Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Privacy

2013

Discipline
Institution
Publication
Publication Type
File Type

Articles 121 - 150 of 150

Full-Text Articles in Law

Defining Privacy And Utility In Data Sets, Felix T. Wu Jan 2013

Defining Privacy And Utility In Data Sets, Felix T. Wu

University of Colorado Law Review

Is it possible to release useful data while preserving the privacy of the individuals whose information is in the database? This question has been the subject of considerable controversy, particularly in the wake of well-publicized instances in which researchers showed how to re-identify individuals in supposedly anonymous data. Some have argued that privacy and utility are fundamentally incompatible, while others have suggested that simple steps can be taken to achieve both simultaneously. Both sides have looked to the computer science literature for support. What the existing debate has overlooked, however, is that the relationship between privacy and utility depends crucially …


Real Masks And Real Name Policies: Applying Anti-Mask Case Law To Anonymous Online Speech, Margot E. Kaminski Jan 2013

Real Masks And Real Name Policies: Applying Anti-Mask Case Law To Anonymous Online Speech, Margot E. Kaminski

Publications

The First Amendment protects anonymous speech, but the scope of that protection has been the subject of much debate. This Article adds to the discussion of anonymous speech by examining anti-mask statutes and cases as an analogue for the regulation of anonymous speech online. Anti-mask case law answers a number of questions left open by the Supreme Court. It shows that courts have used the First Amendment to protect anonymity beyond core political speech, when mask-wearing is expressive conduct or shows a nexus with free expression. This Article explores what the anti-mask cases teach us about anonymity online, including proposed …


Commentary, Critical Legal Theory In Intellectual Property And Information Law Scholarship, Cardozo Arts & Entertainment Law Journal Spring Symposium, Sonia K. Katyal, Peter Goodrich Jan 2013

Commentary, Critical Legal Theory In Intellectual Property And Information Law Scholarship, Cardozo Arts & Entertainment Law Journal Spring Symposium, Sonia K. Katyal, Peter Goodrich

Faculty Scholarship

The very definition and scope of CLS (critical legal studies) is itself subject to debate. Some scholars characterize CLS as scholarship that employs a particular methodology—more of a “means” than an “end.” On the other hand, some scholars contend that CLS scholarship demonstrates a collective commitment to a political end goal—an emancipation of sorts —through the identification of, and resistance to, exploitative power structures that are reinforced through law and legal institutions. After a brief golden age, CLS scholarship was infamously marginalized in legal academia and its sub-disciplines. But CLS themes now appear to be making a resurgence—at least in …


Privacy Law: Positive Theory And Normative Practice, Anita L. Allen Jan 2013

Privacy Law: Positive Theory And Normative Practice, Anita L. Allen

All Faculty Scholarship

No abstract provided.


The Fight To Frame Privacy, Woodrow Hartzog Jan 2013

The Fight To Frame Privacy, Woodrow Hartzog

Faculty Scholarship

The resolution of a debate often hinges on how the problem being debated is presented. In psychology and related disciplines, this method of issue presentation is known as framing. Framing theory holds that even small changes in the presentation of an issue or event can produce significant changes of opinion. Framing has become increasingly important in discussions about privacy and security. In his new book, "Nothing to Hide: The False Tradeoff Between Privacy and Security," Daniel Solove argues that if we continue to view privacy and security as diametrically opposed to each other, privacy will always lose. Solove argues that …


Katz On A Hot Tin Roof: Saving The Fourth Amendment From Commercial Conditioning By Reviving Voluntariness In Disclosures To Third Parties, Mary Graw Leary Jan 2013

Katz On A Hot Tin Roof: Saving The Fourth Amendment From Commercial Conditioning By Reviving Voluntariness In Disclosures To Third Parties, Mary Graw Leary

Scholarly Articles

In a world in which Americans are tracked on the Internet, tracked through their cell phones, tracked through the apps they purchase, and monitored by hundreds of traffic cameras, privacy is quickly becoming nothing more than a quaint vestige of the past.

In a previous article discussing the intersection of technology and the Fourth Amendment, I proposed reframing the issue away from conventional commentary. The Missed Opportunity of United States v. Jones: Commercial Erosion of Fourth Amendment Protection in a Post-Google Earth World, 15 PENN. J. CON. L. 331, 333 (2012). That article posits that society has reached the point …


Durkheim's Internet: Social And Political Theory In Online Society, Ari Ezra Waldman Jan 2013

Durkheim's Internet: Social And Political Theory In Online Society, Ari Ezra Waldman

Articles & Chapters

While the Internet has changed dramatically since the early 1990s, the legal regime governing the right to privacy online and Internet speech is still steeped in a myth of the Internet user, completely hidden from others, in total control of his online experience, and free to come and go as he pleases. This false image of the “virtual self” has also contributed to an ethos of lawlessness, irresponsibility, and radical individuation online, allowing the evisceration of online privacy and the proliferation of hate and harassment.

I argue that the myth of the online anonym is not only false as a …


Fighting Cybercrime After United States V. Jones, David C. Gray, Danielle Keats Citron, Liz Clark Rinehart Jan 2013

Fighting Cybercrime After United States V. Jones, David C. Gray, Danielle Keats Citron, Liz Clark Rinehart

Faculty Scholarship

In a landmark non-decision last term, five Justices of the United States Supreme Court would have held that citizens possess a Fourth Amendment right to expect that certain quantities of information about them will remain private, even if they have no such expectations with respect to any of the information or data constituting that whole. This quantitative approach to evaluating and protecting Fourth Amendment rights is certainly novel and raises serious conceptual, doctrinal, and practical challenges. In other works, we have met these challenges by engaging in a careful analysis of this “mosaic theory” and by proposing that courts focus …


Hipaa Turns 10: Analyzing The Past, Present, And Future Impact, Daniel J. Solove Jan 2013

Hipaa Turns 10: Analyzing The Past, Present, And Future Impact, Daniel J. Solove

GW Law Faculty Publications & Other Works

This essay, written in a journalistic style, examines HIPAA over the past decade. The essay discusses the creation of HIPAA, the evolution of HHS enforcement, the impact of the HITECH Act, and the overall influence and effect of HIPAA on healthcare providers and organizations using medical data. Professor Solove combines analysis with interviews of key regulators and practitioners.


An Ethical Duty To Protect One’S Own Information Privacy?, Anita L. Allen Jan 2013

An Ethical Duty To Protect One’S Own Information Privacy?, Anita L. Allen

All Faculty Scholarship

People freely disclose vast quantities of personal and personally identifiable information. The central question of this Meador Lecture in Morality is whether they have a moral (or ethical) obligation (or duty) to withhold information about themselves or otherwise to protect information about themselves from disclosure. Moreover, could protecting one’s own information privacy be called for by important moral virtues, as well as obligations or duties? Safeguarding others’ privacy is widely understood to be a responsibility of government, business, and individuals. The “virtue” of fairness and the “duty” or “obligation” of respect for persons arguably ground other-regarding responsibilities of confidentiality and …


Preserving Privacy In A Digital Age: Lessons Of Comparative Constitutionalism, David Cole Jan 2013

Preserving Privacy In A Digital Age: Lessons Of Comparative Constitutionalism, David Cole

Georgetown Law Faculty Publications and Other Works

In the modern age, we increasingly live our lives through, and accompanied by, digital media. Virtually every transaction or communication that uses such media, as well as every move of mobile phone owners, is recorded. Computers are able to store, transmit, and analyze the data as never before, drawing on multiple sources to construct an intimate picture of our interests, contacts, travels and desires. Private data-mining services, most often used for commercial advertising purposes, can determine: what we read, listen to, and look at; where we travel to, shop, and dine; and with whom we speak or associate. Meanwhile, social …


Privacy Self-Management And The Consent Dilemma, Daniel J. Solove Jan 2013

Privacy Self-Management And The Consent Dilemma, Daniel J. Solove

GW Law Faculty Publications & Other Works

The current regulatory approach for protecting privacy involves what I refer to as “privacy self-management” — the law provides people with a set of rights to enable them to decide how to weigh the costs and benefits of the collection, use, or disclosure of their information. People’s consent legitimizes nearly any form of collection, use, and disclosure of personal data.

Although privacy self-management is certainly a necessary component of any regulatory regime, I contend in this Article that it is being asked to do work beyond its capabilities. Privacy self-management does not provide meaningful control. Empirical and social science research …


Reconciling Personal Information In The United States And European Union, Daniel J. Solove, Paul M. Schwartz Jan 2013

Reconciling Personal Information In The United States And European Union, Daniel J. Solove, Paul M. Schwartz

GW Law Faculty Publications & Other Works

US and EU privacy law diverge greatly. At the foundational level, they diverge in their underlying philosophy: In the US, privacy law focuses on redressing consumer harm and balancing privacy with efficient commercial transactions. In the EU, privacy is hailed as a fundamental right that trumps other interests. Even at the threshold level - determining what information is covered by the regulation - the US and EU differ significantly. The existence of personal information - commonly referred to as “personally identifiable information” (PII) - is the trigger for when privacy laws apply. PII is defined quite differently in US and …


Employment Law And Social Equality, Samuel R. Bagenstos Jan 2013

Employment Law And Social Equality, Samuel R. Bagenstos

Michigan Law Review

What is the normative justification for individual employment law? For a number of legal scholars, the answer is economic efficiency. Other scholars argue, to the contrary, that employment law protects against (vaguely defined) imbalances of bargaining power and exploitation. Against both of these positions, this Article argues that individual employment law is best understood as advancing a particular conception of equality. That conception, which many legal and political theorists have called social equality, focuses on eliminating hierarchies of social status. This Article argues that individual employment law, like employment discrimination law, is justified as preventing employers from contributing to or …


The Fourth Amendment In The Information Age, Ricardo J. Bascuas Jan 2013

The Fourth Amendment In The Information Age, Ricardo J. Bascuas

Articles

In 2013, the Supreme Court tacitly conceded that the expectations-of-privacy test used since 1967 to assess claims of Fourth Amendment violations was inadequate. It asserted that the previous property-based test for Fourth Amendment violations had never despite widespread agreement to the contrary been overruled. The Court compounded its artfulness by applying a new, significantly weaker trespass test that, like the expectations-of-privacy test, enjoys no legal pedigree. This new trespass test, which is to be applied together with the expectations-of-privacy test, suffers from the same defect as the test it purportedly supplements. It does not require the government to respect private …


Obscurity By Design, Woodrow Hartzog, Frederic D. Stutzman Jan 2013

Obscurity By Design, Woodrow Hartzog, Frederic D. Stutzman

Faculty Scholarship

Design-based solutions to confront technological privacy threats are becoming popular with regulators. However, these promising solutions have left the full potential of design untapped. With respect to online communication technologies, design-based solutions for privacy remain incomplete because they have yet to successfully address the trickiest aspect of the Internet — social interaction. This Article posits that privacy-protection strategies such as “Privacy by Design” face unique challenges with regard to social software and social technology due to their interactional nature.

This Article proposes that design-based solutions for social technologies benefit from increased attention to user interaction, with a focus on the …


The Case For Online Obscurity, Woodrow Hartzog, Frederic Stutzman Jan 2013

The Case For Online Obscurity, Woodrow Hartzog, Frederic Stutzman

Faculty Scholarship

On the Internet, obscure information has a minimal risk of being discovered or understood by unintended recipients. Empirical research demonstrates that Internet users rely on obscurity perhaps more than anything else to protect their privacy. Yet, online obscurity has been largely ignored by courts and lawmakers. In this Article, we argue that obscurity is a critical component of online privacy, but it has not been embraced by courts and lawmakers because it has never been adequately defined or conceptualized. This lack of definition has resulted in the concept of online obscurity being too insubstantial to serve as a helpful guide …


Big Data In Small Hands, Woodrow Hartzog, Evan Selinger Jan 2013

Big Data In Small Hands, Woodrow Hartzog, Evan Selinger

Faculty Scholarship

"Big data" can be defined as a problem-solving philosophy that leverages massive data-sets and algorithmic analysis to extract "hidden information and surprising correlations." Not only does big data pose a threat to traditional notions of privacy, but it also compromises socially shared information. This point remains under appreciated because our so-called public disclosures are not nearly as public as courts and policymakers have argued — at least, not yet. That is subject to change once big data becomes user friendly.

Most social disclosures and details of our everyday lives are meant to be known only to a select group of …


Social Data, Woodrow Hartzog Jan 2013

Social Data, Woodrow Hartzog

Faculty Scholarship

As online social media grow, it is increasingly important to distinguish between the different threats to privacy that arise from the conversion of our social interactions into data. One well-recognized threat is from the robust concentrations of electronic information aggregated into colossal databases. Yet much of this same information is also consumed socially and dispersed through a user interface to hundreds, if not thousands, of peer users.

In order to distinguish relationally shared information from the threat of the electronic database, this essay identifies the massive amounts of personal information shared via the user interface of social technologies as “social …


The Davis Good Faith Rule And Getting Answers To The Questions Jones Left Open, Susan Freiwald Dec 2012

The Davis Good Faith Rule And Getting Answers To The Questions Jones Left Open, Susan Freiwald

Susan Freiwald

The Supreme Court’s decision in United States v. Jones clearly established that use of GPS tracking surveillance constitutes a search under the Fourth Amendment. But the Court left many other questions unanswered about the nature and scope of the constitutional privacy right in location data. A review of lower court decisions in the wake of Jones reveals that, rather than begin to answer the questions that Jones left open, courts are largely avoiding substantive Fourth Amendment analysis of location data privacy. Instead, they are finding that officers who engaged in GPS tracking and related surveillance operated in good faith, based …


Workplace Data: Law & Litigation (With 2014 Supplement), Robert Sprague Dec 2012

Workplace Data: Law & Litigation (With 2014 Supplement), Robert Sprague

Robert Sprague

Workplace Data: Law and Litigation provides an overview of legal issues associated with employment-related electronically stored information (ESI), focusing on discovery issues in particular. Written for employment and labor law practitioners, this new treatise offers a comprehensive overview of today’s discovery challenges, a detailed statute-by-statute analysis of data retention requirements in federal workplace-related laws, a summary of emerging workplace social media and other technology-related issues and a guide to data protection privacy laws in North America, Europe, Asia and Oceania.


In Quest Of The Arbitration Trifecta, Or Closed Door Litigation?: The Delaware Arbitration Program, Thomas Stipanowich Dec 2012

In Quest Of The Arbitration Trifecta, Or Closed Door Litigation?: The Delaware Arbitration Program, Thomas Stipanowich

Thomas J. Stipanowich

The Delaware Arbitration Program established a procedure by which businesses can agree to have their disputes heard in an arbitration proceeding before a sitting judge of the state’s highly regarded Chancery Court. The Program arguably offers a veritable trifecta of procedural advantages for commercial parties, including expert adjudication, efficient case management and short cycle time and, above all, a proceeding cloaked in secrecy. It also may enhance the reputation of Delaware as the forum of choice for businesses. But the Program’s ambitious intermingling of public and private forums brings into play the longstanding tug-of-war between the traditional view of court …


Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke Dec 2012

Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke

Professor Katina Michael

During the last decade, location-tracking and monitoring applications have proliferated, in mobile cellular and wireless data networks, and through self-reporting by applications running in smartphones that are equipped with onboard global positioning system (GPS) chipsets. It is now possible to locate a smartphone-user's location not merely to a cell, but to a small area within it. Innovators have been quick to capitalise on these location-based technologies for commercial purposes, and have gained access to a great deal of sensitive personal data in the process. In addition, law enforcement utilise these technologies, can do so inexpensively and hence can track many …


Towards A Conceptual Model Of User Acceptance Of Location-Based Emergency Services, Anas Aloudat, Katina Michael Dec 2012

Towards A Conceptual Model Of User Acceptance Of Location-Based Emergency Services, Anas Aloudat, Katina Michael

Professor Katina Michael

This paper investigates the introduction of location-based services by government as part of an all-hazards approach to modern emergency management solutions. Its main contribution is in exploring the determinants of an individual’s acceptance or rejection of location services. The authors put forward a conceptual model to better predict why an individual would accept or reject such services, especially with respect to emergencies. While it may be posited by government agencies that individuals would unanimously wish to accept life-saving and life-sustaining location services for their well-being, this view remains untested. The theorised determinants include: visibility of the service solution, perceived service …


Intellectual Property And Public Health – A White Paper, Ryan G. Vacca, Jim Chen, Jay Dratler Jr., Tom Folsom, Timothy Hall, Yaniv Heled, Frank Pasquale, Elizabeth Reilly, Jeff Samuels, Kathy Strandburg, Kara Swanson, Andrew Torrance, Katharine Van Tassel Dec 2012

Intellectual Property And Public Health – A White Paper, Ryan G. Vacca, Jim Chen, Jay Dratler Jr., Tom Folsom, Timothy Hall, Yaniv Heled, Frank Pasquale, Elizabeth Reilly, Jeff Samuels, Kathy Strandburg, Kara Swanson, Andrew Torrance, Katharine Van Tassel

Frank A. Pasquale

On October 26, 2012, the University of Akron School of Law’s Center for Intellectual Property and Technology hosted its Sixth Annual IP Scholars Forum. In attendance were thirteen legal scholars with expertise and an interest in IP and public health who met to discuss problems and potential solutions at the intersection of these fields. This report summarizes this discussion by describing the problems raised, areas of agreement and disagreement between the participants, suggestions and solutions made by participants and the subsequent evaluations of these suggestions and solutions.

Led by the moderator, participants at the Forum focused generally on three broad …


When The Need To Know Outweighs Privacy: Granting Access To Child Welfare Records In The 50 States, Courtney Barclay Dec 2012

When The Need To Know Outweighs Privacy: Granting Access To Child Welfare Records In The 50 States, Courtney Barclay

Courtney Barclay

In 2013, the Kansas City Star, reported that, despite thirteen years of transparency under a records disclosure law, the Missouri Department of Social Services initially declined to requests for information regarding three tragic cases of child abuse in 2012, including one fatality. The state disclosure law permits the director of DSS to release information in these kinds of cases. Yet, the Department refused to release records, citing the need to avoid “hinder[ing] the criminal justice system.” This refusal to provide information seemed contrary to more than a decade of policy since the passage of the Missouri disclosure law in 2000 …


Snopa And The Ppa_ Do You Know What It Means For You, Angela Goodrum Dec 2012

Snopa And The Ppa_ Do You Know What It Means For You, Angela Goodrum

Angela Goodrum

No abstract provided.


Intellectual Property And Public Health – A White Paper, Ryan G. Vacca, Jim Chen, Jay Dratler Jr., Tom Folsom, Timothy Hall, Yaniv Heled, Frank Pasquale, Elizabeth Reilly, Jeff Samuels, Kathy Strandburg, Kara Swanson, Andrew Torrance, Katharine Van Tassel Dec 2012

Intellectual Property And Public Health – A White Paper, Ryan G. Vacca, Jim Chen, Jay Dratler Jr., Tom Folsom, Timothy Hall, Yaniv Heled, Frank Pasquale, Elizabeth Reilly, Jeff Samuels, Kathy Strandburg, Kara Swanson, Andrew Torrance, Katharine Van Tassel

Katharine Van Tassel

On October 26, 2012, the University of Akron School of Law’s Center for Intellectual Property and Technology hosted its Sixth Annual IP Scholars Forum. In attendance were thirteen legal scholars with expertise and an interest in IP and public health who met to discuss problems and potential solutions at the intersection of these fields. This report summarizes this discussion by describing the problems raised, areas of agreement and disagreement between the participants, suggestions and solutions made by participants and the subsequent evaluations of these suggestions and solutions.

Led by the moderator, participants at the Forum focused generally on three broad …


American Bar Association Criminal Justice Standards On Law Enforcement Access To Third Party Records, Stephen E. Henderson Dec 2012

American Bar Association Criminal Justice Standards On Law Enforcement Access To Third Party Records, Stephen E. Henderson

Stephen E Henderson

Drafted over the past six years and adopted by the American Bar Association (ABA) House of Delegates in February, 2012, these Criminal Justice Standards on Law Enforcement Access to Third Party Records provide much needed guidance to legislatures, courts, and administrative agencies having to decide how to regulate law enforcement access to existing records in the hands of third parties. It is the first framework of its kind, and it can do much to improve the current system of ad hoc protections in both state and federal systems. Decision makers are struggling to determine when to permit law enforcement access …


Intellectual Property And Public Health – A White Paper, Ryan G. Vacca, Jim Chen, Jay Dratler Jr., Tom Folsom, Timothy Hall, Yaniv Heled, Frank Pasquale, Elizabeth Reilly, Jeff Samuels, Kathy Strandburg, Kara Swanson, Andrew Torrance, Katharine Van Tassel Dec 2012

Intellectual Property And Public Health – A White Paper, Ryan G. Vacca, Jim Chen, Jay Dratler Jr., Tom Folsom, Timothy Hall, Yaniv Heled, Frank Pasquale, Elizabeth Reilly, Jeff Samuels, Kathy Strandburg, Kara Swanson, Andrew Torrance, Katharine Van Tassel

Yaniv Heled

On October 26, 2012, the University of Akron School of Law’s Center for Intellectual Property and Technology hosted its Sixth Annual IP Scholars Forum. In attendance were thirteen legal scholars with expertise and an interest in IP and public health who met to discuss problems and potential solutions at the intersection of these fields. This report summarizes this discussion by describing the problems raised, areas of agreement and disagreement between the participants, suggestions and solutions made by participants and the subsequent evaluations of these suggestions and solutions.

Led by the moderator, participants at the Forum focused generally on three broad …