Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

Privacy Law

Institution
Keyword
Publication Year
Publication
File Type

Articles 1 - 30 of 1005

Full-Text Articles in Law

Decoding Dobbs: A Typology To Better Understand The Roberts Court's Jurisprudence, Katie Yoder May 2024

Decoding Dobbs: A Typology To Better Understand The Roberts Court's Jurisprudence, Katie Yoder

Honors Projects

The U.S. Supreme Court first recognized Substantive Due Process (“SDP”) in the early twentieth century. In Lochner v. New York, the Court established that there are certain unenumerated rights that are implied by the Fourteenth Amendment.Though SDP originated in a case about worker’s rights and liberties, it quickly became relevant to many cases surrounding personal intimate decisions involving health, safety, marriage, sexual activity, and reproduction.Over the past 60 years, the Court relied upon SDP to justify expanding a fundamental right to privacy, liberty, and the right to medical decision making. Specifically, the court applied these concepts to allow for freedoms …


Content Moderation And The Least Cost Avoider, Paul Rosenzweig Apr 2024

Content Moderation And The Least Cost Avoider, Paul Rosenzweig

Joint PIJIP/TLS Research Paper Series

No abstract provided.


Children Seen But Not Heard, Stacey B. Steinberg Apr 2024

Children Seen But Not Heard, Stacey B. Steinberg

UF Law Faculty Publications

Children are expected to abide by the will of their parents. In the last 200 years, American jurisprudence has given parents the ability to control their children’s upbringing with few exceptions. The principle governing this norm is that parents know best and will use their better knowledge to protect their children’s welfare.

The COVID-19 pandemic, public school rules, and children’s privacy laws offer modern examples of regulations in which the interests of parents and children may not align. Minors may want access to vaccines, despite a parent’s refusal to sign a consent form. Minors may want to talk to their …


Distinguishing Privacy Law: A Critique Of Privacy As Social Taxonomy, María P. Angel, Ryan Calo Mar 2024

Distinguishing Privacy Law: A Critique Of Privacy As Social Taxonomy, María P. Angel, Ryan Calo

Articles

What distinguishes privacy violations from other harms? This has proven a surprisingly difficult question to answer. For over a century, privacy law scholars labored to define the elusive concept of privacy. Then they gave up. Efforts to distinguish privacy were superseded at the turn of the millennium by a new approach: a taxonomy of privacy problems grounded in social recognition. Privacy law became the field that simply studies whatever courts or scholars talk about as related to privacy.

Decades into privacy as social taxonomy, the field has expanded to encompass a broad range of information-based harms—from consumer manipulation to algorithmic …


Privacy Policy Indeterminacy, Christopher G. Bradley Jan 2024

Privacy Policy Indeterminacy, Christopher G. Bradley

Connecticut Law Review

Despite being subjected to decades of sharp criticism, privacy policies published by companies remain a linchpin of privacy regulation. Representations in these policies provide the main measure against which consumer privacy can be judged. Policies are rarely read by consumers. Instead, these policies are interpreted by company decision makers tasked with interpreting whether a proposed course of action is consistent with stated policies as well as underlying privacy law. To be effective, policies must constrain use of consumer data even when they are given a company-friendly reading.

Experimental evidence on the interpretation of privacy policies provides no grounds for encouragement …


The Automated Fourth Amendment, Maneka Sinha Jan 2024

The Automated Fourth Amendment, Maneka Sinha

Faculty Scholarship

Courts routinely defer to police officer judgments in reasonable suspicion and probable cause determinations. Increasingly, though, police officers outsource these threshold judgments to new forms of technology that purport to predict and detect crime and identify those responsible. These policing technologies automate core police determinations about whether crime is occurring and who is responsible. Criminal procedure doctrine has failed to insist on some level of scrutiny of—or skepticism about—the reliability of this technology. Through an original study analyzing numerous state and federal court opinions, this Article exposes the implications of law enforcement’s reliance on these practices given the weighty interests …


The Trade Origins Of Privacy Law, Anupam Chander Jan 2024

The Trade Origins Of Privacy Law, Anupam Chander

Georgetown Law Faculty Publications and Other Works

The desire for trade propelled the growth of data privacy law across the world. Countries with strong privacy laws sought to ensure that their citizens’ privacy would not be compromised when their data traveled to other countries. Even before this vaunted Brussels Effect pushed privacy law across the world through the enticement of trade with the European Union, Brussels had to erect privacy law within the Union itself. And as the Union itself expanded, privacy law was a critical condition for accession.

But this coupling of privacy and trade leaves a puzzle: how did the U.S. avoid a comprehensive privacy …


Privacy Nicks: How The Law Normalizes Surveillance, Woodrow Hartzog, Evan Selinger, Johanna Gunawan Jan 2024

Privacy Nicks: How The Law Normalizes Surveillance, Woodrow Hartzog, Evan Selinger, Johanna Gunawan

Faculty Scholarship

Privacy law is failing to protect individuals from being watched and exposed, despite stronger surveillance and data protection rules. The problem is that our rules look to social norms to set thresholds for privacy violations, but people can get used to being observed. In this article, we argue that by ignoring de minimis privacy encroachments, the law is complicit in normalizing surveillance. Privacy law helps acclimate people to being watched by ignoring smaller, more frequent, and more mundane privacy diminutions. We call these reductions “privacy nicks,” like the proverbial “thousand cuts” that lead to death.

Privacy nicks come from the …


Unavoidability In U.S. Privacy Law, Laura M. Moy Jan 2024

Unavoidability In U.S. Privacy Law, Laura M. Moy

Georgetown Law Faculty Publications and Other Works

Why is U.S. privacy law structured the way it is, with a series of sectoral laws rather than a cross-sectoral law or laws? Why does U.S. privacy law protect information shared in certain contexts—such as information shared with an attorney, a healthcare provider, or a financial provider—rather than particular types of information? One possibility is that sectoral laws apply to contexts in which people typically share highly “sensitive” information containing intimate secrets or with the potential to harm them financially or psychologically.

But this Article argues that there is something else at play—that in fact, an under-discussed and underappreciated factor …


Shields Up For Software, Derek E. Bambauer, Melanie J. Teplinsky Dec 2023

Shields Up For Software, Derek E. Bambauer, Melanie J. Teplinsky

UF Law Faculty Publications

This Article contends that the National Cybersecurity Strategy's software liability regime should incorporate two safe harbors. The first would shield software creators and vendors from liability for decisions related to design, implementation, and maintenance, as long as those choices follow enumerated best practices. The second—the “inverse safe harbor”—would have the opposite effect: coders and distributors who engaged in defined worst practices would automatically become liable. This Article explains the design, components, and justifications for these twin safe harbors. The software safe harbors are key parts of the overall design of the new liability regime and work in tandem with the …


Enhanced Privacy-Enabled Face Recognition Using Κ-Identity Optimization, Ryan Karl Dec 2023

Enhanced Privacy-Enabled Face Recognition Using Κ-Identity Optimization, Ryan Karl

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

Facial recognition is becoming more and more prevalent in the daily lives of the common person. Law enforcement utilizes facial recognition to find and track suspects. The newest smartphones have the ability to unlock using the user's face. Some door locks utilize facial recognition to allow correct users to enter restricted spaces. The list of applications that use facial recognition will only increase as hardware becomes more cost-effective and more computationally powerful. As this technology becomes more prevalent in our lives, it is important to understand and protect the data provided to these companies. Any data transmitted should be encrypted …


Brief Of Amici Curiae Privacy And First Amendment Law Professors In Support Of Defendant-Appellant And Reversal, G. S. Hans, Hannah Bloch-Wehba, Danielle K. Citron, Julie E. Cohen, Mary Anne Franks, Woodrow Hartzog, Margot E. Kaminski, Gregory P. Magarian, Frank Pasquale, Neil Richards, Daniel J. Solove Dec 2023

Brief Of Amici Curiae Privacy And First Amendment Law Professors In Support Of Defendant-Appellant And Reversal, G. S. Hans, Hannah Bloch-Wehba, Danielle K. Citron, Julie E. Cohen, Mary Anne Franks, Woodrow Hartzog, Margot E. Kaminski, Gregory P. Magarian, Frank Pasquale, Neil Richards, Daniel J. Solove

Faculty Scholarship

STATEMENT OF INTEREST: Amici curiae are law professors and scholars of data privacy, constitutional law, and the First Amendment. Amici write to provide the court with scholarly expertise on the complexities of data privacy law and its intersection with the First Amendment. Amici have collectively written scores of academic articles and multiple books on data privacy, technology, the First Amendment, and constitutional challenges to state and federal privacy regulation.

Amici submit this brief pursuant to Fed. Rule App. P. 29(a) and do not repeat arguments made by the parties. No party’s counsel authored this brief, or any part of …


Twenty Years After Krieger V Law Society Of Alberta: Law Society Discipline Of Crown Prosecutors And Government Lawyers, Andrew Flavelle Martin Oct 2023

Twenty Years After Krieger V Law Society Of Alberta: Law Society Discipline Of Crown Prosecutors And Government Lawyers, Andrew Flavelle Martin

Articles, Book Chapters, & Popular Press

Krieger v. Law Society of Alberta held that provincial and territorial law societies have disciplinary jurisdiction over Crown prosecutors for conduct outside of prosecutorial discretion. The reasoning in Krieger would also apply to government lawyers. The apparent consensus is that law societies rarely exercise that jurisdiction. But in those rare instances, what conduct do Canadian law societies discipline Crown prosecutors and government lawyers for? In this article, I canvass reported disciplinary decisions to demonstrate that, while law societies sometimes discipline Crown prosecutors for violations unique to those lawyers, they often do so for violations applicable to all lawyers — particularly …


Continuous Reproductive Surveillance, Michael Ulrich, Leah R. Fowler Oct 2023

Continuous Reproductive Surveillance, Michael Ulrich, Leah R. Fowler

Faculty Scholarship

The Dobbs opinion emphasizes that the state’s interest in the fetus extends to “all stages of development.” This essay briefly explores whether state legislators, agencies, and courts could use the “all stages of development” language to expand reproductive surveillance by using novel developments in consumer health technologies to augment those efforts.


A Trusted Framework For Cross-Border Data Flows, Alex Joel Sep 2023

A Trusted Framework For Cross-Border Data Flows, Alex Joel

Joint PIJIP/TLS Research Paper Series

The German Marshall Fund of the United States (GMF), in cooperation with the Tech, Law and Security Program (TLS) of the American University Washington College of Law, and with support from Microsoft, convened a Global Taskforce to Promote Trusted Sharing of Data comprising experts from civil society, academia, and industry to submit proposals for harmonizing approaches to global data use and sharing. Former US Ambassador to the Organisation for Economic Co-operation and Development (OECD) and GMF Distinguished Fellow Karen Kornbluh and Microsoft Chief Privacy Officer and Corporate Vice President Julie Brill co-chaired the taskforce; TLS Senior Project Director Alex Joel …


Administrative Regulation Of Programmatic Policing: Why "Leaders Of A Beautiful Struggle" Is Both Right And Wrong, Christopher Slobogin Jul 2023

Administrative Regulation Of Programmatic Policing: Why "Leaders Of A Beautiful Struggle" Is Both Right And Wrong, Christopher Slobogin

Vanderbilt Law School Faculty Publications

In Leaders of a Beautiful Struggle v. Baltimore Police Department, the Fourth Circuit Court of Appeals held that Aerial Investigation Research (AIR), Baltimore's aerial surveillance program, violated the Fourth Amendment because it was not authorized by a warrant. AIR was constitutionaly problematic, but not for the reason given by the Fourth Circuit. AIR, like many other technologically-enhanced policing programs that rely on closed-circuit television (CCTV), automated license plate readers and the like, involves the collection and retention of information about huge numbers ofpeople. Because individualized suspicion does not exist with respect to any of these people's information, an individual-specific warrant …


National Telecommunications And Information Administration: Comments From Researchers At Boston University And The University Of Chicago, Ran Canetti, Aloni Cohen, Chris Conley, Mark Crovella, Stacey Dogan, Marco Gaboardi, Woodrow Hartzog, Rory Van Loo, Christopher Robertson, Katharine B. Silbaugh Jun 2023

National Telecommunications And Information Administration: Comments From Researchers At Boston University And The University Of Chicago, Ran Canetti, Aloni Cohen, Chris Conley, Mark Crovella, Stacey Dogan, Marco Gaboardi, Woodrow Hartzog, Rory Van Loo, Christopher Robertson, Katharine B. Silbaugh

Faculty Scholarship

These comments were composed by an interdisciplinary group of legal, computer science, and data science faculty and researchers at Boston University and the University of Chicago. This group collaborates on research projects that grapple with the legal, policy, and ethical implications of the use of algorithms and digital innovation in general, and more specifically regarding the use of online platforms, machine learning algorithms for classification, prediction, and decision making, and generative AI. Specific areas of expertise include the functionality and impact of recommendation systems; the development of Privacy Enhancing Technologies (PETs) and their relationship to privacy and data security laws; …


Opaque Notification: A Country-By-Country Review, Lauren Mantel Jun 2023

Opaque Notification: A Country-By-Country Review, Lauren Mantel

Joint PIJIP/TLS Research Paper Series

No abstract provided.


Femtechnodystopia, Leah R. Fowler, Michael Ulrich Jun 2023

Femtechnodystopia, Leah R. Fowler, Michael Ulrich

Faculty Scholarship

Reproductive rights, as we have long understood them, are dead. But at the same time history seems to be moving backward, technology moves relentlessly forward. Femtech products, a category of consumer technology addressing an array of “female” health needs, seem poised to fill gaps created by states and stakeholders eager to limit birth control and abortion access and increase pregnancy surveillance and fetal rights. Period and fertility tracking applications could supplement or replace other contraception. Early digital alerts to missed periods can improve the chances of obtaining a legal abortion in states with ever-shrinking windows of availability or prompt behavioral …


Artificial Intelligence Tools In Clinical Neuroradiology: Essential Medico-Legal Aspects, Dennis M. Hedderich, Christian Weisstanner, Sofie Van Cauter, Christian Federau, Myriam Edjlali, Alexander Radbruch, Sara Gerke, Sven Haller May 2023

Artificial Intelligence Tools In Clinical Neuroradiology: Essential Medico-Legal Aspects, Dennis M. Hedderich, Christian Weisstanner, Sofie Van Cauter, Christian Federau, Myriam Edjlali, Alexander Radbruch, Sara Gerke, Sven Haller

Faculty Scholarly Works

Commercial software based on artificial intelligence (AI) is entering clinical practice in neuroradiology. Consequently, medico-legal aspects of using Software as a Medical Device (SaMD) become increasingly important. These medico-legal issues warrant an interdisciplinary approach and may affect the way we work in daily practice. In this article, we seek to address three major topics: medical malpractice liability, regulation of AI-based medical devices, and privacy protection in shared medical imaging data, thereby focusing on the legal frameworks of the European Union and the USA. As many of the presented concepts are very complex and, in part, remain yet unsolved, this article …


The Health Care Industry Is Ready For A Revolution: Its Privacy Laws Are Not, Erin Rutherford May 2023

The Health Care Industry Is Ready For A Revolution: Its Privacy Laws Are Not, Erin Rutherford

Student Scholarship

This paper highlights the costs and benefits associated with the gathering, storing, analyzing, and digitizing of health information; examines current privacy laws and their inadequacies in the new and constantly changing digital health world; and then provides a proposal framework to balance encouraging innovation while protecting individual autonomy. The article specifically proceeds as follows. This paper first discusses of the evolution of the health industry, from paper records to the wide array of sources generating health information today. Next, it considers the benefits to the ever-increasing amount of health information, which, while considerable can often be in tension with privacy …


Necessity, Proportionality, And Executive Order 14086, Alex Joel May 2023

Necessity, Proportionality, And Executive Order 14086, Alex Joel

Joint PIJIP/TLS Research Paper Series

No abstract provided.


Consumers' Perceptions Of Digital Privacy In The United States And Japan, Destiny Randle May 2023

Consumers' Perceptions Of Digital Privacy In The United States And Japan, Destiny Randle

Whittier Scholars Program

The purpose of my study is to explore the contours of contemporary consumer privacy protections derived from legislation, regulations and publicly available company policies as a way to get a better understanding of how consumer data is protected. A few examples ranging from company-based consumer protection in the United States to data breaches in Japan will be explored and examined. Finally, this paper includes a comparative survey of consumer perceptions and concerns related to personal data privacy in the U.S. and Japan. As a way to assess the degree to which digital privacy and personal data breaches have adversely influenced …


A Game Theoretic Approach To Balance Privacy Risks And Familial Benefits, Ellen W. Clayton, Jia Guo, Murat Kantarcioglu, Et Al. Apr 2023

A Game Theoretic Approach To Balance Privacy Risks And Familial Benefits, Ellen W. Clayton, Jia Guo, Murat Kantarcioglu, Et Al.

Vanderbilt Law School Faculty Publications

As recreational genomics continues to grow in its popularity, many people are afforded the opportunity to share their genomes in exchange for various services, including third-party interpretation (TPI) tools, to understand their predisposition to health problems and, based on genome similarity, to find extended family members. At the same time, these services have increasingly been reused by law enforcement to track down potential criminals through family members who disclose their genomic information. While it has been observed that many potential users shy away from such data sharing when they learn that their privacy cannot be assured, it remains unclear how …


Confused About Copyright?, Sara Anne Hook Apr 2023

Confused About Copyright?, Sara Anne Hook

Graduate Scholarship and Professional Work

No abstract provided.


Who Owns Data? Constitutional Division In Cyberspace, Dongsheng Zang Apr 2023

Who Owns Data? Constitutional Division In Cyberspace, Dongsheng Zang

Articles

Privacy emerged as a concern as soon as the internet became commercial. In early 1995, Lawrence Lessig warned that the internet, though giving us extraordinary potential, was “not designed to protect individuals against this extraordinary potential for others to abuse.” The same technology can “destroy the very essence of what now defines individuality.” Lessig urged that “a constitutional balance will have to be drawn between these increasingly important interests in privacy, and the competing interest in collective security.” Lessig envisioned that creating property rights in data would help individuals by giving them control of their data. As utopian as property …


Technology Integration In Higher Education And Student Privacy Beyond Learning Environments -- A Comparison Of The Uk And Us Perspective, Iria Giuffrida, Alex Hall Jan 2023

Technology Integration In Higher Education And Student Privacy Beyond Learning Environments -- A Comparison Of The Uk And Us Perspective, Iria Giuffrida, Alex Hall

Faculty Publications

Technology integration in higher education (HE) has brought immense innovation. While research is investigating the benefits of leveraging, through learning analytics, the data created by the greater presence of technology in HE, it is also analysing the privacy implications of vast universes of data now at the fingertips of HE administrators. This paper argues that student privacy challenges linked to technology integration occur not only within but also beyond learning environments, namely at the enterprise level. By analysing the UK and US legal frameworks surrounding how HE institutions respond to parents demanding disclosure of their adult children's personal data in …


Toward Stronger Data Protection Laws, Margot E. Kaminski Jan 2023

Toward Stronger Data Protection Laws, Margot E. Kaminski

Publications

No abstract provided.


Governing Smart Cities As Knowledge Commons - Introduction, Chapter 1 & Conclusion, Brett M. Frischmann, Michael J. Madison, Madelyn Sanfilippo Jan 2023

Governing Smart Cities As Knowledge Commons - Introduction, Chapter 1 & Conclusion, Brett M. Frischmann, Michael J. Madison, Madelyn Sanfilippo

Book Chapters

Smart city technology has its value and its place; it isn’t automatically or universally harmful. Urban challenges and opportunities addressed via smart technology demand systematic study, examining general patterns and local variations as smart city practices unfold around the world. Smart cities are complex blends of community governance institutions, social dilemmas that cities face, and dynamic relationships among information and data, technology, and human lives. Some of those blends are more typical and common. Some are more nuanced in specific contexts. This volume uses the Governing Knowledge Commons (GKC) framework to sort out relevant and important distinctions. The framework grounds …


The Tesla Meets The Fourth Amendment, Adam M. Gershowitz Jan 2023

The Tesla Meets The Fourth Amendment, Adam M. Gershowitz

Faculty Publications

Can police search a smart car’s computer without a warrant? Although the Supreme Court banned warrantless searches of cell phones incident to arrest in Riley v. California, the Court left the door open for warrantless searches under other exceptions to the warrant requirement. This is the first article to argue that the Fourth Amendment’s automobile exception currently permits the police to warrantlessly dig into a vehicle’s computer system and extract vast amounts of cell phone data. Just as the police can rip open seats or slash tires to search for drugs under the automobile exception, the police can warrantlessly …