Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

2019

Data

Discipline
Institution
Publication
Publication Type

Articles 1 - 29 of 29

Full-Text Articles in Law

Privacy Law Issues In Public Blockchains: An Analysis Of Blockchain, Pipeda, The Gdpr, And Proposals For Compliance, Noah Walters Dec 2019

Privacy Law Issues In Public Blockchains: An Analysis Of Blockchain, Pipeda, The Gdpr, And Proposals For Compliance, Noah Walters

Canadian Journal of Law and Technology

Proponents of blockchain proclaim that the technology’s greatest innovation is trust. Blockchain create trust by serving as an indispensable ledger (a central point of truth), for all stakeholders to a transaction. Instead of companies managing and reconciling records of the same transaction in privately held databases, both sides of a transaction are recorded simultaneously on a shared ledger — the blockchain. As a result, the crypto economic environment is characterized by the decentralized coordination of business processes and transactions. Proponents of crypto-economics regard decentralized coordination as an opportunity for new forms of economic innovation, forms designed to increase value for …


Linn Foster Freedman Room Dedication At Rwu School Of Law 11-01-2019, Roger Williams University School Of Law, Michael M. Bowden Nov 2019

Linn Foster Freedman Room Dedication At Rwu School Of Law 11-01-2019, Roger Williams University School Of Law, Michael M. Bowden

School of Law Conferences, Lectures & Events

No abstract provided.


Making Room For Big Data: Web Scraping And An Affirmative Right To Access Publicly Available Information Online, Amber Zamora Oct 2019

Making Room For Big Data: Web Scraping And An Affirmative Right To Access Publicly Available Information Online, Amber Zamora

The Journal of Business, Entrepreneurship & the Law

This paper will explore the legality of web scraping through the lens of recent litigation between web scraper hiQ Labs and the online professional networking platform, LinkedIn. First, the paper will study the background of web scraping litigation, some challenges courts face in issuing consistent verdicts, and the most common claims companies make against web scrapers. Then the paper will address three of the most common claims and identify court motivations and limitations within the doctrines. The first claims are those arising from the federal Computer Fraud and Abuse Act (CFAA). Next, the paper will investigate copyright claims and defenses …


The Noisy "Silent Witness": The Misperception And Misuse Of Criminal Video Evidence, Aaron M. Williams Oct 2019

The Noisy "Silent Witness": The Misperception And Misuse Of Criminal Video Evidence, Aaron M. Williams

Indiana Law Journal

This Note examines recent developments in the research of situational video evidence biases. Part I examines the current and growing body of psychological research into the various situational biases that can affect the reliability of video evidence and the gaps in this research that require further attention from researchers and legal academics. Because these biases do not “operate in a vacuum,” Part I also examines some of the recent and exciting research into the interaction between situational and dispositional biases. Part II examines the development of camera and video processing technology and its limitations as a means of mitigating such …


Law School News: Throw Out The Old Thinking 9-30-2019, Michael M. Bowden Sep 2019

Law School News: Throw Out The Old Thinking 9-30-2019, Michael M. Bowden

Life of the Law School (1993- )

No abstract provided.


Finding Data And Statistics On Judges, Leslie A. Street Sep 2019

Finding Data And Statistics On Judges, Leslie A. Street

Leslie A. Street

No abstract provided.


The Effectiveness Of Measures To Increase Appellate Court Efficiency And Decision Output, Thomas B. Marvell, Carlisle E. Moody Sep 2019

The Effectiveness Of Measures To Increase Appellate Court Efficiency And Decision Output, Thomas B. Marvell, Carlisle E. Moody

Carlisle Moody

This Article will examine the effectiveness of measures commonly employed to increase appellate court productivity. Part I of the Article sets forth some common design problems and explains how the research technique employed in the present study avoids these problems by using a multiple time-series research design. Part II applies this design to state court data. Part II also describes the dependent variable, the number of appeals decided per judge, used in the regression analysis. Part III discusses the results of that analysis-the impact of each change listed above on judicial productivity. The Article, although not advocating the adoption of …


Medical Ai And Contextual Bias, W. Nicholson Price Ii Sep 2019

Medical Ai And Contextual Bias, W. Nicholson Price Ii

Articles

Artificial intelligence will transform medicine. One particularly attractive possibility is the democratization of medical expertise. If black-box medical algorithms can be trained to match the performance of high-level human experts — to identify malignancies as well as trained radiologists, to diagnose diabetic retinopathy as well as board-certified ophthalmologists, or to recommend tumor-specific courses of treatment as well as top-ranked oncologists — then those algorithms could be deployed in medical settings where human experts are not available, and patients could benefit. But there is a problem with this vision. Privacy law, malpractice, insurance reimbursement, and FDA approval standards all encourage developers …


Data Regulation With Chinese Characteristics, Henry S. Gao Aug 2019

Data Regulation With Chinese Characteristics, Henry S. Gao

Centre for AI & Data Governance

Data regulation has become a key issue in today’s world. For various reasons, however, it has been challenging to understand data regulations in China, home to the largest e-commerce market in the world. This paper traces the evolution of data and Internet regulation in China, from the early days of the Chinese Internet, to the regulatory turf wars among different agencies, and all the way to the elevation of data and Internet regulation to the level of national security and the rise of a super-agency in charge of the issue in recent years. The paper argues that, the Chinese Internet …


Tribal Data Governance And Informational Privacy: Constructing "Indigenous Data Sovereignty", Rebecca Tsosie Aug 2019

Tribal Data Governance And Informational Privacy: Constructing "Indigenous Data Sovereignty", Rebecca Tsosie

Montana Law Review

This essay discusses tribal claims to data sovereignty and informational privacy, examining the nature of the respective claims, as well as how tribal governments can exercise effective authority over the collection and use of data about the community and its members. Part I of the essay explores the issue of data sovereignty comparatively, framing the concept within its global and national contexts, and then discussing the rights of tribal governments and other Indigenous peoples. Part II of the essay examines the various claims that are comprised within the movement toward "Indigenous data sovereignty," as well as the current context of …


Diversity As A Trade Secret, Jamillah Bowman Williams Aug 2019

Diversity As A Trade Secret, Jamillah Bowman Williams

Georgetown Law Faculty Publications and Other Works

When we think of trade secrets, we often think of famous examples such as the Coca-Cola formula, Google’s algorithm, or McDonald’s special sauce used on the Big Mac. However, companies have increasingly made the novel argument that diversity data and strategies are protected trade secrets. This may sound like an unusual, even suspicious, legal argument. Many of the industries that dominate the economy in wealth, status, and power continue to struggle with a lack of diversity. Various stakeholders have mobilized to improve access and equity, but there is an information asymmetry that makes this pursuit daunting. When potential plaintiffs and …


The Role Of Satellites And Smart Devices: Data Surprises And Security, Privacy, And Regulatory Challenges, Anne T. Mckenna, Amy C. Gaudion, Jenni L. Evans Jul 2019

The Role Of Satellites And Smart Devices: Data Surprises And Security, Privacy, And Regulatory Challenges, Anne T. Mckenna, Amy C. Gaudion, Jenni L. Evans

Amy C. Gaudion

Strava, a popular social media platform and mobile app like Facebook but specifically designed for athletes, posts a “heatmap” with consensually-obtained details about users’ workouts and geolocation. Strava’s heatmap depicts aggregated data of user location and movement by synthesizing GPS satellite data points and movement data from users’ smart devices together with satellite imagery. In January of 2018, a 20-year-old student tweeted that Strava’s heatmap revealed U.S. forward operating bases. The tweet revealed a significant national security issue and flagged substantial privacy and civil liberty concerns.

Smart devices, software applications, and social media platforms aggregate consumer data from multiple data …


The Mixed Case For A Ptab Off-Ramp, Saurabh Vishnubhakat Jun 2019

The Mixed Case For A Ptab Off-Ramp, Saurabh Vishnubhakat

Faculty Scholarship

This Essay begins from the emerging agenda in the political branches for reforming various aspects of the USPTO Patent Trial and Appeal Board, and focuses on a particular reform: the creation of a PTAB off-ramp whereby a patent being challenged in an administrative revocation proceeding could be removed into a system primarily aimed at amending its claims and preserving its validity. To put the proposal into perspective, the Essay presents specific empirical trends, largely unexplored until now, that implicate patent reliance interests to which the PTAB has done injury. Ultimately, because the benefits and costs from a PTAB off-ramp are …


Digital Colonialism: The 21st Century Scramble For Africa Through The Extraction And Control Of User Data And The Limitations Of Data Protection Laws, Danielle Coleman May 2019

Digital Colonialism: The 21st Century Scramble For Africa Through The Extraction And Control Of User Data And The Limitations Of Data Protection Laws, Danielle Coleman

Michigan Journal of Race and Law

As Western technology companies increasingly rely on user data globally, extensive data protection laws and regulations emerged to ensure ethical use of that data. These same protections, however, do not exist uniformly in the resource-rich, infrastructure-poor African countries, where Western tech seeks to establish its presence. These conditions provide an ideal landscape for digital colonialism.

Digital colonialism refers to a modern-day “Scramble for Africa” where largescale tech companies extract, analyze, and own user data for profit and market influence with nominal benefit to the data source. Under the guise of altruism, large scale tech companies can use their power and …


The Gdpr: It Came, We Saw, But Did It Conquer?, Leila Javanshir Apr 2019

The Gdpr: It Came, We Saw, But Did It Conquer?, Leila Javanshir

Seattle University Law Review

On February 1, 2019, the Seattle University Law Review held its annual symposium at the Seattle University School of Law. Each year, the Law Review hosts its symposium on a topic that is timely and meaningful. This year, privacy and data security professionals from around the globe gathered to discuss the current and future effects of the General Data Protection Regulation (GDPR) that was implemented on May 25, 2018. The articles and essays that follow this Foreword are the product of this year’s symposium.


Confiding In Con Men: U.S. Privacy Law, The Gdpr, And Information Fiduciaries, Lindsey Barrett Apr 2019

Confiding In Con Men: U.S. Privacy Law, The Gdpr, And Information Fiduciaries, Lindsey Barrett

Seattle University Law Review

In scope, ambition, and animating philosophy, U.S. privacy law and Europe’s General Data Protection Regulation are almost diametric opposites. The GDPR’s ambitious individual rights, significant prohibitions, substantive enforcement regime, and broad applicability contrast vividly with a scattershot U.S. regime that generally prioritizes facilitating commerce over protecting individuals, and which has created perverse incentives for industry through anemic enforcement of the few meaningful limitations that do exist. A privacy law that characterizes data collectors as information fiduciaries could coalesce with the commercial focus of U.S. law, while emulating the GDPR’s laudable normative objectives and fortifying U.S. consumer privacy law with a …


Privacy Statements Under The Gdpr, Mike Hintze Apr 2019

Privacy Statements Under The Gdpr, Mike Hintze

Seattle University Law Review

The need to include specific types of information in a privacy statement is a GDPR compliance obligation that does not get as much attention as some other GDPR requirements. Perhaps that is because privacy statements have been much maligned in recent years. They are too long and full of legalese. Nobody reads them. They are part of a notice and consent approach to privacy that puts an unrealistic burden on consumers to make informed choices. But despite these well-known criticisms, the GDPR doubles down on privacy statements. In fact, gauging by the roughly fourfold increase in privacy statement requirements compared …


Footprints: Privacy For Enterprises, Processors, And Custodians…Oh My!, Blair Witzel, Carrie Mount Apr 2019

Footprints: Privacy For Enterprises, Processors, And Custodians…Oh My!, Blair Witzel, Carrie Mount

Seattle University Law Review

Americans’ interest in privacy—as evidenced by increasing news coverage, online searches, and new legislation—has grown over the past decade. After the European Union enacted the General Data Protection Regulation (GDPR), technologists and legal professionals have focused on primary collectors of data—known under various legal regimes as the “controller” or “custodian.” Thanks to advances in computing, many of these data collectors offload the processing of data to third parties providing data-related cloud services like Amazon, Microsoft, and Google. In addition to the data they have already collected about the data subjects themselves, these companies now “hold” that data on behalf of …


Title 2.0: Discrimination Law In A Data-Driven Society, Bryan Casey Apr 2019

Title 2.0: Discrimination Law In A Data-Driven Society, Bryan Casey

Journal of Law and Mobility

More than a quarter century after civil rights activists pioneered America’s first ridesharing network, the connections between transportation, innovation, and discrimination are again on full display. Industry leaders such as Uber, Amazon, and Waze have garnered widespread acclaim for successfully combatting stubbornly persistent barriers to transportation. But alongside this well-deserved praise has come a new set of concerns. Indeed, a growing number of studies have uncovered troubling racial disparities in wait times, ride cancellation rates, and service availability in companies including Uber, Lyft, Task Rabbit, Grubhub, and Amazon Delivery.

Surveying the methodologies employed by these studies reveals a subtle, but …


Nowhere To Run, Nowhere To Hide.* Applying The Fourth Amendment To Connected Cars In The Internet-Of-Things Era, Gregory C. Brown, Jr. Mar 2019

Nowhere To Run, Nowhere To Hide.* Applying The Fourth Amendment To Connected Cars In The Internet-Of-Things Era, Gregory C. Brown, Jr.

Journal of Civil Rights and Economic Development

(Excerpt)

Part I of this Note will briefly discuss the key components of a Connected Car, identify who collects the data from the Car, and examine the various uses for the data. Part I also explores whether Car owners consent to the collection of their Car’s data. Part II-A will trace the historical development of the automobile exception to the Fourth Amendment, which generally permits law-enforcement officers to conduct a warrantless search of a vehicle. Part II-B will discuss how the Supreme Court has applied the Fourth Amendment to pre-Internet technologies. Part II-C will discuss two recent Fourth Amendment Supreme …


Privacy Preserving Social Norm Nudges, Yifat Nahmias Jan 2019

Privacy Preserving Social Norm Nudges, Yifat Nahmias

Michigan Technology Law Review

Nudges comprise a key component of the regulatory toolbox. Both the public and private sectors use nudges extensively in various domains, ranging from environmental regulation to health, food and financial regulation. This article focuses on a particular type of nudge: social norm nudges. It discusses, for the first time, the privacy risks of such nudges. Social norm nudges induce behavioral change by capitalizing on people’s desire to fit in with others, on their predisposition to social conformity, and on their susceptibility to the way information is framed. In order to design effective social norm nudges, personal information about individuals and …


Data-Informed Duties In Ai Development, Frank A. Pasquale Jan 2019

Data-Informed Duties In Ai Development, Frank A. Pasquale

Faculty Scholarship

Law should help direct—and not merely constrain—the development of artificial intelligence (AI). One path to influence is the development of standards of care both supplemented and informed by rigorous regulatory guidance. Such standards are particularly important given the potential for inaccurate and inappropriate data to contaminate machine learning. Firms relying on faulty data can be required to compensate those harmed by that data use—and should be subject to punitive damages when such use is repeated or willful. Regulatory standards for data collection, analysis, use, and stewardship can inform and complement generalist judges. Such regulation will not only provide guidance to …


"You Have The Data"...The Writ Of Habeas Data And Other Data Protection Rights: Is The United States Falling Behind?, Sarah L. Lode Jan 2019

"You Have The Data"...The Writ Of Habeas Data And Other Data Protection Rights: Is The United States Falling Behind?, Sarah L. Lode

Indiana Law Journal

In Part I of this Note, I will discuss the writ of habeas data that has been developed primarily, but not exclusively, in Latin American countries. I will discuss the intricacies of the writ, how it evolved, and how it is applied today. Using Argentina as an example, I will discuss how the writ would be used by an Argentine citizen to protect her personal data. Part II summarizes the previously employed data protection scheme in the European Union, the Data Protection Directive (“the Directive”), and will also discuss the new EU data protection regulation, the General Data Protection Regulation …


The Exclusionary Rule In The Age Of Blue Data, Andrew Ferguson Jan 2019

The Exclusionary Rule In The Age Of Blue Data, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

In Herring v. United States, Chief Justice John Roberts reframed the Supreme Court’s understanding of the exclusionary rule: “As laid out in our cases, the exclusionary rule serves to deter deliberate, reckless, or grossly negligent conduct, or in some circumstances recurring or systemic negligence.” The open question remains: how can defendants demonstrate sufficient recurring or systemic negligence to warrant exclusion? The Supreme Court has never answered the question, although the absence of systemic or recurring problems has figured prominently in two recent exclusionary rule decisions. Without the ability to document recurring failures, or patterns of police misconduct, courts can dismiss …


Privacy In Gaming, N. Cameron Russell, Joel R. Reidenberg, Sumyung Moon Jan 2019

Privacy In Gaming, N. Cameron Russell, Joel R. Reidenberg, Sumyung Moon

Fordham Intellectual Property, Media and Entertainment Law Journal

Video game platforms and business models are increasingly built on collection, use, and sharing of personal information for purposes of both functionality and revenue. This paper examines privacy issues and explores data practices, technical specifications, and policy statements of the most popular games and gaming platforms to provide an overview of the current privacy legal landscape for mobile gaming, console gaming, and virtual reality devices. The research observes how modern gaming aligns with information privacy notions and norms and how data practices and technologies specific to gaming may affect users and, in particular, child gamers.

After objectively selecting and analyzing …


An Empirical Evaluation Of Eada And Ncaa College Sports Financial Data: Applications For Research And Litigation, Ted Tatos Jan 2019

An Empirical Evaluation Of Eada And Ncaa College Sports Financial Data: Applications For Research And Litigation, Ted Tatos

Marquette Sports Law Review

None


Forensic Border Searches After Carpenter Require Probable Cause And A Warrant, Christopher I. Pryby Jan 2019

Forensic Border Searches After Carpenter Require Probable Cause And A Warrant, Christopher I. Pryby

Michigan Law Review

Under the border search doctrine, courts have upheld the federal government's practice of searching people and their possessions upon entry into or exit from the United States, without any requirement of suspicion, as reasonable under the Fourth Amendment. Since the advent of electronic devices with large storage capacities, courts have grappled with whether this definition of reasonableness continues to apply. So far, courts have consistently characterized “nonforensic” border inspections of electronic devices (for example, paging through photos on a phone) as “routine” searches that, like inspecting luggage brought across international lines, require no suspicion. But there is a circuit split …


The Role Of Satellites And Smart Devices: Data Surprises And Security, Privacy, And Regulatory Challenges, Anne T. Mckenna, Amy C. Gaudion, Jenni L. Evans Jan 2019

The Role Of Satellites And Smart Devices: Data Surprises And Security, Privacy, And Regulatory Challenges, Anne T. Mckenna, Amy C. Gaudion, Jenni L. Evans

Faculty Scholarly Works

Strava, a popular social media platform and mobile app like Facebook but specifically designed for athletes, posts a “heatmap” with consensually-obtained details about users’ workouts and geolocation. Strava’s heatmap depicts aggregated data of user location and movement by synthesizing GPS satellite data points and movement data from users’ smart devices together with satellite imagery. In January of 2018, a 20-year-old student tweeted that Strava’s heatmap revealed U.S. forward operating bases. The tweet revealed a significant national security issue and flagged substantial privacy and civil liberty concerns.

Smart devices, software applications, and social media platforms aggregate consumer data from multiple data …


Data-Centric Technologies: Patent And Copyright Doctrinal Disruptions, Tabrez Y. Ebrahim Jan 2019

Data-Centric Technologies: Patent And Copyright Doctrinal Disruptions, Tabrez Y. Ebrahim

Faculty Scholarship

Data-centric technologies create information content that directly controls, modifies, or responds to the physical world. This information content resides in the digital world yet has profound economic and societal impact in the physical world. 3D printing and artificial intelligence are examples of data-centric technologies. 3D printing utilizes digital data for eventual printing of physical goods. Artificial intelligence learns from data sets to make predictions or automated decisions for use in physical applications and systems. 3D printing and artificial intelligence technologies are based on digital foundations, blur the digital and physical divide, and dramatically improve physical goods, objects, products, or systems. …