Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication Year
- Publication
- Publication Type
Articles 1 - 17 of 17
Full-Text Articles in Law
Unavoidability In U.S. Privacy Law, Laura M. Moy
Unavoidability In U.S. Privacy Law, Laura M. Moy
Georgetown Law Faculty Publications and Other Works
Why is U.S. privacy law structured the way it is, with a series of sectoral laws rather than a cross-sectoral law or laws? Why does U.S. privacy law protect information shared in certain contexts—such as information shared with an attorney, a healthcare provider, or a financial provider—rather than particular types of information? One possibility is that sectoral laws apply to contexts in which people typically share highly “sensitive” information containing intimate secrets or with the potential to harm them financially or psychologically.
But this Article argues that there is something else at play—that in fact, an under-discussed and underappreciated factor …
Genealogy Sites And Adoptions–Connecting Families Or Ruining Them?, Taylor Bialek
Genealogy Sites And Adoptions–Connecting Families Or Ruining Them?, Taylor Bialek
Touro Law Review
No abstract provided.
Small Business Cybersecurity: A Loophole To Consumer Data, Matthew R. Espinosa
Small Business Cybersecurity: A Loophole To Consumer Data, Matthew R. Espinosa
The Scholar: St. Mary's Law Review on Race and Social Justice
Small businesses and small minority owned businesses are vital to our nation’s economy; therefore legislation, regulation, and policy has been created in order to assist them in overcoming their economic stability issues and ensure they continue to serve the communities that rely on them. However, there is not a focus on regulating nor assisting small businesses to ensure their cybersecurity standards are up to par despite them increasingly becoming a victim of cyberattacks that yield high consequences. The external oversight and assistance is necessary for small businesses due to their lack of knowledge in implementing effective cybersecurity policies, the fiscal …
Personal Data Privacy And Protective Federal Legislation: An Exploration Of Constituent Position On The Need For Legislation To Control Data Reliant Organizations Collecting And Monetizing Internet-Obtained Personal Data, Giovanni De Meo
Dissertations
In the past twenty years, the business of online personal data collection has grown at the same rapid pace as the internet itself, fostering a multibillion-dollar personal data collection and commercialization industry. Unlike many other large industries, there has been no major federal legislation enacted to monitor or control the activities of organizations dealing in this flourishing industry. The combination of these factors together with the lack of prior research encouraged this research designed to understand how much voters know about this topic and whether there is interest in seeing legislation enacted to protect individual personal data privacy.
To address …
Cloudy With A Chance Of Government Intrusion: The Third-Party Doctrine In The 21st Century, Steven Arango
Cloudy With A Chance Of Government Intrusion: The Third-Party Doctrine In The 21st Century, Steven Arango
Catholic University Law Review
Technology may be created by humans, but we are dependent on it. Look around you: what technology is near you as you read this abstract? An iPhone? A laptop? Perhaps even an Amazon Echo. What do all these devices have in common? They store data in the cloud. And this data can contain some of our most sensitive information, such as business records or medical documents.
Even if you manage this cloud storage account, the government may be able to search your data without a warrant. Federal law provides little protection for cloud stored data. And the Fourth Amendment may …
Regulation Of Algorithmic Tools In The United States, Christopher S. Yoo, Alicia Lai
Regulation Of Algorithmic Tools In The United States, Christopher S. Yoo, Alicia Lai
All Faculty Scholarship
Policymakers in the United States have just begun to address regulation of artificial intelligence technologies in recent years, gaining momentum through calls for additional research funding, piece-meal guidance, proposals, and legislation at all levels of government. This Article provides an overview of high-level federal initiatives for general artificial intelligence (AI) applications set forth by the U.S. president and responding agencies, early indications from the incoming Biden Administration, targeted federal initiatives for sector-specific AI applications, pending federal legislative proposals, and state and local initiatives. The regulation of the algorithmic ecosystem will continue to evolve as the United States continues to search …
The Right Of Publicity's Intellectual Property Turn, Jennifer E. Rothman
The Right Of Publicity's Intellectual Property Turn, Jennifer E. Rothman
All Faculty Scholarship
The Article is adapted from a keynote lecture about my book, THE RIGHT OF PUBLICITY: PRIVACY REIMAGINED FOR A PUBLIC WORLD (Harvard Univ. Press 2018), delivered at Columbia Law School for its symposium, “Owning Personality: The Expanding Right of Publicity.” The book challenges the conventional historical and theoretical understanding of the right of publicity. By uncovering the history of the right of publicity’s development, the book reveals solutions to current clashes with free speech, individual liberty, and copyright law, as well as some opportunities for better protecting privacy in the digital age.
The lecture (as adapted for this Article) explores …
The Privacy Hierarchy: A Comparative Analysis Of The Intimate Privacy Protection Act Vs. The Geolocational Privacy And Surveillance Act, Katherine A. Mitchell
The Privacy Hierarchy: A Comparative Analysis Of The Intimate Privacy Protection Act Vs. The Geolocational Privacy And Surveillance Act, Katherine A. Mitchell
University of Miami Law Review
The advent of the technological boom brought the world smartphones, social media, and Siri. These novel benefits, however, were accompanied by unchartered invasions of privacy. Congress has embarked on the seemingly endless path of protecting its constituents through civil and criminal legislation aimed at combatting such invasions. Two recent examples include the Intimate Privacy Protection Act (“IPPA”) and the Geolocational Privacy and Surveillance Act (“GPS Act”). Nonetheless, the IPPA, which was proposed to criminalize the dissemination of nonconsensual pornography, has garnered much less support—and much more criticism—than its geolocational counterpart.
This Note discusses the striking similarities of both bills, both …
Tactful Inattention: Erving Goffman, Privacy In The Digital Age, And The Virtue Of Averting One's Eyes, Elizabeth De Armond
Tactful Inattention: Erving Goffman, Privacy In The Digital Age, And The Virtue Of Averting One's Eyes, Elizabeth De Armond
St. John's Law Review
(Excerpt)
This Article suggests that we would benefit if we would protect privacy by sometimes requiring tactful inattention by potential users rather than total secrecy by the target. That is, some legal privacy protections should stop emphasizing secrecy and instead emphasize the appropriate uses of personally identifiable and often sensitive information by gelling tactful inattention into legal standards. Culturally, such an expansion may be difficult, as we tend to a “finders-keepers” attitude towards data. However, given technology’s ability to dissolve routine barriers, if we require others to leave some information out of some equations, we may be able to retain …
The Ecology Of Transparency Reloaded, Seth F. Kreimer
The Ecology Of Transparency Reloaded, Seth F. Kreimer
All Faculty Scholarship
As Justice Stewart famously observed, "[t]he Constitution itself is neither a Freedom of Information Act nor an Official Secrets Act." What the Constitution's text omits, the last two generations have embedded in "small c" constitutional law and practice in the form of the Freedom of Information Act and a series of overlapping governance reforms including Inspectors General, disclosure of political contributions, the State Department’s “Dissent Channel,” the National Archives Information Security Oversight Office, and the publication rights guaranteed by New York Times v. United States. These institutions constitute an ecology of transparency.
The late Justice Scalia argued that the …
The Right Of Publicity: Privacy Reimagined For New York?, Jennifer E. Rothman
The Right Of Publicity: Privacy Reimagined For New York?, Jennifer E. Rothman
All Faculty Scholarship
This essay is based on a featured lecture that I gave as part of the Cardozo Arts & Entertainment Law Journal’s 2 symposium on a proposed right of publicity law in New York. The essay draws from my recent book, The Right of Publicity: Privacy Reimagined for a Public World, published by Harvard University Press. Insights from the book suggest that New York should not upend more than one hundred years of established privacy law in the state, nor jeopardize its citizens’ ownership over their own names, likenesses, and voices by replacing these privacy laws with a new and independent …
Newsroom: Logan On Trump And Libel Law 01-03-2017, Roger Williams University School Of Law
Newsroom: Logan On Trump And Libel Law 01-03-2017, Roger Williams University School Of Law
Life of the Law School (1993- )
No abstract provided.
Private Law In The Gaps, Jeffrey A. Pojanowski
Private Law In The Gaps, Jeffrey A. Pojanowski
Jeffrey A. Pojanowski
Private law subjects like tort, contract, and property are traditionally taken to be at the core of the common law tradition, yet statutes increasingly intersect with these bodies of doctrine. This Article draws on recent work in private law theory and statutory interpretation to consider afresh what courts should do with private law in statutory gaps. In particular, it focuses on statutes touching on tort law, a field at the leading edge of private law theory. This Article's analysis unsettles some conventional wisdom about the intersection of private law and statutes. Many leading tort scholars and jurists embrace a regulatory …
Wired Identities: Retention And Destruction Of Personal Health Information In An Electronic World, Elaine Gibson
Wired Identities: Retention And Destruction Of Personal Health Information In An Electronic World, Elaine Gibson
Dalhousie Law Journal
This article examines the issue of the retention and destruction of personal health information. While legislation in Canada shows some attention to the issue of retaining health records, very little consideration has been given to their destruction. As technological advances have made indefinite retention feasible, serious privacy issues are now being raised by the lack of a standard related to the destruction of health records. The author argues that this issue needs to be explicitly addressed. The author analyzes this problem by looking at issues of autonomy, public good, inequality, and privacy as a social good before offering thoughts on …
Minding Your Meds: Balancing The Needs For Patient Privacy And Law Enforcement In Prescription Drug Monitoring Programs, Devon T. Unger
Minding Your Meds: Balancing The Needs For Patient Privacy And Law Enforcement In Prescription Drug Monitoring Programs, Devon T. Unger
West Virginia Law Review
No abstract provided.
Private Law In The Gaps, Jeffrey A. Pojanowski
Private Law In The Gaps, Jeffrey A. Pojanowski
Journal Articles
Private law subjects like tort, contract, and property are traditionally taken to be at the core of the common law tradition, yet statutes increasingly intersect with these bodies of doctrine. This Article draws on recent work in private law theory and statutory interpretation to consider afresh what courts should do with private law in statutory gaps. In particular, it focuses on statutes touching on tort law, a field at the leading edge of private law theory. This Article's analysis unsettles some conventional wisdom about the intersection of private law and statutes. Many leading tort scholars and jurists embrace a regulatory …
The Personal Information Protection And Electronic Documents Act: A Lost Opportunity To Democratize Canada's "Technological Society", Tina Piper
Dalhousie Law Journal
Bill C-6, more recently known as the Personal Information Protection and Electronic Documents Act, is promoted by the Canadian government as privacy legislation to protect Canadians' personal information. This paper explores that characterization and concludes that it is inaccurate and misleading. The problems that motivated a response by Parliament are the proliferation and commercial importance of personal information, concerns Canadians have about its uncontrolled use by the private sector and the inadequacy of existing law to address those concerns. However, the Act has not responded to these problems. There are several reasons for this, primarily the disproportionate and antidemocratic importance …