Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2,894 Full-Text Articles 2,756 Authors 991,885 Downloads 123 Institutions

All Articles in Privacy Law

Faceted Search

2,894 full-text articles. Page 1 of 78.

The Ftc And Ai Governance: A Regulatory Proposal, Michael Spiro 2020 Seattle University School of Law

The Ftc And Ai Governance: A Regulatory Proposal, Michael Spiro

Seattle Journal of Technology, Environmental & Innovation Law

No abstract provided.


Sharenting And The (Potential) Right To Be Forgotten, Keltie Haley 2020 Indiana University, Maurer School of Law

Sharenting And The (Potential) Right To Be Forgotten, Keltie Haley

Indiana Law Journal

Part I of this Note serves as an evaluation of parental use of social media and

further seeks to draw attention to the social and developmental impact parental

oversharing can have on children. Part II examines the tension between parents’

constitutional rights to direct the upbringing of their children, as well as their First

Amendment interest in online expression, and their children’s interest in personal

data security and privacy. Part III provides an overview of the European Union’s

right to be forgotten framework in the sharenting context and considers the

plausibility of implementing such a framework in the ...


Ethical Implications Of Forensic Genealogy In Criminal Cases, Solana Lund 2020 Pepperdine University

Ethical Implications Of Forensic Genealogy In Criminal Cases, Solana Lund

The Journal of Business, Entrepreneurship & the Law

The use of forensic genealogy to solve criminal cases is likely to increase in the coming years, especially given its success in solving cold cases. While its potential for good is impressive, there are also legitimate ethical concerns that need to be addressed. As society sees an increase in the use of forensic genealogy and DTC databases in criminal investigations as well as an increase in the media attention it garners, there will be more discussion regarding ethical implications. Legal scholars say that it is only a matter of time before courts weigh in on the privacy of DNA and ...


Adapting U.S. Electronic Surveillance Laws, Policies, And Practices To Reflect Impending Technological Developments, Eric Manpearl 2020 The Catholic University of America, Columbus School of Law

Adapting U.S. Electronic Surveillance Laws, Policies, And Practices To Reflect Impending Technological Developments, Eric Manpearl

Catholic University Law Review

Intelligence collection must always evolve to meet technological developments. While the collection programs under Section 702 of the FISA Amendments Act of 2008 have produced a great deal of valuable intelligence over the last decade, the United States must begin to think about foreseeable technological developments and strategically consider how to conduct signals intelligence (SIGINT) collection in the future.

This Article identifies four technological trends that could significantly impact the way the United States conducts SIGINT. Individuals now have access to sophisticated technologies that formerly only governments seemed capable of creating, and this decentralization of capabilities will likely only increase ...


Revisiting The “Private Use Exception” To Canada’S Child Pornography Laws: Teenage Sexting, Sex-Positivity, Pleasure, And Control In The Digital Age, Lara Karaian, Dillon Brady 2020 Institute of Criminology and Criminal Justice, Carleton University

Revisiting The “Private Use Exception” To Canada’S Child Pornography Laws: Teenage Sexting, Sex-Positivity, Pleasure, And Control In The Digital Age, Lara Karaian, Dillon Brady

Osgoode Hall Law Journal

In R v Sharpe, the Supreme Court of Canada read in a “private use exception” to the offence of possessing child pornography. The Court reasoned that youths’ self-created expressive material and private recordings of lawful sexual activity—created by, or depicting the accused and held by the accused exclusively for private use—would pose little or no risk to children and may in fact be of significance to adolescent self-fulfillment, self-actualization, sexual exploration, and identity. Fundamental changes in the technological, social, sexual, and legal landscape since Sharpe have resulted in a lack of clarity regarding the exception’s scope. Federal ...


Compliance Management Systems: Do They Make A Difference?, Cary Coglianese, Jennifer Nash 2020 University of Pennsylvania Law School

Compliance Management Systems: Do They Make A Difference?, Cary Coglianese, Jennifer Nash

Faculty Scholarship at Penn Law

Regulatory compliance is vital for promoting the public values served by regulation. Yet many businesses remain out of compliance with some of the regulations that apply to them—presenting not only possible dangers to the public but also exposing themselves to potentially significant liability risk. Compliance management systems (CMSs) may help reduce the likelihood of noncompliance. In recent years, managers have begun using CMSs in an effort to address compliance issues in a variety of domains: environment, workplace health and safety, finance, health care, and aviation, among others. CMSs establish systematic, checklist-like processes by which managers seek to improve their ...


Youtube Is Unsafe For Children: Youtube's Safeguards And The Current Legal Framework Are Inadequate To Protect Children From Disturbing Content, Heather Wilson 2020 Seattle University School of Law

Youtube Is Unsafe For Children: Youtube's Safeguards And The Current Legal Framework Are Inadequate To Protect Children From Disturbing Content, Heather Wilson

Seattle Journal of Technology, Environmental & Innovation Law

For America’s children, the amount of screen time they consume has not changed much over the years. Children under eight have steadily spent about two hours a day in front of a screen, with those under age two averaging 42 minutes a day. Children from low-income families spend roughly an hour and forty minutes longer in front of a screen. According to the American Academy of Pediatrics, screen time should be limited to two hours a day for children ages two to five; whereas, for those youngest children—under two years—they recommend zero screen time.

While the average ...


Cryptocurrencies' Revolt Against The Bsa: Why The Supreme Court Should Hold That The Bank Secrecy Act Violates The Fourth Amendment, Jeremy Ciarabellini 2020 Seattle University School of Law

Cryptocurrencies' Revolt Against The Bsa: Why The Supreme Court Should Hold That The Bank Secrecy Act Violates The Fourth Amendment, Jeremy Ciarabellini

Seattle Journal of Technology, Environmental & Innovation Law

The Bank Secrecy Act (BSA) creates a Hobson’s choice: one must either struggle to function in modern society without a bank account or submit to financial surveillance by the government. Both choices result in drastic consequences.


The Deliberative-Privacy Principle: Abortion, Free Speech, And Religious Freedom, B. Jessie Hill 2020 William & Mary Law School

The Deliberative-Privacy Principle: Abortion, Free Speech, And Religious Freedom, B. Jessie Hill

William & Mary Bill of Rights Journal

No abstract provided.


Healthy Data Protection, Lothar Determann 2020 Freie Universität Berlin

Healthy Data Protection, Lothar Determann

Michigan Technology Law Review

Modern medicine is evolving at a tremendous speed. On a daily basis, we learn about new treatments, drugs, medical devices, and diagnoses. Both established technology companies and start-ups focus on health-related products and services in competition with traditional healthcare businesses. Telemedicine and electronic health records have the potential to improve the effectiveness of treatments significantly. Progress in the medical field depends above all on data, specifically health information. Physicians, researchers, and developers need health information to help patients by improving diagnoses, customizing treatments and finding new cures.

Yet law and policymakers are currently more focused on the fact that health ...


Exploring Lawful Hacking As A Possible Answer To The "Going Dark" Debate, Carlos Liguori 2020 Yale Law School

Exploring Lawful Hacking As A Possible Answer To The "Going Dark" Debate, Carlos Liguori

Michigan Technology Law Review

The debate on government access to encrypted data, popularly known as the “going dark” debate, has intensified over the years. On the one hand, law enforcement authorities have been pushing for mandatory exceptional access mechanisms on encryption systems in order to enable criminal investigations of both data in transit and at rest. On the other hand, both technical and industry experts argue that this solution compromises the security of encrypted systems and, thus, the privacy of their users. Some claim that other means of investigation could provide the information authorities seek without weakening encryption, with lawful hacking being one of ...


What Consumers Don’T Know They’Re Giving Away (Data And Privacy Concerns), Bayleigh Reeves 2020 University of Arkansas, Fayetteville

What Consumers Don’T Know They’Re Giving Away (Data And Privacy Concerns), Bayleigh Reeves

Marketing Undergraduate Honors Theses

The modern world leverages technology and information captured by it in ways the inventors of these technologies likely never imagined. Phones and other devices are gathering information about consumers in the background when they do not even realize it. Pew Research Center found that about 77% of Americans own a smartphone and 88% use the internet. This mass access to technology and information tracking raises many privacy concerns. Basic demographic information is being tracked as well as more in-depth information like shopping tendencies, financial information, and information about known associates. While most of this data is being used for marketing ...


The Common Law Of Cyber Trespass, Michael J. O'Connor 2020 Brooklyn Law School

The Common Law Of Cyber Trespass, Michael J. O'Connor

Brooklyn Law Review

Right now, if executives in California and Virginia each bribe a competitor’s disloyal employee to steal a trade secret from the competitor’s servers, under the federal Computer Fraud and Abuse Act (CFAA), the Government can charge one executive but not the other. Courts decide these cases differently due to the widening circuit split over the CFAA term “without authorization.” Neither the Supreme Court nor Congress has shown interest in resolving the split over authorization. Even more concerning is the suggestion that they can’t resolve it; the statute addresses too many potential scenarios for a single definition to ...


Family Secrets And Relational Privacy: Protecting Not-So-Personal, Sensitive Information From Public Disclosure, J. Lyn Entrikin 2020 William H. Bowen School of Law, University of Arkansas Little Rock

Family Secrets And Relational Privacy: Protecting Not-So-Personal, Sensitive Information From Public Disclosure, J. Lyn Entrikin

University of Miami Law Review

This Article seeks to map contemporary relational privacy issues in the context of the evolving “right of privacy” in the United States. Generally, the Article explains why the so-called “personal” right of informational privacy, whatever its legal foundations, cannot be realistically confined to an individual right given the dramatic scientific and technological developments in the twenty-first century. In particular, the Article proposes that both state and federal law must grapple with the inherently relational nature of privacy interests with respect to DNA profiles, which inherently implicate the privacy interests of one’s biological relatives, whether known or unknown.

Part I ...


The Data Market: A Proposal To Control Data About You, David Shaw, Daniel W. Engels 2020 Southern Methodist University

The Data Market: A Proposal To Control Data About You, David Shaw, Daniel W. Engels

SMU Data Science Review

The current legal and economic infrastructure facilitating data collection practices and data analysis has led to extreme over-collection of data and the overall loss of personal privacy. Data over-collection has led to a secondary market for consumer data that is invisible to the consumer and results in a person's data being distributed far beyond their knowledge or control. In this paper, we propose a Data Market framework and design for personal data management and privacy protection in which the individual controls and profits from the dissemination of their data. Our proposed Data Market uses a market-based approach utilizing blockchain ...


A Section-By-Section Analysis Of Maine's Freedom Of Access Act, Anne C. Lucey 2020 University of Maine School of Law

A Section-By-Section Analysis Of Maine's Freedom Of Access Act, Anne C. Lucey

Maine Law Review

There seems to be no absolute freedom of information. Even President Lyndon B. Johnson's declaration made on July 4, 1966, as he signed the Freedom of Information Act (FOIA) into law, indicates the limitations accompanying most right-to-know laws from their inception. A delicate balance must be struck between the public's access to public business and the public interest, between the public's access and a person's right to privacy, and, at the federal level, between the public's access and national security. Maine also crafted a limited freedom of information law, the Freedom of Access Act ("FOAA ...


Some Limits On The Judicial Power To Restrict Dissemination Of Discovery, Thomas C. Bradley 2020 University of Maine School of Law

Some Limits On The Judicial Power To Restrict Dissemination Of Discovery, Thomas C. Bradley

Maine Law Review

The pretrial process of discovery governed by Federal and Maine Rule of Civil Procedure 26 enables plaintiffs in product liability actions to delve where few people have delved before—into a corporation's internal memoranda, competitive practices, and secret product or design information as well as other less sensitive information in a company's possession. Discovery, in this context as in others, is a powerful tool determined by the courts to be necessary for the just litigation of claims. As a balance to the leeway given parties to compel production of information in discovery, federal and Maine courts have the ...


Smart Homes: The Next Fourth Amendment Frontier, Christina A. Robinson 2020 University of Miami Law School

Smart Homes: The Next Fourth Amendment Frontier, Christina A. Robinson

University of Miami Race & Social Justice Law Review

Under the third-party search doctrine, an individual does not have a reasonable expectation of privacy in information he or she voluntarily discloses to third parties. “Always on” in-home technology creates recordings of unsuspecting consumers in their most intimate spaces and sends them to third party companies and their affiliates, which makes this information subject to warrantless search by law enforcement under the third- search doctrine. The third-party search doctrine is ill-suited to the digital age, where consumers are routinely required to volunteer information to third parties in order to access digital content. This Note suggests that a warrant should be ...


Emerging Privacy Legislation In The International Landscape: Strategy And Analysis For Compliance, Jonathan McGruer 2020 University of Washington School of Law

Emerging Privacy Legislation In The International Landscape: Strategy And Analysis For Compliance, Jonathan Mcgruer

Washington Journal of Law, Technology & Arts

Big data is a part of our daily reality; consumers are constantly making decisions that reflect their personal preferences, resulting in valuable personal data. Facial recognition and other emerging technologies have raised privacy concerns due to the increased efficiency and scope which businesses and governments can use consumer data. With the European Union’s General Data Protection Regulation ushering in a new age of data privacy regulation, international jurisdictions have begun implementing comparable comprehensive legislation, affecting businesses globally. This Article examines the similarities between emerging U.S. state data privacy laws and the General Data Protection Regulation, with suggestions for ...


Screened Out Of Housing: The Impact Of Misleading Tenant Screening Reports And The Potential For Criminal Expungement As A Model For Effectively Sealing Evictions, Katelyn Polk 2020 Northwestern Pritzker School of Law

Screened Out Of Housing: The Impact Of Misleading Tenant Screening Reports And The Potential For Criminal Expungement As A Model For Effectively Sealing Evictions, Katelyn Polk

Northwestern Journal of Law & Social Policy

Having an eviction record “blacklists” tenants from finding future housing. Even renters with mere eviction filings—not eviction orders—on their records face the harsh collateral consequences of eviction. This Note argues that eviction records should be sealed at filing and only released into the public record if a landlord prevails in court. Juvenile record expungement mechanisms in Illinois serve as a model for one way to protect people with eviction records. Recent updates to the Illinois juvenile expungement process provided for the automatic expungement of certain records and strengthened the confidentiality protections of juvenile records. Illinois protects juvenile records ...


Digital Commons powered by bepress