Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

Privacy Law

2019

Institution
Keyword
Publication

Articles 1 - 30 of 71

Full-Text Articles in Law

Deep Fakes: A Looming Challenge For Privacy, Democracy, And National Security, Danielle K. Citron, Robert Chesney Dec 2019

Deep Fakes: A Looming Challenge For Privacy, Democracy, And National Security, Danielle K. Citron, Robert Chesney

Faculty Scholarship

Harmful lies are nothing new. But the ability to distort reality has taken an exponential leap forward with “deep fake” technology. This capability makes it possible to create audio and video of real people saying and doing things they never said or did. Machine learning techniques are escalating the technology’s sophistication, making deep fakes ever more realistic and increasingly resistant to detection. Deep-fake technology has characteristics that enable rapid and widespread diffusion, putting it into the hands of both sophisticated and unsophisticated actors. While deep-fake technology will bring with it certain benefits, it also will introduce many harms. The marketplace …


Law School News: Logan To Serve As Adviser On Restatement Third Of Torts 11-07-2019, Michael M. Bowden Nov 2019

Law School News: Logan To Serve As Adviser On Restatement Third Of Torts 11-07-2019, Michael M. Bowden

Life of the Law School (1993- )

No abstract provided.


Smile, You're On Camera: A Discussion Of The Privacy Rights Of Teachers In The Modern Day Classroom, Dakota Brewer Nov 2019

Smile, You're On Camera: A Discussion Of The Privacy Rights Of Teachers In The Modern Day Classroom, Dakota Brewer

Student Scholarship

Part II of this Article will first explain the purpose of wiretap (or recording) laws. It will then track the development of wiretap laws at the federal and state levels and illustrate several important distinctions. Part III will discuss the evolution of the Fourth Amendment in the United States. It will also examine how the Fourth Amendment and wiretap laws work together and how they apply to teachers. Part IV will look at the inadequacy of current legal remedies available to teachers who are surreptitiously recorded. It will then set forth possible district and classroom policies to help prevent recordings. …


Contracting For Fourth Amendment Privacy Online, Wayne A. Logan, Jake Linford Nov 2019

Contracting For Fourth Amendment Privacy Online, Wayne A. Logan, Jake Linford

Scholarly Publications

No abstract provided.


Data Scams, Roger Allan Ford Nov 2019

Data Scams, Roger Allan Ford

Law Faculty Scholarship

Targeting platforms like Google and Facebook are usually seen as presenting tradeoffs between utility and privacy. This Article identifies and describes a different, non-privacy cost of targeting platforms: they make it easier for malicious actors to scam others. They do this by making it easier for scammers to reach the most promising victims, hide from law-enforcement authorities and others, and develop better scams. Technology offers potential solutions, since the same data and targeting tools that enable scams could help detect and prevent them, though neither platforms nor law-enforcement officials have both the incentives and expertise needed to develop and deploy …


Why Sexual Privacy Matters For Trust, Danielle K. Citron Nov 2019

Why Sexual Privacy Matters For Trust, Danielle K. Citron

Faculty Scholarship

Every generation’s intimates have their preferred modes of self-disclosure. Not long ago, intimate partners exchanged love letters and mixed tapes. They spent hours on the phone. Today, they text their innermost thoughts, beliefs, and wishes, sometimes with nude photos attached. They engage in sexually-explicit activity via FaceTime and SnapChat.

Now, as then, the success and integrity of intimate relationships depends upon sexual privacy. Intimate relationships develop as partners grow to trust one another to treat their nakedness, deepest secrets, and sexual desires as they hope rather than as they fear. Handling partners’ personal information with discretion lays the foundation for …


Open Banking: Regulatory Challenges For A New Form Of Financial Intermediation In A Data-Driven World, Nydia Remolina Oct 2019

Open Banking: Regulatory Challenges For A New Form Of Financial Intermediation In A Data-Driven World, Nydia Remolina

Centre for AI & Data Governance

Data has taken immense importance in the last years. Consider the amount of data that is being collected worldwide every day, industries are reshaping their activities into a data-driven business. The digital transformation of all industries, portent of the fourth industrial revolution, is creating a new kind of economy based on the datafication of almost any aspect of human social, political and economic activity as a result of the information generated by the numerous daily routines of digitally connected individuals and technology. The financial services industry is part of this trend. Embracing the digital revolution and creating the right foundations …


The Missing Regulatory State: Monitoring Businesses In An Age Of Surveillance, Rory Van Loo Oct 2019

The Missing Regulatory State: Monitoring Businesses In An Age Of Surveillance, Rory Van Loo

Faculty Scholarship

An irony of the information age is that the companies responsible for the most extensive surveillance of individuals in history—large platforms such as Amazon, Facebook, and Google—have themselves remained unusually shielded from being monitored by government regulators. But the legal literature on state information acquisition is dominated by the privacy problems of excess collection from individuals, not businesses. There has been little sustained attention to the problem of insufficient information collection from businesses. This Article articulates the administrative state’s normative framework for monitoring businesses and shows how that framework is increasingly in tension with privacy concerns. One emerging complication is …


Privacidad Digital En Ecuador: El Papel De La Vigilancia, La Jurisprudencia Y Los Derechos Humanos, Giselle Valdez Oct 2019

Privacidad Digital En Ecuador: El Papel De La Vigilancia, La Jurisprudencia Y Los Derechos Humanos, Giselle Valdez

Independent Study Project (ISP) Collection

Este documento es un estudio de caso sobre la privacidad digital en Ecuador, cómo se protege y cómo se debe mejorar las protecciones. Comienzo presentando la falta de privacidad de la persona en Ecuador, a través de la reciente violación de datos y las tecnologías de vigilancia en todo el país desde China. Luego, para analizar la jurisprudencia y la falta de protección de la privacidad en la ley, hago la transición a un análisis legal de la privacidad de datos en Ecuador a través de la Constitución de 2008. Cuando establezco que falta privacidad digital en Ecuador, demuestro una …


Review Of Ian Kerr And Jane Bailey, The Implications Of Digital Rights Management For Privacy And Freedom Of Expression, 2 Journal Of Information, Communication & Ethics In Society 87 (2004), Ann Bartow Sep 2019

Review Of Ian Kerr And Jane Bailey, The Implications Of Digital Rights Management For Privacy And Freedom Of Expression, 2 Journal Of Information, Communication & Ethics In Society 87 (2004), Ann Bartow

Law Faculty Scholarship

Ian Kerr, who passed away far too young in 2019, was an incisive scholar and a much treasured colleague. The wit that sparkled in his papers was matched only by his warmth toward his friends, of whom there were many. He and his many co-authors wrote with deep insight and an equally deep humanity about copyright, artificial intelligence, privacy, torts, and much much more.

Ian was also a valued contributor to the Jotwell Technology Law section. His reviews here display the same playful generosity that characterized everything else he did. In tribute to his memory, we are publishing a memorial …


The Professor Anthony J. Santoro Business Law Lecture Series Presents Becoming A Valued Business Lawyer, Roger Williams University School Of Law, Michael M. Bowden Sep 2019

The Professor Anthony J. Santoro Business Law Lecture Series Presents Becoming A Valued Business Lawyer, Roger Williams University School Of Law, Michael M. Bowden

School of Law Conferences, Lectures & Events

No abstract provided.


Towards Standard Information Privacy, Innovations Of The New General Data Protection Regulation, Ali Alibeigi, Abu Bakar Munir, Md Ershadulkarim, Adeleh Asemi Sep 2019

Towards Standard Information Privacy, Innovations Of The New General Data Protection Regulation, Ali Alibeigi, Abu Bakar Munir, Md Ershadulkarim, Adeleh Asemi

Library Philosophy and Practice (e-journal)

Protection of personal data in recent decades became more crucial affecting by emergence of the new technologies especially computer, internet, information and communications technology. However, Europeans felt this necessity at time and provided for up-to-date and supportive laws. The General Data Protection Regulation (GDPR) is the latest legislation in EU to protect personal data of individuals based on the recent technological advancements. However, its’ domestic and international output still is debatable. This doctrinal legal study by using descriptive methods, aimed to evaluate the GDPR through analyzing and interpreting its’ provisions by especial focus on its’ innovations. The results show that …


Functional Secrecy, Laura K. Donohue Aug 2019

Functional Secrecy, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

Many theorists consider secrecy inimical to liberal democracy. Precise examination of the role that it plays in contemporary government, however, including its strengths and weaknesses, has been limited. This chapter, accordingly, lays out a functional theory of secrecy, considering its role in the three branches of government in four contexts: deliberation, information security, law, and adjudicatory processes. Whether and to what extent cloaking information advances the interests of the state and society varies according to how it operates in each category. First, deliberative secrecy carries significant advantages: it can facilitate informed debate and honest exchange, allowing individuals to alter their …


Catalyzing Privacy Law, Anupam Chander, Margot E. Kaminski, William Mcgeveran Aug 2019

Catalyzing Privacy Law, Anupam Chander, Margot E. Kaminski, William Mcgeveran

Georgetown Law Faculty Publications and Other Works

The United States famously lacks a comprehensive federal data privacy law. In the past year, however, over half the states have proposed broad privacy bills or have established task forces to propose possible privacy legislation. Meanwhile, congressional committees are holding hearings on multiple privacy bills. What is catalyzing this legislative momentum? Some believe that Europe’s General Data Protection Regulation (GDPR), which came into force in 2018, is the driving factor. But with the California Consumer Privacy Act (CCPA) which took effect in January 2020, California has emerged as an alternate contender in the race to set the new standard for …


Algorithms At Work: Productivity Monitoring Applications And Wearable Technology As The New Data-Centric Research Agenda For Employment And Labor Law, Ifeoma Ajunwa Jul 2019

Algorithms At Work: Productivity Monitoring Applications And Wearable Technology As The New Data-Centric Research Agenda For Employment And Labor Law, Ifeoma Ajunwa

AI-DR Collection

Recent work technology advancements such as productivity monitoring platforms and wearable technology have given rise to new organizational behavior regarding the management of employees and also prompt new legal questions regarding the protection of workers’ privacy rights. In this Essay, I argue that the proliferation of productivity monitoring applications and wearable technologies will lead to new legal controversies for employment and labor law. In Part I, I assert that productivity monitoring applications will prompt a new reckoning of the balance between the employer’s pecuniary interests in monitoring productivity and the employees’ privacy interests. Ironically, such applications may also be both …


Automated License Plate Readers: The Difficult Balance Of Solving Crime And Protecting Individual Privacy, Lauren Fash Jun 2019

Automated License Plate Readers: The Difficult Balance Of Solving Crime And Protecting Individual Privacy, Lauren Fash

Maryland Law Review Online

No abstract provided.


Location Tracking And Digital Data: Can Carpenter Build A Stable Privacy Doctrine?, Evan H. Caminker Jun 2019

Location Tracking And Digital Data: Can Carpenter Build A Stable Privacy Doctrine?, Evan H. Caminker

Articles

In Carpenter v United States, the Supreme Court struggled to modernize twentieth-century search and seizure precedents for the “Cyber Age.” Twice previously this decade the Court had tweaked Fourth Amendment doctrine to keep pace with advancing technology, requiring a search warrant before the government can either peruse the contents of a cell phone seized incident to arrest or use a GPS tracker to follow a car’s long-term movements.


The Law Of Genetic Privacy: Applications, Implications, And Limitations, Ellen Wright Clayton, Barbara J. Evans, James W. Hazel, Mark A. Rothstein May 2019

The Law Of Genetic Privacy: Applications, Implications, And Limitations, Ellen Wright Clayton, Barbara J. Evans, James W. Hazel, Mark A. Rothstein

Vanderbilt Law School Faculty Publications

Recent advances in technology have significantly improved the accuracy of genetic testing and analysis, and substantially reduced its cost, resulting in a dramatic increase in the amount of genetic information generated, analysed, shared, and stored by diverse individuals and entities. Given the diversity of actors and their interests, coupled with the wide variety of ways genetic data are held, it has been difficult to develop broadly applicable legal principles for genetic privacy. This article examines the current landscape of genetic privacy to identify the roles that the law does or should play, with a focus on federal statutes and regulations, …


Privacy Law Disparities Between The United States And The European Union, Brandon Deluca May 2019

Privacy Law Disparities Between The United States And The European Union, Brandon Deluca

Honors College Theses

Data is the world’s most valuable resource today. In the 21st century, big data has overtaken the world’s commonly known large industries to become one of the most sought after markets, and companies pay to own this data (The Economist, 2017). Advertisements may have been targeted towards demographics such as race or sex in past years. However, in the digital age, the capability exists to push advertisements to the screens of specific users with known interests. This has been made possible, in part, by unregulated data collection practices across the globe, including in the United States and the European Union. …


Mugshots And The Press-Privacy Dilemma, Amy Gajda May 2019

Mugshots And The Press-Privacy Dilemma, Amy Gajda

Faculty Scholarship

No abstract provided.


When Law Frees Us To Speak, Danielle K. Citron, Jonathon Penney May 2019

When Law Frees Us To Speak, Danielle K. Citron, Jonathon Penney

Faculty Scholarship

A central aim of online abuse is to silence victims. That effort is as regrettable as it is successful. In the face of cyber harassment and sexual privacy invasions, women and marginalized groups retreat from online engagement. These documented chilling effects, however, are not inevitable. Beyond its deterrent function, law has an equally important expressive role. In this article, we highlight law’s capacity to shape social norms and behavior through education. We focus on a neglected dimension of law’s expressive role—its capacity to empower victims to express their truths and engage with others. Our argument is theoretical and empirical. We …


The Normative Fourth Amendment, Matthew Tokson May 2019

The Normative Fourth Amendment, Matthew Tokson

Utah Law Faculty Scholarship

For decades, courts have used a “reasonable expectation of privacy” standard to determine whether a government action is a Fourth Amendment search. Scholars have convincingly argued that this test is incoherent, arbitrary, and incapable of protecting privacy against modern forms of surveillance. Yet few alternatives have been proposed, and those alternatives pose many of the same problems as the current standard.

This Article offers a new theoretical approach for determining the scope of the Fourth Amendment. It develops a normative model of Fourth Amendment searches, one that explicitly addresses the balance between law enforcement effectiveness and citizens’ interests inherent in …


Sexual Privacy, Danielle K. Citron May 2019

Sexual Privacy, Danielle K. Citron

Faculty Scholarship

Those who wish to control, expose, and damage the identities of individuals routinely do so by invading their privacy. People are secretly recorded in bedrooms and public bathrooms and “up their skirts.” Such images are used to coerce people into sharing nude photographs and filming sex acts under the threat of public disclosure. People’s nude images are posted online without permission. Machine-learning technology is used to create digitally manipulated “deep fake” sex videos that swap people’s faces into pornography.

Each of these abuses is an invasion of sexual privacy—the behaviors, expectations, and choices that manage access to and information about …


Achieving The Goals Of The Value-Based Purchasing Program: Defining A Standard For External Data Use, Svetlana Makoviy Apr 2019

Achieving The Goals Of The Value-Based Purchasing Program: Defining A Standard For External Data Use, Svetlana Makoviy

Student Award Winning Papers

In our society, artificial intelligence technology has permeated through every aspect of human life. By the end of 2019, more than 60 million Americans will use some kind of smartwatch, whether a Fitbit or an Apple Watch as a part of their daily routine. Further, over 58% of people currently use a healthcare-related mobile application, such as MyFitnessPal or Nike+ Running. Health and fitness application usage increased by over 330% in the last three years. Unsurprisingly, healthcare-related data is one of the fastest growing and financially valuable data pools in the country, if not worldwide. The volume of data generated …


The Right Of Publicity's Intellectual Property Turn, Jennifer E. Rothman Apr 2019

The Right Of Publicity's Intellectual Property Turn, Jennifer E. Rothman

All Faculty Scholarship

The Article is adapted from a keynote lecture about my book, THE RIGHT OF PUBLICITY: PRIVACY REIMAGINED FOR A PUBLIC WORLD (Harvard Univ. Press 2018), delivered at Columbia Law School for its symposium, “Owning Personality: The Expanding Right of Publicity.” The book challenges the conventional historical and theoretical understanding of the right of publicity. By uncovering the history of the right of publicity’s development, the book reveals solutions to current clashes with free speech, individual liberty, and copyright law, as well as some opportunities for better protecting privacy in the digital age.

The lecture (as adapted for this Article) explores …


Data Re-Use And The Problem Of Group Identity, Leslie Francis, John G. Francis Apr 2019

Data Re-Use And The Problem Of Group Identity, Leslie Francis, John G. Francis

Utah Law Faculty Scholarship

Reusing existing data sets of health information for public health or medical research has much to recommend it. Much data repurposing in medical or public health research or practice involves information that has been stripped of individual identifiers but some does not. In some cases, there may have been consent to the reuse but in other cases consent may be absent and people may be entirely unaware of how the data about them are being used. Data sets are also being combined and may contain information with very different sources, consent histories, and individual identifiers. Much of the ethical and …


Law School News: A Spring Break That Teaches - And Gives Back 03/11/2019, Edward Fitzpatrick Mar 2019

Law School News: A Spring Break That Teaches - And Gives Back 03/11/2019, Edward Fitzpatrick

Life of the Law School (1993- )

No abstract provided.


The Public Information Fallacy, Woodrow Hartzog Mar 2019

The Public Information Fallacy, Woodrow Hartzog

Faculty Scholarship

The concept of privacy in “public” information or acts is a perennial topic for debate. It has given privacy law fits. People struggle to reconcile the notion of protecting information that has been made public with traditional accounts of privacy. As a result, successfully labeling information as public often functions as a permission slip for surveillance and personal data practices. It has also given birth to a significant and persistent misconception — that public information is an established and objective concept.

In this article, I argue that the “no privacy in public” justification is misguided because nobody knows what “public” …


The Ironic Privacy Act, Margaret Hu Jan 2019

The Ironic Privacy Act, Margaret Hu

Scholarly Articles

This Article contends that the Privacy Act of 1974, a law intended to engender trust in government records, can be implemented in a way that inverts its intent. Specifically, pursuant to the Privacy Act's reporting requirements, in September 2017, the U.S. Department of Homeland Security (DHS) notified the public that record systems would be modified to encompass the collection of social media data. The notification justified the collection of social media data as a part of national security screening and immigration vetting procedures. However, the collection will encompass social media data on both citizens and noncitizens, and was not explicitly …


Hardware, Heartware, Or Nightmare: Smart-City Technology And The Concomitant Erosion Of Privacy, Leila Lawlor Jan 2019

Hardware, Heartware, Or Nightmare: Smart-City Technology And The Concomitant Erosion Of Privacy, Leila Lawlor

Scholarly Articles

Smart-city technology is being adopted in cities all around the world to simplify our lives, save us time, ease traffic, improve education, reduce energy usage, and keep us healthy and safe. Its adoption is necessary because of changes that are predicted for urban dwellers over the next three decades; urban population and travel are predicted to increase dramatically and our population is graying, meaning the population will include a much greater number of elderly citizens. As these changes occur, smart-city technology can have a huge impact on public safety, improving the ability of law enforcement to investigate crimes, both with …