Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Boston University School of Law (9)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (4)
- Georgetown University Law Center (3)
- Maurer School of Law: Indiana University (3)
- New York Law School (3)
-
- Roger Williams University (3)
- Schulich School of Law, Dalhousie University (3)
- University of Colorado Law School (3)
- University of Michigan Law School (3)
- University of Nebraska - Lincoln (3)
- American University Washington College of Law (2)
- California Western School of Law (2)
- SJ Quinney College of Law, University of Utah (2)
- St. John's University School of Law (2)
- Texas A&M University School of Law (2)
- University of New Hampshire (2)
- Vanderbilt University Law School (2)
- Washington and Lee University School of Law (2)
- William & Mary Law School (2)
- Brooklyn Law School (1)
- Case Western Reserve University School of Law (1)
- Columbia Law School (1)
- Duke Law (1)
- Emory University School of Law (1)
- Florida State University College of Law (1)
- Georgia State University College of Law (1)
- Notre Dame Law School (1)
- Pace University (1)
- SIT Graduate Institute/SIT Study Abroad (1)
- Singapore Management University (1)
- Keyword
-
- Privacy (31)
- Surveillance (7)
- Fourth Amendment (6)
- Data protection (5)
- Big data (4)
-
- Data privacy (4)
- First Amendment (4)
- Sexual privacy (4)
- Technology (4)
- Consent (3)
- GDPR (3)
- Lawyers (3)
- Police (3)
- Social media (3)
- Speech (3)
- Tax (3)
- Transparency (3)
- Algorithms (2)
- Artificial intelligence (2)
- Business (2)
- Contextual privacy (2)
- Cyber civil rights (2)
- Cyber harassment (2)
- Defamation (2)
- Expert (2)
- Expressive role of law (2)
- Expressive theory (2)
- Freedom of expression (2)
- Health data (2)
- Information privacy (2)
- Publication
-
- Faculty Scholarship (15)
- Articles (4)
- Faculty Publications (4)
- Scholarly Works (4)
- Articles & Chapters (3)
-
- Articles by Maurer Faculty (3)
- Articles, Book Chapters, & Popular Press (3)
- Georgetown Law Faculty Publications and Other Works (3)
- Library Philosophy and Practice (e-journal) (3)
- Publications (3)
- Articles in Law Reviews & Other Academic Journals (2)
- Law Faculty Scholarship (2)
- Life of the Law School (1993- ) (2)
- Scholarly Articles (2)
- Utah Law Faculty Scholarship (2)
- Vanderbilt Law School Faculty Publications (2)
- AI-DR Collection (1)
- All Faculty Scholarship (1)
- Centre for AI & Data Governance (1)
- Faculty Articles (1)
- Faculty Publications By Year (1)
- Honors College Theses (1)
- Independent Study Project (ISP) Collection (1)
- Journal Articles (1)
- Maryland Law Review Online (1)
- Scholarly Publications (1)
- School of Law Conferences, Lectures & Events (1)
- Student Award Winning Papers (1)
- Student Scholarship (1)
- UF Law Faculty Publications (1)
Articles 1 - 30 of 71
Full-Text Articles in Law
Deep Fakes: A Looming Challenge For Privacy, Democracy, And National Security, Danielle K. Citron, Robert Chesney
Deep Fakes: A Looming Challenge For Privacy, Democracy, And National Security, Danielle K. Citron, Robert Chesney
Faculty Scholarship
Harmful lies are nothing new. But the ability to distort reality has taken an exponential leap forward with “deep fake” technology. This capability makes it possible to create audio and video of real people saying and doing things they never said or did. Machine learning techniques are escalating the technology’s sophistication, making deep fakes ever more realistic and increasingly resistant to detection. Deep-fake technology has characteristics that enable rapid and widespread diffusion, putting it into the hands of both sophisticated and unsophisticated actors. While deep-fake technology will bring with it certain benefits, it also will introduce many harms. The marketplace …
Law School News: Logan To Serve As Adviser On Restatement Third Of Torts 11-07-2019, Michael M. Bowden
Law School News: Logan To Serve As Adviser On Restatement Third Of Torts 11-07-2019, Michael M. Bowden
Life of the Law School (1993- )
No abstract provided.
Smile, You're On Camera: A Discussion Of The Privacy Rights Of Teachers In The Modern Day Classroom, Dakota Brewer
Smile, You're On Camera: A Discussion Of The Privacy Rights Of Teachers In The Modern Day Classroom, Dakota Brewer
Student Scholarship
Part II of this Article will first explain the purpose of wiretap (or recording) laws. It will then track the development of wiretap laws at the federal and state levels and illustrate several important distinctions. Part III will discuss the evolution of the Fourth Amendment in the United States. It will also examine how the Fourth Amendment and wiretap laws work together and how they apply to teachers. Part IV will look at the inadequacy of current legal remedies available to teachers who are surreptitiously recorded. It will then set forth possible district and classroom policies to help prevent recordings. …
Contracting For Fourth Amendment Privacy Online, Wayne A. Logan, Jake Linford
Contracting For Fourth Amendment Privacy Online, Wayne A. Logan, Jake Linford
Scholarly Publications
No abstract provided.
Data Scams, Roger Allan Ford
Data Scams, Roger Allan Ford
Law Faculty Scholarship
Targeting platforms like Google and Facebook are usually seen as presenting tradeoffs between utility and privacy. This Article identifies and describes a different, non-privacy cost of targeting platforms: they make it easier for malicious actors to scam others. They do this by making it easier for scammers to reach the most promising victims, hide from law-enforcement authorities and others, and develop better scams. Technology offers potential solutions, since the same data and targeting tools that enable scams could help detect and prevent them, though neither platforms nor law-enforcement officials have both the incentives and expertise needed to develop and deploy …
Why Sexual Privacy Matters For Trust, Danielle K. Citron
Why Sexual Privacy Matters For Trust, Danielle K. Citron
Faculty Scholarship
Every generation’s intimates have their preferred modes of self-disclosure. Not long ago, intimate partners exchanged love letters and mixed tapes. They spent hours on the phone. Today, they text their innermost thoughts, beliefs, and wishes, sometimes with nude photos attached. They engage in sexually-explicit activity via FaceTime and SnapChat.
Now, as then, the success and integrity of intimate relationships depends upon sexual privacy. Intimate relationships develop as partners grow to trust one another to treat their nakedness, deepest secrets, and sexual desires as they hope rather than as they fear. Handling partners’ personal information with discretion lays the foundation for …
Open Banking: Regulatory Challenges For A New Form Of Financial Intermediation In A Data-Driven World, Nydia Remolina
Open Banking: Regulatory Challenges For A New Form Of Financial Intermediation In A Data-Driven World, Nydia Remolina
Centre for AI & Data Governance
Data has taken immense importance in the last years. Consider the amount of data that is being collected worldwide every day, industries are reshaping their activities into a data-driven business. The digital transformation of all industries, portent of the fourth industrial revolution, is creating a new kind of economy based on the datafication of almost any aspect of human social, political and economic activity as a result of the information generated by the numerous daily routines of digitally connected individuals and technology. The financial services industry is part of this trend. Embracing the digital revolution and creating the right foundations …
The Missing Regulatory State: Monitoring Businesses In An Age Of Surveillance, Rory Van Loo
The Missing Regulatory State: Monitoring Businesses In An Age Of Surveillance, Rory Van Loo
Faculty Scholarship
An irony of the information age is that the companies responsible for the most extensive surveillance of individuals in history—large platforms such as Amazon, Facebook, and Google—have themselves remained unusually shielded from being monitored by government regulators. But the legal literature on state information acquisition is dominated by the privacy problems of excess collection from individuals, not businesses. There has been little sustained attention to the problem of insufficient information collection from businesses. This Article articulates the administrative state’s normative framework for monitoring businesses and shows how that framework is increasingly in tension with privacy concerns. One emerging complication is …
Privacidad Digital En Ecuador: El Papel De La Vigilancia, La Jurisprudencia Y Los Derechos Humanos, Giselle Valdez
Privacidad Digital En Ecuador: El Papel De La Vigilancia, La Jurisprudencia Y Los Derechos Humanos, Giselle Valdez
Independent Study Project (ISP) Collection
Este documento es un estudio de caso sobre la privacidad digital en Ecuador, cómo se protege y cómo se debe mejorar las protecciones. Comienzo presentando la falta de privacidad de la persona en Ecuador, a través de la reciente violación de datos y las tecnologías de vigilancia en todo el país desde China. Luego, para analizar la jurisprudencia y la falta de protección de la privacidad en la ley, hago la transición a un análisis legal de la privacidad de datos en Ecuador a través de la Constitución de 2008. Cuando establezco que falta privacidad digital en Ecuador, demuestro una …
Review Of Ian Kerr And Jane Bailey, The Implications Of Digital Rights Management For Privacy And Freedom Of Expression, 2 Journal Of Information, Communication & Ethics In Society 87 (2004), Ann Bartow
Law Faculty Scholarship
Ian Kerr, who passed away far too young in 2019, was an incisive scholar and a much treasured colleague. The wit that sparkled in his papers was matched only by his warmth toward his friends, of whom there were many. He and his many co-authors wrote with deep insight and an equally deep humanity about copyright, artificial intelligence, privacy, torts, and much much more.
Ian was also a valued contributor to the Jotwell Technology Law section. His reviews here display the same playful generosity that characterized everything else he did. In tribute to his memory, we are publishing a memorial …
The Professor Anthony J. Santoro Business Law Lecture Series Presents Becoming A Valued Business Lawyer, Roger Williams University School Of Law, Michael M. Bowden
The Professor Anthony J. Santoro Business Law Lecture Series Presents Becoming A Valued Business Lawyer, Roger Williams University School Of Law, Michael M. Bowden
School of Law Conferences, Lectures & Events
No abstract provided.
Towards Standard Information Privacy, Innovations Of The New General Data Protection Regulation, Ali Alibeigi, Abu Bakar Munir, Md Ershadulkarim, Adeleh Asemi
Towards Standard Information Privacy, Innovations Of The New General Data Protection Regulation, Ali Alibeigi, Abu Bakar Munir, Md Ershadulkarim, Adeleh Asemi
Library Philosophy and Practice (e-journal)
Protection of personal data in recent decades became more crucial affecting by emergence of the new technologies especially computer, internet, information and communications technology. However, Europeans felt this necessity at time and provided for up-to-date and supportive laws. The General Data Protection Regulation (GDPR) is the latest legislation in EU to protect personal data of individuals based on the recent technological advancements. However, its’ domestic and international output still is debatable. This doctrinal legal study by using descriptive methods, aimed to evaluate the GDPR through analyzing and interpreting its’ provisions by especial focus on its’ innovations. The results show that …
Functional Secrecy, Laura K. Donohue
Functional Secrecy, Laura K. Donohue
Georgetown Law Faculty Publications and Other Works
Many theorists consider secrecy inimical to liberal democracy. Precise examination of the role that it plays in contemporary government, however, including its strengths and weaknesses, has been limited. This chapter, accordingly, lays out a functional theory of secrecy, considering its role in the three branches of government in four contexts: deliberation, information security, law, and adjudicatory processes. Whether and to what extent cloaking information advances the interests of the state and society varies according to how it operates in each category. First, deliberative secrecy carries significant advantages: it can facilitate informed debate and honest exchange, allowing individuals to alter their …
Catalyzing Privacy Law, Anupam Chander, Margot E. Kaminski, William Mcgeveran
Catalyzing Privacy Law, Anupam Chander, Margot E. Kaminski, William Mcgeveran
Georgetown Law Faculty Publications and Other Works
The United States famously lacks a comprehensive federal data privacy law. In the past year, however, over half the states have proposed broad privacy bills or have established task forces to propose possible privacy legislation. Meanwhile, congressional committees are holding hearings on multiple privacy bills. What is catalyzing this legislative momentum? Some believe that Europe’s General Data Protection Regulation (GDPR), which came into force in 2018, is the driving factor. But with the California Consumer Privacy Act (CCPA) which took effect in January 2020, California has emerged as an alternate contender in the race to set the new standard for …
Algorithms At Work: Productivity Monitoring Applications And Wearable Technology As The New Data-Centric Research Agenda For Employment And Labor Law, Ifeoma Ajunwa
AI-DR Collection
Recent work technology advancements such as productivity monitoring platforms and wearable technology have given rise to new organizational behavior regarding the management of employees and also prompt new legal questions regarding the protection of workers’ privacy rights. In this Essay, I argue that the proliferation of productivity monitoring applications and wearable technologies will lead to new legal controversies for employment and labor law. In Part I, I assert that productivity monitoring applications will prompt a new reckoning of the balance between the employer’s pecuniary interests in monitoring productivity and the employees’ privacy interests. Ironically, such applications may also be both …
Automated License Plate Readers: The Difficult Balance Of Solving Crime And Protecting Individual Privacy, Lauren Fash
Automated License Plate Readers: The Difficult Balance Of Solving Crime And Protecting Individual Privacy, Lauren Fash
Maryland Law Review Online
No abstract provided.
Location Tracking And Digital Data: Can Carpenter Build A Stable Privacy Doctrine?, Evan H. Caminker
Location Tracking And Digital Data: Can Carpenter Build A Stable Privacy Doctrine?, Evan H. Caminker
Articles
In Carpenter v United States, the Supreme Court struggled to modernize twentieth-century search and seizure precedents for the “Cyber Age.” Twice previously this decade the Court had tweaked Fourth Amendment doctrine to keep pace with advancing technology, requiring a search warrant before the government can either peruse the contents of a cell phone seized incident to arrest or use a GPS tracker to follow a car’s long-term movements.
The Law Of Genetic Privacy: Applications, Implications, And Limitations, Ellen Wright Clayton, Barbara J. Evans, James W. Hazel, Mark A. Rothstein
The Law Of Genetic Privacy: Applications, Implications, And Limitations, Ellen Wright Clayton, Barbara J. Evans, James W. Hazel, Mark A. Rothstein
Vanderbilt Law School Faculty Publications
Recent advances in technology have significantly improved the accuracy of genetic testing and analysis, and substantially reduced its cost, resulting in a dramatic increase in the amount of genetic information generated, analysed, shared, and stored by diverse individuals and entities. Given the diversity of actors and their interests, coupled with the wide variety of ways genetic data are held, it has been difficult to develop broadly applicable legal principles for genetic privacy. This article examines the current landscape of genetic privacy to identify the roles that the law does or should play, with a focus on federal statutes and regulations, …
Privacy Law Disparities Between The United States And The European Union, Brandon Deluca
Privacy Law Disparities Between The United States And The European Union, Brandon Deluca
Honors College Theses
Data is the world’s most valuable resource today. In the 21st century, big data has overtaken the world’s commonly known large industries to become one of the most sought after markets, and companies pay to own this data (The Economist, 2017). Advertisements may have been targeted towards demographics such as race or sex in past years. However, in the digital age, the capability exists to push advertisements to the screens of specific users with known interests. This has been made possible, in part, by unregulated data collection practices across the globe, including in the United States and the European Union. …
Mugshots And The Press-Privacy Dilemma, Amy Gajda
Mugshots And The Press-Privacy Dilemma, Amy Gajda
Faculty Scholarship
No abstract provided.
When Law Frees Us To Speak, Danielle K. Citron, Jonathon Penney
When Law Frees Us To Speak, Danielle K. Citron, Jonathon Penney
Faculty Scholarship
A central aim of online abuse is to silence victims. That effort is as regrettable as it is successful. In the face of cyber harassment and sexual privacy invasions, women and marginalized groups retreat from online engagement. These documented chilling effects, however, are not inevitable. Beyond its deterrent function, law has an equally important expressive role. In this article, we highlight law’s capacity to shape social norms and behavior through education. We focus on a neglected dimension of law’s expressive role—its capacity to empower victims to express their truths and engage with others. Our argument is theoretical and empirical. We …
The Normative Fourth Amendment, Matthew Tokson
The Normative Fourth Amendment, Matthew Tokson
Utah Law Faculty Scholarship
For decades, courts have used a “reasonable expectation of privacy” standard to determine whether a government action is a Fourth Amendment search. Scholars have convincingly argued that this test is incoherent, arbitrary, and incapable of protecting privacy against modern forms of surveillance. Yet few alternatives have been proposed, and those alternatives pose many of the same problems as the current standard.
This Article offers a new theoretical approach for determining the scope of the Fourth Amendment. It develops a normative model of Fourth Amendment searches, one that explicitly addresses the balance between law enforcement effectiveness and citizens’ interests inherent in …
Sexual Privacy, Danielle K. Citron
Sexual Privacy, Danielle K. Citron
Faculty Scholarship
Those who wish to control, expose, and damage the identities of individuals routinely do so by invading their privacy. People are secretly recorded in bedrooms and public bathrooms and “up their skirts.” Such images are used to coerce people into sharing nude photographs and filming sex acts under the threat of public disclosure. People’s nude images are posted online without permission. Machine-learning technology is used to create digitally manipulated “deep fake” sex videos that swap people’s faces into pornography.
Each of these abuses is an invasion of sexual privacy—the behaviors, expectations, and choices that manage access to and information about …
Achieving The Goals Of The Value-Based Purchasing Program: Defining A Standard For External Data Use, Svetlana Makoviy
Achieving The Goals Of The Value-Based Purchasing Program: Defining A Standard For External Data Use, Svetlana Makoviy
Student Award Winning Papers
In our society, artificial intelligence technology has permeated through every aspect of human life. By the end of 2019, more than 60 million Americans will use some kind of smartwatch, whether a Fitbit or an Apple Watch as a part of their daily routine. Further, over 58% of people currently use a healthcare-related mobile application, such as MyFitnessPal or Nike+ Running. Health and fitness application usage increased by over 330% in the last three years. Unsurprisingly, healthcare-related data is one of the fastest growing and financially valuable data pools in the country, if not worldwide. The volume of data generated …
The Right Of Publicity's Intellectual Property Turn, Jennifer E. Rothman
The Right Of Publicity's Intellectual Property Turn, Jennifer E. Rothman
All Faculty Scholarship
The Article is adapted from a keynote lecture about my book, THE RIGHT OF PUBLICITY: PRIVACY REIMAGINED FOR A PUBLIC WORLD (Harvard Univ. Press 2018), delivered at Columbia Law School for its symposium, “Owning Personality: The Expanding Right of Publicity.” The book challenges the conventional historical and theoretical understanding of the right of publicity. By uncovering the history of the right of publicity’s development, the book reveals solutions to current clashes with free speech, individual liberty, and copyright law, as well as some opportunities for better protecting privacy in the digital age.
The lecture (as adapted for this Article) explores …
Data Re-Use And The Problem Of Group Identity, Leslie Francis, John G. Francis
Data Re-Use And The Problem Of Group Identity, Leslie Francis, John G. Francis
Utah Law Faculty Scholarship
Reusing existing data sets of health information for public health or medical research has much to recommend it. Much data repurposing in medical or public health research or practice involves information that has been stripped of individual identifiers but some does not. In some cases, there may have been consent to the reuse but in other cases consent may be absent and people may be entirely unaware of how the data about them are being used. Data sets are also being combined and may contain information with very different sources, consent histories, and individual identifiers. Much of the ethical and …
Law School News: A Spring Break That Teaches - And Gives Back 03/11/2019, Edward Fitzpatrick
Law School News: A Spring Break That Teaches - And Gives Back 03/11/2019, Edward Fitzpatrick
Life of the Law School (1993- )
No abstract provided.
The Public Information Fallacy, Woodrow Hartzog
The Public Information Fallacy, Woodrow Hartzog
Faculty Scholarship
The concept of privacy in “public” information or acts is a perennial topic for debate. It has given privacy law fits. People struggle to reconcile the notion of protecting information that has been made public with traditional accounts of privacy. As a result, successfully labeling information as public often functions as a permission slip for surveillance and personal data practices. It has also given birth to a significant and persistent misconception — that public information is an established and objective concept.
In this article, I argue that the “no privacy in public” justification is misguided because nobody knows what “public” …
The Ironic Privacy Act, Margaret Hu
The Ironic Privacy Act, Margaret Hu
Scholarly Articles
This Article contends that the Privacy Act of 1974, a law intended to engender trust in government records, can be implemented in a way that inverts its intent. Specifically, pursuant to the Privacy Act's reporting requirements, in September 2017, the U.S. Department of Homeland Security (DHS) notified the public that record systems would be modified to encompass the collection of social media data. The notification justified the collection of social media data as a part of national security screening and immigration vetting procedures. However, the collection will encompass social media data on both citizens and noncitizens, and was not explicitly …
Hardware, Heartware, Or Nightmare: Smart-City Technology And The Concomitant Erosion Of Privacy, Leila Lawlor
Hardware, Heartware, Or Nightmare: Smart-City Technology And The Concomitant Erosion Of Privacy, Leila Lawlor
Scholarly Articles
Smart-city technology is being adopted in cities all around the world to simplify our lives, save us time, ease traffic, improve education, reduce energy usage, and keep us healthy and safe. Its adoption is necessary because of changes that are predicted for urban dwellers over the next three decades; urban population and travel are predicted to increase dramatically and our population is graying, meaning the population will include a much greater number of elderly citizens. As these changes occur, smart-city technology can have a huge impact on public safety, improving the ability of law enforcement to investigate crimes, both with …