Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (79)
- Privacy Law (78)
- Computer Law (55)
- Science and Technology Law (52)
- Constitutional Law (45)
-
- Fourth Amendment (38)
- Criminal Procedure (32)
- Social and Behavioral Sciences (31)
- Criminal Law (27)
- Intellectual Property Law (25)
- Law and Society (25)
- Communications Law (20)
- Computer Sciences (18)
- Physical Sciences and Mathematics (18)
- First Amendment (17)
- Business (16)
- Labor and Employment Law (16)
- Health Law and Policy (15)
- Consumer Protection Law (14)
- Civil Rights and Discrimination (13)
- Sociology (13)
- Technology and Innovation (12)
- Engineering (11)
- Public Affairs, Public Policy and Public Administration (11)
- Science and Technology Studies (10)
- Criminology (9)
- Other Engineering (9)
- Public Policy (9)
- Social Policy (9)
- Institution
- Publication Year
- Publication
-
- Stephen E Henderson (16)
- Robert Sprague (14)
- James Grimmelmann (7)
- Jean HERVEG (7)
- Dr Rebecca Wong (6)
-
- Joshua A.T. Fairfield (6)
- Patricia L. Bellia (6)
- Paul M. Schwartz (6)
- Susan Freiwald (6)
- Adam Lamparello (5)
- Associate Professor Katina Michael (5)
- Chris Jay Hoofnagle (5)
- Frank A. Pasquale (5)
- Mireille Hildebrandt (5)
- Professor Katina Michael (5)
- Corey A Ciocchetti (4)
- Richard Warner (4)
- Andrew B. Serwin (3)
- Ann Bartow (3)
- Charles J. Russo (3)
- Henry L Hu (3)
- Jacqueline D Lipton (3)
- Meg Penrose (3)
- Samantha Barbas (3)
- Sherry Colb (3)
- Subhajit Basu (3)
- Tracy Mitrano (3)
- Wilhelm Peekhaus (3)
- A. Michael Froomkin (2)
- Adam Thierer (2)
Articles 1 - 30 of 355
Full-Text Articles in Law
The Positive Law Model Of The Fourth Amendment, William Baude, James Y. Stern
The Positive Law Model Of The Fourth Amendment, William Baude, James Y. Stern
James Y. Stern
For fifty years, courts have used a “reasonable expectation of privacy” standard to define “searches” under the Fourth Amendment. As others have recognized, that doctrine is subjective, unpredictable, and conceptually confused, but viable alternatives have been slow to emerge. This Article supplies one.
We argue that Fourth Amendment protection should be anchored in background positive law. The touchstone of the search-and-seizure analysis should be whether government officials have done something forbidden to private parties. It is those actions that should be subjected to Fourth Amendment reasonableness review and the presumptive requirement to obtain a warrant. In short, Fourth Amendment protection …
Combatendo A Corrupção Nos Estados Unidos, Paul Marcus
Combatendo A Corrupção Nos Estados Unidos, Paul Marcus
Paul Marcus
The article discusses the problematic of the fight against the corruption by the criminal justice system of the United States, mainly the white-collar crimes. It is emphasized, first, that in most of the cases does not result in trial, but in plea bargains, and, second, in many cases the encouragement from an undercover agent has served as an effective defense instrument. Finally, it is discussed the problematic of the use of information obtained from the technological devices and its probable violation to the right privacy.
This article is in Portuguese.
The Case For The Third-Party Doctrine, Orin S. Kerr
The Case For The Third-Party Doctrine, Orin S. Kerr
Orin Kerr
This Article offers a defense of the Fourth Amendment's third party doctrine, the controversial rule that information loses Fourth Amendment protection when it is knowingly revealed to a third party. Fourth Amendment scholars have repeatedly attacked the rule on the ground that it is unpersuasive on its face and gives the government too much power This Article responds that critics have overlooked the benefits of the rule and have overstated its weaknesses. The third-party doctrine serves two critical functions. First, the doctrine ensures the technological neutrality of the Fourth Amendment. It corrects for the substitution effect of third parties that …
The Role Of Satellites And Smart Devices: Data Surprises And Security, Privacy, And Regulatory Challenges, Anne T. Mckenna, Amy C. Gaudion, Jenni L. Evans
The Role Of Satellites And Smart Devices: Data Surprises And Security, Privacy, And Regulatory Challenges, Anne T. Mckenna, Amy C. Gaudion, Jenni L. Evans
Amy C. Gaudion
Strava, a popular social media platform and mobile app like Facebook but specifically designed for athletes, posts a “heatmap” with consensually-obtained details about users’ workouts and geolocation. Strava’s heatmap depicts aggregated data of user location and movement by synthesizing GPS satellite data points and movement data from users’ smart devices together with satellite imagery. In January of 2018, a 20-year-old student tweeted that Strava’s heatmap revealed U.S. forward operating bases. The tweet revealed a significant national security issue and flagged substantial privacy and civil liberty concerns.
Smart devices, software applications, and social media platforms aggregate consumer data from multiple data …
Privacy Rights And Public Families, Khiara Bridges
Privacy Rights And Public Families, Khiara Bridges
Khiara M Bridges
This Article is based on eighteen months of anthropological fieldwork conducted among poor, pregnant women receiving prenatal care provided by the Prenatal Care Assistance Program (“PCAP”) at a large public hospital in New York City. The Prenatal Care Assistance Program (“PCAP”) is a special program within the New York State Medicaid program that provides comprehensive prenatal care services to otherwise uninsured or underinsured women. This Article attempts to accomplish two goals. The first goal is to argue that PCAP’s compelled consultations – with social workers, health educators, nutritionists, and financial officers – function as a gross and substantial intrusion by …
Industrial Justice: Privacy Protection For The Employed, Ariana R. Levinson
Industrial Justice: Privacy Protection For The Employed, Ariana R. Levinson
Ariana R. Levinson
No abstract provided.
Remedies, Neutral Rules And Free Speech, David F. Partlett, Russell L. Weaver
Remedies, Neutral Rules And Free Speech, David F. Partlett, Russell L. Weaver
Russell L. Weaver
In general, plaintiffs’ ability to obtain substantial damages against media defendants is directly proportional to their ability to obtain so called “publication damages.”...In future cases, the courts may be forced to deal more straightforwardly with the First Amendment issues. In Sanders, the court avoided those issues because they were not raised. As a result, the court left open the possibility that, even in an intrusion case a media defendant might be allowed to show that the invasion of privacy was “justified by the legitimate motive of gathering the news.”...Moreover, the very existence of the litigation undoubtedly has a negative impact …
Jewish Law And Socially Responsible Corporate Conduct, Steven H. Resnicoff
Jewish Law And Socially Responsible Corporate Conduct, Steven H. Resnicoff
Steven Resnicoff
No abstract provided.
Is It Time For A Universal Genetic Forensic Database?, Christopher Slobogin, Ellen Wright Clayton, J. W. Hazel, B. A. Malin
Is It Time For A Universal Genetic Forensic Database?, Christopher Slobogin, Ellen Wright Clayton, J. W. Hazel, B. A. Malin
Christopher Slobogin
The ethical objections to mandating forensic profiling of newborns and/or compelling every citizen or visitor to submit to a buccal swab or to spit in a cup when they have done nothing wrong are not trivial. But newborns are already subject to compulsory medical screening, and people coming from foreign countries to the United States already submit to fingerprinting. It is also worth noting that concerns about coercion or invasions of privacy did not give pause to legislatures (or, for that matter, even the European Court) when authorizing compelled DNA sampling from arrestees, who should not forfeit genetic privacy interests …
Is It Time For A Universal Genetic Forensic Database?, Christopher Slobogin, Ellen Wright Clayton, J. W. Hazel, B. A. Malin
Is It Time For A Universal Genetic Forensic Database?, Christopher Slobogin, Ellen Wright Clayton, J. W. Hazel, B. A. Malin
Ellen Wright Clayton
The ethical objections to mandating forensic profiling of newborns and/or compelling every citizen or visitor to submit to a buccal swab or to spit in a cup when they have done nothing wrong are not trivial. But newborns are already subject to compulsory medical screening, and people coming from foreign countries to the United States already submit to fingerprinting. It is also worth noting that concerns about coercion or invasions of privacy did not give pause to legislatures (or, for that matter, even the European Court) when authorizing compelled DNA sampling from arrestees, who should not forfeit genetic privacy interests …
Deputizing Family: Loved Ones As A Regulatory Tool In The 'Drug War' And Beyond, Matthew Lawrence
Deputizing Family: Loved Ones As A Regulatory Tool In The 'Drug War' And Beyond, Matthew Lawrence
Matthew B. Lawrence
In Defense Of The American Community Survey, Michael Lewyn
In Defense Of The American Community Survey, Michael Lewyn
Michael E Lewyn
The Language-Game Of Privacy, Joshua A.T. Fairfield
The Language-Game Of Privacy, Joshua A.T. Fairfield
Joshua A.T. Fairfield
A review of Ronald J. Krotoszynski, Jr., Privacy Revisited: A Global Perspective on the Right to Be Left Alone.
Self Incrimination And Cryptographic Keys, Gregory S. Sergienko
Self Incrimination And Cryptographic Keys, Gregory S. Sergienko
Greg Sergienko
Modern cryptography can make it virtually impossible to decipher documents without the cryptographic key thus making the availability of the contents of those documents depend on the availability of the key. This article examines the Fourth and Fifth Amendments' protection against the compulsory production of the key and the scope of the Fifth Amendment immunity against compelled production. After analyzing these questions using prevailing Fourth and Fifth Amendment jurisprudence, I shall describe the advantages of a privacy-based approach in practical and constitutional terms. [excerpt]
Intellectual Property And Public Health – A White Paper, Ryan G. Vacca, Jim Chen, Jay Dratler Jr., Tom Folsom, Timothy Hall, Yaniv Heled, Frank Pasquale, Elizabeth Reilly, Jeff Samuels, Kathy Strandburg, Kara Swanson, Andrew Torrance, Katharine Van Tassel
Intellectual Property And Public Health – A White Paper, Ryan G. Vacca, Jim Chen, Jay Dratler Jr., Tom Folsom, Timothy Hall, Yaniv Heled, Frank Pasquale, Elizabeth Reilly, Jeff Samuels, Kathy Strandburg, Kara Swanson, Andrew Torrance, Katharine Van Tassel
Katharine Van Tassel
On October 26, 2012, the University of Akron School of Law’s Center for Intellectual Property and Technology hosted its Sixth Annual IP Scholars Forum. In attendance were thirteen legal scholars with expertise and an interest in IP and public health who met to discuss problems and potential solutions at the intersection of these fields. This report summarizes this discussion by describing the problems raised, areas of agreement and disagreement between the participants, suggestions and solutions made by participants and the subsequent evaluations of these suggestions and solutions.
Led by the moderator, participants at the Forum focused generally on three broad …
Privacy In The Age Of The Hacker: Balancing Global Privacy And Data Security Law, Cunningham, Mckay, Mckay Cunningham
Privacy In The Age Of The Hacker: Balancing Global Privacy And Data Security Law, Cunningham, Mckay, Mckay Cunningham
McKay Cunningham
The twin goals of privacy and data security share a fascinating symbiotic relationship: too much of one undermines the other. The international regulatory climate, embodied principally by the European Union’s 1995 Directive, increasingly promotes privacy. In the last two decades, fifty-three countries enacted national legislation largely patterned after the E.U. Directive. These laws, by and large, protect privacy by restricting data processing and data transfers.
At the same time, hacking, malware, and other cyber-threats continue to grow in frequency and sophistication. In 2010, one security firm recorded 286 million variants of malware and reported that 232.4 million identities were exposed. …
A Model Regime Of Privacy Protection (Version 2.0), Daniel J. Solove, Chris Jay Hoofnagle
A Model Regime Of Privacy Protection (Version 2.0), Daniel J. Solove, Chris Jay Hoofnagle
Chris Jay Hoofnagle
This version incorporates and responds to the many comments that we received to Version 1.1, which we released on March 10, 2005.
Privacy protection in the United States has often been criticized, but critics have too infrequently suggested specific proposals for reform. Recently, there has been significant legislative interest at both the federal and state levels in addressing the privacy of personal information. This was sparked when ChoicePoint, one of the largest data brokers in the United States with records on almost every adult American citizen, sold data on about 145,000 people to fraudulent businesses set up by identity thieves. …
Bookit Ip Series - Federal Trade Commission Privacy Law And Policy, Chris Hoofnagle
Bookit Ip Series - Federal Trade Commission Privacy Law And Policy, Chris Hoofnagle
Chris Jay Hoofnagle
The Federal Trade Commission (FTC) was established in 1914 to prevent unfair competition in commerce. Since that time, the FTC has been given greater authority to police anticompetitive practices. It has evolved into the most important regulator of information policy and now regulates our technological future. Unfortunately, the agency is often poorly understood. In his book Federal Trade Commission Privacy Law and Policy, Professor Hoofnagle will redress this confusion by explaining how the FTC arrived at its current position of power. He will offer practical tips for lawyers, legal academics, political scientists, historians, and those interested in obtaining a better …
How Different Are Young Adults From Older Adults When It Comes To Information Privacy Attitudes & Policies?, Chris Jay Hoofnagle, Jennifer King, Su Li, Joseph Turow
How Different Are Young Adults From Older Adults When It Comes To Information Privacy Attitudes & Policies?, Chris Jay Hoofnagle, Jennifer King, Su Li, Joseph Turow
Chris Jay Hoofnagle
Media reports teem with stories of young people posting salacious photos online, writing about alcohol-fueled misdeeds on social networking sites, and publicizing other ill-considered escapades that may haunt them in the future. These anecdotes are interpreted as representing a generation-wide shift in attitude toward information privacy. Many commentators therefore claim that young people “are less concerned with maintaining privacy than older people are.” Surprisingly, though, few empirical investigations have explored the privacy attitudes of young adults. This report is among the first quantitative studies evaluating young adults’ attitudes. It demonstrates that the picture is more nuanced than portrayed in the …
A Model Regime Of Privacy Protection (Version 1.1), Daniel J. Solove, Chris Jay Hoofnagle
A Model Regime Of Privacy Protection (Version 1.1), Daniel J. Solove, Chris Jay Hoofnagle
Chris Jay Hoofnagle
Privacy protection in the United States has often been criticized, but critics have too infrequently suggested specific proposals for reform. Recently, there has been significant legislative interest at both the federal and state levels in addressing the privacy of personal information. This was sparked when ChoicePoint, one of the largest data brokers in the United States with records on almost every adult American citizen, sold data on about 145,000 people to fraudulent businesses set up by identity thieves.
In the aftermath of the ChoicePoint debacle, both of us have been asked by Congressional legislative staffers, state legislative policymakers, journalists, academics, …
Carpenter V. United States And The Fourth Amendment: The Best Way Forward, Stephen E. Henderson
Carpenter V. United States And The Fourth Amendment: The Best Way Forward, Stephen E. Henderson
Stephen E Henderson
Consumer Bitcredit And Fintech Lending, Christopher K. Odinet
Consumer Bitcredit And Fintech Lending, Christopher K. Odinet
Christopher K. Odinet
Fourth Amendment Anxiety, Stephen E. Henderson, Kiel Brennan-Marquez
Fourth Amendment Anxiety, Stephen E. Henderson, Kiel Brennan-Marquez
Stephen E Henderson
A Few Criminal Justice Big Data Rules, Stephen E. Henderson
A Few Criminal Justice Big Data Rules, Stephen E. Henderson
Stephen E Henderson
Tactful Inattention: Erving Goffman, Privacy In The Digital Age, And The Virtue Of Averting One's Eyes, Elizabeth De Armond
Tactful Inattention: Erving Goffman, Privacy In The Digital Age, And The Virtue Of Averting One's Eyes, Elizabeth De Armond
Elizabeth De Armond
No abstract provided.
Regulating Spyware: The Limitations Of State Laboratories And The Case For Federal Preemption Of State Unfair Competition Laws, Peter S. Menell
Regulating Spyware: The Limitations Of State Laboratories And The Case For Federal Preemption Of State Unfair Competition Laws, Peter S. Menell
Peter Menell
Drawing on Justice Brandeis's oft-cited observation that states can serve as 'laboratories" of policy experimentation, this Article develops a framework for assessing the allocation of governance authority for regulating Internet activities. In particular, it focuses on whether states should be free to experiment with regulatory approaches or whether the federal government should have principal, if not exclusive (preemptive), regulatory authority over Internet-related activities. Using recent efforts to regulate spyware and adware as a case study, the analysis shows that the lack of harmonization of and uncertainty surrounding, state unfair competition law produces costly, confusing, multi-district litigation and pushes enterprises to …
Keeping The Government's Hands Off Our Bodies: Mapping A Feminist Legal Theory Approach To Privacy In Cross-Gender Prison Searches, Teresa A. Miller
Keeping The Government's Hands Off Our Bodies: Mapping A Feminist Legal Theory Approach To Privacy In Cross-Gender Prison Searches, Teresa A. Miller
Teresa A. Miller
The power of privacy is diminishing in the prison setting, and yet privacy is the legal theory prisoners rely upon most to resist searches by correctional officers. Incarcerated women in particular rely upon privacy to shield them from the kind of physical contact that male guards have been known to abuse. The kind of privacy that protects prisoners from searches by guards of the opposite sex derives from several sources, depending on the factual circumstances. Although some form of bodily privacy is embodied in the First, Fourth, Eighth, and Fourteenth Amendments, prisoners challenging the constitutionality of cross-gender searches most commonly …
Sex & Surveillance: Gender, Privacy & The Sexualization Of Power In Prison, Teresa A. Miller
Sex & Surveillance: Gender, Privacy & The Sexualization Of Power In Prison, Teresa A. Miller
Teresa A. Miller
In prison, surveillance is power and power is sexualized. Sex and surveillance, therefore, are profoundly linked. Whereas numerous penal scholars from Bentham to Foucault have theorized the force inherent in the visual monitoring of prisoners, the sexualization of power and the relationship between sex and surveillance is more academically obscure. This article criticizes the failure of federal courts to consider the strong and complex relationship between sex and surveillance in analyzing the constitutionality of prison searches, specifically, cross-gender searches. The analysis proceeds in four parts. Part One introduces the issues posed by sex and surveillance. Part Two describes the sexually …
Intellectual Property’S Lessons For Information Privacy, Mark Bartholomew
Intellectual Property’S Lessons For Information Privacy, Mark Bartholomew
Mark Bartholomew
There is an inherent tension between an individual’s desire to safeguard her personal information and the expressive rights of businesses seeking to communicate that information to others. This tension has multiplied as consumers generate and businesses collect more and more personal data online, forcing efforts to strike an appropriate balance between privacy and commercial speech. No consensus on this balance has been reached. Some privacy scholars bemoan what they see as a slanted playing field in favor of those wishing to profit from the private details of other people’s lives. Others contend that the right in free expression must always …
When Privacy Almost Won: Time, Inc. V. Hill (1967), Samantha Barbas
When Privacy Almost Won: Time, Inc. V. Hill (1967), Samantha Barbas
Samantha Barbas
Drawing on previously unexplored and unpublished archival papers of Richard Nixon, the plaintiffs’ lawyer in the case, and the justices of the Warren Court, this article tells the story of the seminal First Amendment case Time, Inc. v. Hill (1967). In Hill, the Supreme Court for the first time addressed the conflict between the right to privacy and freedom of the press. The Court constitutionalized tort liability for invasion of privacy, acknowledging that it raised First Amendment issues and must be governed by constitutional standards. Hill substantially diminished privacy rights; today it is difficult if not impossible to recover against …