Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Selected Works (13)
- University of Colorado Law School (12)
- Pepperdine University (11)
- University of Michigan Law School (10)
- Vanderbilt University Law School (7)
-
- Maurer School of Law: Indiana University (6)
- University of Pennsylvania Carey Law School (6)
- University of Massachusetts School of Law (5)
- American University Washington College of Law (4)
- Boston University School of Law (4)
- Chicago-Kent College of Law (4)
- Georgetown University Law Center (4)
- SelectedWorks (4)
- Texas A&M University School of Law (4)
- University at Buffalo School of Law (4)
- University of Maryland Francis King Carey School of Law (4)
- University of Missouri School of Law (4)
- New York Law School (3)
- Pace University (3)
- Roger Williams University (3)
- The Catholic University of America, Columbus School of Law (3)
- University of Florida Levin College of Law (3)
- William & Mary Law School (3)
- Loyola University Chicago, School of Law (2)
- SJ Quinney College of Law, University of Utah (2)
- Touro University Jacob D. Fuchsberg Law Center (2)
- University of Georgia School of Law (2)
- University of Washington School of Law (2)
- Cleveland State University (1)
- Columbia Law School (1)
- Publication Year
- Publication
-
- Publications (12)
- Faculty Publications (11)
- Faculty Scholarship (10)
- Pepperdine Law Review (9)
- Faculty Scholarship at Penn Carey Law (6)
-
- Georgetown Law Faculty Publications and Other Works (4)
- Michigan Telecommunications & Technology Law Review (4)
- Vanderbilt Law Review (4)
- All Faculty Scholarship (3)
- Catholic University Journal of Law and Technology (3)
- Indiana Law Journal (3)
- Journal Articles (3)
- UF Law Faculty Publications (3)
- Vanderbilt Journal of Entertainment & Technology Law (3)
- Amicus Briefs (2)
- Articles (2)
- Articles & Chapters (2)
- Articles by Maurer Faculty (2)
- Articles in Law Reviews & Other Academic Journals (2)
- Chicago-Kent Law Review (2)
- Elisabeth Haub School of Law Faculty Publications (2)
- Faculty Publications & Other Works (2)
- Journal of Business & Technology Law (2)
- Life of the Law School (1993- ) (2)
- Michigan Law Review (2)
- Michigan Law Review First Impressions (2)
- Samantha Barbas (2)
- Scholarly Works (2)
- Stephen E Henderson (2)
- The Journal of Business, Entrepreneurship & the Law (2)
- Publication Type
- File Type
Articles 1 - 30 of 155
Full-Text Articles in Law
“Alexa, Am I A Murderer?”: An Analysis Of Whether The First Amendment Protects Smart Speaker Communications, Josie A. Bates
“Alexa, Am I A Murderer?”: An Analysis Of Whether The First Amendment Protects Smart Speaker Communications, Josie A. Bates
Arkansas Law Review
State v. Bates poses interesting First Amendment questions that go far beyond the case itself, such as whether communications to and from smart speakers are protected under the First Amendment and, if so, whether the government must therefore meet a heightened standard before obtaining information from these devices. But currently, there are no definite answers. Thus, this analysis will attempt to answer these questions as well as offer general guidance for the future of First and Fourth Amendment law in the age of ever-changing technological advancements and never-ending criminal accusations.
Big Data, Big Gap: Working Towards A Hipaa Framework That Covers Big Data, Ryan Mueller
Big Data, Big Gap: Working Towards A Hipaa Framework That Covers Big Data, Ryan Mueller
Indiana Law Journal
One lasting impact of the Health Insurance Portability and Accountability Act (HIPAA) is the privacy protections it provides for our sensitive health information. In the era of Big Data, however, much of our health information exists outside the traditional doctor-patient dynamic. From wearable technology, to mobile applications, to social media and internet browsing, Big Data organizations collect swaths of data that shed light on sensitive health information. Big Data organizations largely fall outside of HIPAA’s current framework because of the stringent requirements for when the HIPAA protections apply, namely that the data must be held by a covered entity, and …
Content Moderation As Surveillance, Hannah Bloch-Wehba
Content Moderation As Surveillance, Hannah Bloch-Wehba
Faculty Scholarship
Technology platforms are the new governments, and content moderation is the new law, or so goes a common refrain. As platforms increasingly turn toward new, automated mechanisms of enforcing their rules, the apparent power of the private sector seems only to grow. Yet beneath the surface lies a web of complex relationships between public and private authorities that call into question whether platforms truly possess such unilateral power. Law enforcement and police are exerting influence over platform content rules, giving governments a louder voice in supposedly “private” decisions. At the same time, law enforcement avails itself of the affordances of …
Four Privacy Stories And Two Hard Cases, Jessica Silbey
Four Privacy Stories And Two Hard Cases, Jessica Silbey
Faculty Scholarship
In the context of reviewing Scott Skinner's book "Privacy at the Margins" (Cambridge University Press, 2021), this article discusses four "privacy stories" (justifications for and explanation of the application of privacy law) that need substantiation and reinterpretation for the 21st century and for what I call "fourth generation" privacy law and scholarship. The article then considers these stories (and Skinner's analysis of them) in light of two "hard" cases, one he discusses in his book and one recently decided by the Massachusetts Supreme Judicial Court, both concerning privacy in taking and dissemination of photographs.
Appealing Compelled Disclosures In Discovery That Threaten First Amendment Rights, Richard L. Heppner Jr.
Appealing Compelled Disclosures In Discovery That Threaten First Amendment Rights, Richard L. Heppner Jr.
Law Faculty Publications
Last year, the Supreme Court held in Americans for Prosperity Foundation v. Bonta that a California anti-fraud policy compelling charities to disclose the identities of their major donors violated the First Amendment. That holding stems from the 1958 case NAACP v. Alabama where the Court held that a discovery order compelling the NAACP to disclose the names of its members violated the First Amendment right of free association because of the members’ justifiable fear of retaliation.
In the over sixty years since NAACP v. Alabama, the Court has only decided a handful of cases about how compelled disclosures of …
You Are Not A Commodity: A More Efficient Approach To Commercial Privacy Rights, Benjamin T. Pardue
You Are Not A Commodity: A More Efficient Approach To Commercial Privacy Rights, Benjamin T. Pardue
Washington Law Review
United States common law provides four torts for privacy invasion: (1) disclosure of private facts, (2) intrusion upon seclusion, (3) placement of a person in a false light, and (4) appropriation of name or likeness. Appropriation of name or likeness occurs when a defendant commandeers the plaintiff’s recognizability, typically for a commercial benefit. Most states allow plaintiffs who establish liability to recover defendants’ profits as damages from the misappropriation under an “unjust enrichment” theory. By contrast, this Comment argues that such an award provides a windfall to plaintiffs and contributes to suboptimal social outcomes. These include overcompensating plaintiffs and incentivizing …
Deepfake Privacy: Attitudes And Regulation, Matthew B. Kugler, Carly Pace
Deepfake Privacy: Attitudes And Regulation, Matthew B. Kugler, Carly Pace
Northwestern University Law Review
Using only a series of images of a person’s face and publicly available software, it is now possible to insert the person’s likeness into a video and show them saying or doing almost anything. This “deepfake” technology has permitted an explosion of political satire and, especially, fake pornography. Several states have already passed laws regulating deepfakes, and more are poised to do so. This Article presents three novel empirical studies that assess public attitudes toward this new technology. In our main study, a representative sample of the U.S. adult population perceived nonconsensually created pornographic deepfake videos as extremely harmful and …
Hacks, Leaks, And Data Dumps: The Right To Publish Illegally Acquired Information Twenty Years After Bartnicki V. Vopper, Erik Ugland, Christina Mazzeo
Hacks, Leaks, And Data Dumps: The Right To Publish Illegally Acquired Information Twenty Years After Bartnicki V. Vopper, Erik Ugland, Christina Mazzeo
Washington Law Review
This Article addresses a fluid and increasingly salient category of cases involving the First Amendment right to publish information that was hacked, stolen, or illegally leaked by someone else. Twenty years ago, in Bartnicki v. Vopper, the Supreme Court appeared to give broad constitutional cover to journalists and other publishers in these situations, but Justice Stevens’s inexact opinion for the Court and Justice Breyer’s muddling concurrence left the boundaries unclear. The Bartnicki framework is now implicated in dozens of new cases— from the extradition and prosecution of Julian Assange, to Donald Trump’s threatened suit of The New York Times …
The First Amendment, Common Carriers, And Public Accommodations: Net Neutrality, Digital Platforms, And Privacy, Christopher S. Yoo
The First Amendment, Common Carriers, And Public Accommodations: Net Neutrality, Digital Platforms, And Privacy, Christopher S. Yoo
Faculty Scholarship at Penn Carey Law
Recent prominent judicial opinions have assumed that common carriers have few to no First Amendment rights and that calling an actor a common carrier or public accommodation could justify limiting its right to exclude and mandating that it provide nondiscriminatory access. A review of the history reveals that the underlying law is richer than these simple statements would suggest. The principles for determining what constitutes a common carrier or a public accommodation and the level of First Amendment protection both turn on whether the actor holds itself out as serving all members of the public or whether it asserts editorial …
Catalyzing Privacy Law, Anupam Chander, Margot E. Kaminski, William Mcgeveran
Catalyzing Privacy Law, Anupam Chander, Margot E. Kaminski, William Mcgeveran
Publications
The United States famously lacks a comprehensive federal data privacy law. In the past year, however, over half the states have proposed broad privacy bills or have established task forces to propose possible privacy legislation. Meanwhile, congressional committees are holding hearings on multiple privacy bills. What is catalyzing this legislative momentum? Some believe that Europe’s General Data Protection Regulation (GDPR), which came into force in 2018, is the driving factor. But with the California Consumer Privacy Act (CCPA) which took effect in January 2020, California has emerged as an alternate contender in the race to set the new standard for …
Agonistic Privacy & Equitable Democracy, Scott Skinner-Thompson
Agonistic Privacy & Equitable Democracy, Scott Skinner-Thompson
Publications
This Essay argues that legal privacy protections—which enable individuals to control their visibility within public space—play a vital role in disrupting the subordinating, antidemocratic impacts of surveillance and should be at the forefront of efforts to reform the operation of both digital and physical public space. Robust privacy protections are a touchstone for empowering members of different marginalized groups with the ability to safely participate in both the physical and digital public squares, while also preserving space for vibrant subaltern counterpublics. By increasing heterogeneity within the public sphere, privacy can also help decrease polarization by breaking down echo chambers and …
The First Amendment And The Right(S) Of Publicity, Jennifer Rothman, Robert C. Post
The First Amendment And The Right(S) Of Publicity, Jennifer Rothman, Robert C. Post
Faculty Scholarship at Penn Carey Law
The right of publicity protects persons against unauthorized uses of their identity, most typically their names, images, or voices. The right is in obvious tension with freedom of speech. Yet courts seeking to reconcile the right with the First Amendment have to date produced only a notoriously confused muddle of inconsistent constitutional doctrine. In this Article, we suggest a way out of the maze. We propose a relatively straightforward framework for analyzing how the right of publicity should be squared with First Amendment principles.
At the root of contemporary constitutional confusion lies a failure to articulate the precise state interests …
The Fourth Amendment At Home, Thomas P. Crocker
The Fourth Amendment At Home, Thomas P. Crocker
Indiana Law Journal
A refuge, a domain of personal privacy, and the seat of familial life, the home holds a special place in Fourth Amendment jurisprudence. Supreme Court opinions are replete with statements affirming the special status of the home. Fourth Amendment text places special emphasis on securing protections for the home in addition to persons, papers, and effects against unwarranted government intrusion. Beyond the Fourth Amendment, the home has a unique place within constitutional structure. The home receives privacy protections in addition to sheltering other constitutional values protected by the Due Process Clause and the First Amendment. For example, under the Due …
The First Amendment And Data Privacy: Securing Data Privacy Laws That Withstand Constitutional Muster, Kathryn Peyton
The First Amendment And Data Privacy: Securing Data Privacy Laws That Withstand Constitutional Muster, Kathryn Peyton
Pepperdine Law Review
Given the growing ubiquity of digital technology’s presence in people’s lives today, it is becoming increasingly more necessary to secure data privacy protections. People interact with technology constantly, ranging from when engaging in business activates, such as corresponding through emails or doing research online, to more innocuous activities like driving, shopping, or talking with friends and family. The advances in technology have made possible the creation of digital trails whenever someone interacts with such technology. Companies aggregate data from data trails and use predictive analytics to create detailed profiles about citizen-consumers. This information is typically used for profit generating purposes. …
Sharenting And The (Potential) Right To Be Forgotten, Keltie Haley
Sharenting And The (Potential) Right To Be Forgotten, Keltie Haley
Indiana Law Journal
Part I of this Note serves as an evaluation of parental use of social media and
further seeks to draw attention to the social and developmental impact parental
oversharing can have on children. Part II examines the tension between parents’
constitutional rights to direct the upbringing of their children, as well as their First
Amendment interest in online expression, and their children’s interest in personal
data security and privacy. Part III provides an overview of the European Union’s
right to be forgotten framework in the sharenting context and considers the
plausibility of implementing such a framework in the United States. …
Automation In Moderation, Hannah Bloch-Wehba
Automation In Moderation, Hannah Bloch-Wehba
Faculty Scholarship
This Article assesses recent efforts to encourage online platforms to use automated means to prevent the dissemination of unlawful online content before it is ever seen or distributed. As lawmakers in Europe and around the world closely scrutinize platforms’ “content moderation” practices, automation and artificial intelligence appear increasingly attractive options for ridding the Internet of many kinds of harmful online content, including defamation, copyright infringement, and terrorist speech. Proponents of these initiatives suggest that requiring platforms to screen user content using automation will promote healthier online discourse and will aid efforts to limit Big Tech’s power.
In fact, however, the …
News As Surveillance, Erin C. Carroll
News As Surveillance, Erin C. Carroll
Georgetown Law Faculty Publications and Other Works
As inhabitants of the Information Age, we are increasingly aware of the amount and kind of data that technology platforms collect on us. Far less publicized, however, is how much data news organizations collect on us as we read the news online and how they allow third parties to collect that personal data as well. A handful of studies by computer scientists reveal that, as a group, news websites are among the Internet’s worst offenders when it comes to tracking their visitors.
On the one hand, this surveillance is unsurprising. It is capitalism at work. The press’s business model has …
The Modern Fight For Media Freedom In The United States, Jonathan Peters
The Modern Fight For Media Freedom In The United States, Jonathan Peters
Scholarly Works
The First Amendment as a subject is challenging and provocative, and scholarly and popular understandings of it are changing. New communication technologies are pushing lawyers, judges, and scholars to revisit, and sometimes rethink, old legal doctrines and concepts. In the area of privacy, we have to think today about encryption and a website's terms of service. In the area of copyright, we have to think about peer-to-peer file sharing and the licenses granted by iTunes. In the area of sexual expression, we have to think about sexting, revenge porn, and deep fakes.'
This is the emerging state of play for …
Privacy, Eavesdropping, And Wiretapping Across The United States: Reasonable Expectation Of Privacy And Judicial Discretion, Carol M. Bast
Privacy, Eavesdropping, And Wiretapping Across The United States: Reasonable Expectation Of Privacy And Judicial Discretion, Carol M. Bast
Catholic University Journal of Law and Technology
One-party consent and all-party consent eavesdropping and wiretapping statutes are two broad pathways for legislation to deal with the problem of secret taping and some states protect conversation under state constitutions. Whether a conversation is protected against being taped as a private conversation is often gauged by the reasonable expectation of privacy standard. Judges in both all-party consent and one-party consent jurisdictions have had to use their leeway under the reasonable expectation of privacy standard to arrive at what at the time seemed to be the most appropriate solution, perhaps in doing so creating a case law exception.
Tinkering With Circuit Conflicts Beyond The Schoolhouse Gate, Stephen Wermiel
Tinkering With Circuit Conflicts Beyond The Schoolhouse Gate, Stephen Wermiel
Articles in Law Reviews & Other Academic Journals
No abstract provided.
Deep Fakes: A Looming Challenge For Privacy, Democracy, And National Security, Danielle K. Citron, Robert Chesney
Deep Fakes: A Looming Challenge For Privacy, Democracy, And National Security, Danielle K. Citron, Robert Chesney
Faculty Scholarship
Harmful lies are nothing new. But the ability to distort reality has taken an exponential leap forward with “deep fake” technology. This capability makes it possible to create audio and video of real people saying and doing things they never said or did. Machine learning techniques are escalating the technology’s sophistication, making deep fakes ever more realistic and increasingly resistant to detection. Deep-fake technology has characteristics that enable rapid and widespread diffusion, putting it into the hands of both sophisticated and unsophisticated actors. While deep-fake technology will bring with it certain benefits, it also will introduce many harms. The marketplace …
Law School News: Logan To Serve As Adviser On Restatement Third Of Torts 11-07-2019, Michael M. Bowden
Law School News: Logan To Serve As Adviser On Restatement Third Of Torts 11-07-2019, Michael M. Bowden
Life of the Law School (1993- )
No abstract provided.
Rights On Publicity As Remarkably Insignificant, R. George Wright
Rights On Publicity As Remarkably Insignificant, R. George Wright
Cleveland State Law Review
This Article introduces the right of publicity through a brief consideration of high-profile cases involving, respectively, Paris Hilton, human cannonball Hugo Zacchini, and the famous actress Olivia de Havilland. With this background understanding, the Article considers the supposed risks to freedom of speech posed by recognizing rights of publicity in a private party. From there, the Article addresses the nagging concern that the publicity rights cases promote a harmful "celebrification" of culture. Finally, the Article considers whether allowing for meaningful damage recoveries in publicity rights cases appropriately compensates victims in ways promoting the broad public interest.
Marketplace Of Ideas, Privacy, And The Digital Audience, Alexander Tsesis
Marketplace Of Ideas, Privacy, And The Digital Audience, Alexander Tsesis
Faculty Publications & Other Works
The availability of almost limitless sets of digital information has opened a vast marketplace of ideas. Information service providers like Facebook and Twitter provide users with an array of personal information about products, friends, acquaintances, and strangers. While this data enriches the lives of those who share content on the internet, it comes at the expense of privacy. Social media companies disseminate news, advertisements, and political messages, while also capitalizing on consumers' private shopping, surfing, and traveling habits. Companies like Cambridge Analytica, Amazon, and Apple rely on algorithmic programs to mash up and scrape enormous amounts of online and otherwise …
The Upside Of Deep Fakes, Jessica Silbey, Woodrow Hartzog
The Upside Of Deep Fakes, Jessica Silbey, Woodrow Hartzog
Faculty Scholarship
It’s bad. We know. The dawn of “deep fakes” — convincing videos and images of people doing things they never did or said — puts us all in jeopardy in several different ways. Professors Bobby Chesney and Danielle Citron have noted that now “false claims — even preposterous ones — can be peddled with unprecedented success today thanks to a combination of social media ubiquity and virality, cognitive biases, filter bubbles, and group polarization.” The scholars identify a host of harms from deep fakes, ranging from people being exploited, extorted, and sabotaged, to societal harms like the erosion of democratic …
Data Subjects' Privacy Rights: Regulation Of Personal Data Retention And Erasure, Alexander Tsesis
Data Subjects' Privacy Rights: Regulation Of Personal Data Retention And Erasure, Alexander Tsesis
Faculty Publications & Other Works
The European Union's right to erasure came into effect May 25, 2018, as Article 17 of the General Data Protection Regulation ("GDPR"). Unlike the U.S. "marketplace of ideas" model of free speech, the GDPR gives greater weight to data subjects' privacy interests than to audiences' curiosity about others' intimate lives. The U.S. and EU models advance human thirst for knowledge through open and uninhibited debates, whereas the internet marketplace tends to favor social media companies' commercial interests: put more specifically, free speech is not entirely harmonious with the interests of social media intermediaries whose algorithms tend to favor companies' bottom …
The Department Of Justice Versus Apple Inc. -- The Great Encryption Debate Between Privacy And National Security, Julia P. Eckart
The Department Of Justice Versus Apple Inc. -- The Great Encryption Debate Between Privacy And National Security, Julia P. Eckart
Catholic University Journal of Law and Technology
This article is an attempt to objectively examine and assess legal arguments made by Apple Inc. (Apple) and the Department of Justice (DOJ) concerning the DOJ’s use of the All Writs Act[1] (AWA) to require Apple to provide technical assistance to the DOJ so that it could access the encrypted data from the locked iPhone of Syed Rizwan Farook, commonly referred to as the San Bernardino shooter. The DOJ’s initial ex parte application focused on meeting the requirements of United States v. New York Telephone Co.[2] concluding the court order was authorized and appropriate. Apple not only argued …
Keeping It Off The Record: Student Social Media Monitoring And The Need For Updated Student Records Laws, Alice Haston
Keeping It Off The Record: Student Social Media Monitoring And The Need For Updated Student Records Laws, Alice Haston
Vanderbilt Journal of Entertainment & Technology Law
An increasing number of school districts work with private companies to monitor public social media and to notify administrators of alarming student information. Although these services help address challenging school safety issues, the Family Educational Rights and Privacy Act (FERPA) and state law offer little guidance on how districts should store student social media data. This Note encourages states to pass student records laws similar to recent California legislation and urges the Department of Education to clarify the relationship between student social media and education records under FERPA. New state and federal initiatives would help ensure that third parties may …
Global Platform Governance: Private Power In The Shadow Of The State, Hannah Bloch-Wehba
Global Platform Governance: Private Power In The Shadow Of The State, Hannah Bloch-Wehba
Faculty Scholarship
Online intermediaries—search engines, social media platforms, even e-commerce businesses—are increasingly required to make critical decisions about free expression, individual privacy, and property rights under domestic law. These requirements arise in contexts that include the right to be forgotten, hate speech, “terrorist” speech, and copyright and intellectual property. At the same time, these disputes about online speech are increasingly borderless. Many laws targeting online speech and privacy are explicitly extraterritorial in scope. Even when not, some courts have ruled that they have jurisdiction to enforce compliance on a global scale. And governments are also demanding that platforms remove content—on a global …
Recording As Heckling, Scott Skinner-Thompson
Recording As Heckling, Scott Skinner-Thompson
Publications
A growing body of authority recognizes that citizen recording of police officers and public space is protected by the First Amendment. But the judicial and scholarly momentum behind the emerging “right to record” fails to fully incorporate recording’s cost to another important right that also furthers First Amendment principles: the right to privacy.
This Article helps fill that gap by comprehensively analyzing the First Amendment interests of both the right to record and the right to privacy in public while highlighting the role of technology in altering the First Amendment landscape. Recording information can be critical to future speech and, …