Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Privacy

Privacy Law

Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 787

Full-Text Articles in Law

Privacy Nicks: How The Law Normalizes Surveillance, Woodrow Hartzog, Evan Selinger, Johanna Gunawan Jan 2024

Privacy Nicks: How The Law Normalizes Surveillance, Woodrow Hartzog, Evan Selinger, Johanna Gunawan

Faculty Scholarship

Privacy law is failing to protect individuals from being watched and exposed, despite stronger surveillance and data protection rules. The problem is that our rules look to social norms to set thresholds for privacy violations, but people can get used to being observed. In this article, we argue that by ignoring de minimis privacy encroachments, the law is complicit in normalizing surveillance. Privacy law helps acclimate people to being watched by ignoring smaller, more frequent, and more mundane privacy diminutions. We call these reductions “privacy nicks,” like the proverbial “thousand cuts” that lead to death.

Privacy nicks come from the …


Asking For It: Gendered Dimensions Of Surveillance Capitalism, Jessica Rizzo May 2023

Asking For It: Gendered Dimensions Of Surveillance Capitalism, Jessica Rizzo

Emancipations: A Journal of Critical Social Analysis

Advertising and privacy were once seen as mutually antagonistic. In the 1950s and 1960s, Americans went to court to fight for their right to be free from the invasion of privacy presented by unwanted advertising, but a strange realignment took place in the 1970s. Radical feminists were among those who were extremely concerned about the collection and computerization of personal data—they worried about private enterprise getting a hold of that data and using it to target women—but liberal feminists went in a different direction, making friends with advertising because they saw it as strategically valuable.

Liberal feminists argued that in …


Aclu V. Clearview Ai, Inc.,, Isra Ahmed May 2023

Aclu V. Clearview Ai, Inc.,, Isra Ahmed

DePaul Journal of Art, Technology & Intellectual Property Law

No abstract provided.


Necessity, Proportionality, And Executive Order 14086, Alex Joel May 2023

Necessity, Proportionality, And Executive Order 14086, Alex Joel

Joint PIJIP/TLS Research Paper Series

No abstract provided.


A Game Theoretic Approach To Balance Privacy Risks And Familial Benefits, Ellen W. Clayton, Jia Guo, Murat Kantarcioglu, Et Al. Apr 2023

A Game Theoretic Approach To Balance Privacy Risks And Familial Benefits, Ellen W. Clayton, Jia Guo, Murat Kantarcioglu, Et Al.

Vanderbilt Law School Faculty Publications

As recreational genomics continues to grow in its popularity, many people are afforded the opportunity to share their genomes in exchange for various services, including third-party interpretation (TPI) tools, to understand their predisposition to health problems and, based on genome similarity, to find extended family members. At the same time, these services have increasingly been reused by law enforcement to track down potential criminals through family members who disclose their genomic information. While it has been observed that many potential users shy away from such data sharing when they learn that their privacy cannot be assured, it remains unclear how …


Confused About Copyright?, Sara Anne Hook Apr 2023

Confused About Copyright?, Sara Anne Hook

Graduate Scholarship and Professional Work

No abstract provided.


A Loaded God Complex: The Unconstitutionality Of The Executive Branch’S Unilaterally Withholding Zero-Days, Brendan Gilligan Apr 2023

A Loaded God Complex: The Unconstitutionality Of The Executive Branch’S Unilaterally Withholding Zero-Days, Brendan Gilligan

Northwestern Journal of Technology and Intellectual Property

No abstract provided.


Adopting Social Media In Family And Adoption Law, Stacey B. Steinberg, Meredith Burgess, Karla Herrera Feb 2023

Adopting Social Media In Family And Adoption Law, Stacey B. Steinberg, Meredith Burgess, Karla Herrera

Utah Law Review

Social media has dramatically changed the landscape facing families brought together through adoption. Just as adoptive families thirty years ago could not have predicted the impact of DNA technology on postadoption family life, adoptive families are only now beginning to grasp the impact of social media connectivity on the lives of their growing children. This change is related both to social media’s impact on family life and to fundamental shifts in our understanding of privacy more generally. Understanding the legal rights of parents and children in these circumstances is a novel and underexplored area of family law, constitutional law, and …


The Data Trust Solution To Data Sharing Problems, Kimberly A. Houser, John W. Bagby Feb 2023

The Data Trust Solution To Data Sharing Problems, Kimberly A. Houser, John W. Bagby

Vanderbilt Journal of Entertainment & Technology Law

A small number of large companies hold most of the world’s data. Once in the hands of these companies, data subjects have little control over the use and sharing of their data. Additionally, this data is not generally available to small and medium enterprises or organizations who seek to use it for social good. A number of solutions have been proposed to limit Big Tech “power,” including antitrust actions and stricter privacy laws, but these measures are not likely to address both the oversharing and under-sharing of personal data. Although the data trust concept is being actively explored in the …


Perlindungan Atas Privasi Konsumen Dalam Layanan Reservasi Tiket Online Dari Pt. Kereta Api Indonesia, Aprilia Susanti Jan 2023

Perlindungan Atas Privasi Konsumen Dalam Layanan Reservasi Tiket Online Dari Pt. Kereta Api Indonesia, Aprilia Susanti

"Dharmasisya” Jurnal Program Magister Hukum FHUI

The significant increase in online activities cannot be separated from the many active internet users who use mobile internet connections to carry out their daily activities, one of which is for the convenience of making ticket reservations at PT. Indonesian Railways (KAI). The purpose of this research is to find out the study of the business law of protecting consumer privacy in the online ticketing service of PT. KAI. Data collection was carried out by means of a literature study of the relationship between laws and regulations in consumer protection and the position of PT. KAI as business actors and …


The Carpenter Test As A Transformation Of Fourth Amendment Law, Matthew Tokson Jan 2023

The Carpenter Test As A Transformation Of Fourth Amendment Law, Matthew Tokson

Utah Law Faculty Scholarship

For over fifty years, the Fourth Amendment’s scope has been largely dictated by the Katz test, which applies the Amendment’s protections only when the government has violated a person’s “reasonable expectation of privacy.” This vague standard is one of the most criticized doctrines in all of American law, and its lack of coherence has made Fourth Amendment search law notoriously confusing. Things have become even more complex following the Supreme Court’s landmark decision in Carpenter v. United States, which has spawned its own alternative test for determining the Fourth Amendment’s scope. The emerging Carpenter test looks to the revealing nature …


Who Owns Data? Constitutional Division In Cyberspace, Dongsheng Zang Jan 2023

Who Owns Data? Constitutional Division In Cyberspace, Dongsheng Zang

Articles

Privacy emerged as a concern as soon as the internet became commercial. In early 1995, Lawrence Lessig warned that the internet, though giving us extraordinary potential, was “not designed to protect individuals against this extraordinary potential for others to abuse.” The same technology can “destroy the very essence of what now defines individuality.” Lessig urged that “a constitutional balance will have to be drawn between these increasingly important interests in privacy, and the competing interest in collective security.” Lessig envisioned that creating property rights in data would help individuals by giving them control of their data. As utopian as property …


The Protection Of Student Data Privacy In Wisconsin School Board Policies, Curtis Clyde Rees Jan 2023

The Protection Of Student Data Privacy In Wisconsin School Board Policies, Curtis Clyde Rees

Theses and Dissertations--Education Sciences

American schools have increasingly adopted technology resources to fulfill their educational obligations. These tools are for instruction, communication, and storing and analyzing student information. Student data can be directory information, enrollment records, achievement data, and student-created products. This increased utilization began with the passage of No Child Left Behind in 2001, and the COVID-19 pandemic led to more educational technology use of student data. Districts turned to third-party vendors for assistance with data systems and virtual learning resources. Before, during, and after the pandemic, stakeholders were concerned about information security and the students' privacy. School leaders looked to federal regulations …


Governing Smart Cities As Knowledge Commons - Introduction, Chapter 1 & Conclusion, Brett M. Frischmann, Michael J. Madison, Madelyn Sanfilippo Jan 2023

Governing Smart Cities As Knowledge Commons - Introduction, Chapter 1 & Conclusion, Brett M. Frischmann, Michael J. Madison, Madelyn Sanfilippo

Book Chapters

Smart city technology has its value and its place; it isn’t automatically or universally harmful. Urban challenges and opportunities addressed via smart technology demand systematic study, examining general patterns and local variations as smart city practices unfold around the world. Smart cities are complex blends of community governance institutions, social dilemmas that cities face, and dynamic relationships among information and data, technology, and human lives. Some of those blends are more typical and common. Some are more nuanced in specific contexts. This volume uses the Governing Knowledge Commons (GKC) framework to sort out relevant and important distinctions. The framework grounds …


Big Data, Big Gap: Working Towards A Hipaa Framework That Covers Big Data, Ryan Mueller Oct 2022

Big Data, Big Gap: Working Towards A Hipaa Framework That Covers Big Data, Ryan Mueller

Indiana Law Journal

One lasting impact of the Health Insurance Portability and Accountability Act (HIPAA) is the privacy protections it provides for our sensitive health information. In the era of Big Data, however, much of our health information exists outside the traditional doctor-patient dynamic. From wearable technology, to mobile applications, to social media and internet browsing, Big Data organizations collect swaths of data that shed light on sensitive health information. Big Data organizations largely fall outside of HIPAA’s current framework because of the stringent requirements for when the HIPAA protections apply, namely that the data must be held by a covered entity, and …


Content Moderation As Surveillance, Hannah Bloch-Wehba Oct 2022

Content Moderation As Surveillance, Hannah Bloch-Wehba

Faculty Scholarship

Technology platforms are the new governments, and content moderation is the new law, or so goes a common refrain. As platforms increasingly turn toward new, automated mechanisms of enforcing their rules, the apparent power of the private sector seems only to grow. Yet beneath the surface lies a web of complex relationships between public and private authorities that call into question whether platforms truly possess such unilateral power. Law enforcement and police are exerting influence over platform content rules, giving governments a louder voice in supposedly “private” decisions. At the same time, law enforcement avails itself of the affordances of …


Flattening The Curve While Protecting Our Right To Privacy: How The United States Can Implement The Digital Contract Tracing Efforts Used In East Asia, Evan Morris Aug 2022

Flattening The Curve While Protecting Our Right To Privacy: How The United States Can Implement The Digital Contract Tracing Efforts Used In East Asia, Evan Morris

The Global Business Law Review

This paper looks at the digital contact tracing efforts implemented by other nations and assesses how similar measures could operate under enacted and proposed United States laws. Part I overviews the history of contact tracing and its effectiveness in prior disease outbreaks. Part II delves into the digital contact tracing efforts implemented by South Korea and Singapore. These summaries include: the digital contact tracing efforts taken, the laws that authorize these efforts, the public’s reception, and the overall effectiveness of the efforts. Part III overviews the digital contact tracing efforts in the United States, including proposed legislation aimed at user …


Throwing Stones In Glass Houses: Protecting Privacy Under The Law Of Nuisance, Cheng Lim Saw, Joon Wei Aaron Yoong Aug 2022

Throwing Stones In Glass Houses: Protecting Privacy Under The Law Of Nuisance, Cheng Lim Saw, Joon Wei Aaron Yoong

Research Collection Yong Pung How School Of Law

The limits of the law of nuisance were recently tested in the controversial decisions of Fearn v Tate Gallery Board of Trustees, both before the UK High Court and UK Court of Appeal. Against the backdrop of these decisions, this article argues that the tort of private nuisance can indeed, in appropriate cases, protect against invasions of privacy caused by overlooking – all within the present framework and ambit of the action. It is also proposed that a communitarian approach be adopted in fashioning the appropriate remedy for actions founded in nuisance.


24th Annual Open Government Summit 2022, Roger Williams University School Of Law, Rhode Island Office Of The Attorney General Jun 2022

24th Annual Open Government Summit 2022, Roger Williams University School Of Law, Rhode Island Office Of The Attorney General

School of Law Conferences, Lectures & Events

No abstract provided.


The Case For A Liberal Communitarian Jurisprudence, Amitai Etzioni May 2022

The Case For A Liberal Communitarian Jurisprudence, Amitai Etzioni

Journal of the National Association of Administrative Law Judiciary

This article seeks to show that courts face difficulties without a principled, constitutional anchoring for the conception of the common good. Courts could divine the common good from the penumbra of the Fourth Amendment in the same way the Supreme Court created a right to privacy. In addition to creating a “common good” constitutional principle, the judicial branch should establish criteria to determine when this principle should take precedence over individual rights expressly preserved in the Constitution.


Big Data, Both Friend And Foe: The Intersection Of Privacy And Trade On The Transatlantic Stage, Gabrielle C. Craft May 2022

Big Data, Both Friend And Foe: The Intersection Of Privacy And Trade On The Transatlantic Stage, Gabrielle C. Craft

University of Miami International and Comparative Law Review

This Note analyzes the data privacy protection initiatives implemented by the European Union and the United States and their effects on international trade. As technology develops, the feasibility of data collection increases, allowing for the collecting of inconceivable amounts of data information. Consequently, this data includes personal information, thus implicating privacy concerns and the need for data privacy protection regulations. Data privacy focuses on the use and governance of personal data and how the data is gathered, collected, and stored. In 2018, the European Union enacted the General Data Protection Regulation (GDPR), which sets out highly stringent standards for how …


I Spy With My Little--Gps Tracking Device: Why Georgia Should Look To The United Kingdom's Domestic Violence Laws To Deter Innovative Abuses Of Technology, Tyerus Skala May 2022

I Spy With My Little--Gps Tracking Device: Why Georgia Should Look To The United Kingdom's Domestic Violence Laws To Deter Innovative Abuses Of Technology, Tyerus Skala

Georgia Journal of International & Comparative Law

No abstract provided.


Femtechnodystopia, Leah R. Fowler, Michael Ulrich May 2022

Femtechnodystopia, Leah R. Fowler, Michael Ulrich

Faculty Scholarship

Reproductive rights, as we have long understood them, are dead. But at the same time history seems to be moving backward, technology moves relentlessly forward. Femtech products, a category of consumer technology addressing an array of “female” health needs, seem poised to fill gaps created by states and stakeholders eager to limit birth control and abortion access and increase pregnancy surveillance and fetal rights. Period and fertility tracking applications could supplement or replace other contraception. Early digital alerts to missed periods can improve the chances of obtaining a legal abortion in states with ever-shrinking windows of availability or prompt behavioral …


Private Rights Of Action In Privacy Law, Lauren Henry Scholz Apr 2022

Private Rights Of Action In Privacy Law, Lauren Henry Scholz

William & Mary Law Review

Many privacy advocates assume that the key to providing individuals with more privacy protection is strengthening the government’s power to directly sanction actors that hurt the privacy interests of citizens. This Article contests the conventional wisdom, arguing that private rights of action are essential for privacy regulation. First, I show how private rights of action make privacy law regimes more effective in general. Private rights of action are the most direct regulatory access point to the private sphere. They leverage private expertise and knowledge, create accountability through discovery, and have expressive value in creating privacy-protective norms. Then to illustrate the …


Dismantling The “Black Opticon”: Privacy, Race Equity, And Online Data-Protection Reform, Anita L. Allen Feb 2022

Dismantling The “Black Opticon”: Privacy, Race Equity, And Online Data-Protection Reform, Anita L. Allen

Faculty Scholarship at Penn Carey Law

African Americans online face three distinguishable but related categories of vulnerability to bias and discrimination that I dub the “Black Opticon”: discriminatory oversurveillance, discriminatory exclusion, and discriminatory predation. Escaping the Black Opticon is unlikely without acknowledgement of privacy’s unequal distribution and privacy law’s outmoded and unduly race-neutral façade. African Americans could benefit from race-conscious efforts to shape a more equitable digital public sphere through improved laws and legal institutions. This Essay critically elaborates the Black Opticon triad and considers whether the Virginia Consumer Data Protection Act (2021), the federal Data Protection Act (2021), and new resources for the Federal Trade …


Self-Control Of Personal Data And The Constitution In East Asia, Dongsheng Zang Jan 2022

Self-Control Of Personal Data And The Constitution In East Asia, Dongsheng Zang

Articles

No abstract provided.


Privacy Frameworks For Smart Cities, Lindsey Tonsager, Jayne Ponder Jan 2022

Privacy Frameworks For Smart Cities, Lindsey Tonsager, Jayne Ponder

Journal of Law and Mobility

This paper identifies some of the core privacy considerations raised by smart cities – government surveillance and data security in Part I. Then, Part II proposes a set of core principles for smart cities to consider in the development and deployment of smart cities to address privacy concerns. These principles include: (A) human-centric approaches to smart cities design and implementation, (B) transparency for city residents, (C) privacy by design, (D) anonymization and deidentification, (E) data minimization and purpose specification, (F) trusted data sharing, and (G) cybersecurity resilience.


The Surprising Virtues Of Data Loyalty, Woodrow Hartzog, Neil M. Richards Jan 2022

The Surprising Virtues Of Data Loyalty, Woodrow Hartzog, Neil M. Richards

Faculty Scholarship

Lawmakers in the United States and Europe are seriously considering imposing duties of data loyalty that implement ideas from privacy law scholarship, but critics claim such duties are unnecessary, unworkable, overly individualistic, and indeterminately vague. This paper takes those criticisms seriously, and its analysis of them reveals that duties of data loyalty have surprising virtues. Loyalty, it turns out, can support collective well-being by embracing privacy’s relational turn; it can be a powerful state of mind for reenergizing privacy reform; it prioritizes human values rather than potentially empty formalism; and it offers solutions that are flexible and clear rather than …


Navigating The Identity Thicket: Trademark's Lost Theory Of Personality, The Right Of Publicity, And Preemption, Jennifer Rothman Jan 2022

Navigating The Identity Thicket: Trademark's Lost Theory Of Personality, The Right Of Publicity, And Preemption, Jennifer Rothman

Faculty Scholarship at Penn Carey Law

Both trademark and unfair competition laws and state right of publicity laws protect against unauthorized uses of a person’s identity. Increasingly, however, these rights are working at odds with one another, and can point in different directions with regard to who controls a person’s name, likeness, and broader indicia of identity. This creates what I call an "identity thicket" of overlapping and conflicting rights over a person’s identity. Current jurisprudence provides little to no guidance on the most basic questions surrounding this thicket, such as what right to use a person’s identity, if any, flows from the transfer of marks …


Privacy Pretexts, Rory Van Loo Jan 2022

Privacy Pretexts, Rory Van Loo

Faculty Scholarship

Data privacy’s ethos lies in protecting the individual from institutions. Increasingly, however, institutions are deploying privacy arguments in ways that harm individuals. Platforms like Amazon, Facebook, and Google wall off information from competitors in the name of privacy. Financial institutions under investigation justify withholding files from the Consumer Financial Protection Bureau by saying they must protect sensitive customer data. In these and other ways, the private sector is exploiting privacy to avoid competition and accountability. This Article highlights the breadth of privacy pretexts and uncovers their moral structure. Like most pretexts, there is an element of truth to the claims. …