Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of Colorado Law School (3)
- University of Washington School of Law (3)
- Brooklyn Law School (2)
- Duke Law (2)
- Seattle University School of Law (2)
-
- William & Mary Law School (2)
- Claremont Colleges (1)
- Emory University School of Law (1)
- Loyola Marymount University and Loyola Law School (1)
- Pepperdine University (1)
- St. Mary's University (1)
- Texas A&M University School of Law (1)
- The Catholic University of America, Columbus School of Law (1)
- University of Denver (1)
- University of Georgia School of Law (1)
- University of Pittsburgh School of Law (1)
- University of San Diego (1)
- Villanova University Charles Widger School of Law (1)
- Keyword
-
- Privacy (14)
- First Amendment (3)
- Abortion (2)
- Constitutional Law (2)
- Data collection (2)
-
- Fourth Amendment (2)
- Right of Privacy (2)
- Surveillance (2)
- Technology (2)
- 4th amendment (1)
- AI (1)
- Agonism (1)
- Algorithmic accountability (1)
- Algorithms (1)
- Appropriation of name or likeness (1)
- Artificial intelligence (1)
- Association for Los Angeles Deputy Sheriffs v. Superior Court (1)
- BCI (1)
- Berger v. new york (1)
- Big data (1)
- Bitcoin (1)
- Bitcoin searches (1)
- Braincomputerinterfacing (1)
- Branding (1)
- Brussels Effect (1)
- CCPA (1)
- COVID-19 pandemic (1)
- California Consumer Privacy Act (1)
- California Effect (1)
- California Supreme Court (1)
- Publication
-
- Publications (3)
- Washington Law Review (3)
- Duke Journal of Constitutional Law & Public Policy Sidebar (2)
- Seattle University Law Review (2)
- Articles (1)
-
- Brooklyn Journal of International Law (1)
- CMC Senior Theses (1)
- Catholic University Journal of Law and Technology (1)
- Dissertations (1)
- Faculty Articles (1)
- Faculty Publications (1)
- Georgia Journal of International & Comparative Law (1)
- Jeffrey S. Moorad Sports Law Journal (1)
- Journal of Law and Policy (1)
- Loyola of Los Angeles Law Review (1)
- Pepperdine Law Review (1)
- St. Mary's Law Journal (1)
- Sturm College of Law: Faculty Scholarship (1)
- Texas A&M Law Review (1)
- William & Mary Bill of Rights Journal (1)
- Publication Type
Articles 1 - 26 of 26
Full-Text Articles in Privacy Law
Fourth Amendment Limits On Extensive Quarantine Surveillance, Benjamin Wolters
Fourth Amendment Limits On Extensive Quarantine Surveillance, Benjamin Wolters
Duke Journal of Constitutional Law & Public Policy Sidebar
The devastation wreaked by the COVID-19 pandemic spurred innovations in technology and public policy. Many countries rushed to implement extensive quarantines, and some introduced disease surveillance, including location tracking to enforce quarantines. Though the United States has never implemented high-tech quarantine surveillance, such technology will certainly be available for the next disease outbreak.
Absent significant doctrinal change, the Fourth Amendment likely bars some, but not all, forms of quarantine surveillance. Quarantine surveillance probably constitutes a Fourth Amendment “search” that generally must be backed by probable cause. This probable cause requirement, and its subcomponent of individualized suspicion, likely applies differently to …
Ferpa And State Open Records Laws: What The North Carolina Supreme Court Got Wrong In Dth Media Corp. V. Folt, And How Courts & Congress Can Take Measures To Reconcile Privacy And Access Interests, Danielle Siegel
Duke Journal of Constitutional Law & Public Policy Sidebar
Over the past few years, courts across the country have confronted a common scenario. Members of the public and media request records from a public university pertaining to its investigations of sexual assault and misconduct on campus. Then, media outlets contend they have a right to access these records under state open records laws. But the university claims that it cannot, or will not, disclose the records under the Family Educational Rights and Privacy Act of 1974 ("FERPA").
The media outlet then files suit to compel disclosure. This Note explores the competing privacy and access interests at stake in this …
Digital Privacy Rights And Cloud Act Agreements, Tim Cochrane
Digital Privacy Rights And Cloud Act Agreements, Tim Cochrane
Brooklyn Journal of International Law
The United States (US) and United Kingdom (UK) will soon bring into force a new international law enforcement data sharing ‘CLOUD Act agreement’ (US-UK Agreement), the first of its kind under the Clarifying Lawful Overseas Use of Data Act 2018 (CLOUD Act). These agreements enable law enforcement in one state to directly request data from service providers based in the other state. They respond to long-standing concerns with the main mechanism for obtaining overseas data, mutual legal assistance (MLA). The US and UK claim the US-UK Agreement will significantly speed up data access relative to MLA while “respecting privacy and …
You Are Not A Commodity: A More Efficient Approach To Commercial Privacy Rights, Benjamin T. Pardue
You Are Not A Commodity: A More Efficient Approach To Commercial Privacy Rights, Benjamin T. Pardue
Washington Law Review
United States common law provides four torts for privacy invasion: (1) disclosure of private facts, (2) intrusion upon seclusion, (3) placement of a person in a false light, and (4) appropriation of name or likeness. Appropriation of name or likeness occurs when a defendant commandeers the plaintiff’s recognizability, typically for a commercial benefit. Most states allow plaintiffs who establish liability to recover defendants’ profits as damages from the misappropriation under an “unjust enrichment” theory. By contrast, this Comment argues that such an award provides a windfall to plaintiffs and contributes to suboptimal social outcomes. These include overcompensating plaintiffs and incentivizing …
Personal Data Privacy And Protective Federal Legislation: An Exploration Of Constituent Position On The Need For Legislation To Control Data Reliant Organizations Collecting And Monetizing Internet-Obtained Personal Data, Giovanni De Meo
Dissertations
In the past twenty years, the business of online personal data collection has grown at the same rapid pace as the internet itself, fostering a multibillion-dollar personal data collection and commercialization industry. Unlike many other large industries, there has been no major federal legislation enacted to monitor or control the activities of organizations dealing in this flourishing industry. The combination of these factors together with the lack of prior research encouraged this research designed to understand how much voters know about this topic and whether there is interest in seeing legislation enacted to protect individual personal data privacy.
To address …
Bird's-Eye View: A Comparative Examination Of Drone Regulation Through The Lens Of Privacy Protection, Allison Mcgregor
Bird's-Eye View: A Comparative Examination Of Drone Regulation Through The Lens Of Privacy Protection, Allison Mcgregor
Georgia Journal of International & Comparative Law
No abstract provided.
“More Than Tangential”: When Does The Public Have A Right To Access Judicial Records?, Jordan Elias
“More Than Tangential”: When Does The Public Have A Right To Access Judicial Records?, Jordan Elias
Journal of Law and Policy
Public accountability requires open proceedings and access to documents filed with the courts. The strong policy favoring access to judicial records creates a presumption against sealing documents without a compelling reason. The Ninth Circuit Court of Appeals recently held that this presumption of access arises when a proceeding relates “more than tangentially” to the merits. This is a low standard under which many types of motions qualify for the compelling reasons test. With too much litigation occurring in secret, courts can use the “more than tangential” standard proactively to keep electronic case dockets available to citizens.
Fitbit Data And The Fourth Amendment: Why The Collection Of Data From A Fitbit Constitutes A Search And Should Require A Warrant In Light Of Carpenter V. United States, Alxis Rodis
William & Mary Bill of Rights Journal
No abstract provided.
Bitcoin Searches And Preserving The Third-Party Doctrine, Christine A. Cortez
Bitcoin Searches And Preserving The Third-Party Doctrine, Christine A. Cortez
St. Mary's Law Journal
Abstract forthcoming.
Overruling Roe V. Wade: Lessons From The Death Penalty, Paul Benjamin Linton
Overruling Roe V. Wade: Lessons From The Death Penalty, Paul Benjamin Linton
Pepperdine Law Review
In Furman v. Georgia (1972), the Supreme Court struck down the Georgia and Texas death penalty statutes, thereby calling into question the validity of every other state death penalty statute. In their concurring opinions, Justices Brennan and Marshall expressed the view that, given society’s gradual abandonment of the death penalty, capital punishment violated the Eighth Amendment’s prohibition of “cruel and unusual punishments.” Justice Powell and three other justices dissented, arguing that the Court had misread the state of the law regarding society’s acceptance of the death penalty. Four years after Furman, in a quintet of cases, the Court held that …
Revising Reasonableness In The Cloud, Ian Walsh
Revising Reasonableness In The Cloud, Ian Walsh
Washington Law Review
Save everything—just in case––and search for it later. This is a modern mantra fueled by the ubiquity of smartphones, laptops, tablets, and free or low-cost data storage that leads users to store massive amounts of data in the cloud. But when users trust third-party cloud storage providers with private communications, they also surrender Fourth Amendment constitutional certainty. Existing statutory safeguards for these communications are lower than Fourth Amendment warrant and probable cause standards; this permits the government to seize large quantities of users’ private communications stored in the cloud with only minimal justification. Due to the revealing nature of such …
Hacks, Leaks, And Data Dumps: The Right To Publish Illegally Acquired Information Twenty Years After Bartnicki V. Vopper, Erik Ugland, Christina Mazzeo
Hacks, Leaks, And Data Dumps: The Right To Publish Illegally Acquired Information Twenty Years After Bartnicki V. Vopper, Erik Ugland, Christina Mazzeo
Washington Law Review
This Article addresses a fluid and increasingly salient category of cases involving the First Amendment right to publish information that was hacked, stolen, or illegally leaked by someone else. Twenty years ago, in Bartnicki v. Vopper, the Supreme Court appeared to give broad constitutional cover to journalists and other publishers in these situations, but Justice Stevens’s inexact opinion for the Court and Justice Breyer’s muddling concurrence left the boundaries unclear. The Bartnicki framework is now implicated in dozens of new cases— from the extradition and prosecution of Julian Assange, to Donald Trump’s threatened suit of The New York Times …
Fact Or Phallus? Considering The Constitutionality Of Texas's Cyber-Flashing Law Under The True Threat Doctrine, Brenna Cheyne Miller
Fact Or Phallus? Considering The Constitutionality Of Texas's Cyber-Flashing Law Under The True Threat Doctrine, Brenna Cheyne Miller
Texas A&M Law Review
As societal reliance on digital and online communication continues to grow, courts are grappling with how best to provide legal recourse for novel, technology-related issues while still protecting American citizens’ First Amendment right to free speech. The State of Texas recently enacted Penal Code section 21.19, which criminalizes the transmission of unsolicited sexually explicit images to another person—or as it is commonly known, “cyber-flashing.” Cyber-flashing occurs through digital and online platforms, including text messages, apps, and social media. Section 21.19 is one of the first statutes of its kind in the United States. In the age of “dick pics,” this …
Can I Have Some Privacy?: A Look Into The Unfortunate Truth Of Pregnancy Tests Throughout Sports And The Negative Impact On Female Athletes, Hannah Rogers
Jeffrey S. Moorad Sports Law Journal
No abstract provided.
Whose Rights Matter More—Police Privacy Or A Defendant’S Right To A Fair Trial?, Laurie L. Levenson
Whose Rights Matter More—Police Privacy Or A Defendant’S Right To A Fair Trial?, Laurie L. Levenson
Loyola of Los Angeles Law Review
The function of the prosecutor under the federal Constitution is not to tack as many skins of victims as possible to the wall. His function is to vindicate the right of the people as expressed in the laws and give those accused of crime a fair trial.
– William O. Douglas
Pure Privacy, Jeffrey Bellin
Pure Privacy, Jeffrey Bellin
Faculty Publications
n 1890, Samuel Warren and Louis Brandeis began a storied legal tradition of trying to conceptualize privacy. Since that time, privacy's appeal has grown beyond those authors' wildest expectations, but its essence remains elusive. One of the rare points of agreement in boisterous academic privacy debates is that there is no consensus on what privacy means.
The modern trend is to embrace the ambiguity. Unable to settle on boundaries, scholars welcome a broad array of interests into an expanding theoretical framework. As a result, privacy is invoked in debates about COVID-19 contact tracing, police body cameras, marriage equality, facial recognition, …
Brain-Computer-Interfacing & Respondeat Superior: Algorithmic Decisions, Manipulation, And Accountability In Armed Conflict, Salahudin Ali
Brain-Computer-Interfacing & Respondeat Superior: Algorithmic Decisions, Manipulation, And Accountability In Armed Conflict, Salahudin Ali
Catholic University Journal of Law and Technology
This article examines the impact that brain-computer-interfacing platforms will have on the international law of armed conflict’s respondeat superior legal regime. Major Ali argues that the connection between the human brain and this nascent technology’s underlying technology of artificial intelligence and machine learning will serve as a disruptor to the traditional mental prerequisites required to impart culpability and liability on commanders for actions of their troops. Anticipating that BCI will become increasingly ubiquitous, Major Ali’s article offers frameworks for solution to BCI’s disruptive potential to the internal law of armed conflict.
Table Of Contents, Seattle University Law Review
Table Of Contents, Seattle University Law Review
Seattle University Law Review
Table of Contents
Privacy Losses As Wrongful Gains, Bernard Chao
Privacy Losses As Wrongful Gains, Bernard Chao
Sturm College of Law: Faculty Scholarship
Perhaps nowhere has the pace of technology placed more pressure on the law than in the area of data privacy. Huge data breaches fill our headlines. Companies often violate their own privacy policies by selling customer data, or by using the information in ways that fall outside their policy. Yet, even when there is indisputable misconduct, the law generally does not hold these companies accountable. That is because traditional legal claims are poorly suited for handling privacy losses.
Contract claims fail when privacy policies are not considered contractual obligations. Misrepresentation claims cannot succeed when customers never read and rely on …
The Small-Er Screen: Youtube Vlogging And The Unequipped Child Entertainment Labor Laws, Amanda G. Riggio
The Small-Er Screen: Youtube Vlogging And The Unequipped Child Entertainment Labor Laws, Amanda G. Riggio
Seattle University Law Review
Family vloggers are among the millions of content creators on YouTube. In general, vloggers frequently upload recorded videos of their daily lives. Family vloggers are unique because they focus their content around their familial relationships and the lives of their children. One set of family vloggers, the Ace Family, has recorded their children’s lives from the day they were born and continue to upload videos of each milestone, including “Elle Cries on Her First Rollercoaster Ride” and “Elle and Alaïa Get Caught Doing What!! **Hidden Camera**.” Another vlogging couple, Cole and Savannah LaBrant, post similar content, including videos titled “Baby …
Two Constitutional Rights, Two Constitutional Controversies, Michael J. Perry
Two Constitutional Rights, Two Constitutional Controversies, Michael J. Perry
Faculty Articles
My overarching aim in the Article is to defend a particular understanding of two constitutional rights and, relatedly, a particular resolution of two constitutional controversies. The two rights I discuss are among the most important rights protected by the constitutional law of the United States: the right to equal protection and the right of privacy. As I explain in the Article, the constitutional right to equal protection is, at its core, the human right to moral equality, and the constitutional right to privacy is best understood as a version of the human right to moral freedom. The two controversies I …
Catalyzing Privacy Law, Anupam Chander, Margot E. Kaminski, William Mcgeveran
Catalyzing Privacy Law, Anupam Chander, Margot E. Kaminski, William Mcgeveran
Publications
The United States famously lacks a comprehensive federal data privacy law. In the past year, however, over half the states have proposed broad privacy bills or have established task forces to propose possible privacy legislation. Meanwhile, congressional committees are holding hearings on multiple privacy bills. What is catalyzing this legislative momentum? Some believe that Europe’s General Data Protection Regulation (GDPR), which came into force in 2018, is the driving factor. But with the California Consumer Privacy Act (CCPA) which took effect in January 2020, California has emerged as an alternate contender in the race to set the new standard for …
The Right To Contest Ai, Margot E. Kaminski, Jennifer M. Urban
The Right To Contest Ai, Margot E. Kaminski, Jennifer M. Urban
Publications
Artificial intelligence (AI) is increasingly used to make important decisions, from university admissions selections to loan determinations to the distribution of COVID-19 vaccines. These uses of AI raise a host of concerns about discrimination, accuracy, fairness, and accountability.
In the United States, recent proposals for regulating AI focus largely on ex ante and systemic governance. This Article argues instead—or really, in addition—for an individual right to contest AI decisions, modeled on due process but adapted for the digital age. The European Union, in fact, recognizes such a right, and a growing number of institutions around the world now call for …
Privacy-As-Property: A New Fundamental Approach To The Right To Privacy And The Impact This Will Have On The Law And Corporations, Sevion Dacosta
Privacy-As-Property: A New Fundamental Approach To The Right To Privacy And The Impact This Will Have On The Law And Corporations, Sevion Dacosta
CMC Senior Theses
The most popular conception of the right to privacy stems from Warren and Brandeis’s description of privacy as “the right to be left alone.” This theory ultimately points to a more fundamental approach to the right to privacy rooted in property rights. This fundamental approach - which I call privacy-as-property - is what I establish in this paper. I argue that the Lockean concept of property that “every man has a property in his own person” provides the foundation for the right to privacy. Privacy-as-property begins with the fundamental right to control oneself. Because of this intrinsic right, your property …
Pandemic Surveillance Discrimination, Christian Sundquist
Pandemic Surveillance Discrimination, Christian Sundquist
Articles
The COVID-19 pandemic has laid bare the abiding tension between surveillance and privacy. Public health epidemiology has long utilized a variety of surveillance methods—such as contact tracing, quarantines, and mandatory reporting laws—to control the spread of disease during past epidemics and pandemics. Officials have typically justified the resulting intrusions on privacy as necessary for the greater public good by helping to stave off larger health crisis. The nature and scope of public health surveillance in the battle against COVID-19, however, has significantly changed with the advent of new technologies. Digital surveillance tools, often embedded in wearable technology, have greatly increased …
Agonistic Privacy & Equitable Democracy, Scott Skinner-Thompson
Agonistic Privacy & Equitable Democracy, Scott Skinner-Thompson
Publications
This Essay argues that legal privacy protections—which enable individuals to control their visibility within public space—play a vital role in disrupting the subordinating, antidemocratic impacts of surveillance and should be at the forefront of efforts to reform the operation of both digital and physical public space. Robust privacy protections are a touchstone for empowering members of different marginalized groups with the ability to safely participate in both the physical and digital public squares, while also preserving space for vibrant subaltern counterpublics. By increasing heterogeneity within the public sphere, privacy can also help decrease polarization by breaking down echo chambers and …