for criminal behavior (in particular, anonymity) but does not impose costs on characteristics that are at the core of …
Push, Pull, And Spill: A Transdisciplinary Case Study In Municipal Open Government, Jan Whittington, Ryan Calo, Mike Simon, Jesse Woo, Meg Young, Perter Schmiedeskamp
Push, Pull, And Spill: A Transdisciplinary Case Study In Municipal Open Government, Jan Whittington, Ryan Calo, Mike Simon, Jesse Woo, Meg Young, Perter Schmiedeskamp
Articles
Municipal open data raises hopes and concerns. The activities of cities produce a wide array of data, data that is vastly enriched by ubiquitous computing. Municipal data is opened as it is pushed to, pulled by, and spilled to the public through online portals, requests for public records, and releases by cities and their vendors, contractors, and partners. By opening data, cities hope to raise public trust and prompt innovation. Municipal data, however, is often about the people who live, work, and travel in the city. By opening data, cities raise concern for privacy and social justice.
This article presents …
Confronting Totalitarianism At Home: The Roots Of European Privacy Protections, Hannah Bloch-Wehba
Confronting Totalitarianism At Home: The Roots Of European Privacy Protections, Hannah Bloch-Wehba
Faculty Scholarship
In the last several years, a consensus has developed that a wide gulf exists between European and American privacy law, although division still exists on whether European law is “more protective” or simply “home to different intuitive sensibilities” than American law. Existing research on the development of European privacy law has focused on two areas: nineteenth-century traditions of honor and dueling, which gave rise to a concept of privacy linked to dignity, and the totalitarian dictatorships of the twentieth century, in reaction to which privacy protected liberty. This Article offers a contrasting view by showing that European privacy law in …
Cases For Lecture 2; Privacy, Macerata 11 March 2015, Ulf Maunsbach
Cases For Lecture 2; Privacy, Macerata 11 March 2015, Ulf Maunsbach
Ulf Maunsbach
No abstract provided.
Digital Peepholes | Remote Activation Of Webcams: Technology, Law And Policy, Lori Andrews