Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Business

PDF

Privacy

Institution
Publication Year
Publication
Publication Type

Articles 1 - 30 of 36

Full-Text Articles in Law

J Mich Dent Assoc August 2023 Aug 2023

J Mich Dent Assoc August 2023

The Journal of the Michigan Dental Association

Every month, The Journal of the Michigan Dental Association brings news, information, and features about Michigan dentistry to our state's oral health community and the MDA's 6,200+ members. No publication reaches more Michigan dentists!

In this issue, the reader will find the following original content:

  • A cover story on new dentist’s perceptions of professionalism.
  • A feature on legal considerations when addressing employee wellness.
  • A feature on the meaning of wellness by ADA Trustee Dr. Brett Kessler.
  • Practice guidance on conducting a HIPAA security risk analysis.
  • Commentary “The New Golden Age of Dentistry.”
  • Editorial and regular department articles on MDA Foundation …


Hired By A Machine: Can A New York City Law Enforce Algorithmic Fairness In Hiring Practices?, Lindsey Fuchs Jan 2023

Hired By A Machine: Can A New York City Law Enforce Algorithmic Fairness In Hiring Practices?, Lindsey Fuchs

Fordham Journal of Corporate & Financial Law

Workplace antidiscrimination laws must adapt to address today’s technological realities. If left underregulated, the rapidly expanding role of Artificial Intelligence (“AI”) in hiring practices has the danger of creating new, more obscure modes of discrimination. Companies use these tools to reduce the duration and costs of hiring and potentially attract a larger pool of qualified applicants for their open positions. But how can we guarantee that these hiring tools yield fair outcomes when deployed? These issues are just starting to be addressed at the federal, state, and city levels. This Note tackles whether a new city law can be improved …


Governing Smart Cities As Knowledge Commons - Introduction, Chapter 1 & Conclusion, Brett M. Frischmann, Michael J. Madison, Madelyn Sanfilippo Jan 2023

Governing Smart Cities As Knowledge Commons - Introduction, Chapter 1 & Conclusion, Brett M. Frischmann, Michael J. Madison, Madelyn Sanfilippo

Book Chapters

Smart city technology has its value and its place; it isn’t automatically or universally harmful. Urban challenges and opportunities addressed via smart technology demand systematic study, examining general patterns and local variations as smart city practices unfold around the world. Smart cities are complex blends of community governance institutions, social dilemmas that cities face, and dynamic relationships among information and data, technology, and human lives. Some of those blends are more typical and common. Some are more nuanced in specific contexts. This volume uses the Governing Knowledge Commons (GKC) framework to sort out relevant and important distinctions. The framework grounds …


Towards A Calibrated Trust-Based Approach To The Use Of Facial Recognition Technology, Gary Kok Yew Chan Nov 2021

Towards A Calibrated Trust-Based Approach To The Use Of Facial Recognition Technology, Gary Kok Yew Chan

Research Collection Yong Pung How School Of Law

The use of facial recognition technology has given rise to much debate relating to issues concerning privacy infringements, bias and inaccuracies of data and outputs, possibilities of covert use, the lack of data security and the problem of function creep. Certain states and jurisdictions have called for bans and moratoria on the use of facial recognition technology. This paper argues that a blanket ban on facial recognition technology would be overly precautionary without fully considering the wide range of uses and benefits of the innovation. To promote its acceptance, trust in facial recognition technology should be developed in a calibrated …


Personal Data Privacy And Protective Federal Legislation: An Exploration Of Constituent Position On The Need For Legislation To Control Data Reliant Organizations Collecting And Monetizing Internet-Obtained Personal Data, Giovanni De Meo Aug 2021

Personal Data Privacy And Protective Federal Legislation: An Exploration Of Constituent Position On The Need For Legislation To Control Data Reliant Organizations Collecting And Monetizing Internet-Obtained Personal Data, Giovanni De Meo

Dissertations

In the past twenty years, the business of online personal data collection has grown at the same rapid pace as the internet itself, fostering a multibillion-dollar personal data collection and commercialization industry. Unlike many other large industries, there has been no major federal legislation enacted to monitor or control the activities of organizations dealing in this flourishing industry. The combination of these factors together with the lack of prior research encouraged this research designed to understand how much voters know about this topic and whether there is interest in seeing legislation enacted to protect individual personal data privacy.

To address …


Privacy-As-Property: A New Fundamental Approach To The Right To Privacy And The Impact This Will Have On The Law And Corporations, Sevion Dacosta Jan 2021

Privacy-As-Property: A New Fundamental Approach To The Right To Privacy And The Impact This Will Have On The Law And Corporations, Sevion Dacosta

CMC Senior Theses

The most popular conception of the right to privacy stems from Warren and Brandeis’s description of privacy as “the right to be left alone.” This theory ultimately points to a more fundamental approach to the right to privacy rooted in property rights. This fundamental approach - which I call privacy-as-property - is what I establish in this paper. I argue that the Lockean concept of property that “every man has a property in his own person” provides the foundation for the right to privacy. Privacy-as-property begins with the fundamental right to control oneself. Because of this intrinsic right, your property …


The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin Aug 2020

The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin

Open Educational Resources

Using episodes from the show Black Mirror as a study tool - a show that features tales that explore techno-paranoia - the course analyzes legal and policy considerations of futuristic or hypothetical case studies. The case studies tap into the collective unease about the modern world and bring up a variety of fascinating key philosophical, legal, and economic-based questions.


Law And Authors: A Legal Handbook For Writers (Introduction), Jacqueline D. Lipton Aug 2020

Law And Authors: A Legal Handbook For Writers (Introduction), Jacqueline D. Lipton

Book Chapters

Drawing on a wealth of experience in legal scholarship and publishing, Professor Jacqueline D. Lipton provides a useful legal guide for writers whatever their levels of expertise or categories of work (fiction, nonfiction, academic, journalism, freelance content development). This introductory chapter outlines the key legal and business issues authors are likely to face during the course of their careers, and emphasizes that most legal problems have solutions so law should never be an excuse to avoid writing something that an author feels strongly about creating. The larger work draws from case studies and hypothetical examples to address issues of copyright …


Regulation Of Algorithmic Tools In The United States, Christopher S. Yoo, Alicia Lai Jan 2020

Regulation Of Algorithmic Tools In The United States, Christopher S. Yoo, Alicia Lai

All Faculty Scholarship

Policymakers in the United States have just begun to address regulation of artificial intelligence technologies in recent years, gaining momentum through calls for additional research funding, piece-meal guidance, proposals, and legislation at all levels of government. This Article provides an overview of high-level federal initiatives for general artificial intelligence (AI) applications set forth by the U.S. president and responding agencies, early indications from the incoming Biden Administration, targeted federal initiatives for sector-specific AI applications, pending federal legislative proposals, and state and local initiatives. The regulation of the algorithmic ecosystem will continue to evolve as the United States continues to search …


Implementing Ethics Into Artificial Intelligence: A Contribution, From A Legal Perspective, To The Development Of An Ai Governance Regime, Axel Walz, Kay Firth-Butterfield Dec 2019

Implementing Ethics Into Artificial Intelligence: A Contribution, From A Legal Perspective, To The Development Of An Ai Governance Regime, Axel Walz, Kay Firth-Butterfield

Duke Law & Technology Review

The increasing use of AI and autonomous systems will have revolutionary impacts on society. Despite many benefits, AI and autonomous systems involve considerable risks that need to be managed. Minimizing these risks will emphasize the respective benefits while at the same time protecting the ethical values defined by fundamental rights and basic constitutional principles, thereby preserving a human centric society. This Article advocates for the need to conduct in-depth risk-benefit-assessments with regard to the use of AI and autonomous systems. This Article points out major concerns in relation to AI and autonomous systems such as likely job losses, causation of …


Law School News: Throw Out The Old Thinking 9-30-2019, Michael M. Bowden Sep 2019

Law School News: Throw Out The Old Thinking 9-30-2019, Michael M. Bowden

Life of the Law School (1993- )

No abstract provided.


Chapter: “Health Law And Ethics”, Allison K. Hoffman, I. Glenn Cohen, William M. Sage Jan 2019

Chapter: “Health Law And Ethics”, Allison K. Hoffman, I. Glenn Cohen, William M. Sage

All Faculty Scholarship

Law and ethics are both essential attributes of a high-functioning health care system and powerful explainers of why the existing system is so difficult to improve. U.S. health law is not seamless; rather, it derives from multiple sources and is based on various theories that may be in tension with one another. There are state laws and federal laws, laws setting standards and laws providing funding, laws reinforcing professional prerogatives, laws furthering social goals, and laws promoting market competition. Complying with law is important, but health professionals also should understand that the legal and ethical constraints under which health systems …


Breadcrumbs: Privacy As A Privilege, Prachi Bhardwaj Dec 2017

Breadcrumbs: Privacy As A Privilege, Prachi Bhardwaj

Capstones

Breadcrumbs: Privacy as a Privilege Abstract

By: Prachi Bhardwaj

In 2017, the world saw more data breaches than in any year prior. The count was more than the all-time high record in 2016, which was 40 percent more than the year before that.

That’s because consumer data is incredibly valuable today. In the last three decades, data storage has gone from being stored physically to being stored almost entirely digitally, which means consumer data is more accessible and applicable to business strategies. As a result, companies are gathering data in ways previously unknown to the average consumer, and hackers are …


Blown To Bits Project, David Schmidt Jan 2017

Blown To Bits Project, David Schmidt

Informatics Open Educational Resources

The book, Blown to Bits, uncovers the many ways that the new digital world has changed and is changing our whole environment. Some changes are incremental but others are more revolutionary. Some of the changes that we welcome are slowly eroding our privacy and are changing the rules of ownership. This book illuminates the complexities of these changes. I have attempted to capture the central points in selected chapters, and in some cases I have added new material or new examples to replace dated material. I picked chapters to summarize that address the following topics (and more). There are many …


Emergent Ai, Social Robots And The Law: Security, Privacy And Policy Issues, Ramesh Subramanian Jan 2017

Emergent Ai, Social Robots And The Law: Security, Privacy And Policy Issues, Ramesh Subramanian

Journal of International Technology and Information Management

The rapid growth of AI systems has implications on a wide variety of fields. It can prove to be a boon to disparate fields such as healthcare, education, global logistics and transportation, to name a few. However, these systems will also bring forth far-reaching changes in employment, economy and security. As AI systems gain acceptance and become more commonplace, certain critical questions arise: What are the legal and security ramifications of the use of these new technologies? Who can use them, and under what circumstances? What is the safety of these systems? Should their commercialization be regulated? What are the …


Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen Dec 2016

Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen

All Faculty Scholarship

Big Data is the vast quantities of information amenable to large-scale collection, storage, and analysis. Using such data, companies and researchers can deploy complex algorithms and artificial intelligence technologies to reveal otherwise unascertained patterns, links, behaviors, trends, identities, and practical knowledge. The information that comprises Big Data arises from government and business practices, consumer transactions, and the digital applications sometimes referred to as the “Internet of Things.” Individuals invisibly contribute to Big Data whenever they live digital lifestyles or otherwise participate in the digital economy, such as when they shop with a credit card, get treated at a hospital, apply …


A Brave New World Of Ambient Intelligence In The Casinos Of Macau: Reality Or Fiction?, Hugo Luz Dos Santos Mr. Dec 2015

A Brave New World Of Ambient Intelligence In The Casinos Of Macau: Reality Or Fiction?, Hugo Luz Dos Santos Mr.

UNLV Gaming Research & Review Journal

The article scrutinizes the brave new world of ambient intelligence in the casinos of the Macau, Special Administrative Region of People´s Republic of China, chiefly in regards to the (candent) issue of privacy of the casino patrons.

Moreover, this scientific article provides an overview about the secondary use of big data of the casino patrons for law enforcement purposes.


The Internet Of Things And Wearable Technology: Addressing Privacy And Security Concerns Without Derailing Innovation, Adam D. Thierer Nov 2014

The Internet Of Things And Wearable Technology: Addressing Privacy And Security Concerns Without Derailing Innovation, Adam D. Thierer

Adam Thierer

This paper highlights some of the opportunities presented by the rise of the so-called “Internet of Things” and wearable technology in particular, and encourages policymakers to allow these technologies to develop in a relatively unabated fashion. As with other new and highly disruptive digital technologies, however, the Internet of Things and wearable tech will challenge existing social, economic, and legal norms. In particular, these technologies raise a variety of privacy and safety concerns. Other technical barriers exist that could hold back IoT and wearable tech — including disputes over technical standards, system interoperability, and access to adequate spectrum to facilitate …


Systematic Ict Surveillance By Employers: Are Your Personal Activities Private?, Arlene J. Nicholas Jul 2014

Systematic Ict Surveillance By Employers: Are Your Personal Activities Private?, Arlene J. Nicholas

Faculty and Staff - Articles & Papers

This paper reviews the various methods of information and communications technology (ICT) that is used by employers to peer into the work lives and, in some cases, private lives of employees. Some of the most common methods – such as computer and Internet monitoring, video surveillance, and global positioning systems (GPS) – have resulted in employee disciplines that have been challenged in courts. This paper provides background information on United States (U.S.) laws and court cases which, in this age of easily accessible information, mostly support the employer. Assessments regarding regulations and policies, which will need to be continually updated …


Fouling The First Amendment: Why Colleges Can't, And Shouldn't, Control Student Athletes' Speech On Social Media, Frank D. Lomonte Jan 2014

Fouling The First Amendment: Why Colleges Can't, And Shouldn't, Control Student Athletes' Speech On Social Media, Frank D. Lomonte

Journal of Business & Technology Law

No abstract provided.


Policing The Social Media Water Cooler: Recent Nlrb Decisions Should Make Employers Think Twice Before Terminating An Employee For Comments Posted On Social Media Sites, Eric Raphan, Sean Kirby Jan 2014

Policing The Social Media Water Cooler: Recent Nlrb Decisions Should Make Employers Think Twice Before Terminating An Employee For Comments Posted On Social Media Sites, Eric Raphan, Sean Kirby

Journal of Business & Technology Law

No abstract provided.


Electronic Privacy Information Center V. National Security Agency: How Glomar Responses Benefit Businesses And Provide An Epic Blow To Individuals, Joshua R. Chazen Jan 2014

Electronic Privacy Information Center V. National Security Agency: How Glomar Responses Benefit Businesses And Provide An Epic Blow To Individuals, Joshua R. Chazen

Journal of Business & Technology Law

No abstract provided.


Social Implications Of Wearable Computing And Augmediated Reality In Every Day Life (Ieee Symposium On Technology And Society, Istas13), Katina Michael Jun 2013

Social Implications Of Wearable Computing And Augmediated Reality In Every Day Life (Ieee Symposium On Technology And Society, Istas13), Katina Michael

Associate Professor Katina Michael

It was in July 2012 that Steve Mann and I corresponded on the possibility of hosting a conference on wearable computing in Toronto, Canada. Steve had just returned home from a family holiday to France and publicly blogged about an unfortunate incident that had happened to him while away. On 17th July 2012 he posted: “Physical assault by McDonald’s for wearing Digital Eye Glass”. We both knew the timing was right for such an event that was not just a technical engineering or applied orientation on the theme of smart worlds, but an event that would grapple with the dichotomies …


Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke Dec 2012

Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke

Professor Katina Michael

During the last decade, location-tracking and monitoring applications have proliferated, in mobile cellular and wireless data networks, and through self-reporting by applications running in smartphones that are equipped with onboard global positioning system (GPS) chipsets. It is now possible to locate a smartphone-user's location not merely to a cell, but to a small area within it. Innovators have been quick to capitalise on these location-based technologies for commercial purposes, and have gained access to a great deal of sensitive personal data in the process. In addition, law enforcement utilise these technologies, can do so inexpensively and hence can track many …


Towards A Conceptual Model Of User Acceptance Of Location-Based Emergency Services, Anas Aloudat, Katina Michael Dec 2012

Towards A Conceptual Model Of User Acceptance Of Location-Based Emergency Services, Anas Aloudat, Katina Michael

Professor Katina Michael

This paper investigates the introduction of location-based services by government as part of an all-hazards approach to modern emergency management solutions. Its main contribution is in exploring the determinants of an individual’s acceptance or rejection of location services. The authors put forward a conceptual model to better predict why an individual would accept or reject such services, especially with respect to emergencies. While it may be posited by government agencies that individuals would unanimously wish to accept life-saving and life-sustaining location services for their well-being, this view remains untested. The theorised determinants include: visibility of the service solution, perceived service …


Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael Dec 2012

Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael

Associate Professor Katina Michael

The boom of the internet and the explosion of new technologies have brought with them new challenges and thus new connotations of privacy. Clearly, when people deal with e-government and e-business, they do not only need the right to be let alone, but also to be let in secret. Not only do they need freedom of movement, but also to be assured of the secrecy of their information. Solove [6] has critiqued traditional definitions of privacy and argued that they do not address privacy issues created by new online technologies. Austin [7] also asserts: “[w]e do need to sharpen and …


Social Implications Of Technology: Past, Present, And Future, Karl D. Stephan, Katina Michael, M.G. Michael, Laura Jacob, Emily Anesta Apr 2012

Social Implications Of Technology: Past, Present, And Future, Karl D. Stephan, Katina Michael, M.G. Michael, Laura Jacob, Emily Anesta

Professor Katina Michael

The social implications of a wide variety of technologies are the subject matter of the IEEE Society on Social Implications of Technology (SSIT). This paper reviews the SSIT’s contributions since the Society’s founding in 1982, and surveys the outlook for certain key technologies that may have significant social impacts in the future. Military and security technologies, always of significant interest to SSIT, may become more autonomous with less human intervention, and this may have both good and bad consequences. We examine some current trends such as mobile, wearable, and pervasive computing, and find both dangers and opportunities in these trends. …


Book Review: Securing The Cloud: Cloud Computer Security Techniques And Tactics, Katina Michael Apr 2012

Book Review: Securing The Cloud: Cloud Computer Security Techniques And Tactics, Katina Michael

Associate Professor Katina Michael

With so much buzz around Cloud Computing, books like this one written by Winkler are much in demand. Winkler’s experience in the computing business shines through and as readers we are spoiled with a great deal of useful strategic information- a jam packed almost 300 page volume on securing the cloud.


Location Privacy Under Dire Threat As Uberveillance Stalks The Streets, Katina Michael, Roger Clarke Jan 2012

Location Privacy Under Dire Threat As Uberveillance Stalks The Streets, Katina Michael, Roger Clarke

Associate Professor Katina Michael

Location tracking and monitoring applications have proliferated with the arrival of smart phones that are equipped with onboard global positioning system (GPS) chipsets. It is now possible to locate a smart phone user down to 10 metres of accuracy on average. Innovators have been quick to capitalise on this emerging market by introducing novel pedestrian tracking technologies which can denote the geographic path of a mobile user. At the same time there is contention by law enforcement personnel over the need for a warrant process to track an individual in a public space. This paper considers the future of location …


Online Privacy Policy Of The Thirty Dow Jones Corporations: Compliance With Ftc Fair Information Practice Principles And Readability Assessment, Yuanxiang Li Jan 2012

Online Privacy Policy Of The Thirty Dow Jones Corporations: Compliance With Ftc Fair Information Practice Principles And Readability Assessment, Yuanxiang Li

Theses Digitization Project

This project conducted a statistical study of online privacy to examine how well corporations comply with FIPs and assess how easy their privacy was to read.