Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Privacy

Journal

Communications Law

Institution
Publication Year
Publication

Articles 1 - 30 of 49

Full-Text Articles in Law

One Size Does Not Fit All: How The California Privacy Rights Act Will Not Improve Employee Data Collection And Privacy Rights, Kayla N. Bushey Jan 2023

One Size Does Not Fit All: How The California Privacy Rights Act Will Not Improve Employee Data Collection And Privacy Rights, Kayla N. Bushey

Catholic University Journal of Law and Technology

No abstract provided.


Inadequate Privacy: The Necessity Of Hipaa Reform In A Post-Dobbs World, Katherine Robertson Jan 2023

Inadequate Privacy: The Necessity Of Hipaa Reform In A Post-Dobbs World, Katherine Robertson

Seattle University Law Review

Part I of this Comment will provide an overview of HIPAA and the legal impacts of Dobbs. Part II will discuss the anticipatory response to the impacts of Dobbs on PHI by addressing the response from (1) the states, (2) the Biden Administration, and (3) the medical field. Part III will discuss the loopholes that exist in HIPAA and further address the potential impacts on individuals and the medical field if reform does not occur. Finally, Part IV will argue that the reform of HIPAA is the best avenue for protecting PHI related to reproductive healthcare.


The Development Of Digital Mass Surveillance In Norway: The Emergence Of A Surveillance State?, Iris Nguyên Duy Jan 2023

The Development Of Digital Mass Surveillance In Norway: The Emergence Of A Surveillance State?, Iris Nguyên Duy

FIU Law Review

No abstract provided.


The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine Jan 2022

The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine

Catholic University Journal of Law and Technology

No abstract provided.


Passcodes, Protection, And Legal Practicality: The Necessity Of A Digital Fifth Amendment, Ethan Swierczewski Jan 2022

Passcodes, Protection, And Legal Practicality: The Necessity Of A Digital Fifth Amendment, Ethan Swierczewski

Catholic University Journal of Law and Technology

No abstract provided.


A Proportionality-Based Framework For Government Regulation Of Digital Tracing Apps In Times Of Emergency, Sharon Bassan Jan 2022

A Proportionality-Based Framework For Government Regulation Of Digital Tracing Apps In Times Of Emergency, Sharon Bassan

Dickinson Law Review (2017-Present)

Times of emergency present an inherent conflict between the public interest and the preservation of individual rights. Such times require granting emergency powers to the government on behalf of the public interest and relaxing safeguards against government actions that infringe rights. The lack of theoretical framework to assess governmental decisions in times of emergency leads to a polarized and politicized discourse about potential policies, and often, to public distrust and lack of compliance.

Such a discourse was evident regarding Digital Tracing Apps (“DTAs”), which are apps installed on cellular phones to alert users that they were exposed to people who …


"Times They Are A Changin'" - Can The Ad Tech Industry Survive In A Privacy Conscious World?, Meaghan Donahue Jan 2021

"Times They Are A Changin'" - Can The Ad Tech Industry Survive In A Privacy Conscious World?, Meaghan Donahue

Catholic University Journal of Law and Technology

The "ad tech ecosystem" is a web of interconnected technologies and intermediaries that facilitate targeted advertising based on consumer data, and supports the free internet while providing users with promotional content relevant to their interests. However, in recent years, lawmakers and consumer advocates have highlighted the dangers associated with the unregulated use of consumer data for advertising purposes, prompting a flurry of legislative action at both the state and federal levels. These various laws and proposed bills impose new challenges on the ad tech industry--threatening to fundamentally change the way the business operates. However, through innovation and creative thinking, the …


Privacy, Eavesdropping, And Wiretapping Across The United States: Reasonable Expectation Of Privacy And Judicial Discretion, Carol M. Bast Jan 2020

Privacy, Eavesdropping, And Wiretapping Across The United States: Reasonable Expectation Of Privacy And Judicial Discretion, Carol M. Bast

Catholic University Journal of Law and Technology

One-party consent and all-party consent eavesdropping and wiretapping statutes are two broad pathways for legislation to deal with the problem of secret taping and some states protect conversation under state constitutions. Whether a conversation is protected against being taped as a private conversation is often gauged by the reasonable expectation of privacy standard. Judges in both all-party consent and one-party consent jurisdictions have had to use their leeway under the reasonable expectation of privacy standard to arrive at what at the time seemed to be the most appropriate solution, perhaps in doing so creating a case law exception.


Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast Jan 2020

Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast

Catholic University Journal of Law and Technology

The goal of this paper is to examine the future of the third-party doctrine with the proliferation of technology and the online data we are surrounded with daily, specifically after the Supreme Court’s decision in Carpenter v. United States. It is imperative that individuals do not forfeit their Constitutional guarantees for the benefit of living in a technologically advanced society. This requires an understanding of the modern-day functional equivalents of “papers” and “effects.”

Looking to the future, this paper contemplates solutions on how to move forward in this technology era by scrutinizing the relevancy of the third-party doctrine due …


The Department Of Justice Versus Apple Inc. -- The Great Encryption Debate Between Privacy And National Security, Julia P. Eckart Jan 2019

The Department Of Justice Versus Apple Inc. -- The Great Encryption Debate Between Privacy And National Security, Julia P. Eckart

Catholic University Journal of Law and Technology

This article is an attempt to objectively examine and assess legal arguments made by Apple Inc. (Apple) and the Department of Justice (DOJ) concerning the DOJ’s use of the All Writs Act[1] (AWA) to require Apple to provide technical assistance to the DOJ so that it could access the encrypted data from the locked iPhone of Syed Rizwan Farook, commonly referred to as the San Bernardino shooter. The DOJ’s initial ex parte application focused on meeting the requirements of United States v. New York Telephone Co.[2] concluding the court order was authorized and appropriate. Apple not only argued …


Dating Dangerously: Risks Lurking Within Mobile Dating Apps, Alyssa Murphy Jan 2018

Dating Dangerously: Risks Lurking Within Mobile Dating Apps, Alyssa Murphy

Catholic University Journal of Law and Technology

In modern society, cell phones have become a virtual extension of most Americans. Advances in cell phone technology have given rise to the popularity of mobile dating applications (“apps”), which are capable of allowing users to date and meet potential partners without leaving the comfort of their own homes. The convenience and allure of mobile dating apps has led to a staggering increase in the number of crimes orchestrated against other users of the apps. Such crimes often include solicitation, stalking, murder, and human trafficking. Unsuspecting and trusting users fall victim to these crimes due to the false sense of …


Smart Baby Monitors: The Modern Nanny Or A Home Invader, Sarah Ensenat Jan 2018

Smart Baby Monitors: The Modern Nanny Or A Home Invader, Sarah Ensenat

Catholic University Journal of Law and Technology

Smart baby monitors exist to help parents protect and watch over their children. The smart baby monitors act as a second set of eyes when parents cannot be in the same room as their children. Low-tech hackers take advantage of gaps in the security of smart baby monitors. A hacker violates a consumer’s privacy by gaining access to private information, viewing the home and its occupants, and even speaking to children through the monitor.

This comment advocates for stricter security legislation for smart baby monitors. Without new legislation, manufacturers of smart baby monitors do not apply or invest in the …


"I Call Alexa To The Stand": The Privacy Implications Of Anthropomorphizing Virtual Assistants Accompanying Smart-Home Technology, Christopher B. Burkett Jan 2018

"I Call Alexa To The Stand": The Privacy Implications Of Anthropomorphizing Virtual Assistants Accompanying Smart-Home Technology, Christopher B. Burkett

Vanderbilt Journal of Entertainment & Technology Law

This Note offers a solution to the unique privacy issues posed by the increasingly humanlike interactions users have with virtual assistants, such as Amazon's Alexa, which accompany smart-home technology. These interactions almost certainly result in the users engaging in the cognitive phenomenon of anthropomorphism--more specifically, an assignment of agency. This is a phenomenon that has heretofore been ignored in the legal context, but both the rapidity of technological advancement and inadequacy of current applicable legal doctrine necessitate its consideration now. Since users view these anthropomorphized virtual assistants as persons rather than machines, the law should treat them as such. To …


Yershov V. Gannett: Rethinking The Vppa In The 21st Century, Ariel A. Pardee Sep 2017

Yershov V. Gannett: Rethinking The Vppa In The 21st Century, Ariel A. Pardee

Maine Law Review

Almost anyone with a smartphone can recall a time when an online advertisement followed them from webpage to webpage, or mobile browser to mobile application, or even jumped from a mobile device to a desktop web browser. While some people see it as a harmless—or even helpful—quirk of the online world, others find it creepy and intrusive. In the absence of significant government regulation of online advertising practices, particularly aggrieved individuals have sought relief in the courts by alleging violations of ill-fitting statutes drafted decades ago. This note explores just such a case, Yershov v. Gannett, in which the First …


Digital Technology And Analog Law: Cellular Location Data, The Third-Party Doctrine, And The Law's Need To Evolve, Justin Hill Mar 2017

Digital Technology And Analog Law: Cellular Location Data, The Third-Party Doctrine, And The Law's Need To Evolve, Justin Hill

University of Richmond Law Review

No abstract provided.


Targeted Advertising And The First Amendment: Student Privacy Vs. Protected Speech, Marco Crocetti Jan 2017

Targeted Advertising And The First Amendment: Student Privacy Vs. Protected Speech, Marco Crocetti

Catholic University Journal of Law and Technology

No abstract provided.


Need For Informed Consent In The Age Of Ubiquitous Human Testing, Caitlyn Kuhs Jan 2016

Need For Informed Consent In The Age Of Ubiquitous Human Testing, Caitlyn Kuhs

Loyola of Los Angeles Law Review

No abstract provided.


Implications For The Future Of Global Data Security And Privacy: The Territorial Application Of The Stored Communications Act And The Microsoft Case, Russell Hsiao Dec 2015

Implications For The Future Of Global Data Security And Privacy: The Territorial Application Of The Stored Communications Act And The Microsoft Case, Russell Hsiao

Catholic University Journal of Law and Technology

No abstract provided.


Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg Jun 2015

Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg

Michigan Telecommunications & Technology Law Review

This Article reveals interdependent legal and technical loopholes that the US intelligence community could use to circumvent constitutional and statutory safeguards for Americans. These loopholes involve the collection of Internet traffic on foreign territory, and leave Americans as unprotected as foreigners by current United States (US) surveillance laws. This Article will also describe how modern Internet protocols can be manipulated to deliberately divert American’s traffic abroad, where traffic can then be collected under a more permissive legal regime (Executive Order 12333) that is overseen solely by the executive branch of the US government. Although the media has reported on some …


No More Shortcuts: Protect Cell Site Location Data With A Warrant Requirement, Lauren E. Babst Jan 2015

No More Shortcuts: Protect Cell Site Location Data With A Warrant Requirement, Lauren E. Babst

Michigan Telecommunications & Technology Law Review

In modern society, the cell phone has become a virtual extension of most Americans, managing all kinds of personal and business matters. Modern cell tower technology allows cell service providers to accumulate a wealth of individuals’ location information while they use their cell phones, and such data is available for law enforcement to obtain without a warrant. This is problematic under the Fourth Amendment, which protects reasonable expectations of privacy. Under the Katz two-prong test, (1) individuals have an actual, subjective expectation of privacy in their cell site location data, and (2) society is prepared to acknowledge that expectation as …


Cookie Monster: Balancing Internet Privacy With Commerce, Technology And Terrorism, Nichoel Forrett Dec 2014

Cookie Monster: Balancing Internet Privacy With Commerce, Technology And Terrorism, Nichoel Forrett

Touro Law Review

No abstract provided.


Webmail At Work: The Case For Protection Against Employer Monitoring, Marc A. Sherman May 2014

Webmail At Work: The Case For Protection Against Employer Monitoring, Marc A. Sherman

Touro Law Review

No abstract provided.


The Communication Decency Act Gone Wild: A Case For Renewing The Presumption Against Preemption, Ryan J.P. Dyer Mar 2014

The Communication Decency Act Gone Wild: A Case For Renewing The Presumption Against Preemption, Ryan J.P. Dyer

Seattle University Law Review

Since its inception, the Internet has disseminated the most vital commodity known to man—information. But not all information is societally desirable. In fact, much of what the Internet serves to disseminate is demonstrably criminal. Nevertheless, in the effort to unbind the “vibrant and competitive free market” of ideas on the Internet, Congress enacted section 230 of the Communications Decency Act, which essentially grants immunity to interactive computer service providers from liability for information provided by a third party. This Comment suggests that, in certain contexts, courts applying section 230 immunity should reexamine the preemptive effect Congress intended section 230 to …


Give Me Your Password: The Intrusive Social Media Policies In Our Schools, Talon Hurst Jan 2014

Give Me Your Password: The Intrusive Social Media Policies In Our Schools, Talon Hurst

CommLaw Conspectus: Journal of Communications Law and Technology Policy (1993-2015)

No abstract provided.


Electronic Privacy Information Center V. National Security Agency: How Glomar Responses Benefit Businesses And Provide An Epic Blow To Individuals, Joshua R. Chazen Jan 2014

Electronic Privacy Information Center V. National Security Agency: How Glomar Responses Benefit Businesses And Provide An Epic Blow To Individuals, Joshua R. Chazen

Journal of Business & Technology Law

No abstract provided.


Policing The Social Media Water Cooler: Recent Nlrb Decisions Should Make Employers Think Twice Before Terminating An Employee For Comments Posted On Social Media Sites, Eric Raphan, Sean Kirby Jan 2014

Policing The Social Media Water Cooler: Recent Nlrb Decisions Should Make Employers Think Twice Before Terminating An Employee For Comments Posted On Social Media Sites, Eric Raphan, Sean Kirby

Journal of Business & Technology Law

No abstract provided.


Limits Of The Federal Wiretap Act's Ability To Protect Against Wi-Fi Sniffing, Mani Potnuru Oct 2012

Limits Of The Federal Wiretap Act's Ability To Protect Against Wi-Fi Sniffing, Mani Potnuru

Michigan Law Review

Adoption of Wi-Fi wireless technology continues to see explosive growth. However many users still operate their home Wi-Fi networks in unsecured mode or use publicly available unsecured Wi-Fi networks, thus exposing their communications to the dangers of "packet sniffing," a technique used for eavesdropping on a network. Some have argued that communications over unsecured Wi-Fi networks are "readily accessible to the general public" and that such communications are therefore excluded from the broad protections of the Federal Wiretap Act against intentional interception of electronic communications. This Note examines the Federal Wiretap Act and argues that the current Act's treatment of …


Privacy Policies, Terms Of Service, And Ftc Enforcement: Broadening Unfairness Regulation For A New Era, G. S. Hans Jan 2012

Privacy Policies, Terms Of Service, And Ftc Enforcement: Broadening Unfairness Regulation For A New Era, G. S. Hans

Michigan Telecommunications & Technology Law Review

This Note examines website privacy policies in the context of FTC regulation. The relevant portion of Section 5 of the Federal Trade Commission Act, 15 U.S.C. § 45(a), uses the following language to define the scope of the agency's regulatory authority: "Unfair methods of competition in or affecting commerce, and unfair or deceptive acts or practices in or affecting commerce, are hereby declared unlawful." Specifically, this Note analyzes the FTC's power to regulate unfair practices (referred to as the FTC's "unfairness power") granted by Section 5, and also discusses the deception prong of Section 5, which allows the agency to …


A Risk Not Worth The Reward: The Stored Communications Act And Employers’ Collection Of Employees’ And Job Applicants’ Social Networking Passwords, Nicholas D. Beadle Jan 2012

A Risk Not Worth The Reward: The Stored Communications Act And Employers’ Collection Of Employees’ And Job Applicants’ Social Networking Passwords, Nicholas D. Beadle

American University Business Law Review

No abstract provided.


The Facebook Frontier: Responding To The Changing Face Of Privacy On The Internet, Samantha L. Millier Jan 2009

The Facebook Frontier: Responding To The Changing Face Of Privacy On The Internet, Samantha L. Millier

Kentucky Law Journal

No abstract provided.