Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2019

Privacy Law

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 177

Full-Text Articles in Law

“Hey Alexa, Do Consumers Really Want More Data Privacy?”: An Analysis Of The Negative Effects Of The General Data Protection Regulation, Katherine M. Wilcox Dec 2019

“Hey Alexa, Do Consumers Really Want More Data Privacy?”: An Analysis Of The Negative Effects Of The General Data Protection Regulation, Katherine M. Wilcox

Brooklyn Law Review

Recent news articles discuss the flooding of email inboxes with lengthy terms and condition updates, viral videos of Mark Zuckerberg’s public Cambridge Analytica hearing before Congress, and the phenomenon of internet advertisements appearing for items that consumers merely searched for on Google a day prior. Effective as of May 25, 2018, the European Union’s General Data Protection Regulation (GDPR) established a framework that sets legal standards targeted at businesses and other data collectors to dramatically increase data privacy protections for citizens of the EU. Consumers, however, do not seem to appreciate these increased protections, as they rarely read ...


The Clone Wars: The Right To Embryonic Gene Editing Under German Law, Keren Goldberger Dec 2019

The Clone Wars: The Right To Embryonic Gene Editing Under German Law, Keren Goldberger

Brooklyn Journal of International Law

Germany has the strictest genetic engineering laws in the world and bans virtually all kinds of embryonic gene editing. Since the invention of CRISPR, however, embryonic gene editing is more precise, and the possibilities of curing genetic diseases are more real than ever. This Note will argue for the right to embryonic gene editing through an analysis of German constitutional privacy and right to life jurisprudence. Ultimately, this Note argues for a right to procreate under German law that is backed by the state’s affirmative duty to encourage and protect life. When the technology is available, German Law should ...


Smart Factories, Dumb Policy? Managing Cybersecurity And Data Privacy Risks In The Industrial Internet Of Things, Scott J. Shackelford Dec 2019

Smart Factories, Dumb Policy? Managing Cybersecurity And Data Privacy Risks In The Industrial Internet Of Things, Scott J. Shackelford

Minnesota Journal of Law, Science & Technology

No abstract provided.


Censorship, Free Speech & Facebook: Applying The First Amendment To Social Media Platforms Via The Public Function Exception, Matthew P. Hooker Dec 2019

Censorship, Free Speech & Facebook: Applying The First Amendment To Social Media Platforms Via The Public Function Exception, Matthew P. Hooker

Washington Journal of Law, Technology & Arts

Society has a love-hate relationship with social media. Thanks to social media platforms, the world is more connected than ever before. But with the ever-growing dominance of social media there have come a mass of challenges. What is okay to post? What isn't? And who or what should be regulating those standards? Platforms are now constantly criticized for their content regulation policies, sometimes because they are viewed as too harsh and other times because they are characterized as too lax. And naturally, the First Amendment quickly enters the conversation. Should social media platforms be subject to the First Amendment ...


Going Rogue: Mobile Research Applications And The Right To Privacy, Stacey A. Tovino Dec 2019

Going Rogue: Mobile Research Applications And The Right To Privacy, Stacey A. Tovino

Notre Dame Law Review

This Article investigates whether nonsectoral state laws may serve as a viable source of privacy and security standards for mobile health research participants and other health data subjects until new federal laws are created or enforced. In particular, this Article (1) catalogues and analyzes the nonsectoral data privacy, security, and breach notification statutes of all fifty states and the District of Columbia; (2) applies these statutes to mobile-app-mediated health research conducted by independent scientists, citizen scientists, and patient researchers; and (3) proposes substantive amendments to state law that could help protect the privacy and security of all health data subjects ...


Protecting Health Information In Utero: A Radical Proposal, Luke Isaac Haqq Dec 2019

Protecting Health Information In Utero: A Radical Proposal, Luke Isaac Haqq

Journal of Law and Policy

This Article introduces an underappreciated space in which protected health information (“PHI”) remains largely unprotected, a fact that will become only more problematic as clinical medicine increasingly turns to genomics. The past decade has seen significant advances in the prevention of birth defects, especially with the introduction of clinical preconception, prenatal, and neonatal genomic sequencing. Parental access to the results of embryonic and fetal clinical sequencing is critical to reproductive autonomy; results can provide parents with important considerations in determining whether to seek or avoid conception, as well as in deciding whether to carry a pregnancy to term. The information ...


The Long Road Back To Skokie: Returning The First Amendment To Mask Wearers, Rob Kahn Dec 2019

The Long Road Back To Skokie: Returning The First Amendment To Mask Wearers, Rob Kahn

Journal of Law and Policy

When the Seventh Circuit upheld the First Amendment right of Nazis to march in Skokie, Illinois in 1978, the protection of mask wearers was not far behind. Since then, doctrinal paths have diverged. While the Supreme Court continues to protect hate speech, mask wearing has been increasingly placed outside First Amendment protection. This article seeks to get to the bottom of this doctrinal divergence by addressing the symbolic purposes of mask bans—rooted in repudiating the Ku Klux Klan—as well as the doctrinal steps taken over the past forty years to restrict the First Amendment claims of mask wearers ...


Increasing Lapses In Data Security: The Need For A Common Answer To What Constitutes Standing In A Data Breach Context, Aaron Benjamin Edelman Dec 2019

Increasing Lapses In Data Security: The Need For A Common Answer To What Constitutes Standing In A Data Breach Context, Aaron Benjamin Edelman

Journal of Law and Policy

As the number of data breaches continues to rise in the United States, so does the amount of data breach litigation. Many potential plaintiffs who suffered as victims of data breaches, however, find themselves in limbo regarding the issue of standing before a court because of a significant split on standing determinations amongst the federal circuit courts. Thus, while victims of data breaches oftentimes have their personal information fall into the hands of nefarious characters who intend to use the information to a victim’s detriment, that may not be enough to provide victims a right to sue in federal ...


Hb 481 - Heartbeat Bill, Michael G. Foo, Taylor L. Lin Dec 2019

Hb 481 - Heartbeat Bill, Michael G. Foo, Taylor L. Lin

Georgia State University Law Review

The Act adds an unborn child with a detectable human heartbeat to the definition of a natural person and includes such unborn child in state population counts. The Act defines abortion, prescribes when abortions may be performed, provides exceptions to abortion performance limitations, establishes requirements for performing an abortion, and provides for a right of action, damages, and affirmative defenses. The Act permits alimony and child support payments starting when an unborn child has a detectable human heartbeat. Parents have the right to recover the full value of a child’s life when a detectable human heartbeat exists. The Act ...


Deep Fakes: A Looming Challenge For Privacy, Democracy, And National Security, Danielle K. Citron, Robert Chesney Dec 2019

Deep Fakes: A Looming Challenge For Privacy, Democracy, And National Security, Danielle K. Citron, Robert Chesney

Faculty Scholarship

Harmful lies are nothing new. But the ability to distort reality has taken an exponential leap forward with “deep fake” technology. This capability makes it possible to create audio and video of real people saying and doing things they never said or did. Machine learning techniques are escalating the technology’s sophistication, making deep fakes ever more realistic and increasingly resistant to detection. Deep-fake technology has characteristics that enable rapid and widespread diffusion, putting it into the hands of both sophisticated and unsophisticated actors. While deep-fake technology will bring with it certain benefits, it also will introduce many harms. The ...


Between You, Me, And Alexa: On The Legality Of Virtual Assistant Devices In Two-Party Consent States, Ria Kuruvilla Dec 2019

Between You, Me, And Alexa: On The Legality Of Virtual Assistant Devices In Two-Party Consent States, Ria Kuruvilla

Washington Law Review

When an Amazon Echo is activated, the device is constantly recording and sending those recordings to Amazon’s cloud. For an always recording device such as the Echo, getting consent from every person subject to a recording proves difficult. An Echo-owner consents to the recordings when they purchase and register the device, but when does a guest in an Echo-owner’s home consent to being recorded? This Comment uses Amazon’s Echo and Washington’s privacy statute to illustrate the tension between speech-activated devices and two-party consent laws—which require that all parties subject to a recording consent to being ...


Law School News: Logan To Serve As Adviser On Restatement Third Of Torts 11-07-2019, Michael M. Bowden Nov 2019

Law School News: Logan To Serve As Adviser On Restatement Third Of Torts 11-07-2019, Michael M. Bowden

Life of the Law School (1993- )

No abstract provided.


Efficient Privacy-Aware Imagery Data Analysis, Yifan Tian Nov 2019

Efficient Privacy-Aware Imagery Data Analysis, Yifan Tian

Dissertations and Theses

The widespread use of smartphones and camera-coupled Internet of Thing (IoT) devices triggers an explosive growth of imagery data. To extract and process the rich contents contained in imagery data, various image analysis techniques have been investigated and applied to a spectrum of application scenarios. In recent years, breakthroughs in deep learning have powered a new revolution for image analysis in terms of effectiveness with high resource consumption. Given the fact that most smartphones and IoT devices have limited computational capability and battery life, they are not ready for the processing of computational intensive analytics over imagery data collected by ...


Smile, You’Re On Camera: A Discussion Of The Privacy Rights Of Teachers In The Modern Day Classroom, Dakota Brewer Nov 2019

Smile, You’Re On Camera: A Discussion Of The Privacy Rights Of Teachers In The Modern Day Classroom, Dakota Brewer

Brigham Young University Education and Law Journal

No abstract provided.


Why Sexual Privacy Matters For Trust, Danielle K. Citron Nov 2019

Why Sexual Privacy Matters For Trust, Danielle K. Citron

Faculty Scholarship

Every generation’s intimates have their preferred modes of self-disclosure. Not long ago, intimate partners exchanged love letters and mixed tapes. They spent hours on the phone. Today, they text their innermost thoughts, beliefs, and wishes, sometimes with nude photos attached. They engage in sexually-explicit activity via FaceTime and SnapChat.

Now, as then, the success and integrity of intimate relationships depends upon sexual privacy. Intimate relationships develop as partners grow to trust one another to treat their nakedness, deepest secrets, and sexual desires as they hope rather than as they fear. Handling partners’ personal information with discretion lays the foundation ...


المسؤولیة المدنیة للمشغل النووي وفقا للمرسوم بقانون اتحادي رقم ( 4) لسنة 2012 في شأن المسؤولیة المدنیة عن الأضرار النوویة واتفاقیة فیینا لعام 1997بشأن المسؤولیة المدنیة عن الأضرار النوویة, إسماعیل إبراھیم صقر الحوسني Nov 2019

المسؤولیة المدنیة للمشغل النووي وفقا للمرسوم بقانون اتحادي رقم ( 4) لسنة 2012 في شأن المسؤولیة المدنیة عن الأضرار النوویة واتفاقیة فیینا لعام 1997بشأن المسؤولیة المدنیة عن الأضرار النوویة, إسماعیل إبراھیم صقر الحوسني

Private Law Theses

نظرا لمدى الأثار الجسيمة المترتبة على أضرار الحادث النووي من حیث الفداحة واتسا ع وسرعة انتشارها واتسامها بطابع الخفية، وتراخي نتائجھا الى المستقبل وما ينتج عن هذه الأارمن آثار سلبیة قد ترتقي الى درجة المأساویة، الأمر الذي وضع المشرع الإماراتي من أجلھ نظام قانوني مستحدث واستثنائى للمسؤوليةالمدنية عن الأضرار النووية يعتمد على المسؤولیة الموضوعیة كأساس للتعویض.

لذلك ھدفت ھذه الدراسة للتعريف على ماهية الفعل الضار للمشغل النووي وأحكام القانون المنظم لھذه المسؤولیة وھي المرسوم بقانون اتحادي رقم 4 لسنة 2012 بشأن المسؤولیة المدنیة عن الآضرار النووية والأساسيات التي وضعها الفقه والقانون في سبيل تقدير الخطأ النووي ومدى استحقاقھ للتعویض ومقدار ...


A Private Enforcement Remedy For Information Misuse, Peter C. Ormerod Oct 2019

A Private Enforcement Remedy For Information Misuse, Peter C. Ormerod

Boston College Law Review

Misuse of users’ personally identifiable information is persistent and pervasive. This Article addresses two questions: why is information misuse so common and so severe and how could domestic law change to make it less so? I use a simple model to illustrate that companies externalize information misuse costs onto users, which has two related but distinct effects: chronic underinvestment in information security and excessive retention of user data. I then seize on this observation to propose a specific legal vehicle at the heart of this Article—a private enforcement remedy. This private enforcement remedy has four essential features. First, the ...


Collect Call For Clarification: How Carpenter Has (And Has Not) Changed Modern Fourth Amendment Jurisprudence, Samuel D. Thomas Oct 2019

Collect Call For Clarification: How Carpenter Has (And Has Not) Changed Modern Fourth Amendment Jurisprudence, Samuel D. Thomas

Boston College Law Review

Since the 1800s, the United States Supreme Court has struggled to define the limits of the Fourth Amendment and adapt the scope of its protection to advances in technology. The new ways we use technology to interact, and the role such technology plays in society, create unique questions that judicial precedent based on old technology has trouble answering. Most recently, cell phones and mobile applications have changed the way millions of Americans communicate with each other, and access and store information. For years the government accessed this shared information through subpoenas without triggering the Fourth Amendment’s protection from unwarranted ...


The Ambush Interview: A False Light Invasion Of Privacy, Kevin F. O'Neill Oct 2019

The Ambush Interview: A False Light Invasion Of Privacy, Kevin F. O'Neill

Kevin F. O'Neill

The ''ambush" interview is a controversial investigative reporting technique permeating both national and local television news programming. In the typical ambush interview, a reporter and his news crew intercept an unsuspecting newsworthy subject on the street and bombard him with incriminating accusations ostensibly framed as questions. The ambush interviewee inevitably appears guilty before the viewing audience. This is due to a variety of forces, including the subject's severe credibility disadvantage and the accusatory nature of the reporter's questions. This Note applies a false light invasion of privacy analysis to the ambush technique and examines the nexus between the ...


The Skeleton In The Hard Drive: Encryption And The Fifth Amendment, David W. Opderbeck Oct 2019

The Skeleton In The Hard Drive: Encryption And The Fifth Amendment, David W. Opderbeck

Florida Law Review

In Teva Pharmaceuticals USA, Inc. v. Sandoz, Inc., the Supreme Court addressed an oft-discussed jurisprudential disconnect between itself and the U.S. Court of Appeals for the Federal Circuit: whether patent claim construction was “legal” or “factual” in nature, and how much deference is due to district court decision-making in this area. This Article closely examines the Teva opinion and situates it within modern claim construction jurisprudence. The thesis is that the Teva holding is likely to have only very modest effects on the incidence of deference to district court claim construction, but that for unexpected reasons the case is ...


The Missing Regulatory State: Monitoring Businesses In An Age Of Surveillance, Rory V. Loo Oct 2019

The Missing Regulatory State: Monitoring Businesses In An Age Of Surveillance, Rory V. Loo

Vanderbilt Law Review

An irony of the information age is that the companies responsible for the most extensive surveillance of individuals in history-large platforms such as Amazon, Facebook, and Google-have themselves remained unusually shielded from being monitored by government regulators. But the legal literature on state information acquisition is dominated by the privacy problems of excess collection from individuals, not businesses. There has been little sustained attention to the problem of insufficient information collection from businesses. This Article articulates the administrative state's normative framework for monitoring businesses and shows how that framework is increasingly in tension with privacy concerns. One emerging complication ...


Standing To Challenge Familial Searches Of Commercial Dna Databases, Hillary L. Kody Oct 2019

Standing To Challenge Familial Searches Of Commercial Dna Databases, Hillary L. Kody

William & Mary Law Review

In April 2018, police officers arrested Joseph James DeAngelo. DeAngelo, the officers claimed, was the “Golden State Killer,” a man who committed dozens of murders and over fifty sexual assaults in California in the 1970s and 1980s. The Golden State Killer had long eluded police, even though his DNA profile linked him to dozens of violent crimes. While law enforcement officials from several jurisdictions in California had collected his DNA from crime scenes, the Golden State Killer’s crimes predated modern DNA analysis. Police found little use for the profile without a suspect’s profile to compare to it.

Nearly ...


The Missing Regulatory State: Monitoring Businesses In An Age Of Surveillance, Rory Van Loo Oct 2019

The Missing Regulatory State: Monitoring Businesses In An Age Of Surveillance, Rory Van Loo

Faculty Scholarship

An irony of the information age is that the companies responsible for the most extensive surveillance of individuals in history—large platforms such as Amazon, Facebook, and Google—have themselves remained unusually shielded from being monitored by government regulators. But the legal literature on state information acquisition is dominated by the privacy problems of excess collection from individuals, not businesses. There has been little sustained attention to the problem of insufficient information collection from businesses. This Article articulates the administrative state’s normative framework for monitoring businesses and shows how that framework is increasingly in tension with privacy concerns. One ...


Boilerplate Indignity, Erik Encarnacion Oct 2019

Boilerplate Indignity, Erik Encarnacion

Indiana Law Journal

Commentators have long tried to sound the alarm about boilerplate contracts, pointing out threats ranging from the loss of privacy rights to the erosion of public law and democratic self-governance. This Article argues that this list of concerns misses something important: that imposing certain boilerplate terms on individuals is incompatible with their dignity. After explaining and defending the conception of dignity presupposed here, this Article shows how boilerplate accountability waivers—like arbitration clauses—prevent people from accessing the distinctive dignity-vindicating role of courts and degrade their status as legal persons. And because governments may legitimately protect dignity interests, proposed reforms ...


The Federalism Challenges Of Protecting Medical Privacy In Workers' Compensation, Ani B. Satz Oct 2019

The Federalism Challenges Of Protecting Medical Privacy In Workers' Compensation, Ani B. Satz

Indiana Law Journal

Under current law, injured workers face a Hobson’s choice: They may file for workers’ compensation or maintain their medical privacy. The reason for this is that § 164.512(l) of the Health Insurance Portability and Accountability Act’s Privacy Rule (HPR) is widely misinterpreted by courts and legislatures as a wholesale waiver of privacy protections for injured workers. Section 164.512(l) excludes workers’ compensation from federal privacy protections that may frustrate the efficient administration of workers’ compensation claims. As the history and intent behind the HPR indicate, § 164.512(l) is premised on the assumption that states will ...


Table Of Contents, Seattle University Law Review Sep 2019

Table Of Contents, Seattle University Law Review

Seattle University Law Review

No abstract provided.


The Professor Anthony J. Santoro Business Law Lecture Series Presents Becoming A Valued Business Lawyer, Roger Williams University School Of Law, Michael M. Bowden Sep 2019

The Professor Anthony J. Santoro Business Law Lecture Series Presents Becoming A Valued Business Lawyer, Roger Williams University School Of Law, Michael M. Bowden

School of Law Conferences, Lectures & Events

No abstract provided.


The Positive Law Model Of The Fourth Amendment, William Baude, James Y. Stern Sep 2019

The Positive Law Model Of The Fourth Amendment, William Baude, James Y. Stern

James Y. Stern

For fifty years, courts have used a “reasonable expectation of privacy” standard to define “searches” under the Fourth Amendment. As others have recognized, that doctrine is subjective, unpredictable, and conceptually confused, but viable alternatives have been slow to emerge. This Article supplies one.

We argue that Fourth Amendment protection should be anchored in background positive law. The touchstone of the search-and-seizure analysis should be whether government officials have done something forbidden to private parties. It is those actions that should be subjected to Fourth Amendment reasonableness review and the presumptive requirement to obtain a warrant. In short, Fourth Amendment protection ...


Towards Standard Information Privacy, Innovations Of The New General Data Protection Regulation, Ali Alibeigi, Abu Bakar Munir, Md Ershadulkarim, Adeleh Asemi Sep 2019

Towards Standard Information Privacy, Innovations Of The New General Data Protection Regulation, Ali Alibeigi, Abu Bakar Munir, Md Ershadulkarim, Adeleh Asemi

Library Philosophy and Practice (e-journal)

Protection of personal data in recent decades became more crucial affecting by emergence of the new technologies especially computer, internet, information and communications technology. However, Europeans felt this necessity at time and provided for up-to-date and supportive laws. The General Data Protection Regulation (GDPR) is the latest legislation in EU to protect personal data of individuals based on the recent technological advancements. However, its’ domestic and international output still is debatable. This doctrinal legal study by using descriptive methods, aimed to evaluate the GDPR through analyzing and interpreting its’ provisions by especial focus on its’ innovations. The results show that ...


Committed To Treatment?: The Potential Role Of Involuntary Hospitalization In West Virginia’S Response To The Opioid Epidemic, Quentin T. Collie Sep 2019

Committed To Treatment?: The Potential Role Of Involuntary Hospitalization In West Virginia’S Response To The Opioid Epidemic, Quentin T. Collie

West Virginia Law Review

No abstract provided.