Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Privacy Law (833)
- Constitutional Law (363)
- Internet Law (344)
- Science and Technology Law (282)
- Fourth Amendment (271)
-
- Computer Law (211)
- Law and Society (178)
- Criminal Law (164)
- Intellectual Property Law (164)
- First Amendment (162)
- Health Law and Policy (134)
- Social and Behavioral Sciences (132)
- Criminal Procedure (129)
- Communications Law (118)
- Civil Rights and Discrimination (97)
- Legislation (84)
- State and Local Government Law (81)
- International Law (79)
- Labor and Employment Law (68)
- National Security Law (67)
- Supreme Court of the United States (67)
- Consumer Protection Law (65)
- Law and Gender (63)
- Administrative Law (62)
- Comparative and Foreign Law (62)
- Law Enforcement and Corrections (61)
- Evidence (58)
- Human Rights Law (53)
- Torts (53)
- Institution
-
- Selected Works (229)
- SelectedWorks (115)
- Boston University School of Law (114)
- Fordham Law School (110)
- University of Michigan Law School (92)
-
- Vanderbilt University Law School (84)
- Maurer School of Law: Indiana University (52)
- American University Washington College of Law (47)
- George Washington University Law School (44)
- Touro University Jacob D. Fuchsberg Law Center (44)
- University of Maryland Francis King Carey School of Law (43)
- Roger Williams University (42)
- University of Colorado Law School (42)
- Duke Law (41)
- Schulich School of Law, Dalhousie University (41)
- Pepperdine University (39)
- Georgetown University Law Center (35)
- University of Pennsylvania Carey Law School (34)
- William & Mary Law School (30)
- University of Florida Levin College of Law (29)
- Cornell University Law School (28)
- New York Law School (28)
- Chicago-Kent College of Law (27)
- University of Washington School of Law (27)
- University of Miami Law School (26)
- University of South Carolina (25)
- Seattle University School of Law (24)
- University of Massachusetts School of Law (23)
- BLR (22)
- Cleveland State University (21)
- Publication
-
- Faculty Scholarship (173)
- Faculty Publications (66)
- All Faculty Scholarship (53)
- Articles (51)
- GW Law Faculty Publications & Other Works (44)
-
- Fordham Law Review (42)
- Touro Law Review (41)
- Publications (36)
- Georgetown Law Faculty Publications and Other Works (35)
- Vanderbilt Journal of Entertainment & Technology Law (32)
- UF Law Faculty Publications (29)
- Journal Articles (26)
- Articles, Book Chapters, & Popular Press (25)
- Pepperdine Law Review (25)
- Vanderbilt Law Review (25)
- Michigan Telecommunications & Technology Law Review (24)
- Fordham Intellectual Property, Media and Entertainment Law Journal (23)
- Michigan Law Review (23)
- School of Law Conferences, Lectures & Events (23)
- Articles by Maurer Faculty (22)
- ExpressO (22)
- Vanderbilt Law School Faculty Publications (21)
- Seattle University Law Review (20)
- Articles in Law Reviews & Other Academic Journals (19)
- Scholarly Works (19)
- Articles & Chapters (18)
- South Carolina Law Review (17)
- Chicago-Kent Law Review (16)
- Fordham Urban Law Journal (16)
- Stephen E Henderson (16)
- Publication Type
Articles 31 - 60 of 2225
Full-Text Articles in Law
Valuing Social Data, Amanda Parsons, Salomé Viljoen
Valuing Social Data, Amanda Parsons, Salomé Viljoen
Law & Economics Working Papers
Social data production is a unique form of value creation that characterizes informational capitalism. Social data production also presents critical challenges for the various legal regimes that are encountering it. This Article provides legal scholars and policymakers with the tools to comprehend this new form of value creation through two descriptive contributions. First, it presents a theoretical account of social data, a mode of production which is cultivated and exploited for two distinct (albeit related) forms of value: prediction value and exchange value. Second, it creates and defends a taxonomy of three “scripts” that companies follow to build up and …
Are Handguns A Matter Of Privacy?, Bret N. Bogenschneider
Are Handguns A Matter Of Privacy?, Bret N. Bogenschneider
St. Mary's Law Journal
The thesis developed in this Article is that the Heller and Bruen cases involved primarily right-to-privacy concerns. By its terms, the Second Amendment involves the collective right to bear Arms in connection to regulated militia service and does not mention handguns. Handguns were not “ordinary military weapons” employed by a militia at the time of the American revolution under the originalist view. The Ninth and Fourteenth Amendments are more appropriate sources for an individual privacy right related to the possession of handguns for private purposes, such as for self-defense or suicide. However, a prohibition of handguns under this approach would …
J Mich Dent Assoc August 2023
The Journal of the Michigan Dental Association
Every month, The Journal of the Michigan Dental Association brings news, information, and features about Michigan dentistry to our state's oral health community and the MDA's 6,200+ members. No publication reaches more Michigan dentists!
In this issue, the reader will find the following original content:
- A cover story on new dentist’s perceptions of professionalism.
- A feature on legal considerations when addressing employee wellness.
- A feature on the meaning of wellness by ADA Trustee Dr. Brett Kessler.
- Practice guidance on conducting a HIPAA security risk analysis.
- Commentary “The New Golden Age of Dentistry.”
- Editorial and regular department articles on MDA Foundation …
Office Of Attorney General Peter F. Neronha, Attorney General: Access To Public Records Act, Open Meetings Act, Attorney General, State Of Rhode Island, Roger Williams University School Of Law
Office Of Attorney General Peter F. Neronha, Attorney General: Access To Public Records Act, Open Meetings Act, Attorney General, State Of Rhode Island, Roger Williams University School Of Law
School of Law Conferences, Lectures & Events
No abstract provided.
25th Annual Open Government Summit: Your Guide To The Access To Public Records Act & Open Meetings Act, Peter F. Neronha, Roger Williams University School Of Law
25th Annual Open Government Summit: Your Guide To The Access To Public Records Act & Open Meetings Act, Peter F. Neronha, Roger Williams University School Of Law
School of Law Conferences, Lectures & Events
No abstract provided.
Encouraging Public Access To Pharmaceuticals Through Modified Protection Of Clinical Trial Data, Scott M. Nolan Ii
Encouraging Public Access To Pharmaceuticals Through Modified Protection Of Clinical Trial Data, Scott M. Nolan Ii
IP Theory
Part I of this Article investigates the development of pharmaceuticals and clinical trial data with a focus on patent and data protection. Part II evaluates the effects of protection and the challenges it poses to widespread public pharmaceutical access. Part III discusses two scholarly approaches to the public access issue that focus on clinical data protection and their associated challenges. In light of these scholarly works, Part IV suggests a new approach to clinical trial data protection that aims to improve public pharmaceutical access while maintaining the incentives to invent for drug developers.
Administrative Regulation Of Programmatic Policing: Why "Leaders Of A Beautiful Struggle" Is Both Right And Wrong, Christopher Slobogin
Administrative Regulation Of Programmatic Policing: Why "Leaders Of A Beautiful Struggle" Is Both Right And Wrong, Christopher Slobogin
Vanderbilt Law School Faculty Publications
In Leaders of a Beautiful Struggle v. Baltimore Police Department, the Fourth Circuit Court of Appeals held that Aerial Investigation Research (AIR), Baltimore's aerial surveillance program, violated the Fourth Amendment because it was not authorized by a warrant. AIR was constitutionaly problematic, but not for the reason given by the Fourth Circuit. AIR, like many other technologically-enhanced policing programs that rely on closed-circuit television (CCTV), automated license plate readers and the like, involves the collection and retention of information about huge numbers ofpeople. Because individualized suspicion does not exist with respect to any of these people's information, an individual-specific warrant …
The United States Should Take A Page Out Of Canadian Law When It Comes To Privacy, Genetic And Otherwise, Ashley Rahaim
The United States Should Take A Page Out Of Canadian Law When It Comes To Privacy, Genetic And Otherwise, Ashley Rahaim
University of Miami Inter-American Law Review
Genetic information is intimate and telling data warranting privacy in public and private realms. The privacy protections offered in the United States and Canada vastly differ when it comes to genetic privacy. Search and seizure law mirrors the privacy gap in the countries, as well as their treatment of DNA database information.
This note explores the foreshadowing of the creation of genetic privacy laws and their varying levels of protection based on the way private information was treated by state actors through search and seizure caselaw, the creation of legal precedent, and the treatment of intimate personal data in the …
National Telecommunications And Information Administration: Comments From Researchers At Boston University And The University Of Chicago, Ran Canetti, Aloni Cohen, Chris Conley, Mark Crovella, Stacey Dogan, Marco Gaboardi, Woodrow Hartzog, Rory Van Loo, Christopher Robertson, Katharine B. Silbaugh
National Telecommunications And Information Administration: Comments From Researchers At Boston University And The University Of Chicago, Ran Canetti, Aloni Cohen, Chris Conley, Mark Crovella, Stacey Dogan, Marco Gaboardi, Woodrow Hartzog, Rory Van Loo, Christopher Robertson, Katharine B. Silbaugh
Faculty Scholarship
These comments were composed by an interdisciplinary group of legal, computer science, and data science faculty and researchers at Boston University and the University of Chicago. This group collaborates on research projects that grapple with the legal, policy, and ethical implications of the use of algorithms and digital innovation in general, and more specifically regarding the use of online platforms, machine learning algorithms for classification, prediction, and decision making, and generative AI. Specific areas of expertise include the functionality and impact of recommendation systems; the development of Privacy Enhancing Technologies (PETs) and their relationship to privacy and data security laws; …
Femtechnodystopia, Leah R. Fowler, Michael Ulrich
Femtechnodystopia, Leah R. Fowler, Michael Ulrich
Faculty Scholarship
Reproductive rights, as we have long understood them, are dead. But at the same time history seems to be moving backward, technology moves relentlessly forward. Femtech products, a category of consumer technology addressing an array of “female” health needs, seem poised to fill gaps created by states and stakeholders eager to limit birth control and abortion access and increase pregnancy surveillance and fetal rights. Period and fertility tracking applications could supplement or replace other contraception. Early digital alerts to missed periods can improve the chances of obtaining a legal abortion in states with ever-shrinking windows of availability or prompt behavioral …
Asking For It: Gendered Dimensions Of Surveillance Capitalism, Jessica Rizzo
Asking For It: Gendered Dimensions Of Surveillance Capitalism, Jessica Rizzo
Emancipations: A Journal of Critical Social Analysis
Advertising and privacy were once seen as mutually antagonistic. In the 1950s and 1960s, Americans went to court to fight for their right to be free from the invasion of privacy presented by unwanted advertising, but a strange realignment took place in the 1970s. Radical feminists were among those who were extremely concerned about the collection and computerization of personal data—they worried about private enterprise getting a hold of that data and using it to target women—but liberal feminists went in a different direction, making friends with advertising because they saw it as strategically valuable.
Liberal feminists argued that in …
Aclu V. Clearview Ai, Inc.,, Isra Ahmed
Aclu V. Clearview Ai, Inc.,, Isra Ahmed
DePaul Journal of Art, Technology & Intellectual Property Law
No abstract provided.
On The Danger Of Not Understanding Technology, Fredric I. Lederer
On The Danger Of Not Understanding Technology, Fredric I. Lederer
Popular Media
No abstract provided.
Are Third Parties Creating A Loophole For Police Investigations?, Alexandria N. Short
Are Third Parties Creating A Loophole For Police Investigations?, Alexandria N. Short
Northern Illinois Law Review Supplement
This article discusses the current case law and statutory law related to the privacy of information collected by third parties. At times, we see the private sector and law enforcement working together to solve crimes. However, that may not always be a good thing. This article offers a solution to these problems of uncertainty by suggesting a uniform code to regulate the private sector, or, in the alternative, a change to the Fourth Amendment that encompasses a more modern interpretation of the information that law enforcement should have access to.
Necessity, Proportionality, And Executive Order 14086, Alex Joel
Necessity, Proportionality, And Executive Order 14086, Alex Joel
Joint PIJIP/TLS Research Paper Series
No abstract provided.
A Game Theoretic Approach To Balance Privacy Risks And Familial Benefits, Ellen W. Clayton, Jia Guo, Murat Kantarcioglu, Et Al.
A Game Theoretic Approach To Balance Privacy Risks And Familial Benefits, Ellen W. Clayton, Jia Guo, Murat Kantarcioglu, Et Al.
Vanderbilt Law School Faculty Publications
As recreational genomics continues to grow in its popularity, many people are afforded the opportunity to share their genomes in exchange for various services, including third-party interpretation (TPI) tools, to understand their predisposition to health problems and, based on genome similarity, to find extended family members. At the same time, these services have increasingly been reused by law enforcement to track down potential criminals through family members who disclose their genomic information. While it has been observed that many potential users shy away from such data sharing when they learn that their privacy cannot be assured, it remains unclear how …
Confused About Copyright?, Sara Anne Hook
Confused About Copyright?, Sara Anne Hook
Graduate Scholarship and Professional Work
No abstract provided.
Who Owns Data? Constitutional Division In Cyberspace, Dongsheng Zang
Who Owns Data? Constitutional Division In Cyberspace, Dongsheng Zang
Articles
Privacy emerged as a concern as soon as the internet became commercial. In early 1995, Lawrence Lessig warned that the internet, though giving us extraordinary potential, was “not designed to protect individuals against this extraordinary potential for others to abuse.” The same technology can “destroy the very essence of what now defines individuality.” Lessig urged that “a constitutional balance will have to be drawn between these increasingly important interests in privacy, and the competing interest in collective security.” Lessig envisioned that creating property rights in data would help individuals by giving them control of their data. As utopian as property …
A Loaded God Complex: The Unconstitutionality Of The Executive Branch’S Unilaterally Withholding Zero-Days, Brendan Gilligan
A Loaded God Complex: The Unconstitutionality Of The Executive Branch’S Unilaterally Withholding Zero-Days, Brendan Gilligan
Northwestern Journal of Technology and Intellectual Property
No abstract provided.
Privacy And Property: Constitutional Concerns Of Dna Dragnet Testing, E. Wyatt Jones
Privacy And Property: Constitutional Concerns Of Dna Dragnet Testing, E. Wyatt Jones
Honors Projects
DNA dragnets have attracted both public and scholarly criticisms that have yet to be resolved by the Courts. This review will introduce a modern understanding of DNA analysis, a complete introduction to past and present Fourth and Fourteenth Amendment jurisprudence, and existing suggestions concerning similar issues in legal scholarship. Considering these contexts, this review concludes that a focus on privacy and property at once, with a particular sensitivity to the inseverable relationship between the two interests, is Constitutionally consistent with precedent and the most workable means of answering the question at hand.
Pandemics And The Protection Of Privacy And Personal Information: Issues Concerning The Restriction On The Right To Privacy In Emergencies, Fumio Shimpo
Japanese Society and Culture
This article focuses on issues which need to be considered in aiming to ensure both the effectiveness of infectious disease control measures and the protection of the right to privacy from the following perspectives.
(1) Issues regarding the restriction of the right to privacy in emergency situations, including (i) the types of measures taken in emergency situations and issues with respect to the restriction of the right to privacy in emergency situations, (ii) the normalisation, constancy and fixation of exceptional measures in emergency situations, (iii) dual-use and use for purposes different from those originally intended, (iv) acquisition of secondary information …
Standing Up To Hackers: Article Iii Standing For Victims Of Data Breaches, Kendall Coffey
Standing Up To Hackers: Article Iii Standing For Victims Of Data Breaches, Kendall Coffey
University of Miami Law Review
Despite the increasing amount of data breaches, there is no liability for parties who do not adequately protect victim’s information. In federal court, plaintiffs must show that their injury was concrete, particularized, and imminent. But, when plaintiffs’ information has been stolen, but not yet criminally used, they may be unable to establish a right to relief. Victims face challenges when seeking damage for this future harm, because despite their destroyed privacy, they may not have evidence of a perpetrator’s actual misuse of purloined data. This Article analyzes multiple court decisions, generally in the setting of class-actions, and discusses outcomes of …
The Data Trust Solution To Data Sharing Problems, Kimberly A. Houser, John W. Bagby
The Data Trust Solution To Data Sharing Problems, Kimberly A. Houser, John W. Bagby
Vanderbilt Journal of Entertainment & Technology Law
A small number of large companies hold most of the world’s data. Once in the hands of these companies, data subjects have little control over the use and sharing of their data. Additionally, this data is not generally available to small and medium enterprises or organizations who seek to use it for social good. A number of solutions have been proposed to limit Big Tech “power,” including antitrust actions and stricter privacy laws, but these measures are not likely to address both the oversharing and under-sharing of personal data. Although the data trust concept is being actively explored in the …
Adopting Social Media In Family And Adoption Law, Stacey B. Steinberg, Meredith Burgess, Karla Herrera
Adopting Social Media In Family And Adoption Law, Stacey B. Steinberg, Meredith Burgess, Karla Herrera
Utah Law Review
Social media has dramatically changed the landscape facing families brought together through adoption. Just as adoptive families thirty years ago could not have predicted the impact of DNA technology on postadoption family life, adoptive families are only now beginning to grasp the impact of social media connectivity on the lives of their growing children. This change is related both to social media’s impact on family life and to fundamental shifts in our understanding of privacy more generally. Understanding the legal rights of parents and children in these circumstances is a novel and underexplored area of family law, constitutional law, and …
How Much Is Your Data Worth? Ccpa's Data Valuation Requirement Explored, Jeewon Kim Serrato
How Much Is Your Data Worth? Ccpa's Data Valuation Requirement Explored, Jeewon Kim Serrato
San Diego Law Review
On January 28, 2022, the Office of the Attorney General of the State of California (OAG or the California Attorney General) put businesses operating loyalty programs on notice for violations of the California Privacy Protection Act (CCPA). Immediately following this press release, the California Attorney General sent a number of Notice of Violation letters to businesses, which alleged that if a business is offering “discounts, free items, or other rewards, in exchange for personal information[, it] must provide consumers with a notice of financial incentive.” These letters were sent to “major corporations in the retail, home improvement, travel, and food …
“Alexa, Am I A Murderer?”: An Analysis Of Whether The First Amendment Protects Smart Speaker Communications, Josie A. Bates
“Alexa, Am I A Murderer?”: An Analysis Of Whether The First Amendment Protects Smart Speaker Communications, Josie A. Bates
Arkansas Law Review
State v. Bates poses interesting First Amendment questions that go far beyond the case itself, such as whether communications to and from smart speakers are protected under the First Amendment and, if so, whether the government must therefore meet a heightened standard before obtaining information from these devices. But currently, there are no definite answers. Thus, this analysis will attempt to answer these questions as well as offer general guidance for the future of First and Fourth Amendment law in the age of ever-changing technological advancements and never-ending criminal accusations.
Perlindungan Atas Privasi Konsumen Dalam Layanan Reservasi Tiket Online Dari Pt. Kereta Api Indonesia, Aprilia Susanti
Perlindungan Atas Privasi Konsumen Dalam Layanan Reservasi Tiket Online Dari Pt. Kereta Api Indonesia, Aprilia Susanti
"Dharmasisya” Jurnal Program Magister Hukum FHUI
The significant increase in online activities cannot be separated from the many active internet users who use mobile internet connections to carry out their daily activities, one of which is for the convenience of making ticket reservations at PT. Indonesian Railways (KAI). The purpose of this research is to find out the study of the business law of protecting consumer privacy in the online ticketing service of PT. KAI. Data collection was carried out by means of a literature study of the relationship between laws and regulations in consumer protection and the position of PT. KAI as business actors and …
Hired By A Machine: Can A New York City Law Enforce Algorithmic Fairness In Hiring Practices?, Lindsey Fuchs
Hired By A Machine: Can A New York City Law Enforce Algorithmic Fairness In Hiring Practices?, Lindsey Fuchs
Fordham Journal of Corporate & Financial Law
Workplace antidiscrimination laws must adapt to address today’s technological realities. If left underregulated, the rapidly expanding role of Artificial Intelligence (“AI”) in hiring practices has the danger of creating new, more obscure modes of discrimination. Companies use these tools to reduce the duration and costs of hiring and potentially attract a larger pool of qualified applicants for their open positions. But how can we guarantee that these hiring tools yield fair outcomes when deployed? These issues are just starting to be addressed at the federal, state, and city levels. This Note tackles whether a new city law can be improved …
Technology Integration In Higher Education And Student Privacy Beyond Learning Environments -- A Comparison Of The Uk And Us Perspective, Iria Giuffrida, Alex Hall
Technology Integration In Higher Education And Student Privacy Beyond Learning Environments -- A Comparison Of The Uk And Us Perspective, Iria Giuffrida, Alex Hall
Faculty Publications
Technology integration in higher education (HE) has brought immense innovation. While research is investigating the benefits of leveraging, through learning analytics, the data created by the greater presence of technology in HE, it is also analysing the privacy implications of vast universes of data now at the fingertips of HE administrators. This paper argues that student privacy challenges linked to technology integration occur not only within but also beyond learning environments, namely at the enterprise level. By analysing the UK and US legal frameworks surrounding how HE institutions respond to parents demanding disclosure of their adult children's personal data in …
Stars, Stripes, And Surveillance: The United States' Failure To Regulate Data Privacy, Sam Begland
Stars, Stripes, And Surveillance: The United States' Failure To Regulate Data Privacy, Sam Begland
American University Law Review
In the wake of the United States Supreme Court’s devastating decision to strip Americans of their constitutional right to abortion in Dobbs v. Jackson Women’s Health Organization, data privacy is more salient than ever. Without adequate data regulations, state governments and anti-abortion activists alike can harass and prosecute pregnant people attempting to exercise their bodily autonomy. This comment argues that the United States has violated its obligations under the International Covenant on Civil and Political Rights (ICCPR) Article 17 by failing to protect against interference with the use and collection of reproductive health data. Further, this comment analyzes interpretations of …