Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of Pennsylvania Carey Law School (14)
- Selected Works (7)
- Seattle University School of Law (5)
- Maurer School of Law: Indiana University (4)
- University of Maine School of Law (4)
-
- Notre Dame Law School (3)
- American University Washington College of Law (1)
- Fordham Law School (1)
- Georgia State University College of Law (1)
- Marquette University Law School (1)
- Pepperdine University (1)
- Schulich School of Law, Dalhousie University (1)
- The Catholic University of America, Columbus School of Law (1)
- University of Colorado Law School (1)
- University of the District of Columbia School of Law (1)
- Publication Year
- Publication
-
- All Faculty Scholarship (14)
- Seattle University Law Review (5)
- Maine Law Review (4)
- Journal Articles (3)
- Indiana Law Journal (2)
-
- Jennifer Daskal (2)
- Sandra S. Klein (2)
- Articles by Maurer Faculty (1)
- Articles in Law Reviews & Other Academic Journals (1)
- Canadian Journal of Law and Technology (1)
- Catholic University Journal of Law and Technology (1)
- Fordham Journal of Corporate & Financial Law (1)
- Georgia State University Law Review (1)
- Indiana Journal of Global Legal Studies (1)
- Jon L. Mills (1)
- Journal of Legislation (1)
- Marquette Intellectual Property Law Review (1)
- Pepperdine Law Review (1)
- Raizel Liebler (1)
- Teresa M. G. Da Cunha Lopes (1)
- University of Colorado Law Review (1)
- Publication Type
- File Type
Articles 1 - 30 of 46
Full-Text Articles in Law
Privacy Purgatory: Why The United States Needs A Comprehensive Federal Data Privacy Law, Emily Stackhouse Taetzsch
Privacy Purgatory: Why The United States Needs A Comprehensive Federal Data Privacy Law, Emily Stackhouse Taetzsch
Journal of Legislation
No abstract provided.
Exploring Financial Data Protection And Civil Liberties In An Evolved Digital Age, Amanda Lindner
Exploring Financial Data Protection And Civil Liberties In An Evolved Digital Age, Amanda Lindner
Fordham Journal of Corporate & Financial Law
There is no comprehensive financial privacy law that can protect consumers from a company’s collection sharing and selling of consumer data. The most recent federal financial privacy law, the Gramm-Leach-Bliley Act (“GLBA”), was enacted by Congress over 20 years ago. Vast technological and financial changes have occurred since 1999, and financial privacy law is due for an upgrade.
As a result, loopholes exist where companies can share financial data without being subject to laws or regulations. Additionally, federal financial privacy related laws provide little to no recourse for consumers to self-remediate with litigation, also known as a private right of …
Securing Patent Law, Charles Duan
Securing Patent Law, Charles Duan
Articles in Law Reviews & Other Academic Journals
A vigorous conversation about intellectual property rights and national security has largely focused on the defense role of those rights, as tools for responding to acts of foreign infringement. But intellectual property, and patents in particular, also play an arguably more important offense role. Foreign competitor nations can obtain and assert U.S. patents against U.S. firms and creators. Use of patents as an offense strategy can be strategically coordinated to stymie domestic innovation and technological progress. This Essay considers current and possible future practices of patent exploitation in this offense setting, with a particular focus on China given the nature …
The Law Of Employee Data: Privacy, Property, Governance, Matthew T. Bodie
The Law Of Employee Data: Privacy, Property, Governance, Matthew T. Bodie
Indiana Law Journal
The availability of data related to the employment relationship has ballooned into an unruly mass of performance metrics, personal characteristics, biometric recordings, and creative output. The law governing this collection of information has been awkwardly split between privacy regulations and intellectual property rights, with employees generally losing on both ends. This Article rejects a binary approach that either carves out private spaces ineffectually or renders data into isolated pieces of ownership. Instead, the law should implement a hybrid system that provides workers with continuing input and control without blocking efforts at joint production. In addition, employers should have fiduciary responsibilities …
Narrowing Data Protection's Enforcement Gap, Filippo Lancieri
Narrowing Data Protection's Enforcement Gap, Filippo Lancieri
Maine Law Review
The rise of data protection laws is one of the most profound legal changes of this century. Yet, despite their nominal force and widespread adoption, available data indicates that these laws recurrently suffer from an enforcement gap—that is, a wide disparity between the stated protections on the books and the reality of how companies respond to them on the ground. Indeed, Appendix I to this Article introduces a novel literature review of twenty-six studies that analyzed the impact on the ground of the GDPR and the CCPA: none found a meaningful improvement in citizen’s data privacy. This raises the question: …
The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine
The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine
Catholic University Journal of Law and Technology
No abstract provided.
Sharenting Is Here To Stay, So Now What?, Anonymous Author
Sharenting Is Here To Stay, So Now What?, Anonymous Author
Seattle University Law Review
This Note explores the concept of sharenting, its real-world consequences, and the daunting task of creating a workable solution. Part I of this Note provides a broad overview of sharenting and its implications. Part II describes the current state of the law and why sharenting remains a difficult issue to address. Part III discusses four legal frameworks posed by legal scholars to combat sharenting: anti-bullying, privacy, erasure, and child labor laws—and, ultimately, why each fails to offer an airtight solution. Part IV offers an alternative solution: the regulation of data brokers and outlawing advertisement-based social media platforms to protect children’s …
Leveling Up To A Reasonable Woman's Expectation Of Privacy, Victoria Schwartz
Leveling Up To A Reasonable Woman's Expectation Of Privacy, Victoria Schwartz
University of Colorado Law Review
Various privacy law doctrines involve a reasonable expectation of privacy or similar analyses that take into account social privacy norms. For the most part, however, neither courts nor scholars have explicitly grappled with whether courts descriptively do or normatively should consider gender in deciding what constitutes a reasonable expectation of privacy. This is despite the fact that, in various scenarios, a reasonable woman’s expectation of privacy might vary from a man’s in light of different lived experiences, biological differences, and existing societal gendered privacy norms.
This Article addresses how courts do and should take into account a reasonable woman’s expectation …
How The World's Largest Economies Regulate Data Privacy: Drawbacks, Benefits, & Proposed Solutions, Alexander J. Pantos
How The World's Largest Economies Regulate Data Privacy: Drawbacks, Benefits, & Proposed Solutions, Alexander J. Pantos
Indiana Journal of Global Legal Studies
National data privacy regimes are quickly gaining traction and ubiquity around the globe. Moving forward, countries will face a range of difficult decisions surrounding how best to engage internationally in cross border data flow, particularly in the context of personal information (PI).
This article takes a bird's-eye view of the current state of data privacy regimes in the world's four highest GDP regions. In part, this article hopes to provide a succinct analysis of these data privacy regimes, with a focus on the balance they strike between granting individuals rights in their data and placing responsibilities on businesses that deal …
The Development And The Future Of Privacy In Maine, Scott P. Bloomberg
The Development And The Future Of Privacy In Maine, Scott P. Bloomberg
Maine Law Review
In the United States, privacy law has traditionally developed in concert with intrusions created by newfangled technologies. This pattern has held true in Maine. Beginning in the late 1960s, the state has experienced three eras of privacy reform that track the technological advances of the mid-century, the internet era, and the new era of social media and big data. This Article details these three eras of reform and advances several proposals for responding to the challenges posed by the era that we are living through today. Indeed, at the beginning of the 2020s, there is much work on the horizon …
What's The Harm? Federalism, The Separation Of Powers, And Standing In Data Breach Litigation, Grayson Wells
What's The Harm? Federalism, The Separation Of Powers, And Standing In Data Breach Litigation, Grayson Wells
Indiana Law Journal
This Comment will argue that the Supreme Court should analyze standing in data breach litigation under a standard that is deferential to state statutory and common law. Specifically, federal standing analysis should look to state law when determining whether an injury is concrete such that the injury-in-fact requirement is met. Some argue that allowing more data breach cases to proceed to the merits could lead to an explosion of successful litigation and settlements, burdening the federal courts and causing economic losses for the breached businesses. These concerns may be valid. But if state law provides a remedy to the harm …
Dysregulating The Media: Digital Redlining, Privacy Erosion, And The Unintentional Deregulation Of American Media, Jon Garon
Maine Law Review
Netflix, Amazon, YouTube, and Apple have been joined by Disney+, Twitch, Facebook, and others to supplant the broadcast industry. As the FCC, FTC, and other regulators struggle, a new digital divide has emerged. The current regulatory regime for television is built upon the government’s right to manage over-the-air broadcasting. As content producers shift away from broadcast and cable, much of the government’s regulatory control will end, resulting in new consequences for public policy and new challenges involving privacy, advertising, and antitrust law. Despite the technological change, there are compelling government interests in a healthy media environment. This article explores the …
Taking Disability Public, Jasmine E. Harris
Taking Disability Public, Jasmine E. Harris
All Faculty Scholarship
Anti-discrimination laws enforce the idea that no one should be forced or encouraged to hide their race, gender, sexuality or other characteristics of their identity. So why is disability rights law the glaring exception? Other areas of anti-discrimination law have eschewed forms of enforced privacy about protected classes and, as a result, re-frame privacy norms as problematic, antigenic, and, at times, counter to structural reform goals. In contrast, disability rights law values privacy norms to preempt discrimination; in other words, if you never reveal the information, no one can discriminate against you because of that information. This Article argues that …
When Considering Federal Privacy Legislation, Neil Chilson
When Considering Federal Privacy Legislation, Neil Chilson
Pepperdine Law Review
Legislators, advocates, and business interests are proposing federal privacy legislation with new urgency. The United States has a long-established federal framework for addressing commercial privacy concerns, including general consumer protection law and sector-specific legislation. But the calls to expand or replace this approach have grown louder since Europe’s General Data Protection Regulation went into effect and since California adopted detailed and prescriptive privacy legislation. Should we create a U.S. federal privacy law, and if so, how? When considering any kind of privacy regulation, three concepts are fundamental. First, no one can control all information about them. Second, all privacy laws …
American Privacy Law At The Dawn Of A New Decade (And The Ccpa And Covid-19): Overview And Practitioner Critique, Kimberly Dempsey Booher, Martin B. Robins
American Privacy Law At The Dawn Of A New Decade (And The Ccpa And Covid-19): Overview And Practitioner Critique, Kimberly Dempsey Booher, Martin B. Robins
Marquette Intellectual Property Law Review
No abstract provided.
A Dangerous Inheritance: A Child’S Digital Identity, Kate Hamming
A Dangerous Inheritance: A Child’S Digital Identity, Kate Hamming
Seattle University Law Review
This Comment begins with one family’s story of its experience with social media that many others can relate to in today’s ever-growing world of technology and the Internet. Technology has made it possible for a person’s online presence to grow exponentially through continuous sharing by other Internet users. This ability to communicate and share information amongst family, friends, and strangers all over the world, while beneficial in some regard, comes with its privacy downfalls. The risks to privacy are elevated when children’s information is being revealed, which often stems from a child’s own parents conduct online. Parents all over the …
Sb 104 - Carjacking, Fentanyl And "Upskirting", Katherine H. Krouse, Lauren R. Light
Sb 104 - Carjacking, Fentanyl And "Upskirting", Katherine H. Krouse, Lauren R. Light
Georgia State University Law Review
The Act includes various amendments to Georgia’s criminal code. Three changes are most notable. First, the Act designates the offense of hijacking a motor vehicle as hijacking a motor vehicle in the first degree and creates the offense of hijacking a motor vehicle in the second degree. Second, the Act criminalizes the use of a device to film underneath or through an individual’s clothing. Lastly, the Act adds the drug Fentanyl and its various analogs to the list of controlled substances.
Testimony @ House Energy And Commerce Subcommittee On Digital Commerce And Consumer Protection Hearing; "21st Century Trade Barriers: Protectionist Cross Border Data Flow Policies Impact On U.S. Jobs.", Jennifer Daskal
Jennifer Daskal
Brief Of Amici Curiae Electronic Privacy Information Center (Epic) And Thirty-Six Technical Experts And Legal Scholars In Support Of Petitioner.Pdf, Jennifer Daskal
Brief Of Amici Curiae Electronic Privacy Information Center (Epic) And Thirty-Six Technical Experts And Legal Scholars In Support Of Petitioner.Pdf, Jennifer Daskal
Jennifer Daskal
Privacy Law's Precautionary Principle Problem, Adam Thierer
Privacy Law's Precautionary Principle Problem, Adam Thierer
Maine Law Review
Privacy law today faces two interrelated problems. The first is an information control problem. Like so many other fields of modern cyberlaw—intellectual property, online safety, cybersecurity, etc.—privacy law is being challenged by intractable Information Age realties. Specifically, it is easier than ever before for information to circulate freely and harder than ever to bottle it up once it is released. This has not slowed efforts to fashion new rules aimed at bottling up those information flows. If anything, the pace of privacy-related regulatory proposals has been steadily increasing in recent years even as these information control challenges multiply. This has …
Data-Driven Elections And Political Parties In Canada: Privacy Implications, Privacy Policies And Privacy Obligations, Colin J. Bennett
Data-Driven Elections And Political Parties In Canada: Privacy Implications, Privacy Policies And Privacy Obligations, Colin J. Bennett
Canadian Journal of Law and Technology
In light of the revelations concerning Cambridge Analytica, we are now in an era of heightened publicity and concern about the role of voter analytics in elections. Parties in Canada need to enhance their privacy management practices and commit to complying with national privacy principles in all their operations. As shown in this article’s comparative analysis of the privacy policies of federal and provincial political parties in Canada, policies are often difficult to find, unclear, and, with a couple of exceptions, do not address all the privacy principles. Accountability and complaints mechanisms are often not clearly publicized, and many are …
Your Right To Privacy: A Selective Bibliography, Sandra Klein
Your Right To Privacy: A Selective Bibliography, Sandra Klein
Sandra S. Klein
An awareness of relevant contemporary legal thought in the area of privacy is especially important today in light of what appears to be an increasing hostility to .the notion of individual privacy. The following bibliography considers privacy in terms of concept and application, and should prove useful to scholars, practitioners, and those seeking to gain more knowledge about this very important and complicated area of law.
The Right To Die As An Issue Of Privacy: A Selective Bibliography, Sandra Klein
The Right To Die As An Issue Of Privacy: A Selective Bibliography, Sandra Klein
Sandra S. Klein
The issue of whether or not an individual has the right to choose when he or she will die, is a very controversial one for many reasons. Further complicating the issue is the question of who, if anyone, has the right to decide for those who are unable to choose for themselves. The bibliography which follows includes articles which discuss this topic from a right to privacy perspective, and should prove useful to those researchers who are new to the subject, as well as to those who are already familiar with the many complex issues involved.
Blood And Privacy: Towards A "Testing-As-Search" Paradigm Under The Fourth Amendment, Andrei Nedelcu
Blood And Privacy: Towards A "Testing-As-Search" Paradigm Under The Fourth Amendment, Andrei Nedelcu
Seattle University Law Review
A vehicle on a public thoroughfare is observed driving erratically and careening across the roadway. After the vehicle strikes another passenger car and comes to a stop, the responding officer notices in the driver the telltale symptoms of intoxication—bloodshot eyes, slurred speech, and a distinct odor of intoxicants. On these facts, a lawfully-procured warrant authorizing the extraction of the driver’s blood is obtained. However, the document fails to circumscribe the manner and variety of testing that may be performed on the sample. Does this lack of particularity render the warrant constitutionally infirm as a mandate for chemical analysis of the …
Sex, Lies, And Genetic Testing: What Are Your Rights To Privacy In Florida?, Jon L. Mills
Sex, Lies, And Genetic Testing: What Are Your Rights To Privacy In Florida?, Jon L. Mills
Jon L. Mills
Individual and human rights in this country have evolved from national movements and national standards. The Fourteenth Amendment's application of rights to the states was a landmark in human rights, guaranteeing all citizens, no matter their state of residence, a baseline of protection. The Federal Constitution was the protector-“states' rights” was the code phrase for discrimination. But in the American crucible of cultural diversity a national standard for “community” may result in the lowest common denominator or a definition based on averaging. Would it not be better when the most individual of rights, privacy, is implicated to define that right …
Trading Privacy For Angry Birds: A Call For Courts To Reevaluate Privacy Expectations In Modern Smartphones, Jeremy Andrew Ciarabellini
Trading Privacy For Angry Birds: A Call For Courts To Reevaluate Privacy Expectations In Modern Smartphones, Jeremy Andrew Ciarabellini
Seattle University Law Review
Of all the smartphone uses, the calling function is probably used the least. Rather, individuals more commonly use their smartphone for surfing the web, checking Facebook, and playing games. Highlighting the “smart” in smartphone, these phones often know more about their users’ daily activities than the users. Without requiring any sort of input, smartphones can tell the user how many steps they walk each day, when it is time to leave for work (also, of course, determining the traveling time with the most up-to-date traffic reports), and when an item recently ordered on Amazon will be delivered. Smartphone users may …
Authorized Investigation: A Temperate Alternative To Cyber Insecurity, Casey M. Bruner
Authorized Investigation: A Temperate Alternative To Cyber Insecurity, Casey M. Bruner
Seattle University Law Review
This Note aims to show that legal structures created to protect the Internet in its original form are completely insufficient to protect what the Internet has become. This antiquated legal framework is exacerbating the problem. The breadth of activity that the current law restricts severely limits the remedies that cyberattack victims can pursue, and it must be updated. While full hack-back may prove necessary in the long run, I argue for a more temperate initial response to the problem—I call this response “authorized investigation.” Specifically, the Computer Fraud and Abuse Act should be amended to allow victims access to their …
Information Superhighway Patrol, Raizel Liebler
Information Superhighway Patrol, Raizel Liebler
Raizel Liebler
When Enough Is Enough: Location Tracking, Machine Learning And The Mosaic Theory, Renee Mcdonald Hutchins, Steve Bellovin, Tony Jebara, Sebastian Zimmeck
When Enough Is Enough: Location Tracking, Machine Learning And The Mosaic Theory, Renee Mcdonald Hutchins, Steve Bellovin, Tony Jebara, Sebastian Zimmeck
Journal Articles
Since 1967, when it decided Katz v. United States, the Supreme Court has tied the right to be free of unwanted government scrutiny to the concept of reasonable expectations of privacy.1 An evaluation of reasonable expectations depends, among other factors, upon an assessment of the intrusiveness of government action. When making such assessment historically the Court considered police conduct with clear temporal, geographic, or substantive limits. However, in an era where new technologies permit the storage and compilation of vast amounts of personal data, things are becoming more complicated. A school of thought known as “mosaic theory” has stepped into …
Información Y Nuevas Tecnologías, Teresa M. G. Da Cunha Lopes, Antonio Soto Robles
Información Y Nuevas Tecnologías, Teresa M. G. Da Cunha Lopes, Antonio Soto Robles
Teresa M. G. Da Cunha Lopes
No abstract provided.