Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of Pittsburgh School of Law (3)
- New York Law School (2)
- Schulich School of Law, Dalhousie University (2)
- Seattle University School of Law (2)
- University of Colorado Law School (2)
-
- University of Michigan Law School (2)
- University of Pennsylvania Carey Law School (2)
- Washington and Lee University School of Law (2)
- American University Washington College of Law (1)
- Barry University School of Law (1)
- Mitchell Hamline School of Law (1)
- Roger Williams University (1)
- Selected Works (1)
- Southern Methodist University (1)
- St. Mary's University (1)
- The Catholic University of America, Columbus School of Law (1)
- University of Baltimore Law (1)
- University of Maryland Francis King Carey School of Law (1)
- University of New Hampshire (1)
- Vanderbilt University Law School (1)
- William & Mary Law School (1)
- Publication Year
- Publication
-
- All Faculty Scholarship (3)
- Articles (3)
- Faculty Scholarship (3)
- Michigan Journal of Gender & Law (2)
- NYLS Law Review (2)
-
- Publications (2)
- Reports & Public Policy Documents (2)
- Seattle University Law Review (2)
- Washington and Lee Journal of Civil Rights and Social Justice (2)
- Articles in Law Reviews & Other Academic Journals (1)
- Catholic University Journal of Law and Technology (1)
- Faculty Journal Articles and Book Chapters (1)
- RISK: Health, Safety & Environment (1990-2002) (1)
- School of Law Conferences, Lectures & Events (1)
- St. Mary's Law Journal (1)
- Stephen E Henderson (1)
- Vanderbilt Journal of Entertainment & Technology Law (1)
- William & Mary Law Review (1)
- Publication Type
Articles 1 - 30 of 30
Full-Text Articles in Privacy Law
The Automated Fourth Amendment, Maneka Sinha
The Automated Fourth Amendment, Maneka Sinha
Faculty Scholarship
Courts routinely defer to police officer judgments in reasonable suspicion and probable cause determinations. Increasingly, though, police officers outsource these threshold judgments to new forms of technology that purport to predict and detect crime and identify those responsible. These policing technologies automate core police determinations about whether crime is occurring and who is responsible. Criminal procedure doctrine has failed to insist on some level of scrutiny of—or skepticism about—the reliability of this technology. Through an original study analyzing numerous state and federal court opinions, this Article exposes the implications of law enforcement’s reliance on these practices given the weighty interests …
Inadequate Privacy: The Necessity Of Hipaa Reform In A Post-Dobbs World, Katherine Robertson
Inadequate Privacy: The Necessity Of Hipaa Reform In A Post-Dobbs World, Katherine Robertson
Seattle University Law Review
Part I of this Comment will provide an overview of HIPAA and the legal impacts of Dobbs. Part II will discuss the anticipatory response to the impacts of Dobbs on PHI by addressing the response from (1) the states, (2) the Biden Administration, and (3) the medical field. Part III will discuss the loopholes that exist in HIPAA and further address the potential impacts on individuals and the medical field if reform does not occur. Finally, Part IV will argue that the reform of HIPAA is the best avenue for protecting PHI related to reproductive healthcare.
The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine
The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine
Catholic University Journal of Law and Technology
No abstract provided.
Big Brother Is Scanning: The Widespread Implementation Of Alpr Technology In America’S Police Forces, Yash Dattani
Big Brother Is Scanning: The Widespread Implementation Of Alpr Technology In America’S Police Forces, Yash Dattani
Vanderbilt Journal of Entertainment & Technology Law
Automatic License Plate Readers (ALPRs) are an increasingly popular tool in police departments across the United States. At its core, ALPR technology functions in a relatively simple manner. The technology has two major components: the actual scanners, which record license plates, and the databases which collect, compile, and analyze this information for officers to access at the click of a button. Although this technology first came to the United States in 1998 as a form of rudimentary border security, its purpose and capabilities have rapidly grown. Now, in 2022, ALPR has evolved into a frighteningly powerful piece of technology, potentially …
Submission To The Province Of Nova Scotia On Its Review Of The Intimate Images And Cyber-Protection Act - Leaf, Suzie Dunn, Rosel Kim
Submission To The Province Of Nova Scotia On Its Review Of The Intimate Images And Cyber-Protection Act - Leaf, Suzie Dunn, Rosel Kim
Reports & Public Policy Documents
The Women’s Legal Education and Action Fund (LEAF) commends the Nova Scotia government for reviewing its Intimate Images and Cyber-protection Act (the Act) and seeking public input for this review. Nova Scotia has been, and continues to be, a leader in Canada for its role in advancing innovative laws and supports for people targeted by technology-facilitated violence (TFV), digital abuse, and the non-consensual distribution of intimate images (NCDII). As these forms of harmful behaviour evolve and become better understood, it is important to revisit this legislation to assess whether it is providing meaningful and accessible responses to such serious social …
Periods For Profit And The Rise Of Menstrual Surveillance, Michele E. Gilman
Periods For Profit And The Rise Of Menstrual Surveillance, Michele E. Gilman
All Faculty Scholarship
Menstruation is being monetized and surveilled, with the voluntary participation of millions of women. Thousands of downloadable apps promise to help women monitor their periods and manage their fertility. These apps are part of the broader, multi-billion dollar, Femtech industry, which sells technology to help women understand and improve their health. Femtech is marketed with the language of female autonomy and feminist empowerment. Despite this rhetoric, Femtech is part of a broader business strategy of data extraction, in which companies are extracting people’s personal data for profit, typically without their knowledge or meaningful consent. Femtech can oppress menstruators in several …
Submission To The Toronto Police Services Board’S Use Of New Artificial Intelligence Technologies Policy- Leaf And The Citizen Lab, Suzie Dunn, Kristen Mj Thomasen, Kate Robertson, Pam Hrick, Cynthia Khoo, Rosel Kim, Ngozi Okidegbe, Christopher Parsons
Submission To The Toronto Police Services Board’S Use Of New Artificial Intelligence Technologies Policy- Leaf And The Citizen Lab, Suzie Dunn, Kristen Mj Thomasen, Kate Robertson, Pam Hrick, Cynthia Khoo, Rosel Kim, Ngozi Okidegbe, Christopher Parsons
Reports & Public Policy Documents
We write as a group of experts in the legal regulation of artificial intelligence (AI), technology-facilitated violence, equality, and the use of AI systems by law enforcement in Canada. We have experience working within academia and legal practice, and are affiliated with LEAF and the Citizen Lab who support this letter.
We reviewed the Toronto Police Services Board Use of New Artificial Intelligence Technologies Policy and provide comments and recommendations focused on the following key observations:
1. Police use of AI technologies must not be seen as inevitable
2. A commitment to protecting equality and human rights must be integrated …
Pandemic Surveillance Discrimination, Christian Sundquist
Pandemic Surveillance Discrimination, Christian Sundquist
Articles
The COVID-19 pandemic has laid bare the abiding tension between surveillance and privacy. Public health epidemiology has long utilized a variety of surveillance methods—such as contact tracing, quarantines, and mandatory reporting laws—to control the spread of disease during past epidemics and pandemics. Officials have typically justified the resulting intrusions on privacy as necessary for the greater public good by helping to stave off larger health crisis. The nature and scope of public health surveillance in the battle against COVID-19, however, has significantly changed with the advent of new technologies. Digital surveillance tools, often embedded in wearable technology, have greatly increased …
Bytes Bite: Why Corporate Data Breaches Should Give Standing To Affected Individuals, Caden Hayes
Bytes Bite: Why Corporate Data Breaches Should Give Standing To Affected Individuals, Caden Hayes
Washington and Lee Journal of Civil Rights and Social Justice
High-profile data hacks are not uncommon. In fact, according to the Privacy Rights Clearinghouse, there have been at least 7,961 data breaches, exposing over 10,000,000,000 accounts in total, since 2005. These shocking numbers are not particularly surprising when taking into account the value of information stolen. For example, cell phone numbers, as exposed in a Yahoo! hack, are worth $10 a piece on the black market, meaning the hackers stood to make $30,000,000,000 from that one hack. That dollar amount does not even consider copies the hackers could make and later resell. Yet while these hackers make astronomical payoffs, the …
Information And The Regulatory Landscape: A Growing Need To Reconsider Existing Legal Frameworks, Anjanette H. Raymond
Information And The Regulatory Landscape: A Growing Need To Reconsider Existing Legal Frameworks, Anjanette H. Raymond
Washington and Lee Journal of Civil Rights and Social Justice
No abstract provided.
Can The Government Deport Immigrants Using Information It Encouraged Them To Provide?, Amanda Frost
Can The Government Deport Immigrants Using Information It Encouraged Them To Provide?, Amanda Frost
Articles in Law Reviews & Other Academic Journals
This Essay describes the legal and policy issues raised by any systematic effort to deport unauthorized immigrants based on information the government invited them to provide. Part I briefly surveys some of the major laws, regulations, and programs that encourage unauthorized immigrants to identify themselves. Part II analyzes the strengths and weaknesses of the statutory and constitutional arguments that immigrants could raise as a defense against deportations based on self-reported data. Part III explains that even if the government’s systematic use of such data to deport unauthorized immigrants is legal, doing so would be a poor policy choice for any …
Health Information Equity, Craig Konnoth
Health Information Equity, Craig Konnoth
Publications
In the last few years, numerous Americans’ health information has been collected and used for follow-on, secondary research. This research studies correlations between medical conditions, genetic or behavioral profiles, and treatments, to customize medical care to specific individuals. Recent federal legislation and regulations make it easier to collect and use the data of the low-income, unwell, and elderly for this purpose. This would impose disproportionate security and autonomy burdens on these individuals. Those who are well-off and pay out of pocket could effectively exempt their data from the publicly available information pot. This presents a problem which modern research ethics …
Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri
Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri
Articles
Much legal and technical scholarship discusses the differing views of the United States and European Union toward privacy concepts and regulation. A substantial amount of effort in recent years, in both research and policy, focuses on attempting to reconcile these viewpoints searching for a common framework with a common level of protection for citizens from both sides of Atlantic. Reconciliation, we argue, misunderstands the nature of the challenge facing effective cross-border data flows. No such reconciliation can occur without abdication of some sovereign authority of nations, that would require the adoption of an international agreement with typical tools of international …
Recording A New Frontier In Evidence-Gathering: Police Body-Worn Cameras And Privacy Doctrines In Washington State, Katie Farden
Recording A New Frontier In Evidence-Gathering: Police Body-Worn Cameras And Privacy Doctrines In Washington State, Katie Farden
Seattle University Law Review
This Note contributes to a growing body of work that weighs the gains that communities stand to make from police body-worn cameras against the tangle of concerns about how cameras may infringe on individual liberties and tread on existing privacy laws. While police departments have quickly implemented cameras over the past few years, laws governing the use of the footage body-worn cameras capture still trail behind. Notably, admissibility rules for footage from an officer’s camera, and evidence obtained with the help of that footage, remain on the horizon. This Note focuses exclusively on Washington State’s laws. It takes a clinical …
13th Annual Diversity Symposium Dinner 04-07-2016, Roger Williams University School Of Law
13th Annual Diversity Symposium Dinner 04-07-2016, Roger Williams University School Of Law
School of Law Conferences, Lectures & Events
No abstract provided.
Ou Professor: Fourth Amendment At Heart Of Dispute Between Fbi, Apple, Stephen E. Henderson
Ou Professor: Fourth Amendment At Heart Of Dispute Between Fbi, Apple, Stephen E. Henderson
Stephen E Henderson
Use Of Facial Recognition Technology For Medical Purposes: Balancing Privacy With Innovation, Seema Mohapatra
Use Of Facial Recognition Technology For Medical Purposes: Balancing Privacy With Innovation, Seema Mohapatra
Faculty Scholarship
No abstract provided.
The Right To Be Forgotten: Comparing U.S. And European Approaches, Samuel W. Royston
The Right To Be Forgotten: Comparing U.S. And European Approaches, Samuel W. Royston
St. Mary's Law Journal
This Article compares the European and United States stances regarding the right to be forgotten. Within that context, this Article explores the implications of technological advances on constitutional rights, specifically the intersection of the right to free speech and the right to privacy, commonly referred to as the "right to be forgotten" paradox. In the United States, the trend is to favor free speech, while Europe places an emphasis on human rights. Each approach is analyzed based on supporting case law. The consequences of each approach on society, both long- and short-term, are also discussed. This Article argues that a …
Protecting Privacy To Prevent Discrimination, Jessica L. Roberts
Protecting Privacy To Prevent Discrimination, Jessica L. Roberts
William & Mary Law Review
A person cannot consider information that she does not have. Unlawful discrimination, therefore, frequently requires discriminators to have knowledge about protected status. This Article exploits that simple reality, arguing that protecting privacy can prevent discrimination by restricting access to the very information discriminators use to discriminate. Although information related to many antidiscrimination categories, like race and sex, may be immediately apparent upon meeting a person, privacy law can still do significant work to prevent discrimination on the basis of less visible traits such as genetic information, age, national origin, ethnicity, and religion, as well as in cases of racial or …
Regulating The Internet Of Things: First Steps Toward Managing Discrimination, Privacy, Security, And Consent, Scott R. Peppet
Regulating The Internet Of Things: First Steps Toward Managing Discrimination, Privacy, Security, And Consent, Scott R. Peppet
Publications
The consumer "Internet of Things" is suddenly reality, not science fiction. Electronic sensors are now ubiquitous in our smartphones, cars, homes, electric systems, health-care devices, fitness monitors, and workplaces. These connected, sensor-based devices create new types and unprecedented quantities of detailed, high-quality information about our everyday actions, habits, personalities, and preferences. Much of this undoubtedly increases social welfare. For example, insurers can price automobile coverage more accurately by using sensors to measure exactly how you drive (e.g., Progressive 's Snapshot system), which should theoretically lower the overall cost of insurance. But the Internet of Things raises new and difficult questions …
A Private Underworld: The Naked Body In Law And Society, Lawrence M. Friedman, Joanna L. Grossman
A Private Underworld: The Naked Body In Law And Society, Lawrence M. Friedman, Joanna L. Grossman
Faculty Journal Articles and Book Chapters
In general, the literature on privacy stresses, quite naturally, our right to keep things private, or to make our own decisions. The individual, the citizen, is the center of gravity. There is a great deal of material on the limits of privacy, on threats to privacy, and the like. In this Article, the authors want to discuss what one might call mandatory privacy: those aspects of life that we are required to keep secret, hidden, or private, the things that we must keep private, whether we want to or not. This is a subject that has been mostly, though not …
Collateral Consequences, Genetic Surveillance, And The New Biopolitics Of Race, Dorothy E. Roberts
Collateral Consequences, Genetic Surveillance, And The New Biopolitics Of Race, Dorothy E. Roberts
All Faculty Scholarship
This Article is part of a Howard Law Journal Symposium on “Collateral Consequences: Who Really Pays the Price for Criminal Justice?,” as well as my larger book project, Fatal Invention: How Science, Politics, and Big Business Re-create Race in the Twenty-First Century (The New Press, 2011). It considers state and federal government expansion of genetic surveillance as a collateral consequence of a criminal record in the context of a new biopolitics of race in America. Part I reviews the expansion of DNA data banking by states and the federal government, extending the collateral impact of a criminal record—in the form …
Associational Privacy And The First Amendment: Naacp V. Alabama, Privacy And Data Protection, Anita L. Allen
Associational Privacy And The First Amendment: Naacp V. Alabama, Privacy And Data Protection, Anita L. Allen
All Faculty Scholarship
No abstract provided.
Nieves V. Home Box Office, Inc., Andrew Nieh
Discipline In Schools After Safford Unified School District #1 V. Redding, Dennis D. Parker
Discipline In Schools After Safford Unified School District #1 V. Redding, Dennis D. Parker
NYLS Law Review
No abstract provided.
Mapping Online Privacy, Jacqueline D. Lipton
Mapping Online Privacy, Jacqueline D. Lipton
Articles
Privacy scholars have recently outlined difficulties in applying existing concepts of personal privacy to the maturing Internet. With Web 2.0 technologies, more people have more opportunities to post information about themselves and others online, often with scant regard for individual privacy. Shifting notions of 'reasonable expectations of privacy' in the context of blogs, wikis, and online social networks create challenges for privacy regulation. Courts and commentators struggle with Web 2.0 privacy incursions without the benefit of a clear regulatory framework. This article offers a map of privacy that might help delineate at least the outer boundaries of Web 2.0 privacy. …
Controlling Identity: Plessy, Privacy, And Racial Defamation, Jonathan Kahn
Controlling Identity: Plessy, Privacy, And Racial Defamation, Jonathan Kahn
Faculty Scholarship
This Article explores the origins of privacy law in early twentieth century America in relation to the legal solidification of Jim Crow in the aftermath of Plessy v. Ferguson. It considers some distinctively southern aspects of the origins of the right to privacy and argues that by viewing privacy, racial defamation, and Jim Crow in relation to each other, we can gain new insights into each-coming to understand that Plessy was not just about controlling space, or property, or even equality but also about controlling identity itself, and coming to see that in its origins, the right to privacy had …
Restructuring The Marital Bedroom: The Role Of The Privacy Doctrine In Advocating The Legalization Of Same-Sex Marriage, Nadine A. Gartner
Restructuring The Marital Bedroom: The Role Of The Privacy Doctrine In Advocating The Legalization Of Same-Sex Marriage, Nadine A. Gartner
Michigan Journal of Gender & Law
Part I of this paper examines the reasons underlying queer rights advocates' reluctance to insert privacy arguments into the case for legalizing same-sex marriage. Part II illustrates that, due to such disinclination, advocates transformed notions of privacy into concepts of liberty. Part III argues that, after the Lawrence decision, proponents of same-sex marriage can and should use privacy-based arguments to fortify their claims.
Psychosocial Risks Of Storing And Using Human Tissues In Research, Jon F. Merz
Psychosocial Risks Of Storing And Using Human Tissues In Research, Jon F. Merz
RISK: Health, Safety & Environment (1990-2002)
Dr. Merz argues that genetics technology makes it more compelling that researchers plan more carefully for the collection and disposition of information derived from subjects' tissues and blood.
Honesty, Privacy, And Shame: When Gay People Talk About Other Gay People To Nongay People, David L. Chambers, Steven K. Homer
Honesty, Privacy, And Shame: When Gay People Talk About Other Gay People To Nongay People, David L. Chambers, Steven K. Homer
Michigan Journal of Gender & Law
There is a longstanding convention among lesbians and gay men in the United States: Do not reveal the sexuality of a gay person to a heterosexual person; unless you are certain that the gay person does not regard his sexuality as a secret. Lie if necessary to protect her secret. Violating the convention by "outing" another person is widely considered a serious social sin.