Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Privacy Law (49)
- Internet Law (34)
- Fourth Amendment (23)
- Constitutional Law (19)
- Intellectual Property Law (18)
-
- Science and Technology Law (16)
- Computer Law (15)
- Law and Society (15)
- Criminal Procedure (13)
- Criminal Law (12)
- Health Law and Policy (12)
- Civil Rights and Discrimination (10)
- First Amendment (9)
- Labor and Employment Law (9)
- Social and Behavioral Sciences (9)
- National Security Law (8)
- Administrative Law (6)
- Evidence (6)
- International Law (6)
- Jurisprudence (6)
- Medicine and Health Sciences (6)
- Public Health (6)
- Computer Sciences (5)
- International Public Health (5)
- Legislation (5)
- Other Public Health (5)
- Physical Sciences and Mathematics (5)
- Arts and Humanities (4)
- Business (4)
- Institution
-
- Selected Works (41)
- Pepperdine University (12)
- SelectedWorks (12)
- American University Washington College of Law (10)
- University of Maryland Francis King Carey School of Law (7)
-
- Boston University School of Law (6)
- University of Michigan Law School (6)
- Fordham Law School (5)
- University of Massachusetts School of Law (4)
- George Washington University Law School (3)
- Maurer School of Law: Indiana University (3)
- University of Miami Law School (3)
- University of South Carolina (3)
- Georgetown University Law Center (2)
- Northern Illinois University (2)
- Penn State Law (2)
- Seattle University School of Law (2)
- Touro University Jacob D. Fuchsberg Law Center (2)
- University of Colorado Law School (2)
- University of New Hampshire (2)
- University of Pennsylvania Carey Law School (2)
- University of Wollongong (2)
- Cleveland State University (1)
- Golden Gate University School of Law (1)
- Loyola Marymount University and Loyola Law School (1)
- New York Law School (1)
- Pace University (1)
- Roger Williams University (1)
- SJ Quinney College of Law, University of Utah (1)
- Southern Methodist University (1)
- Publication
-
- Faculty Scholarship (13)
- American University Law Review (8)
- Journal of the National Association of Administrative Law Judiciary (7)
- Faculty Publications (5)
- Frank A. Pasquale (5)
-
- Patricia L. Bellia (5)
- Pepperdine Law Review (5)
- Joshua A.T. Fairfield (4)
- GW Law Faculty Publications & Other Works (3)
- Journal Articles (3)
- Michigan Law Review (3)
- Paul M. Schwartz (3)
- All Faculty Scholarship (2)
- Angela Goodrum (2)
- Articles (2)
- Articles in Law Reviews & Other Academic Journals (2)
- Associate Professor Katina Michael (2)
- Danielle Keats Citron (2)
- David C. Gray (2)
- Fordham Intellectual Property, Media and Entertainment Law Journal (2)
- Georgetown Law Faculty Publications and Other Works (2)
- Indiana Law Journal (2)
- Jonathan I. Ezor (2)
- Law Faculty Scholarship (2)
- Maryland Law Review (2)
- Mireille Hildebrandt (2)
- Northern Illinois University Law Review (2)
- Professor Katina Michael (2)
- Seattle University Law Review (2)
- South Carolina Law Review (2)
- Publication Type
- File Type
Articles 121 - 150 of 150
Full-Text Articles in Law
Defining Privacy And Utility In Data Sets, Felix T. Wu
Defining Privacy And Utility In Data Sets, Felix T. Wu
University of Colorado Law Review
Is it possible to release useful data while preserving the privacy of the individuals whose information is in the database? This question has been the subject of considerable controversy, particularly in the wake of well-publicized instances in which researchers showed how to re-identify individuals in supposedly anonymous data. Some have argued that privacy and utility are fundamentally incompatible, while others have suggested that simple steps can be taken to achieve both simultaneously. Both sides have looked to the computer science literature for support. What the existing debate has overlooked, however, is that the relationship between privacy and utility depends crucially …
Real Masks And Real Name Policies: Applying Anti-Mask Case Law To Anonymous Online Speech, Margot E. Kaminski
Real Masks And Real Name Policies: Applying Anti-Mask Case Law To Anonymous Online Speech, Margot E. Kaminski
Publications
The First Amendment protects anonymous speech, but the scope of that protection has been the subject of much debate. This Article adds to the discussion of anonymous speech by examining anti-mask statutes and cases as an analogue for the regulation of anonymous speech online. Anti-mask case law answers a number of questions left open by the Supreme Court. It shows that courts have used the First Amendment to protect anonymity beyond core political speech, when mask-wearing is expressive conduct or shows a nexus with free expression. This Article explores what the anti-mask cases teach us about anonymity online, including proposed …
Commentary, Critical Legal Theory In Intellectual Property And Information Law Scholarship, Cardozo Arts & Entertainment Law Journal Spring Symposium, Sonia K. Katyal, Peter Goodrich
Commentary, Critical Legal Theory In Intellectual Property And Information Law Scholarship, Cardozo Arts & Entertainment Law Journal Spring Symposium, Sonia K. Katyal, Peter Goodrich
Faculty Scholarship
The very definition and scope of CLS (critical legal studies) is itself subject to debate. Some scholars characterize CLS as scholarship that employs a particular methodology—more of a “means” than an “end.” On the other hand, some scholars contend that CLS scholarship demonstrates a collective commitment to a political end goal—an emancipation of sorts —through the identification of, and resistance to, exploitative power structures that are reinforced through law and legal institutions. After a brief golden age, CLS scholarship was infamously marginalized in legal academia and its sub-disciplines. But CLS themes now appear to be making a resurgence—at least in …
Privacy Law: Positive Theory And Normative Practice, Anita L. Allen
Privacy Law: Positive Theory And Normative Practice, Anita L. Allen
All Faculty Scholarship
No abstract provided.
The Fight To Frame Privacy, Woodrow Hartzog
The Fight To Frame Privacy, Woodrow Hartzog
Faculty Scholarship
The resolution of a debate often hinges on how the problem being debated is presented. In psychology and related disciplines, this method of issue presentation is known as framing. Framing theory holds that even small changes in the presentation of an issue or event can produce significant changes of opinion. Framing has become increasingly important in discussions about privacy and security. In his new book, "Nothing to Hide: The False Tradeoff Between Privacy and Security," Daniel Solove argues that if we continue to view privacy and security as diametrically opposed to each other, privacy will always lose. Solove argues that …
Katz On A Hot Tin Roof: Saving The Fourth Amendment From Commercial Conditioning By Reviving Voluntariness In Disclosures To Third Parties, Mary Graw Leary
Katz On A Hot Tin Roof: Saving The Fourth Amendment From Commercial Conditioning By Reviving Voluntariness In Disclosures To Third Parties, Mary Graw Leary
Scholarly Articles
In a world in which Americans are tracked on the Internet, tracked through their cell phones, tracked through the apps they purchase, and monitored by hundreds of traffic cameras, privacy is quickly becoming nothing more than a quaint vestige of the past.
In a previous article discussing the intersection of technology and the Fourth Amendment, I proposed reframing the issue away from conventional commentary. The Missed Opportunity of United States v. Jones: Commercial Erosion of Fourth Amendment Protection in a Post-Google Earth World, 15 PENN. J. CON. L. 331, 333 (2012). That article posits that society has reached the point …
Durkheim's Internet: Social And Political Theory In Online Society, Ari Ezra Waldman
Durkheim's Internet: Social And Political Theory In Online Society, Ari Ezra Waldman
Articles & Chapters
While the Internet has changed dramatically since the early 1990s, the legal regime governing the right to privacy online and Internet speech is still steeped in a myth of the Internet user, completely hidden from others, in total control of his online experience, and free to come and go as he pleases. This false image of the “virtual self” has also contributed to an ethos of lawlessness, irresponsibility, and radical individuation online, allowing the evisceration of online privacy and the proliferation of hate and harassment.
I argue that the myth of the online anonym is not only false as a …
Fighting Cybercrime After United States V. Jones, David C. Gray, Danielle Keats Citron, Liz Clark Rinehart
Fighting Cybercrime After United States V. Jones, David C. Gray, Danielle Keats Citron, Liz Clark Rinehart
Faculty Scholarship
In a landmark non-decision last term, five Justices of the United States Supreme Court would have held that citizens possess a Fourth Amendment right to expect that certain quantities of information about them will remain private, even if they have no such expectations with respect to any of the information or data constituting that whole. This quantitative approach to evaluating and protecting Fourth Amendment rights is certainly novel and raises serious conceptual, doctrinal, and practical challenges. In other works, we have met these challenges by engaging in a careful analysis of this “mosaic theory” and by proposing that courts focus …
Hipaa Turns 10: Analyzing The Past, Present, And Future Impact, Daniel J. Solove
Hipaa Turns 10: Analyzing The Past, Present, And Future Impact, Daniel J. Solove
GW Law Faculty Publications & Other Works
This essay, written in a journalistic style, examines HIPAA over the past decade. The essay discusses the creation of HIPAA, the evolution of HHS enforcement, the impact of the HITECH Act, and the overall influence and effect of HIPAA on healthcare providers and organizations using medical data. Professor Solove combines analysis with interviews of key regulators and practitioners.
An Ethical Duty To Protect One’S Own Information Privacy?, Anita L. Allen
An Ethical Duty To Protect One’S Own Information Privacy?, Anita L. Allen
All Faculty Scholarship
People freely disclose vast quantities of personal and personally identifiable information. The central question of this Meador Lecture in Morality is whether they have a moral (or ethical) obligation (or duty) to withhold information about themselves or otherwise to protect information about themselves from disclosure. Moreover, could protecting one’s own information privacy be called for by important moral virtues, as well as obligations or duties? Safeguarding others’ privacy is widely understood to be a responsibility of government, business, and individuals. The “virtue” of fairness and the “duty” or “obligation” of respect for persons arguably ground other-regarding responsibilities of confidentiality and …
Preserving Privacy In A Digital Age: Lessons Of Comparative Constitutionalism, David Cole
Preserving Privacy In A Digital Age: Lessons Of Comparative Constitutionalism, David Cole
Georgetown Law Faculty Publications and Other Works
In the modern age, we increasingly live our lives through, and accompanied by, digital media. Virtually every transaction or communication that uses such media, as well as every move of mobile phone owners, is recorded. Computers are able to store, transmit, and analyze the data as never before, drawing on multiple sources to construct an intimate picture of our interests, contacts, travels and desires. Private data-mining services, most often used for commercial advertising purposes, can determine: what we read, listen to, and look at; where we travel to, shop, and dine; and with whom we speak or associate. Meanwhile, social …
Privacy Self-Management And The Consent Dilemma, Daniel J. Solove
Privacy Self-Management And The Consent Dilemma, Daniel J. Solove
GW Law Faculty Publications & Other Works
The current regulatory approach for protecting privacy involves what I refer to as “privacy self-management” — the law provides people with a set of rights to enable them to decide how to weigh the costs and benefits of the collection, use, or disclosure of their information. People’s consent legitimizes nearly any form of collection, use, and disclosure of personal data.
Although privacy self-management is certainly a necessary component of any regulatory regime, I contend in this Article that it is being asked to do work beyond its capabilities. Privacy self-management does not provide meaningful control. Empirical and social science research …
Reconciling Personal Information In The United States And European Union, Daniel J. Solove, Paul M. Schwartz
Reconciling Personal Information In The United States And European Union, Daniel J. Solove, Paul M. Schwartz
GW Law Faculty Publications & Other Works
US and EU privacy law diverge greatly. At the foundational level, they diverge in their underlying philosophy: In the US, privacy law focuses on redressing consumer harm and balancing privacy with efficient commercial transactions. In the EU, privacy is hailed as a fundamental right that trumps other interests. Even at the threshold level - determining what information is covered by the regulation - the US and EU differ significantly. The existence of personal information - commonly referred to as “personally identifiable information” (PII) - is the trigger for when privacy laws apply. PII is defined quite differently in US and …
Employment Law And Social Equality, Samuel R. Bagenstos
Employment Law And Social Equality, Samuel R. Bagenstos
Michigan Law Review
What is the normative justification for individual employment law? For a number of legal scholars, the answer is economic efficiency. Other scholars argue, to the contrary, that employment law protects against (vaguely defined) imbalances of bargaining power and exploitation. Against both of these positions, this Article argues that individual employment law is best understood as advancing a particular conception of equality. That conception, which many legal and political theorists have called social equality, focuses on eliminating hierarchies of social status. This Article argues that individual employment law, like employment discrimination law, is justified as preventing employers from contributing to or …
The Fourth Amendment In The Information Age, Ricardo J. Bascuas
The Fourth Amendment In The Information Age, Ricardo J. Bascuas
Articles
In 2013, the Supreme Court tacitly conceded that the expectations-of-privacy test used since 1967 to assess claims of Fourth Amendment violations was inadequate. It asserted that the previous property-based test for Fourth Amendment violations had never despite widespread agreement to the contrary been overruled. The Court compounded its artfulness by applying a new, significantly weaker trespass test that, like the expectations-of-privacy test, enjoys no legal pedigree. This new trespass test, which is to be applied together with the expectations-of-privacy test, suffers from the same defect as the test it purportedly supplements. It does not require the government to respect private …
Obscurity By Design, Woodrow Hartzog, Frederic D. Stutzman
Obscurity By Design, Woodrow Hartzog, Frederic D. Stutzman
Faculty Scholarship
Design-based solutions to confront technological privacy threats are becoming popular with regulators. However, these promising solutions have left the full potential of design untapped. With respect to online communication technologies, design-based solutions for privacy remain incomplete because they have yet to successfully address the trickiest aspect of the Internet — social interaction. This Article posits that privacy-protection strategies such as “Privacy by Design” face unique challenges with regard to social software and social technology due to their interactional nature.
This Article proposes that design-based solutions for social technologies benefit from increased attention to user interaction, with a focus on the …
The Case For Online Obscurity, Woodrow Hartzog, Frederic Stutzman
The Case For Online Obscurity, Woodrow Hartzog, Frederic Stutzman
Faculty Scholarship
On the Internet, obscure information has a minimal risk of being discovered or understood by unintended recipients. Empirical research demonstrates that Internet users rely on obscurity perhaps more than anything else to protect their privacy. Yet, online obscurity has been largely ignored by courts and lawmakers. In this Article, we argue that obscurity is a critical component of online privacy, but it has not been embraced by courts and lawmakers because it has never been adequately defined or conceptualized. This lack of definition has resulted in the concept of online obscurity being too insubstantial to serve as a helpful guide …
Big Data In Small Hands, Woodrow Hartzog, Evan Selinger
Big Data In Small Hands, Woodrow Hartzog, Evan Selinger
Faculty Scholarship
"Big data" can be defined as a problem-solving philosophy that leverages massive data-sets and algorithmic analysis to extract "hidden information and surprising correlations." Not only does big data pose a threat to traditional notions of privacy, but it also compromises socially shared information. This point remains under appreciated because our so-called public disclosures are not nearly as public as courts and policymakers have argued — at least, not yet. That is subject to change once big data becomes user friendly.
Most social disclosures and details of our everyday lives are meant to be known only to a select group of …
Social Data, Woodrow Hartzog
Social Data, Woodrow Hartzog
Faculty Scholarship
As online social media grow, it is increasingly important to distinguish between the different threats to privacy that arise from the conversion of our social interactions into data. One well-recognized threat is from the robust concentrations of electronic information aggregated into colossal databases. Yet much of this same information is also consumed socially and dispersed through a user interface to hundreds, if not thousands, of peer users.
In order to distinguish relationally shared information from the threat of the electronic database, this essay identifies the massive amounts of personal information shared via the user interface of social technologies as “social …
The Davis Good Faith Rule And Getting Answers To The Questions Jones Left Open, Susan Freiwald
The Davis Good Faith Rule And Getting Answers To The Questions Jones Left Open, Susan Freiwald
Susan Freiwald
The Supreme Court’s decision in United States v. Jones clearly established that use of GPS tracking surveillance constitutes a search under the Fourth Amendment. But the Court left many other questions unanswered about the nature and scope of the constitutional privacy right in location data. A review of lower court decisions in the wake of Jones reveals that, rather than begin to answer the questions that Jones left open, courts are largely avoiding substantive Fourth Amendment analysis of location data privacy. Instead, they are finding that officers who engaged in GPS tracking and related surveillance operated in good faith, based …
Workplace Data: Law & Litigation (With 2014 Supplement), Robert Sprague
Workplace Data: Law & Litigation (With 2014 Supplement), Robert Sprague
Robert Sprague
Workplace Data: Law and Litigation provides an overview of legal issues associated with employment-related electronically stored information (ESI), focusing on discovery issues in particular. Written for employment and labor law practitioners, this new treatise offers a comprehensive overview of today’s discovery challenges, a detailed statute-by-statute analysis of data retention requirements in federal workplace-related laws, a summary of emerging workplace social media and other technology-related issues and a guide to data protection privacy laws in North America, Europe, Asia and Oceania.
In Quest Of The Arbitration Trifecta, Or Closed Door Litigation?: The Delaware Arbitration Program, Thomas Stipanowich
In Quest Of The Arbitration Trifecta, Or Closed Door Litigation?: The Delaware Arbitration Program, Thomas Stipanowich
Thomas J. Stipanowich
The Delaware Arbitration Program established a procedure by which businesses can agree to have their disputes heard in an arbitration proceeding before a sitting judge of the state’s highly regarded Chancery Court. The Program arguably offers a veritable trifecta of procedural advantages for commercial parties, including expert adjudication, efficient case management and short cycle time and, above all, a proceeding cloaked in secrecy. It also may enhance the reputation of Delaware as the forum of choice for businesses. But the Program’s ambitious intermingling of public and private forums brings into play the longstanding tug-of-war between the traditional view of court …
Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke
Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke
Professor Katina Michael
During the last decade, location-tracking and monitoring applications have proliferated, in mobile cellular and wireless data networks, and through self-reporting by applications running in smartphones that are equipped with onboard global positioning system (GPS) chipsets. It is now possible to locate a smartphone-user's location not merely to a cell, but to a small area within it. Innovators have been quick to capitalise on these location-based technologies for commercial purposes, and have gained access to a great deal of sensitive personal data in the process. In addition, law enforcement utilise these technologies, can do so inexpensively and hence can track many …
Towards A Conceptual Model Of User Acceptance Of Location-Based Emergency Services, Anas Aloudat, Katina Michael
Towards A Conceptual Model Of User Acceptance Of Location-Based Emergency Services, Anas Aloudat, Katina Michael
Professor Katina Michael
This paper investigates the introduction of location-based services by government as part of an all-hazards approach to modern emergency management solutions. Its main contribution is in exploring the determinants of an individual’s acceptance or rejection of location services. The authors put forward a conceptual model to better predict why an individual would accept or reject such services, especially with respect to emergencies. While it may be posited by government agencies that individuals would unanimously wish to accept life-saving and life-sustaining location services for their well-being, this view remains untested. The theorised determinants include: visibility of the service solution, perceived service …
Intellectual Property And Public Health – A White Paper, Ryan G. Vacca, Jim Chen, Jay Dratler Jr., Tom Folsom, Timothy Hall, Yaniv Heled, Frank Pasquale, Elizabeth Reilly, Jeff Samuels, Kathy Strandburg, Kara Swanson, Andrew Torrance, Katharine Van Tassel
Intellectual Property And Public Health – A White Paper, Ryan G. Vacca, Jim Chen, Jay Dratler Jr., Tom Folsom, Timothy Hall, Yaniv Heled, Frank Pasquale, Elizabeth Reilly, Jeff Samuels, Kathy Strandburg, Kara Swanson, Andrew Torrance, Katharine Van Tassel
Frank A. Pasquale
On October 26, 2012, the University of Akron School of Law’s Center for Intellectual Property and Technology hosted its Sixth Annual IP Scholars Forum. In attendance were thirteen legal scholars with expertise and an interest in IP and public health who met to discuss problems and potential solutions at the intersection of these fields. This report summarizes this discussion by describing the problems raised, areas of agreement and disagreement between the participants, suggestions and solutions made by participants and the subsequent evaluations of these suggestions and solutions.
Led by the moderator, participants at the Forum focused generally on three broad …
When The Need To Know Outweighs Privacy: Granting Access To Child Welfare Records In The 50 States, Courtney Barclay
When The Need To Know Outweighs Privacy: Granting Access To Child Welfare Records In The 50 States, Courtney Barclay
Courtney Barclay
In 2013, the Kansas City Star, reported that, despite thirteen years of transparency under a records disclosure law, the Missouri Department of Social Services initially declined to requests for information regarding three tragic cases of child abuse in 2012, including one fatality. The state disclosure law permits the director of DSS to release information in these kinds of cases. Yet, the Department refused to release records, citing the need to avoid “hinder[ing] the criminal justice system.” This refusal to provide information seemed contrary to more than a decade of policy since the passage of the Missouri disclosure law in 2000 …
Snopa And The Ppa_ Do You Know What It Means For You, Angela Goodrum
Snopa And The Ppa_ Do You Know What It Means For You, Angela Goodrum
Angela Goodrum
No abstract provided.
Intellectual Property And Public Health – A White Paper, Ryan G. Vacca, Jim Chen, Jay Dratler Jr., Tom Folsom, Timothy Hall, Yaniv Heled, Frank Pasquale, Elizabeth Reilly, Jeff Samuels, Kathy Strandburg, Kara Swanson, Andrew Torrance, Katharine Van Tassel
Intellectual Property And Public Health – A White Paper, Ryan G. Vacca, Jim Chen, Jay Dratler Jr., Tom Folsom, Timothy Hall, Yaniv Heled, Frank Pasquale, Elizabeth Reilly, Jeff Samuels, Kathy Strandburg, Kara Swanson, Andrew Torrance, Katharine Van Tassel
Katharine Van Tassel
On October 26, 2012, the University of Akron School of Law’s Center for Intellectual Property and Technology hosted its Sixth Annual IP Scholars Forum. In attendance were thirteen legal scholars with expertise and an interest in IP and public health who met to discuss problems and potential solutions at the intersection of these fields. This report summarizes this discussion by describing the problems raised, areas of agreement and disagreement between the participants, suggestions and solutions made by participants and the subsequent evaluations of these suggestions and solutions.
Led by the moderator, participants at the Forum focused generally on three broad …
American Bar Association Criminal Justice Standards On Law Enforcement Access To Third Party Records, Stephen E. Henderson
American Bar Association Criminal Justice Standards On Law Enforcement Access To Third Party Records, Stephen E. Henderson
Stephen E Henderson
Intellectual Property And Public Health – A White Paper, Ryan G. Vacca, Jim Chen, Jay Dratler Jr., Tom Folsom, Timothy Hall, Yaniv Heled, Frank Pasquale, Elizabeth Reilly, Jeff Samuels, Kathy Strandburg, Kara Swanson, Andrew Torrance, Katharine Van Tassel
Intellectual Property And Public Health – A White Paper, Ryan G. Vacca, Jim Chen, Jay Dratler Jr., Tom Folsom, Timothy Hall, Yaniv Heled, Frank Pasquale, Elizabeth Reilly, Jeff Samuels, Kathy Strandburg, Kara Swanson, Andrew Torrance, Katharine Van Tassel
Yaniv Heled
On October 26, 2012, the University of Akron School of Law’s Center for Intellectual Property and Technology hosted its Sixth Annual IP Scholars Forum. In attendance were thirteen legal scholars with expertise and an interest in IP and public health who met to discuss problems and potential solutions at the intersection of these fields. This report summarizes this discussion by describing the problems raised, areas of agreement and disagreement between the participants, suggestions and solutions made by participants and the subsequent evaluations of these suggestions and solutions.
Led by the moderator, participants at the Forum focused generally on three broad …