Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 21 of 21

Full-Text Articles in Privacy Law

The Automated Fourth Amendment, Maneka Sinha Jan 2024

The Automated Fourth Amendment, Maneka Sinha

Faculty Scholarship

Courts routinely defer to police officer judgments in reasonable suspicion and probable cause determinations. Increasingly, though, police officers outsource these threshold judgments to new forms of technology that purport to predict and detect crime and identify those responsible. These policing technologies automate core police determinations about whether crime is occurring and who is responsible. Criminal procedure doctrine has failed to insist on some level of scrutiny of—or skepticism about—the reliability of this technology. Through an original study analyzing numerous state and federal court opinions, this Article exposes the implications of law enforcement’s reliance on these practices given the weighty interests …


24th Annual Open Government Summit 2022, Roger Williams University School Of Law, Rhode Island Office Of The Attorney General Jun 2022

24th Annual Open Government Summit 2022, Roger Williams University School Of Law, Rhode Island Office Of The Attorney General

School of Law Conferences, Lectures & Events

No abstract provided.


Law Library Blog (January 2021): Legal Beagle's Blog Archive, Roger Williams University School Of Law Jan 2021

Law Library Blog (January 2021): Legal Beagle's Blog Archive, Roger Williams University School Of Law

Law Library Newsletters/Blog

No abstract provided.


Submission To The Toronto Police Services Board’S Use Of New Artificial Intelligence Technologies Policy- Leaf And The Citizen Lab, Suzie Dunn, Kristen Mj Thomasen, Kate Robertson, Pam Hrick, Cynthia Khoo, Rosel Kim, Ngozi Okidegbe, Christopher Parsons Jan 2021

Submission To The Toronto Police Services Board’S Use Of New Artificial Intelligence Technologies Policy- Leaf And The Citizen Lab, Suzie Dunn, Kristen Mj Thomasen, Kate Robertson, Pam Hrick, Cynthia Khoo, Rosel Kim, Ngozi Okidegbe, Christopher Parsons

Reports & Public Policy Documents

We write as a group of experts in the legal regulation of artificial intelligence (AI), technology-facilitated violence, equality, and the use of AI systems by law enforcement in Canada. We have experience working within academia and legal practice, and are affiliated with LEAF and the Citizen Lab who support this letter.

We reviewed the Toronto Police Services Board Use of New Artificial Intelligence Technologies Policy and provide comments and recommendations focused on the following key observations:

1. Police use of AI technologies must not be seen as inevitable
2. A commitment to protecting equality and human rights must be integrated …


The Left's Law-And-Order Agenda, Aya Gruber Jan 2019

The Left's Law-And-Order Agenda, Aya Gruber

Publications

No abstract provided.


Privacy And Security Across Borders, Jennifer Daskal Jan 2019

Privacy And Security Across Borders, Jennifer Daskal

Articles in Law Reviews & Other Academic Journals

Three recent initiatives -by the United States, European Union, and Australiaare opening salvos in what will likely be an ongoing and critically important debate about law enforcement access to data, the jurisdictional limits to such access, and the rules that apply. Each of these developments addresses a common set of challenges posed by the increased digitalization of information, the rising power of private companies delimiting access to that information, and the cross-border nature of investigations that involve digital evidence. And each has profound implications for privacy, security, and the possibility of meaningful democratic accountability and control. This Essay analyzes the …


Revenge Porn, Thomas Lonardo, Tricia P. Martland, Rhode Island Bar Journal Nov 2018

Revenge Porn, Thomas Lonardo, Tricia P. Martland, Rhode Island Bar Journal

Life of the Law School (1993- )

No abstract provided.


Rwu First Amendment Blog: David Logan's Blog: Discovering Trump 06-22-2018, David A. Logan Jun 2018

Rwu First Amendment Blog: David Logan's Blog: Discovering Trump 06-22-2018, David A. Logan

Law School Blogs

No abstract provided.


Criminal Employment Law, Benjamin Levin Jan 2018

Criminal Employment Law, Benjamin Levin

Publications

This Article diagnoses a phenomenon, “criminal employment law,” which exists at the nexus of employment law and the criminal justice system. Courts and legislatures discourage employers from hiring workers with criminal records and encourage employers to discipline workers for non-work-related criminal misconduct. In analyzing this phenomenon, my goals are threefold: (1) to examine how criminal employment law works; (2) to hypothesize why criminal employment law has proliferated; and (3) to assess what is wrong with criminal employment law. This Article examines the ways in which the laws that govern the workplace create incentives for employers not to hire individuals with …


Microsoft Ireland, The Cloud Act, And International Lawmaking 2.0, Jennifer Daskal Jan 2018

Microsoft Ireland, The Cloud Act, And International Lawmaking 2.0, Jennifer Daskal

Articles in Law Reviews & Other Academic Journals

On March 23, President Trump signed the CLOUD Act, 1 thereby mooting one of the most closely watched Supreme Court cases this term: the Microsoft Ireland case. 2 This essay examines these extraordinary and fast-moving developments, explaining how the Act resolves the Supreme Court case and addresses the complicated questions of jurisdiction over data in the cloud. The developments represent a classic case of international lawmaking via domestic regulation, as mediated by major multinational corporations that manage so much of the world's data.


The Criminal Justice Black Box, Samuel R. Wiseman Jan 2017

The Criminal Justice Black Box, Samuel R. Wiseman

Scholarly Publications

"Big data "-- the collection and statistical analysis of numerous digital data points -- has transformed the commercial and policy realms, changing firms' understanding of consumer behavior and improving problems ranging from traffic congestion to drug interactions. In the criminal justice field, police now use data from widely dispersed monitoring equipment, crime databases, and statistical analysis to predict where and when crimes will occur, and police body cameras have the potential to both provide key evidence and reduce misconduct. But in many jurisdictions, digital access to basic criminal court records remains surprisingly limited, and, in contrast to the civil context, …


Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri Jan 2017

Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri

Articles

Much legal and technical scholarship discusses the differing views of the United States and European Union toward privacy concepts and regulation. A substantial amount of effort in recent years, in both research and policy, focuses on attempting to reconcile these viewpoints searching for a common framework with a common level of protection for citizens from both sides of Atlantic. Reconciliation, we argue, misunderstands the nature of the challenge facing effective cross-border data flows. No such reconciliation can occur without abdication of some sovereign authority of nations, that would require the adoption of an international agreement with typical tools of international …


Electronic Devices At The Border: The Next Frontier Of Canadian Search And Seizure Law?, Robert Currie Jan 2016

Electronic Devices At The Border: The Next Frontier Of Canadian Search And Seizure Law?, Robert Currie

Articles, Book Chapters, & Popular Press

Over the last several years the Supreme Court of Canada has developed its jurisprudence regarding the search and seizure of electronic devices, applying section 8 of the Canadian Charter of Rights and Freedoms in such a way as to assert and protect a significant amount of privacy in the devices and their data. Recent cases regarding the search of devices at Canada’s borders, however, do not reflect this case law. This is a situation made all the more complex by the generally attenuated expectation of privacy in the border context, and is worthy of inquiry. Using a pending border case …


Riley V. California And The Beginning Of The End For The Third-Party Search Doctrine, David A. Harris Jan 2016

Riley V. California And The Beginning Of The End For The Third-Party Search Doctrine, David A. Harris

Articles

In Riley v. California, the Supreme Court decided that when police officers seize a smart phone, they may not search through its contents -- the data found by looking into the call records, calendars, pictures and so forth in the phone -- without a warrant. In the course of the decision, the Court said that the rule applied not just to data that was physically stored on the device, but also to data stored "in the cloud" -- in remote sites -- but accessed through the device. This piece of the decision may, at last, allow a re-examination of …


Beyond Title Vii: Rethinking Race, Ex-Offender Status, And Employment Discrimination In The Information Age, Kimani Paul-Emile Jan 2014

Beyond Title Vii: Rethinking Race, Ex-Offender Status, And Employment Discrimination In The Information Age, Kimani Paul-Emile

Faculty Scholarship

More than sixty-five million people in the United States—more than one in four adults—have had some involvement with the criminal justice system that will appear on a criminal history report. A rapidly expanding, for-profit industry has developed to collect these records and compile them into electronic databases, offering employers an inexpensive and readily accessible means of screening prospective employees. Nine out of ten employers now inquire into the criminal history of job candidates, systematically denying individuals with a criminal record any opportunity to gain work experience or build their job qualifications. This is so despite the fact that many individuals …


Fighting Cybercrime After United States V. Jones, David C. Gray, Danielle Keats Citron, Liz Clark Rinehart Jan 2013

Fighting Cybercrime After United States V. Jones, David C. Gray, Danielle Keats Citron, Liz Clark Rinehart

Faculty Scholarship

In a landmark non-decision last term, five Justices of the United States Supreme Court would have held that citizens possess a Fourth Amendment right to expect that certain quantities of information about them will remain private, even if they have no such expectations with respect to any of the information or data constituting that whole. This quantitative approach to evaluating and protecting Fourth Amendment rights is certainly novel and raises serious conceptual, doctrinal, and practical challenges. In other works, we have met these challenges by engaging in a careful analysis of this “mosaic theory” and by proposing that courts focus …


Privacy And The Criminal Arrestee Or Suspect: In Search Of A Right, In Need Of A Rule, Sadiq Reza Jan 2005

Privacy And The Criminal Arrestee Or Suspect: In Search Of A Right, In Need Of A Rule, Sadiq Reza

Faculty Scholarship

Criminal accusation stigmatizes. Merely having been accused of a crime lasts in the public eye, damaging one's reputation and threatening current and future employment, relationships, social status, and more. But vast numbers of criminal cases are dismissed soon after arrest, and countless accusations are unfounded or unprovable. Nevertheless, police officers and prosecutors routinely name criminal accusees to the public upon arrest or suspicion, with no obligation to publicize a defendant's exoneration, or the dismissal of his case, or a decision not to file charges against him at all. Other individuals caught up in the criminal process enjoy protections against the …


Toward Taping, Christopher Slobogin Jan 2003

Toward Taping, Christopher Slobogin

Vanderbilt Law School Faculty Publications

Numerous authors, from all points on the political spectrum, have advocated that police interrogations be taped. But police rarely record custodial questioning, at least in full, and only a handful of courts have found this failure objectionable. This commentary outlines three different constitutional grounds for mandating that such recording become a routine practice. To set up the constitutional argument, the article first outlines why taping is needed despite the elaborate rules that now govern interrogation. Put simply, the reasoning is as follows: the Miranda regime has failed, voluntariness should once again be the focal point of interrogation regulation, and taping …


4th Annual Computer & Technology Law Institute, Office Of Continuing Legal Education At The University Of Kentucky College Of Law Nov 2002

4th Annual Computer & Technology Law Institute, Office Of Continuing Legal Education At The University Of Kentucky College Of Law

Continuing Legal Education Materials

Materials from the 4th Annual Computer & Technology Law Institute held by UK/CLE in November 2002.


Sneak And Peak Search Warrants, Donald E. Wilkes Jr. Sep 2002

Sneak And Peak Search Warrants, Donald E. Wilkes Jr.

Popular Media

In his recent article "Taking Liberty with Freedom," author Richard P. Moore reminds us that the USA Patriot Act, signed by President Bush last Oct. 26 in the wake of the Sept. 11 terrorist attacks, "gives the government the kind of sweeping powers of arrest, detention, surveillance, investigation, deportation, and search and seizure that ... assault ... our most basic freedoms."

I want to examine here a single section of the USA Patriot Act--section 213, definitely one of the most sinister provisions of this monstrous statute.


Political Surveillance And The Fourth Amendment, Alan Meisel Jan 1973

Political Surveillance And The Fourth Amendment, Alan Meisel

Articles

The United States District Court case has left the scope of the warrant protection of the fourth amendment considerably clearer and broader. The door left ajar in Katz has been firmly fastened shut by the Court leaving only the traditional exceptions to the warrant requirement, which are based upon practical necessity, and the still unconfronted question of the power of the executive to conduct warrantless surveillances of foreign agents in national security cases." It is also clear that courts are no less competent to evaluate the appropriateness of a search and seizure in an internal security case than in a …