Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Schulich School of Law, Dalhousie University (10)
- Selected Works (4)
- Touro University Jacob D. Fuchsberg Law Center (3)
- Washington and Lee University School of Law (3)
- Boston University School of Law (2)
-
- California Western School of Law (2)
- Maurer School of Law: Indiana University (2)
- Mitchell Hamline School of Law (2)
- Pepperdine University (2)
- The Catholic University of America, Columbus School of Law (2)
- University of Colorado Law School (2)
- Aga Khan University (1)
- American University Washington College of Law (1)
- Brooklyn Law School (1)
- Emory University School of Law (1)
- Georgetown University Law Center (1)
- Georgia State University College of Law (1)
- Penn State Dickinson Law (1)
- Roger Williams University (1)
- Seattle University School of Law (1)
- SelectedWorks (1)
- Southeastern University (1)
- The University of Akron (1)
- Universitas Indonesia (1)
- University of Baltimore Law (1)
- University of Georgia School of Law (1)
- University of Miami Law School (1)
- University of Nebraska - Lincoln (1)
- University of Pennsylvania Carey Law School (1)
- Vanderbilt University Law School (1)
- Publication Year
- Publication
-
- Articles, Book Chapters, & Popular Press (9)
- Faculty Scholarship (4)
- Touro Law Review (3)
- Washington and Lee Journal of Civil Rights and Social Justice (3)
- All Faculty Scholarship (2)
-
- Mitchell Hamline Law Review (2)
- Pepperdine Law Review (2)
- Publications (2)
- Subhajit Basu (2)
- "Dharmasisya” Jurnal Program Magister Hukum FHUI (1)
- Akron Law Review (1)
- American University Law Review (1)
- Articles by Maurer Faculty (1)
- Books & Book Chapters by Maurer Faculty (1)
- Brooklyn Journal of International Law (1)
- Catholic University Journal of Law and Technology (1)
- Catholic University Law Review (1)
- Dickinson Law Review (2017-Present) (1)
- Faculty Articles (1)
- Georgetown Law Faculty Publications and Other Works (1)
- Georgia Journal of International & Comparative Law (1)
- Georgia State University Law Review (1)
- John D. McCamus (1)
- Law Faculty Scholarship (1)
- Library Philosophy and Practice (e-journal) (1)
- Michael E Lewyn (1)
- Reports & Public Policy Documents (1)
- School of Nursing & Midwifery (1)
- Seattle University Law Review (1)
- Selected Honors Theses (1)
- Publication Type
Articles 1 - 30 of 53
Full-Text Articles in Law
Personal Data And Vaccination Hesitancy: Covid-19’S Lessons For Public Health Federalism, Charles D. Curran
Personal Data And Vaccination Hesitancy: Covid-19’S Lessons For Public Health Federalism, Charles D. Curran
Catholic University Law Review
During the COVID-19 vaccination campaign, the federal government adopted a more centralized approach to the collection of public health data. Although the states previously had controlled the storage of vaccination information, the federal government’s Operation Warp Speed plan required the reporting of recipients’ personal information on the grounds that it was needed to monitor the safety of novel vaccines and ensure correct administration of their multi-dose regimens.
Over the course of the pandemic response, this more centralized federal approach to data collection added a new dimension to pre-existing vaccination hesitancy. Requirements that recipients furnish individual information deterred vaccination among undocumented …
Reclaiming Personal Privacy Rights Through The Freedom Of Intimate Association, Nancy C. Marcus
Reclaiming Personal Privacy Rights Through The Freedom Of Intimate Association, Nancy C. Marcus
Faculty Scholarship
The United States has entered a new constitutional era where substantive due process, under attack by the Supreme Court itself, can no longer be viewed as a solid foundation for the securing of personal privacy rights. In a post-Dobbs v. Jackson Women’s Health Organization world, the right to personal privacy, long understood to be protected under the Fifth and Fourteenth Amendments’ Due Process Clauses, is in need of a new doctrinal home. The evisceration of modern substantive due process in the context of abortion rights implicates and endangers LGBTQ+ rights and other personal privacy rights as well. As such, …
Perlindungan Atas Privasi Konsumen Dalam Layanan Reservasi Tiket Online Dari Pt. Kereta Api Indonesia, Aprilia Susanti
Perlindungan Atas Privasi Konsumen Dalam Layanan Reservasi Tiket Online Dari Pt. Kereta Api Indonesia, Aprilia Susanti
"Dharmasisya” Jurnal Program Magister Hukum FHUI
The significant increase in online activities cannot be separated from the many active internet users who use mobile internet connections to carry out their daily activities, one of which is for the convenience of making ticket reservations at PT. Indonesian Railways (KAI). The purpose of this research is to find out the study of the business law of protecting consumer privacy in the online ticketing service of PT. KAI. Data collection was carried out by means of a literature study of the relationship between laws and regulations in consumer protection and the position of PT. KAI as business actors and …
Stars, Stripes, And Surveillance: The United States' Failure To Regulate Data Privacy, Sam Begland
Stars, Stripes, And Surveillance: The United States' Failure To Regulate Data Privacy, Sam Begland
American University Law Review
In the wake of the United States Supreme Court’s devastating decision to strip Americans of their constitutional right to abortion in Dobbs v. Jackson Women’s Health Organization, data privacy is more salient than ever. Without adequate data regulations, state governments and anti-abortion activists alike can harass and prosecute pregnant people attempting to exercise their bodily autonomy. This comment argues that the United States has violated its obligations under the International Covenant on Civil and Political Rights (ICCPR) Article 17 by failing to protect against interference with the use and collection of reproductive health data. Further, this comment analyzes interpretations of …
Inadequate Privacy: The Necessity Of Hipaa Reform In A Post-Dobbs World, Katherine Robertson
Inadequate Privacy: The Necessity Of Hipaa Reform In A Post-Dobbs World, Katherine Robertson
Seattle University Law Review
Part I of this Comment will provide an overview of HIPAA and the legal impacts of Dobbs. Part II will discuss the anticipatory response to the impacts of Dobbs on PHI by addressing the response from (1) the states, (2) the Biden Administration, and (3) the medical field. Part III will discuss the loopholes that exist in HIPAA and further address the potential impacts on individuals and the medical field if reform does not occur. Finally, Part IV will argue that the reform of HIPAA is the best avenue for protecting PHI related to reproductive healthcare.
Collective Data Rights And Their Possible Abuse, Asaf Lubin
Collective Data Rights And Their Possible Abuse, Asaf Lubin
Articles by Maurer Faculty
No abstract provided.
The Right To Privacy And Data Protection In Times Of Armed Conflict, Asaf Lubin, Russell Buchan
The Right To Privacy And Data Protection In Times Of Armed Conflict, Asaf Lubin, Russell Buchan
Books & Book Chapters by Maurer Faculty
Contemporary warfare yields a profound impact on the rights to privacy and data protection. Technological advances in the fields of electronic surveillance, predictive algorithms, big data analytics, user-generated evidence, artificial intelligence, cloud storage, facial recognition, and cryptography are redefining the scope, nature, and contours of military operations. Yet, international humanitarian law offers very few, if any, lex specialis rules for the lawful processing, analysis, dissemination, and retention of personal information. This edited anthology offers a pioneering account of the current and potential future application of digital rights in armed conflict.
In Part I Mary Ellen O’Connell, Tal Mimran and Yuval …
The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine
The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine
Catholic University Journal of Law and Technology
No abstract provided.
Platforms, Encryption, And The Cfaa: The Case Of Whatsapp V Nso Group, Jonathon Penney, Bruce Schneier
Platforms, Encryption, And The Cfaa: The Case Of Whatsapp V Nso Group, Jonathon Penney, Bruce Schneier
Articles, Book Chapters, & Popular Press
End-to-end encryption technology has gone mainstream. But this wider use has led hackers, cybercriminals, foreign governments, and other threat actors to employ creative and novel attacks to compromise or workaround these protections, raising important questions as to how the Computer Fraud and Abuse Act (CFAA), the primary federal anti-hacking statute, is best applied to these new encryption implementations. Now, after the Supreme Court recently narrowed the CFAA’s scope in Van Buren and suggested it favors a code-based approach to liability under the statute, understanding how best to theorize sophisticated code-based access barriers like end-to-end encryption, and their circumvention, is now …
Understanding Chilling Effects, Jonathon Penney
Understanding Chilling Effects, Jonathon Penney
Articles, Book Chapters, & Popular Press
With digital surveillance and censorship on the rise, the amount of data available online unprecedented, and corporate and governmental actors increasingly employing emerging technologies like artificial intelligence (AI), machine learning, and facial recognition technology (FRT) for surveillance and data analytics, concerns about “chilling effects”, that is, the capacity for these activities “chill” or deter people from exercising their rights and freedoms have taken on greater urgency and importance. Yet, there remains a clear dearth in systematic theoretical and empirical work point. This has left significant gaps in understanding. This article has attempted to fill that void, synthesizing theoretical and empirical …
Yes, Alito, There Is A Right To Privacy: Why The Leaked Dobbs Opinion Is Doctrinally Unsound, Nancy C. Marcus
Yes, Alito, There Is A Right To Privacy: Why The Leaked Dobbs Opinion Is Doctrinally Unsound, Nancy C. Marcus
Faculty Scholarship
On June 24, 2022, the Supreme Court released the final Dobbs majority opinion, which is substantially identical to the draft opinion. Consequently, the critique contained in this essay applies equally to the final Dobbs opinion.
On May 2, 2022, a draft majority opinion dated February 2022 and authored by Justice Alito in Dobbs v. Jackson Women’s Health Organization was leaked to the public. This Essay addresses the doctrinal infirmities of the underlying analysis of the draft Dobbs opinion, as well as the resulting dangers posed for the protection of fundamental privacy rights and liberties in contexts even beyond abortion.
The …
Menstrual Dignity And The Bar Exam, Margaret E. Johnson, Marcy L. Karin, Elizabeth Cooper
Menstrual Dignity And The Bar Exam, Margaret E. Johnson, Marcy L. Karin, Elizabeth Cooper
All Faculty Scholarship
This Article examines the issue of menstruation and the administration of the bar exam. Although such problems are not new, over the summer and fall of 2020, test takers and commentators took to social media to critique state board of law examiners’ (“BOLE”) policies regarding menstruation. These problems persist. Menstruators worry that if they unexpectedly bleed during the exam, they may not have access to appropriately sized and constructed menstrual products or may be prohibited from accessing the bathroom. Personal products that are permitted often must be carried in a clear, plastic bag. Some express privacy concerns that the see-through …
Submission To The Toronto Police Services Board’S Use Of New Artificial Intelligence Technologies Policy- Leaf And The Citizen Lab, Suzie Dunn, Kristen Mj Thomasen, Kate Robertson, Pam Hrick, Cynthia Khoo, Rosel Kim, Ngozi Okidegbe, Christopher Parsons
Submission To The Toronto Police Services Board’S Use Of New Artificial Intelligence Technologies Policy- Leaf And The Citizen Lab, Suzie Dunn, Kristen Mj Thomasen, Kate Robertson, Pam Hrick, Cynthia Khoo, Rosel Kim, Ngozi Okidegbe, Christopher Parsons
Reports & Public Policy Documents
We write as a group of experts in the legal regulation of artificial intelligence (AI), technology-facilitated violence, equality, and the use of AI systems by law enforcement in Canada. We have experience working within academia and legal practice, and are affiliated with LEAF and the Citizen Lab who support this letter.
We reviewed the Toronto Police Services Board Use of New Artificial Intelligence Technologies Policy and provide comments and recommendations focused on the following key observations:
1. Police use of AI technologies must not be seen as inevitable
2. A commitment to protecting equality and human rights must be integrated …
Two Constitutional Rights, Two Constitutional Controversies, Michael J. Perry
Two Constitutional Rights, Two Constitutional Controversies, Michael J. Perry
Faculty Articles
My overarching aim in the Article is to defend a particular understanding of two constitutional rights and, relatedly, a particular resolution of two constitutional controversies. The two rights I discuss are among the most important rights protected by the constitutional law of the United States: the right to equal protection and the right of privacy. As I explain in the Article, the constitutional right to equal protection is, at its core, the human right to moral equality, and the constitutional right to privacy is best understood as a version of the human right to moral freedom. The two controversies I …
The Right To Contest Ai, Margot E. Kaminski, Jennifer M. Urban
The Right To Contest Ai, Margot E. Kaminski, Jennifer M. Urban
Publications
Artificial intelligence (AI) is increasingly used to make important decisions, from university admissions selections to loan determinations to the distribution of COVID-19 vaccines. These uses of AI raise a host of concerns about discrimination, accuracy, fairness, and accountability.
In the United States, recent proposals for regulating AI focus largely on ex ante and systemic governance. This Article argues instead—or really, in addition—for an individual right to contest AI decisions, modeled on due process but adapted for the digital age. The European Union, in fact, recognizes such a right, and a growing number of institutions around the world now call for …
Keeping The Zombies At Bay: Fourth Amendment Problems In The Fight Against Botnets, Danielle Potter
Keeping The Zombies At Bay: Fourth Amendment Problems In The Fight Against Botnets, Danielle Potter
Washington and Lee Journal of Civil Rights and Social Justice
You may not have heard of a botnet. If you have, you may have linked it to election shenanigans and nothing else. But if you are reading this on a computer or smartphone, there is a good chance you are in contact with a botnet right now.
Botnets, sometimes called “Zombie Armies,” are networks of devices linked by a computer virus and controlled by cybercriminals. Botnets operate on everyday devices owned by millions of Americans, and thus pose a substantial threat to individual device owners as well as the nation’s institutions and economy.
Accordingly, the United States government has been …
The Limits And Possibilities Of Data-Driven Antitrafficking Efforts, Jennifer Musto Ph.D.
The Limits And Possibilities Of Data-Driven Antitrafficking Efforts, Jennifer Musto Ph.D.
Georgia State University Law Review
An examination of technology in the countertrafficking space reveals recurring tensions between law enforcement and rights-based approaches. It also illuminates assumptions, such as the one that posits more law enforcement-focused, nonstate-actor-supported data-driven efforts are necessary to securing justice for people in trafficking situations. However, a closer look at how technology is used and by whom also invites us to ask different questions and to leverage the power of our all-too-human creative potential in thinking about how to value and prioritize data ethics, transparency, and accountability in future countertrafficking work.
Identity Manipulation: Responding To Advances In Artificial Intelligence And Robotics, Suzie Dunn
Identity Manipulation: Responding To Advances In Artificial Intelligence And Robotics, Suzie Dunn
Articles, Book Chapters, & Popular Press
Advances in artificial intelligence (AI) and robotics technologies have destabilized our ability to control our identity. Today, it is increasingly accessible for the average person to appropriate the voice, image, and body of another individual through the use of technology. Deepfake videos swap new faces into existing videos, facial re-enactment allows for the face of one person to be superimposed on the face of someone else in a real time video, artificial speech synthesis can clone another person’s voice, and 3D printing and modern robotics can reproduce life-size copies of living people. These are all examples of the ways technology …
Politics Of Adversarial Machine Learning, Kendra Albert, Jonathon Penney, Bruce Schneier, Ram Shankar Siva Kumar
Politics Of Adversarial Machine Learning, Kendra Albert, Jonathon Penney, Bruce Schneier, Ram Shankar Siva Kumar
Articles, Book Chapters, & Popular Press
In addition to their security properties, adversarial machine-learning attacks and defenses have political dimensions. They enable or foreclose certain options for both the subjects of the machine learning systems and for those who deploy them, creating risks for civil liberties and human rights. In this paper, we draw on insights from science and technology studies, anthropology, and human rights literature, to inform how defenses against adversarial attacks can be used to suppress dissent and limit attempts to investigate machine learning systems. To make this concrete, we use real-world examples of how attacks such as perturbation, model inversion, or membership inference …
Ethical Testing In The Real World: Evaluating Physical Testing Of Adversarial Machine Learning, Kendra Albert, Maggie Delano, Jonathon Penney, Afsaneh Ragot, Ram Shankar Siva Kumar
Ethical Testing In The Real World: Evaluating Physical Testing Of Adversarial Machine Learning, Kendra Albert, Maggie Delano, Jonathon Penney, Afsaneh Ragot, Ram Shankar Siva Kumar
Articles, Book Chapters, & Popular Press
This paper critically assesses the adequacy and representativeness of physical domain testing for various adversarial machine learning (ML) attacks against computer vision systems involving human subjects. Many papers that deploy such attacks characterize themselves as “real world.” Despite this framing, however, we found the physical or real-world testing conducted was minimal, provided few details about testing subjects and was often conducted as an afterthought or demonstration. Adversarial ML research without representative trials or testing is an ethical, scientific, and health/safety issue that can cause real harms. We introduce the problem and our methodology, and then critique the physical domain testing …
Shaping Intellectual Property Rights Through Human Rights Adjudication: The Example Of The European Court Of Human Rights, Christophe Geiger, Elena Izyumenko
Shaping Intellectual Property Rights Through Human Rights Adjudication: The Example Of The European Court Of Human Rights, Christophe Geiger, Elena Izyumenko
Mitchell Hamline Law Review
No abstract provided.
Bytes Bite: Why Corporate Data Breaches Should Give Standing To Affected Individuals, Caden Hayes
Bytes Bite: Why Corporate Data Breaches Should Give Standing To Affected Individuals, Caden Hayes
Washington and Lee Journal of Civil Rights and Social Justice
High-profile data hacks are not uncommon. In fact, according to the Privacy Rights Clearinghouse, there have been at least 7,961 data breaches, exposing over 10,000,000,000 accounts in total, since 2005. These shocking numbers are not particularly surprising when taking into account the value of information stolen. For example, cell phone numbers, as exposed in a Yahoo! hack, are worth $10 a piece on the black market, meaning the hackers stood to make $30,000,000,000 from that one hack. That dollar amount does not even consider copies the hackers could make and later resell. Yet while these hackers make astronomical payoffs, the …
Privacy And Legal Automation: The Dmca As A Case Study, Jonathon Penney
Privacy And Legal Automation: The Dmca As A Case Study, Jonathon Penney
Articles, Book Chapters, & Popular Press
Advances in artificial intelligence, machine learning, computing capacity, and big data analytics are creating exciting new possibilities for legal automation. At the same time, these changes pose serious risks for civil liberties and other societal interests. Yet, existing scholarship is narrow, leaving uncertainty on a range of issues, including a glaring lack of systematic empirical work as to how legal automation may impact people’s privacy and freedom. This article addresses this gap with an original empirical analysis of the Digital Millennium Copyright Act (DMCA), which today sits at the forefront of algorithmic law due to its automated enforcement of copyright …
How To Get Away With Murder: The “Gay Panic” Defense, Omar T. Russo
How To Get Away With Murder: The “Gay Panic” Defense, Omar T. Russo
Touro Law Review
No abstract provided.
Right To Privacy, A Complicated Concept To Review, Ali Alibeigi, Abu Bakar Munir, Md Ershadul Karim
Right To Privacy, A Complicated Concept To Review, Ali Alibeigi, Abu Bakar Munir, Md Ershadul Karim
Library Philosophy and Practice (e-journal)
The Concept and definition of the privacy has been changed during the time affecting by different factors. At the same time, the boundaries of privacy may differ from one place to another affecting by the culture, religion, etc. Nonetheless, there is not a unique general accepted definition for the privacy. Privacy has been considered from different disciplines like sociology, psychology, law and philosophy. It is a multidisciplinary domain, having an easy concept but difficult to define. However, by reviewing all different viewpoints, it can be concluded that privacy is an individual tendency, wish and natural need to be away from …
Identities In Critical Condition: The Urgent Need To Reevaluate The Investigation And Resolution Of Claims Of Medical Identity Theft, Stephanie Lindgren
Identities In Critical Condition: The Urgent Need To Reevaluate The Investigation And Resolution Of Claims Of Medical Identity Theft, Stephanie Lindgren
Mitchell Hamline Law Review
No abstract provided.
Binary Governance: Lessons From The Gdpr’S Approach To Algorithmic Accountability, Margot E. Kaminski
Binary Governance: Lessons From The Gdpr’S Approach To Algorithmic Accountability, Margot E. Kaminski
Publications
Algorithms are now used to make significant decisions about individuals, from credit determinations to hiring and firing. But they are largely unregulated under U.S. law. A quickly growing literature has split on how to address algorithmic decision-making, with individual rights and accountability to nonexpert stakeholders and to the public at the crux of the debate. In this Article, I make the case for why both individual rights and public- and stakeholder-facing accountability are not just goods in and of themselves but crucial components of effective governance. Only individual rights can fully address dignitary and justificatory concerns behind calls for regulating …
In Defense Of The American Community Survey, Michael Lewyn
In Defense Of The American Community Survey, Michael Lewyn
Michael E Lewyn
Trafficking Technology: A Look At Different Approaches To Ending Technology-Facilitated Human Trafficking, David Barney
Trafficking Technology: A Look At Different Approaches To Ending Technology-Facilitated Human Trafficking, David Barney
Pepperdine Law Review
In 2018, many believe that slavery is an antiquated concept. But as with anything else, if it has not become extinct, it has evolved with time. Human trafficking is no different. Each year, millions of men, women and children are trafficked in the United States, and internationally, and forced to work against their will. Through the rise of technology and an increasingly globalized world, traffickers have learned to use technology as a tool to help facilitate the trafficking of persons and to sell those victims to others they never could have reached before. But what are we doing about it? …
Information And The Regulatory Landscape: A Growing Need To Reconsider Existing Legal Frameworks, Anjanette H. Raymond
Information And The Regulatory Landscape: A Growing Need To Reconsider Existing Legal Frameworks, Anjanette H. Raymond
Washington and Lee Journal of Civil Rights and Social Justice
No abstract provided.