Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2116 Full-Text Articles 2058 Authors 714965 Downloads 106 Institutions

All Articles in Privacy Law

Faceted Search

2116 full-text articles. Page 7 of 52.

Targeted Advertising And The First Amendment: Student Privacy Vs. Protected Speech, Marco Crocetti 2017 Holland & Knight LLP

Targeted Advertising And The First Amendment: Student Privacy Vs. Protected Speech, Marco Crocetti

Catholic University Journal of Law and Technology

No abstract provided.


Manhattan_Project.Exe: A Nuclear Option For The Digital Age, David Laton 2017 Laton & Strain LLC

Manhattan_Project.Exe: A Nuclear Option For The Digital Age, David Laton

Catholic University Journal of Law and Technology

This article explores the possible implications and consequences arising from the use of an artificial intelligence construct as a weapon of mass destruction. The digital age has ushered in many technological advances, as well as certain dangers. Chief among these pitfalls is the lack of reliable security found in critical information technology systems. These security gaps can give cybercriminals unauthorized access to highly sensitive computer networks that control the very infrastructure of the United States. Cyberattacks are rising in both frequency and severity and the response by the U.S. has been ineffective. A cyber-weapon of mass destruction (CWMD) implementing ...


Is Wifi Worth It: The Hidden Dangers Of Public Wifi, Ellie Shahin 2017 Catholic University of America (Student)

Is Wifi Worth It: The Hidden Dangers Of Public Wifi, Ellie Shahin

Catholic University Journal of Law and Technology

No abstract provided.


Here We Are Now, Entertain Us: Defining The Line Between Personal And Professional Context On Social Media, Raizel Liebler, Keidra Chaney 2017 John Marshall Law School

Here We Are Now, Entertain Us: Defining The Line Between Personal And Professional Context On Social Media, Raizel Liebler, Keidra Chaney

Keidra Chaney

Social media platforms such as Facebook, Twitter, and Instagram allow individuals and companies to connect directly and regularly with an audience of peers or with the public at large. These websites combine the audience-building platforms of mass media with the personal data and relationships of in-person social networks. Due to a combination of evolving user activity and frequent updates to functionality and user features, social media tools blur the line of whether a speaker is perceived as speaking to a specific and presumed private audience, a public expression of one’s own personal views, or a representative viewpoint of an ...


European Union Data Privacy Law Reform: General Data Protection Regulation, Privacy Shield, And The Right To Delisting, W. Gregory Voss 2017 Toulouse Business School

European Union Data Privacy Law Reform: General Data Protection Regulation, Privacy Shield, And The Right To Delisting, W. Gregory Voss

W. Gregory Voss

This article discusses a few of the most important European data privacy law developments in recent history – perhaps the most significant since 1995 when the European Union adopted the Data Protection Directive. These include the adoption of the General Data Protection Regulation (GDPR), the invalidation of the U.S. – EU Safe Harbor cross-border personal data transfer framework in the Schrems decision, and the Safe Harbor’s subsequent replacement by the Privacy Shield. The latter allows transfer of personal data (such as data about employees and prospects) from the European Union to the United States, upon certification of commitments by participating ...


Newsroom: Logan On Trump And Libel Law 01-03-2017, Roger Williams University School of Law 2017 Roger Williams University

Newsroom: Logan On Trump And Libel Law 01-03-2017, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


The Right To Attention, Jasper L. Tran 2017 George Mason University

The Right To Attention, Jasper L. Tran

Jasper L. Tran

What marketing, contracts, and healthcare—specifically informed consent and mandatory ultrasounds—have in common is the right to attention from the information receiver. However, scholarship most often focuses on the communicator’s perspective (e.g., how much information the communicator discloses) or on the information itself, but surprisingly, not much on the receiver’s perspective. This dearth of scholarship from the information receiver’s perspective is problematic, because the information receiver is often the “little guy” in the conversation. We own and are entitled to our attention because attention is a property right and part of our individual dignity. Yet ...


2015-2016 Legislative Summary, Assembly Committee on Privacy and Consumer Protection 2017 Golden Gate University School of Law

2015-2016 Legislative Summary, Assembly Committee On Privacy And Consumer Protection

California Agencies

No abstract provided.


Hotline Ping: Harmonizing Contemporary Cell Phone Technology With Traditional Fourth Amendment Protections, Brianne M. Chevalier 2017 Roger Williams University School of Law, Candidate for Juris Doctor, 2017

Hotline Ping: Harmonizing Contemporary Cell Phone Technology With Traditional Fourth Amendment Protections, Brianne M. Chevalier

Roger Williams University Law Review

No abstract provided.


Highway To The Danger Drone: Reconciling First Amendment Rights Of Drone Owners And Privacy Rights Of Individuals In Creating A Comprehensive Statutory Scheme In Rhode Island, David M. Remillard 2017 J.D. 2018, Roger Williams University School of Law

Highway To The Danger Drone: Reconciling First Amendment Rights Of Drone Owners And Privacy Rights Of Individuals In Creating A Comprehensive Statutory Scheme In Rhode Island, David M. Remillard

Roger Williams University Law Review

No abstract provided.


Consumer-Iot: Where Every Thing Collides Promoting Consumer Internet Of Things Protection In Australia., Kate Mathews-Hunt 2017 Bond University

Consumer-Iot: Where Every Thing Collides Promoting Consumer Internet Of Things Protection In Australia., Kate Mathews-Hunt

Theses

The ‘smart’(ly) disruptive world of the consumer internet of things (CIOT) is here. Australian consumers are poised to live in ‘smart’ homes, monitor their ‘smart’ selves and ride in ever- ‘smart’er cars, while smart(er) cities, transport and industrial IOT brilliance changes their world, and the world around them, irretrievably. This thesis both celebrates and exposes this radical, impending CIOT-driven disruption in all its consumer-abusive, privacy-intrusive glory. It posits that consumers and regulators do not yet understand the adverse implications of this new panopticon technology which surveys everything and blurs traditional understandings of human autonomy and privacy, nor ...


Privacy, Poverty, And Big Data: A Matrix Of Vulnerabilities For Poor Americans, Mary Madden, Michele Gilman, Karen Levy, Alice Marwick 2017 Data & Society Research Institute

Privacy, Poverty, And Big Data: A Matrix Of Vulnerabilities For Poor Americans, Mary Madden, Michele Gilman, Karen Levy, Alice Marwick

Washington University Law Review

This Article examines the matrix of vulnerabilities that low-income people face as a result of the collection and aggregation of big data and the application of predictive analytics. On one hand, big data systems could reverse growing economic inequality by expanding access to opportunities for low-income people. On the other hand, big data could widen economic gaps by making it possible to prey on low-income people or to exclude them from opportunities due to biases entrenched in algorithmic decision-making tools. New kinds of “networked privacy” harms, in which users are simultaneously held liable for their own behavior and the actions ...


The New Fisa Court Amicus Should Be Able To Ignore Its Congressionally Imposed Duty, Ben Cook 2017 American University Washington College of Law

The New Fisa Court Amicus Should Be Able To Ignore Its Congressionally Imposed Duty, Ben Cook

American University Law Review

No abstract provided.


Maryland's Bundle Of Joy: A Constitutionally Stronger, More Comprehensive Take On Contraception Coverage, Alexi Nathan 2017 American University Washington College of Law

Maryland's Bundle Of Joy: A Constitutionally Stronger, More Comprehensive Take On Contraception Coverage, Alexi Nathan

American University Journal of Gender, Social Policy & the Law

No abstract provided.


Cybersecurity, Identity Theft, And Standing Law: A Framework For Data Breaches Using Substantial Risk In A Post-Clapper World, James C. Chou 2017 American University Washington College of Law

Cybersecurity, Identity Theft, And Standing Law: A Framework For Data Breaches Using Substantial Risk In A Post-Clapper World, James C. Chou

American University National Security Law Brief

No abstract provided.


Clicks And Tricks: How Computer Hackers Avoid 10b-5 Liability, Ryan H. Gilinson 2017 Brooklyn Law School

Clicks And Tricks: How Computer Hackers Avoid 10b-5 Liability, Ryan H. Gilinson

Brooklyn Law Review

This note argues that computer hackers who sell inside information instead of trading on it themselves, referred to in the note as hacker-sellers, avoid liability under Section 10(b) of the Securities Exchange Act and SEC Rule 10b-5. Rule 10b-5 criminalizes the use of a manipulative or deceptive device “in connection with the purchase or sale of any security.” Hacker-sellers fall outside the scope of this rule for two reasons. First, the type of hacking employed by hacker-sellers is not always “deceptive,” and only the forms of hacking which deceive the computer into thinking an authorized user is seeking access ...


“Big Brother” In The Private Sector: Privacy Threats Under The Faa’S New Civilian Drone Regulations, Sean M. Nolan 2017 Brooklyn Law School

“Big Brother” In The Private Sector: Privacy Threats Under The Faa’S New Civilian Drone Regulations, Sean M. Nolan

Brooklyn Law Review

The Federal Aviation Administration’s (FAA) recent promulgation of civilian drone regulations triggered the growth of a new consumer industry. As this industry grows, so do the privacy threats it presents. Drones with advanced technological capabilities can record and store a wide range of data, without the consent of the data’s source. Privileged information captured by drones—whether for innocent purposes or not—is in turn vulnerable to misappropriation, as civilian drones are far from hack-proof. Despite the likely privacy implications of large-scale drone legalization, the FAA’s new regulations do not include any privacy protections. This note provides ...


Wearables And Personal Health Data: Putting A Premium On Your Privacy, Alexandra Troiano 2017 Brooklyn Law School

Wearables And Personal Health Data: Putting A Premium On Your Privacy, Alexandra Troiano

Brooklyn Law Review

Recently, insurance companies have gained greater insight into their policyholders’ health habits by incentivizing them to take steps towards a healthier lifestyle through the use of wearable devices. This note addresses the recent trend of insurance companies that offer discounts to policyholders who use Fitbits, or other wearable wristbands, to track and report health information. At first glance, this idea seems like a win-win for insurance companies and policyholders–insurance companies can reduce risk by encouraging healthier habits for their policyholders, and policyholders receive discounts on their health insurance. Despite this synergy, however, this type of program threatens personal privacy ...


Reevaluating Attorney-Client Privilege In The Age Of Hackers, Anne E. Conroy 2017 Brooklyn Law School

Reevaluating Attorney-Client Privilege In The Age Of Hackers, Anne E. Conroy

Brooklyn Law Review

The news story is now familiar: hackers breach a security system and post internal, confidential information online for anyone with an Internet connection to comb through. This digital version of whistleblowing, called “hacktivism,” is attractive to the media, which has leaned on broad First Amendment protections to widely cover the confidential communications revealed by hackers. These hacks also provide attorneys with enticing opportunities to look through previously confidential files. But as ethics and evidentiary rules stand, it is not clear if an attorney may view the files, let alone use them as evidence in litigation. That companies are hacked is ...


Machine Learning With Personal Data: Is Data Protection Law Smart Enough To Meet The Challenge?, Fred H. Cate, Christopher Kuner, Dan Jerker B. Svantesson, Orla Lynskey, Christopher Millard 2017 Indiana University Maurer School of Law

Machine Learning With Personal Data: Is Data Protection Law Smart Enough To Meet The Challenge?, Fred H. Cate, Christopher Kuner, Dan Jerker B. Svantesson, Orla Lynskey, Christopher Millard

Articles by Maurer Faculty

No abstract provided.


Digital Commons powered by bepress