Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2001 Full-Text Articles 1961 Authors 643028 Downloads 95 Institutions

All Articles in Privacy Law

Faceted Search

2001 full-text articles. Page 6 of 47.

Health Information Equity, Craig Konnoth 2017 University of Colorado Law School

Health Information Equity, Craig Konnoth

Articles

In the last few years, numerous Americans’ health information has been collected and used for follow-on, secondary research. This research studies correlations between medical conditions, genetic or behavioral profiles, and treatments, to customize medical care to specific individuals. Recent federal legislation and regulations make it easier to collect and use the data of the low-income, unwell, and elderly for this purpose. This would impose disproportionate security and autonomy burdens on these individuals. Those who are well-off and pay out of pocket could effectively exempt their data from the publicly available information pot. This presents a problem which modern research ethics ...


Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski 2017 University of Colorado Law School

Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski

Articles

Article III standing is difficult to achieve in the context of data security and data privacy claims. Injury in fact must be "concrete," "particularized," and "actual or imminent"--all characteristics that are challenging to meet with information harms. This Article suggests looking to an unusual source for clarification on privacy and standing: recent national security surveillance litigation. There we can find significant discussions of what rises to the level of Article III injury in fact. The answers may be surprising: the interception of sensitive information; the seizure of less sensitive information and housing of it in a database for analysis ...


Privacy And The Right To Record, Margot E. Kaminski 2017 University of Colorado Law School

Privacy And The Right To Record, Margot E. Kaminski

Articles

Many U.S. laws protect privacy by governing recording. Recently, however, courts have recognized a First Amendment “right to record.” This Article addresses how courts should handle privacy laws in light of the developing First Amendment right to record.

The privacy harms addressed by recording laws are situated harms. Recording changes the way people behave in physical spaces by altering the nature of those spaces. Thus, recording laws can be placed within a long line of First Amendment case law that recognizes a valid government interest in managing the qualities of rivalrous physical space, so as not to allow one ...


Performative Privacy, Scott Skinner-Thompson 2017 University of Colorado Law School

Performative Privacy, Scott Skinner-Thompson

Articles

Broadly speaking, privacy doctrine suggests that the right to privacy is non-existent once one enters the public realm. Although some scholars contend that privacy ought to exist in public, “public privacy” has been defended largely with reference to other, ancillary values privacy may serve. For instance, public privacy may be necessary to make the freedom of association meaningful in practice.

This Article identifies a new dimension of public privacy, supplementing extant justifications for the right, by arguing that many efforts to maintain privacy while in “public” are properly conceptualized as forms of performative, expressive resistance against an ever-pervasive surveillance society ...


Highway To The Danger Drone: Reconciling First Amendment Rights Of Drone Owners And Privacy Rights Of Individuals In Creating A Comprehensive Statutory Scheme In Rhode Island, David M. Remillard 2017 J.D. 2018, Roger Williams University School of Law

Highway To The Danger Drone: Reconciling First Amendment Rights Of Drone Owners And Privacy Rights Of Individuals In Creating A Comprehensive Statutory Scheme In Rhode Island, David M. Remillard

Roger Williams University Law Review

No abstract provided.


Privacy, Poverty, And Big Data: A Matrix Of Vulnerabilities For Poor Americans, Mary Madden, Michele Gilman, Karen Levy, Alice Marwick 2017 Data & Society Research Institute

Privacy, Poverty, And Big Data: A Matrix Of Vulnerabilities For Poor Americans, Mary Madden, Michele Gilman, Karen Levy, Alice Marwick

Washington University Law Review

This Article examines the matrix of vulnerabilities that low-income people face as a result of the collection and aggregation of big data and the application of predictive analytics. On one hand, big data systems could reverse growing economic inequality by expanding access to opportunities for low-income people. On the other hand, big data could widen economic gaps by making it possible to prey on low-income people or to exclude them from opportunities due to biases entrenched in algorithmic decision-making tools. New kinds of “networked privacy” harms, in which users are simultaneously held liable for their own behavior and the actions ...


Machine Learning With Personal Data: Is Data Protection Law Smart Enough To Meet The Challenge?, Fred H. Cate, Christopher Kuner, Dan Jerker B. Svantesson, Orla Lynskey, Christopher Millard 2017 Indiana University Maurer School of Law

Machine Learning With Personal Data: Is Data Protection Law Smart Enough To Meet The Challenge?, Fred H. Cate, Christopher Kuner, Dan Jerker B. Svantesson, Orla Lynskey, Christopher Millard

Articles by Maurer Faculty

No abstract provided.


Privacy, Poverty, And Big Data: A Matrix Of Vulnerabilities For Poor Americans, Mary Madden, Michele E. Gilman, Karen Levy, Alice Marwick 2017 Berkman Klein Center for Internet & Society at Harvard University

Privacy, Poverty, And Big Data: A Matrix Of Vulnerabilities For Poor Americans, Mary Madden, Michele E. Gilman, Karen Levy, Alice Marwick

All Faculty Scholarship

This Article examines the matrix of vulnerabilities that low-income people face as a result of the collection and aggregation of big data and the application of predictive analytics. On one hand, big data systems could reverse growing economic inequality by expanding access to opportunities for low-income people. On the other hand, big data could widen economic gaps by making it possible to prey on low-income people or to exclude them from opportunities due to biases entrenched in algorithmic decision-making tools. New kinds of “networked privacy” harms, in which users are simultaneously held liable for their own behavior and the actions ...


The Fourth Amendment In A Digital World, Laura K. Donohue 2017 Georgetown University Law Center

The Fourth Amendment In A Digital World, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

Fourth Amendment doctrines created in the 1970s and 1980s no longer reflect how the world works. The formal legal distinctions on which they rely—(a) private versus public space, (b) personal information versus third party data, (c) content versus non-content, and (d) domestic versus international—are failing to protect the privacy interests at stake. Simultaneously, reduced resource constraints are accelerating the loss of rights. The doctrine has yet to catch up with the world in which we live. A necessary first step for the Court is to reconsider the theoretical underpinning of the Fourth Amendment, to allow for the evolution ...


Making News: Balancing Newsworthiness And Privacy In The Age Of Algorithms, Erin C. Carroll 2017 Georgetown University Law Center

Making News: Balancing Newsworthiness And Privacy In The Age Of Algorithms, Erin C. Carroll

Georgetown Law Faculty Publications and Other Works

In deciding privacy lawsuits against media defendants, courts have for decades deferred to the media. They have given it wide berth to determine what is newsworthy and so, what is protected under the First Amendment. And in doing so, they have often spoken reverently of the editorial process and journalistic decision-making.

Yet, in just the last several years, news production and consumption has changed dramatically. As we get more of our news from digital and social media sites, the role of information gatekeeper is shifting from journalists to computer engineers, programmers, and app designers. The algorithms that the latter write ...


Game Of Drones: Rolling The Dice With Unmanned Aerial Vehicles And Privacy, Rebecca L. Scharf 2017 University of Nevada, Las Vegas -- William S. Boyd School of Law

Game Of Drones: Rolling The Dice With Unmanned Aerial Vehicles And Privacy, Rebecca L. Scharf

Scholarly Works

This Article offers a practical three-part test for courts and law enforcement to utilize when faced with drone and privacy issues. Specifically addressing the question: how should courts analyze the Fourth Amendment’s protection against ‘unreasonable searches’ in the context of drones?

The Supreme Court’s Fourth Amendment jurisprudence produced an intricate framework to address issues arising out of the intersection of technology and privacy interests. In prominent decisions, including United States v. Katz, California v. Ciraolo, Kyllo v. United States, and most notably, United States v. Jones, the Court focused on whether the use of a single technology, such ...


Teaching The Hipaa Privacy Rule, Stacey A. Tovino 2017 University of Nevada, Las Vegas -- William S. Boyd School of Law

Teaching The Hipaa Privacy Rule, Stacey A. Tovino

Scholarly Works

Twenty years ago, President Clinton signed the Health Insurance Portability and Accountability Act of 1996 (HIPAA) into law. Over the past two decades, the federal Department of Health and Human Services (HHS) has published several sets of rules implementing the Administrative Simplification provisions within HIPAA as well as the Health Information Technology for Economic and Clinical (HITECH) Act within the American Recovery and Reinvestment Act (ARRA). These rules include, but certainly are not limited to, a final rule published on January 25, 2013, governing the use and disclosure of protected health information by covered entities and their business associates (the ...


Keeping Up With New Legal Titles, Franklin L. Runge 2017 University of Kentucky College of Law

Keeping Up With New Legal Titles, Franklin L. Runge

Law Faculty Scholarly Articles

In this book review, Franklin L. Runge discusses The Future of Foreign Intelligence: Privacy and Surveillance in a Digital Age (2016) by Laura K. Donohue.


Clicks And Tricks: How Computer Hackers Avoid 10b-5 Liability, Ryan H. Gilinson 2017 Brooklyn Law School

Clicks And Tricks: How Computer Hackers Avoid 10b-5 Liability, Ryan H. Gilinson

Brooklyn Law Review

This note argues that computer hackers who sell inside information instead of trading on it themselves, referred to in the note as hacker-sellers, avoid liability under Section 10(b) of the Securities Exchange Act and SEC Rule 10b-5. Rule 10b-5 criminalizes the use of a manipulative or deceptive device “in connection with the purchase or sale of any security.” Hacker-sellers fall outside the scope of this rule for two reasons. First, the type of hacking employed by hacker-sellers is not always “deceptive,” and only the forms of hacking which deceive the computer into thinking an authorized user is seeking access ...


Wearables And Personal Health Data: Putting A Premium On Your Privacy, Alexandra Troiano 2017 Brooklyn Law School

Wearables And Personal Health Data: Putting A Premium On Your Privacy, Alexandra Troiano

Brooklyn Law Review

Recently, insurance companies have gained greater insight into their policyholders’ health habits by incentivizing them to take steps towards a healthier lifestyle through the use of wearable devices. This note addresses the recent trend of insurance companies that offer discounts to policyholders who use Fitbits, or other wearable wristbands, to track and report health information. At first glance, this idea seems like a win-win for insurance companies and policyholders–insurance companies can reduce risk by encouraging healthier habits for their policyholders, and policyholders receive discounts on their health insurance. Despite this synergy, however, this type of program threatens personal privacy ...


“Big Brother” In The Private Sector: Privacy Threats Under The Faa’S New Civilian Drone Regulations, Sean M. Nolan 2017 Brooklyn Law School

“Big Brother” In The Private Sector: Privacy Threats Under The Faa’S New Civilian Drone Regulations, Sean M. Nolan

Brooklyn Law Review

The Federal Aviation Administration’s (FAA) recent promulgation of civilian drone regulations triggered the growth of a new consumer industry. As this industry grows, so do the privacy threats it presents. Drones with advanced technological capabilities can record and store a wide range of data, without the consent of the data’s source. Privileged information captured by drones—whether for innocent purposes or not—is in turn vulnerable to misappropriation, as civilian drones are far from hack-proof. Despite the likely privacy implications of large-scale drone legalization, the FAA’s new regulations do not include any privacy protections. This note provides ...


Reevaluating Attorney-Client Privilege In The Age Of Hackers, Anne E. Conroy 2017 Brooklyn Law School

Reevaluating Attorney-Client Privilege In The Age Of Hackers, Anne E. Conroy

Brooklyn Law Review

The news story is now familiar: hackers breach a security system and post internal, confidential information online for anyone with an Internet connection to comb through. This digital version of whistleblowing, called “hacktivism,” is attractive to the media, which has leaned on broad First Amendment protections to widely cover the confidential communications revealed by hackers. These hacks also provide attorneys with enticing opportunities to look through previously confidential files. But as ethics and evidentiary rules stand, it is not clear if an attorney may view the files, let alone use them as evidence in litigation. That companies are hacked is ...


Playing With Real Property Inside Augmented Reality: Pokemon Go, Trespass, And Law's Limitations, Donald J. Kochan 2016 Chapman University School of Law

Playing With Real Property Inside Augmented Reality: Pokemon Go, Trespass, And Law's Limitations, Donald J. Kochan

Donald J. Kochan

This symposium essay uses the popular game Pokémon Go as a case study for evaluating conflicts that arise when augmented reality is layered over the real property of non-consenting owners. It focuses on the challenges augmented reality technologies pose to the meaning and enforcement of formal and informal trespass norms, first examining physical trespass issues (and enforcement difficulties) associated with game players who sometimes break physical property boundaries.

The essay then undertakes a thought experiment regarding possible recognition of a new, different type of trespass—one to augmented space. Pollock and Maitland called trespass the “fertile mother of all actions ...


Fourth Amendment Anxiety, Stephen E. Henderson, Kiel Brennan-Marquez 2016 New York University

Fourth Amendment Anxiety, Stephen E. Henderson, Kiel Brennan-Marquez

Stephen E Henderson

In Birchfield v. North Dakota (2016), the Supreme Court broke new Fourth Amendment ground by establishing that law enforcement’s collection of information can be cause for “anxiety,” meriting constitutional protection, even if subsequent uses of the information are tightly restricted.  This change is significant.  While the Court has long recognized the reality that police—just like any other actor—cannot be trusted to always follow the rules, Birchfield changes how that concern is implemented in Fourth Amendment law, and importantly, in a manner that acknowledges the new realities of data-driven policing.
 
Beyond offering a careful reading of Birchfield, this ...


Broadband Privacy Within Network Neutrality: The Fcc's Application Of The Cpni Rules, Justin S. Brown 2016 University of South Florida

Broadband Privacy Within Network Neutrality: The Fcc's Application Of The Cpni Rules, Justin S. Brown

Justin S. Brown

No abstract provided.


Digital Commons powered by bepress