Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Law

Trending @ Rwu Law: Linn F. Freedman's Post: The Goal Of Gender Equality In Cybersecurity 08/23/2016, Linn F. Freedman Aug 2016

Trending @ Rwu Law: Linn F. Freedman's Post: The Goal Of Gender Equality In Cybersecurity 08/23/2016, Linn F. Freedman

Law School Blogs

No abstract provided.


Wearable Fitness Devices: Personal Health Data Privacy In Washington State, Steven Spann Jul 2016

Wearable Fitness Devices: Personal Health Data Privacy In Washington State, Steven Spann

Seattle University Law Review

Private entities are increasingly targeting individuals in the United States and around the world to gather personal data for such purposes as product development, market identification, and insurance risk assessment. While credit card records and online browsing histories have long been the medium through which this data is gathered, in more recent years, wearable fitness devices have added a new dimension to data production and collection. These devices are capable of gathering a significant amount of data regarding a person’s physical and physiological characteristics, thereby exposing these data producers to personal privacy infringement. Washington State lawmakers and citizens must be …


Against Data Exceptionalism, Andrew Keane Woods Apr 2016

Against Data Exceptionalism, Andrew Keane Woods

Law Faculty Scholarly Articles

One of the great regulatory challenges of the Internet era—indeed, one of today's most pressing privacy questions—is how to define the limits of government access to personal data stored in the cloud. This is particularly true today because the cloud has gone global, raising a number of questions about the proper reach of one state's authority over cloud-based data. The prevailing response to these questions by scholars, practitioners, and major Internet companies like Google and Facebook has been to argue that data is different. Data is “unterritorial,” they argue, and therefore incompatible with existing territorial notions of jurisdiction. This Article …


Riley V. California And The Beginning Of The End For The Third-Party Search Doctrine, David A. Harris Jan 2016

Riley V. California And The Beginning Of The End For The Third-Party Search Doctrine, David A. Harris

Articles

In Riley v. California, the Supreme Court decided that when police officers seize a smart phone, they may not search through its contents -- the data found by looking into the call records, calendars, pictures and so forth in the phone -- without a warrant. In the course of the decision, the Court said that the rule applied not just to data that was physically stored on the device, but also to data stored "in the cloud" -- in remote sites -- but accessed through the device. This piece of the decision may, at last, allow a re-examination of …


Where Copyright Meets Privacy In The Big Data Era: Access To And Control Over User Data In Agriculture And The Role Of Copyright, Tesh W. Dagne Jan 2016

Where Copyright Meets Privacy In The Big Data Era: Access To And Control Over User Data In Agriculture And The Role Of Copyright, Tesh W. Dagne

Vanderbilt Journal of Entertainment & Technology Law

The application of big data in different sectors of the economy and its transformative value has recently attracted considerable attention. However, this transformation, driven by the application of advanced technologies that utilize big data—such as the Internet of Things (IoT), artificial intelligence (AI), and software systems—raises concerns about access to and control over the user data that results from the uptake in using digital technologies. This Article examines the role different legal regimes have in framing access to and control over various forms of user data from the perspective of technology users in the agriculture sector. This Article then goes …


The Internet Of Heirlooms And Disposable Things, Woodrow Hartzog, Evan Selinger Jan 2016

The Internet Of Heirlooms And Disposable Things, Woodrow Hartzog, Evan Selinger

Faculty Scholarship

The Internet of Things (“IoT”) is here, and we seem to be going all in. We are trying to put a microchip in nearly every object that is not nailed down and even a few that are. Soon, your cars, toasters, toys, and even your underwear will be wired up to make your lives better. The general thought seems to be that “Internet connectivity makes good objects great.” While the IoT might be incredibly useful, we should proceed carefully. Objects are not necessarily better simply because they are connected to the Internet. Often, the Internet can make objects worse and …


Need For Informed Consent In The Age Of Ubiquitous Human Testing, Caitlyn Kuhs Jan 2016

Need For Informed Consent In The Age Of Ubiquitous Human Testing, Caitlyn Kuhs

Loyola of Los Angeles Law Review

No abstract provided.


Classification Standards For Health Information: Ethical And Practical Approaches, Craig Konnoth Jan 2016

Classification Standards For Health Information: Ethical And Practical Approaches, Craig Konnoth

Publications

Secondary health information research requires vast quantities of data in order to make clinical and health delivery breakthroughs. Restrictive policies that limit the use of such information threaten to stymie this research. While the Notice of Proposed Rulemaking (NPRM) for the new Common Rule permits patients to provide broad consent for the use of their information for research, that policy offers insufficient flexibility. This Article suggests a flexible consenting system that allows patients to consent to a range of privacy risks. The details of the system will be fleshed out in future work.