Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 18 of 18

Full-Text Articles in Law

Valuing Social Data, Amanda Parsons, Salomé Viljoen Aug 2023

Valuing Social Data, Amanda Parsons, Salomé Viljoen

Law & Economics Working Papers

Social data production is a unique form of value creation that characterizes informational capitalism. Social data production also presents critical challenges for the various legal regimes that are encountering it. This Article provides legal scholars and policymakers with the tools to comprehend this new form of value creation through two descriptive contributions. First, it presents a theoretical account of social data, a mode of production which is cultivated and exploited for two distinct (albeit related) forms of value: prediction value and exchange value. Second, it creates and defends a taxonomy of three “scripts” that companies follow to build up and …


Data Privacy, Human Rights, And Algorithmic Opacity, Sylvia Lu Jan 2022

Data Privacy, Human Rights, And Algorithmic Opacity, Sylvia Lu

Fellow, Adjunct, Lecturer, and Research Scholar Works

Decades ago, it was difficult to imagine a reality in which artificial intelligence (AI) could penetrate every corner of our lives to monitor our innermost selves for commercial interests. Within just a few decades, the private sector has seen a wild proliferation of AI systems, many of which are more powerful and penetrating than anticipated. In many cases, AI systems have become “the power behind the throne,” tracking user activities and making fateful decisions through predictive analysis of personal information. Despite the growing power of AI, proprietary algorithmic systems can be technically complex, legally claimed as trade secrets, and managerially …


Privacy In The Age Of Medical Big Data, W. Nicholson Price Ii, I. Glenn Cohen Jan 2019

Privacy In The Age Of Medical Big Data, W. Nicholson Price Ii, I. Glenn Cohen

Articles

Big data has become the ubiquitous watch word of medical innovation. The rapid development of machine-learning techniques and artificial intelligence in particular has promised to revolutionize medical practice from the allocation of resources to the diagnosis of complex diseases. But with big data comes big risks and challenges, among them significant questions about patient privacy. Here, we outline the legal and ethical challenges big data brings to patient privacy. We discuss, among other topics, how best to conceive of health privacy; the importance of equity, consent, and patient governance in data collection; discrimination in data uses; and how to handle …


Fourth Amendment Constraints On The Technological Monitoring Of Convicted Sex Offenders, Ben A. Mcjunkin, Jj Prescott Apr 2018

Fourth Amendment Constraints On The Technological Monitoring Of Convicted Sex Offenders, Ben A. Mcjunkin, Jj Prescott

Law & Economics Working Papers

More than forty U.S. states currently track at least some of their convicted sex offenders using GPS devices. Many offenders will be monitored for life. The burdens and expense of living indefinitely under constant technological monitoring have been well documented, but most commentators have assumed that these burdens were of no constitutional moment because states have characterized such surveillance as “civil” in character — and courts have seemed to agree. In 2015, however, the Supreme Court decided in Grady v. North Carolina that attaching a GPS monitoring device to a person was a Fourth Amendment search, notwithstanding the ostensibly civil …


Artificial Intelligence In Health Care: Applications And Legal Implications, W. Nicholson Price Ii Nov 2017

Artificial Intelligence In Health Care: Applications And Legal Implications, W. Nicholson Price Ii

Articles

Artificial intelligence (AI) is rapidly moving to change the healthcare system. Driven by the juxtaposition of big data and powerful machine learning techniques—terms I will explain momentarily—innovators have begun to develop tools to improve the process of clinical care, to advance medical research, and to improve efficiency. These tools rely on algorithms, programs created from healthcare data that can make predictions or recommendations. However, the algorithms themselves are often too complex for their reasoning to be understood or even stated explicitly. Such algorithms may be best described as “black-box.” This article briefly describes the concept of AI in medicine, including …


Country By Country Reporting And Corporate Privacy: Some Unanswered Questions, Reuven S. Avi-Yonah Dec 2016

Country By Country Reporting And Corporate Privacy: Some Unanswered Questions, Reuven S. Avi-Yonah

Articles

Corporate privacy is an oxymoron. Individuals have a right to privacy, which the Supreme Court has recognized at least since Griswold v. Connecticut (1965). Warren and Brandeis’ famous defense of the right to privacy (1890) clearly applied only to individuals, because only individuals have the kind of feelings that are affected by invasions of privacy. Corporations are legal entities, and the concept of privacy does not apply to them, as the Supreme Court held in 1906. Thus, any objection to making corporate tax returns public cannot rest on the right to privacy. In fact, corporate returns were made public in …


Intelligence Legalism And The National Security Agency’S Civil Liberties Gap, Margo Schlanger Jan 2015

Intelligence Legalism And The National Security Agency’S Civil Liberties Gap, Margo Schlanger

Articles

Since June 2013, we have seen unprecedented security breaches and disclosures relating to American electronic surveillance. The nearly daily drip, and occasional gush, of once-secret policy and operational information makes it possible to analyze and understand National Security Agency activities, including the organizations and processes inside and outside the NSA that are supposed to safeguard American’s civil liberties as the agency goes about its intelligence gathering business. Some have suggested that what we have learned is that the NSA is running wild, lawlessly flouting legal constraints on its behavior. This assessment is unfair. In fact, the picture that emerges from …


The 1 Percent Solution: Corporate Tax Returns Should Be Public (And How To Get There), Reuven S. Avi-Yonah, Ariel Siman Feb 2014

The 1 Percent Solution: Corporate Tax Returns Should Be Public (And How To Get There), Reuven S. Avi-Yonah, Ariel Siman

Articles

The justification for publishing corporate tax returns is that corporations are given immense benefits by the state that bestows upon them unlimited life and limited liability, and therefore they owe the public the information of how they treat the state that created them. Tax returns, like the financial disclosures that publicly traded corporations must file with the SEC, also provide useful information to shareholders, creditors, and the investing public.


Bringing Clarity To Administrative Search Doctrine: Distinguishing Dragnets From Special Subpopulation Searches, Eve Brensike Primus Jan 2012

Bringing Clarity To Administrative Search Doctrine: Distinguishing Dragnets From Special Subpopulation Searches, Eve Brensike Primus

Articles

Anyone who has been stopped at a sobriety checkpoint, screened at an international border, scanned by a metal detector at an airport or government building, or drug tested for public employment has been subjected to an administrative search or seizure. Searches of public school students, government employees, and probationers are characterized as administrative, as are business inspections and-increasingly-wiretaps and other searches used in the gathering of national security intelligence. In other words, the government conducts thousands of administrative searches every day. None of these searches requires either probable cause or a search warrant. Instead, courts evaluating administrative searches need only …


Disentangling Administrative Searches, Eve Brensike Primus Jan 2011

Disentangling Administrative Searches, Eve Brensike Primus

Articles

Everyone who has been screened at an international border, scanned by an airport metal detector, or drug tested for public employment has been subjected to an administrative search. Since September 11th, the government has increasingly invoked the administrative search exception to justify more checkpoints, unprecedented subway searches, and extensive wiretaps. As science and technology advance, the frequency and scope of administrative searches will only expand. Formulating the boundaries and requirements of administrative search doctrine is therefore a matter of great importance. Yet the rules governing administrative searches are notoriously unclear. This Article seeks to refocus attention on administrative searches and …


Confidentiality Of Educational Records And Child Protective Proceedings, Frank E. Vandervort Jan 2007

Confidentiality Of Educational Records And Child Protective Proceedings, Frank E. Vandervort

Book Chapters

The Federal Family Education Rights and Privacy Act (FERPA), which provides funding for state educational programming, requires that student records be disclosed to a nonparent only with the written consent of the child’s parent, unless the disclosure falls within one of the several exceptions detailed in the statute. One of the exemptions provided for in the federal law permits a school to disclose information to “state or local officials or authorities to whom [that] information is allowed to be reported or disclosed pursuant to state statute,” if that official certifies in writing “that the information will not be disclosed to …


The Secrecy Interest In Contract Law, Omri Ben-Shahar, Lisa Bernstein Jan 2000

The Secrecy Interest In Contract Law, Omri Ben-Shahar, Lisa Bernstein

Articles

A long and distinguished line of law-and-economics articles has established that in many circumstances fully compensatory expectation damages are a desirable remedy for breach of contract because they induce both efficient performance and efficient breach. The expectation measure, which seeks to put the breached-against party in the position she would have been in had the contract been performed, has, therefore, rightly been chosen as the dominant contract default rule. It does a far better job of regulating breach-or-perform incentives than its leading competitors-the restitution measure, the reliance measure, and specific performance. This Essay does not directly take issue with the …


Review Of The Repeal Of Reticence: A History Of America's Cultural And Legal Struggles Over Free Speech, Obscenity, Sexual Liberation, And Modern Art, Donald J. Herzog Jan 1999

Review Of The Repeal Of Reticence: A History Of America's Cultural And Legal Struggles Over Free Speech, Obscenity, Sexual Liberation, And Modern Art, Donald J. Herzog

Reviews

Our public sphere, which should have displayed and preserved the grandeur and beauty of our civic ideals and moral excellences, is instead inane and vacuous when it is not utterly mean, ugly, or indecent (p. 4). Troubled by the tawdry nonsense circulating in the public sphere-and she wrote before learned enquiries into whether the President's genitals had any distinguishing characteristics- Rochelle Gurstein turns to history to understand how we arrived at such a sorry destination. Hers is a tale of decline: The Victorians "we moderns" so routinelyd eridef or theirP uritanicalr epressivenessu nderstoodf ull well that certain things have to …


The 'Right To Die': On Drawing (And Erasing) Lines, Yale Kamisar Jan 1996

The 'Right To Die': On Drawing (And Erasing) Lines, Yale Kamisar

Articles

Until this year, no state or federal appellate court had ever held that there was a right to assisted suicide no matter how narrow the circumstances or stringent the conditions. In 1996, however, within the span of a single month, two federal courts of appeals so held; in an 8-3 majority of the Ninth Circuit (sitting en banc) in Compassion in Dying v. Washington and a three-judge panel of the Second Circuit in Quill v. Vacco. What heartened proponents of a right to physician-assisted suicide even more, and pleased those resistant to the idea even less, was that the two …


Surrogate Motherhood From The Perspective Of Family Law, Carl E. Schneider Jan 1990

Surrogate Motherhood From The Perspective Of Family Law, Carl E. Schneider

Articles

One of the things that I find most puzzling about the question of surrogate motherhood is how easily many people answer it. One of the things that I have most admired about today's comments is their tone of constraint and their sense of complexity. I myself am sympathetic to the argument that the unhappiness of infertile couples is profound and that surrogacy contracts offer them the hope of an equally profound happiness. And I am prepared to believe that many surrogate mothers perform their part of the bargain without grief and even with gratification. Yet these benefits of surrogacy are …


State-Interest Analysis In Fourteenth-Amendment "Privacy" Law: An Essay On The Constitutionalization Of Social Issues, Carl E. Schneider Jan 1988

State-Interest Analysis In Fourteenth-Amendment "Privacy" Law: An Essay On The Constitutionalization Of Social Issues, Carl E. Schneider

Articles

Asked to resolve a social issue, Americans today turn readily to rights and to the Constitution that is understood to embody them. Many "vice" issues have long been thought particularly apt for a rights analysis. A constitutional resolution of vice issues is therefore inevitably a possibility, and its wisdom is inevitably a question. In this essay, I want to address that question by investigating an area of the law that has been recently constitutionalized family law. Family law is an example worth studying because rights thinking has won a considerable prominence in it: The Constitution has been used to transform …


Privacy In Confucian And Taoist Thought, Christina B. Whitman Jan 1985

Privacy In Confucian And Taoist Thought, Christina B. Whitman

Book Chapters

Only three aspects of the broad concept "privacy" will be explored in this essay: privacy as providing a sphere for intimate personal relationships with family and friends, privacy as freedom from surveillance for purposes of gathering personal information, and privacy as freedom from interference by government or social controls. These concepts describe quite different concerns. They are often grouped together under the single term "privacy," but not without some strain... A comparison between a modern Western value and its counterpart, if any, in very early Confucian and Taoist belief is inevitably somewhat strained. But it serves a purpose. If nothing …


The Right Of Privacy At Common Law, Henry M. Bates Jan 1910

The Right Of Privacy At Common Law, Henry M. Bates

Articles

It is quite evident that the question as to whether there is a right of privacy at common law must be met by the courts in most of our states in the not distant future, unless indeed the right is created or declared by the legislatures.