Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Privacy Law (21)
- Internet Law (15)
- Science and Technology Law (15)
- Computer Law (9)
- Intellectual Property Law (6)
-
- Legislation (6)
- Commercial Law (5)
- Communications Law (5)
- Consumer Protection Law (5)
- First Amendment (5)
- International Law (5)
- Comparative and Foreign Law (4)
- European Law (4)
- Law and Society (4)
- Contracts (3)
- Entertainment, Arts, and Sports Law (3)
- Health Law and Policy (3)
- Administrative Law (2)
- Civil Law (2)
- Common Law (2)
- Computer Sciences (2)
- Courts (2)
- Jurisprudence (2)
- Law and Economics (2)
- Law and Politics (2)
- Legal Education (2)
- National Security Law (2)
- Other Law (2)
- Physical Sciences and Mathematics (2)
- Institution
-
- Seattle University School of Law (7)
- Maurer School of Law: Indiana University (4)
- Fordham Law School (3)
- Notre Dame Law School (2)
- Pepperdine University (2)
-
- The Catholic University of America, Columbus School of Law (2)
- American Dental Association (1)
- American University Washington College of Law (1)
- Brooklyn Law School (1)
- Embry-Riddle Aeronautical University (1)
- Mitchell Hamline School of Law (1)
- Saint Louis University School of Law (1)
- St. John's University School of Law (1)
- Texas A&M University School of Law (1)
- Touro University Jacob D. Fuchsberg Law Center (1)
- University of Cincinnati College of Law (1)
- University of Richmond (1)
- Vanderbilt University Law School (1)
- West Virginia University (1)
- Publication Year
- Publication
-
- Seattle University Law Review (6)
- Fordham Intellectual Property, Media and Entertainment Law Journal (3)
- Catholic University Journal of Law and Technology (2)
- Indiana Law Journal (2)
- American University International Law Review (1)
-
- Brooklyn Journal of International Law (1)
- Federal Communications Law Journal (1)
- Indiana Journal of Global Legal Studies (1)
- Journal of Digital Forensics, Security and Law (1)
- Journal of Legislation (1)
- Mitchell Hamline Law Review (1)
- Notre Dame Law Review (1)
- Pepperdine Law Review (1)
- Richmond Journal of Global Law & Business (1)
- Saint Louis University Law Journal (1)
- Seattle Journal of Technology, Environmental, & Innovation Law (1)
- St. John's Law Review (1)
- Texas A&M Law Review (1)
- The Journal of Business, Entrepreneurship & the Law (1)
- The Journal of the Michigan Dental Association (1)
- The University of Cincinnati Intellectual Property and Computer Law Journal (1)
- Touro Law Review (1)
- Vanderbilt Journal of Entertainment & Technology Law (1)
- West Virginia Law Review (1)
Articles 1 - 30 of 33
Full-Text Articles in Law
The Unregulated World Of Your Most Personal Of Personal Information: A Proposal For A Federal Biometric Information Privacy Law, Isabel M. Vuyk
The Unregulated World Of Your Most Personal Of Personal Information: A Proposal For A Federal Biometric Information Privacy Law, Isabel M. Vuyk
The University of Cincinnati Intellectual Property and Computer Law Journal
No abstract provided.
Privacy Purgatory: Why The United States Needs A Comprehensive Federal Data Privacy Law, Emily Stackhouse Taetzsch
Privacy Purgatory: Why The United States Needs A Comprehensive Federal Data Privacy Law, Emily Stackhouse Taetzsch
Journal of Legislation
No abstract provided.
Keep Your Fingerprints To Yourself: New York Needs A Biometric Privacy Law, Brendan Mcnerney
Keep Your Fingerprints To Yourself: New York Needs A Biometric Privacy Law, Brendan Mcnerney
St. John's Law Review
(Excerpt)
Imagine walking into a store, picking something up, and just walking out. No longer is this shoplifting, it is legal. In 2016, Amazon introduced their “Just Walk Out” technology in Seattle. “Just Walk Out” uses cameras located throughout the store to monitor shoppers, document what they pick up, and automatically charge that shoppers’ Amazon account when they leave the store. Recently, Amazon started selling “Just Walk Out” technology to other retailers. Since then, retailers have become increasingly interested in collecting and using customers’ “biometric identifiers and information.” Generally, “biometrics” is used to refer to “measurable human biological and behavioral …
Complying With New And Existing Biometric Data Privacy Laws, Ariel Latzer
Complying With New And Existing Biometric Data Privacy Laws, Ariel Latzer
The Journal of Business, Entrepreneurship & the Law
After providing an overview of the history behind biometric information, this article will discuss the Illinois Biometric Privacy Act (BIPA)—which laid the foundation for biometric privacy regulations in the United States—and then discuss the California Consumer Privacy Act (CCPA) and its amendments in the California Privacy Rights Act (CPRA). It will also briefly touch on biometric information regulations in other states and then delve into how some notable companies are currently using individuals’ biometric information to give readers a general idea of what is happening to their personal information and highlight areas businesses should take note of in order to …
An Epidemic In Enforceability: A Growing Need For Individual Autonomy In Health Care Data-Privacy Protection In An Era Of Digital Tracking, Madeline Knight
An Epidemic In Enforceability: A Growing Need For Individual Autonomy In Health Care Data-Privacy Protection In An Era Of Digital Tracking, Madeline Knight
Vanderbilt Journal of Entertainment & Technology Law
The health care system in the United States is under conflicting pressures. From one angle, there is a demand for the highest standard of care, which includes efficient, confidential communications between doctors and patients. From another, however, the technology that has facilitated such efficiency has outpaced the security mechanisms currently in place to protect a long-recognized right to privacy. In an era of data tracking, the important privacy interest that Congress has recognized since 1996 confronts a growing threat of data commodification. Despite significant potential consequences, however, there is neither guaranteed statutory recovery nor cohesion among states for the process …
Semantics And Sin Tax: Maintaining Autonomy In The Age Of Hyper-Personalization, Stephen Kohn
Semantics And Sin Tax: Maintaining Autonomy In The Age Of Hyper-Personalization, Stephen Kohn
Mitchell Hamline Law Review
No abstract provided.
Regulating Charitable Crowdfunding, Lloyd H. Mayer
Regulating Charitable Crowdfunding, Lloyd H. Mayer
Indiana Law Journal
Charitable crowdfunding is a global and rapidly growing new method for raising money to benefit charities and individuals in need. While mass fundraising has existed for hundreds of years, crowdfunding is distinguishable from those earlier efforts because of its low cost, speed of implementation, and broad reach. Reflecting these advantages, it now accounts annually for billions of dollars raised from tens of millions of donors through hundreds of internet platforms, including Charidy, Facebook, GoFundMe, and GlobalGiving. Although most charitable crowdfunding campaigns raise only modest amounts, on occasion a campaign attracts tens of millions of dollars in donations. However, charitable crowdfunding …
Do We Own What We Post?: The Fundamental Property Right To Destroy Your Presence On The Internet, Olivia Shangrow
Do We Own What We Post?: The Fundamental Property Right To Destroy Your Presence On The Internet, Olivia Shangrow
Seattle University Law Review
This Note will explore the well-established right to destroy your own property and how such a fundamental right can and should be applied to our online property to develop more protective data privacy legislation. Part I highlights the longstanding pillar of property law establishing a right to destroy one’s property, and how that can and should be applied to your digital identity. Part II will discuss the ambiguity of personal data ownership online and the ill effects resulting from the lack of control of our personal information on the Internet. Part III examines the current state of data privacy legislation …
How The World's Largest Economies Regulate Data Privacy: Drawbacks, Benefits, & Proposed Solutions, Alexander J. Pantos
How The World's Largest Economies Regulate Data Privacy: Drawbacks, Benefits, & Proposed Solutions, Alexander J. Pantos
Indiana Journal of Global Legal Studies
National data privacy regimes are quickly gaining traction and ubiquity around the globe. Moving forward, countries will face a range of difficult decisions surrounding how best to engage internationally in cross border data flow, particularly in the context of personal information (PI).
This article takes a bird's-eye view of the current state of data privacy regimes in the world's four highest GDP regions. In part, this article hopes to provide a succinct analysis of these data privacy regimes, with a focus on the balance they strike between granting individuals rights in their data and placing responsibilities on businesses that deal …
Agriculture & Data Privacy: I Want A Hipaa(Potamus) For Christmas . . . Maybe, Jennifer Zwagerman
Agriculture & Data Privacy: I Want A Hipaa(Potamus) For Christmas . . . Maybe, Jennifer Zwagerman
Texas A&M Law Review
Technology advancements make life, work, and play easier and more enjoyable in many ways. Technology issues are also the cause of many headaches and dreams of living out the copier destruction scene from the movie “Office Space.” Whether it be user error or technological error, one key technology issue on many minds right now is how all the data produced every second of every day, in hundreds of different ways, is used by those that collect it.
How much data are we talking about here? In 2018, the tech company Domo estimated that by 2020 “1.7 MB of data will …
Handle With Care: Domestic Violence Safety Planning In The Age Of Data Privacy Laws, Jenny Wu
Handle With Care: Domestic Violence Safety Planning In The Age Of Data Privacy Laws, Jenny Wu
Seattle Journal of Technology, Environmental, & Innovation Law
The United States has been patiently waiting for a comprehensive federal data privacy law to protect consumers. However, strong data privacy laws can also protect a less thought-about group: survivors of domestic violence and intimate partner violence. As new technology proliferates into our daily lives, technology-based abuse is quickly becoming a common form of intimate partner abuse. Domestic violence survivors and advocates have to stay extra vigilant about who has access to their internet data. Needing to understand technology-specific safety measures and learn technology-literacy skills adds more work to already overwhelmed domestic violence advocates and survivors. Could the law serve …
The Impact Of Schrems Ii: Next Steps For U.S. Data Privacy Law, Andraya Flor
The Impact Of Schrems Ii: Next Steps For U.S. Data Privacy Law, Andraya Flor
Notre Dame Law Review
Schrems II invalidated Privacy Shield because the court found that it did not provide an “essentially equivalent” level of protection compared to the guarantees of the GDPR. The National Security Agency (NSA) operated surveillance programs that had the potential to infringe on the rights of EU subjects, and there was a lack of oversight and effective judicial remedies to protect rights of EU data subjects, which undermined Privacy Shield as a mechanism for data transfers. This Note sets aside the surveillance and national security issue, which would require resolution through a shift in overall U.S. national security law, and instead …
Powered By Ai, Christopher J. Smiley
Powered By Ai, Christopher J. Smiley
The Journal of the Michigan Dental Association
Artificial Intelligence (AI) is revolutionizing dental practice through its ability to process vast amounts of data, enhance diagnosis, and improve patient care. However, AI introduces the challenge of bias and ethical considerations. Dentists and dental benefit providers are utilizing AI for early disease detection and efficient data management, but transparency and fairness in AI algorithms are vital. The Rome Call for AI Ethics emphasizes ethical, non-biased AI development. In the broader context, AI-driven marketing and predictive behavior raise concerns about privacy and ethical data use. The dental community must embrace AI's power while upholding ethical standards and transparency.
Data Privacy: One Universal Regulation Eliminating The Many States Of Legal Uncertainty, Tiffany Light
Data Privacy: One Universal Regulation Eliminating The Many States Of Legal Uncertainty, Tiffany Light
Saint Louis University Law Journal
Although privacy has been around for quite some time, it has picked up speed within the last fifty years or so. Triggered by the advancements in technology that make the collection, storage, and use of data commonplace in today’s data-driven world, new privacy regulations and data protection standards have begun to spread like wildfire across the globe. Consumers continue to advocate for their right to privacy as they face the privacy paradox—the desire to protect one’s own privacy, while at the same time being forced to give it up as the cost of doing business in our data driven world. …
A Monopoly As Vast As The Amazon: How Amazon’S Proprietary Data Collection Is A Violation Of The Treaty On The Functioning Of The European Union, Alexis Adams
American University International Law Review
No abstract provided.
The Balkanization Of Data Privacy Regulation, Fernanda G. Nicola, Oreste Pollicino
The Balkanization Of Data Privacy Regulation, Fernanda G. Nicola, Oreste Pollicino
West Virginia Law Review
No abstract provided.
The First Amendment And Data Privacy: Securing Data Privacy Laws That Withstand Constitutional Muster, Kathryn Peyton
The First Amendment And Data Privacy: Securing Data Privacy Laws That Withstand Constitutional Muster, Kathryn Peyton
Pepperdine Law Review
Given the growing ubiquity of digital technology’s presence in people’s lives today, it is becoming increasingly more necessary to secure data privacy protections. People interact with technology constantly, ranging from when engaging in business activates, such as corresponding through emails or doing research online, to more innocuous activities like driving, shopping, or talking with friends and family. The advances in technology have made possible the creation of digital trails whenever someone interacts with such technology. Companies aggregate data from data trails and use predictive analytics to create detailed profiles about citizen-consumers. This information is typically used for profit generating purposes. …
A Dangerous Inheritance: A Child’S Digital Identity, Kate Hamming
A Dangerous Inheritance: A Child’S Digital Identity, Kate Hamming
Seattle University Law Review
This Comment begins with one family’s story of its experience with social media that many others can relate to in today’s ever-growing world of technology and the Internet. Technology has made it possible for a person’s online presence to grow exponentially through continuous sharing by other Internet users. This ability to communicate and share information amongst family, friends, and strangers all over the world, while beneficial in some regard, comes with its privacy downfalls. The risks to privacy are elevated when children’s information is being revealed, which often stems from a child’s own parents conduct online. Parents all over the …
Revisiting The Enforceability Of Online Contracts: The Need For Unambiguous Assent To Inconspicuous Terms, Tom Mozingo
Revisiting The Enforceability Of Online Contracts: The Need For Unambiguous Assent To Inconspicuous Terms, Tom Mozingo
Seattle University Law Review
In determining the enforceability of online contracts, namely those formed from the use of smartphone applications, courts typically look to whether the contract terms were reasonably conspicuous or communicated to the consumer. With the rise of “browse-wrap” contracts, where terms are not directly communicated to the consumer or where the consumer is not required to click the equivalent of an “I agree” button clearly manifesting assent to the terms, courts have inconsistently applied the reasonable communicativeness standard to the detriment of consumers and application developers alike. This Comment will explore the development of browse-wrap contracting jurisprudence and the need to …
Df 2.0: An Automated, Privacy Preserving, And Efficient Digital Forensic Framework That Leverages Machine Learning For Evidence Prediction And Privacy Evaluation, Robin Verma, Jayaprakash Govindaraj Dr, Saheb Chhabra, Gaurav Gupta
Df 2.0: An Automated, Privacy Preserving, And Efficient Digital Forensic Framework That Leverages Machine Learning For Evidence Prediction And Privacy Evaluation, Robin Verma, Jayaprakash Govindaraj Dr, Saheb Chhabra, Gaurav Gupta
Journal of Digital Forensics, Security and Law
The current state of digital forensic investigation is continuously challenged by the rapid technological changes, the increase in the use of digital devices (both the heterogeneity and the count), and the sheer volume of data that these devices could contain. Although data privacy protection is not a performance measure, however, preventing privacy violations during the digital forensic investigation, is also a big challenge. With a perception that the completeness of investigation and the data privacy preservation are incompatible with each other, the researchers have provided solutions to address the above-stated challenges that either focus on the effectiveness of the investigation …
The Future Of Facial Recognition Is Not Fully Known: Developing Privacy And Security Regulatory Mechanisms For Facial Recognition In The Retail Sector, Elias Wright
Fordham Intellectual Property, Media and Entertainment Law Journal
In recent years, advances in facial recognition technology have resulted in a rapid expansion in the prevalence of private sector biometric technologies. Facial recognition, while providing new potentials for safety and security and personalized marketing by retailers implicates complicated questions about the nature of consumer privacy and surveillance where a “collection imperative” incentivize corporate actors to accumulate increasingly massive reservoirs of consumer data. However, the law has not yet fully developed to address the unique risks to consumers through the use of this technology. This Note examines existing regulatory mechanisms, finding that consumer sensitivities and the opaque nature of the …
The Tortoise And The Hare Of International Data Privacy Law: Can The United States Catch Up To Rising Global Standards?, Matthew Humerick
The Tortoise And The Hare Of International Data Privacy Law: Can The United States Catch Up To Rising Global Standards?, Matthew Humerick
Catholic University Journal of Law and Technology
Technological developments spur the development of big data on a global scale. The breadth of data companies collect, maintain, process, and transmit affects nearly every country and organization around the world. Inherent to big data are issues of data protection and transfers to third countries. While many jurisdictions emphasize the importance of protecting consumer data, such as the European Union, others, like the United States, do not. To circumvent this issue, the United States and European Union contracted around data privacy standard discrepancies through the Safe Harbor Agreement, which eased cross-border data transfers. However, the Court of Justice of the …
Alexa, Who Owns My Pillow Talk? Contracting, Collaterizing, And Monetizing Consumer Privacy Through Voice-Captured Personal Data, Anne Logsdon Smith
Alexa, Who Owns My Pillow Talk? Contracting, Collaterizing, And Monetizing Consumer Privacy Through Voice-Captured Personal Data, Anne Logsdon Smith
Catholic University Journal of Law and Technology
With over one-fourth of households in the U.S. alone now using voice-activated digital assistant devices such as Amazon’s Echo (better known as “Alexa”) and Google’s Home, companies are recording and transmitting record volumes of voice data from the privacy of people’s homes to servers across the globe. These devices capture conversations about everything from online shopping to food preferences to entertainment recommendations to bedtime stories, and even phone and appliance use. With “Big Data” and business analytics expected to be a $203 billion-plus industry by 2020, companies are racing to acquire and leverage consumer data by selling it, licensing it, …
Wearable Fitness Devices: Personal Health Data Privacy In Washington State, Steven Spann
Wearable Fitness Devices: Personal Health Data Privacy In Washington State, Steven Spann
Seattle University Law Review
Private entities are increasingly targeting individuals in the United States and around the world to gather personal data for such purposes as product development, market identification, and insurance risk assessment. While credit card records and online browsing histories have long been the medium through which this data is gathered, in more recent years, wearable fitness devices have added a new dimension to data production and collection. These devices are capable of gathering a significant amount of data regarding a person’s physical and physiological characteristics, thereby exposing these data producers to personal privacy infringement. Washington State lawmakers and citizens must be …
The Need For An International Convention On Data Privacy: Taking A Cue From The Cisg, Morgan Corley
The Need For An International Convention On Data Privacy: Taking A Cue From The Cisg, Morgan Corley
Brooklyn Journal of International Law
In light of the invalidation of the U.S.-EU Safe Harbor, along with the increase in sales of personal data as a commodity, data privacy has become a major concern amongst different nations. The lack of harmonization of data-privacy laws around the world continues to pose obstacles to the free flow of data across national borders. The free flow of data is, nonetheless, essential the international economy. As a result, nations continue to work together to try to create mechanisms by which data can be transferred across borders in a secure manner. This Note examines the current state of data-privacy law …
A Comprehensive Empirical Study Of Data Privacy, Trust, And Consumer Autonomy, Jay P. Kesan, Carol M. Hayes, Masooda N. Bashir
A Comprehensive Empirical Study Of Data Privacy, Trust, And Consumer Autonomy, Jay P. Kesan, Carol M. Hayes, Masooda N. Bashir
Indiana Law Journal
Modern society is driven by data. Data storage is practically unlimited with today’s technology, and analytical tools make it easy to find patterns and make predictions in a way that is very useful for private businesses and governments. These uses of digital data can raise considerable privacy issues that are of great concern to consumers. In this Article, we present and analyze the results of an extensive survey that we conducted to explore what people know, what people do, and what people want when it comes to privacy online.
Our survey is the first comprehensive examination of the intersection of …
Data Privacy Regulation In The Age Of Smartphones, Matthew Hettrich
Data Privacy Regulation In The Age Of Smartphones, Matthew Hettrich
Touro Law Review
No abstract provided.
Trading Privacy For Angry Birds: A Call For Courts To Reevaluate Privacy Expectations In Modern Smartphones, Jeremy Andrew Ciarabellini
Trading Privacy For Angry Birds: A Call For Courts To Reevaluate Privacy Expectations In Modern Smartphones, Jeremy Andrew Ciarabellini
Seattle University Law Review
Of all the smartphone uses, the calling function is probably used the least. Rather, individuals more commonly use their smartphone for surfing the web, checking Facebook, and playing games. Highlighting the “smart” in smartphone, these phones often know more about their users’ daily activities than the users. Without requiring any sort of input, smartphones can tell the user how many steps they walk each day, when it is time to leave for work (also, of course, determining the traveling time with the most up-to-date traffic reports), and when an item recently ordered on Amazon will be delivered. Smartphone users may …
Authorized Investigation: A Temperate Alternative To Cyber Insecurity, Casey M. Bruner
Authorized Investigation: A Temperate Alternative To Cyber Insecurity, Casey M. Bruner
Seattle University Law Review
This Note aims to show that legal structures created to protect the Internet in its original form are completely insufficient to protect what the Internet has become. This antiquated legal framework is exacerbating the problem. The breadth of activity that the current law restricts severely limits the remedies that cyberattack victims can pursue, and it must be updated. While full hack-back may prove necessary in the long run, I argue for a more temperate initial response to the problem—I call this response “authorized investigation.” Specifically, the Computer Fraud and Abuse Act should be amended to allow victims access to their …
Resilience: Building Better Users And Fair Trade Practices In Information, Andrea M. Matwyshyn
Resilience: Building Better Users And Fair Trade Practices In Information, Andrea M. Matwyshyn
Federal Communications Law Journal
Symposium: Rough Consensus and Running Code: Integrating Engineering Principles into Internet Policy Debates, held at the University of Pennsylvania's Center for Technology Innovation and Competition on May 6-7, 2010.
In the discourse on communications and new media policy, the average consumer-the user-is frequently eliminated from the equation. This Article presents an argument rooted in developmental psychology theory regarding the ways that users interact with technology and the resulting implications for data privacy law. Arguing in favor of a user-centric construction of policy and law, the Author introduces the concept of resilience. The concept of resilience has long been discussed in …