Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 95

Full-Text Articles in Law

Dobbs In A Technologized World: Implications For Us Data Privacy, Jheel Gosain, Jason D. Keune, Michael S. Sinha Jan 2023

Dobbs In A Technologized World: Implications For Us Data Privacy, Jheel Gosain, Jason D. Keune, Michael S. Sinha

All Faculty Scholarship

In June of 2022, the U.S. Supreme Court issued its opinion in Dobbs v. Jackson Women’s Health Organization, overturning 50 years of precedent by eliminating the federal constitutional right to abortion care established by the Court’s 1973 decision in Roe v. Wade. The Dobbs decision leaves the decision about abortion services in the hands of the states, which created an immediately variegated checkerboard of access to women’s healthcare across the country. This in turn laid bare a profusion of privacy issues that emanate from our technologized world. We review these privacy issues, including healthcare data, financial data, website tracking and …


Me, Myself And My Digital Double: Extending Sara Greene’S Stealing (Identity) From The Poor To The Challenges Of Identity Verification, Michele E. Gilman Mar 2022

Me, Myself And My Digital Double: Extending Sara Greene’S Stealing (Identity) From The Poor To The Challenges Of Identity Verification, Michele E. Gilman

All Faculty Scholarship

Identity is an essential part of the human condition. When one’s identity is stolen or when a state rejects a citizen’s identity, the consequences can be devastating to one’s notion of selfhood as well as undermine their economic security. In Stealing (Identity) from the Poor, Sara Greene explores the serious harms suffered by low-income people who are victimized by identity theft. She explains that our plutocratic regime of identity theft laws serves the interests of wealthier Americans at the expense of those experiencing poverty.

This Essay extends Greene’s analysis and framing to the harms of identity verification systems, particularly in …


Dismantling The “Black Opticon”: Privacy, Race Equity, And Online Data-Protection Reform, Anita L. Allen Feb 2022

Dismantling The “Black Opticon”: Privacy, Race Equity, And Online Data-Protection Reform, Anita L. Allen

All Faculty Scholarship

African Americans online face three distinguishable but related categories of vulnerability to bias and discrimination that I dub the “Black Opticon”: discriminatory oversurveillance, discriminatory exclusion, and discriminatory predation. Escaping the Black Opticon is unlikely without acknowledgement of privacy’s unequal distribution and privacy law’s outmoded and unduly race-neutral façade. African Americans could benefit from race-conscious efforts to shape a more equitable digital public sphere through improved laws and legal institutions. This Essay critically elaborates the Black Opticon triad and considers whether the Virginia Consumer Data Protection Act (2021), the federal Data Protection Act (2021), and new resources for the Federal Trade …


Navigating The Identity Thicket: Trademark's Lost Theory Of Personality, The Right Of Publicity, And Preemption, Jennifer E. Rothman Jan 2022

Navigating The Identity Thicket: Trademark's Lost Theory Of Personality, The Right Of Publicity, And Preemption, Jennifer E. Rothman

All Faculty Scholarship

Both trademark and unfair competition laws and state right of publicity laws protect against unauthorized uses of a person’s identity. Increasingly, however, these rights are working at odds with one another, and can point in different directions with regard to who controls a person’s name, likeness, and broader indicia of identity. This creates what I call an "identity thicket" of overlapping and conflicting rights over a person’s identity. Current jurisprudence provides little to no guidance on the most basic questions surrounding this thicket, such as what right to use a person’s identity, if any, flows from the transfer of marks …


Periods For Profit And The Rise Of Menstrual Surveillance, Michele E. Gilman Apr 2021

Periods For Profit And The Rise Of Menstrual Surveillance, Michele E. Gilman

All Faculty Scholarship

Menstruation is being monetized and surveilled, with the voluntary participation of millions of women. Thousands of downloadable apps promise to help women monitor their periods and manage their fertility. These apps are part of the broader, multi-billion dollar, Femtech industry, which sells technology to help women understand and improve their health. Femtech is marketed with the language of female autonomy and feminist empowerment. Despite this rhetoric, Femtech is part of a broader business strategy of data extraction, in which companies are extracting people’s personal data for profit, typically without their knowledge or meaningful consent. Femtech can oppress menstruators in several …


Privacy Vs. Transparency: Handling Protected Materials In Agency Rulemaking, Christopher S. Yoo, Kellen Mccoy Jan 2021

Privacy Vs. Transparency: Handling Protected Materials In Agency Rulemaking, Christopher S. Yoo, Kellen Mccoy

All Faculty Scholarship

Agencies conducting informal rulemaking proceedings increasingly confront conflicting duties with respect to protected materials included in information submitted in public rulemaking dockets. They must reconcile the broad commitment to openness and transparency reflected in federal law with the duty to protect confidential business information (CBI) and personally identifiable information (PII) against improper disclosure.

This Article presents an analysis of how agencies can best balance these often-countervailing considerations. Part I explores the statutory duties to disclose and withhold information submitted in public rulemaking dockets placed on agencies. It also examines judicial decisions and other legal interpretations regarding the proper way to …


Artificial Intelligence And The Challenges Of Workplace Discrimination And Privacy, Pauline Kim, Matthew T. Bodie Jan 2021

Artificial Intelligence And The Challenges Of Workplace Discrimination And Privacy, Pauline Kim, Matthew T. Bodie

All Faculty Scholarship

Employers are increasingly relying on artificially intelligent (AI) systems to recruit, select, and manage their workforces, raising fears that these systems may subject workers to discriminatory, invasive, or otherwise unfair treatment. This article reviews those concerns and provides an overview of how current laws may apply, focusing on two particular problems: discrimination on the basis of protected characteristics like race, sex, or disability, and the invasion of workers’ privacy engendered by workplace AI systems. It discusses the ways in which relying on AI to make personnel decisions can produce discriminatory outcomes and how current law might apply. It then explores …


Compliance Management Systems: Do They Make A Difference?, Cary Coglianese, Jennifer Nash Jan 2021

Compliance Management Systems: Do They Make A Difference?, Cary Coglianese, Jennifer Nash

All Faculty Scholarship

Regulatory compliance is vital for promoting the public values served by regulation. Yet many businesses remain out of compliance with some of the regulations that apply to them—presenting not only possible dangers to the public but also exposing themselves to potentially significant liability risk. Compliance management systems (CMSs) may help reduce the likelihood of noncompliance. In recent years, managers have begun using CMSs in an effort to address compliance issues in a variety of domains: environment, workplace health and safety, finance, health care, and aviation, among others. CMSs establish systematic, checklist-like processes by which managers seek to improve their organizations’ …


Contracting For Algorithmic Accountability, Cary Coglianese, Erik Lampmann Jan 2021

Contracting For Algorithmic Accountability, Cary Coglianese, Erik Lampmann

All Faculty Scholarship

As local, state, and federal governments increase their reliance on artificial intelligence (AI) decision-making tools designed and operated by private contractors, so too do public concerns increase over the accountability and transparency of such AI tools. But current calls to respond to these concerns by banning governments from using AI will only deny society the benefits that prudent use of such technology can provide. In this Article, we argue that government agencies should pursue a more nuanced and effective approach to governing the governmental use of AI by structuring their procurement contracts for AI tools and services in ways that …


Taking Disability Public, Jasmine E. Harris Jan 2021

Taking Disability Public, Jasmine E. Harris

All Faculty Scholarship

Anti-discrimination laws enforce the idea that no one should be forced or encouraged to hide their race, gender, sexuality or other characteristics of their identity. So why is disability rights law the glaring exception? Other areas of anti-discrimination law have eschewed forms of enforced privacy about protected classes and, as a result, re-frame privacy norms as problematic, antigenic, and, at times, counter to structural reform goals. In contrast, disability rights law values privacy norms to preempt discrimination; in other words, if you never reveal the information, no one can discriminate against you because of that information. This Article argues that …


Privacy In The Age Of Contact Tracing: An Analysis Of Contact Tracing Apps In Different Statutory And Disease Frameworks, Christopher S. Yoo, Apratim Vidyarthi Jan 2021

Privacy In The Age Of Contact Tracing: An Analysis Of Contact Tracing Apps In Different Statutory And Disease Frameworks, Christopher S. Yoo, Apratim Vidyarthi

All Faculty Scholarship

The Covid-19 pandemic is a historic pandemic that has affected the lives of virtually everyone on the globe. One approach to slowing the spread of the disease is to use contact tracing, facilitated by our internet-connected smartphones. Different nations and states have partnered to develop a variety of contact tracing apps that use different technologies and architectures.

This paper investigates how five contact tracing apps—Germany’s Corona-Warn-App, Israel’s HaMagen, North Dakota’s Care19 Diary and Alert apps, and India’s Aarogya Setu—fare in privacy-oriented statutory frameworks to understand the design choices and public health implications shaped by these statutes. The three statutes—the Health …


The First Amendment And The Right(S) Of Publicity, Jennifer E. Rothman, Robert C. Post Oct 2020

The First Amendment And The Right(S) Of Publicity, Jennifer E. Rothman, Robert C. Post

All Faculty Scholarship

The right of publicity protects persons against unauthorized uses of their identity, most typically their names, images, or voices. The right is in obvious tension with freedom of speech. Yet courts seeking to reconcile the right with the First Amendment have to date produced only a notoriously confused muddle of inconsistent constitutional doctrine. In this Article, we suggest a way out of the maze. We propose a relatively straightforward framework for analyzing how the right of publicity should be squared with First Amendment principles.

At the root of contemporary constitutional confusion lies a failure to articulate the precise state interests …


Regulation Of Algorithmic Tools In The United States, Christopher S. Yoo, Alicia Lai Jan 2020

Regulation Of Algorithmic Tools In The United States, Christopher S. Yoo, Alicia Lai

All Faculty Scholarship

Policymakers in the United States have just begun to address regulation of artificial intelligence technologies in recent years, gaining momentum through calls for additional research funding, piece-meal guidance, proposals, and legislation at all levels of government. This Article provides an overview of high-level federal initiatives for general artificial intelligence (AI) applications set forth by the U.S. president and responding agencies, early indications from the incoming Biden Administration, targeted federal initiatives for sector-specific AI applications, pending federal legislative proposals, and state and local initiatives. The regulation of the algorithmic ecosystem will continue to evolve as the United States continues to search …


Privative Copyright, Shyamkrishna Balganesh Jan 2020

Privative Copyright, Shyamkrishna Balganesh

All Faculty Scholarship

“Privative” copyright claims are infringement actions brought by authors for the unauthorized public dissemination of works that are private, unpublished, and revelatory of the author’s personal identity. Driven by considerations of authorial autonomy, dignity, and personality rather than monetary value, these claims are almost as old as Anglo-American copyright law itself. Yet modern thinking has attempted to undermine their place within copyright law and sought to move them into the domain of privacy law. This Article challenges the dominant view and argues that privative copyright claims form a legitimate part of the copyright landscape. It shows how privative copyright claims …


The Right Of Publicity's Intellectual Property Turn, Jennifer E. Rothman Apr 2019

The Right Of Publicity's Intellectual Property Turn, Jennifer E. Rothman

All Faculty Scholarship

The Article is adapted from a keynote lecture about my book, THE RIGHT OF PUBLICITY: PRIVACY REIMAGINED FOR A PUBLIC WORLD (Harvard Univ. Press 2018), delivered at Columbia Law School for its symposium, “Owning Personality: The Expanding Right of Publicity.” The book challenges the conventional historical and theoretical understanding of the right of publicity. By uncovering the history of the right of publicity’s development, the book reveals solutions to current clashes with free speech, individual liberty, and copyright law, as well as some opportunities for better protecting privacy in the digital age.

The lecture (as adapted for this Article) explores …


Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick Jan 2018

Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick

All Faculty Scholarship

Across the Internet, mistaken and malicious routing announcements impose significant costs on users and network operators. To make routing announcements more reliable and secure, Internet coordination bodies have encouraged network operators to adopt the Resource Public Key Infrastructure (“RPKI”) framework. Despite this encouragement, RPKI’s adoption rates are low, especially in North America.

This report presents the results of a year-long investigation into the hypothesis—widespread within the network operator community—that legal issues pose barriers to RPKI adoption and are one cause of the disparities between North America and other regions of the world. On the basis of interviews and analysis of …


Tactful Inattention: Erving Goffman, Privacy In The Digital Age, And The Virtue Of Averting One's Eyes, Elizabeth De Armond Jan 2018

Tactful Inattention: Erving Goffman, Privacy In The Digital Age, And The Virtue Of Averting One's Eyes, Elizabeth De Armond

All Faculty Scholarship

No abstract provided.


Relational Contracts Of Adhesion, David A. Hoffman Jan 2018

Relational Contracts Of Adhesion, David A. Hoffman

All Faculty Scholarship

Not all digital fine print exculpates liability: some exhorts users to perform before the consumer relationship has soured. We promise to choose strong passwords (and hold them private); to behave civilly on social networks; to refrain from streaming shows and sports; and to avoid reverse-engineering code (or, worse, deploying deadly bots). In short: consumers are apparently regulated by digital fine print, though it’s universally assumed we don’t read it, and even if we did, we’ll never be sued for failing to perform.

On reflection, this ordinary phenomenon is perplexing. Why would firms persist in deploying uncommunicative behavioral spurs? The conventional …


The Right Of Publicity: Privacy Reimagined For New York?, Jennifer E. Rothman Jan 2018

The Right Of Publicity: Privacy Reimagined For New York?, Jennifer E. Rothman

All Faculty Scholarship

This essay is based on a featured lecture that I gave as part of the Cardozo Arts & Entertainment Law Journal’s 2 symposium on a proposed right of publicity law in New York. The essay draws from my recent book, The Right of Publicity: Privacy Reimagined for a Public World, published by Harvard University Press. Insights from the book suggest that New York should not upend more than one hundred years of established privacy law in the state, nor jeopardize its citizens’ ownership over their own names, likenesses, and voices by replacing these privacy laws with a new and independent …


When Whispers Enter The Cloud, Heidi H. Liu Jan 2018

When Whispers Enter The Cloud, Heidi H. Liu

All Faculty Scholarship

With increased awareness of workplace harassment in recent years, the idea of enhanced reporting around sexual misconduct has gained traction. As a result, several technologies – from smartphone apps to well-publicized services – have been introduced with the goals of preventing, enabling reports of, and even predicting sexual misconduct at work, school and in public. But to what extent are these technologies secure and accessible to survivors? This Note documents the existing resources and proposes a framework focusing on privacy and participation for evaluating these tools intended to benefit survivors.


The Ecology Of Transparency Reloaded, Seth F. Kreimer Jan 2018

The Ecology Of Transparency Reloaded, Seth F. Kreimer

All Faculty Scholarship

As Justice Stewart famously observed, "[t]he Constitution itself is neither a Freedom of Information Act nor an Official Secrets Act." What the Constitution's text omits, the last two generations have embedded in "small c" constitutional law and practice in the form of the Freedom of Information Act and a series of overlapping governance reforms including Inspectors General, disclosure of political contributions, the State Department’s “Dissent Channel,” the National Archives Information Security Oversight Office, and the publication rights guaranteed by New York Times v. United States. These institutions constitute an ecology of transparency.

The late Justice Scalia argued that the …


Ispy: Threats To Individual And Institutional Privacy In The Digital World, Lori Andrews May 2017

Ispy: Threats To Individual And Institutional Privacy In The Digital World, Lori Andrews

All Faculty Scholarship

What type of information is collected, who is viewing it, and what law librarians can do to protect their patrons and institutions.


Workplace Freakonomics, Matthew T. Bodie Jan 2017

Workplace Freakonomics, Matthew T. Bodie

All Faculty Scholarship

Data analytics has revolutionized our economy, and employment is no exception. Sometimes called people analytics or HR analytics, the study of worker behavior and activity now includes the collection of massive amounts of data that is then crunched by algorithms looking for both expected and unexpected patterns. This work is akin to the "freakonomics" approach, which asks unusual questions and is prepared to find answers that may upset conventional wisdom. This paper explores the possibility of a "workplace freakonomics" approach to using big data in the workplace, and considers the legal and ethical ramifications for wide-ranging explorations of employee data.


The Use Of Information And Communications Technology In Criminal Procedure In The Usa, Stephen C. Thaman Jan 2017

The Use Of Information And Communications Technology In Criminal Procedure In The Usa, Stephen C. Thaman

All Faculty Scholarship

In this chapter, the author discusses the three types of criminal surveillance and the subsequent data mining used to synthesize and compare the results of surveillance techniques. In addition, the author examines how the aforementioned procedures should be viewed in light of United States case law involving the privacy of American citizens.


Privacy, Poverty, And Big Data: A Matrix Of Vulnerabilities For Poor Americans, Mary Madden, Michele E. Gilman, Karen Levy, Alice Marwick Jan 2017

Privacy, Poverty, And Big Data: A Matrix Of Vulnerabilities For Poor Americans, Mary Madden, Michele E. Gilman, Karen Levy, Alice Marwick

All Faculty Scholarship

This Article examines the matrix of vulnerabilities that low-income people face as a result of the collection and aggregation of big data and the application of predictive analytics. On one hand, big data systems could reverse growing economic inequality by expanding access to opportunities for low-income people. On the other hand, big data could widen economic gaps by making it possible to prey on low-income people or to exclude them from opportunities due to biases entrenched in algorithmic decision-making tools. New kinds of “networked privacy” harms, in which users are simultaneously held liable for their own behavior and the actions …


Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen Dec 2016

Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen

All Faculty Scholarship

Big Data is the vast quantities of information amenable to large-scale collection, storage, and analysis. Using such data, companies and researchers can deploy complex algorithms and artificial intelligence technologies to reveal otherwise unascertained patterns, links, behaviors, trends, identities, and practical knowledge. The information that comprises Big Data arises from government and business practices, consumer transactions, and the digital applications sometimes referred to as the “Internet of Things.” Individuals invisibly contribute to Big Data whenever they live digital lifestyles or otherwise participate in the digital economy, such as when they shop with a credit card, get treated at a hospital, apply …


I'Ll See: How Surveillance Undermines Privacy By Eroding Trust, Richard Warner, Robert Sloan Jan 2016

I'Ll See: How Surveillance Undermines Privacy By Eroding Trust, Richard Warner, Robert Sloan

All Faculty Scholarship

No abstract provided.


Laird V. Tatum And Article Iii Standing In Surveillance Cases, Jeffrey L. Vagle Jan 2016

Laird V. Tatum And Article Iii Standing In Surveillance Cases, Jeffrey L. Vagle

All Faculty Scholarship

Plaintiffs seeking to challenge government surveillance programs have faced long odds in federal courts, due mainly to a line of Supreme Court cases that have set a very high bar to Article III standing in these cases. The origins of this jurisprudence can be directly traced to Laird v. Tatum, a 1972 case where the Supreme Court considered the question of who could sue the government over a surveillance program, holding in a 5-4 decision that chilling effects arising “merely from the individual’s knowledge” of likely government surveillance did not constitute adequate injury to meet Article III standing requirements.


Neuroprediction: New Technology, Old Problems, Stephen J. Morse Jan 2015

Neuroprediction: New Technology, Old Problems, Stephen J. Morse

All Faculty Scholarship

Neuroprediction is the use of structural or functional brain or nervous system variables to make any type of prediction, including medical prognoses and behavioral forecasts, such as an indicator of future dangerous behavior. This commentary will focus on behavioral predictions, but the analysis applies to any context. The general thesis is that using neurovariables for prediction is a new technology, but that it raises no new ethical issues, at least for now. Only if neuroscience achieves the ability to “read” mental content will genuinely new ethical issues be raised, but that is not possible at present.


Self, Privacy, And Power: Is It All Over?, Richard Warner, Robert H. Sloan Oct 2014

Self, Privacy, And Power: Is It All Over?, Richard Warner, Robert H. Sloan

All Faculty Scholarship

The realization of a multifaceted self is an ideal one strives to realize. One realizes such a self in large part through interaction with others in various social roles. Such realization requires a significant degree of informational privacy. Informational privacy is the ability to determine for yourself when others may collect and how they may use your information. The realization of multifaceted selves requires informational privacy in public. There is no contradiction here: informational privacy is a matter of control, and you can have such control in public. Current information processing practices greatly reduce privacy in public thereby threatening the …