Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

1878 Full-Text Articles 1868 Authors 501823 Downloads 89 Institutions

All Articles in Privacy Law

Faceted Search

1878 full-text articles. Page 1 of 42.

Standing And Covert Surveillance, Christopher Slobogin 2017 Selected Works

Standing And Covert Surveillance, Christopher Slobogin

Christopher Slobogin

This Article describes and analyzes standing doctrine as it applies to covert government surveillance, focusing on practices thought to be conducted by the National Security Agency. Primarily because of its desire to avoid judicial incursions into the political process, the Supreme Court has construed its standing doctrine in a way that makes challenges to covert surveillance very difficult. Properly understood, however, such challenges do not call for judicial trenching on the power of the legislative and executive branches. Instead, they ask the courts to ensure that the political branches function properly. This political process theory of standing can rejuvenate the ...


A Healthy Amount Of Privacy: Quantifying Privacy Concerns In Medicine, Ignacio N. Cofone 2017 Yale Law School

A Healthy Amount Of Privacy: Quantifying Privacy Concerns In Medicine, Ignacio N. Cofone

Cleveland State Law Review

With recent developments in e-health, concerns have been raised regarding the privacy of patients who are monitored with such treatments. I propose a simple method to incorporate these concerns into a standard health impact evaluation, based on quality-adjusted life years and the incremental cost-effectiveness ratio. This method provides a way to objectively value privacy concerns and balance them with health benefits. Hence, it can guide doctors and policymakers into incorporating privacy considerations and making better choices regarding e-health programs. This method can also be tested on existing economic evaluations to compare outcomes and gauge the extent to which privacy issues ...


Privacy By Design: Taking Ctrl Of Big Data, Eric Everson 2017 Herzing University

Privacy By Design: Taking Ctrl Of Big Data, Eric Everson

Cleveland State Law Review

The concept of Privacy by Design is rooted in systems engineering. Yet, it is the legal framework of global privacy that gives new color to this concept as applied to Big Data. Increasingly, the long arm of the law is reaching into Big Data, but it is not simply by matter of regulatory enforcement or civil legal developments that Privacy by Design (PbD) is being thrust into the spotlight once more.

Given that Big Data is considered miniscule in contrast to future data environments, PbD is simply the right thing to do. This paper aims to explore the origin of ...


It Depends: Recasting Internet Clickwrap, Browsewrap, "I Agree," And Click-Through Privacy Clauses As Waivers Of Adhesion, Charles E. MacLean 2017 Indiana Tech Law School

It Depends: Recasting Internet Clickwrap, Browsewrap, "I Agree," And Click-Through Privacy Clauses As Waivers Of Adhesion, Charles E. Maclean

Cleveland State Law Review

Digital giants, enabled by America’s courts, Congress, and the Federal Trade Commission, devise click-through, clickwrap, browsewrap, "I Agree" waivers, and other legal fictions that purport to evidence user "consent" to consumer privacy erosions. It is no longer enough to justify privacy invasions as technologically inevitable or as essential to the American economy. As forced consent is no consent at all, privacy policies must advance with the technology. This article discusses adhesion waivers, the potential for FTC corrective action, and a comparison to privacy policies of the European Union.


Social Data Discovery And Proportional Privacy, Agnieszka McPeak 2017 University of Toledo College of Law

Social Data Discovery And Proportional Privacy, Agnieszka Mcpeak

Cleveland State Law Review

Social media platforms aggregate large amounts of personal information as "social data" that can be easily downloaded as a complete archive. Litigants in civil cases increasingly seek out broad access to social data during the discovery process, often with few limits on the scope of such discovery. But unfettered access to social data implicates unique privacy concerns—concerns that should help define the proper scope of discovery.

The Federal Rules of Civil Procedure, as amended in 2015, already contain the tools for crafting meaningful limits on intrusive social data discovery. In particular, the proportionality test under Rule 26 weighs the ...


Game Of Phones: The Fourth Amendment Implications Of Real-Time Cell Phone Tracking, Cal Cumpstone 2017 Cleveland-Marshall College of Law

Game Of Phones: The Fourth Amendment Implications Of Real-Time Cell Phone Tracking, Cal Cumpstone

Cleveland State Law Review

With the help of technological advancements, law enforcement can now hijack a targeted individual’s cell phone to ping and track the phone’s exact location in real time. Based upon previous rulings, this new tracking process has apparently fallen into a "grey area" of Fourth Amendment jurisprudence. However, real-time cell phone tracking should be a search in terms of the Fourth Amendment and, therefore, require a warrant. Real-time cell phone tracking infringes on an individual’s reasonable expectation of privacy, violates the trespass doctrine as a trespass to chattels, and violates the Kyllo standard by using technology not in ...


Enjoying Your "Free" App? The First Circuit's Approach To An Outdated Law In Yershov V. Gannett Satellite Information Network, Inc., Wendy Beylik 2017 Boston College Law School

Enjoying Your "Free" App? The First Circuit's Approach To An Outdated Law In Yershov V. Gannett Satellite Information Network, Inc., Wendy Beylik

Boston College Law Review

On April 29, 2016, in Yershov v. Gannett Satellite Information Network, Inc. (“Yershov II”), the U.S. Court of Appeals for the First Circuit held that the Video Privacy Protection Act (“VPPA”) of 1988 extended to a free application provider who disclosed its users’ GPS coordinates, phone identification numbers, and video histories to a data analytics company. In a similar case, the U.S. Court of Appeals for the Eleventh Circuit held that the VPPA did not apply because the relationship was too weak to render the user a “subscriber” under the Act. The U.S. Court of Appeals for ...


Newsroom: Cybersecurity: Obama's Conflicted Legacy 02-17-2017, Peter Margulies 2017 Roger Williams University School of Law

Newsroom: Cybersecurity: Obama's Conflicted Legacy 02-17-2017, Peter Margulies

Life of the Law School (1993- )

No abstract provided.


Privacy Law's Precautionary Principle Problem, Adam Thierer 2017 University of Maine School of Law

Privacy Law's Precautionary Principle Problem, Adam Thierer

Maine Law Review

Privacy law today faces two interrelated problems. The first is an information control problem. Like so many other fields of modern cyberlaw—intellectual property, online safety, cybersecurity, etc.—privacy law is being challenged by intractable Information Age realties. Specifically, it is easier than ever before for information to circulate freely and harder than ever to bottle it up once it is released. This has not slowed efforts to fashion new rules aimed at bottling up those information flows. If anything, the pace of privacy-related regulatory proposals has been steadily increasing in recent years even as these information control challenges multiply ...


Privacy And Security In The Cloud: Some Realism About Technical Solutions To Transnational Surveillance In The Post-Snowden Era, Joris V.J. van Hoboken, Ira S. Rubinstein 2017 University of Maine School of Law

Privacy And Security In The Cloud: Some Realism About Technical Solutions To Transnational Surveillance In The Post-Snowden Era, Joris V.J. Van Hoboken, Ira S. Rubinstein

Maine Law Review

Since June 2013, the leak of thousands of classified documents regarding highly sensitive U.S. surveillance activities by former National Security Agency (NSA) contractor Edward Snowden has greatly intensified discussions of privacy, trust, and freedom in relation to the use of global computing and communication services. This is happening during a period of ongoing transition to cloud computing services by organizations, businesses, and individuals. There has always been a question of inherent in this transition: are cloud services sufficiently able to guarantee the security of their customers’ data as well s the proper restrictions on access by third parties, including ...


The Promise And Shortcomings Of Privacy Multistakeholder Policymaking: A Case Study, Omer Tene, J. Trevor Hughes 2017 University of Maine School of Law

The Promise And Shortcomings Of Privacy Multistakeholder Policymaking: A Case Study, Omer Tene, J. Trevor Hughes

Maine Law Review

With formal privacy policymaking processes mired in discord, governments and regulators in the United States and Europe have turned to the private sector seeking assistance and solutions. Multistakeholder-driven self-regulation and co-regulation have been pursued in a variety of contexts ranging from online privacy and transparency for mobile applications to protection of transborder data flows. This article focuses on one such process, the World Wide Web Consortium (W3C) discussion of a Do Not Track (DNT) standard, as a case study. It critically analyzes the procedural pitfalls, which hampered the quest to reach a compromise solution acceptable by groups with diametrically opposed ...


Local Law Enforcement Jumps On The Big Data Bandwagon: Automated License Plate Recognition Systems, Infomation Privacy, And Access To Government Information, Bryce Clayton Newell 2017 University of Maine School of Law

Local Law Enforcement Jumps On The Big Data Bandwagon: Automated License Plate Recognition Systems, Infomation Privacy, And Access To Government Information, Bryce Clayton Newell

Maine Law Review

As government agencies and law enforcement departments increasingly adopt big-data surveillance technologies as part of their routine investigatory practice, personal information privacy concerns are becoming progressively more palpable. On the other hand, advancing technologies and data-mining potentially offer law enforcement greater ability to detect, investigate, and prosecute criminal activity. These concerns (for personal information privacy and the efficacy of law enforcement) are both very important in contemporary society. On one view, American privacy law has not kept up with advancing technological capabilities, and government agencies have arguably begun to overstep the acceptable boundaries of information access, violating the privacy of ...


The Glass House Effect: Big Data, The New Oil, And The Power Of Analogy, Dennis D. Hirsch 2017 University of Maine School of Law

The Glass House Effect: Big Data, The New Oil, And The Power Of Analogy, Dennis D. Hirsch

Maine Law Review

One hears with some frequency today that “data is the new oil.” Recently, Virginia Rometty, IBM’s Chief Executive Officer, updated the phrase, explaining that Big Data is the new oil. Most people who have used the analogy do so in order to convey Big Data’s tremendous value. Data is an essential resource that powers the information economy much like oil has fueled the industrial economy. Big Data promises a plethora of new uses—the identification and prevention of the pandemics, the emergence of new businesses and business sectors, the improvement of health care quality and efficiency, and enhanced ...


Standing In The Future: The Case For A Substantial Risk Theory Of "Injury-In-Fact" In Consumer Data Breach Class Actions, Nicholas Green 2017 Boston College Law School

Standing In The Future: The Case For A Substantial Risk Theory Of "Injury-In-Fact" In Consumer Data Breach Class Actions, Nicholas Green

Boston College Law Review

The increasing digitalization of our personal and professional lives has generated corresponding growth in the amount of electronically stored private information in the hands of third parties. That private information is at risk of theft, loss, or manipulation. Employers that hold employee tax information and merchants that hold significant troves of consumer credit card data are particularly attractive targets. When hackers strike, victims often band together in federal class actions, naming the custodians of their private data as defendants. More and more, however, district courts are dismissing these class action claims at the doorstep for lack of Article III standing ...


Privacy And Common Law Names: Sand In The Gears Of Identification, Adam Candeub 2017 University of Florida Levin College of Law

Privacy And Common Law Names: Sand In The Gears Of Identification, Adam Candeub

Florida Law Review

During the last two decades, law and regulation have expanded to require real name identification in virtually every aspect of life—from online purchases to healthcare. This slow, subtle transformation has rendered a de facto nullity the Constitution’s anonymity protection against compelled identity disclosure. This evolution also has rendered impracticable the traditional, but mostly forgotten, common law rights to use whatever name one wishes—the de facto right to pseudonymity. This common law right facilitates anonymity, which, in turn, facilitates privacy.

This Article argues that the continued vitality of common law name rights, particularly in light of recent First ...


Against Data Exceptionalism, Andrew Keane Woods 2017 University of Kentucky, College of Law

Against Data Exceptionalism, Andrew Keane Woods

Andrew Keane Woods

One of the great regulatory challenges of the Internet era—indeed, one of today's most pressing privacy questions—is how to define the limits of government access to personal data stored in the cloud. This is particularly true today because the cloud has gone global, raising a number of questions about the proper reach of one state's authority over cloud-based data. The prevailing response to these questions by scholars, practitioners, and major Internet companies like Google and Facebook has been to argue that data is different. Data is “unterritorial,” they argue, and therefore incompatible with existing territorial notions ...


Manhattan_Project.Exe: A Nuclear Option For The Digital Age, David Laton 2017 Laton & Strain LLC

Manhattan_Project.Exe: A Nuclear Option For The Digital Age, David Laton

Catholic University Journal of Law and Technology

This article explores the possible implications and consequences arising from the use of an artificial intelligence construct as a weapon of mass destruction. The digital age has ushered in many technological advances, as well as certain dangers. Chief among these pitfalls is the lack of reliable security found in critical information technology systems. These security gaps can give cybercriminals unauthorized access to highly sensitive computer networks that control the very infrastructure of the United States. Cyberattacks are rising in both frequency and severity and the response by the U.S. has been ineffective. A cyber-weapon of mass destruction (CWMD) implementing ...


Thriving In The Online Environment: Creating Structures To Promote Technology And Civil Liberties, Daniel W. Sutherland 2017 U.S. Department of Homeland Security

Thriving In The Online Environment: Creating Structures To Promote Technology And Civil Liberties, Daniel W. Sutherland

Catholic University Journal of Law and Technology

No abstract provided.


Targeted Advertising And The First Amendment: Student Privacy Vs. Protected Speech, Marco Crocetti 2017 Holland & Knight LLP

Targeted Advertising And The First Amendment: Student Privacy Vs. Protected Speech, Marco Crocetti

Catholic University Journal of Law and Technology

No abstract provided.


Autonomous Cars: Navigating The Patchwork Of Data Privacy Laws That Could Impact The Industry, Anthony Jones 2017 Catholic University of America (Student)

Autonomous Cars: Navigating The Patchwork Of Data Privacy Laws That Could Impact The Industry, Anthony Jones

Catholic University Journal of Law and Technology

No abstract provided.


Digital Commons powered by bepress