Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Privacy Law (26)
- Internet Law (8)
- Constitutional Law (7)
- Science and Technology Law (6)
- First Amendment (5)
-
- Fourth Amendment (5)
- Law and Society (5)
- Business Organizations Law (4)
- Computer Law (4)
- Intellectual Property Law (4)
- Criminal Law (3)
- Social and Behavioral Sciences (3)
- Communications Law (2)
- Computer Sciences (2)
- Consumer Protection Law (2)
- Criminology (2)
- Disability Law (2)
- Education Law (2)
- Health Law and Policy (2)
- Immigration Law (2)
- Information Security (2)
- Labor and Employment Law (2)
- Legislation (2)
- Physical Sciences and Mathematics (2)
- Sociology (2)
- State and Local Government Law (2)
- Administrative Law (1)
- Air and Space Law (1)
- American Politics (1)
- Institution
-
- Boston University School of Law (8)
- University of Massachusetts School of Law (4)
- The University of Akron (3)
- University of South Carolina (3)
- Columbia Law School (2)
-
- Fordham Law School (2)
- Georgetown University Law Center (2)
- Golden Gate University School of Law (2)
- Maurer School of Law: Indiana University (2)
- University of Maryland Francis King Carey School of Law (2)
- University of Pennsylvania Carey Law School (2)
- University of Washington School of Law (2)
- American University Washington College of Law (1)
- Chicago-Kent College of Law (1)
- Edith Cowan University (1)
- Florida State University College of Law (1)
- Notre Dame Law School (1)
- Roger Williams University (1)
- Salve Regina University (1)
- Santa Clara Law (1)
- The University of Maine (1)
- University at Buffalo School of Law (1)
- University of Arkansas at Little Rock William H. Bowen School of Law (1)
- University of Colorado Law School (1)
- University of Michigan Law School (1)
- University of Missouri School of Law (1)
- University of Pittsburgh School of Law (1)
- Yeshiva University, Cardozo School of Law (1)
- Publication
-
- Faculty Scholarship (15)
- Faculty Publications (9)
- Articles (5)
- Akron Law Faculty Publications (3)
- All Faculty Scholarship (3)
-
- Articles by Maurer Faculty (2)
- GGU Law Review Blog (2)
- Georgetown Law Faculty Publications and Other Works (2)
- Journal Articles (2)
- Articles in Law Reviews & Other Academic Journals (1)
- Australian Security and Intelligence Conference (1)
- Early Childhood Resources (1)
- Faculty and Staff - Articles & Papers (1)
- Publications (1)
- Scholarly Publications (1)
- School of Law Conferences, Lectures & Events (1)
Articles 31 - 50 of 50
Full-Text Articles in Law
I Remember Richelieu: Is Anything Secure Anymore?, Michael G. Crowley, Michael N. Johnstone
I Remember Richelieu: Is Anything Secure Anymore?, Michael G. Crowley, Michael N. Johnstone
Australian Security and Intelligence Conference
Petraeus-gate, hacked nude celebrity photos in the cloud and the recent use of a search and seizure warrant in the United States of America to seek production of customer email contents on an extraterritorial server raises important issues for the supposably safe storage of data on the World Wide Web. Not only may there be nowhere to hide in cyberspace but nothing in cyberspace may be private. This paper explores the legal and technical issues raised by the these matters with emphasis on the courts decision “In the Matter of a Warrant to Search a Certain E-Mail Account Controlled and …
Hands Off Our Fingerprints: State, Local, Andindividual Defiance Of Federal Immigrationenforcement, Christine N. Cimini
Hands Off Our Fingerprints: State, Local, Andindividual Defiance Of Federal Immigrationenforcement, Christine N. Cimini
Articles
Secure Communities, though little-known outside law-enforcement circles, is one of the most powerful of the federal government’s immigration enforcement programs. Under Secure Communities, fingerprints collected by state and local law enforcement and provided to the Federal Bureau of Investigation for criminal background checks are automatically shared with the Department of Homeland Security, which checks the fingerprints against its immigration database. In the event of a match, an immigration detainer can be issued and an individual held after they would otherwise be entitled to release. Originally designed as a voluntary program in which local governments could choose to participate, the Department …
Privacy Harm Exceptionalism, Ryan Calo
Privacy Harm Exceptionalism, Ryan Calo
Articles
“Exceptionalism” refers to the belief that a person, place, or thing is qualitatively different from others in the same basic category. Thus, some have spoken of America’s exceptionalism as a nation. Early debates about the Internet focused on the prospect that existing laws and institutions would prove inadequate to govern the new medium of cyberspace. Scholars have made similar claims about other areas of law.
The focus of this short essay is the supposed exceptionalism of privacy. Rather than catalogue all the ways that privacy might differ from other concepts or areas of study, I intend to focus on the …
The Ftc And The New Common Law Of Privacy, Daniel J. Solove, Woodrow Hartzog
The Ftc And The New Common Law Of Privacy, Daniel J. Solove, Woodrow Hartzog
Faculty Scholarship
One of the great ironies about information privacy law is that the primary regulation of privacy in the United States has barely been studied in a scholarly way. Since the late 1990s, the Federal Trade Commission (FTC) has been enforcing companies’ privacy policies through its authority to police unfair and deceptive trade practices. Despite over fifteen years of FTC enforcement, there is no meaningful body of judicial decisions to show for it. The cases have nearly all resulted in settlement agreements. Nevertheless, companies look to these agreements to guide their privacy practices. Thus, in practice, FTC privacy jurisprudence has become …
The Ftc And Privacy And Security Duties For The Cloud, Daniel J. Solove
The Ftc And Privacy And Security Duties For The Cloud, Daniel J. Solove
Faculty Scholarship
Third-party data service providers, especially providers of cloud computing services, present unique and difficult privacy and data security challenges. While many companies that directly collect data from consumers are bound by the promises they make to individuals in their privacy policies, cloud service providers are usually not a part of this arrangement. It is not entirely clear what, if any, obligations cloud service providers have to protect the data of individuals with whom they have no contractual relationship. This problem is especially acute because many institutions sharing personal data with cloud service providers fail to include significant privacy and security …
Online Privacy And The First Amendment: An Opt-In Approach To Data Processing, Joseph A. Tomain
Online Privacy And The First Amendment: An Opt-In Approach To Data Processing, Joseph A. Tomain
Articles by Maurer Faculty
An individual has little to no ability to prevent online commercial actors from collecting, using, or disclosing data about her. This lack of individual choice is problematic in the Big Data era because individual privacy interests are threatened by the ever increasing number of actors processing data, as well as the ever increasing amount and types of data being processed. This Article argues that online commercial actors should be required to receive an individual’s opt-in consent prior to data processing as a way of protecting individual privacy. I analyze whether an opt-in requirement is constitutionally permissible under the First Amendment …
Beyond Title Vii: Rethinking Race, Ex-Offender Status, And Employment Discrimination In The Information Age, Kimani Paul-Emile
Beyond Title Vii: Rethinking Race, Ex-Offender Status, And Employment Discrimination In The Information Age, Kimani Paul-Emile
Faculty Scholarship
More than sixty-five million people in the United States—more than one in four adults—have had some involvement with the criminal justice system that will appear on a criminal history report. A rapidly expanding, for-profit industry has developed to collect these records and compile them into electronic databases, offering employers an inexpensive and readily accessible means of screening prospective employees. Nine out of ten employers now inquire into the criminal history of job candidates, systematically denying individuals with a criminal record any opportunity to gain work experience or build their job qualifications. This is so despite the fact that many individuals …
Reviving Implied Confidentiality, Woodrow Hartzog
Reviving Implied Confidentiality, Woodrow Hartzog
Faculty Scholarship
The law of online relationships has a significant flaw-it regularly fails to account for the possibility of an implied confidence. The established doctrine of implied confidentiality is, without explanation, almost entirely absent from online jurisprudence in environments where it has traditionally been applied offline, such as with sensitive data sets and intimate social interactions.
Courts' abandonment of implied confidentiality in online environments should have been foreseen. The concept has not been developed enough to be consistently applied in environments such as the Internet that lack obvious physical or contextual cues of confidence. This absence is significant because implied confidentiality could …
Failing Expectations: Fourth Amendment Doctrine In The Era Of Total Surveillance, Olivier Sylvain
Failing Expectations: Fourth Amendment Doctrine In The Era Of Total Surveillance, Olivier Sylvain
Faculty Scholarship
Today’s reasonable expectation test and the third-party doctrine have little to nothing to offer by way of privacy protection if users today are at least conflicted about whether transactional noncontent data should be shared with third parties, including law enforcement officials. This uncertainty about how to define public expectation as a descriptive matter has compelled courts to defer to legislatures to find out what public expectation ought to be more as a matter of prudence than doctrine. Courts and others presume that legislatures are far better than courts at defining public expectations about emergent technologies.This Essay argues that the reasonable …
Secret Consumer Scores And Segmentations: Separating Consumer 'Haves' From 'Have-Nots', Amy J. Schmitz
Secret Consumer Scores And Segmentations: Separating Consumer 'Haves' From 'Have-Nots', Amy J. Schmitz
Faculty Publications
“Big Data” is big business. Data brokers profit by tracking consumers’ information and behavior both on- and offline and using this collected data to assign consumers evaluative scores and classify consumers into segments. Companies then use these consumer scores and segmentations for marketing and to determine what deals, offers, and remedies they provide to different individuals. These valuations and classifications are based on not only consumers’ financial histories and relevant interests, but also their race, gender, ZIP Code, social status, education, familial ties, and a wide range of additional data. Nonetheless, consumers are largely unaware of these scores and segmentations, …
Big Business, Big Government And Big Legal Questions, Michael Mattioli, Todd Vare
Big Business, Big Government And Big Legal Questions, Michael Mattioli, Todd Vare
Articles by Maurer Faculty
No abstract provided.
Rethinking Online Privacy In Canada: Commentary On Voltage Pictures V. John And Jane Doe, Ngozi Okidegbe
Rethinking Online Privacy In Canada: Commentary On Voltage Pictures V. John And Jane Doe, Ngozi Okidegbe
Articles
This article problematizes the use of the bona fide case standard as the legal standard for a court to order a third party Internet Service Provider ("ISP") to disclose subscriber information to a copyright owner in online piracy cases. It argues that ISP account holders have a reasonable expectation of privacy in their subscriber information. It contends that the current bona fide case standard affords a relatively low threshold of protection for Internet users’ subscriber information. The reason for which the article takes this position is that the bona fide case standard can be met solely by IP address evidence, …
A Corporate Right To Privacy, Elizabeth Pollman
A Corporate Right To Privacy, Elizabeth Pollman
All Faculty Scholarship
The debate over the scope of constitutional protections for corporations has exploded with commentary on recent or pending Supreme Court cases, but scholars have left unexplored some of the hardest questions for the future, and the ones that offer the greatest potential for better understanding the nature of corporate rights. This Article analyzes one of those questions — whether corporations have, or should have, a constitutional right to privacy. First, the Article examines the contours of the question in Supreme Court jurisprudence and provides the first scholarly treatment of the growing body of conflicting law in the lower courts on …
Rethinking Privacy, William H. Simon
Rethinking Privacy, William H. Simon
Faculty Scholarship
Anxiety about surveillance and data mining has led many to embrace implausibly expansive and rigid conceptions of privacy. The premises of some current privacy arguments do not fit well with the broader political commitments of those who make them. In particular, liberals seem to have lost touch with the reservations about privacy expressed in the social criticism of some decades ago. They seem unable to imagine that preoccupation with privacy might amount to a “pursuit of loneliness” or how “eyes on the street” might have reassuring connotations. Without denying the importance of the effort to define and secure privacy values, …
Governing, Exchanging, Securing: Big Data And The Production Of Digital Knowledge, Bernard E. Harcourt
Governing, Exchanging, Securing: Big Data And The Production Of Digital Knowledge, Bernard E. Harcourt
Faculty Scholarship
The emergence of Big Data challenges the conventional boundaries between governing, exchange, and security. It ambiguates the lines between commerce and surveillance, between governing and exchanging, between democracy and the police state. The new digital knowledge reproduces consuming subjects who wittingly or unwittingly allow themselves to be watched, tracked, linked and predicted in a blurred amalgam of commercial and governmental projects. Linking back and forth from consumer data to government information to social media, these new webs of information become available to anyone who can purchase the information. How is it that governmental, commercial and security interests have converged, coincided, …
Politics And The Public’S Right To Know, Lloyd Hitoshi Mayer
Politics And The Public’S Right To Know, Lloyd Hitoshi Mayer
Journal Articles
In the United States it is taken for granted that members of the public should have access to information about their government. This access takes many forms, including the ability to obtain copies of government documents, the ability to attend meetings of government officials, and the related obligations of government officials to document their activities and to reveal certain otherwise private information about themselves. This access also is often limited by countervailing concerns, such as the privacy of individual citizens and national security. Nevertheless, the presumption both at the federal level and in every state is to provide such access. …
Regulating The Internet Of Things: First Steps Toward Managing Discrimination, Privacy, Security, And Consent, Scott R. Peppet
Regulating The Internet Of Things: First Steps Toward Managing Discrimination, Privacy, Security, And Consent, Scott R. Peppet
Publications
The consumer "Internet of Things" is suddenly reality, not science fiction. Electronic sensors are now ubiquitous in our smartphones, cars, homes, electric systems, health-care devices, fitness monitors, and workplaces. These connected, sensor-based devices create new types and unprecedented quantities of detailed, high-quality information about our everyday actions, habits, personalities, and preferences. Much of this undoubtedly increases social welfare. For example, insurers can price automobile coverage more accurately by using sensors to measure exactly how you drive (e.g., Progressive 's Snapshot system), which should theoretically lower the overall cost of insurance. But the Internet of Things raises new and difficult questions …
Public Assistance, Drug Testing, And The Law: The Limits Of Population-Based Legal Analysis, Candice T. Player
Public Assistance, Drug Testing, And The Law: The Limits Of Population-Based Legal Analysis, Candice T. Player
All Faculty Scholarship
In Populations, Public Health and the Law, legal scholar Wendy Parmet urges courts to embrace population-based legal analysis, a public health inspired approach to legal reasoning. Parmet contends that population-based legal analysis offers a way to analyze legal issues—not unlike law and economics—as well as a set of values from which to critique contemporary legal discourse. Population-based analysis has been warmly embraced by the health law community as a bold new way of analyzing legal issues. Still, population-based analysis is not without its problems. At times, Parmet claims too much territory for the population perspective. Moreover, Parmet urges courts …
Surveillance At The Source, David Thaw
Surveillance At The Source, David Thaw
Articles
Contemporary discussion concerning surveillance focuses predominantly on government activity. These discussions are important for a variety of reasons, but generally ignore a critical aspect of the surveillance-harm calculus – the source from which government entities derive the information they use. The source of surveillance data is the information "gathering" activity itself, which is where harms like "chilling" of speech and behavior begin.
Unlike the days where satellite imaging, communications intercepts, and other forms of information gathering were limited to advanced law enforcement, military, and intelligence activities, private corporations now play a dominant role in the collection of information about individuals' …
The Trickle-Down War, Rosa Brooks
The Trickle-Down War, Rosa Brooks
Georgetown Law Faculty Publications and Other Works
The history of the European nation-state, wrote political sociologist Charles Tilly, is inextricably bound up with the history of warfare. To oversimplify Tilly’s nuanced and complex arguments, the story goes something like this: As power-holders (originally bandits and local strongmen) sought to expand their power, they needed capital to pay for weapons, soldiers and supplies. The need for capital and new recruits drove the creation of taxation systems and census mechanisms, and the need for more effective systems of taxation and recruitment necessitated better roads, better communications and better record keeping. This in turn enabled the creation of larger and …