Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Privacy Law

Judge Pauley’S Opinion In Clapper: Reset Button For Bulk Collection Debate?, Peter Margulies Dec 2013

Judge Pauley’S Opinion In Clapper: Reset Button For Bulk Collection Debate?, Peter Margulies

Law Faculty Scholarship

This article was originally found in Lawfare, available here: https://www.lawfareblog.com/judge-pauleys-opinion-clapper-reset-button-bulk-collection-debate


Desperately Seeking Substance (Not Slogans) In Review Group Report On Nsa Surveillance, Peter Margulies Dec 2013

Desperately Seeking Substance (Not Slogans) In Review Group Report On Nsa Surveillance, Peter Margulies

Law Faculty Scholarship

No abstract provided.


A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, David C. Gray, Danielle Keats Citron Jan 2013

A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, David C. Gray, Danielle Keats Citron

Faculty Scholarship

On January 23, 2012, the Supreme Court issued a landmark non-decision in United States v. Jones. In that case, officers used a GPS-enabled device to track a suspect’s public movements for four weeks, amassing a considerable amount of data in the process. Although ultimately resolved on narrow grounds, five Justices joined concurring opinions in Jones expressing sympathy for some version of the “mosaic theory” of Fourth Amendment privacy. This theory holds that we maintain reasonable expectations of privacy in certain quantities of information even if we do not have such expectations in the constituent parts. This Article examines and …


Biometric Id Cybersurveillance, Margaret Hu Jan 2013

Biometric Id Cybersurveillance, Margaret Hu

Faculty Scholarship

The implementation of a universal digitalized biometric ID system risks normalizing and integrating mass cybersurveillance into the daily lives of ordinary citizens. ID documents such as driver’s licenses in some states and all U.S. passports are now implanted with radio frequency identification (RFID) technology. In recent proposals, Congress has considered implementing a digitalized biometric identification card—such as a biometric-based, “high-tech” Social Security Card—which may eventually lead to the development of a universal multimodal biometric database (e.g., the collection of the digital photos, fingerprints, iris scans, and/or DNA of all citizens and noncitizens). Such “hightech” IDs, once merged with GPS-RFID tracking …


Supra Synopses, Ryan W. Dumm, Laura Turczanski Jan 2013

Supra Synopses, Ryan W. Dumm, Laura Turczanski

Seattle University Law Review SUpra

No abstract provided.


Global Governance In The Information Age: The Terrorist Finance Tracking Program, Hannah Bloch-Wehba Jan 2013

Global Governance In The Information Age: The Terrorist Finance Tracking Program, Hannah Bloch-Wehba

Faculty Scholarship

Europe has long been deemed "more protective" of privacy than the United States. In the context of transatlantic cooperation in the war on terrorism, divergences in privacy law and policy have become ever more apparent. As has always been the case, the same technologies that pose new and vital privacy issues with regard to personal information and private data are those that are important sources for government actors, including law enforcement and intelligence agencies. Despite the increasing reliance by national agencies on information flowing from other nations, regulation of information transfer, processing and sharing has been achieved largely outside of …


Preserving Privacy In A Digital Age: Lessons Of Comparative Constitutionalism, David Cole Jan 2013

Preserving Privacy In A Digital Age: Lessons Of Comparative Constitutionalism, David Cole

Georgetown Law Faculty Publications and Other Works

In the modern age, we increasingly live our lives through, and accompanied by, digital media. Virtually every transaction or communication that uses such media, as well as every move of mobile phone owners, is recorded. Computers are able to store, transmit, and analyze the data as never before, drawing on multiple sources to construct an intimate picture of our interests, contacts, travels and desires. Private data-mining services, most often used for commercial advertising purposes, can determine: what we read, listen to, and look at; where we travel to, shop, and dine; and with whom we speak or associate. Meanwhile, social …