Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Law

Who Owns Data? Constitutional Division In Cyberspace, Dongsheng Zang Apr 2023

Who Owns Data? Constitutional Division In Cyberspace, Dongsheng Zang

Articles

Privacy emerged as a concern as soon as the internet became commercial. In early 1995, Lawrence Lessig warned that the internet, though giving us extraordinary potential, was “not designed to protect individuals against this extraordinary potential for others to abuse.” The same technology can “destroy the very essence of what now defines individuality.” Lessig urged that “a constitutional balance will have to be drawn between these increasingly important interests in privacy, and the competing interest in collective security.” Lessig envisioned that creating property rights in data would help individuals by giving them control of their data. As utopian as property …


Self-Control Of Personal Data And The Constitution In East Asia, Dongsheng Zang Jan 2022

Self-Control Of Personal Data And The Constitution In East Asia, Dongsheng Zang

Articles

No abstract provided.


Pandemic Surveillance Discrimination, Christian Sundquist Jan 2021

Pandemic Surveillance Discrimination, Christian Sundquist

Articles

The COVID-19 pandemic has laid bare the abiding tension between surveillance and privacy. Public health epidemiology has long utilized a variety of surveillance methods—such as contact tracing, quarantines, and mandatory reporting laws—to control the spread of disease during past epidemics and pandemics. Officials have typically justified the resulting intrusions on privacy as necessary for the greater public good by helping to stave off larger health crisis. The nature and scope of public health surveillance in the battle against COVID-19, however, has significantly changed with the advent of new technologies. Digital surveillance tools, often embedded in wearable technology, have greatly increased …


Taking Data, Michael C. Pollack Jan 2019

Taking Data, Michael C. Pollack

Articles

Technological development has created new forms of information, altered expectations of privacy, and given law enforcement more tools to examine that information and intrude on that privacy. One crucial facet of these changes involves internet service providers (ISPs): as people expose more of their lives to their ISPs—all the websites they visit, people they communicate with, emails they send, files they store, and more—law enforcement efforts to access that data become more and more common. But scholars and policymakers alike recognize that the existing statutory frameworks governing those efforts are based on obsolete technology and strike balances that are difficult …


Intelligence Legalism And The National Security Agency’S Civil Liberties Gap, Margo Schlanger Jan 2015

Intelligence Legalism And The National Security Agency’S Civil Liberties Gap, Margo Schlanger

Articles

Since June 2013, we have seen unprecedented security breaches and disclosures relating to American electronic surveillance. The nearly daily drip, and occasional gush, of once-secret policy and operational information makes it possible to analyze and understand National Security Agency activities, including the organizations and processes inside and outside the NSA that are supposed to safeguard American’s civil liberties as the agency goes about its intelligence gathering business. Some have suggested that what we have learned is that the NSA is running wild, lawlessly flouting legal constraints on its behavior. This assessment is unfair. In fact, the picture that emerges from …


Mapping Online Privacy, Jacqueline D. Lipton Jan 2010

Mapping Online Privacy, Jacqueline D. Lipton

Articles

Privacy scholars have recently outlined difficulties in applying existing concepts of personal privacy to the maturing Internet. With Web 2.0 technologies, more people have more opportunities to post information about themselves and others online, often with scant regard for individual privacy. Shifting notions of 'reasonable expectations of privacy' in the context of blogs, wikis, and online social networks create challenges for privacy regulation. Courts and commentators struggle with Web 2.0 privacy incursions without the benefit of a clear regulatory framework. This article offers a map of privacy that might help delineate at least the outer boundaries of Web 2.0 privacy. …


'We, The Paparazzi': Developing A Privacy Paradigm For Digital Video, Jacqueline D. Lipton Jan 2009

'We, The Paparazzi': Developing A Privacy Paradigm For Digital Video, Jacqueline D. Lipton

Articles

In January 2009, the Camera Phone Predator Alert bill was introduced into Congress. It raised serious concerns about privacy rights in the face of digital video technology. In so doing, it brought to light a worrying gap in current privacy regulation - the lack of rules relating to digital video privacy. To date, digital privacy regulation has focused on text records that contain personal data. Little attention has been paid to privacy in video files that may portray individuals in inappropriate contexts, or in an unflattering or embarrassing light. As digital video technology, including inexpensive cellphone cameras, is now becoming …


Brandeis & Warren's 'The Right To Privacy And The Birth Of The Right To Privacy', Ben Bratman Jan 2002

Brandeis & Warren's 'The Right To Privacy And The Birth Of The Right To Privacy', Ben Bratman

Articles

Privacy law and conceptions of a right to privacy have, of course, evolved considerably since 1890 when future Supreme Court Justice Louis Brandeis and Boston attorney Samuel Warren penned their now ageless article, The Right to Privacy, 4 Harv. L. Rev. 193, in which they argued the law should recognize such a right and impose liability in tort for intrusions on it. But quite apart from any argument about how attenuated the link might be between Brandeis and Warren's specific proposals and the current state of privacy law, is it fair to say, as so many scholars and judges repeatedly …


Standing Up For Fourth Amendment Rights: Salvucci, Rawlings, And The Reasonable Expectation Of Privacy (Comment), Elizabeth Brandt Jan 1981

Standing Up For Fourth Amendment Rights: Salvucci, Rawlings, And The Reasonable Expectation Of Privacy (Comment), Elizabeth Brandt

Articles

The initial inquiry a court must make before considering a motion to suppress evidence based on an unreasonable search and seizure is whether the individual has standing under the fourth amendment. This Note examines the historical development of the standing doctrines leading to the reasonable expectation of privacy test adopted by the Supreme Court in Rakas v. Illinois. The Note also identifies the problems created by the Court's far-reaching application of this test. The author concludes that the overall effect of recent decisions may be to limit the number of defendants able to assert fourth amendment claims, since suppression hearing …


Political Surveillance And The Fourth Amendment, Alan Meisel Jan 1973

Political Surveillance And The Fourth Amendment, Alan Meisel

Articles

The United States District Court case has left the scope of the warrant protection of the fourth amendment considerably clearer and broader. The door left ajar in Katz has been firmly fastened shut by the Court leaving only the traditional exceptions to the warrant requirement, which are based upon practical necessity, and the still unconfronted question of the power of the executive to conduct warrantless surveillances of foreign agents in national security cases." It is also clear that courts are no less competent to evaluate the appropriateness of a search and seizure in an internal security case than in a …