Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 55

Full-Text Articles in Privacy Law

Middleware Technologies: Towards User-Determined News Curation In Social Media, Jose M. Marella Jan 2023

Middleware Technologies: Towards User-Determined News Curation In Social Media, Jose M. Marella

Catholic University Journal of Law and Technology

News distribution and consumption now largely occur within, and are subject to dynamics dictated by, social media platforms. Platforms create audiences, facilitate matching, provide basic services, and set interaction standards. But these networks are structured to maximize engagement and benefit the platforms’ main businesses, leaving individuals with little to no ability to tailor news consumption according to their preferences.

To re-orient platform-dictated dynamics towards user-determined exchanges, middleware technologies—software services appended to social media platforms to curate information flows—are touted as a promising solution. Still, not enough literature articulates middleware’s virtues and hurdles, especially in the context of online news. This …


§230 And Tinfoil Hats: What Conspiracy Theories Teach Us About The Marketplace Of Ideas And Online Speech, Connor B. Flannery Jan 2023

§230 And Tinfoil Hats: What Conspiracy Theories Teach Us About The Marketplace Of Ideas And Online Speech, Connor B. Flannery

Catholic University Journal of Law and Technology

Famously imputed into First Amendment jurisprudence by Justice Oliver Wendell Holmes, the Marketplace of Ideas is a foundational paradigm in free speech theory. However, current trends in social discourse suggest the Marketplace has crashed. Conspiracy theories illustrate this crash as a story of unintended consequences and, paradoxically, a consequence of judicial and legislative efforts to prevent it. Acknowledging the popularity and widespread use of the internet and social media, I explore solutions to rejuvenate the Marketplace of Ideas and better align its prominence in First Amendment doctrine with the reality of the current speech landscape.


Swipe Right Into A Disciplinary Hearing: How The Use Of Dating Apps Could Earn An Attorney More Than A Bad First Date, Zachary S. Aman Jan 2023

Swipe Right Into A Disciplinary Hearing: How The Use Of Dating Apps Could Earn An Attorney More Than A Bad First Date, Zachary S. Aman

Catholic University Journal of Law and Technology

The Model Rules of Professional Conduct seek to police the conduct of attorneys. Each jurisdiction adopts its own rules of professional conduct to apply to the attorneys licensed within it. Notably, the model rules prohibit any sexual relationship between the attorney and client unless that relationship precedes the attorney-client relationship. Traditionally, defining a "sexual relationship" was simple, particularly if the attorney and client engaged in sexual intercourse. The introduction of dating apps, however, has blurred the line.

This article outlines the inherent risks of attorneys using dating apps at a time when most newly-licensed attorneys make up the majority of …


Establishing The Legal Framework To Regulate Quantum Computing Technology, Kaya Derose Jan 2023

Establishing The Legal Framework To Regulate Quantum Computing Technology, Kaya Derose

Catholic University Journal of Law and Technology

No abstract provided.


Masthead, Lead Article Editor Jan 2023

Masthead, Lead Article Editor

Catholic University Journal of Law and Technology

No abstract provided.


Table Of Contents, Lead Article Editor Jan 2023

Table Of Contents, Lead Article Editor

Catholic University Journal of Law and Technology

No abstract provided.


In Memorial - Dorothy Erstling Cukier, Lead Article Editor Jan 2023

In Memorial - Dorothy Erstling Cukier, Lead Article Editor

Catholic University Journal of Law and Technology

No abstract provided.


Learning From Mistakes: A Guide To Expanding The Oversight Board, Kevin Frazier Jan 2023

Learning From Mistakes: A Guide To Expanding The Oversight Board, Kevin Frazier

Catholic University Journal of Law and Technology

More than 4.4 billion people use social media. A few platforms attract a significant number of those users—for example, 2.9 billion people use Facebook, 2.3 billion use YouTube, and 1.2 billion use WeChat. How these major platforms govern themselves with respect to content moderation has an impact on billions of users and may lead to policy changes across other platforms that affect billions more. That is why it is so important to analyze Meta’s Oversight Board—an independent body created for the purpose of “promot[ing] free expression by making principled, independent decisions regarding content on Facebook and Instagram by issuing recommendations …


Masthead, Lead Article Editor Jan 2022

Masthead, Lead Article Editor

Catholic University Journal of Law and Technology

No abstract provided.


Table Of Contents, Lead Article Editor Jan 2022

Table Of Contents, Lead Article Editor

Catholic University Journal of Law and Technology

No abstract provided.


Seeing (Platforms) Like A State: Digital Legibility And Lessons For Platform Governance, Neil Chilson Jan 2021

Seeing (Platforms) Like A State: Digital Legibility And Lessons For Platform Governance, Neil Chilson

Catholic University Journal of Law and Technology

The growing backlash against Big Tech companies is a symptom of digital technology increasing the world’s legibility. James C. Scott’s book, Seeing Like a State: How Certain Schemes to Improve the Human Condition Have Failed, explores how past governments responded to increased legibility – for good and for ill. This article shows how Scott’s historical lessons can guide governments and tech platforms as they seek to improve the human condition online.


Hybrid Ip Rights For Software, Apis, And Guis: Understanding Copyright's Paradigm Shift, Howard Skaist Jan 2021

Hybrid Ip Rights For Software, Apis, And Guis: Understanding Copyright's Paradigm Shift, Howard Skaist

Catholic University Journal of Law and Technology

The non-literal scope of protection for software is intricate legally and is intricate technical. Thus, despite literally decades of court decisions and a mountain of legal scholar written on the subject in that time, it appears that there is still no consistent agreement about it, as evidenced by the Google v. Oracle which has percolated in the courts for nearly a decade and is now being heard by the US Supreme Court (oral argument was on October 7, 2020). However, the thesis of this article that a legal construct is capable of being formulated that is analytically consistent and that …


Masthead, Editor-In- Chief Jan 2021

Masthead, Editor-In- Chief

Catholic University Journal of Law and Technology

No abstract provided.


Table Of Contents, Editor-In- Chief Jan 2021

Table Of Contents, Editor-In- Chief

Catholic University Journal of Law and Technology

No abstract provided.


Privacy, Eavesdropping, And Wiretapping Across The United States: Reasonable Expectation Of Privacy And Judicial Discretion, Carol M. Bast Jan 2020

Privacy, Eavesdropping, And Wiretapping Across The United States: Reasonable Expectation Of Privacy And Judicial Discretion, Carol M. Bast

Catholic University Journal of Law and Technology

One-party consent and all-party consent eavesdropping and wiretapping statutes are two broad pathways for legislation to deal with the problem of secret taping and some states protect conversation under state constitutions. Whether a conversation is protected against being taped as a private conversation is often gauged by the reasonable expectation of privacy standard. Judges in both all-party consent and one-party consent jurisdictions have had to use their leeway under the reasonable expectation of privacy standard to arrive at what at the time seemed to be the most appropriate solution, perhaps in doing so creating a case law exception.


The Survival Of Critical Infrastructure: How Do We Stop Ransomware Attacks On Hospitals?, Helena Roland Jan 2020

The Survival Of Critical Infrastructure: How Do We Stop Ransomware Attacks On Hospitals?, Helena Roland

Catholic University Journal of Law and Technology

Our nation’s infrastructure is under an emerging new threat: ransomware attacks. These attacks can cause anything from individual laptops, to entire cities to shut down for a period of time until the victim pays a ransom to the attacker. Unfortunately, these attacks are on the rise and the attackers have a new target: hospitals. Ransomware attacks on hospitals can temporarily shut down operating room technology and limit physician access to patient files, ultimately threatening the safety of hospital patients and the surrounding community. This paper examines how the threat of ransomware attacks on hospitals is on the rise and what …


Auer Deference Should Be Dead; Long Live Seminole Rock Deference, John B. Meisel Jan 2019

Auer Deference Should Be Dead; Long Live Seminole Rock Deference, John B. Meisel

Catholic University Journal of Law and Technology

Deference doctrines should be understood in light of the Administrative Procedures Act’s distinction between legislative rules and interpretive rules and should be based on a solid theoretical foundation. Modern Auer deference calls for categorical deference for an agency’s regulatory interpretation of an ambiguous regulation. This is inconsistent with the APA’s characterization of the purpose of an interpretive rule. Properly construed, interpretive rules clarify the meaning of a legal text which should be justified by use of expository reasoning. These rules deserve a lesser form of deference (Skidmore deference), based on an agency’s unique understanding of its own regulations which …


The Department Of Justice Versus Apple Inc. -- The Great Encryption Debate Between Privacy And National Security, Julia P. Eckart Jan 2019

The Department Of Justice Versus Apple Inc. -- The Great Encryption Debate Between Privacy And National Security, Julia P. Eckart

Catholic University Journal of Law and Technology

This article is an attempt to objectively examine and assess legal arguments made by Apple Inc. (Apple) and the Department of Justice (DOJ) concerning the DOJ’s use of the All Writs Act[1] (AWA) to require Apple to provide technical assistance to the DOJ so that it could access the encrypted data from the locked iPhone of Syed Rizwan Farook, commonly referred to as the San Bernardino shooter. The DOJ’s initial ex parte application focused on meeting the requirements of United States v. New York Telephone Co.[2] concluding the court order was authorized and appropriate. Apple not only argued …


Warrantless Searches Of Electronic Devices At U.S. Borders: Securing The Nation Or Violating Digital Liberty?, Ahad Khilji Jan 2019

Warrantless Searches Of Electronic Devices At U.S. Borders: Securing The Nation Or Violating Digital Liberty?, Ahad Khilji

Catholic University Journal of Law and Technology

The steady increase of U.S. citizens traveling with smart phones and other electronic devices has been met with the rise of searches and seizures by CBP officers at U.S borders. Although only less than 0.1% of all travelers may actually be subjected to a search while entering the United States, when comparing the statistics between a six month period in 2016 with the same period in 2017, electronic device searches have almost doubled from 8,383 to 14,993. Approximately one million travelers to the U.S. are inspected by the CBP every day. Out of this population, nearly 2,500 electronic devices are …


Contents Jan 2018

Contents

Catholic University Journal of Law and Technology

No abstract provided.


Masthead Jan 2018

Masthead

Catholic University Journal of Law and Technology

No abstract provided.


Table Of Contents Jan 2018

Table Of Contents

Catholic University Journal of Law and Technology

No abstract provided.


Deepfake Videos: When Seeing Isn't Believing, Holly Kathleen Hall Jan 2018

Deepfake Videos: When Seeing Isn't Believing, Holly Kathleen Hall

Catholic University Journal of Law and Technology

Videos, known as deepfakes, use readily available software to create a work that shows people saying and doing things they may never have uttered or engaged in. The technology making the videos appear very authentic is advancing at such a rate that people may not be able to detect if the videos are fact or fiction. Given the hasty acceptance of other forms of fake news in society, deepfake videos have the ability to affect the nature of information the public receives about candidates and policies. This study examines the potential use of deepfake videos in the democratic process, analyzes …


Masthead Jan 2018

Masthead

Catholic University Journal of Law and Technology

No abstract provided.


Ng9-1-1, Cybersecurity, And Contributions To The Model Framework For A Secure National Infrastructure, Andrew Jackson Coley Jan 2018

Ng9-1-1, Cybersecurity, And Contributions To The Model Framework For A Secure National Infrastructure, Andrew Jackson Coley

Catholic University Journal of Law and Technology

9-1-1 call networks form the foundation of emergency communications infrastructure. However, a lack of funding and taking such networks for granted has led to a gradual yet predictable outdating of this critical infrastructure. Fortunately, recent efforts have acknowledged as such, and dedicated public safety officials have worked to update 9-1-1 systems to Next Generation 9-1-1 (NG9-1-1).
NG9-1-1 is an IP-based network with 21stcentury technology capable of handling increased call volume, more resilient networks, and providing significantly more data to first responders, among litany of other advancements. With this much needed advancement comes the responsibilities of ensuring a secure …


Assessing Assisted Reproductive Technology, Raymond C. O'Brien Jan 2018

Assessing Assisted Reproductive Technology, Raymond C. O'Brien

Catholic University Journal of Law and Technology

Technological innovation possesses both opportunity and challenge. Because assisted reproductive technology (ART) involves sexual intimacy, parenthood, personhood, gender identity, privacy, legacy, and a plethora of religious, historical, sociological, and ethical underpinnings, the challenges presented in such technological innovation are substantial. Nonetheless, the opportunities are significant and progressive. Because of in vitro fertilization, gestational and genetic surrogacy, posthumous conception, and mitochondrial replacement therapy, humans now have the opportunity to overcome infertility, gender obstacles to parentage, dynastic limitations, and diseases that have long plagued mothers and infants. However, challenges include the exploitation of surrogates, unequal access to ART services, possibilities of cloning …


Privacy Of Information And Dna Testing Kits, Shanna Raye Mason Jan 2018

Privacy Of Information And Dna Testing Kits, Shanna Raye Mason

Catholic University Journal of Law and Technology

In modern times, consumers desire for more control over their own health and healthcare. With this growing interest of control, direct to consumer DNA testing kits have never been more popular. However, many consumers are unaware of the potential privacy concerns associated with such use. This comment examines the popularity and privacy risks that are likely unknown to the individual consumer. This comment also addresses the shortcomings of the Health Insurance Portability and Accountability Act of 1996 (HIPAA), as well as the Genetic Information Nondiscrimination Act of 2008 (GINA) in regard to protecting individual’s genetic information from misuse. This comment …


The Tortoise And The Hare Of International Data Privacy Law: Can The United States Catch Up To Rising Global Standards?, Matthew Humerick Jan 2018

The Tortoise And The Hare Of International Data Privacy Law: Can The United States Catch Up To Rising Global Standards?, Matthew Humerick

Catholic University Journal of Law and Technology

Technological developments spur the development of big data on a global scale. The breadth of data companies collect, maintain, process, and transmit affects nearly every country and organization around the world. Inherent to big data are issues of data protection and transfers to third countries. While many jurisdictions emphasize the importance of protecting consumer data, such as the European Union, others, like the United States, do not. To circumvent this issue, the United States and European Union contracted around data privacy standard discrepancies through the Safe Harbor Agreement, which eased cross-border data transfers. However, the Court of Justice of the …


Masthead, Editor In Chief Jan 2018

Masthead, Editor In Chief

Catholic University Journal of Law and Technology

No abstract provided.


Table Of Contents, Editor In Chief Jan 2018

Table Of Contents, Editor In Chief

Catholic University Journal of Law and Technology

No abstract provided.