Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 88

Full-Text Articles in Law

Hired By A Machine: Can A New York City Law Enforce Algorithmic Fairness In Hiring Practices?, Lindsey Fuchs Jan 2023

Hired By A Machine: Can A New York City Law Enforce Algorithmic Fairness In Hiring Practices?, Lindsey Fuchs

Fordham Journal of Corporate & Financial Law

Workplace antidiscrimination laws must adapt to address today’s technological realities. If left underregulated, the rapidly expanding role of Artificial Intelligence (“AI”) in hiring practices has the danger of creating new, more obscure modes of discrimination. Companies use these tools to reduce the duration and costs of hiring and potentially attract a larger pool of qualified applicants for their open positions. But how can we guarantee that these hiring tools yield fair outcomes when deployed? These issues are just starting to be addressed at the federal, state, and city levels. This Note tackles whether a new city law can be improved …


Reconciling U.S. Banking And Securities Data Preservation Rules With European Mandatory Data Erasure Under Gdpr, Ronald V. Distante Jan 2020

Reconciling U.S. Banking And Securities Data Preservation Rules With European Mandatory Data Erasure Under Gdpr, Ronald V. Distante

Fordham Journal of Corporate & Financial Law

United States law, which requires financial institutions to retain customer data, conflicts with European Union law, which requires financial institutions to delete customer data on demand. A financial institution operating transnationally cannot comply with both U.S. and EU law. Financial institutions thus face the issue that they cannot possibly delete and retain the same data simultaneously. This Note will clarify the scope and nature of this conflict.

First, it will clarify the conflict by examining (1) the relevant laws, which are Europe’s General Data Protection Regulation (GDPR), the U.S. Bank Secrecy Act, and Securities and Exchange Commission (SEC) regulations, (2) …


Privacy In Gaming, N. Cameron Russell, Joel R. Reidenberg, Sumyung Moon Jan 2019

Privacy In Gaming, N. Cameron Russell, Joel R. Reidenberg, Sumyung Moon

Fordham Intellectual Property, Media and Entertainment Law Journal

Video game platforms and business models are increasingly built on collection, use, and sharing of personal information for purposes of both functionality and revenue. This paper examines privacy issues and explores data practices, technical specifications, and policy statements of the most popular games and gaming platforms to provide an overview of the current privacy legal landscape for mobile gaming, console gaming, and virtual reality devices. The research observes how modern gaming aligns with information privacy notions and norms and how data practices and technologies specific to gaming may affect users and, in particular, child gamers.

After objectively selecting and analyzing …


The Future Of Facial Recognition Is Not Fully Known: Developing Privacy And Security Regulatory Mechanisms For Facial Recognition In The Retail Sector, Elias Wright Jan 2019

The Future Of Facial Recognition Is Not Fully Known: Developing Privacy And Security Regulatory Mechanisms For Facial Recognition In The Retail Sector, Elias Wright

Fordham Intellectual Property, Media and Entertainment Law Journal

In recent years, advances in facial recognition technology have resulted in a rapid expansion in the prevalence of private sector biometric technologies. Facial recognition, while providing new potentials for safety and security and personalized marketing by retailers implicates complicated questions about the nature of consumer privacy and surveillance where a “collection imperative” incentivize corporate actors to accumulate increasingly massive reservoirs of consumer data. However, the law has not yet fully developed to address the unique risks to consumers through the use of this technology. This Note examines existing regulatory mechanisms, finding that consumer sensitivities and the opaque nature of the …


Face Off: An Examination Of State Biometric Privacy Statutes & Data Harm Remedies, Maya E. Rivera Jan 2019

Face Off: An Examination Of State Biometric Privacy Statutes & Data Harm Remedies, Maya E. Rivera

Fordham Intellectual Property, Media and Entertainment Law Journal

As biometric authentication becomes an increasingly popular method of security among consumers, only three states currently have statutes detailing how such data may be collected, used, retained, and released. The Illinois Biometric Information Privacy Act is the only statute of the three that enshrines a private right of action for those who fail to properly handle biometric data. Both the Texas Capture or Use Biometric Identifier Act Information Act and the Washington Biometric Privacy Act allow for state Attorneys General to bring suit on behalf of aggrieved consumers. This Note examines these three statutes in the context of data security …


The Non-Contractual Nature Of Privacy Policies And A New Critique Of The Notice And Choice Privacy Protection Model, Thomas B. Norton Nov 2016

The Non-Contractual Nature Of Privacy Policies And A New Critique Of The Notice And Choice Privacy Protection Model, Thomas B. Norton

Fordham Intellectual Property, Media and Entertainment Law Journal

Notice and Choice is the model for protecting privacy online in the United States. Under the model, users of online services are given notice about services information and privacy practices in the form of privacy policies. Based on this information, users can choose whether to use particular online services and whether to exercise any options for protecting their privacy that the services might offer. In theory, Notice and Choice seems like a sound regulatory mechanism. Indeed, state and federal regulatory agencies prefer the model as a basis for privacy enforcement action. But Notice and Choice faces harsh criticism from privacy …


A Postal Code Lottery: Unequal Access To Abortion Services In The United States And Northern Ireland, Hailey K. Flynn Feb 2016

A Postal Code Lottery: Unequal Access To Abortion Services In The United States And Northern Ireland, Hailey K. Flynn

Fordham International Law Journal

This Note argues that one’s postal code, or where one lives within the United States or in Northern Ireland, should not negatively impact a woman’s access to safe abortion services. This Note will examine abortion-related jurisprudence in the United States and Northern Ireland and will make recommendations for the ways in which access to abortion services can be legally improved. Part I will explain current jurisprudence on abortion in the United States within the Due Process Clause and Equal Protection Clause contexts. Part II will analyze the current legal framework that governs access to abortion in Northern Ireland and will …


Newsgathering Takes Flight In Choppy Skies: Legal Obstacles Affecting Journalistic Drone Use, Clay Calvert, Charles D. Tobin, Matthew D. Bunker Jan 2016

Newsgathering Takes Flight In Choppy Skies: Legal Obstacles Affecting Journalistic Drone Use, Clay Calvert, Charles D. Tobin, Matthew D. Bunker

Fordham Intellectual Property, Media and Entertainment Law Journal

This Article examines legal challenges confronting journalists who use drones to gather images. Initially, it traces the history of drones and the Federal Aviation Administration’s efforts to regulate them, as well as new state legislation that aims to restrict drones. This Article then illustrates that a wide array of legal remedies already exist for individuals harmed by journalistic drone usage, and it argues that calls for additional, piecemeal state laws to regulate drones are unnecessary and unduly hinder First Amendment interests in newsgathering and the public’s right to know. Furthermore, this Article asserts that the reasonable-expectation-of-privacy jurisprudence developed in aerial …


Internet Privacy Enforcement After Net Neutrality, Thomas B. Norton Dec 2015

Internet Privacy Enforcement After Net Neutrality, Thomas B. Norton

Fordham Intellectual Property, Media and Entertainment Law Journal

In March 2015, the Federal Communications Commission reclassified broadband Internet access service providers as “common carriers” subject to obligations under Title II of the Communications Act. One such obligation is to comply with the Act’s section 222 privacy provisions. As a result of reclassification, the Federal Communications Commission claims privacy enforcement jurisdiction over a broad swath of companies that formerly fell within the Federal Trade Commission’s regulatory reach. The Federal Trade Commission and industry players have been outwardly critical of this effect. This Note explores the resulting tension between the two agencies and proposes potential resolutions for it.


Appropriate(D) Moments, Richard Chused Dec 2015

Appropriate(D) Moments, Richard Chused

Fordham Intellectual Property, Media and Entertainment Law Journal

INTRODUCTION Quietly reading a book by a window in your apartment isn’t necessarily a “private” act. Many living in densely packed locations like Manhattan inevitably wonder whether eyes peering through telescopes or watching digital camera screens find them, linger for a time, capture images or generate fantasies about who and what they are. That appropriation reality popped into public view in 2013 when Martha and Matthew Foster discovered images of themselves and their children, Delaney and James, in Arne Svenson’s photography exhibition The Neighbors mounted at the Julie Saul Gallery in the Chelsea district of Manhattan. The Fosters lived in …


The Internet Of Things: Building Trust And Maximizing Benefits Through Consumer Control, Julie Brill Oct 2014

The Internet Of Things: Building Trust And Maximizing Benefits Through Consumer Control, Julie Brill

Fordham Law Review

The Internet of Things is one of the fastest growing facets of a world that is becoming more data intensive. Connecting cars, appliances, and even clothing to the internet promises to deliver convenience, safety, and, through analysis of the torrent of additional data generated, potential solutions to some of our most intractable problems. But turning on this data flood also creates privacy and security risks for consumers, challenging us to consider how to apply basic privacy principles to the Internet of Things. A wide range of stakeholders—technologists, lawyers, industry leaders, and others—has a role to play in meeting this challenge.


“Sharing” With The Court: The Discoverability Of Private Social Media Accounts In Civil Litigation, Zoe Rosenthal Jan 2014

“Sharing” With The Court: The Discoverability Of Private Social Media Accounts In Civil Litigation, Zoe Rosenthal

Fordham Intellectual Property, Media and Entertainment Law Journal

No abstract provided.


Can Condoms Be Compelling? Examining The State Interest In Confiscating Condoms From Suspected Sex Workers, Meghan Newcomer Nov 2013

Can Condoms Be Compelling? Examining The State Interest In Confiscating Condoms From Suspected Sex Workers, Meghan Newcomer

Fordham Law Review

Confiscating condoms from suspected sex workers leaves them at risk for HIV/AIDS, other sexually transmitted diseases, and unwanted pregnancy. Yet, police officers in New York, Washington, D.C., and Los Angeles collect condoms from sex workers to use against them as evidence of prostitution. Sometimes, the condoms are taken solely for the purpose of harassment. These actions put sex workers at risk of contracting sexually transmitted diseases because they may continue to engage in sex work without using protection.

In the landmark case of Griswold v. Connecticut, the U.S. Supreme Court established a fundamental privacy right in the use and …


Real Masks And Real Name Policies: Applying Anti-Mask Case Law To Anonymous Online Speech, Margot E. Kaminski Apr 2013

Real Masks And Real Name Policies: Applying Anti-Mask Case Law To Anonymous Online Speech, Margot E. Kaminski

Fordham Intellectual Property, Media and Entertainment Law Journal

The First Amendment protects anonymous speech, but the scope of that protection has been the subject of much debate. This Article adds to the discussion of anonymous speech by examining anti-mask statutes and cases as an analogue for the regulation of anonymous speech online. Anti-mask case law answers a number of questions left open by the Supreme Court. It shows that courts have used the First Amendment to protect anonymity beyond core political speech, when mask-wearing is expressive conduct or shows a nexus with free expression. This Article explores what the anti-mask cases teach us about anonymity online, including proposed …


Jurisdictional Challenges In The United States Government’S Move To Cloud Computing Technology, Sasha Segall Apr 2013

Jurisdictional Challenges In The United States Government’S Move To Cloud Computing Technology, Sasha Segall

Fordham Intellectual Property, Media and Entertainment Law Journal

No abstract provided.


Natural Law, Slavery, And The Right To Privacy Tort, Anita L. Allen Dec 2012

Natural Law, Slavery, And The Right To Privacy Tort, Anita L. Allen

Fordham Law Review

In 1905 the Supreme Court of Georgia became the first state high court to recognize a freestanding “right to privacy” tort in the common law. The landmark case was Pavesich v. New England Life Insurance Co. Must it be a cause for deep jurisprudential concern that the common law right to privacy in wide currency today originated in Pavesich’s explicit judicial interpretation of the requirements of natural law? Must it be an additional worry that the court which originated the common law privacy right asserted that a free white man whose photograph is published without his consent in a …


Valuing Privacy, Youngjae Lee Dec 2012

Valuing Privacy, Youngjae Lee

Fordham Law Review

No abstract provided.


Smartphone, Dumb Regulations: Mixed Signals In Mobile Privacy, Christian Levis Dec 2011

Smartphone, Dumb Regulations: Mixed Signals In Mobile Privacy, Christian Levis

Fordham Intellectual Property, Media and Entertainment Law Journal

The smartphone has turned a user’s location into valuable information. Users of smart devices can use location-based mobile services to get driving directions, check into social networks, or even see which of their friends are around. But the use of this technology, and the new type of data created by it, raises privacy concerns as to who has access to one's location-based information. Because the only legislation covering this technology, the Electronic Communications Privacy Act, is more than twenty-five years old, courts encounter problems when trying to use it to resolve these privacy issues, often reaching illogical results. This Note …


The “New Body Snatchers”: Analyzing The Effect Of Presumed Consent Organ Donation Laws On Privacy, Autonomy, And Liberty, Maryellen Liddy Jan 2011

The “New Body Snatchers”: Analyzing The Effect Of Presumed Consent Organ Donation Laws On Privacy, Autonomy, And Liberty, Maryellen Liddy

Fordham Urban Law Journal

This Note examines, in three parts, presumed consent laws as they pertain to organ donation. Part I discusses presumed consent and explains the salient features of presumed consent laws. It then discusses case law that addresses the aftermath of unauthorized organ or tissue harvesting. Part II evaluates the United States Supreme Court's evolving conceptions of the rights of individual and family-based privacy, autonomy, and liberty, for subsequent application to the presumed consent organ donation controversy. Part III analyzes presumed consent laws in light of the donors and their families' privacy, autonomy, and liberty interests. The Note concludes that current presumed …


The Deidentification Dilemma: A Legislative And Contractual Proposal, Robert Gellman Dec 2010

The Deidentification Dilemma: A Legislative And Contractual Proposal, Robert Gellman

Fordham Intellectual Property, Media and Entertainment Law Journal

No abstract provided.


The Google-Nsa Alliance: Developing Cybersecurity Policy At Internet Speed, Stephanie A. Devos Dec 2010

The Google-Nsa Alliance: Developing Cybersecurity Policy At Internet Speed, Stephanie A. Devos

Fordham Intellectual Property, Media and Entertainment Law Journal

No abstract provided.


Friending Privacy: Toward Self- Regulation Of Second Generation Social Networks , Robert Terenzi, Jr. Mar 2010

Friending Privacy: Toward Self- Regulation Of Second Generation Social Networks , Robert Terenzi, Jr.

Fordham Intellectual Property, Media and Entertainment Law Journal

No abstract provided.


Databases, Doctrine, And Constitutional Criminal Procedure, Erin Murphy Jan 2010

Databases, Doctrine, And Constitutional Criminal Procedure, Erin Murphy

Fordham Urban Law Journal

Over the past twenty years there has been an explosion in the creation, availability, and use of criminal justice databases. Large scale database systems now routinely influence law enforcement decisions ranging from formal determinations to arrest or convict an individual to informal judgments to subject a person to secondary pre-flight screening or investigate possible gang membership. Evidence gathered from database-related sources is now commonly introduced, and can play a pivotal proof role, in criminal trials. Although much has been written about the failure of constitutional law to adequately respond to the threat to privacy rights posed by databases, less attention …


Million Dollar Baby: Celebrity Baby Pictures And The Right Of Publicity , Natalie Grano Dec 2009

Million Dollar Baby: Celebrity Baby Pictures And The Right Of Publicity , Natalie Grano

Fordham Intellectual Property, Media and Entertainment Law Journal

No abstract provided.


Consent To Monitoring Of Electronic Communications Of Employees As An Aspect Of Liberty And Dignity: Looking To Europe., Matthew A. Chivvis Mar 2009

Consent To Monitoring Of Electronic Communications Of Employees As An Aspect Of Liberty And Dignity: Looking To Europe., Matthew A. Chivvis

Fordham Intellectual Property, Media and Entertainment Law Journal

No abstract provided.


Intentional Sex Torts, Deana Pollard Sacks Jan 2008

Intentional Sex Torts, Deana Pollard Sacks

Fordham Law Review

Intentional tort law generally protects personal autonomy and self-determination vigorously by requiring fair disclosure before consent to physical contact is considered voluntary and valid. A glaring exception exists regarding consent to sexual relations. Although American law historically has provided remedies for fraudulent or other tortious inducement of sexual relations, current sex tort jurisprudence offers virtually no protection. The law’s contemporary “caveat emptor” approach to cases of sexual autonomy infringement is inappropriate because it departs from fundamental principles of intentional tort doctrine. In addition, the current law supports a “false” norm that sexual misappropriation is acceptable. Current law fails to protect …


Data Protection, Breach Notification, And The Interplay Between State And Federal Law: The Experiments Need More Time, Flora J. Garcia Mar 2007

Data Protection, Breach Notification, And The Interplay Between State And Federal Law: The Experiments Need More Time, Flora J. Garcia

Fordham Intellectual Property, Media and Entertainment Law Journal

No abstract provided.


Payton, Practical Wisdom, And The Pragmatist Judge: Is Payton's Goal To Prevent Unreasonable Entries Or To Effectuate Home Arrests?, Christos Papapetrou Jan 2007

Payton, Practical Wisdom, And The Pragmatist Judge: Is Payton's Goal To Prevent Unreasonable Entries Or To Effectuate Home Arrests?, Christos Papapetrou

Fordham Urban Law Journal

This Comment analyzes the conflicting "objective" and "subjective" tests that courts use to determine if a law enforcement officer's entry into a suspect's home is valid following the Supreme Court's holding in Payton v. New York that an arrest warrant implicitly carries with it a right to enter a suspect's home when there is "reason to believe" it is the suspect's residence and that the suspect is inside. The Comment questions how courts should interpret the "reason to believe" standard and analyzes an approach put forth by Professor Matthew A. Edwards in his article, Posner's Pragmatism and Payton Home Arrests. …


Jewish Law And Socially Responsible Corporate Conduct, Steven H. Resnicoff Jan 2006

Jewish Law And Socially Responsible Corporate Conduct, Steven H. Resnicoff

Fordham Journal of Corporate & Financial Law

No abstract provided.


The Dangers Of Fighting Terrorism With Technocommunitarianism: Constitutional Protections Of Free Expression, Exploration, And Unmonitored Activity In Urban Spaces, Marc Jonathan Blitz Jan 2005

The Dangers Of Fighting Terrorism With Technocommunitarianism: Constitutional Protections Of Free Expression, Exploration, And Unmonitored Activity In Urban Spaces, Marc Jonathan Blitz

Fordham Urban Law Journal

Part I of this article examines how some commentators can plausibly argue that constitutional liberty and privacy protections do not protect the individual liberty and privacy that modern individuals have come to expect in many public spaces, particularly in urban environments. Constitutional liberalism, this section points out, makes this question a difficult one, because it is marked by scrupulous neutrality towards different visions of “the good life.” In other words, the constitutional order does not condemn those who choose a communitarian way of life and favor those who prefer individualism. Rather, it tolerates both of these (and other) preferences about …