Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Schulich School of Law, Dalhousie University (13)
- Seattle University School of Law (12)
- The Catholic University of America, Columbus School of Law (8)
- Maurer School of Law: Indiana University (7)
- University of Washington School of Law (7)
-
- Boston University School of Law (6)
- Pepperdine University (6)
- University of Michigan Law School (6)
- Vanderbilt University Law School (6)
- William & Mary Law School (6)
- American University Washington College of Law (5)
- Brooklyn Law School (5)
- St. John's University School of Law (5)
- City University of New York (CUNY) (4)
- Loyola Marymount University and Loyola Law School (4)
- Brigham Young University Law School (3)
- Georgetown University Law Center (3)
- Northwestern Pritzker School of Law (3)
- Singapore Management University (3)
- University at Buffalo School of Law (3)
- University of Arkansas, Fayetteville (3)
- University of Colorado Law School (3)
- University of Miami Law School (3)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (3)
- University of Pennsylvania Carey Law School (3)
- West Virginia University (3)
- Cleveland State University (2)
- Duquesne University (2)
- Marquette University Law School (2)
- New York Law School (2)
- Keyword
-
- Privacy (47)
- Fourth Amendment (13)
- Technology (13)
- Surveillance (12)
- Privacy law (9)
-
- Artificial intelligence (8)
- Data (8)
- Data privacy (8)
- GDPR (8)
- COVID-19 (7)
- Carpenter v. United States (7)
- First Amendment (7)
- Cybersecurity (6)
- Data protection (6)
- General Data Protection Regulation (6)
- AI (5)
- CCPA (5)
- California Consumer Privacy Act (5)
- European Union (5)
- Pandemic (5)
- Police (5)
- California (4)
- Consumer privacy (4)
- Copyright (4)
- Coronavirus (4)
- Internet (4)
- Katz v. United States (4)
- Law (4)
- Security (4)
- Torts (4)
- Publication
-
- Faculty Scholarship (11)
- Canadian Journal of Law and Technology (9)
- Catholic University Journal of Law and Technology (7)
- Seattle University Law Review (7)
- Pepperdine Law Review (5)
-
- St. John's Law Review (5)
- Articles, Book Chapters, & Popular Press (4)
- Indiana Law Journal (4)
- Loyola of Los Angeles Law Review (4)
- Washington Law Review (4)
- All Faculty Scholarship (3)
- BYU Law Review (3)
- Faculty Publications (3)
- Georgetown Law Faculty Publications and Other Works (3)
- Publications (3)
- Seattle Journal of Technology, Environmental & Innovation Law (3)
- Vanderbilt Law Review (3)
- West Virginia Law Review (3)
- William & Mary Law Review (3)
- American University Journal of Gender, Social Policy & the Law (2)
- Arkansas Law Review (2)
- Articles by Maurer Faculty (2)
- Brooklyn Journal of International Law (2)
- Buffalo Law Review (2)
- Dickinson Law Review (2017-Present) (2)
- Florida Law Review (2)
- Honors Theses (2)
- Maine Law Review (2)
- Marquette Intellectual Property Law Review (2)
- Michigan Law Review Online (2)
- Publication Type
Articles 1 - 30 of 186
Full-Text Articles in Law
Data Governance And The Elasticity Of Sovereignty, Roxana Vatanparast
Data Governance And The Elasticity Of Sovereignty, Roxana Vatanparast
Brooklyn Journal of International Law
Traditionally, the world map and territorially bounded spaces have dominated the ways in which we imagine how states govern, make laws, and exercise their authority. Under this conception, reflected in traditional international law principles of territorial sovereignty, each state would have exclusive authority to govern and make laws over everything concerning the land within its borders. Yet developments like the proliferation of data flows, which are based on divisible, mobile, and interconnected components of data, are not territorially bounded. This presents a challenge to the traditional bases for territorial sovereignty and jurisdiction under international law, which some scholars claim is …
Easing The Burdens Of A Patchwork Approach To Data Privacy Regulation In Favor Of A Singular Comprehensive International Solution—The International Data Privacy Agreement, Scott Resnick
Brooklyn Journal of International Law
Data privacy has become one of the premier hot-button issues in today’s increasingly digital human experience. Legislatures around the globe have attempted to act swiftly in an effort to safeguard the highly coveted personal information of their citizens and combat misuse at the hands of international businesses operating with an online presence. Since the European Union’s enactment of the General Data Protection Regulation (GDPR) in 2018, countries around the globe have been grappling with how best to replicate the EU’s leading data privacy regulation while providing the same or greater level of transparency into data collection practices. While a mere …
An Australian Conundrum: Genomic Technology, Data, And The Covidsafe App, David Morrison, Patrick T. Quirk
An Australian Conundrum: Genomic Technology, Data, And The Covidsafe App, David Morrison, Patrick T. Quirk
Pace International Law Review
This paper examines the difficulties that have arisen in Australia in the use of its contact-tracing app. We examine the privacy implications around the use of the app, the wider economic imperative, and the balancing of those concerns against the health threat of the COVID-19 pandemic. We posit that default options are superior in times of emergency and rather than begging for the adoption of lifesaving technology, we suggest that the evidence gathered by behavioral economists provides an apposite and powerful alternative worthy of consideration.
The Jones Trespass Doctrine And The Need For A Reasonable Solution To Unreasonable Protection, Geoffrey Corn
The Jones Trespass Doctrine And The Need For A Reasonable Solution To Unreasonable Protection, Geoffrey Corn
Arkansas Law Review
Each day that Houston drivers exit from Interstate 45 to drive to downtown Houston, they pass an odd sight. Nestled within some bushes is an encampment of tents. This encampment is very clearly located on public property adjacent to the interstate highway, and equally clearly populated by homeless individuals. While local police ostensibly tolerate this presence, at least temporarily, the sight frequently evokes an image in my mind of a police search of those tents. This thought is especially prominent on the days I am driving to my law school, South Texas College of Law Houston, to teach my federal …
The Ftc And Ai Governance: A Regulatory Proposal, Michael Spiro
The Ftc And Ai Governance: A Regulatory Proposal, Michael Spiro
Seattle Journal of Technology, Environmental & Innovation Law
No abstract provided.
The Ethical Challenge For Hipaa’S Privacy Rule In The Genomics Era Of Data Analytics., Reem Shinawi
The Ethical Challenge For Hipaa’S Privacy Rule In The Genomics Era Of Data Analytics., Reem Shinawi
Electronic Theses and Dissertations
The thesis of this dissertation focuses on the Ethical Challenge for HIPAA’s Privacy Rule in the Genomics Era of Data Analytics. Data Analytics in Genomic Medicine challenges the individuals’ right to privacy. Hence, a balance is needed between the previous centrality of individual privacy and the need for population information to make breakthroughs in Genomic Medicine using Data Analytics. Such a problem demands regulatory solutions. And such solutions require the collaboration of professionals. Genomic Medicine is a field that deals with sensitive genetic information in both medicine, and research, it is essential to view it through HIPAA as it is …
Law Enforcement’S Use Of Facial Recognition Software In United States Cities, Samantha Jean Wunschel
Law Enforcement’S Use Of Facial Recognition Software In United States Cities, Samantha Jean Wunschel
Honors Program Theses and Projects
Facial recognition software is something we use every day, whether it’s a suggested tag on our Facebook post or a faster way to unlock our phones. As technology becomes increasingly pervasive in our lives, law enforcement has adapted to utilize the new tools available in accessory to their investigations and the legal process.
Trading Privacy For Promotion? Fourth Amendment Implications Of Employers Using Wearable Sensors To Assess Worker Performance, George M. Dery Iii
Trading Privacy For Promotion? Fourth Amendment Implications Of Employers Using Wearable Sensors To Assess Worker Performance, George M. Dery Iii
Northwestern Journal of Law & Social Policy
This Article considers the Fourth Amendment implications of a study on a passive monitoring system where employees shared data from wearables, phone applications, and position beacons that provided private information such as weekend phone use, sleep patterns in the bedroom, and emotional states. The study’s authors hope to use the data collected to create a new system for objectively assessing employee performance that will replace the current system which is plagued by the inherent bias of self-reporting and peer-review and which is labor intensive and inefficient. The researchers were able to successfully link the data collected with the quality of …
Watching Androids Dream Of Electric Sheep: Immersive Technology, Biometric Psychography, And The Law, Brittan Heller
Watching Androids Dream Of Electric Sheep: Immersive Technology, Biometric Psychography, And The Law, Brittan Heller
Vanderbilt Journal of Entertainment & Technology Law
Virtual reality and augmented reality present exceedingly complex privacy issues because of the enhanced user experience and reality-based models. Unlike the issues presented by traditional gaming and social media, immersive technology poses inherent risks, which our legal understanding of biometrics and online harassment is simply not prepared to address. This Article offers five important contributions to this emerging space. It begins by introducing a new area of legal and policy inquiry raised by immersive technology called “biometric psychography.” Second, it explains how immersive technology works to a legal audience and defines concepts that are essential to understanding the risks that …
National Cybersecurity Innovation, Tabrez Y. Ebrahim
National Cybersecurity Innovation, Tabrez Y. Ebrahim
West Virginia Law Review
National cybersecurity plays a crucial role in protecting our critical infrastructure, such as telecommunication networks, the electricity grid, and even financial transactions. Most discussions about promoting national cybersecurity focus on governance structures, international relations, and political science. In contrast, this Article proposes a different agenda and one that promotes the use of innovation mechanisms for technological advancement. By promoting inducements for technological developments, such innovation mechanisms encourage the advancement of national cybersecurity solutions. In exploring possible solutions, this Article asks whether the government or markets can provide national cybersecurity innovation. This inquiry is a fragment of a much larger literature …
Global Privacy Concerns Of Facial Recognition Big Data, Myranda Westbrook
Global Privacy Concerns Of Facial Recognition Big Data, Myranda Westbrook
Honors Theses
Facial recognition technology is a system of automatic acknowledgement that recognizes individuals by categorizing specific features of their facial structure to link the scanned information to stored data. Within the past few decades facial recognition technology has been implemented on a large scale to increase the security measures needed to access personal information. This has been specifically used in surveillance systems, social media platforms, and mobile device access control. The extensive use of facial recognition systems has created challenges as it relates to biometric information control and privacy concerns. This concern raises the cost and benefit analysis of an individual’s …
From Blockbuster To Big Brother: How An Increase In Mobile Phone Apps Has Led To A Decrease In Privacy Under The Video Privacy Protection Act, Carlee Rizzolo
From Blockbuster To Big Brother: How An Increase In Mobile Phone Apps Has Led To A Decrease In Privacy Under The Video Privacy Protection Act, Carlee Rizzolo
Florida Law Review
Congress enacted the Video Privacy Protection Act (BPPA or the Act) in 1988 to protect consumers by prohibiting video tape service providers from knowingly disclosing their personally identifable information to any person, without first obtaining consent. The VPPA defines "consumer" as any renter, purchaser, or subscriber. However, the Act does not define the term "subscriber." Over the past thirty years, there has been a rapid increase in the use of downloadable apps that allow individuals to watch videos and other online content for free on their mobile phones. Does the sole act of downloading a free app onto a mobile …
Towards A Global Data Privacy Standard, Michael L. Rustad, Thomas H. Koenig
Towards A Global Data Privacy Standard, Michael L. Rustad, Thomas H. Koenig
Florida Law Review
This Article questions the widespread contention that recent updates to European Union (EU) data protection law will drive a disruptive wedge between EU and United States (U.S.) data privacy regimes. Europe’s General Data Protection Regulation (GDPR), which took effect in May 2018, gives all EU citizens easier access to their data, a right to portability, a right to be forgotten, and a right to learn when their data has been hacked. These mandatory privacy protections apply to non-EU companies that offer goods or services to EU consumers, whether through a subsidiary or a website. The “Brussels Effect” hypothesis projects a …
An Analysis Of Technological Components In Relation To Privacy In A Smart City, Kayla Rutherford, Ben Lands, A. J. Stiles
An Analysis Of Technological Components In Relation To Privacy In A Smart City, Kayla Rutherford, Ben Lands, A. J. Stiles
James Madison Undergraduate Research Journal (JMURJ)
A smart city is an interconnection of technological components that store, process, and wirelessly transmit information to enhance the efficiency of applications and the individuals who use those applications. Over the course of the 21st century, it is expected that an overwhelming majority of the world’s population will live in urban areas and that the number of wireless devices will increase. The resulting increase in wireless data transmission means that the privacy of data will be increasingly at risk. This paper uses a holistic problem-solving approach to evaluate the security challenges posed by the technological components that make up a …
Parties’ Choice Of The “Rules Of Law” To Govern International Commercial Contract Before National Courts, Amin Dawwas
Parties’ Choice Of The “Rules Of Law” To Govern International Commercial Contract Before National Courts, Amin Dawwas
Journal of the Arab American University مجلة الجامعة العربية الامريكية للبحوث
According to the conflict-of-laws rule in many Arab countries, the international commercial contract is subject to the law chosen by the parties. According to the prevailing opinion in judiciary and doctrine, the law chosen by the parties to govern the contract should be a law of a particular State. If the parties chose "rules of law", such a choice will generally not be recognized as the law governing the contract. Rather, courts would consider such a choice as an incorporation of the rules of law into the contract, provided that such chosen rules of law shall not contradict the mandatory …
Data Of The Dead: A Proposal For Protecting Posthumous Data Privacy, Kate C. Ashley
Data Of The Dead: A Proposal For Protecting Posthumous Data Privacy, Kate C. Ashley
William & Mary Law Review
No abstract provided.
Forging A Path Towards Meaningful Digital Privacy: Data Monetization And The Ccpa, Rebecca Harris
Forging A Path Towards Meaningful Digital Privacy: Data Monetization And The Ccpa, Rebecca Harris
Loyola of Los Angeles Law Review
The California Consumer Privacy Act (CCPA) was passed in response to a number of newsworthy data breaches with widespread impacts, and which revealed how little digital privacy consumers actually have. Despite the large market for consumer data, individual consumers generally do not earn money when their personal data are sold. Further, consumers have very little control over who collects their data, what information is collected, and with whom it is shared. To place control back in the hands of the consumer, affirmative consent should be required to collect and sell consumer’s data, and consumers should have the ability to sell …
Horizontal Collusions Organized By Uber: Time For A Change In Canada, Thanh Phan
Horizontal Collusions Organized By Uber: Time For A Change In Canada, Thanh Phan
Canadian Journal of Law and Technology
This paper argues that Uber’s ordinary operation should be characterized as organizing horizontal cartels among drivers that not only fix the fares of ride- hailing services using its platform but also allocate customers. Uber-led cartels, therefore, violate section 45(1) of the Competition Act5 of Canada. In doing so, this paper analyzes the relationships between Uber and drivers and argues that (i) Uber is the organizer of price-fixing and market allocation collusions among drivers, (ii) the collusions are horizontal, and (iii) they are per se illegal.
The first section discusses the general structure of peer-to-peer markets. The second section examines factors …
Richard Susskind, Online Courts And The Future Of Justice (Oxford: Oxford University Press, 2019), David Cowan
Richard Susskind, Online Courts And The Future Of Justice (Oxford: Oxford University Press, 2019), David Cowan
Canadian Journal of Law and Technology
There are times when the essential nature of something is simply viewed as ‘nice to have’ until a paradigmatic shift turns the essential into a necessity, and necessity in technological change is not so much the mother of invention as the parent of behavioural change. This point is made clear by the Covid-19 pandemic, which has forced courts to put online and remote working at centre stage. There is a natural yearning to go back to ‘normal,’ but questions arise as to whether online courts are a good idea and whether attempts to work online and remotely will survive the …
Dispute Settlement Under The African Continental Free Trade Area Agreement: A Preliminary Assessment, Olabisi D. Akinkugbe
Dispute Settlement Under The African Continental Free Trade Area Agreement: A Preliminary Assessment, Olabisi D. Akinkugbe
Articles, Book Chapters, & Popular Press
The African Continental Free Trade Area Agreement (AfCFTA) will add a new dispute settlement system to the plethora of judicial mechanisms designed to resolve trade disputes in Africa. Against the discontent of Member States and limited impact the existing highly legalized trade dispute settlement mechanisms have had on regional economic integration in Africa, this paper undertakes a preliminary assessment of the AfCFTA Dispute Settlement Mechanism (DSM). In particular, the paper situates the AfCFTA-DSM in the overall discontent and unsupportive practices of African States with highly legalized dispute settlement systems and similar WTO-Styled DSMs among other shortcomings. Notwithstanding the transplantation of …
Inescapable Surveillance, Matthew Tokson
Inescapable Surveillance, Matthew Tokson
Utah Law Faculty Scholarship
Until recently, Supreme Court precedent dictated that a person waives their Fourth Amendment rights in information they disclose to another party. The Court reshaped this doctrine in Carpenter v. United States, establishing that the Fourth Amendment protects cell phone location data even though it is revealed to others. The Court emphasized that consumers had little choice but to disclose their data, because cell phone use is virtually inescapable in modern society.
In the wake of Carpenter, many scholars and lower courts have endorsed inescapability as an important factor for determining Fourth Amendment rights. Under this approach, surveillance that people cannot …
Preservation Requests And The Fourth Amendment, Armin Tadayon
Preservation Requests And The Fourth Amendment, Armin Tadayon
Seattle University Law Review
Every day, Facebook, Twitter, Google, Amazon, ridesharing companies, and numerous other service providers copy users’ account information upon receiving a preservation request from the government. These requests are authorized under a relatively obscure subsection of the Stored Communications Act (SCA). The SCA is the federal statute that governs the disclosure of communications stored by third party service providers. Section 2703(f) of this statute authorizes the use of “f” or “preservation” letters, which enable the government to request that a service provider “take all necessary steps to preserve records and other evidence in its possession” while investigators seek valid legal process. …
Enough Is As Good As A Feast, Noah C. Chauvin
Enough Is As Good As A Feast, Noah C. Chauvin
Seattle University Law Review
Ipse Dixit, the podcast on legal scholarship, provides a valuable service to the legal community and particularly to the legal academy. The podcast’s hosts skillfully interview guests about their legal and law-related scholarship, helping those guests communicate their ideas clearly and concisely. In this review essay, I argue that Ipse Dixit has made a major contribution to legal scholarship by demonstrating in its interview episodes that law review articles are neither the only nor the best way of communicating scholarly ideas. This contribution should be considered “scholarship,” because one of the primary goals of scholarship is to communicate new ideas.
Good Health And Good Privacy Go Hand-In-Hand (Originally Published By Jnslp), Jennifer Daskal
Good Health And Good Privacy Go Hand-In-Hand (Originally Published By Jnslp), Jennifer Daskal
Joint PIJIP/TLS Research Paper Series
No abstract provided.
The Sacred Fourth Amendment Text, Christopher Slobogin
The Sacred Fourth Amendment Text, Christopher Slobogin
Michigan Law Review Online
The Supreme Court’s jurisprudence governing the Fourth Amendment’s “threshold”—a word meant to refer to the types of police actions that trigger the amendment’s warrant and reasonableness requirements—has confounded scholars and students alike since Katz v. United States. Before that 1967 decision, the Court’s decisions on the topic were fairly straightforward, based primarily on whether the police trespassed on the target’s property or property over which the target had control. After that decision—which has come to stand for the proposition that a Fourth Amendment search occurs if police infringe an expectation of privacy that society is prepared to recognize as …
"The New Weapon Of Choice": Law's Current Inability To Properly Address Deepfake Pornography, Anne Pechenik Gieseke
"The New Weapon Of Choice": Law's Current Inability To Properly Address Deepfake Pornography, Anne Pechenik Gieseke
Vanderbilt Law Review
Deepfake technology uses artificial intelligence to realistically manipulate videos by splicing one person’s face onto another’s. While this technology has innocuous usages, some perpetrators have instead used it to create deepfake pornography. These creators use images ripped from social media sites to construct—or request the generation of—a pornographic video showcasing any woman who has shared images of herself online. And while this technology sounds complex enough to be relegated to Hollywood production studios, it is rapidly becoming free and easy-to-use. The implications of deepfake pornography seep into all facets of victims’ lives. Not only does deepfake pornography shatter these victims’ …
The Fourth Amendment At Home, Thomas P. Crocker
The Fourth Amendment At Home, Thomas P. Crocker
Indiana Law Journal
A refuge, a domain of personal privacy, and the seat of familial life, the home holds a special place in Fourth Amendment jurisprudence. Supreme Court opinions are replete with statements affirming the special status of the home. Fourth Amendment text places special emphasis on securing protections for the home in addition to persons, papers, and effects against unwarranted government intrusion. Beyond the Fourth Amendment, the home has a unique place within constitutional structure. The home receives privacy protections in addition to sheltering other constitutional values protected by the Due Process Clause and the First Amendment. For example, under the Due …
Maximizing The Value Of America’S Newest Resource, Low- Altitude Airspace: An Economic Analysis Of Aerial Trespass And Drones, Tyler Watson
Maximizing The Value Of America’S Newest Resource, Low- Altitude Airspace: An Economic Analysis Of Aerial Trespass And Drones, Tyler Watson
Indiana Law Journal
Recognizing that tort law is a unique area of law that was judicially created by rational human beings with an innate sense of economic justice, this Note seeks to apply positive economic theory—derived from ex post analyses of tort cases—to an ex ante analysis to predict how and to what extent the existing and proposed aerial trespass rules will further economic efficiency in the context of drones and airspace rights. Part I will provide (1) an overview of the Federal Aviation Administration’s (FAA) current regulatory framework and the development of the common law aerial trespass doctrine and (2) an overview …
How Definitive Is Fourth Amendment Textualism?, Evan H. Caminker
How Definitive Is Fourth Amendment Textualism?, Evan H. Caminker
Michigan Law Review Online
Professor Jeffrey Bellin’s excellent article advances a comprehensive and straightforward textual approach to determining what policing activities constitute “searches” triggering the protections of the Fourth Amendment. Bellin’s thesis is that a text-based approach to interpreting the Amendment is superior to the Supreme Court’s current approach, which ever since Katz v. United States has defined “search” primarily by reference to a non-textual “reasonable expectation of privacy” standard. After soundly criticizing the ungrounded and highly subjective nature of the Katz test, Bellin declares that the Court should instead simply follow where the text leads: the Amendment protects people from a search, meaning …
A False Sense Of Security: How Congress And The Sec Are Dropping The Ball On Cryptocurrency, Tessa E. Shurr
A False Sense Of Security: How Congress And The Sec Are Dropping The Ball On Cryptocurrency, Tessa E. Shurr
Dickinson Law Review (2017-Present)
Today, companies use blockchain technology and digital assets for a variety of purposes. This Comment analyzes the digital token. If the Securities and Exchange Commission (SEC) views a digital token as a security, then the issuer of the digital token must comply with the registration and extensive disclosure requirements of federal securities laws.
To determine whether a digital asset is a security, the SEC relies on the test that the Supreme Court established in SEC v. W.J. Howey Co. Rather than enforcing a statute or agency rule, the SEC enforces securities laws by applying the Howey test on a fact-intensive …