Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

2016

PDF

Privacy

Discipline
Institution
Publication

Articles 1 - 30 of 42

Full-Text Articles in Law

Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen Dec 2016

Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen

All Faculty Scholarship

Big Data is the vast quantities of information amenable to large-scale collection, storage, and analysis. Using such data, companies and researchers can deploy complex algorithms and artificial intelligence technologies to reveal otherwise unascertained patterns, links, behaviors, trends, identities, and practical knowledge. The information that comprises Big Data arises from government and business practices, consumer transactions, and the digital applications sometimes referred to as the “Internet of Things.” Individuals invisibly contribute to Big Data whenever they live digital lifestyles or otherwise participate in the digital economy, such as when they shop with a credit card, get treated at a hospital, apply …


The Privacy Policymaking Of State Attorneys General, Danielle K. Citron Dec 2016

The Privacy Policymaking Of State Attorneys General, Danielle K. Citron

Faculty Scholarship

Accounts of privacy law have focused on legislation, federal agencies, and the self-regulation of privacy professionals. Crucial agents of regulatory change, however, have been ignored: the state attorneys general. This article is the first in-depth study of the privacy norm entrepreneurship of state attorneys general. Because so little has been written about this phenomenon, I engaged with primary sources — first interviewing state attorneys general and current and former career staff, and then examining documentary evidence received through FOIA requests submitted to AG offices around the country.

Much as Justice Louis Brandeis imagined states as laboratories of the law, offices …


Country By Country Reporting And Corporate Privacy: Some Unanswered Questions, Reuven S. Avi-Yonah Dec 2016

Country By Country Reporting And Corporate Privacy: Some Unanswered Questions, Reuven S. Avi-Yonah

Articles

Corporate privacy is an oxymoron. Individuals have a right to privacy, which the Supreme Court has recognized at least since Griswold v. Connecticut (1965). Warren and Brandeis’ famous defense of the right to privacy (1890) clearly applied only to individuals, because only individuals have the kind of feelings that are affected by invasions of privacy. Corporations are legal entities, and the concept of privacy does not apply to them, as the Supreme Court held in 1906. Thus, any objection to making corporate tax returns public cannot rest on the right to privacy. In fact, corporate returns were made public in …


Trending @ Rwu Law: Linn F. Freedman's Post: The Goal Of Gender Equality In Cybersecurity 08/23/2016, Linn F. Freedman Aug 2016

Trending @ Rwu Law: Linn F. Freedman's Post: The Goal Of Gender Equality In Cybersecurity 08/23/2016, Linn F. Freedman

Law School Blogs

No abstract provided.


Important Steps To Maintain The Privacy Of Patients In The Hospital, Savera Aziz Ali, Minaz Mawani, Gulshan Bano, Sumera Aziz Ali Aug 2016

Important Steps To Maintain The Privacy Of Patients In The Hospital, Savera Aziz Ali, Minaz Mawani, Gulshan Bano, Sumera Aziz Ali

School of Nursing & Midwifery

Women are considered as vulnerable groups in our society in spite of their defined women rights by various laws. This shows that unfortunately these laws are not implemented practically in the real life. Society is shaped by the individuals and everyone should be responsible for advocating their own rights as well as the right of others especially of the vulnerable groups within the population.


18th Annual Open Government Summit: Access To Public Records Act & Open Meetings Act, 2016, Department Of Attorney General, State Of Rhode Island Jul 2016

18th Annual Open Government Summit: Access To Public Records Act & Open Meetings Act, 2016, Department Of Attorney General, State Of Rhode Island

School of Law Conferences, Lectures & Events

No abstract provided.


My Body, Not My Say: Justice Blackmun's Influential Decision In Roe V. Wade, Kisha K. Patel Jul 2016

My Body, Not My Say: Justice Blackmun's Influential Decision In Roe V. Wade, Kisha K. Patel

Gender, Women's, and Sexuality Studies Summer Fellows

Abortion laws have regulated women’s bodies since the beginning of the country. Many people associate regulation with the case of Roe V. Wade in 1973, in which the Supreme Court ruled that states could not outlaw abortion during the first trimester. Roe v. Wade remains controversial to this day as it failed to establish consensus that women’s decision whether or not to terminate a pregnancy falls within their constitutional right to privacy. Understanding the implications of this decision is fundamental to analyze the debate over the constitutionality of abortion today. This paper examines the opinion written by Justice Blackmun in …


Newsroom: Goldstein On Drug Databases 6-27-2016, Sheri Qualters, Roger Williams University School Of Law Jun 2016

Newsroom: Goldstein On Drug Databases 6-27-2016, Sheri Qualters, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


The Law And Policy Of People Analytics, Matthew T. Bodie, Miriam A. Cherry, Marcia L. Mcormick, Jintong Tang May 2016

The Law And Policy Of People Analytics, Matthew T. Bodie, Miriam A. Cherry, Marcia L. Mcormick, Jintong Tang

AI-DR Collection

Leading technology companies such as Google and Facebook have been experimenting with people analytics, a new data-driven approach to human resources management. People analytics is just one example of the new phenomenon of “big data,” in which analyses of huge sets of quantitative information are used to guide decisions. Applying big data to the workplace could lead to more effective outcomes, as in the Moneyball example, where the Oakland Athletics baseball franchise used statistics to assemble a winning team on a shoestring budget. Data may help firms determine which candidates to hire, how to help workers improve job performance, and …


The Positive Law Model Of The Fourth Amendment, William Baude, James Y. Stern May 2016

The Positive Law Model Of The Fourth Amendment, William Baude, James Y. Stern

Faculty Publications

For fifty years, courts have used a “reasonable expectation of privacy” standard to define “searches” under the Fourth Amendment. As others have recognized, that doctrine is subjective, unpredictable, and conceptually confused, but viable alternatives have been slow to emerge. This Article supplies one.

We argue that Fourth Amendment protection should be anchored in background positive law. The touchstone of the search-and-seizure analysis should be whether government officials have done something forbidden to private parties. It is those actions that should be subjected to Fourth Amendment reasonableness review and the presumptive requirement to obtain a warrant. In short, Fourth Amendment protection …


Transatlantic Setback Or Invitation To Dialogue?: Eu Data Regulators’ Verdict On Privacy Shield, Peter Margulies Apr 2016

Transatlantic Setback Or Invitation To Dialogue?: Eu Data Regulators’ Verdict On Privacy Shield, Peter Margulies

Law Faculty Scholarship

No abstract provided.


13th Annual Diversity Symposium Dinner 04-07-2016, Roger Williams University School Of Law Apr 2016

13th Annual Diversity Symposium Dinner 04-07-2016, Roger Williams University School Of Law

School of Law Conferences, Lectures & Events

No abstract provided.


Unilateral Invasions Of Privacy, Roger Allan Ford Apr 2016

Unilateral Invasions Of Privacy, Roger Allan Ford

Law Faculty Scholarship

Most people seem to agree that individuals have too little privacy, and most proposals to address that problem focus on ways to give those users more information about, and more control over, how information about them is used. Yet in nearly all cases, information subjects are not the parties who make decisions about how information is collected, used, and disseminated; instead, outsiders make unilateral decisions to collect, use, and disseminate information about others. These potential privacy invaders, acting without input from information subjects, are the parties to whom proposals to protect privacy must be directed. This Article develops a theory …


Against Data Exceptionalism, Andrew Keane Woods Apr 2016

Against Data Exceptionalism, Andrew Keane Woods

Law Faculty Scholarly Articles

One of the great regulatory challenges of the Internet era—indeed, one of today's most pressing privacy questions—is how to define the limits of government access to personal data stored in the cloud. This is particularly true today because the cloud has gone global, raising a number of questions about the proper reach of one state's authority over cloud-based data. The prevailing response to these questions by scholars, practitioners, and major Internet companies like Google and Facebook has been to argue that data is different. Data is “unterritorial,” they argue, and therefore incompatible with existing territorial notions of jurisdiction. This Article …


The Right To Silence V. The Fifth Amendment, Tracey Maclin Mar 2016

The Right To Silence V. The Fifth Amendment, Tracey Maclin

Faculty Scholarship

This paper concerns a well-known, but badly misunderstood, constitutional right. The Fifth Amendment to the Constitution guarantees, inter alia, that no person “shall be compelled in any criminal case to be a witness against himself.” For the non-lawyer, the Fifth Amendment protects an individual’s right to silence. Many Americans believe that the Constitution protects their right to remain silent when questioned by police officers or governmental officials. Three rulings from the Supreme Court over the past twelve years, Chavez v. Martinez (2003), Berghuis v. Thomkpins (2010) and Salinas v. Texas (2013), however, demonstrate that the “right to remain silent” that …


Newsroom: Margulies On Apple V. Fbi Standoff 02-18-2016, Roger Williams University School Of Law Feb 2016

Newsroom: Margulies On Apple V. Fbi Standoff 02-18-2016, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


Newsroom: Freedman On Credit Reports 02-12-2016, Roger Williams University School Of Law Feb 2016

Newsroom: Freedman On Credit Reports 02-12-2016, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


The History, Means, And Effects Of Structural Surveillance, Jeffrey L. Vagle Feb 2016

The History, Means, And Effects Of Structural Surveillance, Jeffrey L. Vagle

All Faculty Scholarship

The focus on the technology of surveillance, while important, has had the unfortunate side effect of obscuring the study of surveillance generally, and tends to minimize the exploration of other, less technical means of surveillance that are both ubiquitous and self-reinforcing—what I refer to as structural surveillance— and their effects on marginalized and disenfranchised populations. This Article proposes a theoretical framework for the study of structural surveillance which will act as a foundation for follow-on research in its effects on political participation.


Recognizing Rights In Real Time: The Role Of Google In The Eu Right To Be Forgotten, Edward Lee Feb 2016

Recognizing Rights In Real Time: The Role Of Google In The Eu Right To Be Forgotten, Edward Lee

All Faculty Scholarship

No abstract provided.


Reconsidering Constitutional Protection For Health Information Privacy, Wendy K. Mariner Feb 2016

Reconsidering Constitutional Protection For Health Information Privacy, Wendy K. Mariner

Faculty Scholarship

What kinds of health information should be reported to government for civil purposes? Several competing trends encourage efforts to reassess the scope of constitutional protection for health information: the social and commercial value of health information; the amount of data held by third parties, from health care providers to internet servers; critiques of the third party doctrine exception to Fourth Amendment protection; and concerns about the loss of privacy. This article describes a variety of civil purposes for which health information is collected today. A close analysis of cases applying the third party doctrine, administrative search principles, and the special …


Data Breaches, Identity Theft And Article Iii Standing: Will The Supreme Court Resolve The Split In The Circuits, Bradford Mank Jan 2016

Data Breaches, Identity Theft And Article Iii Standing: Will The Supreme Court Resolve The Split In The Circuits, Bradford Mank

Faculty Articles and Other Publications

In data breach cases, the lower federal courts have split on the question of whether the plaintiffs meet Article III standing requirements for injury and causation. In its 2013 decision Clapper v. Amnesty International USA, the Supreme Court, in a case involving alleged electronic surveillance by the U.S. government’s National Security Agency, declared that a plaintiff alleging that it will suffer future injuries from a defendant’s allegedly improper conduct must show that such injuries are “certainly impending.” Since the Clapper decision, a majority of the lower federal courts addressing “lost data” or potential identity theft cases in which there is …


Lawn Signs: A Fourth Amendment For Constitutional Curmudgeons, Andrew Ferguson Jan 2016

Lawn Signs: A Fourth Amendment For Constitutional Curmudgeons, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

What is the constitutional significance of the proverbial "keep off the grass" sign? This question — asked by curmudgeonly neighbors everywhere — has been given new currency in a recent decision by the United States Supreme Court. Indeed, Florida v. Jardines might have bestowed constitutional curmudgeons with significant new Fourth Amendment protections. By expressing expectations regarding — and control over — access to property, "the people" may be able to claim greater Fourth Amendment protections not only for their homes, but also for their persons, papers, and effects. This article launches a constitutionally grounded, but lighthearted campaign of citizen education …


Classification Standards For Health Information: Ethical And Practical Approaches, Craig Konnoth Jan 2016

Classification Standards For Health Information: Ethical And Practical Approaches, Craig Konnoth

Publications

Secondary health information research requires vast quantities of data in order to make clinical and health delivery breakthroughs. Restrictive policies that limit the use of such information threaten to stymie this research. While the Notice of Proposed Rulemaking (NPRM) for the new Common Rule permits patients to provide broad consent for the use of their information for research, that policy offers insufficient flexibility. This Article suggests a flexible consenting system that allows patients to consent to a range of privacy risks. The details of the system will be fleshed out in future work.


Privacy And Accountability In Black-Box Medicine, Roger Allan Ford, W. Nicholson Price Ii Jan 2016

Privacy And Accountability In Black-Box Medicine, Roger Allan Ford, W. Nicholson Price Ii

Law Faculty Scholarship

Black-box medicine—the use of big data and sophisticated machine learning techniques for health-care applications—could be the future of personalized medicine. Black-box medicine promises to make it easier to diagnose rare diseases and conditions, identify the most promising treatments, and allocate scarce resources among different patients. But to succeed, it must overcome two separate, but related, problems: patient privacy and algorithmic accountability. Privacy is a problem because researchers need access to huge amounts of patient health information to generate useful medical predictions. And accountability is a problem because black-box algorithms must be verified by outsiders to ensure they are accurate and …


Use Of Facial Recognition Technology For Medical Purposes: Balancing Privacy With Innovation, Seema Mohapatra Jan 2016

Use Of Facial Recognition Technology For Medical Purposes: Balancing Privacy With Innovation, Seema Mohapatra

Faculty Scholarship

No abstract provided.


The Notion And Practice Of Reputation And Professional Identity In Social Networking: From K-12 Through Law School, Roberta Bobbie Studwell Jan 2016

The Notion And Practice Of Reputation And Professional Identity In Social Networking: From K-12 Through Law School, Roberta Bobbie Studwell

Faculty Scholarship

No abstract provided.


Electronic Health Records And Medical Big Data: Law And Policy, Sharona Hoffman Jan 2016

Electronic Health Records And Medical Big Data: Law And Policy, Sharona Hoffman

Faculty Publications

This book helps readers gain an in-depth understanding of electronic health record (EHR) systems, medical big data, and the regulations that govern them. It is useful both as a primer for students and as a resource for knowledgeable professionals. The book analyzes the shortcomings and benefits of EHR systems, explores the law's response to the technology’s adoption, highlights gaps in the current legal framework, and develops detailed recommendations for regulatory, policy, and technological improvements. Electronic Health Records and Medical Big Data addresses not only privacy and security concerns, but also other important challenges, such as those related to data quality …


Chilling Effects: Online Surveillance And Wikipedia Use, Jonathon Penney Jan 2016

Chilling Effects: Online Surveillance And Wikipedia Use, Jonathon Penney

Articles, Book Chapters, & Popular Press

This article discusses the results of the first empirical study providing evidence of regulatory “chilling effects” of Wikipedia users associated with online government surveillance. The study explores how traffic to Wikipedia articles on topics that raise privacy concerns for Wikipedia users decreased after the widespread publicity about NSA/PRISM surveillance revelations in June 2013. Using an interdisciplinary research design, the study tests the hypothesis, based on chilling effects theory, that traffic to privacy-sensitive Wikipedia articles reduced after the mass surveillance revelations. The Article finds not only a statistically significant immediate decline in traffic for these Wikipedia articles after June 2013, but …


Cross-Cutting Conflicts: Developments In The Use Of Norwich Orders In Internet Defamation Cases, Robert Currie Jan 2016

Cross-Cutting Conflicts: Developments In The Use Of Norwich Orders In Internet Defamation Cases, Robert Currie

Articles, Book Chapters, & Popular Press

The anonymity afforded to those wishing to post commentary on the internet has given rise to a number of procedural issues in Canadian case law. This paper focuses on one such issue: the need for prospective plaintiffs in defamation actions to "unmask" anonymous commentators in order to be able to bring proceedings against them. It tracks the increasing use of the "Norwich order," A.K.A an order for pre-action discovery, as a means of accomplishing this objective, by examining the leading case of Warman v. Fournier and analyzing how this issue has played out in litigation to date. It also considers …


Chilling Effects: Online Surveillance And Wikipedia Use, Jonathon Penney Jan 2016

Chilling Effects: Online Surveillance And Wikipedia Use, Jonathon Penney

Articles, Book Chapters, & Popular Press

This article discusses the results of the first empirical study providing evidence of regulatory “chilling effects” of Wikipedia users associated with online government surveillance. The study explores how traffic to Wikipedia articles on topics that raise privacy concerns for Wikipedia users decreased after the widespread publicity about NSA/PRISM surveillance revelations in June 2013. Using an interdisciplinary research design, the study tests the hypothesis, based on chilling effects theory, that traffic to privacy-sensitive Wikipedia articles reduced after the mass surveillance revelations. The Article finds not only a statistically significant immediate decline in traffic for these Wikipedia articles after June 2013, but …