Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 56

Full-Text Articles in Law

Privacy Vs. Transparency: Handling Protected Materials In Agency Rulemaking, Christopher S. Yoo, Kellen Mccoy Dec 2020

Privacy Vs. Transparency: Handling Protected Materials In Agency Rulemaking, Christopher S. Yoo, Kellen Mccoy

Faculty Scholarship at Penn Law

Agencies conducting informal rulemaking proceedings increasingly confront conflicting duties with respect to protected materials included in information submitted in public rulemaking dockets. They must reconcile the broad commitment to openness and transparency reflected in federal law with the duty to protect confidential business information (CBI) and personally identifiable information (PII) against improper disclosure.

This Article presents an analysis of how agencies can best balance these often-countervailing considerations. Part I explores the statutory duties to disclose and withhold information submitted in public rulemaking dockets placed on agencies. It also examines judicial decisions and other legal interpretations regarding the proper way to ...


Compliance Management Systems: Do They Make A Difference?, Cary Coglianese, Jennifer Nash Aug 2020

Compliance Management Systems: Do They Make A Difference?, Cary Coglianese, Jennifer Nash

Faculty Scholarship at Penn Law

Regulatory compliance is vital for promoting the public values served by regulation. Yet many businesses remain out of compliance with some of the regulations that apply to them—presenting not only possible dangers to the public but also exposing themselves to potentially significant liability risk. Compliance management systems (CMSs) may help reduce the likelihood of noncompliance. In recent years, managers have begun using CMSs in an effort to address compliance issues in a variety of domains: environment, workplace health and safety, finance, health care, and aviation, among others. CMSs establish systematic, checklist-like processes by which managers seek to improve their ...


Regulation Of Algorithmic Tools In The United States, Christopher S. Yoo, Alicia Lai Jan 2020

Regulation Of Algorithmic Tools In The United States, Christopher S. Yoo, Alicia Lai

Faculty Scholarship at Penn Law

Policymakers in the United States have just begun to address regulation of artificial intelligence technologies in recent years, gaining momentum through calls for additional research funding, piece-meal guidance, proposals, and legislation at all levels of government. This Article provides an overview of high-level federal initiatives for general artificial intelligence (AI) applications set forth by the U.S. president and responding agencies, early indications from the incoming Biden Administration, targeted federal initiatives for sector-specific AI applications, pending federal legislative proposals, and state and local initiatives. The regulation of the algorithmic ecosystem will continue to evolve as the United States continues to ...


Privative Copyright, Shyamkrishna Balganesh Jan 2020

Privative Copyright, Shyamkrishna Balganesh

Faculty Scholarship at Penn Law

“Privative” copyright claims are infringement actions brought by authors for the unauthorized public dissemination of works that are private, unpublished, and revelatory of the author’s personal identity. Driven by considerations of authorial autonomy, dignity, and personality rather than monetary value, these claims are almost as old as Anglo-American copyright law itself. Yet modern thinking has attempted to undermine their place within copyright law and sought to move them into the domain of privacy law. This Article challenges the dominant view and argues that privative copyright claims form a legitimate part of the copyright landscape. It shows how privative copyright ...


Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick Jan 2019

Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick

Faculty Scholarship at Penn Law

Across the Internet, mistaken and malicious routing announcements impose significant costs on users and network operators. To make routing announcements more reliable and secure, Internet coordination bodies have encouraged network operators to adopt the Resource Public Key Infrastructure (“RPKI”) framework. Despite this encouragement, RPKI’s adoption rates are low, especially in North America.

This report presents the results of a year-long investigation into the hypothesis—widespread within the network operator community—that legal issues pose barriers to RPKI adoption and are one cause of the disparities between North America and other regions of the world. On the basis of interviews ...


The Privacy Interest In Property, Abraham Bell, Gideon Parchomovsky Jan 2019

The Privacy Interest In Property, Abraham Bell, Gideon Parchomovsky

Faculty Scholarship at Penn Law

Once upon a time, there existed a clear nexus between property and privacy. Protection of property rights was an important safeguard against intrusions of the privacy interests of owners both by the government and by private actors. Gradually, however, the symbiotic relationship between privacy and property has been forgotten by scholars and policymakers and fallen into oblivion.

In this Article, we seek to restore the centrality of privacy in property law by making two novel contributions – one descriptive and one normative. Descriptively, we demonstrate that concerns for privacy inform, at times implicitly, many important property doctrines. Indeed, we show that ...


The Ecology Of Transparency Reloaded, Seth F. Kreimer Jan 2018

The Ecology Of Transparency Reloaded, Seth F. Kreimer

Faculty Scholarship at Penn Law

As Justice Stewart famously observed, "[t]he Constitution itself is neither a Freedom of Information Act nor an Official Secrets Act." What the Constitution's text omits, the last two generations have embedded in "small c" constitutional law and practice in the form of the Freedom of Information Act and a series of overlapping governance reforms including Inspectors General, disclosure of political contributions, the State Department’s “Dissent Channel,” the National Archives Information Security Oversight Office, and the publication rights guaranteed by New York Times v. United States. These institutions constitute an ecology of transparency.

The late Justice Scalia argued ...


Relational Contracts Of Adhesion, David A. Hoffman Jan 2018

Relational Contracts Of Adhesion, David A. Hoffman

Faculty Scholarship at Penn Law

Not all digital fine print exculpates liability: some exhorts users to perform before the consumer relationship has soured. We promise to choose strong passwords (and hold them private); to behave civilly on social networks; to refrain from streaming shows and sports; and to avoid reverse-engineering code (or, worse, deploying deadly bots). In short: consumers are apparently regulated by digital fine print, though it’s universally assumed we don’t read it, and even if we did, we’ll never be sued for failing to perform.

On reflection, this ordinary phenomenon is perplexing. Why would firms persist in deploying uncommunicative behavioral ...


Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen Dec 2016

Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen

Faculty Scholarship at Penn Law

Big Data is the vast quantities of information amenable to large-scale collection, storage, and analysis. Using such data, companies and researchers can deploy complex algorithms and artificial intelligence technologies to reveal otherwise unascertained patterns, links, behaviors, trends, identities, and practical knowledge. The information that comprises Big Data arises from government and business practices, consumer transactions, and the digital applications sometimes referred to as the “Internet of Things.” Individuals invisibly contribute to Big Data whenever they live digital lifestyles or otherwise participate in the digital economy, such as when they shop with a credit card, get treated at a hospital, apply ...


Laird V. Tatum And Article Iii Standing In Surveillance Cases, Jeffrey L. Vagle Jan 2016

Laird V. Tatum And Article Iii Standing In Surveillance Cases, Jeffrey L. Vagle

Faculty Scholarship at Penn Law

Plaintiffs seeking to challenge government surveillance programs have faced long odds in federal courts, due mainly to a line of Supreme Court cases that have set a very high bar to Article III standing in these cases. The origins of this jurisprudence can be directly traced to Laird v. Tatum, a 1972 case where the Supreme Court considered the question of who could sue the government over a surveillance program, holding in a 5-4 decision that chilling effects arising “merely from the individual’s knowledge” of likely government surveillance did not constitute adequate injury to meet Article III standing requirements.


Neuroprediction: New Technology, Old Problems, Stephen J. Morse Jan 2015

Neuroprediction: New Technology, Old Problems, Stephen J. Morse

Faculty Scholarship at Penn Law

Neuroprediction is the use of structural or functional brain or nervous system variables to make any type of prediction, including medical prognoses and behavioral forecasts, such as an indicator of future dangerous behavior. This commentary will focus on behavioral predictions, but the analysis applies to any context. The general thesis is that using neurovariables for prediction is a new technology, but that it raises no new ethical issues, at least for now. Only if neuroscience achieves the ability to “read” mental content will genuinely new ethical issues be raised, but that is not possible at present.


Toward A Closer Integration Of Law And Computer Science, Christopher S. Yoo Jan 2014

Toward A Closer Integration Of Law And Computer Science, Christopher S. Yoo

Faculty Scholarship at Penn Law

Legal issues increasingly arise in increasingly complex technological contexts. Prominent recent examples include the Stop Online Piracy Act (SOPA) and the Protect Intellectual Property Act (PIPA), network neutrality, the increasing availability of location information, and the NSA’s surveillance program. Other emerging issues include data privacy, online video distribution, patent policy, and spectrum policy. In short, the rapid rate of technological change has increasingly shown that law and engineering can no longer remain compartmentalized into separate spheres. The logical response would be to embed the interaction between law and policy deeper into the fabric of both fields. An essential step ...


Public Assistance, Drug Testing, And The Law: The Limits Of Population-Based Legal Analysis, Candice T. Player Jan 2014

Public Assistance, Drug Testing, And The Law: The Limits Of Population-Based Legal Analysis, Candice T. Player

Faculty Scholarship at Penn Law

In Populations, Public Health and the Law, legal scholar Wendy Parmet urges courts to embrace population-based legal analysis, a public health inspired approach to legal reasoning. Parmet contends that population-based legal analysis offers a way to analyze legal issues—not unlike law and economics—as well as a set of values from which to critique contemporary legal discourse. Population-based analysis has been warmly embraced by the health law community as a bold new way of analyzing legal issues. Still, population-based analysis is not without its problems. At times, Parmet claims too much territory for the population perspective. Moreover, Parmet urges ...


Privacy Law: Positive Theory And Normative Practice, Anita L. Allen Jan 2013

Privacy Law: Positive Theory And Normative Practice, Anita L. Allen

Faculty Scholarship at Penn Law

No abstract provided.


An Ethical Duty To Protect One’S Own Information Privacy?, Anita L. Allen Jan 2013

An Ethical Duty To Protect One’S Own Information Privacy?, Anita L. Allen

Faculty Scholarship at Penn Law

People freely disclose vast quantities of personal and personally identifiable information. The central question of this Meador Lecture in Morality is whether they have a moral (or ethical) obligation (or duty) to withhold information about themselves or otherwise to protect information about themselves from disclosure. Moreover, could protecting one’s own information privacy be called for by important moral virtues, as well as obligations or duties? Safeguarding others’ privacy is widely understood to be a responsibility of government, business, and individuals. The “virtue” of fairness and the “duty” or “obligation” of respect for persons arguably ground other-regarding responsibilities of confidentiality ...


Health Insurance, Employment, And The Human Genome: Genetic Discrimination And Biobanks In The United States, Eric A. Feldman, Chelsea Darnell Jan 2013

Health Insurance, Employment, And The Human Genome: Genetic Discrimination And Biobanks In The United States, Eric A. Feldman, Chelsea Darnell

Faculty Scholarship at Penn Law

Does genetic information warrant special legal protection, and if so how should it be protected? This essay examines the most recent (and indeed only) significant effort by the US government to prohibit genetic discrimination, the Genetic Information Nondiscrimination Act (GINA). We argue that the legislation is unlikely to have the positive impact sought by advocates of genetic privacy and proponents of biobanks. In part, GINA disappoints because it does too little. Hailed by its promoters as “the first civil rights act of the 21st century,” GINA’s reach is in fact quite modest and its grasp even more so ...


Natural Law, Slavery, And The Right To Privacy Tort, Anita L. Allen Dec 2012

Natural Law, Slavery, And The Right To Privacy Tort, Anita L. Allen

Faculty Scholarship at Penn Law

In 1905 the Supreme Court of Georgia became the first state high court to recognize a freestanding “right to privacy” tort in the common law. The landmark case was Pavesich v. New England Life Insurance Co. Must it be a cause for deep jurisprudential concern that the common law right to privacy in wide currency today originated in Pavesich’s explicit judicial interpretation of the requirements of natural law? Must it be an additional worry that the court which originated the common law privacy right asserted that a free white man whose photograph is published without his consent in a ...


First Amendment Privacy And The Battle For Progressively Liberal Social Change, Anita L. Allen Mar 2012

First Amendment Privacy And The Battle For Progressively Liberal Social Change, Anita L. Allen

Faculty Scholarship at Penn Law

No abstract provided.


Facebook Fallacies, Geoffrey C. Hazard Jr. Jan 2012

Facebook Fallacies, Geoffrey C. Hazard Jr.

Faculty Scholarship at Penn Law

No abstract provided.


What Must We Hide: The Ethics Of Privacy And The Ethos Of Disclosure, Anita L. Allen Jan 2012

What Must We Hide: The Ethics Of Privacy And The Ethos Of Disclosure, Anita L. Allen

Faculty Scholarship at Penn Law

No abstract provided.


Collateral Consequences, Genetic Surveillance, And The New Biopolitics Of Race, Dorothy E. Roberts Apr 2011

Collateral Consequences, Genetic Surveillance, And The New Biopolitics Of Race, Dorothy E. Roberts

Faculty Scholarship at Penn Law

This Article is part of a Howard Law Journal Symposium on “Collateral Consequences: Who Really Pays the Price for Criminal Justice?,” as well as my larger book project, Fatal Invention: How Science, Politics, and Big Business Re-create Race in the Twenty-First Century (The New Press, 2011). It considers state and federal government expansion of genetic surveillance as a collateral consequence of a criminal record in the context of a new biopolitics of race in America. Part I reviews the expansion of DNA data banking by states and the federal government, extending the collateral impact of a criminal record—in the ...


Cloud Computing: Architectural And Policy Implications, Christopher S. Yoo Apr 2011

Cloud Computing: Architectural And Policy Implications, Christopher S. Yoo

Faculty Scholarship at Penn Law

Cloud computing has emerged as perhaps the hottest development in information technology. Despite all of the attention that it has garnered, existing analyses focus almost exclusively on the issues that surround data privacy without exploring cloud computing’s architectural and policy implications. This article offers an initial exploratory analysis in that direction. It begins by introducing key cloud computing concepts, such as service-oriented architectures, thin clients, and virtualization, and discusses the leading delivery models and deployment strategies that are being pursued by cloud computing providers. It next analyzes the economics of cloud computing in terms of reducing costs, transforming capital ...


Pervasive Image Capture And The First Amendment: Memory, Discourse, And The Right To Record, Seth F. Kreimer Jan 2011

Pervasive Image Capture And The First Amendment: Memory, Discourse, And The Right To Record, Seth F. Kreimer

Faculty Scholarship at Penn Law

As digital image technology proliferates in camera phones, iPhones, and PDAs, almost any image we observe can be costlessly recorded, freely reproduced and instantly transmitted. We live, relate, work, and decide in an environment in which pervasive image capture from life is routine. During the last half decade, captured images have come to underpin crucial elements of ongoing private and public discourse; digital image capture has become a ubiquitous adjunct to memory and a pervasively accepted mode of connection and correspondence. Digitally captured images precipitate conflicts between government authority and free expression. From efforts to suppress cell phone videos of ...


Associational Privacy And The First Amendment: Naacp V. Alabama, Privacy And Data Protection, Anita L. Allen Jan 2011

Associational Privacy And The First Amendment: Naacp V. Alabama, Privacy And Data Protection, Anita L. Allen

Faculty Scholarship at Penn Law

No abstract provided.


Privacy Torts: Unreliable Remedies For Lgbt Plaintiffs, Anita L. Allen Oct 2010

Privacy Torts: Unreliable Remedies For Lgbt Plaintiffs, Anita L. Allen

Faculty Scholarship at Penn Law

In the United States, both constitutional law and tort law recognize the right to privacy, understood as legal entitlement to an intimate life of one’s own free from undue interference by others and the state. Lesbian, gay, bisexual, and transgender (“LGBT”) persons have defended their interests in dignity, equality, autonomy, and intimate relationships in the courts by appealing to that right. In the constitutional arena, LGBT Americans have claimed the protection of state and federal privacy rights with a modicum of well-known success. Holding that homosexuals have the same right to sexual privacy as heterosexuals, Lawrence v. Texas symbolizes ...


Free Speech And The Myth Of The Internet As An Unintermediated Experience, Christopher S. Yoo Sep 2009

Free Speech And The Myth Of The Internet As An Unintermediated Experience, Christopher S. Yoo

Faculty Scholarship at Penn Law

In recent years, a growing number of commentators have raised concerns that the decisions made by Internet intermediaries — including last-mile network providers, search engines, social networking sites, and smartphones — are inhibiting free speech and have called for restrictions on their ability to prioritize or exclude content. Such calls ignore the fact that when mass communications are involved, intermediation helps end users to protect themselves from unwanted content and allows them to sift through the avalanche of desired content that grows ever larger every day. Intermediation also helps solve a number of classic economic problems associated with the Internet. In short ...


Race, Gender, And Genetic Technologies: A New Reproductive Dystopia?, Dorothy E. Roberts Jan 2009

Race, Gender, And Genetic Technologies: A New Reproductive Dystopia?, Dorothy E. Roberts

Faculty Scholarship at Penn Law

No abstract provided.


Confidentiality: An Expectation In Health Care, Anita L. Allen Jan 2008

Confidentiality: An Expectation In Health Care, Anita L. Allen

Faculty Scholarship at Penn Law

The practice of confidentiality has continued in an era of increased, voluntary openness about medical information in everyday life. Indeed the number and variety of state and federal laws mandating confidentiality by medical professionals has increased in the last dozen years. Moreover, personal injury suits alleging breach of confidentiality or invasion of privacy, along with suits asserting evidentiary privileges, reflect the reality that expectations of confidentiality of medical records and relationships remain strong.


The Virtuous Spy: Privacy As An Ethical Limit, Anita L. Allen Jan 2008

The Virtuous Spy: Privacy As An Ethical Limit, Anita L. Allen

Faculty Scholarship at Penn Law

Is there any reason not to spy on other people as necessary to get the facts straight, especially if you can put the facts you uncover to good use? To “spy” is secretly to monitor or investigate another's beliefs, intentions, actions, omissions, or capacities, especially as revealed in otherwise concealed or confidential conduct, communications and documents. By definition, spying involves secret, covert activity, though not necessarily lies, fraud or dishonesty. Nor does spying necessarily involve the use of special equipment, such as a tape recorder or high-powered binoculars. Use of a third party agent, such as a “private eye ...


Dredging Up The Past: Lifelogging, Memory And Surveillance, Anita L. Allen Jan 2008

Dredging Up The Past: Lifelogging, Memory And Surveillance, Anita L. Allen

Faculty Scholarship at Penn Law

The term “lifelog” refers to a comprehensive archive of an individual's quotidian existence, created with the help of pervasive computing technologies. Lifelog technologies would record and store everyday conversations, actions, and experiences of their users, enabling future replay and aiding remembrance. Products to assist lifelogging are already on the market; but the technology that will enable people fully and continuously to document their entire lives is still in the research and development phase. For generals, edgy artists and sentimental grandmothers alike, lifelogging could someday replace or complement, existing memory preservation practices. Like a traditional diary, journal or day-book, the ...