Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (1847)
- Science and Technology Law (1577)
- Computer Law (1530)
- Intellectual Property Law (688)
- Constitutional Law (672)
-
- Health Law and Policy (449)
- Fourth Amendment (427)
- Criminal Law (375)
- First Amendment (357)
- Legislation (348)
- Criminal Procedure (344)
- International Law (326)
- Law and Society (321)
- Torts (321)
- State and Local Government Law (307)
- Human Rights Law (299)
- Administrative Law (294)
- Family Law (292)
- Supreme Court of the United States (290)
- Legal History (280)
- Courts (275)
- Jurisprudence (269)
- Communications Law (265)
- Marketing Law (264)
- Other Law (262)
- Consumer Protection Law (250)
- Public Law and Legal Theory (248)
- Transnational Law (247)
- Institution
-
- UIC School of Law (911)
- Schulich School of Law, Dalhousie University (302)
- Selected Works (193)
- University of Michigan Law School (169)
- Vanderbilt University Law School (143)
-
- Seattle University School of Law (135)
- Universitas Indonesia (123)
- University of Washington School of Law (105)
- The Catholic University of America, Columbus School of Law (96)
- Maurer School of Law: Indiana University (91)
- Boston University School of Law (81)
- Brooklyn Law School (81)
- University of Pennsylvania Carey Law School (67)
- University of Colorado Law School (61)
- University at Buffalo School of Law (56)
- New York Law School (54)
- University of Richmond (53)
- Washington and Lee University School of Law (53)
- American University Washington College of Law (46)
- William & Mary Law School (45)
- Notre Dame Law School (43)
- University of Maryland Francis King Carey School of Law (43)
- Brigham Young University Law School (42)
- West Virginia University (41)
- University of Kentucky (38)
- Fordham Law School (36)
- Roger Williams University (36)
- Chicago-Kent College of Law (35)
- University of Miami Law School (35)
- University of Georgia School of Law (31)
- Keyword
-
- Privacy (836)
- Surveillance (146)
- Fourth Amendment (145)
- Technology (144)
- Internet (108)
-
- Data protection (87)
- Data privacy (80)
- First Amendment (79)
- Data (75)
- Right to privacy (64)
- Privacy law (62)
- Right of privacy (61)
- Fourth amendment (58)
- Social media (57)
- Cybersecurity (52)
- Copyright (46)
- Privacy Law (46)
- Information (45)
- Big data (44)
- Law (40)
- European Union (39)
- GDPR (38)
- Artificial intelligence (37)
- Security (37)
- Confidentiality (35)
- Data security (34)
- FTC (34)
- Regulation (34)
- Abortion (33)
- Search (33)
- Publication Year
- Publication
-
- UIC John Marshall Journal of Information Technology & Privacy Law (777)
- Canadian Journal of Law and Technology (256)
- Faculty Scholarship (193)
- "Dharmasisya” Jurnal Program Magister Hukum FHUI (122)
- UIC Law Review (111)
-
- All Faculty Scholarship (94)
- Seattle University Law Review (90)
- Catholic University Journal of Law and Technology (84)
- Articles (74)
- Michigan Law Review (73)
- Articles by Maurer Faculty (55)
- Vanderbilt Journal of Entertainment & Technology Law (54)
- Publications (51)
- Washington Law Review (43)
- Faculty Publications (42)
- Vanderbilt Law Review (40)
- West Virginia Law Review (40)
- Articles, Book Chapters, & Popular Press (34)
- Buffalo Law Review (32)
- Journal Articles (32)
- Seattle Journal for Social Justice (29)
- Kentucky Law Journal (28)
- Law Faculty Scholarship (27)
- Vanderbilt Law School Faculty Publications (27)
- Touro Law Review (26)
- Articles & Chapters (25)
- BYU Law Review (25)
- Indiana Law Journal (25)
- NYLS Law Review (25)
- University of Michigan Journal of Law Reform (25)
- Publication Type
- File Type
Articles 61 - 90 of 4171
Full-Text Articles in Privacy Law
The Present And Future Of Ai Usage In The Banking And Financial Decision-Making Processes Within The Developing Indian Economy, Dr. Shouvik Kumar Guha, Bash Savage-Mansary, Dr. Navyajyoti Samanta
The Present And Future Of Ai Usage In The Banking And Financial Decision-Making Processes Within The Developing Indian Economy, Dr. Shouvik Kumar Guha, Bash Savage-Mansary, Dr. Navyajyoti Samanta
Indian Journal of Law and Technology
In course of this paper, the authors have soght to examine the extent to which technology based on artificial intelligence (AI) have made inroads into the banking and financial sectors of a developing economy like India. The paper begins with providing a contextual background to the adoption of such technology in the global financial arena. It then proceeds to identify and categorise the forms of AI currently being used in the Indian financial sector and also considers the different channels of operation where such technology is in vogue. The advantages of using such technology and the future goals for integrating …
Shields Up For Software, Derek E. Bambauer, Melanie J. Teplinsky
Shields Up For Software, Derek E. Bambauer, Melanie J. Teplinsky
UF Law Faculty Publications
This Article contends that the National Cybersecurity Strategy's software liability regime should incorporate two safe harbors. The first would shield software creators and vendors from liability for decisions related to design, implementation, and maintenance, as long as those choices follow enumerated best practices. The second—the “inverse safe harbor”—would have the opposite effect: coders and distributors who engaged in defined worst practices would automatically become liable. This Article explains the design, components, and justifications for these twin safe harbors. The software safe harbors are key parts of the overall design of the new liability regime and work in tandem with the …
Does Federal Law Ban Mailing Abortion Drugs? A Textual Analysis Of 18 U.S.C. § 1461, Peter Allevato
Does Federal Law Ban Mailing Abortion Drugs? A Textual Analysis Of 18 U.S.C. § 1461, Peter Allevato
Pepperdine Law Review
As the regulation of abortion availability returned to the States, many have grappled with so-called trigger laws: dormant laws that were set to take effect to restrict or ensure access to abortion should constitutional protection be revoked. While the federal government has no true trigger law, it does have long-unenforced laws prohibiting the mailing of “[e]very article or thing designed, adapted, or intended for producing abortion.” 18 U.S.C. § 1461 is an old law, and it has not been enforced for at least fifty years. But the law’s potential effect on the growing practice of mail-distribution of chemical abortion pills …
Our Changing Reality: The Metaverse And The Importance Of Privacy Regulations In The United States, Anushkay Raza
Our Changing Reality: The Metaverse And The Importance Of Privacy Regulations In The United States, Anushkay Raza
Global Business Law Review
This Note discusses the legal and pressing digital challenges that arise in connection with the growing use of virtual reality, and more specifically, the metaverse. As this digital realm becomes more integrated into our daily lives, the United States should look towards creating a federal privacy law that protects fundamental individual privacy rights. This Note argues that congress should emulate the European Union's privacy regulations, and further, balances the potential consequences and benefits of adapting European regulations within the United Sates. Finally, this Note provides drafting considerations of future lawyers who will not only be dealing with the rise of …
Brief Of Amici Curiae Privacy And First Amendment Law Professors In Support Of Defendant-Appellant And Reversal, G. S. Hans, Hannah Bloch-Wehba, Danielle K. Citron, Julie E. Cohen, Mary Anne Franks, Woodrow Hartzog, Margot E. Kaminski, Gregory P. Magarian, Frank Pasquale, Neil Richards, Daniel J. Solove
Brief Of Amici Curiae Privacy And First Amendment Law Professors In Support Of Defendant-Appellant And Reversal, G. S. Hans, Hannah Bloch-Wehba, Danielle K. Citron, Julie E. Cohen, Mary Anne Franks, Woodrow Hartzog, Margot E. Kaminski, Gregory P. Magarian, Frank Pasquale, Neil Richards, Daniel J. Solove
Faculty Scholarship
STATEMENT OF INTEREST: Amici curiae are law professors and scholars of data privacy, constitutional law, and the First Amendment. Amici write to provide the court with scholarly expertise on the complexities of data privacy law and its intersection with the First Amendment. Amici have collectively written scores of academic articles and multiple books on data privacy, technology, the First Amendment, and constitutional challenges to state and federal privacy regulation.
Amici submit this brief pursuant to Fed. Rule App. P. 29(a) and do not repeat arguments made by the parties. No party’s counsel authored this brief, or any part of …
Enhanced Privacy-Enabled Face Recognition Using Κ-Identity Optimization, Ryan Karl
Enhanced Privacy-Enabled Face Recognition Using Κ-Identity Optimization, Ryan Karl
Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research
Facial recognition is becoming more and more prevalent in the daily lives of the common person. Law enforcement utilizes facial recognition to find and track suspects. The newest smartphones have the ability to unlock using the user's face. Some door locks utilize facial recognition to allow correct users to enter restricted spaces. The list of applications that use facial recognition will only increase as hardware becomes more cost-effective and more computationally powerful. As this technology becomes more prevalent in our lives, it is important to understand and protect the data provided to these companies. Any data transmitted should be encrypted …
Perlindungan Hukum Bagi Pembeli Terhadap Gugatan Pembatalan Jual Beli Tanah Oleh Para Ahli Waris Penjual, M Waldi Ali Soraya, Lauditta Humaira ,S.H.,M.Kn.
Perlindungan Hukum Bagi Pembeli Terhadap Gugatan Pembatalan Jual Beli Tanah Oleh Para Ahli Waris Penjual, M Waldi Ali Soraya, Lauditta Humaira ,S.H.,M.Kn.
Lex Patrimonium
In the implementation of the Sale and Purchase Binding Agreement Deed, a dispute may occur. For example, if the land being sold is an inheritance. For example, one of the sellers does not approve of the sale and purchase, or the land is sold by someone who is not an heir. Of course the buyer will be disadvantaged. The aim of the research is to find out the legal provisions governing the unilateral cancellation of the PPJB, to explain the determination of unlawful acts and to analyze the legal protection for buyers in land sale and purchase agreements which are …
Why (And How) The Constitution Should Protect Prisoners From Gratuitous Disclosure Of Their Hiv/Aids Status, Dillon Schweers
Why (And How) The Constitution Should Protect Prisoners From Gratuitous Disclosure Of Their Hiv/Aids Status, Dillon Schweers
William & Mary Law Review
This Note is not the first to advocate for prisoners’ constitutional privacy rights concerning their HIV/AIDS status, but it is the first to focus on isolated incidents of disclosure rather than general policies that tend to lead to disclosure like mandatory testing or segregation based on HIV/AIDS status. This Note argues that the Fourteenth Amendment’s Due Process Clause should protect prisoners from isolated disclosures, meaning prisoners should have a § 1983 cause of action against guards or other prison officials who disclose their HIV/AIDS status in a gratuitous manner.
[...]
The proceeding section of this Note, Part I, details the …
Breaking The Fourth's Wall: The Implications Of Remote Education For Students' Fourth Amendment Rights, Sallie Hatfield
Breaking The Fourth's Wall: The Implications Of Remote Education For Students' Fourth Amendment Rights, Sallie Hatfield
Vanderbilt Journal of Entertainment & Technology Law
As the COVID-19 pandemic forced both public K-12 and higher education institutions to transition to exclusively provide remote education, students’ homes and personal lives were exposed to the government like never before. Zoom classes and remote proctoring were suddenly the norm. Students and their families scrambled to create appropriate offices and classroom spaces in their homes, and many awkward and invasive scenarios soon followed. While many may have been harmlessly captured on camera, like classes that witness a student’s family eating lunch in the background or a dog on the couch, even these harmless instances have insidious implications for the …
“Take Your Pictures, Leave Your (Digital) Footprints”: Increasing Privacy Protections For Children On Social Media, Kodie Mcginley
“Take Your Pictures, Leave Your (Digital) Footprints”: Increasing Privacy Protections For Children On Social Media, Kodie Mcginley
Golden Gate University Law Review
As the digital sphere becomes more prevalent in people’s lives, Congress has tried to keep up. First created in 1998, the Children’s Online Privacy Protection Act (COPPA) requires operators of websites directed at children to obtain consent from parents before collecting any personal information from children. COPPA also requires that operators take reasonable measures to protect the confidentiality of any personal information collected about children. Although COPPA has helped regulate online spaces, its focus is on regulating websites that collect personal information directly from children. This focus leaves a gap in the law that ignores personal data shared on social …
Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim
Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim
Journal of Cybersecurity Education, Research and Practice
This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity resilience. Cameroon's cybersecurity legal framework provides for audits but does not explicitly enumerate controls. Consequently, integrating relevant controls from the NIST frameworks and ISO Standards can improve the cybersecurity posture in Cameroon while waiting for a comprehensive revision of the legal framework. NIST and ISO are internationally recognized as best practices in information …
Privacy Harm And Non-Compliance From A Legal Perspective, Suvineetha Herath, Haywood Gelman, Lisa Mckee
Privacy Harm And Non-Compliance From A Legal Perspective, Suvineetha Herath, Haywood Gelman, Lisa Mckee
Journal of Cybersecurity Education, Research and Practice
In today's data-sharing paradigm, personal data has become a valuable resource that intensifies the risk of unauthorized access and data breach. Increased data mining techniques used to analyze big data have posed significant risks to data security and privacy. Consequently, data breaches are a significant threat to individual privacy. Privacy is a multifaceted concept covering many areas, including the right to access, erasure, and rectify personal data. This paper explores the legal aspects of privacy harm and how they transform into legal action. Privacy harm is the negative impact to an individual as a result of the unauthorized release, gathering, …
Privacy And National Politics: Fingerprint And Dna Litigation In Japan And The United States Compared, Dongsheng Zang
Privacy And National Politics: Fingerprint And Dna Litigation In Japan And The United States Compared, Dongsheng Zang
Pace Law Review
No abstract provided.
Table Of Contents, Seattle University Law Review
Table Of Contents, Seattle University Law Review
Seattle University Law Review
Table of Contents
Direct To Consumer Or Direct To All: Home Dna Tests And Lack Of Privacy Regulations In The United States, Karen J. Kukla
Direct To Consumer Or Direct To All: Home Dna Tests And Lack Of Privacy Regulations In The United States, Karen J. Kukla
IP Theory
Although the U.S. has some measures of privacy protection for genetic data, the lack of a comprehensive approach to protecting direct-to-consumer genetic testing results in privacy violations for both consumers and their relatives. This essay explores the critical need for the U.S. government to address these privacy violations and argues that the U.S. should approach the problem and strategize a solution similar to the European Union’s (EU) General Data Protection Regulation (GDPR). Part I identifies current United States law, both federal and state regulations that address DTC-GT and genetic privacy. Part II examines the lack of regulation surrounding current DTC-GT …
A Miscarriage Of Justice: How Femtech Apps And Fog Data Evade Fourth Amendment Privacy Protections, Rachel Silver
A Miscarriage Of Justice: How Femtech Apps And Fog Data Evade Fourth Amendment Privacy Protections, Rachel Silver
Washington and Lee Journal of Civil Rights and Social Justice
After the fall of Roe v. Wade, states across the country have enacted extreme abortion bans. Anti-abortion states, emboldened by their new, unrestricted power to regulate women’s bodies, are only broadening the scope of abortion prosecutions. And modern technology provides law enforcement with unprecedented access to women’s most intimate information, including, for example, their menstrual cycle, weight, body temperature, sexual activity, mood, medications, and pregnancy details. Fourth Amendment law fails to protect this sensitive information stored on femtech apps from government searches. In a largely unregulated private market, femtech apps sell health and location data to third parties like Fog …
Confronting Carpenter: Rethinking The Third-Party Doctrine And Location Information, Charlie Brownstein
Confronting Carpenter: Rethinking The Third-Party Doctrine And Location Information, Charlie Brownstein
Fordham Law Review
The third-party doctrine enables law enforcement officers to obtain personal information shared with third parties without a warrant. In an era of highly accessible technology, individuals’ location information is consistently being transmitted to third parties. Due to the third-party doctrine, this shared information has been available to law enforcement, without the individual knowing or having an opportunity to challenge this availability. Law enforcement has utilized this doctrine to obtain comprehensive information regarding individuals’ whereabouts over long periods of time.
The U.S. Supreme Court recently limited the reach of the third-party doctrine regarding location data held by cellphone providers. However, this …
Twenty Years After Krieger V Law Society Of Alberta: Law Society Discipline Of Crown Prosecutors And Government Lawyers, Andrew Flavelle Martin
Twenty Years After Krieger V Law Society Of Alberta: Law Society Discipline Of Crown Prosecutors And Government Lawyers, Andrew Flavelle Martin
Articles, Book Chapters, & Popular Press
Krieger v. Law Society of Alberta held that provincial and territorial law societies have disciplinary jurisdiction over Crown prosecutors for conduct outside of prosecutorial discretion. The reasoning in Krieger would also apply to government lawyers. The apparent consensus is that law societies rarely exercise that jurisdiction. But in those rare instances, what conduct do Canadian law societies discipline Crown prosecutors and government lawyers for? In this article, I canvass reported disciplinary decisions to demonstrate that, while law societies sometimes discipline Crown prosecutors for violations unique to those lawyers, they often do so for violations applicable to all lawyers — particularly …
Continuous Reproductive Surveillance, Michael Ulrich, Leah R. Fowler
Continuous Reproductive Surveillance, Michael Ulrich, Leah R. Fowler
Faculty Scholarship
The Dobbs opinion emphasizes that the state’s interest in the fetus extends to “all stages of development.” This essay briefly explores whether state legislators, agencies, and courts could use the “all stages of development” language to expand reproductive surveillance by using novel developments in consumer health technologies to augment those efforts.
Constitutional Confidentiality, Natalie Ram, Jorge L. Contreras, Laura M. Beskow, Leslie E. Wolf
Constitutional Confidentiality, Natalie Ram, Jorge L. Contreras, Laura M. Beskow, Leslie E. Wolf
Washington and Lee Law Review
Federal Certificates of Confidentiality (“Certificates”) protect sensitive information about human research subjects from disclosure and use in judicial, administrative, and legislative proceedings at both the state and federal levels. When they were first authorized by Congress in the 1970s, Certificates covered sensitive information collected in research about drug addiction use. Today, however, they extend to virtually all personal information gathered by biomedical research studies. The broad reach of Certificates, coupled with their power to override state subpoenas and warrants issued in the context of law enforcement, abortion regulation, and other police powers typically under state control, beg the question whether …
Stay Out Of My Head: Neurodata, Privacy, And The First Amendment, Wayne Unger
Stay Out Of My Head: Neurodata, Privacy, And The First Amendment, Wayne Unger
Washington and Lee Law Review
The once science-fictional idea of mind-reading is within reach as advancements in brain-computer interfaces, coupled with advanced artificial intelligence, produce neurodata—the collection of substantive thoughts as storable and processable data. But government access to individuals’ neurodata threatens personal autonomy and the right to privacy. While the Fourth Amendment is traditionally considered the source of privacy protections against government intrusion, the First Amendment provides more robust protections with respect to whether governments can access one’s substantive ideas, thoughts, and beliefs. However, many theorists assert that the concept of privacy conflicts with the First Amendment because privacy restricts the flow of information …
The Eyes Beyond The Screen: Digital Media Policy And Child Health, Yahia Al-Qudah
The Eyes Beyond The Screen: Digital Media Policy And Child Health, Yahia Al-Qudah
Research Symposium
Background: Modern communication technology and digital media have provided society with a foundation for instant messaging. Pictures, videos, and texts connect individuals with families, friends, and the world. Consequently, digital media has accelerated exposure to risk in which children and adolescents are most vulnerable. This project’s objective is to 1) congregate and highlight current knowledge about the impact of digital media on child health, and 2) underline deficiencies in related laws and regulations as well as offer solutions in digital media policy.
Methods: A systematic literature review was conducted through the JAMA Pediatrics database with keywords such as “digital media,” …
Keep Your Fingerprints To Yourself: New York Needs A Biometric Privacy Law, Brendan Mcnerney
Keep Your Fingerprints To Yourself: New York Needs A Biometric Privacy Law, Brendan Mcnerney
St. John's Law Review
(Excerpt)
Imagine walking into a store, picking something up, and just walking out. No longer is this shoplifting, it is legal. In 2016, Amazon introduced their “Just Walk Out” technology in Seattle. “Just Walk Out” uses cameras located throughout the store to monitor shoppers, document what they pick up, and automatically charge that shoppers’ Amazon account when they leave the store. Recently, Amazon started selling “Just Walk Out” technology to other retailers. Since then, retailers have become increasingly interested in collecting and using customers’ “biometric identifiers and information.” Generally, “biometrics” is used to refer to “measurable human biological and behavioral …
Accept All Cookies: Opting-In To A Comprehensive Federal Data Privacy Framework And Opting-Out Of A Disparate State Regulatory Regime, Lauren A. Di Lella
Accept All Cookies: Opting-In To A Comprehensive Federal Data Privacy Framework And Opting-Out Of A Disparate State Regulatory Regime, Lauren A. Di Lella
Villanova Law Review
No abstract provided.
Information Leaking And The United States Supreme Court, Chad Marzen, Michael Conklin
Information Leaking And The United States Supreme Court, Chad Marzen, Michael Conklin
Brigham Young University Journal of Public Law
No abstract provided.
A Trusted Framework For Cross-Border Data Flows, Alex Joel
A Trusted Framework For Cross-Border Data Flows, Alex Joel
Joint PIJIP/TLS Research Paper Series
The German Marshall Fund of the United States (GMF), in cooperation with the Tech, Law and Security Program (TLS) of the American University Washington College of Law, and with support from Microsoft, convened a Global Taskforce to Promote Trusted Sharing of Data comprising experts from civil society, academia, and industry to submit proposals for harmonizing approaches to global data use and sharing. Former US Ambassador to the Organisation for Economic Co-operation and Development (OECD) and GMF Distinguished Fellow Karen Kornbluh and Microsoft Chief Privacy Officer and Corporate Vice President Julie Brill co-chaired the taskforce; TLS Senior Project Director Alex Joel …
A Sleeping Giant: Mhelath Applications, The Gdpr, And The Need For Federal Privacy Regulation In The United States, Kali Peeples
A Sleeping Giant: Mhelath Applications, The Gdpr, And The Need For Federal Privacy Regulation In The United States, Kali Peeples
Notre Dame Journal on Emerging Technologies
An analysis of privacy regulation concerning mHealth apps is a multifaceted process that requires the examination of changes within not only the healthcare space but also the technological world, as well as the legislative history and intent of various nations.The main issue being addressed in this paper is whether the United States should create nationwide legislation that directly relates to mHealth data protection or continue with a self-regulatory method. Part I focuses on the development and rapid creation of mHealth apps within the past decade. Part II seeks to illustrate the distinct privacy concerns of mHealth apps by concentrating on …
Deep Dive Into Deepfakes—Safeguarding Our Digital Identity, Yi Yan
Deep Dive Into Deepfakes—Safeguarding Our Digital Identity, Yi Yan
Brooklyn Journal of International Law
Deepfake technology is becoming increasingly sophisticated, and with it, the potential to pose a significant threat to the digital community, democratic institutions, and private individuals. With the creation of highly convincing but entirely fabricated audio, video, and images, there is a pressing need for the international community to address the vulnerabilities posed by deepfake technology in the current legal landscape through unambiguous legislation. This Note explores the ethical, legal, and social implications of deepfakes, including issues of privacy, identity theft, and political manipulation. It also reviews existing international legal frameworks, i.e., the Convention on Cybercrime (“Budapest Convention”) and proposes a …
Battling Baby Brokers: A Comparative Analysis Of The United States’ Versus Europe’S Adoption Policies, Amanda P. Gonzales
Battling Baby Brokers: A Comparative Analysis Of The United States’ Versus Europe’S Adoption Policies, Amanda P. Gonzales
Brooklyn Journal of International Law
Child adoption involves the permanent transfer of parental rights from a child’s biological or legal parents to another party. Parties in the Unites States (US) have engaged in this process in various forms for centuries. Today, over one hundred thousand children are adopted by American families each year. Many of these adoptions take place privately through agencies. An agency assists in the process of matching prospective adoptive parents with birth parents from whom they will adopt a child. In exchange for this assistance, the prospective adoptive parents pay tens of thousands of dollars in fees and expenses to the agency …
Complying With New And Existing Biometric Data Privacy Laws, Ariel Latzer
Complying With New And Existing Biometric Data Privacy Laws, Ariel Latzer
The Journal of Business, Entrepreneurship & the Law
After providing an overview of the history behind biometric information, this article will discuss the Illinois Biometric Privacy Act (BIPA)—which laid the foundation for biometric privacy regulations in the United States—and then discuss the California Consumer Privacy Act (CCPA) and its amendments in the California Privacy Rights Act (CPRA). It will also briefly touch on biometric information regulations in other states and then delve into how some notable companies are currently using individuals’ biometric information to give readers a general idea of what is happening to their personal information and highlight areas businesses should take note of in order to …