Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 21 of 21

Full-Text Articles in Privacy Law

Is It Time For A Universal Genetic Forensic Database?, Christopher Slobogin, Ellen Wright Clayton, J. W. Hazel, B. A. Malin Mar 2019

Is It Time For A Universal Genetic Forensic Database?, Christopher Slobogin, Ellen Wright Clayton, J. W. Hazel, B. A. Malin

Christopher Slobogin

The ethical objections to mandating forensic profiling of newborns and/or compelling every citizen or visitor to submit to a buccal swab or to spit in a cup when they have done nothing wrong are not trivial. But newborns are already subject to compulsory medical screening, and people coming from foreign countries to the United States already submit to fingerprinting. It is also worth noting that concerns about coercion or invasions of privacy did not give pause to legislatures (or, for that matter, even the European Court) when authorizing compelled DNA sampling from arrestees, who should not forfeit genetic privacy interests …


Is It Time For A Universal Genetic Forensic Database?, Christopher Slobogin, Ellen Wright Clayton, J. W. Hazel, B. A. Malin Mar 2019

Is It Time For A Universal Genetic Forensic Database?, Christopher Slobogin, Ellen Wright Clayton, J. W. Hazel, B. A. Malin

Ellen Wright Clayton

The ethical objections to mandating forensic profiling of newborns and/or compelling every citizen or visitor to submit to a buccal swab or to spit in a cup when they have done nothing wrong are not trivial. But newborns are already subject to compulsory medical screening, and people coming from foreign countries to the United States already submit to fingerprinting. It is also worth noting that concerns about coercion or invasions of privacy did not give pause to legislatures (or, for that matter, even the European Court) when authorizing compelled DNA sampling from arrestees, who should not forfeit genetic privacy interests …


Testimony On Unmanned Aircraft Systems Rules And Regulations, Stephen E. Henderson Sep 2016

Testimony On Unmanned Aircraft Systems Rules And Regulations, Stephen E. Henderson

Stephen E Henderson

Chairman Barrington, Vice Chair Brooks, members of the Committee on Public Safety, Senators, and distinguished guests, I am grateful for the opportunity to speak to you today about unmanned aerial systems, or drones, and more particularly about their federal constitutional implications and what might be the constitutional restrictions on any legislation you might like to enact. I am the Judge Haskell A. Holloman Professor of Law at the University of Oklahoma, where my teaching and research focus on criminal law and procedure and privacy, including the constitutional rights pertaining thereto.

My topic is not an easy one. The constitutional law …


If You Fly A Drone, So Can Police, Stephen E. Henderson May 2016

If You Fly A Drone, So Can Police, Stephen E. Henderson

Stephen E Henderson


According to the U.S. Constitution, the more you fly your drone, the more police can fly theirs. “Come on,” you might reply, “that hoary document”—and, yes, sorry to make you the sort who drops words like hoary—“that hoary document surely says nothing about drones.” But in fact it does. At least it does as interpreted by the courts. In particular, it is how they interpret the Fourth Amendment. So, to understand this aspect of drones, we first must understand this provision of the Bill of Rights...


Ou Professor: Fourth Amendment At Heart Of Dispute Between Fbi, Apple, Stephen E. Henderson Mar 2016

Ou Professor: Fourth Amendment At Heart Of Dispute Between Fbi, Apple, Stephen E. Henderson

Stephen E Henderson

The dispute between the FBI and Apple Inc. over the unlocking of the iPhone used by one of the San Bernadino shooters is important to all Americans. And so it's good that it is getting a wide airing. But when it comes to issues that have complicated tradeoffs, it can be important not just that we have the conversation, but that we use the right words. And here the debate deserves very mixed reviews. . . .


Copyrights, Privacy, And The Blockchain, Tom W. Bell Dec 2015

Copyrights, Privacy, And The Blockchain, Tom W. Bell

Tom W. Bell

The law of the United States forces authors to choose between copyrights and privacy rights. Federal lawmakers have noticed and tried to remedy that problem. The Copyright Act makes express provisions for anonymous and pseudonymous works. The Copyright Office has tried to remedy that tension, too; copyright registration forms do not outwardly require authors to reveal their real world identities. Nonetheless, authors still face a choice between protecting their privacy and enjoying one of copyright’s most powerful incentives: the prospect of transferring to another the exclusive right to use a copyrighted work. That power proves useful, to say the least, …


A Rose By Any Other Name: Regulating Law Enforcement Bulk Metadata Collection, Stephen E. Henderson Dec 2015

A Rose By Any Other Name: Regulating Law Enforcement Bulk Metadata Collection, Stephen E. Henderson

Stephen E Henderson

In Other People’s Papers, Jane Bambauer argues for careful reform of the Fourth Amendment’s third party doctrine, providing an important contribution to an increasingly rich field of scholarship, judicial opinion, statute, and law reform.  Bambauer is especially concerned with access to bodies of third-party data that can be filtered and mined, as they can be privacy invasive but also effective and less subject to traditional investigative prejudices and limitations.  Although her article provocatively overclaims in trying to set itself apart from existing proposals, by analyzing existing constitutional and statutory law—including what I have termed a “limited” third party doctrine—and comparing …


Fourth Amendment Time Machines (And What They Might Say About Police Body Cameras), Stephen E. Henderson Dec 2015

Fourth Amendment Time Machines (And What They Might Say About Police Body Cameras), Stephen E. Henderson

Stephen E Henderson

When it comes to criminal investigation, time travel is increasingly possible.  Despite longstanding roots in traditional investigation, science is today providing something fundamentally different in the form of remarkably complete digital records.  And those big data records not only store our past, but thanks to data mining they are in many circumstances eerily good at predicting our future.  So, now that we stand on the threshold of investigatory time travel, how should the Fourth Amendment and legislation respond?  How should we approach bulk government capture, such as by a solar-powered drone employing wide-area persistent stare technology?  Is it meaningfully different …


The Greening Of Canadian Cyber Laws: What Environmental Law Can Teach And Cyber Law Can Learn, Sara Smyth Aug 2015

The Greening Of Canadian Cyber Laws: What Environmental Law Can Teach And Cyber Law Can Learn, Sara Smyth

Sara Smyth

This article examines whether Canadian environmental law and policy could serve as a model for cyber crime regulation. A wide variety of offences are now committed through digital technologies, including thievery, identity theft, fraud, the misdirection of communications, intellectual property theft, espionage, system disruption, the destruction of data, money laundering, hacktivism, and terrorism, among others. The focus of this Article is on the problem of data security breaches, which target businesses and consumers. Following the Introduction, Part I provides an overview of the parallels that can be drawn between threats in the natural environment and on the Internet. Both disciplines …


Digital Peepholes | Remote Activation Of Webcams: Technology, Law And Policy, Lori Andrews Dec 2014

Digital Peepholes | Remote Activation Of Webcams: Technology, Law And Policy, Lori Andrews

Lori B. Andrews

A comprehensive report concerning the many ways that webcams can be used against those who possess them. Digital Peepholes also provides in depth legal analysis of the legality of private companies and the government using people’s webcams to spy on them. A must read for anyone concerned with privacy or anyone with a webcam built in to their devices!


When Enough Is Enough: Location Tracking, Mosaic Theory, And Machine Learning, Steven M. Bellovin, Renée M. Hutchins, Tony Jebara, Sebastian Zimmeck Feb 2014

When Enough Is Enough: Location Tracking, Mosaic Theory, And Machine Learning, Steven M. Bellovin, Renée M. Hutchins, Tony Jebara, Sebastian Zimmeck

Renée M. Hutchins

Since 1967, when it decided Katz v. United States, the Supreme Court has tied the right to be free of unwanted government scrutiny to the concept of reasonable xpectations of privacy.[1] An evaluation of reasonable expectations depends, among other factors, upon an assessment of the intrusiveness of government action. When making such assessment historically the Court has considered police conduct with clear temporal, geographic, or substantive limits. However, in an era where new technologies permit the storage and compilation of vast amounts of personal data, things are becoming more complicated. A school of thought known as “mosaic theory” has stepped …


Katz On A Hot Tin Roof: The Reasonable Expectation Of Privacy Is Rudderless In The Digital Age Unless Congress Continually Resets The Privacy Bar, Charles E. Maclean Jan 2014

Katz On A Hot Tin Roof: The Reasonable Expectation Of Privacy Is Rudderless In The Digital Age Unless Congress Continually Resets The Privacy Bar, Charles E. Maclean

Charles E. MacLean

The Katz reasonable expectation of privacy doctrine has lasting relevance in the digital age, but that relevance must be carefully and clearly guided in great detail by Congressional and state legislative enactments continually resetting the privacy bar as technology advances. In that way, the Katz “reasonableness” requirements are actually set by the legislative branch, thereby precluding courts from applying inapposite analogies to phone booths, cigarette packs, and business records. Once legislation provides the new contours of digital privacy, those legislative contours become the new “reasonable.”

This article calls upon Congress, and to a lesser extent, state legislatures, to control that …


Our Records Panopticon And The American Bar Association Standards For Criminal Justice, Stephen E. Henderson Dec 2013

Our Records Panopticon And The American Bar Association Standards For Criminal Justice, Stephen E. Henderson

Stephen E Henderson

"Secrets are lies. Sharing is caring. Privacy is theft." So concludes the main character in Dave Egger’s novel The Circle, in which a single company that unites Google, Facebook, and Twitter – and on steroids – has the ambition not only to know, but also to share, all of the world's information. It is telling that a current dystopian novel features not the government in the first instance, but instead a private third party that, through no act of overt coercion, knows so much about us. This is indeed the greatest risk to privacy in our day, both the unprecedented …


Do-Not-Track As Default, Joshua A.T. Fairfield Sep 2013

Do-Not-Track As Default, Joshua A.T. Fairfield

Joshua A.T. Fairfield

Do-Not-Track is a developing online legal and technological standard that permits consumers to express their desire not to be tracked by online advertisers. Do-Not-Track has the ability to change the relationship between consumers and advertisers in the information market. Everything will depend on implementation. The most effective way to allow users to achieve their privacy preferences is to implement Do-Not-Track as a default feature. The World Wide Web Consortium’s (W3C) standard setting body for Do-Not-Track has, however, endorsed a corrosive standard in its Tracking Preferences Expression (TPE) draft. This standard requires consumers to set their privacy preference by hand. This …


Cracks In The Foundation: The New Internet Regulation's Hidden Threat To Privacy And Commerce, Joshua A.T. Fairfield Sep 2013

Cracks In The Foundation: The New Internet Regulation's Hidden Threat To Privacy And Commerce, Joshua A.T. Fairfield

Joshua A.T. Fairfield

Scholarship to date has focused on the legal significance of the novelty of the Internet. This scholarship does not describe or predict actual Internet legislation. Instead of asking whether the Internet is so new as to merit new law, legislators and academics should re-evaluate the role of government in orchestrating collective action and change the relative weight of enforcement, deterrence, and incentives in Internet regulations. A perfect example of the need for this new approach is the recent CANSPAM Act of 2003, which was intended to protect personal privacy and legitimate businesses. However, the law threatens both of these interests, …


American Bar Association Criminal Justice Standards On Law Enforcement Access To Third Party Records, Stephen E. Henderson Dec 2012

American Bar Association Criminal Justice Standards On Law Enforcement Access To Third Party Records, Stephen E. Henderson

Stephen E Henderson

Drafted over the past six years and adopted by the American Bar Association (ABA) House of Delegates in February, 2012, these Criminal Justice Standards on Law Enforcement Access to Third Party Records provide much needed guidance to legislatures, courts, and administrative agencies having to decide how to regulate law enforcement access to existing records in the hands of third parties. It is the first framework of its kind, and it can do much to improve the current system of ad hoc protections in both state and federal systems. Decision makers are struggling to determine when to permit law enforcement access …


Expectations Of Privacy In Social Media, Stephen E. Henderson Dec 2011

Expectations Of Privacy In Social Media, Stephen E. Henderson

Stephen E Henderson

This article, which largely tracks my remarks at Mississippi College’s Social Media Symposium, examines expectations of privacy in social media such as weblogs (blogs), Facebook pages, and Twitter tweets. Social media is diverse and ever-diversifying, and while I address some of that complexity, I focus on the core functionality, which provides the groundwork for further conversation as the technology and related social norms develop. As one would expect, just as with our offline communications and other online communications, in some we have an expectation of privacy that is recognized by current law, in some we have an expectation of privacy …


The Timely Demise Of The Fourth Amendment Third Party Doctrine, Stephen E. Henderson Dec 2010

The Timely Demise Of The Fourth Amendment Third Party Doctrine, Stephen E. Henderson

Stephen E Henderson

In what may be a slightly premature obituary, in this response to a forthcoming paper by Matthew Tokson I argue that the Fourth Amendment third party doctrine "has at least taken ill, and it can be hoped it is an illness from which it will never recover." It is increasingly unpopular as a matter of state constitutional law, has long been assailed in scholarship but now thoughtful alternatives are percolating, and it cannot – or at least should not – withstand the pressures which technology and social norms are placing upon it. Even the Supreme Court seems loath to defend …


Preserving Identities: Protecting Personal Identifying Information Through Enhanced Privacy Policies And Laws, Robert Sprague, Corey Ciocchetti Dec 2008

Preserving Identities: Protecting Personal Identifying Information Through Enhanced Privacy Policies And Laws, Robert Sprague, Corey Ciocchetti

Robert Sprague

This article explores the developing phenomenon of the ongoing collection and dissemination of personal identifying information (PII): first, explaining the nature and form of PII, including the consequences of its collection; second, exploring one of the greatest threats associated with data collection - unauthorized disclosure due to data breaches, including an overview of state and federal legislative reactions to the threats of data breaches and identity theft; third, discussing common law and constitutional privacy protections regarding the collection of personal information, revealing that United States privacy laws provide very little protection to individuals; and fourth, examining current practices by online …


The Technology Of Surveillance: Will The Supreme Court's Expectations Ever Resemble Society's?, Stephen E. Henderson Dec 2006

The Technology Of Surveillance: Will The Supreme Court's Expectations Ever Resemble Society's?, Stephen E. Henderson

Stephen E Henderson

For law students studying criminal procedure—or at least for those cramming for the exam—it becomes a mantra: government conduct only implicates the Fourth Amendment protection against unreasonable searches if it invades a “reasonable expectation of privacy.” This is not the contemporary definition of the word “search,” nor was it the definition at the time of the founding. But, via a well-intentioned concurrence by Justice Harlan in the famous 1967 case of Katz v. United States, it became the Court’s definition.
This lack of fealty to the English language left some questions. For example, is determining whether someone has a “reasonable …


Beyond The (Current) Fourth Amendment: Protecting Third-Party Information, Third Parties, And The Rest Of Us Too, Stephen E. Henderson Dec 2006

Beyond The (Current) Fourth Amendment: Protecting Third-Party Information, Third Parties, And The Rest Of Us Too, Stephen E. Henderson

Stephen E Henderson

For at least thirty years the Supreme Court has adhered to its third-party doctrine in interpreting the Fourth Amendment, meaning that so far as a disclosing party is concerned, information in the hands of a third party receives no Fourth Amendment protection. The doctrine was controversial when adopted, has been the target of sustained criticism, and is the predominant reason that the Katz revolution has not been the revolution many hoped it would be. Some forty years after Katz the Court's search jurisprudence largely remains tied to property conceptions. As I have demonstrated elsewhere, however, the doctrine is not the …