Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Law

Adopting Social Media In Family And Adoption Law, Stacey B. Steinberg, Meredith Burgess, Karla Herrera Feb 2023

Adopting Social Media In Family And Adoption Law, Stacey B. Steinberg, Meredith Burgess, Karla Herrera

Utah Law Review

Social media has dramatically changed the landscape facing families brought together through adoption. Just as adoptive families thirty years ago could not have predicted the impact of DNA technology on postadoption family life, adoptive families are only now beginning to grasp the impact of social media connectivity on the lives of their growing children. This change is related both to social media’s impact on family life and to fundamental shifts in our understanding of privacy more generally. Understanding the legal rights of parents and children in these circumstances is a novel and underexplored area of family law, constitutional law, and …


The Carpenter Test As A Transformation Of Fourth Amendment Law, Matthew Tokson Jan 2023

The Carpenter Test As A Transformation Of Fourth Amendment Law, Matthew Tokson

Utah Law Faculty Scholarship

For over fifty years, the Fourth Amendment’s scope has been largely dictated by the Katz test, which applies the Amendment’s protections only when the government has violated a person’s “reasonable expectation of privacy.” This vague standard is one of the most criticized doctrines in all of American law, and its lack of coherence has made Fourth Amendment search law notoriously confusing. Things have become even more complex following the Supreme Court’s landmark decision in Carpenter v. United States, which has spawned its own alternative test for determining the Fourth Amendment’s scope. The emerging Carpenter test looks to the revealing nature …


Telephone Pole Cameras Under Fourth Amendment Law, Matthew Tokson Jan 2022

Telephone Pole Cameras Under Fourth Amendment Law, Matthew Tokson

Utah Law Faculty Scholarship

In a series of recent cases, police officers have mounted sophisticated surveillance cameras on telephone poles and pointed them at the homes of people suspected of a crime. These cameras often operate for months or even years without judicial oversight, collecting vast quantities of video footage on suspects and their activities near the home. Pole camera surveillance raises important Fourth Amendment questions that have divided courts and puzzled scholars.

These questions are complicated because Fourth Amendment law is complicated. This is especially the case today as Fourth Amendment law is in a transitional phase, caught between older and newer paradigms …


Smart Meters As A Catalyst For Privacy Law, Matthew Tokson Jan 2022

Smart Meters As A Catalyst For Privacy Law, Matthew Tokson

Utah Law Faculty Scholarship

Smart utility meters raise several puzzling legal questions—and answering them can help point the way toward the future of Fourth Amendment and civil privacy law. This forum essay addresses two such issues: use restrictions on collected data, and voluntary data disclosure.

First, more than any other current technology, smart meters compel the development of use restrictions on collected data. The benefits of smart meters are potentially enormous, such that categorically prohibiting public utilities from collecting smart meter data is likely beyond the pale. Yet allowing law enforcement agents to obtain detailed or intimate data about the home without a warrant …


Show Me The (Data About The) Money!, Nizan Geslevich Packin Jan 2021

Show Me The (Data About The) Money!, Nizan Geslevich Packin

Utah Law Review

Information about consumers, their money, and what they do with it is the lifeblood of the flourishing financial technology (“FinTech”) sector. Historically, highly regulated banks jealously protected this data. However, consumers themselves now share their data with businesses more than ever before. These businesses monetize and use the data for countless prospects, often without the consumers’ actual consent. Understanding the dimensions of this recent phenomenon, more and more consumer groups, scholars, and lawmakers have started advocating for consumers to have the ability to control their data as a modern imperative. This ability is tightly linked to the concept of open …


Inescapable Surveillance, Matthew Tokson Nov 2020

Inescapable Surveillance, Matthew Tokson

Utah Law Faculty Scholarship

Until recently, Supreme Court precedent dictated that a person waives their Fourth Amendment rights in information they disclose to another party. The Court reshaped this doctrine in Carpenter v. United States, establishing that the Fourth Amendment protects cell phone location data even though it is revealed to others. The Court emphasized that consumers had little choice but to disclose their data, because cell phone use is virtually inescapable in modern society.

In the wake of Carpenter, many scholars and lower courts have endorsed inescapability as an important factor for determining Fourth Amendment rights. Under this approach, surveillance that people cannot …


The Path To Standing: Asserting The Inherent Injury Of The Data Breach, Jennifer M. Joslin Jun 2019

The Path To Standing: Asserting The Inherent Injury Of The Data Breach, Jennifer M. Joslin

Utah Law Review

Data breaches are on the rise as consumers continue to exchange personally identifiable information for goods and services in sectors from retail to healthcare. In the aftermath of a data breach, it has been difficult for victims of the breach to establish Article III standing to sue in federal courts. The primary hurdle for those seeking a remedy for the theft of their data has been showing that they have suffered an injury-in-fact. Plaintiffs typically assert an injury based on the increased risk of identity theft following a breach. However, courts have divided on whether such an injury satisfies the …


The Normative Fourth Amendment, Matthew Tokson May 2019

The Normative Fourth Amendment, Matthew Tokson

Utah Law Faculty Scholarship

For decades, courts have used a “reasonable expectation of privacy” standard to determine whether a government action is a Fourth Amendment search. Scholars have convincingly argued that this test is incoherent, arbitrary, and incapable of protecting privacy against modern forms of surveillance. Yet few alternatives have been proposed, and those alternatives pose many of the same problems as the current standard.

This Article offers a new theoretical approach for determining the scope of the Fourth Amendment. It develops a normative model of Fourth Amendment searches, one that explicitly addresses the balance between law enforcement effectiveness and citizens’ interests inherent in …


Data Re-Use And The Problem Of Group Identity, Leslie Francis, John G. Francis Apr 2019

Data Re-Use And The Problem Of Group Identity, Leslie Francis, John G. Francis

Utah Law Faculty Scholarship

Reusing existing data sets of health information for public health or medical research has much to recommend it. Much data repurposing in medical or public health research or practice involves information that has been stripped of individual identifiers but some does not. In some cases, there may have been consent to the reuse but in other cases consent may be absent and people may be entirely unaware of how the data about them are being used. Data sets are also being combined and may contain information with very different sources, consent histories, and individual identifiers. Much of the ethical and …


Corporate Social Responsibility And Social Media Corporations: Incorporating Human Rights Through Rankings, Self-Regulation And Shareholder Resolutions, Erika George Apr 2018

Corporate Social Responsibility And Social Media Corporations: Incorporating Human Rights Through Rankings, Self-Regulation And Shareholder Resolutions, Erika George

Utah Law Faculty Scholarship

This article examines the emergence and evolution of selected ranking and reporting frameworks in the expanding realm of business and human rights advocacy. It explores how indicators in the form of rankings and reports evaluating the conduct of transnational corporate actors can serve as regulatory tools with potential to bridge a global governance gap that often places human rights at risk. This article examines the relationship of transnational corporations in the Internet communications technology sector (ICT sector) to human rights and the risks presented to the right to freedom of expression and the right to privacy when ICT sector companies …


Environmental Privacy, Katrina F. Kuh Jan 2015

Environmental Privacy, Katrina F. Kuh

Utah Law Review

The purpose of this Article is not to anticipate whether or how the Fourth Amendment might apply to specific efforts to collect information about environmentally significant individual behaviors. The purpose is to discern the considerations that have proven salient in balancing environmental regulation and privacy to date that may likewise be relevant to navigating privacy concerns that arise with respect to policy directed to environmentally significant individual behaviors.

In this regard, the Article’s survey suggests that neither the fact that environmentally significant individual behaviors must be aggregated to produce environmental harm nor the fact that individuals, as opposed to commercial …


Striking A Balance Between Privacy And Online Commerce, Mark Bartholomew Jan 2013

Striking A Balance Between Privacy And Online Commerce, Mark Bartholomew

Utah OnLaw: The Utah Law Review Online Supplement

It is becoming commonplace to note that privacy and online commerce are on a collision course. Corporate entities archive and monetize more and more personal information. Citizens increasingly resent the intrusive nature of such data collection and use. Just noticing this conflict, however, tells us little. In Informing and Reforming the Marketplace of Ideas: The Public-Private Model for Data Production and the First Amendment, Professor Shubha Ghosh not only notes the tension between the costs and benefits of data commercialization, but suggests three normative perspectives for balancing privacy and commercial speech. This is valuable because without a rich theoretical framework …