Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Selected Works (9)
- Schulich School of Law, Dalhousie University (5)
- Boston University School of Law (4)
- Roger Williams University (4)
- Vanderbilt University Law School (4)
-
- Washington and Lee University School of Law (3)
- Barry University School of Law (2)
- Brooklyn Law School (2)
- Notre Dame Law School (2)
- Seattle University School of Law (2)
- University of Colorado Law School (2)
- University of Miami Law School (2)
- Aga Khan University (1)
- American University Washington College of Law (1)
- Chicago-Kent College of Law (1)
- Loyola Marymount University and Loyola Law School (1)
- Northwestern Pritzker School of Law (1)
- Pepperdine University (1)
- St. Mary's University (1)
- University of Baltimore Law (1)
- University of Cincinnati College of Law (1)
- University of Georgia School of Law (1)
- University of Kentucky (1)
- University of Massachusetts School of Law (1)
- University of Michigan Law School (1)
- University of New Hampshire (1)
- University of Pennsylvania Carey Law School (1)
- University of Pittsburgh School of Law (1)
- William & Mary Law School (1)
- Publication
-
- Faculty Scholarship (6)
- Stephen E Henderson (6)
- Articles, Book Chapters, & Popular Press (4)
- Vanderbilt Journal of Entertainment & Technology Law (4)
- Washington and Lee Law Review Online (3)
-
- Life of the Law School (1993- ) (2)
- Notre Dame Law Review (2)
- Publications (2)
- Seattle University Law Review (2)
- University of Miami Law Review (2)
- All Faculty Scholarship (1)
- Articles (1)
- Articles in Law Reviews & Other Academic Journals (1)
- Brooklyn Journal of Corporate, Financial & Commercial Law (1)
- Brooklyn Journal of International Law (1)
- Canadian Journal of Law and Technology (1)
- Chicago-Kent Law Review (1)
- Daniel Harris Brean (1)
- Faculty Articles and Other Publications (1)
- Faculty Publications (1)
- Georgia Journal of International & Comparative Law (1)
- Law Faculty Scholarly Articles (1)
- Law Faculty Scholarship (1)
- Law School Blogs (1)
- Loyola of Los Angeles Law Review (1)
- Northwestern University Law Review (1)
- Pepperdine Law Review (1)
- Robert Sprague (1)
- School of Law Conferences, Lectures & Events (1)
- School of Nursing & Midwifery (1)
- Publication Type
Articles 1 - 30 of 58
Full-Text Articles in Law
Knowledge And Fourth Amendment Privacy, Matthew Tokson
Knowledge And Fourth Amendment Privacy, Matthew Tokson
Northwestern University Law Review
This Article examines the central role that knowledge plays in determining the Fourth Amendment’s scope. What people know about surveillance practices or new technologies often shapes the “reasonable expectations of privacy” that define the Fourth Amendment’s boundaries. From early decisions dealing with automobile searches to recent cases involving advanced information technologies, courts have relied on assessments of knowledge in a wide variety of Fourth Amendment contexts. Yet the analysis of knowledge in Fourth Amendment law is rarely if ever studied on its own.
This Article fills that gap. It starts by identifying the characteristics of Fourth Amendment knowledge. It finds, …
The Privacy Policymaking Of State Attorneys General, Danielle K. Citron
The Privacy Policymaking Of State Attorneys General, Danielle K. Citron
Faculty Scholarship
Accounts of privacy law have focused on legislation, federal agencies, and the self-regulation of privacy professionals. Crucial agents of regulatory change, however, have been ignored: the state attorneys general. This article is the first in-depth study of the privacy norm entrepreneurship of state attorneys general. Because so little has been written about this phenomenon, I engaged with primary sources — first interviewing state attorneys general and current and former career staff, and then examining documentary evidence received through FOIA requests submitted to AG offices around the country.
Much as Justice Louis Brandeis imagined states as laboratories of the law, offices …
Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen
Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen
All Faculty Scholarship
Big Data is the vast quantities of information amenable to large-scale collection, storage, and analysis. Using such data, companies and researchers can deploy complex algorithms and artificial intelligence technologies to reveal otherwise unascertained patterns, links, behaviors, trends, identities, and practical knowledge. The information that comprises Big Data arises from government and business practices, consumer transactions, and the digital applications sometimes referred to as the “Internet of Things.” Individuals invisibly contribute to Big Data whenever they live digital lifestyles or otherwise participate in the digital economy, such as when they shop with a credit card, get treated at a hospital, apply …
Police Body-Worn Camera Policy: Balancing The Tension Between Privacy And Public Access In State Law, Kyle J. Maury
Police Body-Worn Camera Policy: Balancing The Tension Between Privacy And Public Access In State Law, Kyle J. Maury
Notre Dame Law Review
Body camera implementation remains in its infancy stage. As such,
there is a dearth of legal scholarship analyzing the policy considerations associated
with body cameras. Instead of raising the issues involved and assessing
arguments for and against implementation, this Note assumes body cameras
are a force for good and are here to stay for the long haul. Consequently, the
goal of this Note is to analyze various issues involved in administering body
cameras against a backdrop of recently enacted state legislation—focusing
specifically on the tension between protecting privacy interests while also
ensuring public access to recordings. This Note examines these …
Recording A New Frontier In Evidence-Gathering: Police Body-Worn Cameras And Privacy Doctrines In Washington State, Katie Farden
Recording A New Frontier In Evidence-Gathering: Police Body-Worn Cameras And Privacy Doctrines In Washington State, Katie Farden
Seattle University Law Review
This Note contributes to a growing body of work that weighs the gains that communities stand to make from police body-worn cameras against the tangle of concerns about how cameras may infringe on individual liberties and tread on existing privacy laws. While police departments have quickly implemented cameras over the past few years, laws governing the use of the footage body-worn cameras capture still trail behind. Notably, admissibility rules for footage from an officer’s camera, and evidence obtained with the help of that footage, remain on the horizon. This Note focuses exclusively on Washington State’s laws. It takes a clinical …
Testimony On Unmanned Aircraft Systems Rules And Regulations, Stephen E. Henderson
Testimony On Unmanned Aircraft Systems Rules And Regulations, Stephen E. Henderson
Stephen E Henderson
Balancing A Right To Be Forgotten With A Right To Freedom Of Expression In The Wake Of Google Spain V. Aepd, Shaniqua Singleton
Balancing A Right To Be Forgotten With A Right To Freedom Of Expression In The Wake Of Google Spain V. Aepd, Shaniqua Singleton
Georgia Journal of International & Comparative Law
No abstract provided.
Trending @ Rwu Law: Linn F. Freedman's Post: The Goal Of Gender Equality In Cybersecurity 08/23/2016, Linn F. Freedman
Trending @ Rwu Law: Linn F. Freedman's Post: The Goal Of Gender Equality In Cybersecurity 08/23/2016, Linn F. Freedman
Law School Blogs
No abstract provided.
That ‘70s Show: Why The 11th Circuit Was Wrong To Rely On Cases From The 1970s To Decide A Cell-Phone Tracking Case, David Oscar Markus, Nathan Freed Wessler
That ‘70s Show: Why The 11th Circuit Was Wrong To Rely On Cases From The 1970s To Decide A Cell-Phone Tracking Case, David Oscar Markus, Nathan Freed Wessler
University of Miami Law Review
In light of society's increasing reliance on technology, this article explores a critical question – that of the Fourth Amendment’s protection over privacy in the digital age. Specifically, this article addresses how the law currently fails to protect the privacy of one’s cell phone records and its ramifications. By highlighting the antiquated precedent leading up to the Eleventh Circuit’s ruling in United States v. Davis, this article calls on the judiciary to find a more appropriate balance for protecting the right to privacy in a modern society.
Cellphones, Stingrays, And Searches! An Inquiry Into The Legality Of Cellular Location Information, Jeremy H. D'Amico
Cellphones, Stingrays, And Searches! An Inquiry Into The Legality Of Cellular Location Information, Jeremy H. D'Amico
University of Miami Law Review
Can the Fourth Amendment protect an individual’s right privacy by preventing the disclosure of her location through cell site location information? Does it currently? Should it? Many court opinions answer these questions in both the affirmative and the negative. The rationale underlying each conclusion is disparate. Some rely on statutory regimes, others rely on the United States Supreme Court’s interpretation of reasonableness. However, Cell Site Location Information is a technology that requires uniformity in its interpretation. This note investigates the different interpretations of the Fourth Amendment as it relates to Cell Site Location Information. It explains the technology behind Cell …
Important Steps To Maintain The Privacy Of Patients In The Hospital, Savera Aziz Ali, Minaz Mawani, Gulshan Bano, Sumera Aziz Ali
Important Steps To Maintain The Privacy Of Patients In The Hospital, Savera Aziz Ali, Minaz Mawani, Gulshan Bano, Sumera Aziz Ali
School of Nursing & Midwifery
Women are considered as vulnerable groups in our society in spite of their defined women rights by various laws. This shows that unfortunately these laws are not implemented practically in the real life. Society is shaped by the individuals and everyone should be responsible for advocating their own rights as well as the right of others especially of the vulnerable groups within the population.
Wearable Fitness Devices: Personal Health Data Privacy In Washington State, Steven Spann
Wearable Fitness Devices: Personal Health Data Privacy In Washington State, Steven Spann
Seattle University Law Review
Private entities are increasingly targeting individuals in the United States and around the world to gather personal data for such purposes as product development, market identification, and insurance risk assessment. While credit card records and online browsing histories have long been the medium through which this data is gathered, in more recent years, wearable fitness devices have added a new dimension to data production and collection. These devices are capable of gathering a significant amount of data regarding a person’s physical and physiological characteristics, thereby exposing these data producers to personal privacy infringement. Washington State lawmakers and citizens must be …
Review Essay: Sara M. Smyth, Cybercrime In Canadian Criminal Law, 2nd Edition (Toronton: Carswell, 2015), Christopher D. Ram
Review Essay: Sara M. Smyth, Cybercrime In Canadian Criminal Law, 2nd Edition (Toronton: Carswell, 2015), Christopher D. Ram
Canadian Journal of Law and Technology
Dr. Smyth’s book is ambitious in its scope, seeking to trace the criminology and evolution of information technologies and cybercrime as the basis of current Canadian legislation and jurisprudence. It is intended as a concise student reference text or resource for those who are new to the subject area, studying in criminology and other areas, as opposed to law. A list of concepts and issues for discussion appears at the conclusion of each chapter and there is a glossary of technical (but not legal) terms at the end of the book. It takes a neutral and professorial approach, seeking to …
Clapper Dethroned: Imminent Injury And Standing For Data Breach Lawsuits In Light Of Ashley Madison, Arthur R. Vorbrodt
Clapper Dethroned: Imminent Injury And Standing For Data Breach Lawsuits In Light Of Ashley Madison, Arthur R. Vorbrodt
Washington and Lee Law Review Online
No abstract provided.
If You Fly A Drone, So Can Police, Stephen E. Henderson
If You Fly A Drone, So Can Police, Stephen E. Henderson
Stephen E Henderson
Video-Streaming Records And The Video Privacy Protection Act: Broadening The Scope Of Personally Identifiable Information To Include Unique Device Identifiers Disclosed With Video Titles, Gregory M. Huffman
Chicago-Kent Law Review
The Video Privacy Protection Act (“VPPA”) prohibits video tape service providers from disclosing their consumers’ video rental or sale records. Although the VPPA was originally enacted to regulate disclosures by brick-and-mortar video rental stores, litigators have more recently used the VPPA as a vehicle to regulate disclosures by online video content providers.
The application of the VPPA to video streaming via web browsers and mobile devices raises new questions of statutory interpretation. One key question is whether the scope of the VPPA is broad enough to cover a disclosure of a unique device identifier of a user’s device, rather than …
The Positive Law Model Of The Fourth Amendment, William Baude, James Y. Stern
The Positive Law Model Of The Fourth Amendment, William Baude, James Y. Stern
Faculty Publications
For fifty years, courts have used a “reasonable expectation of privacy” standard to define “searches” under the Fourth Amendment. As others have recognized, that doctrine is subjective, unpredictable, and conceptually confused, but viable alternatives have been slow to emerge. This Article supplies one.
We argue that Fourth Amendment protection should be anchored in background positive law. The touchstone of the search-and-seizure analysis should be whether government officials have done something forbidden to private parties. It is those actions that should be subjected to Fourth Amendment reasonableness review and the presumptive requirement to obtain a warrant. In short, Fourth Amendment protection …
13th Annual Diversity Symposium Dinner 04-07-2016, Roger Williams University School Of Law
13th Annual Diversity Symposium Dinner 04-07-2016, Roger Williams University School Of Law
School of Law Conferences, Lectures & Events
No abstract provided.
Unilateral Invasions Of Privacy, Roger Allan Ford
Unilateral Invasions Of Privacy, Roger Allan Ford
Notre Dame Law Review
Most people seem to agree that individuals have too little privacy, and most proposals to address that problem focus on ways to give those users more information about, and more control over, how information about them is used. Yet in nearly all cases, information subjects are not the parties who make decisions about how information is collected, used, and disseminated; instead, outsiders make unilateral decisions to collect, use, and disseminate information about others. These potential privacy invaders, acting without input from information subjects, are the parties to whom proposals to protect privacy must be directed. This Article develops a theory …
Unilateral Invasions Of Privacy, Roger Allan Ford
Unilateral Invasions Of Privacy, Roger Allan Ford
Law Faculty Scholarship
Most people seem to agree that individuals have too little privacy, and most proposals to address that problem focus on ways to give those users more information about, and more control over, how information about them is used. Yet in nearly all cases, information subjects are not the parties who make decisions about how information is collected, used, and disseminated; instead, outsiders make unilateral decisions to collect, use, and disseminate information about others. These potential privacy invaders, acting without input from information subjects, are the parties to whom proposals to protect privacy must be directed. This Article develops a theory …
Against Data Exceptionalism, Andrew Keane Woods
Against Data Exceptionalism, Andrew Keane Woods
Law Faculty Scholarly Articles
One of the great regulatory challenges of the Internet era—indeed, one of today's most pressing privacy questions—is how to define the limits of government access to personal data stored in the cloud. This is particularly true today because the cloud has gone global, raising a number of questions about the proper reach of one state's authority over cloud-based data. The prevailing response to these questions by scholars, practitioners, and major Internet companies like Google and Facebook has been to argue that data is different. Data is “unterritorial,” they argue, and therefore incompatible with existing territorial notions of jurisdiction. This Article …
Big Data Sustainability: An Environmental Management Systems Analogy, Dennis D. Hirsch, Jonathan H. King
Big Data Sustainability: An Environmental Management Systems Analogy, Dennis D. Hirsch, Jonathan H. King
Washington and Lee Law Review Online
Today, organizations globally wrestle with how to extract valuable insights from diverse data sets without invading privacy, causing discrimination, harming their brand, or otherwise undermining the sustainability of their big data projects. Leaders in these organizations are thus asking: What management approach should businesses employ sustainably to achieve the tremendous benefits of big data analytics, while minimizing the potential negative externalities?
This Paper argues that leaders can learn from environmental management practices developed to manage the negative externalities of the industrial revolution. First, it shows that, along with its many benefits, big data can create negative externalities that are structurally …
Elements Of A New Ethical Framework For Big Data Research, Effy Vayena, Urs Gasser, Alexandra Wood, David R. O'Brien, Micah Altman
Elements Of A New Ethical Framework For Big Data Research, Effy Vayena, Urs Gasser, Alexandra Wood, David R. O'Brien, Micah Altman
Washington and Lee Law Review Online
Emerging large-scale data sources hold tremendous potential for new scientific research into human biology, behaviors, and relationships. At the same time, big data research presents privacy and ethical challenges that the current regulatory framework is ill-suited to address. In light of the immense value of large-scale research data, the central question moving forward is not whether such data should be made available for research, but rather how the benefits can be captured in a way that respects fundamental principles of ethics and privacy.
In response, this Essay outlines elements of a new ethical framework for big data research. It argues …
Ou Professor: Fourth Amendment At Heart Of Dispute Between Fbi, Apple, Stephen E. Henderson
Ou Professor: Fourth Amendment At Heart Of Dispute Between Fbi, Apple, Stephen E. Henderson
Stephen E Henderson
Good Cause Is Bad News: How The Good Cause Standard For Record Access Impacts Adult Adoptees Seeking Personal Information And A Proposal For Reform, Christopher G.A. Loriot
Good Cause Is Bad News: How The Good Cause Standard For Record Access Impacts Adult Adoptees Seeking Personal Information And A Proposal For Reform, Christopher G.A. Loriot
University of Massachusetts Law Review
There are many hurdles that adult adoptees face when seeking access to personal information contained in original birth records or adoption proceedings. One such hurdle is the widely-used good cause standard, which requires adoptees seeking information to show good cause to obtain access. This standard is problematic primarily for its vagueness. Very few jurisdictions that use this standard define “good cause” in any meaningful way, and case law interpreting good cause statutory language is inconsistent at best. Although it is meant to protect the privacy interests of all parties in an adoption proceeding, the good cause standard acts as a …
Newsroom: Margulies On Apple V. Fbi Standoff 02-18-2016, Roger Williams University School Of Law
Newsroom: Margulies On Apple V. Fbi Standoff 02-18-2016, Roger Williams University School Of Law
Life of the Law School (1993- )
No abstract provided.
Newsroom: Freedman On Credit Reports 02-12-2016, Roger Williams University School Of Law
Newsroom: Freedman On Credit Reports 02-12-2016, Roger Williams University School Of Law
Life of the Law School (1993- )
No abstract provided.
Litigating In The 21st Century: Amending Challenges For Cause In Light Of Big Data, Andrew Kasabian
Litigating In The 21st Century: Amending Challenges For Cause In Light Of Big Data, Andrew Kasabian
Pepperdine Law Review
The amount of data generated daily is growing exponentially. The majority of this data is unstructured data. Big Data analytics provides the capability to analyze sets of unrelated data to find hidden and meaningful correlations and predict an individual’s future actions. Therefore, Big Data can alter trial preparation by opening up new sets of information for lawyers to analyze in the jury selection process. Privacy concerns may follow Big Data’s incorporation because Big Data aggregates an individual’s information and predicts future actions. This Comment details how Big Data will provide a net benefit to trial preparation. In order to protect …
Protecting Personal Information: Achieving A Balance Between User Privacy And Behavioral Targeting, Patrick Myers
Protecting Personal Information: Achieving A Balance Between User Privacy And Behavioral Targeting, Patrick Myers
University of Michigan Journal of Law Reform
Websites and mobile applications provide immeasurable benefits to both users and companies. These services often collect vast amounts of personal information from the individuals that use them, including sensitive details such as Social Security numbers, credit card information, and physical location. Personal data collection and dissemination leave users vulnerable to various threats that arise from the invasion of their privacy, particularly because users are often ignorant of the existence or extent of these practices. Current privacy law does not provide users with adequate protection from the risks attendant to the collection and dissemination of their personal information. This Note advocates …
Never Alone: Why The Inevitable Influx Of Drones Necessitates A New Fourth Amendment Standard That Adequately Protects Reasonable Expectations Of Privacy, Paul Burgin
University of Baltimore Law Review
In June 2011, North Dakota cattle rancher Rodney Brossart became the first American to be arrested with the aid of a drone (Unmanned Aircraft System(s) or UAS) operated by law enforcement. Six cows found their way onto Brossart's property, and he refused to turn them over to law enforcement officials. Brossart and a few family members chased police officers off of his property at gunpoint, and police later returned with a warrant and SWAT team. A sixteen-hour standoff ensued until police called in the assistance of a UAS to pinpoint Brossart's exact location. Shortly thereafter, SWAT officers rushed in, tased, …