Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Privacy Law (26)
- Constitutional Law (11)
- Internet Law (9)
- Fourth Amendment (6)
- Law and Society (6)
-
- Criminal Law (3)
- First Amendment (3)
- Judges (3)
- Law and Gender (3)
- Legal Remedies (3)
- Legislation (3)
- Science and Technology Law (3)
- Civil Law (2)
- Common Law (2)
- Computer Law (2)
- Consumer Protection Law (2)
- Criminal Procedure (2)
- Education (2)
- European Law (2)
- Fourteenth Amendment (2)
- Health Law and Policy (2)
- Intellectual Property Law (2)
- Jurisprudence (2)
- Labor and Employment Law (2)
- Supreme Court of the United States (2)
- Administrative Law (1)
- Arts and Humanities (1)
- Banking and Finance Law (1)
- Civil Rights and Discrimination (1)
- Institution
-
- Touro University Jacob D. Fuchsberg Law Center (5)
- Northwestern Pritzker School of Law (4)
- University of Washington School of Law (3)
- Brigham Young University (2)
- Duquesne University (2)
-
- Pepperdine University (2)
- Saint Louis University School of Law (2)
- St. Mary's University (2)
- The Catholic University of America, Columbus School of Law (2)
- University of Georgia School of Law (2)
- University of Massachusetts School of Law (2)
- Vanderbilt University Law School (2)
- William & Mary Law School (2)
- Chicago-Kent College of Law (1)
- Loyola Marymount University and Loyola Law School (1)
- Loyola University Chicago, School of Law (1)
- Marquette University Law School (1)
- Maurer School of Law: Indiana University (1)
- Mitchell Hamline School of Law (1)
- Notre Dame Law School (1)
- SJ Quinney College of Law, University of Utah (1)
- San Jose State University (1)
- Seattle University School of Law (1)
- St. John's University School of Law (1)
- U.S. Naval War College (1)
- United Arab Emirates University (1)
- University of Arkansas at Little Rock William H. Bowen School of Law (1)
- University of New Mexico (1)
- Publication
-
- Touro Law Review (5)
- Northwestern University Law Review (3)
- Washington Law Review (3)
- BYU Education & Law Journal (2)
- Duquesne Law Review (2)
-
- Journal of Intellectual Property Law (2)
- Saint Louis University Law Journal (2)
- St. Mary's Law Journal (2)
- University of Massachusetts Law Review (2)
- Vanderbilt Journal of Entertainment & Technology Law (2)
- William & Mary Bill of Rights Journal (2)
- Catholic University Journal of Law and Technology (1)
- Catholic University Law Review (1)
- Chicago-Kent Law Review (1)
- Cybaris® (1)
- Indiana Law Journal (1)
- International Law Studies (1)
- Journal of Legislation (1)
- Journal of the National Association of Administrative Law Judiciary (1)
- Loyola University Chicago Law Journal (1)
- Loyola of Los Angeles Law Review (1)
- Marquette Intellectual Property & Innovation Law Review (1)
- New Mexico Law Review (1)
- Northwestern Journal of Law & Social Policy (1)
- Pepperdine Law Review (1)
- Seattle Journal of Technology, Environmental & Innovation Law (1)
- Secrecy and Society (1)
- St. John's Law Review (1)
- UAEU Law Journal (1)
- University of Arkansas at Little Rock Law Review (1)
Articles 1 - 30 of 47
Full-Text Articles in Law
"A Novel And Controversial Technology." Artificial Face Recognition, Privacy Protection, And Algorithm Bias In Europe, Andrea Pin
William & Mary Bill of Rights Journal
R (Bridges) v. Chief Constable of South Wales Police's Court of Appeals ruling... showcases the variety and the thickness of the legal, ethical, and political considerations that lie underneath the deployment of [Artificial Face Recognition]-based police tools and its ramification within Europe and beyond. More broadly, the topic of "[f]acial recognition technologies provide[s] a useful case study of the complex and unpredictable ways that norms of procedural fairness, equality, and privacy interact when the state deploys machine-learning tools to draw inferences from otherwise unilluminating data." This Article uses Bridges as a proxy to sketch out the main legal issues …
Seeking A Safe Harbor In A Widening Sea: Unpacking The Schrems Saga And What It Means For Transatlantic Relations And Global Cybersecurity, Scott J. Shackelford
Seeking A Safe Harbor In A Widening Sea: Unpacking The Schrems Saga And What It Means For Transatlantic Relations And Global Cybersecurity, Scott J. Shackelford
William & Mary Bill of Rights Journal
The Article is structured as follows. Part I examines Schrems I (Schrems v. Data Protection Commissioner) and the fall of the Safe Harbor regime. Part II analyzes Schrems II (Data Protection Commissioner v. Facebook & Max Schrems) along with the rise and fall of Privacy Shield. Part III focuses on opportunities to bridge the data governance divide and present a united front to help ensure a free, open, interoperable, secure, and resilient vision for cyberspace.
This abstract has been adapted from the author's introduction.
You Are Not A Commodity: A More Efficient Approach To Commercial Privacy Rights, Benjamin T. Pardue
You Are Not A Commodity: A More Efficient Approach To Commercial Privacy Rights, Benjamin T. Pardue
Washington Law Review
United States common law provides four torts for privacy invasion: (1) disclosure of private facts, (2) intrusion upon seclusion, (3) placement of a person in a false light, and (4) appropriation of name or likeness. Appropriation of name or likeness occurs when a defendant commandeers the plaintiff’s recognizability, typically for a commercial benefit. Most states allow plaintiffs who establish liability to recover defendants’ profits as damages from the misappropriation under an “unjust enrichment” theory. By contrast, this Comment argues that such an award provides a windfall to plaintiffs and contributes to suboptimal social outcomes. These include overcompensating plaintiffs and incentivizing …
Deepfake Privacy: Attitudes And Regulation, Matthew B. Kugler, Carly Pace
Deepfake Privacy: Attitudes And Regulation, Matthew B. Kugler, Carly Pace
Northwestern University Law Review
Using only a series of images of a person’s face and publicly available software, it is now possible to insert the person’s likeness into a video and show them saying or doing almost anything. This “deepfake” technology has permitted an explosion of political satire and, especially, fake pornography. Several states have already passed laws regulating deepfakes, and more are poised to do so. This Article presents three novel empirical studies that assess public attitudes toward this new technology. In our main study, a representative sample of the U.S. adult population perceived nonconsensually created pornographic deepfake videos as extremely harmful and …
Alexa Hears With Her Little Ears—But Does She Have The Privilege?, Lauren Chlouber Howell
Alexa Hears With Her Little Ears—But Does She Have The Privilege?, Lauren Chlouber Howell
St. Mary's Law Journal
Abstract forthcoming.
Closing The Data Gap: Protecting Biometric Information Under The Biometric Information Privacy Act And The California Consumer Protection Act, Eva-Maria Ghelardi
Closing The Data Gap: Protecting Biometric Information Under The Biometric Information Privacy Act And The California Consumer Protection Act, Eva-Maria Ghelardi
St. John's Law Review
(Excerpt)
Between May and June of 2014, Stacy Rosenbach bought her son, Alexander, a Six Flags season pass online. She submitted Alexander’s personal information and read that Alexander would complete the sign-up process at the park. No details described what the sign-up process would entail.
After showing his online receipt at Six Flags, Alexander was brought to an office to provide the customary thumb scan. Alexander’s thumb scan, along with the season pass card, was required to permit him to enter the various rides. He was not given any information about how his thumb scan would be stored or used …
Pure Privacy, Jeffrey Bellin
Pure Privacy, Jeffrey Bellin
Northwestern University Law Review
In 1890, Samuel Warren and Louis Brandeis began a storied legal tradition of trying to conceptualize privacy. Since that time, privacy’s appeal has grown beyond those authors’ wildest expectations, but its essence remains elusive. One of the rare points of agreement in boisterous academic privacy debates is that there is no consensus on what privacy means.
The modern trend is to embrace the ambiguity. Unable to settle on boundaries, scholars welcome a broad array of interests into an expanding theoretical framework. As a result, privacy is invoked in debates about COVID-19 contact tracing, police body cameras, marriage equality, facial recognition, …
Comparative Limitations On Abortions: The United States Supreme Court V. The European Court Of Human Rights, Sunaya Padmanabhan
Comparative Limitations On Abortions: The United States Supreme Court V. The European Court Of Human Rights, Sunaya Padmanabhan
Northwestern Journal of Law & Social Policy
This Note compares the balancing tests implemented by the United States Supreme Court and the European Court of Human Rights to determine the legal status of abortion within their jurisdictions. This Note will argue that the Supreme Court’s balancing test better protects a woman’s legal path to an abortion because it A) limits states’ restrictions to specific categories and B) regulates the extent to which states can restrict a woman’s pre-viability abortion.
This Note will also examine the ways in which each court’s abortion jurisprudence substantively restricts a woman’s ability to obtain an abortion, even where legal avenues to the …
Liberty And Health, Frank Griffin
Liberty And Health, Frank Griffin
University of Arkansas at Little Rock Law Review
Liberty is the essence of human nature and is necessary for optimal health. During the COVID-19 pandemic, the government placed unprecedented restrictions on personal liberty in the name of public health, confining millions of Americans to their homes, forcing hundreds of thousands of businesses and parks to close, shuttering abortion clinics, heavily regulating churches, monitoring gatherings in private homes, restricting interstate travel, and shifting disease burdens onto protected populations. Personal liberty is sustenance for individual health. Medical principles of patient autonomy, patient privacy, and social justice are closely related to legal concepts of personal liberty, the liberty of constitutional privacy, …
Private Lives At Home And Public Lives In Court: Protecting The Privacy Of Federal Judges' Home Addresses, Hannah Elias Sbaity
Private Lives At Home And Public Lives In Court: Protecting The Privacy Of Federal Judges' Home Addresses, Hannah Elias Sbaity
Journal of Intellectual Property Law
Targeted murders of federal judges and their families at their private homes date back to May 29, 1979. Most recently, in July 2020, Judge Esther Salas’s only son, Daniel, was murdered and her husband near-fatally shot at their home. Individuals wishing to inflict such harm or death at federal judges’ homes have been able to do so because of federal judges’ publicly available home addresses. Because personally identifying information (PII) is defined differently from statute to statute, home addresses largely remain public information in most states and can be found in real estate records, data broker websites, social media platforms, …
A Deep Dive Into Technical Encryption Concepts To Better Understand Cybersecurity & Data Privacy Legal & Policy Issues, Anthony Volini
A Deep Dive Into Technical Encryption Concepts To Better Understand Cybersecurity & Data Privacy Legal & Policy Issues, Anthony Volini
Journal of Intellectual Property Law
Lawyers wishing to exercise a meaningful degree of leadership at the intersection of technology and the law could benefit greatly from a deep understanding of the use and application of encryption, considering it arises in so many legal scenarios. For example, in FTC v. Wyndham1 the defendant failed to implement nearly every conceivable cybersecurity control, including lack of encryption for stored data, resulting in multiple data breaches and a consequent FTC enforcement action for unfair and deceptive practices. Other examples of legal issues requiring use of encryption and other technology concepts include compliance with security requirements of GLBA & HIPAA, …
Privacy Vs. Transparency: Handling Protected Materials In Agency Rulemaking, Christopher S. Yoo, Kellen Mccoy
Privacy Vs. Transparency: Handling Protected Materials In Agency Rulemaking, Christopher S. Yoo, Kellen Mccoy
Indiana Law Journal
Agencies conducting informal rulemaking proceedings increasingly confront conflicting duties with respect to protected materials included in information submitted in public rulemaking dockets. They must reconcile the broad commitment to openness and transparency reflected in federal law with the duty to protect confidential business information (CBI) and personally identifiable information (PII) against improper disclosure.
This Article presents an analysis of how agencies can best balance these often countervailing considerations. Part I explores the statutory duties to disclose and withhold information submitted in public rulemaking dockets placed on agencies. It also examines judicial decisions and other legal interpretations regarding the proper way …
Perils Of The Reverse Silver Platter Under U.S. Border Patrol Operations, D. Anthony
Perils Of The Reverse Silver Platter Under U.S. Border Patrol Operations, D. Anthony
University of Massachusetts Law Review
In the face of expanding U.S. Border Patrol operations across the country, that agency often acquires evidence during its searches that is unrelated to immigration or other federal crimes but may involve state crimes. States are then faced with the question of whether to accept such evidence for state prosecutions when it was lawfully obtained by federal agents consistent with federal law but in violation of the state’s own search and seizure provisions. Sometimes referred to as “reverse silver platter” evidence, states have come to widely varying conclusions as to the admissibility of federally obtained evidence that would clearly have …
Biometric Data Regulation And The Right Of Publicity: A Path To Regaining Autonomy Over Our Commodified Identity, Lisa Raimondi
Biometric Data Regulation And The Right Of Publicity: A Path To Regaining Autonomy Over Our Commodified Identity, Lisa Raimondi
University of Massachusetts Law Review
This Note explores how a right of publicity action might be used to address present day concerns regarding biometric data ownership rights where an individual’s likeness can essentially be bought and sold. As social networking and use of the internet has grown, so has the opportunity for people to engage with others and share their lives. However, that opportunity also comes with risk. More and more, people are required to accept the terms of use and privacy policies detailing how their biometric data will be collected and stored if they want to download and use certain technological applications. Most of …
Freedom Of Expression V. Social Responsibility On The Internet: Vivi Down Association V. Google, Raphael Cohen-Almagor, Natalina Stamile
Freedom Of Expression V. Social Responsibility On The Internet: Vivi Down Association V. Google, Raphael Cohen-Almagor, Natalina Stamile
Seattle Journal of Technology, Environmental & Innovation Law
The aim of the article is to reflect on Google’s social responsibility by analyzing a milestone court decision, Vivi Down Association v. Google, that took place in Italy, involving the posting of an offensive video clip on Google Video. It was a landmark decision because it refuted the assertion that the Internet knows no boundaries, that the Internet transcends national laws due to its international nature, and that Internet intermediaries, such as Google, are above the law. This case shows that when the legal authorities of a given country decide to assert their jurisdiction, Internet companies need to abide by …
Discussing Privacy In Sec Subpoena Practice After Carpenter V. United States, William A. Ballentine
Discussing Privacy In Sec Subpoena Practice After Carpenter V. United States, William A. Ballentine
Chicago-Kent Law Review
No abstract provided.
The Fourth Amendment Stripped Bare: Substantiating Prisoners' Reasonable Right To Bodily Privacy, Meher Babbar
The Fourth Amendment Stripped Bare: Substantiating Prisoners' Reasonable Right To Bodily Privacy, Meher Babbar
Northwestern University Law Review
Prisoners’ rights to bodily privacy under the Fourth Amendment are limited, allowing detention officials to strip-search them for contraband. The extent to which the Fourth Amendment protects prisoners, however, is uncertain. Questions regarding whether strip searches require reasonable suspicion and the manner in which officials may conduct strip searches have troubled courts for decades. In the absence of clear guidance from the Supreme Court, courts have reached inconsistent conclusions, imperiling the human rights and dignity of prisoners. This Note argues that courts should define and apply prisoners’ rights to bodily privacy with reference to international human-rights law, specifically the United …
Bitcoin Searches And Preserving The Third-Party Doctrine, Christine A. Cortez
Bitcoin Searches And Preserving The Third-Party Doctrine, Christine A. Cortez
St. Mary's Law Journal
Abstract forthcoming.
Cloudy With A Chance Of Government Intrusion: The Third-Party Doctrine In The 21st Century, Steven Arango
Cloudy With A Chance Of Government Intrusion: The Third-Party Doctrine In The 21st Century, Steven Arango
Catholic University Law Review
Technology may be created by humans, but we are dependent on it. Look around you: what technology is near you as you read this abstract? An iPhone? A laptop? Perhaps even an Amazon Echo. What do all these devices have in common? They store data in the cloud. And this data can contain some of our most sensitive information, such as business records or medical documents.
Even if you manage this cloud storage account, the government may be able to search your data without a warrant. Federal law provides little protection for cloud stored data. And the Fourth Amendment may …
Protecting The Privacy Of The Worker In Light Of The Development Of Modern Means Of Communication: A Comparative Study Of The Uae And French Laws, Pierre Mallet
UAEU Law Journal
The concept of privacy has evolved a lot due to the tremendous scientific development that humanity has achieved in recent decades. The massive use of computers and the Internet in all areas has given rise to new aspects of privacy. This concept now concerns calls, personal photos, recordings, the use of social networks and personal conversations. Through this research, we want to inform the reader about the rules governing the protection of the privacy of an employee in the field of computer science in the light of the legal texts applied in UAE laws, or at least clarify the positions …
New Technology And The Right To Privacy: Do E-Scooters Implicate The Fourth Amendment?, Alexander P. Carroll
New Technology And The Right To Privacy: Do E-Scooters Implicate The Fourth Amendment?, Alexander P. Carroll
Journal of the National Association of Administrative Law Judiciary
The Fourth Amendment protects individual’s right to privacy from unwarranted searches and seizures, but the analysis for when the Fourth Amendment applies has become more complicated as new technology is developed. E-scooters are a new piece of technology which may implicate the Fourth Amendment. Cities across the country are beginning to require the mobility companies which provide e-scooter services to turn over location data in order to receive an operating permit. This article first provides a background of the Fourth Amendment, then provides details regarding the new city regulations. The article includes a discussion of the privacy concerns as well …
Hybrid Federalism And The Employee Right To Disconnect, Paul M. Secunda
Hybrid Federalism And The Employee Right To Disconnect, Paul M. Secunda
Pepperdine Law Review
The federal Occupational Safety and Health Administration (OSHA) administers specific workplace and health standards that generally and expressly preempt the entire field of workplace safety and health law. However, where such federal OSHA standards do not exist or states have developed their own approved OSHA plans, OSHA does not merely set a regulatory floor either. A type of “hybrid federalism” has been established, meaning a strong federal-based field preemption approach to labor and employment law issues, but tied to a conflict preemption approach. Applying this hybrid preemption approach to the employee right to disconnect problem provides the best opportunity to …
Revising Reasonableness In The Cloud, Ian Walsh
Revising Reasonableness In The Cloud, Ian Walsh
Washington Law Review
Save everything—just in case––and search for it later. This is a modern mantra fueled by the ubiquity of smartphones, laptops, tablets, and free or low-cost data storage that leads users to store massive amounts of data in the cloud. But when users trust third-party cloud storage providers with private communications, they also surrender Fourth Amendment constitutional certainty. Existing statutory safeguards for these communications are lower than Fourth Amendment warrant and probable cause standards; this permits the government to seize large quantities of users’ private communications stored in the cloud with only minimal justification. Due to the revealing nature of such …
Hacks, Leaks, And Data Dumps: The Right To Publish Illegally Acquired Information Twenty Years After Bartnicki V. Vopper, Erik Ugland, Christina Mazzeo
Hacks, Leaks, And Data Dumps: The Right To Publish Illegally Acquired Information Twenty Years After Bartnicki V. Vopper, Erik Ugland, Christina Mazzeo
Washington Law Review
This Article addresses a fluid and increasingly salient category of cases involving the First Amendment right to publish information that was hacked, stolen, or illegally leaked by someone else. Twenty years ago, in Bartnicki v. Vopper, the Supreme Court appeared to give broad constitutional cover to journalists and other publishers in these situations, but Justice Stevens’s inexact opinion for the Court and Justice Breyer’s muddling concurrence left the boundaries unclear. The Bartnicki framework is now implicated in dozens of new cases— from the extradition and prosecution of Julian Assange, to Donald Trump’s threatened suit of The New York Times …
Protection Of Data In Armed Conflict, Robin Geiss, Henning Lahmann
Protection Of Data In Armed Conflict, Robin Geiss, Henning Lahmann
International Law Studies
This article presents a novel way to conceptualize the protection of data in situations of armed conflict. Although the question of the targeting of data through adversarial military cyber operations and its implications for the qualification of such conduct under International Humanitarian Law has been on scholars’ and states’ radar for the last few years, there remain a number of misunderstandings as to how to think about the notion of “data.” Based on a number of fictional scenarios, the article clarifies the pertinent terminology and makes some expedient distinctions between various types of data. It then analyzes how existing international …
Whose Rights Matter More—Police Privacy Or A Defendant’S Right To A Fair Trial?, Laurie L. Levenson
Whose Rights Matter More—Police Privacy Or A Defendant’S Right To A Fair Trial?, Laurie L. Levenson
Loyola of Los Angeles Law Review
The function of the prosecutor under the federal Constitution is not to tack as many skins of victims as possible to the wall. His function is to vindicate the right of the people as expressed in the laws and give those accused of crime a fair trial.
– William O. Douglas
Concealing In The Public Interest, Or Why We Must Teach Secrecy, Susan Maret
Concealing In The Public Interest, Or Why We Must Teach Secrecy, Susan Maret
Secrecy and Society
Secrecy as the intentional or unintentional concealment of information is the subject of investigation within the humanities, social sciences, journalism, law and legal studies. However, the subject it is not widely taught as a distinct social problem within higher education. In this article, I report personal experience with developing and teaching a graduate level course on a particular type of secrecy, government secrecy, at the School of Information, San Jose State University. This article includes discussion on selecting course materials, creating assignments, and navigating controversial histories. This article also sets the stage to this special issue of Secrecy and Society …
"Times They Are A Changin'" - Can The Ad Tech Industry Survive In A Privacy Conscious World?, Meaghan Donahue
"Times They Are A Changin'" - Can The Ad Tech Industry Survive In A Privacy Conscious World?, Meaghan Donahue
Catholic University Journal of Law and Technology
The "ad tech ecosystem" is a web of interconnected technologies and intermediaries that facilitate targeted advertising based on consumer data, and supports the free internet while providing users with promotional content relevant to their interests. However, in recent years, lawmakers and consumer advocates have highlighted the dangers associated with the unregulated use of consumer data for advertising purposes, prompting a flurry of legislative action at both the state and federal levels. These various laws and proposed bills impose new challenges on the ad tech industry--threatening to fundamentally change the way the business operates. However, through innovation and creative thinking, the …
Too Big To Protect: A Dodd-Frank Framework For Protecting 21st Century American Consumer Privacy Rights, Stanley A. Marciniak Iii
Too Big To Protect: A Dodd-Frank Framework For Protecting 21st Century American Consumer Privacy Rights, Stanley A. Marciniak Iii
Duquesne Law Review
No abstract provided.
Regulating Data Breaches: A Data Superfund Statute, Kyle Mckibbin
Regulating Data Breaches: A Data Superfund Statute, Kyle Mckibbin
Vanderbilt Journal of Entertainment & Technology Law
Collecting and processing large amounts of personal data has become a fundamental feature of the modern economy. Personal data, combined with good data analytics, are valuable to businesses as they can provide highly detailed information about individual preferences and behaviors. This data collection can also be valuable to the consumer as it generates innovative products and digital platforms. The era of big data promises great rewards, but it is not without its costs. Data breaches, or the release of personal data into unwanted hands, are pervasive and increasingly massive in scale. Despite the personal privacy harm caused by data breaches, …