Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Privacy (3)
- Data brokers (2)
- Agnotology (1)
- Amazon (1)
- Anti-surveillance strategy (1)
-
- Apple (1)
- Baltimore (1)
- Banks (1)
- Biobanks—Law and legislation (1)
- Black box society (1)
- Cell phone cameras (1)
- Citibank (1)
- Commercial speech (1)
- Countersurveillance (1)
- Cyber-security (1)
- Data Privacy (1)
- Data justice (1)
- Defunding police (1)
- Facebook (1)
- Facial recognition (1)
- Fiduciary law (1)
- Fiduciary relationships (1)
- Finance (1)
- Financial Regulation (1)
- Fintech (1)
- First Amendment (1)
- Fourth amendment (1)
- Freddie Gray (1)
- Genomics (1)
- Goldman (1)
Articles 1 - 9 of 9
Full-Text Articles in Privacy Law
The Automated Fourth Amendment, Maneka Sinha
The Automated Fourth Amendment, Maneka Sinha
Faculty Scholarship
Courts routinely defer to police officer judgments in reasonable suspicion and probable cause determinations. Increasingly, though, police officers outsource these threshold judgments to new forms of technology that purport to predict and detect crime and identify those responsible. These policing technologies automate core police determinations about whether crime is occurring and who is responsible. Criminal procedure doctrine has failed to insist on some level of scrutiny of—or skepticism about—the reliability of this technology. Through an original study analyzing numerous state and federal court opinions, this Article exposes the implications of law enforcement’s reliance on these practices given the weighty interests …
Data Autonomy, Cesare Fracassi, William Magnuson
Data Autonomy, Cesare Fracassi, William Magnuson
Faculty Scholarship
In recent years, “data privacy” has vaulted to the forefront of public attention. Scholars, policymakers, and the media have, nearly in unison, decried the lack of data privacy in the modern world. In response, they have put forth various proposals to remedy the situation, from the imposition of fiduciary obligations on technology platforms to the creation of rights to be forgotten for individuals. All these proposals, however, share one essential assumption: we must raise greater protective barriers around data. As a scholar of corporate finance and a scholar of corporate law, respectively, we find this assumption problematic. Data, after all, …
Race, Surveillance, Resistance, Chaz Arnett
Race, Surveillance, Resistance, Chaz Arnett
Faculty Scholarship
The increasing capability of surveillance technology in the hands of law enforcement is radically changing the power, size, and depth of the surveillance state. More daily activities are being captured and scrutinized, larger quantities of personal and biometric data are being extracted and analyzed, in what is becoming a deeply intensified and pervasive surveillance society. This reality is particularly troubling for Black communities, as they shoulder a disproportionate share of the burden and harm associated with these powerful surveillance measures, at a time when traditional mechanisms for accountability have grown weaker. These harms include the maintenance of legacies of state …
Interview On The Black Box Society, Lawrence Joseph, Frank A. Pasquale
Interview On The Black Box Society, Lawrence Joseph, Frank A. Pasquale
Faculty Scholarship
Hidden algorithms drive decisions at major Silicon Valley and Wall Street firms. Thanks to automation, those firms can approve credit, rank websites, and make myriad other decisions instantaneously. But what are the costs of their methods? And what exactly are they doing with their digital profiles of us?
Leaks, whistleblowers, and legal disputes have shed new light on corporate surveillance and the automated judgments it enables. Self-serving and reckless behavior is surprisingly common, and easy to hide in code protected by legal and real secrecy. Even after billions of dollars of fines have been levied, underfunded regulators may have only …
Privacy In Public, Joel R. Reidenberg
Privacy In Public, Joel R. Reidenberg
Faculty Scholarship
As government and private companies rapidly expand the infrastructure of surveillance from cameras on every street corner to facial recognition for photographs on social media sites, privacy doctrines built on seclusion are at odds with technological advances. This essay addresses a key conceptual problem in US privacy law identified by Justice Sotomayor in U.S. v. Jones and by Justice Scalia in Kyllo v. U.S.; namely that technological capabilities undermine the meaning of the third-party doctrine and the 4th Amendment's ‘reasonable expectation of privacy’ standard. The essay argues that the conceptual problem derives from the evolution of three stages of development …
Redefining Genomic Privacy: Trust And Empowerment, Yaniv Erlich, James B. Williams, David Glazer, Kenneth Yocum, Nita A. Farahany, Maynard Olson, Arvind Narayanan, Lincoln D. Stein, Jan A. Witkowski, Robert C. Kain
Redefining Genomic Privacy: Trust And Empowerment, Yaniv Erlich, James B. Williams, David Glazer, Kenneth Yocum, Nita A. Farahany, Maynard Olson, Arvind Narayanan, Lincoln D. Stein, Jan A. Witkowski, Robert C. Kain
Faculty Scholarship
Fulfilling the promise of the genetic revolution requires the analysis of large datasets containing information from thousands to millions of participants. However, sharing human genomic data requires protecting subjects from potential harm. Current models rely on de-identification techniques in which privacy versus data utility becomes a zero-sum game. Instead, we propose the use of trust-enabling techniques to create a solution in which researchers and participants both win. To do so we introduce three principles that facilitate trust in genetic research and outline one possible framework built upon those principles. Our hope is that such trust-centric frameworks provide a sustainable solution …
A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, David C. Gray, Danielle Keats Citron
A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, David C. Gray, Danielle Keats Citron
Faculty Scholarship
On January 23, 2012, the Supreme Court issued a landmark non-decision in United States v. Jones. In that case, officers used a GPS-enabled device to track a suspect’s public movements for four weeks, amassing a considerable amount of data in the process. Although ultimately resolved on narrow grounds, five Justices joined concurring opinions in Jones expressing sympathy for some version of the “mosaic theory” of Fourth Amendment privacy. This theory holds that we maintain reasonable expectations of privacy in certain quantities of information even if we do not have such expectations in the constituent parts. This Article examines and …
Fiduciary Law In The Twenty-First Century, Tamar Frankel
Fiduciary Law In The Twenty-First Century, Tamar Frankel
Faculty Scholarship
How does one embrace the riches of the knowledge presented in this Conference? This Conference’s participants have presented the fiduciary relationship from so many points of view: interdisciplinary perspectives, current issues, and particular fascinating narrower topics. Does this event suggest that critics are correct, and that fiduciary law as a category is incoherent?1 Arguably, fiduciary relationships and the rules that govern them are too varied. Yet I maintain that the variety presented in this Conference leads to the opposite conclusion, and that the papers in this Conference provide support for my claim: that fiduciary law should be viewed and understood …
Second Class For The Second Time: How The Commercial Speech Doctrine Stigmatizes Commercial Use Of Aggregated Public Records, Brian N. Larson, Genelle I. Belmas
Second Class For The Second Time: How The Commercial Speech Doctrine Stigmatizes Commercial Use Of Aggregated Public Records, Brian N. Larson, Genelle I. Belmas
Faculty Scholarship
This Article argues that access to aggregated electronic public records for commercial use should receive protection under the First Amendment in the same measure as the speech acts the access supports. In other words, we view commercial access to aggregated public records as an essential means to valuable speech. For many, however, the taint of the commercial speech doctrine is turning all “information flows” into commercial ones. This, in turn, is threatening the access to government records.