Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Privacy

Discipline
Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 2219

Full-Text Articles in Law

Personal Data And Vaccination Hesitancy: Covid-19’S Lessons For Public Health Federalism, Charles D. Curran Apr 2024

Personal Data And Vaccination Hesitancy: Covid-19’S Lessons For Public Health Federalism, Charles D. Curran

Catholic University Law Review

During the COVID-19 vaccination campaign, the federal government adopted a more centralized approach to the collection of public health data. Although the states previously had controlled the storage of vaccination information, the federal government’s Operation Warp Speed plan required the reporting of recipients’ personal information on the grounds that it was needed to monitor the safety of novel vaccines and ensure correct administration of their multi-dose regimens.

Over the course of the pandemic response, this more centralized federal approach to data collection added a new dimension to pre-existing vaccination hesitancy. Requirements that recipients furnish individual information deterred vaccination among undocumented …


Regulating Social Media Through Family Law, Katharine B. Silbaugh, Adi Caplan-Bricker Mar 2024

Regulating Social Media Through Family Law, Katharine B. Silbaugh, Adi Caplan-Bricker

Faculty Scholarship

Social media afflicts minors with depression, anxiety, sleeplessness, addiction, suicidality, and eating disorders. States are legislating at a breakneck pace to protect children. Courts strike down every attempt to intervene on First Amendment grounds. This Article clears a path through this stalemate by leveraging two underappreciated frameworks: the latent regulatory power of parental authority arising out of family law, and a hidden family law within First Amendment jurisprudence. These two projects yield novel insights. First, the recent cases offer a dangerous understanding of the First Amendment, one that should not survive the family law reasoning we provide. First Amendment jurisprudence …


An Exegesis Of The Meaning Of Dobbs: Despotism, Servitude, & Forced Birth, Athena D. Mutua Feb 2024

An Exegesis Of The Meaning Of Dobbs: Despotism, Servitude, & Forced Birth, Athena D. Mutua

Journal Articles

The Dobbs decision has been leaked. Gathered outside of New York City's St. Patrick's Old Cathedral, pro-choice protesters chant: "Not the church, not the state, the people must decide their fate."

A white man wearing a New York Fire Department sweatshirt and standing on the front steps responds: "l am the people, l am the people, l am the people, the people have decided, the court has decided, you lose . . . . You have no choice. Not your body, not your choice, your body is mine and you're having my baby."

Despicable but not unexpected,³ this man's comments …


Redefining The Injury-In-Fact: Treating Personally Identifying Information As Bailed Property, Austin Headrick Jan 2024

Redefining The Injury-In-Fact: Treating Personally Identifying Information As Bailed Property, Austin Headrick

Georgia Law Review

There is a long-existing circuit split among federal courts of appeals as to whether an individual has standing under Article III of the United States Constitution when their personally identifying information (PII) is stolen from an entity to which they entrusted it such as a hospital or bank. Federal courts disagree as to whether an individual whose PII has been stolen—without more—has suffered an injury-in-fact, a necessary element of standing. The disagreement between the courts centers on whether the injury-in-fact has already occurred at the time the PII is stolen or whether the injury occurs once the PII has been …


Prevent Phishy Business: Comparing California’S And The United Kingdom’S Age-Appropriate Design Code To Protect Youth From Cybersecurity Threats, Morgan Comite Jan 2024

Prevent Phishy Business: Comparing California’S And The United Kingdom’S Age-Appropriate Design Code To Protect Youth From Cybersecurity Threats, Morgan Comite

University of Miami International and Comparative Law Review

Cybersecurity is the safeguarding of computer systems and networks against information disclosure, theft, or damage to users’ hardware, software, or electronic data, as well as disruption or misdirection of the services computers and networks provide. Knowing privacy would be breached due to the impact of COVID, in 2020, the United Kingdom got ahead of the game and passed rules/regulations requiring online services to protect children under the age of eighteen from scams, phishing, and security attacks. However, currently, the United States does not have a sufficient uniform privacy law governed to protect children under the age of eighteen from cybersecurity …


June 24, 2022, Bisma Shoaib Jan 2024

June 24, 2022, Bisma Shoaib

Seattle Journal for Social Justice

No abstract provided.


Forget About Ferpa: How Foia Protects Student-Athlete Privacy In The Nil Era, Kamron Cox Jan 2024

Forget About Ferpa: How Foia Protects Student-Athlete Privacy In The Nil Era, Kamron Cox

Vanderbilt Journal of Entertainment & Technology Law

The start of the name, image, and likeness (NIL) era stirred public fervor about the new earning potential of high-profile student-athletes. Since institutional policies and state laws governing NIL require student-athletes to broadly disclose information about their NIL activities to their respective institutions, the several state laws that follow the approach of the federal Freedom of Information Act (FOIA) can jeopardize the privacy of student-athlete NIL information. Major universities have repeatedly resorted to the unreliable defense of the Family Educational Rights and Privacy Act as well as sporadic state legislation to protect student-athlete privacy in the new NIL space. However, …


The Modern Border: The Government Can Search . . . Anything?, Abigail Nusbaum Jan 2024

The Modern Border: The Government Can Search . . . Anything?, Abigail Nusbaum

FIU Law Review

The evolution of modern technology has introduced new obstacles in interpreting the Fourth Amendment’s application to searches of peoples’ effects. Specifically, the longstanding exception to the Fourth Amendment permitting searches at the international border in the absence of probable cause does not so neatly apply to forensic searches of cell phones. Consequently, a circuit split has emerged on two aspects of the issue: the scope of the border exception and the requisite level of suspicion within that exception. The Supreme Court should find that forensic cell phone searches at the international border implicate Fourth Amendment privacy interests, requiring the border …


Privacy Nicks: How The Law Normalizes Surveillance, Woodrow Hartzog, Evan Selinger, Johanna Gunawan Jan 2024

Privacy Nicks: How The Law Normalizes Surveillance, Woodrow Hartzog, Evan Selinger, Johanna Gunawan

Faculty Scholarship

Privacy law is failing to protect individuals from being watched and exposed, despite stronger surveillance and data protection rules. The problem is that our rules look to social norms to set thresholds for privacy violations, but people can get used to being observed. In this article, we argue that by ignoring de minimis privacy encroachments, the law is complicit in normalizing surveillance. Privacy law helps acclimate people to being watched by ignoring smaller, more frequent, and more mundane privacy diminutions. We call these reductions “privacy nicks,” like the proverbial “thousand cuts” that lead to death.

Privacy nicks come from the …


The Trade Origins Of Privacy Law, Anupam Chander Jan 2024

The Trade Origins Of Privacy Law, Anupam Chander

Georgetown Law Faculty Publications and Other Works

The desire for trade propelled the growth of data privacy law across the world. Countries with strong privacy laws sought to ensure that their citizens’ privacy would not be compromised when their data traveled to other countries. Even before this vaunted Brussels Effect pushed privacy law across the world through the enticement of trade with the European Union, Brussels had to erect privacy law within the Union itself. And as the Union itself expanded, privacy law was a critical condition for accession.

But this coupling of privacy and trade leaves a puzzle: how did the U.S. avoid a comprehensive privacy …


The Automated Fourth Amendment, Maneka Sinha Jan 2024

The Automated Fourth Amendment, Maneka Sinha

Faculty Scholarship

Courts routinely defer to police officer judgments in reasonable suspicion and probable cause determinations. Increasingly, though, police officers outsource these threshold judgments to new forms of technology that purport to predict and detect crime and identify those responsible. These policing technologies automate core police determinations about whether crime is occurring and who is responsible. Criminal procedure doctrine has failed to insist on some level of scrutiny of—or skepticism about—the reliability of this technology. Through an original study analyzing numerous state and federal court opinions, this Article exposes the implications of law enforcement’s reliance on these practices given the weighty interests …


Unavoidability In U.S. Privacy Law, Laura M. Moy Jan 2024

Unavoidability In U.S. Privacy Law, Laura M. Moy

Georgetown Law Faculty Publications and Other Works

Why is U.S. privacy law structured the way it is, with a series of sectoral laws rather than a cross-sectoral law or laws? Why does U.S. privacy law protect information shared in certain contexts—such as information shared with an attorney, a healthcare provider, or a financial provider—rather than particular types of information? One possibility is that sectoral laws apply to contexts in which people typically share highly “sensitive” information containing intimate secrets or with the potential to harm them financially or psychologically.

But this Article argues that there is something else at play—that in fact, an under-discussed and underappreciated factor …


Development Of The Right To Privacy In Montana Discourse And The Montana Constitution, Scott A. O'Donnell Jan 2024

Development Of The Right To Privacy In Montana Discourse And The Montana Constitution, Scott A. O'Donnell

Undergraduate Theses, Professional Papers, and Capstone Artifacts

No abstract provided.


Target(Ed) Advertising, Derek E. Bambauer Jan 2024

Target(Ed) Advertising, Derek E. Bambauer

UF Law Faculty Publications

Targeted advertising—using data about consumers to customize the ads they receive—is deeply controversial. It also creates a regulatory quandary. Targeted ads generate more money than untargeted ones for apps and online platforms. Apps and platforms depend on this revenue stream to offer free services to users, if not for their financial viability altogether. However, targeted advertising also generates significant privacy risks and consumer resentment. Despite sustained attention to this issue, neither legal scholars nor policymakers have crafted interventions that address both concerns, and existing regulatory regimes for targeted advertising have critical gaps.

This Article makes three key contributions to the …


Fintech Lending In India: Taking Stock Of Implications For Privacy And Autonomy, Vidushi Marda, Amber Sinha Dec 2023

Fintech Lending In India: Taking Stock Of Implications For Privacy And Autonomy, Vidushi Marda, Amber Sinha

Indian Journal of Law and Technology

In the last five years, the Fintech sector has thrived in India, with Machine Learning (ML) driven credit scoring based on alternative data, emerging as a growing segment. The credit scoring industry in India needs to be viewed in light of a careful examination of rights, inclusion, appropriate safeguards and discrimination, currently missing from the discourse and practices. In this paper, we explain how ML-based credit scoring works, and the regulatory and commercial factors that have enabled and impeded its growth in India. Through legal and technological analysis, richened by insights from qualitative interviews with entrepreneurs and practitioners, we provide …


Our Changing Reality: The Metaverse And The Importance Of Privacy Regulations In The United States, Anushkay Raza Dec 2023

Our Changing Reality: The Metaverse And The Importance Of Privacy Regulations In The United States, Anushkay Raza

Global Business Law Review

This Note discusses the legal and pressing digital challenges that arise in connection with the growing use of virtual reality, and more specifically, the metaverse. As this digital realm becomes more integrated into our daily lives, the United States should look towards creating a federal privacy law that protects fundamental individual privacy rights. This Note argues that congress should emulate the European Union's privacy regulations, and further, balances the potential consequences and benefits of adapting European regulations within the United Sates. Finally, this Note provides drafting considerations of future lawyers who will not only be dealing with the rise of …


Defragging Feminist Cyberlaw, Amanda Levendowski Nov 2023

Defragging Feminist Cyberlaw, Amanda Levendowski

Georgetown Law Faculty Publications and Other Works

In 1996, Judge Frank Easterbrook famously observed that any effort to create a field called cyberlaw would be “doomed to be shallow and miss unifying principles.” He was wrong, but not for the reason other scholars have stated. Feminism is a unifying principle of cyberlaw, which alternately amplifies and abridges the feminist values of consent, safety, and accessibility. Cyberlaw simply hasn’t been understood that way—until now.

In computer science, “defragging” means bringing together disparate pieces of data so they are easier to access. Inspired by that process, this Article offers a new approach to cyberlaw that illustrates how feminist values …


Breaking The Fourth's Wall: The Implications Of Remote Education For Students' Fourth Amendment Rights, Sallie Hatfield Nov 2023

Breaking The Fourth's Wall: The Implications Of Remote Education For Students' Fourth Amendment Rights, Sallie Hatfield

Vanderbilt Journal of Entertainment & Technology Law

As the COVID-19 pandemic forced both public K-12 and higher education institutions to transition to exclusively provide remote education, students’ homes and personal lives were exposed to the government like never before. Zoom classes and remote proctoring were suddenly the norm. Students and their families scrambled to create appropriate offices and classroom spaces in their homes, and many awkward and invasive scenarios soon followed. While many may have been harmlessly captured on camera, like classes that witness a student’s family eating lunch in the background or a dog on the couch, even these harmless instances have insidious implications for the …


Privacy And National Politics: Fingerprint And Dna Litigation In Japan And The United States Compared, Dongsheng Zang Oct 2023

Privacy And National Politics: Fingerprint And Dna Litigation In Japan And The United States Compared, Dongsheng Zang

Pace Law Review

No abstract provided.


Direct To Consumer Or Direct To All: Home Dna Tests And Lack Of Privacy Regulations In The United States, Karen J. Kukla Oct 2023

Direct To Consumer Or Direct To All: Home Dna Tests And Lack Of Privacy Regulations In The United States, Karen J. Kukla

IP Theory

Although the U.S. has some measures of privacy protection for genetic data, the lack of a comprehensive approach to protecting direct-to-consumer genetic testing results in privacy violations for both consumers and their relatives. This essay explores the critical need for the U.S. government to address these privacy violations and argues that the U.S. should approach the problem and strategize a solution similar to the European Union’s (EU) General Data Protection Regulation (GDPR). Part I identifies current United States law, both federal and state regulations that address DTC-GT and genetic privacy. Part II examines the lack of regulation surrounding current DTC-GT …


Continuous Reproductive Surveillance, Michael Ulrich, Leah R. Fowler Oct 2023

Continuous Reproductive Surveillance, Michael Ulrich, Leah R. Fowler

Faculty Scholarship

The Dobbs opinion emphasizes that the state’s interest in the fetus extends to “all stages of development.” This essay briefly explores whether state legislators, agencies, and courts could use the “all stages of development” language to expand reproductive surveillance by using novel developments in consumer health technologies to augment those efforts.


Wrong Search At The Wrong Time: Keyword Search Warrants And The Fourth Amendment, Nicole Chan Oct 2023

Wrong Search At The Wrong Time: Keyword Search Warrants And The Fourth Amendment, Nicole Chan

Articles

This Note will advocate for the view that when presented with the issue, state and federal courts should establish that keyword search warrants are unconstitutional because they violate the Fourth Amendment. Keyword search warrants cannot meet the Fourth Amendment’s requirements of probable cause and particularity because the subjects of the search cannot be identified until after the search is completed. These warrants are unnecessary and have the potential of implicating millions of internet users who have no connection to a crime. This Note will contend that individuals have a reasonable expectation of privacy in their search history data, and that …


Keep Your Fingerprints To Yourself: New York Needs A Biometric Privacy Law, Brendan Mcnerney Sep 2023

Keep Your Fingerprints To Yourself: New York Needs A Biometric Privacy Law, Brendan Mcnerney

St. John's Law Review

(Excerpt)

Imagine walking into a store, picking something up, and just walking out. No longer is this shoplifting, it is legal. In 2016, Amazon introduced their “Just Walk Out” technology in Seattle. “Just Walk Out” uses cameras located throughout the store to monitor shoppers, document what they pick up, and automatically charge that shoppers’ Amazon account when they leave the store. Recently, Amazon started selling “Just Walk Out” technology to other retailers. Since then, retailers have become increasingly interested in collecting and using customers’ “biometric identifiers and information.” Generally, “biometrics” is used to refer to “measurable human biological and behavioral …


Two Visions Of Digital Sovereignty, Sujit Raman Sep 2023

Two Visions Of Digital Sovereignty, Sujit Raman

Joint PIJIP/TLS Research Paper Series

No abstract provided.


A Trusted Framework For Cross-Border Data Flows, Alex Joel Sep 2023

A Trusted Framework For Cross-Border Data Flows, Alex Joel

Joint PIJIP/TLS Research Paper Series

The German Marshall Fund of the United States (GMF), in cooperation with the Tech, Law and Security Program (TLS) of the American University Washington College of Law, and with support from Microsoft, convened a Global Taskforce to Promote Trusted Sharing of Data comprising experts from civil society, academia, and industry to submit proposals for harmonizing approaches to global data use and sharing. Former US Ambassador to the Organisation for Economic Co-operation and Development (OECD) and GMF Distinguished Fellow Karen Kornbluh and Microsoft Chief Privacy Officer and Corporate Vice President Julie Brill co-chaired the taskforce; TLS Senior Project Director Alex Joel …


Valuing Social Data, Amanda Parsons, Salomé Viljoen Aug 2023

Valuing Social Data, Amanda Parsons, Salomé Viljoen

Law & Economics Working Papers

Social data production is a unique form of value creation that characterizes informational capitalism. Social data production also presents critical challenges for the various legal regimes that are encountering it. This Article provides legal scholars and policymakers with the tools to comprehend this new form of value creation through two descriptive contributions. First, it presents a theoretical account of social data, a mode of production which is cultivated and exploited for two distinct (albeit related) forms of value: prediction value and exchange value. Second, it creates and defends a taxonomy of three “scripts” that companies follow to build up and …


Are Handguns A Matter Of Privacy?, Bret N. Bogenschneider Aug 2023

Are Handguns A Matter Of Privacy?, Bret N. Bogenschneider

St. Mary's Law Journal

The thesis developed in this Article is that the Heller and Bruen cases involved primarily right-to-privacy concerns. By its terms, the Second Amendment involves the collective right to bear Arms in connection to regulated militia service and does not mention handguns. Handguns were not “ordinary military weapons” employed by a militia at the time of the American revolution under the originalist view. The Ninth and Fourteenth Amendments are more appropriate sources for an individual privacy right related to the possession of handguns for private purposes, such as for self-defense or suicide. However, a prohibition of handguns under this approach would …


J Mich Dent Assoc August 2023 Aug 2023

J Mich Dent Assoc August 2023

The Journal of the Michigan Dental Association

Every month, The Journal of the Michigan Dental Association brings news, information, and features about Michigan dentistry to our state's oral health community and the MDA's 6,200+ members. No publication reaches more Michigan dentists!

In this issue, the reader will find the following original content:

  • A cover story on new dentist’s perceptions of professionalism.
  • A feature on legal considerations when addressing employee wellness.
  • A feature on the meaning of wellness by ADA Trustee Dr. Brett Kessler.
  • Practice guidance on conducting a HIPAA security risk analysis.
  • Commentary “The New Golden Age of Dentistry.”
  • Editorial and regular department articles on MDA Foundation …


Office Of Attorney General Peter F. Neronha, Attorney General: Access To Public Records Act, Open Meetings Act, Attorney General, State Of Rhode Island, Roger Williams University School Of Law Jul 2023

Office Of Attorney General Peter F. Neronha, Attorney General: Access To Public Records Act, Open Meetings Act, Attorney General, State Of Rhode Island, Roger Williams University School Of Law

School of Law Conferences, Lectures & Events

No abstract provided.


25th Annual Open Government Summit: Your Guide To The Access To Public Records Act & Open Meetings Act, Peter F. Neronha, Roger Williams University School Of Law Jul 2023

25th Annual Open Government Summit: Your Guide To The Access To Public Records Act & Open Meetings Act, Peter F. Neronha, Roger Williams University School Of Law

School of Law Conferences, Lectures & Events

No abstract provided.