Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

New York Law School

Discipline
Keyword
Publication Year
Publication
Publication Type

Articles 1 - 30 of 54

Full-Text Articles in Privacy Law

United States V. Touset, Katelyn James Jan 2020

United States V. Touset, Katelyn James

NYLS Law Review

No abstract provided.


Cognitive Biases, Dark Patterns, And The ‘Privacy Paradox’, Ari Ezra Waldman Jan 2020

Cognitive Biases, Dark Patterns, And The ‘Privacy Paradox’, Ari Ezra Waldman

Articles & Chapters

Scholars and commentators often argue that individuals do not care about their privacy, and that users routinely trade privacy for convenience. This ignores the cognitive biases and design tactics platforms use to manipulate users into disclosing information. This essay highlights some of those cognitive biases – from hyperbolic discounting to the problem of overchoice – and discusses the ways in which platform design can manipulate disclosure. It then explains how current law allows this manipulative and anti-consumer behavior to continue and proposes a new approach to reign in the phenomenon.


Privacy's Law Of Design, Ari Ezra Waldman Jan 2019

Privacy's Law Of Design, Ari Ezra Waldman

Articles & Chapters

Privacy by design is about making privacy part of the conception and development of new data collection tools. But how should we interpret “privacy by design” as a legal mandate? As it transitions from an academic buzzword into binding law, privacy by design will, for the first time, impose real responsibilities on real people to do specific things at specific times. And yet, there remains significant disagreement about what privacy by design actually means in practice: we have yet to define its who, what, when, why, and how. Different approaches to privacy by design have tried to answer those questions …


Power, Process, And Automated Decision-Making, Ari Ezra Waldman Jan 2019

Power, Process, And Automated Decision-Making, Ari Ezra Waldman

Articles & Chapters

Many decisions that used to be made by humans are now made by machines. And yet, automated decision-making systems based on “big data” – powered algorithms and machine learning are just as prone to mistakes, biases, and arbitrariness as their human counterparts. The result is a technologically driven decision-making process that seems to defy interrogation, analysis, and accountability and, therefore, undermines due process. This should make algorithmic decision-making an illegitimate source of authority in a liberal democracy. This Essay argues that algorithmic decision-making is a product of the neoliberal project to undermine social values like equality, nondiscrimination, and human flourishing …


Safe Social Spaces, Ari Ezra Waldman Jan 2019

Safe Social Spaces, Ari Ezra Waldman

Articles & Chapters

Technologies that mediate social interaction can put our privacy and our safety at risk. Harassment, intimate partner violence and surveillance, data insecurity, and revenge porn are just a few of harms that bedevil technosocial spaces and their users, particularly users from marginalized communities. This Article seeks to identify the building blocks of safe social spaces, or environments in which individuals can be free of privacy and safety dangers. Relying on analogies to offline social spaces—Alcoholics Anonymous meetings, teams of coworkers, and attorney-client relationships—this Article argues that if a social space is defined as an environment characterized by disclosure, then a …


Privacy As Trust: Information Privacy For An Information Age (2018), Ari Ezra Waldman Jan 2018

Privacy As Trust: Information Privacy For An Information Age (2018), Ari Ezra Waldman

Books

It seems like there is no such thing as privacy anymore. But the truth is that privacy is in danger only because we think about it in narrow, limited, and outdated ways. In this transformative work, Ari Ezra Waldman, leveraging the notion that we share information with others in contexts of trust, offers a roadmap for data privacy that will better protect our information in a digitized world. With case studies involving websites, online harassment, intellectual property, and social robots, Waldman shows how 'privacy as trust' can be applied in the most challenging real-world contexts to make privacy work for …


Commodifying Consumer Data In The Era Of The Internet Of Things, Stacy-Ann Elvy Jan 2018

Commodifying Consumer Data In The Era Of The Internet Of Things, Stacy-Ann Elvy

Articles & Chapters

Internet of Things (“IOT”) products generate a wealth of data about consumers that was never before widely and easily accessible to companies. Examples include biometric and health-related data, such as fingerprint patterns, heart rates and calories burned. This Article explores the connection between the types of data generated by the IOT and the financial frameworks of Article 9 of the Uniform Commercial Code and the Bankruptcy Code. It critiques these regimes, which enable the commodification of consumer data, as well as laws aimed at protecting consumer data, such as the Bankruptcy Abuse Prevention and Consumer Protection Act, various state biometric …


Designing Without Privacy, Ari Ezra Waldman Jan 2018

Designing Without Privacy, Ari Ezra Waldman

Articles & Chapters

In Privacy on the Ground, the law and information scholars Kenneth Bamberger and Deirdre Mulligan showed that empowered chief privacy officers (CPOs) are pushing their companies to take consumer privacy seriously, integrating privacy into the designs of new technologies. But their work was just the beginning of a larger research agenda. CPOs may set policies at the top, but they alone cannot embed robust privacy norms into the corporate ethos, practice, and routine. As such, if we want the mobile apps, websites, robots, and smart devices we use to respect our privacy, we need to institutionalize privacy throughout the corporations …


What Authorizes The Image? The Visual Economy Of Post-Secular Jurisprudence, Richard Sherwin Jan 2018

What Authorizes The Image? The Visual Economy Of Post-Secular Jurisprudence, Richard Sherwin

Articles & Chapters

In law’s visual economy our commitment to justice grows out of a renewed encounter with an interior libidinal source whose ongoing collective investment binds us to the nomos in which we live. We experience this corporeal bond in paintings, films, and video images on screens large and small. In the ethically inflected aesthetic of post-secular jurisprudence, justice is to law as beauty is to art. As distant as an abstract expressionist canvas, as close as any neighbor, or indeed any screen on which the neighbor becomes real to us. That is where we behold the source and instantiation of law’s …


Privacy, Notice, And Design, Ari Ezra Waldman Jan 2018

Privacy, Notice, And Design, Ari Ezra Waldman

Articles & Chapters

Design configures our relationship with a space, whether offline or online. In particular, the design of built online environments can constrain our ability to understand and respond to websites’ data use practices or it can enhance agency by giving us control over information. Design, therefore, poses dangers and offers opportunity to protect privacy online. This Article is a comprehensive theoretical and empirical approach to the design of privacy policies.

Privacy notices today do not convey information in a way understandable to most internet users. This is because they are designed without the needs of real people in mind. They are …


Are Anti-Bullying Laws Effective?, Ari Ezra Waldman Jan 2018

Are Anti-Bullying Laws Effective?, Ari Ezra Waldman

Articles & Chapters

Since 2010, when several high profile bullying-related suicides brought bullying and cyberharassment into the national consciousness, all 50 states have passed laws that address bullying among the nation’s youth. This essay is the first in a series of three projects on federal, state, municipal, and individual school approaches to bullying. There are only 4 published studies on the relationships between law and bullying rates. This Essay adds several features to the discourse. It offers a comprehensive analysis of the contents of state anti-bullying laws, using a 16-item list of guidelines from the United States Department of Education as a frame. …


The Judicial Legacy Of Louis Brandeis And The Nature Of American Constitutionalism, Edward A. Purcell Jr. Jan 2017

The Judicial Legacy Of Louis Brandeis And The Nature Of American Constitutionalism, Edward A. Purcell Jr.

Articles & Chapters

No abstract provided.


Paying For Privacy And The Personal Data Economy, Stacy-Ann Elvy Jan 2017

Paying For Privacy And The Personal Data Economy, Stacy-Ann Elvy

Articles & Chapters

Growing demands for privacy and increases in the quantity and variety of consumer data have engendered various business offerings to allow companies, and in some instances consumers, to capitalize on these developments. One such example is the emerging “personal data economy” (PDE) in which companies, such as Datacoup, purchase data directly from individuals. At the opposite end of the spectrum, the “pay-for-privacy” (PFP) model requires consumers to pay an additional fee to prevent their data from being collected and mined for advertising purposes. This Article conducts a simultaneous in-depth exploration of the impact of burgeoning PDE and PFP models. It …


Trust: A Model For Disclosure In Patent Law, Ari Ezra Waldman Jan 2017

Trust: A Model For Disclosure In Patent Law, Ari Ezra Waldman

Articles & Chapters

How to draw the line between public and private is a foundational, first-principles question of privacy law, but the answer has implications for intellectual property, as well. This project is the first in a series of papers about first-person disclosures of information in the privacy and intellectual property law contexts, and it defines the boundary between public and non-public information through the lens of social science — namely, principles of trust.

Patent law’s “public use” bar confronts the question of whether legal protection should extend to information previously disclosed to a small group of people. I present evidence that shows …


Appropriate(D) Moments, Richard H. Chused Oct 2015

Appropriate(D) Moments, Richard H. Chused

Articles & Chapters

No abstract provided.


Reducing Secrecy: Balancing Legitimate Government Interests With Public Accountability, Nadine Strossen Jan 2015

Reducing Secrecy: Balancing Legitimate Government Interests With Public Accountability, Nadine Strossen

Articles & Chapters

No abstract provided.


Privacy As Trust: Sharing Personal Information In A Networked World, Ari Ezra Waldman Jan 2015

Privacy As Trust: Sharing Personal Information In A Networked World, Ari Ezra Waldman

Articles & Chapters

This Article is the first in a series on the legal and sociological aspects of privacy, arguing that private contexts are defined by relationships of trust among individuals. The argument reorients privacy scholarship from an individual right to social relationships of disclosure. This has implications for a wide variety of vexing problems of modern privacy law, from limited disclosures to “revenge porn.”

The common everyday understanding is that privacy is about choice, autonomy, and individual freedom. It encompasses the individual’s right to determine what he will keep hidden and what, how, and when he will disclose to the public. Privacy …


Kicking The Can Down The Road: Dodd-Frank’S Attempted Reform On Broker-Dealers, Helen Quigley Jan 2015

Kicking The Can Down The Road: Dodd-Frank’S Attempted Reform On Broker-Dealers, Helen Quigley

NYLS Law Review

No abstract provided.


Amplifying Abuse: The Fusion Of Cyberharassment And Discrimination, Ari Ezra Waldman Jan 2015

Amplifying Abuse: The Fusion Of Cyberharassment And Discrimination, Ari Ezra Waldman

Articles & Chapters

Cyberharassment devastates its victims. Anxiety, panic attacks, and fear are common effects; post-traumatic stress disorder, anorexia and bulimia, and clinical depression are common diagnoses. Targets of online hate and abuse have gone into hiding, changed schools, and quit jobs to prevent further abuse. Some lives are devastated in adolescence and are never able to recover. Some lives come to tragic, premature ends. Danielle Keats Citron not only teases out these effects in her masterful work, Hate Crimes in Cyberspace; she also makes the profound conclusion that these personal effects are part of a larger social cancer that breeds sexism, subjugation, …


Durkheim's Internet: Social And Political Theory In Online Society, Ari Ezra Waldman Jan 2013

Durkheim's Internet: Social And Political Theory In Online Society, Ari Ezra Waldman

Articles & Chapters

While the Internet has changed dramatically since the early 1990s, the legal regime governing the right to privacy online and Internet speech is still steeped in a myth of the Internet user, completely hidden from others, in total control of his online experience, and free to come and go as he pleases. This false image of the “virtual self” has also contributed to an ethos of lawlessness, irresponsibility, and radical individuation online, allowing the evisceration of online privacy and the proliferation of hate and harassment.

I argue that the myth of the online anonym is not only false as a …


In Re Miguel M., Jonathan Weinstein Jan 2011

In Re Miguel M., Jonathan Weinstein

NYLS Law Review

No abstract provided.


Cohen V. Google, Inc., Eirik Cheverud Jan 2011

Cohen V. Google, Inc., Eirik Cheverud

NYLS Law Review

No abstract provided.


Nieves V. Home Box Office, Inc., Andrew Nieh Jan 2010

Nieves V. Home Box Office, Inc., Andrew Nieh

NYLS Law Review

No abstract provided.


Discipline In Schools After Safford Unified School District #1 V. Redding, Dennis D. Parker Jan 2010

Discipline In Schools After Safford Unified School District #1 V. Redding, Dennis D. Parker

NYLS Law Review

No abstract provided.


Cybercrimes Vs. Cyberliberties, Nadine Strossen Jan 2009

Cybercrimes Vs. Cyberliberties, Nadine Strossen

Articles & Chapters

Cybercrimes vs. Cyberliberties, Chapter 8 in Internet Policy and Economics: Challenges and Perspectives 2nd ed. at 110-127 ( W.H. Lehr & L.M. Pupillo, eds. Springer, 2009).


Tuck-It-Away Associates, L.P. V. Empire State Development Corp., Kelly D. Fisher Jan 2009

Tuck-It-Away Associates, L.P. V. Empire State Development Corp., Kelly D. Fisher

NYLS Law Review

No abstract provided.


Conflict Of Law And Surreptitious Taping Of Telephone Conversations, Carol M. Bast Jan 2009

Conflict Of Law And Surreptitious Taping Of Telephone Conversations, Carol M. Bast

NYLS Law Review

No abstract provided.


In The Matter Of Ottinger V. Non-Party The Journal News, Daniel Haier Jan 2009

In The Matter Of Ottinger V. Non-Party The Journal News, Daniel Haier

NYLS Law Review

No abstract provided.


Islam's Fourth Amendment: Search And Seizure In Islamic Doctrine And Muslim Practice, Sadiq Reza Jan 2009

Islam's Fourth Amendment: Search And Seizure In Islamic Doctrine And Muslim Practice, Sadiq Reza

Articles & Chapters

Modern scholars regularly assert that Islamic law contains privacy protections similar to those of the FourthAmendment to the U.S. Constitution. Two Quranic verses in particular - one that commands Muslims not to enter homes without permission, and one that commands them not to 'spy' - are held up, along with reports from the Traditions (Sunna) that repeat and embellish on these commands, as establishing rules that forbid warrantless searches and seizures by state actors and require the exclusion of evidence obtained in violation of these rules. This Article tests these assertions by: (1) presenting rules and doctrines Muslim jurists of …


Making The Plaintiff ’S Bar Earn Its Keep: Rethinking The Hospital Incident Report, Katherine Mikk Jan 2008

Making The Plaintiff ’S Bar Earn Its Keep: Rethinking The Hospital Incident Report, Katherine Mikk

NYLS Law Review

No abstract provided.