Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Intellectual Property Law

PDF

Privacy

Institution
Publication Year
Publication
Publication Type

Articles 1 - 30 of 163

Full-Text Articles in Law

Comparing Gdpr Against The United States’ Approach To Data Breach Notification By Examining Texas And California And The Feasibility Of A Universal Standard, Amrit Nagi Jan 2024

Comparing Gdpr Against The United States’ Approach To Data Breach Notification By Examining Texas And California And The Feasibility Of A Universal Standard, Amrit Nagi

Cybaris®

No abstract provided.


Unavoidability In U.S. Privacy Law, Laura M. Moy Jan 2024

Unavoidability In U.S. Privacy Law, Laura M. Moy

Georgetown Law Faculty Publications and Other Works

Why is U.S. privacy law structured the way it is, with a series of sectoral laws rather than a cross-sectoral law or laws? Why does U.S. privacy law protect information shared in certain contexts—such as information shared with an attorney, a healthcare provider, or a financial provider—rather than particular types of information? One possibility is that sectoral laws apply to contexts in which people typically share highly “sensitive” information containing intimate secrets or with the potential to harm them financially or psychologically.

But this Article argues that there is something else at play—that in fact, an under-discussed and underappreciated factor …


The Trade Origins Of Privacy Law, Anupam Chander Jan 2024

The Trade Origins Of Privacy Law, Anupam Chander

Georgetown Law Faculty Publications and Other Works

The desire for trade propelled the growth of data privacy law across the world. Countries with strong privacy laws sought to ensure that their citizens’ privacy would not be compromised when their data traveled to other countries. Even before this vaunted Brussels Effect pushed privacy law across the world through the enticement of trade with the European Union, Brussels had to erect privacy law within the Union itself. And as the Union itself expanded, privacy law was a critical condition for accession.

But this coupling of privacy and trade leaves a puzzle: how did the U.S. avoid a comprehensive privacy …


Defragging Feminist Cyberlaw, Amanda Levendowski Nov 2023

Defragging Feminist Cyberlaw, Amanda Levendowski

Georgetown Law Faculty Publications and Other Works

In 1996, Judge Frank Easterbrook famously observed that any effort to create a field called cyberlaw would be “doomed to be shallow and miss unifying principles.” He was wrong, but not for the reason other scholars have stated. Feminism is a unifying principle of cyberlaw, which alternately amplifies and abridges the feminist values of consent, safety, and accessibility. Cyberlaw simply hasn’t been understood that way—until now.

In computer science, “defragging” means bringing together disparate pieces of data so they are easier to access. Inspired by that process, this Article offers a new approach to cyberlaw that illustrates how feminist values …


Direct To Consumer Or Direct To All: Home Dna Tests And Lack Of Privacy Regulations In The United States, Karen J. Kukla Oct 2023

Direct To Consumer Or Direct To All: Home Dna Tests And Lack Of Privacy Regulations In The United States, Karen J. Kukla

IP Theory

Although the U.S. has some measures of privacy protection for genetic data, the lack of a comprehensive approach to protecting direct-to-consumer genetic testing results in privacy violations for both consumers and their relatives. This essay explores the critical need for the U.S. government to address these privacy violations and argues that the U.S. should approach the problem and strategize a solution similar to the European Union’s (EU) General Data Protection Regulation (GDPR). Part I identifies current United States law, both federal and state regulations that address DTC-GT and genetic privacy. Part II examines the lack of regulation surrounding current DTC-GT …


Encouraging Public Access To Pharmaceuticals Through Modified Protection Of Clinical Trial Data, Scott M. Nolan Ii Jul 2023

Encouraging Public Access To Pharmaceuticals Through Modified Protection Of Clinical Trial Data, Scott M. Nolan Ii

IP Theory

Part I of this Article investigates the development of pharmaceuticals and clinical trial data with a focus on patent and data protection. Part II evaluates the effects of protection and the challenges it poses to widespread public pharmaceutical access. Part III discusses two scholarly approaches to the public access issue that focus on clinical data protection and their associated challenges. In light of these scholarly works, Part IV suggests a new approach to clinical trial data protection that aims to improve public pharmaceutical access while maintaining the incentives to invent for drug developers.


Aclu V. Clearview Ai, Inc.,, Isra Ahmed May 2023

Aclu V. Clearview Ai, Inc.,, Isra Ahmed

DePaul Journal of Art, Technology & Intellectual Property Law

No abstract provided.


Confused About Copyright?, Sara Anne Hook Apr 2023

Confused About Copyright?, Sara Anne Hook

Graduate Scholarship and Professional Work

No abstract provided.


A Loaded God Complex: The Unconstitutionality Of The Executive Branch’S Unilaterally Withholding Zero-Days, Brendan Gilligan Apr 2023

A Loaded God Complex: The Unconstitutionality Of The Executive Branch’S Unilaterally Withholding Zero-Days, Brendan Gilligan

Northwestern Journal of Technology and Intellectual Property

No abstract provided.


The Data Trust Solution To Data Sharing Problems, Kimberly A. Houser, John W. Bagby Feb 2023

The Data Trust Solution To Data Sharing Problems, Kimberly A. Houser, John W. Bagby

Vanderbilt Journal of Entertainment & Technology Law

A small number of large companies hold most of the world’s data. Once in the hands of these companies, data subjects have little control over the use and sharing of their data. Additionally, this data is not generally available to small and medium enterprises or organizations who seek to use it for social good. A number of solutions have been proposed to limit Big Tech “power,” including antitrust actions and stricter privacy laws, but these measures are not likely to address both the oversharing and under-sharing of personal data. Although the data trust concept is being actively explored in the …


Securing Patent Law, Charles Duan Jan 2023

Securing Patent Law, Charles Duan

Articles in Law Reviews & Other Academic Journals

A vigorous conversation about intellectual property rights and national security has largely focused on the defense role of those rights, as tools for responding to acts of foreign infringement. But intellectual property, and patents in particular, also play an arguably more important offense role. Foreign competitor nations can obtain and assert U.S. patents against U.S. firms and creators. Use of patents as an offense strategy can be strategically coordinated to stymie domestic innovation and technological progress. This Essay considers current and possible future practices of patent exploitation in this offense setting, with a particular focus on China given the nature …


International Tax Agreements As The Final Push For Us Adoption Of Adequate Protection In Connection With The Gdpr, Olivia Hansen Jan 2023

International Tax Agreements As The Final Push For Us Adoption Of Adequate Protection In Connection With The Gdpr, Olivia Hansen

Marquette Intellectual Property & Innovation Law Review

None


Grand Jury Information And Government Contractors: Reconciliation Through Privacy Law, Andrew Holzmann Jan 2023

Grand Jury Information And Government Contractors: Reconciliation Through Privacy Law, Andrew Holzmann

Marquette Intellectual Property & Innovation Law Review

None


Questions Of Intellectual Property And Fundamental Values In The Digital Age, Jessica Silbey Jan 2023

Questions Of Intellectual Property And Fundamental Values In The Digital Age, Jessica Silbey

Marquette Intellectual Property & Innovation Law Review

None


Inadequate Privacy: The Necessity Of Hipaa Reform In A Post-Dobbs World, Katherine Robertson Jan 2023

Inadequate Privacy: The Necessity Of Hipaa Reform In A Post-Dobbs World, Katherine Robertson

Seattle University Law Review

Part I of this Comment will provide an overview of HIPAA and the legal impacts of Dobbs. Part II will discuss the anticipatory response to the impacts of Dobbs on PHI by addressing the response from (1) the states, (2) the Biden Administration, and (3) the medical field. Part III will discuss the loopholes that exist in HIPAA and further address the potential impacts on individuals and the medical field if reform does not occur. Finally, Part IV will argue that the reform of HIPAA is the best avenue for protecting PHI related to reproductive healthcare.


Questions Of Intellectual Property And Fundamental Values In The Digital Age, Jessica Silbey Jan 2023

Questions Of Intellectual Property And Fundamental Values In The Digital Age, Jessica Silbey

Faculty Scholarship

Today's intellectual property debates, in both law and the larger society, are a bellwether of changing justice needs in the twenty-first century. As the digital age democratizes technological opportunities, it brings intellectual property law into mainstream everyday culture. This generates debates about the relationship between the constitutional interest in "the progress of science and useful arts" and other fundamental values, such as equality, privacy, and distributive justice. These values, which were not explicitly part of intellectual property regimes in prior eras, are especially challenged in today's internet world.

The article (which was presented as the annual Nies Lecture in April …


Resisting Face Surveillance With Copyright Law, Amanda Levendowski May 2022

Resisting Face Surveillance With Copyright Law, Amanda Levendowski

Georgetown Law Faculty Publications and Other Works

Face surveillance is animated by deep-rooted demographic and deployment biases that endanger marginalized communities and threaten the privacy of all. But current approaches have not prevented its adoption by law enforcement. Some companies have offered voluntary moratoria on selling the technology, leaving many others to fill in the gaps. Legislators have enacted regulatory oversight at the state and city levels, but a federal ban remains elusive. Both approaches require vast shifts in practical and political will, each with drawbacks. While we wait, face surveillance persists. This Article suggests a new possibility: face surveillance is fueled by unauthorized copies and reproductions …


Four Privacy Stories And Two Hard Cases, Jessica Silbey Jan 2022

Four Privacy Stories And Two Hard Cases, Jessica Silbey

Faculty Scholarship

In the context of reviewing Scott Skinner's book "Privacy at the Margins" (Cambridge University Press, 2021), this article discusses four "privacy stories" (justifications for and explanation of the application of privacy law) that need substantiation and reinterpretation for the 21st century and for what I call "fourth generation" privacy law and scholarship. The article then considers these stories (and Skinner's analysis of them) in light of two "hard" cases, one he discusses in his book and one recently decided by the Massachusetts Supreme Judicial Court, both concerning privacy in taking and dissemination of photographs.


Delineating The Legal Framework For Data Protection: A Fundamental Rights Approach Or Data Propertization?, Efe Lawrence Ogbeide Jan 2022

Delineating The Legal Framework For Data Protection: A Fundamental Rights Approach Or Data Propertization?, Efe Lawrence Ogbeide

Canadian Journal of Law and Technology

The Charter of Fundamental Rights of the European Union, like other key legal instruments around the globe, grants citizens the right to privacy in Article 7. The Charter, however, further provides for the right to data protection in Article 8. Simply put, the implication of Article 8 of the Charter is that the right to data protection is a fundamental right. The central question in this article is whether data protection indeed qualifies to be categorized as a fundamental right. If not, what other approach(es) to data protection may be implemented?


Data Privacy, Human Rights, And Algorithmic Opacity, Sylvia Lu Jan 2022

Data Privacy, Human Rights, And Algorithmic Opacity, Sylvia Lu

Fellow, Adjunct, Lecturer, and Research Scholar Works

Decades ago, it was difficult to imagine a reality in which artificial intelligence (AI) could penetrate every corner of our lives to monitor our innermost selves for commercial interests. Within just a few decades, the private sector has seen a wild proliferation of AI systems, many of which are more powerful and penetrating than anticipated. In many cases, AI systems have become “the power behind the throne,” tracking user activities and making fateful decisions through predictive analysis of personal information. Despite the growing power of AI, proprietary algorithmic systems can be technically complex, legally claimed as trade secrets, and managerially …


Navigating The Identity Thicket: Trademark's Lost Theory Of Personality, The Right Of Publicity, And Preemption, Jennifer E. Rothman Jan 2022

Navigating The Identity Thicket: Trademark's Lost Theory Of Personality, The Right Of Publicity, And Preemption, Jennifer E. Rothman

All Faculty Scholarship

Both trademark and unfair competition laws and state right of publicity laws protect against unauthorized uses of a person’s identity. Increasingly, however, these rights are working at odds with one another, and can point in different directions with regard to who controls a person’s name, likeness, and broader indicia of identity. This creates what I call an "identity thicket" of overlapping and conflicting rights over a person’s identity. Current jurisprudence provides little to no guidance on the most basic questions surrounding this thicket, such as what right to use a person’s identity, if any, flows from the transfer of marks …


Facing Injustice: How Face Recognition Technology May Increase The Incidence Of Misidentifications And Wrongful Convictions, Laura M. Moy Dec 2021

Facing Injustice: How Face Recognition Technology May Increase The Incidence Of Misidentifications And Wrongful Convictions, Laura M. Moy

Georgetown Law Faculty Publications and Other Works

Does law enforcement use of face recognition technology paired with eyewitness identifications increase the incidence of wrongful convictions in U.S. criminal law? This Article explores this critical question and posits that the answer may be yes. Facial recognition is frequently used by law enforcement agencies to help generate investigative leads that are then presented to eyewitnesses for positive identification. But erroneous eyewitness accounts are the number one cause of wrongful convictions, and the use of face recognition to generate investigative leads may create the conditions for erroneous eyewitness identifications to take place. This is because face recognition technology is designed …


Contested Sovereignties: States, Media Platforms, Peoples, And The Regulation Of Media Content And Big Data In The Networked Society, Pascale Chapdelaine, Jaqueline Mcleod Rogers Aug 2021

Contested Sovereignties: States, Media Platforms, Peoples, And The Regulation Of Media Content And Big Data In The Networked Society, Pascale Chapdelaine, Jaqueline Mcleod Rogers

Law Publications

This article examines the legal and normative foundations of media content regulation in the borderless networked society. We explore the extent to which internet undertakings should be subject to state regulation, in light of Canada’s ongoing debates and legislative reform. We bring a cross-disciplinary perspective (from the subject fields of law; communications studies, in particular McLuhan’s now classic probes; international relations; and technology studies) to enable both policy and language analysis. We apply the concept of sovereignty to states (national cultural and digital sovereignty), media platforms (transnational sovereignty), and citizens (autonomy and personal data sovereignty) to examine the competing dynamics …


Privacy Vs. Transparency: Handling Protected Materials In Agency Rulemaking, Christopher S. Yoo, Kellen Mccoy Jul 2021

Privacy Vs. Transparency: Handling Protected Materials In Agency Rulemaking, Christopher S. Yoo, Kellen Mccoy

Indiana Law Journal

Agencies conducting informal rulemaking proceedings increasingly confront conflicting duties with respect to protected materials included in information submitted in public rulemaking dockets. They must reconcile the broad commitment to openness and transparency reflected in federal law with the duty to protect confidential business information (CBI) and personally identifiable information (PII) against improper disclosure.

This Article presents an analysis of how agencies can best balance these often countervailing considerations. Part I explores the statutory duties to disclose and withhold information submitted in public rulemaking dockets placed on agencies. It also examines judicial decisions and other legal interpretations regarding the proper way …


Achieving Privacy: Costs Of Compliance And Enforcement Of Data Protection Regulation, Anupam Chander, Meaza Abraham, Sandeep Chandy, Yuan Fang, Dayoung Park, Isabel Yu Mar 2021

Achieving Privacy: Costs Of Compliance And Enforcement Of Data Protection Regulation, Anupam Chander, Meaza Abraham, Sandeep Chandy, Yuan Fang, Dayoung Park, Isabel Yu

Georgetown Law Faculty Publications and Other Works

Is privacy a luxury for the rich world? Remarkably, there is a dearth of literature evaluating whether data privacy is too costly for companies to implement, or too expensive for governments to enforce. This paper is the first to offer a review of surveys of costs of compliance, and to summarize national budgets for enforcement. The study shows that while privacy may indeed prove costly for companies to implement, it is not too costly for governments to enforce. This study will help inform governments as they fashion and implement privacy laws to address the “privacy enforcement gap”—the disparity between the …


Legal Opacity: Artificial Intelligence’S Sticky Wicket, Charlotte A. Tschider Jan 2021

Legal Opacity: Artificial Intelligence’S Sticky Wicket, Charlotte A. Tschider

Faculty Publications & Other Works

Proponents of artificial intelligence (“AI”) transparency have carefully illustrated the many ways in which transparency may be beneficial to prevent safety and unfairness issues, to promote innovation, and to effectively provide recovery or support due process in lawsuits. However, impediments to transparency goals, described as opacity, or the “black-box” nature of AI, present significant issues for promoting these goals.

An undertheorized perspective on opacity is legal opacity, where competitive, and often discretionary legal choices, coupled with regulatory barriers create opacity. Although legal opacity does not specifically affect AI only, the combination of technical opacity in AI systems with legal opacity …


Data As The New Oil: A Slippery Slope Of Trade Secret Implications Greased By The California Consumer Privacy Act, Megan Marie Miller Jan 2021

Data As The New Oil: A Slippery Slope Of Trade Secret Implications Greased By The California Consumer Privacy Act, Megan Marie Miller

Cybaris®

Following the European model of the General Data Protection Regulation (GDPR), the state of California implemented the California Consumer Privacy Act (CCPA) on January 1, 2020. The CCPA allows any California consumer to demand to see all of the information that a company has saved on them; consumers can also request a full list of all the third parties that their data is shared with, sold to, and for what commercial purpose. This paper reviews the implications of a new law on the disclosure of trade secrets like client lists and algorithms that manipulate consumers’ data. Ultimately, the issue comes …


The Republic Of Letters And The Origins Of Scientific Knowledge Commons, Michael J. Madison Jan 2021

The Republic Of Letters And The Origins Of Scientific Knowledge Commons, Michael J. Madison

Book Chapters

The knowledge commons framework, deployed here in a review of the early network of scientific communication known as the Republic of Letters, combines a historical sensibility regarding the character of scientific research and communications with a modern approach to analyzing institutions for knowledge governance. Distinctions and intersections between public purposes and privacy interests are highlighted. Lessons from revisiting the Republic of Letters as knowledge commons may be useful in advancing contemporary discussions of Open Science.


Trademarks As Surveillance Transparency, Amanda Levendowski Jan 2021

Trademarks As Surveillance Transparency, Amanda Levendowski

Georgetown Law Faculty Publications and Other Works

We know very little about the technologies that watch us. From cell site simulators to predictive policing algorithms, the lack of transparency around surveillance technologies makes it difficult for the public to engage in meaningful oversight. Legal scholars have critiqued various corporate and law enforcement justifications for surveillance opacity, including contract and intellectual property law. But the public needs a free, public, and easily accessible source of information about corporate technologies that might be used to watch us. To date, the literature has overlooked a free, extensive, and easily accessible source of information about surveillance technologies hidden in plain sight: …


From Lex Informatica To The Control Revolution, Julie E. Cohen Jan 2021

From Lex Informatica To The Control Revolution, Julie E. Cohen

Georgetown Law Faculty Publications and Other Works

Legal scholarship on the encounter between networked digital technologies and law has focused principally on how legal and policy processes should respond to new technological developments and has spent much less time considering what that encounter might signify for the shape of legal institutions themselves. This essay focuses on the latter question. Within fields like technology studies, labor history, and economic sociology, there is a well-developed tradition of studying the ways that new information technologies and the “control revolution” they enabled—in brief, a quantum leap in the capacity for highly granular oversight and management—have elicited long-term, enduring changes in the …