Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of Colorado Law School (17)
- American University Washington College of Law (12)
- University of Pennsylvania Carey Law School (10)
- Schulich School of Law, Dalhousie University (9)
- Boston University School of Law (8)
-
- Georgetown University Law Center (8)
- University of Pittsburgh School of Law (7)
- University of Miami Law School (5)
- Penn State Law (4)
- Chicago-Kent College of Law (3)
- University of Maryland Francis King Carey School of Law (3)
- Maurer School of Law: Indiana University (2)
- Penn State Dickinson Law (2)
- Singapore Management University (2)
- Texas A&M University School of Law (2)
- University of Massachusetts School of Law (2)
- University of Michigan Law School (2)
- University of Washington School of Law (2)
- William & Mary Law School (2)
- Bridgewater College (1)
- California Western School of Law (1)
- Cleveland State University (1)
- Fordham Law School (1)
- New York Law School (1)
- Northwestern Pritzker School of Law (1)
- Pace University (1)
- Roger Williams University (1)
- Vanderbilt University Law School (1)
- Washington and Lee University School of Law (1)
- Yeshiva University, Cardozo School of Law (1)
- Publication Year
- Publication
-
- Publications (17)
- Articles (15)
- Faculty Scholarship (15)
- All Faculty Scholarship (13)
- Georgetown Law Faculty Publications and Other Works (8)
-
- Articles, Book Chapters, & Popular Press (7)
- Articles in Law Reviews & Other Academic Journals (6)
- Joint PIJIP/TLS Research Paper Series (5)
- Journal Articles (4)
- Faculty Publications (3)
- Articles by Maurer Faculty (2)
- Faculty Scholarly Works (2)
- Reports & Public Policy Documents (2)
- Research Collection Yong Pung How School Of Law (2)
- Amicus Briefs (1)
- Articles & Chapters (1)
- Book Chapters (1)
- Elisabeth Haub School of Law Faculty Publications (1)
- Honors Projects (1)
- Law Faculty Articles and Essays (1)
- Law School Blogs (1)
- NULR Online (1)
- Popular Media (1)
- Scholarly Articles (1)
- Short Works (1)
- Vanderbilt Law School Faculty Publications (1)
Articles 31 - 60 of 113
Full-Text Articles in Law
Reflections On The Use Of Facial Recognition Technology During Covid-19, Gary Kok Yew Chan
Reflections On The Use Of Facial Recognition Technology During Covid-19, Gary Kok Yew Chan
Research Collection Yong Pung How School Of Law
During the COVID-10 pandemic, infected persons have been quarantined in segregated facilities. Individuals who have been in contact with the infected persons may be subject to self-isolation measures or stay-home notices. Technological tools such as proximity and contact tracing apps are used to identify those who have been in close contact with infected persons. The contact tracing QR code used in Singapore's SafeEntry requires the submission of personal information (including names and identification numbers) prior to entry into certain public places such as malls, factories and restaurants. Robots, in addition to designated human officers, have been delpoyed to maintain social …
Automation In Moderation, Hannah Bloch-Wehba
Automation In Moderation, Hannah Bloch-Wehba
Faculty Scholarship
This Article assesses recent efforts to encourage online platforms to use automated means to prevent the dissemination of unlawful online content before it is ever seen or distributed. As lawmakers in Europe and around the world closely scrutinize platforms’ “content moderation” practices, automation and artificial intelligence appear increasingly attractive options for ridding the Internet of many kinds of harmful online content, including defamation, copyright infringement, and terrorist speech. Proponents of these initiatives suggest that requiring platforms to screen user content using automation will promote healthier online discourse and will aid efforts to limit Big Tech’s power.
In fact, however, the …
Politics Of Adversarial Machine Learning, Kendra Albert, Jonathon Penney, Bruce Schneier, Ram Shankar Siva Kumar
Politics Of Adversarial Machine Learning, Kendra Albert, Jonathon Penney, Bruce Schneier, Ram Shankar Siva Kumar
Articles, Book Chapters, & Popular Press
In addition to their security properties, adversarial machine-learning attacks and defenses have political dimensions. They enable or foreclose certain options for both the subjects of the machine learning systems and for those who deploy them, creating risks for civil liberties and human rights. In this paper, we draw on insights from science and technology studies, anthropology, and human rights literature, to inform how defenses against adversarial attacks can be used to suppress dissent and limit attempts to investigate machine learning systems. To make this concrete, we use real-world examples of how attacks such as perturbation, model inversion, or membership inference …
Ethical Testing In The Real World: Evaluating Physical Testing Of Adversarial Machine Learning, Kendra Albert, Maggie Delano, Jonathon Penney, Afsaneh Ragot, Ram Shankar Siva Kumar
Ethical Testing In The Real World: Evaluating Physical Testing Of Adversarial Machine Learning, Kendra Albert, Maggie Delano, Jonathon Penney, Afsaneh Ragot, Ram Shankar Siva Kumar
Articles, Book Chapters, & Popular Press
This paper critically assesses the adequacy and representativeness of physical domain testing for various adversarial machine learning (ML) attacks against computer vision systems involving human subjects. Many papers that deploy such attacks characterize themselves as “real world.” Despite this framing, however, we found the physical or real-world testing conducted was minimal, provided few details about testing subjects and was often conducted as an afterthought or demonstration. Adversarial ML research without representative trials or testing is an ethical, scientific, and health/safety issue that can cause real harms. We introduce the problem and our methodology, and then critique the physical domain testing …
Regulation Of Algorithmic Tools In The United States, Christopher S. Yoo, Alicia Lai
Regulation Of Algorithmic Tools In The United States, Christopher S. Yoo, Alicia Lai
All Faculty Scholarship
Policymakers in the United States have just begun to address regulation of artificial intelligence technologies in recent years, gaining momentum through calls for additional research funding, piece-meal guidance, proposals, and legislation at all levels of government. This Article provides an overview of high-level federal initiatives for general artificial intelligence (AI) applications set forth by the U.S. president and responding agencies, early indications from the incoming Biden Administration, targeted federal initiatives for sector-specific AI applications, pending federal legislative proposals, and state and local initiatives. The regulation of the algorithmic ecosystem will continue to evolve as the United States continues to search …
Tinkering With Circuit Conflicts Beyond The Schoolhouse Gate, Stephen Wermiel
Tinkering With Circuit Conflicts Beyond The Schoolhouse Gate, Stephen Wermiel
Articles in Law Reviews & Other Academic Journals
No abstract provided.
Catalyzing Privacy Law, Anupam Chander, Margot E. Kaminski, William Mcgeveran
Catalyzing Privacy Law, Anupam Chander, Margot E. Kaminski, William Mcgeveran
Georgetown Law Faculty Publications and Other Works
The United States famously lacks a comprehensive federal data privacy law. In the past year, however, over half the states have proposed broad privacy bills or have established task forces to propose possible privacy legislation. Meanwhile, congressional committees are holding hearings on multiple privacy bills. What is catalyzing this legislative momentum? Some believe that Europe’s General Data Protection Regulation (GDPR), which came into force in 2018, is the driving factor. But with the California Consumer Privacy Act (CCPA) which took effect in January 2020, California has emerged as an alternate contender in the race to set the new standard for …
The Exclusionary Rule In The Age Of Blue Data, Andrew Ferguson
The Exclusionary Rule In The Age Of Blue Data, Andrew Ferguson
Articles in Law Reviews & Other Academic Journals
In Herring v. United States, Chief Justice John Roberts reframed the Supreme Court’s understanding of the exclusionary rule: “As laid out in our cases, the exclusionary rule serves to deter deliberate, reckless, or grossly negligent conduct, or in some circumstances recurring or systemic negligence.” The open question remains: how can defendants demonstrate sufficient recurring or systemic negligence to warrant exclusion? The Supreme Court has never answered the question, although the absence of systemic or recurring problems has figured prominently in two recent exclusionary rule decisions. Without the ability to document recurring failures, or patterns of police misconduct, courts can dismiss …
Privacy And Legal Automation: The Dmca As A Case Study, Jonathon Penney
Privacy And Legal Automation: The Dmca As A Case Study, Jonathon Penney
Articles, Book Chapters, & Popular Press
Advances in artificial intelligence, machine learning, computing capacity, and big data analytics are creating exciting new possibilities for legal automation. At the same time, these changes pose serious risks for civil liberties and other societal interests. Yet, existing scholarship is narrow, leaving uncertainty on a range of issues, including a glaring lack of systematic empirical work as to how legal automation may impact people’s privacy and freedom. This article addresses this gap with an original empirical analysis of the Digital Millennium Copyright Act (DMCA), which today sits at the forefront of algorithmic law due to its automated enforcement of copyright …
Privacy And Security Across Borders, Jennifer Daskal
Privacy And Security Across Borders, Jennifer Daskal
Articles in Law Reviews & Other Academic Journals
Three recent initiatives -by the United States, European Union, and Australiaare opening salvos in what will likely be an ongoing and critically important debate about law enforcement access to data, the jurisdictional limits to such access, and the rules that apply. Each of these developments addresses a common set of challenges posed by the increased digitalization of information, the rising power of private companies delimiting access to that information, and the cross-border nature of investigations that involve digital evidence. And each has profound implications for privacy, security, and the possibility of meaningful democratic accountability and control. This Essay analyzes the …
The Right To Explanation, Explained, Margot E. Kaminski
The Right To Explanation, Explained, Margot E. Kaminski
Publications
Many have called for algorithmic accountability: laws governing decision-making by complex algorithms, or AI. The EU’s General Data Protection Regulation (GDPR) now establishes exactly this. The recent debate over the right to explanation (a right to information about individual decisions made by algorithms) has obscured the significant algorithmic accountability regime established by the GDPR. The GDPR’s provisions on algorithmic accountability, which include a right to explanation, have the potential to be broader, stronger, and deeper than the preceding requirements of the Data Protection Directive. This Essay clarifies, largely for a U.S. audience, what the GDPR actually requires, incorporating recently released …
The Role Of Satellites And Smart Devices: Data Surprises And Security, Privacy, And Regulatory Challenges, Anne T. Mckenna, Amy C. Gaudion, Jenni L. Evans
The Role Of Satellites And Smart Devices: Data Surprises And Security, Privacy, And Regulatory Challenges, Anne T. Mckenna, Amy C. Gaudion, Jenni L. Evans
Faculty Scholarly Works
Strava, a popular social media platform and mobile app like Facebook but specifically designed for athletes, posts a “heatmap” with consensually-obtained details about users’ workouts and geolocation. Strava’s heatmap depicts aggregated data of user location and movement by synthesizing GPS satellite data points and movement data from users’ smart devices together with satellite imagery. In January of 2018, a 20-year-old student tweeted that Strava’s heatmap revealed U.S. forward operating bases. The tweet revealed a significant national security issue and flagged substantial privacy and civil liberty concerns.
Smart devices, software applications, and social media platforms aggregate consumer data from multiple data …
The Value Of Deviance: Understanding Contextual Privacy, Timothy Casey
The Value Of Deviance: Understanding Contextual Privacy, Timothy Casey
Faculty Scholarship
Recent decisions by the Supreme Court in Carpenter v. United States and the Illinois Supreme Court in Rosenbach v. Six Flags Entertainment Corporation signal a shift in the traditional understanding of what exactly is protected by a privacy interest. Carpenter distinguished between a police officer’s observation of a suspect’s location and a perpetual catalogue of a person’s movements obtained through cell site location information (CSLI). The pervasive and vast quantity of information from CSLI exposed a protected privacy interest. In Rosenbach, the Illinois Supreme Court found the unique and personal quality of biometric information meant that consent and disclosure requirements …
Recording As Heckling, Scott Skinner-Thompson
Recording As Heckling, Scott Skinner-Thompson
Publications
A growing body of authority recognizes that citizen recording of police officers and public space is protected by the First Amendment. But the judicial and scholarly momentum behind the emerging “right to record” fails to fully incorporate recording’s cost to another important right that also furthers First Amendment principles: the right to privacy.
This Article helps fill that gap by comprehensively analyzing the First Amendment interests of both the right to record and the right to privacy in public while highlighting the role of technology in altering the First Amendment landscape. Recording information can be critical to future speech and, …
Binary Governance: Lessons From The Gdpr’S Approach To Algorithmic Accountability, Margot E. Kaminski
Binary Governance: Lessons From The Gdpr’S Approach To Algorithmic Accountability, Margot E. Kaminski
Publications
Algorithms are now used to make significant decisions about individuals, from credit determinations to hiring and firing. But they are largely unregulated under U.S. law. A quickly growing literature has split on how to address algorithmic decision-making, with individual rights and accountability to nonexpert stakeholders and to the public at the crux of the debate. In this Article, I make the case for why both individual rights and public- and stakeholder-facing accountability are not just goods in and of themselves but crucial components of effective governance. Only individual rights can fully address dignitary and justificatory concerns behind calls for regulating …
Power, Process, And Automated Decision-Making, Ari Ezra Waldman
Power, Process, And Automated Decision-Making, Ari Ezra Waldman
Articles & Chapters
Many decisions that used to be made by humans are now made by machines. And yet, automated decision-making systems based on “big data” – powered algorithms and machine learning are just as prone to mistakes, biases, and arbitrariness as their human counterparts. The result is a technologically driven decision-making process that seems to defy interrogation, analysis, and accountability and, therefore, undermines due process. This should make algorithmic decision-making an illegitimate source of authority in a liberal democracy. This Essay argues that algorithmic decision-making is a product of the neoliberal project to undermine social values like equality, nondiscrimination, and human flourishing …
Humans Forget, Machines Remember: Artificial Intelligence And The Right To Be Forgotten, Tiffany Li, Eduard Fosch Villaronga, Peter Kieseberg
Humans Forget, Machines Remember: Artificial Intelligence And The Right To Be Forgotten, Tiffany Li, Eduard Fosch Villaronga, Peter Kieseberg
Faculty Scholarship
To understand the Right to be Forgotten in context of artificial intelligence, it is necessary to first delve into an overview of the concepts of human and AI memory and forgetting. Our current law appears to treat human and machine memory alike – supporting a fictitious understanding of memory and forgetting that does not comport with reality. (Some authors have already highlighted the concerns on the perfect remembering.) This Article will examine the problem of AI memory and the Right to be Forgotten, using this example as a model for understanding the failures of current privacy law to reflect the …
Is It Time For A Universal Genetic Forensic Database?, J. W. Hazel, Ellen Wright Clayton, B. A. Malin, Christopher Slobogin
Is It Time For A Universal Genetic Forensic Database?, J. W. Hazel, Ellen Wright Clayton, B. A. Malin, Christopher Slobogin
Vanderbilt Law School Faculty Publications
The ethical objections to mandating forensic profiling of newborns and/or compelling every citizen or visitor to submit to a buccal swab or to spit in a cup when they have done nothing wrong are not trivial. But newborns are already subject to compulsory medical screening, and people coming from foreign countries to the United States already submit to fingerprinting. It is also worth noting that concerns about coercion or invasions of privacy did not give pause to legislatures (or, for that matter, even the European Court) when authorizing compelled DNA sampling from arrestees, who should not forfeit genetic privacy interests …
When Whispers Enter The Cloud, Heidi H. Liu
When Whispers Enter The Cloud, Heidi H. Liu
All Faculty Scholarship
With increased awareness of workplace harassment in recent years, the idea of enhanced reporting around sexual misconduct has gained traction. As a result, several technologies – from smartphone apps to well-publicized services – have been introduced with the goals of preventing, enabling reports of, and even predicting sexual misconduct at work, school and in public. But to what extent are these technologies secure and accessible to survivors? This Note documents the existing resources and proposes a framework focusing on privacy and participation for evaluating these tools intended to benefit survivors.
"We Only Spy On Foreigners": The Myth Of A Universal Right To Privacy And The Practice Of Foreign Mass Surveillance, Asaf Lubin
Articles by Maurer Faculty
The digital age brought with it a new epoch in global political life, one neatly coined by Professor Philip Howard as the “pax technica.” In this new world order, government and industry are “tightly bound” in technological and security arrangements that serve to push forward an information and cyber revolution of unparalleled magnitude. While the rise of information technologies tells a miraculous story of triumph over the physical constraints that once shackled mankind, these very technologies are also the cause of grave concern. Intelligence agencies have been recently involved in the exercise of global indiscriminate surveillance, which purports to go …
Innovation And Tradition: A Survey Of Intellectual Property And Technology Legal Clinics, Cynthia L. Dahl, Victoria F. Phillips
Innovation And Tradition: A Survey Of Intellectual Property And Technology Legal Clinics, Cynthia L. Dahl, Victoria F. Phillips
All Faculty Scholarship
For artists, nonprofits, community organizations and small-business clients of limited means, securing intellectual property rights and getting counseling involving patent, copyright and trademark law are critical to their success and growth. These clients need expert IP and technology legal assistance, but very often cannot afford services in the legal marketplace. In addition, legal services and state bar pro bono programs have generally been ill-equipped to assist in these more specialized areas. An expanding community of IP and Technology clinics has emerged across the country to meet these needs. But while law review articles have described and examined other sectors of …
The Gdpr’S Version Of Algorithmic Accountability, Margot Kaminski
The Gdpr’S Version Of Algorithmic Accountability, Margot Kaminski
Publications
No abstract provided.
Artificial Intelligence In Health Care: Applications And Legal Implications, W. Nicholson Price Ii
Artificial Intelligence In Health Care: Applications And Legal Implications, W. Nicholson Price Ii
Articles
Artificial intelligence (AI) is rapidly moving to change the healthcare system. Driven by the juxtaposition of big data and powerful machine learning techniques—terms I will explain momentarily—innovators have begun to develop tools to improve the process of clinical care, to advance medical research, and to improve efficiency. These tools rely on algorithms, programs created from healthcare data that can make predictions or recommendations. However, the algorithms themselves are often too complex for their reasoning to be understood or even stated explicitly. Such algorithms may be best described as “black-box.” This article briefly describes the concept of AI in medicine, including …
Keep Out! The Efficacy Of Trespass, Nuisance And Privacy Torts As Applied To Drones, Hillary B. Farber
Keep Out! The Efficacy Of Trespass, Nuisance And Privacy Torts As Applied To Drones, Hillary B. Farber
Faculty Publications
The drone industry is burgeoning and there is boundless excitement over the potential civil and commercial applications of these aerial observers. Drones are also fun recreational toys that have more capabilities than their predecessor - the remote controlled helicopter. But along with the benefits comes the potential for misuse. More and more frequently concerned spectators are reporting drones flying around the windows of homes, backyards, and at beaches and sporting events. In some places people are even shooting them down.
We have entered a new frontier of aerial observation with the unmanned aircraft. As is often the case with new …
Access To Data Across Borders: The Critical Role For Congress To Play Now, Jennifer Daskal
Access To Data Across Borders: The Critical Role For Congress To Play Now, Jennifer Daskal
Articles in Law Reviews & Other Academic Journals
No abstract provided.
Privacy And The Right To Record, Margot E. Kaminski
Privacy And The Right To Record, Margot E. Kaminski
Publications
Many U.S. laws protect privacy by governing recording. Recently, however, courts have recognized a First Amendment “right to record.” This Article addresses how courts should handle privacy laws in light of the developing First Amendment right to record.
The privacy harms addressed by recording laws are situated harms. Recording changes the way people behave in physical spaces by altering the nature of those spaces. Thus, recording laws can be placed within a long line of First Amendment case law that recognizes a valid government interest in managing the qualities of rivalrous physical space, so as not to allow one person’s …
Privacy, Vulnerability, And Affordance, Ryan Calo
Privacy, Vulnerability, And Affordance, Ryan Calo
Articles
This essay begins to unpack the complex, sometimes contradictory relationship between privacy and vulnerability. I begin by exploring how the law conceives of vulnerability — essentially, as a binary status meriting special consideration where present. Recent literature recognizes vulnerability not as a status but as a state — a dynamic and manipulable condition that everyone experiences to different degrees and at different times. I then discuss various ways in which vulnerability and privacy intersect. I introduce an analytic distinction between vulnerability rendering, i.e., making a person more vulnerable, and the exploitation of vulnerability whether manufactured or native. I also describe …
Health Information Equity, Craig Konnoth
Health Information Equity, Craig Konnoth
Publications
In the last few years, numerous Americans’ health information has been collected and used for follow-on, secondary research. This research studies correlations between medical conditions, genetic or behavioral profiles, and treatments, to customize medical care to specific individuals. Recent federal legislation and regulations make it easier to collect and use the data of the low-income, unwell, and elderly for this purpose. This would impose disproportionate security and autonomy burdens on these individuals. Those who are well-off and pay out of pocket could effectively exempt their data from the publicly available information pot. This presents a problem which modern research ethics …
The Fourth Amendment In A Digital World, Laura K. Donohue
The Fourth Amendment In A Digital World, Laura K. Donohue
Georgetown Law Faculty Publications and Other Works
Fourth Amendment doctrines created in the 1970s and 1980s no longer reflect how the world works. The formal legal distinctions on which they rely—(a) private versus public space, (b) personal information versus third party data, (c) content versus non-content, and (d) domestic versus international—are failing to protect the privacy interests at stake. Simultaneously, reduced resource constraints are accelerating the loss of rights. The doctrine has yet to catch up with the world in which we live. A necessary first step for the Court is to reconsider the theoretical underpinning of the Fourth Amendment, to allow for the evolution of a …
Trending @ Rwu Law: Linn F. Freedman's Post: The Goal Of Gender Equality In Cybersecurity 08/23/2016, Linn F. Freedman
Trending @ Rwu Law: Linn F. Freedman's Post: The Goal Of Gender Equality In Cybersecurity 08/23/2016, Linn F. Freedman
Law School Blogs
No abstract provided.