Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Brooklyn Law School

Discipline
Keyword
Publication Year
Publication
Publication Type

Articles 1 - 30 of 81

Full-Text Articles in Privacy Law

My Body, Whose Choice? A Case For A Fundamental Right To Bodily Autonomy, Miri Trauner Mar 2024

My Body, Whose Choice? A Case For A Fundamental Right To Bodily Autonomy, Miri Trauner

Brooklyn Law Review

In 2022, the US Supreme Court decided Dobbs v. Jackson Women’s Health Organization, which overturned Roe v. Wade and the fundamental right to abortion it had established nearly fifty years prior. The Court’s decision threw into uncertainty the future of not only reproductive rights in this country, but also many other individual rights. At the same time as the decision, the world was still reeling from a global pandemic, and the development of COVID-19 vaccines had spurred widespread controversy over the constitutionality of vaccine mandates. Both advocates for abortion access and opponents to vaccine mandates shared a common cry: “my …


How (Not) To Deal With The Bubble Effect In Cyberspace: The Case Of The Eu And Digital Services Act, João Tornada Dec 2023

How (Not) To Deal With The Bubble Effect In Cyberspace: The Case Of The Eu And Digital Services Act, João Tornada

Brooklyn Journal of International Law

Deliberative democracies are based on an ideal process of speech and dialogue that fosters an “uninhibited, robust, and wide-open” public discourse sphere. In cyberspace, social networks and search engine platforms largely operate with recommender systems that tailor content according to the users' interests and online behavior (“profiling”), thus segregating them from different points of view (“bubble effect”). While this personalization of content is particularly efficient to promote commercial goods and services, when it comes to information of common interest, especially on political matters, it undermines consensus-building dialogue and threatens democratic ideals. The theory of a free “marketplace of ideas” justifies …


It's Finally Time For A National Data Privacy Law: A Discussion Of The American Data Privacy And Protection Act (Adppa), Erin J. An Dec 2023

It's Finally Time For A National Data Privacy Law: A Discussion Of The American Data Privacy And Protection Act (Adppa), Erin J. An

Brooklyn Journal of Corporate, Financial & Commercial Law

Millions of Americans face unprecedented privacy risks related to their data, often without their awareness. With the increasing value of consumer data and its growing utilization by businesses, there is a growing demand for greater transparency and privacy protections. As of 2023, no comprehensive federal law governs data privacy in the United States, leaving citizens with limited protections. Introduced to Congress on June 21, 2022, the American Data and Privacy Protection Act (ADPPA) successfully passed the House of Representatives Committee on Energy and Commerce, making it the furthest a national comprehensive data privacy bill has progressed through the federal legislative …


Deep Dive Into Deepfakes—Safeguarding Our Digital Identity, Yi Yan Aug 2023

Deep Dive Into Deepfakes—Safeguarding Our Digital Identity, Yi Yan

Brooklyn Journal of International Law

Deepfake technology is becoming increasingly sophisticated, and with it, the potential to pose a significant threat to the digital community, democratic institutions, and private individuals. With the creation of highly convincing but entirely fabricated audio, video, and images, there is a pressing need for the international community to address the vulnerabilities posed by deepfake technology in the current legal landscape through unambiguous legislation. This Note explores the ethical, legal, and social implications of deepfakes, including issues of privacy, identity theft, and political manipulation. It also reviews existing international legal frameworks, i.e., the Convention on Cybercrime (“Budapest Convention”) and proposes a …


Battling Baby Brokers: A Comparative Analysis Of The United States’ Versus Europe’S Adoption Policies, Amanda P. Gonzales Aug 2023

Battling Baby Brokers: A Comparative Analysis Of The United States’ Versus Europe’S Adoption Policies, Amanda P. Gonzales

Brooklyn Journal of International Law

Child adoption involves the permanent transfer of parental rights from a child’s biological or legal parents to another party. Parties in the Unites States (US) have engaged in this process in various forms for centuries. Today, over one hundred thousand children are adopted by American families each year. Many of these adoptions take place privately through agencies. An agency assists in the process of matching prospective adoptive parents with birth parents from whom they will adopt a child. In exchange for this assistance, the prospective adoptive parents pay tens of thousands of dollars in fees and expenses to the agency …


Policing The Police: Establishing The Right To Record And Civilian Oversight Boards To Oversee America’S Police, Michael G. Brewster Apr 2023

Policing The Police: Establishing The Right To Record And Civilian Oversight Boards To Oversee America’S Police, Michael G. Brewster

Brooklyn Law Review

Police misconduct is a persistent issue in the United States that undermines public trust in law enforcement and the criminal justice system as a whole. The video of George Floyd’s arrest and murder played an irreplaceable role in bringing attention to the case and sparking nationwide discussions about the state of policing in America. The video, showing former Minneapolis police officer Derek Chauvin kneeling on Mr. Floyd’s neck for several minutes, also helped convict Mr. Chauvin of murder at trial. Recording police activity is an important means of holding officers accountable for their actions and protecting citizens from abuse of …


Standing In The Ether: Constitutional Standing In Data Breach Cases After Mcmorris, Andrew Ridge Dec 2022

Standing In The Ether: Constitutional Standing In Data Breach Cases After Mcmorris, Andrew Ridge

Brooklyn Journal of Corporate, Financial & Commercial Law

For some time, circuit courts have been ostensibly divided over the power of plaintiffs to maintain claims for injuries sustained from data breaches based merely on an increased risk of injury. However, in McMorris v. Carlos Lopez & Assocs., LLC, 995 F.3d 295 (2d Cir. 2021), the Second Circuit denied the existence of the circuit split, instead contending that its three-factor balancing test for determining standing for risk of future injury in data breach cases could be reconciled with the positions of both clusters of circuits. The three factors are “(1) whether the plaintiffs’ data has been exposed as the …


Dna Dystopia: How The National Security Apparatus Could Map The Entire Genome Of America Without Violating The Fourth Amendment Or The Constitutional Right To Privacy, Elias Rios Iii May 2022

Dna Dystopia: How The National Security Apparatus Could Map The Entire Genome Of America Without Violating The Fourth Amendment Or The Constitutional Right To Privacy, Elias Rios Iii

Brooklyn Law Review

Over the past decade, scientific advances have allowed genetic testing to become accessible to consumers. Direct-to-consumer (DTC) DNA testing companies can analyze your DNA sample so you can learn about your family’s origins or whether you are genetically predisposed to a specific disease or disorder. Consumers can then send these analyzed files to third-party databases that aggregate genetic data for specific purposes, like helping law enforcement solve cold cases. Recently, the Department of Defense alerted servicemembers that DTC DNA tests were a national security threat. Simply put, when the national security apparatus finds a threat, it proactively seeks to neutralize …


The "Worst Law In Technology": How The Computer Fraud And Abuse Act Allows Big Businesses To Collect And Sell Your Personal Information, Alicia Nakhjavan Apr 2022

The "Worst Law In Technology": How The Computer Fraud And Abuse Act Allows Big Businesses To Collect And Sell Your Personal Information, Alicia Nakhjavan

Brooklyn Law Review

For years, big businesses have been collecting and selling users’ personal information without permission. In attempts at preventing this practice, users have brought civil actions under the Computer Fraud and Abuse Act (CFAA), alleging a loss of personal privacy. As currently enacted, “personal privacy” is not included in the statutory definition of loss. Further, courts have been reluctant to interpret the CFAA broadly to cover loss of personal privacy claims. This note proposes that an amendment to the CFAA is necessary to close this gap in the statute’s coverage and better protect users’ right to privacy.


The Gatekeepers Of Research: Why A Data Protection Authority Holds The Key To Research In The New York Privacy Acts, Eric B. Green Feb 2022

The Gatekeepers Of Research: Why A Data Protection Authority Holds The Key To Research In The New York Privacy Acts, Eric B. Green

Brooklyn Law Review

Biometric data is among the most sensitive of personal data because it is biologically tied and unique to the individual. Nonetheless, biometric data is an invaluable facet of the research that enables progressive scientific, technological, and medical innovation. Because a comprehensive federal data privacy act does not appear to be on the horizon, the torch has been passed to the states to create their own personal data protection regimes. New Yorkers’ personal biometric data is not aptly protected, partially because neither the New York Privacy Act nor the Biometric Privacy Act (collectively, the NY Privacy Acts) have matured to the …


From The Golden Gate To London: Bridging The Gap Between Data Privacy And The Right Of Publicity, Kristin Kuraishi Dec 2021

From The Golden Gate To London: Bridging The Gap Between Data Privacy And The Right Of Publicity, Kristin Kuraishi

Brooklyn Journal of International Law

Currently, there is no global standard or recognition for the right of publicity. Even within the United States, the recognition, scope, and protections vary by state. As the world becomes increasingly reliant on social media for news, information, communication, and recommendations, micro-influencers and non-celebrities require a way to control their developed and curated name, image, and likeness from unauthorized commercial uses by others. Advertising is occurring more frequently online, and brands recognize the power that micro-influencers have on commerce. Some countries, like the United Kingdom, do not recognize the right of publicity, potentially leaving many individuals without recourse for the …


Compulsory Dna Testing In Argentina: The Right To Truth Versus The Right To Privacy, Margaret Foster Dec 2021

Compulsory Dna Testing In Argentina: The Right To Truth Versus The Right To Privacy, Margaret Foster

Brooklyn Journal of International Law

During the Dirty War—a seven year repression by the Argentinian junta of political dissidents and alleged subversives—an estimated 500 babies were stolen from their mothers while imprisoned and given to leading military officials as "adopted" children. These children had their true identities erased and replaced with a false one covering up their true origins. This Note will explore Argentina's response to the Dirty War. Namely, it will consider the tension between the right to truth—an international right right often associated with enforced disappearances—and the right to privacy. In particular, it will consider cases in which adults resisted DNA testing to …


Digital Privacy Rights And Cloud Act Agreements, Tim Cochrane Dec 2021

Digital Privacy Rights And Cloud Act Agreements, Tim Cochrane

Brooklyn Journal of International Law

The United States (US) and United Kingdom (UK) will soon bring into force a new international law enforcement data sharing ‘CLOUD Act agreement’ (US-UK Agreement), the first of its kind under the Clarifying Lawful Overseas Use of Data Act 2018 (CLOUD Act). These agreements enable law enforcement in one state to directly request data from service providers based in the other state. They respond to long-standing concerns with the main mechanism for obtaining overseas data, mutual legal assistance (MLA). The US and UK claim the US-UK Agreement will significantly speed up data access relative to MLA while “respecting privacy and …


“More Than Tangential”: When Does The Public Have A Right To Access Judicial Records?, Jordan Elias Jun 2021

“More Than Tangential”: When Does The Public Have A Right To Access Judicial Records?, Jordan Elias

Journal of Law and Policy

 Public accountability requires open proceedings and access to documents filed with the courts. The strong policy favoring access to judicial records creates a presumption against sealing documents without a compelling reason.  The Ninth Circuit Court of Appeals recently held that this presumption of access arises when a proceeding relates “more than tangentially” to the merits. This is a low standard under which many types of motions qualify for the compelling reasons test.  With too much litigation occurring in secret, courts can use the “more than tangential” standard proactively to keep electronic case dockets available to citizens.


Data Governance And The Elasticity Of Sovereignty, Roxana Vatanparast Dec 2020

Data Governance And The Elasticity Of Sovereignty, Roxana Vatanparast

Brooklyn Journal of International Law

Traditionally, the world map and territorially bounded spaces have dominated the ways in which we imagine how states govern, make laws, and exercise their authority. Under this conception, reflected in traditional international law principles of territorial sovereignty, each state would have exclusive authority to govern and make laws over everything concerning the land within its borders. Yet developments like the proliferation of data flows, which are based on divisible, mobile, and interconnected components of data, are not territorially bounded. This presents a challenge to the traditional bases for territorial sovereignty and jurisdiction under international law, which some scholars claim is …


Easing The Burdens Of A Patchwork Approach To Data Privacy Regulation In Favor Of A Singular Comprehensive International Solution—The International Data Privacy Agreement, Scott Resnick Dec 2020

Easing The Burdens Of A Patchwork Approach To Data Privacy Regulation In Favor Of A Singular Comprehensive International Solution—The International Data Privacy Agreement, Scott Resnick

Brooklyn Journal of International Law

Data privacy has become one of the premier hot-button issues in today’s increasingly digital human experience. Legislatures around the globe have attempted to act swiftly in an effort to safeguard the highly coveted personal information of their citizens and combat misuse at the hands of international businesses operating with an online presence. Since the European Union’s enactment of the General Data Protection Regulation (GDPR) in 2018, countries around the globe have been grappling with how best to replicate the EU’s leading data privacy regulation while providing the same or greater level of transparency into data collection practices. While a mere …


The Criminal, Regulatory, And Civil Issues Surrounding Intellectual Property And Cybersecurity, Ernest Edward Badway, Christie Mcguinness Jun 2020

The Criminal, Regulatory, And Civil Issues Surrounding Intellectual Property And Cybersecurity, Ernest Edward Badway, Christie Mcguinness

Brooklyn Journal of Corporate, Financial & Commercial Law

Cyber-attacks have affected all organizations and individual consumers. Dissemination of relevant information and attention to strong information security practices is an important tool in fighting this cyber “pandemic.” Additionally, the legal and regulatory liability companies face from cyber-attacks as well as general strategies and practical solutions companies may implement to protect against cyber-intrusions and respond effectively in the event of an attack are considered. There are many iterations of cyber-crime, and we address the various methods cybercriminals use and the many ways cyber-attacks can take place, as well as the entities and victims affected. Moreover, the legal liability and regulatory …


The Common Law Of Cyber Trespass, Michael J. O'Connor Apr 2020

The Common Law Of Cyber Trespass, Michael J. O'Connor

Brooklyn Law Review

Right now, if executives in California and Virginia each bribe a competitor’s disloyal employee to steal a trade secret from the competitor’s servers, under the federal Computer Fraud and Abuse Act (CFAA), the Government can charge one executive but not the other. Courts decide these cases differently due to the widening circuit split over the CFAA term “without authorization.” Neither the Supreme Court nor Congress has shown interest in resolving the split over authorization. Even more concerning is the suggestion that they can’t resolve it; the statute addresses too many potential scenarios for a single definition to end all debate. …


Reconsidering Confidential Settlements In The #Metoo Era, Minna J. Kotkin Jan 2020

Reconsidering Confidential Settlements In The #Metoo Era, Minna J. Kotkin

Faculty Scholarship

No abstract provided.


The Clone Wars: The Right To Embryonic Gene Editing Under German Law, Keren Goldberger Dec 2019

The Clone Wars: The Right To Embryonic Gene Editing Under German Law, Keren Goldberger

Brooklyn Journal of International Law

Germany has the strictest genetic engineering laws in the world and bans virtually all kinds of embryonic gene editing. Since the invention of CRISPR, however, embryonic gene editing is more precise, and the possibilities of curing genetic diseases are more real than ever. This Note will argue for the right to embryonic gene editing through an analysis of German constitutional privacy and right to life jurisprudence. Ultimately, this Note argues for a right to procreate under German law that is backed by the state’s affirmative duty to encourage and protect life. When the technology is available, German Law should not …


“Hey Alexa, Do Consumers Really Want More Data Privacy?”: An Analysis Of The Negative Effects Of The General Data Protection Regulation, Katherine M. Wilcox Dec 2019

“Hey Alexa, Do Consumers Really Want More Data Privacy?”: An Analysis Of The Negative Effects Of The General Data Protection Regulation, Katherine M. Wilcox

Brooklyn Law Review

Recent news articles discuss the flooding of email inboxes with lengthy terms and condition updates, viral videos of Mark Zuckerberg’s public Cambridge Analytica hearing before Congress, and the phenomenon of internet advertisements appearing for items that consumers merely searched for on Google a day prior. Effective as of May 25, 2018, the European Union’s General Data Protection Regulation (GDPR) established a framework that sets legal standards targeted at businesses and other data collectors to dramatically increase data privacy protections for citizens of the EU. Consumers, however, do not seem to appreciate these increased protections, as they rarely read the updated …


Increasing Lapses In Data Security: The Need For A Common Answer To What Constitutes Standing In A Data Breach Context, Aaron Benjamin Edelman Dec 2019

Increasing Lapses In Data Security: The Need For A Common Answer To What Constitutes Standing In A Data Breach Context, Aaron Benjamin Edelman

Journal of Law and Policy

As the number of data breaches continues to rise in the United States, so does the amount of data breach litigation. Many potential plaintiffs who suffered as victims of data breaches, however, find themselves in limbo regarding the issue of standing before a court because of a significant split on standing determinations amongst the federal circuit courts. Thus, while victims of data breaches oftentimes have their personal information fall into the hands of nefarious characters who intend to use the information to a victim’s detriment, that may not be enough to provide victims a right to sue in federal court …


Protecting Health Information In Utero: A Radical Proposal, Luke Isaac Haqq Dec 2019

Protecting Health Information In Utero: A Radical Proposal, Luke Isaac Haqq

Journal of Law and Policy

This Article introduces an underappreciated space in which protected health information (“PHI”) remains largely unprotected, a fact that will become only more problematic as clinical medicine increasingly turns to genomics. The past decade has seen significant advances in the prevention of birth defects, especially with the introduction of clinical preconception, prenatal, and neonatal genomic sequencing. Parental access to the results of embryonic and fetal clinical sequencing is critical to reproductive autonomy; results can provide parents with important considerations in determining whether to seek or avoid conception, as well as in deciding whether to carry a pregnancy to term. The information …


The Long Road Back To Skokie: Returning The First Amendment To Mask Wearers, Rob Kahn Dec 2019

The Long Road Back To Skokie: Returning The First Amendment To Mask Wearers, Rob Kahn

Journal of Law and Policy

When the Seventh Circuit upheld the First Amendment right of Nazis to march in Skokie, Illinois in 1978, the protection of mask wearers was not far behind. Since then, doctrinal paths have diverged. While the Supreme Court continues to protect hate speech, mask wearing has been increasingly placed outside First Amendment protection. This article seeks to get to the bottom of this doctrinal divergence by addressing the symbolic purposes of mask bans—rooted in repudiating the Ku Klux Klan—as well as the doctrinal steps taken over the past forty years to restrict the First Amendment claims of mask wearers. It also …


The Need For A Shared Responsibility Regime Between State And Non-State Actors To Prevent Human Rights Violations Caused By Cyber-Surveillance Spyware, Anna W. Chan Jul 2019

The Need For A Shared Responsibility Regime Between State And Non-State Actors To Prevent Human Rights Violations Caused By Cyber-Surveillance Spyware, Anna W. Chan

Brooklyn Journal of International Law

Technology has undoubtedly contributed to the field of human rights. Internet connection and a smartphone has enabled activists to call out political leaders, shine light on human atrocities and organize mass protests through social media platforms. This has resulted in many authoritarian governments spending large amounts of their resources to purchase cyber-surveillance spyware systems from multi-national corporations to closely monitor and track their citizens for any signs of dissidence. Such technology has enabled authoritarian regimes to commit human right violations ranging from invasion of privacy, arbitrary arrest, arbitrary detention, torture and even murder. Despite the uncovering of such questionable transactions …


Comparative Analysis Of The Eu’S Gdpr And Brazil’S Lgpd: Enforcement Challenges With The Lgpd, Abigayle Erickson Jul 2019

Comparative Analysis Of The Eu’S Gdpr And Brazil’S Lgpd: Enforcement Challenges With The Lgpd, Abigayle Erickson

Brooklyn Journal of International Law

In the wake of the adoption of the European Union’s General Data Protection Regulation (GDPR) in May 2018, other countries and jurisdictions have contemplated personal data privacy legislation. In August 2018, the former president of Brazil, Michel Temer, signed the country’s comprehensive data privacy regulation, Lei Geral de Proteção de Dados Pessoais (LGPD), into law. Temer, however, vetoed many of the enforcement provisions. Shortly before leaving office, Temer signed an executive order creating a regulatory agency as the bill initially called for, but situated the agency under executive control instead of creating a wholly independent agency. This Note provides a …


Mugshots And The Press-Privacy Dilemma, Amy Gajda May 2019

Mugshots And The Press-Privacy Dilemma, Amy Gajda

Faculty Scholarship

No abstract provided.


Pay For (Privacy) Performance: Holding Social Network Executives Accountable For Breaches In Data Privacy Protection, Lital Helman Jan 2019

Pay For (Privacy) Performance: Holding Social Network Executives Accountable For Breaches In Data Privacy Protection, Lital Helman

Brooklyn Law Review

Social networking has proliferated over the past years and is now being utilized by a large percentage of the world’s population. Social networks substantially contribute to enhanced speech, creativity, and communication. Yet, their practices of collecting and monetizing personal data of users pose severe privacy risks. Compelling social networks to internalize these risks is crucial for the healthy evolution of social networking. This article proposes a novel approach to address this challenge: to link executive compensation in social networking firms to the quality of data protection the company provides to its users. This proposal is different from other solutions that …


Telemarketing, Technology, And The Regulation Of Private Speech: First Amendment Lessons From The Fcc’S Tcpa Rules, Justin (Gus) Hurwitz Oct 2018

Telemarketing, Technology, And The Regulation Of Private Speech: First Amendment Lessons From The Fcc’S Tcpa Rules, Justin (Gus) Hurwitz

Brooklyn Law Review

This article considers the viability of the Telephone Consumer Protection Act (TCPA) in light of recent Supreme Court First Amendment precedent and technological and regulatory developments. Robocalls—phone calls made using autodialers or prerecorded messages without the consent of the call recipient—have become one of the primary consumer protection issues facing regulators. With more than 2.4 billion of these calls placed each month, consumer concern about them dominate complaints received by both the Federal Communications Commission and Federal Trade Commission. Simultaneously, as cellphones have become a ubiquitous means by which individuals engage with one another and have become the public square, …


The Equifax Data Breach And The Resulting Legal Recourse, Caitlin Kenny Oct 2018

The Equifax Data Breach And The Resulting Legal Recourse, Caitlin Kenny

Brooklyn Journal of Corporate, Financial & Commercial Law

What happens when one’s sensitive information falls into the wrong hands? With the twenty-first century’s advancement of technology comes the increasing problem of data breaches wherein sensitive information is exposed. On September 7, 2017, Equifax, one of three major United States credit reporting agencies announced one of the largest data breaches in the history of the United States. The data breach affected approximately 145 million consumers and subsequently a wave of consumer class actions followed. This Note clarifies why class action lawsuits and arbitration are not viable legal remedies for massive data breaches where entities like credit reporting agencies are …