Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

1999 Full-Text Articles 1961 Authors 643028 Downloads 94 Institutions

All Articles in Privacy Law

Faceted Search

1999 full-text articles. Page 3 of 47.

Broadband Privacy Within Network Neutrality: The Fcc's Application & Expansion Of The Cpni Rules, Justin S. Brown 2017 University of St. Thomas, Minnesota

Broadband Privacy Within Network Neutrality: The Fcc's Application & Expansion Of The Cpni Rules, Justin S. Brown

University of St. Thomas Journal of Law and Public Policy

No abstract provided.


Data Analytics In Higher Education: Key Concerns And Open Questions, Alan Rubel, Kyle Jones 2017 University of St. Thomas, Minnesota

Data Analytics In Higher Education: Key Concerns And Open Questions, Alan Rubel, Kyle Jones

University of St. Thomas Journal of Law and Public Policy

No abstract provided.


Relational Privacy: Surveillance, Common Knowledge And Coordination, Robert H. Sloan, Richard Warner 2017 University of St. Thomas, Minnesota

Relational Privacy: Surveillance, Common Knowledge And Coordination, Robert H. Sloan, Richard Warner

University of St. Thomas Journal of Law and Public Policy

No abstract provided.


Who Needs To Know? The Seventh Circuit Accepts Information Sent To Government As Publicly Disclosed In Cause Of Action V. Chicago Transit Authority, Kurtis Brown 2017 Boston College Law School

Who Needs To Know? The Seventh Circuit Accepts Information Sent To Government As Publicly Disclosed In Cause Of Action V. Chicago Transit Authority, Kurtis Brown

Boston College Law Review

On February 29, 2016, the United States Court of Appeals for the Seventh Circuit in Cause of Action v. Chicago Transit Authority held that information disclosed to a government official and acted upon by that official has been publicly disclosed, barring a qui tam action from being brought under the False Claims Act. Several other circuits, including the First, Fourth, and Sixth, in contrast, have all interpreted the public disclosure bar within the False Claims Act to require a disclosure of information beyond the government. This Comment argues that the majority of circuit courts have correctly interpreted the False Claims ...


Data Flow Maps—Increasing Data Processing Transparency And Privacy Compliance In The Enterprise, Jeremy Berkowitz, Michael Mangold, Stephen Sharon 2017 Deloitte & Touche LLP

Data Flow Maps—Increasing Data Processing Transparency And Privacy Compliance In The Enterprise, Jeremy Berkowitz, Michael Mangold, Stephen Sharon

Washington and Lee Law Review Online

In recent years, well-known cyber breaches have placed growing pressure on organizations to implement proper privacy and data protection standards. Attacks involving the theft of employee and customer personal information have damaged the reputations of well-known brands, resulting in significant financial costs. As a result, governments across the globe are actively examining and strengthening laws to better protect the personal data of its citizens. The General Data Protection Regulation (GDPR) updates European privacy law with an array of provisions that better protect consumers and require organizations to focus on accounting for privacy in their business processes through “privacy-by-design” and “privacy ...


Why New Hampshire Must Update Rape Shield Laws, Amy Vorenberg 2017 University of New Hampshire School of Law

Why New Hampshire Must Update Rape Shield Laws, Amy Vorenberg

Legal Scholarship

[Excerpt] “Recent research indicates that New Hampshire has some of the highest rates of sexual assault in the nation; nearly one in four New Hampshire women and one in 20 New Hampshire men will experience sexual assault. Although reporting a crime can be hard for anyone, sexual assault victims have particular reasons for not reporting. After an assault, a rape victim typically feels embarrassment, shame and fears reprisal (most of these crimes are committed by an acquaintance). The deeply personal nature of rape makes it uniquely traumatizing and confusing.”


The Market’S Law Of Privacy: Case Studies In Privacy/Security Adoption, Chetan Gupta 2017 Washington and Lee University School of Law

The Market’S Law Of Privacy: Case Studies In Privacy/Security Adoption, Chetan Gupta

Washington and Lee Law Review Online

This paper examines the hypothesis that it may be possible for individual actors in a marketplace to drive the adoption of particular privacy and security standards. It aims to explore the diffusion of privacy and security technologies in the marketplace. Using HTTPS, Two-Factor Authentication, and End-to-End Encryption as case studies, it tries to ascertain which factors are responsible for successful diffusion which improves the privacy of a large number of users. Lastly, it explores whether the FTC may view a widely diffused standard as a necessary security feature for all actors in a particular industry.

Based on the case studies ...


Privacy In The Age Of Autonomous Vehicles, Ivan L. Sucharski, Philip Fabinger 2017 HERE North America, LLC

Privacy In The Age Of Autonomous Vehicles, Ivan L. Sucharski, Philip Fabinger

Washington and Lee Law Review Online

To prepare for the age of the intelligent, highly connected, and autonomous vehicle, a new approach to concepts of granting consent, managing privacy, and dealing with the need to interact quickly and meaningfully is needed. Additionally, in an environment where personal data is rapidly shared with a multitude of independent parties, there exists a need to reduce the information asymmetry that currently exists between the user and data collecting entities. This Article rethinks the traditional notice and consent model in the context of real-time communication between vehicles or vehicles and infrastructure or vehicles and other surroundings and proposes a re-engineering ...


Unsafe Harbor: The European Union's Demand For Heightened Data Privacy Standards In Schrems V. Irish Data Protection Commissioner, Christina Lam 2017 Boston College Law School

Unsafe Harbor: The European Union's Demand For Heightened Data Privacy Standards In Schrems V. Irish Data Protection Commissioner, Christina Lam

Boston College International and Comparative Law Review

In 1995, the European Union adopted the Data Protection Directive to govern the processing, use, and exchange of personal data. The United States refused to enact similar legislation, consequently jeopardizing ongoing and future data transfers with the European Union. To prevent economic catastrophe, the United States negotiated with the European Union to reach the Safe Harbor Agreement and, on July 26, 2000, the European Commission formally recognized the agreement as compliant with the Data Protection Directive in its Safe Harbor Decision. In 2013, U.S. data protection standards were once again placed under the microscope when Edward Snowden leaked information ...


‘Relational Privacy’ & Tort, Stuart Hargreaves 2017 College of William & Mary Law School

‘Relational Privacy’ & Tort, Stuart Hargreaves

William & Mary Journal of Women and the Law

This Article argues that the current interpretation given to the four-part invasion of privacy framework by the courts is inadequate in the face of modern privacy challenges. In particular, it struggles with claims for privacy over public matters or other ‘non-secret’ matters that an individual may nonetheless have some ongoing privacy interest in. This Article suggests that this struggle is the result of the courts adopting a fixed, binary approach to privacy, which is itself grounded in a liberal-individualistic account of autonomy. While this may be a natural response to concerns about limiting the scope of the tort, it is ...


Good Things Don't Come To Those Forced To Wait: Denial Of A Litigant's Request To Proceed Anonymously Can Be Appealed Prior To Final Judgment In The Wake Of Doe V. Village Of Deerfield, Chloe Booth 2017 Boston College Law School

Good Things Don't Come To Those Forced To Wait: Denial Of A Litigant's Request To Proceed Anonymously Can Be Appealed Prior To Final Judgment In The Wake Of Doe V. Village Of Deerfield, Chloe Booth

Boston College Law Review

On April 12, 2016, in Doe v. Village of Deerfield, the United States Court of Appeals for the Seventh Circuit held that a denial of a motion to proceed anonymously is an immediately appealable order under the collateral order doctrine. The Seventh Circuit joined the Fourth, Fifth, Ninth, Tenth and Eleventh Circuits in holding that this type of order, examined categorically, satisfies the rigorous requirements of the collateral order doctrine. Allowing immediate review of this type of order implements a practical construction of the traditional final judgment rule that the United States Courts of Appeals can only review orders upon ...


Personal Jurisdiction In The Data Age: Macdermid V. Deiter's Adaptation Of International Shoe Amidst Supreme Court Uncertainty, Ryan Almy 2017 University of Maine School of Law

Personal Jurisdiction In The Data Age: Macdermid V. Deiter's Adaptation Of International Shoe Amidst Supreme Court Uncertainty, Ryan Almy

Maine Law Review

In MacDermid, Inc. v. Deiter, the Second Circuit held that a Connecticut court may exercise personal jurisdiction over a defendant who allegedly used a computer in Canada to remotely access a computer server located in Connecticut in order to misappropriate proprietary, confidential electronic information belonging to a Connecticut corporation. This Note argues that, given the factual elements before the court, MacDermid was an unsurprising, orthodox, and proper holding in the context of personal jurisdiction jurisprudence. However, the facts in MacDermid, and the corresponding limits inherent in the Second Circuit’s holding, reveal potentially gaping holes in our modern personal jurisdiction ...


A Comment On Privacy And Accountability In Black-Box Medicine, Carl E. Schneider 2017 University of Michigan Law School

A Comment On Privacy And Accountability In Black-Box Medicine, Carl E. Schneider

Michigan Telecommunications and Technology Law Review

Human institutions and activities cannot avoid failures. Anxiety about them often provokes governments to try to prevent those failures. When that anxiety is vivid and urgent, government may do so without carefully asking whether regulation’s costs justify their benefits. Privacy and Accountability in Black Box Medicine admirably labors to bring discipline and rationality to thinking about an important development — the rise of “black-box medicine” — before it causes injuries regulation should have prevented and before it is impaired by improvident regulation. That is, Privacy and Accountability weighs the costs against the benefits of various forms of regulation across the many ...


Trust: A Model For Disclosure In Patent Law, Ari Ezra Waldman 2017 New York Law School

Trust: A Model For Disclosure In Patent Law, Ari Ezra Waldman

Indiana Law Journal

How to draw the line between public and private is a foundational, first-principles question of privacy law, but the answer has implications for intellectual property, as well. This project is one in a series of papers about first-person disclosures of information in the privacy and intellectual property law contexts, and it defines the boundary between public and nonpublic information through the lens of social science —namely, principles of trust.

Patent law’s public use bar confronts the question of whether legal protection should extend to information previously disclosed to a small group of people. I present evidence that shows that ...


Dangerous Classroom "App"-Titude: Protecting Student Privacy From Third-Party Educational Service Providers, Alexis M. Peddy 2017 Brigham Young University Law School

Dangerous Classroom "App"-Titude: Protecting Student Privacy From Third-Party Educational Service Providers, Alexis M. Peddy

Brigham Young University Education and Law Journal

No abstract provided.


Having An Affair May Shorten Your Life: The Ashley Madison Suicides, Sakinah N. Jones 2017 Georgia State University College of Law

Having An Affair May Shorten Your Life: The Ashley Madison Suicides, Sakinah N. Jones

Georgia State University Law Review

Ashley Madison is an online dating service originally designed for people in committed relationships who want to cheat on their partners. In 2015, the website claimed to be “100% discreet.” Ashley Madison’s FAQs promised that its users would never compromise their “safety, privacy or security” and would never have to reveal their identities unless they chose to.

Ashley Madison’s concept attracted over forty million ostensibly anonymous members to its site. In July 2015, a group calling itself The Impact Team (Impact) hacked into Ashley Madison’s parent company, Avid Life Media, Inc. (Avid Life), breaching its security walls ...


Civil Liberty Or National Security: The Battle Over Iphone Encryption, Karen Lowell 2017 Georgia State University College of Law

Civil Liberty Or National Security: The Battle Over Iphone Encryption, Karen Lowell

Georgia State University Law Review

On June 5, 2013, Edward Snowden released what would be the first of many documents exposing the vast breadth of electronic surveillance the Federal Bureau of Investigation (FBI) and the National Security Agency (NSA) had been conducting on millions of United States citizens. Although the federal agencies had legal authority under the Foreign Intelligence Surveillance Act (FISA) to collect metadata from companies such as Verizon, many Americans considered this data collection to be a massive invasion of privacy.

Equipped with the knowledge of sweeping domestic surveillance programs, citizens and technology firms fighting for strong privacy and security protection, have started ...


Keep Out! The Efficacy Of Trespass, Nuisance And Privacy Torts As Applied To Drones, Hillary B. Farber 2017 University of Massachusetts School of Law

Keep Out! The Efficacy Of Trespass, Nuisance And Privacy Torts As Applied To Drones, Hillary B. Farber

Georgia State University Law Review

A few years ago one might have seen a small object flying overhead without any idea what it could be. Today, it is fairly commonplace to see drones flying around our neighborhood skies. The Federal Aviation Administration (FAA) predicts there will be seven million drones populating our skies by 2020. In 2015 hobbyists, recreational users, and commercial businesses purchased unmanned aerial vehicles, commonly referred to as drones, in record-breaking numbers. Estimates reveal that over 4.3 million drones were sold worldwide in 2015. Trade industry experts predicted that more than 2.8 million drones would be sold in the U ...


Standing And Covert Surveillance, Christopher Slobogin 2017 Selected Works

Standing And Covert Surveillance, Christopher Slobogin

Christopher Slobogin

This Article describes and analyzes standing doctrine as it applies to covert government surveillance, focusing on practices thought to be conducted by the National Security Agency. Primarily because of its desire to avoid judicial incursions into the political process, the Supreme Court has construed its standing doctrine in a way that makes challenges to covert surveillance very difficult. Properly understood, however, such challenges do not call for judicial trenching on the power of the legislative and executive branches. Instead, they ask the courts to ensure that the political branches function properly. This political process theory of standing can rejuvenate the ...


The Privacy Policymaking Of State Attorneys General, Danielle Keats Citron 2017 University of Maryland Carey School of Law

The Privacy Policymaking Of State Attorneys General, Danielle Keats Citron

Notre Dame Law Review

Much as Justice Louis Brandeis imagined states as laboratories of the law, offices of state attorneys general have been laboratories of privacy enforcement. State attorneys general have been nimble privacy enforcers whereas federal agencies have been more constrained by politics. Local knowledge, specialization, multistate coordination, and broad legal authority have allowed AG offices to fill in gaps in the law. State attorneys general have established baseline fair-information protections and expanded the frontiers of privacy law to cover sexual intimacy and youth. Their efforts have reinforced and strengthened federal norms, further harmonizing certain aspects of privacy and data security policy.

Although ...


Digital Commons powered by bepress