Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Law

Improving Post-Approval Risk Surveillance For Drugs: Active Post-Market Risk Identification, Matthew Gordon Jan 2008

Improving Post-Approval Risk Surveillance For Drugs: Active Post-Market Risk Identification, Matthew Gordon

Michigan Telecommunications & Technology Law Review

Pre-approval clinical trials cannot possibly ensure that a drug will not have disastrous side effects once it arrives on the market. Post-approval drug safety data gathering was put in place to address this problem, but as implemented, it has not proven to be as effective as hoped. Congress recently overhauled the legislation regarding post-approval drug risk identification, and in doing so made a deliberate decision to put much of the burden of post-approval drug surveillance on the FDA through data mining. Further, the legislation gave the FDA the power to require post-approval clinical trials from drug makers only in limited …


Just Click Submit: The Collection, Dissemination And Tagging Of Personally Identifying Information, Corey A. Ciocchetti Jan 2008

Just Click Submit: The Collection, Dissemination And Tagging Of Personally Identifying Information, Corey A. Ciocchetti

Corey A Ciocchetti

As the twenty-first century bustles forward, the e-commerce arena becomes an ever more dangerous place. On a daily basis, websites collect vast amounts of personally identifying information (PII) and mine it in sophisticated databases to discover consumer trends and desires. This process provides many benefits – such as tailored websites and relevant marketing – that few Web surfers would care to do without. However, serious threats lurk in cyberspace and are enhanced by consumers who continue to submit vast amounts of information in a state of relative unawareness. Not wanting to miss out on their Web surfing experience, visitors submit …


Government Data Mining: The Need For A Legal Framework, Fred H. Cate Jan 2008

Government Data Mining: The Need For A Legal Framework, Fred H. Cate

Articles by Maurer Faculty

The article examines the government's growing appetite for collecting personal data. Often justified on the basis of protecting national security, government data mining programs sweep up data collected through hundreds of regulatory and administrative programs, and combine them with huge datasets obtained from industry. The result is an aggregation of personal data - the "digital footprints" of individual lives - never before seen. These data warehouses are then used to determine who can work and participate in Social Security programs, who can board airplanes and enter government buildings, and who is likely to pose a threat in the future, even …


Government Data Mining And The Fourth Amendment, Christopher Slobogin Jan 2008

Government Data Mining And The Fourth Amendment, Christopher Slobogin

Vanderbilt Law School Faculty Publications

The government's ability to obtain and analyze recorded information about its citizens through the process known as data mining has expanded enormously over the past decade. Although the best-known government data mining operation (Total Information Awareness, more recently dubbed Terrorism Information Awareness) supposedly no longer exists, large-scale data mining by federal agencies devoted to enforcing criminal and counter-terrorism laws has continued unabated. This paper addresses three puzzles about data mining. First, when data mining is undertaken by the government, does it implicate the Fourth Amendment? Second, does the analysis change when data mining is undertaken by private entities which then …


Data Mining And The Security-Liberty Debate, Daniel J. Solove Jan 2008

Data Mining And The Security-Liberty Debate, Daniel J. Solove

GW Law Faculty Publications & Other Works

In this essay, written for a symposium on surveillance for the University of Chicago Law Review, I examine some common difficulties in the way that liberty is balanced against security in the context of data mining. Countless discussions about the trade-offs between security and liberty begin by taking a security proposal and then weighing it against what it would cost our civil liberties. Often, the liberty interests are cast as individual rights and balanced against the security interests, which are cast in terms of the safety of society as a whole. Courts and commentators defer to the government's assertions about …


Understanding Privacy (Chapter One), Daniel J. Solove Jan 2008

Understanding Privacy (Chapter One), Daniel J. Solove

GW Law Faculty Publications & Other Works

Privacy is one of the most important concepts of our time, yet it is also one of the most elusive. As rapidly changing technology makes information increasingly available, scholars, activists, and policymakers have struggled to define privacy, with many conceding that the task is virtually impossible.

In UNDERSTANDING PRIVACY (Harvard University Press, May 2008), Professor Daniel J. Solove offers a comprehensive overview of the difficulties involved in discussions of privacy and ultimately provides a provocative resolution. He argues that no single definition can be workable, but rather that there are multiple forms of privacy, related to one another by family …