Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 43

Full-Text Articles in Law

The Consumer Bundle, Shelly Kreiczer-Levy Mar 2024

The Consumer Bundle, Shelly Kreiczer-Levy

Washington Law Review

Can property law have a consumer protection purpose? One of the most important consumer law concerns today is the limited control consumers have over the digital assets and software-embedded products they purchase. Current proposals for reform focus on classifying the transaction as either license or sale and rely mostly on contract law and consumer protection regulation with a few calls for restoring ownership rights. This Article argues that property law can protect consumers by establishing a minimum bundle of rights for consumers: the “consumer’s bundle.” Working with property theory and an analysis of property values, this Article explains the importance …


The Kids Are Not Alright: Negative Consequences Of Student Device And Account Surveillance, Ashley Peterson Mar 2024

The Kids Are Not Alright: Negative Consequences Of Student Device And Account Surveillance, Ashley Peterson

Washington Law Review

In recent years, student surveillance has rapidly grown. As schools have experimented with new technologies, transitioned to remote and hybrid instruction, and faced pressure to protect student safety, they have increased surveillance of school accounts and school-issued devices. School surveillance extends beyond school premises to monitor student activities that occur off-campus. It reaches students’ most intimate data and spaces, including things students likely believe are private: internet searches, emails, and messages. This Comment focuses on the problems associated with off-campus surveillance of school accounts and school-issued devices, including chilling effects that fundamentally alter student behavior, reinforcement of the school-to-prison pipeline, …


Speaking Back To Sexual Privacy Invasions, Brenda Dvoskin Mar 2024

Speaking Back To Sexual Privacy Invasions, Brenda Dvoskin

Washington Law Review

Many big players in the internet ecosystem do not like hosting sexual expression. They often justify these bans as a protection of sexual privacy. For example, Meta states that it removes sexual imagery to prevent the nonconsensual distribution of sexual images. In response, this Article argues that banning digital sexual expression is counterproductive if the aim is to alleviate the harms inflicted by sexual privacy losses.

Contemporary sexual privacy theory, however, lacks analytical tools to explain why nudity bans harm the interests they intend to protect. This Article aims at building those tools. The main contribution is an invitation to …


Gone Fishing: Casting A Wide Net Using Geofence Warrants, Ryan Tursi Mar 2023

Gone Fishing: Casting A Wide Net Using Geofence Warrants, Ryan Tursi

Washington Law Review

Technology companies across the country receive requests from law enforcement agencies for cell phone location information near the scenes of crimes. These requests rely on the traditional warrant process and are known as geofence warrants, or reverse location search warrants. By obtaining location information, law enforcement can identify potential suspects or persons of interest who were near the scene of a crime when they have no leads. But the use of this investigative technique is controversial, as it threatens to intrude upon the privacy of innocent bystanders who had the misfortune of being nearby when the crime took place. Innocent …


Beware What You Google: Fourth Amendment Constitutionality Of Keyword Warrants, Chelsa Camille Edano Dec 2022

Beware What You Google: Fourth Amendment Constitutionality Of Keyword Warrants, Chelsa Camille Edano

Washington Law Review

Many Americans have potentially had their privacy rights invaded through invisible, widespread police searches. In recent years, local and federal governments have compelled Google and other search engine companies to produce the personal information of users who have conducted a search query related to a crime. By using keyword warrants, the government can conduct a dragnet search for suspects, imposing suspicion on users and exposing their personal information. The keyword warrant is a symptom of the erosion of the Fourth Amendment protection against suspicionless searches. Not only is scholarship scarce on keyword warrants, but also instances of these warrants are …


You Are Not A Commodity: A More Efficient Approach To Commercial Privacy Rights, Benjamin T. Pardue Dec 2021

You Are Not A Commodity: A More Efficient Approach To Commercial Privacy Rights, Benjamin T. Pardue

Washington Law Review

United States common law provides four torts for privacy invasion: (1) disclosure of private facts, (2) intrusion upon seclusion, (3) placement of a person in a false light, and (4) appropriation of name or likeness. Appropriation of name or likeness occurs when a defendant commandeers the plaintiff’s recognizability, typically for a commercial benefit. Most states allow plaintiffs who establish liability to recover defendants’ profits as damages from the misappropriation under an “unjust enrichment” theory. By contrast, this Comment argues that such an award provides a windfall to plaintiffs and contributes to suboptimal social outcomes. These include overcompensating plaintiffs and incentivizing …


Revising Reasonableness In The Cloud, Ian Walsh Mar 2021

Revising Reasonableness In The Cloud, Ian Walsh

Washington Law Review

Save everything—just in case––and search for it later. This is a modern mantra fueled by the ubiquity of smartphones, laptops, tablets, and free or low-cost data storage that leads users to store massive amounts of data in the cloud. But when users trust third-party cloud storage providers with private communications, they also surrender Fourth Amendment constitutional certainty. Existing statutory safeguards for these communications are lower than Fourth Amendment warrant and probable cause standards; this permits the government to seize large quantities of users’ private communications stored in the cloud with only minimal justification. Due to the revealing nature of such …


Hacks, Leaks, And Data Dumps: The Right To Publish Illegally Acquired Information Twenty Years After Bartnicki V. Vopper, Erik Ugland, Christina Mazzeo Mar 2021

Hacks, Leaks, And Data Dumps: The Right To Publish Illegally Acquired Information Twenty Years After Bartnicki V. Vopper, Erik Ugland, Christina Mazzeo

Washington Law Review

This Article addresses a fluid and increasingly salient category of cases involving the First Amendment right to publish information that was hacked, stolen, or illegally leaked by someone else. Twenty years ago, in Bartnicki v. Vopper, the Supreme Court appeared to give broad constitutional cover to journalists and other publishers in these situations, but Justice Stevens’s inexact opinion for the Court and Justice Breyer’s muddling concurrence left the boundaries unclear. The Bartnicki framework is now implicated in dozens of new cases— from the extradition and prosecution of Julian Assange, to Donald Trump’s threatened suit of The New York Times …


Data Protection In Disarray, Thomas D. Haley Oct 2020

Data Protection In Disarray, Thomas D. Haley

Washington Law Review

Businesses routinely lose or misuse individuals’ private information, with results that can be devastating. Federal courts often leave those individuals without legal recourse by dismissing their lawsuits for lack of standing, even though plaintiffs in these cases provide stronger showings of harm than courts usually require. Using an original data set, this Article shows how standing analysis in these cases has gone awry and argues that the standing inquiry in today’s data-protection cases harms both public policy and standing doctrine.

This Article makes three contributions to literatures in federal courts and privacy. First, it shows that current federal court practice …


Privacy Dependencies, Solon Barocas, Karen Levy Jun 2020

Privacy Dependencies, Solon Barocas, Karen Levy

Washington Law Review

This Article offers a comprehensive survey of privacy dependencies—the many ways that our privacy depends on the decisions and disclosures of other people. What we do and what we say can reveal as much about others as it does about ourselves, even when we don’t realize it or when we think we’re sharing information about ourselves alone. We identify three bases upon which our privacy can depend: our social ties, our similarities to others, and our differences from others. In a tie-based dependency, an observer learns about one person by virtue of her social relationships with others—family, friends, or other …


Candidate Privacy, Rebecca Green Mar 2020

Candidate Privacy, Rebecca Green

Washington Law Review

In the United States, we have long accepted that candidates for public office who have voluntarily stepped into the public eye sacrifice claims to privacy. This refrain is rooted deep within the American enterprise, emanating from the Framers’ concept of the informed citizen as a bedrock of democracy. Voters must have full information about candidates to make their choices at the ballot box. Even as privacy rights for ordinary citizens have expanded, privacy theorists and courts continue to exempt candidates from privacy protections. This Article suggests that two disruptions warrant revisiting the privacy interests of candidates. The first is a …


Privacy As Safety, A. Michael Froomkin, Zak Colangelo Mar 2020

Privacy As Safety, A. Michael Froomkin, Zak Colangelo

Washington Law Review

The idea that privacy makes you safer is unjustly neglected: public officials emphasize the dangers of privacy while contemporary privacy theorists acknowledge that privacy may have safety implications but hardly dwell on the point. We argue that this lack of emphasis is a substantive and strategic error and seek to rectify it. This refocusing is particularly timely given the proliferation of new and invasive technologies for the home and for consumer use more generally, not to mention surveillance technologies such as so-called smart cities.

Indeed, we argue—perhaps for the first time in modern conversations about privacy—that in many cases privacy …


Between You, Me, And Alexa: On The Legality Of Virtual Assistant Devices In Two-Party Consent States, Ria Kuruvilla Dec 2019

Between You, Me, And Alexa: On The Legality Of Virtual Assistant Devices In Two-Party Consent States, Ria Kuruvilla

Washington Law Review

When an Amazon Echo is activated, the device is constantly recording and sending those recordings to Amazon’s cloud. For an always recording device such as the Echo, getting consent from every person subject to a recording proves difficult. An Echo-owner consents to the recordings when they purchase and register the device, but when does a guest in an Echo-owner’s home consent to being recorded? This Comment uses Amazon’s Echo and Washington’s privacy statute to illustrate the tension between speech-activated devices and two-party consent laws—which require that all parties subject to a recording consent to being recorded. This Comment argues that …


Striking A Balance: Privacy And National Security In Section 702 U.S. Person Queries, Brittany Adams Mar 2019

Striking A Balance: Privacy And National Security In Section 702 U.S. Person Queries, Brittany Adams

Washington Law Review

The transformation of U.S. foreign intelligence in recent years has led to increasing privacy concerns. The Foreign Intelligence Surveillance Act of 1978 (FISA) traditionally regulated foreign intelligence surveillance by authorizing warrant-based searches of U.S. and non-U.S. persons. Individualized court orders under traditional FISA were intended to protect U.S. persons and limit the scope of intelligence collection. In a post-9/11 world, however, the intelligence community cited concerns regarding the speed and efficiency of collection under traditional methods. The intelligence and law enforcement communities recognized the “wall” preventing information sharing between the communities as a central failure leading to the 9/11 attacks. …


Privacy Localism, Ira S. Rubinstein Dec 2018

Privacy Localism, Ira S. Rubinstein

Washington Law Review

Privacy law scholarship often focuses on domain-specific federal privacy laws and state efforts to broaden them. This Article provides the first comprehensive analysis of privacy regulation at the local level (which it dubs “privacy localism”), using recently enacted privacy laws in Seattle and New York City as principal examples. Further, this Article attributes the rise of privacy localism to a combination of federal and state legislative failures and three emerging urban trends: the role of local police in federal counterterrorism efforts; smart city and open data initiatives; and demands for local police reform in the wake of widely reported abusive …


Privacy's Double Standards, Scott Skinner-Thompson Dec 2018

Privacy's Double Standards, Scott Skinner-Thompson

Washington Law Review

Where the right to privacy exists, it should be available to all people. If not universally available, then privacy rights should be particularly accessible to marginalized individuals who are subject to greater surveillance and are less able to absorb the social costs of privacy violations. But in practice, there is evidence that people of privilege tend to fare better when they bring privacy tort claims than do non-privileged individuals. This disparity occurs despite doctrine suggesting that those who occupy prominent and public social positions are entitled to diminished privacy tort protections. This Article unearths disparate outcomes in public disclosure tort …


Privacy In The Cloud: The Fourth Amendment Fog, Sarah Aitchison Jun 2018

Privacy In The Cloud: The Fourth Amendment Fog, Sarah Aitchison

Washington Law Review

The Cloud has changed how individuals record, store, and aggregate their personal information. As technology’s capacity for holding an individual’s most intimate details and recording day-to-day experiences increases, Fourth Amendment privacy protections become less equipped to respond to technological advances. These advances allow private companies to store an immense amount of their consumers’ personal information, and government entities to obtain that information. In response, tech companies have begun refusing to comply with government demands for information collected and stored in their devices and in the Cloud, and are increasingly ending up in court, fighting orders to disclose consumer information. A …


Privacy, Press, And The Right To Be Forgotten In The United States, Amy Gajda Mar 2018

Privacy, Press, And The Right To Be Forgotten In The United States, Amy Gajda

Washington Law Review

When the European Court of Justice in effect accepted a Right to Be Forgotten in 2014, ruling that a man had a right to privacy in his past economic troubles, many suggested that a similar right would be neither welcomed nor constitutional in the United States given the Right’s impact on First Amendment-related freedoms. Even so, a number of state and federal courts have recently used language that embraces in a normative sense the appropriateness of such a Right. These court decisions protect an individual’s personal history in a press-relevant way: they balance individual privacy rights against the public value …


Alexa, What Should We Do About Privacy? Protecting Privacy For Users Of Voice-Activated Devices, Anne Pfeifle Mar 2018

Alexa, What Should We Do About Privacy? Protecting Privacy For Users Of Voice-Activated Devices, Anne Pfeifle

Washington Law Review

Alexa, Amazon’s digital voice assistant, and devices like it, are increasingly common. With this trend comes growing problems, as illustrated by a murder investigation in Bentonville, Arkansas. Police wanted Amazon to turn over data associated with the suspect’s Echo device, hoping it had overheard something on the night of the murder. The case sparked wide-spread interest in the privacy implications of in-home devices that record audio of users. But the biggest threat to user privacy is not that Alexa may overhear a crime—it is that law enforcement will use such devices in new ways that users are not prepared for …


Anonymization And Risk, Ira S. Rubinstein, Woodrow Hartzog Jun 2016

Anonymization And Risk, Ira S. Rubinstein, Woodrow Hartzog

Washington Law Review

Perfect anonymization of data sets that contain personal information has failed. But the process of protecting data subjects in shared information remains integral to privacy practice and policy. While the deidentification debate has been vigorous and productive, there is no clear direction for policy. As a result, the law has been slow to adapt a holistic approach to protecting data subjects when data sets are released to others. Currently, the law is focused on whether an individual can be identified within a given set. We argue that the best way to move data release policy past the alleged failures of …


Regulating Real-World Surveillance, Margot E. Kaminski Oct 2015

Regulating Real-World Surveillance, Margot E. Kaminski

Washington Law Review

A number of laws govern information gathering, or surveillance, by private parties in the physical world. But we lack a compelling theory of privacy harm that accounts for the state’s interest in enacting these laws. Without a theory of privacy harm, these laws will be enacted piecemeal. Legislators will have a difficult time justifying the laws to constituents; the laws will not be adequately tailored to legislative interest; and courts will find it challenging to weigh privacy harms against other strong values, such as freedom of expression. This Article identifies the government interest in enacting laws governing surveillance by private …


Washington's Reproductive Privacy Act: An Interpretation And Constitutional Analysis, Ross Tanaka Jun 2015

Washington's Reproductive Privacy Act: An Interpretation And Constitutional Analysis, Ross Tanaka

Washington Law Review

In Roe v. Wade, the Supreme Court declared that the “zone of privacy” inherent in the liberty component of the Due Process Clauses protected a woman’s right to choose when to terminate her pregnancy. Nevertheless, in the years following Roe, the Court held that the right of choice did not include a right to state assistance in obtaining an abortion. After decisions such as Webster v. Reproductive Services and Maher v. Roe, the state may express its preference for childbirth by denying the use of its funds, facilities, and personnel for abortion. Although a majority of the …


Public Records In Private Devices: How Public Employees' Article I, Section 7 Privacy Rights Create A Dilemma For State And Local Government, Philip Paine Mar 2015

Public Records In Private Devices: How Public Employees' Article I, Section 7 Privacy Rights Create A Dilemma For State And Local Government, Philip Paine

Washington Law Review

The Washington Public Records Act (PRA or “the Act”) is a wide-ranging law that heavily weighs in favor of public disclosure of government processes. Initially enacted as a citizen initiative in 1972, the Act has many beneficial uses. For example, it provides insight into a local government’s decision-making process and ensures that citizens have access to their own government. However, the PRA’s potential to be used to invade personal privacy raises significant constitutional concerns. When an employee in possession of a public record invokes the protection of article I, section 7 of the Washington State Constitution, which protects an individual’s …


Obscurity By Design, Woodrow Hartzog, Frederic Stutzman Jun 2013

Obscurity By Design, Woodrow Hartzog, Frederic Stutzman

Washington Law Review

Design-based solutions to confront technological privacy threats are becoming popular with regulators. However, these promising solutions have left the full potential of design untapped. With respect to online communication technologies, design-based solutions for privacy remain incomplete because they have yet to successfully address the trickiest aspect of the Internet—social interaction. This Article posits that privacy-protection strategies such as “Privacy by Design” face unique challenges with regard to social software and social technology due to their interactional nature. This Article proposes that design-based solutions for social technologies benefit from increased attention to user interaction, with a focus on the principles of …


Arrested Development: Arizona V. Gant And Article I, Section 7 Of The Washington State Constitution, Jacob R. Brown May 2010

Arrested Development: Arizona V. Gant And Article I, Section 7 Of The Washington State Constitution, Jacob R. Brown

Washington Law Review

In Arizona v. Gant, the United States Supreme Court held that the search of a vehicle incident to arrest is permissible in only two situations: (1) when the arrestee is unsecured and within reaching distance of the passenger compartment; or (2) when it is reasonable to believe that evidence relevant to the crime of arrest may be found in the vehicle. Because Gant expressed a standard more protective than that established by the Washington State Supreme Court, Gant induced a state of confusion in Washington, where it has long been maintained that article I, section 7 of the Washington …


Privacy As Contextual Integrity, Helen Nissenbaum Feb 2004

Privacy As Contextual Integrity, Helen Nissenbaum

Washington Law Review

The practices of public surveillance, which include the monitoring of individuals in public through a variety of media (e.g., video, data, online), are among the least understood and controversial challenges to privacy in an age of information technologies. The fragmentary nature of privacy policy in the United States reflects not only the oppositional pulls of diverse vested interests, but also the ambivalence of unsettled intuitions on mundane phenomena such as shopper cards, closed-circuit television, and biometrics. This Article, which extends earlier work on the problem of privacy in public, explains why some of the prominent theoretical approaches to privacy, which …


Conundrums With Penumbras: The Right To Privacy Encompasses Non-Gamete Providers Who Create Preembryos With The Intent To Become Parents, Lainie M.C. Dillon May 2003

Conundrums With Penumbras: The Right To Privacy Encompasses Non-Gamete Providers Who Create Preembryos With The Intent To Become Parents, Lainie M.C. Dillon

Washington Law Review

To date, five state high courts have resolved disputes over frozen preembryos. These disputes arose during divorce proceedings between couples who had previously used assisted reproduction and cryopreserved excess preembryos. In each case, one spouse wished to have the preembryos destroyed, while the other wanted to be able to use or donate them in the future. The parties in these cases invoked the constitutional right to privacy to argue for dispositional control over the preembryos; two of the five cases were resolved by relying on this right. The constitutional right to privacy protects intimate decisions involving procreation, marriage, and family …


Recognizing The Societal Value In Information Privacy, James P. Nehf Feb 2003

Recognizing The Societal Value In Information Privacy, James P. Nehf

Washington Law Review

Much has been written about database privacy in the Internet Age, most of it critical of the way in which the American legal system addresses the issue. In this article, Professor Nehf maintains that one of the fundamental difficulties with the public policy debates is that information privacy is often discussed as a typical consumer problem rather than a problem of more general societal concern. As a result, arguments over appropriate resolutions reduce to a balancing of individual rights against more general societal interests, such as increased efficiency in law enforcement, government operations or commercial enterprise. Although privacy scholars discussed …


Opting In, Outing Out, Or No Options At All: The Fight For Control Of Personal Information, Jeff Sovern Oct 1999

Opting In, Outing Out, Or No Options At All: The Fight For Control Of Personal Information, Jeff Sovern

Washington Law Review

Businesses routinely buy and sell personal information about consumers. Many consumers find this objectionable, but relatively few of them opt out of that trade. This Article argues that businesses have both the incentive and the ability to increase consumers' transaction costs in protecting their privacy and that some marketers do in fact inflate those costs. Faced with this and other constraints, many consumers ultimately decide not to protect their privacy. This Article proposes several ways by which consumers' transaction costs can be reduced or eliminated.


No More Messing Around: Substantive Due Process Challenges To State Laws Prohibiting Fornication, Traci Shallbetter Stratton Jul 1998

No More Messing Around: Substantive Due Process Challenges To State Laws Prohibiting Fornication, Traci Shallbetter Stratton

Washington Law Review

Anglo-American law has historically prohibited fornication, and through the 1960s fornication remained illegal in all but ten states. Few questioned the validity of laws proscribing various forms of private, adult, consensual sexual behavior until the early 1970s. Aside from legislative repeal, substantive due process has been the primary weapon in the fight against state sex laws. Although the U.S. Supreme Court's substantive due process jurisprudence, particularly in the area of personal privacy, has brought the constitutionality of fornication statutes into question, it has not definitively resolved the matter. This Comment argues that laws prohibiting fornication do not violate substantive due …