Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Privacy Law (36)
- Science and Technology Law (24)
- Internet Law (14)
- Fourth Amendment (13)
- Intellectual Property Law (13)
-
- International Law (13)
- Computer Law (9)
- Health Law and Policy (9)
- Constitutional Law (8)
- Law and Gender (8)
- Law and Society (8)
- Communications Law (6)
- National Security Law (6)
- State and Local Government Law (6)
- Civil Procedure (5)
- Family Law (5)
- Legislation (5)
- Social and Behavioral Sciences (5)
- Business Organizations Law (4)
- Civil Law (4)
- Comparative and Foreign Law (4)
- Criminal Procedure (4)
- Education Law (4)
- Human Rights Law (4)
- International Trade Law (4)
- Law and Economics (4)
- Military, War, and Peace (4)
- Other Law (4)
- Supreme Court of the United States (4)
- Institution
-
- American University Washington College of Law (8)
- Vanderbilt University Law School (5)
- Boston University School of Law (4)
- Florida International University College of Law (4)
- George Washington University Law School (3)
-
- Marquette University Law School (3)
- Maurer School of Law: Indiana University (3)
- William & Mary Law School (3)
- Fordham Law School (2)
- Mitchell Hamline School of Law (2)
- Roger Williams University (2)
- SJ Quinney College of Law, University of Utah (2)
- The Catholic University of America, Columbus School of Law (2)
- University of Miami Law School (2)
- University of Washington School of Law (2)
- American Dental Association (1)
- Bridgewater College (1)
- Butler University (1)
- Claremont Colleges (1)
- Cleveland State University (1)
- Columbia Law School (1)
- DePaul University (1)
- Florida A&M University College of Law (1)
- Georgetown University Law Center (1)
- Institute of Social Sciences, TOYO University (1)
- Mississippi State University (1)
- National Law School of India University (1)
- Northern Illinois University (1)
- Northwestern Pritzker School of Law (1)
- Pace University (1)
- Publication
-
- Faculty Scholarship (6)
- FIU Law Review (4)
- American University National Security Law Brief (3)
- Articles (3)
- Faculty Publications (3)
-
- GW Law Faculty Publications & Other Works (3)
- Joint PIJIP/TLS Research Paper Series (3)
- Marquette Intellectual Property & Innovation Law Review (3)
- Vanderbilt Journal of Entertainment & Technology Law (3)
- Catholic University Journal of Law and Technology (2)
- IP Theory (2)
- Mitchell Hamline Law Review (2)
- School of Law Conferences, Lectures & Events (2)
- Vanderbilt Law School Faculty Publications (2)
- "Dharmasisya” Jurnal Program Magister Hukum FHUI (1)
- American University Law Review (1)
- Arkansas Law Review (1)
- Articles by Maurer Faculty (1)
- Articles in Law Reviews & Other Academic Journals (1)
- Book Chapters (1)
- CGU Theses & Dissertations (1)
- DePaul Journal of Art, Technology & Intellectual Property Law (1)
- Emancipations: A Journal of Critical Social Analysis (1)
- Fordham Journal of Corporate & Financial Law (1)
- Georgetown Law Faculty Publications and Other Works (1)
- Global Business Law Review (1)
- Graduate Scholarship and Professional Work (1)
- Honors Projects (1)
- Indian Journal of Law and Technology (1)
- Japanese Society and Culture (1)
- Publication Type
Articles 1 - 30 of 78
Full-Text Articles in Law
Fintech Lending In India: Taking Stock Of Implications For Privacy And Autonomy, Vidushi Marda, Amber Sinha
Fintech Lending In India: Taking Stock Of Implications For Privacy And Autonomy, Vidushi Marda, Amber Sinha
Indian Journal of Law and Technology
In the last five years, the Fintech sector has thrived in India, with Machine Learning (ML) driven credit scoring based on alternative data, emerging as a growing segment. The credit scoring industry in India needs to be viewed in light of a careful examination of rights, inclusion, appropriate safeguards and discrimination, currently missing from the discourse and practices. In this paper, we explain how ML-based credit scoring works, and the regulatory and commercial factors that have enabled and impeded its growth in India. Through legal and technological analysis, richened by insights from qualitative interviews with entrepreneurs and practitioners, we provide …
Our Changing Reality: The Metaverse And The Importance Of Privacy Regulations In The United States, Anushkay Raza
Our Changing Reality: The Metaverse And The Importance Of Privacy Regulations In The United States, Anushkay Raza
Global Business Law Review
This Note discusses the legal and pressing digital challenges that arise in connection with the growing use of virtual reality, and more specifically, the metaverse. As this digital realm becomes more integrated into our daily lives, the United States should look towards creating a federal privacy law that protects fundamental individual privacy rights. This Note argues that congress should emulate the European Union's privacy regulations, and further, balances the potential consequences and benefits of adapting European regulations within the United Sates. Finally, this Note provides drafting considerations of future lawyers who will not only be dealing with the rise of …
Defragging Feminist Cyberlaw, Amanda Levendowski
Defragging Feminist Cyberlaw, Amanda Levendowski
Georgetown Law Faculty Publications and Other Works
In 1996, Judge Frank Easterbrook famously observed that any effort to create a field called cyberlaw would be “doomed to be shallow and miss unifying principles.” He was wrong, but not for the reason other scholars have stated. Feminism is a unifying principle of cyberlaw, which alternately amplifies and abridges the feminist values of consent, safety, and accessibility. Cyberlaw simply hasn’t been understood that way—until now.
In computer science, “defragging” means bringing together disparate pieces of data so they are easier to access. Inspired by that process, this Article offers a new approach to cyberlaw that illustrates how feminist values …
Breaking The Fourth's Wall: The Implications Of Remote Education For Students' Fourth Amendment Rights, Sallie Hatfield
Breaking The Fourth's Wall: The Implications Of Remote Education For Students' Fourth Amendment Rights, Sallie Hatfield
Vanderbilt Journal of Entertainment & Technology Law
As the COVID-19 pandemic forced both public K-12 and higher education institutions to transition to exclusively provide remote education, students’ homes and personal lives were exposed to the government like never before. Zoom classes and remote proctoring were suddenly the norm. Students and their families scrambled to create appropriate offices and classroom spaces in their homes, and many awkward and invasive scenarios soon followed. While many may have been harmlessly captured on camera, like classes that witness a student’s family eating lunch in the background or a dog on the couch, even these harmless instances have insidious implications for the …
Privacy And National Politics: Fingerprint And Dna Litigation In Japan And The United States Compared, Dongsheng Zang
Privacy And National Politics: Fingerprint And Dna Litigation In Japan And The United States Compared, Dongsheng Zang
Pace Law Review
No abstract provided.
Direct To Consumer Or Direct To All: Home Dna Tests And Lack Of Privacy Regulations In The United States, Karen J. Kukla
Direct To Consumer Or Direct To All: Home Dna Tests And Lack Of Privacy Regulations In The United States, Karen J. Kukla
IP Theory
Although the U.S. has some measures of privacy protection for genetic data, the lack of a comprehensive approach to protecting direct-to-consumer genetic testing results in privacy violations for both consumers and their relatives. This essay explores the critical need for the U.S. government to address these privacy violations and argues that the U.S. should approach the problem and strategize a solution similar to the European Union’s (EU) General Data Protection Regulation (GDPR). Part I identifies current United States law, both federal and state regulations that address DTC-GT and genetic privacy. Part II examines the lack of regulation surrounding current DTC-GT …
Wrong Search At The Wrong Time: Keyword Search Warrants And The Fourth Amendment, Nicole Chan
Wrong Search At The Wrong Time: Keyword Search Warrants And The Fourth Amendment, Nicole Chan
Articles
This Note will advocate for the view that when presented with the issue, state and federal courts should establish that keyword search warrants are unconstitutional because they violate the Fourth Amendment. Keyword search warrants cannot meet the Fourth Amendment’s requirements of probable cause and particularity because the subjects of the search cannot be identified until after the search is completed. These warrants are unnecessary and have the potential of implicating millions of internet users who have no connection to a crime. This Note will contend that individuals have a reasonable expectation of privacy in their search history data, and that …
Continuous Reproductive Surveillance, Michael Ulrich, Leah R. Fowler
Continuous Reproductive Surveillance, Michael Ulrich, Leah R. Fowler
Faculty Scholarship
The Dobbs opinion emphasizes that the state’s interest in the fetus extends to “all stages of development.” This essay briefly explores whether state legislators, agencies, and courts could use the “all stages of development” language to expand reproductive surveillance by using novel developments in consumer health technologies to augment those efforts.
Keep Your Fingerprints To Yourself: New York Needs A Biometric Privacy Law, Brendan Mcnerney
Keep Your Fingerprints To Yourself: New York Needs A Biometric Privacy Law, Brendan Mcnerney
St. John's Law Review
(Excerpt)
Imagine walking into a store, picking something up, and just walking out. No longer is this shoplifting, it is legal. In 2016, Amazon introduced their “Just Walk Out” technology in Seattle. “Just Walk Out” uses cameras located throughout the store to monitor shoppers, document what they pick up, and automatically charge that shoppers’ Amazon account when they leave the store. Recently, Amazon started selling “Just Walk Out” technology to other retailers. Since then, retailers have become increasingly interested in collecting and using customers’ “biometric identifiers and information.” Generally, “biometrics” is used to refer to “measurable human biological and behavioral …
Two Visions Of Digital Sovereignty, Sujit Raman
Two Visions Of Digital Sovereignty, Sujit Raman
Joint PIJIP/TLS Research Paper Series
No abstract provided.
A Trusted Framework For Cross-Border Data Flows, Alex Joel
A Trusted Framework For Cross-Border Data Flows, Alex Joel
Joint PIJIP/TLS Research Paper Series
The German Marshall Fund of the United States (GMF), in cooperation with the Tech, Law and Security Program (TLS) of the American University Washington College of Law, and with support from Microsoft, convened a Global Taskforce to Promote Trusted Sharing of Data comprising experts from civil society, academia, and industry to submit proposals for harmonizing approaches to global data use and sharing. Former US Ambassador to the Organisation for Economic Co-operation and Development (OECD) and GMF Distinguished Fellow Karen Kornbluh and Microsoft Chief Privacy Officer and Corporate Vice President Julie Brill co-chaired the taskforce; TLS Senior Project Director Alex Joel …
Valuing Social Data, Amanda Parsons, Salomé Viljoen
Valuing Social Data, Amanda Parsons, Salomé Viljoen
Law & Economics Working Papers
Social data production is a unique form of value creation that characterizes informational capitalism. Social data production also presents critical challenges for the various legal regimes that are encountering it. This Article provides legal scholars and policymakers with the tools to comprehend this new form of value creation through two descriptive contributions. First, it presents a theoretical account of social data, a mode of production which is cultivated and exploited for two distinct (albeit related) forms of value: prediction value and exchange value. Second, it creates and defends a taxonomy of three “scripts” that companies follow to build up and …
Are Handguns A Matter Of Privacy?, Bret N. Bogenschneider
Are Handguns A Matter Of Privacy?, Bret N. Bogenschneider
St. Mary's Law Journal
The thesis developed in this Article is that the Heller and Bruen cases involved primarily right-to-privacy concerns. By its terms, the Second Amendment involves the collective right to bear Arms in connection to regulated militia service and does not mention handguns. Handguns were not “ordinary military weapons” employed by a militia at the time of the American revolution under the originalist view. The Ninth and Fourteenth Amendments are more appropriate sources for an individual privacy right related to the possession of handguns for private purposes, such as for self-defense or suicide. However, a prohibition of handguns under this approach would …
J Mich Dent Assoc August 2023
The Journal of the Michigan Dental Association
Every month, The Journal of the Michigan Dental Association brings news, information, and features about Michigan dentistry to our state's oral health community and the MDA's 6,200+ members. No publication reaches more Michigan dentists!
In this issue, the reader will find the following original content:
- A cover story on new dentist’s perceptions of professionalism.
- A feature on legal considerations when addressing employee wellness.
- A feature on the meaning of wellness by ADA Trustee Dr. Brett Kessler.
- Practice guidance on conducting a HIPAA security risk analysis.
- Commentary “The New Golden Age of Dentistry.”
- Editorial and regular department articles on MDA Foundation …
Office Of Attorney General Peter F. Neronha, Attorney General: Access To Public Records Act, Open Meetings Act, Attorney General, State Of Rhode Island, Roger Williams University School Of Law
Office Of Attorney General Peter F. Neronha, Attorney General: Access To Public Records Act, Open Meetings Act, Attorney General, State Of Rhode Island, Roger Williams University School Of Law
School of Law Conferences, Lectures & Events
No abstract provided.
25th Annual Open Government Summit: Your Guide To The Access To Public Records Act & Open Meetings Act, Peter F. Neronha, Roger Williams University School Of Law
25th Annual Open Government Summit: Your Guide To The Access To Public Records Act & Open Meetings Act, Peter F. Neronha, Roger Williams University School Of Law
School of Law Conferences, Lectures & Events
No abstract provided.
Encouraging Public Access To Pharmaceuticals Through Modified Protection Of Clinical Trial Data, Scott M. Nolan Ii
Encouraging Public Access To Pharmaceuticals Through Modified Protection Of Clinical Trial Data, Scott M. Nolan Ii
IP Theory
Part I of this Article investigates the development of pharmaceuticals and clinical trial data with a focus on patent and data protection. Part II evaluates the effects of protection and the challenges it poses to widespread public pharmaceutical access. Part III discusses two scholarly approaches to the public access issue that focus on clinical data protection and their associated challenges. In light of these scholarly works, Part IV suggests a new approach to clinical trial data protection that aims to improve public pharmaceutical access while maintaining the incentives to invent for drug developers.
Administrative Regulation Of Programmatic Policing: Why "Leaders Of A Beautiful Struggle" Is Both Right And Wrong, Christopher Slobogin
Administrative Regulation Of Programmatic Policing: Why "Leaders Of A Beautiful Struggle" Is Both Right And Wrong, Christopher Slobogin
Vanderbilt Law School Faculty Publications
In Leaders of a Beautiful Struggle v. Baltimore Police Department, the Fourth Circuit Court of Appeals held that Aerial Investigation Research (AIR), Baltimore's aerial surveillance program, violated the Fourth Amendment because it was not authorized by a warrant. AIR was constitutionaly problematic, but not for the reason given by the Fourth Circuit. AIR, like many other technologically-enhanced policing programs that rely on closed-circuit television (CCTV), automated license plate readers and the like, involves the collection and retention of information about huge numbers ofpeople. Because individualized suspicion does not exist with respect to any of these people's information, an individual-specific warrant …
The United States Should Take A Page Out Of Canadian Law When It Comes To Privacy, Genetic And Otherwise, Ashley Rahaim
The United States Should Take A Page Out Of Canadian Law When It Comes To Privacy, Genetic And Otherwise, Ashley Rahaim
University of Miami Inter-American Law Review
Genetic information is intimate and telling data warranting privacy in public and private realms. The privacy protections offered in the United States and Canada vastly differ when it comes to genetic privacy. Search and seizure law mirrors the privacy gap in the countries, as well as their treatment of DNA database information.
This note explores the foreshadowing of the creation of genetic privacy laws and their varying levels of protection based on the way private information was treated by state actors through search and seizure caselaw, the creation of legal precedent, and the treatment of intimate personal data in the …
National Telecommunications And Information Administration: Comments From Researchers At Boston University And The University Of Chicago, Ran Canetti, Aloni Cohen, Chris Conley, Mark Crovella, Stacey Dogan, Marco Gaboardi, Woodrow Hartzog, Rory Van Loo, Christopher Robertson, Katharine B. Silbaugh
National Telecommunications And Information Administration: Comments From Researchers At Boston University And The University Of Chicago, Ran Canetti, Aloni Cohen, Chris Conley, Mark Crovella, Stacey Dogan, Marco Gaboardi, Woodrow Hartzog, Rory Van Loo, Christopher Robertson, Katharine B. Silbaugh
Faculty Scholarship
These comments were composed by an interdisciplinary group of legal, computer science, and data science faculty and researchers at Boston University and the University of Chicago. This group collaborates on research projects that grapple with the legal, policy, and ethical implications of the use of algorithms and digital innovation in general, and more specifically regarding the use of online platforms, machine learning algorithms for classification, prediction, and decision making, and generative AI. Specific areas of expertise include the functionality and impact of recommendation systems; the development of Privacy Enhancing Technologies (PETs) and their relationship to privacy and data security laws; …
Femtechnodystopia, Leah R. Fowler, Michael Ulrich
Femtechnodystopia, Leah R. Fowler, Michael Ulrich
Faculty Scholarship
Reproductive rights, as we have long understood them, are dead. But at the same time history seems to be moving backward, technology moves relentlessly forward. Femtech products, a category of consumer technology addressing an array of “female” health needs, seem poised to fill gaps created by states and stakeholders eager to limit birth control and abortion access and increase pregnancy surveillance and fetal rights. Period and fertility tracking applications could supplement or replace other contraception. Early digital alerts to missed periods can improve the chances of obtaining a legal abortion in states with ever-shrinking windows of availability or prompt behavioral …
Asking For It: Gendered Dimensions Of Surveillance Capitalism, Jessica Rizzo
Asking For It: Gendered Dimensions Of Surveillance Capitalism, Jessica Rizzo
Emancipations: A Journal of Critical Social Analysis
Advertising and privacy were once seen as mutually antagonistic. In the 1950s and 1960s, Americans went to court to fight for their right to be free from the invasion of privacy presented by unwanted advertising, but a strange realignment took place in the 1970s. Radical feminists were among those who were extremely concerned about the collection and computerization of personal data—they worried about private enterprise getting a hold of that data and using it to target women—but liberal feminists went in a different direction, making friends with advertising because they saw it as strategically valuable.
Liberal feminists argued that in …
Aclu V. Clearview Ai, Inc.,, Isra Ahmed
Aclu V. Clearview Ai, Inc.,, Isra Ahmed
DePaul Journal of Art, Technology & Intellectual Property Law
No abstract provided.
On The Danger Of Not Understanding Technology, Fredric I. Lederer
On The Danger Of Not Understanding Technology, Fredric I. Lederer
Popular Media
No abstract provided.
Are Third Parties Creating A Loophole For Police Investigations?, Alexandria N. Short
Are Third Parties Creating A Loophole For Police Investigations?, Alexandria N. Short
Northern Illinois Law Review Supplement
This article discusses the current case law and statutory law related to the privacy of information collected by third parties. At times, we see the private sector and law enforcement working together to solve crimes. However, that may not always be a good thing. This article offers a solution to these problems of uncertainty by suggesting a uniform code to regulate the private sector, or, in the alternative, a change to the Fourth Amendment that encompasses a more modern interpretation of the information that law enforcement should have access to.
Necessity, Proportionality, And Executive Order 14086, Alex Joel
Necessity, Proportionality, And Executive Order 14086, Alex Joel
Joint PIJIP/TLS Research Paper Series
No abstract provided.
A Game Theoretic Approach To Balance Privacy Risks And Familial Benefits, Ellen W. Clayton, Jia Guo, Murat Kantarcioglu, Et Al.
A Game Theoretic Approach To Balance Privacy Risks And Familial Benefits, Ellen W. Clayton, Jia Guo, Murat Kantarcioglu, Et Al.
Vanderbilt Law School Faculty Publications
As recreational genomics continues to grow in its popularity, many people are afforded the opportunity to share their genomes in exchange for various services, including third-party interpretation (TPI) tools, to understand their predisposition to health problems and, based on genome similarity, to find extended family members. At the same time, these services have increasingly been reused by law enforcement to track down potential criminals through family members who disclose their genomic information. While it has been observed that many potential users shy away from such data sharing when they learn that their privacy cannot be assured, it remains unclear how …
Confused About Copyright?, Sara Anne Hook
Confused About Copyright?, Sara Anne Hook
Graduate Scholarship and Professional Work
No abstract provided.
Who Owns Data? Constitutional Division In Cyberspace, Dongsheng Zang
Who Owns Data? Constitutional Division In Cyberspace, Dongsheng Zang
Articles
Privacy emerged as a concern as soon as the internet became commercial. In early 1995, Lawrence Lessig warned that the internet, though giving us extraordinary potential, was “not designed to protect individuals against this extraordinary potential for others to abuse.” The same technology can “destroy the very essence of what now defines individuality.” Lessig urged that “a constitutional balance will have to be drawn between these increasingly important interests in privacy, and the competing interest in collective security.” Lessig envisioned that creating property rights in data would help individuals by giving them control of their data. As utopian as property …
A Loaded God Complex: The Unconstitutionality Of The Executive Branch’S Unilaterally Withholding Zero-Days, Brendan Gilligan
A Loaded God Complex: The Unconstitutionality Of The Executive Branch’S Unilaterally Withholding Zero-Days, Brendan Gilligan
Northwestern Journal of Technology and Intellectual Property
No abstract provided.