Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 66

Full-Text Articles in Law

Technology Integration In Higher Education And Student Privacy Beyond Learning Environments -- A Comparison Of The Uk And Us Perspective, Iria Giuffrida, Alex Hall Jan 2023

Technology Integration In Higher Education And Student Privacy Beyond Learning Environments -- A Comparison Of The Uk And Us Perspective, Iria Giuffrida, Alex Hall

Faculty Publications

Technology integration in higher education (HE) has brought immense innovation. While research is investigating the benefits of leveraging, through learning analytics, the data created by the greater presence of technology in HE, it is also analysing the privacy implications of vast universes of data now at the fingertips of HE administrators. This paper argues that student privacy challenges linked to technology integration occur not only within but also beyond learning environments, namely at the enterprise level. By analysing the UK and US legal frameworks surrounding how HE institutions respond to parents demanding disclosure of their adult children's personal data in …


The Tesla Meets The Fourth Amendment, Adam M. Gershowitz Jan 2023

The Tesla Meets The Fourth Amendment, Adam M. Gershowitz

Faculty Publications

Can police search a smart car’s computer without a warrant? Although the Supreme Court banned warrantless searches of cell phones incident to arrest in Riley v. California, the Court left the door open for warrantless searches under other exceptions to the warrant requirement. This is the first article to argue that the Fourth Amendment’s automobile exception currently permits the police to warrantlessly dig into a vehicle’s computer system and extract vast amounts of cell phone data. Just as the police can rip open seats or slash tires to search for drugs under the automobile exception, the police can warrantlessly …


Political Advertising In Virtual Reality, Scott P. Bloomberg Jan 2023

Political Advertising In Virtual Reality, Scott P. Bloomberg

Faculty Publications

This Article is about how biometric data collected through VR technologies will greatly exacerbate existing problems with political ad microtargeting. Commercially available VR devices can—and in some cases, must—be integrated with sensors that track users’ eyes, faces, hands, and bodies. Political campaigns will be able to leverage this data to target ads with extraordinary precision. Indeed, targeting ads with biometric data may well be the next step in the evolution of microtargeted political messaging—a practice that has contributed to a rise in disinformation, filter-bubbles, and privacy invasions. If this sounds like science fiction, it is closer than you may think. …


Pure Privacy, Jeffrey Bellin Jan 2021

Pure Privacy, Jeffrey Bellin

Faculty Publications

n 1890, Samuel Warren and Louis Brandeis began a storied legal tradition of trying to conceptualize privacy. Since that time, privacy's appeal has grown beyond those authors' wildest expectations, but its essence remains elusive. One of the rare points of agreement in boisterous academic privacy debates is that there is no consensus on what privacy means.

The modern trend is to embrace the ambiguity. Unable to settle on boundaries, scholars welcome a broad array of interests into an expanding theoretical framework. As a result, privacy is invoked in debates about COVID-19 contact tracing, police body cameras, marriage equality, facial recognition, …


The Ironic Privacy Act, Margaret Hu Jan 2019

The Ironic Privacy Act, Margaret Hu

Faculty Publications

This Article contends that the Privacy Act of 1974, a law intended to engender trust in government records, can be implemented in a way that inverts its intent. Specifically, pursuant to the Privacy Act's reporting requirements, in September 2017, the U.S. Department of Homeland Security (DHS) notified the public that record systems would be modified to encompass the collection of social media data. The notification justified the collection of social media data as a part of national security screening and immigration vetting procedures. However, the collection will encompass social media data on both citizens and noncitizens, and was not explicitly …


Discipline And Policing, Kate Levine Jan 2019

Discipline And Policing, Kate Levine

Faculty Publications

A prime focus of police-reform advocates is the transparency of police discipline. Indeed, transparency is one of, the most popular accountability solutions for a wide swath of policing problems. This Article examines the “transparency cure” as it applies to Police Disciplinary Records (“PDRs”). These records are part of an officer’s personnel file and contain reported wrongdoing from supervisors, Internal Affairs Bureaus, and Citizen Complaint Review Boards.

This Article argues that making PDRs public is worthy of skeptical examination. It problematizes the notion that transparency is a worthy end goal for those who desire to see police-reform in general. Transparency is …


Ferpa Close-Up: When Video Captures Violence And Injury, Richard J. Peltz-Steele, Kitty L. Cone Jan 2018

Ferpa Close-Up: When Video Captures Violence And Injury, Richard J. Peltz-Steele, Kitty L. Cone

Faculty Publications

Federal privacy law is all to often misconstrued or perverted to preclude the disclosure of video recordings that capture students victimized by violent crime or tortious injury. This misuse of federal law impedes transparency and accountability and, in many cases, even jeopardizes the health, safety, and lives of children. When properly construed, however, federal law is no bar to disclosure and, at least in public schools, works in tandem with freedom of information laws to ensure disclosure. This Article posits that without unequivocal guidance from federal administrative authorities, uncertainty regarding the disclosure of such recordings will continue to linger, jeopardizing …


The New Governors: The People, Rules And Processes Governing Online Speech, Kate Klonick Jan 2018

The New Governors: The People, Rules And Processes Governing Online Speech, Kate Klonick

Faculty Publications

Private online platforms have an increasingly essential role in free speech and participation in democratic culture. But while it might appear that any internet user can publish freely and instantly online, many platforms actively curate the content posted by their users. How and why these platforms operate to moderate speech is largely opaque.

This Article provides the first analysis of what these platforms are actually doing to moderate online speech under a regulatory and First Amendment framework. Drawing from original interviews, archived materials, and internal documents, this Article describes how three major online platforms — Facebook, Twitter, and YouTube — …


Orwell's 1984 And A Fourth Amendment Cybersurveillance Nonintrusion Test, Margaret Hu Dec 2017

Orwell's 1984 And A Fourth Amendment Cybersurveillance Nonintrusion Test, Margaret Hu

Faculty Publications

This Article describes a cybersurveillance nonintrusion test under the Fourth Amendment that is grounded in evolving customary law to replace the reasonable expectation of privacy test formulated in Katz v. United States. To illustrate how customary law norms are shaping modern Fourth Amendment jurisprudence, this Article examines the recurrence of judicial references to George Orwell’s novel, 1984, within the Fourth Amendment context when federal courts have assessed the constitutionality of modern surveillance methods. The Supreme Court has indicated that the Fourth Amendment privacy doctrine must now evolve to impose meaningful limitations on the intrusiveness of new surveillance technologies. …


We Need To Talk About Police Disciplinary Records, Kate Levine Aug 2017

We Need To Talk About Police Disciplinary Records, Kate Levine

Faculty Publications

In March 2017, an employee of New York’s Civilian Complaint Review Board leaked the disciplinary record of Daniel Pantaleo to the media. Pantaleo, the police officer who choked Eric Garner to death in the video that went public and horrified many citizens, is under federal investigation after a Staten Island grand jury refused to indict him for Garner’s death. Legal Aid Society attorneys had unsuccessfully sought the release of his records in the courts for years. The leak of his records is the public face of an important but rarely discussed issue facing police, legislators, judges, lawyers, and scholars who …


Protecting Homeowners' Privacy Rights In The Age Of Drones: The Role Of Community Associations, Hillary B. Farber, Marvin J. Nodiff Jan 2017

Protecting Homeowners' Privacy Rights In The Age Of Drones: The Role Of Community Associations, Hillary B. Farber, Marvin J. Nodiff

Faculty Publications

Homeowners' notions of privacy in their dwellings and surroundings are under attack from the threat of pervasive surveillance by small civilian drones equipped with highly sophisticated visual and data-gathering capabilities. Streamlined rules recently issued by the Federal Aviation Administration ("FAA') have unleashed technological innovation that promises great societal benefits. However, the new rules expose homeowners to unwanted snooping because they lack limits on the distance drones may operate from residential dwellings or time of operations. Indeed, our society should not expect a federal agency to deal effectively with the widely diverse issues of drone technology facing the states, given the …


Keep Out! The Efficacy Of Trespass, Nuisance And Privacy Torts As Applied To Drones, Hillary B. Farber Jan 2017

Keep Out! The Efficacy Of Trespass, Nuisance And Privacy Torts As Applied To Drones, Hillary B. Farber

Faculty Publications

The drone industry is burgeoning and there is boundless excitement over the potential civil and commercial applications of these aerial observers. Drones are also fun recreational toys that have more capabilities than their predecessor - the remote controlled helicopter. But along with the benefits comes the potential for misuse. More and more frequently concerned spectators are reporting drones flying around the windows of homes, backyards, and at beaches and sporting events. In some places people are even shooting them down.

We have entered a new frontier of aerial observation with the unmanned aircraft. As is often the case with new …


Carpenter Privacy Case Vexes Justices, While Tech Giant Microsoft Battles Government In Second U.S. Supreme Court Privacy Case With International Implications, Richard J. Peltz-Steele Jan 2017

Carpenter Privacy Case Vexes Justices, While Tech Giant Microsoft Battles Government In Second U.S. Supreme Court Privacy Case With International Implications, Richard J. Peltz-Steele

Faculty Publications

Fall 2017 saw a major privacy case with international implications reach the U.S. Supreme Court this term, Carpenter v. United States. Now a second such case pits the Government against Big Tech in United States v. Microsoft. Carpenter is a criminal case involving federal seizure of cell phone location data from service providers. Arising under the “reasonable grounds” provision of the Stored Communications Act (SCA), the case accentuates Americans’ lack of constitutional protection for personal data in third-party hands, in contrast with emerging global privacy norms. The second major privacy case headed for Supreme Court decision in 2018 also arises …


Big Data And The Americans With Disabilities Act: Amending The Law To Cover Discrimination Based On Data-Driven Predictions Of Future Illnesses, Sharona Hoffman Jan 2017

Big Data And The Americans With Disabilities Act: Amending The Law To Cover Discrimination Based On Data-Driven Predictions Of Future Illnesses, Sharona Hoffman

Faculty Publications

While big data holds great promise to improve the human condition, it also creates new and previously unimaginable opportunities for discrimination. Employers, financial institutions, marketers, educational institutions, and others can now easily obtain a wealth of big data about individuals’ health status and use it to make adverse decisions relating to data subjects.

The Americans with Disabilities Act (ADA) is a federal law that prohibits employers and other public and private entities from discriminating against individuals because of their disabilities. This chapter argues that in the era of big data, the ADA does not go far enough. While the ADA …


The Law And Policy Of People Analytics, Matthew T. Bodie, Miriam A. Cherry, Marcia L. Mccormick, Jintong Tang Jan 2017

The Law And Policy Of People Analytics, Matthew T. Bodie, Miriam A. Cherry, Marcia L. Mccormick, Jintong Tang

Faculty Publications

(Excerpt)

Recently, leading technology companies such as Google and IBM have started experimenting with "people analytics," a new data-driven approach to human resources management. People analytics is just one example of the phenomenon of "big data," in which analyses of huge sets of quantitative information are used to guide a variety of decisions. Applying big data to workplace situations could lead to more effective work outcomes, as in Moneyball, where the Oakland A's baseball franchise used statistics to assemble a winning team on a shoestring budget. People analytics is the name given to this new approach to personnel management …


The Positive Law Model Of The Fourth Amendment, William Baude, James Y. Stern May 2016

The Positive Law Model Of The Fourth Amendment, William Baude, James Y. Stern

Faculty Publications

For fifty years, courts have used a “reasonable expectation of privacy” standard to define “searches” under the Fourth Amendment. As others have recognized, that doctrine is subjective, unpredictable, and conceptually confused, but viable alternatives have been slow to emerge. This Article supplies one.

We argue that Fourth Amendment protection should be anchored in background positive law. The touchstone of the search-and-seizure analysis should be whether government officials have done something forbidden to private parties. It is those actions that should be subjected to Fourth Amendment reasonableness review and the presumptive requirement to obtain a warrant. In short, Fourth Amendment protection …


Electronic Health Records And Medical Big Data: Law And Policy, Sharona Hoffman Jan 2016

Electronic Health Records And Medical Big Data: Law And Policy, Sharona Hoffman

Faculty Publications

This book helps readers gain an in-depth understanding of electronic health record (EHR) systems, medical big data, and the regulations that govern them. It is useful both as a primer for students and as a resource for knowledgeable professionals. The book analyzes the shortcomings and benefits of EHR systems, explores the law's response to the technology’s adoption, highlights gaps in the current legal framework, and develops detailed recommendations for regulatory, policy, and technological improvements. Electronic Health Records and Medical Big Data addresses not only privacy and security concerns, but also other important challenges, such as those related to data quality …


U.S. Media Law Update, Lyrissa Lidsky, Racheal Jones Jan 2016

U.S. Media Law Update, Lyrissa Lidsky, Racheal Jones

Faculty Publications

In June 2015 the United States Supreme Court completed what was hailed as its most ‘liberal term of the ages’, issuing major decisions on controversial issues, such as same-sex marriage, affirmative action and the Affordable Care Act. The Court’s free press jurisprudence, however, remained largely unchanged after its last term. The Court did not decide any significant press cases. Instead, the Court sidestepped the opportunity to resolve important questions about the constitutional limits on the prosecution of threats made via social media in one notable case, and set a new, more speech-protective standard for determining when a law is content-based …


Combatendo A Corrupção Nos Estados Unidos, Paul Marcus Oct 2015

Combatendo A Corrupção Nos Estados Unidos, Paul Marcus

Faculty Publications

The article discusses the problematic of the fight against the corruption by the criminal justice system of the United States, mainly the white-collar crimes. It is emphasized, first, that in most of the cases does not result in trial, but in plea bargains, and, second, in many cases the encouragement from an undercover agent has served as an effective defense instrument. Finally, it is discussed the problematic of the use of information obtained from the technological devices and its probable violation to the right privacy.

This article is in Portuguese.


The Pond Betwixt: Differences In The U.S.-Eu Data Protection/Safe Harbor Negotiation, Richard J. Peltz-Steele Jan 2015

The Pond Betwixt: Differences In The U.S.-Eu Data Protection/Safe Harbor Negotiation, Richard J. Peltz-Steele

Faculty Publications

This article analyzes the differing perspectives that animate US and EU conceptions of privacy in the context of data protection. It begins by briefly reviewing the two continental approaches to data protection and then explains how the two approaches arise in a context of disparate cultural traditions with respect to the role of law in society. In light of those disparities, Underpinning contemporary data protection regulation is the normative value that both US and EU societies place on personal privacy. Both cultures attribute modern privacy to the famous Warren-Brandeis article in 1890, outlining a "right to be let alone." But …


Social Media: Children’S Lawyer’S Friend And Foe, Jennifer Baum, Sarah N. Fox Jan 2015

Social Media: Children’S Lawyer’S Friend And Foe, Jennifer Baum, Sarah N. Fox

Faculty Publications

(Excerpt)

Social media is taking over the globe. The Pew Research Internet Project states that in the United States, 95 percent of 12- to 17-year-old children are online. Teenagers are also sharing more and more information online: 91 percent of teenagers post a photo of themselves, 92 percent post their real name, and 71 percent post the city or town where they live. “Teens Fact Sheet,” Pew Res. Internet Project (Sept. 2012). This information, in the wrong hands, can be harmful to a child. The Children’s Online Privacy Protection Rule, designed to safeguard children’s information and access online, is a …


Corporate Avatars And The Erosion Of The Populist Fourth Amendment, Avidan Cover Jan 2015

Corporate Avatars And The Erosion Of The Populist Fourth Amendment, Avidan Cover

Faculty Publications

The current state of Fourth Amendment jurisprudence leaves it to technology corporations to challenge court orders, subpoenas, and requests by the government for individual users’ information. The third-party doctrine denies people a reasonable expectation of privacy in data they transmit through telecommunications and Internet service providers. Third-party corporations become, by default, the people’s corporate avatars. Corporate avatars, however, do a poor job of representing individuals’ interests. Moreover, vesting the Fourth Amendment’s government-oversight functions in corporations fails to cohere with the Bill of Rights’ populist history and the Framers’ distrust of corporations.

This article examines how the third-party doctrine proves unsupportable …


Privacy And The New Press, Lyrissa Lidsky Jan 2015

Privacy And The New Press, Lyrissa Lidsky

Faculty Publications

In The First Amendment Bubble, Professor Amy Gajda comprehensively examines privacy threats posed by digital media and “quasi-journalists” and demonstrates how their intrusive practices threaten existing press freedoms.


Beyond The Schoolhouse Gates: The Unprecedented Expansion Of School Surveillance Authority Under Cyberbulling Laws, Emily Suski Oct 2014

Beyond The Schoolhouse Gates: The Unprecedented Expansion Of School Surveillance Authority Under Cyberbulling Laws, Emily Suski

Faculty Publications

For several years, states have grappled with the problem of cyberbullying and its sometimes devastating effects. Because cyberbullying often occurs between students, most states have understandably looked to schools to help address the problem. To that end, schools in forty-six states have the authority to intervene when students engage in cyberbullying. This solution seems all to the good unless a close examination of the cyberbullying laws and their implications is made. This Article explores some of the problematic implications of the cyberbullying laws. More specifically, it focuses on how the cyberbullying laws allow schools unprecedented surveillance authority over students. This …


Proximity-Driven Liability, Bryant Walker Smith Aug 2014

Proximity-Driven Liability, Bryant Walker Smith

Faculty Publications

This working paper argues that commercial sellers’ growing information about, access to, and control over their products, product users, and product uses could significantly expand their point-of-sale and post-sale obligations toward people endangered by these products. The paper first describes how companies are embracing new technologies that expand their information, access, and control, with primary reference to the increasingly automated and connected motor vehicle. It next analyzes how this proximity to product, user, and use could impact product-related claims for breach of implied warranty, defect in design or information, post-sale failure to warn or update, and negligent enabling of a …


Featuring People In Ads (2014 Edition), Eric Goldman, Rebecca Tushnet Aug 2014

Featuring People In Ads (2014 Edition), Eric Goldman, Rebecca Tushnet

Faculty Publications

This is a book chapter from the 2014 edition of a casebook, Advertising & Marketing Law: Cases and Materials, by Rebecca Tushnet and Eric Goldman. This chapter examines the legal issues arising from featuring people in advertisements, including publicity rights and endorsement/testimonial guidelines.


Ubiquitous Privacy, Thomas P. Crocker Jul 2014

Ubiquitous Privacy, Thomas P. Crocker

Faculty Publications

No abstract provided.


Keep Your Eyes On Eyes In The Sky, Hillary B. Farber Jan 2014

Keep Your Eyes On Eyes In The Sky, Hillary B. Farber

Faculty Publications

To date, eight states have passed bills regulating domestic drone use by government and private individuals. This leaves us with a question: If a city of more than 60,000 residents and a global company with a customer base in the hundreds of millions are racing to the sky, how are we as a commonwealth of 6.6 million to truly launch ourselves into the debate and protect what little privacy we have left?


On Business Torts And The First Amendment, Richard J. Peltz-Steele Jan 2014

On Business Torts And The First Amendment, Richard J. Peltz-Steele

Faculty Publications

A gaping question in free speech law surrounds the application of the First Amendment defense in business torts. The pervasiveness of communication technologies, the flourishing of privacy law, and the mere passage of time have precipitated an escalation in tort cases in which communication, and what the defendant may allege is free speech, lies at the heart of the matter.


The New American Privacy, Richard J. Peltz-Steele Jan 2014

The New American Privacy, Richard J. Peltz-Steele

Faculty Publications

The European Union sparked an intercontinental furor last year with proposed legislation to supersede the 1995 Data Protection Directive (DPD). The EU Parliament approved legislation in a 49-3 committee vote in October. The text, which is not yet published in its current draft at the time of this writing, may yet be amended before being accepted by the union’s 28 member states. The legislation is billed a money saver because it would harmonize EU member states’ data protection laws, which have diverged under the DPD umbrella. The business community is not convinced, fearful that costly new demands will strain balance …