Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Privacy (2)
- Privacy law (2)
- Technology (2)
- Aggregate data (1)
- Big data (1)
-
- Biometric psychography (1)
- Composition (1)
- Data backpacks (1)
- Data mining (1)
- Differential privacy (1)
- Federal and state regulation (1)
- Federal courts (1)
- Human rights (1)
- Immersive technology (1)
- Managing privacy risk (1)
- Privacy protection (1)
- Property (1)
- Public policy (1)
- Secondary data (1)
- Security (1)
- State courts (1)
- Tech privacy (1)
- Technology in the courtroom (1)
- Technology law (1)
Articles 1 - 7 of 7
Full-Text Articles in Privacy Law
Watching Androids Dream Of Electric Sheep: Immersive Technology, Biometric Psychography, And The Law, Brittan Heller
Watching Androids Dream Of Electric Sheep: Immersive Technology, Biometric Psychography, And The Law, Brittan Heller
Vanderbilt Journal of Entertainment & Technology Law
Virtual reality and augmented reality present exceedingly complex privacy issues because of the enhanced user experience and reality-based models. Unlike the issues presented by traditional gaming and social media, immersive technology poses inherent risks, which our legal understanding of biometrics and online harassment is simply not prepared to address. This Article offers five important contributions to this emerging space. It begins by introducing a new area of legal and policy inquiry raised by immersive technology called “biometric psychography.” Second, it explains how immersive technology works to a legal audience and defines concepts that are essential to understanding the risks that …
The Law Of The Tetrapods, Henry T. Greely
The Law Of The Tetrapods, Henry T. Greely
Vanderbilt Journal of Entertainment & Technology Law
Should there be such a thing as "Technology Law"? This Article explores that question in two ways. It first looks at four substantive issues that appear across many different areas of technology law: privacy, security, property, and responsibility. It then examines five questions that frequently recur about how to regulate very different new technologies. These questions include which agency should regulate, whether regulation should focus on before or after marketing, what jurisdiction should regulate, how relevant new information will be gained and used, and how-politically-good regulation can be enacted. This Article concludes that it may make sense to develop a …
The States Have Spoken: Allow Expanded Media Coverage Of The Federal Courts, Mitchell T. Galloway
The States Have Spoken: Allow Expanded Media Coverage Of The Federal Courts, Mitchell T. Galloway
Vanderbilt Journal of Entertainment & Technology Law
Since the advent of film and video recording, society has enjoyed the ability to capture the lights and sounds of moments in history. This innovation left courts to determine what place, if any, such technology should have inside the courtroom. Refusing to constrain the future capacity of this technology, the Supreme Court "punted" on this issue until a time when this technology evolved past its initial disruptive nature. Throughout the past forty-five years, the vast majority of state courts have embraced the potential of cameras in the courtroom and have created policies governing such use. In contrast, the federal judiciary …
Differential Privacy: A Primer For A Non-Technical Audience, Alexandra Wood, Micah Altman, Aaron Bembenek, Mark Bun, Marco Gaboardi, James Honaker, Kobbi Nissim, David R. O'Brien, Thomas Steinke, Salil Vadhan
Differential Privacy: A Primer For A Non-Technical Audience, Alexandra Wood, Micah Altman, Aaron Bembenek, Mark Bun, Marco Gaboardi, James Honaker, Kobbi Nissim, David R. O'Brien, Thomas Steinke, Salil Vadhan
Vanderbilt Journal of Entertainment & Technology Law
Differential privacy is a formal mathematical framework for quantifying and managing privacy risks. It provides provable privacy protection against a wide range of potential attacks, including those currently unforeseen. Differential privacy is primarily studied in the context of the collection, analysis, and release of aggregate statistics. These range from simple statistical estimations, such as averages, to machine learning. Tools for differentially private analysis are now in early stages of implementation and use across a variety of academic,industry, and government settings. Interest in the concept is growing among potential users of the tools, as well as within legal and policy communities, …
Secondary Data: A Primary Concern, Kelsey L. Zottnick
Secondary Data: A Primary Concern, Kelsey L. Zottnick
Vanderbilt Journal of Entertainment & Technology Law
This Note addresses privacy concerns implicated by rising secondary data mining. Secondary data mining is the use of personal information for a purpose other than the original. This complex technology drives billions of dollars in commercial industry yet remains largely unregulated. This Note examines the current state of the data mining industry and the behavioral fallacies that belie societal concerns about online privacy. Further, relevant federal, state, and constitutional laws appear outstripped by these technological advances. An analysis of potential privacy solutions examines the advantages and disadvantages of implementing each one through the privacy community, the federal government, and the …
Who Is Reading Whom Now: Privacy In Education From Books To Moocs, Jules Polonetsky, Omer Tene
Who Is Reading Whom Now: Privacy In Education From Books To Moocs, Jules Polonetsky, Omer Tene
Vanderbilt Journal of Entertainment & Technology Law
This Article is the most comprehensive study to date of the policy issues and privacy concerns arising from the surge of ed tech innovation. It surveys the burgeoning market of ed tech solutions, which range from free Android and iPhone apps to comprehensive learning management systems and digitized curricula delivered via the Internet. It discusses the deployment of big data analytics by education institutions to enhance student performance, evaluate teachers, improve education techniques, customize programs, and better leverage scarce resources to optimize education results.
This Article seeks to untangle ed tech privacy concerns from the broader policy debates surrounding standardization, …
A Traitor In Our Midst: Is It Your Tivo?, Teresa W. Chan
A Traitor In Our Midst: Is It Your Tivo?, Teresa W. Chan
Vanderbilt Journal of Entertainment & Technology Law
Part I of this Note provides a backdrop of the different aspects of privacy law, focusing on the federal statutory schemes that are applicable to the issue of information gathering and the different possible uses of that information as a violation of privacy rights that have appeared in similar technology cases up to this point in time. This section will also focus on the capabilities of TiVo in more depth.
Part II of the Note examines both of TiVo's questionable actions: first, whether gathering information to sell to advertisers and networks in the form of aggregate data violates privacy rights; …