Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 23 of 23

Full-Text Articles in Law

Our Changing Reality: The Metaverse And The Importance Of Privacy Regulations In The United States, Anushkay Raza Dec 2023

Our Changing Reality: The Metaverse And The Importance Of Privacy Regulations In The United States, Anushkay Raza

Global Business Law Review

This Note discusses the legal and pressing digital challenges that arise in connection with the growing use of virtual reality, and more specifically, the metaverse. As this digital realm becomes more integrated into our daily lives, the United States should look towards creating a federal privacy law that protects fundamental individual privacy rights. This Note argues that congress should emulate the European Union's privacy regulations, and further, balances the potential consequences and benefits of adapting European regulations within the United Sates. Finally, this Note provides drafting considerations of future lawyers who will not only be dealing with the rise of …


Flattening The Curve While Protecting Our Right To Privacy: How The United States Can Implement The Digital Contract Tracing Efforts Used In East Asia, Evan Morris Aug 2022

Flattening The Curve While Protecting Our Right To Privacy: How The United States Can Implement The Digital Contract Tracing Efforts Used In East Asia, Evan Morris

Global Business Law Review

This paper looks at the digital contact tracing efforts implemented by other nations and assesses how similar measures could operate under enacted and proposed United States laws. Part I overviews the history of contact tracing and its effectiveness in prior disease outbreaks. Part II delves into the digital contact tracing efforts implemented by South Korea and Singapore. These summaries include: the digital contact tracing efforts taken, the laws that authorize these efforts, the public’s reception, and the overall effectiveness of the efforts. Part III overviews the digital contact tracing efforts in the United States, including proposed legislation aimed at user …


Just Plain Dumb?: How Digital Contact Tracing Apps Could’Ve Worked Better (And Why They Never Got The Chance), Brian E. Ray Jan 2021

Just Plain Dumb?: How Digital Contact Tracing Apps Could’Ve Worked Better (And Why They Never Got The Chance), Brian E. Ray

Law Faculty Articles and Essays

This essay describes how the privacy debate that emerged over digital contact tracing and Google’s and Apple’s decisions to strictly limit apps permitted to use their platforms resulted in undercutting their potential usefulness as a tool to combat the pandemic while still failing to engender trust in these tools as intended.


Private Affairs: Public Employees And The Right To Sexual Privacy, Susan A. Jacobsen Jun 2020

Private Affairs: Public Employees And The Right To Sexual Privacy, Susan A. Jacobsen

Cleveland State Law Review

Currently, the federal circuit courts split on whether public employers can discipline their employees for legal, off-duty sexual activity. The Fifth and Tenth Circuits permit discipline in these scenarios; the Ninth Circuit does not. At issue is whether certain public employees, like police officers, should be held to a higher standard because of their duty to the public or whether the Constitution entitles them to privacy rights that shield them from discipline. This Note concludes the latter and argues against punishing the legal, off-duty sexual conduct of all public employees. Because the right to sexual privacy already exists within the …


Appendix B: Ohio Attorney General Facial Recognition Task Force Proposal On Monitoring, Auditing, Enforcement And Transparency, Brian E. Ray, Dennis Hirsch Jan 2020

Appendix B: Ohio Attorney General Facial Recognition Task Force Proposal On Monitoring, Auditing, Enforcement And Transparency, Brian E. Ray, Dennis Hirsch

Law Faculty Reports and Comments

Policy controls that govern agency activity generally contain at least two components: (1) a substantive policy; and (2) a governance structure for ensuring implementation of and compliance with that policy. Effective controls require both. This proposal focuses on the second component, the governance structure. Specifically, it addresses routine monitoring, annual audits, enforcement of the AG’s policies that govern the facial recognition system, and public transparency. Established facial recognition policies, including those that the Task Force has looked to as models, recognize the importance of establishing such a governance structure.

We have reviewed existing federal and state policy templates documents in …


Cell Phones Are Orwell's Telescreen: The Need For Fourth Amendment Protection In Real-Time Cell Phone Location Information, Matthew Devoy Jones May 2019

Cell Phones Are Orwell's Telescreen: The Need For Fourth Amendment Protection In Real-Time Cell Phone Location Information, Matthew Devoy Jones

Cleveland State Law Review

Courts are divided as to whether law enforcement can collect cell phone location information in real-time without a warrant under the Fourth Amendment. This Article argues that Carpenter v. United States requires a warrant under the Fourth Amendment prior to law enforcement’s collection of real-time cell phone location information. Courts that have required a warrant prior to the government’s collection of real-time cell phone location information have considered the length of surveillance. This should not be a factor. The growing prevalence and usage of cell phones and cell phone technology, the original intent of the Fourth Amendment, and United States …


Keep Your Friends Close And Your Medical Records Closer: Defining The Extent To Which A Constitutional Right To Informational Privacy Protects Medical Records, Lauren Newman May 2019

Keep Your Friends Close And Your Medical Records Closer: Defining The Extent To Which A Constitutional Right To Informational Privacy Protects Medical Records, Lauren Newman

Journal of Law and Health

The following Article discusses the extent to which the constitutional right to informational privacy protects medical data from improper acquisition or dissemination by state agents. Part I provides background on Whalen v. Roe, the Supreme Court case that has been understood to establish the right to informational privacy. Part I also discusses the variations across the circuit courts as to what medical information is afforded protection by the right. Part II analyzes the well-established approaches adopted by the Second and Third Circuits as they present opposing interpretations of Whalen, one wholly protecting medical information and the other protecting …


Clear As Mud: Constitutional Concerns With Clear Affirmative Consent, C. Ashley Saferight May 2019

Clear As Mud: Constitutional Concerns With Clear Affirmative Consent, C. Ashley Saferight

Cleveland State Law Review

Rape and sexual assault laws and policies have shifted significantly in recent years, including the introduction of affirmative consent. Unfortunately, both proponents and critics tend to confuse the issues and falsely equate affirmative consent as a substantive social standard versus a procedural standard for adjudication and punishment. Although affirmative consent generally does not represent a significant change in consent law in the United States, statutes and policies requiring a further requirement that affirmative consent be clear and unambiguous (“clear affirmative consent”) are problematic and raise constitutional concerns. When clear affirmative consent policies are used as an adjudicative standard, they increase …


Rights On Publicity As Remarkably Insignificant, R. George Wright Apr 2019

Rights On Publicity As Remarkably Insignificant, R. George Wright

Cleveland State Law Review

This Article introduces the right of publicity through a brief consideration of high-profile cases involving, respectively, Paris Hilton, human cannonball Hugo Zacchini, and the famous actress Olivia de Havilland. With this background understanding, the Article considers the supposed risks to freedom of speech posed by recognizing rights of publicity in a private party. From there, the Article addresses the nagging concern that the publicity rights cases promote a harmful "celebrification" of culture. Finally, the Article considers whether allowing for meaningful damage recoveries in publicity rights cases appropriately compensates victims in ways promoting the broad public interest.


Workplace Privacy In The Age Of Social Media, Tess Traylor-Notaro Jul 2018

Workplace Privacy In The Age Of Social Media, Tess Traylor-Notaro

Global Business Law Review

This note addresses the lack of adequate protections in Ohio for social media privacy laws in the workplace and compares proposed legislation in Ohio to legislation that has passed in other states. It examines the provision of the SCA including the definition of "user" and whether social media sites fall under its umbrella. It also looks at the safeguards and limitations of the SCA and how it is used to protect a private employee’s social media account. It analyzes the state statutory laws in Arkansas, Illinois, and California passed specifically to prevent employers from requesting passwords to personal Internet accounts. …


Consumer Law Immersion, Kevin M. Mcdonald, Karl Hochkammer, Steven Wernikoff Jul 2018

Consumer Law Immersion, Kevin M. Mcdonald, Karl Hochkammer, Steven Wernikoff

Global Business Law Review

As part of Washington University School of Law’s (WashULaw) Online Master of Legal Studies (MLS) program, students attend optional weekend immersion courses at the law school in St. Louis in both the spring and fall. We recently taught a course on consumer law over the spring 2018 weekend session held on March 23-25, 2018. In attendance were twenty-two students, most of whom were enrolled in the MLS program. Several were foreign lawyers and one was an LL.M. student. This article summarizes our three-day experience and concludes with our key learnings that incorporate feedback we received from students both during and …


Against Notice And Choice: The Manifest Failure Of The Proceduralist Paradigm To Protect Privacy Online (Or Anywhere Else), John A. Rothchild May 2018

Against Notice And Choice: The Manifest Failure Of The Proceduralist Paradigm To Protect Privacy Online (Or Anywhere Else), John A. Rothchild

Cleveland State Law Review

Notice and choice are the foundational principles underlying the regulation of privacy in online transactions and in most other situations in which individuals interact with the government and commercial interests. These principles mean that before collecting personally identifiable information (PII) from an individual, the collector must provide the individual with a disclosure (notice) of what PII it proposes to collect and how it proposes to use that information. That knowledge enables the individual to make a rational decision (choice) about whether to allow that collection of information, generally by declining to enter into the transaction or, in some situations, by …


The Fight Over Encryption: Reasons Why Congress Must Block The Government From Compelling Technology Companies To Create Backdoors Into Their Devices, Shannon Lear Apr 2018

The Fight Over Encryption: Reasons Why Congress Must Block The Government From Compelling Technology Companies To Create Backdoors Into Their Devices, Shannon Lear

Cleveland State Law Review

Advances in technology in the past decade have blurred the line between individuals’ privacy rights and the government’s ability to access information. How should this issue be handled in a manner that balances the privacy rights of individuals and the government’s access to information in the interest of national security?

This Note proposes a bright-line rule that would continue to allow the government to obtain specific information from a data service provider without forcing the company to circumvent its own security features. Under this rule, a company shall relinquish specific information in its control or possession only by court order …


Privacy By Design: Taking Ctrl Of Big Data, Eric Everson Mar 2017

Privacy By Design: Taking Ctrl Of Big Data, Eric Everson

Cleveland State Law Review

The concept of Privacy by Design is rooted in systems engineering. Yet, it is the legal framework of global privacy that gives new color to this concept as applied to Big Data. Increasingly, the long arm of the law is reaching into Big Data, but it is not simply by matter of regulatory enforcement or civil legal developments that Privacy by Design (PbD) is being thrust into the spotlight once more.

Given that Big Data is considered miniscule in contrast to future data environments, PbD is simply the right thing to do. This paper aims to explore the origin of …


Game Of Phones: The Fourth Amendment Implications Of Real-Time Cell Phone Tracking, Cal Cumpstone Mar 2017

Game Of Phones: The Fourth Amendment Implications Of Real-Time Cell Phone Tracking, Cal Cumpstone

Cleveland State Law Review

With the help of technological advancements, law enforcement can now hijack a targeted individual’s cell phone to ping and track the phone’s exact location in real time. Based upon previous rulings, this new tracking process has apparently fallen into a "grey area" of Fourth Amendment jurisprudence. However, real-time cell phone tracking should be a search in terms of the Fourth Amendment and, therefore, require a warrant. Real-time cell phone tracking infringes on an individual’s reasonable expectation of privacy, violates the trespass doctrine as a trespass to chattels, and violates the Kyllo standard by using technology not in general public use …


It Depends: Recasting Internet Clickwrap, Browsewrap, "I Agree," And Click-Through Privacy Clauses As Waivers Of Adhesion, Charles E. Maclean Mar 2017

It Depends: Recasting Internet Clickwrap, Browsewrap, "I Agree," And Click-Through Privacy Clauses As Waivers Of Adhesion, Charles E. Maclean

Cleveland State Law Review

Digital giants, enabled by America’s courts, Congress, and the Federal Trade Commission, devise click-through, clickwrap, browsewrap, "I Agree" waivers, and other legal fictions that purport to evidence user "consent" to consumer privacy erosions. It is no longer enough to justify privacy invasions as technologically inevitable or as essential to the American economy. As forced consent is no consent at all, privacy policies must advance with the technology. This article discusses adhesion waivers, the potential for FTC corrective action, and a comparison to privacy policies of the European Union.


Social Data Discovery And Proportional Privacy, Agnieszka Mcpeak Mar 2017

Social Data Discovery And Proportional Privacy, Agnieszka Mcpeak

Cleveland State Law Review

Social media platforms aggregate large amounts of personal information as "social data" that can be easily downloaded as a complete archive. Litigants in civil cases increasingly seek out broad access to social data during the discovery process, often with few limits on the scope of such discovery. But unfettered access to social data implicates unique privacy concerns—concerns that should help define the proper scope of discovery.

The Federal Rules of Civil Procedure, as amended in 2015, already contain the tools for crafting meaningful limits on intrusive social data discovery. In particular, the proportionality test under Rule 26 weighs the burdens …


A Healthy Amount Of Privacy: Quantifying Privacy Concerns In Medicine, Ignacio N. Cofone Mar 2017

A Healthy Amount Of Privacy: Quantifying Privacy Concerns In Medicine, Ignacio N. Cofone

Cleveland State Law Review

With recent developments in e-health, concerns have been raised regarding the privacy of patients who are monitored with such treatments. I propose a simple method to incorporate these concerns into a standard health impact evaluation, based on quality-adjusted life years and the incremental cost-effectiveness ratio. This method provides a way to objectively value privacy concerns and balance them with health benefits. Hence, it can guide doctors and policymakers into incorporating privacy considerations and making better choices regarding e-health programs. This method can also be tested on existing economic evaluations to compare outcomes and gauge the extent to which privacy issues …


Are They Worth Reading? An In-Depth Analysis Of Online Trackers’ Privacy Policies, Candice Hoke, Lorrie Faith Cranor, Pedro Giovanni Leon, Alyssa Au Apr 2015

Are They Worth Reading? An In-Depth Analysis Of Online Trackers’ Privacy Policies, Candice Hoke, Lorrie Faith Cranor, Pedro Giovanni Leon, Alyssa Au

Law Faculty Articles and Essays

We analyzed the privacy policies of 75 online tracking companies with the goal of assessing whether they contain information relevant for users to make privacy decisions. We compared privacy policies from large companies, companies that are members of self-regulatory organizations, and nonmember companies and found that many of them are silent with regard to important consumer-relevant practices including the collection and use of sensitive information and linkage of tracking data with personally-identifiable information. We evaluated these policies against self-regulatory guidelines and found that many policies are not fully compliant. Furthermore, the overly general requirements established in those guidelines allow companies …


Surveillance, Speech Suppression And Degradation Of The Rule Of Law In The “Post-Democracy Electronic State”, David Barnhizer Jan 2014

Surveillance, Speech Suppression And Degradation Of The Rule Of Law In The “Post-Democracy Electronic State”, David Barnhizer

David Barnhizer

None of us can claim the quality of original insight achieved by Alexis de Tocqueville in his early 19th Century classic Democracy in America in his observation that the “soft” repression of democracy was unlike that in any other political form. It is impossible to deny that we in the US, the United Kingdom and Western Europe are experiencing just such a “gentle” drift of the kind that Tocqueville describes, losing our democratic integrity amid an increasingly “pretend” democracy. He explained: “[T]he supreme power [of government] then extends its arm over the whole community. It covers the surface of society …


The Ambush Interview: A False Light Invasion Of Privacy, Kevin F. O'Neill Jan 1983

The Ambush Interview: A False Light Invasion Of Privacy, Kevin F. O'Neill

Law Faculty Articles and Essays

The ''ambush" interview is a controversial investigative reporting technique permeating both national and local television news programming. In the typical ambush interview, a reporter and his news crew intercept an unsuspecting newsworthy subject on the street and bombard him with incriminating accusations ostensibly framed as questions. The ambush interviewee inevitably appears guilty before the viewing audience. This is due to a variety of forces, including the subject's severe credibility disadvantage and the accusatory nature of the reporter's questions. This Note applies a false light invasion of privacy analysis to the ambush technique and examines the nexus between the technique and …


Laudatory Invasion Of Privacy, Joseph Zolich Jan 1967

Laudatory Invasion Of Privacy, Joseph Zolich

Cleveland State Law Review

Although seventy-seven years have passed since its launching, the right of privacy is still in its infancy. But we can say that the doctrine is no longer a generality and courts have developed principles which are applied and followed in jurisdictions where the doctrine has been recognized. Laudatory invasion of privacy cases fall into the category of public disclosure of private facts about the plaintiff.


Comparative Law Of Privacy, James K. Weeks Jan 1963

Comparative Law Of Privacy, James K. Weeks

Cleveland State Law Review

At this time there is little doubt that the right of privacy is well established in most American jurisdictions. In Europe the situation is much the same. There the concept of "Fault"and "Moral Injury" affords the proper climate for its further development and continued protection. The fact that Continental countries have difficulty in tacking down the concept to a particular category of right, and even, sometimes, to a particular article in their Code, is, after all, inconsequential. Only in England is the right slow to come into its own, but the increasing awareness of the English Bench and Bar that …