Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2019

Privacy Law

Institution
Keyword
Publication
Publication Type

Articles 151 - 180 of 223

Full-Text Articles in Law

How I Learned To Stop Worrying And Love The Bots, And How I Learned To Start Worrying About Democracy Instead, Antonio F. Perez Jan 2019

How I Learned To Stop Worrying And Love The Bots, And How I Learned To Start Worrying About Democracy Instead, Antonio F. Perez

Catholic University Journal of Law and Technology

This essay reviewing Striking Power, John Yoo and Jeremy Rabkin's new book on the legal and policy implications of autonomous weapons, takes issue with the book’s assumptions and; therefore its conclusions. The essay argues that, because of technological and ethical limitations, discriminate and effective use of autonomous weapons may not serve as an adequate substitute for traditional manpower-based military forces. It further argues that traditional conceptions of international law could prove more durable than Yoo and Rabkin suggest, and finally it concludes by suggesting that a grand strategy relying primarily on technological elites managing autonomous weapons actually threatens to …


Has Regulation Affected The High Frequency Trading Market?, Kevin O'Connell Jan 2019

Has Regulation Affected The High Frequency Trading Market?, Kevin O'Connell

Catholic University Journal of Law and Technology

As technology rapidly advances society, there are a few industries that have not been drastically impacted by disruptive technology. The financial markets are no different. Over the past ten years, algorithmic trading has quickly revolutionized the financial markets and continues to dominate an industry that for many years remained largely uninfluenced by society’s technological advances. Algorithmic trading is “a type of trading done with the use of mathematical formulas” and market data “run by powerful computers” to execute trades. One of the most commonly used platforms of algorithmic trading is high frequency trading. High frequency trading (“HFT”) uses a computerized …


The Department Of Justice Versus Apple Inc. -- The Great Encryption Debate Between Privacy And National Security, Julia P. Eckart Jan 2019

The Department Of Justice Versus Apple Inc. -- The Great Encryption Debate Between Privacy And National Security, Julia P. Eckart

Catholic University Journal of Law and Technology

This article is an attempt to objectively examine and assess legal arguments made by Apple Inc. (Apple) and the Department of Justice (DOJ) concerning the DOJ’s use of the All Writs Act[1] (AWA) to require Apple to provide technical assistance to the DOJ so that it could access the encrypted data from the locked iPhone of Syed Rizwan Farook, commonly referred to as the San Bernardino shooter. The DOJ’s initial ex parte application focused on meeting the requirements of United States v. New York Telephone Co.[2] concluding the court order was authorized and appropriate. Apple not only argued …


Not In My Backyard: State V. Quiday And Warrantless Aerial Police Surveillance, Hayden Brown Jan 2019

Not In My Backyard: State V. Quiday And Warrantless Aerial Police Surveillance, Hayden Brown

Journal of Air Law and Commerce

No abstract provided.


Identities In Critical Condition: The Urgent Need To Reevaluate The Investigation And Resolution Of Claims Of Medical Identity Theft, Stephanie Lindgren Jan 2019

Identities In Critical Condition: The Urgent Need To Reevaluate The Investigation And Resolution Of Claims Of Medical Identity Theft, Stephanie Lindgren

Mitchell Hamline Law Review

No abstract provided.


A Right To Go Dark (?), David C. Gray Jan 2019

A Right To Go Dark (?), David C. Gray

SMU Law Review

In 2013, reports based on documents leaked by former National Security Agency contractor Edward Snowden revealed committed efforts by federal agencies to develop and deploy data surveillance technologies. These revelations documented the ability of government agencies to monitor internet usage, read the contents of communications, and access data stored in the cloud and on personal devices. These revelations marked a turning point in the public conversation as consumers became aware of the extent to which national security and law enforcement agencies can monitor a wide range of activities in physical and virtual spaces.

The market responded. Technology companies began to …


Warrantless Searches Of Electronic Devices At U.S. Borders: Securing The Nation Or Violating Digital Liberty?, Ahad Khilji Jan 2019

Warrantless Searches Of Electronic Devices At U.S. Borders: Securing The Nation Or Violating Digital Liberty?, Ahad Khilji

Catholic University Journal of Law and Technology

The steady increase of U.S. citizens traveling with smart phones and other electronic devices has been met with the rise of searches and seizures by CBP officers at U.S borders. Although only less than 0.1% of all travelers may actually be subjected to a search while entering the United States, when comparing the statistics between a six month period in 2016 with the same period in 2017, electronic device searches have almost doubled from 8,383 to 14,993. Approximately one million travelers to the U.S. are inspected by the CBP every day. Out of this population, nearly 2,500 electronic devices are …


Let’S Get This Show On The Road: Driverless Cars Have Arrived And It’S Time To Advance The Regulatory Framework, Joshua D. Borneman Jan 2019

Let’S Get This Show On The Road: Driverless Cars Have Arrived And It’S Time To Advance The Regulatory Framework, Joshua D. Borneman

Catholic University Journal of Law and Technology

The potential benefits that driverless automobile technology will provide to the U.S. and its roadways are vast. Greatly enhanced safety of American citizens is chief among these benefits. Congressional and administrative support will be required if these benefits are to be completely realized by American society. However, lawmakers are dragging their feet on passing legislation that will allow driverless cars to hit the road in full force. This comment examines the legislative proposals put forth by the House of Representatives and Senate. It argues that the differences between the two versions are inconsequential and urges lawmakers to act in order …


An Information Operations Theory Of Domestic Counterterrorism Efforts, Tung Yin Jan 2019

An Information Operations Theory Of Domestic Counterterrorism Efforts, Tung Yin

South Carolina Law Review

No abstract provided.


Policing, Databases, And Surveilance: Five Regulatory Categories, Christopher Slobogin Jan 2019

Policing, Databases, And Surveilance: Five Regulatory Categories, Christopher Slobogin

Vanderbilt Law School Faculty Publications

Databases are full of personal information that law enforcement might find useful. Government access to these databases can be divided into five categories: suspect-driven; profile-driven; event-driven; program-driven and volunteer-driven. This chapter recommends that, in addition to any restrictions imposed by the Fourth Amendment (which currently are minimal), each type of access should be subject to its own regulatory regime. Suspect-driven access should depend on justification proportionate to the intrusion. Profile-driven access should likewise abide by a proportionality principle but should also be subject to transparency, vetting, and universality restrictions. Event-driven access should be cabined by the time and place of …


Data Protection In An Increasingly Globalized World, Nicholas F. Palmieri Iii Jan 2019

Data Protection In An Increasingly Globalized World, Nicholas F. Palmieri Iii

Indiana Law Journal

With the rise of the internet in recent decades, it has become increasingly easy for various enterprises—including retailers, advertising agencies, and service providers—to acquire, use, and even share the personal details of their users. Such a trend is unlikely to decrease in the coming years; in fact, internet usage is only likely to increase as more and more people gain access to the internet. In the wakeof recent data breaches, including the now infamous breach of Equifax as well as the scandal involving Facebook and Cambridge Analytica, people are even more aware of the need for (and the risk of …


"You Have The Data"...The Writ Of Habeas Data And Other Data Protection Rights: Is The United States Falling Behind?, Sarah L. Lode Jan 2019

"You Have The Data"...The Writ Of Habeas Data And Other Data Protection Rights: Is The United States Falling Behind?, Sarah L. Lode

Indiana Law Journal

In Part I of this Note, I will discuss the writ of habeas data that has been developed primarily, but not exclusively, in Latin American countries. I will discuss the intricacies of the writ, how it evolved, and how it is applied today. Using Argentina as an example, I will discuss how the writ would be used by an Argentine citizen to protect her personal data. Part II summarizes the previously employed data protection scheme in the European Union, the Data Protection Directive (“the Directive”), and will also discuss the new EU data protection regulation, the General Data Protection Regulation …


The Ironic Privacy Act, Margaret Hu Jan 2019

The Ironic Privacy Act, Margaret Hu

Faculty Publications

This Article contends that the Privacy Act of 1974, a law intended to engender trust in government records, can be implemented in a way that inverts its intent. Specifically, pursuant to the Privacy Act's reporting requirements, in September 2017, the U.S. Department of Homeland Security (DHS) notified the public that record systems would be modified to encompass the collection of social media data. The notification justified the collection of social media data as a part of national security screening and immigration vetting procedures. However, the collection will encompass social media data on both citizens and noncitizens, and was not explicitly …


The Exclusionary Rule In The Age Of Blue Data, Andrew Ferguson Jan 2019

The Exclusionary Rule In The Age Of Blue Data, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

In Herring v. United States, Chief Justice John Roberts reframed the Supreme Court’s understanding of the exclusionary rule: “As laid out in our cases, the exclusionary rule serves to deter deliberate, reckless, or grossly negligent conduct, or in some circumstances recurring or systemic negligence.” The open question remains: how can defendants demonstrate sufficient recurring or systemic negligence to warrant exclusion? The Supreme Court has never answered the question, although the absence of systemic or recurring problems has figured prominently in two recent exclusionary rule decisions. Without the ability to document recurring failures, or patterns of police misconduct, courts can dismiss …


Data Scraping As A Cause Of Action: Limiting Use Of The Cfaa And Trespass In Online Copying Cases, Kathleen C. Riley Jan 2019

Data Scraping As A Cause Of Action: Limiting Use Of The Cfaa And Trespass In Online Copying Cases, Kathleen C. Riley

Fordham Intellectual Property, Media and Entertainment Law Journal

In recent years, online platforms have used claims such as the Computer Fraud and Abuse Act (“CFAA”) and trespass to curb data scraping, or copying of web content accomplished using robots or web crawlers. However, as the term “data scraping” implies, the content typically copied is data or information that is not protected by intellectual property law, and the means by which the copying occurs is not considered to be hacking. Trespass and the CFAA are both concerned with authorization, but in data scraping cases, these torts are used in such a way that implies that real property norms exist …


Privacy In Gaming, N. Cameron Russell, Joel R. Reidenberg, Sumyung Moon Jan 2019

Privacy In Gaming, N. Cameron Russell, Joel R. Reidenberg, Sumyung Moon

Fordham Intellectual Property, Media and Entertainment Law Journal

Video game platforms and business models are increasingly built on collection, use, and sharing of personal information for purposes of both functionality and revenue. This paper examines privacy issues and explores data practices, technical specifications, and policy statements of the most popular games and gaming platforms to provide an overview of the current privacy legal landscape for mobile gaming, console gaming, and virtual reality devices. The research observes how modern gaming aligns with information privacy notions and norms and how data practices and technologies specific to gaming may affect users and, in particular, child gamers.

After objectively selecting and analyzing …


Shopping For Privacy: How Technology In Brick-And-Mortar Retail Stores Poses Privacy Risks For Shoppers, Vincent Nguyen Jan 2019

Shopping For Privacy: How Technology In Brick-And-Mortar Retail Stores Poses Privacy Risks For Shoppers, Vincent Nguyen

Fordham Intellectual Property, Media and Entertainment Law Journal

As technology continues to rapidly advance, the American legal system has failed to protect individual shoppers from the technology implemented into retail stores, which poses significant privacy risks but does not violate the law. In particular, I examine the technologies implemented into many brick-and-mortar stores today, many of which the average everyday shopper has no idea exists. This Article criticizes these technologies, suggesting that many, if not all of them, are questionable in their legality taking advantage of their status in a legal gray zone. Because the American judicial system cannot adequately protect the individual shopper from these questionable privacy …


Implementing Privacy Policy: Who Should Do What?, David Hyman, William E. Kovacic Jan 2019

Implementing Privacy Policy: Who Should Do What?, David Hyman, William E. Kovacic

Fordham Intellectual Property, Media and Entertainment Law Journal

Academic scholarship on privacy has focused on the substantive rules and policies governing the protection of personal data. An extensive literature has debated alternative approaches for defining how private and public institutions can collect and use information about individuals. But, the attention given to the what of U.S. privacy regulation has overshadowed consideration of how and by whom privacy policy should be formulated and implemented.

U.S. privacy policy is an amalgam of activity by a myriad of federal, state, and local government agencies. But, the quality of substantive privacy law depends greatly on which agency or agencies are running the …


The Gdpr-Blockchain Paradox: Exempting Permissioned Blockchains From The Gdpr, Anisha Mirchandani Jan 2019

The Gdpr-Blockchain Paradox: Exempting Permissioned Blockchains From The Gdpr, Anisha Mirchandani

Fordham Intellectual Property, Media and Entertainment Law Journal

When considering the legal landscape emerging after the General Data Protection Regulation went into effect on May 25, 2018, the uncertainty surrounding the Regulation reaches its peak when it is applied to blockchain technology. While the goals of storing personal data on permissioned blockchains may align with the goals of accuracy and transparency emulated by the GDPR, the language of the Regulation makes it likely that blockchain technology, as a whole, violates the GDPR. Permissioned blockchains have promising use cases and developments that have not only streamlined data storage, but also allowed users to have increased control over who accesses …


The Left's Law-And-Order Agenda, Aya Gruber Jan 2019

The Left's Law-And-Order Agenda, Aya Gruber

Publications

No abstract provided.


The States Have Spoken: Allow Expanded Media Coverage Of The Federal Courts, Mitchell T. Galloway Jan 2019

The States Have Spoken: Allow Expanded Media Coverage Of The Federal Courts, Mitchell T. Galloway

Vanderbilt Journal of Entertainment & Technology Law

Since the advent of film and video recording, society has enjoyed the ability to capture the lights and sounds of moments in history. This innovation left courts to determine what place, if any, such technology should have inside the courtroom. Refusing to constrain the future capacity of this technology, the Supreme Court "punted" on this issue until a time when this technology evolved past its initial disruptive nature. Throughout the past forty-five years, the vast majority of state courts have embraced the potential of cameras in the courtroom and have created policies governing such use. In contrast, the federal judiciary …


Keeping It Off The Record: Student Social Media Monitoring And The Need For Updated Student Records Laws, Alice Haston Jan 2019

Keeping It Off The Record: Student Social Media Monitoring And The Need For Updated Student Records Laws, Alice Haston

Vanderbilt Journal of Entertainment & Technology Law

An increasing number of school districts work with private companies to monitor public social media and to notify administrators of alarming student information. Although these services help address challenging school safety issues, the Family Educational Rights and Privacy Act (FERPA) and state law offer little guidance on how districts should store student social media data. This Note encourages states to pass student records laws similar to recent California legislation and urges the Department of Education to clarify the relationship between student social media and education records under FERPA. New state and federal initiatives would help ensure that third parties may …


Confidences Worth Keeping: Rebalancing Legitimate Interests In Litigants' Private Information In An Era Of Open-Access Courts, Jeffrey W. Sheehan Jan 2019

Confidences Worth Keeping: Rebalancing Legitimate Interests In Litigants' Private Information In An Era Of Open-Access Courts, Jeffrey W. Sheehan

Vanderbilt Journal of Entertainment & Technology Law

The ideal of the public trial in open court continues to guide decisions about public access to courts and their records, even as cases are increasingly decided "on the papers." This is still the case when those "papers" take the form of electronic documents that can be uploaded, downloaded, copied, and distributed by anyone with an internet connection. A series of opinions from the US Court of Appeals for the Sixth Circuit reinforcing this ideal of public access to court records and unsealing district court filings offers an opening to reconsider core values that must inform our treatment of private …


Drone Invasion: Unmanned Aerial Vehicles And The Right To Privacy, Rebecca L. Scharf Jan 2019

Drone Invasion: Unmanned Aerial Vehicles And The Right To Privacy, Rebecca L. Scharf

Scholarly Works

Since the birth of the concept of a legally-recognized right to privacy in Samuel D. Warren and Louis D. Brandeis’ influential 1890 law review article, The Right to Privacy, common law – with the aid of influential scholars -- has massaged the concept of privacy torts into actionable claims. But now, one of the most innovative technological advancements in recent years, the unmanned aerial vehicle, or drone, has created difficult challenges for plaintiffs and courts navigating common law privacy tort claims.

This Article explores the challenges of prosecution of the specific privacy tort of intrusion into seclusion involving non-governmental use …


Informed Trading And Cybersecurity Breaches, Joshua Mitts, Eric L. Talley Jan 2019

Informed Trading And Cybersecurity Breaches, Joshua Mitts, Eric L. Talley

Faculty Scholarship

Cybersecurity has become a significant concern in corporate and commercial settings, and for good reason: a threatened or realized cybersecurity breach can materially affect firm value for capital investors. This paper explores whether market arbitrageurs appear systematically to exploit advance knowledge of such vulnerabilities. We make use of a novel data set tracking cybersecurity breach announcements among public companies to study trading patterns in the derivatives market preceding the announcement of a breach. Using a matched sample of unaffected control firms, we find significant trading abnormalities for hacked targets, measured in terms of both open interest and volume. Our results …


A Brave New World: Using The Outer Space Treaty To Design International Data Protection Standards For Low- Earth Orbit Satellite Operators, Amir Saboorian Jan 2019

A Brave New World: Using The Outer Space Treaty To Design International Data Protection Standards For Low- Earth Orbit Satellite Operators, Amir Saboorian

Journal of Air Law and Commerce

No abstract provided.


Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment's Third-Party Doctrine, Cristina Del Rosso Jan 2019

Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment's Third-Party Doctrine, Cristina Del Rosso

Honors Undergraduate Theses

The intent of this thesis is to examine the future of the third-party doctrine with the proliferation of technology and the online data we are surrounded with daily, specifically after the United States Supreme Court's decision in Carpenter v. United States. In order to better understand the Supreme Court's reasoning in that case, this thesis will review the history of the third-party doctrine and its roots in United States v. Miller and Smith v. Maryland. A review of Fourth Amendment history and jurisprudence is also crucial to this thesis, as it is imperative that individuals do not forfeit …


Privacy And Legal Automation: The Dmca As A Case Study, Jonathon Penney Jan 2019

Privacy And Legal Automation: The Dmca As A Case Study, Jonathon Penney

Articles, Book Chapters, & Popular Press

Advances in artificial intelligence, machine learning, computing capacity, and big data analytics are creating exciting new possibilities for legal automation. At the same time, these changes pose serious risks for civil liberties and other societal interests. Yet, existing scholarship is narrow, leaving uncertainty on a range of issues, including a glaring lack of systematic empirical work as to how legal automation may impact people’s privacy and freedom. This article addresses this gap with an original empirical analysis of the Digital Millennium Copyright Act (DMCA), which today sits at the forefront of algorithmic law due to its automated enforcement of copyright …


Recording As Heckling, Scott Skinner-Thompson Jan 2019

Recording As Heckling, Scott Skinner-Thompson

Publications

A growing body of authority recognizes that citizen recording of police officers and public space is protected by the First Amendment. But the judicial and scholarly momentum behind the emerging “right to record” fails to fully incorporate recording’s cost to another important right that also furthers First Amendment principles: the right to privacy.

This Article helps fill that gap by comprehensively analyzing the First Amendment interests of both the right to record and the right to privacy in public while highlighting the role of technology in altering the First Amendment landscape. Recording information can be critical to future speech and, …


Privacy And Security Across Borders, Jennifer Daskal Jan 2019

Privacy And Security Across Borders, Jennifer Daskal

Articles in Law Reviews & Other Academic Journals

Three recent initiatives -by the United States, European Union, and Australiaare opening salvos in what will likely be an ongoing and critically important debate about law enforcement access to data, the jurisdictional limits to such access, and the rules that apply. Each of these developments addresses a common set of challenges posed by the increased digitalization of information, the rising power of private companies delimiting access to that information, and the cross-border nature of investigations that involve digital evidence. And each has profound implications for privacy, security, and the possibility of meaningful democratic accountability and control. This Essay analyzes the …