Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Privacy Law (33)
- Internet Law (14)
- Fourth Amendment (13)
- Constitutional Law (10)
- Science and Technology Law (9)
-
- Computer Law (7)
- Criminal Procedure (4)
- Law and Society (4)
- National Security Law (4)
- Air and Space Law (3)
- Communications Law (3)
- Criminal Law (3)
- Human Rights Law (3)
- Law and Politics (3)
- Social and Behavioral Sciences (3)
- Computer Sciences (2)
- Consumer Protection Law (2)
- First Amendment (2)
- Information Security (2)
- Intellectual Property Law (2)
- Legislation (2)
- Physical Sciences and Mathematics (2)
- President/Executive Department (2)
- Property Law and Real Estate (2)
- Torts (2)
- Administrative Law (1)
- Agency (1)
- Agriculture Law (1)
- Animal Law (1)
- Institution
-
- University of Oklahoma College of Law (10)
- Loyola Marymount University and Loyola Law School (3)
- University of Arkansas at Little Rock William H. Bowen School of Law (3)
- Cleveland State University (2)
- Embry-Riddle Aeronautical University (2)
-
- Nova Southeastern University (2)
- Southern Methodist University (2)
- University of Maine School of Law (2)
- University of Richmond (2)
- University of South Carolina (2)
- Vanderbilt University Law School (2)
- Washington and Lee University School of Law (2)
- William & Mary Law School (2)
- American University Washington College of Law (1)
- Brigham Young University (1)
- California State University, San Bernardino (1)
- Duke Law (1)
- Georgia State University College of Law (1)
- Maurer School of Law: Indiana University (1)
- Northwestern Pritzker School of Law (1)
- Penn State Dickinson Law (1)
- Pepperdine University (1)
- The Catholic University of America, Columbus School of Law (1)
- Touro University Jacob D. Fuchsberg Law Center (1)
- University of Colorado Law School (1)
- University of Georgia School of Law (1)
- University of Miami Law School (1)
- University of Michigan Law School (1)
- University of Missouri School of Law (1)
- University of Rhode Island (1)
- Publication
-
- Oklahoma Journal of Law and Technology (10)
- Loyola of Los Angeles Law Review (3)
- University of Arkansas at Little Rock Law Review (3)
- Cleveland State Law Review (2)
- Journal of Digital Forensics, Security and Law (2)
-
- Maine Law Review (2)
- Nova Law Review (2)
- South Carolina Law Review (2)
- University of Richmond Law Review (2)
- Vanderbilt Journal of Entertainment & Technology Law (2)
- Washington and Lee Law Review Online (2)
- William & Mary Bill of Rights Journal (2)
- American University Law Review (1)
- Brigham Young University Prelaw Review (1)
- Catholic University Journal of Law and Technology (1)
- Dickinson Law Review (2017-Present) (1)
- Dignity: A Journal of Analysis of Exploitation and Violence (1)
- Duke Law & Technology Review (1)
- Georgia Journal of International & Comparative Law (1)
- Georgia State University Law Review (1)
- Indiana Journal of Global Legal Studies (1)
- Journal of International Technology and Information Management (1)
- Missouri Law Review (1)
- Northwestern University Law Review (1)
- Pepperdine Law Review (1)
- SMU Law Review (1)
- SMU Science and Technology Law Review (1)
- Touro Law Review (1)
- University of Colorado Law Review (1)
- University of Miami Inter-American Law Review (1)
Articles 1 - 30 of 53
Full-Text Articles in Law
Carpenter V. United States And The Fourth Amendment: The Best Way Forward, Stephen E. Henderson
Carpenter V. United States And The Fourth Amendment: The Best Way Forward, Stephen E. Henderson
William & Mary Bill of Rights Journal
We finally have a federal ‘test case.’ In Carpenter v. United States, the Supreme Court is poised to set the direction of the Fourth Amendment in the digital age. The case squarely presents how the twentieth-century third party doctrine will fare in contemporary times, and the stakes could not be higher. This Article reviews the Carpenter case and how it fits within the greater discussion of the Fourth Amendment third party doctrine and location surveillance, and I express a hope that the Court will be both a bit ambitious and a good measure cautious.
As for ambition, the Court …
The Fourth Amendment Disclosure Doctrines, Monu Bedi
The Fourth Amendment Disclosure Doctrines, Monu Bedi
William & Mary Bill of Rights Journal
The third party and public disclosure doctrines (together the “disclosure doctrines”) are long-standing hurdles to Fourth Amendment protection. These doctrines have become increasingly relevant to assessing the government’s use of recent technologies such as data mining, drone surveillance, and cell site location data. It is surprising then that both the Supreme Court and scholars, at times, have associated them together as expressing one principle. It turns out that each relies on unique foundational triggers and does not stand or fall with the other. This Article tackles this issue and provides a comprehensive topology for analyzing the respective contours of each …
Collection Of Cryptocurrency Customer-Information: Tax Enforcement Mechanism Or Invasion Of Privacy?, Austin Elliott
Collection Of Cryptocurrency Customer-Information: Tax Enforcement Mechanism Or Invasion Of Privacy?, Austin Elliott
Duke Law & Technology Review
After granting permission to the Internal Revenue Service to serve a digital exchange company a summons for user information, the Federal District Court for the Northern District of California created some uncertainty regarding the privacy of cryptocurrencies. The IRS views this information gathering as necessary for monitoring compliance with Notice 2014-21, which classifies cryptocurrencies as property for tax purposes. Cryptocurrency users, however, view the attempt for information as an infringement on their privacy rights and are seeking legal protection. This Issue Brief investigates the future tax implications of Notice 2014-21 and considers possible routes the cryptocurrency market can take to …
Blethen Maine Newspapers, Inc. V. State: Balancing The Public's Right To Know Against The Privacy Rights Of Victims Of Sexual Abuse, Kenleigh A. Nicoletta
Blethen Maine Newspapers, Inc. V. State: Balancing The Public's Right To Know Against The Privacy Rights Of Victims Of Sexual Abuse, Kenleigh A. Nicoletta
Maine Law Review
In Blethen Maine Newspapers, Inc. v. State, a sharply divided Maine Supreme Judicial Court, sitting as the Law Court, held that release of records relating to Attorney General G. Steven Rowe's investigation of alleged sexual abuse by Catholic priests was warranted under Maine's Freedom of Access Act (FOAA). Although such investigative records are designated confidential by statute, the majority held that the public's interest in the contents of the records mandated their disclosure after all information identifying persons other than the deceased priests had been redacted. The concurrence asserted that the majority had reached the correct conclusion, but in so …
Justice Blackmun And Individual Rights, Diane P. Wood
Justice Blackmun And Individual Rights, Diane P. Wood
Dickinson Law Review (2017-Present)
Of the many contributions Justice Blackmun has made to American jurisprudence, surely his record in the area of individual rights stands out for its importance. Throughout his career on the Supreme Court, he has displayed concern for a wide variety of individual and civil rights. He has rendered decisions on matters ranging from the most personal interests in autonomy and freedom from interference from government in life’s private realms, to the increasingly complex problems posed by discrimination based upon race, sex, national origin, alienage, illegitimacy, sexual orientation, and other characteristics. As his views have become well known to the public, …
When You Cannot Just Say No: Protecting The Online Privacy Of Employees And Students, Samuel A. Thumma
When You Cannot Just Say No: Protecting The Online Privacy Of Employees And Students, Samuel A. Thumma
South Carolina Law Review
No abstract provided.
Who's Watching The Kids?--The Use Of Peer-To-Peer Programs To Cyberstalk Children, Jessica Herndon
Who's Watching The Kids?--The Use Of Peer-To-Peer Programs To Cyberstalk Children, Jessica Herndon
Oklahoma Journal of Law and Technology
No abstract provided.
Fbi's Carnivore: Under The Fourth Amendment And The Usa Patriot Act, Scott Griner
Fbi's Carnivore: Under The Fourth Amendment And The Usa Patriot Act, Scott Griner
Oklahoma Journal of Law and Technology
No abstract provided.
Emailer Beware: The Fourth Amendment And Electronic Mail, E. Parker Lowe
Emailer Beware: The Fourth Amendment And Electronic Mail, E. Parker Lowe
Oklahoma Journal of Law and Technology
No abstract provided.
Health Information Technology And Hipaa: Can We Satisfy Security And Privacy Standards In The Digital Age, Robert Malone
Health Information Technology And Hipaa: Can We Satisfy Security And Privacy Standards In The Digital Age, Robert Malone
Oklahoma Journal of Law and Technology
No abstract provided.
Looking For Lagniappe: Publicity As A Culprit To Social Networking Websites, Kristin Decker
Looking For Lagniappe: Publicity As A Culprit To Social Networking Websites, Kristin Decker
Oklahoma Journal of Law and Technology
No abstract provided.
Not So Fast: Quon V. Arch Wireless Is Not Employees' License To Text The Workday Away, Amanda R. Higgins
Not So Fast: Quon V. Arch Wireless Is Not Employees' License To Text The Workday Away, Amanda R. Higgins
Oklahoma Journal of Law and Technology
No abstract provided.
Getting Under Fido's Skin: Analyzing The Objections To Mandatory Pet Microchipping Laws, Stephen D. Lott
Getting Under Fido's Skin: Analyzing The Objections To Mandatory Pet Microchipping Laws, Stephen D. Lott
Oklahoma Journal of Law and Technology
No abstract provided.
Yershov V. Gannett: Rethinking The Vppa In The 21st Century, Ariel A. Pardee
Yershov V. Gannett: Rethinking The Vppa In The 21st Century, Ariel A. Pardee
Maine Law Review
Almost anyone with a smartphone can recall a time when an online advertisement followed them from webpage to webpage, or mobile browser to mobile application, or even jumped from a mobile device to a desktop web browser. While some people see it as a harmless—or even helpful—quirk of the online world, others find it creepy and intrusive. In the absence of significant government regulation of online advertising practices, particularly aggrieved individuals have sought relief in the courts by alleging violations of ill-fitting statutes drafted decades ago. This note explores just such a case, Yershov v. Gannett, in which the First …
Iright: There's No App For That, Justin Hinderliter
Iright: There's No App For That, Justin Hinderliter
Oklahoma Journal of Law and Technology
No abstract provided.
Analysis Of Security In Big Data Related To Healthcare, Isabel De La Torre, Begoña García-Zapirain, Miguel López-Coronado
Analysis Of Security In Big Data Related To Healthcare, Isabel De La Torre, Begoña García-Zapirain, Miguel López-Coronado
Journal of Digital Forensics, Security and Law
Big data facilitates the processing and management of huge amounts of data. In health, the main information source is the electronic health record with others being the Internet and social media. Health-related data refers to storage in big data based on and shared via electronic means. Why are criminal organisations interested in this data? These organisations can blackmail people with information related to their health condition or sell the information to marketing companies, etc. This article analyses healthcare-related big data security and proposes different solutions. There are different techniques available to help preserve privacy such as data modification techniques, cryptographic …
Security And The Transnational Information Polity, Michael M. Losavio, Adel Said Elmaghraby
Security And The Transnational Information Polity, Michael M. Losavio, Adel Said Elmaghraby
Journal of Digital Forensics, Security and Law
Global information and communications technologies create criminal opportunities in which criminal violation and physical proximity are decoupled. As in all our endeavors, the good become the prey of the bad. Murderous and venal exploitation of ICT has followed from the inception of the Internet, threatening all the good it brings and the trust we need so badly as a people. As the work continues to expand the implementation of Smart Cities and the Internet of Things, there will be more opportunities for exploitation of these technologies. We examine the social and liberty risks our data and technology-driven responses may entail.
Digital Effects: The Fourth Amendment And Computer Searches Warrants, Ash Moore
Digital Effects: The Fourth Amendment And Computer Searches Warrants, Ash Moore
Oklahoma Journal of Law and Technology
No abstract provided.
The Sky Is Not Falling: An Analysis Of The National Strategy For Trusted Identities In Cyberspace And The Proposed Identity Ecosystem, Aaron L. Jackson
The Sky Is Not Falling: An Analysis Of The National Strategy For Trusted Identities In Cyberspace And The Proposed Identity Ecosystem, Aaron L. Jackson
Oklahoma Journal of Law and Technology
No abstract provided.
Global Cybersecurity, Surveillance, And Privacy: The Obama Administration's Conflicted Legacy, Peter Margulies
Global Cybersecurity, Surveillance, And Privacy: The Obama Administration's Conflicted Legacy, Peter Margulies
Indiana Journal of Global Legal Studies
To analyze the Obama administration's cyber efforts, this Article proposes a paradigm of stewardship with both discursive and structural dimensions. Discursive stewardship refers to the Executive's openness to dialogue with other stakeholders. Structural stewardship refers to the domestic and transnational distribution of decisional authority, including checks and balances that guard against the excesses of unilateral action. The Article concludes that the Obama administration made substantial progress in each of these realms. However, the outsized role of law enforcement agendas and dearth of clearly articulated checks on transnational surveillance drove headwinds that limited forward movement.
The Outer Limits: Imsi-Catchers, Technology, And The Future Of The Fourth Amendment, Ryan C. Chapman
The Outer Limits: Imsi-Catchers, Technology, And The Future Of The Fourth Amendment, Ryan C. Chapman
Pepperdine Law Review
Recent advances in technology are posing new challenges for a legal system based on decades-old precedent. Nowhere is this more apparent than in law enforcement’s warrantless use of IMSI Catchers. These devices mimic a cell phone tower, and when the device is activated, cell phones will naturally connect to them. Law enforcement officers can use those intercepted cell phone signals to track a suspect’s movements in real time with startling accuracy. Scholarly commentary on these devices has largely concluded that their use requires a warrant. This Comment engages in a close examination of Fourth Amendment precedent and argues that, as …
The Freedom From Sexploitation Agenda: Policy And Legislative Recommendations To Curb Sexual Exploitation, Dawn Hawkins
The Freedom From Sexploitation Agenda: Policy And Legislative Recommendations To Curb Sexual Exploitation, Dawn Hawkins
Dignity: A Journal of Analysis of Exploitation and Violence
No abstract provided.
Judicial Oversight Of Interception Of Communications In The United Kingdom: An Historical And Comparative Analysis, David G. Barnum
Judicial Oversight Of Interception Of Communications In The United Kingdom: An Historical And Comparative Analysis, David G. Barnum
Georgia Journal of International & Comparative Law
No abstract provided.
Automating Threat Sharing: How Companies Can Best Ensure Liability Protection When Sharing Cyber Threat Information With Other Companies Or Organizations, Ari Schwartz, Sejal C. Shah, Matthew H. Mackenzie, Sheena Thomas, Tara Sugiyama Potashnik, Bri Law
Automating Threat Sharing: How Companies Can Best Ensure Liability Protection When Sharing Cyber Threat Information With Other Companies Or Organizations, Ari Schwartz, Sejal C. Shah, Matthew H. Mackenzie, Sheena Thomas, Tara Sugiyama Potashnik, Bri Law
University of Michigan Journal of Law Reform
This Article takes an in-depth look at the evolution of cybersecurity information sharing legislation, leading to the recent passage of the Cybersecurity Information Sharing Act (CISA) and offers insights into how automated information sharing mechanisms and associated requirements implemented pursuant to CISA can be leveraged to help ensure liability protections when engaging in cyber threat information sharing with and amongst other non-federal government entities.
Check Yes For Checkpoints: Suspicionless Stops And Ramifications For Missouri Motorists, Conner Harris
Check Yes For Checkpoints: Suspicionless Stops And Ramifications For Missouri Motorists, Conner Harris
Missouri Law Review
One of the great advantages of living in a free society is the enjoyment of general privacy and freedom from unwarranted interference in one’s personal affairs. This advantage benefits citizens in both their private and public interactions. For example, it is expected one could drive to the store across town, the mall in a neighboring city, or somewhere on the other side of the country uninterrupted and unhindered. The Fourth Amendment to the United States Constitution codifies this privacy expectation as a right to be enjoyed by all within its reach. Specifically, the Fourth Amendment protects against “unreasonable searches and …
The Expanding Scope Of Human Rights In A Technological World — Using The Interamerican Court Of Human Rights To Establish A Minimum Data Protection Standard Across Latin America, Josiah Wolfson
University of Miami Inter-American Law Review
Privacy is a human right that many in the world do not enjoy. The failure of many countries to prioritize privacy through the passage and enforcement of comprehensive data protection laws has left their citizens vulnerable. The Inter-American Court of Human Rights should use its authority to set a minimum data protection standard for its Member States.
This Note discusses the historical development of data protection, the current data protection gap in Latin America, and proposes the role that the Inter-American Court of Human Rights should play in advancing a minimum data protection standard in the region.
The Market’S Law Of Privacy: Case Studies In Privacy/Security Adoption, Chetan Gupta
The Market’S Law Of Privacy: Case Studies In Privacy/Security Adoption, Chetan Gupta
Washington and Lee Law Review Online
This paper examines the hypothesis that it may be possible for individual actors in a marketplace to drive the adoption of particular privacy and security standards. It aims to explore the diffusion of privacy and security technologies in the marketplace. Using HTTPS, Two-Factor Authentication, and End-to-End Encryption as case studies, it tries to ascertain which factors are responsible for successful diffusion which improves the privacy of a large number of users. Lastly, it explores whether the FTC may view a widely diffused standard as a necessary security feature for all actors in a particular industry.
Based on the case studies …
Privacy In The Age Of Autonomous Vehicles, Ivan L. Sucharski, Philip Fabinger
Privacy In The Age Of Autonomous Vehicles, Ivan L. Sucharski, Philip Fabinger
Washington and Lee Law Review Online
To prepare for the age of the intelligent, highly connected, and autonomous vehicle, a new approach to concepts of granting consent, managing privacy, and dealing with the need to interact quickly and meaningfully is needed. Additionally, in an environment where personal data is rapidly shared with a multitude of independent parties, there exists a need to reduce the information asymmetry that currently exists between the user and data collecting entities. This Article rethinks the traditional notice and consent model in the context of real-time communication between vehicles or vehicles and infrastructure or vehicles and other surroundings and proposes a re-engineering …
Death And Dignity, Michael Gardner
Death And Dignity, Michael Gardner
Brigham Young University Prelaw Review
This paper discusses the contemporary debate over physician-assisted suicide and focuses specifically on Oregon’s Death with Dignity Act. Because the majority of the states have yet to pass legislation on physician-assisted suicide, the greatest debate over the legality of euthanasia is yet to come. This paper addresses the arguments for and against physician-assisted suicide with the purpose of educating the reader regarding the social, moral and ethical consequences of allowing or denying its practice.
Legal Challenges Facing Unmanned Aerial Systems And Commercial Agriculture, Peggy Kirk Hall, Rusty Rumley
Legal Challenges Facing Unmanned Aerial Systems And Commercial Agriculture, Peggy Kirk Hall, Rusty Rumley
University of Arkansas at Little Rock Law Review
No abstract provided.