Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Privacy

Constitutional Law

University of Washington School of Law

Articles 1 - 7 of 7

Full-Text Articles in Law

Who Owns Data? Constitutional Division In Cyberspace, Dongsheng Zang Apr 2023

Who Owns Data? Constitutional Division In Cyberspace, Dongsheng Zang

Articles

Privacy emerged as a concern as soon as the internet became commercial. In early 1995, Lawrence Lessig warned that the internet, though giving us extraordinary potential, was “not designed to protect individuals against this extraordinary potential for others to abuse.” The same technology can “destroy the very essence of what now defines individuality.” Lessig urged that “a constitutional balance will have to be drawn between these increasingly important interests in privacy, and the competing interest in collective security.” Lessig envisioned that creating property rights in data would help individuals by giving them control of their data. As utopian as property …


Self-Control Of Personal Data And The Constitution In East Asia, Dongsheng Zang Jan 2022

Self-Control Of Personal Data And The Constitution In East Asia, Dongsheng Zang

Articles

No abstract provided.


You Are Not A Commodity: A More Efficient Approach To Commercial Privacy Rights, Benjamin T. Pardue Dec 2021

You Are Not A Commodity: A More Efficient Approach To Commercial Privacy Rights, Benjamin T. Pardue

Washington Law Review

United States common law provides four torts for privacy invasion: (1) disclosure of private facts, (2) intrusion upon seclusion, (3) placement of a person in a false light, and (4) appropriation of name or likeness. Appropriation of name or likeness occurs when a defendant commandeers the plaintiff’s recognizability, typically for a commercial benefit. Most states allow plaintiffs who establish liability to recover defendants’ profits as damages from the misappropriation under an “unjust enrichment” theory. By contrast, this Comment argues that such an award provides a windfall to plaintiffs and contributes to suboptimal social outcomes. These include overcompensating plaintiffs and incentivizing …


Revising Reasonableness In The Cloud, Ian Walsh Mar 2021

Revising Reasonableness In The Cloud, Ian Walsh

Washington Law Review

Save everything—just in case––and search for it later. This is a modern mantra fueled by the ubiquity of smartphones, laptops, tablets, and free or low-cost data storage that leads users to store massive amounts of data in the cloud. But when users trust third-party cloud storage providers with private communications, they also surrender Fourth Amendment constitutional certainty. Existing statutory safeguards for these communications are lower than Fourth Amendment warrant and probable cause standards; this permits the government to seize large quantities of users’ private communications stored in the cloud with only minimal justification. Due to the revealing nature of such …


Hacks, Leaks, And Data Dumps: The Right To Publish Illegally Acquired Information Twenty Years After Bartnicki V. Vopper, Erik Ugland, Christina Mazzeo Mar 2021

Hacks, Leaks, And Data Dumps: The Right To Publish Illegally Acquired Information Twenty Years After Bartnicki V. Vopper, Erik Ugland, Christina Mazzeo

Washington Law Review

This Article addresses a fluid and increasingly salient category of cases involving the First Amendment right to publish information that was hacked, stolen, or illegally leaked by someone else. Twenty years ago, in Bartnicki v. Vopper, the Supreme Court appeared to give broad constitutional cover to journalists and other publishers in these situations, but Justice Stevens’s inexact opinion for the Court and Justice Breyer’s muddling concurrence left the boundaries unclear. The Bartnicki framework is now implicated in dozens of new cases— from the extradition and prosecution of Julian Assange, to Donald Trump’s threatened suit of The New York Times …


Ring, Amazon Calling: The State Action Doctrine & The Fourth Amendment, Grace Egger Dec 2020

Ring, Amazon Calling: The State Action Doctrine & The Fourth Amendment, Grace Egger

Washington Law Review Online

Video doorbells have proliferated across the United States and Amazon owns one of the most popular video doorbell companies on the market—Ring. While many view the Ring video doorbell as useful technology that protects the home and promotes safer neighborhoods, the product reduces consumer privacy without much recourse. For example, Ring partners with cities and law enforcement agencies across the United States thereby creating a mass surveillance network in which law enforcement agencies can watch neighborhoods and access Ring data without the user’s knowledge or consent. Because Amazon is not a state actor, it is able to circumvent the due …


The Thickness Of Blood: Article I, Section 7, Law Enforcement, And Commercial Dna Databases, Hannah Parman Dec 2020

The Thickness Of Blood: Article I, Section 7, Law Enforcement, And Commercial Dna Databases, Hannah Parman

Washington Law Review

Law enforcement agencies increasingly use online commercial and open source DNA databases to identify suspects in cases that have long since gone cold. By uploading crime scene DNA to one of these websites, investigators can find family members who have used the website and build a family tree leading back to the owner of the original DNA. This is called “familial DNA searching.” The highest profile use of this investigative method to date occurred in California, but law enforcement in Washington State has been quick to begin utilizing the method as well. However, article I, section 7 of the Washington …