Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Privacy Law

Facebook

Institution
Publication Year
Publication
Publication Type

Articles 1 - 30 of 32

Full-Text Articles in Law

About-Face: How Facebook’S Restrictions On User Posts Could Violate Antitrust Law, Efrem Berk Apr 2023

About-Face: How Facebook’S Restrictions On User Posts Could Violate Antitrust Law, Efrem Berk

Northwestern Journal of Technology and Intellectual Property

This Note examines whether Facebook’s restrictions on its users’ posts are subject to Sherman Act § 2. This Note looks at the economic activity generated by social media activity and argues that posts are commerce. While this piece finds that current antitrust jurisprudence likely favors Facebook, an alternative approach sought by some antitrust scholars could influence judges to preclude the platform’s restrictions.


Layered Fiduciaries In The Information Age, Zhaoyi Li Jan 2023

Layered Fiduciaries In The Information Age, Zhaoyi Li

Indiana Law Journal

Technology companies such as Facebook have long been criticized for abusing customers’ personal information and monetizing user data in a manner contrary to customer expectations. Some commentators suggest fiduciary law could be used to restrict how these companies use their customers’ data.1 Under this framework, a new member of the fiduciary family called the “information fiduciary” was born. The concept of an information fiduciary is that a company providing network services to “collect, analyze, use, sell, and distribute personal information” owes customers and end-users a fiduciary duty to use the collected data to promote their interests, thereby assuming fiduciary liability …


Learning From Mistakes: A Guide To Expanding The Oversight Board, Kevin Frazier Jan 2023

Learning From Mistakes: A Guide To Expanding The Oversight Board, Kevin Frazier

Catholic University Journal of Law and Technology

More than 4.4 billion people use social media. A few platforms attract a significant number of those users—for example, 2.9 billion people use Facebook, 2.3 billion use YouTube, and 1.2 billion use WeChat. How these major platforms govern themselves with respect to content moderation has an impact on billions of users and may lead to policy changes across other platforms that affect billions more. That is why it is so important to analyze Meta’s Oversight Board—an independent body created for the purpose of “promot[ing] free expression by making principled, independent decisions regarding content on Facebook and Instagram by issuing recommendations …


The Oslo Accords: A Modern-Day Story Of Occupation Told Through Violations Of The Right To Freedom Of Privacy, Catherine Demetrovich Jan 2022

The Oslo Accords: A Modern-Day Story Of Occupation Told Through Violations Of The Right To Freedom Of Privacy, Catherine Demetrovich

Indiana Law Journal

The Israeli-Palestinian conflict began in the early 1900s when the disputed land, what is now the West Bank and the Gaza Strip, fell under British rule. After the Six- Day War in 1967, Israel took control of the West Bank, Golan Heights, and the Gaza Strip. Since then, tensions between Israel and Palestine have continued to grow. This Note explores a modern-day occupation question: Israel’s control over Palestine’s information and communication technology (ICT) sector. Along with privacy and human rights violations, Israel’s control is in direct violation of the Oslo Accords— guaranteeing Palestinians limited self-governance in Gaza and the West …


Platforms, Encryption, And The Cfaa: The Case Of Whatsapp V Nso Group, Jonathon Penney, Bruce Schneier Jan 2022

Platforms, Encryption, And The Cfaa: The Case Of Whatsapp V Nso Group, Jonathon Penney, Bruce Schneier

Articles, Book Chapters, & Popular Press

End-to-end encryption technology has gone mainstream. But this wider use has led hackers, cybercriminals, foreign governments, and other threat actors to employ creative and novel attacks to compromise or workaround these protections, raising important questions as to how the Computer Fraud and Abuse Act (CFAA), the primary federal anti-hacking statute, is best applied to these new encryption implementations. Now, after the Supreme Court recently narrowed the CFAA’s scope in Van Buren and suggested it favors a code-based approach to liability under the statute, understanding how best to theorize sophisticated code-based access barriers like end-to-end encryption, and their circumvention, is now …


Private Largess In The Digital Age: Privacy In Reich's The New Property, Raymond H. Brescia Jan 2021

Private Largess In The Digital Age: Privacy In Reich's The New Property, Raymond H. Brescia

Touro Law Review

No abstract provided.


Sharenting And The (Potential) Right To Be Forgotten, Keltie Haley Jul 2020

Sharenting And The (Potential) Right To Be Forgotten, Keltie Haley

Indiana Law Journal

Part I of this Note serves as an evaluation of parental use of social media and

further seeks to draw attention to the social and developmental impact parental

oversharing can have on children. Part II examines the tension between parents’

constitutional rights to direct the upbringing of their children, as well as their First

Amendment interest in online expression, and their children’s interest in personal

data security and privacy. Part III provides an overview of the European Union’s

right to be forgotten framework in the sharenting context and considers the

plausibility of implementing such a framework in the United States. …


Bad Actors: Authenticity, Inauthenticity, Speech, And Capitalism, Sarah C. Haan Jan 2020

Bad Actors: Authenticity, Inauthenticity, Speech, And Capitalism, Sarah C. Haan

Scholarly Articles

“Authenticity” has evolved into an important value that guides social media companies’ regulation of online speech. It is enforced through rules and practices that include real-name policies, Terms of Service requiring users to present only accurate information about themselves, community guidelines that prohibit “coordinated inauthentic behavior,” verification practices, product features, and more.

This Article critically examines authenticity regulation by the social media industry, including companies’ claims that authenticity is a moral virtue, an expressive value, and a pragmatic necessity for online communication. It explains how authenticity regulation provides economic value to companies engaged in “information capitalism,” “data capitalism,” and “surveillance …


Symposium: The California Consumer Privacy Act, Margot Kaminski, Jacob Snow, Felix Wu, Justin Hughes Jan 2020

Symposium: The California Consumer Privacy Act, Margot Kaminski, Jacob Snow, Felix Wu, Justin Hughes

Publications

This symposium discussion of the Loyola of Los Angeles Law Review focuses on the newly enacted California Consumer Privacy Act (CPPA), a statute signed into state law by then-Governor Jerry Brown on June 28, 2018 and effective as of January 1, 2020. The panel was held on February 20, 2020.

The panelists discuss how businesses are responding to the new law and obstacles for consumers to make effective use of the law’s protections and rights. Most importantly, the panelists grapple with questions courts are likely to have to address, including the definition of personal information under the CCPA, the application …


Censorship, Free Speech & Facebook: Applying The First Amendment To Social Media Platforms Via The Public Function Exception, Matthew P. Hooker Dec 2019

Censorship, Free Speech & Facebook: Applying The First Amendment To Social Media Platforms Via The Public Function Exception, Matthew P. Hooker

Washington Journal of Law, Technology & Arts

Society has a love-hate relationship with social media. Thanks to social media platforms, the world is more connected than ever before. But with the ever-growing dominance of social media there have come a mass of challenges. What is okay to post? What isn't? And who or what should be regulating those standards? Platforms are now constantly criticized for their content regulation policies, sometimes because they are viewed as too harsh and other times because they are characterized as too lax. And naturally, the First Amendment quickly enters the conversation. Should social media platforms be subject to the First Amendment? Can—or …


Privacy, Freedom, And Technology—Or “How Did We Get Into This Mess?”, Alex Alben Apr 2019

Privacy, Freedom, And Technology—Or “How Did We Get Into This Mess?”, Alex Alben

Seattle University Law Review

Can we live in a free society without personal privacy? The question is worth pondering, not only in light of the ongoing debate about government surveillance of private communications, but also because new technologies continue to erode the boundaries of our personal space. This Article examines our loss of freedom in a variety of disparate contexts, all connected by the thread of erosion of personal privacy. In the scenarios explored here, privacy reducing activities vary from government surveillance, personal stalking conducted by individuals, and profiling by data-driven corporations, to political actors manipulating social media platforms. In each case, new technologies …


Privacy In Gaming, N. Cameron Russell, Joel R. Reidenberg, Sumyung Moon Jan 2019

Privacy In Gaming, N. Cameron Russell, Joel R. Reidenberg, Sumyung Moon

Fordham Intellectual Property, Media and Entertainment Law Journal

Video game platforms and business models are increasingly built on collection, use, and sharing of personal information for purposes of both functionality and revenue. This paper examines privacy issues and explores data practices, technical specifications, and policy statements of the most popular games and gaming platforms to provide an overview of the current privacy legal landscape for mobile gaming, console gaming, and virtual reality devices. The research observes how modern gaming aligns with information privacy notions and norms and how data practices and technologies specific to gaming may affect users and, in particular, child gamers.

After objectively selecting and analyzing …


Commercial Clicks: Advertising Algorithms As Commercial Speech, Kerri A. Thompson Jan 2019

Commercial Clicks: Advertising Algorithms As Commercial Speech, Kerri A. Thompson

Vanderbilt Journal of Entertainment & Technology Law

Congressional hearings have finally called for the "right regulation" of social media platforms. The First Amendment, however, has shielded internet companies from regulation since the birth of social media. Even if Congress enacts legislation now, internet companies will be able to defend against the "wrong regulation" by claiming the regulation unconstitutionally limits their freedom of speech. This Article uses Facebook's advertising algorithms as a case study of how Congress can properly regulate Facebook by analyzing the advertising algorithms as commercial speech, which receives less protection under First Amendment jurisprudence. In doing so, Congress can protect the strong public interest in …


Facebook V. Sullivan: Public Figures And Newsworthiness In Online Speech, Thomas E. Kadri, Kate Klonick Jan 2019

Facebook V. Sullivan: Public Figures And Newsworthiness In Online Speech, Thomas E. Kadri, Kate Klonick

Faculty Publications

In the United States, there are now two systems to adjudicate disputes about harmful speech. The first is older and more established: the legal system in which judges apply constitutional law to limit tort claims alleging injuries caused by speech. The second is newer and less familiar: the content-moderation system in which platforms like Facebook implement the rules that govern online speech. These platforms are not bound by the First Amendment. But, as it turns out, they rely on many of the tools used by courts to resolve tensions between regulating harmful speech and preserving free expression—particularly the entangled concepts …


From Innovation To Abuse: Does The Internet Still Need Section 230 Immunity?, Benjamin Volpe Jan 2019

From Innovation To Abuse: Does The Internet Still Need Section 230 Immunity?, Benjamin Volpe

Catholic University Law Review

In 1996, Congress passed the Communications Decency Act to allow the screening of offensive material from the internet, while preserving the continued development of the internet economy without burdensome regulation. However, for years, online intermediaries have successfully used the Act as a shield from liability when third parties use their online services to commit tortious or criminal acts. This Comment argues that a wholly-unregulated internet is no longer necessary to preserve the once-fledgling internet economy. After evaluating various approaches to intermediary liability, this Comment also argues that Congress should take a more comprehensive look at consumer protection online and establish …


The First Amendment In The Second Gilded Age, Jack M. Balkin Dec 2018

The First Amendment In The Second Gilded Age, Jack M. Balkin

Buffalo Law Review

How do we pay for the digital public sphere? In the Second Gilded Age, the answer is primarily through digital surveillance and through finding ever new ways to make money out of personal data. Digital capitalism in the Second Gilded Age features an implicit bargain: a seemingly unlimited freedom to speak in exchange for the right to surveil and manipulate end users.To protect freedom of speech in the Second Gilded Age we must distinguish the values of free speech from the judicially created doctrines of the First Amendment. That is because the practical freedom to speak online depends on a …


A Status Update For Texas Voir Dire: Advocating For Pre-Trial Internet Investigation Of Prospective Jurors, Luke A. Harle Jun 2018

A Status Update For Texas Voir Dire: Advocating For Pre-Trial Internet Investigation Of Prospective Jurors, Luke A. Harle

St. Mary's Law Journal

The Internet provides trial attorneys an additional tool to investigate the backgrounds of prospective jurors during voir dire. Online searches of a person’s name and social media accounts can reveal information that could be used as grounds for a challenge for cause or to facilitate intelligent use of peremptory strikes. Texas lawmakers have not yet provided any official guidance as to whether attorneys can investigate prospective jurors online or how they might do so, should it be allowed. Texas’s current voir dire structure, judicial opinions, and ethics opinions, together, support the notion that Texas trial attorneys should be given opportunities …


Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen Dec 2016

Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen

All Faculty Scholarship

Big Data is the vast quantities of information amenable to large-scale collection, storage, and analysis. Using such data, companies and researchers can deploy complex algorithms and artificial intelligence technologies to reveal otherwise unascertained patterns, links, behaviors, trends, identities, and practical knowledge. The information that comprises Big Data arises from government and business practices, consumer transactions, and the digital applications sometimes referred to as the “Internet of Things.” Individuals invisibly contribute to Big Data whenever they live digital lifestyles or otherwise participate in the digital economy, such as when they shop with a credit card, get treated at a hospital, apply …


Need For Informed Consent In The Age Of Ubiquitous Human Testing, Caitlyn Kuhs Jan 2016

Need For Informed Consent In The Age Of Ubiquitous Human Testing, Caitlyn Kuhs

Loyola of Los Angeles Law Review

No abstract provided.


Here We Are Now, Entertain Us: Defining The Line Between Personal And Professional Context On Social Media, Raizel Liebler, Keidra Chaney May 2015

Here We Are Now, Entertain Us: Defining The Line Between Personal And Professional Context On Social Media, Raizel Liebler, Keidra Chaney

Pace Law Review

Social media platforms such as Facebook, Twitter, and Instagram allow individuals and companies to connect directly and regularly with an audience of peers or with the public at large. These websites combine the audience-building platforms of mass media with the personal data and relationships of in-person social networks. Due to a combination of evolving user activity and frequent updates to functionality and user features, social media tools blur the line of whether a speaker is perceived as speaking to a specific and presumed private audience, a public expression of one’s own personal views, or a representative viewpoint of an entire …


Interview On The Black Box Society, Lawrence Joseph, Frank A. Pasquale Sep 2014

Interview On The Black Box Society, Lawrence Joseph, Frank A. Pasquale

Faculty Scholarship

Hidden algorithms drive decisions at major Silicon Valley and Wall Street firms. Thanks to automation, those firms can approve credit, rank websites, and make myriad other decisions instantaneously. But what are the costs of their methods? And what exactly are they doing with their digital profiles of us?

Leaks, whistleblowers, and legal disputes have shed new light on corporate surveillance and the automated judgments it enables. Self-serving and reckless behavior is surprisingly common, and easy to hide in code protected by legal and real secrecy. Even after billions of dollars of fines have been levied, underfunded regulators may have only …


Digital Security In The Expository Society: Spectacle, Surveillance, And Exhibition In The Neoliberal Age Of Big Data, Bernard E. Harcourt Jan 2014

Digital Security In The Expository Society: Spectacle, Surveillance, And Exhibition In The Neoliberal Age Of Big Data, Bernard E. Harcourt

Faculty Scholarship

In 1827, Nicolaus Heinrich Julius, a professor at the University of Berlin, identified an important architectural mutation in nineteenth-century society that reflected a deep disruption in our technologies of knowledge and a profound transformation in relations of power across society: Antiquity, Julius observed, had discovered the architectural form of the spectacle; but modern times had operated a fundamental shift from spectacle to surveillance. Michel Foucault would elaborate this insight in his 1973 Collège de France lectures on The Punitive Society, where he would declare: “[T]his is precisely what happens in the modern era: the reversal of the spectacle into surveillance…. …


Should The Default Be "Social"? Canada's Pushback Against Oversharing By Facebook, Karen Tanenbaum Oct 2013

Should The Default Be "Social"? Canada's Pushback Against Oversharing By Facebook, Karen Tanenbaum

Georgia Journal of International & Comparative Law

No abstract provided.


Identity Theft On Social Networking Sites: Developing Issues Of Internet Impersonation, Maksim Reznik Oct 2013

Identity Theft On Social Networking Sites: Developing Issues Of Internet Impersonation, Maksim Reznik

Touro Law Review

This Comment focuses on the dangers of social media sites when a person gains access to another's online account through two different methods: (1) stealing the third party's password, or (2) creating a completely fake profile and subsequently impersonating that person.


An Ethical Duty To Protect One’S Own Information Privacy?, Anita L. Allen Jan 2013

An Ethical Duty To Protect One’S Own Information Privacy?, Anita L. Allen

All Faculty Scholarship

People freely disclose vast quantities of personal and personally identifiable information. The central question of this Meador Lecture in Morality is whether they have a moral (or ethical) obligation (or duty) to withhold information about themselves or otherwise to protect information about themselves from disclosure. Moreover, could protecting one’s own information privacy be called for by important moral virtues, as well as obligations or duties? Safeguarding others’ privacy is widely understood to be a responsibility of government, business, and individuals. The “virtue” of fairness and the “duty” or “obligation” of respect for persons arguably ground other-regarding responsibilities of confidentiality and …


Privacy For Social Networking, Connie Davis Powell Jul 2012

Privacy For Social Networking, Connie Davis Powell

University of Arkansas at Little Rock Law Review

This article begins by considering the emergence of social networks as a major medium of communication and posits that the success of social networks is attributable to their users' willingness to share their information. Next, the article considers the expectation of privacy for users of social networks and whether such expectation is reasonable. In particular, the article discusses the privacy policies and legal terms governing the use of social networks, and tracks the evolution of such terms and policies as they slowly whittle away user control over time. The article then discusses public outcry regarding the disclosure of information contrary …


The Need To Prevent Employers From Accessing Private Social Network Profiles, Brett Novick Jan 2012

The Need To Prevent Employers From Accessing Private Social Network Profiles, Brett Novick

University of Michigan Journal of Law Reform Caveat

In March 2012, social network privacy became a conversation topic after news reports of the story of Justin Bassett, a job applicant who withdrew his application in the middle of an interview when the interviewer asked him for the username and password of his private Facebook account. Although the issue has received much attention from the public and media, the Department of Justice (DOJ) has stated that it has no interest in prosecuting employers for asking for social networking account information. Fortunately, legislation that would make it illegal for employers to ask for the username and passwords for social networking …


Privacy Policies, Terms Of Service, And Ftc Enforcement: Broadening Unfairness Regulation For A New Era, G. S. Hans Jan 2012

Privacy Policies, Terms Of Service, And Ftc Enforcement: Broadening Unfairness Regulation For A New Era, G. S. Hans

Michigan Telecommunications & Technology Law Review

This Note examines website privacy policies in the context of FTC regulation. The relevant portion of Section 5 of the Federal Trade Commission Act, 15 U.S.C. § 45(a), uses the following language to define the scope of the agency's regulatory authority: "Unfair methods of competition in or affecting commerce, and unfair or deceptive acts or practices in or affecting commerce, are hereby declared unlawful." Specifically, this Note analyzes the FTC's power to regulate unfair practices (referred to as the FTC's "unfairness power") granted by Section 5, and also discusses the deception prong of Section 5, which allows the agency to …


Expectations Of Privacy In Social Media, Stephen E. Henderson Dec 2011

Expectations Of Privacy In Social Media, Stephen E. Henderson

Stephen E Henderson

This article, which largely tracks my remarks at Mississippi College’s Social Media Symposium, examines expectations of privacy in social media such as weblogs (blogs), Facebook pages, and Twitter tweets. Social media is diverse and ever-diversifying, and while I address some of that complexity, I focus on the core functionality, which provides the groundwork for further conversation as the technology and related social norms develop. As one would expect, just as with our offline communications and other online communications, in some we have an expectation of privacy that is recognized by current law, in some we have an expectation of privacy …


Privacy As Product Safety, James Grimmelmann Jan 2010

Privacy As Product Safety, James Grimmelmann

Cornell Law Faculty Publications

Online social media confound many of our familiar expectations about privacy. Contrary to popular myth, users of social software like Facebook do care about privacy, deserve it, and have trouble securing it for themselves. Moreover, traditional database-focused privacy regulations on the Fair Information Practices model, while often worthwhile, fail to engage with the distinctively social aspects of these online services.

Instead, online privacy law should take inspiration from a perhaps surprising quarter: product-safety law. A web site that directs users' personal information in ways they don't expect is a defectively designed product, and many concepts from products liability law could …