Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Privacy Law

Dispute Settlement Under The African Continental Free Trade Area Agreement: A Preliminary Assessment, Olabisi D. Akinkugbe Nov 2020

Dispute Settlement Under The African Continental Free Trade Area Agreement: A Preliminary Assessment, Olabisi D. Akinkugbe

Articles, Book Chapters, & Popular Press

The African Continental Free Trade Area Agreement (AfCFTA) will add a new dispute settlement system to the plethora of judicial mechanisms designed to resolve trade disputes in Africa. Against the discontent of Member States and limited impact the existing highly legalized trade dispute settlement mechanisms have had on regional economic integration in Africa, this paper undertakes a preliminary assessment of the AfCFTA Dispute Settlement Mechanism (DSM). In particular, the paper situates the AfCFTA-DSM in the overall discontent and unsupportive practices of African States with highly legalized dispute settlement systems and similar WTO-Styled DSMs among other shortcomings. Notwithstanding the transplantation of …


Enough Is As Good As A Feast, Noah C. Chauvin Oct 2020

Enough Is As Good As A Feast, Noah C. Chauvin

Seattle University Law Review

Ipse Dixit, the podcast on legal scholarship, provides a valuable service to the legal community and particularly to the legal academy. The podcast’s hosts skillfully interview guests about their legal and law-related scholarship, helping those guests communicate their ideas clearly and concisely. In this review essay, I argue that Ipse Dixit has made a major contribution to legal scholarship by demonstrating in its interview episodes that law review articles are neither the only nor the best way of communicating scholarly ideas. This contribution should be considered “scholarship,” because one of the primary goals of scholarship is to communicate new ideas.


A False Sense Of Security: How Congress And The Sec Are Dropping The Ball On Cryptocurrency, Tessa E. Shurr Oct 2020

A False Sense Of Security: How Congress And The Sec Are Dropping The Ball On Cryptocurrency, Tessa E. Shurr

Dickinson Law Review (2017-Present)

Today, companies use blockchain technology and digital assets for a variety of purposes. This Comment analyzes the digital token. If the Securities and Exchange Commission (SEC) views a digital token as a security, then the issuer of the digital token must comply with the registration and extensive disclosure requirements of federal securities laws.

To determine whether a digital asset is a security, the SEC relies on the test that the Supreme Court established in SEC v. W.J. Howey Co. Rather than enforcing a statute or agency rule, the SEC enforces securities laws by applying the Howey test on a fact-intensive …


Table Of Contents, Seattle University Law Review Sep 2020

Table Of Contents, Seattle University Law Review

Seattle University Law Review

Table of Contents


Reflections On The Influence Of Social Media On Judging, Peter D. Lauwers Justice Jun 2020

Reflections On The Influence Of Social Media On Judging, Peter D. Lauwers Justice

Canadian Journal of Law and Technology

This essay examines the influence of social media on judging. While the ethical implications of judges’ engagement in social media have received some scholarly attention, the actual influence of social media on judging has not.1 But it is possible to make some useful observations that might at once seem obvious and disquieting.

This essay is divided into four parts. Part 1 describes the normative judicial disposition. Part 2 examines the psychology of judging. Part 3 asks what could go wrong with the judicial use of social media. Part 4 describes a stance judges might take towards social media.


Cryptocurrencies' Revolt Against The Bsa: Why The Supreme Court Should Hold That The Bank Secrecy Act Violates The Fourth Amendment, Jeremy Ciarabellini May 2020

Cryptocurrencies' Revolt Against The Bsa: Why The Supreme Court Should Hold That The Bank Secrecy Act Violates The Fourth Amendment, Jeremy Ciarabellini

Seattle Journal of Technology, Environmental & Innovation Law

The Bank Secrecy Act (BSA) creates a Hobson’s choice: one must either struggle to function in modern society without a bank account or submit to financial surveillance by the government. Both choices result in drastic consequences.


Some Limits On The Judicial Power To Restrict Dissemination Of Discovery, Thomas C. Bradley Apr 2020

Some Limits On The Judicial Power To Restrict Dissemination Of Discovery, Thomas C. Bradley

Maine Law Review

The pretrial process of discovery governed by Federal and Maine Rule of Civil Procedure 26 enables plaintiffs in product liability actions to delve where few people have delved before—into a corporation's internal memoranda, competitive practices, and secret product or design information as well as other less sensitive information in a company's possession. Discovery, in this context as in others, is a powerful tool determined by the courts to be necessary for the just litigation of claims. As a balance to the leeway given parties to compel production of information in discovery, federal and Maine courts have the authority under Federal …


Screened Out Of Housing: The Impact Of Misleading Tenant Screening Reports And The Potential For Criminal Expungement As A Model For Effectively Sealing Evictions, Katelyn Polk Apr 2020

Screened Out Of Housing: The Impact Of Misleading Tenant Screening Reports And The Potential For Criminal Expungement As A Model For Effectively Sealing Evictions, Katelyn Polk

Northwestern Journal of Law & Social Policy

Having an eviction record “blacklists” tenants from finding future housing. Even renters with mere eviction filings—not eviction orders—on their records face the harsh collateral consequences of eviction. This Note argues that eviction records should be sealed at filing and only released into the public record if a landlord prevails in court. Juvenile record expungement mechanisms in Illinois serve as a model for one way to protect people with eviction records. Recent updates to the Illinois juvenile expungement process provided for the automatic expungement of certain records and strengthened the confidentiality protections of juvenile records. Illinois protects juvenile records because it …


The Internet Never Forgets: A Federal Solution To The Dissemination Of Nonconsensual Pornography, Alexis Santiago Jan 2020

The Internet Never Forgets: A Federal Solution To The Dissemination Of Nonconsensual Pornography, Alexis Santiago

Seattle University Law Review

As technology evolves, new outlets for interpersonal conflict and crime evolve with it. The law is notorious for its inability to keep pace with this evolution. This Comment focuses on one area that the law urgently needs to regulate—the dissemination of “revenge porn,” otherwise known as nonconsensual pornography. Currently, no federal law exists in the U.S. that criminalizes the dissemination of nonconsensual pornography. Most U.S. states have criminalized the offense, but with vastly different degrees of severity, resulting in legal inconsistencies and jurisdictional conflicts. This Comment proposes a federal solution to the dissemination of nonconsensual pornography that carefully balances the …


Legal Risks Of Adversarial Machine Learning Research, Ram Shankar Siva Kumar, Jonathon Penney, Bruce Schneier, Kendra Albert Jan 2020

Legal Risks Of Adversarial Machine Learning Research, Ram Shankar Siva Kumar, Jonathon Penney, Bruce Schneier, Kendra Albert

Articles, Book Chapters, & Popular Press

Adversarial machine learning is the systematic study of how motivated adversaries can compromise the confidentiality, integrity, and availability of machine learning (ML) systems through targeted or blanket attacks. The problem of attacking ML systems is so prevalent that CERT, the federally funded research and development center tasked with studying attacks, issued a broad vulnerability note on how most ML classifiers are vulnerable to adversarial manipulation. Google, IBM, Facebook, and Microsoft have committed to investing in securing machine learning systems. The US and EU are likewise putting security and safety of AI systems as a top priority.

Now, research on adversarial …


In Memory Of Professor James E. Bond, Janet Ainsworth Jan 2020

In Memory Of Professor James E. Bond, Janet Ainsworth

Seattle University Law Review

Janet Ainsworth, Professor of Law at Seattle University School of Law: In Memory of Professor James E. Bond.


Table Of Contents, Seattle University Law Review Jan 2020

Table Of Contents, Seattle University Law Review

Seattle University Law Review

Table of Contents