Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2019

Privacy Law

Institution
Keyword
Publication
Publication Type

Articles 31 - 60 of 224

Full-Text Articles in Law

The Missing Regulatory State: Monitoring Businesses In An Age Of Surveillance, Rory Van Loo Oct 2019

The Missing Regulatory State: Monitoring Businesses In An Age Of Surveillance, Rory Van Loo

Faculty Scholarship

An irony of the information age is that the companies responsible for the most extensive surveillance of individuals in history—large platforms such as Amazon, Facebook, and Google—have themselves remained unusually shielded from being monitored by government regulators. But the legal literature on state information acquisition is dominated by the privacy problems of excess collection from individuals, not businesses. There has been little sustained attention to the problem of insufficient information collection from businesses. This Article articulates the administrative state’s normative framework for monitoring businesses and shows how that framework is increasingly in tension with privacy concerns. One emerging complication is …


The Missing Regulatory State: Monitoring Businesses In An Age Of Surveillance, Rory V. Loo Oct 2019

The Missing Regulatory State: Monitoring Businesses In An Age Of Surveillance, Rory V. Loo

Vanderbilt Law Review

An irony of the information age is that the companies responsible for the most extensive surveillance of individuals in history-large platforms such as Amazon, Facebook, and Google-have themselves remained unusually shielded from being monitored by government regulators. But the legal literature on state information acquisition is dominated by the privacy problems of excess collection from individuals, not businesses. There has been little sustained attention to the problem of insufficient information collection from businesses. This Article articulates the administrative state's normative framework for monitoring businesses and shows how that framework is increasingly in tension with privacy concerns. One emerging complication is …


حقوق المشتبه فیه في قانون الإجراءات الجزائية الاتحادي والقانون الإنجليزي (دراسة مقارنة), فیصل صالح محمد الخوري Oct 2019

حقوق المشتبه فیه في قانون الإجراءات الجزائية الاتحادي والقانون الإنجليزي (دراسة مقارنة), فیصل صالح محمد الخوري

Theses

تتناول ھذه الدراسة حقوق المشتبه فیه في مرحلة الاستدلال من خلال دراسة مقارنة بین قانون

الإجراءات الجزائية الإتحادي بالنظام الإنجليزي، وذلك بعرض سير الدعوى الجزائية فیھما،

وكفالة حقوق المشتبه فیه، وآلية ذلك في كلا النظامين، وبیان ما إذا استطعنا تحقيق الموازنة بین

الحقوق والحریات الفردیة وحق المجتمع بحفظ أمنه استقراره.

ولقد حاولتْ الدراسة الإجابة على ھذه الإشكالية من خلال تقسيم البحث إلى مبحث تمھیدي ھو:

ماھیة مرحلة الاستدلال وصول إلي ماھیة المشتبه فیه التطرق إلى معرفة ذلك لغة وفقھًا، ثم

تعریفھا في الاتفاقیات الدولة والتشريعات الأجنبية والعربية، أما الفصل الأول فيتناول حقوق

المشتبه فیه قبل وبعد تقیید حریته، والفصل الثاني …


Standing To Challenge Familial Searches Of Commercial Dna Databases, Hillary L. Kody Oct 2019

Standing To Challenge Familial Searches Of Commercial Dna Databases, Hillary L. Kody

William & Mary Law Review

In April 2018, police officers arrested Joseph James DeAngelo. DeAngelo, the officers claimed, was the “Golden State Killer,” a man who committed dozens of murders and over fifty sexual assaults in California in the 1970s and 1980s. The Golden State Killer had long eluded police, even though his DNA profile linked him to dozens of violent crimes. While law enforcement officials from several jurisdictions in California had collected his DNA from crime scenes, the Golden State Killer’s crimes predated modern DNA analysis. Police found little use for the profile without a suspect’s profile to compare to it.

Nearly forty years …


Privacidad Digital En Ecuador: El Papel De La Vigilancia, La Jurisprudencia Y Los Derechos Humanos, Giselle Valdez Oct 2019

Privacidad Digital En Ecuador: El Papel De La Vigilancia, La Jurisprudencia Y Los Derechos Humanos, Giselle Valdez

Independent Study Project (ISP) Collection

Este documento es un estudio de caso sobre la privacidad digital en Ecuador, cómo se protege y cómo se debe mejorar las protecciones. Comienzo presentando la falta de privacidad de la persona en Ecuador, a través de la reciente violación de datos y las tecnologías de vigilancia en todo el país desde China. Luego, para analizar la jurisprudencia y la falta de protección de la privacidad en la ley, hago la transición a un análisis legal de la privacidad de datos en Ecuador a través de la Constitución de 2008. Cuando establezco que falta privacidad digital en Ecuador, demuestro una …


Table Of Contents, Seattle University Law Review Sep 2019

Table Of Contents, Seattle University Law Review

Seattle University Law Review

No abstract provided.


Review Of Ian Kerr And Jane Bailey, The Implications Of Digital Rights Management For Privacy And Freedom Of Expression, 2 Journal Of Information, Communication & Ethics In Society 87 (2004), Ann Bartow Sep 2019

Review Of Ian Kerr And Jane Bailey, The Implications Of Digital Rights Management For Privacy And Freedom Of Expression, 2 Journal Of Information, Communication & Ethics In Society 87 (2004), Ann Bartow

Law Faculty Scholarship

Ian Kerr, who passed away far too young in 2019, was an incisive scholar and a much treasured colleague. The wit that sparkled in his papers was matched only by his warmth toward his friends, of whom there were many. He and his many co-authors wrote with deep insight and an equally deep humanity about copyright, artificial intelligence, privacy, torts, and much much more.

Ian was also a valued contributor to the Jotwell Technology Law section. His reviews here display the same playful generosity that characterized everything else he did. In tribute to his memory, we are publishing a memorial …


The Professor Anthony J. Santoro Business Law Lecture Series Presents Becoming A Valued Business Lawyer, Roger Williams University School Of Law, Michael M. Bowden Sep 2019

The Professor Anthony J. Santoro Business Law Lecture Series Presents Becoming A Valued Business Lawyer, Roger Williams University School Of Law, Michael M. Bowden

School of Law Conferences, Lectures & Events

No abstract provided.


The Positive Law Model Of The Fourth Amendment, William Baude, James Y. Stern Sep 2019

The Positive Law Model Of The Fourth Amendment, William Baude, James Y. Stern

James Y. Stern

For fifty years, courts have used a “reasonable expectation of privacy” standard to define “searches” under the Fourth Amendment. As others have recognized, that doctrine is subjective, unpredictable, and conceptually confused, but viable alternatives have been slow to emerge. This Article supplies one.

We argue that Fourth Amendment protection should be anchored in background positive law. The touchstone of the search-and-seizure analysis should be whether government officials have done something forbidden to private parties. It is those actions that should be subjected to Fourth Amendment reasonableness review and the presumptive requirement to obtain a warrant. In short, Fourth Amendment protection …


Striking The Balance: Search Warrants And Encryption Protected Smartphones, Nicholas A. Oliva Sep 2019

Striking The Balance: Search Warrants And Encryption Protected Smartphones, Nicholas A. Oliva

Journal of Civil Rights and Economic Development

(Excerpt)

This note’s analysis of searches of encrypted cell phone will be broken down into in three parts. Part I of this note provides context for the balance between individual privacy and law enforcement by reviewing general Fourth Amendment principles and then Supreme Court rulings that apply these principles to cell phones. Part II then details the advancements in cell phone technology, specifically encryption. These new technologies render the data on cell phones inaccessible and lead law enforcement to go beyond search warrants and seek special orders pursuant to the All Writs Act. Part II provides an overview of the …


Towards Standard Information Privacy, Innovations Of The New General Data Protection Regulation, Ali Alibeigi, Abu Bakar Munir, Md Ershadulkarim, Adeleh Asemi Sep 2019

Towards Standard Information Privacy, Innovations Of The New General Data Protection Regulation, Ali Alibeigi, Abu Bakar Munir, Md Ershadulkarim, Adeleh Asemi

Library Philosophy and Practice (e-journal)

Protection of personal data in recent decades became more crucial affecting by emergence of the new technologies especially computer, internet, information and communications technology. However, Europeans felt this necessity at time and provided for up-to-date and supportive laws. The General Data Protection Regulation (GDPR) is the latest legislation in EU to protect personal data of individuals based on the recent technological advancements. However, its’ domestic and international output still is debatable. This doctrinal legal study by using descriptive methods, aimed to evaluate the GDPR through analyzing and interpreting its’ provisions by especial focus on its’ innovations. The results show that …


Defamation, Privacy And Aspects Of Reputation, Andrew T. Kenyon Sep 2019

Defamation, Privacy And Aspects Of Reputation, Andrew T. Kenyon

Osgoode Hall Law Journal

Unlike the commonplace statement that defamation law protects reputation, this article suggests that it only protects aspects of reputation. Previously, defamation was often the only avenue of legal protection for reputation worth examining, but now privacy actions also offer an avenue of protection for aspects of reputation in many jurisdictions. In other words, informational privacy law now protects aspects of reputation, as does defamation law. Recognizing this fact leads to the suggestion that exactly what each action—defamation and informational privacy—seeks to protect could be stated more concisely. This exercise, undertaken in this article, draws on classic defamation law analysis by …


“O! They Have Lived Long On The Alms-Basket Of Words”: Enhancing Efficacy And Reducing Cost By Limiting The Role Of Law And Lawyers In Defamation Disputes, Andrew Scott Sep 2019

“O! They Have Lived Long On The Alms-Basket Of Words”: Enhancing Efficacy And Reducing Cost By Limiting The Role Of Law And Lawyers In Defamation Disputes, Andrew Scott

Osgoode Hall Law Journal

To triangulate the individual and social interests in reputation and free speech, the common law has generated an unwieldy corpus of technical rules and counterfactual assumptions. This complexity entails enormous cost and opportunities for game-playing by astute, well-resourced litigants. Neither reputation nor free speech is well-served by reform initiatives that focus mainly on amending the substantive law. This paper offers a critical assessment of a proposal that might better address complexity and cost. This comprises the inextricable combination of two initiatives: repeal of the ‘single meaning rule’ which promises to simplify the court’s task, but instead generates complexity in defiance …


Internet Intermediary Liability In Defamation, Emily B. Laidlaw, Hilary Young Sep 2019

Internet Intermediary Liability In Defamation, Emily B. Laidlaw, Hilary Young

Osgoode Hall Law Journal

Given the broad meaning of publication in defamation law, internet intermediaries such as internet service providers, search engines, and social media companies may be liable for defamatory content posted by third parties. This article argues that current law is not suitable to dealing with issues of internet defamation and intermediary responsibility because it is needlessly complex, confusing, and may impose liability without blameworthiness. Instead, the article proposes that publication be redefined to require a deliberate act of communicating specific words. This would better reflect blameworthiness and few intermediaries would be liable in defamation under this test. That said, intermediaries profit …


Restoring Accountability In Freedom Of Expression Theory: Public Libel Law And Radical Whig Ideology, Randall Stephenson Sep 2019

Restoring Accountability In Freedom Of Expression Theory: Public Libel Law And Radical Whig Ideology, Randall Stephenson

Osgoode Hall Law Journal

As leading common law jurisdictions grapple with the Internet’s impact on defamation law, comparative legal scholarship has revealed long-standing problems with its underlying theoretical justifications. Specifically, public libel doctrine is commonly supported by appeals to democratic theory in the abstract. Accountability concerns most relevant to adjudicating public libel cases are thus routinely overlooked. This article aims to diagnose the causes of these theoretical inaccuracies, describe their impact on public libel law, and translate their significance for law reform. Through exploring eighteenth-century libertarian thought, we highlight the foundational importance of accountability and the checking function rationale to democratic theory and governance. …


Re-Imagining Resolution Of Online Defamation Disputes, Emily B. Laidlaw Sep 2019

Re-Imagining Resolution Of Online Defamation Disputes, Emily B. Laidlaw

Osgoode Hall Law Journal

If an individual or company is defamed online, they have two options to resolve the dispute, absent a technical solution. They can complain to an intermediary or launch a civil action. Both are deficient for a variety of reasons. Civil litigation is often unsuitable given the nature of online communications (across different platforms, jurisdictions, involving multiple parties, and spread with ease), the length and cost of litigation, and the ineffectiveness of traditional remedies. Intermediary dispute resolution processes can sometimes be effective, but lack industry standards and due process, place intermediaries in pseudo-judicial roles, and depend on the changeable commitments of …


Committed To Treatment?: The Potential Role Of Involuntary Hospitalization In West Virginia’S Response To The Opioid Epidemic, Quentin T. Collie Sep 2019

Committed To Treatment?: The Potential Role Of Involuntary Hospitalization In West Virginia’S Response To The Opioid Epidemic, Quentin T. Collie

West Virginia Law Review

No abstract provided.


Functional Secrecy, Laura K. Donohue Aug 2019

Functional Secrecy, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

Many theorists consider secrecy inimical to liberal democracy. Precise examination of the role that it plays in contemporary government, however, including its strengths and weaknesses, has been limited. This chapter, accordingly, lays out a functional theory of secrecy, considering its role in the three branches of government in four contexts: deliberation, information security, law, and adjudicatory processes. Whether and to what extent cloaking information advances the interests of the state and society varies according to how it operates in each category. First, deliberative secrecy carries significant advantages: it can facilitate informed debate and honest exchange, allowing individuals to alter their …


Centralizing Energy Consumption Data In State Energy Data Centers, Zach Sibley Aug 2019

Centralizing Energy Consumption Data In State Energy Data Centers, Zach Sibley

Minnesota Journal of Law, Science & Technology

No abstract provided.


Bleeding Out: The Case For Strengthening Healthcare Client Portal Data Privacy Regulations, Matthew D. Mccord Aug 2019

Bleeding Out: The Case For Strengthening Healthcare Client Portal Data Privacy Regulations, Matthew D. Mccord

Minnesota Journal of Law, Science & Technology

No abstract provided.


Catalyzing Privacy Law, Anupam Chander, Margot E. Kaminski, William Mcgeveran Aug 2019

Catalyzing Privacy Law, Anupam Chander, Margot E. Kaminski, William Mcgeveran

Georgetown Law Faculty Publications and Other Works

The United States famously lacks a comprehensive federal data privacy law. In the past year, however, over half the states have proposed broad privacy bills or have established task forces to propose possible privacy legislation. Meanwhile, congressional committees are holding hearings on multiple privacy bills. What is catalyzing this legislative momentum? Some believe that Europe’s General Data Protection Regulation (GDPR), which came into force in 2018, is the driving factor. But with the California Consumer Privacy Act (CCPA) which took effect in January 2020, California has emerged as an alternate contender in the race to set the new standard for …


The Equifax Data Breach: An Opportunity To Improve Consumer Protection And Cybersecurity Efforts In America, Gregory S. Gaglione Jr. Aug 2019

The Equifax Data Breach: An Opportunity To Improve Consumer Protection And Cybersecurity Efforts In America, Gregory S. Gaglione Jr.

Buffalo Law Review

No abstract provided.


21st Century-Style Truth Decay: Deep Fakes And The Challenge For Privacy, Free Expression, And National Security, Robert Chesney, Danielle Keats Citron Aug 2019

21st Century-Style Truth Decay: Deep Fakes And The Challenge For Privacy, Free Expression, And National Security, Robert Chesney, Danielle Keats Citron

Maryland Law Review

No abstract provided.


The Effect Of Legislation On Fourth Amendment Protection, Orin S. Kerr Jul 2019

The Effect Of Legislation On Fourth Amendment Protection, Orin S. Kerr

Orin Kerr

When judges interpret the Fourth Amendment, and privacy legislation regulates the government’s conduct, should the legislation have an effect on the Fourth Amendment? Courts are split three ways. Some courts argue that legislation provides the informed judgment of a coequal branch that should influence the Fourth Amendment. Some courts contend that the presence of legislation should displace Fourth Amendment protection to prevent constitutional rules from interfering with the legislature’s handiwork. Finally, some courts treat legislation and the Fourth Amendment as independent and contend that the legislation should have no effect. This Article argues that courts should favor interpreting the Fourth …


The Fourth Amendment And New Technologies: Constitutional Myths And The Case For Caution, Orin S. Kerr Jul 2019

The Fourth Amendment And New Technologies: Constitutional Myths And The Case For Caution, Orin S. Kerr

Orin Kerr

To one who values federalism, federal preemption of state law may significantly threaten the autonomy and core regulatory authority of The Supreme Court recently considered whether a1mmg an infrared thermal imaging device at a suspect's home can violate the Fourth Amendment. Kyllo v. United States announced a new and comprehensive rule: the government's warrantless use of senseenhancing technology that is "not in general use" violates the Fourth Amendment when it yields "details of the home that would previously have been unknowable without physical intrusion." Justice Scalia's majority opinion acknowledged that the Court's rule was not needed to resolve the case …


Privacy Rights And Public Families, Khiara Bridges Jul 2019

Privacy Rights And Public Families, Khiara Bridges

Khiara M Bridges

This Article is based on eighteen months of anthropological fieldwork conducted among poor, pregnant women receiving prenatal care provided by the Prenatal Care Assistance Program (“PCAP”) at a large public hospital in New York City. The Prenatal Care Assistance Program (“PCAP”) is a special program within the New York State Medicaid program that provides comprehensive prenatal care services to otherwise uninsured or underinsured women. This Article attempts to accomplish two goals. The first goal is to argue that PCAP’s compelled consultations – with social workers, health educators, nutritionists, and financial officers – function as a gross and substantial intrusion by …


Mind Your Businesses: Why Georgia Companies Should Worry About European Privacy Law, Emily E. Seaton Jul 2019

Mind Your Businesses: Why Georgia Companies Should Worry About European Privacy Law, Emily E. Seaton

Georgia Journal of International & Comparative Law

No abstract provided.


Algorithms At Work: Productivity Monitoring Applications And Wearable Technology As The New Data-Centric Research Agenda For Employment And Labor Law, Ifeoma Ajunwa Jul 2019

Algorithms At Work: Productivity Monitoring Applications And Wearable Technology As The New Data-Centric Research Agenda For Employment And Labor Law, Ifeoma Ajunwa

AI-DR Collection

Recent work technology advancements such as productivity monitoring platforms and wearable technology have given rise to new organizational behavior regarding the management of employees and also prompt new legal questions regarding the protection of workers’ privacy rights. In this Essay, I argue that the proliferation of productivity monitoring applications and wearable technologies will lead to new legal controversies for employment and labor law. In Part I, I assert that productivity monitoring applications will prompt a new reckoning of the balance between the employer’s pecuniary interests in monitoring productivity and the employees’ privacy interests. Ironically, such applications may also be both …


Identities Lost: Enacting Federal Law Mandating Disclosure & Notice After A Data Security Breach, John Ogle Jul 2019

Identities Lost: Enacting Federal Law Mandating Disclosure & Notice After A Data Security Breach, John Ogle

Arkansas Law Review

Identity theft is real, it’s here, and consumers need protection. Over the past five years hackers have stolen billions of consumers’ sensitive information like social security numbers, addresses, and bank routing numbers from companies that have neglected their security measures. Most of the time these security breaches are easily preventable. Companies sometimes wait weeks, months, or even years to inform the customers whose information was stolen because there is no federal law that requires disclosure. As of 2018, all 50 states have adopted security breach notification laws that require companies to inform consumers that their information may have been stolen …


A New Third-Party Doctrine: The Telephone Metadata Program And Carpenter V. United States, Mary-Kathryn Takeuchi Jul 2019

A New Third-Party Doctrine: The Telephone Metadata Program And Carpenter V. United States, Mary-Kathryn Takeuchi

Notre Dame Law Review

This Note will answer the question of whether bulk metadata collection is still defensible under the third-party doctrine. It ultimately concludes that Chief Justice Roberts incorrectly asserted that Carpenter v. United States will not impact the application of the third-party doctrine to collection techniques involving national security, and that the warrantless collection of bulk metadata under the Foreign Intelligence Surveillance Act is no longer defensible by the third-party doctrine. In Section I.A, this Note discusses traditional Fourth Amendment jurisprudence in Katz v. United States and the establishment of the third-party doctrine as a bright-line rule in United States v. Miller …