Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- First Amendment (4)
- Privacy (4)
- Data Privacy (2)
- Defamation (2)
- First amendment (2)
-
- Free speech (2)
- Freedom of speech (2)
- GDPR (2)
- Personal Data (2)
- Personal Information (2)
- Surveillance (2)
- Torts (2)
- "Beverly Hills Hotel" (1)
- "Hush money" (1)
- "National Enquirer" (1)
- "Stormy Daniels" (1)
- 9-1-1 (1)
- ART (1)
- Advertisement law (1)
- Advertising law (1)
- Age (1)
- Alexa (1)
- Amazon Echo (1)
- Appropriation of identity (1)
- Artificial intelligence (1)
- Balancing publicity rights (1)
- Banking (1)
- Businessman (1)
- CDC (1)
- Cambridge Analytica (1)
- Publication
- Publication Type
Articles 1 - 24 of 24
Full-Text Articles in Privacy Law
The First Amendment In The Second Gilded Age, Jack M. Balkin
The First Amendment In The Second Gilded Age, Jack M. Balkin
Buffalo Law Review
How do we pay for the digital public sphere? In the Second Gilded Age, the answer is primarily through digital surveillance and through finding ever new ways to make money out of personal data. Digital capitalism in the Second Gilded Age features an implicit bargain: a seemingly unlimited freedom to speak in exchange for the right to surveil and manipulate end users.To protect freedom of speech in the Second Gilded Age we must distinguish the values of free speech from the judicially created doctrines of the First Amendment. That is because the practical freedom to speak online depends on a …
Dialing It Back: Why Courts Should Rethink Students’ Privacy And Speech Rights As Cell Phone Communications Erode The ‘Schoolhouse Gate’, Nicholas J. Mcguire
Dialing It Back: Why Courts Should Rethink Students’ Privacy And Speech Rights As Cell Phone Communications Erode The ‘Schoolhouse Gate’, Nicholas J. Mcguire
Duke Law & Technology Review
The ubiquity of cell phones in today’s society has forced courts to change or dismiss established, but inapplicable analytical frameworks. Two such frameworks in the school setting are regulations of student speech and of student searches. This Article traces the constitutional jurisprudence of both First Amendment off-campus speech protection and Fourth Amendment search standards as applied to the school setting. It then analyzes how the Supreme Court’s ruling in Riley v. California complicates both areas. Finally, it proposes a pragmatic solution: by recognizing a categorical First Amendment exception for “substantial threats” against the school community, courts could accommodate students’ constitutional …
Telemarketing, Technology, And The Regulation Of Private Speech: First Amendment Lessons From The Fcc’S Tcpa Rules, Justin (Gus) Hurwitz
Telemarketing, Technology, And The Regulation Of Private Speech: First Amendment Lessons From The Fcc’S Tcpa Rules, Justin (Gus) Hurwitz
Brooklyn Law Review
This article considers the viability of the Telephone Consumer Protection Act (TCPA) in light of recent Supreme Court First Amendment precedent and technological and regulatory developments. Robocalls—phone calls made using autodialers or prerecorded messages without the consent of the call recipient—have become one of the primary consumer protection issues facing regulators. With more than 2.4 billion of these calls placed each month, consumer concern about them dominate complaints received by both the Federal Communications Commission and Federal Trade Commission. Simultaneously, as cellphones have become a ubiquitous means by which individuals engage with one another and have become the public square, …
Rwu First Amendment Blog: David Logan's Blog: Discovering Trump 06-22-2018, David A. Logan
Rwu First Amendment Blog: David Logan's Blog: Discovering Trump 06-22-2018, David A. Logan
Law School Blogs
No abstract provided.
Search Query: Can America Accept A Right To Be Forgotten As A Publicity Right?, James J. Lavelle
Search Query: Can America Accept A Right To Be Forgotten As A Publicity Right?, James J. Lavelle
Brooklyn Law Review
Search engines have profoundly changed the relationship between privacy and free speech by making personal information widely and cheaply available to a global audience. This has raised many concerns both over how online companies handle the information they collect and how regular citizens use online services to invade other people’s privacy. One way Europe has addressed this change is by providing European Union citizens with a right to petition search engines to deindex links from search results—a so-called “right to be forgotten.” If the information contained in a search result is “inadequate, irrelevant or no longer relevant,” the search engine …
Drawing The Line: The Jurisprudence Of Non-Consensual Pornography And The Implications Of Kanye West’S Famous Music Video, Karla Utset
University of Miami Law Review
In June 2016, American rapper Kanye West premiered the music video for Famous from his seventh studio album “The Life of Pablo.” West’s Famous music video, inspired by Vincent Desiderio’s painting Sleep, features nude replications of several celebrities lying together on a bed. The cinematography is voyeuristic, with one journalist describing the video as “predatory.” In making and publicizing the infamous music video, West failed to seek and acquire the consent of several of the individuals featured. The production received both considerable praise and backlash from artists, critics, and the celebrities depicted.
This Note discusses the jurisprudence of non-consensual pornography, …
Harmonizing The Tension Between The First Amendment And Publicity Rights And Finding The Right Balance: Discerning How Much Freedom Is Warranted And What Needs Protection, William Buchsbaum
Harmonizing The Tension Between The First Amendment And Publicity Rights And Finding The Right Balance: Discerning How Much Freedom Is Warranted And What Needs Protection, William Buchsbaum
The University of Cincinnati Intellectual Property and Computer Law Journal
This paper examines the tension between the First Amendment and Publicity Rights considering why and how friction is emerging, the legal underpinnings and theories behind the development of publicity rights and how to reconcile this with values raised in support of the First Amendment. This collision course of rights occurs where property interests have vested in human identity itself which brings us face to face with the outer limits of free speech and expression under the First Amendment and evens tests the notion of how we define speech. The paper takes a dive into some of the currently arising issues …
Privacy, Press, And The Right To Be Forgotten In The United States, Amy Gajda
Privacy, Press, And The Right To Be Forgotten In The United States, Amy Gajda
Washington Law Review
When the European Court of Justice in effect accepted a Right to Be Forgotten in 2014, ruling that a man had a right to privacy in his past economic troubles, many suggested that a similar right would be neither welcomed nor constitutional in the United States given the Right’s impact on First Amendment-related freedoms. Even so, a number of state and federal courts have recently used language that embraces in a normative sense the appropriateness of such a Right. These court decisions protect an individual’s personal history in a press-relevant way: they balance individual privacy rights against the public value …
Sexual Privacy, Danielle Keats Citron
Sexual Privacy, Danielle Keats Citron
Faculty Scholarship
Those who wish to control and expose the identities of women and people from marginalized communities routinely do so by invading their privacy. People are secretly recorded in bedrooms and public bathrooms, and “up their skirts.” They are coerced into sharing nude photographs and filming sex acts under the threat of public disclosure of their nude images. People’s nude images are posted online without permission. Machine-learning technology is used to create digitally manipulated “deep fake” sex videos that swap people’s faces into pornography.
At the heart of these abuses is an invasion of sexual privacy—the behaviors and expectations that manage …
Table Of Contents
Catholic University Journal of Law and Technology
No abstract provided.
Deepfake Videos: When Seeing Isn't Believing, Holly Kathleen Hall
Deepfake Videos: When Seeing Isn't Believing, Holly Kathleen Hall
Catholic University Journal of Law and Technology
Videos, known as deepfakes, use readily available software to create a work that shows people saying and doing things they may never have uttered or engaged in. The technology making the videos appear very authentic is advancing at such a rate that people may not be able to detect if the videos are fact or fiction. Given the hasty acceptance of other forms of fake news in society, deepfake videos have the ability to affect the nature of information the public receives about candidates and policies. This study examines the potential use of deepfake videos in the democratic process, analyzes …
Ng9-1-1, Cybersecurity, And Contributions To The Model Framework For A Secure National Infrastructure, Andrew Jackson Coley
Ng9-1-1, Cybersecurity, And Contributions To The Model Framework For A Secure National Infrastructure, Andrew Jackson Coley
Catholic University Journal of Law and Technology
9-1-1 call networks form the foundation of emergency communications infrastructure. However, a lack of funding and taking such networks for granted has led to a gradual yet predictable outdating of this critical infrastructure. Fortunately, recent efforts have acknowledged as such, and dedicated public safety officials have worked to update 9-1-1 systems to Next Generation 9-1-1 (NG9-1-1).
NG9-1-1 is an IP-based network with 21stcentury technology capable of handling increased call volume, more resilient networks, and providing significantly more data to first responders, among litany of other advancements. With this much needed advancement comes the responsibilities of ensuring a secure …
Assessing Assisted Reproductive Technology, Raymond C. O'Brien
Assessing Assisted Reproductive Technology, Raymond C. O'Brien
Catholic University Journal of Law and Technology
Technological innovation possesses both opportunity and challenge. Because assisted reproductive technology (ART) involves sexual intimacy, parenthood, personhood, gender identity, privacy, legacy, and a plethora of religious, historical, sociological, and ethical underpinnings, the challenges presented in such technological innovation are substantial. Nonetheless, the opportunities are significant and progressive. Because of in vitro fertilization, gestational and genetic surrogacy, posthumous conception, and mitochondrial replacement therapy, humans now have the opportunity to overcome infertility, gender obstacles to parentage, dynastic limitations, and diseases that have long plagued mothers and infants. However, challenges include the exploitation of surrogates, unequal access to ART services, possibilities of cloning …
Privacy Of Information And Dna Testing Kits, Shanna Raye Mason
Privacy Of Information And Dna Testing Kits, Shanna Raye Mason
Catholic University Journal of Law and Technology
In modern times, consumers desire for more control over their own health and healthcare. With this growing interest of control, direct to consumer DNA testing kits have never been more popular. However, many consumers are unaware of the potential privacy concerns associated with such use. This comment examines the popularity and privacy risks that are likely unknown to the individual consumer. This comment also addresses the shortcomings of the Health Insurance Portability and Accountability Act of 1996 (HIPAA), as well as the Genetic Information Nondiscrimination Act of 2008 (GINA) in regard to protecting individual’s genetic information from misuse. This comment …
The Tortoise And The Hare Of International Data Privacy Law: Can The United States Catch Up To Rising Global Standards?, Matthew Humerick
The Tortoise And The Hare Of International Data Privacy Law: Can The United States Catch Up To Rising Global Standards?, Matthew Humerick
Catholic University Journal of Law and Technology
Technological developments spur the development of big data on a global scale. The breadth of data companies collect, maintain, process, and transmit affects nearly every country and organization around the world. Inherent to big data are issues of data protection and transfers to third countries. While many jurisdictions emphasize the importance of protecting consumer data, such as the European Union, others, like the United States, do not. To circumvent this issue, the United States and European Union contracted around data privacy standard discrepancies through the Safe Harbor Agreement, which eased cross-border data transfers. However, the Court of Justice of the …
Masthead, Editor In Chief
Masthead, Editor In Chief
Catholic University Journal of Law and Technology
No abstract provided.
Table Of Contents, Editor In Chief
Table Of Contents, Editor In Chief
Catholic University Journal of Law and Technology
No abstract provided.
Alexa, Who Owns My Pillow Talk? Contracting, Collaterizing, And Monetizing Consumer Privacy Through Voice-Captured Personal Data, Anne Logsdon Smith
Alexa, Who Owns My Pillow Talk? Contracting, Collaterizing, And Monetizing Consumer Privacy Through Voice-Captured Personal Data, Anne Logsdon Smith
Catholic University Journal of Law and Technology
With over one-fourth of households in the U.S. alone now using voice-activated digital assistant devices such as Amazon’s Echo (better known as “Alexa”) and Google’s Home, companies are recording and transmitting record volumes of voice data from the privacy of people’s homes to servers across the globe. These devices capture conversations about everything from online shopping to food preferences to entertainment recommendations to bedtime stories, and even phone and appliance use. With “Big Data” and business analytics expected to be a $203 billion-plus industry by 2020, companies are racing to acquire and leverage consumer data by selling it, licensing it, …
Defamation And Privacy In The Social Media Age: What Would Justice Brennan Think?, Stephen Wermiel
Defamation And Privacy In The Social Media Age: What Would Justice Brennan Think?, Stephen Wermiel
Articles in Law Reviews & Other Academic Journals
No abstract provided.
Robotic Speakers And Human Listeners, Helen Norton
Robotic Speakers And Human Listeners, Helen Norton
Publications
In their new book, Robotica, Ron Collins and David Skover assert that we protect speech not so much because of its value to speakers but instead because of its affirmative value to listeners. If we assume that the First Amendment is largely, if not entirely, about serving listeners’ interests—in other words, that it’s listeners all the way down—what would a listener-centered approach to robotic speech require? This short symposium essay briefly discusses the complicated and sometimes even dark side of robotic speech from a listener-centered perspective.
Privacy's Double Standards, Scott Skinner-Thompson
Privacy's Double Standards, Scott Skinner-Thompson
Publications
Where the right to privacy exists, it should be available to all people. If not universally available, then privacy rights should be particularly accessible to marginalized individuals who are subject to greater surveillance and are less able to absorb the social costs of privacy violations. But in practice, there is evidence that people of privilege tend to fare better when they bring privacy tort claims than do non-privileged individuals. This disparity occurs despite doctrine suggesting that those who occupy prominent and public social positions are entitled to diminished privacy tort protections.
This Article unearths disparate outcomes in public disclosure tort …