Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (18)
- Science and Technology Law (14)
- Fourth Amendment (12)
- Computer Law (9)
- Constitutional Law (7)
-
- Intellectual Property Law (6)
- Law and Society (5)
- State and Local Government Law (5)
- First Amendment (4)
- Health Law and Policy (4)
- Business (3)
- Comparative and Foreign Law (3)
- Computer Sciences (3)
- European Law (3)
- Information Security (3)
- Physical Sciences and Mathematics (3)
- Social and Behavioral Sciences (3)
- Communication (2)
- Communications Law (2)
- Consumer Protection Law (2)
- Contracts (2)
- Criminal Procedure (2)
- Human Rights Law (2)
- International Trade Law (2)
- Legal Remedies (2)
- Legislation (2)
- Sexuality and the Law (2)
- Accounting (1)
- Institution
-
- Boston University School of Law (8)
- Vanderbilt University Law School (7)
- Maurer School of Law: Indiana University (5)
- Schulich School of Law, Dalhousie University (4)
- University of Colorado Law School (4)
-
- Florida A&M University College of Law (3)
- Loyola Marymount University and Loyola Law School (2)
- Northwestern Pritzker School of Law (2)
- Notre Dame Law School (2)
- Pepperdine University (2)
- St. Mary's University (2)
- University of Georgia School of Law (2)
- Chicago-Kent College of Law (1)
- Columbia Law School (1)
- Cornell University Law School (1)
- Florida State University College of Law (1)
- Fordham Law School (1)
- Georgetown University Law Center (1)
- Georgia Southern University (1)
- Penn State Dickinson Law (1)
- Selected Works (1)
- Singapore Management University (1)
- The Catholic University of America, Columbus School of Law (1)
- Touro University Jacob D. Fuchsberg Law Center (1)
- University of Arkansas, Fayetteville (1)
- University of Baltimore Law (1)
- University of Kentucky (1)
- University of Maine School of Law (1)
- University of Maryland Francis King Carey School of Law (1)
- University of Washington School of Law (1)
- Publication Year
- Publication
-
- Faculty Scholarship (10)
- Vanderbilt Journal of Entertainment & Technology Law (5)
- Publications (4)
- Canadian Journal of Law and Technology (3)
- Journal Publications (3)
-
- Articles by Maurer Faculty (2)
- Indiana Law Journal (2)
- Loyola of Los Angeles Law Review (2)
- Pepperdine Law Review (2)
- All Faculty Scholarship (1)
- Articles, Book Chapters, & Popular Press (1)
- Catholic University Journal of Law and Technology (1)
- Cornell Law School J.D. Student Research Papers (1)
- Dickinson Law Review (2017-Present) (1)
- Elizabeth De Armond (1)
- Faculty Articles (1)
- Fordham Intellectual Property, Media and Entertainment Law Journal (1)
- Georgetown Law Faculty Publications and Other Works (1)
- Honors College Theses (1)
- Journal of Intellectual Property Law (1)
- Maine Law Review (1)
- Marketing Undergraduate Honors Theses (1)
- Maurer Theses and Dissertations (1)
- Northwestern Journal of International Law & Business (1)
- Northwestern University Law Review (1)
- Notre Dame Journal on Emerging Technologies (1)
- Notre Dame Law Review (1)
- Research Collection Yong Pung How School Of Law (1)
- Scholarly Publications (1)
- Scholarly Works (1)
- Publication Type
Articles 1 - 30 of 62
Full-Text Articles in Privacy Law
Data Is What Data Does: Regulating Based On Harm And Risk Instead Of Sensitive Data, Daniel J. Solove
Data Is What Data Does: Regulating Based On Harm And Risk Instead Of Sensitive Data, Daniel J. Solove
Northwestern University Law Review
Heightened protection for sensitive data is becoming quite trendy in privacy laws around the world. Originating in European Union (EU) data protection law and included in the EU’s General Data Protection Regulation, sensitive data singles out certain categories of personal data for extra protection. Commonly recognized special categories of sensitive data include racial or ethnic origin, political opinions, religious or philosophical beliefs, trade union membership, health, sexual orientation and sex life, and biometric and genetic data.
Although heightened protection for sensitive data appropriately recognizes that not all situations involving personal data should be protected uniformly, the sensitive data approach is …
The Trade Origins Of Privacy Law, Anupam Chander
The Trade Origins Of Privacy Law, Anupam Chander
Indiana Law Journal
The desire for trade propelled the growth of data privacy law across the world. Countries with strong privacy laws sought to ensure that their citizens’ privacy would not be compromised when their data traveled to other countries. Even before this vaunted Brussels Effect pushed privacy law across the world through the enticement of trade with the European Union, Brussels had to erect privacy law within the Union itself. And as the Union itself expanded, privacy law was a critical condition for accession.
But this coupling of privacy and trade leaves a puzzle: how did the U.S. avoid a comprehensive privacy …
Extended Privacy For Extended Reality: Xr Technology Has 99 Problems And Privacy Is Several Of Them, Suchismita Pahi, Calli Schroeder
Extended Privacy For Extended Reality: Xr Technology Has 99 Problems And Privacy Is Several Of Them, Suchismita Pahi, Calli Schroeder
Notre Dame Journal on Emerging Technologies
Americans are rapidly adopting innovative technologies which are pushing the frontiers of reality. But, when they look at how their privacy is protected within the new extended reality (XR), they will find that U.S. privacy laws fall short. The privacy risks inherent in XR are inadequately addressed by current U.S. data privacy laws or courtcreated frameworks that purport to protect the constitutional right to be free from unreasonable searches. Many scholars, including Ryan Calo, Danielle Citron, Sherry Colb, Margaret Hu, Orin Kerr, Kirsten Martin, Paul Ohm, Daniel Solove, Rebecca Wexler, Shoshana Zuboff, and others, have highlighted the gaps in U.S. …
Gone Fishing: Casting A Wide Net Using Geofence Warrants, Ryan Tursi
Gone Fishing: Casting A Wide Net Using Geofence Warrants, Ryan Tursi
Washington Law Review
Technology companies across the country receive requests from law enforcement agencies for cell phone location information near the scenes of crimes. These requests rely on the traditional warrant process and are known as geofence warrants, or reverse location search warrants. By obtaining location information, law enforcement can identify potential suspects or persons of interest who were near the scene of a crime when they have no leads. But the use of this investigative technique is controversial, as it threatens to intrude upon the privacy of innocent bystanders who had the misfortune of being nearby when the crime took place. Innocent …
Sexuality’S Promise For Sexual Privacy, Scott Skinner-Thompson
Sexuality’S Promise For Sexual Privacy, Scott Skinner-Thompson
Publications
No abstract provided.
Privacy Qui Tam, Peter Ormerod
Privacy Qui Tam, Peter Ormerod
Notre Dame Law Review
Privacy law keeps getting stronger, but surveillance-based businesses have proven immune to these new legal regimes. The disconnect between privacy law in theory and in practice is a multifaceted problem, and one critical component is enforcement.
Today, most privacy laws are enforced by governmental regulators—the Federal Trade Commission, the nascent California Privacy Protection Agency, and state attorneys general. An enduring impasse for proposed privacy laws is whether to supplement public enforcement by using a private right of action to authorize individuals to enforce the law.
Both of these conventional enforcement schemes have significant shortcomings. Public enforcement has proven inadequate because …
Four Privacy Stories And Two Hard Cases, A Comment On Skinner-Thompson's Privacy At The Margins, Jessica Silbey
Four Privacy Stories And Two Hard Cases, A Comment On Skinner-Thompson's Privacy At The Margins, Jessica Silbey
Faculty Scholarship
Scott Skinner-Thompson's new book, Privacy at the Margins, is what I would call a "fourth-generation" study of privacy law. Privacy's contours and justifications have been debated over the course of the twentieth century, first to establish it as a matter deserving legal protection (roughly the first half of the twentieth century), 2 then to iterate its various common law and constitutional variations (starting in the 1960s), 3 and since the computer and internet revolution of the 1990s, to reevaluate privacy's growing importance but waning presence in the digitally-networked age.4 The third-generation of privacy scholarship has been a fast-growing area …
Data Privacy Regulations In The United States, China, And The European Union, Charlsey A. Kelly
Data Privacy Regulations In The United States, China, And The European Union, Charlsey A. Kelly
Honors College Theses
This paper compares and discusses the different data privacy regulations found in the United States, China, and the European Union. It is no secret that big tech companies like Facebook and Google continuously collect data on their users. The big question is what protections and rights one has as a consumer. The answer to this question differs when you are in different parts of the world. Currently the United States does not have a federal data privacy law, China recently adopted a new data privacy law called the Personal Information Protection Law, and the European Union has a data privacy …
Whither Privacy Protection In The Law Of Nuisance, Cheng Lim Saw, Aaron Yoong
Whither Privacy Protection In The Law Of Nuisance, Cheng Lim Saw, Aaron Yoong
Research Collection Yong Pung How School Of Law
Privacy-related concerns often feature in disputes involving the tort of private nuisance. Despite the growing importance ascribed to the protection of an individual’s privacy in the modern world, English law has tended to shy away from allowing such concerns to influence the thinking behind the more traditional areas of law (like nuisance). This article examines and questions the various notions that underpin this English approach. Using the recent decisions of Giles Duncan Fearn v The Board of Trustees of the Tate Gallery [2019] EWHC 246 (Ch) and Giles Fearn v The Board of Trustees of the Tate Gallery [2020] EWCA …
Sociotechnical Safeguards For Genomic Data Privacy, Ellen W. Clayton, Zhiyu Wan, Et Al.
Sociotechnical Safeguards For Genomic Data Privacy, Ellen W. Clayton, Zhiyu Wan, Et Al.
Vanderbilt Law School Faculty Publications
Recent developments in a variety of sectors, including health care, research and the direct-to-consumer industry, have led to a dramatic increase in the amount of genomic data that are collected, used and shared. This state of affairs raises new and challenging concerns for personal privacy, both legally and technically. This Review appraises existing and emerging threats to genomic data privacy and discusses how well current legal frameworks and technical safeguards mitigate these concerns. It concludes with a discussion of remaining and emerging challenges and illustrates possible solutions that can balance protecting privacy and realizing the benefits that result from the …
The Anomaly That Is Privacy: Data Privacy Concerns Related To The Rise Of Microchip Implants In Humans, Kendra Lobban
The Anomaly That Is Privacy: Data Privacy Concerns Related To The Rise Of Microchip Implants In Humans, Kendra Lobban
Catholic University Journal of Law and Technology
No abstract provided.
A Proportionality-Based Framework For Government Regulation Of Digital Tracing Apps In Times Of Emergency, Sharon Bassan
A Proportionality-Based Framework For Government Regulation Of Digital Tracing Apps In Times Of Emergency, Sharon Bassan
Dickinson Law Review (2017-Present)
Times of emergency present an inherent conflict between the public interest and the preservation of individual rights. Such times require granting emergency powers to the government on behalf of the public interest and relaxing safeguards against government actions that infringe rights. The lack of theoretical framework to assess governmental decisions in times of emergency leads to a polarized and politicized discourse about potential policies, and often, to public distrust and lack of compliance.
Such a discourse was evident regarding Digital Tracing Apps (“DTAs”), which are apps installed on cellular phones to alert users that they were exposed to people who …
Alexa Hears With Her Little Ears—But Does She Have The Privilege?, Lauren Chlouber Howell
Alexa Hears With Her Little Ears—But Does She Have The Privilege?, Lauren Chlouber Howell
St. Mary's Law Journal
Abstract forthcoming.
Comic Books, The First Amendment, And The “Best Test” For Right Of Publicity Issues, Rachel Silverstein
Comic Books, The First Amendment, And The “Best Test” For Right Of Publicity Issues, Rachel Silverstein
Touro Law Review
No abstract provided.
If You Don't Care, Who Will?, Chad J. Pomeroy
If You Don't Care, Who Will?, Chad J. Pomeroy
Faculty Articles
As a property law professor, I have lately found myself thinking a lot about privacy rights. Initially, the two topics (property and privacy) perhaps do not seem closely related, but I think they are—or, at least, I think the tie between the two is becoming much more pronounced and important, as modern life becomes ever more techno-centric. specifically, I think that privacy rights are, at this point, essentially an outgrowth of property rights. That is, one's right to privacy is dependent on what we traditionally view as one's property rights. At least, I think this is the current state of …
Send The Word Over There: An Offshore Solution To The Right To Be Forgotten, Jay Kaganoff
Send The Word Over There: An Offshore Solution To The Right To Be Forgotten, Jay Kaganoff
Northwestern Journal of International Law & Business
The right to be forgotten is a subject of contention in both the United States and the European Union. In the E.U., the right to be forgotten gives one the right to demand that information—even if published legitimately—be taken down or removed from search engine results. While well-intentioned, this has led to concerns of free press restrictions. In contrast, the right to be forgotten is not recognized in the U.S., although there are scholars who would like to see such a right here. This Note takes the view that introducing a right to be forgotten would be contrary to the …
Envisioning The Ftc As A Facilitator Of Blockchain Technology Adoption In The Direct-To-Consumer Genetic Testing Industry, Noah Spector
Envisioning The Ftc As A Facilitator Of Blockchain Technology Adoption In The Direct-To-Consumer Genetic Testing Industry, Noah Spector
Vanderbilt Journal of Entertainment & Technology Law
Seemingly overnight, the kingpins of the direct-to-consumer genetic testing (DTC-GT) industry shifted their focus from exploring their customers’ DNA to commodifying it. Companies like Ancestry or 23andMe that were once exclusively known as mere sources of “infotainment” now regularly sell consenting customers’ genetic data to pharmaceutical researchers or use it to develop drugs of their own. To gain these customers’ consent, both firms employ a series of long, complex clickwrap contracts that largely fail to apprise their readers of the potential risks of sharing their genetic data. Nor do these agreements provide any form of compensation to those consumers whose …
Watching Androids Dream Of Electric Sheep: Immersive Technology, Biometric Psychography, And The Law, Brittan Heller
Watching Androids Dream Of Electric Sheep: Immersive Technology, Biometric Psychography, And The Law, Brittan Heller
Vanderbilt Journal of Entertainment & Technology Law
Virtual reality and augmented reality present exceedingly complex privacy issues because of the enhanced user experience and reality-based models. Unlike the issues presented by traditional gaming and social media, immersive technology poses inherent risks, which our legal understanding of biometrics and online harassment is simply not prepared to address. This Article offers five important contributions to this emerging space. It begins by introducing a new area of legal and policy inquiry raised by immersive technology called “biometric psychography.” Second, it explains how immersive technology works to a legal audience and defines concepts that are essential to understanding the risks that …
Privacy In Pandemic: Law, Technology, And Public Health In The Covid-19 Crisis, Tiffany Li
Privacy In Pandemic: Law, Technology, And Public Health In The Covid-19 Crisis, Tiffany Li
Faculty Scholarship
The COVID-19 pandemic has caused millions of deaths and disastrous consequences around the world, with lasting repercussions for every field of law, including privacy and technology. The unique characteristics of this pandemic have precipitated an increase in use of new technologies, including remote communications platforms, healthcare robots, and medical AI. Public and private actors are using new technologies, like heat sensing, and technologically-influenced programs, like contact tracing, alike in response, leading to a rise in government and corporate surveillance in sectors like healthcare, employment, education, and commerce. Advocates have raised the alarm for privacy and civil liberties violations, but the …
Emerging Technology & Regulation Panel Transcript, Bill Goodwin, Ryan Hagemann, Brooks Rainwater, Caleb Watney
Emerging Technology & Regulation Panel Transcript, Bill Goodwin, Ryan Hagemann, Brooks Rainwater, Caleb Watney
Pepperdine Law Review
No abstract provided.
A New Compact For Sexual Privacy, Danielle K. Citron
A New Compact For Sexual Privacy, Danielle K. Citron
Faculty Scholarship
Intimate life is under constant surveillance. Firms track people’s periods, hot flashes, abortions, sexual assaults, sex toy use, sexual fantasies, and nude photos. Individuals hardly appreciate the extent of the monitoring, and even if they did, little can be done to curtail it. What is big business for firms is a big risk for individuals. The handling of intimate data undermines the values that sexual privacy secures—autonomy, dignity, intimacy, and equality. It can imperil people’s job, housing, insurance, and other crucial opportunities. More often, women and minorities shoulder a disproportionate amount of the burden.
Privacy law is failing us. Our …
Cell-Site Location Information And The Privacies Of Life: The Impact Of Carpenter V. United States, Trevor Moore
Cell-Site Location Information And The Privacies Of Life: The Impact Of Carpenter V. United States, Trevor Moore
Loyola of Los Angeles Law Review
No abstract provided.
What Consumers Don’T Know They’Re Giving Away (Data And Privacy Concerns), Bayleigh Reeves
What Consumers Don’T Know They’Re Giving Away (Data And Privacy Concerns), Bayleigh Reeves
Marketing Undergraduate Honors Theses
The modern world leverages technology and information captured by it in ways the inventors of these technologies likely never imagined. Phones and other devices are gathering information about consumers in the background when they do not even realize it. Pew Research Center found that about 77% of Americans own a smartphone and 88% use the internet. This mass access to technology and information tracking raises many privacy concerns. Basic demographic information is being tracked as well as more in-depth information like shopping tendencies, financial information, and information about known associates. While most of this data is being used for marketing …
Symposium: The California Consumer Privacy Act, Margot Kaminski, Jacob Snow, Felix Wu, Justin Hughes
Symposium: The California Consumer Privacy Act, Margot Kaminski, Jacob Snow, Felix Wu, Justin Hughes
Publications
This symposium discussion of the Loyola of Los Angeles Law Review focuses on the newly enacted California Consumer Privacy Act (CPPA), a statute signed into state law by then-Governor Jerry Brown on June 28, 2018 and effective as of January 1, 2020. The panel was held on February 20, 2020.
The panelists discuss how businesses are responding to the new law and obstacles for consumers to make effective use of the law’s protections and rights. Most importantly, the panelists grapple with questions courts are likely to have to address, including the definition of personal information under the CCPA, the application …
A Recent Renaissance In Privacy Law, Margot Kaminski
A Recent Renaissance In Privacy Law, Margot Kaminski
Publications
Considering the recent increased attention to privacy law issues amid the typically slow pace of legal change.
Privative Copyright, Shyamkrishna Balganesh
Privative Copyright, Shyamkrishna Balganesh
Vanderbilt Law Review
“Privative” copyright claims are infringement actions brought by authors for the unauthorized public dissemination of works that are private, unpublished, and revelatory of the author’s personal identity. Driven by considerations of authorial autonomy, dignity, and personality rather than monetary value, these claims are almost as old as Anglo-American copyright law itself. Yet modern thinking has attempted to undermine their place within copyright law and sought to move them into the domain of privacy law. This Article challenges the dominant view and argues that privative copyright claims form a legitimate part of the copyright landscape. It shows how privative copyright claims …
Contracting For Fourth Amendment Privacy Online, Wayne A. Logan, Jake Linford
Contracting For Fourth Amendment Privacy Online, Wayne A. Logan, Jake Linford
Scholarly Publications
No abstract provided.
Big Brother Riding Shotgun: Internal Surveillance Of Semi-Autonomous Vehicles And Its Effects On The Reasonable Expectation Of Privacy, Tunca Bolca
Canadian Journal of Law and Technology
The makers of autonomous vehicles (AVs) claim that their vehicles will reduce traffic accidents by 90 per cent and save millions of lives. Although this is yet to be proven, even if these new generation cars are made to be everything that the carmakers claim, accidents will still happen. Now, as the technology is progressing, governments and scholars are trying to come up with solutions to many legal, ethical and sociological problems the AVs will bring along.
Face Off: An Examination Of State Biometric Privacy Statutes & Data Harm Remedies, Maya E. Rivera
Face Off: An Examination Of State Biometric Privacy Statutes & Data Harm Remedies, Maya E. Rivera
Fordham Intellectual Property, Media and Entertainment Law Journal
As biometric authentication becomes an increasingly popular method of security among consumers, only three states currently have statutes detailing how such data may be collected, used, retained, and released. The Illinois Biometric Information Privacy Act is the only statute of the three that enshrines a private right of action for those who fail to properly handle biometric data. Both the Texas Capture or Use Biometric Identifier Act Information Act and the Washington Biometric Privacy Act allow for state Attorneys General to bring suit on behalf of aggrieved consumers. This Note examines these three statutes in the context of data security …
Empiricism And Privacy Policies In The Restatement Of Consumer Contract Law, Gregory Klass
Empiricism And Privacy Policies In The Restatement Of Consumer Contract Law, Gregory Klass
Georgetown Law Faculty Publications and Other Works
The Draft Restatement of the Law of Consumer Contracts includes a quantitative study of judicial decisions concerning businesses’ online privacy policies, which it cites in support of a claim that most courts treat privacy policies as contract terms. This Article reports an attempt to reproduce that study’s results. Using the Reporters’ data, this study was unable to reproduce their numerical findings. This study found in the data fewer relevant decisions, and a lower proportion of decisions supporting the Draft Restatement position. It also found little support for the Draft’s claim that there is a clear trend recognizing privacy policies as …