Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2118 Full-Text Articles 2061 Authors 714965 Downloads 107 Institutions

All Articles in Privacy Law

Faceted Search

2118 full-text articles. Page 1 of 52.

A Critical Assessment Of The Empiricism In The Restatement Of Consumer Contract Law, Gregory Klass 2018 Georgetown University Law Center

A Critical Assessment Of The Empiricism In The Restatement Of Consumer Contract Law, Gregory Klass

Georgetown Law Faculty Publications and Other Works

The draft Restatement of the Law of Consumer Contracts includes a quantitative study of judicial decisions concerning businesses’ online privacy policies, which it cites in support of a claim that most courts treat privacy policies as contracts. This article reports an attempt to replicate that study. Using the Restatement data, this study was unable to replicate its numerical findings. This study found in the data fewer relevant decisions, and a lower proportion of decisions supporting the Restatement position. This study also found little support for the claim that there is a clear trend recognizing enforcing privacy policies as contracts, and ...


Sfr Inv.'S Pool 1, Llc V. First Horizon Home Loans, 134 Nev. Adv. Op. 4 (Feb. 1, 2018), Brendan McLeod 2018 University of Nevada, Las Vegas -- William S. Boyd School of Law

Sfr Inv.'S Pool 1, Llc V. First Horizon Home Loans, 134 Nev. Adv. Op. 4 (Feb. 1, 2018), Brendan Mcleod

Nevada Supreme Court Summaries

The Court determined that, under provisions of NRS 116.31162, when an HOA records a notice of a foreclosure sale, any subsequent buyer who purchases the property is subject to that notice that a foreclosure may be imminent.


Privacy In The Age Of The Hacker: Balancing Global Privacy And Data Security Law, Cunningham, Mckay, McKay Cunningham 2018 Concordia University School of Law

Privacy In The Age Of The Hacker: Balancing Global Privacy And Data Security Law, Cunningham, Mckay, Mckay Cunningham

McKay Cunningham

The twin goals of privacy and data security share a fascinating symbiotic relationship: too much of one undermines the other. The international regulatory climate, embodied principally by the European Union’s 1995 Directive, increasingly promotes privacy. In the last two decades, fifty-three countries enacted national legislation largely patterned after the E.U. Directive. These laws, by and large, protect privacy by restricting data processing and data transfers.

At the same time, hacking, malware, and other cyber-threats continue to grow in frequency and sophistication. In 2010, one security firm recorded 286 million variants of malware and reported that 232.4 million ...


Civil Society And Cybersurveillance, Andrew McCanse Wright 2018 Savannah Law School

Civil Society And Cybersurveillance, Andrew Mccanse Wright

Arkansas Law Review

There is no such thing as benign surveillance. It always comes with costs because of the chill it visits upon conduct, education, associations, and expression. Government surveillance has been magnified by cybersurveillance in the Digital Age to a degree unimaginable by the Founders of the United States of America.


Contents, 2018 The Catholic University of America, Columbus School of Law

Contents

Catholic University Journal of Law and Technology

No abstract provided.


Mobile Instant Messaging Evidence In Criminal Trials, Youngjin Choi 2018 The Catholic University of America, Columbus School of Law

Mobile Instant Messaging Evidence In Criminal Trials, Youngjin Choi

Catholic University Journal of Law and Technology

Mobile instant messaging, such as text messages, are a pervasive aspect of everyday life. The characteristics of the modern mobile instant messaging application, especially in comparison with other forms of more traditional electronic communication platforms, such as e-mail, text messaging, or computer-based instant messaging program, present a variety of evidentiary issues in trial.

To be relevant, mobile instant messaging evidence must be connected to a genuine issue at trial and not too attenuated from it. Authentication is also very important in determining whether it may be considered a non-hearsay statement. Although often otherwise admissible, mobile instant messaging evidence may still ...


Smart Baby Monitors: The Modern Nanny Or A Home Invader, Sarah Ensenat 2018 The Catholic University of America, Columbus School of Law

Smart Baby Monitors: The Modern Nanny Or A Home Invader, Sarah Ensenat

Catholic University Journal of Law and Technology

Smart baby monitors exist to help parents protect and watch over their children. The smart baby monitors act as a second set of eyes when parents cannot be in the same room as their children. Low-tech hackers take advantage of gaps in the security of smart baby monitors. A hacker violates a consumer’s privacy by gaining access to private information, viewing the home and its occupants, and even speaking to children through the monitor.

This comment advocates for stricter security legislation for smart baby monitors. Without new legislation, manufacturers of smart baby monitors do not apply or invest in ...


Dating Dangerously: Risks Lurking Within Mobile Dating Apps, Alyssa Murphy 2018 Catholic University of America (Student)

Dating Dangerously: Risks Lurking Within Mobile Dating Apps, Alyssa Murphy

Catholic University Journal of Law and Technology

In modern society, cell phones have become a virtual extension of most Americans. Advances in cell phone technology have given rise to the popularity of mobile dating applications (“apps”), which are capable of allowing users to date and meet potential partners without leaving the comfort of their own homes. The convenience and allure of mobile dating apps has led to a staggering increase in the number of crimes orchestrated against other users of the apps. Such crimes often include solicitation, stalking, murder, and human trafficking. Unsuspecting and trusting users fall victim to these crimes due to the false sense of ...


Masthead, 2018 The Catholic University of America, Columbus School of Law

Masthead

Catholic University Journal of Law and Technology

No abstract provided.


Sb 104 - Carjacking, Fentanyl And "Upskirting", Katherine H. Krouse, Lauren R. Light 2018 Georgia State University College of Law

Sb 104 - Carjacking, Fentanyl And "Upskirting", Katherine H. Krouse, Lauren R. Light

Georgia State University Law Review

The Act includes various amendments to Georgia’s criminal code. Three changes are most notable. First, the Act designates the offense of hijacking a motor vehicle as hijacking a motor vehicle in the first degree and creates the offense of hijacking a motor vehicle in the second degree. Second, the Act criminalizes the use of a device to film underneath or through an individual’s clothing. Lastly, the Act adds the drug Fentanyl and its various analogs to the list of controlled substances.


Peeling Back The Student Privacy Pledge, Alexi Pfeffer-Gillett 2018 Duke Law

Peeling Back The Student Privacy Pledge, Alexi Pfeffer-Gillett

Duke Law & Technology Review

Education software is a multi-billion dollar industry that is rapidly growing. The federal government has encouraged this growth through a series of initiatives that reward schools for tracking and aggregating student data. Amid this increasingly digitized education landscape, parents and educators have begun to raise concerns about the scope and security of student data collection. Industry players, rather than policymakers, have so far led efforts to protect student data. Central to these efforts is the Student Privacy Pledge, a set of standards that providers of digital education services have voluntarily adopted. By many accounts, the Pledge has been a success ...


Get Off My Porch: United States V. Carloss And The Escalating Dangers Of “Knock And Talks”, Skyler K. Sikes 2018 University of Oklahoma College of Law

Get Off My Porch: United States V. Carloss And The Escalating Dangers Of “Knock And Talks”, Skyler K. Sikes

Oklahoma Law Review

No abstract provided.


United States V. Carloss: Should The Police Act Like Good Neighbors?, Cole McLanahan 2018 University of Oklahoma College of Law

United States V. Carloss: Should The Police Act Like Good Neighbors?, Cole Mclanahan

Oklahoma Law Review

No abstract provided.


Fourth Amendment Anxiety, Stephen E. Henderson, Kiel Brennan-Marquez 2017 New York University

Fourth Amendment Anxiety, Stephen E. Henderson, Kiel Brennan-Marquez

Stephen E Henderson

In Birchfield v. North Dakota (2016), the Supreme Court broke new Fourth Amendment ground by establishing that law enforcement’s collection of information can be cause for “anxiety,” meriting constitutional protection, even if subsequent uses of the information are tightly restricted.  This change is significant.  While the Court has long recognized the reality that police cannot always be trusted to follow constitutional rules, Birchfield changes how that concern is implemented in Fourth Amendment law, and importantly, in a manner that acknowledges the new realities of data-driven policing.
 
Beyond offering a careful reading of Birchfield, this Article has two goals.  First ...


Carpenter V. United States And The Fourth Amendment: The Best Way Forward, Stephen E. Henderson 2017 University of Oklahoma College of Law

Carpenter V. United States And The Fourth Amendment: The Best Way Forward, Stephen E. Henderson

Stephen E Henderson

We finally have a federal ‘test case.’  In Carpenter v. United States, the Supreme Court is poised to set the direction of the Fourth Amendment in the digital age.  The case squarely presents how the twentieth-century third party doctrine will fare in contemporary times, and the stakes could not be higher.  This Article reviews the Carpenter case and how it fits within the greater discussion of the Fourth Amendment third party doctrine and location surveillance, and I express a hope that the Court will be both a bit ambitious and a good measure cautious. 
 
As for ambition, the Court must ...


Baking Common Sense Into The Ferpa Cake: How To Meaningfully Protect Student Rights And The Public Interest, Zach Greenberg, Adam Goldstein 2017 Notre Dame Law School

Baking Common Sense Into The Ferpa Cake: How To Meaningfully Protect Student Rights And The Public Interest, Zach Greenberg, Adam Goldstein

Journal of Legislation

No abstract provided.


A Pantomime Of Privacy: Terrorism And Investigative Powers In German Constitutional Law, Russell A. Miller 2017 Washington & Lee University School of Law

A Pantomime Of Privacy: Terrorism And Investigative Powers In German Constitutional Law, Russell A. Miller

Russell A. Miller

Germany is widely regarded as a global model for the privacy protection its constitutional regime offers against intrusive intelligence-gathering and law enforcement surveillance. There is some basis for Germany’s privacy “exceptionalism,” especially as the text of the German Constitution (“Basic Law”) provides explicit textual protections that America’s Eighteenth Century Constitution lacks. The German Federal Constitutional Court has added to those doctrines with an expansive interpretation of the more general rights to dignity (Basic Law Article 1) and the free development of one’s personality (Basic Law Article 2). This jurisprudence includes constitutional liberty guarantees such as the absolute ...


An Economic Analysis Of The Law Surrounding Data Aggregation In Cyberspace, Johnathan M. H. Short 2017 University of Maine School of Law

An Economic Analysis Of The Law Surrounding Data Aggregation In Cyberspace, Johnathan M. H. Short

Maine Law Review

The emergence of technological advances has traditionally created new and unique legal problems. The solutions to counter these problems are often drawn from our legal traditions and adapted to an ever-modernizing world. However, as Professor Coase opined at the dawn of the communication technology revolution, “lawyers and economists should not be so overwhelmed by the emergence of new technologies as to change the existing legal and economic system without first making quite certain that this is required.” Examination and reflection, in other words, is paramount to instituting a sound legal framework to encompass developing legal problems in technology. This Article ...


Desperately Seeking Solutions: Using Implementation-Based Solutions For The Troubles Of Information Privacy In The Age Of Data Mining And The Internet Society, Tal Z. Zarsky 2017 University of Maine School of Law

Desperately Seeking Solutions: Using Implementation-Based Solutions For The Troubles Of Information Privacy In The Age Of Data Mining And The Internet Society, Tal Z. Zarsky

Maine Law Review

Our personal information is constantly being recorded, stored and analyzed. Commercial entities watch our every action, storing this data and analyzing it in conjunction with information acquired from third parties. These entities use this knowledge to their benefit (and at times, our detriment) by discriminating between various customers on the basis of this personal information. At the same time, in the media market, large conglomerates can now provide specifically tailored content to individual customers on the basis of such data, thus potentially controlling their perspectives and impairing their autonomy. The expanding use of data mining applications, which enable vendors to ...


Slave To The Algorithm? Why A 'Right To An Explanation' Is Probably Not The Remedy You Are Looking For, Lilian Edwards, Michael Veale 2017 Duke Law

Slave To The Algorithm? Why A 'Right To An Explanation' Is Probably Not The Remedy You Are Looking For, Lilian Edwards, Michael Veale

Duke Law & Technology Review

Algorithms, particularly machine learning (ML) algorithms, are increasingly important to individuals’ lives, but have caused a range of concerns revolving mainly around unfairness, discrimination and opacity. Transparency in the form of a “right to an explanation” has emerged as a compellingly attractive remedy since it intuitively promises to open the algorithmic “black box” to promote challenge, redress, and hopefully heightened accountability. Amidst the general furore over algorithmic bias we describe, any remedy in a storm has looked attractive. However, we argue that a right to an explanation in the EU General Data Protection Regulation (GDPR) is unlikely to present a ...


Digital Commons powered by bepress