Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of Pennsylvania Carey Law School (21)
- University of Pittsburgh School of Law (6)
- Washington University in St. Louis (6)
- City University of New York (CUNY) (3)
- University at Buffalo School of Law (3)
-
- University of Nebraska - Lincoln (3)
- University of New Hampshire (3)
- Georgetown University Law Center (2)
- University of Washington School of Law (2)
- Western University (2)
- Butler University (1)
- Chicago-Kent College of Law (1)
- Cleveland State University (1)
- Edith Cowan University (1)
- Emory University School of Law (1)
- Florida International University (1)
- Georgia State University (1)
- Illinois State University (1)
- Macalester College (1)
- Maurer School of Law: Indiana University (1)
- Northwestern Pritzker School of Law (1)
- Pace University (1)
- Roger Williams University (1)
- Syracuse University (1)
- Texas A&M University School of Law (1)
- University at Albany, State University of New York (1)
- University of Michigan Law School (1)
- Western Washington University (1)
- William & Mary Law School (1)
- Publication Year
- Publication
-
- All Faculty Scholarship (22)
- Scholarship@WashULaw (6)
- Articles (5)
- Book Chapters (3)
- Journal Articles (3)
-
- Law Faculty Scholarship (3)
- Georgetown Law Faculty Publications and Other Works (2)
- Library Philosophy and Practice (e-journal) (2)
- Articles by Maurer Faculty (1)
- Australian Security and Intelligence Conference (1)
- CJC Publications (1)
- Dyson College- Seidenberg School of CSIS : Collaborative Projects and Presentations (1)
- FIMS Presentations (1)
- FIMS Publications (1)
- Faculty Articles (1)
- Faculty Scholarship (1)
- Faculty Working Papers (1)
- Faculty and Staff Publications – Milner Library (1)
- Graduate Scholarship and Professional Work (1)
- LACUNY Institute 2015 (1)
- Law & Economics Working Papers (1)
- Law Faculty Articles and Essays (1)
- Law Library Newsletters/Blog (1)
- Library Staff Publications (1)
- Open Educational Resources (1)
- Political Science Honors Projects (1)
- Publications and Research (1)
- School of Information Studies - Post-doc and Student Scholarship (1)
- University Libraries Faculty Scholarship (1)
- University of Nebraska-Lincoln Libraries: Conference Presentations and Speeches (1)
Articles 31 - 60 of 70
Full-Text Articles in Law
Making News: Balancing Newsworthiness And Privacy In The Age Of Algorithms, Erin C. Carroll
Making News: Balancing Newsworthiness And Privacy In The Age Of Algorithms, Erin C. Carroll
Georgetown Law Faculty Publications and Other Works
In deciding privacy lawsuits against media defendants, courts have for decades deferred to the media. They have given it wide berth to determine what is newsworthy and so, what is protected under the First Amendment. And in doing so, they have often spoken reverently of the editorial process and journalistic decision-making.
Yet, in just the last several years, news production and consumption has changed dramatically. As we get more of our news from digital and social media sites, the role of information gatekeeper is shifting from journalists to computer engineers, programmers, and app designers. The algorithms that the latter write …
Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen
Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen
All Faculty Scholarship
Big Data is the vast quantities of information amenable to large-scale collection, storage, and analysis. Using such data, companies and researchers can deploy complex algorithms and artificial intelligence technologies to reveal otherwise unascertained patterns, links, behaviors, trends, identities, and practical knowledge. The information that comprises Big Data arises from government and business practices, consumer transactions, and the digital applications sometimes referred to as the “Internet of Things.” Individuals invisibly contribute to Big Data whenever they live digital lifestyles or otherwise participate in the digital economy, such as when they shop with a credit card, get treated at a hospital, apply …
The History, Means, And Effects Of Structural Surveillance, Jeffrey L. Vagle
The History, Means, And Effects Of Structural Surveillance, Jeffrey L. Vagle
All Faculty Scholarship
The focus on the technology of surveillance, while important, has had the unfortunate side effect of obscuring the study of surveillance generally, and tends to minimize the exploration of other, less technical means of surveillance that are both ubiquitous and self-reinforcing—what I refer to as structural surveillance— and their effects on marginalized and disenfranchised populations. This Article proposes a theoretical framework for the study of structural surveillance which will act as a foundation for follow-on research in its effects on political participation.
Wisconsin School For Girls Inmate Record Books: A Case Study Of Redacted Digitization, Eric Willey, Laura Farley
Wisconsin School For Girls Inmate Record Books: A Case Study Of Redacted Digitization, Eric Willey, Laura Farley
Faculty and Staff Publications – Milner Library
The Wisconsin School for Girls collection housed in the Wisconsin Historical Society (WHS) archives contains a variety of documents from the institution’s period of operation. Inmates who were admitted to the institution were predominately juvenile females at the time of the records’ creation; because of this, the contents of the records are protected by Wisconsin state statutes, which mandate restricted access for patrons as well as limitations on the use of the information contained within the records. This article examines how the restrictions on the collection continue to protect the privacy of the inmates and their descendants, what procedures WHS …
Librarians As Advocates For Social Media Privacy, Sarah Lamdan
Librarians As Advocates For Social Media Privacy, Sarah Lamdan
LACUNY Institute 2015
Librarians must continue their traditional roles as privacy rights activists and intellectual freedom upholders into the digital age, and across electronic information sources, including social media fora. Social media is quickly becoming a major source of information and center for information seeking, and librarians have an opportunity to promote and help shape social media policies that protect users’ privacy and assure that users can seek information without inhibition. One way librarians can be involved in the promotion of online privacy is by joining the social media user rights movement and advocating terms of use agreements that protect information seekers that …
Are They Worth Reading? An In-Depth Analysis Of Online Trackers’ Privacy Policies, Candice Hoke, Lorrie Faith Cranor, Pedro Giovanni Leon, Alyssa Au
Are They Worth Reading? An In-Depth Analysis Of Online Trackers’ Privacy Policies, Candice Hoke, Lorrie Faith Cranor, Pedro Giovanni Leon, Alyssa Au
Law Faculty Articles and Essays
We analyzed the privacy policies of 75 online tracking companies with the goal of assessing whether they contain information relevant for users to make privacy decisions. We compared privacy policies from large companies, companies that are members of self-regulatory organizations, and nonmember companies and found that many of them are silent with regard to important consumer-relevant practices including the collection and use of sensitive information and linkage of tracking data with personally-identifiable information. We evaluated these policies against self-regulatory guidelines and found that many policies are not fully compliant. Furthermore, the overly general requirements established in those guidelines allow companies …
The 4th Amendment To The U.S. Constitution, Article 3 Of The Ala Code Of Ethics, And Section 215 Of The Usa Patriot Act: Squaring The Triangle, Sue Ann Gardner
The 4th Amendment To The U.S. Constitution, Article 3 Of The Ala Code Of Ethics, And Section 215 Of The Usa Patriot Act: Squaring The Triangle, Sue Ann Gardner
University of Nebraska-Lincoln Libraries: Conference Presentations and Speeches
Librarians in the United States have many professional guideposts to inform their work. A patron's right to privacy is one tenet that tends to be upheld tenaciously, and is informed first by the 4th Amendment to the U.S. Constitution, among other Amendments, as well as Article III of the American Library Association Code of Ethics. Section 215 of the USA PATRIOT Act, the so-called "library provision," contradicts both the 4th Amendment and Article III of the ALA Code of Ethics, making it a weak third leg of a triangle of guideposts. The speaker explains how Section 215 allows for confiscation …
Push, Pull, And Spill: A Transdisciplinary Case Study In Municipal Open Government, Jan Whittington, Ryan Calo, Mike Simon, Jesse Woo, Meg Young, Perter Schmiedeskamp
Push, Pull, And Spill: A Transdisciplinary Case Study In Municipal Open Government, Jan Whittington, Ryan Calo, Mike Simon, Jesse Woo, Meg Young, Perter Schmiedeskamp
Articles
Municipal open data raises hopes and concerns. The activities of cities produce a wide array of data, data that is vastly enriched by ubiquitous computing. Municipal data is opened as it is pushed to, pulled by, and spilled to the public through online portals, requests for public records, and releases by cities and their vendors, contractors, and partners. By opening data, cities hope to raise public trust and prompt innovation. Municipal data, however, is often about the people who live, work, and travel in the city. By opening data, cities raise concern for privacy and social justice.
This article presents …
Can Americans Resist Surveillance?, Ryan Calo
Can Americans Resist Surveillance?, Ryan Calo
Articles
This Essay analyzes the ability of everyday Americans to resist and alter the conditions of government surveillance. Americans appear to have several avenues of resistance or reform. We can vote for privacy-friendly politicians, challenge surveillance in court, adopt encryption or other technologies, and put market pressure on companies not to cooperate with law enforcement.
In practice, however, many of these avenues are limited. Reform-minded officials lack the capacity for real oversight. Litigants lack standing to invoke the Constitution in court. Encryption is not usable and can turn citizens into targets. Citizens can extract promises from companies to push back against …
Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo
Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo
Articles
In 1986, Congress passed the Stored Communications Act (“SCA”) to provide additional protections for individuals’ private communications content held in electronic storage by third parties. Acting out of direct concern for the implications of the Third-Party Records Doctrine — a judicially created doctrine that generally eliminates Fourth Amendment protections for information entrusted to third parties — Congress sought to tailor the SCA to electronic communications sent via and stored by third parties. Yet, because Congress crafted the SCA with language specific to the technology of 1986, courts today have struggled to apply the SCA consistently with regard to similar private …
Neuroprediction: New Technology, Old Problems, Stephen J. Morse
Neuroprediction: New Technology, Old Problems, Stephen J. Morse
All Faculty Scholarship
Neuroprediction is the use of structural or functional brain or nervous system variables to make any type of prediction, including medical prognoses and behavioral forecasts, such as an indicator of future dangerous behavior. This commentary will focus on behavioral predictions, but the analysis applies to any context. The general thesis is that using neurovariables for prediction is a new technology, but that it raises no new ethical issues, at least for now. Only if neuroscience achieves the ability to “read” mental content will genuinely new ethical issues be raised, but that is not possible at present.
Marital Supremacy And The Constitution Of The Nonmarital Family, Serena Mayeri
Marital Supremacy And The Constitution Of The Nonmarital Family, Serena Mayeri
All Faculty Scholarship
Despite a transformative half century of social change, marital status still matters. The marriage equality movement has drawn attention to the many benefits conferred in law by marriage at a time when the “marriage gap” between affluent and poor Americans widens and rates of nonmarital childbearing soar. This Essay explores the contested history of marital supremacy—the legal privileging of marriage—through the lens of the “illegitimacy” cases of the 1960s and 1970s. Often remembered as a triumph for nonmarital families, these decisions defined the constitutional harm of illegitimacy classifications as the unjust punishment of innocent children for the “sins” of their …
I Remember Richelieu: Is Anything Secure Anymore?, Michael G. Crowley, Michael N. Johnstone
I Remember Richelieu: Is Anything Secure Anymore?, Michael G. Crowley, Michael N. Johnstone
Australian Security and Intelligence Conference
Petraeus-gate, hacked nude celebrity photos in the cloud and the recent use of a search and seizure warrant in the United States of America to seek production of customer email contents on an extraterritorial server raises important issues for the supposably safe storage of data on the World Wide Web. Not only may there be nowhere to hide in cyberspace but nothing in cyberspace may be private. This paper explores the legal and technical issues raised by the these matters with emphasis on the courts decision “In the Matter of a Warrant to Search a Certain E-Mail Account Controlled and …
Public Assistance, Drug Testing, And The Law: The Limits Of Population-Based Legal Analysis, Candice T. Player
Public Assistance, Drug Testing, And The Law: The Limits Of Population-Based Legal Analysis, Candice T. Player
All Faculty Scholarship
In Populations, Public Health and the Law, legal scholar Wendy Parmet urges courts to embrace population-based legal analysis, a public health inspired approach to legal reasoning. Parmet contends that population-based legal analysis offers a way to analyze legal issues—not unlike law and economics—as well as a set of values from which to critique contemporary legal discourse. Population-based analysis has been warmly embraced by the health law community as a bold new way of analyzing legal issues. Still, population-based analysis is not without its problems. At times, Parmet claims too much territory for the population perspective. Moreover, Parmet urges courts …
A Corporate Right To Privacy, Elizabeth Pollman
A Corporate Right To Privacy, Elizabeth Pollman
All Faculty Scholarship
The debate over the scope of constitutional protections for corporations has exploded with commentary on recent or pending Supreme Court cases, but scholars have left unexplored some of the hardest questions for the future, and the ones that offer the greatest potential for better understanding the nature of corporate rights. This Article analyzes one of those questions — whether corporations have, or should have, a constitutional right to privacy. First, the Article examines the contours of the question in Supreme Court jurisprudence and provides the first scholarly treatment of the growing body of conflicting law in the lower courts on …
Intellectual Property And Public Health – A White Paper, Ryan G. Vacca, James Ming Chen, Jay Dratler Jr., Thomas Folsom, Timothy S. Hall, Yaniv Heled, Frank A. Pasquale Iii, Elizabeth A. Reilly, Jeffrey Samuels, Katherine J. Strandburg, Kara W. Swanson, Andrew W. Torrance, Katharine A. Van Tassel
Intellectual Property And Public Health – A White Paper, Ryan G. Vacca, James Ming Chen, Jay Dratler Jr., Thomas Folsom, Timothy S. Hall, Yaniv Heled, Frank A. Pasquale Iii, Elizabeth A. Reilly, Jeffrey Samuels, Katherine J. Strandburg, Kara W. Swanson, Andrew W. Torrance, Katharine A. Van Tassel
Law Faculty Scholarship
On October 26, 2012, the University of Akron School of Law’s Center for Intellectual Property and Technology hosted its Sixth Annual IP Scholars Forum. In attendance were thirteen legal scholars with expertise and an interest in IP and public health who met to discuss problems and potential solutions at the intersection of these fields. This report summarizes this discussion by describing the problems raised, areas of agreement and disagreement between the participants, suggestions and solutions made by participants and the subsequent evaluations of these suggestions and solutions. Led by the moderator, participants at the Forum focused generally on three broad …
Privacy Law: Positive Theory And Normative Practice, Anita L. Allen
Privacy Law: Positive Theory And Normative Practice, Anita L. Allen
All Faculty Scholarship
No abstract provided.
Who's In Charge Here? Information Privacy In A Social Networking World, Lisa Di Valentino
Who's In Charge Here? Information Privacy In A Social Networking World, Lisa Di Valentino
FIMS Presentations
No abstract provided.
Access For All: A Review Of “Law Libraries, Government Transparency, And The Internet,” A Presentation By Daniel Schuman Of The Sunlight Foundation At The All-Sis Meeting, July 22, 2012, Susan David Demaine
Access For All: A Review Of “Law Libraries, Government Transparency, And The Internet,” A Presentation By Daniel Schuman Of The Sunlight Foundation At The All-Sis Meeting, July 22, 2012, Susan David Demaine
Articles by Maurer Faculty
Attendees at the ALL-SIS Breakfast and Business Meeting at the AALL Annual Meeting had the pleasure of hearing from Daniel Schuman of the Sunlight Foundation speak on “Law Libraries, Government Transparency, and the Internet.” The Sunlight Foundation is a nonpartisan, nonprofit organization whose mission is to increase access to federal government information resources through advocacy and the development of information technology tools.
When Antitrust Met Facebook, Christopher S. Yoo
When Antitrust Met Facebook, Christopher S. Yoo
All Faculty Scholarship
Social networks are among the hottest phenomena on the Internet. Facebook eclipsed Google as the most visited website in both 2010 and 2011. Moreover, according to Nielsen estimates, as of the end of 2011 the average American spent nearly seven hours per month on Facebook, which is more time than they spent on Google, Yahoo!, YouTube, Microsoft, and Wikipedia combined. LinkedIn’s May 19, 2011 initial public offering (“IPO”) surpassed expectations, placing the value of the company at nearly $9 billion, and approximately a year later, its stock price had risen another 20 percent. Facebook followed suit a year later with …
Keeping And Deleting Patron Records In Law Libraries, Benjamin J. Keele
Keeping And Deleting Patron Records In Law Libraries, Benjamin J. Keele
Library Staff Publications
No abstract provided.
The Sidis Case And The Origins Of Modern Privacy Law, Samantha Barbas
The Sidis Case And The Origins Of Modern Privacy Law, Samantha Barbas
Journal Articles
The American press, it’s been said, is freer to invade personal privacy than perhaps any other in the world. The tort law of privacy, as a shield against unwanted media exposure of private life, is very weak. The usual reason given for the weakness of U.S. privacy law as a bar on the publication of private information is the strong tradition of First Amendment freedom. But “freedom of the press” alone cannot explain why liberty to publish has been interpreted as a right to print truly intimate matters or to thrust people into the spotlight against their will. Especially in …
Electronic Privacy And Employee Speech, Pauline Kim
Electronic Privacy And Employee Speech, Pauline Kim
Scholarship@WashULaw
The boundary between work and private life is blurring as a result of changes in the organization of work and advances in technology. Current privacy law is ill-equipped to address these changes and as a result, employees’ privacy in their electronic communications is only weakly protected from employer scrutiny. At the same time, the law increasingly protects certain socially valued forms of employee speech. In particular, collective speech, speech that enforces workplace regulations and speech that deters or reports employer wrong-doing are explicitly protected by law from employer reprisals. These two developments — weak protection of employee privacy and increased …
Cloud Computing: Architectural And Policy Implications, Christopher S. Yoo
Cloud Computing: Architectural And Policy Implications, Christopher S. Yoo
All Faculty Scholarship
Cloud computing has emerged as perhaps the hottest development in information technology. Despite all of the attention that it has garnered, existing analyses focus almost exclusively on the issues that surround data privacy without exploring cloud computing’s architectural and policy implications. This article offers an initial exploratory analysis in that direction. It begins by introducing key cloud computing concepts, such as service-oriented architectures, thin clients, and virtualization, and discusses the leading delivery models and deployment strategies that are being pursued by cloud computing providers. It next analyzes the economics of cloud computing in terms of reducing costs, transforming capital expenditures …
Associational Privacy And The First Amendment: Naacp V. Alabama, Privacy And Data Protection, Anita L. Allen
Associational Privacy And The First Amendment: Naacp V. Alabama, Privacy And Data Protection, Anita L. Allen
All Faculty Scholarship
No abstract provided.
Free Speech And The Myth Of The Internet As An Unintermediated Experience, Christopher S. Yoo
Free Speech And The Myth Of The Internet As An Unintermediated Experience, Christopher S. Yoo
All Faculty Scholarship
In recent years, a growing number of commentators have raised concerns that the decisions made by Internet intermediaries — including last-mile network providers, search engines, social networking sites, and smartphones — are inhibiting free speech and have called for restrictions on their ability to prioritize or exclude content. Such calls ignore the fact that when mass communications are involved, intermediation helps end users to protect themselves from unwanted content and allows them to sift through the avalanche of desired content that grows ever larger every day. Intermediation also helps solve a number of classic economic problems associated with the Internet. …
Liberating Copyright: Thinking Beyond Free Speech, Jennifer E. Rothman
Liberating Copyright: Thinking Beyond Free Speech, Jennifer E. Rothman
All Faculty Scholarship
Scholars have often turned to the First Amendment to limit the scope of ever-expanding copyright law. This approach has mostly failed to convince courts that independent review is merited and has offered little to individuals engaged in personal rather than political or cultural expression. In this Article, I consider the value of an alternative paradigm using the lens of substantive due process and liberty to evaluate users’ rights. A liberty-based approach uses this other developed body of constitutional law to demarcate justifiable personal, identity-based uses of copyrighted works. Uses that are essential for mental integrity, intimacy promotion, communication, or religious …
A Fourth Amendment For The Poor Alone: Subconstitutional Status And The Myth Of The Inviolate Home, Jordan C. Budd
A Fourth Amendment For The Poor Alone: Subconstitutional Status And The Myth Of The Inviolate Home, Jordan C. Budd
Law Faculty Scholarship
For much of our nation’s history, the poor have faced pervasive discrimination in the exercise of fundamental rights. Nowhere has the impairment been more severe than in the area of privacy. This Article considers the enduring legacy of this tradition with respect to the Fourth Amendment right to domestic privacy. Far from a matter of receding historical interest, the diminution of the poor’s right to privacy has accelerated in recent years and now represents a powerful theme within the jurisprudence of poverty. Triggering this development has been a series of challenges to aggressive administrative practices adopted by localities in the …
Regulating The Use Of Genetic Information: Perspective From The U.S. Experience, Pauline Kim
Regulating The Use Of Genetic Information: Perspective From The U.S. Experience, Pauline Kim
Scholarship@WashULaw
This essay comments on an empirical study documenting the policies, practices, and attitudes of Australian employers regarding the use of genetic information from the U.S. perspective. The U.S. Congress recently enacted the Genetic Information Nondiscrimination Act of 2008 (GINA), which, among other things, prohibits employment discrimination on the basis of genetic information and restricts employers’ access to their employees’ genetic information. Just as the Australian study found no evidence of systematic use of genetic testing or screening by employers, GINA was passed in the absence of any evidence of widespread employment discrimination on the basis of genetic characteristics. Although it …
The Changing Patterns Of Internet Usage, Christopher S. Yoo
The Changing Patterns Of Internet Usage, Christopher S. Yoo
All Faculty Scholarship
The Internet unquestionably represents one of the most important technological developments in recent history. It has revolutionized the way people communicate with one another and obtain information and created an unimaginable variety of commercial and leisure activities. Interestingly, many members of the engineering community often observe that the current network is ill-suited to handle the demands that end users are placing on it. Indeed, engineering researchers often describe the network as ossified and impervious to significant architectural change. As a result, both the U.S. and the European Commission are sponsoring “clean slate” projects to study how the Internet might be …