Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Privacy Law (12)
- Internet Law (8)
- Science and Technology Law (7)
- Fourth Amendment (5)
- Constitutional Law (4)
-
- Communications Law (3)
- Computer Law (3)
- Criminal Procedure (3)
- International and Area Studies (3)
- National Security Law (3)
- Social and Behavioral Sciences (3)
- Asian Studies (2)
- Criminal Law (2)
- First Amendment (2)
- Intellectual Property Law (2)
- Supreme Court of the United States (2)
- Anthropology (1)
- Arts and Humanities (1)
- Banking and Finance Law (1)
- Business Organizations Law (1)
- Civil Rights and Discrimination (1)
- Communication (1)
- Communication Technology and New Media (1)
- Computer Sciences (1)
- Disability Studies (1)
- Education Law (1)
- Ethnic Studies (1)
- Feminist, Gender, and Sexuality Studies (1)
- Film and Media Studies (1)
- Institution
-
- Boston University School of Law (3)
- SJ Quinney College of Law, University of Utah (2)
- Texas A&M University School of Law (2)
- The Catholic University of America, Columbus School of Law (2)
- University of Washington School of Law (2)
-
- Washington and Lee University School of Law (2)
- American University Washington College of Law (1)
- Association of Arab Universities (1)
- Claremont Colleges (1)
- Duke Law (1)
- Embry-Riddle Aeronautical University (1)
- George Washington University Law School (1)
- Loyola Marymount University and Loyola Law School (1)
- Maurer School of Law: Indiana University (1)
- Mitchell Hamline School of Law (1)
- Penn State Dickinson Law (1)
- Saint Louis University School of Law (1)
- Seattle University School of Law (1)
- Singapore Management University (1)
- The Peter A. Allard School of Law (1)
- The University of Akron (1)
- Publication
-
- Faculty Scholarship (5)
- Utah Law Faculty Scholarship (2)
- All Faculty Publications (1)
- Articles by Maurer Faculty (1)
- Catholic University Journal of Law and Technology (1)
-
- Catholic University Law Review (1)
- ConLawNOW (1)
- Duke Law & Technology Review (1)
- Faculty Scholarly Works (1)
- GW Law Faculty Publications & Other Works (1)
- Joint PIJIP/TLS Research Paper Series (1)
- Journal of the Arab American University مجلة الجامعة العربية الامريكية للبحوث (1)
- Loyola of Los Angeles Law Review (1)
- Mitchell Hamline Law Review (1)
- Publications (1)
- Research Collection Yong Pung How School Of Law (1)
- Saint Louis University Law Journal (1)
- Scholarly Articles (1)
- Scripps Senior Theses (1)
- Seattle University Law Review (1)
- Washington Law Review (1)
- Washington Law Review Online (1)
- Washington and Lee Law Review (1)
- Publication Type
Articles 1 - 28 of 28
Full-Text Articles in Law
Ring, Amazon Calling: The State Action Doctrine & The Fourth Amendment, Grace Egger
Ring, Amazon Calling: The State Action Doctrine & The Fourth Amendment, Grace Egger
Washington Law Review Online
Video doorbells have proliferated across the United States and Amazon owns one of the most popular video doorbell companies on the market—Ring. While many view the Ring video doorbell as useful technology that protects the home and promotes safer neighborhoods, the product reduces consumer privacy without much recourse. For example, Ring partners with cities and law enforcement agencies across the United States thereby creating a mass surveillance network in which law enforcement agencies can watch neighborhoods and access Ring data without the user’s knowledge or consent. Because Amazon is not a state actor, it is able to circumvent the due …
The Contemporary Position Of Public International Law From The Right To Privacy In The Digital Age, Rezeq Salmoudi
The Contemporary Position Of Public International Law From The Right To Privacy In The Digital Age, Rezeq Salmoudi
Journal of the Arab American University مجلة الجامعة العربية الامريكية للبحوث
The right to privacy is one of the pivotal rights rooted in the history of human beings. Almost all legal systems have always regarded this right as being sacred and should never be violated. Paradoxically, as life goes on, the threat to this right is growing rapidly, which constitutes a challenge to human rights' defenders and activists. This challenge is mainly triggered by the ever-advancing revolution of technology, which enables, inter alia, the State, more than ever before, to interfere with one's private life, This, in turn, endangers the societal value of privacy. However, the cyber surveillance programs have proved …
Inescapable Surveillance, Matthew Tokson
Inescapable Surveillance, Matthew Tokson
Utah Law Faculty Scholarship
Until recently, Supreme Court precedent dictated that a person waives their Fourth Amendment rights in information they disclose to another party. The Court reshaped this doctrine in Carpenter v. United States, establishing that the Fourth Amendment protects cell phone location data even though it is revealed to others. The Court emphasized that consumers had little choice but to disclose their data, because cell phone use is virtually inescapable in modern society.
In the wake of Carpenter, many scholars and lower courts have endorsed inescapability as an important factor for determining Fourth Amendment rights. Under this approach, surveillance that people cannot …
Good Health And Good Privacy Go Hand-In-Hand (Originally Published By Jnslp), Jennifer Daskal
Good Health And Good Privacy Go Hand-In-Hand (Originally Published By Jnslp), Jennifer Daskal
Joint PIJIP/TLS Research Paper Series
No abstract provided.
Submission To The Justice And Electoral Committee On The Search And Surveillance Bill 2009, Samuel Beswick, William Fotherby
Submission To The Justice And Electoral Committee On The Search And Surveillance Bill 2009, Samuel Beswick, William Fotherby
All Faculty Publications
This submission to the Justice and Electoral Select Committee of the New Zealand Parliament addresses the surveillance regime created by the Search and Surveillance Bill 2009.
Privacy In Pandemic: Law, Technology, And Public Health In The Covid-19 Crisis, Tiffany Li
Privacy In Pandemic: Law, Technology, And Public Health In The Covid-19 Crisis, Tiffany Li
Faculty Scholarship
The COVID-19 pandemic has caused millions of deaths and disastrous consequences around the world, with lasting repercussions for every field of law, including privacy and technology. The unique characteristics of this pandemic have precipitated an increase in use of new technologies, including remote communications platforms, healthcare robots, and medical AI. Public and private actors are using new technologies, like heat sensing, and technologically-influenced programs, like contact tracing, alike in response, leading to a rise in government and corporate surveillance in sectors like healthcare, employment, education, and commerce. Advocates have raised the alarm for privacy and civil liberties violations, but the …
Fixing Informational Asymmetry Through Trademark Search, Jessica Silbey
Fixing Informational Asymmetry Through Trademark Search, Jessica Silbey
Faculty Scholarship
I call this paper a “Levendowski special.” It follows the signature format of much of Professor Levendowski’s prior work which, as in the latest article, recruits a legal tool typically aimed at one set of problems for the purpose of cleverly addressing a different set of problems. Her past articles harnessed copyright law to “fix artificial intelligence’s implicit bias” (2018) and to “combat revenge porn.” (2014). This paper draws on Professor Levendowski’s expertise working in private practice as a trademark attorney to address the problem of surveillance technology opacity. It is a primer on how to investigate trademark …
A New Compact For Sexual Privacy, Danielle K. Citron
A New Compact For Sexual Privacy, Danielle K. Citron
Faculty Scholarship
Intimate life is under constant surveillance. Firms track people’s periods, hot flashes, abortions, sexual assaults, sex toy use, sexual fantasies, and nude photos. Individuals hardly appreciate the extent of the monitoring, and even if they did, little can be done to curtail it. What is big business for firms is a big risk for individuals. The handling of intimate data undermines the values that sexual privacy secures—autonomy, dignity, intimacy, and equality. It can imperil people’s job, housing, insurance, and other crucial opportunities. More often, women and minorities shoulder a disproportionate amount of the burden.
Privacy law is failing us. Our …
Adapting U.S. Electronic Surveillance Laws, Policies, And Practices To Reflect Impending Technological Developments, Eric Manpearl
Adapting U.S. Electronic Surveillance Laws, Policies, And Practices To Reflect Impending Technological Developments, Eric Manpearl
Catholic University Law Review
Intelligence collection must always evolve to meet technological developments. While the collection programs under Section 702 of the FISA Amendments Act of 2008 have produced a great deal of valuable intelligence over the last decade, the United States must begin to think about foreseeable technological developments and strategically consider how to conduct signals intelligence (SIGINT) collection in the future.
This Article identifies four technological trends that could significantly impact the way the United States conducts SIGINT. Individuals now have access to sophisticated technologies that formerly only governments seemed capable of creating, and this decentralization of capabilities will likely only increase …
Symposium: Pandemics And The Constitution: Pandemic Surveillance - The New Predictive Policing, Michael Gentithes, Harold J. Krent
Symposium: Pandemics And The Constitution: Pandemic Surveillance - The New Predictive Policing, Michael Gentithes, Harold J. Krent
ConLawNOW
As the fight against the coronavirus pandemic continues, state governments are considering more invasive surveillance to determine who has been exposed to the virus and who is most likely to catch the virus in the future. Widespread efforts to test temperatures have been initiated; calls for contact tracing have increased; and plans have been revealed to allow only those testing positive for the virus’s antibodies (who presumably now are immune) to return to work and travel. Such fundamental liberties may now hinge on the mere probabilities that one may catch the disease or be immune from it.
To assess the …
Cell-Site Location Information And The Privacies Of Life: The Impact Of Carpenter V. United States, Trevor Moore
Cell-Site Location Information And The Privacies Of Life: The Impact Of Carpenter V. United States, Trevor Moore
Loyola of Los Angeles Law Review
No abstract provided.
Ethics, Ai, Mass Data And Pandemic Challenges: Responsible Data Use And Infrastructure Application For Surveillance And Pre-Emptive Tracing Post-Crisis, Mark Findlay, Jia Yuan Loke, Nydia Remolina Leon, Yum Yin, Benjamin (Tan Renyan) Tham
Ethics, Ai, Mass Data And Pandemic Challenges: Responsible Data Use And Infrastructure Application For Surveillance And Pre-Emptive Tracing Post-Crisis, Mark Findlay, Jia Yuan Loke, Nydia Remolina Leon, Yum Yin, Benjamin (Tan Renyan) Tham
Research Collection Yong Pung How School Of Law
As the COVID-19 health pandemic rages governments and private companies across the globe are utilising AI-assisted surveillance, reporting, mapping and tracing technologies with the intention of slowing the spread of the virus. These technologies have the capacity to amass personal data and share for community control and citizen safety motivations that empower state agencies and inveigle citizen co-operation which could only be imagined outside such times of real and present danger. While not cavilling with the short-term necessity for these technologies and the data they control, process and share in the health regulation mission, this paper argues that this infrastructure …
Limited Privacy In “Pings:” Why Law Enforcement’S Use Of Cell-Site Simulators Does Not Categorically Violate The Fourth Amendment, Lara M. Mcmahon
Limited Privacy In “Pings:” Why Law Enforcement’S Use Of Cell-Site Simulators Does Not Categorically Violate The Fourth Amendment, Lara M. Mcmahon
Washington and Lee Law Review
This Note proposes four factors courts should consider when asked to determine whether law enforcement’s use of a cell-site simulator constituted a Fourth Amendment search. The first asks courts to consider whether the cell-site simulator surveillance infringed on a constitutionally protected area, such as the home. The second asks courts to consider the duration of the cell-site simulator surveillance. The third asks courts to consider whether the cell-site simulator surveillance was conducted actively or passively. The fourth asks courts to focus on the nature and depth of the information obtained as a result of the cell-site simulator surveillance. If, after …
The Danger Of Facial Recognition In Our Children’S Classrooms, Nila Bala
The Danger Of Facial Recognition In Our Children’S Classrooms, Nila Bala
Duke Law & Technology Review
No abstract provided.
Privacy As Safety, A. Michael Froomkin, Zak Colangelo
Privacy As Safety, A. Michael Froomkin, Zak Colangelo
Washington Law Review
The idea that privacy makes you safer is unjustly neglected: public officials emphasize the dangers of privacy while contemporary privacy theorists acknowledge that privacy may have safety implications but hardly dwell on the point. We argue that this lack of emphasis is a substantive and strategic error and seek to rectify it. This refocusing is particularly timely given the proliferation of new and invasive technologies for the home and for consumer use more generally, not to mention surveillance technologies such as so-called smart cities.
Indeed, we argue—perhaps for the first time in modern conversations about privacy—that in many cases privacy …
Automation In Moderation, Hannah Bloch-Wehba
Automation In Moderation, Hannah Bloch-Wehba
Faculty Scholarship
This Article assesses recent efforts to encourage online platforms to use automated means to prevent the dissemination of unlawful online content before it is ever seen or distributed. As lawmakers in Europe and around the world closely scrutinize platforms’ “content moderation” practices, automation and artificial intelligence appear increasingly attractive options for ridding the Internet of many kinds of harmful online content, including defamation, copyright infringement, and terrorist speech. Proponents of these initiatives suggest that requiring platforms to screen user content using automation will promote healthier online discourse and will aid efforts to limit Big Tech’s power.
In fact, however, the …
Management Culture And Surveillance, J.S. Nelson
Management Culture And Surveillance, J.S. Nelson
Seattle University Law Review
As the modern workplace increasingly adopts technology, that technology is being used to surveil workers in ways that can be highly invasive. Ostensibly, management uses surveillance to assess workers’ productivity, but it uses the same systems to, for example, map their interpersonal relationships, study their conversations, collect data on their health, track where they travel on and off the job, as well as monitor and manipulate their emotional responses. Many of these overreaches are justified in the name of enterprise control. That justification should worry us. This Article aims to make us think about how surveillance is being used as …
Bad Actors: Authenticity, Inauthenticity, Speech, And Capitalism, Sarah C. Haan
Bad Actors: Authenticity, Inauthenticity, Speech, And Capitalism, Sarah C. Haan
Scholarly Articles
“Authenticity” has evolved into an important value that guides social media companies’ regulation of online speech. It is enforced through rules and practices that include real-name policies, Terms of Service requiring users to present only accurate information about themselves, community guidelines that prohibit “coordinated inauthentic behavior,” verification practices, product features, and more.
This Article critically examines authenticity regulation by the social media industry, including companies’ claims that authenticity is a moral virtue, an expressive value, and a pragmatic necessity for online communication. It explains how authenticity regulation provides economic value to companies engaged in “information capitalism,” “data capitalism,” and “surveillance …
42nd Annual Foulston-Siefkin Lecture: The Next Wave Of Fourth Amendment Challenges After Carpenter, Matthew Tokson
42nd Annual Foulston-Siefkin Lecture: The Next Wave Of Fourth Amendment Challenges After Carpenter, Matthew Tokson
Utah Law Faculty Scholarship
This is an edited and adapted version of the 42nd Annual Foulston Siefkin Lecture, delivered at Washburn University School of Law.
The lecture discusses the future of Fourth Amendment law following the Supreme Court’s enormously important decision in Carpenter v. United States. It analyzes Carpenter and argues that its detailed account of the privacy harms caused by government surveillance will be its most important legacy. Moreover, the Court’s emphasis on the risk of privacy harm is not a one-off or a sharp break from previous practice. Carpenter is consistent with a long line of Supreme Court decisions ignoring or reshaping …
My Brother's Keeper: Using The Intelligence Toolbox On Domestic Terrorism, Brandon Carmack
My Brother's Keeper: Using The Intelligence Toolbox On Domestic Terrorism, Brandon Carmack
Mitchell Hamline Law Review
No abstract provided.
Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast
Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast
Catholic University Journal of Law and Technology
The goal of this paper is to examine the future of the third-party doctrine with the proliferation of technology and the online data we are surrounded with daily, specifically after the Supreme Court’s decision in Carpenter v. United States. It is imperative that individuals do not forfeit their Constitutional guarantees for the benefit of living in a technologically advanced society. This requires an understanding of the modern-day functional equivalents of “papers” and “effects.”
Looking to the future, this paper contemplates solutions on how to move forward in this technology era by scrutinizing the relevancy of the third-party doctrine due …
Tracing Biometric Assemblages In India’S Surveillance State: Reproducing Colonial Logics, Reifying Caste Purity, And Quelling Dissent Through Aadhaar, Priya Prabhakar
Tracing Biometric Assemblages In India’S Surveillance State: Reproducing Colonial Logics, Reifying Caste Purity, And Quelling Dissent Through Aadhaar, Priya Prabhakar
Scripps Senior Theses
Tracing Biometric Assemblages in India’s Surveillance State seeks to understand the historical conditions that rendered the nation-state of India as having the world’s largest biometric surveillance system: Aadhaar. Surveillance practices used by the British Raj mirrors the current social order of the ruling Bharatiya Janata Party (BJP), as they use surveillance to similar ends in today’s political economy, through the intersecting forces of neoliberalism and ethnonationalism. This thesis is an exploration into how India’s current surveillance regimes cultivate biometric surveillant assemblages through Aadhaar. Contrary to claims that Aadhaar was created to empower the poor, I argue that these surveillance regimes …
The Ethics Of Dna Testing At The Border, Medha D. Makhlouf
The Ethics Of Dna Testing At The Border, Medha D. Makhlouf
Faculty Scholarly Works
From 2018 to 2020, the U.S. government dramatically expanded DNA surveillance of immigrants. The most recent expansion, finalized in March 2020, effectively requires the collection of DNA from all immigration detainees and storage of their genetic information in the Federal Bureau of Investigation’s (“FBI”) Combined DNA Index System (“CODIS”) database for criminal forensic investigation. This new policy is ethically troubling because it fails to address the potential privacy harms it creates; shifts the application of DNA analysis for criminal investigation from retrospective to prospective assessment of criminality; and disparately impacts racial and ethnic minorities. In this time of extreme immigration …
Hacking For Intelligence Collection In The Fight Against Terrorism: Israeli, Comparative, And International Perspectives, Asaf Lubin
Articles by Maurer Faculty
תקציר בעברית: הניסיון של המחוקק הישראלי להביא להסדרה מפורשת של סמכויות השב״כ במרחב הקיברנטי משקף מגמה רחבה יותר הניכרת בעולם לעיגון בחקיקה ראשית של הוראות בדבר פעולות פצחנות מצד גופי ביון ומודיעין ורשויות אכיפת חוק למטרות איסוף מודיעין לשם סיכול עבירות חמורות, ובייחוד עבירות טרור אם בעבר היו פעולות מסוג אלה כפופות לנהלים פנימיים ומסווגים, הרי שהדרישה לשקיפות בעידן שלאחר גילויי אדוארד סנודן מחד והשימוש הנרחב בתקיפות מחשב לביצוע פעולות חיפוש וחקירה לסיכול טרור מאידך, מציפים כעת את הדרישה להסמכה מפורשת. במאמר זה אבקש למפות הן את השדה הטכנולוגי והן את השדה המשפטי בכל האמור בתקיפות מחשבים למטרות ריגול ומעקב. …
Transparency After Carpenter, Hannah Bloch-Wehba
Transparency After Carpenter, Hannah Bloch-Wehba
Faculty Scholarship
This brief invited response to Professor Matthew Tokson’s Foulston-Siefkin lecture on the Supreme Court's decision in Carpenter v. United States makes two contributions. First, I highlight the social, political, and economic factors at play in the Carpenter decision. The Carpenter Court recognized, in particular, that digital surveillance implicates the rights of more than just criminal suspects: it poses unique and unappreciated threats to public governance of policing. The decision, I argue, reflects longstanding preoccupations in Fourth Amendment decisions with protecting the “public” — particularly innocent third parties — from intrusive and baseless investigations. In so doing, I situate Professor Tokson’s …
Data Battles, Platform Shutdowns, And Digital Rights In Surveillance: Labor Politics In The Online Sex Industry, Winifred R. Poster
Data Battles, Platform Shutdowns, And Digital Rights In Surveillance: Labor Politics In The Online Sex Industry, Winifred R. Poster
Saint Louis University Law Journal
Sex workers are often portrayed as groups with little authority over their jobs. But lately they are making much use of online spaces, both large scale public-facing platforms and their own smaller websites. Taking a deeper ethnographic look into their online activities, I recount a story of highly adept, technologically proficient, and expert digital navigation by sex workers online.
The analysis follows the trajectory of platforms in the online sex industry over the last two decades. First it charts the rise of platforms for matching, reviewing, and identity verification, many of which developed roughly around the 2000s, and their impact …
Sentenced To Surveillance: Fourth Amendment Limits On Electronic Monitoring, Kate Weisburd
Sentenced To Surveillance: Fourth Amendment Limits On Electronic Monitoring, Kate Weisburd
GW Law Faculty Publications & Other Works
As courts and legislatures increasingly recognize that “digital is different” and attempt to limit government surveillance of private data, one group is conspicuously excluded from this new privacy-protective discourse: the five million people in the United States on probation, parole, or other forms of community supervision. This Article is the first to explore how warrantless electronic surveillance is dramatically transforming community supervision and, as a result, amplifying a growing privacy-protection disparity: those in the criminal legal system are increasingly losing privacy protections even while those not in the system are increasingly gaining privacy protections. The quickly expanding use of GPS-equipped …
Iran, Diane M. Zorri
Iran, Diane M. Zorri
Publications
Internet access in Iran is characterized by strong censorship, limited access, surveillance, and widespread state-sanctioned propaganda. The regime in Tehran views internet freedom as a critical threat to its national security (Henry, Pettyjohn, and York 2014). Using an index of variables such as obstacles to access, limits on content, and violations of user rights, the nongovernmental organization Freedom House rates Iran’s internet access as “not free” (Freedom House 2018). On a scale of zero to one hundred, where zero is “free” and one hundred is “not free,” Freedom House scores Iran at an eighty-five, making it the least free nation …