Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Law

Data Collection And The Regulatory State, Ahmed Ghappour Sep 2017

Data Collection And The Regulatory State, Ahmed Ghappour

Faculty Scholarship

The following remarks were given on January 27, 2017 during the Connecticut Law Review’s symposium, “Privacy, Security & Power: The State of Digital Surveillance.” Hillary Greene, the Zephaniah Swift Professor of Law at the University of Connecticut School of Law, offered introductory remarks and moderated the panel. The panel included Dr. Cooper, Associate Professor of Law and Director of the Program on Economics & Privacy at Antonin Scalia Law School at George Mason University, Professor Ghappour, Visiting Assistant Professor at UC Hastings College of the Law, Attorney Lieber, Senior Privacy Policy Counsel at Google, and Dr. Wu, Professor of Law …


Copyright Owners' Putative Interests In Privacy, Reputation, And Control: A Reply To Goold, Wendy J. Gordon Jun 2017

Copyright Owners' Putative Interests In Privacy, Reputation, And Control: A Reply To Goold, Wendy J. Gordon

Faculty Scholarship

My own view is that Goold overstates the explanatory role of tort law. But even were that not the case, the courts need to reach some kind of “settled” understanding on these various interests before a cause of action is created or definitively rejected, and that no such consensus on the three matters mentioned yet exists, whether they are viewed as forms of tort or otherwise. Goold’s work may nevertheless be an important step toward reaching closure on these and other open questions in copyright law.


Searching Places Unknown: Law Enforcement Jurisdiction On The Dark Web, Ahmed Ghappour Apr 2017

Searching Places Unknown: Law Enforcement Jurisdiction On The Dark Web, Ahmed Ghappour

Faculty Scholarship

The use of hacking tools by law enforcement to pursue criminal suspects who have anonymized their communications on the dark web presents a looming flashpoint between criminal procedure and international law. Criminal actors who use the dark web (for instance, to commit crimes or to evade authorities) obscure digital footprints left behind with third parties, rendering existing surveillance methods obsolete. In response, law enforcement has implemented hacking techniques that deploy surveillance software over the Internet to directly access and control criminals’ devices. The practical reality of the underlying technologies makes it inevitable that foreign-located computers will be subject to remote …


Privacy's Trust Gap, Neil M. Richards, Woodrow Hartzog Jan 2017

Privacy's Trust Gap, Neil M. Richards, Woodrow Hartzog

Faculty Scholarship

It can be easy to get depressed about the state of privacy these days. In an age of networked digital information, many of us feel disempowered by the various governments, companies, and criminals trying to peer into our lives to collect our digital data trails. When so much is in flux, the way we think about an issue matters a great deal. Yet while new technologies abound, our ideas and thinking — as well as our laws — have lagged in grappling with the new problems raised by the digital revolution. In their important new book, Obfuscation: A User’s Guide …


Certain Certiorari: The Digital Privacy Rights Of Probationers, Daniel Yeager Jan 2017

Certain Certiorari: The Digital Privacy Rights Of Probationers, Daniel Yeager

Faculty Scholarship

In a recent oral argument, a judge on the California Court of Appeal told me they had "at least 50" pending cases on the constitutionality of probation conditions authorizing suspicionless searches of digital devices. As counsel of record in three of those cases, I feel positioned to comment on this hot topic within criminal law. My intention here is less to reconcile California's cases on suspicionless searches of probationers' digital devices than to locate them within the precedents of the United States Supreme Court, which is bound before long to pick up a case for the same purpose.


Trusting Big Data Research, Neil M. Richards, Woodrow Hartzog Jan 2017

Trusting Big Data Research, Neil M. Richards, Woodrow Hartzog

Faculty Scholarship

Although it might puzzle or even infuriate data scientists, suspicion about big data is understandable. The concept doesn’t seem promising to most people. It seems scary. This is partly because big data research is shrouded in mystery. People are unsure about organizations’ motives and methods. What do companies think they know about us? Are they keeping their insights safe from hackers? Are they selling their insights to unscrupulous parties? Most importantly, do organizations use our personal information against us? Big data research will only overcome its suspicious reputation when people can trust it.

Some scholars and commentators have proposed review …