Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 19 of 19

Full-Text Articles in Law

“You Keep Using That Word”: Why Privacy Doesn’T Mean What Lawyers Think, Joshua A.T. Fairfield Jan 2022

“You Keep Using That Word”: Why Privacy Doesn’T Mean What Lawyers Think, Joshua A.T. Fairfield

Scholarly Articles

This article explores how the need to define privacy has impeded our ability to protect it in law.

The meaning of “privacy” is notoriously hard to pin down. This article contends that the problem is not with the word “privacy,” but with the act of trying to pin it down. The problem lies with the act of definition itself and is particularly acute when the words in question have deep-seated and longstanding common-language meanings, such as liberty, freedom, dignity, and certainly privacy. If one wishes to determine what words like these actually mean to people, definition is the wrong tool …


Making An Offer That Can't Be Refused: The Need For Reform In The Rules Governing Informed Consent And Doctor-Patient Agreements, Timothy C. Macdonnell Jan 2022

Making An Offer That Can't Be Refused: The Need For Reform In The Rules Governing Informed Consent And Doctor-Patient Agreements, Timothy C. Macdonnell

Scholarly Articles

On a daily basis, throughout the country, patients are required to sign informed consent forms regarding the care they receive from their doctors. Informed consent forms are an important part of ensuring patients are making an intelligent, autonomous decision regarding their healthcare based on the facts related to their particular situation. However, frequently these consent forms contain what amount to contract-like terms that require patients to permit doctors to substitute other healthcare providers to care for the patient under the doctor’s supervision (substituted caregiver terms). Often these terms are presented to patients on the eve of surgery and on a …


#Audited: Social Media And Tax Enforcement, Michelle Lyon Drumbl Jan 2021

#Audited: Social Media And Tax Enforcement, Michelle Lyon Drumbl

Scholarly Articles

With limited resources and a diminished budget, it is not surprising that the Internal Revenue Service would seek new tools to maximize its enforcement efficiency. Automation and technology provide new opportunities for the IRS, and in turn, present new concerns for taxpayers. In December 2018, the IRS signaled its interest in a tool to access publicly available social media profiles of individuals in order to “expedite IRS case resolution for existing compliance cases.” This has important implications for taxpayer privacy.

Moreover, the use of social media in tax enforcement may pose a particular harm to an especially vulnerable population: low-income …


Bad Actors: Authenticity, Inauthenticity, Speech, And Capitalism, Sarah C. Haan Jan 2020

Bad Actors: Authenticity, Inauthenticity, Speech, And Capitalism, Sarah C. Haan

Scholarly Articles

“Authenticity” has evolved into an important value that guides social media companies’ regulation of online speech. It is enforced through rules and practices that include real-name policies, Terms of Service requiring users to present only accurate information about themselves, community guidelines that prohibit “coordinated inauthentic behavior,” verification practices, product features, and more.

This Article critically examines authenticity regulation by the social media industry, including companies’ claims that authenticity is a moral virtue, an expressive value, and a pragmatic necessity for online communication. It explains how authenticity regulation provides economic value to companies engaged in “information capitalism,” “data capitalism,” and “surveillance …


The Ironic Privacy Act, Margaret Hu Jan 2019

The Ironic Privacy Act, Margaret Hu

Scholarly Articles

This Article contends that the Privacy Act of 1974, a law intended to engender trust in government records, can be implemented in a way that inverts its intent. Specifically, pursuant to the Privacy Act's reporting requirements, in September 2017, the U.S. Department of Homeland Security (DHS) notified the public that record systems would be modified to encompass the collection of social media data. The notification justified the collection of social media data as a part of national security screening and immigration vetting procedures. However, the collection will encompass social media data on both citizens and noncitizens, and was not explicitly …


Hardware, Heartware, Or Nightmare: Smart-City Technology And The Concomitant Erosion Of Privacy, Leila Lawlor Jan 2019

Hardware, Heartware, Or Nightmare: Smart-City Technology And The Concomitant Erosion Of Privacy, Leila Lawlor

Scholarly Articles

Smart-city technology is being adopted in cities all around the world to simplify our lives, save us time, ease traffic, improve education, reduce energy usage, and keep us healthy and safe. Its adoption is necessary because of changes that are predicted for urban dwellers over the next three decades; urban population and travel are predicted to increase dramatically and our population is graying, meaning the population will include a much greater number of elderly citizens. As these changes occur, smart-city technology can have a huge impact on public safety, improving the ability of law enforcement to investigate crimes, both with …


Bulk Biometric Metadata Collection, Margaret Hu Jan 2018

Bulk Biometric Metadata Collection, Margaret Hu

Scholarly Articles

Smart police body cameras and smart glasses worn by law enforcement increasingly reflect state-of-the-art surveillance technology, such as the integration of live-streaming video with facial recognition and artificial intelligence tools, including automated analytics. This Article explores how these emerging cybersurveillance technologies risk the potential for bulk biometric metadata collection. Such collection is likely to fall outside the scope of the types of bulk metadata collection protections regulated by the USA FREEDOM Act of 2015. The USA FREEDOM Act was intended to bring the practice of bulk telephony metadata collection conducted by the National Security Agency (“NSA”) under tighter regulation. In …


From The National Surveillance State To The Cybersurveillance State, Margaret Hu Jan 2017

From The National Surveillance State To The Cybersurveillance State, Margaret Hu

Scholarly Articles

This article anchors the phenomenon of bureaucratized cybersurveillance around the concept of the National Surveillance State, a theory attributed to Professor Jack Balkin of Yale Law School and Professor Sanford Levinson of the University of Texas School of Law. Pursuant to the theory of the National Surveillance State, because of the routinized and administrative nature of government-led surveillance, normalized mass surveillance is viewed as justified under crime and counterterrorism policy rationales. This article contends that the Cybersurveillance State is the successor to the National Surveillance State. The Cybersurveillance State harnesses technologies that fuse biometric and biographic data for risk assessment, …


Peeling Back The Student Privacy Pledge, Alexi Pfeffer-Gillett Jan 2017

Peeling Back The Student Privacy Pledge, Alexi Pfeffer-Gillett

Scholarly Articles

Education software is a multi-billion dollar industry that is rapidly growing. The federal government has encouraged this growth through a series of initiatives that reward schools for tracking and aggregating student data. Amid this increasingly digitized education landscape, parents and educators have begun to raise concerns about the scope and security of student data collection.

Industry players, rather than policymakers, have so far led efforts to protect student data. Central to these efforts is the Student Privacy Pledge, a set of standards that providers of digital education services have voluntarily adopted. By many accounts, the Pledge has been a success. …


The Regulation Of Commercial Profiling — A Comparative Analysis, Indra Spiecker, Olivia Tambou, Paul Bernal, Margaret Hu, Carlos Alberto Molinaro Jan 2016

The Regulation Of Commercial Profiling — A Comparative Analysis, Indra Spiecker, Olivia Tambou, Paul Bernal, Margaret Hu, Carlos Alberto Molinaro

Scholarly Articles

The authors, all data protection experts, discuss the status of the relevant data protection regulatory framework on profiling in the business sector in sev eral countries worldwide, from the constitutional level to some individual regulation including the general attitude towards the topic. The EU perspective is presented on the basis of the present directives as well as the General Data Protection Regulation. The United Kingdom, Germany and France, as three of the largest EU Member States with partly highly differing regulatory approaches represent Member State law. Australia, Brazil and the US regulation exemplify the different integration of data protection standards …


Juror Privacy In The Sixth Amendment Balance, Melanie D. Wilson Jan 2012

Juror Privacy In The Sixth Amendment Balance, Melanie D. Wilson

Scholarly Articles

Some eight million citizens report for jury duty every year. Arguably, jury duty is one of the most significant opportunities to participate in the democratic process. For the accused, the jury acts as an indispensable safeguard against government overreaching. One might expect, therefore, that our justice system would treat potential jurors with care and tact. The opposite is true. During voir dire, prospective jurors are required to share insights into their own lives, quirks, proclivities, and beliefs. Litigants have probed jurors’ sexual orientation, criminal histories, criminal victimization, health, family relations, and beyond. A few scholars have chided the system for …


Revisiting The American Action For Public Disclosure Of Facts, Brian C. Murchison Jan 2006

Revisiting The American Action For Public Disclosure Of Facts, Brian C. Murchison

Scholarly Articles

None available.


The "Do-Not-Call List" Controversy: A Parable Of Privacy And Speech, Rodney A. Smolla Jan 2005

The "Do-Not-Call List" Controversy: A Parable Of Privacy And Speech, Rodney A. Smolla

Scholarly Articles

None available.


Cracks In The Foundation: The New Internet Regulation's Hidden Threat To Privacy And Commerce, Joshua A.T. Fairfield Jan 2004

Cracks In The Foundation: The New Internet Regulation's Hidden Threat To Privacy And Commerce, Joshua A.T. Fairfield

Scholarly Articles

Scholarship to date has focused on the legal significance of the novelty of the Internet. This scholarship does not describe or predict actual Internet legislation. Instead of asking whether the Internet is so new as to merit new law, legislators and academics should re-evaluate the role of government in orchestrating collective action and change the relative weight of enforcement, deterrence, and incentives in Internet regulations.

A perfect example of the need for this new approach is the recent CANSPAM Act of 2003, which was intended to protect personal privacy and legitimate businesses. However, the law threatens both of these interests, …


Accounting For The Slow Growth Of American Privacy Law, Rodney A. Smolla Jan 2002

Accounting For The Slow Growth Of American Privacy Law, Rodney A. Smolla

Scholarly Articles

Not available.


Privacy And The First Amendment Right To Gather News, Rodney A. Smolla Jun 1999

Privacy And The First Amendment Right To Gather News, Rodney A. Smolla

Scholarly Articles

Not available.


Selective Service System V. Minnesota Public Interest Research Group, Lewis F. Powell Jr. Oct 1983

Selective Service System V. Minnesota Public Interest Research Group, Lewis F. Powell Jr.

Supreme Court Case Files

No abstract provided.


Nixon V. Administrator Of General Services, Lewis F. Powell Jr. Oct 1976

Nixon V. Administrator Of General Services, Lewis F. Powell Jr.

Supreme Court Case Files

No abstract provided.


Runyon V. Mccrary, Lewis F. Powell, Jr. Oct 1975

Runyon V. Mccrary, Lewis F. Powell, Jr.

Supreme Court Case Files

No abstract provided.