Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

Privacy Law

Institution
Keyword
Publication Year
Publication
File Type

Articles 31 - 60 of 1002

Full-Text Articles in Law

Layered Fiduciaries In The Information Age, Zhaoyi Li Jan 2023

Layered Fiduciaries In The Information Age, Zhaoyi Li

Articles

Technology companies such as Facebook have long been criticized for abusing customers’ personal information and monetizing user data in a manner contrary to customer expectations. Some commentators suggest fiduciary law could be used to restrict how these companies use their customers’ data. Under this framework, a new member of the fiduciary family called the “information fiduciary” was born. The concept of an information fiduciary is that a company providing network services to “collect, analyze, use, sell, and distribute personal information” owes customers and end-users a fiduciary duty to use the collected data to promote their interests, thereby assuming fiduciary liability …


The Fourth Amendment's Constitutional Home, Gerald S. Dickinson Jan 2023

The Fourth Amendment's Constitutional Home, Gerald S. Dickinson

Articles

The home enjoys omnipresent status in American constitutional law. The Bill of Rights, peculiarly, has served as the central refuge for special protections to the home. This constitutional sanctuary has elicited an intriguing textual and doctrinal puzzle. A distinct thread has emerged that runs through the first five amendments delineating the home as a zone where rights emanating from speech, smut, gods, guns, soldiers, searches, sex, and self-incrimination enjoy special protections. However, the thread inexplicably unravels upon arriving at takings. There, the constitutional text omits and the Supreme Court’s doctrine excludes a special zone of safeguards to the home. This …


Privacy And National Politics: Fingerprint And Dna Litigation In Japan And The United States Compared, Dongsheng Zang Jan 2023

Privacy And National Politics: Fingerprint And Dna Litigation In Japan And The United States Compared, Dongsheng Zang

Articles

Drawing cases from two related areas of law-fingerprint and DNA (deoxyribonucleic acid) data-this Article proposes a modified framework, built on the Balkin-Levinson emphasis on national politics: First, national politics understood as partisan rivalry cannot account for what I call doctrinal lock-in in this Article, where I will demonstrate that in different stages of American politics-the Lochner era, the New Deal era, and Civil Rights era-courts across the nation ruled predominantly in favor of public data collectors-state and federal law enforcement in fingerprint cases. From the 1990s, when DNA data became hot targets of law enforcement, the United States Supreme Court …


The Carpenter Test As A Transformation Of Fourth Amendment Law, Matthew Tokson Jan 2023

The Carpenter Test As A Transformation Of Fourth Amendment Law, Matthew Tokson

Utah Law Faculty Scholarship

For over fifty years, the Fourth Amendment’s scope has been largely dictated by the Katz test, which applies the Amendment’s protections only when the government has violated a person’s “reasonable expectation of privacy.” This vague standard is one of the most criticized doctrines in all of American law, and its lack of coherence has made Fourth Amendment search law notoriously confusing. Things have become even more complex following the Supreme Court’s landmark decision in Carpenter v. United States, which has spawned its own alternative test for determining the Fourth Amendment’s scope. The emerging Carpenter test looks to the revealing nature …


Dobbs In A Technologized World: Implications For Us Data Privacy, Jheel Gosain, Jason D. Keune, Michael S. Sinha Jan 2023

Dobbs In A Technologized World: Implications For Us Data Privacy, Jheel Gosain, Jason D. Keune, Michael S. Sinha

All Faculty Scholarship

In June of 2022, the U.S. Supreme Court issued its opinion in Dobbs v. Jackson Women’s Health Organization, overturning 50 years of precedent by eliminating the federal constitutional right to abortion care established by the Court’s 1973 decision in Roe v. Wade. The Dobbs decision leaves the decision about abortion services in the hands of the states, which created an immediately variegated checkerboard of access to women’s healthcare across the country. This in turn laid bare a profusion of privacy issues that emanate from our technologized world. We review these privacy issues, including healthcare data, financial data, website tracking and …


Unprecedented Precedent And Original Originalism: How The Supreme Court’S Decision In Dobbs Threatens Privacy And Free Speech Rights, Leonard Niehoff Jan 2023

Unprecedented Precedent And Original Originalism: How The Supreme Court’S Decision In Dobbs Threatens Privacy And Free Speech Rights, Leonard Niehoff

Articles

The U.S. Supreme Court’s decision in Dobbs v. Jackson Women’s Health Organization has drawn considerable attention because of its reversal of Roe v. Wade and its rejection of a woman’s constitutional right to terminate her pregnancy. The Dobbs majority, and some of the concurring opinions, emphasized that the ruling was a narrow one. Nevertheless, there are reasons to think the influence of Dobbs may extend far beyond the specific constitutional issue the case addresses.

This article explains why Dobbs could have significant and unanticipated implications for the law of privacy and the law of free expression. I argue that two …


How Reputational Nondisclosure Agreements Fails (Or, In Praise Of Breach), Mark Fenster Jan 2023

How Reputational Nondisclosure Agreements Fails (Or, In Praise Of Breach), Mark Fenster

UF Law Faculty Publications

Investigative reporters and the #MeToo movement exposed the widespread use of non-disclosure agreements intended to maintain confidentiality about one or both contracting parties’ embarrassing acts. These reputational NDAs (RNDAs) have been widely condemned and addressed in the past half-decade by legislators, activists, and academics. Their exposure, often via victims’ breaches, revealed a curious and distinct dilemma for the non-breaching party whose reputation is vulnerable to disclosure. In most contracts, non-breaching parties might choose to forgo enforcement because of the cost and uncertain success of litigation and the availability of other pathways to a satisfactory resolution. Parties to a RNDA, by …


Content Moderation As Surveillance, Hannah Bloch-Wehba Oct 2022

Content Moderation As Surveillance, Hannah Bloch-Wehba

Faculty Scholarship

Technology platforms are the new governments, and content moderation is the new law, or so goes a common refrain. As platforms increasingly turn toward new, automated mechanisms of enforcing their rules, the apparent power of the private sector seems only to grow. Yet beneath the surface lies a web of complex relationships between public and private authorities that call into question whether platforms truly possess such unilateral power. Law enforcement and police are exerting influence over platform content rules, giving governments a louder voice in supposedly “private” decisions. At the same time, law enforcement avails itself of the affordances of …


Data Privacy In The Time Of Plague, Cason Schmit, Brian N. Larson, Hye-Chung Kum Aug 2022

Data Privacy In The Time Of Plague, Cason Schmit, Brian N. Larson, Hye-Chung Kum

Faculty Scholarship

Data privacy is a life-or-death matter for public health. Beginning in late fall 2019, two series of events unfolded, one everyone talked about and one hardly anyone noticed: The greatest world-health crisis in at least 100 years, the COVID-19 pandemic; and the development of the Personal Data Protection Act Committee by the Uniform Law Commissioners (ULC) in the United States. By July 2021, each of these stories had reached a turning point. In the developed, Western world, most people who wanted to receive the vaccine against COVID- 19 could do so. Meanwhile, the ULC adopted the Uniform Personal Data Protection …


Throwing Stones In Glass Houses: Protecting Privacy Under The Law Of Nuisance, Cheng Lim Saw, Joon Wei Aaron Yoong Aug 2022

Throwing Stones In Glass Houses: Protecting Privacy Under The Law Of Nuisance, Cheng Lim Saw, Joon Wei Aaron Yoong

Research Collection Yong Pung How School Of Law

The limits of the law of nuisance were recently tested in the controversial decisions of Fearn v Tate Gallery Board of Trustees, both before the UK High Court and UK Court of Appeal. Against the backdrop of these decisions, this article argues that the tort of private nuisance can indeed, in appropriate cases, protect against invasions of privacy caused by overlooking – all within the present framework and ambit of the action. It is also proposed that a communitarian approach be adopted in fashioning the appropriate remedy for actions founded in nuisance.


Four Privacy Stories And Two Hard Cases, A Comment On Skinner-Thompson's Privacy At The Margins, Jessica Silbey Jul 2022

Four Privacy Stories And Two Hard Cases, A Comment On Skinner-Thompson's Privacy At The Margins, Jessica Silbey

Faculty Scholarship

Scott Skinner-Thompson's new book, Privacy at the Margins, is what I would call a "fourth-generation" study of privacy law. Privacy's contours and justifications have been debated over the course of the twentieth century, first to establish it as a matter deserving legal protection (roughly the first half of the twentieth century), 2 then to iterate its various common law and constitutional variations (starting in the 1960s), 3 and since the computer and internet revolution of the 1990s, to reevaluate privacy's growing importance but waning presence in the digitally-networked age.4 The third-generation of privacy scholarship has been a fast-growing area …


Race And Regulation Podcast Episode 5 - Racial Equity And Data Privacy, Anita L. Allen Jun 2022

Race And Regulation Podcast Episode 5 - Racial Equity And Data Privacy, Anita L. Allen

Penn Program on Regulation Podcasts

In this episode, Anita Allen, an internationally renowned expert on the philosophical dimensions of privacy and data protection law, reveals how race-neutral privacy laws in the U.S. have failed to address the unequal burdens faced online by Black Americans, whose personal data are used in racially discriminatory ways. Professor Allen articulates what she terms an African American Online Equity Agenda to guide the development of race-conscious privacy regulations that can better promote racial justice in the modern digital economy.


Submission Of The Citizen Lab (Munk School Of Global Affairs, University Of Toronto) To The United Nations Working Group On Enforced Or Involuntary Disappearances, Siena Anstis, Ronald J. Deibert, Émilie Laflèche, Jonathon W. Penney Jun 2022

Submission Of The Citizen Lab (Munk School Of Global Affairs, University Of Toronto) To The United Nations Working Group On Enforced Or Involuntary Disappearances, Siena Anstis, Ronald J. Deibert, Émilie Laflèche, Jonathon W. Penney

Commissioned Reports, Studies and Public Policy Documents

No abstract provided.


24th Annual Open Government Summit 2022, Roger Williams University School Of Law, Rhode Island Office Of The Attorney General Jun 2022

24th Annual Open Government Summit 2022, Roger Williams University School Of Law, Rhode Island Office Of The Attorney General

School of Law Conferences, Lectures & Events

No abstract provided.


Gauging The Acceptance Of Contact Tracing Technology: An Empirical Study Of Singapore Residents’ Concerns With Sharing Their Information And Willingness To Trust, Ee-Ing Ong, Wee Ling Loo Jun 2022

Gauging The Acceptance Of Contact Tracing Technology: An Empirical Study Of Singapore Residents’ Concerns With Sharing Their Information And Willingness To Trust, Ee-Ing Ong, Wee Ling Loo

Research Collection Yong Pung How School Of Law

In response to the COVID-19 pandemic, governments began implementing various forms of contact tracing technology. Singapore’s implementation of its contact tracing technology, TraceTogether, however, was met with significant concern by its population, with regard to privacy and data security. This concern did not fit with the general perception that Singaporeans have a high level of trust in its government. We explore this disconnect, using responses to our survey (conducted pre-COVID-19) in which we asked participants about their level of concern with the government and business collecting certain categories of personal data. The results show that respondents had less concern with …


Three Observations About Justice Alito's Draft Opinion In Dobbs - Commentary, John M. Greabe May 2022

Three Observations About Justice Alito's Draft Opinion In Dobbs - Commentary, John M. Greabe

Law Faculty Scholarship

[Excerpt] "There is much to say about Justice Samuel Alito's draft opinion in Dobbs v. Jackson Women's Health Organization, which was leaked from the United States Supreme Court on May 2 [2022].

Obviously, the most significant direct consequence of the proposed decision, which overrules Roe v. Wade (1973) and Planned Parenthood v. Casey (1992) while upholding the constitutionality of a Mississippi law that outlaws most abortions after 15 weeks of pregnancy, would be the restriction or elimination of abortion services throughout much of the nation. This will have all sorts of attendant consequences, large and smaller, many of which …


Pov: What Rights Could Unravel Next, In Light Of Draft Opinion By Scotus Overturning Roe V. Wade, Robert L. Tsai May 2022

Pov: What Rights Could Unravel Next, In Light Of Draft Opinion By Scotus Overturning Roe V. Wade, Robert L. Tsai

Shorter Faculty Works

Beyond what Alito’s draft opinion in Dobbs v. Jackson Women’s Health Organization portends for the future of abortion rights is the striking method of analysis he employs in the reported draft. Despite his many efforts to reassure that the opinion “does not undermine” other constitutional rights “in any way,” it actually outlines a roadmap for the withdrawal of other cherished constitutional rights.


Is The End Of Roe V. Wade Near? Leaked Scotus Brief Says Yes, Nicole Huberfeld, Linda C. Mcclain May 2022

Is The End Of Roe V. Wade Near? Leaked Scotus Brief Says Yes, Nicole Huberfeld, Linda C. Mcclain

Shorter Faculty Works

Protesters on both sides of the abortion debate descended on the US Supreme Court Monday night and into Tuesday after a leaked secret draft of a US Supreme Court opinion indicated that a majority of justices support overturning Roe v. Wade, after almost 50 years of legalized abortion rights in America. If finalized, possibly as soon as this summer, the bombshell could trigger a cultural tsunami across American life, forcing some women to travel to another state for an abortion and putting the divisive issue at the heart of the fall midterm elections.


Evaluating The Constitutionality Of Marital Status Classifications In The Regulation Of Posthumous Reproduction And Postmortem Sperm Retrieval, Alison Jane Walker May 2022

Evaluating The Constitutionality Of Marital Status Classifications In The Regulation Of Posthumous Reproduction And Postmortem Sperm Retrieval, Alison Jane Walker

Connecticut Law Review

In Eisenstadt v. Baird, the Supreme Court held that a state law prohibiting the provision of contraceptives to unmarried persons violated the Fourteenth Amendment’s rational basis test because of the disparate treatment it afforded to married and unmarried individuals. Eisenstadt stands for an individual’s right to make their own procreative decisions, free from governmental intrusions which impose arbitrary classifications on privacy and freedom. This Note focuses on posthumous reproduction and, more specifically, postmortem sperm retrieval: the process of using a deceased male’s frozen sperm after his death to produce his biological children at the request of his spouse or intimate …


2l Brian Hills Honored With Iapp Annual Westin Scholar Award, James Owsley Boyd Apr 2022

2l Brian Hills Honored With Iapp Annual Westin Scholar Award, James Owsley Boyd

Keep Up With the Latest News from the Law School (blog)

No abstract provided.


Risk And Rights In Transatlantic Data Transfers: Eu Privacy Law, U.S. Surveillance, And The Search For Common Ground, Ira Rubinstein, Peter Margulies Apr 2022

Risk And Rights In Transatlantic Data Transfers: Eu Privacy Law, U.S. Surveillance, And The Search For Common Ground, Ira Rubinstein, Peter Margulies

Connecticut Law Review

Privacy advocates rightly view the Court of Justice of the European Union (CJEU) decision in Data Protection Commissioner v. Facebook Ireland Ltd. and Maximilian Schrems (Schrems II) as a landmark. But, one stakeholder’s landmark is another’s headache. The CJEU’s decision invalidated the EU-U.S. Privacy Shield agreement governing transatlantic transfers of personal data. Citing U.S. surveillance, the CJEU found that data transfers lacked adequate privacy protections under the EU’s General Data Protection Regulation (GDPR). The Schrems II decision thus clouded the future of data transfers that help drive the global economy. This Article offers a hybrid approach to safeguard privacy rights …


Whither Privacy Protection In The Law Of Nuisance, Cheng Lim Saw, Aaron Yoong Apr 2022

Whither Privacy Protection In The Law Of Nuisance, Cheng Lim Saw, Aaron Yoong

Research Collection Yong Pung How School Of Law

Privacy-related concerns often feature in disputes involving the tort of private nuisance. Despite the growing importance ascribed to the protection of an individual’s privacy in the modern world, English law has tended to shy away from allowing such concerns to influence the thinking behind the more traditional areas of law (like nuisance). This article examines and questions the various notions that underpin this English approach. Using the recent decisions of Giles Duncan Fearn v The Board of Trustees of the Tate Gallery [2019] EWHC 246 (Ch) and Giles Fearn v The Board of Trustees of the Tate Gallery [2020] EWCA …


Understanding Chilling Effects, Jonathon W. Penney Apr 2022

Understanding Chilling Effects, Jonathon W. Penney

Articles & Book Chapters

With digital surveillance and censorship on the rise, the amount of data available unprecedented, and corporate and governmental actors increasingly employing emerging technologies like artificial intelligence and facial recognition technology for surveillance and data analytics, concerns about “chilling effects,” that is, the capacity for these activities to “chill” or deter people from exercising their rights and freedoms, have taken on greater urgency and importance. Yet, there remains a clear dearth in systematic theoretical and empirical work points. This has left significant gaps in understanding. This Article has attempted to fill that void, synthesizing theoretical and empirical insights from law, privacy, …


Platforms, Encryption, And The Cfaa: The Case Of Whatsapp V Nso Group, Jonathon W. Penney, Bruce Schneier Mar 2022

Platforms, Encryption, And The Cfaa: The Case Of Whatsapp V Nso Group, Jonathon W. Penney, Bruce Schneier

Articles & Book Chapters

End-to-end encryption technology has gone mainstream. But this wider use has led hackers, cybercriminals, foreign governments, and other threat actors to employ creative and novel attacks to compromise or workaround these protections, raising important questions as to how the Computer Fraud and Abuse Act (CFAA), the primary federal anti-hacking statute, is best applied to these new encryption implementations. Now, after the Supreme Court recently narrowed the CFAA’s scope in Van Buren and suggested it favors a code-based approach to liability under the statute, understanding how best to theorize sophisticated code-based access barriers like end-to-end encryption, and their circumvention, is now …


Me, Myself And My Digital Double: Extending Sara Greene’S Stealing (Identity) From The Poor To The Challenges Of Identity Verification, Michele E. Gilman Mar 2022

Me, Myself And My Digital Double: Extending Sara Greene’S Stealing (Identity) From The Poor To The Challenges Of Identity Verification, Michele E. Gilman

All Faculty Scholarship

Identity is an essential part of the human condition. When one’s identity is stolen or when a state rejects a citizen’s identity, the consequences can be devastating to one’s notion of selfhood as well as undermine their economic security. In Stealing (Identity) from the Poor, Sara Greene explores the serious harms suffered by low-income people who are victimized by identity theft. She explains that our plutocratic regime of identity theft laws serves the interests of wealthier Americans at the expense of those experiencing poverty.

This Essay extends Greene’s analysis and framing to the harms of identity verification systems, particularly in …


Canadian Privacy Law And The Post-War Freedom Of Information Paradigm, Jonathon W. Penney Mar 2022

Canadian Privacy Law And The Post-War Freedom Of Information Paradigm, Jonathon W. Penney

Articles & Book Chapters

An overemphasis on technology among Canadian privacy scholars has neglected other important historical factors in the development of privacy law. The chapter aims to help fill that void through a case study examining how a broader Post War paradigm, centred on freedom of information, impacted on Canada's most important early privacy laws, including Canada's first privacy law - Part VI of the Canadian Human Rights Act (1977); the federal Privacy Act (1983); and the Personal Information Protection and Electronic Documents Act (PIPEDA)(2000). The case study suggests that despite wider concerns about privacy when each law was enacted, those concerns were …


Sociotechnical Safeguards For Genomic Data Privacy, Ellen W. Clayton, Zhiyu Wan, Et Al. Mar 2022

Sociotechnical Safeguards For Genomic Data Privacy, Ellen W. Clayton, Zhiyu Wan, Et Al.

Vanderbilt Law School Faculty Publications

Recent developments in a variety of sectors, including health care, research and the direct-to-consumer industry, have led to a dramatic increase in the amount of genomic data that are collected, used and shared. This state of affairs raises new and challenging concerns for personal privacy, both legally and technically. This Review appraises existing and emerging threats to genomic data privacy and discusses how well current legal frameworks and technical safeguards mitigate these concerns. It concludes with a discussion of remaining and emerging challenges and illustrates possible solutions that can balance protecting privacy and realizing the benefits that result from the …


Dismantling The “Black Opticon”: Privacy, Race Equity, And Online Data-Protection Reform, Anita L. Allen Feb 2022

Dismantling The “Black Opticon”: Privacy, Race Equity, And Online Data-Protection Reform, Anita L. Allen

All Faculty Scholarship

African Americans online face three distinguishable but related categories of vulnerability to bias and discrimination that I dub the “Black Opticon”: discriminatory oversurveillance, discriminatory exclusion, and discriminatory predation. Escaping the Black Opticon is unlikely without acknowledgement of privacy’s unequal distribution and privacy law’s outmoded and unduly race-neutral façade. African Americans could benefit from race-conscious efforts to shape a more equitable digital public sphere through improved laws and legal institutions. This Essay critically elaborates the Black Opticon triad and considers whether the Virginia Consumer Data Protection Act (2021), the federal Data Protection Act (2021), and new resources for the Federal Trade …


A Solution For The Third-Party Doctrine In A Time Of Data Sharing, Contact Tracing, And Mass Surveillance, Tonja Jacobi, Dustin Stonecipher Jan 2022

A Solution For The Third-Party Doctrine In A Time Of Data Sharing, Contact Tracing, And Mass Surveillance, Tonja Jacobi, Dustin Stonecipher

Faculty Articles

Today, information is shared almost constantly. People share their DNA to track their ancestry or for individualized health information; they instruct Alexa to purchase products or provide directions; and, now more than ever, they use videoconferencing technology in their homes. According to the third-party doctrine, the government can access all such information without a warrant or without infringing on Fourth Amendment privacy protections. This exposure of vast amounts of highly personal data to government intrusion is permissible because the Supreme Court has interpreted the third-party doctrine as a per se rule. However, that interpretation rests on an improper understanding of …


Submission To The Province Of Nova Scotia On Its Review Of The Intimate Images And Cyber-Protection Act - Leaf, Suzie Dunn, Rosel Kim Jan 2022

Submission To The Province Of Nova Scotia On Its Review Of The Intimate Images And Cyber-Protection Act - Leaf, Suzie Dunn, Rosel Kim

Reports & Public Policy Documents

The Women’s Legal Education and Action Fund (LEAF) commends the Nova Scotia government for reviewing its Intimate Images and Cyber-protection Act (the Act) and seeking public input for this review. Nova Scotia has been, and continues to be, a leader in Canada for its role in advancing innovative laws and supports for people targeted by technology-facilitated violence (TFV), digital abuse, and the non-consensual distribution of intimate images (NCDII). As these forms of harmful behaviour evolve and become better understood, it is important to revisit this legislation to assess whether it is providing meaningful and accessible responses to such serious social …