Regulating Mass Surveillance As Privacy Pollution: Learning From Environmental Impact Statements, A. Michael Froomkin
A. Michael Froomkin
US law has remarkably little to say about mass surveillance in public, a failure which has allowed the surveillance to grow at an alarming rate – a rate that is only set to increase. This article proposes ‘Privacy Impact Notices’ (PINs) — modeled on Environmental Impact Statements — as an initial solution to this problem.
Data collection in public (and in the home via public spaces) resembles an externality imposed on the person whose privacy is reduced involuntarily; it can also be seen as a market failure caused by an information asymmetry. Current doctrinal legal tools available to respond to the deployment of ...
Federal And State Authority For Network Neutrality And Broadband Regulation, 2014 SelectedWorks
Federal And State Authority For Network Neutrality And Broadband Regulation, Tejas N. Narechania
Tejas N. Narechania
For the second time in less than four years, the D.C. Circuit has rebuffed the Federal Communications Commission’s attempt at imposing network neutrality rules on internet traffic. But in so doing, the D.C. Circuit affirmed the FCC’s theory of jurisdiction based on section 706 of the Telecommunications Act of 1996. This ruling has the significant effect of transforming a questionable source of authority into what may become the Commission’s most significant font of regulatory power.
Surprisingly, section 706 seems to give the Commission the power to implement a slightly revised set of network neutrality rules ...
Finding The Foregone Conclusions Of Encryption, 2014 SelectedWorks
Finding The Foregone Conclusions Of Encryption, Timothy A. Wiseman
Timothy A Wiseman
Encryption is commonly used to protect private information, for both legitimate and illegitimate reasons. Courts have been struggling to determine when, within the bounds of the Fourth and Fifth Amendments, the Courts may compel a defendant in a criminal case to decrypt their data.
This article argues that a broad use of the Forgone Conclusion doctrine would permit the Courts to order a defendant to decrypt their data when the prosecution can show with reasonable particularity the existence and location of the encrypted documents, that they are likely to be incriminating, and that the government can authenticate them without the ...
Snopa And The Ppa: Do You Know What It Means For You? If Snopa (Social Networking Online Protection Act) Or Ppa (Password Protection Act) Do Not Pass, The Snooping Could Cause You Trouble, 2014 Hamline University
Snopa And The Ppa: Do You Know What It Means For You? If Snopa (Social Networking Online Protection Act) Or Ppa (Password Protection Act) Do Not Pass, The Snooping Could Cause You Trouble, Angela Goodrum
Hamline University's School of Law's Journal of Public Law and Policy
This article discusses the importance of passing the Social Networking Online Protection Act and the Password Protection Act to afford vital protection against discrimination in hiring and admission decisions. Existing laws fail to adequately provide protection against discrimination after the advent of social media. Furthermore, failure to provide to provide protection via federal laws will create a disparity in the protection afforded individuals across the United States.
Social media has introduced a new world of opportunities for sharing, networking, but it has also created ample opportunities for others to snoop around, discriminate, and base their hiring or admission decisions, in ...
Furtive Encryption: Power, Trust, And The Constitutional Cost Of Collective Surveillance, Jeffrey L. Vagle
Jeffrey L Vagle
Recent revelations of heretofore secret U.S. government surveillance programs have sparked national conversations about their constitutionality and the delicate balance between security and civil liberties in a constitutional democracy. Among the revealed policies asserted by the National Security Agency (NSA) is a provision found in the “minimization procedures” required under Section 702 of the Foreign Intelligence Surveillance Act of 1978. This provision allows the NSA to collect and keep indefinitely any encrypted information collected from domestic communications—including the communications of U.S. citizens. That is, according to the U.S. government, the mere fact that a U.S ...
Omnipresent Student Speech And The Schoolhouse Gate: Interpreting Tinker In The Digital Age, Watt L. Black Jr.
Watt L. Black Jr.
This paper focuses primarily on federal circuit level decisions regarding public school district's ability to discipline students who engage in electronic speech while off-campus and not involved in school activities. Particular attention is paid to the question of whether and how appeals courts have been willing to apply the "material and substantial disruption" standard from the Supreme Court's 1969 Tinker v. Des Moines decision to speech occurring off-campus. The paper, which is targeted toward both legal scholars and school administrators, draws together the common threads from the various circuits and weaves them into a set of guidelines for ...
How To Avoid The Death Of Your Case By Two Billion Paper Cuts: Encouraging Arbitration As An Alternative Way To Resolve Costly Discovery Disputes, Tzipora Goodfriend-Gelernter
Pepperdine Dispute Resolution Law Journal
This article analyzes the costly effect of electronic information on discovery practice and advocates for the arbitration of discovery disputes. Part II discusses the background of electronic discovery, the evolution of our reliance on ESI (electronically stored information) as part of our modern day discovery practice, and the benefits and detriments of electronic discovery. Part III discusses the effects of our reliance on electronic discovery and the implications of those effects on litigating parties. It examines how the increasingly computer-based world of discovery has increased the cost of litigation disputes significantly and proposes using the patent arbitration model as a ...
Is “Active Defense” A Viable Component Of The Corporate Cyber Security Panoply?, 2014 SelectedWorks
Is “Active Defense” A Viable Component Of The Corporate Cyber Security Panoply?, Sean L. Harrington
Sean L Harrington
Working draft explores contemporary "active defense" techniques in use by private organizations and the legal, regulatory, practical, and business risks associated with each.
Online Terms Of Service: A Shield For First Amendment Scrutiny Of Government Action, 2014 Notre Dame Law School
Online Terms Of Service: A Shield For First Amendment Scrutiny Of Government Action, Jacquelyn E. Fradette
Notre Dame Law Review
Part I of this Note will canvas popular opinions and perceptions about First Amendment rights on the Internet using examples of public outcry over recent instances of speech limitation. It will also discuss the state action doctrine generally and how the presence of this doctrine most likely renders certain popular public constitutional intuitions about the First Amendment erroneous.
Part II will provide an overview of how courts have taken an expansive and protective view of private ordering between online parties. It will discuss how courts have developed a robust freedom to contract jurisprudence in the Internet context. Because courts essentially ...
No Surfing Allowed: A Review And Analysis Of Legislation Prohibiting Employers From Demanding Access To Employees’ And Job Applicants’ Social Media Accounts, Robert Sprague
This article examines recent state legislation prohibiting employers from requesting username and password information from employees and job applicants in order to access restricted portions of those employees’ and job applicants’ personal social media accounts. This article raises the issue of whether this legislation is even needed, from both practical and legal perspectives, focusing on: (a) how prevalent the practice is of requesting employees’ and job applicants’ social media access information; (b) whether alternative laws already exist which prohibit employers from requesting employees’ and job applicants’ social media access information; and (c) whether any benefits can be derived from this ...
The Evolution Of The Digital Millennium Copyright Act; Changing Interpretations Of The Dmca And Future Implications For Copyright Holders, Hillary A. Henderson
Hillary A Henderson
Copyright law rewards an artificial monopoly to individual authors for their creations. This reward is based on the belief that, by granting authors the exclusive right to reproduce their works, they receive an incentive and means to create, which in turn advances the welfare of the general public by “promoting the progress of science and useful arts.”
Copyright protection subsists . . . in original works of authorship fixed in any tangible medium of expression, now known or later developed, from which they can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or device . . . . In no ...
Emerging Technologies And Dwindling Speech, 2014 Charleston School of Law
Emerging Technologies And Dwindling Speech, Jorge R. Roig
Jorge R Roig
Inspired in part by the recent holding in Bland v. Roberts that the use of the “Like” feature in Facebook is not covered by the Free Speech Clause, this article makes a brief foray into the approach that courts have taken in the recent past towards questions of First Amendment coverage in the context of emerging technologies. Specifically, this article will take a closer look at how courts have dealt with the issue of functionality in the context of First Amendment coverage of computer source code. The analysis of this and other recent experiences, when put in a larger context ...
Stymieing Controversy Over Generic Top-Level Domains (Gtlds) And Other Internet Governance Decisions With Content Neutrality, 2013 Seattle University School of Law
Stymieing Controversy Over Generic Top-Level Domains (Gtlds) And Other Internet Governance Decisions With Content Neutrality, Nafees Uddin
Seattle Journal for Social Justice
No abstract provided.
Discovering E-Discovery: A Resources Guide, 2013 University of Richmond
Discovering E-Discovery: A Resources Guide, Timothy L. Coggins
Law Faculty Publications
E-discovery refers to discovery in civil litigation that focuses on the exchange of information in electronic form. Lainie Crouch Kaiser, a litigation attorney with McDermott Will & Emery, writes that “e-Discovery can be used as an umbrella term for both the legal and operational considerations related to how electronically stored information (ESI) is used in the modern day practice of law.” There are many types of ESI, including e-mail and office documents, voicemail, photos, video, and databases. Attorneys and others who write about e-discovery also include “raw data” as discoverable information. Ronald J. Hedges of Nixon Peabody writes that “[t]echnically ...
What Do We Worry About When We Worry About Price Discrimination? The Law And Ethics Of Using Personal Information For Pricing, Akiva A. Miller
Akiva A Miller
New information technologies have dramatically increased sellers’ ability to engage in retail price discrimination. Debates over using personal information for price discrimination frequently treat it as a single problem, and are not sufficiently sensitive to the variety of price discrimination practices, the different kinds of information they require in order to succeed, and the different ethical concerns they raise. This paper explores the ethical and legal debate over regulating price discrimination facilitated by consumers’ personal information. Various kinds of “privacy remedies”—self-regulation, technological fixes, state regulation, and legislating private causes of legal action—each have their place. By drawing distinctions ...
Lo Que Siempre Quiso Saber Sobre... Nombres De Dominio Pero Nunca Se Atrevió A Preguntar, Rodolfo C. Rivas Rea Esq., Marco A. Vargas Iñiguez Esq.
Rodolfo C Rivas Rea
The authors provide a brief overview of the domain name system and its dispute resolution regulation. The authors then delve into the new gTLDs and tackle some of the questions brought forward by its imminent introduction. /////////////////////////////////////////////////////////////////////////////////////////////////////////////// Los autores ofrecen un panorama general del sistema de nombres de dominio y la regulación de sus procedimientos de solución de controversias. Posteriormente, los autores profundizan en los nuevos gTLDs y tratan de responder a algunas de las preguntas presentadas por su inminente introducción.
Should The Default Be "Social"? Canada's Pushback Against Oversharing By Facebook, 2013 University of Georgia School of Law
Should The Default Be "Social"? Canada's Pushback Against Oversharing By Facebook, Karen Tanenbaum
Georgia Journal of International & Comparative Law
No abstract provided.
The Uncharted Waters Of Cyberspace: Applying The Principles Of International Maritime Law To The Problem Of Cybersecurity, 2013 University of Georgia School of Law
The Uncharted Waters Of Cyberspace: Applying The Principles Of International Maritime Law To The Problem Of Cybersecurity, William M. Stahl
Georgia Journal of International & Comparative Law
No abstract provided.
E-Commerce And Electronic Payment System Risks: Lessons From Paypal, 2013 SelectedWorks
E-Commerce And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman
Lawrence J. Trautman Sr.
What are the major risks perceived by those engaged in e-commerce and electronic payment systems? What development risks, if they become reality, may cause substantial increases in operating costs or threaten the very survival of the enterprise?
This article utilizes the relevant annual report disclosures from eBay (parent of PayPal), along with other eBay and PayPal documents, as a potentially powerful teaching device. Most of the descriptive language to follow is excerpted directly from eBay’s regulatory filings. My additions include weaving these materials into a logical presentation and providing supplemental sources for those who desire a deeper look (usually ...
A New Approach To Digital Reader Privacy; State Regulations And Their Protection Of Digital Book Data, 2013 Maurer School of Law: Indiana University
A New Approach To Digital Reader Privacy; State Regulations And Their Protection Of Digital Book Data, Andrew A. Proia
Indiana Law Journal
No abstract provided.