Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Privacy (10)
- Big Data (3)
- Facebook (3)
- HIPAA (3)
- Privacy Rights (3)
-
- Cybersecurity (2)
- Data (2)
- Dignity (2)
- Drones (2)
- FAA (2)
- FTC (2)
- Federal Aviation Administration (2)
- Federal Trade Commission (2)
- Federalism (2)
- First Amendment (2)
- Health Insurance Portability and Accountability Act (2)
- Instagram (2)
- Jurisprudence (2)
- Privacy Law (2)
- Right To Be Forgotten (2)
- Technology (2)
- Trust (2)
- United States (2)
- A Comprehensive Empirical Study (1)
- A Model for Disclosure (1)
- AIA (1)
- ALJ (1)
- Accountability Waivers (1)
- Administrative Law Judge (1)
- Adoption (1)
Articles 1 - 24 of 24
Full-Text Articles in Law
Layered Fiduciaries In The Information Age, Zhaoyi Li
Layered Fiduciaries In The Information Age, Zhaoyi Li
Indiana Law Journal
Technology companies such as Facebook have long been criticized for abusing customers’ personal information and monetizing user data in a manner contrary to customer expectations. Some commentators suggest fiduciary law could be used to restrict how these companies use their customers’ data.1 Under this framework, a new member of the fiduciary family called the “information fiduciary” was born. The concept of an information fiduciary is that a company providing network services to “collect, analyze, use, sell, and distribute personal information” owes customers and end-users a fiduciary duty to use the collected data to promote their interests, thereby assuming fiduciary liability …
Big Data, Big Gap: Working Towards A Hipaa Framework That Covers Big Data, Ryan Mueller
Big Data, Big Gap: Working Towards A Hipaa Framework That Covers Big Data, Ryan Mueller
Indiana Law Journal
One lasting impact of the Health Insurance Portability and Accountability Act (HIPAA) is the privacy protections it provides for our sensitive health information. In the era of Big Data, however, much of our health information exists outside the traditional doctor-patient dynamic. From wearable technology, to mobile applications, to social media and internet browsing, Big Data organizations collect swaths of data that shed light on sensitive health information. Big Data organizations largely fall outside of HIPAA’s current framework because of the stringent requirements for when the HIPAA protections apply, namely that the data must be held by a covered entity, and …
The Law Of Employee Data: Privacy, Property, Governance, Matthew T. Bodie
The Law Of Employee Data: Privacy, Property, Governance, Matthew T. Bodie
Indiana Law Journal
The availability of data related to the employment relationship has ballooned into an unruly mass of performance metrics, personal characteristics, biometric recordings, and creative output. The law governing this collection of information has been awkwardly split between privacy regulations and intellectual property rights, with employees generally losing on both ends. This Article rejects a binary approach that either carves out private spaces ineffectually or renders data into isolated pieces of ownership. Instead, the law should implement a hybrid system that provides workers with continuing input and control without blocking efforts at joint production. In addition, employers should have fiduciary responsibilities …
Illusory Privacy, Thomas Haley
Illusory Privacy, Thomas Haley
Indiana Law Journal
For decades, regulators, consumer advocates, and privacy theorists have grappled with one of privacy’s most important questions: how to protect private information that consumers unwittingly give away with the click of an “I accept” button. Reform efforts remain mired in a morass of text, focusing on the increasing volume and complexity of firms’ terms of service and privacy policies. This Article moves beyond such existing approaches. By analyzing terms of service and privacy policies from hundreds of top websites—which this Article calls “platform terms”—this Article demonstrates that the prevailing “notice and consent” paradigm of privacy regulation cannot provide meaningful protection. …
The Oslo Accords: A Modern-Day Story Of Occupation Told Through Violations Of The Right To Freedom Of Privacy, Catherine Demetrovich
The Oslo Accords: A Modern-Day Story Of Occupation Told Through Violations Of The Right To Freedom Of Privacy, Catherine Demetrovich
Indiana Law Journal
The Israeli-Palestinian conflict began in the early 1900s when the disputed land, what is now the West Bank and the Gaza Strip, fell under British rule. After the Six- Day War in 1967, Israel took control of the West Bank, Golan Heights, and the Gaza Strip. Since then, tensions between Israel and Palestine have continued to grow. This Note explores a modern-day occupation question: Israel’s control over Palestine’s information and communication technology (ICT) sector. Along with privacy and human rights violations, Israel’s control is in direct violation of the Oslo Accords— guaranteeing Palestinians limited self-governance in Gaza and the West …
Privacy Vs. Transparency: Handling Protected Materials In Agency Rulemaking, Christopher S. Yoo, Kellen Mccoy
Privacy Vs. Transparency: Handling Protected Materials In Agency Rulemaking, Christopher S. Yoo, Kellen Mccoy
Indiana Law Journal
Agencies conducting informal rulemaking proceedings increasingly confront conflicting duties with respect to protected materials included in information submitted in public rulemaking dockets. They must reconcile the broad commitment to openness and transparency reflected in federal law with the duty to protect confidential business information (CBI) and personally identifiable information (PII) against improper disclosure.
This Article presents an analysis of how agencies can best balance these often countervailing considerations. Part I explores the statutory duties to disclose and withhold information submitted in public rulemaking dockets placed on agencies. It also examines judicial decisions and other legal interpretations regarding the proper way …
What's The Harm? Federalism, The Separation Of Powers, And Standing In Data Breach Litigation, Grayson Wells
What's The Harm? Federalism, The Separation Of Powers, And Standing In Data Breach Litigation, Grayson Wells
Indiana Law Journal
This Comment will argue that the Supreme Court should analyze standing in data breach litigation under a standard that is deferential to state statutory and common law. Specifically, federal standing analysis should look to state law when determining whether an injury is concrete such that the injury-in-fact requirement is met. Some argue that allowing more data breach cases to proceed to the merits could lead to an explosion of successful litigation and settlements, burdening the federal courts and causing economic losses for the breached businesses. These concerns may be valid. But if state law provides a remedy to the harm …
Maximizing The Value Of America’S Newest Resource, Low- Altitude Airspace: An Economic Analysis Of Aerial Trespass And Drones, Tyler Watson
Maximizing The Value Of America’S Newest Resource, Low- Altitude Airspace: An Economic Analysis Of Aerial Trespass And Drones, Tyler Watson
Indiana Law Journal
Recognizing that tort law is a unique area of law that was judicially created by rational human beings with an innate sense of economic justice, this Note seeks to apply positive economic theory—derived from ex post analyses of tort cases—to an ex ante analysis to predict how and to what extent the existing and proposed aerial trespass rules will further economic efficiency in the context of drones and airspace rights. Part I will provide (1) an overview of the Federal Aviation Administration’s (FAA) current regulatory framework and the development of the common law aerial trespass doctrine and (2) an overview …
The Fourth Amendment At Home, Thomas P. Crocker
The Fourth Amendment At Home, Thomas P. Crocker
Indiana Law Journal
A refuge, a domain of personal privacy, and the seat of familial life, the home holds a special place in Fourth Amendment jurisprudence. Supreme Court opinions are replete with statements affirming the special status of the home. Fourth Amendment text places special emphasis on securing protections for the home in addition to persons, papers, and effects against unwarranted government intrusion. Beyond the Fourth Amendment, the home has a unique place within constitutional structure. The home receives privacy protections in addition to sheltering other constitutional values protected by the Due Process Clause and the First Amendment. For example, under the Due …
Sharenting And The (Potential) Right To Be Forgotten, Keltie Haley
Sharenting And The (Potential) Right To Be Forgotten, Keltie Haley
Indiana Law Journal
Part I of this Note serves as an evaluation of parental use of social media and
further seeks to draw attention to the social and developmental impact parental
oversharing can have on children. Part II examines the tension between parents’
constitutional rights to direct the upbringing of their children, as well as their First
Amendment interest in online expression, and their children’s interest in personal
data security and privacy. Part III provides an overview of the European Union’s
right to be forgotten framework in the sharenting context and considers the
plausibility of implementing such a framework in the United States. …
Zoning For Families, Sara C. Bronin
Zoning For Families, Sara C. Bronin
Indiana Law Journal
Is a group of eight unrelated adults and three children living together and sharing meals, household expenses, and responsibilities—and holding themselves out to the world to have long-term commitments to each other—a family? Not according to most zoning codes—including that of Hartford, Connecticut, where the preceding scenario presented itself a few years ago. Zoning, which is the local regulation of land use, almost always defines family, limiting those who may live in a dwelling unit to those who satisfy the zoning code’s definition. Often times, this definition is drafted in a way that excludes many modern living arrangements and preferences. …
Boilerplate Indignity, Erik Encarnacion
Boilerplate Indignity, Erik Encarnacion
Indiana Law Journal
Commentators have long tried to sound the alarm about boilerplate contracts, pointing out threats ranging from the loss of privacy rights to the erosion of public law and democratic self-governance. This Article argues that this list of concerns misses something important: that imposing certain boilerplate terms on individuals is incompatible with their dignity. After explaining and defending the conception of dignity presupposed here, this Article shows how boilerplate accountability waivers—like arbitration clauses—prevent people from accessing the distinctive dignity-vindicating role of courts and degrade their status as legal persons. And because governments may legitimately protect dignity interests, proposed reforms like the …
The Federalism Challenges Of Protecting Medical Privacy In Workers' Compensation, Ani B. Satz
The Federalism Challenges Of Protecting Medical Privacy In Workers' Compensation, Ani B. Satz
Indiana Law Journal
Under current law, injured workers face a Hobson’s choice: They may file for workers’ compensation or maintain their medical privacy. The reason for this is that § 164.512(l) of the Health Insurance Portability and Accountability Act’s Privacy Rule (HPR) is widely misinterpreted by courts and legislatures as a wholesale waiver of privacy protections for injured workers. Section 164.512(l) excludes workers’ compensation from federal privacy protections that may frustrate the efficient administration of workers’ compensation claims. As the history and intent behind the HPR indicate, § 164.512(l) is premised on the assumption that states will protect workers’ privacy by creating and …
Drone Invasion: Unmanned Aerial Vehicles And The Right To Privacy, Rebecca L. Scharf
Drone Invasion: Unmanned Aerial Vehicles And The Right To Privacy, Rebecca L. Scharf
Indiana Law Journal
Since the birth of the concept of a legally recognized right to privacy in Samuel D. Warren and Louis D. Brandeis’ influential 1890 law review article, “The Right to Privacy,” common law—with the aid of influential scholars—has massaged the concept of privacy torts into actionable claims. But now, one of the most innovative technological advancements in recent years, the unmanned aerial vehicle, or drone, has created difficult challenges for plaintiffs and courts navigating common law privacy tort claims.
This Article explores the challenges of prosecution of the specific privacy tort of intrusion upon seclusion involving nongovernmental use of drone technology. …
Privacy Remedies, Lauren H. Scholz
Privacy Remedies, Lauren H. Scholz
Indiana Law Journal
When consumers sue companies for privacy-intrusive practices, they are often unsuccessful. Many cases fail in federal court at the motion to dismiss phase because the plaintiff has not shown the privacy infringement has caused her concrete harm. This is a symptom of a broader issue: the failure of courts and commentators to describe the relationship between privacy rights and privacy remedies.
This Article contends that restitution is the normal measure of privacy remedies. Restitution measures relief by economic gain to the defendant. If a plaintiff can show the likely ability to recover in restitution, that should be sufficient to pass …
"You Have The Data"...The Writ Of Habeas Data And Other Data Protection Rights: Is The United States Falling Behind?, Sarah L. Lode
"You Have The Data"...The Writ Of Habeas Data And Other Data Protection Rights: Is The United States Falling Behind?, Sarah L. Lode
Indiana Law Journal
In Part I of this Note, I will discuss the writ of habeas data that has been developed primarily, but not exclusively, in Latin American countries. I will discuss the intricacies of the writ, how it evolved, and how it is applied today. Using Argentina as an example, I will discuss how the writ would be used by an Argentine citizen to protect her personal data. Part II summarizes the previously employed data protection scheme in the European Union, the Data Protection Directive (“the Directive”), and will also discuss the new EU data protection regulation, the General Data Protection Regulation …
Data Protection In An Increasingly Globalized World, Nicholas F. Palmieri Iii
Data Protection In An Increasingly Globalized World, Nicholas F. Palmieri Iii
Indiana Law Journal
With the rise of the internet in recent decades, it has become increasingly easy for various enterprises—including retailers, advertising agencies, and service providers—to acquire, use, and even share the personal details of their users. Such a trend is unlikely to decrease in the coming years; in fact, internet usage is only likely to increase as more and more people gain access to the internet. In the wakeof recent data breaches, including the now infamous breach of Equifax as well as the scandal involving Facebook and Cambridge Analytica, people are even more aware of the need for (and the risk of …
Trust: A Model For Disclosure In Patent Law, Ari Ezra Waldman
Trust: A Model For Disclosure In Patent Law, Ari Ezra Waldman
Indiana Law Journal
How to draw the line between public and private is a foundational, first-principles question of privacy law, but the answer has implications for intellectual property, as well. This project is one in a series of papers about first-person disclosures of information in the privacy and intellectual property law contexts, and it defines the boundary between public and nonpublic information through the lens of social science —namely, principles of trust.
Patent law’s public use bar confronts the question of whether legal protection should extend to information previously disclosed to a small group of people. I present evidence that shows that current …
The Two Faces Of The Foreign Intelligence Surveillance Court, Emily Berman
The Two Faces Of The Foreign Intelligence Surveillance Court, Emily Berman
Indiana Law Journal
When former National Security Agency contractor Edward Snowden leaked a massive trove of information about secret intelligence-collection programs implemented under the Foreign Intelligence Surveillance Act in the summer of 2013, U.S. surveillance activities were thrust to the forefront of public debate. This debate included the question of whether and how to reform the Foreign Intelligence Surveillance Court (“FISA Court”), the statutorily created secret court that reviews government applications to conduct surveillance in the United States. This discussion, however, has underemphasized a critical feature of the way the FISA Court works. As this Article will show, since the terrorist attacks of …
The Right To Attention, Jasper L. Tran
The Right To Attention, Jasper L. Tran
Indiana Law Journal
What marketing, contracts, and healthcare—specifically informed consent and mandatory ultrasounds—have in common is the right to attention from the information receiver. However, scholarship most often focuses on the communicator’s perspective (e.g., how much information the communicator discloses) or on the information itself, but surprisingly, not much on the receiver’s perspective.
This dearth of scholarship from the information receiver’s perspective is problematic, because the information receiver is often the “little guy” in the conversation. We own and are entitled to our attention because attention is a property right and part of our individual dignity. Yet advertisement companies and scam artists freely …
A Comprehensive Empirical Study Of Data Privacy, Trust, And Consumer Autonomy, Jay P. Kesan, Carol M. Hayes, Masooda N. Bashir
A Comprehensive Empirical Study Of Data Privacy, Trust, And Consumer Autonomy, Jay P. Kesan, Carol M. Hayes, Masooda N. Bashir
Indiana Law Journal
Modern society is driven by data. Data storage is practically unlimited with today’s technology, and analytical tools make it easy to find patterns and make predictions in a way that is very useful for private businesses and governments. These uses of digital data can raise considerable privacy issues that are of great concern to consumers. In this Article, we present and analyze the results of an extensive survey that we conducted to explore what people know, what people do, and what people want when it comes to privacy online.
Our survey is the first comprehensive examination of the intersection of …
Furtive Encryption: Power, Trusts, And The Constitutional Cost Of Collective Surveillance, Jeffrey L. Vagle
Furtive Encryption: Power, Trusts, And The Constitutional Cost Of Collective Surveillance, Jeffrey L. Vagle
Indiana Law Journal
Recent revelations of heretofore secret U.S. government surveillance programs have sparked national conversations about their constitutionality and the delicate balance between security and civil liberties in a constitutional democracy. Among the revealed policies asserted by the National Security Agency (NSA) is a provision found in the “minimization procedures” required under section 702 of the Foreign Intelligence Surveillance Act of 1978. This provision allows the NSA to collect and keep indefinitely any encrypted information collected from domestic communications—including the communications of U.S. citizens. That is, according to the U.S. government, the mere fact that a U.S. citizen has encrypted her electronic …
Reviving Implied Confidentiality, Woodrow Hartzog
Reviving Implied Confidentiality, Woodrow Hartzog
Indiana Law Journal
The law of online relationships has a significant flaw—it regularly fails to account for the possibility of an implied confidence. The established doctrine of implied confidentiality is, without explanation, almost entirely absent from online jurisprudence in environments where it has traditionally been applied offline, such as with sensitive data sets and intimate social interactions.
Courts’ abandonment of implied confidentiality in online environments should have been foreseen. The concept has not been developed enough to be consistently applied in environments such as the Internet that lack obvious physical or contextual cues of confidence. This absence is significant because implied confidentiality could …
The Polysemy Of Privacy, Ronald J. Krotoszynski Jr.
The Polysemy Of Privacy, Ronald J. Krotoszynski Jr.
Indiana Law Journal
“The Polysemy of Privacy” considers the highly protean nature of the concept of “privacy,” which extends to myriad disparate legal interests, including nondisclosure, generalized autonomy interests, and even human dignity. For a concept of such central importance to many systems of protecting fundamental rights, its precise contours are surprisingly ill defined. This lack of determinate meaning is not limited to the concept of privacy in the United States; virtually all legal systems that utilize privacy (or its first cousin, “dignity”) have difficulty reducing the concept into specific, carefully delineated legal interests. In some respects, privacy means everything—and nothing—at the same …