Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Schulich School of Law, Dalhousie University (12)
- Selected Works (12)
- Fordham Law School (11)
- Seattle University School of Law (11)
- Maurer School of Law: Indiana University (10)
-
- Boston University School of Law (9)
- Brooklyn Law School (9)
- The Catholic University of America, Columbus School of Law (7)
- University of Michigan Law School (7)
- Vanderbilt University Law School (7)
- American University Washington College of Law (6)
- Notre Dame Law School (6)
- Southern Methodist University (6)
- University of Washington School of Law (6)
- Osgoode Hall Law School of York University (5)
- St. John's University School of Law (5)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (5)
- Cleveland State University (4)
- University of Colorado Law School (4)
- University of Miami Law School (4)
- University of Minnesota Law School (4)
- William & Mary Law School (4)
- Duke Law (3)
- Georgetown University Law Center (3)
- New York Law School (3)
- Roger Williams University (3)
- Texas A&M University School of Law (3)
- UIC School of Law (3)
- University at Buffalo School of Law (3)
- University of Maryland Francis King Carey School of Law (3)
- Keyword
-
- Privacy (59)
- Surveillance (12)
- Technology (12)
- Data (11)
- Fourth Amendment (10)
-
- GDPR (9)
- Data privacy (8)
- First Amendment (8)
- Data protection (7)
- Big data (6)
- Facebook (6)
- Internet (6)
- Social media (6)
- Compliance (5)
- Consent (5)
- FTC (5)
- Regulation (5)
- Searches (5)
- Business (4)
- EU (4)
- European Union (4)
- Federal Trade Commission (4)
- General Data Protection Regulation (4)
- Google (4)
- Personal information (4)
- Privacy law (4)
- Sexual privacy (4)
- Warrants (4)
- Apple (3)
- BIPA (3)
- Publication
-
- Faculty Scholarship (15)
- Seattle University Law Review (11)
- Canadian Journal of Law and Technology (8)
- Fordham Intellectual Property, Media and Entertainment Law Journal (7)
- Catholic University Journal of Law and Technology (6)
-
- Indiana Law Journal (6)
- Osgoode Hall Law Journal (5)
- Articles (4)
- Faculty Publications (4)
- Fordham Law Review (4)
- Minnesota Journal of Law, Science & Technology (4)
- Notre Dame Law Review (4)
- Scholarly Works (4)
- Vanderbilt Journal of Entertainment & Technology Law (4)
- Articles & Chapters (3)
- Articles by Maurer Faculty (3)
- Articles, Book Chapters, & Popular Press (3)
- Brooklyn Journal of International Law (3)
- Buffalo Law Review (3)
- Cleveland State Law Review (3)
- Georgetown Law Faculty Publications and Other Works (3)
- Journal of Air Law and Commerce (3)
- Journal of Law and Policy (3)
- Library Philosophy and Practice (e-journal) (3)
- Publications (3)
- SMU Law Review (3)
- UIC John Marshall Journal of Information Technology & Privacy Law (3)
- University of Miami Law Review (3)
- Washington Journal of Law, Technology & Arts (3)
- American University Law Review (2)
- Publication Type
Articles 211 - 224 of 224
Full-Text Articles in Law
A Brave New World: Using The Outer Space Treaty To Design International Data Protection Standards For Low- Earth Orbit Satellite Operators, Amir Saboorian
A Brave New World: Using The Outer Space Treaty To Design International Data Protection Standards For Low- Earth Orbit Satellite Operators, Amir Saboorian
Journal of Air Law and Commerce
No abstract provided.
Privacy In The Age Of Medical Big Data, W. Nicholson Price Ii, I. Glenn Cohen
Privacy In The Age Of Medical Big Data, W. Nicholson Price Ii, I. Glenn Cohen
Articles
Big data has become the ubiquitous watch word of medical innovation. The rapid development of machine-learning techniques and artificial intelligence in particular has promised to revolutionize medical practice from the allocation of resources to the diagnosis of complex diseases. But with big data comes big risks and challenges, among them significant questions about patient privacy. Here, we outline the legal and ethical challenges big data brings to patient privacy. We discuss, among other topics, how best to conceive of health privacy; the importance of equity, consent, and patient governance in data collection; discrimination in data uses; and how to handle …
Safe Social Spaces, Ari Ezra Waldman
Safe Social Spaces, Ari Ezra Waldman
Articles & Chapters
Technologies that mediate social interaction can put our privacy and our safety at risk. Harassment, intimate partner violence and surveillance, data insecurity, and revenge porn are just a few of harms that bedevil technosocial spaces and their users, particularly users from marginalized communities. This Article seeks to identify the building blocks of safe social spaces, or environments in which individuals can be free of privacy and safety dangers. Relying on analogies to offline social spaces—Alcoholics Anonymous meetings, teams of coworkers, and attorney-client relationships—this Article argues that if a social space is defined as an environment characterized by disclosure, then a …
Power, Process, And Automated Decision-Making, Ari Ezra Waldman
Power, Process, And Automated Decision-Making, Ari Ezra Waldman
Articles & Chapters
Many decisions that used to be made by humans are now made by machines. And yet, automated decision-making systems based on “big data” – powered algorithms and machine learning are just as prone to mistakes, biases, and arbitrariness as their human counterparts. The result is a technologically driven decision-making process that seems to defy interrogation, analysis, and accountability and, therefore, undermines due process. This should make algorithmic decision-making an illegitimate source of authority in a liberal democracy. This Essay argues that algorithmic decision-making is a product of the neoliberal project to undermine social values like equality, nondiscrimination, and human flourishing …
Medical Records And Privacy Rights: The Unintended Consequences Of Aggregated Data In Electronic Health Records, Andrea C. Maciejewski
Medical Records And Privacy Rights: The Unintended Consequences Of Aggregated Data In Electronic Health Records, Andrea C. Maciejewski
University of Colorado Law Review
In an era of rapid-pace technological innovation and political focus on healthcare, the federal government is pushing for nationwide interoperability of electronic health records. While there are many benefits from such a program, the lack of federal or state privacy regulations for patients' personal data opens up the possibility of widespread dissemination of private and sensitive information. This inattention to privacy will cause major problems if exploited.
Currently, there are no federal or Colorado laws that protect against potential privacy violations and provide recourse for a patient if a medical professional decides to insert nonmedical information, such as information about …
Secrets Of The Deep: Defining Privacy Underwater, Annie Brett
Secrets Of The Deep: Defining Privacy Underwater, Annie Brett
UF Law Faculty Publications
The drones are coming, But not just to your neighborhood skies – to the world’s oceans. From recreational robots designed to autonomously follow divers and record video of them to low-cost, remotely operated submersibles that put ocean exploration in the hands of the general public to sophisticated military submersibles able to autonomously gather intelligence throughout the oceans, the underwater drone market is exploding. But unlike on land, this explosion has not been accompanied by similar discussion of privacy concerns. Instead, the ocean’s rapid shift away from an inaccessible operational sanctuary is one that is happening largely silently. And it is …
Identities In Critical Condition: The Urgent Need To Reevaluate The Investigation And Resolution Of Claims Of Medical Identity Theft, Stephanie Lindgren
Identities In Critical Condition: The Urgent Need To Reevaluate The Investigation And Resolution Of Claims Of Medical Identity Theft, Stephanie Lindgren
Mitchell Hamline Law Review
No abstract provided.
The Left's Law-And-Order Agenda, Aya Gruber
Face Off: An Examination Of State Biometric Privacy Statutes & Data Harm Remedies, Maya E. Rivera
Face Off: An Examination Of State Biometric Privacy Statutes & Data Harm Remedies, Maya E. Rivera
Fordham Intellectual Property, Media and Entertainment Law Journal
As biometric authentication becomes an increasingly popular method of security among consumers, only three states currently have statutes detailing how such data may be collected, used, retained, and released. The Illinois Biometric Information Privacy Act is the only statute of the three that enshrines a private right of action for those who fail to properly handle biometric data. Both the Texas Capture or Use Biometric Identifier Act Information Act and the Washington Biometric Privacy Act allow for state Attorneys General to bring suit on behalf of aggrieved consumers. This Note examines these three statutes in the context of data security …
Empiricism And Privacy Policies In The Restatement Of Consumer Contract Law, Gregory Klass
Empiricism And Privacy Policies In The Restatement Of Consumer Contract Law, Gregory Klass
Georgetown Law Faculty Publications and Other Works
The Draft Restatement of the Law of Consumer Contracts includes a quantitative study of judicial decisions concerning businesses’ online privacy policies, which it cites in support of a claim that most courts treat privacy policies as contract terms. This Article reports an attempt to reproduce that study’s results. Using the Reporters’ data, this study was unable to reproduce their numerical findings. This study found in the data fewer relevant decisions, and a lower proportion of decisions supporting the Draft Restatement position. It also found little support for the Draft’s claim that there is a clear trend recognizing privacy policies as …
Informed Trading And Cybersecurity Breaches, Joshua Mitts, Eric L. Talley
Informed Trading And Cybersecurity Breaches, Joshua Mitts, Eric L. Talley
Faculty Scholarship
Cybersecurity has become a significant concern in corporate and commercial settings, and for good reason: a threatened or realized cybersecurity breach can materially affect firm value for capital investors. This paper explores whether market arbitrageurs appear systematically to exploit advance knowledge of such vulnerabilities. We make use of a novel data set tracking cybersecurity breach announcements among public companies to study trading patterns in the derivatives market preceding the announcement of a breach. Using a matched sample of unaffected control firms, we find significant trading abnormalities for hacked targets, measured in terms of both open interest and volume. Our results …
Introducing The Global Data Privacy Prize, Fred H. Cate, Christopher Kuner, Orla Lynskey, Christopher Millard, Nora Ni Loideain, Dan Jerker B. Svantesson
Introducing The Global Data Privacy Prize, Fred H. Cate, Christopher Kuner, Orla Lynskey, Christopher Millard, Nora Ni Loideain, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
Discipline And Policing, Kate Levine
Discipline And Policing, Kate Levine
Faculty Publications
A prime focus of police-reform advocates is the transparency of police discipline. Indeed, transparency is one of, the most popular accountability solutions for a wide swath of policing problems. This Article examines the “transparency cure” as it applies to Police Disciplinary Records (“PDRs”). These records are part of an officer’s personnel file and contain reported wrongdoing from supervisors, Internal Affairs Bureaus, and Citizen Complaint Review Boards.
This Article argues that making PDRs public is worthy of skeptical examination. It problematizes the notion that transparency is a worthy end goal for those who desire to see police-reform in general. Transparency is …
Facebook V. Sullivan: Public Figures And Newsworthiness In Online Speech, Thomas E. Kadri, Kate Klonick
Facebook V. Sullivan: Public Figures And Newsworthiness In Online Speech, Thomas E. Kadri, Kate Klonick
Faculty Publications
In the United States, there are now two systems to adjudicate disputes about harmful speech. The first is older and more established: the legal system in which judges apply constitutional law to limit tort claims alleging injuries caused by speech. The second is newer and less familiar: the content-moderation system in which platforms like Facebook implement the rules that govern online speech. These platforms are not bound by the First Amendment. But, as it turns out, they rely on many of the tools used by courts to resolve tensions between regulating harmful speech and preserving free expression—particularly the entangled concepts …