Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Privacy Law (54)
- Constitutional Law (23)
- Internet Law (16)
- Law and Society (13)
- Health Law and Policy (12)
-
- Science and Technology Law (11)
- Intellectual Property Law (9)
- Fourth Amendment (7)
- Law and Gender (7)
- Civil Rights and Discrimination (6)
- Criminal Law (6)
- First Amendment (6)
- Legislation (6)
- Social and Behavioral Sciences (6)
- Civil Law (5)
- Computer Law (5)
- European Law (5)
- Labor and Employment Law (5)
- State and Local Government Law (5)
- Supreme Court of the United States (5)
- Fourteenth Amendment (4)
- Human Rights Law (4)
- Judges (4)
- Legal Profession (4)
- Administrative Law (3)
- Business (3)
- Common Law (3)
- Consumer Protection Law (3)
- Criminal Procedure (3)
- Institution
-
- Touro University Jacob D. Fuchsberg Law Center (6)
- Vanderbilt University Law School (6)
- Boston University School of Law (5)
- Georgetown University Law Center (5)
- Loyola University Chicago, School of Law (4)
-
- Northwestern Pritzker School of Law (4)
- Roger Williams University (3)
- Saint Louis University School of Law (3)
- University of Colorado Law School (3)
- University of Georgia School of Law (3)
- University of Washington School of Law (3)
- William & Mary Law School (3)
- Brigham Young University (2)
- Duquesne University (2)
- Pepperdine University (2)
- St. Mary's University (2)
- The Catholic University of America, Columbus School of Law (2)
- University of Baltimore Law (2)
- University of Massachusetts School of Law (2)
- University of New Hampshire (2)
- University of Pennsylvania Carey Law School (2)
- University of Pittsburgh School of Law (2)
- Chicago-Kent College of Law (1)
- Claremont Colleges (1)
- Cleveland State University (1)
- Duke Law (1)
- Emory University School of Law (1)
- Fordham Law School (1)
- George Washington University Law School (1)
- Loyola Marymount University and Loyola Law School (1)
- Publication
-
- Faculty Scholarship (7)
- Georgetown Law Faculty Publications and Other Works (5)
- Touro Law Review (5)
- All Faculty Scholarship (4)
- Vanderbilt Law School Faculty Publications (4)
-
- Faculty Publications & Other Works (3)
- Northwestern University Law Review (3)
- Publications (3)
- Washington Law Review (3)
- BYU Education & Law Journal (2)
- Duquesne Law Review (2)
- Journal of Intellectual Property Law (2)
- Law Faculty Scholarship (2)
- Saint Louis University Law Journal (2)
- Scholarly Works (2)
- School of Law Conferences, Lectures & Events (2)
- St. Mary's Law Journal (2)
- University of Massachusetts Law Review (2)
- Vanderbilt Journal of Entertainment & Technology Law (2)
- William & Mary Bill of Rights Journal (2)
- Articles (1)
- Book Chapters (1)
- CMC Senior Theses (1)
- Catholic University Journal of Law and Technology (1)
- Catholic University Law Review (1)
- Chicago-Kent Law Review (1)
- Cybaris® (1)
- Dissertations (1)
- Duke Journal of Constitutional Law & Public Policy Sidebar (1)
- Faculty Articles (1)
- Publication Type
Articles 1 - 30 of 97
Full-Text Articles in Law
Ferpa And State Open Records Laws: What The North Carolina Supreme Court Got Wrong In Dth Media Corp. V. Folt, And How Courts & Congress Can Take Measures To Reconcile Privacy And Access Interests, Danielle Siegel
Duke Journal of Constitutional Law & Public Policy Sidebar
Over the past few years, courts across the country have confronted a common scenario. Members of the public and media request records from a public university pertaining to its investigations of sexual assault and misconduct on campus. Then, media outlets contend they have a right to access these records under state open records laws. But the university claims that it cannot, or will not, disclose the records under the Family Educational Rights and Privacy Act of 1974 ("FERPA").
The media outlet then files suit to compel disclosure. This Note explores the competing privacy and access interests at stake in this …
"A Novel And Controversial Technology." Artificial Face Recognition, Privacy Protection, And Algorithm Bias In Europe, Andrea Pin
William & Mary Bill of Rights Journal
R (Bridges) v. Chief Constable of South Wales Police's Court of Appeals ruling... showcases the variety and the thickness of the legal, ethical, and political considerations that lie underneath the deployment of [Artificial Face Recognition]-based police tools and its ramification within Europe and beyond. More broadly, the topic of "[f]acial recognition technologies provide[s] a useful case study of the complex and unpredictable ways that norms of procedural fairness, equality, and privacy interact when the state deploys machine-learning tools to draw inferences from otherwise unilluminating data." This Article uses Bridges as a proxy to sketch out the main legal issues …
Seeking A Safe Harbor In A Widening Sea: Unpacking The Schrems Saga And What It Means For Transatlantic Relations And Global Cybersecurity, Scott J. Shackelford
Seeking A Safe Harbor In A Widening Sea: Unpacking The Schrems Saga And What It Means For Transatlantic Relations And Global Cybersecurity, Scott J. Shackelford
William & Mary Bill of Rights Journal
The Article is structured as follows. Part I examines Schrems I (Schrems v. Data Protection Commissioner) and the fall of the Safe Harbor regime. Part II analyzes Schrems II (Data Protection Commissioner v. Facebook & Max Schrems) along with the rise and fall of Privacy Shield. Part III focuses on opportunities to bridge the data governance divide and present a united front to help ensure a free, open, interoperable, secure, and resilient vision for cyberspace.
This abstract has been adapted from the author's introduction.
You Are Not A Commodity: A More Efficient Approach To Commercial Privacy Rights, Benjamin T. Pardue
You Are Not A Commodity: A More Efficient Approach To Commercial Privacy Rights, Benjamin T. Pardue
Washington Law Review
United States common law provides four torts for privacy invasion: (1) disclosure of private facts, (2) intrusion upon seclusion, (3) placement of a person in a false light, and (4) appropriation of name or likeness. Appropriation of name or likeness occurs when a defendant commandeers the plaintiff’s recognizability, typically for a commercial benefit. Most states allow plaintiffs who establish liability to recover defendants’ profits as damages from the misappropriation under an “unjust enrichment” theory. By contrast, this Comment argues that such an award provides a windfall to plaintiffs and contributes to suboptimal social outcomes. These include overcompensating plaintiffs and incentivizing …
Facing Injustice: How Face Recognition Technology May Increase The Incidence Of Misidentifications And Wrongful Convictions, Laura M. Moy
Facing Injustice: How Face Recognition Technology May Increase The Incidence Of Misidentifications And Wrongful Convictions, Laura M. Moy
Georgetown Law Faculty Publications and Other Works
Does law enforcement use of face recognition technology paired with eyewitness identifications increase the incidence of wrongful convictions in U.S. criminal law? This Article explores this critical question and posits that the answer may be yes. Facial recognition is frequently used by law enforcement agencies to help generate investigative leads that are then presented to eyewitnesses for positive identification. But erroneous eyewitness accounts are the number one cause of wrongful convictions, and the use of face recognition to generate investigative leads may create the conditions for erroneous eyewitness identifications to take place. This is because face recognition technology is designed …
Direct-To-Consumer Genetic Testing, Ellen W. Clayton, Et Al.
Direct-To-Consumer Genetic Testing, Ellen W. Clayton, Et Al.
Vanderbilt Law School Faculty Publications
Direct-to-consumer genetic testing is marketed as a tool to uncover ancestry and kin. Recent studies of actual and potential users have demonstrated that individuals’ responses to the use of these tests for these purposes are complex, with privacy, disruptive consequences, potential for misuse, and secondary use by law enforcement cited as potential concerns. We conducted six focus groups with a diverse sample of participants (n = 62) who were aware of but had not used direct-to-consumer genetic tests, in an effort to understand more about what people considering these tests think about the potential value, risks, and benefits of such …
Deepfake Privacy: Attitudes And Regulation, Matthew B. Kugler, Carly Pace
Deepfake Privacy: Attitudes And Regulation, Matthew B. Kugler, Carly Pace
Northwestern University Law Review
Using only a series of images of a person’s face and publicly available software, it is now possible to insert the person’s likeness into a video and show them saying or doing almost anything. This “deepfake” technology has permitted an explosion of political satire and, especially, fake pornography. Several states have already passed laws regulating deepfakes, and more are poised to do so. This Article presents three novel empirical studies that assess public attitudes toward this new technology. In our main study, a representative sample of the U.S. adult population perceived nonconsensually created pornographic deepfake videos as extremely harmful and …
Towards A Calibrated Trust-Based Approach To The Use Of Facial Recognition Technology, Gary Kok Yew Chan
Towards A Calibrated Trust-Based Approach To The Use Of Facial Recognition Technology, Gary Kok Yew Chan
Research Collection Yong Pung How School Of Law
The use of facial recognition technology has given rise to much debate relating to issues concerning privacy infringements, bias and inaccuracies of data and outputs, possibilities of covert use, the lack of data security and the problem of function creep. Certain states and jurisdictions have called for bans and moratoria on the use of facial recognition technology. This paper argues that a blanket ban on facial recognition technology would be overly precautionary without fully considering the wide range of uses and benefits of the innovation. To promote its acceptance, trust in facial recognition technology should be developed in a calibrated …
Menstrual Dignity And The Bar Exam, Margaret E. Johnson, Marcy L. Karin, Elizabeth Cooper
Menstrual Dignity And The Bar Exam, Margaret E. Johnson, Marcy L. Karin, Elizabeth Cooper
All Faculty Scholarship
This Article examines the issue of menstruation and the administration of the bar exam. Although such problems are not new, over the summer and fall of 2020, test takers and commentators took to social media to critique state board of law examiners’ (“BOLE”) policies regarding menstruation. These problems persist. Menstruators worry that if they unexpectedly bleed during the exam, they may not have access to appropriately sized and constructed menstrual products or may be prohibited from accessing the bathroom. Personal products that are permitted often must be carried in a clear, plastic bag. Some express privacy concerns that the see-through …
Alexa Hears With Her Little Ears—But Does She Have The Privilege?, Lauren Chlouber Howell
Alexa Hears With Her Little Ears—But Does She Have The Privilege?, Lauren Chlouber Howell
St. Mary's Law Journal
Abstract forthcoming.
Closing The Data Gap: Protecting Biometric Information Under The Biometric Information Privacy Act And The California Consumer Protection Act, Eva-Maria Ghelardi
Closing The Data Gap: Protecting Biometric Information Under The Biometric Information Privacy Act And The California Consumer Protection Act, Eva-Maria Ghelardi
St. John's Law Review
(Excerpt)
Between May and June of 2014, Stacy Rosenbach bought her son, Alexander, a Six Flags season pass online. She submitted Alexander’s personal information and read that Alexander would complete the sign-up process at the park. No details described what the sign-up process would entail.
After showing his online receipt at Six Flags, Alexander was brought to an office to provide the customary thumb scan. Alexander’s thumb scan, along with the season pass card, was required to permit him to enter the various rides. He was not given any information about how his thumb scan would be stored or used …
Pure Privacy, Jeffrey Bellin
Pure Privacy, Jeffrey Bellin
Northwestern University Law Review
In 1890, Samuel Warren and Louis Brandeis began a storied legal tradition of trying to conceptualize privacy. Since that time, privacy’s appeal has grown beyond those authors’ wildest expectations, but its essence remains elusive. One of the rare points of agreement in boisterous academic privacy debates is that there is no consensus on what privacy means.
The modern trend is to embrace the ambiguity. Unable to settle on boundaries, scholars welcome a broad array of interests into an expanding theoretical framework. As a result, privacy is invoked in debates about COVID-19 contact tracing, police body cameras, marriage equality, facial recognition, …
Comparative Limitations On Abortions: The United States Supreme Court V. The European Court Of Human Rights, Sunaya Padmanabhan
Comparative Limitations On Abortions: The United States Supreme Court V. The European Court Of Human Rights, Sunaya Padmanabhan
Northwestern Journal of Law & Social Policy
This Note compares the balancing tests implemented by the United States Supreme Court and the European Court of Human Rights to determine the legal status of abortion within their jurisdictions. This Note will argue that the Supreme Court’s balancing test better protects a woman’s legal path to an abortion because it A) limits states’ restrictions to specific categories and B) regulates the extent to which states can restrict a woman’s pre-viability abortion.
This Note will also examine the ways in which each court’s abortion jurisprudence substantively restricts a woman’s ability to obtain an abortion, even where legal avenues to the …
Liberty And Health, Frank Griffin
Liberty And Health, Frank Griffin
University of Arkansas at Little Rock Law Review
Liberty is the essence of human nature and is necessary for optimal health. During the COVID-19 pandemic, the government placed unprecedented restrictions on personal liberty in the name of public health, confining millions of Americans to their homes, forcing hundreds of thousands of businesses and parks to close, shuttering abortion clinics, heavily regulating churches, monitoring gatherings in private homes, restricting interstate travel, and shifting disease burdens onto protected populations. Personal liberty is sustenance for individual health. Medical principles of patient autonomy, patient privacy, and social justice are closely related to legal concepts of personal liberty, the liberty of constitutional privacy, …
Contested Sovereignties: States, Media Platforms, Peoples, And The Regulation Of Media Content And Big Data In The Networked Society, Pascale Chapdelaine, Jaqueline Mcleod Rogers
Contested Sovereignties: States, Media Platforms, Peoples, And The Regulation Of Media Content And Big Data In The Networked Society, Pascale Chapdelaine, Jaqueline Mcleod Rogers
Law Publications
This article examines the legal and normative foundations of media content regulation in the borderless networked society. We explore the extent to which internet undertakings should be subject to state regulation, in light of Canada’s ongoing debates and legislative reform. We bring a cross-disciplinary perspective (from the subject fields of law; communications studies, in particular McLuhan’s now classic probes; international relations; and technology studies) to enable both policy and language analysis. We apply the concept of sovereignty to states (national cultural and digital sovereignty), media platforms (transnational sovereignty), and citizens (autonomy and personal data sovereignty) to examine the competing dynamics …
Personal Data Privacy And Protective Federal Legislation: An Exploration Of Constituent Position On The Need For Legislation To Control Data Reliant Organizations Collecting And Monetizing Internet-Obtained Personal Data, Giovanni De Meo
Dissertations
In the past twenty years, the business of online personal data collection has grown at the same rapid pace as the internet itself, fostering a multibillion-dollar personal data collection and commercialization industry. Unlike many other large industries, there has been no major federal legislation enacted to monitor or control the activities of organizations dealing in this flourishing industry. The combination of these factors together with the lack of prior research encouraged this research designed to understand how much voters know about this topic and whether there is interest in seeing legislation enacted to protect individual personal data privacy.
To address …
23rd Annual Open Government Summit: Access To Public Records Act, Open Meetings Act Powerpoint Presentation 07-30-2021, Office Of Attorney General State Of Rhode Island, Peter F. Neronha
23rd Annual Open Government Summit: Access To Public Records Act, Open Meetings Act Powerpoint Presentation 07-30-2021, Office Of Attorney General State Of Rhode Island, Peter F. Neronha
School of Law Conferences, Lectures & Events
No abstract provided.
23rd Annual Open Government Summit: Attorney General State Of Rhode Island : Access To Public Records Act & Open Meetings Act July 30, 2021, Office Of The Attorney General State Of Rhode Island
23rd Annual Open Government Summit: Attorney General State Of Rhode Island : Access To Public Records Act & Open Meetings Act July 30, 2021, Office Of The Attorney General State Of Rhode Island
School of Law Conferences, Lectures & Events
No abstract provided.
Private Lives At Home And Public Lives In Court: Protecting The Privacy Of Federal Judges' Home Addresses, Hannah Elias Sbaity
Private Lives At Home And Public Lives In Court: Protecting The Privacy Of Federal Judges' Home Addresses, Hannah Elias Sbaity
Journal of Intellectual Property Law
Targeted murders of federal judges and their families at their private homes date back to May 29, 1979. Most recently, in July 2020, Judge Esther Salas’s only son, Daniel, was murdered and her husband near-fatally shot at their home. Individuals wishing to inflict such harm or death at federal judges’ homes have been able to do so because of federal judges’ publicly available home addresses. Because personally identifying information (PII) is defined differently from statute to statute, home addresses largely remain public information in most states and can be found in real estate records, data broker websites, social media platforms, …
A Deep Dive Into Technical Encryption Concepts To Better Understand Cybersecurity & Data Privacy Legal & Policy Issues, Anthony Volini
A Deep Dive Into Technical Encryption Concepts To Better Understand Cybersecurity & Data Privacy Legal & Policy Issues, Anthony Volini
Journal of Intellectual Property Law
Lawyers wishing to exercise a meaningful degree of leadership at the intersection of technology and the law could benefit greatly from a deep understanding of the use and application of encryption, considering it arises in so many legal scenarios. For example, in FTC v. Wyndham1 the defendant failed to implement nearly every conceivable cybersecurity control, including lack of encryption for stored data, resulting in multiple data breaches and a consequent FTC enforcement action for unfair and deceptive practices. Other examples of legal issues requiring use of encryption and other technology concepts include compliance with security requirements of GLBA & HIPAA, …
Privacy Vs. Transparency: Handling Protected Materials In Agency Rulemaking, Christopher S. Yoo, Kellen Mccoy
Privacy Vs. Transparency: Handling Protected Materials In Agency Rulemaking, Christopher S. Yoo, Kellen Mccoy
Indiana Law Journal
Agencies conducting informal rulemaking proceedings increasingly confront conflicting duties with respect to protected materials included in information submitted in public rulemaking dockets. They must reconcile the broad commitment to openness and transparency reflected in federal law with the duty to protect confidential business information (CBI) and personally identifiable information (PII) against improper disclosure.
This Article presents an analysis of how agencies can best balance these often countervailing considerations. Part I explores the statutory duties to disclose and withhold information submitted in public rulemaking dockets placed on agencies. It also examines judicial decisions and other legal interpretations regarding the proper way …
Perils Of The Reverse Silver Platter Under U.S. Border Patrol Operations, D. Anthony
Perils Of The Reverse Silver Platter Under U.S. Border Patrol Operations, D. Anthony
University of Massachusetts Law Review
In the face of expanding U.S. Border Patrol operations across the country, that agency often acquires evidence during its searches that is unrelated to immigration or other federal crimes but may involve state crimes. States are then faced with the question of whether to accept such evidence for state prosecutions when it was lawfully obtained by federal agents consistent with federal law but in violation of the state’s own search and seizure provisions. Sometimes referred to as “reverse silver platter” evidence, states have come to widely varying conclusions as to the admissibility of federally obtained evidence that would clearly have …
Biometric Data Regulation And The Right Of Publicity: A Path To Regaining Autonomy Over Our Commodified Identity, Lisa Raimondi
Biometric Data Regulation And The Right Of Publicity: A Path To Regaining Autonomy Over Our Commodified Identity, Lisa Raimondi
University of Massachusetts Law Review
This Note explores how a right of publicity action might be used to address present day concerns regarding biometric data ownership rights where an individual’s likeness can essentially be bought and sold. As social networking and use of the internet has grown, so has the opportunity for people to engage with others and share their lives. However, that opportunity also comes with risk. More and more, people are required to accept the terms of use and privacy policies detailing how their biometric data will be collected and stored if they want to download and use certain technological applications. Most of …
Freedom Of Expression V. Social Responsibility On The Internet: Vivi Down Association V. Google, Raphael Cohen-Almagor, Natalina Stamile
Freedom Of Expression V. Social Responsibility On The Internet: Vivi Down Association V. Google, Raphael Cohen-Almagor, Natalina Stamile
Seattle Journal of Technology, Environmental & Innovation Law
The aim of the article is to reflect on Google’s social responsibility by analyzing a milestone court decision, Vivi Down Association v. Google, that took place in Italy, involving the posting of an offensive video clip on Google Video. It was a landmark decision because it refuted the assertion that the Internet knows no boundaries, that the Internet transcends national laws due to its international nature, and that Internet intermediaries, such as Google, are above the law. This case shows that when the legal authorities of a given country decide to assert their jurisdiction, Internet companies need to abide by …
The Commercialization Of Crime Solving: Ethical Implication Of Forensic Genetic Genealogy, Hannah Lee
The Commercialization Of Crime Solving: Ethical Implication Of Forensic Genetic Genealogy, Hannah Lee
Honors Theses
With the advancement of DNA technology and expansion of direct-to-consumer DNA services, a growing number of cold cases have been solved using a revolutionary new investigative method: familial DNA mapping. While the technique has been lauded by law enforcement as revolutionizing criminal identification, others are concerned by the privacy implications and impact on the family structure. In this thesis I will draw on communitarian, liberal rights, utilitarian, and social justice arguments for and against the practice. I conclude that this method has the potential to increase security and provide justice for victims and families, but absent comprehensive regulation and privacy …
Discussing Privacy In Sec Subpoena Practice After Carpenter V. United States, William A. Ballentine
Discussing Privacy In Sec Subpoena Practice After Carpenter V. United States, William A. Ballentine
Chicago-Kent Law Review
No abstract provided.
The Fourth Amendment Stripped Bare: Substantiating Prisoners' Reasonable Right To Bodily Privacy, Meher Babbar
The Fourth Amendment Stripped Bare: Substantiating Prisoners' Reasonable Right To Bodily Privacy, Meher Babbar
Northwestern University Law Review
Prisoners’ rights to bodily privacy under the Fourth Amendment are limited, allowing detention officials to strip-search them for contraband. The extent to which the Fourth Amendment protects prisoners, however, is uncertain. Questions regarding whether strip searches require reasonable suspicion and the manner in which officials may conduct strip searches have troubled courts for decades. In the absence of clear guidance from the Supreme Court, courts have reached inconsistent conclusions, imperiling the human rights and dignity of prisoners. This Note argues that courts should define and apply prisoners’ rights to bodily privacy with reference to international human-rights law, specifically the United …
Periods For Profit And The Rise Of Menstrual Surveillance, Michele E. Gilman
Periods For Profit And The Rise Of Menstrual Surveillance, Michele E. Gilman
All Faculty Scholarship
Menstruation is being monetized and surveilled, with the voluntary participation of millions of women. Thousands of downloadable apps promise to help women monitor their periods and manage their fertility. These apps are part of the broader, multi-billion dollar, Femtech industry, which sells technology to help women understand and improve their health. Femtech is marketed with the language of female autonomy and feminist empowerment. Despite this rhetoric, Femtech is part of a broader business strategy of data extraction, in which companies are extracting people’s personal data for profit, typically without their knowledge or meaningful consent. Femtech can oppress menstruators in several …
Bitcoin Searches And Preserving The Third-Party Doctrine, Christine A. Cortez
Bitcoin Searches And Preserving The Third-Party Doctrine, Christine A. Cortez
St. Mary's Law Journal
Abstract forthcoming.
The Internet Never Forgets: Student Journalists Meet The "Right To Be Forgotten", Emily R. Feek
The Internet Never Forgets: Student Journalists Meet The "Right To Be Forgotten", Emily R. Feek
WWU Honors College Senior Projects
This study examines how journalists at college publications handle unpublishing requests in the context of United States media law, the European Union's Right to be Forgotten and journalistic ethics. Interviews with student editors at Washington state public universities' student newspapers were used to examine how student publications address requests for information or entire articles to be unpublished and what those editors' attitudes toward unpublishing are. This research reveals that this subset of student journalists tended to favor alternatives to unpublishing, although articles could be removed ethically in some select cases, and a lack of consistent guidelines regarding how to manage …