Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Washington University in St. Louis (4)
- Boston University School of Law (3)
- Maurer School of Law: Indiana University (3)
- Schulich School of Law, Dalhousie University (3)
- The Catholic University of America, Columbus School of Law (3)
-
- University of Pennsylvania Carey Law School (3)
- American University Washington College of Law (2)
- City University of New York (CUNY) (2)
- Embry-Riddle Aeronautical University (2)
- Georgetown University Law Center (2)
- New York Law School (2)
- Northwestern Pritzker School of Law (2)
- Pepperdine University (2)
- Seattle University School of Law (2)
- University of Washington School of Law (2)
- Bowdoin College (1)
- Fordham Law School (1)
- Georgia State University College of Law (1)
- Loyola Marymount University and Loyola Law School (1)
- Loyola University Chicago, School of Law (1)
- Pace University (1)
- SJ Quinney College of Law, University of Utah (1)
- Southern Methodist University (1)
- St. John's University School of Law (1)
- St. Mary's University (1)
- Texas A&M University School of Law (1)
- University of Arkansas, Fayetteville (1)
- University of Miami Law School (1)
- Vanderbilt University Law School (1)
- William & Mary Law School (1)
- Publication
-
- Faculty Scholarship (4)
- Scholarship@WashULaw (4)
- All Faculty Scholarship (3)
- Catholic University Journal of Law and Technology (3)
- Indiana Law Journal (3)
-
- Articles, Book Chapters, & Popular Press (2)
- Georgetown Law Faculty Publications and Other Works (2)
- Pepperdine Law Review (2)
- Seattle Journal for Social Justice (2)
- Washington Law Review (2)
- American University Journal of Gender, Social Policy & the Law (1)
- Arkansas Law Review (1)
- Articles & Chapters (1)
- Canadian Journal of Law and Technology (1)
- Faculty Publications & Other Works (1)
- Fordham Journal of Corporate & Financial Law (1)
- Georgia State University Law Review (1)
- Honors Projects (1)
- Joint PIJIP/TLS Research Paper Series (1)
- Journal of Digital Forensics, Security and Law (1)
- Loyola of Los Angeles Law Review (1)
- NYLS Law Review (1)
- Northwestern Journal of International Law & Business (1)
- Northwestern Journal of Law & Social Policy (1)
- Open Educational Resources (1)
- Pace International Law Review (1)
- Publications (1)
- Publications and Research (1)
- SMU Data Science Review (1)
- St. John's Law Review (1)
- Publication Type
Articles 1 - 30 of 52
Full-Text Articles in Law
An Australian Conundrum: Genomic Technology, Data, And The Covidsafe App, David Morrison, Patrick T. Quirk
An Australian Conundrum: Genomic Technology, Data, And The Covidsafe App, David Morrison, Patrick T. Quirk
Pace International Law Review
This paper examines the difficulties that have arisen in Australia in the use of its contact-tracing app. We examine the privacy implications around the use of the app, the wider economic imperative, and the balancing of those concerns against the health threat of the COVID-19 pandemic. We posit that default options are superior in times of emergency and rather than begging for the adoption of lifesaving technology, we suggest that the evidence gathered by behavioral economists provides an apposite and powerful alternative worthy of consideration.
The Jones Trespass Doctrine And The Need For A Reasonable Solution To Unreasonable Protection, Geoffrey Corn
The Jones Trespass Doctrine And The Need For A Reasonable Solution To Unreasonable Protection, Geoffrey Corn
Arkansas Law Review
Each day that Houston drivers exit from Interstate 45 to drive to downtown Houston, they pass an odd sight. Nestled within some bushes is an encampment of tents. This encampment is very clearly located on public property adjacent to the interstate highway, and equally clearly populated by homeless individuals. While local police ostensibly tolerate this presence, at least temporarily, the sight frequently evokes an image in my mind of a police search of those tents. This thought is especially prominent on the days I am driving to my law school, South Texas College of Law Houston, to teach my federal …
Trading Privacy For Promotion? Fourth Amendment Implications Of Employers Using Wearable Sensors To Assess Worker Performance, George M. Dery Iii
Trading Privacy For Promotion? Fourth Amendment Implications Of Employers Using Wearable Sensors To Assess Worker Performance, George M. Dery Iii
Northwestern Journal of Law & Social Policy
This Article considers the Fourth Amendment implications of a study on a passive monitoring system where employees shared data from wearables, phone applications, and position beacons that provided private information such as weekend phone use, sleep patterns in the bedroom, and emotional states. The study’s authors hope to use the data collected to create a new system for objectively assessing employee performance that will replace the current system which is plagued by the inherent bias of self-reporting and peer-review and which is labor intensive and inefficient. The researchers were able to successfully link the data collected with the quality of …
Inescapable Surveillance, Matthew Tokson
Inescapable Surveillance, Matthew Tokson
Utah Law Faculty Scholarship
Until recently, Supreme Court precedent dictated that a person waives their Fourth Amendment rights in information they disclose to another party. The Court reshaped this doctrine in Carpenter v. United States, establishing that the Fourth Amendment protects cell phone location data even though it is revealed to others. The Court emphasized that consumers had little choice but to disclose their data, because cell phone use is virtually inescapable in modern society.
In the wake of Carpenter, many scholars and lower courts have endorsed inescapability as an important factor for determining Fourth Amendment rights. Under this approach, surveillance that people cannot …
Good Health And Good Privacy Go Hand-In-Hand (Originally Published By Jnslp), Jennifer Daskal
Good Health And Good Privacy Go Hand-In-Hand (Originally Published By Jnslp), Jennifer Daskal
Joint PIJIP/TLS Research Paper Series
No abstract provided.
The Fourth Amendment At Home, Thomas P. Crocker
The Fourth Amendment At Home, Thomas P. Crocker
Indiana Law Journal
A refuge, a domain of personal privacy, and the seat of familial life, the home holds a special place in Fourth Amendment jurisprudence. Supreme Court opinions are replete with statements affirming the special status of the home. Fourth Amendment text places special emphasis on securing protections for the home in addition to persons, papers, and effects against unwarranted government intrusion. Beyond the Fourth Amendment, the home has a unique place within constitutional structure. The home receives privacy protections in addition to sheltering other constitutional values protected by the Due Process Clause and the First Amendment. For example, under the Due …
The First Amendment And The Right(S) Of Publicity, Jennifer E. Rothman, Robert C. Post
The First Amendment And The Right(S) Of Publicity, Jennifer E. Rothman, Robert C. Post
All Faculty Scholarship
The right of publicity protects persons against unauthorized uses of their identity, most typically their names, images, or voices. The right is in obvious tension with freedom of speech. Yet courts seeking to reconcile the right with the First Amendment have to date produced only a notoriously confused muddle of inconsistent constitutional doctrine. In this Article, we suggest a way out of the maze. We propose a relatively straightforward framework for analyzing how the right of publicity should be squared with First Amendment principles.
At the root of contemporary constitutional confusion lies a failure to articulate the precise state interests …
Privacy In Pandemic: Law, Technology, And Public Health In The Covid-19 Crisis, Tiffany Li
Privacy In Pandemic: Law, Technology, And Public Health In The Covid-19 Crisis, Tiffany Li
Faculty Scholarship
The COVID-19 pandemic has caused millions of deaths and disastrous consequences around the world, with lasting repercussions for every field of law, including privacy and technology. The unique characteristics of this pandemic have precipitated an increase in use of new technologies, including remote communications platforms, healthcare robots, and medical AI. Public and private actors are using new technologies, like heat sensing, and technologically-influenced programs, like contact tracing, alike in response, leading to a rise in government and corporate surveillance in sectors like healthcare, employment, education, and commerce. Advocates have raised the alarm for privacy and civil liberties violations, but the …
Cryptography, Passwords, Privacy, And The Fifth Amendment, Gary C. Kessler, Ann M. Phillips
Cryptography, Passwords, Privacy, And The Fifth Amendment, Gary C. Kessler, Ann M. Phillips
Journal of Digital Forensics, Security and Law
Military-grade cryptography has been widely available at no cost for personal and commercial use since the early 1990s. Since the introduction of Pretty Good Privacy (PGP), more and more people encrypt files and devices, and we are now at the point where our smartphones are encrypted by default. While this ostensibly provides users with a high degree of privacy, compelling a user to provide a password has been interpreted by some courts as a violation of our Fifth Amendment protections, becoming an often insurmountable hurdle to law enforcement lawfully executing a search warrant. This paper will explore some of the …
The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin
The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin
Open Educational Resources
Using episodes from the show Black Mirror as a study tool - a show that features tales that explore techno-paranoia - the course analyzes legal and policy considerations of futuristic or hypothetical case studies. The case studies tap into the collective unease about the modern world and bring up a variety of fascinating key philosophical, legal, and economic-based questions.
Is Data Localization A Solution For Schrems Ii?, Anupam Chander
Is Data Localization A Solution For Schrems Ii?, Anupam Chander
Georgetown Law Faculty Publications and Other Works
For the second time this decade, the Court of Justice of the European Union has struck a blow against the principal mechanisms for personal data transfer to the United States. In Data Protection Commissioner v Facebook Ireland, Maximillian Schrems, the Court declared the EU-US Privacy Shield invalid and placed significant hurdles to the process of transferring personal data from the European Union to the United States via the mechanism of Standard Contractual Clauses. Many have begun to suggest data localization as the solution to the problem of data transfer; that is, don’t transfer the data at all. I argue …
The First Amendment And Data Privacy: Securing Data Privacy Laws That Withstand Constitutional Muster, Kathryn Peyton
The First Amendment And Data Privacy: Securing Data Privacy Laws That Withstand Constitutional Muster, Kathryn Peyton
Pepperdine Law Review
Given the growing ubiquity of digital technology’s presence in people’s lives today, it is becoming increasingly more necessary to secure data privacy protections. People interact with technology constantly, ranging from when engaging in business activates, such as corresponding through emails or doing research online, to more innocuous activities like driving, shopping, or talking with friends and family. The advances in technology have made possible the creation of digital trails whenever someone interacts with such technology. Companies aggregate data from data trails and use predictive analytics to create detailed profiles about citizen-consumers. This information is typically used for profit generating purposes. …
Sharenting And The (Potential) Right To Be Forgotten, Keltie Haley
Sharenting And The (Potential) Right To Be Forgotten, Keltie Haley
Indiana Law Journal
Part I of this Note serves as an evaluation of parental use of social media and
further seeks to draw attention to the social and developmental impact parental
oversharing can have on children. Part II examines the tension between parents’
constitutional rights to direct the upbringing of their children, as well as their First
Amendment interest in online expression, and their children’s interest in personal
data security and privacy. Part III provides an overview of the European Union’s
right to be forgotten framework in the sharenting context and considers the
plausibility of implementing such a framework in the United States. …
Modern Privacy Advocacy: An Approach At War With Privacy Itself?, Justin "Gus" Hurwitz, Jamil N. Jaffer
Modern Privacy Advocacy: An Approach At War With Privacy Itself?, Justin "Gus" Hurwitz, Jamil N. Jaffer
Pepperdine Law Review
This Article argues that the modern concept of privacy itself, particularly as framed by some of its most ardent advocates today, is fundamentally incoherent. The Article highlights that many common arguments made in support of privacy, while initially seeming to protect this critical value, nonetheless undermine it in the long run. Using both recent and older examples of applying classic privacy advocacy positions to key technological innovations, the authors demonstrate how these positions, while seemingly privacy-enhancing at the time, actually resulted in outcomes that were less beneficial for consumers and citizens, including from a purely privacy-focused perspective. As a result, …
Can Pipeda ‘Face’ The Challenge? An Analysis Of The Adequacy Of Canada’S Private Sector Privacy Legislation Against Facial Recognition Technology, Tunca Bolca
Canadian Journal of Law and Technology
Facial recognition technology is one of the most intrusive and privacy threatening technologies available today. The literature around this technology mainly focuses on its use by the public sector as a mass surveillance tool; however, the private sector uses of facial recognition technologies also raise significant privacy concerns. This paper aims to identify and examine the privacy implications of the private sector uses of facial recognition technologies and the adequacy of Canada’s federal private sector privacy legislation, the Personal Information Protection and Electronic Documents Act (PIPEDA), in addressing these privacy concerns. Facial templates produced and recorded by these technologies are …
Anti-Masking Statutes And Anonymous Protest In The Age Of Surveillance, Nicholas Doherty
Anti-Masking Statutes And Anonymous Protest In The Age Of Surveillance, Nicholas Doherty
Seattle Journal for Social Justice
No abstract provided.
Real You Meets Virtual You: It Is Time For Consumers To Regain Power Online, Neeka Hodaie
Real You Meets Virtual You: It Is Time For Consumers To Regain Power Online, Neeka Hodaie
Seattle Journal for Social Justice
No abstract provided.
Privacy Dependencies, Solon Barocas, Karen Levy
Privacy Dependencies, Solon Barocas, Karen Levy
Washington Law Review
This Article offers a comprehensive survey of privacy dependencies—the many ways that our privacy depends on the decisions and disclosures of other people. What we do and what we say can reveal as much about others as it does about ourselves, even when we don’t realize it or when we think we’re sharing information about ourselves alone. We identify three bases upon which our privacy can depend: our social ties, our similarities to others, and our differences from others. In a tie-based dependency, an observer learns about one person by virtue of her social relationships with others—family, friends, or other …
Cell-Site Location Information And The Privacies Of Life: The Impact Of Carpenter V. United States, Trevor Moore
Cell-Site Location Information And The Privacies Of Life: The Impact Of Carpenter V. United States, Trevor Moore
Loyola of Los Angeles Law Review
No abstract provided.
The Limits And Possibilities Of Data-Driven Antitrafficking Efforts, Jennifer Musto Ph.D.
The Limits And Possibilities Of Data-Driven Antitrafficking Efforts, Jennifer Musto Ph.D.
Georgia State University Law Review
An examination of technology in the countertrafficking space reveals recurring tensions between law enforcement and rights-based approaches. It also illuminates assumptions, such as the one that posits more law enforcement-focused, nonstate-actor-supported data-driven efforts are necessary to securing justice for people in trafficking situations. However, a closer look at how technology is used and by whom also invites us to ask different questions and to leverage the power of our all-too-human creative potential in thinking about how to value and prioritize data ethics, transparency, and accountability in future countertrafficking work.
Privacy's Constitutional Moment And The Limits Of Data Protection, Woodrow Hartzog, Neil M. Richards
Privacy's Constitutional Moment And The Limits Of Data Protection, Woodrow Hartzog, Neil M. Richards
Faculty Scholarship
America’s privacy bill has come due. Since the dawn of the Internet, Congress has repeatedly failed to build a robust identity for American privacy law. But now both California and the European Union have forced Congress’s hand by passing the California Consumer Privacy Act (CCPA) and the General Data Protection Regulation (GDPR). These data protection frameworks, structured around principles for Fair Information Processing called the “FIPs,” have industry and privacy advocates alike clamoring for a “U.S. GDPR.” States seemed poised to blanket the country with FIP-based laws if Congress fails to act. The United States is thus in the midst …
The Data Market: A Proposal To Control Data About You, David Shaw, Daniel W. Engels
The Data Market: A Proposal To Control Data About You, David Shaw, Daniel W. Engels
SMU Data Science Review
The current legal and economic infrastructure facilitating data collection practices and data analysis has led to extreme over-collection of data and the overall loss of personal privacy. Data over-collection has led to a secondary market for consumer data that is invisible to the consumer and results in a person's data being distributed far beyond their knowledge or control. In this paper, we propose a Data Market framework and design for personal data management and privacy protection in which the individual controls and profits from the dissemination of their data. Our proposed Data Market uses a market-based approach utilizing blockchain distributed …
Smart Homes: The Next Fourth Amendment Frontier, Christina A. Robinson
Smart Homes: The Next Fourth Amendment Frontier, Christina A. Robinson
University of Miami Race & Social Justice Law Review
Under the third-party search doctrine, an individual does not have a reasonable expectation of privacy in information he or she voluntarily discloses to third parties. “Always on” in-home technology creates recordings of unsuspecting consumers in their most intimate spaces and sends them to third party companies and their affiliates, which makes this information subject to warrantless search by law enforcement under the third- search doctrine. The third-party search doctrine is ill-suited to the digital age, where consumers are routinely required to volunteer information to third parties in order to access digital content. This Note suggests that a warrant should be …
Privacy Or The Polls: Public Voter Registration Laws As A Modern Form Of Vote Denial, Audrey Paige Sauer
Privacy Or The Polls: Public Voter Registration Laws As A Modern Form Of Vote Denial, Audrey Paige Sauer
William & Mary Law Review
On May 11, 2017, President Donald J. Trump signed an executive order establishing the Presidential Advisory Commission on Election Integrity (PACEI), with the mission to “study the registration and voting processes used in Federal elections.” Pursuant to this mission, Vice Chair of the Commission, Kansas Secretary of State Kris Kobach, sent out letters to state election officials soliciting all “publicly available voter roll data,” including all registrants’ full first and last names, middle names or initials, addresses, dates of birth, political party, last four digits of Social Security numbers if available, voter history from 2006 onward, information regarding any felony …
Dna Is Different: An Exploration Of The Current Inadequacies Of Genetic Privacy Protection In Recreational Dna Databases, Jamie M. Zeevi
Dna Is Different: An Exploration Of The Current Inadequacies Of Genetic Privacy Protection In Recreational Dna Databases, Jamie M. Zeevi
St. John's Law Review
(Excerpt)
Part I of this Note discusses the fundamental science behind DNA and defines and explains the process of familial DNA searching. Part I also discusses how Carpenter v. United States provides a framework to begin thinking about the unique nature of DNA and privacy implications for its use, and why the revealing nature of this type of data warrants protection. Part II of this Note delves into the lack of constitutional and statutory protections for DNA in recreational DNA databases. First, Part II explains that traditional Fourth Amendment concepts, like search warrants, probable cause, reasonable expectation of privacy, third-party …
Privacy As Safety, A. Michael Froomkin, Zak Colangelo
Privacy As Safety, A. Michael Froomkin, Zak Colangelo
Washington Law Review
The idea that privacy makes you safer is unjustly neglected: public officials emphasize the dangers of privacy while contemporary privacy theorists acknowledge that privacy may have safety implications but hardly dwell on the point. We argue that this lack of emphasis is a substantive and strategic error and seek to rectify it. This refocusing is particularly timely given the proliferation of new and invasive technologies for the home and for consumer use more generally, not to mention surveillance technologies such as so-called smart cities.
Indeed, we argue—perhaps for the first time in modern conversations about privacy—that in many cases privacy …
Automation In Moderation, Hannah Bloch-Wehba
Automation In Moderation, Hannah Bloch-Wehba
Faculty Scholarship
This Article assesses recent efforts to encourage online platforms to use automated means to prevent the dissemination of unlawful online content before it is ever seen or distributed. As lawmakers in Europe and around the world closely scrutinize platforms’ “content moderation” practices, automation and artificial intelligence appear increasingly attractive options for ridding the Internet of many kinds of harmful online content, including defamation, copyright infringement, and terrorist speech. Proponents of these initiatives suggest that requiring platforms to screen user content using automation will promote healthier online discourse and will aid efforts to limit Big Tech’s power.
In fact, however, the …
The Relationship Between Privacy Notice Formats And Consumer Disclosure Decisions: A Quantitative Study, Alexys Mercedes Carlton, David Cross
The Relationship Between Privacy Notice Formats And Consumer Disclosure Decisions: A Quantitative Study, Alexys Mercedes Carlton, David Cross
Publications
In the Data Era, the future success of many businesses will heavily depend on the business’ ability to collect and process consumer personal information. Business leaders must understand and implement practices that increase consumer trust to influence their willingness to disclose their information. The problem addressed by this study is many consumers do not trust online service providers with their personal information, and as a result, have refrained from engaging in online activities. The purpose of this quantitative correlational study was to understand how consumers use privacy notices when deciding to share their personal information with online businesses. A sample …
News As Surveillance, Erin C. Carroll
News As Surveillance, Erin C. Carroll
Georgetown Law Faculty Publications and Other Works
As inhabitants of the Information Age, we are increasingly aware of the amount and kind of data that technology platforms collect on us. Far less publicized, however, is how much data news organizations collect on us as we read the news online and how they allow third parties to collect that personal data as well. A handful of studies by computer scientists reveal that, as a group, news websites are among the Internet’s worst offenders when it comes to tracking their visitors.
On the one hand, this surveillance is unsurprising. It is capitalism at work. The press’s business model has …
Criminalizing Asylum: Dna Testing Asylum Seekers Violates Privacy Rights, Scarlett L. Montenegro
Criminalizing Asylum: Dna Testing Asylum Seekers Violates Privacy Rights, Scarlett L. Montenegro
American University Journal of Gender, Social Policy & the Law
Introduction.
On June 16, 2015, President Trump announced his 2016 presidential campaign and claimed that Mexicans are criminals who “[h]ave lots of problems . . . they’re bringing drugs. They’re bringing crime. They’re rapists . . . It’s coming from all over . . . Latin America.” President Trump has publicly expressed his hostility towards immigrants by calling them “animals” and blaming them for drugs and gangs in the United States. While in office, President Trump tweeted that immigrants were invading the United States and suggested that “we must immediately, with no Judges or Court Cases, bring them back from …