Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Osgoode Hall Law School of York University (9)
- University of Pennsylvania Carey Law School (5)
- American University Washington College of Law (3)
- City University of New York (CUNY) (3)
- Pace University (3)
-
- University of Pittsburgh School of Law (3)
- University of Washington School of Law (3)
- Boston University School of Law (2)
- Maurer School of Law: Indiana University (2)
- New York Law School (2)
- Schulich School of Law, Dalhousie University (2)
- Singapore Management University (2)
- Texas A&M University School of Law (2)
- California Western School of Law (1)
- Chicago-Kent College of Law (1)
- Duke Law (1)
- Golden Gate University School of Law (1)
- Penn State Dickinson Law (1)
- Roger Williams University (1)
- St. John's University School of Law (1)
- Touro University Jacob D. Fuchsberg Law Center (1)
- University of Colorado Law School (1)
- University of Georgia School of Law (1)
- University of Maryland Francis King Carey School of Law (1)
- University of Michigan Law School (1)
- Vanderbilt University Law School (1)
- Virginia Community College System (1)
- Washington University in St. Louis (1)
- Yeshiva University, Cardozo School of Law (1)
- Keyword
-
- Privacy (6)
- Facebook (4)
- Internet (4)
- Social media (4)
- Technology (4)
-
- Blockchain (3)
- Communications Decency Act (3)
- Data privacy (3)
- Data protection (3)
- Gambling (3)
- Google (3)
- Section 230 (3)
- Social Media (3)
- Surveillance (3)
- Antiterrorism Act (2)
- Artificial Intelligence (2)
- Artificial intelligence (2)
- Civil liability (2)
- Cryptocurrency (2)
- Cyberspace (2)
- Data (2)
- Digital harm (2)
- First Amendment (2)
- Free speech (2)
- Impeachment (2)
- Internet Law (2)
- Legislation (2)
- Loyalty (2)
- Polycentricity (2)
- Ransomware (2)
- Publication
-
- Articles (6)
- Faculty Scholarship (6)
- Articles & Book Chapters (5)
- All Faculty Scholarship (4)
- Commissioned Reports, Studies and Public Policy Documents (3)
-
- Court Briefs (3)
- Elisabeth Haub School of Law Faculty Publications (3)
- Publications and Research (3)
- Articles by Maurer Faculty (2)
- Articles, Book Chapters, & Popular Press (2)
- Scholarly Works (2)
- All Papers (1)
- Articles & Chapters (1)
- Articles in Law Reviews & Other Academic Journals (1)
- Faculty Publications (1)
- Faculty Scholarly Works (1)
- GGU Law Review Blog (1)
- Homeland Security Publications (1)
- Joint PIJIP/TLS Research Paper Series (1)
- Law Faculty Scholarship (1)
- Penn Program on Regulation Podcasts (1)
- Publications (1)
- Reports and Resources (1)
- Research Collection Yong Pung How School Of Law (1)
- Scholarship@WashULaw (1)
- Singapore Law Journal (Lexicon) (1)
- Student Writing (1)
- Upper Level Writing Requirement Research Papers (1)
- Vanderbilt Law School Faculty Publications (1)
Articles 1 - 30 of 57
Full-Text Articles in Law
Algorithmic Management And Collective Bargaining, Valerio De Stefano, Simon Taes
Algorithmic Management And Collective Bargaining, Valerio De Stefano, Simon Taes
Articles & Book Chapters
This article addresses the challenges raised by the introduction of algorithmic management and artificial intelligence in the world of work, focusing on the risks that new managerial technologies present for fundamental rights and principles, such as non-discrimination, freedom of association and the right to privacy. The article argues that collective bargaining is the most suitable regulatory instrument for responding to these challenges, and that current EU legislative initiatives do not adequately recognise the role of collective bargaining in this area. It also maps current initiatives undertaken by national trade union movements in Europe to govern algorithmic management.
Insurance And Enterprise: Cyber Insurance For Ransomware, Tom Baker, Anja Shortland
Insurance And Enterprise: Cyber Insurance For Ransomware, Tom Baker, Anja Shortland
All Faculty Scholarship
Selling insurance gives insurers an incentive to manage insured risks. The “insurance as governance” literature demonstrates that insurers often make insurance conditional on ex ante risk reduction or mitigation. But insurance governs in support of enterprise, not security for its own sake. Tight underwriting inhibits enterprise – not only for insured businesses but also the business of insurance. This paper highlights ex post loss reduction as a form of insurance-based governance. Drawing on interviews with industry insiders, we explore how insurers addressed the evolving problems of moral hazard, uncertainty, and correlated losses since the 1990s. We find that cyber insurance …
Brief For Petitioners, Gonzalez V. Google, 143 S.Ct. 1191 (2023) (No. 21-1333), Eric Schnapper, Robert J. Tolchin, Keith L. Altman
Brief For Petitioners, Gonzalez V. Google, 143 S.Ct. 1191 (2023) (No. 21-1333), Eric Schnapper, Robert J. Tolchin, Keith L. Altman
Court Briefs
QUESTION PRESENTED: Section 203(c)(1) of the Communications Decency Act immunizes an “interactive computer service” (such as YouTube, Google, Facebook and Twitter) for “publish[ ing] ... information provided by another” “information content provider” (such as someone who posts a video on YouTube or a statement on Facebook). This is the most recent of three court of appeals’ decisions regarding whether section 230(c)(1) immunizes an interactive computer service when it makes targeted recommendations of information provided by such another party. Five courts of appeals judges have concluded that section 230(c)(1) creates such immunity. Three court of appeals judges have rejected such immunity. …
Comments Of The Cordell Institute For Policy In Medicine & Law At Washington University In St. Louis, Neil Richards, Woodrow Hartzog, Jordan Francis
Comments Of The Cordell Institute For Policy In Medicine & Law At Washington University In St. Louis, Neil Richards, Woodrow Hartzog, Jordan Francis
Faculty Scholarship
The Federal Trade Commission—with its broad, independent grant of authority and statutory mandate to identify and prevent unfair and deceptive trade practices—is uniquely situated to prevent and remedy unfair and deceptive data privacy and data security practices. In an increasingly digitized world, data collection, processing, and transfer have become integral to market interactions. Our personal and commercial experiences are now mediated by powerful, information-intensive firms who hold the power to shape what consumers see, how they interact, which options are available to them, and how they make decisions. That power imbalance exposes consumers and leaves them all vulnerable. We all …
Algorithmic Governance From The Bottom Up, Hannah Bloch-Wehba
Algorithmic Governance From The Bottom Up, Hannah Bloch-Wehba
Faculty Scholarship
Artificial intelligence and machine learning are both a blessing and a curse for governance. In theory, algorithmic governance makes government more efficient, more accurate, and more fair. But the emergence of automation in governance also rests on public-private collaborations that expand both public and private power, aggravate transparency and accountability gaps, and create significant obstacles for those seeking algorithmic justice. In response, a nascent body of law proposes technocratic policy changes to foster algorithmic accountability, ethics, and transparency.
This Article examines an alternative vision of algorithmic governance, one advanced primarily by social and labor movements instead of technocrats and firms. …
Anonymous Hacktivism: Flying The Flag Of Feminist Ethics For The Ukraine It Army, Ellen Cornelius
Anonymous Hacktivism: Flying The Flag Of Feminist Ethics For The Ukraine It Army, Ellen Cornelius
Homeland Security Publications
No abstract provided.
Social Media Harms And The Common Law, Leslie Y. Garfield Tenzer
Social Media Harms And The Common Law, Leslie Y. Garfield Tenzer
Elisabeth Haub School of Law Faculty Publications
This article finds fault with the judiciaries' failure to create a set of common law norms for social media wrongs. In cases concerning social media harms, the Supreme Court and lower courts have consistently adhered to traditional pre-social media principles, failing to use the power of the common law to create a kind of Internet Justice.
Part I of this article reviews social media history and explores how judicial decisions created a fertile bed for social media harm to blossom. Part II illustrates social media harms across several doctrinal disciplines and highlights judicial reluctance to embrace the realities of social …
Content Moderation As Surveillance, Hannah Bloch-Wehba
Content Moderation As Surveillance, Hannah Bloch-Wehba
Faculty Scholarship
Technology platforms are the new governments, and content moderation is the new law, or so goes a common refrain. As platforms increasingly turn toward new, automated mechanisms of enforcing their rules, the apparent power of the private sector seems only to grow. Yet beneath the surface lies a web of complex relationships between public and private authorities that call into question whether platforms truly possess such unilateral power. Law enforcement and police are exerting influence over platform content rules, giving governments a louder voice in supposedly “private” decisions. At the same time, law enforcement avails itself of the affordances of …
The Law And Politics Of Ransomware, Asaf Lubin
The Law And Politics Of Ransomware, Asaf Lubin
Articles by Maurer Faculty
What do Lady Gaga, the Royal Zoological Society of Scotland, the city of Valdez in Alaska, and the court system of the Brazilian state of Rio Grande do Sul all have in common? They have all been victims of ransomware attacks, which are growing both in number and severity. In 2016, hackers perpetrated roughly four thousand ransomware attacks a day worldwide, a figure which was already alarming. By 2020, however, ransomware attacks reached a staggering number, between 20,000 and 30,000 per day in the United States alone. That is a ransomware attack every eleven seconds, each of which cost victims …
Brief In Opposition, Twitter, Inc. V. Taamneh, 143 S.Ct. 1206 (2023) (No. 21.1496), Eric Schnapper, Keith L. Altman, Daniel W. Weininger
Brief In Opposition, Twitter, Inc. V. Taamneh, 143 S.Ct. 1206 (2023) (No. 21.1496), Eric Schnapper, Keith L. Altman, Daniel W. Weininger
Court Briefs
No abstract provided.
Law's Tacit Dimension: Audiovisual Proof Of Incitement In The Impeachment Trial Of Donald J. Trump, Richard Sherwin
Law's Tacit Dimension: Audiovisual Proof Of Incitement In The Impeachment Trial Of Donald J. Trump, Richard Sherwin
Articles & Chapters
In arguing their case for the impeachment of Donald J. Trump for inciting a violent insurrection, prosecutors made extensive use of video images of Trump supporters violently overtaking Capitol police and ransacking the Capitol building once they had forced their way inside. But the rally video that immediately preceded Trump’s January 6 speech was ignored completely. Should it have been brought into the prosecution’s case? If it had been, how might it have aided the prosecution’s contention that Trump was guilty of inciting violent insurrection?
In this article, I contend that the prosecution team’s insufficient understanding of how, and with …
Too Much Of A Good Thing? A Governing Knowledge Commons Review Of Abundance In Context, Michael J. Madison, Brett M. Frischmann, Madelyn Sanfilippo, Katherine J. Strandburg
Too Much Of A Good Thing? A Governing Knowledge Commons Review Of Abundance In Context, Michael J. Madison, Brett M. Frischmann, Madelyn Sanfilippo, Katherine J. Strandburg
Articles
The economics of abundance, along with the sociology of abundance, the law of abundance, and so forth, should be re-framed, linked, and situated in a common context for empirical rather than conceptual research. Abundance may seem to be a new, big thing, between anxiety over information overload, Big Data, and related technological disruptions. But scholars know that abundance is an ancient phenomenon, which only seemed to disappear as twentieth century social science focused on scarcity instead. Restoring the study of abundance, and figuring out how to solve the problems that abundance might create, means shedding disciplinary blinders and going back …
Blockchain Land Transfers: Technology, Promises, And Perils, Vincent Ooi, Kian Peng Soh, Jerrold Soh
Blockchain Land Transfers: Technology, Promises, And Perils, Vincent Ooi, Kian Peng Soh, Jerrold Soh
Research Collection Yong Pung How School Of Law
The blockchain’s apparent immutability has attracted significant interest on whether it may be relied on for registering and transferring land. Proponents of blockchain-based land systems point toward data security, automated transacting, and improved accessibility as key benefits; critics raise concerns over structural vulnerabilities, such as majority attacks, and inconsistencies with existing legal frameworks. The literature, however, tends to conceptualise blockchain as one monolithic data structure invariably built on the same mechanisms powering Bitcoin. This paper seeks to situate the debate on a closer understanding of the range of blockchain implementations possible. To this end, we provide a detailed technological survey …
Race And Regulation Podcast Episode 5 - Racial Equity And Data Privacy, Anita L. Allen
Race And Regulation Podcast Episode 5 - Racial Equity And Data Privacy, Anita L. Allen
Penn Program on Regulation Podcasts
In this episode, Anita Allen, an internationally renowned expert on the philosophical dimensions of privacy and data protection law, reveals how race-neutral privacy laws in the U.S. have failed to address the unequal burdens faced online by Black Americans, whose personal data are used in racially discriminatory ways. Professor Allen articulates what she terms an African American Online Equity Agenda to guide the development of race-conscious privacy regulations that can better promote racial justice in the modern digital economy.
Submission Of The Citizen Lab (Munk School Of Global Affairs, University Of Toronto) To The United Nations Working Group On Enforced Or Involuntary Disappearances, Siena Anstis, Ronald J. Deibert, Émilie Laflèche, Jonathon W. Penney
Submission Of The Citizen Lab (Munk School Of Global Affairs, University Of Toronto) To The United Nations Working Group On Enforced Or Involuntary Disappearances, Siena Anstis, Ronald J. Deibert, Émilie Laflèche, Jonathon W. Penney
Commissioned Reports, Studies and Public Policy Documents
No abstract provided.
Municipal Fiber In The United States: A Financial Assessment, Christopher S. Yoo, Jesse Lambert, Timothy P. Pfenninger
Municipal Fiber In The United States: A Financial Assessment, Christopher S. Yoo, Jesse Lambert, Timothy P. Pfenninger
All Faculty Scholarship
Despite growing interest in broadband provided by municipally owned and operated fiber-to-the-home networks, the academic literature has yet to undertake a systematic assessment of these projects’ financial performance. To fill this gap, we utilize municipalities’ official reports to offer an empirical evaluation of the financial performance of every municipal fiber project in the U.S. operating in 2010 through 2019. An analysis of the actual performance of the resulting fifteen-project panel dataset reveals that none of the projects generated sufficient nominal cash flow in the short run to maintain solvency without infusions of additional cash from outside sources or debt relief. …
Spotlight Report #6: Proffering Machine-Readable Personal Privacy Research Agreements: Pilot Project Findings For Ieee P7012 Wg, Noreen Y. Whysel, Lisa Levasseur
Spotlight Report #6: Proffering Machine-Readable Personal Privacy Research Agreements: Pilot Project Findings For Ieee P7012 Wg, Noreen Y. Whysel, Lisa Levasseur
Publications and Research
What if people had the ability to assert their own legally binding permissions for data collection, use, sharing, and retention by the technologies they use? The IEEE P7012 has been working on an interoperability specification for machine-readable personal privacy terms to support this ability since 2018. The premise behind the work of IEEE P7012 is that people need technology that works on their behalf—i.e. software agents that assert the individual’s permissions and preferences in a machine-readable format.
Thanks to a grant from the IEEE Technical Activities Board Committee on Standards (TAB CoS), we were able to explore the attitudes of …
The Relational Robot: A Normative Lens For Ai Legal Neutrality — Commentary On Ryan Abbott, The Reasonable Robot, Carys Craig
The Relational Robot: A Normative Lens For Ai Legal Neutrality — Commentary On Ryan Abbott, The Reasonable Robot, Carys Craig
Articles & Book Chapters
Artificial Intelligence (AI), we are told, is poised to disrupt almost every facet of our lives and society. From industrial labor markets to daily commutes, and from policing tactics to personal assistants, AI brings with it the usual promise and perils of change. How that change will unfold, however, and whether it will ultimately bestow upon us more benefits than harms, remains to be determined. A significant factor in setting the course for AI’s inevitable integration into society will be the legal framework within which it is developed and operationalized. Who will AI displace? What will it replace? What improvements …
Government By Code? Blockchain Applications To Public Sector Governance, Pedro Bustamante, Meina Cai, Marcela Gomez, Colin Harris, Prashabnt Krishnamurthy, Wilson Law, Michael J. Madison, Ilia Murtazashvili, Jennifer Brick Murtazashvili, Tymofiy Mylovanov, Nataliia Shapoval, Annette Vee, Martin B. H. Weiss
Government By Code? Blockchain Applications To Public Sector Governance, Pedro Bustamante, Meina Cai, Marcela Gomez, Colin Harris, Prashabnt Krishnamurthy, Wilson Law, Michael J. Madison, Ilia Murtazashvili, Jennifer Brick Murtazashvili, Tymofiy Mylovanov, Nataliia Shapoval, Annette Vee, Martin B. H. Weiss
Articles
Studies of blockchain governance can be divided into analyses of the governance of blockchains (such as rules and power dynamics within a given network) and governance by blockchains (such as how blockchains can be implemented to improve self-governance of community-based peer production networks). Less emphasis has been placed on applications of distributed ledgers to public sector governance. Our review clarifies that the decentralization and distributive features that enable blockchains to link up loosely connected private organizations and public agencies to improve efficiency and transparency of government transactions. However, most blockchain applications lack clear advantages over the conventional digital recording of …
Reframing Technology-Facilitated Gender-Based Violence At The Intersections Of Law & Society, Jane S. Bailey, Carys Craig, Suzie Dunn, Sonia Lawrence
Reframing Technology-Facilitated Gender-Based Violence At The Intersections Of Law & Society, Jane S. Bailey, Carys Craig, Suzie Dunn, Sonia Lawrence
Articles & Book Chapters
This special issue of the Canadian Journal of Law and Technology focuses on the growing problem of technology-facilitated gender-based violence (TFGBV): an expansive, dynamic, and rapidly evolving phenomenon that Jane Bailey and Carissima Mathen have defined as “a spectrum of behaviours carried out at least in some part through digital communications technologies, including actions that cause physical or psychological harm.” The collection of articles in this issue offers multi-disciplinary insights on TFGBV by bringing together the work of emerging scholars in information and media studies, communications, and law. This approach reflects our firm belief that in order to be meaningful …
Rules Of Engagement: Copyright And Automated Gatekeepers' Influence On Creative Expression, Michael W. Carroll
Rules Of Engagement: Copyright And Automated Gatekeepers' Influence On Creative Expression, Michael W. Carroll
Articles in Law Reviews & Other Academic Journals
This Essay turns questions about artificial intelligence and copyright law around. Rather than focus on algorithms as potential authors, this Essay argues for more attention to the role of algorithms as gatekeepers on social media and how creators adapt their creative choices to meet the demands of these automated tastemakers. Using TikTok’s “For You” algorithm and its role in breaking Lil Nas X’s hit song “Old Town Road” as a case study, this Essay poses the question whether algorithmic gatekeeping is simply a difference in degree or a difference in kind from an artist’s perspective. While tentative, this Essay concludes …
Petition For A Writ Of Certiorari, Gonzalez V. Google, 143 S.Ct. 1191 (2023) (No. 21-1333), Eric Schnapper, Robert J. Tolchin, Keith L. Altman, Daniel Weininger
Petition For A Writ Of Certiorari, Gonzalez V. Google, 143 S.Ct. 1191 (2023) (No. 21-1333), Eric Schnapper, Robert J. Tolchin, Keith L. Altman, Daniel Weininger
Court Briefs
QUESTION PRESENTED: Section 203(c)(1) of the Communications Decency Act immunizes an “interactive computer service” (such as YouTube, Google, Facebook and Twitter) for “publish[ ing] ... information provided by another” “information content provider” (such as someone who posts a video on YouTube or a statement on Facebook). This is the most recent of three court of appeals’ decisions regarding whether section 230(c)(1) immunizes an interactive computer service when it makes targeted recommendations of information provided by such another party. Five courts of appeals judges have concluded that section 230(c)(1) creates such immunity. Three court of appeals judges have rejected such immunity. …
Free Speech On Social Media: Unrestricted Or Regulated?, Alessandra Garcia Guevara
Free Speech On Social Media: Unrestricted Or Regulated?, Alessandra Garcia Guevara
Student Writing
Social media has evolved into an essential mode of communication in recent years, allowing people to express their thoughts with the audience of their choice by sending private messages, posting their thoughts, or sharing their opinions. Such audiences can come from all over the world because this online technology breaks down geographic, linguistic, and cultural barriers. As a result, social media has evolved into a powerful tool for self-expression, allowing anyone with an Internet connection to participate in global debates. However, its misuse has had disastrous consequences in the real world, such as the attack on the Capitol that occurred …
Understanding Chilling Effects, Jonathon W. Penney
Understanding Chilling Effects, Jonathon W. Penney
Articles & Book Chapters
With digital surveillance and censorship on the rise, the amount of data available unprecedented, and corporate and governmental actors increasingly employing emerging technologies like artificial intelligence and facial recognition technology for surveillance and data analytics, concerns about “chilling effects,” that is, the capacity for these activities to “chill” or deter people from exercising their rights and freedoms, have taken on greater urgency and importance. Yet, there remains a clear dearth in systematic theoretical and empirical work points. This has left significant gaps in understanding. This Article has attempted to fill that void, synthesizing theoretical and empirical insights from law, privacy, …
The Political Dynamics Of Legislative Reform: Potential Drivers Of The Next Communications Statute, Christopher S. Yoo, Tiffany Keung
The Political Dynamics Of Legislative Reform: Potential Drivers Of The Next Communications Statute, Christopher S. Yoo, Tiffany Keung
All Faculty Scholarship
Although most studies of major communications reform legislation focus on the merits of their substantive provisions, analyzing the political dynamics that led to the enactment of such legislation can yield important insights. An examination of the tradeoffs that led the major industry segments to support the Telecommunications Act of 1996 provides a useful illustration of the political bargain that it embodies. Application of a similar analysis to the current context identifies seven components that could form the basis for the next communications statute: universal service, pole attachments, privacy, intermediary immunity, net neutrality, spectrum policy, and antitrust reform. Determining how these …
Platforms, Encryption, And The Cfaa: The Case Of Whatsapp V Nso Group, Jonathon W. Penney, Bruce Schneier
Platforms, Encryption, And The Cfaa: The Case Of Whatsapp V Nso Group, Jonathon W. Penney, Bruce Schneier
Articles & Book Chapters
End-to-end encryption technology has gone mainstream. But this wider use has led hackers, cybercriminals, foreign governments, and other threat actors to employ creative and novel attacks to compromise or workaround these protections, raising important questions as to how the Computer Fraud and Abuse Act (CFAA), the primary federal anti-hacking statute, is best applied to these new encryption implementations. Now, after the Supreme Court recently narrowed the CFAA’s scope in Van Buren and suggested it favors a code-based approach to liability under the statute, understanding how best to theorize sophisticated code-based access barriers like end-to-end encryption, and their circumvention, is now …
Ai And Digital Tools In Workplace Management And Evaluation: An Assessment Of The Eu's Legal Framework, Valerio De Stefano, Mathias Wouters
Ai And Digital Tools In Workplace Management And Evaluation: An Assessment Of The Eu's Legal Framework, Valerio De Stefano, Mathias Wouters
Commissioned Reports, Studies and Public Policy Documents
This study focuses on options for regulating the use of AI enabled and algorithmic management systems in the world of work under EU law. The first part describes how these technologies are already being deployed, particularly in recruitment, staff appraisal, task distribution and disciplinary procedures. It discusses some near-term potential development prospects and presents an impact assessment, highlighting some of these technologies' most significant implications.
The second part addresses the regulatory field. It examines the different EU regulations and directives that are already relevant to regulating the use of AI in employment. Subsequently, it analyses the potential labour and employment …
Nft: The Next Big Thing?, Golden Gate University School Of Law
Nft: The Next Big Thing?, Golden Gate University School Of Law
GGU Law Review Blog
In 2021, Non-Fungible Tokens (“NFTs”) have taken the world of digital art to new heights. Artists are beginning to “tokenize” their art and sell them in NFT marketplaces for highly lucrative prices where bids can be made only with cryptocurrency. The “hype” surrounding NFTs grows by the day, thousands of new NFTs are being “minted” everyday. Even celebrities are getting involved in this digital movement. It seems however, that we have seen only the infancy of the blockchain based technology and that it may soon venture off beyond the world of digital art. For those in the legal profession, it …
Designing Respectful Tech: What Is Your Relationship With Technology?, Noreen Y. Whysel
Designing Respectful Tech: What Is Your Relationship With Technology?, Noreen Y. Whysel
Publications and Research
According to research at the Me2B Alliance, people feel they have a relationship with technology. It’s emotional. It’s embodied. And it’s very personal. We are studying digital relationships to answer questions like “Do people have a relationship with technology?” “What does that relationship feel like?” And “Do people understand the commitments that they are making when they explore, enter into and dissolve these relationships?” There are parallels between messy human relationships and the kinds of relationships that people develop with technology. As with human relationships, we move through states of discovery, commitment and breakup with digital applications as well. Technology …
Dismantling The “Black Opticon”: Privacy, Race Equity, And Online Data-Protection Reform, Anita L. Allen
Dismantling The “Black Opticon”: Privacy, Race Equity, And Online Data-Protection Reform, Anita L. Allen
All Faculty Scholarship
African Americans online face three distinguishable but related categories of vulnerability to bias and discrimination that I dub the “Black Opticon”: discriminatory oversurveillance, discriminatory exclusion, and discriminatory predation. Escaping the Black Opticon is unlikely without acknowledgement of privacy’s unequal distribution and privacy law’s outmoded and unduly race-neutral façade. African Americans could benefit from race-conscious efforts to shape a more equitable digital public sphere through improved laws and legal institutions. This Essay critically elaborates the Black Opticon triad and considers whether the Virginia Consumer Data Protection Act (2021), the federal Data Protection Act (2021), and new resources for the Federal Trade …