Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (133)
- Computer Law (115)
- Health Law and Policy (109)
- Constitutional Law (104)
- Legislation (95)
-
- Human Rights Law (93)
- International Law (93)
- State and Local Government Law (91)
- Criminal Law (90)
- Supreme Court of the United States (89)
- Courts (88)
- Military, War, and Peace (88)
- Administrative Law (87)
- Civil Procedure (87)
- Criminal Procedure (87)
- Family Law (87)
- Civil Law (86)
- Contracts (86)
- Jurisprudence (86)
- Law and Politics (86)
- Legal History (86)
- Other Law (86)
- Public Law and Legal Theory (86)
- Torts (86)
- Conflict of Laws (85)
- Law and Economics (85)
- Social Welfare Law (85)
- Banking and Finance Law (84)
- Institution
-
- Universitas Indonesia (82)
- Schulich School of Law, Dalhousie University (19)
- Washington and Lee University School of Law (10)
- University of Michigan Law School (9)
- Chicago-Kent College of Law (7)
-
- Maurer School of Law: Indiana University (7)
- Seattle University School of Law (7)
- The Catholic University of America, Columbus School of Law (7)
- Boston University School of Law (6)
- University of Maine School of Law (5)
- Vanderbilt University Law School (5)
- Brooklyn Law School (4)
- Osgoode Hall Law School of York University (4)
- Singapore Management University (4)
- University of Colorado Law School (4)
- University of Washington School of Law (4)
- Association of Arab Universities (3)
- Fordham Law School (3)
- Roger Williams University (3)
- University of Connecticut (3)
- University of Oklahoma College of Law (3)
- University of Pennsylvania Carey Law School (3)
- William & Mary Law School (3)
- Marquette University Law School (2)
- Mitchell Hamline School of Law (2)
- Pace University (2)
- Pepperdine University (2)
- SJ Quinney College of Law, University of Utah (2)
- Texas A&M University School of Law (2)
- Touro University Jacob D. Fuchsberg Law Center (2)
- Keyword
-
- Privacy (35)
- Surveillance (11)
- Data privacy (10)
- Data protection (9)
- Fourth Amendment (9)
-
- Privacy law (7)
- COVID-19 (6)
- Copyright (6)
- Technology (6)
- Data (5)
- Human rights (5)
- Privacy Law (5)
- Cybersecurity (4)
- HIPAA (4)
- Internet (4)
- Personal Data (4)
- Personal data (4)
- Roe v. Wade (4)
- Abortion (3)
- Agreement (3)
- Artificial intelligence (3)
- China (3)
- Data security (3)
- Deposit Insurance Corporation (3)
- Human Rights (3)
- Identity theft (3)
- Indonesia (3)
- Internet Law (3)
- Investment (3)
- Law (3)
- Publication
-
- "Dharmasisya” Jurnal Program Magister Hukum FHUI (82)
- Canadian Journal of Law and Technology (16)
- Catholic University Journal of Law and Technology (7)
- Chicago-Kent Law Review (7)
- Faculty Scholarship (7)
-
- Washington and Lee Law Review (6)
- University of Michigan Journal of Law Reform (5)
- Articles (4)
- Indiana Law Journal (4)
- Privacy Certificate Student Publications (4)
- Research Collection Yong Pung How School Of Law (4)
- Seattle University Law Review (4)
- All Faculty Scholarship (3)
- Articles & Book Chapters (3)
- Brooklyn Law Review (3)
- Connecticut Law Review (3)
- Oklahoma Law Review (3)
- Publications (3)
- مجلة جامعة الإمارات للبحوث القانونية UAEU LAW JOURNAL (3)
- Articles by Maurer Faculty (2)
- Articles, Book Chapters, & Popular Press (2)
- Fordham Intellectual Property, Media and Entertainment Law Journal (2)
- Jeffrey S. Moorad Sports Law Journal (2)
- Mitchell Hamline Law Review (2)
- Roger Williams University Law Review (2)
- Scholarly Articles (2)
- Seattle Journal of Technology, Environmental & Innovation Law (2)
- Shorter Faculty Works (2)
- Utah Law Faculty Scholarship (2)
- Vanderbilt Journal of Entertainment & Technology Law (2)
- Publication Type
Articles 241 - 250 of 250
Full-Text Articles in Privacy Law
Managing And Monitoring The Menopausal Body, Naomi R. Cahn, Bridget J. Crawford, Emily Gold Waldman
Managing And Monitoring The Menopausal Body, Naomi R. Cahn, Bridget J. Crawford, Emily Gold Waldman
Elisabeth Haub School of Law Faculty Publications
This Essay explores how menopausal bodies are managed and monitored through both menopausal hormone therapy (MHT) and the burgeoning market for technology-driven menopause products and services. While each of these allegedly improves the menopause experience, a closer investigation reveals a more complex interaction of profit motives and traditional notions of gender identity. The Essay identifies problems with—and suggests some solutions for reforming—current practices of monitoring and managing the menopausal body.
Careful consideration of menopause brings this Essay into ongoing conversations about theorizing beyond the gender binary and stereotypical notions of femininity. Purveyors of both MHT and menopause-related digital products and …
Privacy, Network Effects, And Law Enforcement: The Gap Between Technology And The Law, Adriena Clifton
Privacy, Network Effects, And Law Enforcement: The Gap Between Technology And The Law, Adriena Clifton
Seattle Journal for Social Justice
No abstract provided.
Making Privacy Injuries Concrete, Peter Ormerod
Making Privacy Injuries Concrete, Peter Ormerod
Washington and Lee Law Review
In recent years, the U.S. Supreme Court has repeatedly said that the doctrine of Article III standing deprives the federal courts of jurisdiction over some lawsuits involving intangible injuries. The lower federal courts are carrying out the Supreme Court’s instructions, and privacy injuries have borne the brunt of the Court’s directive. This Article identifies two incoherencies in the Court’s recent intangible injury decisions and builds on the work of privacy scholars to fashion a solution.
The first incoherency is a line-drawing problem: the Court has never explained why some intangible injuries create an Article III injury in fact while others …
Data Breach Notification Laws And The Quantum Decryption Problem, Phillip Harmon
Data Breach Notification Laws And The Quantum Decryption Problem, Phillip Harmon
Washington and Lee Law Review
In the United States, state data breach notification laws protect citizens by forcing businesses to notify those citizens when their personal information has been compromised. These laws almost universally include an exception for encrypted personal data. Modern encryption methods make encrypted data largely useless, and the notification laws aim to encourage good encryption practices.
This Note challenges the wisdom of laws that place blind faith in the continued infallibility of encryption. For decades, Shor’s algorithm has promised polynomial-time factoring once a sufficiently powerful quantum computer can be built. Competing laboratories around the world steadily continue to march toward this end. …
Face The Facts, Or Is The Face A Fact?: Biometric Privacy In Publicly Available Data, Daniel Levin
Face The Facts, Or Is The Face A Fact?: Biometric Privacy In Publicly Available Data, Daniel Levin
Fordham Intellectual Property, Media and Entertainment Law Journal
Recent advances in biometric technologies have caused a stir among the privacy community. Specifically, facial recognition technologies facilitated through data scraping practices have called into question the basic precepts we had around exercising biometric privacy. Yet, in spite of emerging case law on the permissibility of data scraping, comparatively little attention has been given to the privacy implications endemic to such practices.
On the one hand, privacy proponents espouse the view that manipulating publicly available data from, for example, our social media profiles, derogates from users’ expectations around the kind of data they share with platforms (and the obligations such …
The New Bailments, Danielle D'Onfro
The New Bailments, Danielle D'Onfro
Scholarship@WashULaw
The rise of cloud computing has dramatically changed how consumers and firms store their belongings. Property that owners once managed directly now exists primarily on infrastructure maintained by intermediaries. Consumers entrust their photos to Apple instead of scrapbooks; businesses put their documents on Amazon’s servers instead of in file cabinets; seemingly everything runs in the cloud. Were these belongings tangible, the relationship between owner and intermediary would be governed by the common-law doctrine of bailment. Bailments are mandatory relationships formed when one party entrusts their property to another. Within this relationship, the bailees owe the bailors a duty of care …
A Proportionality-Based Framework For Government Regulation Of Digital Tracing Apps In Times Of Emergency, Sharon Bassan
A Proportionality-Based Framework For Government Regulation Of Digital Tracing Apps In Times Of Emergency, Sharon Bassan
Dickinson Law Review (2017-Present)
Times of emergency present an inherent conflict between the public interest and the preservation of individual rights. Such times require granting emergency powers to the government on behalf of the public interest and relaxing safeguards against government actions that infringe rights. The lack of theoretical framework to assess governmental decisions in times of emergency leads to a polarized and politicized discourse about potential policies, and often, to public distrust and lack of compliance.
Such a discourse was evident regarding Digital Tracing Apps (“DTAs”), which are apps installed on cellular phones to alert users that they were exposed to people who …
The Surprising Virtues Of Data Loyalty, Woodrow Hartzog, Neil M. Richards
The Surprising Virtues Of Data Loyalty, Woodrow Hartzog, Neil M. Richards
Faculty Scholarship
Lawmakers in the United States and Europe are seriously considering imposing duties of data loyalty that implement ideas from privacy law scholarship, but critics claim such duties are unnecessary, unworkable, overly individualistic, and indeterminately vague. This paper takes those criticisms seriously, and its analysis of them reveals that duties of data loyalty have surprising virtues. Loyalty, it turns out, can support collective well-being by embracing privacy’s relational turn; it can be a powerful state of mind for reenergizing privacy reform; it prioritizes human values rather than potentially empty formalism; and it offers solutions that are flexible and clear rather than …
Legislating Data Loyalty, Woodrow Hartzog, Neil Richards
Legislating Data Loyalty, Woodrow Hartzog, Neil Richards
Faculty Scholarship
Lawmakers looking to embolden privacy law have begun to consider imposing duties of loyalty on organizations trusted with people’s data and online experiences. The idea behind loyalty is simple: organizations should not process data or design technologies that conflict with the best interests of trusting parties. But the logistics and implementation of data loyalty need to be developed if the concept is going to be capable of moving privacy law beyond its “notice and consent” roots to confront people’s vulnerabilities in their relationship with powerful data collectors.
In this short Essay, we propose a model for legislating data loyalty. Our …
Navigating The Identity Thicket: Trademark's Lost Theory Of Personality, The Right Of Publicity, And Preemption, Jennifer E. Rothman
Navigating The Identity Thicket: Trademark's Lost Theory Of Personality, The Right Of Publicity, And Preemption, Jennifer E. Rothman
All Faculty Scholarship
Both trademark and unfair competition laws and state right of publicity laws protect against unauthorized uses of a person’s identity. Increasingly, however, these rights are working at odds with one another, and can point in different directions with regard to who controls a person’s name, likeness, and broader indicia of identity. This creates what I call an "identity thicket" of overlapping and conflicting rights over a person’s identity. Current jurisprudence provides little to no guidance on the most basic questions surrounding this thicket, such as what right to use a person’s identity, if any, flows from the transfer of marks …