Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Privacy Law

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 166

Full-Text Articles in Social and Behavioral Sciences

Privacy Vs. Transparency: Handling Protected Materials In Agency Rulemaking, Christopher S. Yoo, Kellen Mccoy Dec 2020

Privacy Vs. Transparency: Handling Protected Materials In Agency Rulemaking, Christopher S. Yoo, Kellen Mccoy

Faculty Scholarship at Penn Law

Agencies conducting informal rulemaking proceedings increasingly confront conflicting duties with respect to protected materials included in information submitted in public rulemaking dockets. They must reconcile the broad commitment to openness and transparency reflected in federal law with the duty to protect confidential business information (CBI) and personally identifiable information (PII) against improper disclosure.

This Article presents an analysis of how agencies can best balance these often-countervailing considerations. Part I explores the statutory duties to disclose and withhold information submitted in public rulemaking dockets placed on agencies. It also examines judicial decisions and other legal interpretations regarding the proper way to ...


An Analysis Of Technological Components In Relation To Privacy In A Smart City, Kayla Rutherford, Ben Lands, A. J. Stiles Nov 2020

An Analysis Of Technological Components In Relation To Privacy In A Smart City, Kayla Rutherford, Ben Lands, A. J. Stiles

James Madison Undergraduate Research Journal (JMURJ)

A smart city is an interconnection of technological components that store, process, and wirelessly transmit information to enhance the efficiency of applications and the individuals who use those applications. Over the course of the 21st century, it is expected that an overwhelming majority of the world’s population will live in urban areas and that the number of wireless devices will increase. The resulting increase in wireless data transmission means that the privacy of data will be increasingly at risk. This paper uses a holistic problem-solving approach to evaluate the security challenges posed by the technological components that make up ...


The Internet Never Forgets: Image-Based Sexual Abuse And The Workplace, John Schriner, Melody Lee Rood Oct 2020

The Internet Never Forgets: Image-Based Sexual Abuse And The Workplace, John Schriner, Melody Lee Rood

Publications and Research

Image-based sexual abuse (IBSA), commonly known as revenge pornography, is a type of cyberharassment that often results in detrimental effects to an individual's career and livelihood. Although there exists valuable research concerning cyberharassment in the workplace generally, there is little written about specifically IBSA and the workplace. This chapter examines current academic research on IBSA, the issues with defining this type of abuse, victim blaming, workplace policy, and challenges to victim-survivors' redress. The authors explore monetary motivation for websites that host revenge pornography and unpack how the dark web presents new challenges to seeking justice. Additionally, this chapter presents ...


Compliance Management Systems: Do They Make A Difference?, Cary Coglianese, Jennifer Nash Aug 2020

Compliance Management Systems: Do They Make A Difference?, Cary Coglianese, Jennifer Nash

Faculty Scholarship at Penn Law

Regulatory compliance is vital for promoting the public values served by regulation. Yet many businesses remain out of compliance with some of the regulations that apply to them—presenting not only possible dangers to the public but also exposing themselves to potentially significant liability risk. Compliance management systems (CMSs) may help reduce the likelihood of noncompliance. In recent years, managers have begun using CMSs in an effort to address compliance issues in a variety of domains: environment, workplace health and safety, finance, health care, and aviation, among others. CMSs establish systematic, checklist-like processes by which managers seek to improve their ...


The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin Aug 2020

The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin

Open Educational Resources

Using episodes from the show Black Mirror as a study tool - a show that features tales that explore techno-paranoia - the course analyzes legal and policy considerations of futuristic or hypothetical case studies. The case studies tap into the collective unease about the modern world and bring up a variety of fascinating key philosophical, legal, and economic-based questions.


Privacy And Surveillance In The Workplace: Closing The Electronic Surveillance Gap, Christina Catenacci Jul 2020

Privacy And Surveillance In The Workplace: Closing The Electronic Surveillance Gap, Christina Catenacci

Electronic Thesis and Dissertation Repository

This dissertation argues that there is an electronic surveillance gap in the employment context in Canada, a gap that is best understood as an absence of appropriate legal provisions to regulate employers’ electronic surveillance of employees both inside and outside the workplace. This dissertation aims to identify and articulate principles and values that can be used to close the electronic surveillance gap in Canada and suggests that, through the synthesis of social theories of surveillance and privacy, together with analyses of privacy provisions and workplace privacy cases, a new and better workplace privacy regime can be designed. This dissertation uses ...


Surveillance Technology Toward A Dystopian Future, Sandy Hernandez Jul 2020

Surveillance Technology Toward A Dystopian Future, Sandy Hernandez

University Honors Program Senior Projects

There is a continual debate between individuals who attempt to measure the individual’s right to privacy against the government’s right to know as an exchange to provide for the security of all citizens. Questions that demand an answer are whether the individual’s right to privacy outweighs the government’s duty to provide security; and if security is considered more important, can there even be a right to privacy. When questioning the right to privacy and state surveillance, there are three key goals. First, to investigate whether the human right to privacy should exist, considering the continued threat ...


Youtube Is Unsafe For Children: Youtube's Safeguards And The Current Legal Framework Are Inadequate To Protect Children From Disturbing Content, Heather Wilson May 2020

Youtube Is Unsafe For Children: Youtube's Safeguards And The Current Legal Framework Are Inadequate To Protect Children From Disturbing Content, Heather Wilson

Seattle Journal of Technology, Environmental & Innovation Law

For America’s children, the amount of screen time they consume has not changed much over the years. Children under eight have steadily spent about two hours a day in front of a screen, with those under age two averaging 42 minutes a day. Children from low-income families spend roughly an hour and forty minutes longer in front of a screen. According to the American Academy of Pediatrics, screen time should be limited to two hours a day for children ages two to five; whereas, for those youngest children—under two years—they recommend zero screen time.

While the average ...


Ethics, Ai, Mass Data And Pandemic Challenges: Responsible Data Use And Infrastructure Application For Surveillance And Pre-Emptive Tracing Post-Crisis, Mark Findlay, Jia Yuan Loke, Nydia Remolina Leon, Yum Yin, Benjamin (Tan Renyan) Tham May 2020

Ethics, Ai, Mass Data And Pandemic Challenges: Responsible Data Use And Infrastructure Application For Surveillance And Pre-Emptive Tracing Post-Crisis, Mark Findlay, Jia Yuan Loke, Nydia Remolina Leon, Yum Yin, Benjamin (Tan Renyan) Tham

Research Collection School Of Law

As the COVID-19 health pandemic rages governments and private companies across the globe are utilising AI-assisted surveillance, reporting, mapping and tracing technologies with the intention of slowing the spread of the virus. These technologies have the capacity to amass personal data and share for community control and citizen safety motivations that empower state agencies and inveigle citizen co-operation which could only be imagined outside such times of real and present danger. While not cavilling with the short-term necessity for these technologies and the data they control, process and share in the health regulation mission, this paper argues that this infrastructure ...


The Data Market: A Proposal To Control Data About You, David Shaw, Daniel W. Engels Apr 2020

The Data Market: A Proposal To Control Data About You, David Shaw, Daniel W. Engels

SMU Data Science Review

The current legal and economic infrastructure facilitating data collection practices and data analysis has led to extreme over-collection of data and the overall loss of personal privacy. Data over-collection has led to a secondary market for consumer data that is invisible to the consumer and results in a person's data being distributed far beyond their knowledge or control. In this paper, we propose a Data Market framework and design for personal data management and privacy protection in which the individual controls and profits from the dissemination of their data. Our proposed Data Market uses a market-based approach utilizing blockchain ...


Screened Out Of Housing: The Impact Of Misleading Tenant Screening Reports And The Potential For Criminal Expungement As A Model For Effectively Sealing Evictions, Katelyn Polk Apr 2020

Screened Out Of Housing: The Impact Of Misleading Tenant Screening Reports And The Potential For Criminal Expungement As A Model For Effectively Sealing Evictions, Katelyn Polk

Northwestern Journal of Law & Social Policy

Having an eviction record “blacklists” tenants from finding future housing. Even renters with mere eviction filings—not eviction orders—on their records face the harsh collateral consequences of eviction. This Note argues that eviction records should be sealed at filing and only released into the public record if a landlord prevails in court. Juvenile record expungement mechanisms in Illinois serve as a model for one way to protect people with eviction records. Recent updates to the Illinois juvenile expungement process provided for the automatic expungement of certain records and strengthened the confidentiality protections of juvenile records. Illinois protects juvenile records ...


Privacy Or The Polls: Public Voter Registration Laws As A Modern Form Of Vote Denial, Audrey Paige Sauer Apr 2020

Privacy Or The Polls: Public Voter Registration Laws As A Modern Form Of Vote Denial, Audrey Paige Sauer

William & Mary Law Review

On May 11, 2017, President Donald J. Trump signed an executive order establishing the Presidential Advisory Commission on Election Integrity (PACEI), with the mission to “study the registration and voting processes used in Federal elections.” Pursuant to this mission, Vice Chair of the Commission, Kansas Secretary of State Kris Kobach, sent out letters to state election officials soliciting all “publicly available voter roll data,” including all registrants’ full first and last names, middle names or initials, addresses, dates of birth, political party, last four digits of Social Security numbers if available, voter history from 2006 onward, information regarding any felony ...


Governing The Internet: The Extraterritorial Effects Of The General Data Protection Regulation, Sasa Jovanovic Jan 2020

Governing The Internet: The Extraterritorial Effects Of The General Data Protection Regulation, Sasa Jovanovic

Honors Projects

The advent of the commercial Internet has introduced novel challenges to global governance because of the transnational nature of shared data flows, creating interdependence that may result in inter-state cooperation or competition. Data protection laws that are designed to ensure citizens’ right to privacy are one of the primary tool used by states to extend control over data flows. The European Union’s (EU) General Data Protection Regulation (2016) is widely regarded as the strongest data protection law in the world, and therefore may serve as a barrier to the openness of the Internet. The GDPR is both an instance ...


Privacidad Digital En Ecuador: El Papel De La Vigilancia, La Jurisprudencia Y Los Derechos Humanos, Giselle Valdez Oct 2019

Privacidad Digital En Ecuador: El Papel De La Vigilancia, La Jurisprudencia Y Los Derechos Humanos, Giselle Valdez

Independent Study Project (ISP) Collection

Este documento es un estudio de caso sobre la privacidad digital en Ecuador, cómo se protege y cómo se debe mejorar las protecciones. Comienzo presentando la falta de privacidad de la persona en Ecuador, a través de la reciente violación de datos y las tecnologías de vigilancia en todo el país desde China. Luego, para analizar la jurisprudencia y la falta de protección de la privacidad en la ley, hago la transición a un análisis legal de la privacidad de datos en Ecuador a través de la Constitución de 2008. Cuando establezco que falta privacidad digital en Ecuador, demuestro una ...


Towards Standard Information Privacy, Innovations Of The New General Data Protection Regulation, Ali Alibeigi, Abu Bakar Munir, Md Ershadulkarim, Adeleh Asemi Sep 2019

Towards Standard Information Privacy, Innovations Of The New General Data Protection Regulation, Ali Alibeigi, Abu Bakar Munir, Md Ershadulkarim, Adeleh Asemi

Library Philosophy and Practice (e-journal)

Protection of personal data in recent decades became more crucial affecting by emergence of the new technologies especially computer, internet, information and communications technology. However, Europeans felt this necessity at time and provided for up-to-date and supportive laws. The General Data Protection Regulation (GDPR) is the latest legislation in EU to protect personal data of individuals based on the recent technological advancements. However, its’ domestic and international output still is debatable. This doctrinal legal study by using descriptive methods, aimed to evaluate the GDPR through analyzing and interpreting its’ provisions by especial focus on its’ innovations. The results show that ...


Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick Jan 2019

Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick

Faculty Scholarship at Penn Law

Across the Internet, mistaken and malicious routing announcements impose significant costs on users and network operators. To make routing announcements more reliable and secure, Internet coordination bodies have encouraged network operators to adopt the Resource Public Key Infrastructure (“RPKI”) framework. Despite this encouragement, RPKI’s adoption rates are low, especially in North America.

This report presents the results of a year-long investigation into the hypothesis—widespread within the network operator community—that legal issues pose barriers to RPKI adoption and are one cause of the disparities between North America and other regions of the world. On the basis of interviews ...


Examining The Legality Of Employee Microchipping Under The Lens Of The Transhumanistic Proactionary Principle, Joshua Z. Wasbin Jan 2019

Examining The Legality Of Employee Microchipping Under The Lens Of The Transhumanistic Proactionary Principle, Joshua Z. Wasbin

Washington University Jurisprudence Review

Modern workplaces are beginning to look to implanting their

employees with RFID microchips as a replacement for badges and

keycards. While both employers and employees stand to benefit from the

convenience of this innovation, states have begun to look to legislative

options for restricting employers from requiring that their employees get

microchipped. This Note will examine some of the state legislation and

will argue that Congress must institute a federal law that will provide

similar, if not stronger, levels of protection for employees who seek to

avoid being microchipped, an argument premised upon the

Transhumanistic Proactionary Principle.


Privacy And The Internet Of Things: Why Changing Expectations Demand Heightened Standards, Graham Johnson Jan 2019

Privacy And The Internet Of Things: Why Changing Expectations Demand Heightened Standards, Graham Johnson

Washington University Jurisprudence Review

Entertainment consoles, wearable monitors, and security systems. For

better or worse, internet-connected devices are revolutionizing the

consumer products industry. Referred to broadly as the Internet of Things

(IoT), this ‘smart’ technology is drastically increasing the means, scope,

and frequency by which individuals communicate their personal

information. This Note explores the disruptive impact of IoT consumer

devices on the U.S.’s patchwork system of privacy protections. After

presenting a high-level survey of several key regulatory issues, this Note

argues that the proliferation of IoT devices exposes a fundamental flaw in

the Katz “reasonable expectation of privacy” standard. As individual

expectations ...


Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment's Third-Party Doctrine, Cristina Del Rosso Jan 2019

Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment's Third-Party Doctrine, Cristina Del Rosso

Honors Undergraduate Theses

The intent of this thesis is to examine the future of the third-party doctrine with the proliferation of technology and the online data we are surrounded with daily, specifically after the United States Supreme Court's decision in Carpenter v. United States. In order to better understand the Supreme Court's reasoning in that case, this thesis will review the history of the third-party doctrine and its roots in United States v. Miller and Smith v. Maryland. A review of Fourth Amendment history and jurisprudence is also crucial to this thesis, as it is imperative that individuals do not forfeit ...


Right To Privacy, A Complicated Concept To Review, Ali Alibeigi, Abu Bakar Munir, Md Ershadul Karim Jan 2019

Right To Privacy, A Complicated Concept To Review, Ali Alibeigi, Abu Bakar Munir, Md Ershadul Karim

Library Philosophy and Practice (e-journal)

The Concept and definition of the privacy has been changed during the time affecting by different factors. At the same time, the boundaries of privacy may differ from one place to another affecting by the culture, religion, etc. Nonetheless, there is not a unique general accepted definition for the privacy. Privacy has been considered from different disciplines like sociology, psychology, law and philosophy. It is a multidisciplinary domain, having an easy concept but difficult to define. However, by reviewing all different viewpoints, it can be concluded that privacy is an individual tendency, wish and natural need to be away from ...


Hardware, Heartware, Or Nightmare: Smart-City Technology And The Concomitant Erosion Of Privacy, Leila Lawlor Jan 2019

Hardware, Heartware, Or Nightmare: Smart-City Technology And The Concomitant Erosion Of Privacy, Leila Lawlor

Faculty Publications By Year

Smart city technology is being adopted in cities all around the world to simplify our lives, save us time, ease traffic, improve education, reduce energy usage and keep us safe. This article discusses smart city projects being utilized in crime prevention and investigations. Specifically, this article highlights examples of gunshot detection devices and surveillance that have led to improvements in public safety in Cape Town, Chicago and Atlanta, and discusses their impacts to privacy.


Facebook-Cambridge Analytica Data Harvesting: What You Need To Know, Ikhlaq Ur Rehman Jan 2019

Facebook-Cambridge Analytica Data Harvesting: What You Need To Know, Ikhlaq Ur Rehman

Library Philosophy and Practice (e-journal)

In 2018, it became public knowledge that millions of Facebook users’ data had been harvested without their consent. At the heart of the issue was Cambridge Analytica (CA) which in partnership with Cambridge researcher, Aleksandr Kogan harvested data from millions of Facebook profiles. Kogan had developed an application called “thisisyourdigitallife” which featured a personality quiz and CA paid for people to take it. The app recorded results of each quiz, collected data from quiz taker’s Facebook account such as personal information and Facebook activity (e.g., what content was “liked”) as well as their Facebook friends which led to ...


Protecting Consumers' Personal Data In The Digital World: Challenges And Changes, Man Yip Dec 2018

Protecting Consumers' Personal Data In The Digital World: Challenges And Changes, Man Yip

Research Collection School Of Law

At the Personal Data Protection Seminar 2017, Dr Yaacob Ibrahim, Minister for Communications and Information, said that Singapore must “aspire towards a high standard of data protection that strengthens trust with the public, gives confidence to customers whose data is collected and used, while providing an environment for companies to thrive in the digital economy”.


Law, Metaphor, And The Encrypted Machine, Lex Gill Sep 2018

Law, Metaphor, And The Encrypted Machine, Lex Gill

Osgoode Hall Law Journal

The metaphors we use to imagine, describe, and regulate new technologies have profound legal implications. This article offers a critical examination of the metaphors we choose to describe encryption technology and aims to uncover some of the normative and legal implications of those choices. The article begins with a basic technical backgrounder and reviews the main legal and policy problems raised by strong encryption. Then it explores the relationship between metaphor and the law, demonstrating that legal metaphor may be particularly determinative wherever the law seeks to integrate novel technologies into old legal frameworks. The article establishes a loose framework ...


The Surveillance Gap: The Harms Of Extreme Privacy And Data Marginalization, Michele Gilman, Rebecca Green Apr 2018

The Surveillance Gap: The Harms Of Extreme Privacy And Data Marginalization, Michele Gilman, Rebecca Green

Faculty Publications

We live in an age of unprecedented surveillance, enhanced by modern technology, prompting some to suggest that privacy is dead. Previous scholarship suggests that no subset of the population feels this phenomenon more than marginalized communities. Those who rely on public benefits, for example, must turn over personal information and submit to government surveillance far more routinely than wealthier citizens who enjoy greater opportunity to protect their privacy and the ready funds to secure it. This article illuminates the other end of the spectrum, arguing that many individuals who may value government and nonprofit services and legal protections fail to ...


How Different Are Young Adults From Older Adults When It Comes To Information Privacy Attitudes & Policies?, Chris Jay Hoofnagle, Jennifer King, Su Li, Joseph Turow Jan 2018

How Different Are Young Adults From Older Adults When It Comes To Information Privacy Attitudes & Policies?, Chris Jay Hoofnagle, Jennifer King, Su Li, Joseph Turow

Chris Jay Hoofnagle

Media reports teem with stories of young people posting salacious photos online, writing about alcohol-fueled misdeeds on social networking sites, and publicizing other ill-considered escapades that may haunt them in the future. These anecdotes are interpreted as representing a generation-wide shift in attitude toward information privacy. Many commentators therefore claim that young people “are less concerned with maintaining privacy than older people are.” Surprisingly, though, few empirical investigations have explored the privacy attitudes of young adults. This report is among the first quantitative studies evaluating young adults’ attitudes. It demonstrates that the picture is more nuanced than portrayed in the ...


The Federal Trade Commission And Consumer Privacy In The Coming Decade, Joseph Turow, Chris Jay Hoofnagle, Deirdre K. Mulligan, Nathaniel Good, Jens Grossklags Jan 2018

The Federal Trade Commission And Consumer Privacy In The Coming Decade, Joseph Turow, Chris Jay Hoofnagle, Deirdre K. Mulligan, Nathaniel Good, Jens Grossklags

Chris Jay Hoofnagle

The large majority of consumers believe that the term “privacy policy” describes a baseline level of information practices that protect their privacy. In short, “privacy,” like “free” before it, has taken on a normative meaning in the marketplace. When consumers see the term “privacy policy,” they believe that their personal information will be protected in specific ways; in particular, they assume that a website that advertises a privacy policy will not share their personal information. Of course, this is not the case. Privacy policies today come in all different flavors. Some companies make affirmative commitments not to share the personal ...


The Ecology Of Transparency Reloaded, Seth F. Kreimer Jan 2018

The Ecology Of Transparency Reloaded, Seth F. Kreimer

Faculty Scholarship at Penn Law

As Justice Stewart famously observed, "[t]he Constitution itself is neither a Freedom of Information Act nor an Official Secrets Act." What the Constitution's text omits, the last two generations have embedded in "small c" constitutional law and practice in the form of the Freedom of Information Act and a series of overlapping governance reforms including Inspectors General, disclosure of political contributions, the State Department’s “Dissent Channel,” the National Archives Information Security Oversight Office, and the publication rights guaranteed by New York Times v. United States. These institutions constitute an ecology of transparency.

The late Justice Scalia argued ...


Così Fan Tutte: A Better Approach Than The Right To Be Forgotten, Martha Garcia-Murillo, Ian Macinnes Dec 2017

Così Fan Tutte: A Better Approach Than The Right To Be Forgotten, Martha Garcia-Murillo, Ian Macinnes

School of Information Studies - Faculty Scholarship

In this article, we argue in favor of a macro-societal approach to protect people from the potential harms of personal information online. In the tension between information and privacy, “the right to be forgotten” is not an appropriate solution. Such a micro, individual-based answer puts the burden of protection on each person instead of on external entities that can abuse such knowledge. The personal responsibility to delete personal data is challenging because of the leakage of data that happens through the connections we have with others, many of whom do not share the same privacy preferences. We show that effective ...


The Sidis Case And The Origins Of Modern Privacy Law, Samantha Barbas Nov 2017

The Sidis Case And The Origins Of Modern Privacy Law, Samantha Barbas

Samantha Barbas

The American press, it’s been said, is freer to invade personal privacy than perhaps any other in the world. The tort law of privacy, as a shield against unwanted media exposure of private life, is very weak. The usual reason given for the weakness of U.S. privacy law as a bar on the publication of private information is the strong tradition of First Amendment freedom. But “freedom of the press” alone cannot explain why liberty to publish has been interpreted as a right to print truly intimate matters or to thrust people into the spotlight against their will ...