Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Seattle University School of Law (7)
- Selected Works (6)
- Boston University School of Law (4)
- The University of Akron (3)
- University of Colorado Law School (3)
-
- American University Washington College of Law (2)
- Schulich School of Law, Dalhousie University (2)
- SelectedWorks (2)
- The Catholic University of America, Columbus School of Law (2)
- University of Kentucky (2)
- University of Pennsylvania Carey Law School (2)
- University of Pittsburgh School of Law (2)
- Cornell University Law School (1)
- Georgia State University College of Law (1)
- Loyola Marymount University and Loyola Law School (1)
- Marquette University Law School (1)
- Pepperdine University (1)
- Roger Williams University (1)
- Singapore Management University (1)
- St. John's University School of Law (1)
- St. Mary's University (1)
- Universitas Indonesia (1)
- University at Buffalo School of Law (1)
- University of Georgia School of Law (1)
- University of Maryland Francis King Carey School of Law (1)
- University of Massachusetts School of Law (1)
- University of Michigan Law School (1)
- University of Richmond (1)
- University of Washington School of Law (1)
- Washington and Lee University School of Law (1)
- Publication Year
- Publication
-
- Seattle University Law Review (7)
- Faculty Scholarship (4)
- Akron Law Review (3)
- All Faculty Scholarship (2)
- Articles (2)
-
- Articles in Law Reviews & Other Academic Journals (2)
- Catholic University Journal of Law and Technology (2)
- Faculty Publications (2)
- Law Faculty Scholarly Articles (2)
- Publications (2)
- "Dharmasisya” Jurnal Program Magister Hukum FHUI (1)
- A. Michael Froomkin (1)
- Articles, Book Chapters, & Popular Press (1)
- Cornell Law Faculty Publications (1)
- Faculty Articles (1)
- Georgia State University Law Review (1)
- James Grimmelmann (1)
- John D. McCamus (1)
- Journal Articles (1)
- Law Student Publications (1)
- Life of the Law School (1993- ) (1)
- Loyola of Los Angeles Law Review (1)
- Marquette Law Review (1)
- Michigan Law Review (1)
- Pepperdine Law Review (1)
- Reports & Public Policy Documents (1)
- Research Collection Yong Pung How School Of Law (1)
- Research Data (1)
- Russell L. Weaver (1)
- Samantha Barbas (1)
- Publication Type
- File Type
Articles 1 - 30 of 55
Full-Text Articles in Law
A How-To Guide For When Your Favorite Meme Account Is Defamed: Involuntary Public Figures In Defamation, Privacy, And Intentional Infliction Of Emotional Distress Law, Elizabeth Mcmullen
A How-To Guide For When Your Favorite Meme Account Is Defamed: Involuntary Public Figures In Defamation, Privacy, And Intentional Infliction Of Emotional Distress Law, Elizabeth Mcmullen
Catholic University Journal of Law and Technology
The world we live in today has changed infinitely since the inception of our Constitution and early legal doctrine. Our Founding Fathers could never have predicted that we would one day live in a world where anyone living in any corner of the globe could garner millions of followers. Whether someone finds him or herself to be particularly proficient in writing Harry Potter fan fiction or to be the best creator of memes with an American Girl Doll focus, ordinary citizens could find themselves suddenly jolted out of quiet anonymity by one unexpectedly viral post. Despite years of Instagram micro-fame, …
Perlindungan Atas Privasi Konsumen Dalam Layanan Reservasi Tiket Online Dari Pt. Kereta Api Indonesia, Aprilia Susanti
Perlindungan Atas Privasi Konsumen Dalam Layanan Reservasi Tiket Online Dari Pt. Kereta Api Indonesia, Aprilia Susanti
"Dharmasisya” Jurnal Program Magister Hukum FHUI
The significant increase in online activities cannot be separated from the many active internet users who use mobile internet connections to carry out their daily activities, one of which is for the convenience of making ticket reservations at PT. Indonesian Railways (KAI). The purpose of this research is to find out the study of the business law of protecting consumer privacy in the online ticketing service of PT. KAI. Data collection was carried out by means of a literature study of the relationship between laws and regulations in consumer protection and the position of PT. KAI as business actors and …
Inadequate Privacy: The Necessity Of Hipaa Reform In A Post-Dobbs World, Katherine Robertson
Inadequate Privacy: The Necessity Of Hipaa Reform In A Post-Dobbs World, Katherine Robertson
Seattle University Law Review
Part I of this Comment will provide an overview of HIPAA and the legal impacts of Dobbs. Part II will discuss the anticipatory response to the impacts of Dobbs on PHI by addressing the response from (1) the states, (2) the Biden Administration, and (3) the medical field. Part III will discuss the loopholes that exist in HIPAA and further address the potential impacts on individuals and the medical field if reform does not occur. Finally, Part IV will argue that the reform of HIPAA is the best avenue for protecting PHI related to reproductive healthcare.
Throwing Stones In Glass Houses: Protecting Privacy Under The Law Of Nuisance, Cheng Lim Saw, Joon Wei Aaron Yoong
Throwing Stones In Glass Houses: Protecting Privacy Under The Law Of Nuisance, Cheng Lim Saw, Joon Wei Aaron Yoong
Research Collection Yong Pung How School Of Law
The limits of the law of nuisance were recently tested in the controversial decisions of Fearn v Tate Gallery Board of Trustees, both before the UK High Court and UK Court of Appeal. Against the backdrop of these decisions, this article argues that the tort of private nuisance can indeed, in appropriate cases, protect against invasions of privacy caused by overlooking – all within the present framework and ambit of the action. It is also proposed that a communitarian approach be adopted in fashioning the appropriate remedy for actions founded in nuisance.
Submission To The Province Of Nova Scotia On Its Review Of The Intimate Images And Cyber-Protection Act - Leaf, Suzie Dunn, Rosel Kim
Submission To The Province Of Nova Scotia On Its Review Of The Intimate Images And Cyber-Protection Act - Leaf, Suzie Dunn, Rosel Kim
Reports & Public Policy Documents
The Women’s Legal Education and Action Fund (LEAF) commends the Nova Scotia government for reviewing its Intimate Images and Cyber-protection Act (the Act) and seeking public input for this review. Nova Scotia has been, and continues to be, a leader in Canada for its role in advancing innovative laws and supports for people targeted by technology-facilitated violence (TFV), digital abuse, and the non-consensual distribution of intimate images (NCDII). As these forms of harmful behaviour evolve and become better understood, it is important to revisit this legislation to assess whether it is providing meaningful and accessible responses to such serious social …
You Are Not A Commodity: A More Efficient Approach To Commercial Privacy Rights, Benjamin T. Pardue
You Are Not A Commodity: A More Efficient Approach To Commercial Privacy Rights, Benjamin T. Pardue
Washington Law Review
United States common law provides four torts for privacy invasion: (1) disclosure of private facts, (2) intrusion upon seclusion, (3) placement of a person in a false light, and (4) appropriation of name or likeness. Appropriation of name or likeness occurs when a defendant commandeers the plaintiff’s recognizability, typically for a commercial benefit. Most states allow plaintiffs who establish liability to recover defendants’ profits as damages from the misappropriation under an “unjust enrichment” theory. By contrast, this Comment argues that such an award provides a windfall to plaintiffs and contributes to suboptimal social outcomes. These include overcompensating plaintiffs and incentivizing …
Privacy, Eavesdropping, And Wiretapping Across The United States: Reasonable Expectation Of Privacy And Judicial Discretion, Carol M. Bast
Privacy, Eavesdropping, And Wiretapping Across The United States: Reasonable Expectation Of Privacy And Judicial Discretion, Carol M. Bast
Catholic University Journal of Law and Technology
One-party consent and all-party consent eavesdropping and wiretapping statutes are two broad pathways for legislation to deal with the problem of secret taping and some states protect conversation under state constitutions. Whether a conversation is protected against being taped as a private conversation is often gauged by the reasonable expectation of privacy standard. Judges in both all-party consent and one-party consent jurisdictions have had to use their leeway under the reasonable expectation of privacy standard to arrive at what at the time seemed to be the most appropriate solution, perhaps in doing so creating a case law exception.
Identity Manipulation: Responding To Advances In Artificial Intelligence And Robotics, Suzie Dunn
Identity Manipulation: Responding To Advances In Artificial Intelligence And Robotics, Suzie Dunn
Articles, Book Chapters, & Popular Press
Advances in artificial intelligence (AI) and robotics technologies have destabilized our ability to control our identity. Today, it is increasingly accessible for the average person to appropriate the voice, image, and body of another individual through the use of technology. Deepfake videos swap new faces into existing videos, facial re-enactment allows for the face of one person to be superimposed on the face of someone else in a real time video, artificial speech synthesis can clone another person’s voice, and 3D printing and modern robotics can reproduce life-size copies of living people. These are all examples of the ways technology …
Law School News: Logan To Serve As Adviser On Restatement Third Of Torts 11-07-2019, Michael M. Bowden
Law School News: Logan To Serve As Adviser On Restatement Third Of Torts 11-07-2019, Michael M. Bowden
Life of the Law School (1993- )
No abstract provided.
Remedies, Neutral Rules And Free Speech, David F. Partlett, Russell L. Weaver
Remedies, Neutral Rules And Free Speech, David F. Partlett, Russell L. Weaver
Russell L. Weaver
In general, plaintiffs’ ability to obtain substantial damages against media defendants is directly proportional to their ability to obtain so called “publication damages.”...In future cases, the courts may be forced to deal more straightforwardly with the First Amendment issues. In Sanders, the court avoided those issues because they were not raised. As a result, the court left open the possibility that, even in an intrusion case a media defendant might be allowed to show that the invasion of privacy was “justified by the legitimate motive of gathering the news.”...Moreover, the very existence of the litigation undoubtedly has a negative impact …
Privacy, Freedom, And Technology—Or “How Did We Get Into This Mess?”, Alex Alben
Privacy, Freedom, And Technology—Or “How Did We Get Into This Mess?”, Alex Alben
Seattle University Law Review
Can we live in a free society without personal privacy? The question is worth pondering, not only in light of the ongoing debate about government surveillance of private communications, but also because new technologies continue to erode the boundaries of our personal space. This Article examines our loss of freedom in a variety of disparate contexts, all connected by the thread of erosion of personal privacy. In the scenarios explored here, privacy reducing activities vary from government surveillance, personal stalking conducted by individuals, and profiling by data-driven corporations, to political actors manipulating social media platforms. In each case, new technologies …
Confiding In Con Men: U.S. Privacy Law, The Gdpr, And Information Fiduciaries, Lindsey Barrett
Confiding In Con Men: U.S. Privacy Law, The Gdpr, And Information Fiduciaries, Lindsey Barrett
Seattle University Law Review
In scope, ambition, and animating philosophy, U.S. privacy law and Europe’s General Data Protection Regulation are almost diametric opposites. The GDPR’s ambitious individual rights, significant prohibitions, substantive enforcement regime, and broad applicability contrast vividly with a scattershot U.S. regime that generally prioritizes facilitating commerce over protecting individuals, and which has created perverse incentives for industry through anemic enforcement of the few meaningful limitations that do exist. A privacy law that characterizes data collectors as information fiduciaries could coalesce with the commercial focus of U.S. law, while emulating the GDPR’s laudable normative objectives and fortifying U.S. consumer privacy law with a …
Privacy Statements Under The Gdpr, Mike Hintze
Privacy Statements Under The Gdpr, Mike Hintze
Seattle University Law Review
The need to include specific types of information in a privacy statement is a GDPR compliance obligation that does not get as much attention as some other GDPR requirements. Perhaps that is because privacy statements have been much maligned in recent years. They are too long and full of legalese. Nobody reads them. They are part of a notice and consent approach to privacy that puts an unrealistic burden on consumers to make informed choices. But despite these well-known criticisms, the GDPR doubles down on privacy statements. In fact, gauging by the roughly fourfold increase in privacy statement requirements compared …
Gdpr Compliance—It Takes A Village, Susy Mendoza
Gdpr Compliance—It Takes A Village, Susy Mendoza
Seattle University Law Review
When the General Data Protection Regulation (GDPR) came into effect in May of 2018, many legal departments were confronted with the gravity of just how they were going to comply with such a wide-reaching law. If you have international customers (both direct to consumer or business to business), it is not hard to convince your general counsel that compliance with the GDPR is a must. You may even be able to get the chief technical officer (CTO) or chief operating officer (COO) onboard just by mentioning the steep fines—two to four percent of worldwide gross revenue. But how does the …
Footprints: Privacy For Enterprises, Processors, And Custodians…Oh My!, Blair Witzel, Carrie Mount
Footprints: Privacy For Enterprises, Processors, And Custodians…Oh My!, Blair Witzel, Carrie Mount
Seattle University Law Review
Americans’ interest in privacy—as evidenced by increasing news coverage, online searches, and new legislation—has grown over the past decade. After the European Union enacted the General Data Protection Regulation (GDPR), technologists and legal professionals have focused on primary collectors of data—known under various legal regimes as the “controller” or “custodian.” Thanks to advances in computing, many of these data collectors offload the processing of data to third parties providing data-related cloud services like Amazon, Microsoft, and Google. In addition to the data they have already collected about the data subjects themselves, these companies now “hold” that data on behalf of …
Bytes Bite: Why Corporate Data Breaches Should Give Standing To Affected Individuals, Caden Hayes
Bytes Bite: Why Corporate Data Breaches Should Give Standing To Affected Individuals, Caden Hayes
Washington and Lee Journal of Civil Rights and Social Justice
High-profile data hacks are not uncommon. In fact, according to the Privacy Rights Clearinghouse, there have been at least 7,961 data breaches, exposing over 10,000,000,000 accounts in total, since 2005. These shocking numbers are not particularly surprising when taking into account the value of information stolen. For example, cell phone numbers, as exposed in a Yahoo! hack, are worth $10 a piece on the black market, meaning the hackers stood to make $30,000,000,000 from that one hack. That dollar amount does not even consider copies the hackers could make and later resell. Yet while these hackers make astronomical payoffs, the …
Strict Liability For Genetic Privacy Violations In The Age Of Big Data, Benjamin Sundholm
Strict Liability For Genetic Privacy Violations In The Age Of Big Data, Benjamin Sundholm
Faculty Publications
(Excerpt)
The ethical issues implicated by the misuse of genetic information have been smoldering for over half a century, and the age of big data has turned them into a five-alarm fire. In recent years, medical researchers and commercial enterprises have been using technological advancements to develop a variety of innovative ways to use genetic information. For example, it is becoming increasingly common for people to learn more about their health and family history by paying direct-to-consumer (“DTC”) companies to analyze their genetic data. DTC companies store the results of these tests electronically and often share them with pharmaceutical companies …
Privacy's Double Standards: Public Disclosure Tort Case Chart (2006-2016), Scott Skinner-Thompson
Privacy's Double Standards: Public Disclosure Tort Case Chart (2006-2016), Scott Skinner-Thompson
Research Data
This document, Privacy's Double Standards: Public Disclosure Tort Case Chart (2006-2016), 93 Wash. L. Rev. Online 2051 (2018), https://www.law.uw.edu/wlr/online-edition/scott-skinner-thompson, was published as an electronic supplement to the empirical study, Scott Skinner-Thompson, Privacy’s Double Standards, 93 Wash. L. Rev. 2051 (2018), available at https://scholar.law.colorado.edu/articles/1218/.
Defamation And Privacy In The Social Media Age: What Would Justice Brennan Think?, Stephen Wermiel
Defamation And Privacy In The Social Media Age: What Would Justice Brennan Think?, Stephen Wermiel
Articles in Law Reviews & Other Academic Journals
No abstract provided.
Criminal Employment Law, Benjamin Levin
Criminal Employment Law, Benjamin Levin
Publications
This Article diagnoses a phenomenon, “criminal employment law,” which exists at the nexus of employment law and the criminal justice system. Courts and legislatures discourage employers from hiring workers with criminal records and encourage employers to discipline workers for non-work-related criminal misconduct. In analyzing this phenomenon, my goals are threefold: (1) to examine how criminal employment law works; (2) to hypothesize why criminal employment law has proliferated; and (3) to assess what is wrong with criminal employment law. This Article examines the ways in which the laws that govern the workplace create incentives for employers not to hire individuals with …
Privacy's Double Standards, Scott Skinner-Thompson
Privacy's Double Standards, Scott Skinner-Thompson
Publications
Where the right to privacy exists, it should be available to all people. If not universally available, then privacy rights should be particularly accessible to marginalized individuals who are subject to greater surveillance and are less able to absorb the social costs of privacy violations. But in practice, there is evidence that people of privilege tend to fare better when they bring privacy tort claims than do non-privileged individuals. This disparity occurs despite doctrine suggesting that those who occupy prominent and public social positions are entitled to diminished privacy tort protections.
This Article unearths disparate outcomes in public disclosure tort …
Are Privacy Laws Deficient?, Woodrow Hartzog
Are Privacy Laws Deficient?, Woodrow Hartzog
Faculty Scholarship
Privacy law around the world is deficient because it ignores design. Lawmakers have attempted to establish limits on the collection, use, and distribution of personal information. But they have largely overlooked the power of design. They have discounted the role that design plays in facilitating the conduct and harm privacy law is meant to prevent. Design pitches and picks privacy winners and losers, with people as data subjects and surveillance objects often on the losing side.
The Laws Of Image, Samantha Barbas
The Laws Of Image, Samantha Barbas
Samantha Barbas
We live in an image society. Since the turn of the 20th century if not earlier, Americans have been awash in a sea of images throughout the visual landscape. We have become highly image-conscious, attuned to first impressions and surface appearances, and deeply concerned with our own personal images – our looks, reputations, and the impressions we make on others. The advent of this image-consciousness has been a familiar subject of commentary by social and cultural historians, yet its legal implications have not been explored. This article argues that one significant legal consequence of the image society was the evolution …
Copyright Owners' Putative Interests In Privacy, Reputation, And Control: A Reply To Goold, Wendy J. Gordon
Copyright Owners' Putative Interests In Privacy, Reputation, And Control: A Reply To Goold, Wendy J. Gordon
Faculty Scholarship
My own view is that Goold overstates the explanatory role of tort law. But even were that not the case, the courts need to reach some kind of “settled” understanding on these various interests before a cause of action is created or definitively rejected, and that no such consensus on the three matters mentioned yet exists, whether they are viewed as forms of tort or otherwise. Goold’s work may nevertheless be an important step toward reaching closure on these and other open questions in copyright law.
Keep Out! The Efficacy Of Trespass, Nuisance And Privacy Torts As Applied To Drones, Hillary B. Farber
Keep Out! The Efficacy Of Trespass, Nuisance And Privacy Torts As Applied To Drones, Hillary B. Farber
Georgia State University Law Review
A few years ago one might have seen a small object flying overhead without any idea what it could be. Today, it is fairly commonplace to see drones flying around our neighborhood skies. The Federal Aviation Administration (FAA) predicts there will be seven million drones populating our skies by 2020. In 2015 hobbyists, recreational users, and commercial businesses purchased unmanned aerial vehicles, commonly referred to as drones, in record-breaking numbers. Estimates reveal that over 4.3 million drones were sold worldwide in 2015. Trade industry experts predicted that more than 2.8 million drones would be sold in the U.S. in 2016 …
The Dark Side Of Social Media Romance: Civil Recourse For Catfish Victims, Armida Derzakarian
The Dark Side Of Social Media Romance: Civil Recourse For Catfish Victims, Armida Derzakarian
Loyola of Los Angeles Law Review
No abstract provided.
Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen
Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen
All Faculty Scholarship
Big Data is the vast quantities of information amenable to large-scale collection, storage, and analysis. Using such data, companies and researchers can deploy complex algorithms and artificial intelligence technologies to reveal otherwise unascertained patterns, links, behaviors, trends, identities, and practical knowledge. The information that comprises Big Data arises from government and business practices, consumer transactions, and the digital applications sometimes referred to as the “Internet of Things.” Individuals invisibly contribute to Big Data whenever they live digital lifestyles or otherwise participate in the digital economy, such as when they shop with a credit card, get treated at a hospital, apply …
Testimony On Unmanned Aircraft Systems Rules And Regulations, Stephen E. Henderson
Testimony On Unmanned Aircraft Systems Rules And Regulations, Stephen E. Henderson
Stephen E Henderson
Celebrity Newsgathering And Privacy: The Transformation Of Breach Of Confidence In English Law, John D. Mccamus
Celebrity Newsgathering And Privacy: The Transformation Of Breach Of Confidence In English Law, John D. Mccamus
John D. McCamus
In recent years, a series of leading cases have returned to consider these questions. The implications of these decisions for the current shape of English law relating to civil redress for privacy invasion are the subject of this article. Surprisingly, perhaps, English courts have remained steadfast in their refusal to recognize invasion of privacy as a tort and in doing so have quite explicitly declined to rely on American experience in this area. Rather, English courts have preferred to resist innovation of this kind and leave the difficult question of privacy law reform to Parliament. On a number of recent …
Prince V. St. Francis-St. George Hospital, Inc., Michael Christie
Prince V. St. Francis-St. George Hospital, Inc., Michael Christie
Akron Law Review
This note considers the possible impact on Ohio law of the Prince holding. A review of Ohio's prior position on invasion of privacy suggests that the holding of Prince represents a substantial departure from past decisions in two respects: first, the plaintiffs alleged that their privacy was invaded when information was communicated to only one other person, and second, the invasion of the privacy of one spouse served as the basis for a claim of the other spouse. This apparent departure of Prince from prior decisions is discussed in the context of a physician's duty of confidentiality and defendant's breach …