Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Privacy Law

Wiretapping The Internet: Analyzing The Application Of The Federal Wiretap Act’S Party Exception Online, Hayden Driscoll Oct 2022

Wiretapping The Internet: Analyzing The Application Of The Federal Wiretap Act’S Party Exception Online, Hayden Driscoll

Washington and Lee Journal of Civil Rights and Social Justice

The federal Wiretap Act—originally enacted to curtail the government’s unbridled use of wiretaps to monitor telephonic communications—was amended in 1986 to provide a private right of action, extending the Act’s Fourth Amendment-like protections to private intrusions. Since the advent of the internet, plaintiffs have attempted to predicate claims of unauthorized online privacy intrusions on the Wiretap Act. In response, defendants claim they are parties to the communications at issue and should be absolved of liability under the Act’s party exception. The federal circuit courts of appeal disagree on how the party exception applies in the internet context. This Note evaluates …


The Three Laws: The Chinese Communist Party Throws Down The Data Regulation Gauntlet, William Chaskes Jul 2022

The Three Laws: The Chinese Communist Party Throws Down The Data Regulation Gauntlet, William Chaskes

Washington and Lee Law Review

Criticism of the Chinese Communist Party (CCP) runs a wide gamut. Accusations of human rights abuses, intellectual property theft, authoritarian domestic policies, disrespecting sovereign borders, and propaganda campaigns all have one common factor: the CCP’s desire to control information. Controlling information means controlling data. Lurking beneath the People’s Republic of China’s (PRC) tumultuous relationship with the rest of the world is the fight between nations to control their citizens’ data while also keeping it out of the hands of adversaries. The CCP’s Three Laws are its newest weapon in this data war.

One byproduct of the CCP’s emphasis on controlling …


Right Of Self, Mitchell F. Crusto Apr 2022

Right Of Self, Mitchell F. Crusto

Washington and Lee Law Review

The exercise of free will against tyranny is the single principle that defines the American spirit, our history, and our culture. From the American Revolution through the Civil War, the two World Wars, the Civil Rights Movement, and up to today, Americans have embraced the fundamental rights of the individual against wrongful governmental intrusion. This is reflected in our foundational principles, including the Magna Carta, the Bill of Rights to the United States Constitution, the Reconstruction Amendments, the Nineteenth Amendment, and, more recently, in the Supreme Court’s recognition of fundamental individual rights within the Constitution’s penumbras. However, there is no …


The New State Of Surveillance: Societies Of Subjugation, Khaled Ali Beydoun Apr 2022

The New State Of Surveillance: Societies Of Subjugation, Khaled Ali Beydoun

Washington and Lee Law Review

Foundational surveillance studies theory has largely been shaped in line with the experiences of white subjects in western capitalist societies. Formative scholars, most notably Michel Foucault and Gilles Deleuze, theorized that the advancement of surveillance technology tempers the State’s reliance on mass discipline and corporal punishment. Legal scholarship examining modern surveillance perpetuates this view, and popular interventions, such as the blockbuster docudrama The Social Dilemma and Shoshana Zuboff’s bestseller The Age of Surveillance Capitalism, mainstream the myth of colorblind surveillance. However, the experiences of nonwhite subjects of surveillance—pushed to or beyond the margins of these formative discourses—reflect otherwise. …


“You Keep Using That Word”: Why Privacy Doesn’T Mean What Lawyers Think, Joshua A.T. Fairfield Jan 2022

“You Keep Using That Word”: Why Privacy Doesn’T Mean What Lawyers Think, Joshua A.T. Fairfield

Scholarly Articles

This article explores how the need to define privacy has impeded our ability to protect it in law.

The meaning of “privacy” is notoriously hard to pin down. This article contends that the problem is not with the word “privacy,” but with the act of trying to pin it down. The problem lies with the act of definition itself and is particularly acute when the words in question have deep-seated and longstanding common-language meanings, such as liberty, freedom, dignity, and certainly privacy. If one wishes to determine what words like these actually mean to people, definition is the wrong tool …


Making An Offer That Can't Be Refused: The Need For Reform In The Rules Governing Informed Consent And Doctor-Patient Agreements, Timothy C. Macdonnell Jan 2022

Making An Offer That Can't Be Refused: The Need For Reform In The Rules Governing Informed Consent And Doctor-Patient Agreements, Timothy C. Macdonnell

Scholarly Articles

On a daily basis, throughout the country, patients are required to sign informed consent forms regarding the care they receive from their doctors. Informed consent forms are an important part of ensuring patients are making an intelligent, autonomous decision regarding their healthcare based on the facts related to their particular situation. However, frequently these consent forms contain what amount to contract-like terms that require patients to permit doctors to substitute other healthcare providers to care for the patient under the doctor’s supervision (substituted caregiver terms). Often these terms are presented to patients on the eve of surgery and on a …


Comment: The Necessary Evolution Of State Data Breach Notification Laws: Keeping Pace With New Cyber Threats, Quantum Decryption, And The Rapid Expansion Of Technology, Beth Burgin Waller, Elaine Mccafferty Jan 2022

Comment: The Necessary Evolution Of State Data Breach Notification Laws: Keeping Pace With New Cyber Threats, Quantum Decryption, And The Rapid Expansion Of Technology, Beth Burgin Waller, Elaine Mccafferty

Washington and Lee Law Review

The legal framework that was built almost two decades ago now struggles to keep pace with the rapid expansion of technology, including quantum computing and artificial intelligence, and an ever-evolving cyber threat landscape. In 2002, California passed the first data breach notification law, with all fifty states following suit to require notice of unauthorized access to and acquisition of an individual’s personal information.1 These data breach notification laws, originally designed to capture one-off unauthorized views of data in a computerized database, were not built to address PowerShell scripts by cyber terrorists run across thousands of servers, leaving automated accessed data …


Reproductive Privacy In The World: Critical Examination Of June Medical Services, L.L.C. V. Russo And Buck V. Bell, Kumiko Kitaoka Jan 2022

Reproductive Privacy In The World: Critical Examination Of June Medical Services, L.L.C. V. Russo And Buck V. Bell, Kumiko Kitaoka

Washington and Lee Journal of Civil Rights and Social Justice

Using insights from Professor Stephen A. Simon’s Universal Rights and the Constitution, this Article argues that national courts should continue to assume an active role in the protection of privacy rights by giving due consideration to the nature of the privacy right in combination with the merits of the universal right theory. This Article then demonstrates that both foreign national courts and domestic state courts have recognized the right to procreate and key aspects of the right to abortion as fundamental rights.

Part II introduces the universal right theory, explaining why the theory is particularly relevant to the protection …


Making Privacy Injuries Concrete, Peter Ormerod Jan 2022

Making Privacy Injuries Concrete, Peter Ormerod

Washington and Lee Law Review

In recent years, the U.S. Supreme Court has repeatedly said that the doctrine of Article III standing deprives the federal courts of jurisdiction over some lawsuits involving intangible injuries. The lower federal courts are carrying out the Supreme Court’s instructions, and privacy injuries have borne the brunt of the Court’s directive. This Article identifies two incoherencies in the Court’s recent intangible injury decisions and builds on the work of privacy scholars to fashion a solution.

The first incoherency is a line-drawing problem: the Court has never explained why some intangible injuries create an Article III injury in fact while others …


Data Breach Notification Laws And The Quantum Decryption Problem, Phillip Harmon Jan 2022

Data Breach Notification Laws And The Quantum Decryption Problem, Phillip Harmon

Washington and Lee Law Review

In the United States, state data breach notification laws protect citizens by forcing businesses to notify those citizens when their personal information has been compromised. These laws almost universally include an exception for encrypted personal data. Modern encryption methods make encrypted data largely useless, and the notification laws aim to encourage good encryption practices.

This Note challenges the wisdom of laws that place blind faith in the continued infallibility of encryption. For decades, Shor’s algorithm has promised polynomial-time factoring once a sufficiently powerful quantum computer can be built. Competing laboratories around the world steadily continue to march toward this end. …