Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Science and Technology Law (7)
- Communications Law (4)
- Internet Law (4)
- National Security Law (4)
- Computer Law (3)
-
- Constitutional Law (3)
- State and Local Government Law (3)
- Criminal Law (2)
- Criminal Procedure (2)
- Evidence (2)
- Intellectual Property Law (2)
- Law Enforcement and Corrections (2)
- Legislation (2)
- Civil Law (1)
- Civil Procedure (1)
- Civil Rights and Discrimination (1)
- Consumer Protection Law (1)
- First Amendment (1)
- Fourth Amendment (1)
- Jurisprudence (1)
- Litigation (1)
- Property Law and Real Estate (1)
- Transportation Law (1)
- Institution
Articles 1 - 14 of 14
Full-Text Articles in Privacy Law
Passcodes, Protection, And Legal Practicality: The Necessity Of A Digital Fifth Amendment, Ethan Swierczewski
Passcodes, Protection, And Legal Practicality: The Necessity Of A Digital Fifth Amendment, Ethan Swierczewski
Catholic University Journal of Law and Technology
No abstract provided.
Biometric Data Regulation And The Right Of Publicity: A Path To Regaining Autonomy Over Our Commodified Identity, Lisa Raimondi
Biometric Data Regulation And The Right Of Publicity: A Path To Regaining Autonomy Over Our Commodified Identity, Lisa Raimondi
University of Massachusetts Law Review
This Note explores how a right of publicity action might be used to address present day concerns regarding biometric data ownership rights where an individual’s likeness can essentially be bought and sold. As social networking and use of the internet has grown, so has the opportunity for people to engage with others and share their lives. However, that opportunity also comes with risk. More and more, people are required to accept the terms of use and privacy policies detailing how their biometric data will be collected and stored if they want to download and use certain technological applications. Most of …
Who Gets To Operate On Herbie? Right To Repair Legislation In The Context Of Automated Vehicles, Jennifer J. Huseby
Who Gets To Operate On Herbie? Right To Repair Legislation In The Context Of Automated Vehicles, Jennifer J. Huseby
Journal of Law and Mobility
You bought it, you own it, but do you have the right to repair it? As right-to-repair remains a hot topic in the context of consumer electronics such as smartphones, one must consider the ramifications it may have for the automated vehicle (“AV”) industry. As the backdrop for one of the first legislative victories for right-to-repair, the automobile industry has continued to push for the expansion of right-to-repair to cover increased access to telematics and exceptions to proprietary software controls. However, as we revisit the issue for more highly connected and automated vehicles, it is important to assess the unique …
The Law Of The Tetrapods, Henry T. Greely
The Law Of The Tetrapods, Henry T. Greely
Vanderbilt Journal of Entertainment & Technology Law
Should there be such a thing as "Technology Law"? This Article explores that question in two ways. It first looks at four substantive issues that appear across many different areas of technology law: privacy, security, property, and responsibility. It then examines five questions that frequently recur about how to regulate very different new technologies. These questions include which agency should regulate, whether regulation should focus on before or after marketing, what jurisdiction should regulate, how relevant new information will be gained and used, and how-politically-good regulation can be enacted. This Article concludes that it may make sense to develop a …
Face Off: An Examination Of State Biometric Privacy Statutes & Data Harm Remedies, Maya E. Rivera
Face Off: An Examination Of State Biometric Privacy Statutes & Data Harm Remedies, Maya E. Rivera
Fordham Intellectual Property, Media and Entertainment Law Journal
As biometric authentication becomes an increasingly popular method of security among consumers, only three states currently have statutes detailing how such data may be collected, used, retained, and released. The Illinois Biometric Information Privacy Act is the only statute of the three that enshrines a private right of action for those who fail to properly handle biometric data. Both the Texas Capture or Use Biometric Identifier Act Information Act and the Washington Biometric Privacy Act allow for state Attorneys General to bring suit on behalf of aggrieved consumers. This Note examines these three statutes in the context of data security …
Smart Baby Monitors: The Modern Nanny Or A Home Invader, Sarah Ensenat
Smart Baby Monitors: The Modern Nanny Or A Home Invader, Sarah Ensenat
Catholic University Journal of Law and Technology
Smart baby monitors exist to help parents protect and watch over their children. The smart baby monitors act as a second set of eyes when parents cannot be in the same room as their children. Low-tech hackers take advantage of gaps in the security of smart baby monitors. A hacker violates a consumer’s privacy by gaining access to private information, viewing the home and its occupants, and even speaking to children through the monitor.
This comment advocates for stricter security legislation for smart baby monitors. Without new legislation, manufacturers of smart baby monitors do not apply or invest in the …
The Market’S Law Of Privacy: Case Studies In Privacy/Security Adoption, Chetan Gupta
The Market’S Law Of Privacy: Case Studies In Privacy/Security Adoption, Chetan Gupta
Washington and Lee Law Review Online
This paper examines the hypothesis that it may be possible for individual actors in a marketplace to drive the adoption of particular privacy and security standards. It aims to explore the diffusion of privacy and security technologies in the marketplace. Using HTTPS, Two-Factor Authentication, and End-to-End Encryption as case studies, it tries to ascertain which factors are responsible for successful diffusion which improves the privacy of a large number of users. Lastly, it explores whether the FTC may view a widely diffused standard as a necessary security feature for all actors in a particular industry.
Based on the case studies …
Civil Liberty Or National Security: The Battle Over Iphone Encryption, Karen Lowell
Civil Liberty Or National Security: The Battle Over Iphone Encryption, Karen Lowell
Georgia State University Law Review
On June 5, 2013, Edward Snowden released what would be the first of many documents exposing the vast breadth of electronic surveillance the Federal Bureau of Investigation (FBI) and the National Security Agency (NSA) had been conducting on millions of United States citizens. Although the federal agencies had legal authority under the Foreign Intelligence Surveillance Act (FISA) to collect metadata from companies such as Verizon, many Americans considered this data collection to be a massive invasion of privacy.
Equipped with the knowledge of sweeping domestic surveillance programs, citizens and technology firms fighting for strong privacy and security protection, have started …
Enhancing Cybersecurity In The Private Sector By Means Of Civil Liability Lawsuits - The Connie Francis Effect, Jeffrey F. Addicott
Enhancing Cybersecurity In The Private Sector By Means Of Civil Liability Lawsuits - The Connie Francis Effect, Jeffrey F. Addicott
University of Richmond Law Review
The purpose of this article is to explore the threats posed by
cybersecurity breaches, outline the steps taken by the government
to address those threats in the private sector economy, and
call attention to the ultimate solution, which will most certainly
spur private businesses to create a more secure cyber environment
for the American people-a Connie Francis-styled cyber civil
action lawsuit.
"I Want My File": Surveillance Data, Minimization, And Historical Accountability, Douglas Cox
"I Want My File": Surveillance Data, Minimization, And Historical Accountability, Douglas Cox
University of Richmond Law Review
No abstract provided.
Decrypting The Fourth Amendment: Applying Fourth Amendment Principles To Evolving Privacy Expectations In Encryption Technologies, Candice Gliksberg
Decrypting The Fourth Amendment: Applying Fourth Amendment Principles To Evolving Privacy Expectations In Encryption Technologies, Candice Gliksberg
Loyola of Los Angeles Law Review
No abstract provided.
The Fight To Frame Privacy, Woodrow Hartzog
The Fight To Frame Privacy, Woodrow Hartzog
Michigan Law Review
In his important new book, Nothing to Hide: The False Tradeoff Between Privacy and Security, Daniel Solove argues that if we continue to view privacy and security as diametrically opposed to each other, privacy will always lose. Solove argues that the predetermined abandonment of privacy in security-related disputes means that the structure of the privacy-security debate is inherently flawed. Solove understands that privacy is far too vital to our freedom and democracy to accept its inevitable demise. The central thesis of this Review is that Solove's polemic is a strong and desperately needed collection of frames that counterbalances the "nothing …
Limits Of The Federal Wiretap Act's Ability To Protect Against Wi-Fi Sniffing, Mani Potnuru
Limits Of The Federal Wiretap Act's Ability To Protect Against Wi-Fi Sniffing, Mani Potnuru
Michigan Law Review
Adoption of Wi-Fi wireless technology continues to see explosive growth. However many users still operate their home Wi-Fi networks in unsecured mode or use publicly available unsecured Wi-Fi networks, thus exposing their communications to the dangers of "packet sniffing," a technique used for eavesdropping on a network. Some have argued that communications over unsecured Wi-Fi networks are "readily accessible to the general public" and that such communications are therefore excluded from the broad protections of the Federal Wiretap Act against intentional interception of electronic communications. This Note examines the Federal Wiretap Act and argues that the current Act's treatment of …
No Cause Of Action: Video Surveillance In New York City, Olivia J. Greer
No Cause Of Action: Video Surveillance In New York City, Olivia J. Greer
Michigan Telecommunications & Technology Law Review
In 2010, New York City Police Commissioner Raymond Kelly announced a new network of video surveillance in the City. The new network would be able to prevent future terrorist attacks by identifying suspicious behavior before catastrophic events could take place. Kelly told reporters, "If we're looking for a person in a red jacket, we can call up all the red jackets filmed in the last 30 days," and "[w]e're beginning to use software that can identify suspicious objects or behaviors." Gothamist later made a witticism of Kelly's statement, remarking, "Note to terrorists: red jackets are not a good look for …