Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

Privacy Law

2016

Institution
Keyword
Publication

Articles 1 - 30 of 51

Full-Text Articles in Law

Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen Dec 2016

Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen

All Faculty Scholarship

Big Data is the vast quantities of information amenable to large-scale collection, storage, and analysis. Using such data, companies and researchers can deploy complex algorithms and artificial intelligence technologies to reveal otherwise unascertained patterns, links, behaviors, trends, identities, and practical knowledge. The information that comprises Big Data arises from government and business practices, consumer transactions, and the digital applications sometimes referred to as the “Internet of Things.” Individuals invisibly contribute to Big Data whenever they live digital lifestyles or otherwise participate in the digital economy, such as when they shop with a credit card, get treated at a hospital, apply …


The Privacy Policymaking Of State Attorneys General, Danielle K. Citron Dec 2016

The Privacy Policymaking Of State Attorneys General, Danielle K. Citron

Faculty Scholarship

Accounts of privacy law have focused on legislation, federal agencies, and the self-regulation of privacy professionals. Crucial agents of regulatory change, however, have been ignored: the state attorneys general. This article is the first in-depth study of the privacy norm entrepreneurship of state attorneys general. Because so little has been written about this phenomenon, I engaged with primary sources — first interviewing state attorneys general and current and former career staff, and then examining documentary evidence received through FOIA requests submitted to AG offices around the country.

Much as Justice Louis Brandeis imagined states as laboratories of the law, offices …


Reader Privacy In Digital Library Collaborations: Signs Of Commitment, Opportunities For Improvement, Anne Klinefelter Oct 2016

Reader Privacy In Digital Library Collaborations: Signs Of Commitment, Opportunities For Improvement, Anne Klinefelter

Faculty Publications

Libraries collaborate to digitize collections large and small in order to provide information with fewer geographical, temporal, or socio-economic barriers. These collaborations promise economy of scale and breadth of impact, both for access to content and for preservation of decaying print source material. Some suggest this increased access to information through the digital environment comes at the expense of reader privacy, a value that United States librarians have advanced for nearly eighty years. Multiplying risks to digital reader privacy are said to weaken librarians’ commitment to privacy of library use and to overwhelm libraries’ ability to ensure confidential access to …


Digital Self-Ownership: A Publicity-Rights Framework For Determining Employee Social Media Rights, Susan Park, Patricia Sánchez Abril Oct 2016

Digital Self-Ownership: A Publicity-Rights Framework For Determining Employee Social Media Rights, Susan Park, Patricia Sánchez Abril

Management Faculty Publications and Presentations

Imagine an upandcoming company hires you as one of its first employees. Passionate about your employer, you put in long hours doing everything from marketing to accounting to event planning. You are also proud of your employer's product, so you begin to publicize it to your friends through your social network accounts. (In fact, the company's founder is also one of your Facebook friends.) You tell your friends about the product launch, invite them to marketing events, and eventually blog about your industry, amassing a significant social media following while creating buzz about your employer. But one day, during layoffs …


Trending @ Rwu Law: Linn F. Freedman's Post: The Goal Of Gender Equality In Cybersecurity 08/23/2016, Linn F. Freedman Aug 2016

Trending @ Rwu Law: Linn F. Freedman's Post: The Goal Of Gender Equality In Cybersecurity 08/23/2016, Linn F. Freedman

Law School Blogs

No abstract provided.


Just Cause Discipline For Social Networking In The New Guilded Age: Will The Law Look The Other Way?, William A. Herbert, Alicia Mcnally Aug 2016

Just Cause Discipline For Social Networking In The New Guilded Age: Will The Law Look The Other Way?, William A. Herbert, Alicia Mcnally

Publications and Research

We live and work in an era with the moniker of the New Gilded Age to describe the growth in societal income inequality. The designation is not limited to evidence of the growing gap in wealth distribution, but also the sharp rise in employment without security, including contingent and part-time work. This article examines the state of workplace procedural protections against discipline as they relate to employee use of social media in the New Gilded Age. In our times, reactions to the rapid distribution of troublesome electronic communications through social networking tend to eclipse patience for enforceable workplace procedures. The …


Important Steps To Maintain The Privacy Of Patients In The Hospital, Savera Aziz Ali, Minaz Mawani, Gulshan Bano, Sumera Aziz Ali Aug 2016

Important Steps To Maintain The Privacy Of Patients In The Hospital, Savera Aziz Ali, Minaz Mawani, Gulshan Bano, Sumera Aziz Ali

School of Nursing & Midwifery

Women are considered as vulnerable groups in our society in spite of their defined women rights by various laws. This shows that unfortunately these laws are not implemented practically in the real life. Society is shaped by the individuals and everyone should be responsible for advocating their own rights as well as the right of others especially of the vulnerable groups within the population.


Surveillance By Algorithm: The Nsa, Computerized Intelligence Collection, And Human Rights, Peter Margulies Jul 2016

Surveillance By Algorithm: The Nsa, Computerized Intelligence Collection, And Human Rights, Peter Margulies

Law Faculty Scholarship

No abstract provided.


The Positive Law Model Of The Fourth Amendment, William Baude, James Y. Stern May 2016

The Positive Law Model Of The Fourth Amendment, William Baude, James Y. Stern

Faculty Publications

For fifty years, courts have used a “reasonable expectation of privacy” standard to define “searches” under the Fourth Amendment. As others have recognized, that doctrine is subjective, unpredictable, and conceptually confused, but viable alternatives have been slow to emerge. This Article supplies one.

We argue that Fourth Amendment protection should be anchored in background positive law. The touchstone of the search-and-seizure analysis should be whether government officials have done something forbidden to private parties. It is those actions that should be subjected to Fourth Amendment reasonableness review and the presumptive requirement to obtain a warrant. In short, Fourth Amendment protection …


13th Annual Diversity Symposium Dinner 04-07-2016, Roger Williams University School Of Law Apr 2016

13th Annual Diversity Symposium Dinner 04-07-2016, Roger Williams University School Of Law

School of Law Conferences, Lectures & Events

No abstract provided.


Unilateral Invasions Of Privacy, Roger Allan Ford Apr 2016

Unilateral Invasions Of Privacy, Roger Allan Ford

Law Faculty Scholarship

Most people seem to agree that individuals have too little privacy, and most proposals to address that problem focus on ways to give those users more information about, and more control over, how information about them is used. Yet in nearly all cases, information subjects are not the parties who make decisions about how information is collected, used, and disseminated; instead, outsiders make unilateral decisions to collect, use, and disseminate information about others. These potential privacy invaders, acting without input from information subjects, are the parties to whom proposals to protect privacy must be directed. This Article develops a theory …


Against Data Exceptionalism, Andrew Keane Woods Apr 2016

Against Data Exceptionalism, Andrew Keane Woods

Law Faculty Scholarly Articles

One of the great regulatory challenges of the Internet era—indeed, one of today's most pressing privacy questions—is how to define the limits of government access to personal data stored in the cloud. This is particularly true today because the cloud has gone global, raising a number of questions about the proper reach of one state's authority over cloud-based data. The prevailing response to these questions by scholars, practitioners, and major Internet companies like Google and Facebook has been to argue that data is different. Data is “unterritorial,” they argue, and therefore incompatible with existing territorial notions of jurisdiction. This Article …


Trending @ Rwu Law: Professor David Coombs's Post: Veterans Court's Decision Will Affect Rwu Law's Veterans Disability Field Clinic: 02-24-2016, David Coombs Feb 2016

Trending @ Rwu Law: Professor David Coombs's Post: Veterans Court's Decision Will Affect Rwu Law's Veterans Disability Field Clinic: 02-24-2016, David Coombs

Law School Blogs

No abstract provided.


Newsroom: Margulies On Apple V. Fbi Standoff 02-18-2016, Roger Williams University School Of Law Feb 2016

Newsroom: Margulies On Apple V. Fbi Standoff 02-18-2016, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


Newsroom: Freedman On Credit Reports 02-12-2016, Roger Williams University School Of Law Feb 2016

Newsroom: Freedman On Credit Reports 02-12-2016, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


Privacy Petitions And Institutional Legitimacy, Lauren Henry Scholz Feb 2016

Privacy Petitions And Institutional Legitimacy, Lauren Henry Scholz

Scholarly Publications

This Article argues that a petitions process for privacy concerns arising from new technologies would substantially aid in gauging privacy social norms and legitimating regulation of new technologies. An accessible, transparent petitions process would empower individuals who have privacy concerns by making their proposals for change more visible. Moreover, data accumulated from such a petitions process would provide the requisite information to enable institutions to incorporate social norms into privacy policy development. Hearing and responding to privacy petitions would build trust with the public regarding the role of government and large companies in shaping the modern privacy technical infrastructure. This …


Security And Privacy Must Not Be Traded Off Against Each Other, Tan K. B. Eugene Feb 2016

Security And Privacy Must Not Be Traded Off Against Each Other, Tan K. B. Eugene

Research Collection Yong Pung How School Of Law

Last week, a United States federal judge ordered Apple to assist the Federal Bureau of Investigation to gain entry into an encrypted iPhone used by Syed Rizwan Farook to know where Farook and his wife had been and who had helped them in their terrorist act last December. Farook and his wife shot and killed 14 people in San Bernardino, California, before the police killed them.


Data Breaches, Identity Theft And Article Iii Standing: Will The Supreme Court Resolve The Split In The Circuits, Bradford Mank Jan 2016

Data Breaches, Identity Theft And Article Iii Standing: Will The Supreme Court Resolve The Split In The Circuits, Bradford Mank

Faculty Articles and Other Publications

In data breach cases, the lower federal courts have split on the question of whether the plaintiffs meet Article III standing requirements for injury and causation. In its 2013 decision Clapper v. Amnesty International USA, the Supreme Court, in a case involving alleged electronic surveillance by the U.S. government’s National Security Agency, declared that a plaintiff alleging that it will suffer future injuries from a defendant’s allegedly improper conduct must show that such injuries are “certainly impending.” Since the Clapper decision, a majority of the lower federal courts addressing “lost data” or potential identity theft cases in which there is …


Biometric Identity, Jonathan T. Weinberg Jan 2016

Biometric Identity, Jonathan T. Weinberg

Law Faculty Research Publications

No abstract provided.


Community Economic Development, Legal Clinic Program Jan 2016

Community Economic Development, Legal Clinic Program

Course Descriptions and Information

This clinic emphasizes transactional practice skills. This clinic provides short term counseling in a broad range of small business matters such as corporations, limited liability companies, partnerships, intellectual property, copyright, trademark, privacy law, nonprofit organizations, art groups as well as the legal requirements for starting a small business. Students provide direct legal assistance, counseling, representation, community legal education, and informational materials to new and mature for-profit and non-profit organizations, individuals and community groups seeking to better the economic, social, equitable and cultural well-being of low income communities.


I'Ll See: How Surveillance Undermines Privacy By Eroding Trust, Richard Warner, Robert Sloan Jan 2016

I'Ll See: How Surveillance Undermines Privacy By Eroding Trust, Richard Warner, Robert Sloan

All Faculty Scholarship

No abstract provided.


Small Companies, Big Breaches: Why Current Data Protection Laws Fail American Consumers In Cases Of Third-Party Hacking, Kaylie Gioioso Jan 2016

Small Companies, Big Breaches: Why Current Data Protection Laws Fail American Consumers In Cases Of Third-Party Hacking, Kaylie Gioioso

Proxy

No abstract provided.


The Privacy Policymaking Of State Attorneys General, Danielle Keats Citron Jan 2016

The Privacy Policymaking Of State Attorneys General, Danielle Keats Citron

Faculty Scholarship

No abstract provided.


Une Nouvelle Course Aux Armements: Surveillance Des Donnees Informatiques Et Finance Dematerialisee (Big Data, Digital Finance, And The Surveillance Arms Race), Frank A. Pasquale Jan 2016

Une Nouvelle Course Aux Armements: Surveillance Des Donnees Informatiques Et Finance Dematerialisee (Big Data, Digital Finance, And The Surveillance Arms Race), Frank A. Pasquale

Faculty Scholarship

No abstract provided.


The Regulation Of Commercial Profiling — A Comparative Analysis, Indra Spiecker, Olivia Tambou, Paul Bernal, Margaret Hu, Carlos Alberto Molinaro Jan 2016

The Regulation Of Commercial Profiling — A Comparative Analysis, Indra Spiecker, Olivia Tambou, Paul Bernal, Margaret Hu, Carlos Alberto Molinaro

Scholarly Articles

The authors, all data protection experts, discuss the status of the relevant data protection regulatory framework on profiling in the business sector in sev eral countries worldwide, from the constitutional level to some individual regulation including the general attitude towards the topic. The EU perspective is presented on the basis of the present directives as well as the General Data Protection Regulation. The United Kingdom, Germany and France, as three of the largest EU Member States with partly highly differing regulatory approaches represent Member State law. Australia, Brazil and the US regulation exemplify the different integration of data protection standards …


Lawn Signs: A Fourth Amendment For Constitutional Curmudgeons, Andrew Ferguson Jan 2016

Lawn Signs: A Fourth Amendment For Constitutional Curmudgeons, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

What is the constitutional significance of the proverbial "keep off the grass" sign? This question — asked by curmudgeonly neighbors everywhere — has been given new currency in a recent decision by the United States Supreme Court. Indeed, Florida v. Jardines might have bestowed constitutional curmudgeons with significant new Fourth Amendment protections. By expressing expectations regarding — and control over — access to property, "the people" may be able to claim greater Fourth Amendment protections not only for their homes, but also for their persons, papers, and effects. This article launches a constitutionally grounded, but lighthearted campaign of citizen education …


Data Privacy And Inmate Recidivism, Chad Squitieri Jan 2016

Data Privacy And Inmate Recidivism, Chad Squitieri

Scholarly Articles

Private companies are awarded contracts to provide Internet technologies within jails and prisons. These correctional contractors often argue that their services can reduce recidivism rates by, for example, providing inmates with access to video messaging services where inmates can communicate with loved ones who are otherwise unable to travel to communicate in person. A close examination of the privacy policies offered by correctional contractors, however, reveals how efforts to reduce recidivism rates are undermined.

As this Essay will explain, correctional contractors collect sensitive data about inmates and the loved ones with whom they communicate. If this data is stolen or …


Privacy As Quasi-Property, Lauren Henry Scholz Jan 2016

Privacy As Quasi-Property, Lauren Henry Scholz

Scholarly Publications

Courts and commentators struggle to apply privacy law in a way that conforms to the intuitions of the average person. It is often assumed that the reason for this discrepancy is the absence of an agreed upon conceptual definition of privacy. In fact, the lack of a description of the interest invaded in a privacy matter is the more substantial hurdle. This Article provides such a description of the privacy interest.

Privacy is quasi-property. Quasi-property is a relational entitlement to exclude. Unlike real property, there is no freestanding right to exclude from a quasi-property interest absent reference to a relationship …


Classification Standards For Health Information: Ethical And Practical Approaches, Craig Konnoth Jan 2016

Classification Standards For Health Information: Ethical And Practical Approaches, Craig Konnoth

Publications

Secondary health information research requires vast quantities of data in order to make clinical and health delivery breakthroughs. Restrictive policies that limit the use of such information threaten to stymie this research. While the Notice of Proposed Rulemaking (NPRM) for the new Common Rule permits patients to provide broad consent for the use of their information for research, that policy offers insufficient flexibility. This Article suggests a flexible consenting system that allows patients to consent to a range of privacy risks. The details of the system will be fleshed out in future work.


Use Of Facial Recognition Technology For Medical Purposes: Balancing Privacy With Innovation, Seema Mohapatra Jan 2016

Use Of Facial Recognition Technology For Medical Purposes: Balancing Privacy With Innovation, Seema Mohapatra

Faculty Scholarship

No abstract provided.