Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 15 of 15

Full-Text Articles in Law

Ethical Ai In American Policing, Elizabeth E. Joh Nov 2022

Ethical Ai In American Policing, Elizabeth E. Joh

Notre Dame Journal on Emerging Technologies

We know there are problems in the use of artificial intelligence in policing, but we don’t quite know what to do about them. One can also find many reports and white papers today offering principles for the responsible use of AI systems by the government, civil society organizations, and the private sector. Yet, largely missing from the current debate in the United States is a shared framework for thinking about the ethical and responsible use of AI that is specific to policing. There are many AI policy guidance documents now, but their value to the police is limited. Simply repeating …


Cyber-Security, Privacy, And The Covid-19 Attenuation?, Vincent J. Samar Jan 2021

Cyber-Security, Privacy, And The Covid-19 Attenuation?, Vincent J. Samar

Journal of Legislation

Large-scale data brokers collect massive amounts of highly personal consumer information to be sold to whoever will pay their price, even at the expense of sacrificing individual privacy and autonomy in the process. In this Article, I will show how a proper understanding and justification for a right to privacy, in context to both protecting private acts and safeguarding information and states of affairs for the performance of such acts, provides a necessary background framework for imposing legal restrictions on such collections. This problem, which has already gained some attention in literature, now becomes even more worrisome, as government itself …


The Necessity Of Human Rights Legal Protections In Mutual Legal Assistance Treaty Reform, Christine Galvagna May 2019

The Necessity Of Human Rights Legal Protections In Mutual Legal Assistance Treaty Reform, Christine Galvagna

Notre Dame Journal of International & Comparative Law

Mutual legal assistance treaty (MLAT) reform is a transnational legal movement aimed at facilitating more rapid law enforcement access to cross-border data, while also preventing violations of state sovereignty through the exercise of extraterritorial jurisdiction over data. Efforts primarily focus on the United States (U.S.) mutual legal assistance (MLA) process, as it is exceedingly slow and convoluted, but also unavoidable, given that most major tech companies have their bases in the U.S. Recently proposed or enacted legal instruments include the U.S. CLOUD Act, the European Union’s (EU) e-Evidence proposal, Council of Europe’s forthcoming Additional Protocol to the Convention on Cybercrime, …


The Employee Right To Disconnect, Paul M. Secunda Jan 2019

The Employee Right To Disconnect, Paul M. Secunda

Notre Dame Journal of International & Comparative Law

U.S. workers are increasingly finding it difficult to escape from work. Through their smartphones, e-mail, and social media, work tethers them to their workstations well after the work day has ended. Whether at home or in transit, employers are asking or requiring employees to complete assignments, tasks, and projects outside of working hours. This practice has a profound detrimental impact on employee privacy and autonomy, safety and health, productivity and compensation, and rest and leisure. France and Germany have responded to this emerging workplace issue by taking different legal approaches to providing their employees a right to disconnect from the …


Police Body-Worn Camera Policy: Balancing The Tension Between Privacy And Public Access In State Law, Kyle J. Maury Nov 2016

Police Body-Worn Camera Policy: Balancing The Tension Between Privacy And Public Access In State Law, Kyle J. Maury

Notre Dame Law Review

Body camera implementation remains in its infancy stage. As such,

there is a dearth of legal scholarship analyzing the policy considerations associated

with body cameras. Instead of raising the issues involved and assessing

arguments for and against implementation, this Note assumes body cameras

are a force for good and are here to stay for the long haul. Consequently, the

goal of this Note is to analyze various issues involved in administering body

cameras against a backdrop of recently enacted state legislation—focusing

specifically on the tension between protecting privacy interests while also

ensuring public access to recordings. This Note examines these …


Unilateral Invasions Of Privacy, Roger Allan Ford Apr 2016

Unilateral Invasions Of Privacy, Roger Allan Ford

Notre Dame Law Review

Most people seem to agree that individuals have too little privacy, and most proposals to address that problem focus on ways to give those users more information about, and more control over, how information about them is used. Yet in nearly all cases, information subjects are not the parties who make decisions about how information is collected, used, and disseminated; instead, outsiders make unilateral decisions to collect, use, and disseminate information about others. These potential privacy invaders, acting without input from information subjects, are the parties to whom proposals to protect privacy must be directed. This Article develops a theory …


Open Face: Striking The Balance Between Privacy And Security With The Fbi's Next Generation Identification System, Christopher Delillo Jun 2015

Open Face: Striking The Balance Between Privacy And Security With The Fbi's Next Generation Identification System, Christopher Delillo

Journal of Legislation

Privacy in the United States has never been an explicit general right for every citizen.I Federal grants of privacy protection exist for specific instances or areas, but generally have been left to the province of the States.2 Some states, but not all, have general privacy laws granting citizens privacy rights beyond the scope of con- tent-specific legislation.3 Thus, the privacy law regime in the United States is best characterized as a patchwork: rights or protections exist in numerous areas without much to connect those areas together as an interlocking protective framework for national citizenry.


Politics And The Public’S Right To Know, Lloyd Hitoshi Mayer Jan 2014

Politics And The Public’S Right To Know, Lloyd Hitoshi Mayer

Journal Articles

In the United States it is taken for granted that members of the public should have access to information about their government. This access takes many forms, including the ability to obtain copies of government documents, the ability to attend meetings of government officials, and the related obligations of government officials to document their activities and to reveal certain otherwise private information about themselves. This access also is often limited by countervailing concerns, such as the privacy of individual citizens and national security. Nevertheless, the presumption both at the federal level and in every state is to provide such access. …


Designing Surveillance Law, Patricia L. Bellia Jan 2011

Designing Surveillance Law, Patricia L. Bellia

Journal Articles

As communications surveillance techniques become increasingly important in government efforts to detect and thwart criminal and terrorist activities, questions of how to reconcile privacy and law enforcement interests take on paramount importance. These questions have institutional as well as substantive dimensions. That is, the issue is not simply what the limits on communications surveillance should be, but who should set them — courts through application of the Fourth Amendment or legislatures through statutes and the oversight process? The scholarly literature offers divergent positive and normative perspectives on these questions.

For most scholars, the question of who should regulate communications surveillance …


Federalization In Information Privacy Law, Patricia L. Bellia Jan 2009

Federalization In Information Privacy Law, Patricia L. Bellia

Journal Articles

In Preemption and Privacy, Professor Paul Schwartz argues that it would be unwise for Congress to adopt a unitary federal information privacy statute that both eliminates the sector-specific distinctions in federal information privacy law and blocks the development of stronger state regulation. That conclusion, though narrow, rests on descriptive and normative claims with broad implications for the state-federal balance in information privacy law. Descriptively, Professor Schwartz sees the current information privacy law landscape as the product of successful experimentation at the state level. That account, in turn, fuels his normative claims, and in particular his sympathy with theories of competitive …


Fourth Amendment Protection For Stored E-Mail, Patricia L. Bellia, Susan Freiwald Jan 2008

Fourth Amendment Protection For Stored E-Mail, Patricia L. Bellia, Susan Freiwald

Journal Articles

The question of whether and how the Fourth Amendment regulates government access to stored e-mail remains open and pressing. A panel of the Sixth Circuit recently held in Warshak v. United States, 490 F.3d 455 (6th Cir. 2007), that users generally retain a reasonable expectation of privacy in the e-mails they store with their Internet Service Providers (ISPs), which implies that government agents must generally acquire a warrant before they may compel ISPs to disclose their users' stored e-mails. The Sixth Circuit, however, is reconsidering the case en banc. This Article examines the nature of stored e-mail surveillance and argues …


Spyware And The Limits Of Surveillance Law, Patricia L. Bellia Jan 2005

Spyware And The Limits Of Surveillance Law, Patricia L. Bellia

Journal Articles

For policymakers, litigants, and commentators seeking to address the threats digital technology poses for privacy, electronic surveillance law remains a weapon of choice. The debate over how best to respond to the spyware problem provides only the most recent illustration of that fact. Although there is much controversy over how to define spyware, that label encompasses at least some software that monitors a computer user's electronic communications. Federal surveillance statutes thus present an intuitive fit for responding to the regulatory challenges of spyware, because those statutes bar the unauthorized acquisition of electronic communications and related data in some circumstances. Indeed, …


The Right Of Publicity And Autonomous Self-Definition, Mark P. Mckenna Jan 2005

The Right Of Publicity And Autonomous Self-Definition, Mark P. Mckenna

Journal Articles

Legal protection against unauthorized commercial uses of an individual's identity has grown significantly over the last fifty years as it has relentlessly pursued economic value. It was forced to focus on value because a false distinction between the harms suffered by private citizens and celebrities seemingly left celebrities without a privacy claim for commercial use of their identities. But the normative case for awarding individuals the economic value of their identity is weak, since celebrities do not need additional incentive to invest in either their native skill or in developing a persona. Still, while the prevailing justification is inadequate, as …


Surveillance Law Through Cyberlaw's Lens, Patricia L. Bellia Jan 2004

Surveillance Law Through Cyberlaw's Lens, Patricia L. Bellia

Journal Articles

The continuing controversy over the surveillance-related provisions of the USA Patriot Act highlights the depth of Americans' concern about internet privacy. Although calls to limit the government's surveillance powers strike a chord with the public, the legal framework governing surveillance activities is highly technical and poorly understood. The Patriot Act's sunset date provides Congress with an opportunity to revisit that framework.

This Article seeks to contribute to the debate over the appropriate scope of internet surveillance in two ways. First, the Article explores the intricacies of the constitutional and statutory frameworks governing electronic surveillance, and particularly surveillance to acquire electronic …


Chasing Bits Across Borders, Patricia L. Bellia Jan 2001

Chasing Bits Across Borders, Patricia L. Bellia

Journal Articles

As computer crime becomes more widespread, countries increasingly confront difficulties in securing evidence stored in electronic form outside of their borders. These difficulties have prompted two related responses. Some states have asserted a broad power to conduct remote cross-border searches - that is, to use computers within their territory to access and examine data physically stored outside of their territory. Other states have pressed for recognition of a remote cross-border search power in international fora, arguing that such a power is an essential weapon in efforts to combat computer crime. This Article explores these state responses and develops a framework …