Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
- Publication Type
Articles 1 - 9 of 9
Full-Text Articles in Law
Law School News: Logan To Serve As Adviser On Restatement Third Of Torts 11-07-2019, Michael M. Bowden
Law School News: Logan To Serve As Adviser On Restatement Third Of Torts 11-07-2019, Michael M. Bowden
Life of the Law School (1993- )
No abstract provided.
Remedies, Neutral Rules And Free Speech, David F. Partlett, Russell L. Weaver
Remedies, Neutral Rules And Free Speech, David F. Partlett, Russell L. Weaver
Russell L. Weaver
In general, plaintiffs’ ability to obtain substantial damages against media defendants is directly proportional to their ability to obtain so called “publication damages.”...In future cases, the courts may be forced to deal more straightforwardly with the First Amendment issues. In Sanders, the court avoided those issues because they were not raised. As a result, the court left open the possibility that, even in an intrusion case a media defendant might be allowed to show that the invasion of privacy was “justified by the legitimate motive of gathering the news.”...Moreover, the very existence of the litigation undoubtedly has a negative impact …
Privacy, Freedom, And Technology—Or “How Did We Get Into This Mess?”, Alex Alben
Privacy, Freedom, And Technology—Or “How Did We Get Into This Mess?”, Alex Alben
Seattle University Law Review
Can we live in a free society without personal privacy? The question is worth pondering, not only in light of the ongoing debate about government surveillance of private communications, but also because new technologies continue to erode the boundaries of our personal space. This Article examines our loss of freedom in a variety of disparate contexts, all connected by the thread of erosion of personal privacy. In the scenarios explored here, privacy reducing activities vary from government surveillance, personal stalking conducted by individuals, and profiling by data-driven corporations, to political actors manipulating social media platforms. In each case, new technologies …
Footprints: Privacy For Enterprises, Processors, And Custodians…Oh My!, Blair Witzel, Carrie Mount
Footprints: Privacy For Enterprises, Processors, And Custodians…Oh My!, Blair Witzel, Carrie Mount
Seattle University Law Review
Americans’ interest in privacy—as evidenced by increasing news coverage, online searches, and new legislation—has grown over the past decade. After the European Union enacted the General Data Protection Regulation (GDPR), technologists and legal professionals have focused on primary collectors of data—known under various legal regimes as the “controller” or “custodian.” Thanks to advances in computing, many of these data collectors offload the processing of data to third parties providing data-related cloud services like Amazon, Microsoft, and Google. In addition to the data they have already collected about the data subjects themselves, these companies now “hold” that data on behalf of …
Privacy Statements Under The Gdpr, Mike Hintze
Privacy Statements Under The Gdpr, Mike Hintze
Seattle University Law Review
The need to include specific types of information in a privacy statement is a GDPR compliance obligation that does not get as much attention as some other GDPR requirements. Perhaps that is because privacy statements have been much maligned in recent years. They are too long and full of legalese. Nobody reads them. They are part of a notice and consent approach to privacy that puts an unrealistic burden on consumers to make informed choices. But despite these well-known criticisms, the GDPR doubles down on privacy statements. In fact, gauging by the roughly fourfold increase in privacy statement requirements compared …
Confiding In Con Men: U.S. Privacy Law, The Gdpr, And Information Fiduciaries, Lindsey Barrett
Confiding In Con Men: U.S. Privacy Law, The Gdpr, And Information Fiduciaries, Lindsey Barrett
Seattle University Law Review
In scope, ambition, and animating philosophy, U.S. privacy law and Europe’s General Data Protection Regulation are almost diametric opposites. The GDPR’s ambitious individual rights, significant prohibitions, substantive enforcement regime, and broad applicability contrast vividly with a scattershot U.S. regime that generally prioritizes facilitating commerce over protecting individuals, and which has created perverse incentives for industry through anemic enforcement of the few meaningful limitations that do exist. A privacy law that characterizes data collectors as information fiduciaries could coalesce with the commercial focus of U.S. law, while emulating the GDPR’s laudable normative objectives and fortifying U.S. consumer privacy law with a …
Gdpr Compliance—It Takes A Village, Susy Mendoza
Gdpr Compliance—It Takes A Village, Susy Mendoza
Seattle University Law Review
When the General Data Protection Regulation (GDPR) came into effect in May of 2018, many legal departments were confronted with the gravity of just how they were going to comply with such a wide-reaching law. If you have international customers (both direct to consumer or business to business), it is not hard to convince your general counsel that compliance with the GDPR is a must. You may even be able to get the chief technical officer (CTO) or chief operating officer (COO) onboard just by mentioning the steep fines—two to four percent of worldwide gross revenue. But how does the …
Bytes Bite: Why Corporate Data Breaches Should Give Standing To Affected Individuals, Caden Hayes
Bytes Bite: Why Corporate Data Breaches Should Give Standing To Affected Individuals, Caden Hayes
Washington and Lee Journal of Civil Rights and Social Justice
High-profile data hacks are not uncommon. In fact, according to the Privacy Rights Clearinghouse, there have been at least 7,961 data breaches, exposing over 10,000,000,000 accounts in total, since 2005. These shocking numbers are not particularly surprising when taking into account the value of information stolen. For example, cell phone numbers, as exposed in a Yahoo! hack, are worth $10 a piece on the black market, meaning the hackers stood to make $30,000,000,000 from that one hack. That dollar amount does not even consider copies the hackers could make and later resell. Yet while these hackers make astronomical payoffs, the …
Strict Liability For Genetic Privacy Violations In The Age Of Big Data, Benjamin Sundholm
Strict Liability For Genetic Privacy Violations In The Age Of Big Data, Benjamin Sundholm
Faculty Publications
(Excerpt)
The ethical issues implicated by the misuse of genetic information have been smoldering for over half a century, and the age of big data has turned them into a five-alarm fire. In recent years, medical researchers and commercial enterprises have been using technological advancements to develop a variety of innovative ways to use genetic information. For example, it is becoming increasingly common for people to learn more about their health and family history by paying direct-to-consumer (“DTC”) companies to analyze their genetic data. DTC companies store the results of these tests electronically and often share them with pharmaceutical companies …