Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2,367 Full-Text Articles 2,320 Authors 714,965 Downloads 117 Institutions

All Articles in Privacy Law

Faceted Search

2,367 full-text articles. Page 1 of 59.

Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick 2019 University of Pennsylvania Law School

Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick

Faculty Scholarship at Penn Law

Across the Internet, mistaken and malicious routing announcements impose significant costs on users and network operators. To make routing announcements more reliable and secure, Internet coordination bodies have encouraged network operators to adopt the Resource Public Key Infrastructure (“RPKI”) framework. Despite this encouragement, RPKI’s adoption rates are low, especially in North America.

This report presents the results of a year-long investigation into the hypothesis—widespread within the network operator community—that legal issues pose barriers to RPKI adoption and are one cause of the disparities between North America and other regions of the world. On the basis of interviews ...


Predictability For Privacy In Data Driven Government, Jordan Blanke, Janine Hiller 2019 Mercer University

Predictability For Privacy In Data Driven Government, Jordan Blanke, Janine Hiller

Minnesota Journal of Law, Science & Technology

No abstract provided.


Deepfakes: False Pornography Is Here And The Law Cannot Protect You, Douglas Harris 2019 Duke Law

Deepfakes: False Pornography Is Here And The Law Cannot Protect You, Douglas Harris

Duke Law & Technology Review

It is now possible for anyone with rudimentary computer skills to create a pornographic deepfake portraying an individual engaging in a sex act that never actually occurred. These realistic videos, called “deepfakes,” use artificial intelligence software to impose a person’s face onto another person’s body. While pornographic deepfakes were first created to produce videos of celebrities, they are now being generated to feature other nonconsenting individuals—like a friend or a classmate. This Article argues that several tort doctrines and recent non-consensual pornography laws are unable to handle published deepfakes of non-celebrities. Instead, a federal criminal statute prohibiting ...


A Constitutional Hope: An Alternative Approach To The Right Of Privacy And Marijuana Laws Using Argentina As An Example, Kevin E. Szmuc 2018 University of Miami Law School

A Constitutional Hope: An Alternative Approach To The Right Of Privacy And Marijuana Laws Using Argentina As An Example, Kevin E. Szmuc

University of Miami International and Comparative Law Review

No abstract provided.


Cybersecurity, Shareholders, And The Boardroom: An Analysis Of Current And Proposed Measures For Protecting Corporate Intellectual Property, Kathryn V. Wymer 2018 University of Georgia School of Law

Cybersecurity, Shareholders, And The Boardroom: An Analysis Of Current And Proposed Measures For Protecting Corporate Intellectual Property, Kathryn V. Wymer

Journal of Intellectual Property Law

No abstract provided.


A Duty To Safeguard: Data Breach Litigation Through A Quasi-Bailment Lens, Miles Christian Skedvold 2018 University of Georgia School of Law

A Duty To Safeguard: Data Breach Litigation Through A Quasi-Bailment Lens, Miles Christian Skedvold

Journal of Intellectual Property Law

No abstract provided.


Privacy Localism, Ira S. Rubinstein 2018 University of Washington School of Law

Privacy Localism, Ira S. Rubinstein

Washington Law Review

Privacy law scholarship often focuses on domain-specific federal privacy laws and state efforts to broaden them. This Article provides the first comprehensive analysis of privacy regulation at the local level (which it dubs “privacy localism”), using recently enacted privacy laws in Seattle and New York City as principal examples. Further, this Article attributes the rise of privacy localism to a combination of federal and state legislative failures and three emerging urban trends: the role of local police in federal counterterrorism efforts; smart city and open data initiatives; and demands for local police reform in the wake of widely reported abusive ...


Privacy's Double Standards, Scott Skinner-Thompson 2018 University of Washington School of Law

Privacy's Double Standards, Scott Skinner-Thompson

Washington Law Review

Where the right to privacy exists, it should be available to all people. If not universally available, then privacy rights should be particularly accessible to marginalized individuals who are subject to greater surveillance and are less able to absorb the social costs of privacy violations. But in practice, there is evidence that people of privilege tend to fare better when they bring privacy tort claims than do non-privileged individuals. This disparity occurs despite doctrine suggesting that those who occupy prominent and public social positions are entitled to diminished privacy tort protections. This Article unearths disparate outcomes in public disclosure tort ...


Dialing It Back: Why Courts Should Rethink Students’ Privacy And Speech Rights As Cell Phone Communications Erode The ‘Schoolhouse Gate’, Nicholas J. McGuire 2018 Duke Law

Dialing It Back: Why Courts Should Rethink Students’ Privacy And Speech Rights As Cell Phone Communications Erode The ‘Schoolhouse Gate’, Nicholas J. Mcguire

Duke Law & Technology Review

The ubiquity of cell phones in today’s society has forced courts to change or dismiss established, but inapplicable analytical frameworks. Two such frameworks in the school setting are regulations of student speech and of student searches. This Article traces the constitutional jurisprudence of both First Amendment off-campus speech protection and Fourth Amendment search standards as applied to the school setting. It then analyzes how the Supreme Court’s ruling in Riley v. California complicates both areas. Finally, it proposes a pragmatic solution: by recognizing a categorical First Amendment exception for “substantial threats” against the school community, courts could accommodate ...


Dean's Desk: Iu Maurer Programs Supporting Careers In Cybersecurity, Austen L. Parrish 2018 Indiana University Maurer School of Law

Dean's Desk: Iu Maurer Programs Supporting Careers In Cybersecurity, Austen L. Parrish

Austen Parrish (2014-)

A recent Bureau of Labor Statistics report estimated a near 30 percent growth in coming years for information security professionals, far outpacing most other job types. While Indiana University has long recognized the importance of data security and privacy, multiple new initiatives are ensuring that the next generation of chief information security officers, systems analysts, privacy professionals and others will come from our law school.

One of the ways the law school is leading the way is through the university’s new master of science in cybersecurity risk management. That degree program combines the resources of three of IU’s ...


Revenge Porn, Thomas Lonardo, Tricia P. Martland, Rhode Island Bar Journal 2018 Roger Williams University

Revenge Porn, Thomas Lonardo, Tricia P. Martland, Rhode Island Bar Journal

Life of the Law School (1993- )

No abstract provided.


Clark Cty. Sch. Dist. V. Las Vegas Review Journal, Nev. Adv. Op. 84 (Oct. 25, 2018) (En Banc), Edgar Cervantes 2018 University of Nevada, Las Vegas -- William S. Boyd School of Law

Clark Cty. Sch. Dist. V. Las Vegas Review Journal, Nev. Adv. Op. 84 (Oct. 25, 2018) (En Banc), Edgar Cervantes

Nevada Supreme Court Summaries

The Court determined that the interest of individuals who participate in an internal investigation by a state agency regarding the inappropriate behavior of an elected official should be considered before publishing their identity or identifying information on public records. The Court adopted the Cameranesi test to determine the scope of redactions of names of persons identified in an investigative report with nontrivial privacy claims.


Pub. Emps.’ Ret. Sys. Of Nev., A Pub. Agency V. Nev. Pol’Y Res. Inst. Inc., 134 Nev. Adv. Op. 81 (Oct. 18, 2018) (En Banc), Daniel Brady 2018 University of Nevada, Las Vegas -- William S. Boyd School of Law

Pub. Emps.’ Ret. Sys. Of Nev., A Pub. Agency V. Nev. Pol’Y Res. Inst. Inc., 134 Nev. Adv. Op. 81 (Oct. 18, 2018) (En Banc), Daniel Brady

Nevada Supreme Court Summaries

The Court determined that the Nevada Public Records Act requires the government agency to disclose the requested information if: (1) it can be found by searching a database for existing information, (2) it is readily accessible and not confidential, and (3) the alleged risks of disclosure do not outweigh the benefits of the public’s interest in the records.


Mining For Children’S Data In Today’S Digital World, Damin Park 2018 Pepperdine University

Mining For Children’S Data In Today’S Digital World, Damin Park

Journal of the National Association of Administrative Law Judiciary

No abstract provided.


The New Family Freedom, Emily J. Stolzenberg 2018 Columbia Law School

The New Family Freedom, Emily J. Stolzenberg

Boston College Law Review

In family law, “autonomy” has traditionally meant freedom from state interference in one’s intimate life. This Article describes an emergent, libertarian vision of autonomy as property rights that also demands freedom from other family members. This conception, “choice about obligations,” holds redistribution of resources between intimates to be illegitimate unless the richer party “chose” to take on financial obligations ex ante by ceremonially marrying or formally contracting. But as more people conduct their intimate lives outside these legal institutions, choice about obligations increasingly collides with another, more fundamental, family law principle: the imperative to “privatize dependency,” i.e., to ...


Workplace Privacy In The Age Of Social Media, Tess Traylor-Notaro 2018 Cleveland-Marshall College of Law

Workplace Privacy In The Age Of Social Media, Tess Traylor-Notaro

The Global Business Law Review

This note addresses the lack of adequate protections in Ohio for social media privacy laws in the workplace and compares proposed legislation in Ohio to legislation that has passed in other states. It examines the provision of the SCA including the definition of "user" and whether social media sites fall under its umbrella. It also looks at the safeguards and limitations of the SCA and how it is used to protect a private employee’s social media account. It analyzes the state statutory laws in Arkansas, Illinois, and California passed specifically to prevent employers from requesting passwords to personal Internet ...


Consumer Law Immersion, Kevin M. McDonald, Karl Hochkammer, Steven Wernikoff 2018 Cleveland State University

Consumer Law Immersion, Kevin M. Mcdonald, Karl Hochkammer, Steven Wernikoff

The Global Business Law Review

As part of Washington University School of Law’s (WashULaw) Online Master of Legal Studies (MLS) program, students attend optional weekend immersion courses at the law school in St. Louis in both the spring and fall. We recently taught a course on consumer law over the spring 2018 weekend session held on March 23-25, 2018. In attendance were twenty-two students, most of whom were enrolled in the MLS program. Several were foreign lawyers and one was an LL.M. student. This article summarizes our three-day experience and concludes with our key learnings that incorporate feedback we received from students both ...


Privacy Regulation In The Age Of Biometrics That Deal With A New World Order Of Information, Michael Monajemi 2018 University of Miami Law School

Privacy Regulation In The Age Of Biometrics That Deal With A New World Order Of Information, Michael Monajemi

University of Miami International and Comparative Law Review

No abstract provided.


Rwu First Amendment Blog: David Logan's Blog: Discovering Trump 06-22-2018, David A. Logan 2018 Roger Williams University School of Law

Rwu First Amendment Blog: David Logan's Blog: Discovering Trump 06-22-2018, David A. Logan

Law School Blogs

No abstract provided.


Brief Of Amicus Curiae, In Re Opinions & Orders Of This Court Addressing Bulk Collection Of Data Under The Foreign Intelligence Surveillance Act, No. Misc. 13-08 (Fisa Ct. June 13, 2018), Laura K. Donohue 2018 Georgetown University Law

Brief Of Amicus Curiae, In Re Opinions & Orders Of This Court Addressing Bulk Collection Of Data Under The Foreign Intelligence Surveillance Act, No. Misc. 13-08 (Fisa Ct. June 13, 2018), Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

No abstract provided.


Digital Commons powered by bepress