Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (10)
- Comparative and Foreign Law (3)
- Intellectual Property Law (3)
- Privacy Law (3)
- International Law (2)
-
- Banking and Finance Law (1)
- Civil Rights and Discrimination (1)
- Communications Law (1)
- Constitutional Law (1)
- Criminal Law (1)
- Disability Law (1)
- Entertainment, Arts, and Sports Law (1)
- Family Law (1)
- Fourth Amendment (1)
- Health Law and Policy (1)
- Labor and Employment Law (1)
- Law and Society (1)
- Legal Education (1)
- Legal History (1)
- Other Law (1)
- Science and Technology Law (1)
- Sexuality and the Law (1)
Articles 1 - 21 of 21
Full-Text Articles in Law
Policing "Bad" Mothers, I. Bennett Capers
Policing "Bad" Mothers, I. Bennett Capers
Faculty Scholarship
Jessamine Chan’s The School for Good Mothers — a speculative novel about a mother who abandons her child for a few hours and is required to attend a school for good mothers to regain custody — may not be a great book, but it is a good yarn, and a page turner, and thought-provoking. Thought-provoking, because to measure her fitness to be a mother, the protagonist is assigned a robot doppelganger of her child — one that is sentient, one that seems almost real, one that might even pass the Turing test, and one that she is required not only …
Menstrual Dignity And The Bar Exam, Marcy L. Karin, Margaret E. Johnson, Elizabeth B. Cooper
Menstrual Dignity And The Bar Exam, Marcy L. Karin, Margaret E. Johnson, Elizabeth B. Cooper
Faculty Scholarship
This Article examines the issue of menstruation and the administration of the bar exam. Although such problems are not new, over the summer and fall of 2020, test takers and commentators took to social media to critique state board of law examiners’ (“BOLE”) policies regarding menstruation. These problems persist. Menstruators worry that if they unexpectedly bleed during the exam, they may not have access to appropriately sized and constructed menstrual products or may be prohibited from accessing the bathroom. Personal products that are permitted often must be carried in a clear, plastic bag. Some express privacy concerns that the see-through …
Apis And Your Privacy, N. Cameron Russell
Apis And Your Privacy, N. Cameron Russell
Faculty Scholarship
Application programming interfaces, or APIs, have been the topic of much recent discussion. Newsworthy events, including those involving Facebook’s API and Cambridge Analytica obtaining information about millions of Facebook users, have highlighted the technical capabilities of APIs for prominent websites and mobile applications. At the same time, media coverage of ways that APIs have been misused has sparked concern for potential privacy invasions and other issues of public policy. This paper seeks to educate consumers on how APIs work and how they are used within popular websites and mobile apps to gather, share, and utilize data.
APIs are used in …
Maps: Scaling Privacy Compliance Analysis To A Million Apps, Sebastian Zimmeck, Peter Story, Daniel Smullen, Abhilasha Ravichander, Ziqi Wang, Joel R. Reidenberg, N. Cameron Russell, Norman Sadeh
Maps: Scaling Privacy Compliance Analysis To A Million Apps, Sebastian Zimmeck, Peter Story, Daniel Smullen, Abhilasha Ravichander, Ziqi Wang, Joel R. Reidenberg, N. Cameron Russell, Norman Sadeh
Faculty Scholarship
The app economy is largely reliant on data collection as its primary revenue model. To comply with legal requirements, app developers are often obligated to notify users of their privacy practices in privacy policies. However, prior research has suggested that many developers are not accurately disclosing their apps’ privacy practices. Evaluating discrepancies between apps’ code and privacy policies enables the identification of potential compliance issues. In this study, we introduce the Mobile App Privacy System (MAPS) for conducting an extensive privacy census of Android apps. We designed a pipeline for retrieving and analyzing large app populations based on code analysis …
Disagreeable Privacy Policies: Mismatches Between Meaning And Users’ Understanding, Joel R. Reidenberg, Travis Breaux, Lorrie F. Cranor, Brian M. French, Amanda Grannis, James T. Graves, Fei Liu, Aleecia Mcdonald, Thomas B. Norton, Rohan Ramanath, N. Cameron Russell, Norman Sadeh, Florian Schaub
Disagreeable Privacy Policies: Mismatches Between Meaning And Users’ Understanding, Joel R. Reidenberg, Travis Breaux, Lorrie F. Cranor, Brian M. French, Amanda Grannis, James T. Graves, Fei Liu, Aleecia Mcdonald, Thomas B. Norton, Rohan Ramanath, N. Cameron Russell, Norman Sadeh, Florian Schaub
Faculty Scholarship
Privacy policies are verbose, difficult to understand, take too long to read, and may be the least-read items on most websites even as users express growing concerns about information collection practices. For all their faults, though, privacy policies remain the single most important source of information for users to attempt to learn how companies collect, use, and share data. Likewise, these policies form the basis for the self-regulatory notice and choice framework that is designed and promoted as a replacement for regulation. The underlying value and legitimacy of notice and choice depends, however, on the ability of users to understand …
Failing Expectations: Fourth Amendment Doctrine In The Era Of Total Surveillance, Olivier Sylvain
Failing Expectations: Fourth Amendment Doctrine In The Era Of Total Surveillance, Olivier Sylvain
Faculty Scholarship
Today’s reasonable expectation test and the third-party doctrine have little to nothing to offer by way of privacy protection if users today are at least conflicted about whether transactional noncontent data should be shared with third parties, including law enforcement officials. This uncertainty about how to define public expectation as a descriptive matter has compelled courts to defer to legislatures to find out what public expectation ought to be more as a matter of prudence than doctrine. Courts and others presume that legislatures are far better than courts at defining public expectations about emergent technologies.This Essay argues that the reasonable …
Beyond Title Vii: Rethinking Race, Ex-Offender Status, And Employment Discrimination In The Information Age, Kimani Paul-Emile
Beyond Title Vii: Rethinking Race, Ex-Offender Status, And Employment Discrimination In The Information Age, Kimani Paul-Emile
Faculty Scholarship
More than sixty-five million people in the United States—more than one in four adults—have had some involvement with the criminal justice system that will appear on a criminal history report. A rapidly expanding, for-profit industry has developed to collect these records and compile them into electronic databases, offering employers an inexpensive and readily accessible means of screening prospective employees. Nine out of ten employers now inquire into the criminal history of job candidates, systematically denying individuals with a criminal record any opportunity to gain work experience or build their job qualifications. This is so despite the fact that many individuals …
Commentary, Critical Legal Theory In Intellectual Property And Information Law Scholarship, Cardozo Arts & Entertainment Law Journal Spring Symposium, Sonia K. Katyal, Peter Goodrich
Commentary, Critical Legal Theory In Intellectual Property And Information Law Scholarship, Cardozo Arts & Entertainment Law Journal Spring Symposium, Sonia K. Katyal, Peter Goodrich
Faculty Scholarship
The very definition and scope of CLS (critical legal studies) is itself subject to debate. Some scholars characterize CLS as scholarship that employs a particular methodology—more of a “means” than an “end.” On the other hand, some scholars contend that CLS scholarship demonstrates a collective commitment to a political end goal—an emancipation of sorts —through the identification of, and resistance to, exploitative power structures that are reinforced through law and legal institutions. After a brief golden age, CLS scholarship was infamously marginalized in legal academia and its sub-disciplines. But CLS themes now appear to be making a resurgence—at least in …
The Simplification Of International Data Privacy Rules, Joel R. Reidenberg
The Simplification Of International Data Privacy Rules, Joel R. Reidenberg
Faculty Scholarship
The variation and complexity of national data privacy rules pose significant challenges for international data flows. Data protection laws range from ad hoc narrow legal rights, like those found in the United States, to comprehensive fair information practice statutes like those found in Europe. Because data processing frequently occurs across national borders, multiple data protection laws might apply simultaneously to international data flows. At the same time, data protection regimes may prohibit the circumvention of national standards by processing personal information at a foreign site. Global information processing thus presents a data controller with important burdens and obstacles related to …
Sexuality And Sovereignty: The Global Limits And Possibilities Of Lawrence Symposium: Legal Rights In Historical Perspective: From The Margins To The Mainstream, Sonia K. Katyal
Faculty Scholarship
In the summer of 2003, the Supreme Court handed gay and lesbian activists a stunning victory in the decision of Lawrence v. Texas, which summarily overruled Bowers v. Hardwick. At issue was whether Texas' prohibition of same-sex sexual conduct violated the Due Process Clause of the U.S. Constitution. In a powerful, poetic, and strident opinion, Justice Kennedy, writing for a six-member majority, reversed Bowers, observing that individual decisions regarding physical intimacy between consenting adults, either of the same or opposite sex, are constitutionally protected, and thus fall outside of the reach of state intervention. Volumes can be written about the …
Le Droit Et Les Reseaux Internationaux D'Information, Joel R. Reidenberg
Le Droit Et Les Reseaux Internationaux D'Information, Joel R. Reidenberg
Faculty Scholarship
Travaux pour obtenir le grade de Docteur De L'Universite Paris I. Discipline: Droit. Sujet des publications: Le Droit Et Les Reseaux Internationaux D'Information
New Surveillance, The , Sonia K. Katyal
New Surveillance, The , Sonia K. Katyal
Faculty Scholarship
A few years ago, it was fanciful to imagine a world where intellectual property owners - such as record companies, software owners, and publishers - were capable of invading the most sacred areas of the home in order to track, deter, and control uses of their products. Yet, today, strategies of copyright enforcement have rapidly multiplied, each strategy more invasive than the last. This new surveillance exposes the paradoxical nature of the Internet: It offers both the consumer and creator a seemingly endless capacity for human expression - a virtual marketplace of ideas - alongside an insurmountable array of capacities …
States And Internet Enforcement, Joel R. Reidenberg
States And Internet Enforcement, Joel R. Reidenberg
Faculty Scholarship
This essay addresses the enforcement of decisions through internet instruments. The starting point is a brief justification of internet enforcement as the obligation of democratic states. Next, the essay argues that the movement to re-engineer the internet infrastructure by public and private actions also facilitates state enforcement of legal and policy decisions. The essay maintains that states will increasingly try to use network intermediaries such as payment systems and Internet Service Providers as enforcement instruments. Finally, and most importantly, the essay focuses on ways that states may harness the power of technological instruments such as worms, filters and packet interceptors …
Privacy Wrongs In Search Of Remedies, Joel R. Reidenberg
Privacy Wrongs In Search Of Remedies, Joel R. Reidenberg
Faculty Scholarship
The American legal system has generally rejected legal rights for data privacy and relies instead on market self-regulation and the litigation process to establish norms of appropriate behavior in society. Information privacy is protected only through an amalgam of narrowly targeted rules. The aggregation of these specific rights leaves many significant gaps and fewer clear remedies for violations of fair information practices. With an absence of well-established legal rights, privacy wrongs are currently in search of remedies. This Article first describes privacy rights and wrongs that frame the search for remedies in the United States. It explores public enforcement of, …
E-Commerce And Trans-Atlantic Privacy, Joel R. Reidenberg
E-Commerce And Trans-Atlantic Privacy, Joel R. Reidenberg
Faculty Scholarship
For almost a decade, the United States and Europe have anticipated a clash over the protection of personal information. Between the implementation in Europe of comprehensive legal protections pursuant to the directive on data protection and the continued reliance on industry self-regulation in the United States, trans-Atlantic privacy policies have been at odds with each other. The rapid growth in e-commerce is now sparking the long-anticipated trans-Atlantic privacy clash. This Article will first look at the context of American e-commerce and the disjuncture between citizens' privacy and business practices. The Article will then turn to the international context and explore …
Restoring Americans' Privacy In Electronic Commerce Symposium - The Legal And Policy Framework For Global Electronic Commerce: A Progress Report, Joel R. Reidenberg
Restoring Americans' Privacy In Electronic Commerce Symposium - The Legal And Policy Framework For Global Electronic Commerce: A Progress Report, Joel R. Reidenberg
Faculty Scholarship
In the United States today, substance abusers have greater privacy than web users and privacy has become the critical issue for the development of electronic commerce. Yet, the U.S. government’s privacy policy relies on industry self-regulation rather than legal rights. This article argues that the theory of self-regulation has normative flaws and that public experience shows the failure of industry to implement fair information practices. Together the flawed theory and data scandals demonstrate the sophistry of U.S. policy. The article then examines the comprehensive legal rights approach to data protection that has been adopted by governments around the world, most …
Resolving Conflicting International Data Privacy Rules In Cyberspace, Joel R. Reidenberg
Resolving Conflicting International Data Privacy Rules In Cyberspace, Joel R. Reidenberg
Faculty Scholarship
While core principles for the fair treatment of personal information are common to democracies, privacy rights vary considerably across national borders. This article explores the divergences in approach and substance of data privacy between Europe and the United States. It argues that the specific privacy rules adopted in a country have a governance function. The article shows that national differences support two distinct political choices for the roles in democratic society assigned to the state, the market and the individual: either liberal, market-based governance or socially-protective, rights-based governance. These structural divergences make international cooperation imperative for effective data protection in …
Lex Informatica: The Formulation Of Information Policy Rules Through Technology , Joel R. Reidenberg
Lex Informatica: The Formulation Of Information Policy Rules Through Technology , Joel R. Reidenberg
Faculty Scholarship
Historically, law and government regulation have established default rules for information policy, including constitutional rules on freedom of expression and statutory rights of ownership of information. This Article will show that for network environments and the Information Society, however, law and government regulation are not the only source of rule-making. Technological capabilities and system design choices impose rules on participants. The creation and implementation of information policy are embedded in network designs and standards as well as in system configurations. Even user preferences and technical choices create overarching, local default rules. This Article argues, in essence, that the set of …
Governing Networks And Rule-Making In Cyberspace, Joel R. Reidenberg
Governing Networks And Rule-Making In Cyberspace, Joel R. Reidenberg
Faculty Scholarship
The global network environment defies traditional regulatory theories and policymaking practices. At present, policymakers and private sector organizations are searching for appropriate regulatory strategies to encourage and channel the global information infrastructure (“GII”). Most attempts to define new rules for the development of the GII rely on disintegrating concepts of territory and sector, while ignoring the new network and technological borders that transcend national boundaries. The GII creates new models and sources for rules. Policy leadership requires a fresh approach to the governance of global networks. Instead of foundering on old concepts, the GII requires a new paradigm for governance …
Setting Standards For Fair Information Practice In The U.S. Private Sector, Joel R. Reidenberg
Setting Standards For Fair Information Practice In The U.S. Private Sector, Joel R. Reidenberg
Faculty Scholarship
The confluence of plans for an Information Superhighway, actual industry self-regulatory practices, and international pressure dictate renewed consideration of standard setting for fair information practices in the U.S. private sector. The legal rules, industry norms, and business practices that regulate the treatment of personal information in the United States are organized in a wide and dispersed manner. This Article analyzes how these standards are established in the U.S. private sector. Part I argues that the U.S. standards derive from the influence of American political philosophy on legal rule making and a preference for dispersed sources of information standards. Part II …
The Privacy Obstacle Course: Hurding Barriers To Transnational Financial Services, Joel R. Reidenberg
The Privacy Obstacle Course: Hurding Barriers To Transnational Financial Services, Joel R. Reidenberg
Faculty Scholarship
This article addresses the challenge to transnational financial services resulting from national regulation of information processing. National laws around the world seek to define fair information practices for the private sector and contain prohibitions on data transfers to foreign destinations that lack sufficient privacy protection. The effect of these laws for the financial services industry is significant because financial services depend on personal information. The article argues that the international attempts to harmonize information practice standards and the national efforts to regulate information processing encourage divergence of national standards for financial services. It argues that regulatory flexibility and customization is …