Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Law

Spying Inc., Danielle K. Citron Mar 2015

Spying Inc., Danielle K. Citron

Faculty Scholarship

The latest spying craze is the “stalking app.” Once installed on someone’s cell phone, the stalking app provides continuous access to the person’s calls, texts, snap chats, photos, calendar updates, and movements. Domestic abusers and stalkers frequently turn to stalking apps because they are undetectable even to sophisticated phone owners.

Business is booming for stalking app providers, even though their entire enterprise is arguably illegal. Federal and state wiretapping laws ban the manufacture, sale, or advertisement of devices knowing their design makes them primarily useful for the surreptitious interception of electronic communications. But those laws are rarely, if ever, enforced. …


Spying Inc., Danielle Keats Citron Jan 2015

Spying Inc., Danielle Keats Citron

Faculty Scholarship

The latest spying craze is the “stalking app.” Once installed on someone’s cell phone, the stalking app provides continuous access to the person’s calls, texts, snap chats, photos, calendar updates, and movements. Domestic abusers and stalkers frequently turn to stalking apps because they are undetectable even to sophisticated phone owners.

Business is booming for stalking app providers, even though their entire enterprise is arguably illegal. Federal and state wiretapping laws ban the manufacture, sale, or advertisement of devices knowing their design makes them primarily useful for the surreptitious interception of electronic communications. But those laws are rarely, if ever, …


Reforming The Law Of Reputation, Frank A. Pasquale Jan 2015

Reforming The Law Of Reputation, Frank A. Pasquale

Faculty Scholarship

Unfair and deceptive practices of controllers and processors of data have adversely affected many citizens. New threats to individuals’ reputations have seriously undermined the efficacy of extant regulation concerning health privacy, credit reporting, and expungement. The common thread is automated, algorithmic arrangements of information, which could render data properly removed or obscured in one records system, nevertheless highly visible or dominant in other, more important ones.

As policymakers reform the law of reputation, they should closely consult European approaches to what is now called the “right to be forgotten.” Health privacy law, credit reporting, and criminal conviction expungement need to …


Privacy, Autonomy, And Internet Platforms, Frank A. Pasquale Jan 2015

Privacy, Autonomy, And Internet Platforms, Frank A. Pasquale

Faculty Scholarship

No abstract provided.


Why The State Cannot “Abolish Marriage” A Partial Defense Of Legal Marriage Based On The Structure Of Intimate Duties, Gregg Strauss Jan 2015

Why The State Cannot “Abolish Marriage” A Partial Defense Of Legal Marriage Based On The Structure Of Intimate Duties, Gregg Strauss

Faculty Scholarship

Does a liberal state have a legitimate interest in defining the terms of intimate relationships? Recently, several scholars have answered this question “no” and concluded that the state should abolish marriage, along with all other categories of intimate status. While politically infeasible, these proposals offer a powerful thought experiment. In this Article, I use this thought experiment to argue that the law cannot avoid relying on intimate status norms and has legitimate reasons to retain an intimate status like marriage.

The argument has three parts. First, even if the law abolished licensed status categories, ordinary doctrines in tort, contract and …


Unfair And Deceptive Robots, Woodrow Hartzog Jan 2015

Unfair And Deceptive Robots, Woodrow Hartzog

Faculty Scholarship

Robots, like household helpers, personal digital assistants, automated cars, and personal drones are or will soon be available to consumers. These robots raise common consumer protection issues, such as fraud, privacy, data security, and risks to health, physical safety and finances. Robots also raise new consumer protection issues, or at least call into question how existing consumer protection regimes might be applied to such emerging technologies. Yet it is unclear which legal regimes should govern these robots and what consumer protection rules for robots should look like.

The thesis of the Article is that the FTC’s grant of authority and …


Surveillance As Loss Of Obscurity, Woodrow Hartzog, Evan Selinger Jan 2015

Surveillance As Loss Of Obscurity, Woodrow Hartzog, Evan Selinger

Faculty Scholarship

Everyone seems concerned about government surveillance, yet we have a hard time agreeing when and why it is a problem and what we should do about it. When is surveillance in public unjustified? Does metadata raise privacy concerns? Should encrypted devices have a backdoor for law enforcement officials? Despite increased attention, surveillance jurisprudence and theory still struggle for coherence. A common thread for modern surveillance problems has been difficult to find.

In this article we argue that the concept of ‘obscurity,’ which deals with the transaction costs involved in finding or understanding information, is the key to understanding and uniting …


Confronting Totalitarianism At Home: The Roots Of European Privacy Protections, Hannah Bloch-Wehba Jan 2015

Confronting Totalitarianism At Home: The Roots Of European Privacy Protections, Hannah Bloch-Wehba

Faculty Scholarship

In the last several years, a consensus has developed that a wide gulf exists between European and American privacy law, although division still exists on whether European law is “more protective” or simply “home to different intuitive sensibilities” than American law. Existing research on the development of European privacy law has focused on two areas: nineteenth-century traditions of honor and dueling, which gave rise to a concept of privacy linked to dignity, and the totalitarian dictatorships of the twentieth century, in reaction to which privacy protected liberty. This Article offers a contrasting view by showing that European privacy law in …


The Scope And Potential Of Ftc Data Protection, Woodrow Hartzog, Daniel J. Solove Jan 2015

The Scope And Potential Of Ftc Data Protection, Woodrow Hartzog, Daniel J. Solove

Faculty Scholarship

For more than fifteen years, the FTC has regulated privacy and data security through its authority to police deceptive and unfair trade practices as well as through powers conferred by specific statutes and international agreements. Recently, the FTC’s powers for data protection have been challenged by Wyndham Worldwide Corp. and LabMD. These recent cases raise a fundamental issue, and one that has surprisingly not been well explored: How broad are the FTC’s privacy and data security regulatory powers? How broad should they be?

In this Article, we address the issue of the scope of FTC authority in the areas of …


Could Data Broker Information Threaten Physician Prescribing And Professional Behavior?, Marco D. Huesch, Michael K. Ong, Barak D. Richman Jan 2015

Could Data Broker Information Threaten Physician Prescribing And Professional Behavior?, Marco D. Huesch, Michael K. Ong, Barak D. Richman

Faculty Scholarship

Privacy is threatened by the extent of data collected and sold by consumer data brokers. Physicians, as individual consumers, leave a ‘data trail’ in the offline (e.g. through traditional shopping) and online worlds (e.g. through online purchases and use of social media). Such data could easily and legally be used without a physician’s knowledge or consent to influence prescribing practices or other physician professional behavior. We sought to determine the extent to which such consumer data was available on a sample of more than 3,000 physicians, healthcare faculty and healthcare system staff at one university’s health units. Using just work …


Tightrope Act, Charles J. Dunlap Jr. Jan 2015

Tightrope Act, Charles J. Dunlap Jr.

Faculty Scholarship

No abstract provided.


Disagreeable Privacy Policies: Mismatches Between Meaning And Users’ Understanding, Joel R. Reidenberg, Travis Breaux, Lorrie F. Cranor, Brian M. French, Amanda Grannis, James T. Graves, Fei Liu, Aleecia Mcdonald, Thomas B. Norton, Rohan Ramanath, N. Cameron Russell, Norman Sadeh, Florian Schaub Jan 2015

Disagreeable Privacy Policies: Mismatches Between Meaning And Users’ Understanding, Joel R. Reidenberg, Travis Breaux, Lorrie F. Cranor, Brian M. French, Amanda Grannis, James T. Graves, Fei Liu, Aleecia Mcdonald, Thomas B. Norton, Rohan Ramanath, N. Cameron Russell, Norman Sadeh, Florian Schaub

Faculty Scholarship

Privacy policies are verbose, difficult to understand, take too long to read, and may be the least-read items on most websites even as users express growing concerns about information collection practices. For all their faults, though, privacy policies remain the single most important source of information for users to attempt to learn how companies collect, use, and share data. Likewise, these policies form the basis for the self-regulatory notice and choice framework that is designed and promoted as a replacement for regulation. The underlying value and legitimacy of notice and choice depends, however, on the ability of users to understand …


When The Curtain Must Be Drawn: American Experience With Proceedings Involving Information That, For Reasons Of National Security, Cannot Be Disclosed, Peter L. Strauss Jan 2015

When The Curtain Must Be Drawn: American Experience With Proceedings Involving Information That, For Reasons Of National Security, Cannot Be Disclosed, Peter L. Strauss

Faculty Scholarship

In numerous contexts today, ranging from no-fly lists, to the designation of foreign terrorist organizations, to controls over foreign investments in the United States, federal authorities reach decisions having dramatic consequences for individuals’ liberty and property on the basis of information that those individuals cannot obtain, even in summary form. Recent and pending litigation has challenged these deprivations on due process grounds, with only moderate success. Perhaps unclassified information on which the government has acted must be revealed, with an opportunity given to challenge it and to submit contrary evidence; but in the words of the DC Circuit writing last …