Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Law

William H. Sorrell, Attorney General Of Vermont, Et Al. V. Ims Health Inc., Et Al. - Amicus Brief In Support Of Petitioners, Kevin Outterson, David Orentlicher, Christopher Robertson, Frank Pasquale Aug 2013

William H. Sorrell, Attorney General Of Vermont, Et Al. V. Ims Health Inc., Et Al. - Amicus Brief In Support Of Petitioners, Kevin Outterson, David Orentlicher, Christopher Robertson, Frank Pasquale

Frank A. Pasquale

On April 26, 2011, the US Supreme Court will hear oral arguments in the Vermont data mining case, Sorrell v. IMS Health Inc. Respondents claim this is the most important commercial speech case in a decade. Petitioner (the State of Vermont) argues this is the most important medical privacy case since Whalen v. Roe. The is an amicus brief supporting Vermont, written by law professors and submitted on behalf of the New England Journal of Medicine


Grand Bargains For Big Data: The Emerging Law Of Health Information, Frank Pasquale Aug 2013

Grand Bargains For Big Data: The Emerging Law Of Health Information, Frank Pasquale

Frank A. Pasquale

No abstract provided.


Addressing The Harm Of Total Surveillance: A Reply To Professor Neil Richards, Danielle Citron, David Gray Jun 2013

Addressing The Harm Of Total Surveillance: A Reply To Professor Neil Richards, Danielle Citron, David Gray

David C. Gray

In his insightful article The Dangers of Surveillance, 126 HARV. L. REV. 1934 (2013), Neil Richards offers a framework for evaluating the implications of government surveillance programs that is centered on protecting "intellectual privacy." Although we share his interest in recognizing and protecting privacy as a condition of personal and intellectual development, we worry in this essay that, as an organizing principle for policy, "intellectual privacy" is too narrow and politically fraught. Drawing on other work, we therefore recommend that judges, legislators, and executives focus instead on limiting the potential of surveillance technologies to effect programs of broad and indiscriminate …


Addressing The Harm Of Total Surveillance: A Reply To Professor Neil Richards, Danielle Keats Citron, David C. Gray Jun 2013

Addressing The Harm Of Total Surveillance: A Reply To Professor Neil Richards, Danielle Keats Citron, David C. Gray

Danielle Keats Citron

In his insightful article The Dangers of Surveillance, 126 HARV. L. REV. 1934 (2013), Neil Richards offers a framework for evaluating the implications of government surveillance programs that is centered on protecting "intellectual privacy." Although we share his interest in recognizing and protecting privacy as a condition of personal and intellectual development, we worry in this essay that, as an organizing principle for policy, "intellectual privacy" is too narrow and politically fraught. Drawing on other work, we therefore recommend that judges, legislators, and executives focus instead on limiting the potential of surveillance technologies to effect programs of broad and indiscriminate …


The Rule Of Law In Cyberspace, Mireille Hildebrandt Jun 2013

The Rule Of Law In Cyberspace, Mireille Hildebrandt

Mireille Hildebrandt

This is a translation of my inaugural lecture at Radboud University Nijmegen. The Dutch version has been published as a booklet, the English version in available on my bepress site.


Gouvernementalité Algorithmique Et Perspectives D'Émancipation : Le Disparate Comme Condition D'Individuation Par La Relation?, Antoinette Rouvroy, Thomas Berns Jan 2013

Gouvernementalité Algorithmique Et Perspectives D'Émancipation : Le Disparate Comme Condition D'Individuation Par La Relation?, Antoinette Rouvroy, Thomas Berns

Antoinette Rouvroy

La gouvernementalité algorithmique se caractérise notamment par le double mouvement suivant : a) l’abandon de toute forme d’« échelle », d’« étalon », de hiérarchie, au profit d’une normativité immanente et évolutive en temps réel, dont émerge un « double statistique » du monde et qui semble faire table rase des anciennes hiérarchies dessinée par l’homme normal ou l’homme moyen ; b) l’évitement de toute confrontation avec les individus dont les occasions de subjectivation se trouvent raréfiées. Ce double mouvement nous paraît le fruit de la focalisation de la statistique contemporaine sur les relations. Nous tentons d’évaluer dans quelle mesure …


Tolls On The Information Superhighway: Entitlement Defaults For Clickstream Data, Lee B. Kovarsky Aug 2012

Tolls On The Information Superhighway: Entitlement Defaults For Clickstream Data, Lee B. Kovarsky

Lee Kovarsky

This paper addresses the collection of "clickstream data," and sets forth a theory about the legal rules that should govern it. At the outset, I propose a typology for categorizing privacy invasions. A given state of informational privacy may be represented by: the observed behavior, the collecting agent, and the searching agent. Using this typology, I identify the specific sources of concern about collection of clickstream data. Then, based on expected levels of utility and expected transaction costs of "flipping" to a different rule, I argue for a particular set of privacy defaults for data mining.


"A Necessary Cost Of Freedom"? The Incoherence Of Sorrell V. Ims, Tamara R. Piety Mar 2012

"A Necessary Cost Of Freedom"? The Incoherence Of Sorrell V. Ims, Tamara R. Piety

Tamara R. Piety

No abstract provided.


"A Necessary Cost Of Freedom"? The Incoherence Of Sorrell V. Ims, Tamara R. Piety Feb 2012

"A Necessary Cost Of Freedom"? The Incoherence Of Sorrell V. Ims, Tamara R. Piety

Tamara R. Piety

On June 23, 2011 the Supreme Court announced its decision in a closely watched case, Sorrell v. IMS, striking down Vermont’s law prohibiting pharmacies from selling physicians’ prescription records without their permission for use in marketing brand name drugs. The Court’s majority struck down Vermont’s statute as unconstitutional on the grounds that the law was not “content neutral” because it singled out marketing for disparate treatment. It in effect applied a strict scrutiny test to a category of speech that has technically if not in practice been subject to intermediate scrutiny. This ruling effectively does away with the commercial speech …


Leashing The Internet Watchdog: Legislative Restraints On Electronic Surveillance In The U.S. And U.K., John P. Heekin Apr 2010

Leashing The Internet Watchdog: Legislative Restraints On Electronic Surveillance In The U.S. And U.K., John P. Heekin

John P. Heekin

This article examines the legislative approaches undertaken by the United States and the United Kingdom to regulate the surveillance and interception of electronic communications. Drawing from the recognition of individual privacy in each country, the author explores the development and impact of statutory provisions enacted to accomplish effective oversight of the respective intelligence services. In the U.S., the shifting purposes and provisions of the Foreign Intelligence Surveillance Act of 1978 are tracked from implementation to its revisions following the terrorist attacks of September 11, 2001. Along that timeline, a distinct trend toward greater deference to Executive authority for electronic surveillance …


The Meaning And The Mining Of Legal Texts, Mireille Hildebrandt Jan 2010

The Meaning And The Mining Of Legal Texts, Mireille Hildebrandt

Mireille Hildebrandt

Positive law, inscribed in legal texts, entails an authority not inherent in literary texts, generating legal consequences that can have real effects on a person’s life and liberty. The interpretation of legal texts, necessarily a normative undertaking, resists the mechanical application of rules, though still requiring a measure of predictability, coherence with other relevant legal norms and compliance with constitutional safeguards. The present proliferation of legal texts on the internet (codes, statutes, judgments, treaties, doctrinal treatises) renders the selection of relevant texts and cases next to impossible. We may expect that systems to mine these texts to find arguments that …


Just Click Submit: The Collection, Dissemination And Tagging Of Personally Identifying Information, Corey A. Ciocchetti Jan 2008

Just Click Submit: The Collection, Dissemination And Tagging Of Personally Identifying Information, Corey A. Ciocchetti

Corey A Ciocchetti

As the twenty-first century bustles forward, the e-commerce arena becomes an ever more dangerous place. On a daily basis, websites collect vast amounts of personally identifying information (PII) and mine it in sophisticated databases to discover consumer trends and desires. This process provides many benefits – such as tailored websites and relevant marketing – that few Web surfers would care to do without. However, serious threats lurk in cyberspace and are enhanced by consumers who continue to submit vast amounts of information in a state of relative unawareness. Not wanting to miss out on their Web surfing experience, visitors submit …


E-Commerce And Information Privacy: Privacy Policies As Personal Information Protectors, Corey A. Ciocchetti Jan 2007

E-Commerce And Information Privacy: Privacy Policies As Personal Information Protectors, Corey A. Ciocchetti

Corey A Ciocchetti

This article dives into the contemporary debate surrounding information privacy in the twenty-first century e-commerce environment through the lens of consumers submitting personally identifying information into the vast abyss of cyberspace. I argue that this information must be better protected and that United States law should emphasize electronic privacy policies as privacy-protecting devices. Currently, the United States operates under primarily a self-regulatory environment where the federal and state governments allow industry to regulate the use and content of their privacy policies. This article details current state of the United States legal regime, addresses its inefficiencies in this area and proposes …