Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2019

Privacy

Discipline
Institution
Publication
Publication Type

Articles 1 - 30 of 112

Full-Text Articles in Law

Implementing Ethics Into Artificial Intelligence: A Contribution, From A Legal Perspective, To The Development Of An Ai Governance Regime, Axel Walz, Kay Firth-Butterfield Dec 2019

Implementing Ethics Into Artificial Intelligence: A Contribution, From A Legal Perspective, To The Development Of An Ai Governance Regime, Axel Walz, Kay Firth-Butterfield

Duke Law & Technology Review

The increasing use of AI and autonomous systems will have revolutionary impacts on society. Despite many benefits, AI and autonomous systems involve considerable risks that need to be managed. Minimizing these risks will emphasize the respective benefits while at the same time protecting the ethical values defined by fundamental rights and basic constitutional principles, thereby preserving a human centric society. This Article advocates for the need to conduct in-depth risk-benefit-assessments with regard to the use of AI and autonomous systems. This Article points out major concerns in relation to AI and autonomous systems such as likely job losses, causation of …


United States V. Jones: Changing Expectations Of Privacy In The Digital Age, Daniel W. Edwards Dec 2019

United States V. Jones: Changing Expectations Of Privacy In The Digital Age, Daniel W. Edwards

University of Denver Criminal Law Review

No abstract provided.


Attempts Towards A Zero-Sum Game: A Recurring Imbalance Between Individual Privacy And The Fourth Amendment, Christopher Netniss Dec 2019

Attempts Towards A Zero-Sum Game: A Recurring Imbalance Between Individual Privacy And The Fourth Amendment, Christopher Netniss

Loyola of Los Angeles Entertainment Law Review

The digital era we live in today allows society to work, shop, socialize, and even monitor one’s health without having to leave the confines of one’s home. In a recent landmark privacy case, Carpenter v. United States, the individual privacy implications of the Fourth Amendment were strengthened when the Supreme Court held that the government must generally obtain a warrant before collecting more than six days of historical cell-site location information from a third-party service provider, like Verizon. Cell-site location information could implicate numerous Fourth Amendment concepts, such as the third-party doctrine, mosaic theory, and public exposure doctrine. Refusing to …


Actual Harm Means It Is Too Late: How Rosenbach V. Six Flags Demonstrates Effective Biometric Information Privacy Law, Chloe Stepney Dec 2019

Actual Harm Means It Is Too Late: How Rosenbach V. Six Flags Demonstrates Effective Biometric Information Privacy Law, Chloe Stepney

Loyola of Los Angeles Entertainment Law Review

Technology is rapidly advancing, and the law is trying to keep up. While this challenge is not new, technological advancements are impacting privacy rights in unprecedented ways. Using a fingerprint to clock in at work or face identification to unlock a smartphone provides ease and convenience, but at what cost?

Currently, there is no federal law that regulates the collection, use, and storage of biometric information in the private sector. On a local level, three states have enacted laws that specifically address biometrics. Of those, the Biometric Information Privacy Act (BIPA) in Illinois provides the strongest protections for consumers, who …


Law School News: Among The Trailblazers 12/02/2019, Michael M. Bowden Dec 2019

Law School News: Among The Trailblazers 12/02/2019, Michael M. Bowden

Life of the Law School (1993- )

No abstract provided.


Cops And Cars: How The Automobile Drove Fourth Amendment Law, Tracey Maclin Dec 2019

Cops And Cars: How The Automobile Drove Fourth Amendment Law, Tracey Maclin

Faculty Scholarship

This is an essay on Professor Sarah A. Seo’s new book, Policing the Open Road: How Cars Transformed American Freedom (Harvard Univ. Press 2019). I focus on Professor Seo’s analysis of Carroll v. United States, 267 U.S. 132 (1925) and Brinegar v. United States, 338 U.S. 160 (1949). Carroll is important not only because it was the Court’s first car case. Understanding Carroll (and Brinegar, which solidified and expanded Carroll’s holding) is essential because, nearly one hundred years later, its logic continues to direct how the modern Court resolves Fourth Amendment claims of motorists. Put simply, a majority of today’s …


Deep Fakes: A Looming Challenge For Privacy, Democracy, And National Security, Danielle K. Citron, Robert Chesney Dec 2019

Deep Fakes: A Looming Challenge For Privacy, Democracy, And National Security, Danielle K. Citron, Robert Chesney

Faculty Scholarship

Harmful lies are nothing new. But the ability to distort reality has taken an exponential leap forward with “deep fake” technology. This capability makes it possible to create audio and video of real people saying and doing things they never said or did. Machine learning techniques are escalating the technology’s sophistication, making deep fakes ever more realistic and increasingly resistant to detection. Deep-fake technology has characteristics that enable rapid and widespread diffusion, putting it into the hands of both sophisticated and unsophisticated actors. While deep-fake technology will bring with it certain benefits, it also will introduce many harms. The marketplace …


Catching Killers With Consumer Genetic Information, Angela Hackstadt Nov 2019

Catching Killers With Consumer Genetic Information, Angela Hackstadt

University Libraries Faculty Scholarship

In April 2018, Joseph James D'Angelo was arrested as a suspect in the Golden State Killer case. DNA evidence collected at a 1980 crime scene finally shed light on the murderer's identity in early 2018 when investigators turned to GEDMatch, a service that allows users to upload and share DNA data obtained from consumer genetic tests. Consumer genetic testing, DNA collection, and familial DNA searching all raise ethical and privacy concerns. If investigators are using genetic genealogy to solve cold cases, where does that leave consumers?


Law School News: Logan To Serve As Adviser On Restatement Third Of Torts 11-07-2019, Michael M. Bowden Nov 2019

Law School News: Logan To Serve As Adviser On Restatement Third Of Torts 11-07-2019, Michael M. Bowden

Life of the Law School (1993- )

No abstract provided.


Data Scams, Roger Allan Ford Nov 2019

Data Scams, Roger Allan Ford

Law Faculty Scholarship

Targeting platforms like Google and Facebook are usually seen as presenting tradeoffs between utility and privacy. This Article identifies and describes a different, non-privacy cost of targeting platforms: they make it easier for malicious actors to scam others. They do this by making it easier for scammers to reach the most promising victims, hide from law-enforcement authorities and others, and develop better scams. Technology offers potential solutions, since the same data and targeting tools that enable scams could help detect and prevent them, though neither platforms nor law-enforcement officials have both the incentives and expertise needed to develop and deploy …


Linn Foster Freedman Room Dedication At Rwu School Of Law 11-01-2019, Roger Williams University School Of Law, Michael M. Bowden Nov 2019

Linn Foster Freedman Room Dedication At Rwu School Of Law 11-01-2019, Roger Williams University School Of Law, Michael M. Bowden

School of Law Conferences, Lectures & Events

No abstract provided.


Digital Health Privacy In Active-Aging Settings: Will The Law Let You Age Well?, Tara Sklar, Richard Carmona, Kathie Insel, Christopher Robertson Nov 2019

Digital Health Privacy In Active-Aging Settings: Will The Law Let You Age Well?, Tara Sklar, Richard Carmona, Kathie Insel, Christopher Robertson

Faculty Scholarship

What is privacy and how are our interpretations of it changing with advances in technology? This question, and concerns around potentially violating a person’s right to privacy, have been emerging across industries around the world. Senior living providers have increased their exposure to privacy risks with the shift to implementing sensors throughout their communities. Typically located in digital health devices that can be worn on the body or placed in the environment, these sensors are capable of collecting and tracking data relevant to a person’s health and well-being on a continuous monitoring basis.

There are privacy laws and a growing …


Protection Of Privacy And Banking Secrecy In Swiss Banking, Bashkim Nuredini, Vesna Paunkoska Dodevska Oct 2019

Protection Of Privacy And Banking Secrecy In Swiss Banking, Bashkim Nuredini, Vesna Paunkoska Dodevska

UBT International Conference

Despite being one of the most developed and regulated countries in the world, Switzerland is also considered to be the leading financial center in the world. Everyone agrees with the fact that banking is one of the most recognizable activities in Switzerland, and also places it among the most important international financial centers with a long tradition, stretching back to medieval times.

Swiss banking is a synonym for a banking system in which the principle of secrecy in banking is widely used. Banking secrecy as an established practice is based on the fact that customer data is kept secret for …


Hardware, Heartware, Or Nightmare: Smart-City Technology And The Concomitant Erosion Of Privacy, Leila Lawlor Oct 2019

Hardware, Heartware, Or Nightmare: Smart-City Technology And The Concomitant Erosion Of Privacy, Leila Lawlor

Journal of Comparative Urban Law and Policy

Smart city technology is being adopted in cities all around the world to simplify our lives, save us time, ease traffic, improve education, reduce energy usage and keep us safe. This article discusses smart city projects being utilized in crime prevention and investigations. Specifically, this article highlights examples of gunshot detection devices and surveillance that have led to improvements in public safety in Cape Town, Chicago and Atlanta, and discusses their impacts to privacy.


The Missing Regulatory State: Monitoring Businesses In An Age Of Surveillance, Rory V. Loo Oct 2019

The Missing Regulatory State: Monitoring Businesses In An Age Of Surveillance, Rory V. Loo

Vanderbilt Law Review

An irony of the information age is that the companies responsible for the most extensive surveillance of individuals in history-large platforms such as Amazon, Facebook, and Google-have themselves remained unusually shielded from being monitored by government regulators. But the legal literature on state information acquisition is dominated by the privacy problems of excess collection from individuals, not businesses. There has been little sustained attention to the problem of insufficient information collection from businesses. This Article articulates the administrative state's normative framework for monitoring businesses and shows how that framework is increasingly in tension with privacy concerns. One emerging complication is …


The Missing Regulatory State: Monitoring Businesses In An Age Of Surveillance, Rory Van Loo Oct 2019

The Missing Regulatory State: Monitoring Businesses In An Age Of Surveillance, Rory Van Loo

Faculty Scholarship

An irony of the information age is that the companies responsible for the most extensive surveillance of individuals in history—large platforms such as Amazon, Facebook, and Google—have themselves remained unusually shielded from being monitored by government regulators. But the legal literature on state information acquisition is dominated by the privacy problems of excess collection from individuals, not businesses. There has been little sustained attention to the problem of insufficient information collection from businesses. This Article articulates the administrative state’s normative framework for monitoring businesses and shows how that framework is increasingly in tension with privacy concerns. One emerging complication is …


Law School News: Throw Out The Old Thinking 9-30-2019, Michael M. Bowden Sep 2019

Law School News: Throw Out The Old Thinking 9-30-2019, Michael M. Bowden

Life of the Law School (1993- )

No abstract provided.


Review Of Ian Kerr And Jane Bailey, The Implications Of Digital Rights Management For Privacy And Freedom Of Expression, 2 Journal Of Information, Communication & Ethics In Society 87 (2004), Ann Bartow Sep 2019

Review Of Ian Kerr And Jane Bailey, The Implications Of Digital Rights Management For Privacy And Freedom Of Expression, 2 Journal Of Information, Communication & Ethics In Society 87 (2004), Ann Bartow

Law Faculty Scholarship

Ian Kerr, who passed away far too young in 2019, was an incisive scholar and a much treasured colleague. The wit that sparkled in his papers was matched only by his warmth toward his friends, of whom there were many. He and his many co-authors wrote with deep insight and an equally deep humanity about copyright, artificial intelligence, privacy, torts, and much much more.

Ian was also a valued contributor to the Jotwell Technology Law section. His reviews here display the same playful generosity that characterized everything else he did. In tribute to his memory, we are publishing a memorial …


The Positive Law Model Of The Fourth Amendment, William Baude, James Y. Stern Sep 2019

The Positive Law Model Of The Fourth Amendment, William Baude, James Y. Stern

James Y. Stern

For fifty years, courts have used a “reasonable expectation of privacy” standard to define “searches” under the Fourth Amendment. As others have recognized, that doctrine is subjective, unpredictable, and conceptually confused, but viable alternatives have been slow to emerge. This Article supplies one.

We argue that Fourth Amendment protection should be anchored in background positive law. The touchstone of the search-and-seizure analysis should be whether government officials have done something forbidden to private parties. It is those actions that should be subjected to Fourth Amendment reasonableness review and the presumptive requirement to obtain a warrant. In short, Fourth Amendment protection …


Combatendo A Corrupção Nos Estados Unidos, Paul Marcus Sep 2019

Combatendo A Corrupção Nos Estados Unidos, Paul Marcus

Paul Marcus

The article discusses the problematic of the fight against the corruption by the criminal justice system of the United States, mainly the white-collar crimes. It is emphasized, first, that in most of the cases does not result in trial, but in plea bargains, and, second, in many cases the encouragement from an undercover agent has served as an effective defense instrument. Finally, it is discussed the problematic of the use of information obtained from the technological devices and its probable violation to the right privacy.

This article is in Portuguese.


Towards Standard Information Privacy, Innovations Of The New General Data Protection Regulation, Ali Alibeigi, Abu Bakar Munir, Md Ershadulkarim, Adeleh Asemi Sep 2019

Towards Standard Information Privacy, Innovations Of The New General Data Protection Regulation, Ali Alibeigi, Abu Bakar Munir, Md Ershadulkarim, Adeleh Asemi

Library Philosophy and Practice (e-journal)

Protection of personal data in recent decades became more crucial affecting by emergence of the new technologies especially computer, internet, information and communications technology. However, Europeans felt this necessity at time and provided for up-to-date and supportive laws. The General Data Protection Regulation (GDPR) is the latest legislation in EU to protect personal data of individuals based on the recent technological advancements. However, its’ domestic and international output still is debatable. This doctrinal legal study by using descriptive methods, aimed to evaluate the GDPR through analyzing and interpreting its’ provisions by especial focus on its’ innovations. The results show that …


Catalyzing Privacy Law, Anupam Chander, Margot E. Kaminski, William Mcgeveran Aug 2019

Catalyzing Privacy Law, Anupam Chander, Margot E. Kaminski, William Mcgeveran

Georgetown Law Faculty Publications and Other Works

The United States famously lacks a comprehensive federal data privacy law. In the past year, however, over half the states have proposed broad privacy bills or have established task forces to propose possible privacy legislation. Meanwhile, congressional committees are holding hearings on multiple privacy bills. What is catalyzing this legislative momentum? Some believe that Europe’s General Data Protection Regulation (GDPR), which came into force in 2018, is the driving factor. But with the California Consumer Privacy Act (CCPA) which took effect in January 2020, California has emerged as an alternate contender in the race to set the new standard for …


21st Century-Style Truth Decay: Deep Fakes And The Challenge For Privacy, Free Expression, And National Security, Robert Chesney, Danielle Keats Citron Aug 2019

21st Century-Style Truth Decay: Deep Fakes And The Challenge For Privacy, Free Expression, And National Security, Robert Chesney, Danielle Keats Citron

Maryland Law Review

No abstract provided.


The Case For The Third-Party Doctrine, Orin S. Kerr Jul 2019

The Case For The Third-Party Doctrine, Orin S. Kerr

Orin Kerr

This Article offers a defense of the Fourth Amendment's third party doctrine, the controversial rule that information loses Fourth Amendment protection when it is knowingly revealed to a third party. Fourth Amendment scholars have repeatedly attacked the rule on the ground that it is unpersuasive on its face and gives the government too much power This Article responds that critics have overlooked the benefits of the rule and have overstated its weaknesses. The third-party doctrine serves two critical functions. First, the doctrine ensures the technological neutrality of the Fourth Amendment. It corrects for the substitution effect of third parties that …


The Role Of Satellites And Smart Devices: Data Surprises And Security, Privacy, And Regulatory Challenges, Anne T. Mckenna, Amy C. Gaudion, Jenni L. Evans Jul 2019

The Role Of Satellites And Smart Devices: Data Surprises And Security, Privacy, And Regulatory Challenges, Anne T. Mckenna, Amy C. Gaudion, Jenni L. Evans

Amy C. Gaudion

Strava, a popular social media platform and mobile app like Facebook but specifically designed for athletes, posts a “heatmap” with consensually-obtained details about users’ workouts and geolocation. Strava’s heatmap depicts aggregated data of user location and movement by synthesizing GPS satellite data points and movement data from users’ smart devices together with satellite imagery. In January of 2018, a 20-year-old student tweeted that Strava’s heatmap revealed U.S. forward operating bases. The tweet revealed a significant national security issue and flagged substantial privacy and civil liberty concerns.

Smart devices, software applications, and social media platforms aggregate consumer data from multiple data …


Privacy Rights And Public Families, Khiara Bridges Jul 2019

Privacy Rights And Public Families, Khiara Bridges

Khiara M Bridges

This Article is based on eighteen months of anthropological fieldwork conducted among poor, pregnant women receiving prenatal care provided by the Prenatal Care Assistance Program (“PCAP”) at a large public hospital in New York City. The Prenatal Care Assistance Program (“PCAP”) is a special program within the New York State Medicaid program that provides comprehensive prenatal care services to otherwise uninsured or underinsured women. This Article attempts to accomplish two goals. The first goal is to argue that PCAP’s compelled consultations – with social workers, health educators, nutritionists, and financial officers – function as a gross and substantial intrusion by …


Drone Invasion: Unmanned Aerial Vehicles And The Right To Privacy, Rebecca L. Scharf Jul 2019

Drone Invasion: Unmanned Aerial Vehicles And The Right To Privacy, Rebecca L. Scharf

Indiana Law Journal

Since the birth of the concept of a legally recognized right to privacy in Samuel D. Warren and Louis D. Brandeis’ influential 1890 law review article, “The Right to Privacy,” common law—with the aid of influential scholars—has massaged the concept of privacy torts into actionable claims. But now, one of the most innovative technological advancements in recent years, the unmanned aerial vehicle, or drone, has created difficult challenges for plaintiffs and courts navigating common law privacy tort claims.

This Article explores the challenges of prosecution of the specific privacy tort of intrusion upon seclusion involving nongovernmental use of drone technology. …


Automated License Plate Readers: The Difficult Balance Of Solving Crime And Protecting Individual Privacy, Lauren Fash Jun 2019

Automated License Plate Readers: The Difficult Balance Of Solving Crime And Protecting Individual Privacy, Lauren Fash

Maryland Law Review Online

No abstract provided.


Industrial Justice: Privacy Protection For The Employed, Ariana R. Levinson Jun 2019

Industrial Justice: Privacy Protection For The Employed, Ariana R. Levinson

Ariana R. Levinson

No abstract provided.


Remedies, Neutral Rules And Free Speech, David F. Partlett, Russell L. Weaver Jun 2019

Remedies, Neutral Rules And Free Speech, David F. Partlett, Russell L. Weaver

Russell L. Weaver

In general, plaintiffs’ ability to obtain substantial damages against media defendants is directly proportional to their ability to obtain so called “publication damages.”...In future cases, the courts may be forced to deal more straightforwardly with the First Amendment issues. In Sanders, the court avoided those issues because they were not raised. As a result, the court left open the possibility that, even in an intrusion case a media defendant might be allowed to show that the invasion of privacy was “justified by the legitimate motive of gathering the news.”...Moreover, the very existence of the litigation undoubtedly has a negative impact …