Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Comparative and Foreign Law

Journal

Privacy

Institution
Publication Year
Publication

Articles 1 - 30 of 36

Full-Text Articles in Law

The Detention Of Immigration Policy: How States Are Commandeering Dhs Enforcement Guidelines, Brianna Riguera May 2024

The Detention Of Immigration Policy: How States Are Commandeering Dhs Enforcement Guidelines, Brianna Riguera

University of Miami Inter-American Law Review

In 2021, the Department of Homeland Security issued immigration guidelines that de-emphasized detention and removal of non-citizens who, aside from being undocumented, are otherwise contributing members of communities across the United States. However, Arizona, Montana, Ohio, Texas, and Louisiana challenged these guidelines, launching a nuanced legal dispute that concerned states standing under Article III, prosecutorial discretion, and nationwide preliminary injunctions. In United States v. Texas, the Court ruled 8-1 that the states lacked standing and reversed the Fifth Circuit’s nationwide injunction, but the majority opinion failed to address the other legal issues that are pressing on a rife debate about …


Prevent Phishy Business: Comparing California’S And The United Kingdom’S Age-Appropriate Design Code To Protect Youth From Cybersecurity Threats, Morgan Comite Jan 2024

Prevent Phishy Business: Comparing California’S And The United Kingdom’S Age-Appropriate Design Code To Protect Youth From Cybersecurity Threats, Morgan Comite

University of Miami International and Comparative Law Review

Cybersecurity is the safeguarding of computer systems and networks against information disclosure, theft, or damage to users’ hardware, software, or electronic data, as well as disruption or misdirection of the services computers and networks provide. Knowing privacy would be breached due to the impact of COVID, in 2020, the United Kingdom got ahead of the game and passed rules/regulations requiring online services to protect children under the age of eighteen from scams, phishing, and security attacks. However, currently, the United States does not have a sufficient uniform privacy law governed to protect children under the age of eighteen from cybersecurity …


Direct To Consumer Or Direct To All: Home Dna Tests And Lack Of Privacy Regulations In The United States, Karen J. Kukla Oct 2023

Direct To Consumer Or Direct To All: Home Dna Tests And Lack Of Privacy Regulations In The United States, Karen J. Kukla

IP Theory

Although the U.S. has some measures of privacy protection for genetic data, the lack of a comprehensive approach to protecting direct-to-consumer genetic testing results in privacy violations for both consumers and their relatives. This essay explores the critical need for the U.S. government to address these privacy violations and argues that the U.S. should approach the problem and strategize a solution similar to the European Union’s (EU) General Data Protection Regulation (GDPR). Part I identifies current United States law, both federal and state regulations that address DTC-GT and genetic privacy. Part II examines the lack of regulation surrounding current DTC-GT …


Inadequate Privacy: The Necessity Of Hipaa Reform In A Post-Dobbs World, Katherine Robertson Jan 2023

Inadequate Privacy: The Necessity Of Hipaa Reform In A Post-Dobbs World, Katherine Robertson

Seattle University Law Review

Part I of this Comment will provide an overview of HIPAA and the legal impacts of Dobbs. Part II will discuss the anticipatory response to the impacts of Dobbs on PHI by addressing the response from (1) the states, (2) the Biden Administration, and (3) the medical field. Part III will discuss the loopholes that exist in HIPAA and further address the potential impacts on individuals and the medical field if reform does not occur. Finally, Part IV will argue that the reform of HIPAA is the best avenue for protecting PHI related to reproductive healthcare.


Stars, Stripes, And Surveillance: The United States' Failure To Regulate Data Privacy, Sam Begland Jan 2023

Stars, Stripes, And Surveillance: The United States' Failure To Regulate Data Privacy, Sam Begland

American University Law Review

In the wake of the United States Supreme Court’s devastating decision to strip Americans of their constitutional right to abortion in Dobbs v. Jackson Women’s Health Organization, data privacy is more salient than ever. Without adequate data regulations, state governments and anti-abortion activists alike can harass and prosecute pregnant people attempting to exercise their bodily autonomy. This comment argues that the United States has violated its obligations under the International Covenant on Civil and Political Rights (ICCPR) Article 17 by failing to protect against interference with the use and collection of reproductive health data. Further, this comment analyzes interpretations of …


Big Data, Both Friend And Foe: The Intersection Of Privacy And Trade On The Transatlantic Stage, Gabrielle C. Craft May 2022

Big Data, Both Friend And Foe: The Intersection Of Privacy And Trade On The Transatlantic Stage, Gabrielle C. Craft

University of Miami International and Comparative Law Review

This Note analyzes the data privacy protection initiatives implemented by the European Union and the United States and their effects on international trade. As technology develops, the feasibility of data collection increases, allowing for the collecting of inconceivable amounts of data information. Consequently, this data includes personal information, thus implicating privacy concerns and the need for data privacy protection regulations. Data privacy focuses on the use and governance of personal data and how the data is gathered, collected, and stored. In 2018, the European Union enacted the General Data Protection Regulation (GDPR), which sets out highly stringent standards for how …


I Spy With My Little--Gps Tracking Device: Why Georgia Should Look To The United Kingdom's Domestic Violence Laws To Deter Innovative Abuses Of Technology, Tyerus Skala May 2022

I Spy With My Little--Gps Tracking Device: Why Georgia Should Look To The United Kingdom's Domestic Violence Laws To Deter Innovative Abuses Of Technology, Tyerus Skala

Georgia Journal of International & Comparative Law

No abstract provided.


The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine Jan 2022

The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine

Catholic University Journal of Law and Technology

No abstract provided.


Comparative Limitations On Abortions: The United States Supreme Court V. The European Court Of Human Rights, Sunaya Padmanabhan Oct 2021

Comparative Limitations On Abortions: The United States Supreme Court V. The European Court Of Human Rights, Sunaya Padmanabhan

Northwestern Journal of Law & Social Policy

This Note compares the balancing tests implemented by the United States Supreme Court and the European Court of Human Rights to determine the legal status of abortion within their jurisdictions. This Note will argue that the Supreme Court’s balancing test better protects a woman’s legal path to an abortion because it A) limits states’ restrictions to specific categories and B) regulates the extent to which states can restrict a woman’s pre-viability abortion.

This Note will also examine the ways in which each court’s abortion jurisprudence substantively restricts a woman’s ability to obtain an abortion, even where legal avenues to the …


Hardware, Heartware, Or Nightmare: Smart-City Technology And The Concomitant Erosion Of Privacy, Leila Lawlor Oct 2019

Hardware, Heartware, Or Nightmare: Smart-City Technology And The Concomitant Erosion Of Privacy, Leila Lawlor

Journal of Comparative Urban Law and Policy

Smart city technology is being adopted in cities all around the world to simplify our lives, save us time, ease traffic, improve education, reduce energy usage and keep us safe. This article discusses smart city projects being utilized in crime prevention and investigations. Specifically, this article highlights examples of gunshot detection devices and surveillance that have led to improvements in public safety in Cape Town, Chicago and Atlanta, and discusses their impacts to privacy.


The Necessity Of Human Rights Legal Protections In Mutual Legal Assistance Treaty Reform, Christine Galvagna May 2019

The Necessity Of Human Rights Legal Protections In Mutual Legal Assistance Treaty Reform, Christine Galvagna

Notre Dame Journal of International & Comparative Law

Mutual legal assistance treaty (MLAT) reform is a transnational legal movement aimed at facilitating more rapid law enforcement access to cross-border data, while also preventing violations of state sovereignty through the exercise of extraterritorial jurisdiction over data. Efforts primarily focus on the United States (U.S.) mutual legal assistance (MLA) process, as it is exceedingly slow and convoluted, but also unavoidable, given that most major tech companies have their bases in the U.S. Recently proposed or enacted legal instruments include the U.S. CLOUD Act, the European Union’s (EU) e-Evidence proposal, Council of Europe’s forthcoming Additional Protocol to the Convention on Cybercrime, …


Cashless Societies And The Rise Of The Independent Cryptocurrencies: How Governments Can Use Privacy Laws To Compete With Independent Cryptocurrencies, Matla Garcia Chavolla Mar 2019

Cashless Societies And The Rise Of The Independent Cryptocurrencies: How Governments Can Use Privacy Laws To Compete With Independent Cryptocurrencies, Matla Garcia Chavolla

Pace International Law Review

Many individuals (including governments) envision living in a future world where physical currency is a thing of the past. Many countries have made great strides in their efforts to go cashless. At the same time, there is increasing awareness among citizens of the decreasing amount of privacy in their lives. The potential hazards cashless societies pose to financial privacy may incentivize citizens to hold some of their money in independent cryptocurrencies. This article argues that in order for governments in cashless societies to keep firm control over their money supply, they should enact stronger privacy law protections for its citizens …


Younger Generations Are Infected By Continuous Socialization To Accept Diminished Privacy: A Global Analysis Of How The United States' Constitutional Doctrine Is A Main Contributor To Eroded Privacy, Tiffany Kim Feb 2019

Younger Generations Are Infected By Continuous Socialization To Accept Diminished Privacy: A Global Analysis Of How The United States' Constitutional Doctrine Is A Main Contributor To Eroded Privacy, Tiffany Kim

Indiana Journal of Global Legal Studies

Since the nineteenth century, privacy concerns have increased with the growth of technology. The invention of instantaneous photography, coupled with the enlarged presence of press, was met with concerns of degraded privacy. Society has formed expectations of privacy, but as time passes, those expectations continue to diminish. Younger generations have been socialized to accept lessened levels of privacy in this digitalized world of mass data and connectivity.

Individual privacy expectations vary globally. The construction of China's government and culture produces a lesser expectation of individual privacy than that of the United States. As outlined in the U.S. Constitution, U.S. citizens …


The Employee Right To Disconnect, Paul M. Secunda Jan 2019

The Employee Right To Disconnect, Paul M. Secunda

Notre Dame Journal of International & Comparative Law

U.S. workers are increasingly finding it difficult to escape from work. Through their smartphones, e-mail, and social media, work tethers them to their workstations well after the work day has ended. Whether at home or in transit, employers are asking or requiring employees to complete assignments, tasks, and projects outside of working hours. This practice has a profound detrimental impact on employee privacy and autonomy, safety and health, productivity and compensation, and rest and leisure. France and Germany have responded to this emerging workplace issue by taking different legal approaches to providing their employees a right to disconnect from the …


"You Have The Data"...The Writ Of Habeas Data And Other Data Protection Rights: Is The United States Falling Behind?, Sarah L. Lode Jan 2019

"You Have The Data"...The Writ Of Habeas Data And Other Data Protection Rights: Is The United States Falling Behind?, Sarah L. Lode

Indiana Law Journal

In Part I of this Note, I will discuss the writ of habeas data that has been developed primarily, but not exclusively, in Latin American countries. I will discuss the intricacies of the writ, how it evolved, and how it is applied today. Using Argentina as an example, I will discuss how the writ would be used by an Argentine citizen to protect her personal data. Part II summarizes the previously employed data protection scheme in the European Union, the Data Protection Directive (“the Directive”), and will also discuss the new EU data protection regulation, the General Data Protection Regulation …


Data Subjects' Privacy Rights: Regulation Of Personal Data Retention And Erasure, Alexander Tsesis... Jan 2019

Data Subjects' Privacy Rights: Regulation Of Personal Data Retention And Erasure, Alexander Tsesis...

University of Colorado Law Review

No abstract provided.


The Language-Game Of Privacy, Joshua A.T. Fairfield Apr 2018

The Language-Game Of Privacy, Joshua A.T. Fairfield

Michigan Law Review

A review of Ronald J. Krotoszynski, Jr., Privacy Revisited: A Global Perspective on the Right to Be Left Alone.


Global Cybersecurity, Surveillance, And Privacy: The Obama Administration's Conflicted Legacy, Peter Margulies Aug 2017

Global Cybersecurity, Surveillance, And Privacy: The Obama Administration's Conflicted Legacy, Peter Margulies

Indiana Journal of Global Legal Studies

To analyze the Obama administration's cyber efforts, this Article proposes a paradigm of stewardship with both discursive and structural dimensions. Discursive stewardship refers to the Executive's openness to dialogue with other stakeholders. Structural stewardship refers to the domestic and transnational distribution of decisional authority, including checks and balances that guard against the excesses of unilateral action. The Article concludes that the Obama administration made substantial progress in each of these realms. However, the outsized role of law enforcement agendas and dearth of clearly articulated checks on transnational surveillance drove headwinds that limited forward movement.


Balancing A Right To Be Forgotten With A Right To Freedom Of Expression In The Wake Of Google Spain V. Aepd, Shaniqua Singleton Sep 2016

Balancing A Right To Be Forgotten With A Right To Freedom Of Expression In The Wake Of Google Spain V. Aepd, Shaniqua Singleton

Georgia Journal of International & Comparative Law

No abstract provided.


The Need For An International Convention On Data Privacy: Taking A Cue From The Cisg, Morgan Corley Jan 2016

The Need For An International Convention On Data Privacy: Taking A Cue From The Cisg, Morgan Corley

Brooklyn Journal of International Law

In light of the invalidation of the U.S.-EU Safe Harbor, along with the increase in sales of personal data as a commodity, data privacy has become a major concern amongst different nations. The lack of harmonization of data-privacy laws around the world continues to pose obstacles to the free flow of data across national borders. The free flow of data is, nonetheless, essential the international economy. As a result, nations continue to work together to try to create mechanisms by which data can be transferred across borders in a secure manner. This Note examines the current state of data-privacy law …


The Right To Be Forgotten: Comparing U.S. And European Approaches, Samuel W. Royston Jan 2016

The Right To Be Forgotten: Comparing U.S. And European Approaches, Samuel W. Royston

St. Mary's Law Journal

This Article compares the European and United States stances regarding the right to be forgotten. Within that context, this Article explores the implications of technological advances on constitutional rights, specifically the intersection of the right to free speech and the right to privacy, commonly referred to as the "right to be forgotten" paradox. In the United States, the trend is to favor free speech, while Europe places an emphasis on human rights. Each approach is analyzed based on supporting case law. The consequences of each approach on society, both long- and short-term, are also discussed. This Article argues that a …


Implications For The Future Of Global Data Security And Privacy: The Territorial Application Of The Stored Communications Act And The Microsoft Case, Russell Hsiao Dec 2015

Implications For The Future Of Global Data Security And Privacy: The Territorial Application Of The Stored Communications Act And The Microsoft Case, Russell Hsiao

Catholic University Journal of Law and Technology

No abstract provided.


Habeas Data: Comparative Constitutional Interventions From Latin America Against Neoliberal States Of Insecurity And Surveillance, Marc Tizoc Gonzalez Apr 2015

Habeas Data: Comparative Constitutional Interventions From Latin America Against Neoliberal States Of Insecurity And Surveillance, Marc Tizoc Gonzalez

Chicago-Kent Law Review

To cultivate the next twenty years of LatCrit theory, praxis, and community, the afterword looks back to LatCrit’s Critical Global Classroom (2003–04) (CGC), an ABA-accredited summer study-abroad program. The CGC invited U.S. law students to study comparative constitutionalism, law and society, and truth and reconciliation movements while sojourning Chile, Argentina, and South Africa under the question: “Shall the recent history of the Global South become the imminent fate of the Global North?” While enrolled in the 2004 CGC, the author learned about the extraordinary constitutional writ of habeas data, which various Latin American countries adopted as they reconstituted their …


The Right To No: The Crime Of Marital Rape, Women's Human Rights, And International Law, Melanie Randall, Vasanthi Venkatesh Jan 2015

The Right To No: The Crime Of Marital Rape, Women's Human Rights, And International Law, Melanie Randall, Vasanthi Venkatesh

Brooklyn Journal of International Law

More than half of the world’s countries do not explicitly criminalize sexual assault in marriage. While sexual assault in general is criminalized in these countries, sexual assault perpetrated by a spouse is entirely legal. The human rights violations inhere in acts of violence against women are now well recognized. Yet somehow marital rape is a particular form of gendered violence that has escaped both criminal law sanctions and human rights approbation in a great number of the world’s nations.

This silence in the law creates legal impunity for men who sexually assault or rape the women who are their wives …


A Cloudy Forecast: Divergence In The Cloud Computing Laws Of The United States, European Union, And China, Tina Cheng Jun 2014

A Cloudy Forecast: Divergence In The Cloud Computing Laws Of The United States, European Union, And China, Tina Cheng

Georgia Journal of International & Comparative Law

No abstract provided.


Should The Default Be "Social"? Canada's Pushback Against Oversharing By Facebook, Karen Tanenbaum Oct 2013

Should The Default Be "Social"? Canada's Pushback Against Oversharing By Facebook, Karen Tanenbaum

Georgia Journal of International & Comparative Law

No abstract provided.


In The Middle: Creating A Middle Road Between U.S. And Eu Data Protection Policies, Carolyn Hoang Apr 2013

In The Middle: Creating A Middle Road Between U.S. And Eu Data Protection Policies, Carolyn Hoang

Journal of the National Association of Administrative Law Judiciary

The first section of this paper examines the historical differences that have led to the American approach to privacy and the European approach to privacy. The second section will examine the current U.S. model, and the third section will examine the EU model. Next, the fourth section will compare and contrast the two models. Finally, the last section will argue that the U.S. should have a regulatory agency and describe how that should look and run.


¿Viva La Data Protection? Chile As A Touchstone For The Future Of Information Privacy, Nicola Carah Menaldo Apr 2011

¿Viva La Data Protection? Chile As A Touchstone For The Future Of Information Privacy, Nicola Carah Menaldo

University of Miami International and Comparative Law Review

This article attempts to uncover a puzzle: although the traditional levers for strong privacy protection are present in Chile - a history of dictatorship, an information technology revolution, and strong trade with the European Union - its data protection laws are in fact very weak. What explains this apparent disconnect? This article challenges the conventional wisdom that Chile's weak data protection regime is the result of weak democratic institutions, collective action problems, or the prioritization of credit data protections. Instead, it argues that Chile's stunted regime results from a political culture in which privacy protections, generally, are traded off for …


Does Law Matter Online - Empirical Evidence On Privacy Law Compliance, Michael Birnhack, Niva Elkin-Koren Jan 2011

Does Law Matter Online - Empirical Evidence On Privacy Law Compliance, Michael Birnhack, Niva Elkin-Koren

Michigan Telecommunications & Technology Law Review

Does law matter in the information environment? What can we learn from the experience of applying a particular legal regime to the online environment? Informational privacy (or to use the European term, data protection) provides an excellent illustration of the challenges faced by regulators who seek to secure user rights and shape online behavior. A comprehensive study of Israeli website compliance with information privacy regulation in 2003 and 2006 provides insights for understanding these challenges. The study examined the information privacy practices of 1360 active websites, determining the extent to which these sites comply with applicable legal requirements related to …


The (Mis)Categorization Of Sex In Anglo-American Cases Of Transsexual Marriage, John Parsi Jun 2010

The (Mis)Categorization Of Sex In Anglo-American Cases Of Transsexual Marriage, John Parsi

Michigan Law Review

The United States' promise to establish equality for all has been challenged by post-operative transsexuals seeking recognition in their acquired sex. The birth certificate is the legal gateway to changing other legal documents; but the process for changing the birth certificate varies widely from state to state. This lack of national uniformity makes post-operative transsexuals' recognition of their acquired sex complicated at best and impossible at worst. This Note details the legal progression from non-recognition to recognition of post-operative transsexuals' acquired sex in the United Kingdom and through the European Court of Human Rights. The Note goes on to explore …