Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Law

Data Transfers After Schrems Ii: The Eu-Us Disagreements Over Data Privacy And National Security, Monika Zalnieriute Jan 2022

Data Transfers After Schrems Ii: The Eu-Us Disagreements Over Data Privacy And National Security, Monika Zalnieriute

Vanderbilt Journal of Transnational Law

In the long-awaited Schrems II decision, the Court of Justice of the European Union (CJEU) took a radical, although not an unexpected, step in invalidating the Privacy Shield Agreement, which facilitated data transfers between the European Union and the United States. Schrems II illuminates long-lasting international disagreements between the EU and the United States over data protection, national security, and the fundamental differences between the public and private approaches to the protection of human rights in the data-driven economy and modern state. This Article approaches the decision via an interdisciplinary lens of international law and international relations and situates it …


Brain-Computer-Interfacing & Respondeat Superior: Algorithmic Decisions, Manipulation, And Accountability In Armed Conflict, Salahudin Ali Jan 2021

Brain-Computer-Interfacing & Respondeat Superior: Algorithmic Decisions, Manipulation, And Accountability In Armed Conflict, Salahudin Ali

Catholic University Journal of Law and Technology

This article examines the impact that brain-computer-interfacing platforms will have on the international law of armed conflict’s respondeat superior legal regime. Major Ali argues that the connection between the human brain and this nascent technology’s underlying technology of artificial intelligence and machine learning will serve as a disruptor to the traditional mental prerequisites required to impart culpability and liability on commanders for actions of their troops. Anticipating that BCI will become increasingly ubiquitous, Major Ali’s article offers frameworks for solution to BCI’s disruptive potential to the internal law of armed conflict.


Meaningful Choice: A History Of Consent And Alternatives To The Consent Myth, Charlotte A. Tschider Jan 2021

Meaningful Choice: A History Of Consent And Alternatives To The Consent Myth, Charlotte A. Tschider

Faculty Publications & Other Works

Although the first legal conceptions of commercial privacy were identified in Samuel Warren and Louis Brandeis’s foundational 1890 article, The Right to Privacy, conceptually, privacy has existed since as early as 1127 as a natural concern when navigating between personal and commercial spheres of life. As an extension of contract and tort law, two common relational legal models, U.S. privacy law emerged to buoy engagement in commercial enterprise, borrowing known legal conventions like consent and assent. Historically, however, international legal privacy frameworks involving consent ultimately diverged, with the European Union taking a more expansive view of legal justification for processing …


Controversy Over Information Privacy Arising From The Taiwan National Health Insurance Database Examining The Taiwan Taipei High Administrative Court Judgement No. 102-Su-36 (Tsai V. Nhia), Chen-Hung Chang Aug 2016

Controversy Over Information Privacy Arising From The Taiwan National Health Insurance Database Examining The Taiwan Taipei High Administrative Court Judgement No. 102-Su-36 (Tsai V. Nhia), Chen-Hung Chang

Pace International Law Review

This article examines the limitations of the application of traditional information privacy theory to disputes relating to modern technologies. If information privacy is understood as an individual’s right to full control over his information, activities involving the collection, process and use of personal data cannot be conducted without the data subject’s consent because his privacy rights would be affected as a result of such activities. Instead of the privacy interest approach, this article introduces a privacy harm approach to reconcile the defects of traditional privacy theory. The privacy interest approach helps identify situations in which an individual’s information privacy conflicts …


Against Data Exceptionalism, Andrew Keane Woods Apr 2016

Against Data Exceptionalism, Andrew Keane Woods

Law Faculty Scholarly Articles

One of the great regulatory challenges of the Internet era—indeed, one of today's most pressing privacy questions—is how to define the limits of government access to personal data stored in the cloud. This is particularly true today because the cloud has gone global, raising a number of questions about the proper reach of one state's authority over cloud-based data. The prevailing response to these questions by scholars, practitioners, and major Internet companies like Google and Facebook has been to argue that data is different. Data is “unterritorial,” they argue, and therefore incompatible with existing territorial notions of jurisdiction. This Article …


Submarine Cables, Cybersecurity And International Law: An Intersectional Analysis, Tara Davenport Dec 2015

Submarine Cables, Cybersecurity And International Law: An Intersectional Analysis, Tara Davenport

Catholic University Journal of Law and Technology

No abstract provided.


The Cycles Of Global Telecommunication Censorship And Surveillance, Jonathon Penney Jan 2015

The Cycles Of Global Telecommunication Censorship And Surveillance, Jonathon Penney

Articles, Book Chapters, & Popular Press

Internet censorship and surveillance is on the rise globally and cyber-warfare increasing in scope and intensity. To help understand these new threats commentators have grasped at historical analogies often with little regard for historical complexity or international perspective. Unfortunately, helpful new works on telecommunications history have focused primarily on U.S. history with little focus on international developments. There is thus a need for further internationally oriented investigation of telecommunications technologies, and their history. This essay attempts to help fill that void, drawing on case studies wherein global telecommunications technologies have been disrupted or censored — telegram censorship and surveillance, high …


Walled Gardens Of Privacy Or “Binding Corporate Rules?”: A Critical Look At International Protection Of Online Privacy, Joanna Kulesza Jul 2012

Walled Gardens Of Privacy Or “Binding Corporate Rules?”: A Critical Look At International Protection Of Online Privacy, Joanna Kulesza

University of Arkansas at Little Rock Law Review

A growing concern in the era of cloud computing is protecting Internet users' privacy. This concern is compounded by the fact that there are no effective international solutions. This article considers the latest European Union (EU) proposed development in this area – a regulatory model based on amended Binding Corporate Rules (BCR) – as introduced by the EU Justice Commissioner. These planned changes would have worldwide effects on international companies' online activities in transboundary cyberspace.

After providing a background on the concept of defining privacy in general, the article describes the BCR proposal, and proceeds to consider the likelihood of …


Communications Disruption And Censorship Under International Law: History Lessons, Jonathon Penney Jan 2012

Communications Disruption And Censorship Under International Law: History Lessons, Jonathon Penney

Articles, Book Chapters, & Popular Press

With Internet censorship on the rise around the world, a variety of tools have proliferated to assist Internet users to circumvent such censorship. However, there are few studies examining the implications of censorship circumvention under international law, and its related politics. This paper aims to help fill some of that void, with an examination of case studies wherein global communications technologies have been disrupted or censored — telegram cable cutting and censorship, high frequency radio jamming, and direct broadcast satellite blocking — and how the world community responded to that disruption or censorship through international law and law making. In …


The European Union Data Privacy Directive And International Relations, Steven R. Salbu Jan 2002

The European Union Data Privacy Directive And International Relations, Steven R. Salbu

Vanderbilt Journal of Transnational Law

This Article explores the European Union Data Privacy Directive and its impact upon international relations. Part II provides a background upon which the Privacy Directive is built. In Part III, the Article confronts the differences between how the United States and its European counterparts address privacy issues generally. Part IV analyzes the Privacy Directive in detail, while Part V explores possible effects that the Privacy Directive might have on international relations.


Polish Communications Law: Telecommunications Takes Off In Transition Countries But At What Price Are They Becoming Wired?, Jennifer L. Feltham Jan 2000

Polish Communications Law: Telecommunications Takes Off In Transition Countries But At What Price Are They Becoming Wired?, Jennifer L. Feltham

Vanderbilt Journal of Transnational Law

Internationally, the urge to expand and improve telecommunications services is spreading. Transition countries, attempting the leap from Third World status to becoming world leaders, have caught the fever and have attempted to reform their regulations governing telecommunications. In large part these laws have induced slow liberalization of the communications sector with an intrusive regulatory agency guarding every step taken towards privatization. The World Trade Organization's General Agreement on Trade in Services (GATS) encourages transition countries to use privatization as a way to increase funding for communications equipment. Many transition countries signed the GATS agreement in the hope of attracting international …