Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Consumer Protection Law

PDF

Pepperdine University

Privacy

Articles 1 - 2 of 2

Full-Text Articles in Law

Modern Privacy Advocacy: An Approach At War With Privacy Itself?, Justin "Gus" Hurwitz, Jamil N. Jaffer Jun 2020

Modern Privacy Advocacy: An Approach At War With Privacy Itself?, Justin "Gus" Hurwitz, Jamil N. Jaffer

Pepperdine Law Review

This Article argues that the modern concept of privacy itself, particularly as framed by some of its most ardent advocates today, is fundamentally incoherent. The Article highlights that many common arguments made in support of privacy, while initially seeming to protect this critical value, nonetheless undermine it in the long run. Using both recent and older examples of applying classic privacy advocacy positions to key technological innovations, the authors demonstrate how these positions, while seemingly privacy-enhancing at the time, actually resulted in outcomes that were less beneficial for consumers and citizens, including from a purely privacy-focused perspective. As a result, …


Sacrificing Privacy For Convenience: The Need For Stricter Ftc Regulations In An Age Of Smartphone Surveillance, Ashton Mckinnon May 2015

Sacrificing Privacy For Convenience: The Need For Stricter Ftc Regulations In An Age Of Smartphone Surveillance, Ashton Mckinnon

Journal of the National Association of Administrative Law Judiciary

This comment aims to focus on the most frequently used connector that consumers treasure not only for convenience but also as a lifelong necessity - the smartphone. The FTC needs to enforce federally mandated guidelines that will allow the consumer to use technology without the technology using the consumer. Part II of this comment focuses on the type of information that can be collected by various companies, service providers, and agencies from an individual's smartphone, and the intentions of these collectors behind use of this information. Part III evaluates how applications (apps) contribute to this scheme, and, specifically, apps' recordkeeping …