Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 41

Full-Text Articles in Law

Workshop | Body Worn Video Recorders: The Socio-Technical Implications Of Gathering Direct Evidence, Katina Michael, Alexander Hayes Jun 2015

Workshop | Body Worn Video Recorders: The Socio-Technical Implications Of Gathering Direct Evidence, Katina Michael, Alexander Hayes

Alexander Hayes Mr.

- From in-car video recording to body-worn video recording

- Exploring available technologies: how do they work, pros and cons

- Storing direct evidence in secure storage: factors to consider

- Citizens “shooting” back with POV tech – what are their rights?

- Crowdsourced sousveillance- harnessing public data for forensic profiling

- Police force policies and practices on the application of new media


Panel I: The Conflict Between Commercial Speech And Legislation Governing The Commercialization Of Public Sector Data, Robert Sherman, Paul Schwartz, Deirdre Mulligan, Steven Emmert Dec 2013

Panel I: The Conflict Between Commercial Speech And Legislation Governing The Commercialization Of Public Sector Data, Robert Sherman, Paul Schwartz, Deirdre Mulligan, Steven Emmert

Paul M. Schwartz

No abstract provided.


Privacy Inalienability And The Regulation Of Spyware, Paul M. Schwartz Dec 2013

Privacy Inalienability And The Regulation Of Spyware, Paul M. Schwartz

Paul M. Schwartz

No abstract provided.


Privacy And The Economics Of Personal Health Care Information, Paul M. Schwartz Dec 2013

Privacy And The Economics Of Personal Health Care Information, Paul M. Schwartz

Paul M. Schwartz

No abstract provided.


Immigration Policing And Federalism Through The Lens Of Technology, Surveillance, And Privacy, Anil Kalhan Nov 2013

Immigration Policing And Federalism Through The Lens Of Technology, Surveillance, And Privacy, Anil Kalhan

Anil Kalhan

With the deployment of technology, federal programs to enlist state and local police assistance with immigration enforcement are undergoing a sea change. For example, even as it forcefully has urged invalidation of Arizona’s S.B. 1070 and similar state laws, the Obama administration has presided over the largest expansion of state and local immigration policing in U.S. history with its implementation of the “Secure Communities” program, which integrates immigration and criminal history database systems in order to automatically ascertain the immigration status of every individual who is arrested and booked by state and local police nationwide. By 2012, over one fifth …


The Right Of Publicity And Autonomous Self-Definition, Mark P. Mckenna Nov 2013

The Right Of Publicity And Autonomous Self-Definition, Mark P. Mckenna

Mark P. McKenna

Legal protection against unauthorized commercial uses of an individual's identity has grown significantly over the last fifty years as it has relentlessly pursued economic value. It was forced to focus on value because a false distinction between the harms suffered by private citizens and celebrities seemingly left celebrities without a privacy claim for commercial use of their identities. But the normative case for awarding individuals the economic value of their identity is weak, since celebrities do not need additional incentive to invest in either their native skill or in developing a persona. Still, while the prevailing justification is inadequate, as …


Revisiting The American Action For Public Disclosure Of Facts, Brian C. Murchison Nov 2013

Revisiting The American Action For Public Disclosure Of Facts, Brian C. Murchison

Brian C. Murchison

None available.


Chasing Bits Across Borders, Patricia L. Bellia Oct 2013

Chasing Bits Across Borders, Patricia L. Bellia

Patricia L. Bellia

As computer crime becomes more widespread, countries increasingly confront difficulties in securing evidence stored in electronic form outside of their borders. These difficulties have prompted two related responses. Some states have asserted a broad power to conduct remote cross-border searches - that is, to use computers within their territory to access and examine data physically stored outside of their territory. Other states have pressed for recognition of a remote cross-border search power in international fora, arguing that such a power is an essential weapon in efforts to combat computer crime. This Article explores these state responses and develops a framework …


Surveillance Law Through Cyberlaw's Lens, Patricia L. Bellia Oct 2013

Surveillance Law Through Cyberlaw's Lens, Patricia L. Bellia

Patricia L. Bellia

The continuing controversy over the surveillance-related provisions of the USA Patriot Act highlights the depth of Americans' concern about internet privacy. Although calls to limit the government's surveillance powers strike a chord with the public, the legal framework governing surveillance activities is highly technical and poorly understood. The Patriot Act's sunset date provides Congress with an opportunity to revisit that framework.

This Article seeks to contribute to the debate over the appropriate scope of internet surveillance in two ways. First, the Article explores the intricacies of the constitutional and statutory frameworks governing electronic surveillance, and particularly surveillance to acquire electronic …


Federalization In Information Privacy Law, Patricia L. Bellia Oct 2013

Federalization In Information Privacy Law, Patricia L. Bellia

Patricia L. Bellia

In Preemption and Privacy, Professor Paul Schwartz argues that it would be unwise for Congress to adopt a unitary federal information privacy statute that both eliminates the sector-specific distinctions in federal information privacy law and blocks the development of stronger state regulation. That conclusion, though narrow, rests on descriptive and normative claims with broad implications for the state-federal balance in information privacy law. Descriptively, Professor Schwartz sees the current information privacy law landscape as the product of successful experimentation at the state level. That account, in turn, fuels his normative claims, and in particular his sympathy with theories of competitive …


Spyware And The Limits Of Surveillance Law, Patricia L. Bellia Oct 2013

Spyware And The Limits Of Surveillance Law, Patricia L. Bellia

Patricia L. Bellia

For policymakers, litigants, and commentators seeking to address the threats digital technology poses for privacy, electronic surveillance law remains a weapon of choice. The debate over how best to respond to the spyware problem provides only the most recent illustration of that fact. Although there is much controversy over how to define spyware, that label encompasses at least some software that monitors a computer user's electronic communications. Federal surveillance statutes thus present an intuitive fit for responding to the regulatory challenges of spyware, because those statutes bar the unauthorized acquisition of electronic communications and related data in some circumstances. Indeed, …


Fourth Amendment Protection For Stored E-Mail, Patricia L. Bellia, Susan Freiwald Oct 2013

Fourth Amendment Protection For Stored E-Mail, Patricia L. Bellia, Susan Freiwald

Patricia L. Bellia

The question of whether and how the Fourth Amendment regulates government access to stored e-mail remains open and pressing. A panel of the Sixth Circuit recently held in Warshak v. United States, 490 F.3d 455 (6th Cir. 2007), that users generally retain a reasonable expectation of privacy in the e-mails they store with their Internet Service Providers (ISPs), which implies that government agents must generally acquire a warrant before they may compel ISPs to disclose their users' stored e-mails. The Sixth Circuit, however, is reconsidering the case en banc. This Article examines the nature of stored e-mail surveillance and argues …


Escape Into The Panopticon: Virtual Worlds And The Surveillance Society, Joshua A.T. Fairfield Oct 2013

Escape Into The Panopticon: Virtual Worlds And The Surveillance Society, Joshua A.T. Fairfield

Joshua A.T. Fairfield

Not available.


"Do-Not-Track" As Contract, Joshua A.T. Fairfield Oct 2013

"Do-Not-Track" As Contract, Joshua A.T. Fairfield

Joshua A.T. Fairfield

Support for enforcement of a do-not-track option in browsers has been gathering steam. Such an option presents a simple method for consumers to protect their privacy. The problem is how to enforce this choice. The Federal Trade Commission (FTC) could enforce a do-not-track option in a consumer browser under its section 5 powers. The FTC, however, currently appears to lack the political will to do so. Moreover, the FTC cannot follow the model of its successful do-not-call list since the majority of Internet service providers (ISPs) assign Internet addresses dynamically — telephone numbers do not change, whereas Internet protocol (IP) …


Navigating Through The Fog Of Cloud Computing Contracts, T. Noble Foster Sep 2013

Navigating Through The Fog Of Cloud Computing Contracts, T. Noble Foster

T. Noble Foster

This paper explores legal issues associated with cloud computing, provides analysis and commentary on typical clauses found in contracts offered by well-known cloud service providers, and identifies strategies to mitigate the risk of exposure to cloud-based legal claims in the critical areas of data security, privacy, and confidentiality. While current research offers numerous case studies, viewpoints, and technical descriptions of cloud processes, our research provides a close examination of the language used in cloud contract terms. Analysis of these contract terms supports the finding that most standard cloud computing contracts are unevenly balanced in favor of the cloud service provider. …


Do-Not-Track As Default, Joshua A.T. Fairfield Sep 2013

Do-Not-Track As Default, Joshua A.T. Fairfield

Joshua A.T. Fairfield

Do-Not-Track is a developing online legal and technological standard that permits consumers to express their desire not to be tracked by online advertisers. Do-Not-Track has the ability to change the relationship between consumers and advertisers in the information market. Everything will depend on implementation. The most effective way to allow users to achieve their privacy preferences is to implement Do-Not-Track as a default feature. The World Wide Web Consortium’s (W3C) standard setting body for Do-Not-Track has, however, endorsed a corrosive standard in its Tracking Preferences Expression (TPE) draft. This standard requires consumers to set their privacy preference by hand. This …


Who Should Be The ‘Decider’ On Keeping Our Secrets?, Stephen E. Henderson Sep 2013

Who Should Be The ‘Decider’ On Keeping Our Secrets?, Stephen E. Henderson

Stephen E Henderson

An invited essay for Constitution Day, also available here: http://blogs.law.widener.edu/constitution2013/2013-essay-authors/stephen-henderson/
It addresses the national security surveillance disclosed by Edward Snowden and others, and asks whether a fundamental shift would be prudent in the era of Big Data.


Cracks In The Foundation: The New Internet Regulation's Hidden Threat To Privacy And Commerce, Joshua A.T. Fairfield Sep 2013

Cracks In The Foundation: The New Internet Regulation's Hidden Threat To Privacy And Commerce, Joshua A.T. Fairfield

Joshua A.T. Fairfield

Scholarship to date has focused on the legal significance of the novelty of the Internet. This scholarship does not describe or predict actual Internet legislation. Instead of asking whether the Internet is so new as to merit new law, legislators and academics should re-evaluate the role of government in orchestrating collective action and change the relative weight of enforcement, deterrence, and incentives in Internet regulations. A perfect example of the need for this new approach is the recent CANSPAM Act of 2003, which was intended to protect personal privacy and legitimate businesses. However, the law threatens both of these interests, …


Fighting Cybercrime After United States V. Jones, David C. Gray, Danielle Keats Citron, Liz Clark Rinehart Aug 2013

Fighting Cybercrime After United States V. Jones, David C. Gray, Danielle Keats Citron, Liz Clark Rinehart

David C. Gray

In a landmark non-decision last term, five Justices of the United States Supreme Court would have held that citizens possess a Fourth Amendment right to expect that certain quantities of information about them will remain private, even if they have no such expectations with respect to any of the information or data constituting that whole. This quantitative approach to evaluating and protecting Fourth Amendment rights is certainly novel and raises serious conceptual, doctrinal, and practical challenges. In other works, we have met these challenges by engaging in a careful analysis of this “mosaic theory” and by proposing that courts focus …


Fighting Cybercrime After United States V. Jones, David C. Gray, Danielle Keats Citron, Liz Clark Rinehart Aug 2013

Fighting Cybercrime After United States V. Jones, David C. Gray, Danielle Keats Citron, Liz Clark Rinehart

Danielle Keats Citron

In a landmark non-decision last term, five Justices of the United States Supreme Court would have held that citizens possess a Fourth Amendment right to expect that certain quantities of information about them will remain private, even if they have no such expectations with respect to any of the information or data constituting that whole. This quantitative approach to evaluating and protecting Fourth Amendment rights is certainly novel and raises serious conceptual, doctrinal, and practical challenges. In other works, we have met these challenges by engaging in a careful analysis of this “mosaic theory” and by proposing that courts focus …


William H. Sorrell, Attorney General Of Vermont, Et Al. V. Ims Health Inc., Et Al. - Amicus Brief In Support Of Petitioners, Kevin Outterson, David Orentlicher, Christopher Robertson, Frank Pasquale Aug 2013

William H. Sorrell, Attorney General Of Vermont, Et Al. V. Ims Health Inc., Et Al. - Amicus Brief In Support Of Petitioners, Kevin Outterson, David Orentlicher, Christopher Robertson, Frank Pasquale

Frank A. Pasquale

On April 26, 2011, the US Supreme Court will hear oral arguments in the Vermont data mining case, Sorrell v. IMS Health Inc. Respondents claim this is the most important commercial speech case in a decade. Petitioner (the State of Vermont) argues this is the most important medical privacy case since Whalen v. Roe. The is an amicus brief supporting Vermont, written by law professors and submitted on behalf of the New England Journal of Medicine


Privacy, Antitrust, And Power, Frank Pasquale Aug 2013

Privacy, Antitrust, And Power, Frank Pasquale

Frank A. Pasquale

When a dominant internet service collects information about its users, the situation is so far from the usual arm’s-length market transaction that neoclassical economic analysis is misleading. “Lack of surveillance” is not a product that individuals have varying preferences for and purchase accordingly. Rather, surveillance is an inevitable concomitant of life online. We need to tame the power that surveillance entails, rather than continuing to pursue illusory, surveillance-free alternatives on the platform level. To the extent a company creates profiles of individuals and collects data on them, a third party ought to be collecting reports from the company on how …


Federal Search Commission? Access, Fairness, And Accountability In The Law Of Search, Oren Bracha, Frank Pasquale Aug 2013

Federal Search Commission? Access, Fairness, And Accountability In The Law Of Search, Oren Bracha, Frank Pasquale

Frank A. Pasquale

Should search engines be subject to the types of regulation now applied to personal data collectors, cable networks, or phone books? In this article, we make the case for some regulation of the ability of search engines to manipulate and structure their results. We demonstrate that the First Amendment, properly understood, does not prohibit such regulation. Nor will such interventions inevitably lead to the disclosure of important trade secrets. After setting forth normative foundations for evaluating search engine manipulation, we explain how neither market discipline nor technological advance is likely to stop it. Though savvy users and personalized search may …


Beyond Innovation And Competition: The Need For Qualified Transparency In Internet Intermediaries, Frank Pasquale Aug 2013

Beyond Innovation And Competition: The Need For Qualified Transparency In Internet Intermediaries, Frank Pasquale

Frank A. Pasquale

Internet service providers and search engines have mapped the web, accelerated e-commerce, and empowered new communities. They also pose new challenges for law. Individuals are rapidly losing the ability to affect their own image on the web - or even to know what data are presented about them. When web users attempt to find information or entertainment, they have little assurance that a carrier or search engine is not biasing the presentation of results in accordance with its own commercial interests. Technology’s impact on privacy and democratic culture needs to be at the center of internet policy-making. Yet before they …


Finding Privacy In A Sea Of Social Media And Other E-Discovery, Allyson Haynes Stuart Aug 2013

Finding Privacy In A Sea Of Social Media And Other E-Discovery, Allyson Haynes Stuart

Allyson Haynes Stuart

This article looks at the case law governing discovery of social media, and finds several problems. First, many courts are improperly requiring a threshold showing that relevant information exists in public portions of the user’s social media account before allowing such discovery. Second, they allow overbroad discovery, often requiring a litigant to turn over its username and password to the other party. At the same time, parties are seeking such information directly from social media sites, attempting an end-run around the relevancy requirement and increasing motion practice. The article argues that, instead, social media discovery should be treated like other …


Addressing The Harm Of Total Surveillance: A Reply To Professor Neil Richards, Danielle Citron, David Gray Jun 2013

Addressing The Harm Of Total Surveillance: A Reply To Professor Neil Richards, Danielle Citron, David Gray

David C. Gray

In his insightful article The Dangers of Surveillance, 126 HARV. L. REV. 1934 (2013), Neil Richards offers a framework for evaluating the implications of government surveillance programs that is centered on protecting "intellectual privacy." Although we share his interest in recognizing and protecting privacy as a condition of personal and intellectual development, we worry in this essay that, as an organizing principle for policy, "intellectual privacy" is too narrow and politically fraught. Drawing on other work, we therefore recommend that judges, legislators, and executives focus instead on limiting the potential of surveillance technologies to effect programs of broad and indiscriminate …


Addressing The Harm Of Total Surveillance: A Reply To Professor Neil Richards, Danielle Keats Citron, David C. Gray Jun 2013

Addressing The Harm Of Total Surveillance: A Reply To Professor Neil Richards, Danielle Keats Citron, David C. Gray

Danielle Keats Citron

In his insightful article The Dangers of Surveillance, 126 HARV. L. REV. 1934 (2013), Neil Richards offers a framework for evaluating the implications of government surveillance programs that is centered on protecting "intellectual privacy." Although we share his interest in recognizing and protecting privacy as a condition of personal and intellectual development, we worry in this essay that, as an organizing principle for policy, "intellectual privacy" is too narrow and politically fraught. Drawing on other work, we therefore recommend that judges, legislators, and executives focus instead on limiting the potential of surveillance technologies to effect programs of broad and indiscriminate …


Guest View: In Defense Of Student Privacy, Richard J. Peltz-Steele Jun 2013

Guest View: In Defense Of Student Privacy, Richard J. Peltz-Steele

Richard J. Peltz-Steele

Privacy is another American value we rush to sacrifice on the altar of accountability. In Ohio, reporters swarm the yards of liberated kidnapping victims. And in Massachusetts, news trucks besiege the campus at UMass Dartmouth, where I work, and where marathon bombing suspect Dzhokhar Tsarnaev was a student. Media want to know everything about Tsarnaev and his college friends. The university, bound by federal privacy law, has refused access to student academic and financial aid records.


Has Skinner Killed The Katz? Are Society's Expectations Of Privacy Reasonable In Today's Techological World?, Jason Forcier Apr 2013

Has Skinner Killed The Katz? Are Society's Expectations Of Privacy Reasonable In Today's Techological World?, Jason Forcier

Jason Forcier

The right to privacy has and will remain a hotly contested debate about American liberties. In 2012, a 3-0 decision by the Sixth Circuit Court of Appeals, in United States v. Melvin Skinner, the court held that there is no “reasonable expectation of privacy in the data given off by. . . cellphone[s].” Given today’s explosion of cellular technology and use of smart phones, is it unreasonable to believe a person should remain secure in their "person" and “effects," as guaranteed under the Fourth Amendment, from unreasonable searches and seizures? Furthermore, with police requiring only a subpoena to a obtain …


The Relational Nature Of Privacy, Laurent Sacharoff Jan 2013

The Relational Nature Of Privacy, Laurent Sacharoff

Laurent Sacharoff

The hard Fourth Amendment cases, especially those involving surveillance, ask whether the police investigative tactic at issue counts as a “search”; if not, the Fourth Amendment does not apply at all. Under the Court’s main test, at least for surveillance without a trespass, the police conduct a “search” if they invade a person’s reasonable expectation of privacy.

But when the Court assesses Fourth Amendment privacy, it treats it as an all-or-nothing concept without regard to the relation between the person searched and the person searching. For example, the Court has held that when the police rummage through a person’s garbage …