Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2050 Full-Text Articles 1996 Authors 687007 Downloads 100 Institutions

All Articles in Privacy Law

Faceted Search

2050 full-text articles. Page 5 of 49.

The Privacy Policymaking Of State Attorneys General, Danielle Keats Citron 2017 University of Maryland Carey School of Law

The Privacy Policymaking Of State Attorneys General, Danielle Keats Citron

Notre Dame Law Review

Much as Justice Louis Brandeis imagined states as laboratories of the law, offices of state attorneys general have been laboratories of privacy enforcement. State attorneys general have been nimble privacy enforcers whereas federal agencies have been more constrained by politics. Local knowledge, specialization, multistate coordination, and broad legal authority have allowed AG offices to fill in gaps in the law. State attorneys general have established baseline fair-information protections and expanded the frontiers of privacy law to cover sexual intimacy and youth. Their efforts have reinforced and strengthened federal norms, further harmonizing certain aspects of privacy and data security policy.

Although ...


The Regulatory Framework For Aerial Imaging By Recreational Users Of "Drones" In Singapore: Old And Emerging Issues And Some Possible Solutions, Siyuan CHEN 2017 Singapore Management University

The Regulatory Framework For Aerial Imaging By Recreational Users Of "Drones" In Singapore: Old And Emerging Issues And Some Possible Solutions, Siyuan Chen

Research Collection School Of Law

In response to the sudden proliferation of hobbyist unmanned aerial vehicles used for digital imaging – or “drones”, as they are popularly, but rather inaccurately, labelled – the Singapore government enacted the Unmanned Aircraft (Public Safety and Security) Act in 2015 and also amended various existing laws relating to air navigation. However, in view of the rapid evolution in drone technology and the ever-expanding range of useful applications brought about by drones, what are some of the challenges that would be faced when enforcing the law against recreational users of aerial imaging in particular, and what are some of the changes that ...


Enjoying Your "Free" App? The First Circuit's Approach To An Outdated Law In Yershov V. Gannett Satellite Information Network, Inc., Wendy Beylik 2017 Boston College Law School

Enjoying Your "Free" App? The First Circuit's Approach To An Outdated Law In Yershov V. Gannett Satellite Information Network, Inc., Wendy Beylik

Boston College Law Review

On April 29, 2016, in Yershov v. Gannett Satellite Information Network, Inc. (“Yershov II”), the U.S. Court of Appeals for the First Circuit held that the Video Privacy Protection Act (“VPPA”) of 1988 extended to a free application provider who disclosed its users’ GPS coordinates, phone identification numbers, and video histories to a data analytics company. In a similar case, the U.S. Court of Appeals for the Eleventh Circuit held that the VPPA did not apply because the relationship was too weak to render the user a “subscriber” under the Act. The U.S. Court of Appeals for ...


Newsroom: Cybersecurity: Obama's Conflicted Legacy 02-17-2017, Peter Margulies 2017 Roger Williams University School of Law

Newsroom: Cybersecurity: Obama's Conflicted Legacy 02-17-2017, Peter Margulies

Life of the Law School (1993- )

No abstract provided.


Privacy Law's Precautionary Principle Problem, Adam Thierer 2017 University of Maine School of Law

Privacy Law's Precautionary Principle Problem, Adam Thierer

Maine Law Review

Privacy law today faces two interrelated problems. The first is an information control problem. Like so many other fields of modern cyberlaw—intellectual property, online safety, cybersecurity, etc.—privacy law is being challenged by intractable Information Age realties. Specifically, it is easier than ever before for information to circulate freely and harder than ever to bottle it up once it is released. This has not slowed efforts to fashion new rules aimed at bottling up those information flows. If anything, the pace of privacy-related regulatory proposals has been steadily increasing in recent years even as these information control challenges multiply ...


Privacy And Security In The Cloud: Some Realism About Technical Solutions To Transnational Surveillance In The Post-Snowden Era, Joris V.J. van Hoboken, Ira S. Rubinstein 2017 University of Maine School of Law

Privacy And Security In The Cloud: Some Realism About Technical Solutions To Transnational Surveillance In The Post-Snowden Era, Joris V.J. Van Hoboken, Ira S. Rubinstein

Maine Law Review

Since June 2013, the leak of thousands of classified documents regarding highly sensitive U.S. surveillance activities by former National Security Agency (NSA) contractor Edward Snowden has greatly intensified discussions of privacy, trust, and freedom in relation to the use of global computing and communication services. This is happening during a period of ongoing transition to cloud computing services by organizations, businesses, and individuals. There has always been a question of inherent in this transition: are cloud services sufficiently able to guarantee the security of their customers’ data as well s the proper restrictions on access by third parties, including ...


The Promise And Shortcomings Of Privacy Multistakeholder Policymaking: A Case Study, Omer Tene, J. Trevor Hughes 2017 University of Maine School of Law

The Promise And Shortcomings Of Privacy Multistakeholder Policymaking: A Case Study, Omer Tene, J. Trevor Hughes

Maine Law Review

With formal privacy policymaking processes mired in discord, governments and regulators in the United States and Europe have turned to the private sector seeking assistance and solutions. Multistakeholder-driven self-regulation and co-regulation have been pursued in a variety of contexts ranging from online privacy and transparency for mobile applications to protection of transborder data flows. This article focuses on one such process, the World Wide Web Consortium (W3C) discussion of a Do Not Track (DNT) standard, as a case study. It critically analyzes the procedural pitfalls, which hampered the quest to reach a compromise solution acceptable by groups with diametrically opposed ...


Local Law Enforcement Jumps On The Big Data Bandwagon: Automated License Plate Recognition Systems, Infomation Privacy, And Access To Government Information, Bryce Clayton Newell 2017 University of Maine School of Law

Local Law Enforcement Jumps On The Big Data Bandwagon: Automated License Plate Recognition Systems, Infomation Privacy, And Access To Government Information, Bryce Clayton Newell

Maine Law Review

As government agencies and law enforcement departments increasingly adopt big-data surveillance technologies as part of their routine investigatory practice, personal information privacy concerns are becoming progressively more palpable. On the other hand, advancing technologies and data-mining potentially offer law enforcement greater ability to detect, investigate, and prosecute criminal activity. These concerns (for personal information privacy and the efficacy of law enforcement) are both very important in contemporary society. On one view, American privacy law has not kept up with advancing technological capabilities, and government agencies have arguably begun to overstep the acceptable boundaries of information access, violating the privacy of ...


The Glass House Effect: Big Data, The New Oil, And The Power Of Analogy, Dennis D. Hirsch 2017 University of Maine School of Law

The Glass House Effect: Big Data, The New Oil, And The Power Of Analogy, Dennis D. Hirsch

Maine Law Review

One hears with some frequency today that “data is the new oil.” Recently, Virginia Rometty, IBM’s Chief Executive Officer, updated the phrase, explaining that Big Data is the new oil. Most people who have used the analogy do so in order to convey Big Data’s tremendous value. Data is an essential resource that powers the information economy much like oil has fueled the industrial economy. Big Data promises a plethora of new uses—the identification and prevention of the pandemics, the emergence of new businesses and business sectors, the improvement of health care quality and efficiency, and enhanced ...


Standing In The Future: The Case For A Substantial Risk Theory Of "Injury-In-Fact" In Consumer Data Breach Class Actions, Nicholas Green 2017 Boston College Law School

Standing In The Future: The Case For A Substantial Risk Theory Of "Injury-In-Fact" In Consumer Data Breach Class Actions, Nicholas Green

Boston College Law Review

The increasing digitalization of our personal and professional lives has generated corresponding growth in the amount of electronically stored private information in the hands of third parties. That private information is at risk of theft, loss, or manipulation. Employers that hold employee tax information and merchants that hold significant troves of consumer credit card data are particularly attractive targets. When hackers strike, victims often band together in federal class actions, naming the custodians of their private data as defendants. More and more, however, district courts are dismissing these class action claims at the doorstep for lack of Article III standing ...


Privacy And Common Law Names: Sand In The Gears Of Identification, Adam Candeub 2017 University of Florida Levin College of Law

Privacy And Common Law Names: Sand In The Gears Of Identification, Adam Candeub

Florida Law Review

During the last two decades, law and regulation have expanded to require real name identification in virtually every aspect of life—from online purchases to healthcare. This slow, subtle transformation has rendered a de facto nullity the Constitution’s anonymity protection against compelled identity disclosure. This evolution also has rendered impracticable the traditional, but mostly forgotten, common law rights to use whatever name one wishes—the de facto right to pseudonymity. This common law right facilitates anonymity, which, in turn, facilitates privacy.

This Article argues that the continued vitality of common law name rights, particularly in light of recent First ...


Thriving In The Online Environment: Creating Structures To Promote Technology And Civil Liberties, Daniel W. Sutherland 2017 U.S. Department of Homeland Security

Thriving In The Online Environment: Creating Structures To Promote Technology And Civil Liberties, Daniel W. Sutherland

Catholic University Journal of Law and Technology

No abstract provided.


Targeted Advertising And The First Amendment: Student Privacy Vs. Protected Speech, Marco Crocetti 2017 Holland & Knight LLP

Targeted Advertising And The First Amendment: Student Privacy Vs. Protected Speech, Marco Crocetti

Catholic University Journal of Law and Technology

No abstract provided.


Manhattan_Project.Exe: A Nuclear Option For The Digital Age, David Laton 2017 Laton & Strain LLC

Manhattan_Project.Exe: A Nuclear Option For The Digital Age, David Laton

Catholic University Journal of Law and Technology

This article explores the possible implications and consequences arising from the use of an artificial intelligence construct as a weapon of mass destruction. The digital age has ushered in many technological advances, as well as certain dangers. Chief among these pitfalls is the lack of reliable security found in critical information technology systems. These security gaps can give cybercriminals unauthorized access to highly sensitive computer networks that control the very infrastructure of the United States. Cyberattacks are rising in both frequency and severity and the response by the U.S. has been ineffective. A cyber-weapon of mass destruction (CWMD) implementing ...


Autonomous Cars: Navigating The Patchwork Of Data Privacy Laws That Could Impact The Industry, Anthony Jones 2017 Catholic University of America (Student)

Autonomous Cars: Navigating The Patchwork Of Data Privacy Laws That Could Impact The Industry, Anthony Jones

Catholic University Journal of Law and Technology

No abstract provided.


Is Wifi Worth It: The Hidden Dangers Of Public Wifi, Ellie Shahin 2017 Catholic University of America (Student)

Is Wifi Worth It: The Hidden Dangers Of Public Wifi, Ellie Shahin

Catholic University Journal of Law and Technology

No abstract provided.


Table Of Contents, 2017 The Catholic University of America, Columbus School of Law

Table Of Contents

Catholic University Journal of Law and Technology

No abstract provided.


Masthead, 2017 The Catholic University of America, Columbus School of Law

Masthead

Catholic University Journal of Law and Technology

No abstract provided.


Newsroom: Logan On Trump And Libel Law 01-03-2017, Roger Williams University School of Law 2017 Roger Williams University

Newsroom: Logan On Trump And Libel Law 01-03-2017, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


The Right To Attention, Jasper L. Tran 2017 George Mason University

The Right To Attention, Jasper L. Tran

Jasper L. Tran

What marketing, contracts, and healthcare—specifically informed consent and mandatory ultrasounds—have in common is the right to attention from the information receiver. However, scholarship most often focuses on the communicator’s perspective (e.g., how much information the communicator discloses) or on the information itself, but surprisingly, not much on the receiver’s perspective. This dearth of scholarship from the information receiver’s perspective is problematic, because the information receiver is often the “little guy” in the conversation. We own and are entitled to our attention because attention is a property right and part of our individual dignity. Yet ...


Digital Commons powered by bepress