Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Privacy Law

Journal

2019

Institution
Keyword
Publication

Articles 1 - 30 of 136

Full-Text Articles in Law

The Clone Wars: The Right To Embryonic Gene Editing Under German Law, Keren Goldberger Dec 2019

The Clone Wars: The Right To Embryonic Gene Editing Under German Law, Keren Goldberger

Brooklyn Journal of International Law

Germany has the strictest genetic engineering laws in the world and bans virtually all kinds of embryonic gene editing. Since the invention of CRISPR, however, embryonic gene editing is more precise, and the possibilities of curing genetic diseases are more real than ever. This Note will argue for the right to embryonic gene editing through an analysis of German constitutional privacy and right to life jurisprudence. Ultimately, this Note argues for a right to procreate under German law that is backed by the state’s affirmative duty to encourage and protect life. When the technology is available, German Law should not …


“Hey Alexa, Do Consumers Really Want More Data Privacy?”: An Analysis Of The Negative Effects Of The General Data Protection Regulation, Katherine M. Wilcox Dec 2019

“Hey Alexa, Do Consumers Really Want More Data Privacy?”: An Analysis Of The Negative Effects Of The General Data Protection Regulation, Katherine M. Wilcox

Brooklyn Law Review

Recent news articles discuss the flooding of email inboxes with lengthy terms and condition updates, viral videos of Mark Zuckerberg’s public Cambridge Analytica hearing before Congress, and the phenomenon of internet advertisements appearing for items that consumers merely searched for on Google a day prior. Effective as of May 25, 2018, the European Union’s General Data Protection Regulation (GDPR) established a framework that sets legal standards targeted at businesses and other data collectors to dramatically increase data privacy protections for citizens of the EU. Consumers, however, do not seem to appreciate these increased protections, as they rarely read the updated …


Smart Factories, Dumb Policy? Managing Cybersecurity And Data Privacy Risks In The Industrial Internet Of Things, Scott J. Shackelford Dec 2019

Smart Factories, Dumb Policy? Managing Cybersecurity And Data Privacy Risks In The Industrial Internet Of Things, Scott J. Shackelford

Minnesota Journal of Law, Science & Technology

No abstract provided.


Censorship, Free Speech & Facebook: Applying The First Amendment To Social Media Platforms Via The Public Function Exception, Matthew P. Hooker Dec 2019

Censorship, Free Speech & Facebook: Applying The First Amendment To Social Media Platforms Via The Public Function Exception, Matthew P. Hooker

Washington Journal of Law, Technology & Arts

Society has a love-hate relationship with social media. Thanks to social media platforms, the world is more connected than ever before. But with the ever-growing dominance of social media there have come a mass of challenges. What is okay to post? What isn't? And who or what should be regulating those standards? Platforms are now constantly criticized for their content regulation policies, sometimes because they are viewed as too harsh and other times because they are characterized as too lax. And naturally, the First Amendment quickly enters the conversation. Should social media platforms be subject to the First Amendment? Can—or …


Actual Harm Means It Is Too Late: How Rosenbach V. Six Flags Demonstrates Effective Biometric Information Privacy Law, Chloe Stepney Dec 2019

Actual Harm Means It Is Too Late: How Rosenbach V. Six Flags Demonstrates Effective Biometric Information Privacy Law, Chloe Stepney

Loyola of Los Angeles Entertainment Law Review

Technology is rapidly advancing, and the law is trying to keep up. While this challenge is not new, technological advancements are impacting privacy rights in unprecedented ways. Using a fingerprint to clock in at work or face identification to unlock a smartphone provides ease and convenience, but at what cost?

Currently, there is no federal law that regulates the collection, use, and storage of biometric information in the private sector. On a local level, three states have enacted laws that specifically address biometrics. Of those, the Biometric Information Privacy Act (BIPA) in Illinois provides the strongest protections for consumers, who …


Going Rogue: Mobile Research Applications And The Right To Privacy, Stacey A. Tovino Dec 2019

Going Rogue: Mobile Research Applications And The Right To Privacy, Stacey A. Tovino

Notre Dame Law Review

This Article investigates whether nonsectoral state laws may serve as a viable source of privacy and security standards for mobile health research participants and other health data subjects until new federal laws are created or enforced. In particular, this Article (1) catalogues and analyzes the nonsectoral data privacy, security, and breach notification statutes of all fifty states and the District of Columbia; (2) applies these statutes to mobile-app-mediated health research conducted by independent scientists, citizen scientists, and patient researchers; and (3) proposes substantive amendments to state law that could help protect the privacy and security of all health data subjects, …


Increasing Lapses In Data Security: The Need For A Common Answer To What Constitutes Standing In A Data Breach Context, Aaron Benjamin Edelman Dec 2019

Increasing Lapses In Data Security: The Need For A Common Answer To What Constitutes Standing In A Data Breach Context, Aaron Benjamin Edelman

Journal of Law and Policy

As the number of data breaches continues to rise in the United States, so does the amount of data breach litigation. Many potential plaintiffs who suffered as victims of data breaches, however, find themselves in limbo regarding the issue of standing before a court because of a significant split on standing determinations amongst the federal circuit courts. Thus, while victims of data breaches oftentimes have their personal information fall into the hands of nefarious characters who intend to use the information to a victim’s detriment, that may not be enough to provide victims a right to sue in federal court …


Protecting Health Information In Utero: A Radical Proposal, Luke Isaac Haqq Dec 2019

Protecting Health Information In Utero: A Radical Proposal, Luke Isaac Haqq

Journal of Law and Policy

This Article introduces an underappreciated space in which protected health information (“PHI”) remains largely unprotected, a fact that will become only more problematic as clinical medicine increasingly turns to genomics. The past decade has seen significant advances in the prevention of birth defects, especially with the introduction of clinical preconception, prenatal, and neonatal genomic sequencing. Parental access to the results of embryonic and fetal clinical sequencing is critical to reproductive autonomy; results can provide parents with important considerations in determining whether to seek or avoid conception, as well as in deciding whether to carry a pregnancy to term. The information …


The Long Road Back To Skokie: Returning The First Amendment To Mask Wearers, Rob Kahn Dec 2019

The Long Road Back To Skokie: Returning The First Amendment To Mask Wearers, Rob Kahn

Journal of Law and Policy

When the Seventh Circuit upheld the First Amendment right of Nazis to march in Skokie, Illinois in 1978, the protection of mask wearers was not far behind. Since then, doctrinal paths have diverged. While the Supreme Court continues to protect hate speech, mask wearing has been increasingly placed outside First Amendment protection. This article seeks to get to the bottom of this doctrinal divergence by addressing the symbolic purposes of mask bans—rooted in repudiating the Ku Klux Klan—as well as the doctrinal steps taken over the past forty years to restrict the First Amendment claims of mask wearers. It also …


Ai Goes To School—Implications For School District Liability, Harold J. Krent, John Etchingham, Alec Kraus, Katharine Pancewicz Dec 2019

Ai Goes To School—Implications For School District Liability, Harold J. Krent, John Etchingham, Alec Kraus, Katharine Pancewicz

Buffalo Law Review

No abstract provided.


Developing A Privacy Code Of Practice For Connected And Automated Vehicles, Rajen Akula Dec 2019

Developing A Privacy Code Of Practice For Connected And Automated Vehicles, Rajen Akula

Canadian Journal of Law and Technology

Connected and autonomous vehicles (‘‘CAVs”) can collect, store, process and transmit vast amounts of data. Understanding the use (and potential misuse) of this data, particularly when that data is about an identifiable individual within the meaning of data protection law, is regarded critical to the success of this new mode of transportation. However, what constitutes personal information in relation to coneccted and automated vehicle data on a case-by-case basic. This presents a policy challenge for the government and creates uncertainty for businesses wishing to make use of this data.


Ethical Hacking By Alana Maurushat, Laura Ellyson Dec 2019

Ethical Hacking By Alana Maurushat, Laura Ellyson

Canadian Journal of Law and Technology

Book Review of Ethical Hacking by Alana Maurushat (Ottawa: University of Ottawa Press, 2019).


Privacy Law Issues In Public Blockchains: An Analysis Of Blockchain, Pipeda, The Gdpr, And Proposals For Compliance, Noah Walters Dec 2019

Privacy Law Issues In Public Blockchains: An Analysis Of Blockchain, Pipeda, The Gdpr, And Proposals For Compliance, Noah Walters

Canadian Journal of Law and Technology

Proponents of blockchain proclaim that the technology’s greatest innovation is trust. Blockchain create trust by serving as an indispensable ledger (a central point of truth), for all stakeholders to a transaction. Instead of companies managing and reconciling records of the same transaction in privately held databases, both sides of a transaction are recorded simultaneously on a shared ledger — the blockchain. As a result, the crypto economic environment is characterized by the decentralized coordination of business processes and transactions. Proponents of crypto-economics regard decentralized coordination as an opportunity for new forms of economic innovation, forms designed to increase value for …


Between You, Me, And Alexa: On The Legality Of Virtual Assistant Devices In Two-Party Consent States, Ria Kuruvilla Dec 2019

Between You, Me, And Alexa: On The Legality Of Virtual Assistant Devices In Two-Party Consent States, Ria Kuruvilla

Washington Law Review

When an Amazon Echo is activated, the device is constantly recording and sending those recordings to Amazon’s cloud. For an always recording device such as the Echo, getting consent from every person subject to a recording proves difficult. An Echo-owner consents to the recordings when they purchase and register the device, but when does a guest in an Echo-owner’s home consent to being recorded? This Comment uses Amazon’s Echo and Washington’s privacy statute to illustrate the tension between speech-activated devices and two-party consent laws—which require that all parties subject to a recording consent to being recorded. This Comment argues that …


Hb 481 - Heartbeat Bill, Michael G. Foo, Taylor L. Lin Dec 2019

Hb 481 - Heartbeat Bill, Michael G. Foo, Taylor L. Lin

Georgia State University Law Review

The Act adds an unborn child with a detectable human heartbeat to the definition of a natural person and includes such unborn child in state population counts. The Act defines abortion, prescribes when abortions may be performed, provides exceptions to abortion performance limitations, establishes requirements for performing an abortion, and provides for a right of action, damages, and affirmative defenses. The Act permits alimony and child support payments starting when an unborn child has a detectable human heartbeat. Parents have the right to recover the full value of a child’s life when a detectable human heartbeat exists. The Act requires …


Privacy As Pretext, Susan Hazeldean Nov 2019

Privacy As Pretext, Susan Hazeldean

Cornell Law Review

The terms of the debate over LGBT rights have shifted in recent years, particularly since the Supreme Court made marriage equality the law of the land in Obergefell v. Hodges. Today, people against LGBT equality argue that curtailing LGBT rights is necessary to protect the rights of others. One potent rhetorical weapon used to oppose LGBT rights is the claim that antidiscrimination protections for LGBT people undermine privacy because they permit transgender people to use facilities that accord with their gender identity. This Article uses legal privacy theory to show that allowing transgender people into gendered facilities does not undermine …


Smile, You’Re On Camera: A Discussion Of The Privacy Rights Of Teachers In The Modern Day Classroom, Dakota Brewer Nov 2019

Smile, You’Re On Camera: A Discussion Of The Privacy Rights Of Teachers In The Modern Day Classroom, Dakota Brewer

Brigham Young University Education and Law Journal

No abstract provided.


The Skeleton In The Hard Drive: Encryption And The Fifth Amendment, David W. Opderbeck Oct 2019

The Skeleton In The Hard Drive: Encryption And The Fifth Amendment, David W. Opderbeck

Florida Law Review

In Teva Pharmaceuticals USA, Inc. v. Sandoz, Inc., the Supreme Court addressed an oft-discussed jurisprudential disconnect between itself and the U.S. Court of Appeals for the Federal Circuit: whether patent claim construction was “legal” or “factual” in nature, and how much deference is due to district court decision-making in this area. This Article closely examines the Teva opinion and situates it within modern claim construction jurisprudence. The thesis is that the Teva holding is likely to have only very modest effects on the incidence of deference to district court claim construction, but that for unexpected reasons the case is far …


It's Nothing Personal: Why Existing State Laws On Point-Of-Sale Consumer Data Collection Should Be Replaced With A Federal Standard, Kate Mirino Oct 2019

It's Nothing Personal: Why Existing State Laws On Point-Of-Sale Consumer Data Collection Should Be Replaced With A Federal Standard, Kate Mirino

St. John's Law Review

(Excerpt)

Accordingly, this Note proposes a contemporary-minded federal solution to preempt and standardize the various, outmoded state approaches in this field. Part I engages in a historical overview of the development of information privacy law in the United States. Part II provides a summary and comparison of the existing state rules at play. Part III discusses the negative consequences—both to consumers and to businesses—of inconsistent regulation in this area, and explains why a federal solution is necessary. Part IV outlines the parameters of the federal regulation proposed by this Note.


Boilerplate Indignity, Erik Encarnacion Oct 2019

Boilerplate Indignity, Erik Encarnacion

Indiana Law Journal

Commentators have long tried to sound the alarm about boilerplate contracts, pointing out threats ranging from the loss of privacy rights to the erosion of public law and democratic self-governance. This Article argues that this list of concerns misses something important: that imposing certain boilerplate terms on individuals is incompatible with their dignity. After explaining and defending the conception of dignity presupposed here, this Article shows how boilerplate accountability waivers—like arbitration clauses—prevent people from accessing the distinctive dignity-vindicating role of courts and degrade their status as legal persons. And because governments may legitimately protect dignity interests, proposed reforms like the …


The Federalism Challenges Of Protecting Medical Privacy In Workers' Compensation, Ani B. Satz Oct 2019

The Federalism Challenges Of Protecting Medical Privacy In Workers' Compensation, Ani B. Satz

Indiana Law Journal

Under current law, injured workers face a Hobson’s choice: They may file for workers’ compensation or maintain their medical privacy. The reason for this is that § 164.512(l) of the Health Insurance Portability and Accountability Act’s Privacy Rule (HPR) is widely misinterpreted by courts and legislatures as a wholesale waiver of privacy protections for injured workers. Section 164.512(l) excludes workers’ compensation from federal privacy protections that may frustrate the efficient administration of workers’ compensation claims. As the history and intent behind the HPR indicate, § 164.512(l) is premised on the assumption that states will protect workers’ privacy by creating and …


The Missing Regulatory State: Monitoring Businesses In An Age Of Surveillance, Rory V. Loo Oct 2019

The Missing Regulatory State: Monitoring Businesses In An Age Of Surveillance, Rory V. Loo

Vanderbilt Law Review

An irony of the information age is that the companies responsible for the most extensive surveillance of individuals in history-large platforms such as Amazon, Facebook, and Google-have themselves remained unusually shielded from being monitored by government regulators. But the legal literature on state information acquisition is dominated by the privacy problems of excess collection from individuals, not businesses. There has been little sustained attention to the problem of insufficient information collection from businesses. This Article articulates the administrative state's normative framework for monitoring businesses and shows how that framework is increasingly in tension with privacy concerns. One emerging complication is …


Standing To Challenge Familial Searches Of Commercial Dna Databases, Hillary L. Kody Oct 2019

Standing To Challenge Familial Searches Of Commercial Dna Databases, Hillary L. Kody

William & Mary Law Review

In April 2018, police officers arrested Joseph James DeAngelo. DeAngelo, the officers claimed, was the “Golden State Killer,” a man who committed dozens of murders and over fifty sexual assaults in California in the 1970s and 1980s. The Golden State Killer had long eluded police, even though his DNA profile linked him to dozens of violent crimes. While law enforcement officials from several jurisdictions in California had collected his DNA from crime scenes, the Golden State Killer’s crimes predated modern DNA analysis. Police found little use for the profile without a suspect’s profile to compare to it.

Nearly forty years …


Table Of Contents, Seattle University Law Review Sep 2019

Table Of Contents, Seattle University Law Review

Seattle University Law Review

No abstract provided.


Striking The Balance: Search Warrants And Encryption Protected Smartphones, Nicholas A. Oliva Sep 2019

Striking The Balance: Search Warrants And Encryption Protected Smartphones, Nicholas A. Oliva

Journal of Civil Rights and Economic Development

(Excerpt)

This note’s analysis of searches of encrypted cell phone will be broken down into in three parts. Part I of this note provides context for the balance between individual privacy and law enforcement by reviewing general Fourth Amendment principles and then Supreme Court rulings that apply these principles to cell phones. Part II then details the advancements in cell phone technology, specifically encryption. These new technologies render the data on cell phones inaccessible and lead law enforcement to go beyond search warrants and seek special orders pursuant to the All Writs Act. Part II provides an overview of the …


Re-Imagining Resolution Of Online Defamation Disputes, Emily B. Laidlaw Sep 2019

Re-Imagining Resolution Of Online Defamation Disputes, Emily B. Laidlaw

Osgoode Hall Law Journal

If an individual or company is defamed online, they have two options to resolve the dispute, absent a technical solution. They can complain to an intermediary or launch a civil action. Both are deficient for a variety of reasons. Civil litigation is often unsuitable given the nature of online communications (across different platforms, jurisdictions, involving multiple parties, and spread with ease), the length and cost of litigation, and the ineffectiveness of traditional remedies. Intermediary dispute resolution processes can sometimes be effective, but lack industry standards and due process, place intermediaries in pseudo-judicial roles, and depend on the changeable commitments of …


Internet Intermediary Liability In Defamation, Emily B. Laidlaw, Hilary Young Sep 2019

Internet Intermediary Liability In Defamation, Emily B. Laidlaw, Hilary Young

Osgoode Hall Law Journal

Given the broad meaning of publication in defamation law, internet intermediaries such as internet service providers, search engines, and social media companies may be liable for defamatory content posted by third parties. This article argues that current law is not suitable to dealing with issues of internet defamation and intermediary responsibility because it is needlessly complex, confusing, and may impose liability without blameworthiness. Instead, the article proposes that publication be redefined to require a deliberate act of communicating specific words. This would better reflect blameworthiness and few intermediaries would be liable in defamation under this test. That said, intermediaries profit …


Restoring Accountability In Freedom Of Expression Theory: Public Libel Law And Radical Whig Ideology, Randall Stephenson Sep 2019

Restoring Accountability In Freedom Of Expression Theory: Public Libel Law And Radical Whig Ideology, Randall Stephenson

Osgoode Hall Law Journal

As leading common law jurisdictions grapple with the Internet’s impact on defamation law, comparative legal scholarship has revealed long-standing problems with its underlying theoretical justifications. Specifically, public libel doctrine is commonly supported by appeals to democratic theory in the abstract. Accountability concerns most relevant to adjudicating public libel cases are thus routinely overlooked. This article aims to diagnose the causes of these theoretical inaccuracies, describe their impact on public libel law, and translate their significance for law reform. Through exploring eighteenth-century libertarian thought, we highlight the foundational importance of accountability and the checking function rationale to democratic theory and governance. …


Defamation, Privacy And Aspects Of Reputation, Andrew T. Kenyon Sep 2019

Defamation, Privacy And Aspects Of Reputation, Andrew T. Kenyon

Osgoode Hall Law Journal

Unlike the commonplace statement that defamation law protects reputation, this article suggests that it only protects aspects of reputation. Previously, defamation was often the only avenue of legal protection for reputation worth examining, but now privacy actions also offer an avenue of protection for aspects of reputation in many jurisdictions. In other words, informational privacy law now protects aspects of reputation, as does defamation law. Recognizing this fact leads to the suggestion that exactly what each action—defamation and informational privacy—seeks to protect could be stated more concisely. This exercise, undertaken in this article, draws on classic defamation law analysis by …


“O! They Have Lived Long On The Alms-Basket Of Words”: Enhancing Efficacy And Reducing Cost By Limiting The Role Of Law And Lawyers In Defamation Disputes, Andrew Scott Sep 2019

“O! They Have Lived Long On The Alms-Basket Of Words”: Enhancing Efficacy And Reducing Cost By Limiting The Role Of Law And Lawyers In Defamation Disputes, Andrew Scott

Osgoode Hall Law Journal

To triangulate the individual and social interests in reputation and free speech, the common law has generated an unwieldy corpus of technical rules and counterfactual assumptions. This complexity entails enormous cost and opportunities for game-playing by astute, well-resourced litigants. Neither reputation nor free speech is well-served by reform initiatives that focus mainly on amending the substantive law. This paper offers a critical assessment of a proposal that might better address complexity and cost. This comprises the inextricable combination of two initiatives: repeal of the ‘single meaning rule’ which promises to simplify the court’s task, but instead generates complexity in defiance …