Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Privacy Law (59)
- Science and Technology Law (25)
- Computer Law (17)
- Constitutional Law (16)
- First Amendment (13)
-
- Fourth Amendment (13)
- Internet Law (13)
- Health Law and Policy (11)
- Criminal Law (10)
- International Law (10)
- Intellectual Property Law (9)
- European Law (8)
- Torts (8)
- Civil Law (7)
- Comparative and Foreign Law (7)
- Criminal Procedure (7)
- Human Rights Law (7)
- Law and Society (7)
- Other Law (7)
- Public Law and Legal Theory (7)
- Business Organizations Law (6)
- Commercial Law (5)
- Legal Profession (5)
- Marketing Law (5)
- Social and Behavioral Sciences (5)
- Transnational Law (5)
- Administrative Law (4)
- Civil Rights and Discrimination (4)
- Communications Law (4)
- Institution
-
- Selected Works (12)
- Boston University School of Law (11)
- Seattle University School of Law (6)
- Fordham Law School (5)
- Maurer School of Law: Indiana University (5)
-
- Roger Williams University (5)
- University of Colorado Law School (5)
- Cleveland State University (3)
- Georgetown University Law Center (3)
- SJ Quinney College of Law, University of Utah (3)
- Vanderbilt University Law School (3)
- American University Washington College of Law (2)
- Loyola Marymount University and Loyola Law School (2)
- Loyola University Chicago, School of Law (2)
- New York Law School (2)
- Notre Dame Law School (2)
- Penn State Dickinson Law (2)
- St. John's University School of Law (2)
- Touro University Jacob D. Fuchsberg Law Center (2)
- University of Florida Levin College of Law (2)
- University of Maryland Francis King Carey School of Law (2)
- University of Nebraska - Lincoln (2)
- University of New Hampshire (2)
- University of Pennsylvania Carey Law School (2)
- William & Mary Law School (2)
- California Western School of Law (1)
- Case Western Reserve University School of Law (1)
- Columbia Law School (1)
- Duke Law (1)
- Emory University School of Law (1)
- Publication
-
- Faculty Scholarship (17)
- Seattle University Law Review (6)
- Life of the Law School (1993- ) (4)
- Publications (4)
- Fordham Intellectual Property, Media and Entertainment Law Journal (3)
-
- Georgetown Law Faculty Publications and Other Works (3)
- Indiana Law Journal (3)
- Scholarly Works (3)
- Articles (2)
- Articles in Law Reviews & Other Academic Journals (2)
- Cleveland State Law Review (2)
- Faculty Publications (2)
- Faculty Publications & Other Works (2)
- Faculty Scholarly Works (2)
- Law Faculty Scholarship (2)
- Library Philosophy and Practice (e-journal) (2)
- Loyola of Los Angeles Entertainment Law Review (2)
- Notre Dame Journal of International & Comparative Law (2)
- UF Law Faculty Publications (2)
- Utah Law Faculty Scholarship (2)
- All Faculty Scholarship (1)
- Amy C. Gaudion (1)
- Ariana R. Levinson (1)
- Articles & Chapters (1)
- Articles by Maurer Faculty (1)
- Articles, Book Chapters, & Popular Press (1)
- Catholic University Journal of Law and Technology (1)
- Christopher Slobogin (1)
- Duke Law & Technology Review (1)
- Ellen Wright Clayton (1)
- Publication Type
Articles 1 - 30 of 112
Full-Text Articles in Law
Implementing Ethics Into Artificial Intelligence: A Contribution, From A Legal Perspective, To The Development Of An Ai Governance Regime, Axel Walz, Kay Firth-Butterfield
Implementing Ethics Into Artificial Intelligence: A Contribution, From A Legal Perspective, To The Development Of An Ai Governance Regime, Axel Walz, Kay Firth-Butterfield
Duke Law & Technology Review
The increasing use of AI and autonomous systems will have revolutionary impacts on society. Despite many benefits, AI and autonomous systems involve considerable risks that need to be managed. Minimizing these risks will emphasize the respective benefits while at the same time protecting the ethical values defined by fundamental rights and basic constitutional principles, thereby preserving a human centric society. This Article advocates for the need to conduct in-depth risk-benefit-assessments with regard to the use of AI and autonomous systems. This Article points out major concerns in relation to AI and autonomous systems such as likely job losses, causation of …
United States V. Jones: Changing Expectations Of Privacy In The Digital Age, Daniel W. Edwards
United States V. Jones: Changing Expectations Of Privacy In The Digital Age, Daniel W. Edwards
University of Denver Criminal Law Review
No abstract provided.
Attempts Towards A Zero-Sum Game: A Recurring Imbalance Between Individual Privacy And The Fourth Amendment, Christopher Netniss
Attempts Towards A Zero-Sum Game: A Recurring Imbalance Between Individual Privacy And The Fourth Amendment, Christopher Netniss
Loyola of Los Angeles Entertainment Law Review
The digital era we live in today allows society to work, shop, socialize, and even monitor one’s health without having to leave the confines of one’s home. In a recent landmark privacy case, Carpenter v. United States, the individual privacy implications of the Fourth Amendment were strengthened when the Supreme Court held that the government must generally obtain a warrant before collecting more than six days of historical cell-site location information from a third-party service provider, like Verizon. Cell-site location information could implicate numerous Fourth Amendment concepts, such as the third-party doctrine, mosaic theory, and public exposure doctrine. Refusing to …
Actual Harm Means It Is Too Late: How Rosenbach V. Six Flags Demonstrates Effective Biometric Information Privacy Law, Chloe Stepney
Actual Harm Means It Is Too Late: How Rosenbach V. Six Flags Demonstrates Effective Biometric Information Privacy Law, Chloe Stepney
Loyola of Los Angeles Entertainment Law Review
Technology is rapidly advancing, and the law is trying to keep up. While this challenge is not new, technological advancements are impacting privacy rights in unprecedented ways. Using a fingerprint to clock in at work or face identification to unlock a smartphone provides ease and convenience, but at what cost?
Currently, there is no federal law that regulates the collection, use, and storage of biometric information in the private sector. On a local level, three states have enacted laws that specifically address biometrics. Of those, the Biometric Information Privacy Act (BIPA) in Illinois provides the strongest protections for consumers, who …
Law School News: Among The Trailblazers 12/02/2019, Michael M. Bowden
Law School News: Among The Trailblazers 12/02/2019, Michael M. Bowden
Life of the Law School (1993- )
No abstract provided.
Cops And Cars: How The Automobile Drove Fourth Amendment Law, Tracey Maclin
Cops And Cars: How The Automobile Drove Fourth Amendment Law, Tracey Maclin
Faculty Scholarship
This is an essay on Professor Sarah A. Seo’s new book, Policing the Open Road: How Cars Transformed American Freedom (Harvard Univ. Press 2019). I focus on Professor Seo’s analysis of Carroll v. United States, 267 U.S. 132 (1925) and Brinegar v. United States, 338 U.S. 160 (1949). Carroll is important not only because it was the Court’s first car case. Understanding Carroll (and Brinegar, which solidified and expanded Carroll’s holding) is essential because, nearly one hundred years later, its logic continues to direct how the modern Court resolves Fourth Amendment claims of motorists. Put simply, a majority of today’s …
Deep Fakes: A Looming Challenge For Privacy, Democracy, And National Security, Danielle K. Citron, Robert Chesney
Deep Fakes: A Looming Challenge For Privacy, Democracy, And National Security, Danielle K. Citron, Robert Chesney
Faculty Scholarship
Harmful lies are nothing new. But the ability to distort reality has taken an exponential leap forward with “deep fake” technology. This capability makes it possible to create audio and video of real people saying and doing things they never said or did. Machine learning techniques are escalating the technology’s sophistication, making deep fakes ever more realistic and increasingly resistant to detection. Deep-fake technology has characteristics that enable rapid and widespread diffusion, putting it into the hands of both sophisticated and unsophisticated actors. While deep-fake technology will bring with it certain benefits, it also will introduce many harms. The marketplace …
Catching Killers With Consumer Genetic Information, Angela Hackstadt
Catching Killers With Consumer Genetic Information, Angela Hackstadt
University Libraries Faculty Scholarship
In April 2018, Joseph James D'Angelo was arrested as a suspect in the Golden State Killer case. DNA evidence collected at a 1980 crime scene finally shed light on the murderer's identity in early 2018 when investigators turned to GEDMatch, a service that allows users to upload and share DNA data obtained from consumer genetic tests. Consumer genetic testing, DNA collection, and familial DNA searching all raise ethical and privacy concerns. If investigators are using genetic genealogy to solve cold cases, where does that leave consumers?
Law School News: Logan To Serve As Adviser On Restatement Third Of Torts 11-07-2019, Michael M. Bowden
Law School News: Logan To Serve As Adviser On Restatement Third Of Torts 11-07-2019, Michael M. Bowden
Life of the Law School (1993- )
No abstract provided.
Data Scams, Roger Allan Ford
Data Scams, Roger Allan Ford
Law Faculty Scholarship
Targeting platforms like Google and Facebook are usually seen as presenting tradeoffs between utility and privacy. This Article identifies and describes a different, non-privacy cost of targeting platforms: they make it easier for malicious actors to scam others. They do this by making it easier for scammers to reach the most promising victims, hide from law-enforcement authorities and others, and develop better scams. Technology offers potential solutions, since the same data and targeting tools that enable scams could help detect and prevent them, though neither platforms nor law-enforcement officials have both the incentives and expertise needed to develop and deploy …
Linn Foster Freedman Room Dedication At Rwu School Of Law 11-01-2019, Roger Williams University School Of Law, Michael M. Bowden
Linn Foster Freedman Room Dedication At Rwu School Of Law 11-01-2019, Roger Williams University School Of Law, Michael M. Bowden
School of Law Conferences, Lectures & Events
No abstract provided.
Digital Health Privacy In Active-Aging Settings: Will The Law Let You Age Well?, Tara Sklar, Richard Carmona, Kathie Insel, Christopher Robertson
Digital Health Privacy In Active-Aging Settings: Will The Law Let You Age Well?, Tara Sklar, Richard Carmona, Kathie Insel, Christopher Robertson
Faculty Scholarship
What is privacy and how are our interpretations of it changing with advances in technology? This question, and concerns around potentially violating a person’s right to privacy, have been emerging across industries around the world. Senior living providers have increased their exposure to privacy risks with the shift to implementing sensors throughout their communities. Typically located in digital health devices that can be worn on the body or placed in the environment, these sensors are capable of collecting and tracking data relevant to a person’s health and well-being on a continuous monitoring basis.
There are privacy laws and a growing …
Protection Of Privacy And Banking Secrecy In Swiss Banking, Bashkim Nuredini, Vesna Paunkoska Dodevska
Protection Of Privacy And Banking Secrecy In Swiss Banking, Bashkim Nuredini, Vesna Paunkoska Dodevska
UBT International Conference
Despite being one of the most developed and regulated countries in the world, Switzerland is also considered to be the leading financial center in the world. Everyone agrees with the fact that banking is one of the most recognizable activities in Switzerland, and also places it among the most important international financial centers with a long tradition, stretching back to medieval times.
Swiss banking is a synonym for a banking system in which the principle of secrecy in banking is widely used. Banking secrecy as an established practice is based on the fact that customer data is kept secret for …
Hardware, Heartware, Or Nightmare: Smart-City Technology And The Concomitant Erosion Of Privacy, Leila Lawlor
Hardware, Heartware, Or Nightmare: Smart-City Technology And The Concomitant Erosion Of Privacy, Leila Lawlor
Journal of Comparative Urban Law and Policy
Smart city technology is being adopted in cities all around the world to simplify our lives, save us time, ease traffic, improve education, reduce energy usage and keep us safe. This article discusses smart city projects being utilized in crime prevention and investigations. Specifically, this article highlights examples of gunshot detection devices and surveillance that have led to improvements in public safety in Cape Town, Chicago and Atlanta, and discusses their impacts to privacy.
The Missing Regulatory State: Monitoring Businesses In An Age Of Surveillance, Rory V. Loo
The Missing Regulatory State: Monitoring Businesses In An Age Of Surveillance, Rory V. Loo
Vanderbilt Law Review
An irony of the information age is that the companies responsible for the most extensive surveillance of individuals in history-large platforms such as Amazon, Facebook, and Google-have themselves remained unusually shielded from being monitored by government regulators. But the legal literature on state information acquisition is dominated by the privacy problems of excess collection from individuals, not businesses. There has been little sustained attention to the problem of insufficient information collection from businesses. This Article articulates the administrative state's normative framework for monitoring businesses and shows how that framework is increasingly in tension with privacy concerns. One emerging complication is …
The Missing Regulatory State: Monitoring Businesses In An Age Of Surveillance, Rory Van Loo
The Missing Regulatory State: Monitoring Businesses In An Age Of Surveillance, Rory Van Loo
Faculty Scholarship
An irony of the information age is that the companies responsible for the most extensive surveillance of individuals in history—large platforms such as Amazon, Facebook, and Google—have themselves remained unusually shielded from being monitored by government regulators. But the legal literature on state information acquisition is dominated by the privacy problems of excess collection from individuals, not businesses. There has been little sustained attention to the problem of insufficient information collection from businesses. This Article articulates the administrative state’s normative framework for monitoring businesses and shows how that framework is increasingly in tension with privacy concerns. One emerging complication is …
Law School News: Throw Out The Old Thinking 9-30-2019, Michael M. Bowden
Law School News: Throw Out The Old Thinking 9-30-2019, Michael M. Bowden
Life of the Law School (1993- )
No abstract provided.
Review Of Ian Kerr And Jane Bailey, The Implications Of Digital Rights Management For Privacy And Freedom Of Expression, 2 Journal Of Information, Communication & Ethics In Society 87 (2004), Ann Bartow
Law Faculty Scholarship
Ian Kerr, who passed away far too young in 2019, was an incisive scholar and a much treasured colleague. The wit that sparkled in his papers was matched only by his warmth toward his friends, of whom there were many. He and his many co-authors wrote with deep insight and an equally deep humanity about copyright, artificial intelligence, privacy, torts, and much much more.
Ian was also a valued contributor to the Jotwell Technology Law section. His reviews here display the same playful generosity that characterized everything else he did. In tribute to his memory, we are publishing a memorial …
The Positive Law Model Of The Fourth Amendment, William Baude, James Y. Stern
The Positive Law Model Of The Fourth Amendment, William Baude, James Y. Stern
James Y. Stern
For fifty years, courts have used a “reasonable expectation of privacy” standard to define “searches” under the Fourth Amendment. As others have recognized, that doctrine is subjective, unpredictable, and conceptually confused, but viable alternatives have been slow to emerge. This Article supplies one.
We argue that Fourth Amendment protection should be anchored in background positive law. The touchstone of the search-and-seizure analysis should be whether government officials have done something forbidden to private parties. It is those actions that should be subjected to Fourth Amendment reasonableness review and the presumptive requirement to obtain a warrant. In short, Fourth Amendment protection …
Combatendo A Corrupção Nos Estados Unidos, Paul Marcus
Combatendo A Corrupção Nos Estados Unidos, Paul Marcus
Paul Marcus
The article discusses the problematic of the fight against the corruption by the criminal justice system of the United States, mainly the white-collar crimes. It is emphasized, first, that in most of the cases does not result in trial, but in plea bargains, and, second, in many cases the encouragement from an undercover agent has served as an effective defense instrument. Finally, it is discussed the problematic of the use of information obtained from the technological devices and its probable violation to the right privacy.
This article is in Portuguese.
Towards Standard Information Privacy, Innovations Of The New General Data Protection Regulation, Ali Alibeigi, Abu Bakar Munir, Md Ershadulkarim, Adeleh Asemi
Towards Standard Information Privacy, Innovations Of The New General Data Protection Regulation, Ali Alibeigi, Abu Bakar Munir, Md Ershadulkarim, Adeleh Asemi
Library Philosophy and Practice (e-journal)
Protection of personal data in recent decades became more crucial affecting by emergence of the new technologies especially computer, internet, information and communications technology. However, Europeans felt this necessity at time and provided for up-to-date and supportive laws. The General Data Protection Regulation (GDPR) is the latest legislation in EU to protect personal data of individuals based on the recent technological advancements. However, its’ domestic and international output still is debatable. This doctrinal legal study by using descriptive methods, aimed to evaluate the GDPR through analyzing and interpreting its’ provisions by especial focus on its’ innovations. The results show that …
Catalyzing Privacy Law, Anupam Chander, Margot E. Kaminski, William Mcgeveran
Catalyzing Privacy Law, Anupam Chander, Margot E. Kaminski, William Mcgeveran
Georgetown Law Faculty Publications and Other Works
The United States famously lacks a comprehensive federal data privacy law. In the past year, however, over half the states have proposed broad privacy bills or have established task forces to propose possible privacy legislation. Meanwhile, congressional committees are holding hearings on multiple privacy bills. What is catalyzing this legislative momentum? Some believe that Europe’s General Data Protection Regulation (GDPR), which came into force in 2018, is the driving factor. But with the California Consumer Privacy Act (CCPA) which took effect in January 2020, California has emerged as an alternate contender in the race to set the new standard for …
21st Century-Style Truth Decay: Deep Fakes And The Challenge For Privacy, Free Expression, And National Security, Robert Chesney, Danielle Keats Citron
21st Century-Style Truth Decay: Deep Fakes And The Challenge For Privacy, Free Expression, And National Security, Robert Chesney, Danielle Keats Citron
Maryland Law Review
No abstract provided.
The Case For The Third-Party Doctrine, Orin S. Kerr
The Case For The Third-Party Doctrine, Orin S. Kerr
Orin Kerr
This Article offers a defense of the Fourth Amendment's third party doctrine, the controversial rule that information loses Fourth Amendment protection when it is knowingly revealed to a third party. Fourth Amendment scholars have repeatedly attacked the rule on the ground that it is unpersuasive on its face and gives the government too much power This Article responds that critics have overlooked the benefits of the rule and have overstated its weaknesses. The third-party doctrine serves two critical functions. First, the doctrine ensures the technological neutrality of the Fourth Amendment. It corrects for the substitution effect of third parties that …
The Role Of Satellites And Smart Devices: Data Surprises And Security, Privacy, And Regulatory Challenges, Anne T. Mckenna, Amy C. Gaudion, Jenni L. Evans
The Role Of Satellites And Smart Devices: Data Surprises And Security, Privacy, And Regulatory Challenges, Anne T. Mckenna, Amy C. Gaudion, Jenni L. Evans
Amy C. Gaudion
Strava, a popular social media platform and mobile app like Facebook but specifically designed for athletes, posts a “heatmap” with consensually-obtained details about users’ workouts and geolocation. Strava’s heatmap depicts aggregated data of user location and movement by synthesizing GPS satellite data points and movement data from users’ smart devices together with satellite imagery. In January of 2018, a 20-year-old student tweeted that Strava’s heatmap revealed U.S. forward operating bases. The tweet revealed a significant national security issue and flagged substantial privacy and civil liberty concerns.
Smart devices, software applications, and social media platforms aggregate consumer data from multiple data …
Privacy Rights And Public Families, Khiara Bridges
Privacy Rights And Public Families, Khiara Bridges
Khiara M Bridges
This Article is based on eighteen months of anthropological fieldwork conducted among poor, pregnant women receiving prenatal care provided by the Prenatal Care Assistance Program (“PCAP”) at a large public hospital in New York City. The Prenatal Care Assistance Program (“PCAP”) is a special program within the New York State Medicaid program that provides comprehensive prenatal care services to otherwise uninsured or underinsured women. This Article attempts to accomplish two goals. The first goal is to argue that PCAP’s compelled consultations – with social workers, health educators, nutritionists, and financial officers – function as a gross and substantial intrusion by …
Drone Invasion: Unmanned Aerial Vehicles And The Right To Privacy, Rebecca L. Scharf
Drone Invasion: Unmanned Aerial Vehicles And The Right To Privacy, Rebecca L. Scharf
Indiana Law Journal
Since the birth of the concept of a legally recognized right to privacy in Samuel D. Warren and Louis D. Brandeis’ influential 1890 law review article, “The Right to Privacy,” common law—with the aid of influential scholars—has massaged the concept of privacy torts into actionable claims. But now, one of the most innovative technological advancements in recent years, the unmanned aerial vehicle, or drone, has created difficult challenges for plaintiffs and courts navigating common law privacy tort claims.
This Article explores the challenges of prosecution of the specific privacy tort of intrusion upon seclusion involving nongovernmental use of drone technology. …
Automated License Plate Readers: The Difficult Balance Of Solving Crime And Protecting Individual Privacy, Lauren Fash
Automated License Plate Readers: The Difficult Balance Of Solving Crime And Protecting Individual Privacy, Lauren Fash
Maryland Law Review Online
No abstract provided.
Industrial Justice: Privacy Protection For The Employed, Ariana R. Levinson
Industrial Justice: Privacy Protection For The Employed, Ariana R. Levinson
Ariana R. Levinson
No abstract provided.
Remedies, Neutral Rules And Free Speech, David F. Partlett, Russell L. Weaver
Remedies, Neutral Rules And Free Speech, David F. Partlett, Russell L. Weaver
Russell L. Weaver
In general, plaintiffs’ ability to obtain substantial damages against media defendants is directly proportional to their ability to obtain so called “publication damages.”...In future cases, the courts may be forced to deal more straightforwardly with the First Amendment issues. In Sanders, the court avoided those issues because they were not raised. As a result, the court left open the possibility that, even in an intrusion case a media defendant might be allowed to show that the invasion of privacy was “justified by the legitimate motive of gathering the news.”...Moreover, the very existence of the litigation undoubtedly has a negative impact …