Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 16 of 16

Full-Text Articles in Law

The Shaky Ground Of The Right To Be Delisted, Miquel Peguera Aug 2015

The Shaky Ground Of The Right To Be Delisted, Miquel Peguera

Miquel Peguera

It has long been discussed whether individuals should have a “right to be forgotten” online to suppress old information that could seriously interfere with their privacy and data protection rights. In the landmark case of Google Spain v AEPD, the Court of Justice of the European Union addressed the particular question of whether, under EU Data Protection Law, individuals have a right to have links delisted from the list of search results, in searches made on the basis of their name. It found that they do have this right – which can be best described as a “right to be …


Riley V. California: What It Means For Metadata, Border Searches, And The Future Of Privacy, Adam Lamparello Jul 2014

Riley V. California: What It Means For Metadata, Border Searches, And The Future Of Privacy, Adam Lamparello

Adam Lamparello

Private information is no longer stored only in homes or other areas traditionally protected from warrantless intrusion. The private lives of many citizens are contained in a digital device no larger than the palm of their hand—and carried in public places. But that does not make the data within a cell phone any less private, just as the dialing of a phone number does not voluntarily waive an individual’s right to keep their call log or location private. Remember that we are not talking about individuals suspected of committing violent crimes. The Government is recording the calls and locations of …


Criminal Innovation And The Warrant Requirement: Reconsidering The Rights-Police Efficiency Trade-Off, Tonja Jacobi, Jonah Kind Feb 2014

Criminal Innovation And The Warrant Requirement: Reconsidering The Rights-Police Efficiency Trade-Off, Tonja Jacobi, Jonah Kind

Tonja Jacobi

It is routinely assumed that there is a trade-off between police efficiency and the warrant requirement. But existing analysis ignores the interaction between police investigative practices and criminal innovation. Narrowing the definition of a search or otherwise limiting the requirement for a warrant gives criminals greater incentive to innovate to avoid detection. With limited police resources to develop countermeasures, police will often be just as effective at capturing criminals when facing higher Fourth Amendment hurdles. We provide a game theoretic model that shows that when police investigation and criminal innovation are considered in a dynamic context, the police efficiency rationale …


Back To The Future: The Constitution Requires Reasonableness And Particularity—Introducing The “Seize But Don’T Search” Doctrine, Adam Lamparello, Charles E. Maclean Feb 2014

Back To The Future: The Constitution Requires Reasonableness And Particularity—Introducing The “Seize But Don’T Search” Doctrine, Adam Lamparello, Charles E. Maclean

Adam Lamparello

Issuing one-hundred or fewer opinions per year, the United States Supreme Court cannot keep pace with opinions that match technological advancement. As a result, in Riley v. California and United States v. Wurie, the Court needs to announce a broader principle that protects privacy in the digital age. That principle, what we call “seize but don’t search,” recognizes that the constitutional touchstone for all searches is reasonableness.

When do present-day circumstances—the evolution in the Government’s surveillance capabilities, citizens’ phone habits, and the relationship between the NSA and telecom companies—become so thoroughly unlike those considered by the Supreme Court thirty-four years …


What Do We Worry About When We Worry About Price Discrimination? The Law And Ethics Of Using Personal Information For Pricing, Akiva A. Miller Nov 2013

What Do We Worry About When We Worry About Price Discrimination? The Law And Ethics Of Using Personal Information For Pricing, Akiva A. Miller

Akiva A Miller

New information technologies have dramatically increased sellers’ ability to engage in retail price discrimination. Debates over using personal information for price discrimination frequently treat it as a single problem, and are not sufficiently sensitive to the variety of price discrimination practices, the different kinds of information they require in order to succeed, and the different ethical concerns they raise. This paper explores the ethical and legal debate over regulating price discrimination facilitated by consumers’ personal information. Various kinds of “privacy remedies”—self-regulation, technological fixes, state regulation, and legislating private causes of legal action—each have their place. By drawing distinctions between various …


The Surveillance Society And The Third-Party Privacy Problem, Shaun Spencer Mar 2013

The Surveillance Society And The Third-Party Privacy Problem, Shaun Spencer

Shaun Spencer

This article examines a question that has become increasingly important in the emerging surveillance society: should the law treat information as private even though others know about it? This is the third-party privacy problem. Part I explores two competing conceptions of privacy: the binary and contextual conceptions. Part II describes two features of the emerging surveillance society that should change the way we address the third-party privacy problem. One feature, “surveillance on demand,” results from exponential increases in data collection and aggregation. The other feature, “uploaded lives,” reflects a revolution in the type and amount of information that we share …


Contextual Expectations Of Privacy, Andrew Selbst Feb 2013

Contextual Expectations Of Privacy, Andrew Selbst

Andrew Selbst

Fourth Amendment search jurisprudence is nominally based on a “reasonable expectation of privacy,” but actual doctrine is detached from society’s conception of privacy. Courts rely on various binary distinctions: Is a piece of information secret or not? Was the observed conduct inside or outside? While often convenient, none of these binary distinctions can adequately capture the complicated range of ideas encompassed by “privacy.” Privacy theorists have begun to understand that a consideration of social context is essential to a full understanding of privacy. Helen Nissenbaum’s theory of contextual integrity, which characterizes a right to privacy as the preservation of expected …


It's About Time: Privacy, Information Life Cycles, And The Right To Be Forgotten, Meg Leta Ambrose Aug 2012

It's About Time: Privacy, Information Life Cycles, And The Right To Be Forgotten, Meg Leta Ambrose

Meg Leta Ambrose

The current consensus is that information, once online, is there forever. Content permanence has led many European countries, the European Union, and even the United States to establish a right to be forgotten to protect citizens from the shackles of the past presented by the Internet. But, the Internet has not defeated time, and information, like everything, gets old, decays, and dies, even online. Quite the opposite of permanent, the Web cannot be self-preserving. One study from the field of content persistence, a body of research that has been almost wholly overlooked by legal scholars, found that 85% of content …


Contextual Expectations Of Privacy, Andrew Selbst Aug 2012

Contextual Expectations Of Privacy, Andrew Selbst

Andrew Selbst

Fourth Amendment search jurisprudence is nominally based on a “reasonable expectation of privacy,” but actual doctrine is detached from society’s conception of privacy. Courts rely on various binary distinctions: Is a piece of information secret or not? Was the observed conduct inside or outside? While often convenient, none of these binary distinctions can adequately capture the complicated range of ideas encompassed by “privacy.” Over the last decade, privacy theorists have begun to understand that a consideration of context is essential to a full understanding of privacy. Helen Nissenbaum’s theory of contextual integrity, which characterizes a right to privacy as the …


“Technopanics, Threat Inflation, And The Danger Of An Information Technology Precautionary Principle”, Adam Thierer Mar 2012

“Technopanics, Threat Inflation, And The Danger Of An Information Technology Precautionary Principle”, Adam Thierer

Adam Thierer

Fear is an extremely powerful motivational force. In public policy debates, appeals to fear are often used in an attempt to sway opinion or bolster the case for action. Such appeals are used to convince citizens that threats to individual or social wellbeing may be avoided only if specific steps are taken. Often these steps take the form of anticipatory regulation based on the precautionary principle.

Such “fear appeal arguments” are frequently on display in the Internet policy arena and often take the form of a full-blown “moral panic” or “technopanic.” These panics are intense public, political, and academic responses …


The Harmony Between Professional Conscience Rights And Patients’ Right Of Access, Matthew S. Bowman Mar 2012

The Harmony Between Professional Conscience Rights And Patients’ Right Of Access, Matthew S. Bowman

Matthew S Bowman

Abstract: “Access” is the new catchphrase for expanding privacy rights. This shift moves from seeking merely legalization, to demanding government assistance and the participation of private citizens. The trend can be seen across a spectrum of activities such as abortion, contraception, doctor-prescribed suicide, and reproductive technologies. Shifting from legalization to access, however, has precipitated a variety of disputes over the “right of conscience” of health professionals who don’t want to assist activities so defined under the right to privacy. Yet amidst this debate, advocates for and against the right of conscience tend to adopt some of the same, often unspoken, …


Seeking Digital Redemption: The Future Of Forgiveness In The Internet Age, Meg Leta Ambrose Mar 2012

Seeking Digital Redemption: The Future Of Forgiveness In The Internet Age, Meg Leta Ambrose

Meg Leta Ambrose

The Right to be Forgotten, a controversial privacy right that allows users to make information about themselves less accessible after a period of time, is hailed as a pillar of information privacy in some countries while condemned as censorship in others. Psychological and behavioral research indicates that one’s capacity to forget features of the past - or remember them in a different way - is deeply connected to his or her power to forgive others and move on, which in turn, has dramatic impacts on well-being. Second chances and the reinvention of self are deeply intertwined with American history and …


The Politics Of Privacy In The Criminal Justice System: Information Disclosure, The Fourth Amendment, And Statutory Law Enforcement Exemptions, Erin E. Murphy Feb 2012

The Politics Of Privacy In The Criminal Justice System: Information Disclosure, The Fourth Amendment, And Statutory Law Enforcement Exemptions, Erin E. Murphy

Erin E Murphy

When criminal justice scholars think of privacy, they think of the Fourth Amendment. But lately its domain has become far less absolute. The United States federal code currently contains over twenty separate statutes that restrict both acquisition and release of covered information. Largely enacted in the latter part of the twentieth century, these statutes address matters vital to modern existence. They control police access to drivers’ licenses, education records, health histories, telephone calls, e-mail messages, and even video rentals. They conform to no common template, but rather enlist a variety of procedural tools to serve as safeguards – ranging from …


Patient Privacy In The Cloud: Why Congress Should Model Hipaa Enforcement Mechanisms After The Fca To Meet A New Wave Of Privacy Threats From The Implementation Of Cloud-Computing Technologies, Andrew M. Palanzi Feb 2012

Patient Privacy In The Cloud: Why Congress Should Model Hipaa Enforcement Mechanisms After The Fca To Meet A New Wave Of Privacy Threats From The Implementation Of Cloud-Computing Technologies, Andrew M. Palanzi

Andrew M Palanzi

While Congress has taken an important step in amending HIPAA via the HITECH Act to include business associates under many of the provisions of the Privacy and Security Rules, they have ultimately failed to give HIPAA satisfactory enforcement mechanisms by not providing individuals with any course of action to protect their privacy, capping yearly fines at $1,500,000.00, and not requiring stricter enforcement by OCR. Because the Privacy and Security Rules act as the primary legal regulation for the protection of private, sensitive electronic medical records that are stored and transmitted on the cloud, it becomes imperative that these protections are …


Patient Privacy In The Cloud: Why Congress Should Model Hipaa Enforcement Mechanisms After The Fca To Meet A New Wave Of Privacy Threats From The Implementation Of Cloud-Computing Technologies, Andrew M. Palanzi Feb 2012

Patient Privacy In The Cloud: Why Congress Should Model Hipaa Enforcement Mechanisms After The Fca To Meet A New Wave Of Privacy Threats From The Implementation Of Cloud-Computing Technologies, Andrew M. Palanzi

Andrew M Palanzi

While Congress has taken an important step in amending HIPAA via the HITECH Act to include business associates under many of the provisions of the Privacy and Security Rules, they have ultimately failed to give HIPAA satisfactory enforcement mechanisms by not providing individuals with any course of action to protect their privacy, capping yearly fines at $1,500,000.00, and not requiring stricter enforcement by OCR. Because the Privacy and Security Rules act as the primary legal regulation for the protection of private, sensitive electronic medical records that are stored and transmitted on the cloud, it becomes imperative that these protections are …


Protecting Privacy; A Manifestation Of Civic Rights, Hossien Maleky Zadeh Feb 2011

Protecting Privacy; A Manifestation Of Civic Rights, Hossien Maleky Zadeh

hossien Maleky Zadeh

Protecting Privacy; A Manifestation of Civic Rights Written by Hossein Maleky Zadeh; PhD student of Criminal Law and Criminology at the National Academy of Sciences of Armenia Everyone likes to be, in special domains, out of the range of any kind of offensive and control not only by government but also by his most sincere persons; he/she also likes that this right be legally recognized and the violators be punished; such a domain and realm is, in fact, "Privacy"; protecting individuals' Privacy is one of the manifestations of Civic Rights which, by virtue of International and Regional Conventions, has been …