Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Law

Handle With Care: Domestic Violence Safety Planning In The Age Of Data Privacy Laws, Jenny Wu May 2021

Handle With Care: Domestic Violence Safety Planning In The Age Of Data Privacy Laws, Jenny Wu

Seattle Journal of Technology, Environmental & Innovation Law

The United States has been patiently waiting for a comprehensive federal data privacy law to protect consumers. However, strong data privacy laws can also protect a less thought-about group: survivors of domestic violence and intimate partner violence. As new technology proliferates into our daily lives, technology-based abuse is quickly becoming a common form of intimate partner abuse. Domestic violence survivors and advocates have to stay extra vigilant about who has access to their internet data. Needing to understand technology-specific safety measures and learn technology-literacy skills adds more work to already overwhelmed domestic violence advocates and survivors. Could the law serve …


The Impact Of Schrems Ii: Next Steps For U.S. Data Privacy Law, Andraya Flor May 2021

The Impact Of Schrems Ii: Next Steps For U.S. Data Privacy Law, Andraya Flor

Notre Dame Law Review

Schrems II invalidated Privacy Shield because the court found that it did not provide an “essentially equivalent” level of protection compared to the guarantees of the GDPR. The National Security Agency (NSA) operated surveillance programs that had the potential to infringe on the rights of EU subjects, and there was a lack of oversight and effective judicial remedies to protect rights of EU data subjects, which undermined Privacy Shield as a mechanism for data transfers. This Note sets aside the surveillance and national security issue, which would require resolution through a shift in overall U.S. national security law, and instead …


Data Autonomy, Cesare Fracassi, William Magnuson Mar 2021

Data Autonomy, Cesare Fracassi, William Magnuson

Faculty Scholarship

In recent years, “data privacy” has vaulted to the forefront of public attention. Scholars, policymakers, and the media have, nearly in unison, decried the lack of data privacy in the modern world. In response, they have put forth various proposals to remedy the situation, from the imposition of fiduciary obligations on technology platforms to the creation of rights to be forgotten for individuals. All these proposals, however, share one essential assumption: we must raise greater protective barriers around data. As a scholar of corporate finance and a scholar of corporate law, respectively, we find this assumption problematic. Data, after all, …


Chinese Technology Platforms Operating In The United States: Assessing The Threat (Originally Published As A Joint Report Of The National Security, Technology, And Law Working Group At The Hoover Institution At Stanford University And The Tech, Law & Security Program At American University Washington College Of Law), Gary Corn, Jennifer Daskal, Jack Goldsmith, Chris Inglis, Paul Rosenzweig, Samm Sacks, Bruce Schneier, Alex Stamos, Vincent Stewart Feb 2021

Chinese Technology Platforms Operating In The United States: Assessing The Threat (Originally Published As A Joint Report Of The National Security, Technology, And Law Working Group At The Hoover Institution At Stanford University And The Tech, Law & Security Program At American University Washington College Of Law), Gary Corn, Jennifer Daskal, Jack Goldsmith, Chris Inglis, Paul Rosenzweig, Samm Sacks, Bruce Schneier, Alex Stamos, Vincent Stewart

Joint PIJIP/TLS Research Paper Series

No abstract provided.