Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Privacy Law

How Different Are Young Adults From Older Adults When It Comes To Information Privacy Attitudes & Policies?, Chris Jay Hoofnagle, Jennifer King, Su Li, Joseph Turow Jan 2018

How Different Are Young Adults From Older Adults When It Comes To Information Privacy Attitudes & Policies?, Chris Jay Hoofnagle, Jennifer King, Su Li, Joseph Turow

Chris Jay Hoofnagle

Media reports teem with stories of young people posting salacious photos online, writing about alcohol-fueled misdeeds on social networking sites, and publicizing other ill-considered escapades that may haunt them in the future. These anecdotes are interpreted as representing a generation-wide shift in attitude toward information privacy. Many commentators therefore claim that young people “are less concerned with maintaining privacy than older people are.” Surprisingly, though, few empirical investigations have explored the privacy attitudes of young adults. This report is among the first quantitative studies evaluating young adults’ attitudes. It demonstrates that the picture is more nuanced than portrayed in the …


The Sidis Case And The Origins Of Modern Privacy Law, Samantha Barbas Nov 2017

The Sidis Case And The Origins Of Modern Privacy Law, Samantha Barbas

Samantha Barbas

The American press, it’s been said, is freer to invade personal privacy than perhaps any other in the world. The tort law of privacy, as a shield against unwanted media exposure of private life, is very weak. The usual reason given for the weakness of U.S. privacy law as a bar on the publication of private information is the strong tradition of First Amendment freedom. But “freedom of the press” alone cannot explain why liberty to publish has been interpreted as a right to print truly intimate matters or to thrust people into the spotlight against their will. Especially in …


Ispy: Threats To Individual And Institutional Privacy In The Digital World, Lori Andrews Apr 2017

Ispy: Threats To Individual And Institutional Privacy In The Digital World, Lori Andrews

Lori B. Andrews

What type of information is collected, who is viewing it, and what law librarians can do to protect their patrons and institutions.


Are They Worth Reading? An In-Depth Analysis Of Online Trackers’ Privacy Policies, Candice Hoke, Lorrie Faith Cranor, Pedro Giovanni Leon, Alyssa Au Dec 2015

Are They Worth Reading? An In-Depth Analysis Of Online Trackers’ Privacy Policies, Candice Hoke, Lorrie Faith Cranor, Pedro Giovanni Leon, Alyssa Au

Lorrie F Cranor

We analyzed the privacy policies of 75 online tracking companies with the goal of assessing whether they contain information relevant for users to make privacy decisions. We compared privacy policies from large companies, companies that are members of self-regulatory organizations, and nonmember companies and found that many of them are silent with regard to important consumer-relevant practices including the collection and use of sensitive information and linkage of tracking data with personally-identifiable information. We evaluated these policies against self-regulatory guidelines and found that many policies are not fully compliant. Furthermore, the overly general requirements established in those guidelines allow companies …


The Greening Of Canadian Cyber Laws: What Environmental Law Can Teach And Cyber Law Can Learn, Sara Smyth Aug 2015

The Greening Of Canadian Cyber Laws: What Environmental Law Can Teach And Cyber Law Can Learn, Sara Smyth

Sara Smyth

This article examines whether Canadian environmental law and policy could serve as a model for cyber crime regulation. A wide variety of offences are now committed through digital technologies, including thievery, identity theft, fraud, the misdirection of communications, intellectual property theft, espionage, system disruption, the destruction of data, money laundering, hacktivism, and terrorism, among others. The focus of this Article is on the problem of data security breaches, which target businesses and consumers. Following the Introduction, Part I provides an overview of the parallels that can be drawn between threats in the natural environment and on the Internet. Both disciplines …


Developing And Testing A Surveillance Impact Assessment Methodology, David Wright, Michael Friedewald, Raphael Gellert Jan 2015

Developing And Testing A Surveillance Impact Assessment Methodology, David Wright, Michael Friedewald, Raphael Gellert

Michael Friedewald

With the increasing pervasiveness of surveillance, from big companies such as Google and Facebook, as well as from the intelligence agencies, such as the US National Security Agency (NSA) and the UK Government Communications Headquarters (GCHQ), there is a clear need for a surveillance impact assessment (SIA), a method that addresses not only issues of privacy and data protection, but also ethical, social, economic, and political issues.

The SAPIENT project, funded by the European Commission, and undertaken by a consortium of partners from several European countries, aimed to develop an SIA methodology, based on stake- holder needs and a set …


Immigration Policing And Federalism Through The Lens Of Technology, Surveillance, And Privacy, Anil Kalhan Nov 2013

Immigration Policing And Federalism Through The Lens Of Technology, Surveillance, And Privacy, Anil Kalhan

Anil Kalhan

With the deployment of technology, federal programs to enlist state and local police assistance with immigration enforcement are undergoing a sea change. For example, even as it forcefully has urged invalidation of Arizona’s S.B. 1070 and similar state laws, the Obama administration has presided over the largest expansion of state and local immigration policing in U.S. history with its implementation of the “Secure Communities” program, which integrates immigration and criminal history database systems in order to automatically ascertain the immigration status of every individual who is arrested and booked by state and local police nationwide. By 2012, over one fifth …