Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Privacy

2017

Discipline
Institution
Publication
Publication Type

Articles 31 - 60 of 123

Full-Text Articles in Law

Data Collection And The Regulatory State, Ahmed Ghappour Sep 2017

Data Collection And The Regulatory State, Ahmed Ghappour

Faculty Scholarship

The following remarks were given on January 27, 2017 during the Connecticut Law Review’s symposium, “Privacy, Security & Power: The State of Digital Surveillance.” Hillary Greene, the Zephaniah Swift Professor of Law at the University of Connecticut School of Law, offered introductory remarks and moderated the panel. The panel included Dr. Cooper, Associate Professor of Law and Director of the Program on Economics & Privacy at Antonin Scalia Law School at George Mason University, Professor Ghappour, Visiting Assistant Professor at UC Hastings College of the Law, Attorney Lieber, Senior Privacy Policy Counsel at Google, and Dr. Wu, Professor of Law …


Comments To The Federal Trade Commission On The Can-Spam Rule Review, 16 C.F.R. Part 316, Project No. R711010, Roger Allan Ford Aug 2017

Comments To The Federal Trade Commission On The Can-Spam Rule Review, 16 C.F.R. Part 316, Project No. R711010, Roger Allan Ford

Law Faculty Scholarship

These comments respond to the Federal Trade Commission’s request for public comment on the CAN-SPAM Rule, 16 C.F.R. Part 316.

The CAN-SPAM Act set a minimum baseline for consumer protections that senders of unsolicited commercial email must respect. These protections have been largely effective at giving consumers the ability to manage how a large group of companies uses their email addresses for marketing. At the same time, the Act has had little effect on the volume of unsolicited commercial email or on the amount of email sent by scammers and fraudsters. The Act and its implementing Rule, then, have been …


Brief Of Scholars Of The History And Original Meaning Of The Fourth Amendment As Amici Curiae In Support Of Petitioner, Margaret Hu Aug 2017

Brief Of Scholars Of The History And Original Meaning Of The Fourth Amendment As Amici Curiae In Support Of Petitioner, Margaret Hu

Briefs

No abstract provided.


Digital Effects: The Fourth Amendment And Computer Searches Warrants, Ash Moore Aug 2017

Digital Effects: The Fourth Amendment And Computer Searches Warrants, Ash Moore

Oklahoma Journal of Law and Technology

No abstract provided.


The Sky Is Not Falling: An Analysis Of The National Strategy For Trusted Identities In Cyberspace And The Proposed Identity Ecosystem, Aaron L. Jackson Aug 2017

The Sky Is Not Falling: An Analysis Of The National Strategy For Trusted Identities In Cyberspace And The Proposed Identity Ecosystem, Aaron L. Jackson

Oklahoma Journal of Law and Technology

No abstract provided.


We Need To Talk About Police Disciplinary Records, Kate Levine Aug 2017

We Need To Talk About Police Disciplinary Records, Kate Levine

Faculty Publications

In March 2017, an employee of New York’s Civilian Complaint Review Board leaked the disciplinary record of Daniel Pantaleo to the media. Pantaleo, the police officer who choked Eric Garner to death in the video that went public and horrified many citizens, is under federal investigation after a Staten Island grand jury refused to indict him for Garner’s death. Legal Aid Society attorneys had unsuccessfully sought the release of his records in the courts for years. The leak of his records is the public face of an important but rarely discussed issue facing police, legislators, judges, lawyers, and scholars who …


Global Cybersecurity, Surveillance, And Privacy: The Obama Administration's Conflicted Legacy, Peter Margulies Aug 2017

Global Cybersecurity, Surveillance, And Privacy: The Obama Administration's Conflicted Legacy, Peter Margulies

Indiana Journal of Global Legal Studies

To analyze the Obama administration's cyber efforts, this Article proposes a paradigm of stewardship with both discursive and structural dimensions. Discursive stewardship refers to the Executive's openness to dialogue with other stakeholders. Structural stewardship refers to the domestic and transnational distribution of decisional authority, including checks and balances that guard against the excesses of unilateral action. The Article concludes that the Obama administration made substantial progress in each of these realms. However, the outsized role of law enforcement agendas and dearth of clearly articulated checks on transnational surveillance drove headwinds that limited forward movement.


19th Annual Open Government Summit: Access To Public Records Act & Open Meetings Act, 2017, Department Of Attorney General, State Of Rhode Island Jul 2017

19th Annual Open Government Summit: Access To Public Records Act & Open Meetings Act, 2017, Department Of Attorney General, State Of Rhode Island

School of Law Conferences, Lectures & Events

No abstract provided.


The Outer Limits: Imsi-Catchers, Technology, And The Future Of The Fourth Amendment, Ryan C. Chapman Jul 2017

The Outer Limits: Imsi-Catchers, Technology, And The Future Of The Fourth Amendment, Ryan C. Chapman

Pepperdine Law Review

Recent advances in technology are posing new challenges for a legal system based on decades-old precedent. Nowhere is this more apparent than in law enforcement’s warrantless use of IMSI Catchers. These devices mimic a cell phone tower, and when the device is activated, cell phones will naturally connect to them. Law enforcement officers can use those intercepted cell phone signals to track a suspect’s movements in real time with startling accuracy. Scholarly commentary on these devices has largely concluded that their use requires a warrant. This Comment engages in a close examination of Fourth Amendment precedent and argues that, as …


The Freedom From Sexploitation Agenda: Policy And Legislative Recommendations To Curb Sexual Exploitation, Dawn Hawkins Jul 2017

The Freedom From Sexploitation Agenda: Policy And Legislative Recommendations To Curb Sexual Exploitation, Dawn Hawkins

Dignity: A Journal of Analysis of Exploitation and Violence

No abstract provided.


The Doctor Requirement: Griswold, Privacy, And At-Home Reproductive Care, Yvonne F. Lindgren Jul 2017

The Doctor Requirement: Griswold, Privacy, And At-Home Reproductive Care, Yvonne F. Lindgren

Faculty Works

Supreme Court privacy jurisprudence has traditionally offered greater protection to activities when exercised within the home. This is true in common law as well as across a broad range of constitutional claims. For example, common law privacy identifies the home as a location of solitude and repose, often conceptualized as the “right to be let alone.” Speech, or the right to be free of unwanted messages, is enhanced when the claimant is within the confines of her or his home. Fourth Amendment protections against search and seizure and the notion of the reasonable expectation of privacy are enhanced when the …


Judicial Oversight Of Interception Of Communications In The United Kingdom: An Historical And Comparative Analysis, David G. Barnum Jun 2017

Judicial Oversight Of Interception Of Communications In The United Kingdom: An Historical And Comparative Analysis, David G. Barnum

Georgia Journal of International & Comparative Law

No abstract provided.


Privacy And The Alaska Constitution: Failing To Fulfill The Promise, Erwin Chemerinsky Jun 2017

Privacy And The Alaska Constitution: Failing To Fulfill The Promise, Erwin Chemerinsky

Erwin Chemerinsky

No abstract provided.


Automating Threat Sharing: How Companies Can Best Ensure Liability Protection When Sharing Cyber Threat Information With Other Companies Or Organizations, Ari Schwartz, Sejal C. Shah, Matthew H. Mackenzie, Sheena Thomas, Tara Sugiyama Potashnik, Bri Law Jun 2017

Automating Threat Sharing: How Companies Can Best Ensure Liability Protection When Sharing Cyber Threat Information With Other Companies Or Organizations, Ari Schwartz, Sejal C. Shah, Matthew H. Mackenzie, Sheena Thomas, Tara Sugiyama Potashnik, Bri Law

University of Michigan Journal of Law Reform

This Article takes an in-depth look at the evolution of cybersecurity information sharing legislation, leading to the recent passage of the Cybersecurity Information Sharing Act (CISA) and offers insights into how automated information sharing mechanisms and associated requirements implemented pursuant to CISA can be leveraged to help ensure liability protections when engaging in cyber threat information sharing with and amongst other non-federal government entities.


Copyright Owners' Putative Interests In Privacy, Reputation, And Control: A Reply To Goold, Wendy J. Gordon Jun 2017

Copyright Owners' Putative Interests In Privacy, Reputation, And Control: A Reply To Goold, Wendy J. Gordon

Faculty Scholarship

My own view is that Goold overstates the explanatory role of tort law. But even were that not the case, the courts need to reach some kind of “settled” understanding on these various interests before a cause of action is created or definitively rejected, and that no such consensus on the three matters mentioned yet exists, whether they are viewed as forms of tort or otherwise. Goold’s work may nevertheless be an important step toward reaching closure on these and other open questions in copyright law.


Check Yes For Checkpoints: Suspicionless Stops And Ramifications For Missouri Motorists, Conner Harris Jun 2017

Check Yes For Checkpoints: Suspicionless Stops And Ramifications For Missouri Motorists, Conner Harris

Missouri Law Review

One of the great advantages of living in a free society is the enjoyment of general privacy and freedom from unwarranted interference in one’s personal affairs. This advantage benefits citizens in both their private and public interactions. For example, it is expected one could drive to the store across town, the mall in a neighboring city, or somewhere on the other side of the country uninterrupted and unhindered. The Fourth Amendment to the United States Constitution codifies this privacy expectation as a right to be enjoyed by all within its reach. Specifically, the Fourth Amendment protects against “unreasonable searches and …


I Know What You Did Last Summer: A User’S Guide For Internet Investigations, Sean O'Brien, Quinn O'Brien Jun 2017

I Know What You Did Last Summer: A User’S Guide For Internet Investigations, Sean O'Brien, Quinn O'Brien

Faculty Works

Coauthored with licensed private investigator Quinn O'Brien, this article provides important ethical considerations, practice tips, and technical advice about the preparation, execution, preservation, and follow-up investigation of subjects using the Internet.


Copyright Owners' Putative Interests In Privacy, Reputation, And Control: A Reply To Goold - Draft - 05-15-2017, Wendy J. Gordon May 2017

Copyright Owners' Putative Interests In Privacy, Reputation, And Control: A Reply To Goold - Draft - 05-15-2017, Wendy J. Gordon

Scholarship Chronologically

Patrick Goold’s interesting new article, Unbundling the “Tort” of Copyright Infringement (“Unbundling”) centers on a key lack of clarity that Professor Goold perceives in the cause of action for copyright infringement. The lack of clarity, he argues, afflicts threshold definitions of what constitutes actionable copying.


Why New Hampshire Must Update Rape Shield Laws, Amy Vorenberg May 2017

Why New Hampshire Must Update Rape Shield Laws, Amy Vorenberg

Law Faculty Scholarship

[Excerpt] “Recent research indicates that New Hampshire has some of the highest rates of sexual assault in the nation; nearly one in four New Hampshire women and one in 20 New Hampshire men will experience sexual assault. Although reporting a crime can be hard for anyone, sexual assault victims have particular reasons for not reporting. After an assault, a rape victim typically feels embarrassment, shame and fears reprisal (most of these crimes are committed by an acquaintance). The deeply personal nature of rape makes it uniquely traumatizing and confusing.”


Ispy: Threats To Individual And Institutional Privacy In The Digital World, Lori Andrews May 2017

Ispy: Threats To Individual And Institutional Privacy In The Digital World, Lori Andrews

All Faculty Scholarship

What type of information is collected, who is viewing it, and what law librarians can do to protect their patrons and institutions.


The Expanding Scope Of Human Rights In A Technological World — Using The Interamerican Court Of Human Rights To Establish A Minimum Data Protection Standard Across Latin America, Josiah Wolfson May 2017

The Expanding Scope Of Human Rights In A Technological World — Using The Interamerican Court Of Human Rights To Establish A Minimum Data Protection Standard Across Latin America, Josiah Wolfson

University of Miami Inter-American Law Review

Privacy is a human right that many in the world do not enjoy. The failure of many countries to prioritize privacy through the passage and enforcement of comprehensive data protection laws has left their citizens vulnerable. The Inter-American Court of Human Rights should use its authority to set a minimum data protection standard for its Member States.

This Note discusses the historical development of data protection, the current data protection gap in Latin America, and proposes the role that the Inter-American Court of Human Rights should play in advancing a minimum data protection standard in the region.


The Market’S Law Of Privacy: Case Studies In Privacy/Security Adoption, Chetan Gupta May 2017

The Market’S Law Of Privacy: Case Studies In Privacy/Security Adoption, Chetan Gupta

Washington and Lee Law Review Online

This paper examines the hypothesis that it may be possible for individual actors in a marketplace to drive the adoption of particular privacy and security standards. It aims to explore the diffusion of privacy and security technologies in the marketplace. Using HTTPS, Two-Factor Authentication, and End-to-End Encryption as case studies, it tries to ascertain which factors are responsible for successful diffusion which improves the privacy of a large number of users. Lastly, it explores whether the FTC may view a widely diffused standard as a necessary security feature for all actors in a particular industry.

Based on the case studies …


Ispy: Threats To Individual And Institutional Privacy In The Digital World, Lori Andrews Apr 2017

Ispy: Threats To Individual And Institutional Privacy In The Digital World, Lori Andrews

Lori B. Andrews

What type of information is collected, who is viewing it, and what law librarians can do to protect their patrons and institutions.


A Comprehensive Analysis Of Roe V. Wade And Its Legality In Respect To Scientific And Christian Perspectives, Gabriella Morillo Apr 2017

A Comprehensive Analysis Of Roe V. Wade And Its Legality In Respect To Scientific And Christian Perspectives, Gabriella Morillo

Selected Honors Theses

This thesis is about the Supreme Court case Roe v. Wade and how the Court in Roe ruled a child as a “potential to life.” The Fifth and Fourteenth Amendments show that there is an expectation of privacy in regards to a woman and her doctor but it is questionable as to whether or not the expectation of privacy can cover the fetus in the womb. The question raised next is whether or not the woman has complete rights to the fetus and whether or not she can decide if the fetus has a right to live or not. Coming …


Privacy In The Age Of Autonomous Vehicles, Ivan L. Sucharski, Philip Fabinger Apr 2017

Privacy In The Age Of Autonomous Vehicles, Ivan L. Sucharski, Philip Fabinger

Washington and Lee Law Review Online

To prepare for the age of the intelligent, highly connected, and autonomous vehicle, a new approach to concepts of granting consent, managing privacy, and dealing with the need to interact quickly and meaningfully is needed. Additionally, in an environment where personal data is rapidly shared with a multitude of independent parties, there exists a need to reduce the information asymmetry that currently exists between the user and data collecting entities. This Article rethinks the traditional notice and consent model in the context of real-time communication between vehicles or vehicles and infrastructure or vehicles and other surroundings and proposes a re-engineering …


Female Autonomy: An Analysis Of Privacy And Equality Doctrine For Reproductive Rights, Elizabeth Levi Apr 2017

Female Autonomy: An Analysis Of Privacy And Equality Doctrine For Reproductive Rights, Elizabeth Levi

Political Science Honors Projects

What is the constitutional basis for women’s equality? Recently, scholars have suggested that as the right to privacy has floundered against the political undoing of women's access to abortion, equal protection arguments have grown stronger. This thesis investigates the feminist utility and limits of the equality and privacy arguments. Taking liberal feminism and feminist legal theory as analytical lenses, I offer interpretations of gender discrimination, reproductive rights, and marriage equality case law. By this framework, I argue that while an equality argument is less inherently oppressive towards women than the privacy doctrine, equality doctrine has been constructed thus far to …


Center For Rights And Justice Presents: The Constitutional Right Of Private Citizens To Video Record The Nypd In Public, Center For Rights And Justice (Crj) Apr 2017

Center For Rights And Justice Presents: The Constitutional Right Of Private Citizens To Video Record The Nypd In Public, Center For Rights And Justice (Crj)

Flyers 2016-2017

No abstract provided.


Death And Dignity, Michael Gardner Apr 2017

Death And Dignity, Michael Gardner

Brigham Young University Prelaw Review

This paper discusses the contemporary debate over physician-assisted suicide and focuses specifically on Oregon’s Death with Dignity Act. Because the majority of the states have yet to pass legislation on physician-assisted suicide, the greatest debate over the legality of euthanasia is yet to come. This paper addresses the arguments for and against physician-assisted suicide with the purpose of educating the reader regarding the social, moral and ethical consequences of allowing or denying its practice.


Legal Challenges Facing Unmanned Aerial Systems And Commercial Agriculture, Peggy Kirk Hall, Rusty Rumley Apr 2017

Legal Challenges Facing Unmanned Aerial Systems And Commercial Agriculture, Peggy Kirk Hall, Rusty Rumley

University of Arkansas at Little Rock Law Review

No abstract provided.


Searching Places Unknown: Law Enforcement Jurisdiction On The Dark Web, Ahmed Ghappour Apr 2017

Searching Places Unknown: Law Enforcement Jurisdiction On The Dark Web, Ahmed Ghappour

Faculty Scholarship

The use of hacking tools by law enforcement to pursue criminal suspects who have anonymized their communications on the dark web presents a looming flashpoint between criminal procedure and international law. Criminal actors who use the dark web (for instance, to commit crimes or to evade authorities) obscure digital footprints left behind with third parties, rendering existing surveillance methods obsolete. In response, law enforcement has implemented hacking techniques that deploy surveillance software over the Internet to directly access and control criminals’ devices. The practical reality of the underlying technologies makes it inevitable that foreign-located computers will be subject to remote …