Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Selected Works (5)
- The Catholic University of America, Columbus School of Law (2)
- University of Pennsylvania Carey Law School (2)
- BLR (1)
- Embry-Riddle Aeronautical University (1)
-
- Pace University (1)
- Penn State Dickinson Law (1)
- Penn State Law (1)
- SJ Quinney College of Law, University of Utah (1)
- Salve Regina University (1)
- Schulich School of Law, Dalhousie University (1)
- Seattle University School of Law (1)
- Texas A&M University School of Law (1)
- Universitas Indonesia (1)
- University of Cincinnati College of Law (1)
- University of Colorado Law School (1)
- University of Maryland Francis King Carey School of Law (1)
- University of Nebraska - Lincoln (1)
- University of New Hampshire (1)
- University of San Diego (1)
- Vanderbilt University Law School (1)
- Publication Year
- Publication
-
- Stephen E Henderson (3)
- All Faculty Scholarship (2)
- Catholic University Journal of Law and Technology (2)
- "Dharmasisya” Jurnal Program Magister Hukum FHUI (1)
- Articles, Book Chapters, & Popular Press (1)
-
- Dickinson Law Review (2017-Present) (1)
- Dissertations (1)
- Dyson College- Seidenberg School of CSIS : Collaborative Projects and Presentations (1)
- ExpressO (1)
- Faculty Articles and Other Publications (1)
- Faculty Scholarship (1)
- Faculty and Staff - Articles & Papers (1)
- Greg Sergienko (1)
- Journal Articles (1)
- Journal of Business & Technology Law (1)
- Journal of Digital Forensics, Security and Law (1)
- Law Faculty Scholarship (1)
- Library Philosophy and Practice (e-journal) (1)
- Publications (1)
- Rodolfo C. Rivas (1)
- Seattle University Law Review (1)
- Utah OnLaw: The Utah Law Review Online Supplement (1)
- Vanderbilt Journal of Transnational Law (1)
- Publication Type
Articles 1 - 27 of 27
Full-Text Articles in Computer Law
Perlindungan Atas Privasi Konsumen Dalam Layanan Reservasi Tiket Online Dari Pt. Kereta Api Indonesia, Aprilia Susanti
Perlindungan Atas Privasi Konsumen Dalam Layanan Reservasi Tiket Online Dari Pt. Kereta Api Indonesia, Aprilia Susanti
"Dharmasisya” Jurnal Program Magister Hukum FHUI
The significant increase in online activities cannot be separated from the many active internet users who use mobile internet connections to carry out their daily activities, one of which is for the convenience of making ticket reservations at PT. Indonesian Railways (KAI). The purpose of this research is to find out the study of the business law of protecting consumer privacy in the online ticketing service of PT. KAI. Data collection was carried out by means of a literature study of the relationship between laws and regulations in consumer protection and the position of PT. KAI as business actors and …
Inadequate Privacy: The Necessity Of Hipaa Reform In A Post-Dobbs World, Katherine Robertson
Inadequate Privacy: The Necessity Of Hipaa Reform In A Post-Dobbs World, Katherine Robertson
Seattle University Law Review
Part I of this Comment will provide an overview of HIPAA and the legal impacts of Dobbs. Part II will discuss the anticipatory response to the impacts of Dobbs on PHI by addressing the response from (1) the states, (2) the Biden Administration, and (3) the medical field. Part III will discuss the loopholes that exist in HIPAA and further address the potential impacts on individuals and the medical field if reform does not occur. Finally, Part IV will argue that the reform of HIPAA is the best avenue for protecting PHI related to reproductive healthcare.
Content Moderation As Surveillance, Hannah Bloch-Wehba
Content Moderation As Surveillance, Hannah Bloch-Wehba
Faculty Scholarship
Technology platforms are the new governments, and content moderation is the new law, or so goes a common refrain. As platforms increasingly turn toward new, automated mechanisms of enforcing their rules, the apparent power of the private sector seems only to grow. Yet beneath the surface lies a web of complex relationships between public and private authorities that call into question whether platforms truly possess such unilateral power. Law enforcement and police are exerting influence over platform content rules, giving governments a louder voice in supposedly “private” decisions. At the same time, law enforcement avails itself of the affordances of …
Passcodes, Protection, And Legal Practicality: The Necessity Of A Digital Fifth Amendment, Ethan Swierczewski
Passcodes, Protection, And Legal Practicality: The Necessity Of A Digital Fifth Amendment, Ethan Swierczewski
Catholic University Journal of Law and Technology
No abstract provided.
A Proportionality-Based Framework For Government Regulation Of Digital Tracing Apps In Times Of Emergency, Sharon Bassan
A Proportionality-Based Framework For Government Regulation Of Digital Tracing Apps In Times Of Emergency, Sharon Bassan
Dickinson Law Review (2017-Present)
Times of emergency present an inherent conflict between the public interest and the preservation of individual rights. Such times require granting emergency powers to the government on behalf of the public interest and relaxing safeguards against government actions that infringe rights. The lack of theoretical framework to assess governmental decisions in times of emergency leads to a polarized and politicized discourse about potential policies, and often, to public distrust and lack of compliance.
Such a discourse was evident regarding Digital Tracing Apps (“DTAs”), which are apps installed on cellular phones to alert users that they were exposed to people who …
Personal Data Privacy And Protective Federal Legislation: An Exploration Of Constituent Position On The Need For Legislation To Control Data Reliant Organizations Collecting And Monetizing Internet-Obtained Personal Data, Giovanni De Meo
Dissertations
In the past twenty years, the business of online personal data collection has grown at the same rapid pace as the internet itself, fostering a multibillion-dollar personal data collection and commercialization industry. Unlike many other large industries, there has been no major federal legislation enacted to monitor or control the activities of organizations dealing in this flourishing industry. The combination of these factors together with the lack of prior research encouraged this research designed to understand how much voters know about this topic and whether there is interest in seeing legislation enacted to protect individual personal data privacy.
To address …
The Right To Contest Ai, Margot E. Kaminski, Jennifer M. Urban
The Right To Contest Ai, Margot E. Kaminski, Jennifer M. Urban
Publications
Artificial intelligence (AI) is increasingly used to make important decisions, from university admissions selections to loan determinations to the distribution of COVID-19 vaccines. These uses of AI raise a host of concerns about discrimination, accuracy, fairness, and accountability.
In the United States, recent proposals for regulating AI focus largely on ex ante and systemic governance. This Article argues instead—or really, in addition—for an individual right to contest AI decisions, modeled on due process but adapted for the digital age. The European Union, in fact, recognizes such a right, and a growing number of institutions around the world now call for …
Cryptography, Passwords, Privacy, And The Fifth Amendment, Gary C. Kessler, Ann M. Phillips
Cryptography, Passwords, Privacy, And The Fifth Amendment, Gary C. Kessler, Ann M. Phillips
Journal of Digital Forensics, Security and Law
Military-grade cryptography has been widely available at no cost for personal and commercial use since the early 1990s. Since the introduction of Pretty Good Privacy (PGP), more and more people encrypt files and devices, and we are now at the point where our smartphones are encrypted by default. While this ostensibly provides users with a high degree of privacy, compelling a user to provide a password has been interpreted by some courts as a violation of our Fifth Amendment protections, becoming an often insurmountable hurdle to law enforcement lawfully executing a search warrant. This paper will explore some of the …
Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast
Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast
Catholic University Journal of Law and Technology
The goal of this paper is to examine the future of the third-party doctrine with the proliferation of technology and the online data we are surrounded with daily, specifically after the Supreme Court’s decision in Carpenter v. United States. It is imperative that individuals do not forfeit their Constitutional guarantees for the benefit of living in a technologically advanced society. This requires an understanding of the modern-day functional equivalents of “papers” and “effects.”
Looking to the future, this paper contemplates solutions on how to move forward in this technology era by scrutinizing the relevancy of the third-party doctrine due …
Review Of Ian Kerr And Jane Bailey, The Implications Of Digital Rights Management For Privacy And Freedom Of Expression, 2 Journal Of Information, Communication & Ethics In Society 87 (2004), Ann Bartow
Law Faculty Scholarship
Ian Kerr, who passed away far too young in 2019, was an incisive scholar and a much treasured colleague. The wit that sparkled in his papers was matched only by his warmth toward his friends, of whom there were many. He and his many co-authors wrote with deep insight and an equally deep humanity about copyright, artificial intelligence, privacy, torts, and much much more.
Ian was also a valued contributor to the Jotwell Technology Law section. His reviews here display the same playful generosity that characterized everything else he did. In tribute to his memory, we are publishing a memorial …
Right To Privacy, A Complicated Concept To Review, Ali Alibeigi, Abu Bakar Munir, Md Ershadul Karim
Right To Privacy, A Complicated Concept To Review, Ali Alibeigi, Abu Bakar Munir, Md Ershadul Karim
Library Philosophy and Practice (e-journal)
The Concept and definition of the privacy has been changed during the time affecting by different factors. At the same time, the boundaries of privacy may differ from one place to another affecting by the culture, religion, etc. Nonetheless, there is not a unique general accepted definition for the privacy. Privacy has been considered from different disciplines like sociology, psychology, law and philosophy. It is a multidisciplinary domain, having an easy concept but difficult to define. However, by reviewing all different viewpoints, it can be concluded that privacy is an individual tendency, wish and natural need to be away from …
Self Incrimination And Cryptographic Keys, Gregory S. Sergienko
Self Incrimination And Cryptographic Keys, Gregory S. Sergienko
Greg Sergienko
Modern cryptography can make it virtually impossible to decipher documents without the cryptographic key thus making the availability of the contents of those documents depend on the availability of the key. This article examines the Fourth and Fifth Amendments' protection against the compulsory production of the key and the scope of the Fifth Amendment immunity against compelled production. After analyzing these questions using prevailing Fourth and Fifth Amendment jurisprudence, I shall describe the advantages of a privacy-based approach in practical and constitutional terms. [excerpt]
Data Breaches, Identity Theft And Article Iii Standing: Will The Supreme Court Resolve The Split In The Circuits, Bradford Mank
Data Breaches, Identity Theft And Article Iii Standing: Will The Supreme Court Resolve The Split In The Circuits, Bradford Mank
Faculty Articles and Other Publications
In data breach cases, the lower federal courts have split on the question of whether the plaintiffs meet Article III standing requirements for injury and causation. In its 2013 decision Clapper v. Amnesty International USA, the Supreme Court, in a case involving alleged electronic surveillance by the U.S. government’s National Security Agency, declared that a plaintiff alleging that it will suffer future injuries from a defendant’s allegedly improper conduct must show that such injuries are “certainly impending.” Since the Clapper decision, a majority of the lower federal courts addressing “lost data” or potential identity theft cases in which there is …
Fourth Amendment Time Machines (And What They Might Say About Police Body Cameras), Stephen E. Henderson
Fourth Amendment Time Machines (And What They Might Say About Police Body Cameras), Stephen E. Henderson
Stephen E Henderson
Systematic Ict Surveillance By Employers: Are Your Personal Activities Private?, Arlene J. Nicholas
Systematic Ict Surveillance By Employers: Are Your Personal Activities Private?, Arlene J. Nicholas
Faculty and Staff - Articles & Papers
This paper reviews the various methods of information and communications technology (ICT) that is used by employers to peer into the work lives and, in some cases, private lives of employees. Some of the most common methods – such as computer and Internet monitoring, video surveillance, and global positioning systems (GPS) – have resulted in employee disciplines that have been challenged in courts. This paper provides background information on United States (U.S.) laws and court cases which, in this age of easily accessible information, mostly support the employer. Assessments regarding regulations and policies, which will need to be continually updated …
Fouling The First Amendment: Why Colleges Can't, And Shouldn't, Control Student Athletes' Speech On Social Media, Frank D. Lomonte
Fouling The First Amendment: Why Colleges Can't, And Shouldn't, Control Student Athletes' Speech On Social Media, Frank D. Lomonte
Journal of Business & Technology Law
No abstract provided.
Striking A Balance Between Privacy And Online Commerce, Mark Bartholomew
Striking A Balance Between Privacy And Online Commerce, Mark Bartholomew
Utah OnLaw: The Utah Law Review Online Supplement
It is becoming commonplace to note that privacy and online commerce are on a collision course. Corporate entities archive and monetize more and more personal information. Citizens increasingly resent the intrusive nature of such data collection and use. Just noticing this conflict, however, tells us little. In Informing and Reforming the Marketplace of Ideas: The Public-Private Model for Data Production and the First Amendment, Professor Shubha Ghosh not only notes the tension between the costs and benefits of data commercialization, but suggests three normative perspectives for balancing privacy and commercial speech. This is valuable because without a rich theoretical framework …
Pass Parallel Privacy Standards Or Privacy Perishes, Anne T. Mckenna
Pass Parallel Privacy Standards Or Privacy Perishes, Anne T. Mckenna
Journal Articles
No abstract provided.
Implementación De Políticas Corporativas Sobre Internet Y Redes Sociales En México, Rodolfo C. Rivas Rea Esq.
Implementación De Políticas Corporativas Sobre Internet Y Redes Sociales En México, Rodolfo C. Rivas Rea Esq.
Rodolfo C. Rivas
The author analyzes and describes the necessary elements of a successful social media and Internet corporate policy; through citing common pitfalls and learning lessons from different jurisdictions across the world. The author then offers general guidelines on policies for Mexican enterprises under Mexican legislation.///////////////////////////////////////////////////////////////////////////////////////El autor analiza y describe los elementos necesarios de una política corporativa sobre internet y redes sociales exitosa, citando los errores más comunes y aprendiendo lecciones de las legislaciones de distintos países.
Communications Disruption And Censorship Under International Law: History Lessons, Jonathon Penney
Communications Disruption And Censorship Under International Law: History Lessons, Jonathon Penney
Articles, Book Chapters, & Popular Press
With Internet censorship on the rise around the world, a variety of tools have proliferated to assist Internet users to circumvent such censorship. However, there are few studies examining the implications of censorship circumvention under international law, and its related politics. This paper aims to help fill some of that void, with an examination of case studies wherein global communications technologies have been disrupted or censored — telegram cable cutting and censorship, high frequency radio jamming, and direct broadcast satellite blocking — and how the world community responded to that disruption or censorship through international law and law making. In …
Expectations Of Privacy In Social Media, Stephen E. Henderson
Expectations Of Privacy In Social Media, Stephen E. Henderson
Stephen E Henderson
This article, which largely tracks my remarks at Mississippi College’s Social Media Symposium, examines expectations of privacy in social media such as weblogs (blogs), Facebook pages, and Twitter tweets. Social media is diverse and ever-diversifying, and while I address some of that complexity, I focus on the core functionality, which provides the groundwork for further conversation as the technology and related social norms develop. As one would expect, just as with our offline communications and other online communications, in some we have an expectation of privacy that is recognized by current law, in some we have an expectation of privacy …
The Timely Demise Of The Fourth Amendment Third Party Doctrine, Stephen E. Henderson
The Timely Demise Of The Fourth Amendment Third Party Doctrine, Stephen E. Henderson
Stephen E Henderson
In what may be a slightly premature obituary, in this response to a forthcoming paper by Matthew Tokson I argue that the Fourth Amendment third party doctrine "has at least taken ill, and it can be hoped it is an illness from which it will never recover." It is increasingly unpopular as a matter of state constitutional law, has long been assailed in scholarship but now thoughtful alternatives are percolating, and it cannot – or at least should not – withstand the pressures which technology and social norms are placing upon it. Even the Supreme Court seems loath to defend …
Civilians In Cyberwarfare: Conscripts, Susan W. Brenner, Leo L. Clarke
Civilians In Cyberwarfare: Conscripts, Susan W. Brenner, Leo L. Clarke
Vanderbilt Journal of Transnational Law
Civilian-owned and -operated entities will almost certainly be a target in cyberwarfare because cyberattackers are likely to be more focused on undermining the viability of the targeted state than on invading its territory. Cyberattackers will probably target military computer systems, at least to some extent, but in a departure from traditional warfare, they will also target companies that operate aspects of the victim nation's infrastructure. Cyberwarfare, in other words, will penetrate the territorial borders of the attacked state and target high-value civilian businesses. Nation-states will therefore need to integrate the civilian employees of these (and perhaps other) companies into their …
Student Comprehension Of Privacy Issues In Sns, Collaborative Project
Student Comprehension Of Privacy Issues In Sns, Collaborative Project
Dyson College- Seidenberg School of CSIS : Collaborative Projects and Presentations
This entry adheres to the use of the quad chart template to provide for a succint description only of the current research project undertaken by the participants. It provides for the following information:
1. Participant/s
2. Overall project goals
3. Illustrative picture/s
4.Specific research/artistic/pedagogic foci
Dredging Up The Past: Lifelogging, Memory And Surveillance, Anita L. Allen
Dredging Up The Past: Lifelogging, Memory And Surveillance, Anita L. Allen
All Faculty Scholarship
The term “lifelog” refers to a comprehensive archive of an individual's quotidian existence, created with the help of pervasive computing technologies. Lifelog technologies would record and store everyday conversations, actions, and experiences of their users, enabling future replay and aiding remembrance. Products to assist lifelogging are already on the market; but the technology that will enable people fully and continuously to document their entire lives is still in the research and development phase. For generals, edgy artists and sentimental grandmothers alike, lifelogging could someday replace or complement, existing memory preservation practices. Like a traditional diary, journal or day-book, the lifelog …
The Virtuous Spy: Privacy As An Ethical Limit, Anita L. Allen
The Virtuous Spy: Privacy As An Ethical Limit, Anita L. Allen
All Faculty Scholarship
Is there any reason not to spy on other people as necessary to get the facts straight, especially if you can put the facts you uncover to good use? To “spy” is secretly to monitor or investigate another's beliefs, intentions, actions, omissions, or capacities, especially as revealed in otherwise concealed or confidential conduct, communications and documents. By definition, spying involves secret, covert activity, though not necessarily lies, fraud or dishonesty. Nor does spying necessarily involve the use of special equipment, such as a tape recorder or high-powered binoculars. Use of a third party agent, such as a “private eye” or …
Privacy And Access To Public Records In The Information Age, Sol Bermann
Privacy And Access To Public Records In The Information Age, Sol Bermann
ExpressO
Online public record access brings a wealth of benefits ranging from greater government access and accountability to increased cost-savings and efficiencies. However, due to the presence of highly sensitive, personal data, an increase in public records access also brings potential dangers, including heightened risk of identity theft and frivolous snooping into the affairs of others.
Historically, public records have had some measure of public accessibility in order to empower citizens with the ability to observe the goings-on of government, leading to greater government accountability. Until the rise of the internet, citizens have had their privacy protected through practical obscurity (the …