Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Privacy Law (10)
- Fourth Amendment (7)
- Constitutional Law (6)
- Criminal Law (5)
- Science and Technology Law (5)
-
- Criminal Procedure (4)
- First Amendment (3)
- Law Enforcement and Corrections (2)
- National Security Law (2)
- Sexuality and the Law (2)
- Social and Behavioral Sciences (2)
- Torts (2)
- Administrative Law (1)
- Commercial Law (1)
- Communications Law (1)
- Computer Law (1)
- Computer Sciences (1)
- Criminology (1)
- Education Law (1)
- Evidence (1)
- Fourteenth Amendment (1)
- Human Rights Law (1)
- Information Security (1)
- Intellectual Property Law (1)
- Law and Psychology (1)
- Law and Race (1)
- Legal Studies (1)
- Legislation (1)
- Litigation (1)
- Institution
-
- Washington and Lee University School of Law (3)
- University of Colorado Law School (2)
- Boston University School of Law (1)
- Cleveland State University (1)
- Georgetown University Law Center (1)
-
- Maurer School of Law: Indiana University (1)
- Northwestern Pritzker School of Law (1)
- SJ Quinney College of Law, University of Utah (1)
- Saint Louis University School of Law (1)
- San Jose State University (1)
- Schulich School of Law, Dalhousie University (1)
- Selected Works (1)
- St. John's University School of Law (1)
- St. Mary's University (1)
- University at Buffalo School of Law (1)
- University of Massachusetts School of Law (1)
- University of Michigan Law School (1)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (1)
- Publication
-
- Scholarly Articles (2)
- Articles (1)
- Articles by Maurer Faculty (1)
- Buffalo Law Review (1)
- Faculty Articles (1)
-
- Faculty Publications (1)
- Faculty Scholarship (1)
- Georgetown Law Faculty Publications and Other Works (1)
- Journal of Criminal Law and Criminology (1)
- LLM Theses (1)
- Publications (1)
- Research Data (1)
- Saint Louis University Law Journal (1)
- Scholarly Works (1)
- Secrecy and Society (1)
- St. John's Law Review (1)
- Stephen E Henderson (1)
- The Downtown Review (1)
- Utah Law Faculty Scholarship (1)
- Washington and Lee Law Review (1)
- Publication Type
Articles 1 - 21 of 21
Full-Text Articles in Law
Privacy's Double Standards: Public Disclosure Tort Case Chart (2006-2016), Scott Skinner-Thompson
Privacy's Double Standards: Public Disclosure Tort Case Chart (2006-2016), Scott Skinner-Thompson
Research Data
This document, Privacy's Double Standards: Public Disclosure Tort Case Chart (2006-2016), 93 Wash. L. Rev. Online 2051 (2018), https://www.law.uw.edu/wlr/online-edition/scott-skinner-thompson, was published as an electronic supplement to the empirical study, Scott Skinner-Thompson, Privacy’s Double Standards, 93 Wash. L. Rev. 2051 (2018), available at https://scholar.law.colorado.edu/articles/1218/.
Psychosocial Analysis Of An Ethnography At The Cuyahoga County Public Defenders Office, Ernest M. Oleksy
Psychosocial Analysis Of An Ethnography At The Cuyahoga County Public Defenders Office, Ernest M. Oleksy
The Downtown Review
Too often, social science majors become jaded with their field of study due to a misperception of the nature of many potential jobs which they are qualified for. Such discord is prevalent amongst undergraduates who strive for work in the criminal justice system. Hollywood misrepresentations become the archetypes of the aforementioned field, leaving out the necessity and ubiquity of accompanying desk work. Still other social science majors struggle to identify theoretical interpretations in praxis.
The First Amendment In The Second Gilded Age, Jack M. Balkin
The First Amendment In The Second Gilded Age, Jack M. Balkin
Buffalo Law Review
How do we pay for the digital public sphere? In the Second Gilded Age, the answer is primarily through digital surveillance and through finding ever new ways to make money out of personal data. Digital capitalism in the Second Gilded Age features an implicit bargain: a seemingly unlimited freedom to speak in exchange for the right to surveil and manipulate end users.To protect freedom of speech in the Second Gilded Age we must distinguish the values of free speech from the judicially created doctrines of the First Amendment. That is because the practical freedom to speak online depends on a …
Tactful Inattention: Erving Goffman, Privacy In The Digital Age, And The Virtue Of Averting One's Eyes, Elizabeth De Armond
Tactful Inattention: Erving Goffman, Privacy In The Digital Age, And The Virtue Of Averting One's Eyes, Elizabeth De Armond
St. John's Law Review
(Excerpt)
This Article suggests that we would benefit if we would protect privacy by sometimes requiring tactful inattention by potential users rather than total secrecy by the target. That is, some legal privacy protections should stop emphasizing secrecy and instead emphasize the appropriate uses of personally identifiable and often sensitive information by gelling tactful inattention into legal standards. Culturally, such an expansion may be difficult, as we tend to a “finders-keepers” attitude towards data. However, given technology’s ability to dissolve routine barriers, if we require others to leave some information out of some equations, we may be able to retain …
The Authoritarianization Of U.S. Counterterrorism, Sahar F. Aziz
The Authoritarianization Of U.S. Counterterrorism, Sahar F. Aziz
Washington and Lee Law Review
No abstract provided.
Smart Devices In Criminal Investigations: How Section 8 Of The Canadian Charter Of Rights And Freedoms Can Better Protect Privacy In The Search Of Technology And Seizure Of Information, Lee-Ann Conrod
LLM Theses
This thesis examines the jurisprudence from the Supreme Court of Canada (SCC) on informational privacy under section 8 of the Canadian Charter of Rights and Freedoms as it relates to searches of technology in the context of criminal investigations. The development and use of technology in criminal investigations will be detailed along with an overview of the current state of the law in this area. Challenges with the interpretation of section 8 demonstrate a prevalent uncertainty. This thesis proposes a new approach for the SCC to apply to cases where technology intersects with section 8 of the Charter. The proposal …
Fourth Amendment Constraints On The Technological Monitoring Of Convicted Sex Offenders, Ben A. Mcjunkin, J. J. Prescott
Fourth Amendment Constraints On The Technological Monitoring Of Convicted Sex Offenders, Ben A. Mcjunkin, J. J. Prescott
Articles
More than forty U.S. states currently track at least some of their convicted sex offenders using GPS devices. Many offenders will be monitored for life. The burdens and expense of living indefinitely under constant technological monitoring have been well documented, but most commentators have assumed that these burdens were of no constitutional moment because states have characterized such surveillance as ‘‘civil’’ in character—and courts have seemed to agree. In 2015, however, the Supreme Court decided in Grady v. North Carolina that attaching a GPS monitoring device to a person was a Fourth Amendment search, notwithstanding the ostensibly civil character of …
Constitutional Shapeshifting: Giving The Fourth Amendment Substance In The Technology Driven World Of Criminal Investigation, Gerald S. Reamey
Constitutional Shapeshifting: Giving The Fourth Amendment Substance In The Technology Driven World Of Criminal Investigation, Gerald S. Reamey
Faculty Articles
For the first hundred years of the Fourth Amendment's life, gains in the technology of surveillance were modest. With the advent of miniaturization and ever-increasing sophistication and capability of surveillance and detection devices, the Supreme Court has struggled to adapt its understanding of "search" to the constantly evolving devices and methods that challenge contemporary understanding of privacy. In response to surveillance innovations, the Court has taken varying positions, focusing first on property-based intrusions by government, then shifting to privacy expectations, and, more recently, resurrecting the view that a trespass to property can define search.
This article surveys this constitutional odyssey, …
The Biopolitical Public Domain: The Legal Construction Of The Surveillance Economy, Julie E. Cohen
The Biopolitical Public Domain: The Legal Construction Of The Surveillance Economy, Julie E. Cohen
Georgetown Law Faculty Publications and Other Works
Within the political economy of informational capitalism, commercial surveillance practices are tools for resource extraction. That process requires an enabling legal construct, which this essay identifies and explores. Contemporary practices of personal information processing constitute a new type of public domain — a repository of raw materials that are there for the taking and that are framed as inputs to particular types of productive activity. As a legal construct, the biopolitical public domain shapes practices of appropriation and use of personal information in two complementary and interrelated ways. First, it constitutes personal information as available and potentially valuable: as a …
Corporate Social Responsibility And Social Media Corporations: Incorporating Human Rights Through Rankings, Self-Regulation And Shareholder Resolutions, Erika George
Utah Law Faculty Scholarship
This article examines the emergence and evolution of selected ranking and reporting frameworks in the expanding realm of business and human rights advocacy. It explores how indicators in the form of rankings and reports evaluating the conduct of transnational corporate actors can serve as regulatory tools with potential to bridge a global governance gap that often places human rights at risk. This article examines the relationship of transnational corporations in the Internet communications technology sector (ICT sector) to human rights and the risks presented to the right to freedom of expression and the right to privacy when ICT sector companies …
Review, The New Era Of Secret Law, Patrice Mcdermott
Review, The New Era Of Secret Law, Patrice Mcdermott
Secrecy and Society
In a recent Brennan Center report, The New Era of Secret Law, Elizabeth (Liza) Goitein articulates, examines, and evaluates the claims for and objections to secret law. Under this banner, the report includes any law that is withheld from the public, regardless of whether it may be shared among agencies or with certain members or committees of Congress.” Goitein’s underlying goal is to propose procedural and substantive reforms. Secret Law is a deeply-researched and highly valuable policy brief with an aim of making specific policy recommendations. And readable to boot.
The Fourth Amendment In The Age Of Persistent Aerial Surveillance, John Pavletic
The Fourth Amendment In The Age Of Persistent Aerial Surveillance, John Pavletic
Journal of Criminal Law and Criminology
If Big Brother made movies, persistent aerial surveillance would be its masterpiece. Small airplanes are rigged with high-tech cameras that can continuously transmit real-time images to the ground. The aircraft is able to monitor an area of thirty square miles for ten hours at a time. This technology allows video analysts to zoom in and track the location of vehicles, and even people. It was originally designed for military use during the Iraq War, but since then, it has been adapted for civilian applications. In 2016, the Baltimore Police Department contracted with Persistent Surveillance Systems to carry out a trial …
Ferpa Close-Up: When Video Captures Violence And Injury, Richard J. Peltz-Steele, Kitty L. Cone
Ferpa Close-Up: When Video Captures Violence And Injury, Richard J. Peltz-Steele, Kitty L. Cone
Faculty Publications
Federal privacy law is all to often misconstrued or perverted to preclude the disclosure of video recordings that capture students victimized by violent crime or tortious injury. This misuse of federal law impedes transparency and accountability and, in many cases, even jeopardizes the health, safety, and lives of children. When properly construed, however, federal law is no bar to disclosure and, at least in public schools, works in tandem with freedom of information laws to ensure disclosure. This Article posits that without unequivocal guidance from federal administrative authorities, uncertainty regarding the disclosure of such recordings will continue to linger, jeopardizing …
Cybersurveillance Intrusions And An Evolving Katz Privacy Test, Margaret Hu
Cybersurveillance Intrusions And An Evolving Katz Privacy Test, Margaret Hu
Scholarly Articles
To contextualize why a new approach to the Fourth Amendment is essential, this Article describes two emerging cybersurveillance tools. The first Cybersurveillance tool, Geofeedia, has been deployed by state and local law enforcement. Geofeedia uses a process known as "geofencing" to draw a virtual barrier around a particular geographic region, and then identifies and tracks public social media posts within that region for predictive policing purposes. The second tool, Future Attribute Screening Technology (FAST), is under development by the United States Department of Homeland Security (DHS). FAST is another predictive policing tool that analyzes physiological and behavioral signals with the …
Bulk Biometric Metadata Collection, Margaret Hu
Bulk Biometric Metadata Collection, Margaret Hu
Scholarly Articles
Smart police body cameras and smart glasses worn by law enforcement increasingly reflect state-of-the-art surveillance technology, such as the integration of live-streaming video with facial recognition and artificial intelligence tools, including automated analytics. This Article explores how these emerging cybersurveillance technologies risk the potential for bulk biometric metadata collection. Such collection is likely to fall outside the scope of the types of bulk metadata collection protections regulated by the USA FREEDOM Act of 2015. The USA FREEDOM Act was intended to bring the practice of bulk telephony metadata collection conducted by the National Security Agency (“NSA”) under tighter regulation. In …
Body Cameras And The Path To Redeem Privacy Law, Woodrow Hartzog
Body Cameras And The Path To Redeem Privacy Law, Woodrow Hartzog
Faculty Scholarship
From a privacy perspective, the movement towards police body cameras seems ominous. The prospect of a surveillance device capturing massive amounts of data concerning people’s most vulnerable moments is daunting. These concerns are compounded by the fact that there is little consensus and few hard rules on how and for whom these systems should be built and used. But in many ways, this blank slate is a gift. Law and policy makers are not burdened by the weight of rules and technologies created in a different time for a different purpose. These surveillance and data technologies will be modern. Many …
The New Writs Of Assistance, Ian Samuel
The New Writs Of Assistance, Ian Samuel
Articles by Maurer Faculty
The providers of network services (and the makers of network devices) know an enormous amount about our lives. Because they do, these network intermediaries are being asked with increasing frequency to assist the government in solving crimes or gathering intelligence. Given how much they know about us, if the government can secure the assistance of these intermediaries, it will enjoy a huge increase in its theoretical capacity for surveillance—the ability to learn, in principle, almost anything about anyone. That has the potential to create serious social harm, even assuming that the government continues to adhere to ordinary democratic norms and …
Game Of Drones: Rolling The Dice With Unmanned Aerial Vehicles And Privacy, Rebecca L. Scharf
Game Of Drones: Rolling The Dice With Unmanned Aerial Vehicles And Privacy, Rebecca L. Scharf
Scholarly Works
This Article offers a practical three-part test for courts and law enforcement to utilize when faced with drone and privacy issues. Specifically addressing the question: how should courts analyze the Fourth Amendment’s protection against ‘unreasonable searches’ in the context of drones?
The Supreme Court’s Fourth Amendment jurisprudence produced an intricate framework to address issues arising out of the intersection of technology and privacy interests. In prominent decisions, including United States v. Katz, California v. Ciraolo, Kyllo v. United States, and most notably, United States v. Jones, the Court focused on whether the use of a single …
Labor Organizing In The Age Of Surveillance, Charlotte Garden
Labor Organizing In The Age Of Surveillance, Charlotte Garden
Saint Louis University Law Journal
No abstract provided.
Privacy's Double Standards, Scott Skinner-Thompson
Privacy's Double Standards, Scott Skinner-Thompson
Publications
Where the right to privacy exists, it should be available to all people. If not universally available, then privacy rights should be particularly accessible to marginalized individuals who are subject to greater surveillance and are less able to absorb the social costs of privacy violations. But in practice, there is evidence that people of privilege tend to fare better when they bring privacy tort claims than do non-privileged individuals. This disparity occurs despite doctrine suggesting that those who occupy prominent and public social positions are entitled to diminished privacy tort protections.
This Article unearths disparate outcomes in public disclosure tort …
Carpenter V. United States And The Fourth Amendment: The Best Way Forward, Stephen E. Henderson
Carpenter V. United States And The Fourth Amendment: The Best Way Forward, Stephen E. Henderson
Stephen E Henderson