Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Journal

2024

Privacy

Discipline
Institution
Publication

Articles 1 - 19 of 19

Full-Text Articles in Law

Privacy’S Commodification And The Limits Of Antitrust, Jeffrey L. Vagle May 2024

Privacy’S Commodification And The Limits Of Antitrust, Jeffrey L. Vagle

Arkansas Law Review

This Article argues that the buying and selling of personal data forms what Debra Satz calls a “noxious market,” and, thus, any regulation of information privacy should not accept or depend upon its commodification but should stand on its own. This Article proceeds in three parts. Part I first lays out the history and effects of data commodification, arguing that the market created by this commodification is noxious and undesirable. Part II examines the renewal of antitrust’s purpose as a regulatory tool, especially in the context of its use in the regulation of large technology firms. Finally, Part III argues …


Implementing Information Fiduciaries, Samuel E. Marticke May 2024

Implementing Information Fiduciaries, Samuel E. Marticke

Georgia State University Law Review

This Note discusses the information fiduciary model, proposed by Jack Balkin, where fiduciary duties would be imposed on data collectors and analyzes how such a model could come to pass in the United States.


Machine Speech: Towards A Unified Doctrine Of Attribution And Control, Brian Sites May 2024

Machine Speech: Towards A Unified Doctrine Of Attribution And Control, Brian Sites

University of Miami Law Review

Like many courts across the country in 2023, courts in the Eleventh Circuit were met with novel claims challenging ChatGPT and other artificial intelligence tools. These cases raise common questions: How should courts treat the speech of machines? When a machine generates allegedly defamatory material, who is the speaker—mortal or machine? When a machine generates expressive creations, who is the artist, and does that shape copyright eligibility? When a machine makes assertions about reality through lab analyses and other forensic reports, who is the accuser, and how does the answer impact a defendant’s rights at trial? Should those answers stem …


Legal Uncertainty In Virtual Worlds And Digital Goods: Do The Same Laws Apply?, Alanna Sadler May 2024

Legal Uncertainty In Virtual Worlds And Digital Goods: Do The Same Laws Apply?, Alanna Sadler

University of Miami Business Law Review

The growth of virtual worlds and digital goods will force US courts to examine whether traditional laws are sufficient to protect consumers. To do so requires judges and legislative officials to possess a deep understanding of concepts that are everchanging. Many aspects of virtual worlds, such as the metaverse(s), are driven by web3 technology, the technology responsible for the NFT and cryptocurrency craze of recent years. It is impossible to ascertain the impact of virtual worlds on daily life, however, companies must nevertheless prepare for the shift toward virtual spaces and digital goods. There is greater skepticism regarding the utility …


Privacy Or Safety? The Use Of Cameras To Combat Special Ed Abuse, Sarah M. Benites May 2024

Privacy Or Safety? The Use Of Cameras To Combat Special Ed Abuse, Sarah M. Benites

University of Massachusetts Law Review

Self-contained classroom students face abuse from educators at disproportionate rates compared to general education students. To combat the abuse, several jurisdictions, including Massachusetts, have proposed or enacted bills enabling cameras to be placed in self-contained classrooms. This has sparked privacy concerns, particularly regarding whether the usage would amount to an infringement on the Fourth Amendment rights of students and educators. This note argues that surveillance is an ineffective deterrent to prevent violent and abusive behavior and should not justify bypassing potential privacy and constitutional violations. It outlines the relevant case law regarding students and teachers and apply these standards to …


The Detention Of Immigration Policy: How States Are Commandeering Dhs Enforcement Guidelines, Brianna Riguera May 2024

The Detention Of Immigration Policy: How States Are Commandeering Dhs Enforcement Guidelines, Brianna Riguera

University of Miami Inter-American Law Review

In 2021, the Department of Homeland Security issued immigration guidelines that de-emphasized detention and removal of non-citizens who, aside from being undocumented, are otherwise contributing members of communities across the United States. However, Arizona, Montana, Ohio, Texas, and Louisiana challenged these guidelines, launching a nuanced legal dispute that concerned states standing under Article III, prosecutorial discretion, and nationwide preliminary injunctions. In United States v. Texas, the Court ruled 8-1 that the states lacked standing and reversed the Fifth Circuit’s nationwide injunction, but the majority opinion failed to address the other legal issues that are pressing on a rife debate about …


The Post-Dobbs Reality: Privacy Expectations For Period-Tracking Apps In Criminal Abortion Prosecutions, Sophie L. Nelson Apr 2024

The Post-Dobbs Reality: Privacy Expectations For Period-Tracking Apps In Criminal Abortion Prosecutions, Sophie L. Nelson

Pepperdine Law Review

The Supreme Court’s decision to overturn Roe v. Wade and Planned Parenthood v. Casey in June 2022 was met with waves of both support and criticism throughout the United States. Several states immediately implemented or began drafting trigger laws that criminalize seeking and providing an abortion. These laws prompted several period-tracking app companies to encrypt their users’ data to make it more difficult for the government to access period- and pregnancy-related information for criminal investigations. This Comment explores whether the Fourth Amendment and U.S. privacy statutes protect users of period-tracking apps from government surveillance. More specifically, this Comment argues that …


Personal Data And Vaccination Hesitancy: Covid-19’S Lessons For Public Health Federalism, Charles D. Curran Apr 2024

Personal Data And Vaccination Hesitancy: Covid-19’S Lessons For Public Health Federalism, Charles D. Curran

Catholic University Law Review

During the COVID-19 vaccination campaign, the federal government adopted a more centralized approach to the collection of public health data. Although the states previously had controlled the storage of vaccination information, the federal government’s Operation Warp Speed plan required the reporting of recipients’ personal information on the grounds that it was needed to monitor the safety of novel vaccines and ensure correct administration of their multi-dose regimens.

Over the course of the pandemic response, this more centralized federal approach to data collection added a new dimension to pre-existing vaccination hesitancy. Requirements that recipients furnish individual information deterred vaccination among undocumented …


Authentication Of Cybernetic Avatars And Legal System Challenges; With A View To The Trial Concept Of New Dimensional Domain Jurisprudence (Ai, Robot, And Avatar Law), Fumio Shimpo Mar 2024

Authentication Of Cybernetic Avatars And Legal System Challenges; With A View To The Trial Concept Of New Dimensional Domain Jurisprudence (Ai, Robot, And Avatar Law), Fumio Shimpo

Japanese Society and Culture

This article aims to illustrate the basis for the development of authentication, which will be the foundation of future cybernetic-avatar (CA) infrastructures, enabling the safe and secure use of CA’s. This will be realised by the authentication of CA operators (User Authentication Technology), identification and authentication of CA’s (CA Authentication), and ensuring connectivity and existence between operators (User Entities) and the CA’s themselves (CA Notarisation). An ELSI (Ethical, Legal, Social Implications) research platform will be established, to develop a new dimension of the legal field, that is, AI, Robot, and Avatar Law to solve the social issues and realise an …


Speaking Back To Sexual Privacy Invasions, Brenda Dvoskin Mar 2024

Speaking Back To Sexual Privacy Invasions, Brenda Dvoskin

Washington Law Review

Many big players in the internet ecosystem do not like hosting sexual expression. They often justify these bans as a protection of sexual privacy. For example, Meta states that it removes sexual imagery to prevent the nonconsensual distribution of sexual images. In response, this Article argues that banning digital sexual expression is counterproductive if the aim is to alleviate the harms inflicted by sexual privacy losses.

Contemporary sexual privacy theory, however, lacks analytical tools to explain why nudity bans harm the interests they intend to protect. This Article aims at building those tools. The main contribution is an invitation to …


Redefining The Injury-In-Fact: Treating Personally Identifying Information As Bailed Property, Austin Headrick Jan 2024

Redefining The Injury-In-Fact: Treating Personally Identifying Information As Bailed Property, Austin Headrick

Georgia Law Review

There is a long-existing circuit split among federal courts of appeals as to whether an individual has standing under Article III of the United States Constitution when their personally identifying information (PII) is stolen from an entity to which they entrusted it such as a hospital or bank. Federal courts disagree as to whether an individual whose PII has been stolen—without more—has suffered an injury-in-fact, a necessary element of standing. The disagreement between the courts centers on whether the injury-in-fact has already occurred at the time the PII is stolen or whether the injury occurs once the PII has been …


Prevent Phishy Business: Comparing California’S And The United Kingdom’S Age-Appropriate Design Code To Protect Youth From Cybersecurity Threats, Morgan Comite Jan 2024

Prevent Phishy Business: Comparing California’S And The United Kingdom’S Age-Appropriate Design Code To Protect Youth From Cybersecurity Threats, Morgan Comite

University of Miami International and Comparative Law Review

Cybersecurity is the safeguarding of computer systems and networks against information disclosure, theft, or damage to users’ hardware, software, or electronic data, as well as disruption or misdirection of the services computers and networks provide. Knowing privacy would be breached due to the impact of COVID, in 2020, the United Kingdom got ahead of the game and passed rules/regulations requiring online services to protect children under the age of eighteen from scams, phishing, and security attacks. However, currently, the United States does not have a sufficient uniform privacy law governed to protect children under the age of eighteen from cybersecurity …


June 24, 2022, Bisma Shoaib Jan 2024

June 24, 2022, Bisma Shoaib

Seattle Journal for Social Justice

No abstract provided.


Data In Distress: Effectuating State Data Privacy Laws During Bankruptcy, Cameron Love Jan 2024

Data In Distress: Effectuating State Data Privacy Laws During Bankruptcy, Cameron Love

Emory Law Journal

In 2000, an online toy retailer, Toysmart.com, attempted to liquidate consumer data to pay creditors in its bankruptcy case. The attempted sale drew objections from the Federal Trade Commission and forty-seven state attorneys general. Five years later, Congress attempted to resolve privacy concerns in bankruptcy, amending the Bankruptcy Code to provide clear procedures for the liquidation of “personally identifiable information.” Recently, scholars have criticized these amendments, characterizing them as “limited,” “outdated,” and “privacy theater.” This Comment adds to these criticisms, arguing the amendments’ failure to mandate consideration of relevant nonbankruptcy law puts these permissive sales procedures on a collision course …


Forget About Ferpa: How Foia Protects Student-Athlete Privacy In The Nil Era, Kamron Cox Jan 2024

Forget About Ferpa: How Foia Protects Student-Athlete Privacy In The Nil Era, Kamron Cox

Vanderbilt Journal of Entertainment & Technology Law

The start of the name, image, and likeness (NIL) era stirred public fervor about the new earning potential of high-profile student-athletes. Since institutional policies and state laws governing NIL require student-athletes to broadly disclose information about their NIL activities to their respective institutions, the several state laws that follow the approach of the federal Freedom of Information Act (FOIA) can jeopardize the privacy of student-athlete NIL information. Major universities have repeatedly resorted to the unreliable defense of the Family Educational Rights and Privacy Act as well as sporadic state legislation to protect student-athlete privacy in the new NIL space. However, …


Eavesdropping: The Forgotten Public Nuisance In The Age Of Alexa, Julia Keller Jan 2024

Eavesdropping: The Forgotten Public Nuisance In The Age Of Alexa, Julia Keller

Vanderbilt Law Review

Always-listening devices have sparked new concerns about privacy while evading regulation, but a potential solution has existed for hundreds of years: public nuisance.

Public nuisance has been stretched to serve as a basis of liability for some of the most prominent cases of modern mass-tort litigation, such as suits against opioid and tobacco manufacturers for creating products that endanger public health. While targeting conduct that arguably interferes with a right common to the public, this use of public nuisance extends far beyond the original understanding of the doctrine. Public nuisance has not been applied, however, to another prominent contemporary issue: …


The Modern Border: The Government Can Search . . . Anything?, Abigail Nusbaum Jan 2024

The Modern Border: The Government Can Search . . . Anything?, Abigail Nusbaum

FIU Law Review

The evolution of modern technology has introduced new obstacles in interpreting the Fourth Amendment’s application to searches of peoples’ effects. Specifically, the longstanding exception to the Fourth Amendment permitting searches at the international border in the absence of probable cause does not so neatly apply to forensic searches of cell phones. Consequently, a circuit split has emerged on two aspects of the issue: the scope of the border exception and the requisite level of suspicion within that exception. The Supreme Court should find that forensic cell phone searches at the international border implicate Fourth Amendment privacy interests, requiring the border …


Comparing Gdpr Against The United States’ Approach To Data Breach Notification By Examining Texas And California And The Feasibility Of A Universal Standard, Amrit Nagi Jan 2024

Comparing Gdpr Against The United States’ Approach To Data Breach Notification By Examining Texas And California And The Feasibility Of A Universal Standard, Amrit Nagi

Cybaris®

No abstract provided.


Justice David Hackett Souter And The Right To Privacy, Scott P. Johnson Jan 2024

Justice David Hackett Souter And The Right To Privacy, Scott P. Johnson

Mitchell Hamline Law Review

No abstract provided.