Open Access. Powered by Scholars. Published by Universities.®
- Institution
Articles 1 - 10 of 10
Full-Text Articles in Law
Who Owns Data? Constitutional Division In Cyberspace, Dongsheng Zang
Who Owns Data? Constitutional Division In Cyberspace, Dongsheng Zang
Articles
Privacy emerged as a concern as soon as the internet became commercial. In early 1995, Lawrence Lessig warned that the internet, though giving us extraordinary potential, was “not designed to protect individuals against this extraordinary potential for others to abuse.” The same technology can “destroy the very essence of what now defines individuality.” Lessig urged that “a constitutional balance will have to be drawn between these increasingly important interests in privacy, and the competing interest in collective security.” Lessig envisioned that creating property rights in data would help individuals by giving them control of their data. As utopian as property …
Self-Control Of Personal Data And The Constitution In East Asia, Dongsheng Zang
Self-Control Of Personal Data And The Constitution In East Asia, Dongsheng Zang
Articles
No abstract provided.
Pandemic Surveillance Discrimination, Christian Sundquist
Pandemic Surveillance Discrimination, Christian Sundquist
Articles
The COVID-19 pandemic has laid bare the abiding tension between surveillance and privacy. Public health epidemiology has long utilized a variety of surveillance methods—such as contact tracing, quarantines, and mandatory reporting laws—to control the spread of disease during past epidemics and pandemics. Officials have typically justified the resulting intrusions on privacy as necessary for the greater public good by helping to stave off larger health crisis. The nature and scope of public health surveillance in the battle against COVID-19, however, has significantly changed with the advent of new technologies. Digital surveillance tools, often embedded in wearable technology, have greatly increased …
Taking Data, Michael Pollack
Taking Data, Michael Pollack
Articles
Technological development has created new forms of information, altered expectations of privacy, and given law enforcement more tools to examine that information and intrude on that privacy. One crucial facet of these changes involves internet service providers (ISPs): as people expose more of their lives to their ISPs—all the websites they visit, people they communicate with, emails they send, files they store, and more—law enforcement efforts to access that data become more and more common. But scholars and policymakers alike recognize that the existing statutory frameworks governing those efforts are based on obsolete technology and strike balances that are difficult …
Intelligence Legalism And The National Security Agency’S Civil Liberties Gap, Margo Schlanger
Intelligence Legalism And The National Security Agency’S Civil Liberties Gap, Margo Schlanger
Articles
Since June 2013, we have seen unprecedented security breaches and disclosures relating to American electronic surveillance. The nearly daily drip, and occasional gush, of once-secret policy and operational information makes it possible to analyze and understand National Security Agency activities, including the organizations and processes inside and outside the NSA that are supposed to safeguard American’s civil liberties as the agency goes about its intelligence gathering business. Some have suggested that what we have learned is that the NSA is running wild, lawlessly flouting legal constraints on its behavior. This assessment is unfair. In fact, the picture that emerges from …
Mapping Online Privacy, Jacqueline D. Lipton
Mapping Online Privacy, Jacqueline D. Lipton
Articles
Privacy scholars have recently outlined difficulties in applying existing concepts of personal privacy to the maturing Internet. With Web 2.0 technologies, more people have more opportunities to post information about themselves and others online, often with scant regard for individual privacy. Shifting notions of 'reasonable expectations of privacy' in the context of blogs, wikis, and online social networks create challenges for privacy regulation. Courts and commentators struggle with Web 2.0 privacy incursions without the benefit of a clear regulatory framework. This article offers a map of privacy that might help delineate at least the outer boundaries of Web 2.0 privacy. …
'We, The Paparazzi': Developing A Privacy Paradigm For Digital Video, Jacqueline D. Lipton
'We, The Paparazzi': Developing A Privacy Paradigm For Digital Video, Jacqueline D. Lipton
Articles
In January 2009, the Camera Phone Predator Alert bill was introduced into Congress. It raised serious concerns about privacy rights in the face of digital video technology. In so doing, it brought to light a worrying gap in current privacy regulation - the lack of rules relating to digital video privacy. To date, digital privacy regulation has focused on text records that contain personal data. Little attention has been paid to privacy in video files that may portray individuals in inappropriate contexts, or in an unflattering or embarrassing light. As digital video technology, including inexpensive cellphone cameras, is now becoming …
Brandeis & Warren's 'The Right To Privacy And The Birth Of The Right To Privacy', Ben Bratman
Brandeis & Warren's 'The Right To Privacy And The Birth Of The Right To Privacy', Ben Bratman
Articles
Privacy law and conceptions of a right to privacy have, of course, evolved considerably since 1890 when future Supreme Court Justice Louis Brandeis and Boston attorney Samuel Warren penned their now ageless article, The Right to Privacy, 4 Harv. L. Rev. 193, in which they argued the law should recognize such a right and impose liability in tort for intrusions on it. But quite apart from any argument about how attenuated the link might be between Brandeis and Warren's specific proposals and the current state of privacy law, is it fair to say, as so many scholars and judges repeatedly …
Standing Up For Fourth Amendment Rights: Salvucci, Rawlings, And The Reasonable Expectation Of Privacy (Comment), Elizabeth Brandt
Standing Up For Fourth Amendment Rights: Salvucci, Rawlings, And The Reasonable Expectation Of Privacy (Comment), Elizabeth Brandt
Articles
The initial inquiry a court must make before considering a motion to suppress evidence based on an unreasonable search and seizure is whether the individual has standing under the fourth amendment. This Note examines the historical development of the standing doctrines leading to the reasonable expectation of privacy test adopted by the Supreme Court in Rakas v. Illinois. The Note also identifies the problems created by the Court's far-reaching application of this test. The author concludes that the overall effect of recent decisions may be to limit the number of defendants able to assert fourth amendment claims, since suppression hearing …
Political Surveillance And The Fourth Amendment, Alan Meisel
Political Surveillance And The Fourth Amendment, Alan Meisel
Articles
The United States District Court case has left the scope of the warrant protection of the fourth amendment considerably clearer and broader. The door left ajar in Katz has been firmly fastened shut by the Court leaving only the traditional exceptions to the warrant requirement, which are based upon practical necessity, and the still unconfronted question of the power of the executive to conduct warrantless surveillances of foreign agents in national security cases." It is also clear that courts are no less competent to evaluate the appropriateness of a search and seizure in an internal security case than in a …