Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Privacy Law

2016

Privacy

Institution
Publication
Publication Type

Articles 1 - 30 of 58

Full-Text Articles in Law

Knowledge And Fourth Amendment Privacy, Matthew Tokson Dec 2016

Knowledge And Fourth Amendment Privacy, Matthew Tokson

Northwestern University Law Review

This Article examines the central role that knowledge plays in determining the Fourth Amendment’s scope. What people know about surveillance practices or new technologies often shapes the “reasonable expectations of privacy” that define the Fourth Amendment’s boundaries. From early decisions dealing with automobile searches to recent cases involving advanced information technologies, courts have relied on assessments of knowledge in a wide variety of Fourth Amendment contexts. Yet the analysis of knowledge in Fourth Amendment law is rarely if ever studied on its own.

This Article fills that gap. It starts by identifying the characteristics of Fourth Amendment knowledge. It finds, …


The Privacy Policymaking Of State Attorneys General, Danielle K. Citron Dec 2016

The Privacy Policymaking Of State Attorneys General, Danielle K. Citron

Faculty Scholarship

Accounts of privacy law have focused on legislation, federal agencies, and the self-regulation of privacy professionals. Crucial agents of regulatory change, however, have been ignored: the state attorneys general. This article is the first in-depth study of the privacy norm entrepreneurship of state attorneys general. Because so little has been written about this phenomenon, I engaged with primary sources — first interviewing state attorneys general and current and former career staff, and then examining documentary evidence received through FOIA requests submitted to AG offices around the country.

Much as Justice Louis Brandeis imagined states as laboratories of the law, offices …


Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen Dec 2016

Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen

All Faculty Scholarship

Big Data is the vast quantities of information amenable to large-scale collection, storage, and analysis. Using such data, companies and researchers can deploy complex algorithms and artificial intelligence technologies to reveal otherwise unascertained patterns, links, behaviors, trends, identities, and practical knowledge. The information that comprises Big Data arises from government and business practices, consumer transactions, and the digital applications sometimes referred to as the “Internet of Things.” Individuals invisibly contribute to Big Data whenever they live digital lifestyles or otherwise participate in the digital economy, such as when they shop with a credit card, get treated at a hospital, apply …


Police Body-Worn Camera Policy: Balancing The Tension Between Privacy And Public Access In State Law, Kyle J. Maury Nov 2016

Police Body-Worn Camera Policy: Balancing The Tension Between Privacy And Public Access In State Law, Kyle J. Maury

Notre Dame Law Review

Body camera implementation remains in its infancy stage. As such,

there is a dearth of legal scholarship analyzing the policy considerations associated

with body cameras. Instead of raising the issues involved and assessing

arguments for and against implementation, this Note assumes body cameras

are a force for good and are here to stay for the long haul. Consequently, the

goal of this Note is to analyze various issues involved in administering body

cameras against a backdrop of recently enacted state legislation—focusing

specifically on the tension between protecting privacy interests while also

ensuring public access to recordings. This Note examines these …


Recording A New Frontier In Evidence-Gathering: Police Body-Worn Cameras And Privacy Doctrines In Washington State, Katie Farden Oct 2016

Recording A New Frontier In Evidence-Gathering: Police Body-Worn Cameras And Privacy Doctrines In Washington State, Katie Farden

Seattle University Law Review

This Note contributes to a growing body of work that weighs the gains that communities stand to make from police body-worn cameras against the tangle of concerns about how cameras may infringe on individual liberties and tread on existing privacy laws. While police departments have quickly implemented cameras over the past few years, laws governing the use of the footage body-worn cameras capture still trail behind. Notably, admissibility rules for footage from an officer’s camera, and evidence obtained with the help of that footage, remain on the horizon. This Note focuses exclusively on Washington State’s laws. It takes a clinical …


Testimony On Unmanned Aircraft Systems Rules And Regulations, Stephen E. Henderson Sep 2016

Testimony On Unmanned Aircraft Systems Rules And Regulations, Stephen E. Henderson

Stephen E Henderson

Chairman Barrington, Vice Chair Brooks, members of the Committee on Public Safety, Senators, and distinguished guests, I am grateful for the opportunity to speak to you today about unmanned aerial systems, or drones, and more particularly about their federal constitutional implications and what might be the constitutional restrictions on any legislation you might like to enact. I am the Judge Haskell A. Holloman Professor of Law at the University of Oklahoma, where my teaching and research focus on criminal law and procedure and privacy, including the constitutional rights pertaining thereto.

My topic is not an easy one. The constitutional law …


Balancing A Right To Be Forgotten With A Right To Freedom Of Expression In The Wake Of Google Spain V. Aepd, Shaniqua Singleton Sep 2016

Balancing A Right To Be Forgotten With A Right To Freedom Of Expression In The Wake Of Google Spain V. Aepd, Shaniqua Singleton

Georgia Journal of International & Comparative Law

No abstract provided.


Trending @ Rwu Law: Linn F. Freedman's Post: The Goal Of Gender Equality In Cybersecurity 08/23/2016, Linn F. Freedman Aug 2016

Trending @ Rwu Law: Linn F. Freedman's Post: The Goal Of Gender Equality In Cybersecurity 08/23/2016, Linn F. Freedman

Law School Blogs

No abstract provided.


That ‘70s Show: Why The 11th Circuit Was Wrong To Rely On Cases From The 1970s To Decide A Cell-Phone Tracking Case, David Oscar Markus, Nathan Freed Wessler Aug 2016

That ‘70s Show: Why The 11th Circuit Was Wrong To Rely On Cases From The 1970s To Decide A Cell-Phone Tracking Case, David Oscar Markus, Nathan Freed Wessler

University of Miami Law Review

In light of society's increasing reliance on technology, this article explores a critical question – that of the Fourth Amendment’s protection over privacy in the digital age. Specifically, this article addresses how the law currently fails to protect the privacy of one’s cell phone records and its ramifications. By highlighting the antiquated precedent leading up to the Eleventh Circuit’s ruling in United States v. Davis, this article calls on the judiciary to find a more appropriate balance for protecting the right to privacy in a modern society.


Cellphones, Stingrays, And Searches! An Inquiry Into The Legality Of Cellular Location Information, Jeremy H. D'Amico Aug 2016

Cellphones, Stingrays, And Searches! An Inquiry Into The Legality Of Cellular Location Information, Jeremy H. D'Amico

University of Miami Law Review

Can the Fourth Amendment protect an individual’s right privacy by preventing the disclosure of her location through cell site location information? Does it currently? Should it? Many court opinions answer these questions in both the affirmative and the negative. The rationale underlying each conclusion is disparate. Some rely on statutory regimes, others rely on the United States Supreme Court’s interpretation of reasonableness. However, Cell Site Location Information is a technology that requires uniformity in its interpretation. This note investigates the different interpretations of the Fourth Amendment as it relates to Cell Site Location Information. It explains the technology behind Cell …


Important Steps To Maintain The Privacy Of Patients In The Hospital, Savera Aziz Ali, Minaz Mawani, Gulshan Bano, Sumera Aziz Ali Aug 2016

Important Steps To Maintain The Privacy Of Patients In The Hospital, Savera Aziz Ali, Minaz Mawani, Gulshan Bano, Sumera Aziz Ali

School of Nursing & Midwifery

Women are considered as vulnerable groups in our society in spite of their defined women rights by various laws. This shows that unfortunately these laws are not implemented practically in the real life. Society is shaped by the individuals and everyone should be responsible for advocating their own rights as well as the right of others especially of the vulnerable groups within the population.


Wearable Fitness Devices: Personal Health Data Privacy In Washington State, Steven Spann Jul 2016

Wearable Fitness Devices: Personal Health Data Privacy In Washington State, Steven Spann

Seattle University Law Review

Private entities are increasingly targeting individuals in the United States and around the world to gather personal data for such purposes as product development, market identification, and insurance risk assessment. While credit card records and online browsing histories have long been the medium through which this data is gathered, in more recent years, wearable fitness devices have added a new dimension to data production and collection. These devices are capable of gathering a significant amount of data regarding a person’s physical and physiological characteristics, thereby exposing these data producers to personal privacy infringement. Washington State lawmakers and citizens must be …


Review Essay: Sara M. Smyth, Cybercrime In Canadian Criminal Law, 2nd Edition (Toronton: Carswell, 2015), Christopher D. Ram Jun 2016

Review Essay: Sara M. Smyth, Cybercrime In Canadian Criminal Law, 2nd Edition (Toronton: Carswell, 2015), Christopher D. Ram

Canadian Journal of Law and Technology

Dr. Smyth’s book is ambitious in its scope, seeking to trace the criminology and evolution of information technologies and cybercrime as the basis of current Canadian legislation and jurisprudence. It is intended as a concise student reference text or resource for those who are new to the subject area, studying in criminology and other areas, as opposed to law. A list of concepts and issues for discussion appears at the conclusion of each chapter and there is a glossary of technical (but not legal) terms at the end of the book. It takes a neutral and professorial approach, seeking to …


Clapper Dethroned: Imminent Injury And Standing For Data Breach Lawsuits In Light Of Ashley Madison, Arthur R. Vorbrodt Jun 2016

Clapper Dethroned: Imminent Injury And Standing For Data Breach Lawsuits In Light Of Ashley Madison, Arthur R. Vorbrodt

Washington and Lee Law Review Online

No abstract provided.


If You Fly A Drone, So Can Police, Stephen E. Henderson May 2016

If You Fly A Drone, So Can Police, Stephen E. Henderson

Stephen E Henderson


According to the U.S. Constitution, the more you fly your drone, the more police can fly theirs. “Come on,” you might reply, “that hoary document”—and, yes, sorry to make you the sort who drops words like hoary—“that hoary document surely says nothing about drones.” But in fact it does. At least it does as interpreted by the courts. In particular, it is how they interpret the Fourth Amendment. So, to understand this aspect of drones, we first must understand this provision of the Bill of Rights...


Video-Streaming Records And The Video Privacy Protection Act: Broadening The Scope Of Personally Identifiable Information To Include Unique Device Identifiers Disclosed With Video Titles, Gregory M. Huffman May 2016

Video-Streaming Records And The Video Privacy Protection Act: Broadening The Scope Of Personally Identifiable Information To Include Unique Device Identifiers Disclosed With Video Titles, Gregory M. Huffman

Chicago-Kent Law Review

The Video Privacy Protection Act (“VPPA”) prohibits video tape service providers from disclosing their consumers’ video rental or sale records. Although the VPPA was originally enacted to regulate disclosures by brick-and-mortar video rental stores, litigators have more recently used the VPPA as a vehicle to regulate disclosures by online video content providers.

The application of the VPPA to video streaming via web browsers and mobile devices raises new questions of statutory interpretation. One key question is whether the scope of the VPPA is broad enough to cover a disclosure of a unique device identifier of a user’s device, rather than …


The Positive Law Model Of The Fourth Amendment, William Baude, James Y. Stern May 2016

The Positive Law Model Of The Fourth Amendment, William Baude, James Y. Stern

Faculty Publications

For fifty years, courts have used a “reasonable expectation of privacy” standard to define “searches” under the Fourth Amendment. As others have recognized, that doctrine is subjective, unpredictable, and conceptually confused, but viable alternatives have been slow to emerge. This Article supplies one.

We argue that Fourth Amendment protection should be anchored in background positive law. The touchstone of the search-and-seizure analysis should be whether government officials have done something forbidden to private parties. It is those actions that should be subjected to Fourth Amendment reasonableness review and the presumptive requirement to obtain a warrant. In short, Fourth Amendment protection …


13th Annual Diversity Symposium Dinner 04-07-2016, Roger Williams University School Of Law Apr 2016

13th Annual Diversity Symposium Dinner 04-07-2016, Roger Williams University School Of Law

School of Law Conferences, Lectures & Events

No abstract provided.


Unilateral Invasions Of Privacy, Roger Allan Ford Apr 2016

Unilateral Invasions Of Privacy, Roger Allan Ford

Notre Dame Law Review

Most people seem to agree that individuals have too little privacy, and most proposals to address that problem focus on ways to give those users more information about, and more control over, how information about them is used. Yet in nearly all cases, information subjects are not the parties who make decisions about how information is collected, used, and disseminated; instead, outsiders make unilateral decisions to collect, use, and disseminate information about others. These potential privacy invaders, acting without input from information subjects, are the parties to whom proposals to protect privacy must be directed. This Article develops a theory …


Unilateral Invasions Of Privacy, Roger Allan Ford Apr 2016

Unilateral Invasions Of Privacy, Roger Allan Ford

Law Faculty Scholarship

Most people seem to agree that individuals have too little privacy, and most proposals to address that problem focus on ways to give those users more information about, and more control over, how information about them is used. Yet in nearly all cases, information subjects are not the parties who make decisions about how information is collected, used, and disseminated; instead, outsiders make unilateral decisions to collect, use, and disseminate information about others. These potential privacy invaders, acting without input from information subjects, are the parties to whom proposals to protect privacy must be directed. This Article develops a theory …


Against Data Exceptionalism, Andrew Keane Woods Apr 2016

Against Data Exceptionalism, Andrew Keane Woods

Law Faculty Scholarly Articles

One of the great regulatory challenges of the Internet era—indeed, one of today's most pressing privacy questions—is how to define the limits of government access to personal data stored in the cloud. This is particularly true today because the cloud has gone global, raising a number of questions about the proper reach of one state's authority over cloud-based data. The prevailing response to these questions by scholars, practitioners, and major Internet companies like Google and Facebook has been to argue that data is different. Data is “unterritorial,” they argue, and therefore incompatible with existing territorial notions of jurisdiction. This Article …


Big Data Sustainability: An Environmental Management Systems Analogy, Dennis D. Hirsch, Jonathan H. King Mar 2016

Big Data Sustainability: An Environmental Management Systems Analogy, Dennis D. Hirsch, Jonathan H. King

Washington and Lee Law Review Online

Today, organizations globally wrestle with how to extract valuable insights from diverse data sets without invading privacy, causing discrimination, harming their brand, or otherwise undermining the sustainability of their big data projects. Leaders in these organizations are thus asking: What management approach should businesses employ sustainably to achieve the tremendous benefits of big data analytics, while minimizing the potential negative externalities?

This Paper argues that leaders can learn from environmental management practices developed to manage the negative externalities of the industrial revolution. First, it shows that, along with its many benefits, big data can create negative externalities that are structurally …


Elements Of A New Ethical Framework For Big Data Research, Effy Vayena, Urs Gasser, Alexandra Wood, David R. O'Brien, Micah Altman Mar 2016

Elements Of A New Ethical Framework For Big Data Research, Effy Vayena, Urs Gasser, Alexandra Wood, David R. O'Brien, Micah Altman

Washington and Lee Law Review Online

Emerging large-scale data sources hold tremendous potential for new scientific research into human biology, behaviors, and relationships. At the same time, big data research presents privacy and ethical challenges that the current regulatory framework is ill-suited to address. In light of the immense value of large-scale research data, the central question moving forward is not whether such data should be made available for research, but rather how the benefits can be captured in a way that respects fundamental principles of ethics and privacy.

In response, this Essay outlines elements of a new ethical framework for big data research. It argues …


Ou Professor: Fourth Amendment At Heart Of Dispute Between Fbi, Apple, Stephen E. Henderson Mar 2016

Ou Professor: Fourth Amendment At Heart Of Dispute Between Fbi, Apple, Stephen E. Henderson

Stephen E Henderson

The dispute between the FBI and Apple Inc. over the unlocking of the iPhone used by one of the San Bernadino shooters is important to all Americans. And so it's good that it is getting a wide airing. But when it comes to issues that have complicated tradeoffs, it can be important not just that we have the conversation, but that we use the right words. And here the debate deserves very mixed reviews. . . .


Good Cause Is Bad News: How The Good Cause Standard For Record Access Impacts Adult Adoptees Seeking Personal Information And A Proposal For Reform, Christopher G.A. Loriot Feb 2016

Good Cause Is Bad News: How The Good Cause Standard For Record Access Impacts Adult Adoptees Seeking Personal Information And A Proposal For Reform, Christopher G.A. Loriot

University of Massachusetts Law Review

There are many hurdles that adult adoptees face when seeking access to personal information contained in original birth records or adoption proceedings. One such hurdle is the widely-used good cause standard, which requires adoptees seeking information to show good cause to obtain access. This standard is problematic primarily for its vagueness. Very few jurisdictions that use this standard define “good cause” in any meaningful way, and case law interpreting good cause statutory language is inconsistent at best. Although it is meant to protect the privacy interests of all parties in an adoption proceeding, the good cause standard acts as a …


Newsroom: Margulies On Apple V. Fbi Standoff 02-18-2016, Roger Williams University School Of Law Feb 2016

Newsroom: Margulies On Apple V. Fbi Standoff 02-18-2016, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


Newsroom: Freedman On Credit Reports 02-12-2016, Roger Williams University School Of Law Feb 2016

Newsroom: Freedman On Credit Reports 02-12-2016, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


Litigating In The 21st Century: Amending Challenges For Cause In Light Of Big Data, Andrew Kasabian Feb 2016

Litigating In The 21st Century: Amending Challenges For Cause In Light Of Big Data, Andrew Kasabian

Pepperdine Law Review

The amount of data generated daily is growing exponentially. The majority of this data is unstructured data. Big Data analytics provides the capability to analyze sets of unrelated data to find hidden and meaningful correlations and predict an individual’s future actions. Therefore, Big Data can alter trial preparation by opening up new sets of information for lawyers to analyze in the jury selection process. Privacy concerns may follow Big Data’s incorporation because Big Data aggregates an individual’s information and predicts future actions. This Comment details how Big Data will provide a net benefit to trial preparation. In order to protect …


Protecting Personal Information: Achieving A Balance Between User Privacy And Behavioral Targeting, Patrick Myers Jan 2016

Protecting Personal Information: Achieving A Balance Between User Privacy And Behavioral Targeting, Patrick Myers

University of Michigan Journal of Law Reform

Websites and mobile applications provide immeasurable benefits to both users and companies. These services often collect vast amounts of personal information from the individuals that use them, including sensitive details such as Social Security numbers, credit card information, and physical location. Personal data collection and dissemination leave users vulnerable to various threats that arise from the invasion of their privacy, particularly because users are often ignorant of the existence or extent of these practices. Current privacy law does not provide users with adequate protection from the risks attendant to the collection and dissemination of their personal information. This Note advocates …


Never Alone: Why The Inevitable Influx Of Drones Necessitates A New Fourth Amendment Standard That Adequately Protects Reasonable Expectations Of Privacy, Paul Burgin Jan 2016

Never Alone: Why The Inevitable Influx Of Drones Necessitates A New Fourth Amendment Standard That Adequately Protects Reasonable Expectations Of Privacy, Paul Burgin

University of Baltimore Law Review

In June 2011, North Dakota cattle rancher Rodney Brossart became the first American to be arrested with the aid of a drone (Unmanned Aircraft System(s) or UAS) operated by law enforcement. Six cows found their way onto Brossart's property, and he refused to turn them over to law enforcement officials. Brossart and a few family members chased police officers off of his property at gunpoint, and police later returned with a warrant and SWAT team. A sixteen-hour standoff ensued until police called in the assistance of a UAS to pinpoint Brossart's exact location. Shortly thereafter, SWAT officers rushed in, tased, …