Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Law

Gender Equality And The First Amendment: Foreword, Jeanmarie Fenrich, Benjamin C. Zipursky, Danielle Keats Citron May 2019

Gender Equality And The First Amendment: Foreword, Jeanmarie Fenrich, Benjamin C. Zipursky, Danielle Keats Citron

Fordham Law Review

Gender equality demands equal opportunity to speak and be heard. Yet, in recent years, the clash between equality and free speech in the context of gender has intensified—in the media, the workplace, college campuses, and the political arena, both online and offline. The internet has given rise to novel First Amendment issues that particularly affect women, such as nonconsensual pornography, online harassment, and online privacy. On November 1–2, 2018, the Fordham Law Review brought together scholars and practicing lawyers from around the nation to address many of the pressing challenges facing feminists and free speech advocates today. The Symposium was …


When Law Frees Us To Speak, Danielle Keats Citron, Jonathon W. Penney May 2019

When Law Frees Us To Speak, Danielle Keats Citron, Jonathon W. Penney

Fordham Law Review

A central aim of online abuse is to silence victims. That effort is as regrettable as it is successful. In the face of cyberharassment and sexualprivacy invasions, women and marginalized groups retreat from online engagement. These documented chilling effects, however, are not inevitable. Beyond its deterrent function, the law has an equally important expressive role. In this Article, we highlight law’s capacity to shape social norms and behavior through education. We focus on a neglected dimension of law’s expressive role: its capacity to empower victims to express their truths and engage with others. Our argument is theoretical and empirical. We …


American Courts And The Sex Blind Spot: Legitimacy And Representation, Michele Goodwin, Mariah Lindsay May 2019

American Courts And The Sex Blind Spot: Legitimacy And Representation, Michele Goodwin, Mariah Lindsay

Fordham Law Review

We argue the legacy of explicit sex bias and discrimination with relation to political rights and social status begins within government, hewn from state and federal lawmaking. As such, male lawmakers and judges conscribed a woman’s role to her home and defined the scope of her independence in the local community and broader society. Politically and legally, women were legal appendages to men—objects of male power (visà-vis their husbands and fathers). In law, women’s roles included sexual chattel to their spouses, care of the home, and producing offspring. Accordingly, women were essential in the home, as law would have it, …


Airbnb In New York City: Whose Privacy Rights Are Threatened By A Government Data Grab?, Tess Hofmann May 2019

Airbnb In New York City: Whose Privacy Rights Are Threatened By A Government Data Grab?, Tess Hofmann

Fordham Law Review

New York City regulators have vigorously resisted the rise of Airbnb as an alternative to traditional hotels, characterizing “home sharing” as a trend that is sucking up permanent housing in a city already facing an affordability crisis. However, laws banning short-term rentals have done little to discourage this practice, as Airbnb’s policy of keeping user information private makes it possible for illegal operators to evade law enforcement. Frustrated by this power imbalance, the New York City Council passed Local Law 146, which requires Airbnb to provide city officials with access to the names and information of its home sharing hosts …


Data Scraping As A Cause Of Action: Limiting Use Of The Cfaa And Trespass In Online Copying Cases, Kathleen C. Riley Jan 2019

Data Scraping As A Cause Of Action: Limiting Use Of The Cfaa And Trespass In Online Copying Cases, Kathleen C. Riley

Fordham Intellectual Property, Media and Entertainment Law Journal

In recent years, online platforms have used claims such as the Computer Fraud and Abuse Act (“CFAA”) and trespass to curb data scraping, or copying of web content accomplished using robots or web crawlers. However, as the term “data scraping” implies, the content typically copied is data or information that is not protected by intellectual property law, and the means by which the copying occurs is not considered to be hacking. Trespass and the CFAA are both concerned with authorization, but in data scraping cases, these torts are used in such a way that implies that real property norms exist …


Privacy In Gaming, N. Cameron Russell, Joel R. Reidenberg, Sumyung Moon Jan 2019

Privacy In Gaming, N. Cameron Russell, Joel R. Reidenberg, Sumyung Moon

Fordham Intellectual Property, Media and Entertainment Law Journal

Video game platforms and business models are increasingly built on collection, use, and sharing of personal information for purposes of both functionality and revenue. This paper examines privacy issues and explores data practices, technical specifications, and policy statements of the most popular games and gaming platforms to provide an overview of the current privacy legal landscape for mobile gaming, console gaming, and virtual reality devices. The research observes how modern gaming aligns with information privacy notions and norms and how data practices and technologies specific to gaming may affect users and, in particular, child gamers.

After objectively selecting and analyzing …


Shopping For Privacy: How Technology In Brick-And-Mortar Retail Stores Poses Privacy Risks For Shoppers, Vincent Nguyen Jan 2019

Shopping For Privacy: How Technology In Brick-And-Mortar Retail Stores Poses Privacy Risks For Shoppers, Vincent Nguyen

Fordham Intellectual Property, Media and Entertainment Law Journal

As technology continues to rapidly advance, the American legal system has failed to protect individual shoppers from the technology implemented into retail stores, which poses significant privacy risks but does not violate the law. In particular, I examine the technologies implemented into many brick-and-mortar stores today, many of which the average everyday shopper has no idea exists. This Article criticizes these technologies, suggesting that many, if not all of them, are questionable in their legality taking advantage of their status in a legal gray zone. Because the American judicial system cannot adequately protect the individual shopper from these questionable privacy …


Implementing Privacy Policy: Who Should Do What?, David Hyman, William E. Kovacic Jan 2019

Implementing Privacy Policy: Who Should Do What?, David Hyman, William E. Kovacic

Fordham Intellectual Property, Media and Entertainment Law Journal

Academic scholarship on privacy has focused on the substantive rules and policies governing the protection of personal data. An extensive literature has debated alternative approaches for defining how private and public institutions can collect and use information about individuals. But, the attention given to the what of U.S. privacy regulation has overshadowed consideration of how and by whom privacy policy should be formulated and implemented.

U.S. privacy policy is an amalgam of activity by a myriad of federal, state, and local government agencies. But, the quality of substantive privacy law depends greatly on which agency or agencies are running the …


The Gdpr-Blockchain Paradox: Exempting Permissioned Blockchains From The Gdpr, Anisha Mirchandani Jan 2019

The Gdpr-Blockchain Paradox: Exempting Permissioned Blockchains From The Gdpr, Anisha Mirchandani

Fordham Intellectual Property, Media and Entertainment Law Journal

When considering the legal landscape emerging after the General Data Protection Regulation went into effect on May 25, 2018, the uncertainty surrounding the Regulation reaches its peak when it is applied to blockchain technology. While the goals of storing personal data on permissioned blockchains may align with the goals of accuracy and transparency emulated by the GDPR, the language of the Regulation makes it likely that blockchain technology, as a whole, violates the GDPR. Permissioned blockchains have promising use cases and developments that have not only streamlined data storage, but also allowed users to have increased control over who accesses …


Face Off: An Examination Of State Biometric Privacy Statutes & Data Harm Remedies, Maya E. Rivera Jan 2019

Face Off: An Examination Of State Biometric Privacy Statutes & Data Harm Remedies, Maya E. Rivera

Fordham Intellectual Property, Media and Entertainment Law Journal

As biometric authentication becomes an increasingly popular method of security among consumers, only three states currently have statutes detailing how such data may be collected, used, retained, and released. The Illinois Biometric Information Privacy Act is the only statute of the three that enshrines a private right of action for those who fail to properly handle biometric data. Both the Texas Capture or Use Biometric Identifier Act Information Act and the Washington Biometric Privacy Act allow for state Attorneys General to bring suit on behalf of aggrieved consumers. This Note examines these three statutes in the context of data security …


The Future Of Facial Recognition Is Not Fully Known: Developing Privacy And Security Regulatory Mechanisms For Facial Recognition In The Retail Sector, Elias Wright Jan 2019

The Future Of Facial Recognition Is Not Fully Known: Developing Privacy And Security Regulatory Mechanisms For Facial Recognition In The Retail Sector, Elias Wright

Fordham Intellectual Property, Media and Entertainment Law Journal

In recent years, advances in facial recognition technology have resulted in a rapid expansion in the prevalence of private sector biometric technologies. Facial recognition, while providing new potentials for safety and security and personalized marketing by retailers implicates complicated questions about the nature of consumer privacy and surveillance where a “collection imperative” incentivize corporate actors to accumulate increasingly massive reservoirs of consumer data. However, the law has not yet fully developed to address the unique risks to consumers through the use of this technology. This Note examines existing regulatory mechanisms, finding that consumer sensitivities and the opaque nature of the …