Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Privacy Law (78)
- Internet Law (27)
- Constitutional Law (23)
- Fourth Amendment (21)
- Science and Technology Law (18)
-
- Computer Law (13)
- Law and Society (13)
- Social and Behavioral Sciences (13)
- Criminal Law (11)
- First Amendment (10)
- Intellectual Property Law (9)
- Computer Sciences (8)
- Physical Sciences and Mathematics (8)
- Information Security (7)
- National Security Law (7)
- Consumer Protection Law (6)
- Air and Space Law (5)
- Civil Rights and Discrimination (5)
- Communications Law (5)
- Criminal Procedure (5)
- Health Law and Policy (5)
- Human Rights Law (5)
- Communication (4)
- Comparative and Foreign Law (4)
- Law and Politics (4)
- Legal History (4)
- Legislation (4)
- Torts (4)
- Administrative Law (3)
- Institution
-
- Selected Works (11)
- University of Oklahoma College of Law (10)
- Boston University School of Law (6)
- Roger Williams University (5)
- University of Colorado Law School (5)
-
- William & Mary Law School (4)
- American University Washington College of Law (3)
- Georgetown University Law Center (3)
- Loyola Marymount University and Loyola Law School (3)
- New York Law School (3)
- University of Arkansas at Little Rock William H. Bowen School of Law (3)
- University of Massachusetts School of Law (3)
- University of Richmond (3)
- Cleveland State University (2)
- Embry-Riddle Aeronautical University (2)
- Maurer School of Law: Indiana University (2)
- Nova Southeastern University (2)
- Schulich School of Law, Dalhousie University (2)
- Southern Methodist University (2)
- St. John's University School of Law (2)
- University of Florida Levin College of Law (2)
- University of Maine School of Law (2)
- University of Miami Law School (2)
- University of Michigan Law School (2)
- University of Missouri-Kansas City School of Law (2)
- University of New Hampshire (2)
- University of Pittsburgh School of Law (2)
- University of South Carolina (2)
- University of Washington School of Law (2)
- Vanderbilt University Law School (2)
- Publication
-
- Oklahoma Journal of Law and Technology (10)
- Faculty Publications (7)
- Faculty Scholarship (6)
- Articles (5)
- Publications (4)
-
- Articles & Chapters (3)
- Georgetown Law Faculty Publications and Other Works (3)
- Life of the Law School (1993- ) (3)
- Loyola of Los Angeles Law Review (3)
- Samantha Barbas (3)
- University of Arkansas at Little Rock Law Review (3)
- All Faculty Scholarship (2)
- Articles in Law Reviews & Other Academic Journals (2)
- Articles, Book Chapters, & Popular Press (2)
- Cleveland State Law Review (2)
- Faculty Works (2)
- Journal of Digital Forensics, Security and Law (2)
- Law Faculty Scholarship (2)
- Maine Law Review (2)
- Nova Law Review (2)
- South Carolina Law Review (2)
- Teresa A. Miller (2)
- UF Law Faculty Publications (2)
- University of Richmond Law Review (2)
- Vanderbilt Journal of Entertainment & Technology Law (2)
- Washington and Lee Law Review Online (2)
- William & Mary Bill of Rights Journal (2)
- American University Law Review (1)
- Articles by Maurer Faculty (1)
- Brian Larson (1)
- Publication Type
Articles 31 - 60 of 123
Full-Text Articles in Law
Data Collection And The Regulatory State, Ahmed Ghappour
Data Collection And The Regulatory State, Ahmed Ghappour
Faculty Scholarship
The following remarks were given on January 27, 2017 during the Connecticut Law Review’s symposium, “Privacy, Security & Power: The State of Digital Surveillance.” Hillary Greene, the Zephaniah Swift Professor of Law at the University of Connecticut School of Law, offered introductory remarks and moderated the panel. The panel included Dr. Cooper, Associate Professor of Law and Director of the Program on Economics & Privacy at Antonin Scalia Law School at George Mason University, Professor Ghappour, Visiting Assistant Professor at UC Hastings College of the Law, Attorney Lieber, Senior Privacy Policy Counsel at Google, and Dr. Wu, Professor of Law …
Comments To The Federal Trade Commission On The Can-Spam Rule Review, 16 C.F.R. Part 316, Project No. R711010, Roger Allan Ford
Comments To The Federal Trade Commission On The Can-Spam Rule Review, 16 C.F.R. Part 316, Project No. R711010, Roger Allan Ford
Law Faculty Scholarship
These comments respond to the Federal Trade Commission’s request for public comment on the CAN-SPAM Rule, 16 C.F.R. Part 316.
The CAN-SPAM Act set a minimum baseline for consumer protections that senders of unsolicited commercial email must respect. These protections have been largely effective at giving consumers the ability to manage how a large group of companies uses their email addresses for marketing. At the same time, the Act has had little effect on the volume of unsolicited commercial email or on the amount of email sent by scammers and fraudsters. The Act and its implementing Rule, then, have been …
Brief Of Scholars Of The History And Original Meaning Of The Fourth Amendment As Amici Curiae In Support Of Petitioner, Margaret Hu
Briefs
No abstract provided.
Digital Effects: The Fourth Amendment And Computer Searches Warrants, Ash Moore
Digital Effects: The Fourth Amendment And Computer Searches Warrants, Ash Moore
Oklahoma Journal of Law and Technology
No abstract provided.
The Sky Is Not Falling: An Analysis Of The National Strategy For Trusted Identities In Cyberspace And The Proposed Identity Ecosystem, Aaron L. Jackson
The Sky Is Not Falling: An Analysis Of The National Strategy For Trusted Identities In Cyberspace And The Proposed Identity Ecosystem, Aaron L. Jackson
Oklahoma Journal of Law and Technology
No abstract provided.
We Need To Talk About Police Disciplinary Records, Kate Levine
We Need To Talk About Police Disciplinary Records, Kate Levine
Faculty Publications
In March 2017, an employee of New York’s Civilian Complaint Review Board leaked the disciplinary record of Daniel Pantaleo to the media. Pantaleo, the police officer who choked Eric Garner to death in the video that went public and horrified many citizens, is under federal investigation after a Staten Island grand jury refused to indict him for Garner’s death. Legal Aid Society attorneys had unsuccessfully sought the release of his records in the courts for years. The leak of his records is the public face of an important but rarely discussed issue facing police, legislators, judges, lawyers, and scholars who …
Global Cybersecurity, Surveillance, And Privacy: The Obama Administration's Conflicted Legacy, Peter Margulies
Global Cybersecurity, Surveillance, And Privacy: The Obama Administration's Conflicted Legacy, Peter Margulies
Indiana Journal of Global Legal Studies
To analyze the Obama administration's cyber efforts, this Article proposes a paradigm of stewardship with both discursive and structural dimensions. Discursive stewardship refers to the Executive's openness to dialogue with other stakeholders. Structural stewardship refers to the domestic and transnational distribution of decisional authority, including checks and balances that guard against the excesses of unilateral action. The Article concludes that the Obama administration made substantial progress in each of these realms. However, the outsized role of law enforcement agendas and dearth of clearly articulated checks on transnational surveillance drove headwinds that limited forward movement.
19th Annual Open Government Summit: Access To Public Records Act & Open Meetings Act, 2017, Department Of Attorney General, State Of Rhode Island
19th Annual Open Government Summit: Access To Public Records Act & Open Meetings Act, 2017, Department Of Attorney General, State Of Rhode Island
School of Law Conferences, Lectures & Events
No abstract provided.
The Outer Limits: Imsi-Catchers, Technology, And The Future Of The Fourth Amendment, Ryan C. Chapman
The Outer Limits: Imsi-Catchers, Technology, And The Future Of The Fourth Amendment, Ryan C. Chapman
Pepperdine Law Review
Recent advances in technology are posing new challenges for a legal system based on decades-old precedent. Nowhere is this more apparent than in law enforcement’s warrantless use of IMSI Catchers. These devices mimic a cell phone tower, and when the device is activated, cell phones will naturally connect to them. Law enforcement officers can use those intercepted cell phone signals to track a suspect’s movements in real time with startling accuracy. Scholarly commentary on these devices has largely concluded that their use requires a warrant. This Comment engages in a close examination of Fourth Amendment precedent and argues that, as …
The Freedom From Sexploitation Agenda: Policy And Legislative Recommendations To Curb Sexual Exploitation, Dawn Hawkins
The Freedom From Sexploitation Agenda: Policy And Legislative Recommendations To Curb Sexual Exploitation, Dawn Hawkins
Dignity: A Journal of Analysis of Exploitation and Violence
No abstract provided.
The Doctor Requirement: Griswold, Privacy, And At-Home Reproductive Care, Yvonne F. Lindgren
The Doctor Requirement: Griswold, Privacy, And At-Home Reproductive Care, Yvonne F. Lindgren
Faculty Works
Supreme Court privacy jurisprudence has traditionally offered greater protection to activities when exercised within the home. This is true in common law as well as across a broad range of constitutional claims. For example, common law privacy identifies the home as a location of solitude and repose, often conceptualized as the “right to be let alone.” Speech, or the right to be free of unwanted messages, is enhanced when the claimant is within the confines of her or his home. Fourth Amendment protections against search and seizure and the notion of the reasonable expectation of privacy are enhanced when the …
Judicial Oversight Of Interception Of Communications In The United Kingdom: An Historical And Comparative Analysis, David G. Barnum
Judicial Oversight Of Interception Of Communications In The United Kingdom: An Historical And Comparative Analysis, David G. Barnum
Georgia Journal of International & Comparative Law
No abstract provided.
Privacy And The Alaska Constitution: Failing To Fulfill The Promise, Erwin Chemerinsky
Privacy And The Alaska Constitution: Failing To Fulfill The Promise, Erwin Chemerinsky
Erwin Chemerinsky
No abstract provided.
Automating Threat Sharing: How Companies Can Best Ensure Liability Protection When Sharing Cyber Threat Information With Other Companies Or Organizations, Ari Schwartz, Sejal C. Shah, Matthew H. Mackenzie, Sheena Thomas, Tara Sugiyama Potashnik, Bri Law
Automating Threat Sharing: How Companies Can Best Ensure Liability Protection When Sharing Cyber Threat Information With Other Companies Or Organizations, Ari Schwartz, Sejal C. Shah, Matthew H. Mackenzie, Sheena Thomas, Tara Sugiyama Potashnik, Bri Law
University of Michigan Journal of Law Reform
This Article takes an in-depth look at the evolution of cybersecurity information sharing legislation, leading to the recent passage of the Cybersecurity Information Sharing Act (CISA) and offers insights into how automated information sharing mechanisms and associated requirements implemented pursuant to CISA can be leveraged to help ensure liability protections when engaging in cyber threat information sharing with and amongst other non-federal government entities.
Copyright Owners' Putative Interests In Privacy, Reputation, And Control: A Reply To Goold, Wendy J. Gordon
Copyright Owners' Putative Interests In Privacy, Reputation, And Control: A Reply To Goold, Wendy J. Gordon
Faculty Scholarship
My own view is that Goold overstates the explanatory role of tort law. But even were that not the case, the courts need to reach some kind of “settled” understanding on these various interests before a cause of action is created or definitively rejected, and that no such consensus on the three matters mentioned yet exists, whether they are viewed as forms of tort or otherwise. Goold’s work may nevertheless be an important step toward reaching closure on these and other open questions in copyright law.
Check Yes For Checkpoints: Suspicionless Stops And Ramifications For Missouri Motorists, Conner Harris
Check Yes For Checkpoints: Suspicionless Stops And Ramifications For Missouri Motorists, Conner Harris
Missouri Law Review
One of the great advantages of living in a free society is the enjoyment of general privacy and freedom from unwarranted interference in one’s personal affairs. This advantage benefits citizens in both their private and public interactions. For example, it is expected one could drive to the store across town, the mall in a neighboring city, or somewhere on the other side of the country uninterrupted and unhindered. The Fourth Amendment to the United States Constitution codifies this privacy expectation as a right to be enjoyed by all within its reach. Specifically, the Fourth Amendment protects against “unreasonable searches and …
I Know What You Did Last Summer: A User’S Guide For Internet Investigations, Sean O'Brien, Quinn O'Brien
I Know What You Did Last Summer: A User’S Guide For Internet Investigations, Sean O'Brien, Quinn O'Brien
Faculty Works
Coauthored with licensed private investigator Quinn O'Brien, this article provides important ethical considerations, practice tips, and technical advice about the preparation, execution, preservation, and follow-up investigation of subjects using the Internet.
Copyright Owners' Putative Interests In Privacy, Reputation, And Control: A Reply To Goold - Draft - 05-15-2017, Wendy J. Gordon
Copyright Owners' Putative Interests In Privacy, Reputation, And Control: A Reply To Goold - Draft - 05-15-2017, Wendy J. Gordon
Scholarship Chronologically
Patrick Goold’s interesting new article, Unbundling the “Tort” of Copyright Infringement (“Unbundling”) centers on a key lack of clarity that Professor Goold perceives in the cause of action for copyright infringement. The lack of clarity, he argues, afflicts threshold definitions of what constitutes actionable copying.
Why New Hampshire Must Update Rape Shield Laws, Amy Vorenberg
Why New Hampshire Must Update Rape Shield Laws, Amy Vorenberg
Law Faculty Scholarship
[Excerpt] “Recent research indicates that New Hampshire has some of the highest rates of sexual assault in the nation; nearly one in four New Hampshire women and one in 20 New Hampshire men will experience sexual assault. Although reporting a crime can be hard for anyone, sexual assault victims have particular reasons for not reporting. After an assault, a rape victim typically feels embarrassment, shame and fears reprisal (most of these crimes are committed by an acquaintance). The deeply personal nature of rape makes it uniquely traumatizing and confusing.”
Ispy: Threats To Individual And Institutional Privacy In The Digital World, Lori Andrews
Ispy: Threats To Individual And Institutional Privacy In The Digital World, Lori Andrews
All Faculty Scholarship
What type of information is collected, who is viewing it, and what law librarians can do to protect their patrons and institutions.
The Expanding Scope Of Human Rights In A Technological World — Using The Interamerican Court Of Human Rights To Establish A Minimum Data Protection Standard Across Latin America, Josiah Wolfson
University of Miami Inter-American Law Review
Privacy is a human right that many in the world do not enjoy. The failure of many countries to prioritize privacy through the passage and enforcement of comprehensive data protection laws has left their citizens vulnerable. The Inter-American Court of Human Rights should use its authority to set a minimum data protection standard for its Member States.
This Note discusses the historical development of data protection, the current data protection gap in Latin America, and proposes the role that the Inter-American Court of Human Rights should play in advancing a minimum data protection standard in the region.
The Market’S Law Of Privacy: Case Studies In Privacy/Security Adoption, Chetan Gupta
The Market’S Law Of Privacy: Case Studies In Privacy/Security Adoption, Chetan Gupta
Washington and Lee Law Review Online
This paper examines the hypothesis that it may be possible for individual actors in a marketplace to drive the adoption of particular privacy and security standards. It aims to explore the diffusion of privacy and security technologies in the marketplace. Using HTTPS, Two-Factor Authentication, and End-to-End Encryption as case studies, it tries to ascertain which factors are responsible for successful diffusion which improves the privacy of a large number of users. Lastly, it explores whether the FTC may view a widely diffused standard as a necessary security feature for all actors in a particular industry.
Based on the case studies …
Ispy: Threats To Individual And Institutional Privacy In The Digital World, Lori Andrews
Ispy: Threats To Individual And Institutional Privacy In The Digital World, Lori Andrews
Lori B. Andrews
A Comprehensive Analysis Of Roe V. Wade And Its Legality In Respect To Scientific And Christian Perspectives, Gabriella Morillo
A Comprehensive Analysis Of Roe V. Wade And Its Legality In Respect To Scientific And Christian Perspectives, Gabriella Morillo
Selected Honors Theses
This thesis is about the Supreme Court case Roe v. Wade and how the Court in Roe ruled a child as a “potential to life.” The Fifth and Fourteenth Amendments show that there is an expectation of privacy in regards to a woman and her doctor but it is questionable as to whether or not the expectation of privacy can cover the fetus in the womb. The question raised next is whether or not the woman has complete rights to the fetus and whether or not she can decide if the fetus has a right to live or not. Coming …
Privacy In The Age Of Autonomous Vehicles, Ivan L. Sucharski, Philip Fabinger
Privacy In The Age Of Autonomous Vehicles, Ivan L. Sucharski, Philip Fabinger
Washington and Lee Law Review Online
To prepare for the age of the intelligent, highly connected, and autonomous vehicle, a new approach to concepts of granting consent, managing privacy, and dealing with the need to interact quickly and meaningfully is needed. Additionally, in an environment where personal data is rapidly shared with a multitude of independent parties, there exists a need to reduce the information asymmetry that currently exists between the user and data collecting entities. This Article rethinks the traditional notice and consent model in the context of real-time communication between vehicles or vehicles and infrastructure or vehicles and other surroundings and proposes a re-engineering …
Female Autonomy: An Analysis Of Privacy And Equality Doctrine For Reproductive Rights, Elizabeth Levi
Female Autonomy: An Analysis Of Privacy And Equality Doctrine For Reproductive Rights, Elizabeth Levi
Political Science Honors Projects
What is the constitutional basis for women’s equality? Recently, scholars have suggested that as the right to privacy has floundered against the political undoing of women's access to abortion, equal protection arguments have grown stronger. This thesis investigates the feminist utility and limits of the equality and privacy arguments. Taking liberal feminism and feminist legal theory as analytical lenses, I offer interpretations of gender discrimination, reproductive rights, and marriage equality case law. By this framework, I argue that while an equality argument is less inherently oppressive towards women than the privacy doctrine, equality doctrine has been constructed thus far to …
Center For Rights And Justice Presents: The Constitutional Right Of Private Citizens To Video Record The Nypd In Public, Center For Rights And Justice (Crj)
Center For Rights And Justice Presents: The Constitutional Right Of Private Citizens To Video Record The Nypd In Public, Center For Rights And Justice (Crj)
Flyers 2016-2017
No abstract provided.
Death And Dignity, Michael Gardner
Death And Dignity, Michael Gardner
Brigham Young University Prelaw Review
This paper discusses the contemporary debate over physician-assisted suicide and focuses specifically on Oregon’s Death with Dignity Act. Because the majority of the states have yet to pass legislation on physician-assisted suicide, the greatest debate over the legality of euthanasia is yet to come. This paper addresses the arguments for and against physician-assisted suicide with the purpose of educating the reader regarding the social, moral and ethical consequences of allowing or denying its practice.
Legal Challenges Facing Unmanned Aerial Systems And Commercial Agriculture, Peggy Kirk Hall, Rusty Rumley
Legal Challenges Facing Unmanned Aerial Systems And Commercial Agriculture, Peggy Kirk Hall, Rusty Rumley
University of Arkansas at Little Rock Law Review
No abstract provided.
Searching Places Unknown: Law Enforcement Jurisdiction On The Dark Web, Ahmed Ghappour
Searching Places Unknown: Law Enforcement Jurisdiction On The Dark Web, Ahmed Ghappour
Faculty Scholarship
The use of hacking tools by law enforcement to pursue criminal suspects who have anonymized their communications on the dark web presents a looming flashpoint between criminal procedure and international law. Criminal actors who use the dark web (for instance, to commit crimes or to evade authorities) obscure digital footprints left behind with third parties, rendering existing surveillance methods obsolete. In response, law enforcement has implemented hacking techniques that deploy surveillance software over the Internet to directly access and control criminals’ devices. The practical reality of the underlying technologies makes it inevitable that foreign-located computers will be subject to remote …