Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Privacy Law (73)
- Internet Law (43)
- Computer Law (26)
- Fourth Amendment (24)
- Communications Law (18)
-
- Intellectual Property Law (16)
- International Law (16)
- Constitutional Law (12)
- National Security Law (12)
- Law and Society (10)
- Other Law (10)
- European Law (9)
- Health Law and Policy (9)
- Commercial Law (8)
- Law Enforcement and Corrections (8)
- Torts (8)
- Civil Law (7)
- Criminal Law (7)
- Criminal Procedure (7)
- First Amendment (7)
- Marketing Law (7)
- Supreme Court of the United States (7)
- Comparative and Foreign Law (6)
- Consumer Protection Law (6)
- Public Law and Legal Theory (6)
- State and Local Government Law (6)
- Transnational Law (6)
- Administrative Law (5)
- Institution
-
- University of Michigan Law School (17)
- The Catholic University of America, Columbus School of Law (13)
- Seattle University School of Law (8)
- Pepperdine University (7)
- University of Miami Law School (7)
-
- Cleveland State University (6)
- Schulich School of Law, Dalhousie University (5)
- American University Washington College of Law (4)
- Maurer School of Law: Indiana University (4)
- Chicago-Kent College of Law (3)
- Florida International University College of Law (3)
- Case Western Reserve University School of Law (2)
- Duke Law (2)
- Embry-Riddle Aeronautical University (2)
- Georgia State University College of Law (2)
- Penn State Dickinson Law (2)
- University of Massachusetts School of Law (2)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (2)
- Vanderbilt University Law School (2)
- Brooklyn Law School (1)
- California State University, San Bernardino (1)
- DePaul University (1)
- Mitchell Hamline School of Law (1)
- New York Law School (1)
- Northwestern Pritzker School of Law (1)
- Notre Dame Law School (1)
- Southern Methodist University (1)
- St. John's University School of Law (1)
- St. Mary's University (1)
- Touro University Jacob D. Fuchsberg Law Center (1)
- Publication Year
- Publication
-
- Catholic University Journal of Law and Technology (12)
- Michigan Telecommunications & Technology Law Review (9)
- Seattle University Law Review (8)
- Canadian Journal of Law and Technology (5)
- Michigan Law Review (4)
-
- Pepperdine Law Review (4)
- American University National Security Law Brief (3)
- Chicago-Kent Law Review (3)
- Cleveland State Law Review (3)
- FIU Law Review (3)
- Journal of the National Association of Administrative Law Judiciary (3)
- University of Miami Law Review (3)
- Dickinson Law Review (2017-Present) (2)
- Duke Law & Technology Review (2)
- Georgia State University Law Review (2)
- Global Business Law Review (2)
- IP Theory (2)
- Journal of Law, Technology, & the Internet (2)
- Nevada Law Journal (2)
- University of Massachusetts Law Review (2)
- University of Miami Business Law Review (2)
- University of Miami Inter-American Law Review (2)
- Vanderbilt Journal of Entertainment & Technology Law (2)
- American University Law Review (1)
- Brooklyn Journal of International Law (1)
- Catholic University Law Review (1)
- DePaul Journal of Art, Technology & Intellectual Property Law (1)
- Indiana Journal of Global Legal Studies (1)
- Indiana Law Journal (1)
- International Journal of Aviation, Aeronautics, and Aerospace (1)
Articles 1 - 30 of 110
Full-Text Articles in Science and Technology Law
The Post-Dobbs Reality: Privacy Expectations For Period-Tracking Apps In Criminal Abortion Prosecutions, Sophie L. Nelson
The Post-Dobbs Reality: Privacy Expectations For Period-Tracking Apps In Criminal Abortion Prosecutions, Sophie L. Nelson
Pepperdine Law Review
The Supreme Court’s decision to overturn Roe v. Wade and Planned Parenthood v. Casey in June 2022 was met with waves of both support and criticism throughout the United States. Several states immediately implemented or began drafting trigger laws that criminalize seeking and providing an abortion. These laws prompted several period-tracking app companies to encrypt their users’ data to make it more difficult for the government to access period- and pregnancy-related information for criminal investigations. This Comment explores whether the Fourth Amendment and U.S. privacy statutes protect users of period-tracking apps from government surveillance. More specifically, this Comment argues that …
Personal Data And Vaccination Hesitancy: Covid-19’S Lessons For Public Health Federalism, Charles D. Curran
Personal Data And Vaccination Hesitancy: Covid-19’S Lessons For Public Health Federalism, Charles D. Curran
Catholic University Law Review
During the COVID-19 vaccination campaign, the federal government adopted a more centralized approach to the collection of public health data. Although the states previously had controlled the storage of vaccination information, the federal government’s Operation Warp Speed plan required the reporting of recipients’ personal information on the grounds that it was needed to monitor the safety of novel vaccines and ensure correct administration of their multi-dose regimens.
Over the course of the pandemic response, this more centralized federal approach to data collection added a new dimension to pre-existing vaccination hesitancy. Requirements that recipients furnish individual information deterred vaccination among undocumented …
Our Changing Reality: The Metaverse And The Importance Of Privacy Regulations In The United States, Anushkay Raza
Our Changing Reality: The Metaverse And The Importance Of Privacy Regulations In The United States, Anushkay Raza
Global Business Law Review
This Note discusses the legal and pressing digital challenges that arise in connection with the growing use of virtual reality, and more specifically, the metaverse. As this digital realm becomes more integrated into our daily lives, the United States should look towards creating a federal privacy law that protects fundamental individual privacy rights. This Note argues that congress should emulate the European Union's privacy regulations, and further, balances the potential consequences and benefits of adapting European regulations within the United Sates. Finally, this Note provides drafting considerations of future lawyers who will not only be dealing with the rise of …
Direct To Consumer Or Direct To All: Home Dna Tests And Lack Of Privacy Regulations In The United States, Karen J. Kukla
Direct To Consumer Or Direct To All: Home Dna Tests And Lack Of Privacy Regulations In The United States, Karen J. Kukla
IP Theory
Although the U.S. has some measures of privacy protection for genetic data, the lack of a comprehensive approach to protecting direct-to-consumer genetic testing results in privacy violations for both consumers and their relatives. This essay explores the critical need for the U.S. government to address these privacy violations and argues that the U.S. should approach the problem and strategize a solution similar to the European Union’s (EU) General Data Protection Regulation (GDPR). Part I identifies current United States law, both federal and state regulations that address DTC-GT and genetic privacy. Part II examines the lack of regulation surrounding current DTC-GT …
Encouraging Public Access To Pharmaceuticals Through Modified Protection Of Clinical Trial Data, Scott M. Nolan Ii
Encouraging Public Access To Pharmaceuticals Through Modified Protection Of Clinical Trial Data, Scott M. Nolan Ii
IP Theory
Part I of this Article investigates the development of pharmaceuticals and clinical trial data with a focus on patent and data protection. Part II evaluates the effects of protection and the challenges it poses to widespread public pharmaceutical access. Part III discusses two scholarly approaches to the public access issue that focus on clinical data protection and their associated challenges. In light of these scholarly works, Part IV suggests a new approach to clinical trial data protection that aims to improve public pharmaceutical access while maintaining the incentives to invent for drug developers.
Aclu V. Clearview Ai, Inc.,, Isra Ahmed
Aclu V. Clearview Ai, Inc.,, Isra Ahmed
DePaul Journal of Art, Technology & Intellectual Property Law
No abstract provided.
A Loaded God Complex: The Unconstitutionality Of The Executive Branch’S Unilaterally Withholding Zero-Days, Brendan Gilligan
A Loaded God Complex: The Unconstitutionality Of The Executive Branch’S Unilaterally Withholding Zero-Days, Brendan Gilligan
Northwestern Journal of Technology and Intellectual Property
No abstract provided.
Standing Up To Hackers: Article Iii Standing For Victims Of Data Breaches, Kendall Coffey
Standing Up To Hackers: Article Iii Standing For Victims Of Data Breaches, Kendall Coffey
University of Miami Law Review
Despite the increasing amount of data breaches, there is no liability for parties who do not adequately protect victim’s information. In federal court, plaintiffs must show that their injury was concrete, particularized, and imminent. But, when plaintiffs’ information has been stolen, but not yet criminally used, they may be unable to establish a right to relief. Victims face challenges when seeking damage for this future harm, because despite their destroyed privacy, they may not have evidence of a perpetrator’s actual misuse of purloined data. This Article analyzes multiple court decisions, generally in the setting of class-actions, and discusses outcomes of …
Letter Form The Editor, Wayne Rash, Iii
Letter Form The Editor, Wayne Rash, Iii
American University National Security Law Brief
In our last issue of The National Security Law Brief, Vol. 13, No. 1, we highlighted the dynamism that makes National Security Law such an exciting field. In this issue, No. 2, we continue with the dynamism theme. National security law is a field in constant change that often leaves us questioning how these changes will shape the law.
The Need For An Australian Regulatory Code For The Use Of Artificial Intelligence (Ai) In Military Application, Sascha-Dominik Dov Bachmann, Richard V. Grant
The Need For An Australian Regulatory Code For The Use Of Artificial Intelligence (Ai) In Military Application, Sascha-Dominik Dov Bachmann, Richard V. Grant
American University National Security Law Brief
Artificial Intelligence (AI) is enabling rapid technological innovation and is ever more pervasive, in a global technological eco-system lacking suitable governance and absence of regulation over AI-enabled technologies. Australia is committed to being a global leader in trusted secure and responsible AI and has escalated the development of its own sovereign AI capabilities. Military and Defence organisations have similarly embraced AI, harnessing advantages for applications supporting battlefield autonomy, intelligence analysis, capability planning, operations, training, and autonomous weapons systems. While no regulation exists covering AI-enabled military systems and autonomous weapons, these platforms must comply with International Humanitarian Law, the Law of …
Hanging In The Balance: An Assessment Of European Versus American Data Privacy Laws And Threats To U.S. National Security, Dara Paleski
Hanging In The Balance: An Assessment Of European Versus American Data Privacy Laws And Threats To U.S. National Security, Dara Paleski
American University National Security Law Brief
Social media has quickly become an integral part of modern-day life, keeping the world connected to friends, family and current events. Social media, and the data collected from it, also play a crucial role in intelligence gathering and the safeguarding of national security. It is estimated that about 80-95% of information that is collected for intelligence missions is found freely throughout the internet or other publicly available sources. This type of information has been dubbed SOCMINT (Social Media Intelligence) and it has become a crucial tool within the intelligence community. After the Edward Snowden leaks in 2013 revealed a global …
Forensic Microbiome Evidence: Fourth Amendment Applications And Court Acceptance, Trason Lasley
Forensic Microbiome Evidence: Fourth Amendment Applications And Court Acceptance, Trason Lasley
Catholic University Journal of Law and Technology
No abstract provided.
One Size Does Not Fit All: How The California Privacy Rights Act Will Not Improve Employee Data Collection And Privacy Rights, Kayla N. Bushey
One Size Does Not Fit All: How The California Privacy Rights Act Will Not Improve Employee Data Collection And Privacy Rights, Kayla N. Bushey
Catholic University Journal of Law and Technology
No abstract provided.
Inadequate Privacy: The Necessity Of Hipaa Reform In A Post-Dobbs World, Katherine Robertson
Inadequate Privacy: The Necessity Of Hipaa Reform In A Post-Dobbs World, Katherine Robertson
Seattle University Law Review
Part I of this Comment will provide an overview of HIPAA and the legal impacts of Dobbs. Part II will discuss the anticipatory response to the impacts of Dobbs on PHI by addressing the response from (1) the states, (2) the Biden Administration, and (3) the medical field. Part III will discuss the loopholes that exist in HIPAA and further address the potential impacts on individuals and the medical field if reform does not occur. Finally, Part IV will argue that the reform of HIPAA is the best avenue for protecting PHI related to reproductive healthcare.
Supervision Of Artificial Intelligence In The Eu And The Protection Of Privacy, Johanna Chamberlain, Jane Reichel
Supervision Of Artificial Intelligence In The Eu And The Protection Of Privacy, Johanna Chamberlain, Jane Reichel
FIU Law Review
No abstract provided.
The Development Of Digital Mass Surveillance In Norway: The Emergence Of A Surveillance State?, Iris Nguyên Duy
The Development Of Digital Mass Surveillance In Norway: The Emergence Of A Surveillance State?, Iris Nguyên Duy
FIU Law Review
No abstract provided.
Calculated Privacy: Tech Meets Law & Law Meets Tech, Tobias J. Oechtering, Sara Saeidian, Cecilia Magnusson Sjöberg
Calculated Privacy: Tech Meets Law & Law Meets Tech, Tobias J. Oechtering, Sara Saeidian, Cecilia Magnusson Sjöberg
FIU Law Review
No abstract provided.
Ethical Ai In American Policing, Elizabeth E. Joh
Ethical Ai In American Policing, Elizabeth E. Joh
Notre Dame Journal on Emerging Technologies
We know there are problems in the use of artificial intelligence in policing, but we don’t quite know what to do about them. One can also find many reports and white papers today offering principles for the responsible use of AI systems by the government, civil society organizations, and the private sector. Yet, largely missing from the current debate in the United States is a shared framework for thinking about the ethical and responsible use of AI that is specific to policing. There are many AI policy guidance documents now, but their value to the police is limited. Simply repeating …
Transcript: Presentation On Artificial Intelligence And Discrimination In Healthcare, Sharona Hoffman
Transcript: Presentation On Artificial Intelligence And Discrimination In Healthcare, Sharona Hoffman
Journal of Law and Health
The following is a transcription from The Digital Health and Technology Symposium presented at Cleveland-Marshall College of Law by The Journal of Law & Health on Friday, April 8, 2022. This transcript has been lightly edited for clarity.
Flattening The Curve While Protecting Our Right To Privacy: How The United States Can Implement The Digital Contract Tracing Efforts Used In East Asia, Evan Morris
Global Business Law Review
This paper looks at the digital contact tracing efforts implemented by other nations and assesses how similar measures could operate under enacted and proposed United States laws. Part I overviews the history of contact tracing and its effectiveness in prior disease outbreaks. Part II delves into the digital contact tracing efforts implemented by South Korea and Singapore. These summaries include: the digital contact tracing efforts taken, the laws that authorize these efforts, the public’s reception, and the overall effectiveness of the efforts. Part III overviews the digital contact tracing efforts in the United States, including proposed legislation aimed at user …
Privacy Frameworks For Smart Cities, Lindsey Tonsager, Jayne Ponder
Privacy Frameworks For Smart Cities, Lindsey Tonsager, Jayne Ponder
Journal of Law and Mobility
This paper identifies some of the core privacy considerations raised by smart cities – government surveillance and data security in Part I. Then, Part II proposes a set of core principles for smart cities to consider in the development and deployment of smart cities to address privacy concerns. These principles include: (A) human-centric approaches to smart cities design and implementation, (B) transparency for city residents, (C) privacy by design, (D) anonymization and deidentification, (E) data minimization and purpose specification, (F) trusted data sharing, and (G) cybersecurity resilience.
The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine
The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine
Catholic University Journal of Law and Technology
No abstract provided.
Passcodes, Protection, And Legal Practicality: The Necessity Of A Digital Fifth Amendment, Ethan Swierczewski
Passcodes, Protection, And Legal Practicality: The Necessity Of A Digital Fifth Amendment, Ethan Swierczewski
Catholic University Journal of Law and Technology
No abstract provided.
A New Reality: Deepfake Technology And The World Around Us, Molly Mullen
A New Reality: Deepfake Technology And The World Around Us, Molly Mullen
Mitchell Hamline Law Review
No abstract provided.
A Proportionality-Based Framework For Government Regulation Of Digital Tracing Apps In Times Of Emergency, Sharon Bassan
A Proportionality-Based Framework For Government Regulation Of Digital Tracing Apps In Times Of Emergency, Sharon Bassan
Dickinson Law Review (2017-Present)
Times of emergency present an inherent conflict between the public interest and the preservation of individual rights. Such times require granting emergency powers to the government on behalf of the public interest and relaxing safeguards against government actions that infringe rights. The lack of theoretical framework to assess governmental decisions in times of emergency leads to a polarized and politicized discourse about potential policies, and often, to public distrust and lack of compliance.
Such a discourse was evident regarding Digital Tracing Apps (“DTAs”), which are apps installed on cellular phones to alert users that they were exposed to people who …
Delineating The Legal Framework For Data Protection: A Fundamental Rights Approach Or Data Propertization?, Efe Lawrence Ogbeide
Delineating The Legal Framework For Data Protection: A Fundamental Rights Approach Or Data Propertization?, Efe Lawrence Ogbeide
Canadian Journal of Law and Technology
The Charter of Fundamental Rights of the European Union, like other key legal instruments around the globe, grants citizens the right to privacy in Article 7. The Charter, however, further provides for the right to data protection in Article 8. Simply put, the implication of Article 8 of the Charter is that the right to data protection is a fundamental right. The central question in this article is whether data protection indeed qualifies to be categorized as a fundamental right. If not, what other approach(es) to data protection may be implemented?
Use Of Unmanned Aircraft Systems And Regulatory Landscape: Unravelling The Future Challenges In The High Sky, K Kirthan Shenoy, Divya Tyagi
Use Of Unmanned Aircraft Systems And Regulatory Landscape: Unravelling The Future Challenges In The High Sky, K Kirthan Shenoy, Divya Tyagi
International Journal of Aviation, Aeronautics, and Aerospace
The individuals on the ground nowadays often observe objects distantly hover over the sky, which raises the question of who might be operating the object or what the object might record. Unmanned Aircraft Systems (UAS) or Drones today have quickly penetrated civilian, military, and commercial sectors. The drones or UAS, with the advancement of technology, are now capable of traversing long distances, having long endurance, and having multipurpose functionality. The UAS industry is fast expanding, with trade investment touching the billion-dollar mark in flourishing economies. The advent of the Covid 19 pandemic saw a steep rise in the use of …
Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion
Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion
Dickinson Law Review (2017-Present)
No abstract provided.
Alexa Hears With Her Little Ears—But Does She Have The Privilege?, Lauren Chlouber Howell
Alexa Hears With Her Little Ears—But Does She Have The Privilege?, Lauren Chlouber Howell
St. Mary's Law Journal
Abstract forthcoming.
New Technology And The Right To Privacy: Do E-Scooters Implicate The Fourth Amendment?, Alexander P. Carroll
New Technology And The Right To Privacy: Do E-Scooters Implicate The Fourth Amendment?, Alexander P. Carroll
Journal of the National Association of Administrative Law Judiciary
The Fourth Amendment protects individual’s right to privacy from unwarranted searches and seizures, but the analysis for when the Fourth Amendment applies has become more complicated as new technology is developed. E-scooters are a new piece of technology which may implicate the Fourth Amendment. Cities across the country are beginning to require the mobility companies which provide e-scooter services to turn over location data in order to receive an operating permit. This article first provides a background of the Fourth Amendment, then provides details regarding the new city regulations. The article includes a discussion of the privacy concerns as well …