Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Privacy Law

Social Justice And Silicon Valley: A Perspective On The Apple-Fbi Case And The “Going Dark” Debate, Charles J. Dunlap Jr. Jan 2017

Social Justice And Silicon Valley: A Perspective On The Apple-Fbi Case And The “Going Dark” Debate, Charles J. Dunlap Jr.

Faculty Scholarship

No abstract provided.


Privacy-Privacy Tradeoffs, David E. Pozen Jan 2016

Privacy-Privacy Tradeoffs, David E. Pozen

Faculty Scholarship

Legal and policy debates about privacy revolve around conflicts between privacy and other goods. But privacy also conflicts with itself. Whenever securing privacy on one margin compromises privacy on another margin, a privacy-privacy tradeoff arises.

This Essay introduces the phenomenon of privacy-privacy tradeoffs, with particular attention to their role in NSA surveillance. After explaining why these tradeoffs are pervasive in modern society and developing a typology, the Essay shows that many of the arguments made by the NSA's defenders appeal not only to a national-security need but also to a privacy-privacy tradeoff. An appreciation of these tradeoffs, the Essay contends, …


Tightrope Act, Charles J. Dunlap Jr. Jan 2015

Tightrope Act, Charles J. Dunlap Jr.

Faculty Scholarship

No abstract provided.


When The Curtain Must Be Drawn: American Experience With Proceedings Involving Information That, For Reasons Of National Security, Cannot Be Disclosed, Peter L. Strauss Jan 2015

When The Curtain Must Be Drawn: American Experience With Proceedings Involving Information That, For Reasons Of National Security, Cannot Be Disclosed, Peter L. Strauss

Faculty Scholarship

In numerous contexts today, ranging from no-fly lists, to the designation of foreign terrorist organizations, to controls over foreign investments in the United States, federal authorities reach decisions having dramatic consequences for individuals’ liberty and property on the basis of information that those individuals cannot obtain, even in summary form. Recent and pending litigation has challenged these deprivations on due process grounds, with only moderate success. Perhaps unclassified information on which the government has acted must be revealed, with an opportunity given to challenge it and to submit contrary evidence; but in the words of the DC Circuit writing last …


A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, David C. Gray, Danielle Keats Citron Jan 2013

A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, David C. Gray, Danielle Keats Citron

Faculty Scholarship

On January 23, 2012, the Supreme Court issued a landmark non-decision in United States v. Jones. In that case, officers used a GPS-enabled device to track a suspect’s public movements for four weeks, amassing a considerable amount of data in the process. Although ultimately resolved on narrow grounds, five Justices joined concurring opinions in Jones expressing sympathy for some version of the “mosaic theory” of Fourth Amendment privacy. This theory holds that we maintain reasonable expectations of privacy in certain quantities of information even if we do not have such expectations in the constituent parts. This Article examines and …


Biometric Id Cybersurveillance, Margaret Hu Jan 2013

Biometric Id Cybersurveillance, Margaret Hu

Faculty Scholarship

The implementation of a universal digitalized biometric ID system risks normalizing and integrating mass cybersurveillance into the daily lives of ordinary citizens. ID documents such as driver’s licenses in some states and all U.S. passports are now implanted with radio frequency identification (RFID) technology. In recent proposals, Congress has considered implementing a digitalized biometric identification card—such as a biometric-based, “high-tech” Social Security Card—which may eventually lead to the development of a universal multimodal biometric database (e.g., the collection of the digital photos, fingerprints, iris scans, and/or DNA of all citizens and noncitizens). Such “hightech” IDs, once merged with GPS-RFID tracking …


Global Governance In The Information Age: The Terrorist Finance Tracking Program, Hannah Bloch-Wehba Jan 2013

Global Governance In The Information Age: The Terrorist Finance Tracking Program, Hannah Bloch-Wehba

Faculty Scholarship

Europe has long been deemed "more protective" of privacy than the United States. In the context of transatlantic cooperation in the war on terrorism, divergences in privacy law and policy have become ever more apparent. As has always been the case, the same technologies that pose new and vital privacy issues with regard to personal information and private data are those that are important sources for government actors, including law enforcement and intelligence agencies. Despite the increasing reliance by national agencies on information flowing from other nations, regulation of information transfer, processing and sharing has been achieved largely outside of …


Network Accountability For The Domestic Intelligence Apparatus, Frank Pasquale, Danielle Keats Citron Jan 2011

Network Accountability For The Domestic Intelligence Apparatus, Frank Pasquale, Danielle Keats Citron

Faculty Scholarship

No abstract provided.