Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Law

Series

Privacy

Institution
Publication Year
Publication

Articles 91 - 114 of 114

Full-Text Articles in Law

Technological Leap, Statutory Gap, And Constitutional Abyss: Remote Biometric Identification Comes Of Age, Laura K. Donohue Jan 2012

Technological Leap, Statutory Gap, And Constitutional Abyss: Remote Biometric Identification Comes Of Age, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

Federal interest in using facial recognition technology (“FRT”) to collect, analyze, and use biometric information is rapidly growing. Despite the swift movement of agencies and contractors into this realm, however, Congress has been virtually silent on the current and potential uses of FRT. No laws directly address facial recognition—much less the pairing of facial recognition with video surveillance—in criminal law. Limits placed on the collection of personally identifiable information, moreover, do not apply. The absence of a statutory framework is a cause for concern. FRT represents the first of a series of next generation biometrics, such as hand geometry, iris, …


Collateral Consequences, Genetic Surveillance, And The New Biopolitics Of Race, Dorothy E. Roberts Apr 2011

Collateral Consequences, Genetic Surveillance, And The New Biopolitics Of Race, Dorothy E. Roberts

All Faculty Scholarship

This Article is part of a Howard Law Journal Symposium on “Collateral Consequences: Who Really Pays the Price for Criminal Justice?,” as well as my larger book project, Fatal Invention: How Science, Politics, and Big Business Re-create Race in the Twenty-First Century (The New Press, 2011). It considers state and federal government expansion of genetic surveillance as a collateral consequence of a criminal record in the context of a new biopolitics of race in America. Part I reviews the expansion of DNA data banking by states and the federal government, extending the collateral impact of a criminal record—in the form …


Supreme Court Amicus Brief Of Aarp And The National Legislative Association On Petition Drug Prices In Support Of Petitioners, William H. Sorrell V. Ims Health, Inc., No. 10-779 (Filed March 1, 2011), Sean Flynn, Meredith Jacob, Stacy Canan Jan 2011

Supreme Court Amicus Brief Of Aarp And The National Legislative Association On Petition Drug Prices In Support Of Petitioners, William H. Sorrell V. Ims Health, Inc., No. 10-779 (Filed March 1, 2011), Sean Flynn, Meredith Jacob, Stacy Canan

Amicus Briefs

This Court should refuse to apply the First Amendment to Vermont’s Prescription Confidentiality Law based on two essential facts. First, the regulation at issue is limited to the commercial use or private-channel distribution of confidential data. It is thus governed by cases of this Court upholding the regulation of uses of information in purely private settings that do not inform or contribute to the public sphere. Bartnicki v. Vopper, 532 U.S. 514, 526-27 n.10 (2001); Dun & Bradstreet, Inc. v. Greenmoss Builders, Inc., 472 U.S. 749 (1985). Second, it concerns the regulation of secondary uses of information where the government …


Unraveling Privacy: The Personal Prospectus And The Threat Of A Full-Disclosure Future, Scott R. Peppet Jan 2011

Unraveling Privacy: The Personal Prospectus And The Threat Of A Full-Disclosure Future, Scott R. Peppet

Publications

Information technologies are reducing the costs of credible signaling, just as they have reduced the costs of data mining and economic sorting. The burgeoning informational privacy field has ignored this evolution, leaving it unprepared to deal with the consequences of these new signaling mechanisms. In an economy with robust signaling, those with valuable credentials, clean medical records, and impressive credit scores will want to disclose those traits to receive preferential economic treatment. Others may then find that they must also disclose private information to avoid the negative inferences attached to staying silent. This unraveling effect creates new types of privacy …


Disentangling Administrative Searches, Eve Brensike Primus Jan 2011

Disentangling Administrative Searches, Eve Brensike Primus

Articles

Everyone who has been screened at an international border, scanned by an airport metal detector, or drug tested for public employment has been subjected to an administrative search. Since September 11th, the government has increasingly invoked the administrative search exception to justify more checkpoints, unprecedented subway searches, and extensive wiretaps. As science and technology advance, the frequency and scope of administrative searches will only expand. Formulating the boundaries and requirements of administrative search doctrine is therefore a matter of great importance. Yet the rules governing administrative searches are notoriously unclear. This Article seeks to refocus attention on administrative searches and …


Location-Based Services: Time For A Privacy Check-In, Chris Conley, Nicole Ozer, Hari O'Connell, Ellen Ginsburg, Tamar Gubins Nov 2010

Location-Based Services: Time For A Privacy Check-In, Chris Conley, Nicole Ozer, Hari O'Connell, Ellen Ginsburg, Tamar Gubins

Faculty Scholarship

Need to get directions when you are lost? Want to know if your friends are in the neighborhood? Location-based services – applications and websites that provide services based on your current location – can put this information and more in the palm of your hand.

But outdated privacy laws and varying corporate practices could mean that sensitive information about who you are, where you go, what you do, and who you know end up being shared, sold, or turned over to the government.

Can location-based services protect your privacy? Do they? And what can we do to improve the situation? …


Free Speech And The Myth Of The Internet As An Unintermediated Experience, Christopher S. Yoo Sep 2010

Free Speech And The Myth Of The Internet As An Unintermediated Experience, Christopher S. Yoo

All Faculty Scholarship

In recent years, a growing number of commentators have raised concerns that the decisions made by Internet intermediaries — including last-mile network providers, search engines, social networking sites, and smartphones — are inhibiting free speech and have called for restrictions on their ability to prioritize or exclude content. Such calls ignore the fact that when mass communications are involved, intermediation helps end users to protect themselves from unwanted content and allows them to sift through the avalanche of desired content that grows ever larger every day. Intermediation also helps solve a number of classic economic problems associated with the Internet. …


Undermined Norms: The Corrosive Effect Of Information Processing Technology On Informational Privacy, Richard Warner Mar 2010

Undermined Norms: The Corrosive Effect Of Information Processing Technology On Informational Privacy, Richard Warner

All Faculty Scholarship

Informational privacy is a matter of control; it consists in the ability to control when one’s personal information is collected, how it is used, and to whom it is distributed. The degree of control we once enjoyed has vanished. Advances in information processing technology now give others considerable power to determine when personal information is collected, how it is used, and to it is whom distributed. Privacy advocates sound the alarm in regard to both the governmental and private sectors. I focus exclusively on the later. Relying on the extensive privacy advocate literature, I assume we should try to regain …


Regulating The Use Of Genetic Information: Perspective From The U.S. Experience, Pauline Kim Jan 2010

Regulating The Use Of Genetic Information: Perspective From The U.S. Experience, Pauline Kim

Scholarship@WashULaw

This essay comments on an empirical study documenting the policies, practices, and attitudes of Australian employers regarding the use of genetic information from the U.S. perspective. The U.S. Congress recently enacted the Genetic Information Nondiscrimination Act of 2008 (GINA), which, among other things, prohibits employment discrimination on the basis of genetic information and restricts employers’ access to their employees’ genetic information. Just as the Australian study found no evidence of systematic use of genetic testing or screening by employers, GINA was passed in the absence of any evidence of widespread employment discrimination on the basis of genetic characteristics. Although it …


Mapping Online Privacy, Jacqueline D. Lipton Jan 2010

Mapping Online Privacy, Jacqueline D. Lipton

Articles

Privacy scholars have recently outlined difficulties in applying existing concepts of personal privacy to the maturing Internet. With Web 2.0 technologies, more people have more opportunities to post information about themselves and others online, often with scant regard for individual privacy. Shifting notions of 'reasonable expectations of privacy' in the context of blogs, wikis, and online social networks create challenges for privacy regulation. Courts and commentators struggle with Web 2.0 privacy incursions without the benefit of a clear regulatory framework. This article offers a map of privacy that might help delineate at least the outer boundaries of Web 2.0 privacy. …


'We, The Paparazzi': Developing A Privacy Paradigm For Digital Video, Jacqueline D. Lipton Jan 2009

'We, The Paparazzi': Developing A Privacy Paradigm For Digital Video, Jacqueline D. Lipton

Articles

In January 2009, the Camera Phone Predator Alert bill was introduced into Congress. It raised serious concerns about privacy rights in the face of digital video technology. In so doing, it brought to light a worrying gap in current privacy regulation - the lack of rules relating to digital video privacy. To date, digital privacy regulation has focused on text records that contain personal data. Little attention has been paid to privacy in video files that may portray individuals in inappropriate contexts, or in an unflattering or embarrassing light. As digital video technology, including inexpensive cellphone cameras, is now becoming …


Book Review, Susan Nevelow Mart Jan 2008

Book Review, Susan Nevelow Mart

Publications

No abstract provided.


Dredging Up The Past: Lifelogging, Memory And Surveillance, Anita L. Allen Jan 2008

Dredging Up The Past: Lifelogging, Memory And Surveillance, Anita L. Allen

All Faculty Scholarship

The term “lifelog” refers to a comprehensive archive of an individual's quotidian existence, created with the help of pervasive computing technologies. Lifelog technologies would record and store everyday conversations, actions, and experiences of their users, enabling future replay and aiding remembrance. Products to assist lifelogging are already on the market; but the technology that will enable people fully and continuously to document their entire lives is still in the research and development phase. For generals, edgy artists and sentimental grandmothers alike, lifelogging could someday replace or complement, existing memory preservation practices. Like a traditional diary, journal or day-book, the lifelog …


Garbage Pails And Puppy Dog Tails: Is That What Katz Is Made Of?, Aya Gruber Jan 2008

Garbage Pails And Puppy Dog Tails: Is That What Katz Is Made Of?, Aya Gruber

Publications

This Article takes the opportunity of the fortieth anniversary of Katz v. U.S. to assess whether the revolutionary case's potential to provide broad and flexible privacy protection to individuals has been realized. Answering this question in a circumspect way, the Article pinpoints the language in Katz that was its eventual undoing and demonstrates how the Katz test has been plagued by two principle problems that have often rendered it more harmful to than protective of privacy. The manipulation problem describes the tendency of conservative courts to define reasonable expectations of privacy as lower than the expectations society actually entertains. The …


Please, Let's Bury The Junk: The Codis Loci And The Revelation Of Private Information, David H. Kaye Jan 2007

Please, Let's Bury The Junk: The Codis Loci And The Revelation Of Private Information, David H. Kaye

Journal Articles

This Northwestern University Law Review Colloquy paper describes the four possible ways in which genetic loci could possess predictive or diagnostic value with regard to diseases and explains why these mechanisms have not led, and probably cannot lead, to useful screening tests with the Convicted Offender DNA Index System (CODIS) profiles in national, state, and local databases. It then considers the phenotypes and familial relationships that the CODIS STRs can be used to identify. The profiles carry limited information about an individual's race and familial relationships, and the article places the resulting privacy issues in perspective. Finally, the paper comments …


Structural Rights In Privacy, Harry Surden Jan 2007

Structural Rights In Privacy, Harry Surden

Publications

This Essay challenges the view that privacy interests are protected primarily by law. Based upon the understanding that society relies upon nonlegal devices such as markets, norms, and structure to regulate human behavior, this Essay calls attention to a class of regulatory devices known as latent structural constraints and provides a positive account of their role in regulating privacy. Structural constraints are physical or technological barriers which regulate conduct; they can be either explicit or latent. An example of an explicit structural constraint is a fence which is designed to prevent entry onto real property, thereby effectively enforcing property rights. …


Science Fiction And Shed Dna, D. H. Kaye Dec 2006

Science Fiction And Shed Dna, D. H. Kaye

NULR Online

No abstract provided.


The Privacy Gambit: Toward A Game Theoretic Approach To International Data Protection, Horace E. Anderson Jan 2006

The Privacy Gambit: Toward A Game Theoretic Approach To International Data Protection, Horace E. Anderson

Elisabeth Haub School of Law Faculty Publications

This article briefly explores several scenarios in which economic actors compete and cooperate in order to capture the value in personal information. The focus then shifts to one particular scenario: the ongoing interaction between the United States and the European Union in attempting to construct data protection regimes that serve the philosophies and citizens of each jurisdiction as well as provide a strategic economic advantage. A game theoretic model is presented to explain the course of dealings between the two actors, including both unilateral and bilateral actions. Part I ends with an exploration of opportunities for seizing competitive advantage, and …


The Magic Lantern Revealed: A Report Of The Fbi's New Key Logging Trojan And Analysis Of Its Possible Treatment In A Dynamic Legal Landscape, Woodrow Hartzog Jan 2002

The Magic Lantern Revealed: A Report Of The Fbi's New Key Logging Trojan And Analysis Of Its Possible Treatment In A Dynamic Legal Landscape, Woodrow Hartzog

Faculty Scholarship

Magic Lantern presents several difficult legal questions that are left unanswered due to new or non-existent statutes and case law directly pertaining to the unique situation that Magic Lantern creates. 25 The first concern is statutory. It is unclear what laws, if any, will apply when Magic Lantern is put into use.26 The recent terrorist attacks in the United States have brought the need for information as a matter of national security to the forefront. Congress recently passed legislation (i.e. USA PATRIOT Act) 27 that dramatically modifies current surveillance law, thus further complicating the untested waters of a …


Two Fallacies About Dna Data Banks For Law Enforcement, David H. Kaye Jan 2001

Two Fallacies About Dna Data Banks For Law Enforcement, David H. Kaye

Journal Articles

This commentary on the article Legal and Policy Issues in Expanding the Scope of Law Enforcement DNA Data Banks, 67 Brook. L. Rev. 127 (2001), by Mark Rothstein and Sandra Carnahan, argues that the case for confining law enforcement DNA databases to noncoding loci and to samples from individuals convicted of violent crimes is quite weak.

It describes alternative approaches, including the possibility of a population-wide database; the privacy implications of the loci now used in forensic identification; the law governing DNA dragnets; and the limits on DNA databases imposed by recent cases on searches and seizures. It notes the …


The Constitutionality Of Dna Sampling On Arrest, David H. Kaye Jan 2001

The Constitutionality Of Dna Sampling On Arrest, David H. Kaye

Journal Articles

Every state now collects DNA from people convicted of certain offenses. Law enforcement authorities promote offender DNA databanking on the theory that it will identify offenders who commit additional crimes while or probation or parole, or after they have finished serving their sentences. Even relatively small databases have yielded such dividends. As these database searches uncover the perpetrators of rapes, murders, and other offenses, the pressure builds to expand the coverage of the databases.

Recent proposals call for extending not merely the scope of crimes for which DNA databanking would be used, but also the point at which the samples …


Privacy, Ideology, And Technology: A Response To Jeffrey Rosen, Julie E. Cohen Jan 2001

Privacy, Ideology, And Technology: A Response To Jeffrey Rosen, Julie E. Cohen

Georgetown Law Faculty Publications and Other Works

This essay reviews Jeffrey Rosen’s The Unwanted Gaze: The Destruction of Privacy in America (2000).

Rosen offers a compelling (and often hair-raising) account of the pervasive dissolution of the boundary between public and private information. This dissolution is both legal and social; neither the law nor any other social institution seems to recognize many limits on the sorts of information that can be subjected to public scrutiny. The book also provides a rich, evocative characterization of the dignitary harms caused by privacy invasion. Rosen’s description of the sheer unfairness of being “judged out of context” rings instantly true. Privacy, Rosen …


Copyright And The Jurisprudence Of Self-Help, Julie E. Cohen Jan 1998

Copyright And The Jurisprudence Of Self-Help, Julie E. Cohen

Georgetown Law Faculty Publications and Other Works

The proposed draft of Article 2B grants broad rights to enforce electronically contract provisions governing access to and use of digital works. Purveyors of digital works may engage in electronic self-help following breach of contract, and may also elect to foreclose unauthorized uses ex ante, via electronic “regulation of performance.” This Article examines these provisions in light of existing law authorizing self-help repossession of tangible chattels, leading academic justifications for self-help repossession, and federal copyright law and policy. It concludes that the provisions authorize an unprecedented degree of intrusion into private homes and offices, that they lack a sound theoretical …


The Eu Data Protection Directive, Information Privacy, And The Public Interest, Fred H. Cate Jan 1995

The Eu Data Protection Directive, Information Privacy, And The Public Interest, Fred H. Cate

Articles by Maurer Faculty

No abstract provided.