Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Privacy

2017

Journal

Discipline
Institution
Publication

Articles 1 - 30 of 53

Full-Text Articles in Law

Carpenter V. United States And The Fourth Amendment: The Best Way Forward, Stephen E. Henderson Dec 2017

Carpenter V. United States And The Fourth Amendment: The Best Way Forward, Stephen E. Henderson

William & Mary Bill of Rights Journal

We finally have a federal ‘test case.’ In Carpenter v. United States, the Supreme Court is poised to set the direction of the Fourth Amendment in the digital age. The case squarely presents how the twentieth-century third party doctrine will fare in contemporary times, and the stakes could not be higher. This Article reviews the Carpenter case and how it fits within the greater discussion of the Fourth Amendment third party doctrine and location surveillance, and I express a hope that the Court will be both a bit ambitious and a good measure cautious.

As for ambition, the Court …


The Fourth Amendment Disclosure Doctrines, Monu Bedi Dec 2017

The Fourth Amendment Disclosure Doctrines, Monu Bedi

William & Mary Bill of Rights Journal

The third party and public disclosure doctrines (together the “disclosure doctrines”) are long-standing hurdles to Fourth Amendment protection. These doctrines have become increasingly relevant to assessing the government’s use of recent technologies such as data mining, drone surveillance, and cell site location data. It is surprising then that both the Supreme Court and scholars, at times, have associated them together as expressing one principle. It turns out that each relies on unique foundational triggers and does not stand or fall with the other. This Article tackles this issue and provides a comprehensive topology for analyzing the respective contours of each …


Collection Of Cryptocurrency Customer-Information: Tax Enforcement Mechanism Or Invasion Of Privacy?, Austin Elliott Nov 2017

Collection Of Cryptocurrency Customer-Information: Tax Enforcement Mechanism Or Invasion Of Privacy?, Austin Elliott

Duke Law & Technology Review

After granting permission to the Internal Revenue Service to serve a digital exchange company a summons for user information, the Federal District Court for the Northern District of California created some uncertainty regarding the privacy of cryptocurrencies. The IRS views this information gathering as necessary for monitoring compliance with Notice 2014-21, which classifies cryptocurrencies as property for tax purposes. Cryptocurrency users, however, view the attempt for information as an infringement on their privacy rights and are seeking legal protection. This Issue Brief investigates the future tax implications of Notice 2014-21 and considers possible routes the cryptocurrency market can take to …


Blethen Maine Newspapers, Inc. V. State: Balancing The Public's Right To Know Against The Privacy Rights Of Victims Of Sexual Abuse, Kenleigh A. Nicoletta Nov 2017

Blethen Maine Newspapers, Inc. V. State: Balancing The Public's Right To Know Against The Privacy Rights Of Victims Of Sexual Abuse, Kenleigh A. Nicoletta

Maine Law Review

In Blethen Maine Newspapers, Inc. v. State, a sharply divided Maine Supreme Judicial Court, sitting as the Law Court, held that release of records relating to Attorney General G. Steven Rowe's investigation of alleged sexual abuse by Catholic priests was warranted under Maine's Freedom of Access Act (FOAA). Although such investigative records are designated confidential by statute, the majority held that the public's interest in the contents of the records mandated their disclosure after all information identifying persons other than the deceased priests had been redacted. The concurrence asserted that the majority had reached the correct conclusion, but in so …


Justice Blackmun And Individual Rights, Diane P. Wood Oct 2017

Justice Blackmun And Individual Rights, Diane P. Wood

Dickinson Law Review (2017-Present)

Of the many contributions Justice Blackmun has made to American jurisprudence, surely his record in the area of individual rights stands out for its importance. Throughout his career on the Supreme Court, he has displayed concern for a wide variety of individual and civil rights. He has rendered decisions on matters ranging from the most personal interests in autonomy and freedom from interference from government in life’s private realms, to the increasingly complex problems posed by discrimination based upon race, sex, national origin, alienage, illegitimacy, sexual orientation, and other characteristics. As his views have become well known to the public, …


When You Cannot Just Say No: Protecting The Online Privacy Of Employees And Students, Samuel A. Thumma Oct 2017

When You Cannot Just Say No: Protecting The Online Privacy Of Employees And Students, Samuel A. Thumma

South Carolina Law Review

No abstract provided.


Who's Watching The Kids?--The Use Of Peer-To-Peer Programs To Cyberstalk Children, Jessica Herndon Sep 2017

Who's Watching The Kids?--The Use Of Peer-To-Peer Programs To Cyberstalk Children, Jessica Herndon

Oklahoma Journal of Law and Technology

No abstract provided.


Fbi's Carnivore: Under The Fourth Amendment And The Usa Patriot Act, Scott Griner Sep 2017

Fbi's Carnivore: Under The Fourth Amendment And The Usa Patriot Act, Scott Griner

Oklahoma Journal of Law and Technology

No abstract provided.


Emailer Beware: The Fourth Amendment And Electronic Mail, E. Parker Lowe Sep 2017

Emailer Beware: The Fourth Amendment And Electronic Mail, E. Parker Lowe

Oklahoma Journal of Law and Technology

No abstract provided.


Health Information Technology And Hipaa: Can We Satisfy Security And Privacy Standards In The Digital Age, Robert Malone Sep 2017

Health Information Technology And Hipaa: Can We Satisfy Security And Privacy Standards In The Digital Age, Robert Malone

Oklahoma Journal of Law and Technology

No abstract provided.


Looking For Lagniappe: Publicity As A Culprit To Social Networking Websites, Kristin Decker Sep 2017

Looking For Lagniappe: Publicity As A Culprit To Social Networking Websites, Kristin Decker

Oklahoma Journal of Law and Technology

No abstract provided.


Not So Fast: Quon V. Arch Wireless Is Not Employees' License To Text The Workday Away, Amanda R. Higgins Sep 2017

Not So Fast: Quon V. Arch Wireless Is Not Employees' License To Text The Workday Away, Amanda R. Higgins

Oklahoma Journal of Law and Technology

No abstract provided.


Getting Under Fido's Skin: Analyzing The Objections To Mandatory Pet Microchipping Laws, Stephen D. Lott Sep 2017

Getting Under Fido's Skin: Analyzing The Objections To Mandatory Pet Microchipping Laws, Stephen D. Lott

Oklahoma Journal of Law and Technology

No abstract provided.


Yershov V. Gannett: Rethinking The Vppa In The 21st Century, Ariel A. Pardee Sep 2017

Yershov V. Gannett: Rethinking The Vppa In The 21st Century, Ariel A. Pardee

Maine Law Review

Almost anyone with a smartphone can recall a time when an online advertisement followed them from webpage to webpage, or mobile browser to mobile application, or even jumped from a mobile device to a desktop web browser. While some people see it as a harmless—or even helpful—quirk of the online world, others find it creepy and intrusive. In the absence of significant government regulation of online advertising practices, particularly aggrieved individuals have sought relief in the courts by alleging violations of ill-fitting statutes drafted decades ago. This note explores just such a case, Yershov v. Gannett, in which the First …


Iright: There's No App For That, Justin Hinderliter Sep 2017

Iright: There's No App For That, Justin Hinderliter

Oklahoma Journal of Law and Technology

No abstract provided.


Analysis Of Security In Big Data Related To Healthcare, Isabel De La Torre, Begoña García-Zapirain, Miguel López-Coronado Sep 2017

Analysis Of Security In Big Data Related To Healthcare, Isabel De La Torre, Begoña García-Zapirain, Miguel López-Coronado

Journal of Digital Forensics, Security and Law

Big data facilitates the processing and management of huge amounts of data. In health, the main information source is the electronic health record with others being the Internet and social media. Health-related data refers to storage in big data based on and shared via electronic means. Why are criminal organisations interested in this data? These organisations can blackmail people with information related to their health condition or sell the information to marketing companies, etc. This article analyses healthcare-related big data security and proposes different solutions. There are different techniques available to help preserve privacy such as data modification techniques, cryptographic …


Security And The Transnational Information Polity, Michael M. Losavio, Adel Said Elmaghraby Sep 2017

Security And The Transnational Information Polity, Michael M. Losavio, Adel Said Elmaghraby

Journal of Digital Forensics, Security and Law

Global information and communications technologies create criminal opportunities in which criminal violation and physical proximity are decoupled. As in all our endeavors, the good become the prey of the bad. Murderous and venal exploitation of ICT has followed from the inception of the Internet, threatening all the good it brings and the trust we need so badly as a people. As the work continues to expand the implementation of Smart Cities and the Internet of Things, there will be more opportunities for exploitation of these technologies. We examine the social and liberty risks our data and technology-driven responses may entail.


Digital Effects: The Fourth Amendment And Computer Searches Warrants, Ash Moore Aug 2017

Digital Effects: The Fourth Amendment And Computer Searches Warrants, Ash Moore

Oklahoma Journal of Law and Technology

No abstract provided.


The Sky Is Not Falling: An Analysis Of The National Strategy For Trusted Identities In Cyberspace And The Proposed Identity Ecosystem, Aaron L. Jackson Aug 2017

The Sky Is Not Falling: An Analysis Of The National Strategy For Trusted Identities In Cyberspace And The Proposed Identity Ecosystem, Aaron L. Jackson

Oklahoma Journal of Law and Technology

No abstract provided.


Global Cybersecurity, Surveillance, And Privacy: The Obama Administration's Conflicted Legacy, Peter Margulies Aug 2017

Global Cybersecurity, Surveillance, And Privacy: The Obama Administration's Conflicted Legacy, Peter Margulies

Indiana Journal of Global Legal Studies

To analyze the Obama administration's cyber efforts, this Article proposes a paradigm of stewardship with both discursive and structural dimensions. Discursive stewardship refers to the Executive's openness to dialogue with other stakeholders. Structural stewardship refers to the domestic and transnational distribution of decisional authority, including checks and balances that guard against the excesses of unilateral action. The Article concludes that the Obama administration made substantial progress in each of these realms. However, the outsized role of law enforcement agendas and dearth of clearly articulated checks on transnational surveillance drove headwinds that limited forward movement.


The Outer Limits: Imsi-Catchers, Technology, And The Future Of The Fourth Amendment, Ryan C. Chapman Jul 2017

The Outer Limits: Imsi-Catchers, Technology, And The Future Of The Fourth Amendment, Ryan C. Chapman

Pepperdine Law Review

Recent advances in technology are posing new challenges for a legal system based on decades-old precedent. Nowhere is this more apparent than in law enforcement’s warrantless use of IMSI Catchers. These devices mimic a cell phone tower, and when the device is activated, cell phones will naturally connect to them. Law enforcement officers can use those intercepted cell phone signals to track a suspect’s movements in real time with startling accuracy. Scholarly commentary on these devices has largely concluded that their use requires a warrant. This Comment engages in a close examination of Fourth Amendment precedent and argues that, as …


The Freedom From Sexploitation Agenda: Policy And Legislative Recommendations To Curb Sexual Exploitation, Dawn Hawkins Jul 2017

The Freedom From Sexploitation Agenda: Policy And Legislative Recommendations To Curb Sexual Exploitation, Dawn Hawkins

Dignity: A Journal of Analysis of Exploitation and Violence

No abstract provided.


Judicial Oversight Of Interception Of Communications In The United Kingdom: An Historical And Comparative Analysis, David G. Barnum Jun 2017

Judicial Oversight Of Interception Of Communications In The United Kingdom: An Historical And Comparative Analysis, David G. Barnum

Georgia Journal of International & Comparative Law

No abstract provided.


Automating Threat Sharing: How Companies Can Best Ensure Liability Protection When Sharing Cyber Threat Information With Other Companies Or Organizations, Ari Schwartz, Sejal C. Shah, Matthew H. Mackenzie, Sheena Thomas, Tara Sugiyama Potashnik, Bri Law Jun 2017

Automating Threat Sharing: How Companies Can Best Ensure Liability Protection When Sharing Cyber Threat Information With Other Companies Or Organizations, Ari Schwartz, Sejal C. Shah, Matthew H. Mackenzie, Sheena Thomas, Tara Sugiyama Potashnik, Bri Law

University of Michigan Journal of Law Reform

This Article takes an in-depth look at the evolution of cybersecurity information sharing legislation, leading to the recent passage of the Cybersecurity Information Sharing Act (CISA) and offers insights into how automated information sharing mechanisms and associated requirements implemented pursuant to CISA can be leveraged to help ensure liability protections when engaging in cyber threat information sharing with and amongst other non-federal government entities.


Check Yes For Checkpoints: Suspicionless Stops And Ramifications For Missouri Motorists, Conner Harris Jun 2017

Check Yes For Checkpoints: Suspicionless Stops And Ramifications For Missouri Motorists, Conner Harris

Missouri Law Review

One of the great advantages of living in a free society is the enjoyment of general privacy and freedom from unwarranted interference in one’s personal affairs. This advantage benefits citizens in both their private and public interactions. For example, it is expected one could drive to the store across town, the mall in a neighboring city, or somewhere on the other side of the country uninterrupted and unhindered. The Fourth Amendment to the United States Constitution codifies this privacy expectation as a right to be enjoyed by all within its reach. Specifically, the Fourth Amendment protects against “unreasonable searches and …


The Expanding Scope Of Human Rights In A Technological World — Using The Interamerican Court Of Human Rights To Establish A Minimum Data Protection Standard Across Latin America, Josiah Wolfson May 2017

The Expanding Scope Of Human Rights In A Technological World — Using The Interamerican Court Of Human Rights To Establish A Minimum Data Protection Standard Across Latin America, Josiah Wolfson

University of Miami Inter-American Law Review

Privacy is a human right that many in the world do not enjoy. The failure of many countries to prioritize privacy through the passage and enforcement of comprehensive data protection laws has left their citizens vulnerable. The Inter-American Court of Human Rights should use its authority to set a minimum data protection standard for its Member States.

This Note discusses the historical development of data protection, the current data protection gap in Latin America, and proposes the role that the Inter-American Court of Human Rights should play in advancing a minimum data protection standard in the region.


The Market’S Law Of Privacy: Case Studies In Privacy/Security Adoption, Chetan Gupta May 2017

The Market’S Law Of Privacy: Case Studies In Privacy/Security Adoption, Chetan Gupta

Washington and Lee Law Review Online

This paper examines the hypothesis that it may be possible for individual actors in a marketplace to drive the adoption of particular privacy and security standards. It aims to explore the diffusion of privacy and security technologies in the marketplace. Using HTTPS, Two-Factor Authentication, and End-to-End Encryption as case studies, it tries to ascertain which factors are responsible for successful diffusion which improves the privacy of a large number of users. Lastly, it explores whether the FTC may view a widely diffused standard as a necessary security feature for all actors in a particular industry.

Based on the case studies …


Privacy In The Age Of Autonomous Vehicles, Ivan L. Sucharski, Philip Fabinger Apr 2017

Privacy In The Age Of Autonomous Vehicles, Ivan L. Sucharski, Philip Fabinger

Washington and Lee Law Review Online

To prepare for the age of the intelligent, highly connected, and autonomous vehicle, a new approach to concepts of granting consent, managing privacy, and dealing with the need to interact quickly and meaningfully is needed. Additionally, in an environment where personal data is rapidly shared with a multitude of independent parties, there exists a need to reduce the information asymmetry that currently exists between the user and data collecting entities. This Article rethinks the traditional notice and consent model in the context of real-time communication between vehicles or vehicles and infrastructure or vehicles and other surroundings and proposes a re-engineering …


Death And Dignity, Michael Gardner Apr 2017

Death And Dignity, Michael Gardner

Brigham Young University Prelaw Review

This paper discusses the contemporary debate over physician-assisted suicide and focuses specifically on Oregon’s Death with Dignity Act. Because the majority of the states have yet to pass legislation on physician-assisted suicide, the greatest debate over the legality of euthanasia is yet to come. This paper addresses the arguments for and against physician-assisted suicide with the purpose of educating the reader regarding the social, moral and ethical consequences of allowing or denying its practice.


Legal Challenges Facing Unmanned Aerial Systems And Commercial Agriculture, Peggy Kirk Hall, Rusty Rumley Apr 2017

Legal Challenges Facing Unmanned Aerial Systems And Commercial Agriculture, Peggy Kirk Hall, Rusty Rumley

University of Arkansas at Little Rock Law Review

No abstract provided.