Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 14 of 14

Full-Text Articles in Law

Ethical Implications Of Forensic Genealogy In Criminal Cases, Solana Lund May 2020

Ethical Implications Of Forensic Genealogy In Criminal Cases, Solana Lund

The Journal of Business, Entrepreneurship & the Law

The use of forensic genealogy to solve criminal cases is likely to increase in the coming years, especially given its success in solving cold cases. While its potential for good is impressive, there are also legitimate ethical concerns that need to be addressed. As society sees an increase in the use of forensic genealogy and DTC databases in criminal investigations as well as an increase in the media attention it garners, there will be more discussion regarding ethical implications. Legal scholars say that it is only a matter of time before courts weigh in on the privacy of DNA and …


Regulating Personal Data Usage In Covid-19 Control Conditions, Mark Findlay, Nydia Remolina May 2020

Regulating Personal Data Usage In Covid-19 Control Conditions, Mark Findlay, Nydia Remolina

Centre for AI & Data Governance

As the COVID-19 health pandemic ebbs and flows world-wide, governments and private companies across the globe are utilising AI-assisted surveillance, reporting, mapping and tracing technologies with the intention of slowing the spread of the virus. These technologies have capacity to amass and share personal data for community control and citizen safety motivations that empower state agencies and inveigle citizen co-operation which could only be imagined outside times of real and present personal danger. While not cavilling with the short-term necessity for these technologies and the data they control, process and share in the health regulation mission (provided that the technology …


Ethics, Ai, Mass Data And Pandemic Challenges: Responsible Data Use And Infrastructure Application For Surveillance And Pre-Emptive Tracing Post-Crisis, Mark Findlay, Jia Yuan Loke, Nydia Remolina Leon, Yum Yin, Benjamin (Tan Renyan) Tham May 2020

Ethics, Ai, Mass Data And Pandemic Challenges: Responsible Data Use And Infrastructure Application For Surveillance And Pre-Emptive Tracing Post-Crisis, Mark Findlay, Jia Yuan Loke, Nydia Remolina Leon, Yum Yin, Benjamin (Tan Renyan) Tham

Research Collection Yong Pung How School Of Law

As the COVID-19 health pandemic rages governments and private companies across the globe are utilising AI-assisted surveillance, reporting, mapping and tracing technologies with the intention of slowing the spread of the virus. These technologies have the capacity to amass personal data and share for community control and citizen safety motivations that empower state agencies and inveigle citizen co-operation which could only be imagined outside such times of real and present danger. While not cavilling with the short-term necessity for these technologies and the data they control, process and share in the health regulation mission, this paper argues that this infrastructure …


Digital Colonialism: The 21st Century Scramble For Africa Through The Extraction And Control Of User Data And The Limitations Of Data Protection Laws, Danielle Coleman May 2019

Digital Colonialism: The 21st Century Scramble For Africa Through The Extraction And Control Of User Data And The Limitations Of Data Protection Laws, Danielle Coleman

Michigan Journal of Race and Law

As Western technology companies increasingly rely on user data globally, extensive data protection laws and regulations emerged to ensure ethical use of that data. These same protections, however, do not exist uniformly in the resource-rich, infrastructure-poor African countries, where Western tech seeks to establish its presence. These conditions provide an ideal landscape for digital colonialism.

Digital colonialism refers to a modern-day “Scramble for Africa” where largescale tech companies extract, analyze, and own user data for profit and market influence with nominal benefit to the data source. Under the guise of altruism, large scale tech companies can use their power and …


A Status Update For Texas Voir Dire: Advocating For Pre-Trial Internet Investigation Of Prospective Jurors, Luke A. Harle Jun 2018

A Status Update For Texas Voir Dire: Advocating For Pre-Trial Internet Investigation Of Prospective Jurors, Luke A. Harle

St. Mary's Law Journal

The Internet provides trial attorneys an additional tool to investigate the backgrounds of prospective jurors during voir dire. Online searches of a person’s name and social media accounts can reveal information that could be used as grounds for a challenge for cause or to facilitate intelligent use of peremptory strikes. Texas lawmakers have not yet provided any official guidance as to whether attorneys can investigate prospective jurors online or how they might do so, should it be allowed. Texas’s current voir dire structure, judicial opinions, and ethics opinions, together, support the notion that Texas trial attorneys should be given opportunities …


Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen Dec 2016

Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen

All Faculty Scholarship

Big Data is the vast quantities of information amenable to large-scale collection, storage, and analysis. Using such data, companies and researchers can deploy complex algorithms and artificial intelligence technologies to reveal otherwise unascertained patterns, links, behaviors, trends, identities, and practical knowledge. The information that comprises Big Data arises from government and business practices, consumer transactions, and the digital applications sometimes referred to as the “Internet of Things.” Individuals invisibly contribute to Big Data whenever they live digital lifestyles or otherwise participate in the digital economy, such as when they shop with a credit card, get treated at a hospital, apply …


Modern-Day Monitorships, Veronica Root Jun 2016

Modern-Day Monitorships, Veronica Root

Veronica Root

When a sexual abuse scandal rocked Penn State, when Apple engaged in anticompetitive behavior, and when servicers like Bank of America improperly foreclosed upon hundreds of thousands of homeowners, each organization entered into a Modern-Day Monitorship. Modern-Day Monitorships are utilized in an array of contexts to assist in widely varying remediation efforts. They provide outsiders a unique source of information about the efficacy of the tarnished organization’s efforts to remediate misconduct. Yet despite their use in high-profile and serious matters of organizational wrongdoing, they are not an outgrowth of careful study and deliberate planning. Instead, Modern-Day Monitorships have been employed …


Need For Informed Consent In The Age Of Ubiquitous Human Testing, Caitlyn Kuhs Jan 2016

Need For Informed Consent In The Age Of Ubiquitous Human Testing, Caitlyn Kuhs

Loyola of Los Angeles Law Review

No abstract provided.


Modern-Day Monitorships, Veronica Root Jan 2016

Modern-Day Monitorships, Veronica Root

Journal Articles

When a sexual abuse scandal rocked Penn State, when Apple engaged in anticompetitive behavior, and when servicers like Bank of America improperly foreclosed upon hundreds of thousands of homeowners, each organization entered into a Modern-Day Monitorship. Modern-Day Monitorships are utilized in an array of contexts to assist in widely varying remediation efforts. They provide outsiders a unique source of information about the efficacy of the tarnished organization’s efforts to remediate misconduct. Yet despite their use in high-profile and serious matters of organizational wrongdoing, they are not an outgrowth of careful study and deliberate planning. Instead, Modern-Day Monitorships have been employed …


An Ethical Duty To Protect One’S Own Information Privacy?, Anita L. Allen Jan 2013

An Ethical Duty To Protect One’S Own Information Privacy?, Anita L. Allen

All Faculty Scholarship

People freely disclose vast quantities of personal and personally identifiable information. The central question of this Meador Lecture in Morality is whether they have a moral (or ethical) obligation (or duty) to withhold information about themselves or otherwise to protect information about themselves from disclosure. Moreover, could protecting one’s own information privacy be called for by important moral virtues, as well as obligations or duties? Safeguarding others’ privacy is widely understood to be a responsibility of government, business, and individuals. The “virtue” of fairness and the “duty” or “obligation” of respect for persons arguably ground other-regarding responsibilities of confidentiality and …


Search, Seizure, And Immunity: Second-Order Normative Authority And Rights, Stephen E. Henderson, Kelly Sorensen Dec 2012

Search, Seizure, And Immunity: Second-Order Normative Authority And Rights, Stephen E. Henderson, Kelly Sorensen

Stephen E Henderson

A paradigmatic aspect of a paradigmatic kind of right is that the rights holder is the only one who can alienate it. When individuals waive rights, the normative source of that waiving is normally taken to be the individual herself. This moral feature—immunity—is usually in the background of discussions about rights. We bring it into the foreground here, with specific attention to a recent U.S. Supreme Court decision, Kentucky v. King (2011), concerning search and seizure rights. An entailment of the Court’s decision is that, at least in some cases, a right can be removed by the intentional actions of …


Legal And Ethical Implications Of Corporate Social Networks, Gundars Kaupins, Susan Park Jun 2010

Legal And Ethical Implications Of Corporate Social Networks, Gundars Kaupins, Susan Park

Management Faculty Publications and Presentations

Corporate social networking sites provide employees and employers with considerable opportunity to share information and become friends. Unfortunately, American laws do not directly address social networking site usage. The National Labor Relations Act, civil rights laws, and various common law doctrines such as employment at-will and defamation provide the pattern for future social networking laws. Ethical considerations such as productivity, security, goodwill, privacy, accuracy, and discipline fairness also affect future laws. Corporate policies on corporate social networking should balance the employer‘s and employee‘s interests. Existing laws and ethical issues associated with social networking should impact social networking policies related to …


Access To Medical Records For Research Purposes: Varying Perceptions Across Research Ethics Boards, Donald Willison, Claudia Emerson, Karen Szala-Meneok, Elaine Gibson, Lisa Schwartz, Karen Weisbaum, François Fournier, Kevin Brazil, Michael Coughlin Jan 2008

Access To Medical Records For Research Purposes: Varying Perceptions Across Research Ethics Boards, Donald Willison, Claudia Emerson, Karen Szala-Meneok, Elaine Gibson, Lisa Schwartz, Karen Weisbaum, François Fournier, Kevin Brazil, Michael Coughlin

Articles, Book Chapters, & Popular Press

Variation across research ethics boards (REBs) in conditions placed on access to medical records for research purposes raises concerns around negative impacts on research quality and on human subject protection, including privacy. Aim: To study variation in REB consent requirements for retrospective chart review and who may have access to the medical record for data abstraction. Methods: Thirty 90-min face-to-face interviews were conducted with REB chairs and administrators affiliated with faculties of medicine in Canadian universities, using structured questions around a case study with open-ended responses. Interviews were recorded, transcribed and coded manually. Results: Fourteen sites (47%) required individual patient …


Some Ethical Reflections On Cyberstalking, Frances Grodzinsky, Herman T. Tavani Mar 2002

Some Ethical Reflections On Cyberstalking, Frances Grodzinsky, Herman T. Tavani

School of Computer Science & Engineering Faculty Publications

The present study examines a range of moral issues associated with recent cyberstalking cases. Particular attention is centered on the Amy Boyer/ Liam Youens case of cyberstalking, which raises a host of considerations that we believe have a significant impact for ethical behavior on the Internet. Among the questions we consider are those having to do with personal privacy and the use of certain kinds of Internet search facilities to stalk individuals in cyberspace. Also considered are questions having to do with legal liability and (possible) moral responsibility that Internet Service Providers (ISPs) have for stalking crimes that occur in …