Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Series

2018

Privacy

Discipline
Institution
Publication

Articles 1 - 30 of 44

Full-Text Articles in Law

Privacy's Double Standards: Public Disclosure Tort Case Chart (2006-2016), Scott Skinner-Thompson Dec 2018

Privacy's Double Standards: Public Disclosure Tort Case Chart (2006-2016), Scott Skinner-Thompson

Research Data

This document, Privacy's Double Standards: Public Disclosure Tort Case Chart (2006-2016), 93 Wash. L. Rev. Online 2051 (2018), https://www.law.uw.edu/wlr/online-edition/scott-skinner-thompson, was published as an electronic supplement to the empirical study, Scott Skinner-Thompson, Privacy’s Double Standards, 93 Wash. L. Rev. 2051 (2018), available at https://scholar.law.colorado.edu/articles/1218/.


Revenge Porn, Thomas Lonardo, Tricia P. Martland, Rhode Island Bar Journal Nov 2018

Revenge Porn, Thomas Lonardo, Tricia P. Martland, Rhode Island Bar Journal

Life of the Law School (1993- )

No abstract provided.


A Poor Mother's Right To Privacy: A Review, Danielle K. Citron Sep 2018

A Poor Mother's Right To Privacy: A Review, Danielle K. Citron

Faculty Scholarship

Collecting personal data is a feature of daily life. Businesses, advertisers, agencies, and law enforcement amass massive reservoirs of our personal data. This state of affairs—what I am calling the “collection imperative”—is justified in the name of efficiency, convenience, and security. The unbridled collection of personal data, meanwhile, leads to abuses. Public and private entities have disproportionate power over individuals and groups whose information they have amassed. Nowhere is that power disparity more evident than for the state’s surveillance of the indigent. Poor mothers, in particular, have vanishingly little privacy. Whether or not poor mothers receive subsidized prenatal care, the …


20th Annual Open Government Summit: Access To Public Records Act And Open Meetings Act, 2018, Department Of Attorney General, State Of Rhode Island Jul 2018

20th Annual Open Government Summit: Access To Public Records Act And Open Meetings Act, 2018, Department Of Attorney General, State Of Rhode Island

School of Law Conferences, Lectures & Events

10


Technology Regulation By Default: Platforms, Privacy, And The Cfpb, Rory Van Loo Jul 2018

Technology Regulation By Default: Platforms, Privacy, And The Cfpb, Rory Van Loo

Faculty Scholarship

In the absence of a technology-focused regulator, diverse administrative agencies have been forced to develop regulatory models for governing their sphere of the data economy. These largely uncoordinated efforts offer a laboratory of regulatory experimentation on governance architecture. This symposium essay explores what the Consumer Financial Protection Bureau (CFPB) has done in its first several years to regulate financial technology (“fintech”), in the context of broader technology-related concerns identified in the literature. It begins with a survey of what the CFPB has undertaken using more traditional administrative agency tools—enforcement and rulemaking—in areas such as privacy, consumer control over data, and …


Rwu First Amendment Blog: David Logan's Blog: Discovering Trump 06-22-2018, David A. Logan Jun 2018

Rwu First Amendment Blog: David Logan's Blog: Discovering Trump 06-22-2018, David A. Logan

Law School Blogs

No abstract provided.


The Biopolitical Public Domain: The Legal Construction Of The Surveillance Economy, Julie E. Cohen Jun 2018

The Biopolitical Public Domain: The Legal Construction Of The Surveillance Economy, Julie E. Cohen

Georgetown Law Faculty Publications and Other Works

Within the political economy of informational capitalism, commercial surveillance practices are tools for resource extraction. That process requires an enabling legal construct, which this essay identifies and explores. Contemporary practices of personal information processing constitute a new type of public domain — a repository of raw materials that are there for the taking and that are framed as inputs to particular types of productive activity. As a legal construct, the biopolitical public domain shapes practices of appropriation and use of personal information in two complementary and interrelated ways. First, it constitutes personal information as available and potentially valuable: as a …


Constitutional Shapeshifting: Giving The Fourth Amendment Substance In The Technology Driven World Of Criminal Investigation, Gerald S. Reamey Jun 2018

Constitutional Shapeshifting: Giving The Fourth Amendment Substance In The Technology Driven World Of Criminal Investigation, Gerald S. Reamey

Faculty Articles

For the first hundred years of the Fourth Amendment's life, gains in the technology of surveillance were modest. With the advent of miniaturization and ever-increasing sophistication and capability of surveillance and detection devices, the Supreme Court has struggled to adapt its understanding of "search" to the constantly evolving devices and methods that challenge contemporary understanding of privacy. In response to surveillance innovations, the Court has taken varying positions, focusing first on property-based intrusions by government, then shifting to privacy expectations, and, more recently, resurrecting the view that a trespass to property can define search.

This article surveys this constitutional odyssey, …


Consumer Bitcredit And Fintech Lending, Christopher K. Odinet May 2018

Consumer Bitcredit And Fintech Lending, Christopher K. Odinet

Faculty Scholarship

The digital economy is changing everything, including how we borrow money. In the wake of the 2008 crisis, banks pulled back in their lending and, as a result, many consumers and small businesses found themselves unable to access credit. A wave of online firms called fintech lenders have filled the space left vacant by traditional financial institutions. These platforms are fast making antiques out of many mainstream lending practices, such as long paper applications and face-to-face meetings. Instead, through underwriting by automation — utilizing big data (including social media data) and machine learning — loan processing that once took days …


We’Ve Come A Long Way (Baby)! Or Have We? Evolving Intellectual Freedom Issues In The Us And Florida, L. Bryan Cooper, A.D. Beman-Cavallaro May 2018

We’Ve Come A Long Way (Baby)! Or Have We? Evolving Intellectual Freedom Issues In The Us And Florida, L. Bryan Cooper, A.D. Beman-Cavallaro

Works of the FIU Libraries

This paper analyzes a shifting landscape of intellectual freedom (IF) in and outside Florida for children, adolescents, teens and adults. National ideals stand in tension with local and state developments, as new threats are visible in historical, legal, and technological context. Examples include doctrinal shifts, legislative bills, electronic surveillance and recent attempts to censor books, classroom texts, and reading lists.

Privacy rights for minors in Florida are increasingly unstable. New assertions of parental rights are part of a larger conservative animus. Proponents of IF can identify a lessening of ideals and standards that began after doctrinal fruition in the 1960s …


Fourth Amendment Constraints On The Technological Monitoring Of Convicted Sex Offenders, Ben A. Mcjunkin, Jj Prescott Apr 2018

Fourth Amendment Constraints On The Technological Monitoring Of Convicted Sex Offenders, Ben A. Mcjunkin, Jj Prescott

Law & Economics Working Papers

More than forty U.S. states currently track at least some of their convicted sex offenders using GPS devices. Many offenders will be monitored for life. The burdens and expense of living indefinitely under constant technological monitoring have been well documented, but most commentators have assumed that these burdens were of no constitutional moment because states have characterized such surveillance as “civil” in character — and courts have seemed to agree. In 2015, however, the Supreme Court decided in Grady v. North Carolina that attaching a GPS monitoring device to a person was a Fourth Amendment search, notwithstanding the ostensibly civil …


Humans Forget, Machines Remember: Artificial Intelligence And The Right To Be Forgotten, Tiffany Li, Eduard Fosch Villaronga, Peter Kieseberg Apr 2018

Humans Forget, Machines Remember: Artificial Intelligence And The Right To Be Forgotten, Tiffany Li, Eduard Fosch Villaronga, Peter Kieseberg

Faculty Scholarship

To understand the Right to be Forgotten in context of artificial intelligence, it is necessary to first delve into an overview of the concepts of human and AI memory and forgetting. Our current law appears to treat human and machine memory alike – supporting a fictitious understanding of memory and forgetting that does not comport with reality. (Some authors have already highlighted the concerns on the perfect remembering.) This Article will examine the problem of AI memory and the Right to be Forgotten, using this example as a model for understanding the failures of current privacy law to reflect the …


Corporate Social Responsibility And Social Media Corporations: Incorporating Human Rights Through Rankings, Self-Regulation And Shareholder Resolutions, Erika George Apr 2018

Corporate Social Responsibility And Social Media Corporations: Incorporating Human Rights Through Rankings, Self-Regulation And Shareholder Resolutions, Erika George

Utah Law Faculty Scholarship

This article examines the emergence and evolution of selected ranking and reporting frameworks in the expanding realm of business and human rights advocacy. It explores how indicators in the form of rankings and reports evaluating the conduct of transnational corporate actors can serve as regulatory tools with potential to bridge a global governance gap that often places human rights at risk. This article examines the relationship of transnational corporations in the Internet communications technology sector (ICT sector) to human rights and the risks presented to the right to freedom of expression and the right to privacy when ICT sector companies …


Corporate Social Responsibility And Social Media Corporations: Incorporating Human Rights Through Rankings, Self-Regulation And Shareholder Resolutions, Erika George Apr 2018

Corporate Social Responsibility And Social Media Corporations: Incorporating Human Rights Through Rankings, Self-Regulation And Shareholder Resolutions, Erika George

Faculty Scholarship

This article examines the emergence and evolution of selected ranking and reporting frameworks in the expanding realm of business and human rights advocacy. It explores how indicators in the form of rankings and reports evaluating the conduct of transnational corporate actors can serve as regulatory tools with potential to bridge a global governance gap that often places human rights at risk. Specifically, this article examines the relationship of transnational corporations in the Internet communications technology sector (ICT sector) to human rights and the risks presented to the right to freedom of expression and the right to privacy when ICT sector …


Risk And Anxiety: A Theory Of Data Breach Harms, Danielle K. Citron, Daniel Solove Mar 2018

Risk And Anxiety: A Theory Of Data Breach Harms, Danielle K. Citron, Daniel Solove

Faculty Scholarship

In lawsuits about data breaches, the issue of harm has confounded courts. Harm is central to whether plaintiffs have standing to sue in federal court and whether their claims are viable. Plaintiffs have argued that data breaches create a risk of future injury from identity theft or fraud and that breaches cause them to experience anxiety about this risk. Courts have been reaching wildly inconsistent conclusions on the issue of harm, with most courts dismissing data breach lawsuits for failure to allege harm. A sound and principled approach to harm has yet to emerge, resulting in a lack of consensus …


Tactful Inattention: Erving Goffman, Privacy In The Digital Age, And The Virtue Of Averting One's Eyes, Elizabeth De Armond Jan 2018

Tactful Inattention: Erving Goffman, Privacy In The Digital Age, And The Virtue Of Averting One's Eyes, Elizabeth De Armond

All Faculty Scholarship

No abstract provided.


Ferpa Close-Up: When Video Captures Violence And Injury, Richard J. Peltz-Steele, Kitty L. Cone Jan 2018

Ferpa Close-Up: When Video Captures Violence And Injury, Richard J. Peltz-Steele, Kitty L. Cone

Faculty Publications

Federal privacy law is all to often misconstrued or perverted to preclude the disclosure of video recordings that capture students victimized by violent crime or tortious injury. This misuse of federal law impedes transparency and accountability and, in many cases, even jeopardizes the health, safety, and lives of children. When properly construed, however, federal law is no bar to disclosure and, at least in public schools, works in tandem with freedom of information laws to ensure disclosure. This Article posits that without unequivocal guidance from federal administrative authorities, uncertainty regarding the disclosure of such recordings will continue to linger, jeopardizing …


When Whispers Enter The Cloud, Heidi H. Liu Jan 2018

When Whispers Enter The Cloud, Heidi H. Liu

All Faculty Scholarship

With increased awareness of workplace harassment in recent years, the idea of enhanced reporting around sexual misconduct has gained traction. As a result, several technologies – from smartphone apps to well-publicized services – have been introduced with the goals of preventing, enabling reports of, and even predicting sexual misconduct at work, school and in public. But to what extent are these technologies secure and accessible to survivors? This Note documents the existing resources and proposes a framework focusing on privacy and participation for evaluating these tools intended to benefit survivors.


Equality At Stake: Connecting The Privacy/Vulnerability Cycle To The Debate About Publicly Accessible Online Court Records, Jacquelyn A. Burkell, Jane Bailey Jan 2018

Equality At Stake: Connecting The Privacy/Vulnerability Cycle To The Debate About Publicly Accessible Online Court Records, Jacquelyn A. Burkell, Jane Bailey

FIMS Publications

A considerable amount has been written about the privacy implications of publishing court and tribunal records online. In this article the authors examine the linkages between privacy and vulnerability for members of marginalized communities and, drawing on Calo’s “vicious cycle” of privacy and vulnerability, suggest that publicly accessible online court records represent an equality issue as well. Drawing on social science research and privacy theory, the authors demonstrate the potentially disproportionate effect of online court records on members of marginalized communities. They then examine Canadian case law, legislation and policy that impose restrictions on public disclosure of information from court …


"We Only Spy On Foreigners": The Myth Of A Universal Right To Privacy And The Practice Of Foreign Mass Surveillance, Asaf Lubin Jan 2018

"We Only Spy On Foreigners": The Myth Of A Universal Right To Privacy And The Practice Of Foreign Mass Surveillance, Asaf Lubin

Articles by Maurer Faculty

The digital age brought with it a new epoch in global political life, one neatly coined by Professor Philip Howard as the “pax technica.” In this new world order, government and industry are “tightly bound” in technological and security arrangements that serve to push forward an information and cyber revolution of unparalleled magnitude. While the rise of information technologies tells a miraculous story of triumph over the physical constraints that once shackled mankind, these very technologies are also the cause of grave concern. Intelligence agencies have been recently involved in the exercise of global indiscriminate surveillance, which purports to go …


Privacy Revisited: A Global Perspective On The Right To Be Left Alone, Jon L. Mills Jan 2018

Privacy Revisited: A Global Perspective On The Right To Be Left Alone, Jon L. Mills

UF Law Faculty Publications

Reviewing: Ronald J. Krotoszynski, Jr., Privacy Revisited: A Global Perspective on the Right to Be Left Alone (Oxford University Press 2016).


Innovation And Tradition: A Survey Of Intellectual Property And Technology Legal Clinics, Cynthia L. Dahl, Victoria F. Phillips Jan 2018

Innovation And Tradition: A Survey Of Intellectual Property And Technology Legal Clinics, Cynthia L. Dahl, Victoria F. Phillips

All Faculty Scholarship

For artists, nonprofits, community organizations and small-business clients of limited means, securing intellectual property rights and getting counseling involving patent, copyright and trademark law are critical to their success and growth. These clients need expert IP and technology legal assistance, but very often cannot afford services in the legal marketplace. In addition, legal services and state bar pro bono programs have generally been ill-equipped to assist in these more specialized areas. An expanding community of IP and Technology clinics has emerged across the country to meet these needs. But while law review articles have described and examined other sectors of …


Criminal Employment Law, Benjamin Levin Jan 2018

Criminal Employment Law, Benjamin Levin

Publications

This Article diagnoses a phenomenon, “criminal employment law,” which exists at the nexus of employment law and the criminal justice system. Courts and legislatures discourage employers from hiring workers with criminal records and encourage employers to discipline workers for non-work-related criminal misconduct. In analyzing this phenomenon, my goals are threefold: (1) to examine how criminal employment law works; (2) to hypothesize why criminal employment law has proliferated; and (3) to assess what is wrong with criminal employment law. This Article examines the ways in which the laws that govern the workplace create incentives for employers not to hire individuals with …


Data Collection, Ehrs, And Poverty Determinations, Craig Konnoth Jan 2018

Data Collection, Ehrs, And Poverty Determinations, Craig Konnoth

Publications

Collecting and deploying poverty-related data is an important starting point for leveraging data regarding social determinants of health in precision medicine. However, we must rethink how we collect and deploy such data. Current modes of collection yield imprecise data that is unsuited for research. Better data can be collected by cross-referencing other sources such as employers and public benefit programs, and by incentivizing and encouraging patients and providers to provide more accurate information. Data thus collected can be used to provide appropriate individual-level clinical and non-clinical care, and to systematically determine what share of social resources healthcare should consume.


The Gdpr’S Version Of Algorithmic Accountability, Margot Kaminski Jan 2018

The Gdpr’S Version Of Algorithmic Accountability, Margot Kaminski

Publications

No abstract provided.


Privacy's Double Standards, Scott Skinner-Thompson Jan 2018

Privacy's Double Standards, Scott Skinner-Thompson

Publications

Where the right to privacy exists, it should be available to all people. If not universally available, then privacy rights should be particularly accessible to marginalized individuals who are subject to greater surveillance and are less able to absorb the social costs of privacy violations. But in practice, there is evidence that people of privilege tend to fare better when they bring privacy tort claims than do non-privileged individuals. This disparity occurs despite doctrine suggesting that those who occupy prominent and public social positions are entitled to diminished privacy tort protections.

This Article unearths disparate outcomes in public disclosure tort …


Is It Time For A Universal Genetic Forensic Database?, J. W. Hazel, Ellen Wright Clayton, B. A. Malin, Christopher Slobogin Jan 2018

Is It Time For A Universal Genetic Forensic Database?, J. W. Hazel, Ellen Wright Clayton, B. A. Malin, Christopher Slobogin

Vanderbilt Law School Faculty Publications

The ethical objections to mandating forensic profiling of newborns and/or compelling every citizen or visitor to submit to a buccal swab or to spit in a cup when they have done nothing wrong are not trivial. But newborns are already subject to compulsory medical screening, and people coming from foreign countries to the United States already submit to fingerprinting. It is also worth noting that concerns about coercion or invasions of privacy did not give pause to legislatures (or, for that matter, even the European Court) when authorizing compelled DNA sampling from arrestees, who should not forfeit genetic privacy interests …


Criminal Employment Law, Benjamin Levin Jan 2018

Criminal Employment Law, Benjamin Levin

Scholarship@WashULaw

This Article diagnoses a phenomenon, “criminal employment law,” which exists at the nexus of employment law and the criminal justice system. Courts and legislatures discourage employers from hiring workers with criminal records and encourage employers to discipline workers for non-work-related criminal misconduct. In analyzing this phenomenon, my goals are threefold: (1) to examine how criminal employment law works; (2) to hypothesize why criminal employment law has proliferated; and (3) to assess what is wrong with criminal employment law. This Article examines the ways in which the laws that govern the workplace create incentives for employers not to hire individuals with …


Four Principles For Digital Expression (You Won't Believe #3!), Neil M. Richards, Danielle Keats Citron Jan 2018

Four Principles For Digital Expression (You Won't Believe #3!), Neil M. Richards, Danielle Keats Citron

Scholarship@WashULaw

At the dawn of the Internet’s emergence, the Supreme Court rhapsodized about its potential as a tool for free expression and political liberation. In ACLU v. Reno (1997), the Supreme Court adopted a bold vision of Internet expression to strike down a federal law–the Communications Decency Act–that restricted digital expression to forms that were merely “decent.” Far more than the printing press, the Court explained, the mid-90s Internet enabled anyone to become a town crier. Communication no longer required the permission of powerful entities. With a network connection, the powerless had as much luck reaching a mass audience as the …


The Case Against Idealising Control, Woodrow Hartzog Jan 2018

The Case Against Idealising Control, Woodrow Hartzog

Faculty Scholarship

Seemingly everyone, from scholars, industry, and privacy advocates to lawmakers, regulators, and judges seems to have settled on the idea that the key to privacy is control over personal information. But in practice, there is only so much a person can do. Control is far too precious and finite of a concept to meaningfully scale. It will never work for personal data mediated by technology.

Now we have an entire empire of data protection built around the crumbling edifice of control. The idealisation of control in modern data protection regimes like the GDPR and the ePrivacy Directive creates a pursuit …