Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Surveillance (5)
- Big data (4)
- Homeland security (2)
- Right of privacy (2)
- Social media (2)
-
- 5G (1)
- Bias (1)
- Big Data (1)
- Bill of Attainder Claus (1)
- Biometrics (1)
- Body cameras (1)
- Cities (1)
- Computers & privacy (1)
- Cybersurveillance (1)
- Data (1)
- Data Analytics (1)
- Definition (1)
- Dhs (1)
- Education software (1)
- FTC (1)
- Facebook (1)
- False light invasion of privacy (1)
- Federal Trade Commission (1)
- Fifth Amendment (1)
- First amendment (1)
- Fourth Amendment (1)
- Freedom of speech (1)
- Freedom of the press (1)
- Google (1)
- HIPAA (1)
- Publication Year
- Publication
Articles 1 - 19 of 19
Full-Text Articles in Law
“You Keep Using That Word”: Why Privacy Doesn’T Mean What Lawyers Think, Joshua A.T. Fairfield
“You Keep Using That Word”: Why Privacy Doesn’T Mean What Lawyers Think, Joshua A.T. Fairfield
Scholarly Articles
This article explores how the need to define privacy has impeded our ability to protect it in law.
The meaning of “privacy” is notoriously hard to pin down. This article contends that the problem is not with the word “privacy,” but with the act of trying to pin it down. The problem lies with the act of definition itself and is particularly acute when the words in question have deep-seated and longstanding common-language meanings, such as liberty, freedom, dignity, and certainly privacy. If one wishes to determine what words like these actually mean to people, definition is the wrong tool …
Making An Offer That Can't Be Refused: The Need For Reform In The Rules Governing Informed Consent And Doctor-Patient Agreements, Timothy C. Macdonnell
Making An Offer That Can't Be Refused: The Need For Reform In The Rules Governing Informed Consent And Doctor-Patient Agreements, Timothy C. Macdonnell
Scholarly Articles
On a daily basis, throughout the country, patients are required to sign informed consent forms regarding the care they receive from their doctors. Informed consent forms are an important part of ensuring patients are making an intelligent, autonomous decision regarding their healthcare based on the facts related to their particular situation. However, frequently these consent forms contain what amount to contract-like terms that require patients to permit doctors to substitute other healthcare providers to care for the patient under the doctor’s supervision (substituted caregiver terms). Often these terms are presented to patients on the eve of surgery and on a …
#Audited: Social Media And Tax Enforcement, Michelle Lyon Drumbl
#Audited: Social Media And Tax Enforcement, Michelle Lyon Drumbl
Scholarly Articles
With limited resources and a diminished budget, it is not surprising that the Internal Revenue Service would seek new tools to maximize its enforcement efficiency. Automation and technology provide new opportunities for the IRS, and in turn, present new concerns for taxpayers. In December 2018, the IRS signaled its interest in a tool to access publicly available social media profiles of individuals in order to “expedite IRS case resolution for existing compliance cases.” This has important implications for taxpayer privacy.
Moreover, the use of social media in tax enforcement may pose a particular harm to an especially vulnerable population: low-income …
Bad Actors: Authenticity, Inauthenticity, Speech, And Capitalism, Sarah C. Haan
Bad Actors: Authenticity, Inauthenticity, Speech, And Capitalism, Sarah C. Haan
Scholarly Articles
“Authenticity” has evolved into an important value that guides social media companies’ regulation of online speech. It is enforced through rules and practices that include real-name policies, Terms of Service requiring users to present only accurate information about themselves, community guidelines that prohibit “coordinated inauthentic behavior,” verification practices, product features, and more.
This Article critically examines authenticity regulation by the social media industry, including companies’ claims that authenticity is a moral virtue, an expressive value, and a pragmatic necessity for online communication. It explains how authenticity regulation provides economic value to companies engaged in “information capitalism,” “data capitalism,” and “surveillance …
The Ironic Privacy Act, Margaret Hu
The Ironic Privacy Act, Margaret Hu
Scholarly Articles
This Article contends that the Privacy Act of 1974, a law intended to engender trust in government records, can be implemented in a way that inverts its intent. Specifically, pursuant to the Privacy Act's reporting requirements, in September 2017, the U.S. Department of Homeland Security (DHS) notified the public that record systems would be modified to encompass the collection of social media data. The notification justified the collection of social media data as a part of national security screening and immigration vetting procedures. However, the collection will encompass social media data on both citizens and noncitizens, and was not explicitly …
Hardware, Heartware, Or Nightmare: Smart-City Technology And The Concomitant Erosion Of Privacy, Leila Lawlor
Hardware, Heartware, Or Nightmare: Smart-City Technology And The Concomitant Erosion Of Privacy, Leila Lawlor
Scholarly Articles
Smart-city technology is being adopted in cities all around the world to simplify our lives, save us time, ease traffic, improve education, reduce energy usage, and keep us healthy and safe. Its adoption is necessary because of changes that are predicted for urban dwellers over the next three decades; urban population and travel are predicted to increase dramatically and our population is graying, meaning the population will include a much greater number of elderly citizens. As these changes occur, smart-city technology can have a huge impact on public safety, improving the ability of law enforcement to investigate crimes, both with …
Bulk Biometric Metadata Collection, Margaret Hu
Bulk Biometric Metadata Collection, Margaret Hu
Scholarly Articles
Smart police body cameras and smart glasses worn by law enforcement increasingly reflect state-of-the-art surveillance technology, such as the integration of live-streaming video with facial recognition and artificial intelligence tools, including automated analytics. This Article explores how these emerging cybersurveillance technologies risk the potential for bulk biometric metadata collection. Such collection is likely to fall outside the scope of the types of bulk metadata collection protections regulated by the USA FREEDOM Act of 2015. The USA FREEDOM Act was intended to bring the practice of bulk telephony metadata collection conducted by the National Security Agency (“NSA”) under tighter regulation. In …
From The National Surveillance State To The Cybersurveillance State, Margaret Hu
From The National Surveillance State To The Cybersurveillance State, Margaret Hu
Scholarly Articles
This article anchors the phenomenon of bureaucratized cybersurveillance around the concept of the National Surveillance State, a theory attributed to Professor Jack Balkin of Yale Law School and Professor Sanford Levinson of the University of Texas School of Law. Pursuant to the theory of the National Surveillance State, because of the routinized and administrative nature of government-led surveillance, normalized mass surveillance is viewed as justified under crime and counterterrorism policy rationales. This article contends that the Cybersurveillance State is the successor to the National Surveillance State. The Cybersurveillance State harnesses technologies that fuse biometric and biographic data for risk assessment, …
Peeling Back The Student Privacy Pledge, Alexi Pfeffer-Gillett
Peeling Back The Student Privacy Pledge, Alexi Pfeffer-Gillett
Scholarly Articles
Education software is a multi-billion dollar industry that is rapidly growing. The federal government has encouraged this growth through a series of initiatives that reward schools for tracking and aggregating student data. Amid this increasingly digitized education landscape, parents and educators have begun to raise concerns about the scope and security of student data collection.
Industry players, rather than policymakers, have so far led efforts to protect student data. Central to these efforts is the Student Privacy Pledge, a set of standards that providers of digital education services have voluntarily adopted. By many accounts, the Pledge has been a success. …
The Regulation Of Commercial Profiling — A Comparative Analysis, Indra Spiecker, Olivia Tambou, Paul Bernal, Margaret Hu, Carlos Alberto Molinaro
The Regulation Of Commercial Profiling — A Comparative Analysis, Indra Spiecker, Olivia Tambou, Paul Bernal, Margaret Hu, Carlos Alberto Molinaro
Scholarly Articles
The authors, all data protection experts, discuss the status of the relevant data protection regulatory framework on profiling in the business sector in sev eral countries worldwide, from the constitutional level to some individual regulation including the general attitude towards the topic. The EU perspective is presented on the basis of the present directives as well as the General Data Protection Regulation. The United Kingdom, Germany and France, as three of the largest EU Member States with partly highly differing regulatory approaches represent Member State law. Australia, Brazil and the US regulation exemplify the different integration of data protection standards …
Juror Privacy In The Sixth Amendment Balance, Melanie D. Wilson
Juror Privacy In The Sixth Amendment Balance, Melanie D. Wilson
Scholarly Articles
Some eight million citizens report for jury duty every year. Arguably, jury duty is one of the most significant opportunities to participate in the democratic process. For the accused, the jury acts as an indispensable safeguard against government overreaching. One might expect, therefore, that our justice system would treat potential jurors with care and tact. The opposite is true. During voir dire, prospective jurors are required to share insights into their own lives, quirks, proclivities, and beliefs. Litigants have probed jurors’ sexual orientation, criminal histories, criminal victimization, health, family relations, and beyond. A few scholars have chided the system for …
Revisiting The American Action For Public Disclosure Of Facts, Brian C. Murchison
Revisiting The American Action For Public Disclosure Of Facts, Brian C. Murchison
Scholarly Articles
None available.
The "Do-Not-Call List" Controversy: A Parable Of Privacy And Speech, Rodney A. Smolla
The "Do-Not-Call List" Controversy: A Parable Of Privacy And Speech, Rodney A. Smolla
Scholarly Articles
None available.
Cracks In The Foundation: The New Internet Regulation's Hidden Threat To Privacy And Commerce, Joshua A.T. Fairfield
Cracks In The Foundation: The New Internet Regulation's Hidden Threat To Privacy And Commerce, Joshua A.T. Fairfield
Scholarly Articles
Scholarship to date has focused on the legal significance of the novelty of the Internet. This scholarship does not describe or predict actual Internet legislation. Instead of asking whether the Internet is so new as to merit new law, legislators and academics should re-evaluate the role of government in orchestrating collective action and change the relative weight of enforcement, deterrence, and incentives in Internet regulations.
A perfect example of the need for this new approach is the recent CANSPAM Act of 2003, which was intended to protect personal privacy and legitimate businesses. However, the law threatens both of these interests, …
Accounting For The Slow Growth Of American Privacy Law, Rodney A. Smolla
Accounting For The Slow Growth Of American Privacy Law, Rodney A. Smolla
Scholarly Articles
Not available.
Privacy And The First Amendment Right To Gather News, Rodney A. Smolla
Privacy And The First Amendment Right To Gather News, Rodney A. Smolla
Scholarly Articles
Not available.
Selective Service System V. Minnesota Public Interest Research Group, Lewis F. Powell Jr.
Selective Service System V. Minnesota Public Interest Research Group, Lewis F. Powell Jr.
Supreme Court Case Files
No abstract provided.
Nixon V. Administrator Of General Services, Lewis F. Powell Jr.
Nixon V. Administrator Of General Services, Lewis F. Powell Jr.
Supreme Court Case Files
No abstract provided.
Runyon V. Mccrary, Lewis F. Powell, Jr.
Runyon V. Mccrary, Lewis F. Powell, Jr.
Supreme Court Case Files
No abstract provided.