Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

First Amendment

Privacy

Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 85

Full-Text Articles in Privacy Law

Inadequate Privacy: The Necessity Of Hipaa Reform In A Post-Dobbs World, Katherine Robertson Jan 2023

Inadequate Privacy: The Necessity Of Hipaa Reform In A Post-Dobbs World, Katherine Robertson

Seattle University Law Review

Part I of this Comment will provide an overview of HIPAA and the legal impacts of Dobbs. Part II will discuss the anticipatory response to the impacts of Dobbs on PHI by addressing the response from (1) the states, (2) the Biden Administration, and (3) the medical field. Part III will discuss the loopholes that exist in HIPAA and further address the potential impacts on individuals and the medical field if reform does not occur. Finally, Part IV will argue that the reform of HIPAA is the best avenue for protecting PHI related to reproductive healthcare.


Big Data, Big Gap: Working Towards A Hipaa Framework That Covers Big Data, Ryan Mueller Oct 2022

Big Data, Big Gap: Working Towards A Hipaa Framework That Covers Big Data, Ryan Mueller

Indiana Law Journal

One lasting impact of the Health Insurance Portability and Accountability Act (HIPAA) is the privacy protections it provides for our sensitive health information. In the era of Big Data, however, much of our health information exists outside the traditional doctor-patient dynamic. From wearable technology, to mobile applications, to social media and internet browsing, Big Data organizations collect swaths of data that shed light on sensitive health information. Big Data organizations largely fall outside of HIPAA’s current framework because of the stringent requirements for when the HIPAA protections apply, namely that the data must be held by a covered entity, and …


Content Moderation As Surveillance, Hannah Bloch-Wehba Oct 2022

Content Moderation As Surveillance, Hannah Bloch-Wehba

Faculty Scholarship

Technology platforms are the new governments, and content moderation is the new law, or so goes a common refrain. As platforms increasingly turn toward new, automated mechanisms of enforcing their rules, the apparent power of the private sector seems only to grow. Yet beneath the surface lies a web of complex relationships between public and private authorities that call into question whether platforms truly possess such unilateral power. Law enforcement and police are exerting influence over platform content rules, giving governments a louder voice in supposedly “private” decisions. At the same time, law enforcement avails itself of the affordances of …


You Are Not A Commodity: A More Efficient Approach To Commercial Privacy Rights, Benjamin T. Pardue Dec 2021

You Are Not A Commodity: A More Efficient Approach To Commercial Privacy Rights, Benjamin T. Pardue

Washington Law Review

United States common law provides four torts for privacy invasion: (1) disclosure of private facts, (2) intrusion upon seclusion, (3) placement of a person in a false light, and (4) appropriation of name or likeness. Appropriation of name or likeness occurs when a defendant commandeers the plaintiff’s recognizability, typically for a commercial benefit. Most states allow plaintiffs who establish liability to recover defendants’ profits as damages from the misappropriation under an “unjust enrichment” theory. By contrast, this Comment argues that such an award provides a windfall to plaintiffs and contributes to suboptimal social outcomes. These include overcompensating plaintiffs and incentivizing …


Deepfake Privacy: Attitudes And Regulation, Matthew B. Kugler, Carly Pace Nov 2021

Deepfake Privacy: Attitudes And Regulation, Matthew B. Kugler, Carly Pace

Northwestern University Law Review

Using only a series of images of a person’s face and publicly available software, it is now possible to insert the person’s likeness into a video and show them saying or doing almost anything. This “deepfake” technology has permitted an explosion of political satire and, especially, fake pornography. Several states have already passed laws regulating deepfakes, and more are poised to do so. This Article presents three novel empirical studies that assess public attitudes toward this new technology. In our main study, a representative sample of the U.S. adult population perceived nonconsensually created pornographic deepfake videos as extremely harmful and …


Hacks, Leaks, And Data Dumps: The Right To Publish Illegally Acquired Information Twenty Years After Bartnicki V. Vopper, Erik Ugland, Christina Mazzeo Mar 2021

Hacks, Leaks, And Data Dumps: The Right To Publish Illegally Acquired Information Twenty Years After Bartnicki V. Vopper, Erik Ugland, Christina Mazzeo

Washington Law Review

This Article addresses a fluid and increasingly salient category of cases involving the First Amendment right to publish information that was hacked, stolen, or illegally leaked by someone else. Twenty years ago, in Bartnicki v. Vopper, the Supreme Court appeared to give broad constitutional cover to journalists and other publishers in these situations, but Justice Stevens’s inexact opinion for the Court and Justice Breyer’s muddling concurrence left the boundaries unclear. The Bartnicki framework is now implicated in dozens of new cases— from the extradition and prosecution of Julian Assange, to Donald Trump’s threatened suit of The New York Times …


Agonistic Privacy & Equitable Democracy, Scott Skinner-Thompson Jan 2021

Agonistic Privacy & Equitable Democracy, Scott Skinner-Thompson

Publications

This Essay argues that legal privacy protections—which enable individuals to control their visibility within public space—play a vital role in disrupting the subordinating, antidemocratic impacts of surveillance and should be at the forefront of efforts to reform the operation of both digital and physical public space. Robust privacy protections are a touchstone for empowering members of different marginalized groups with the ability to safely participate in both the physical and digital public squares, while also preserving space for vibrant subaltern counterpublics. By increasing heterogeneity within the public sphere, privacy can also help decrease polarization by breaking down echo chambers and …


Catalyzing Privacy Law, Anupam Chander, Margot E. Kaminski, William Mcgeveran Jan 2021

Catalyzing Privacy Law, Anupam Chander, Margot E. Kaminski, William Mcgeveran

Publications

The United States famously lacks a comprehensive federal data privacy law. In the past year, however, over half the states have proposed broad privacy bills or have established task forces to propose possible privacy legislation. Meanwhile, congressional committees are holding hearings on multiple privacy bills. What is catalyzing this legislative momentum? Some believe that Europe’s General Data Protection Regulation (GDPR), which came into force in 2018, is the driving factor. But with the California Consumer Privacy Act (CCPA) which took effect in January 2020, California has emerged as an alternate contender in the race to set the new standard for …


The First Amendment And The Right(S) Of Publicity, Jennifer E. Rothman, Robert C. Post Oct 2020

The First Amendment And The Right(S) Of Publicity, Jennifer E. Rothman, Robert C. Post

All Faculty Scholarship

The right of publicity protects persons against unauthorized uses of their identity, most typically their names, images, or voices. The right is in obvious tension with freedom of speech. Yet courts seeking to reconcile the right with the First Amendment have to date produced only a notoriously confused muddle of inconsistent constitutional doctrine. In this Article, we suggest a way out of the maze. We propose a relatively straightforward framework for analyzing how the right of publicity should be squared with First Amendment principles.

At the root of contemporary constitutional confusion lies a failure to articulate the precise state interests …


The Fourth Amendment At Home, Thomas P. Crocker Oct 2020

The Fourth Amendment At Home, Thomas P. Crocker

Indiana Law Journal

A refuge, a domain of personal privacy, and the seat of familial life, the home holds a special place in Fourth Amendment jurisprudence. Supreme Court opinions are replete with statements affirming the special status of the home. Fourth Amendment text places special emphasis on securing protections for the home in addition to persons, papers, and effects against unwarranted government intrusion. Beyond the Fourth Amendment, the home has a unique place within constitutional structure. The home receives privacy protections in addition to sheltering other constitutional values protected by the Due Process Clause and the First Amendment. For example, under the Due …


The First Amendment And Data Privacy: Securing Data Privacy Laws That Withstand Constitutional Muster, Kathryn Peyton Jul 2020

The First Amendment And Data Privacy: Securing Data Privacy Laws That Withstand Constitutional Muster, Kathryn Peyton

Pepperdine Law Review

Given the growing ubiquity of digital technology’s presence in people’s lives today, it is becoming increasingly more necessary to secure data privacy protections. People interact with technology constantly, ranging from when engaging in business activates, such as corresponding through emails or doing research online, to more innocuous activities like driving, shopping, or talking with friends and family. The advances in technology have made possible the creation of digital trails whenever someone interacts with such technology. Companies aggregate data from data trails and use predictive analytics to create detailed profiles about citizen-consumers. This information is typically used for profit generating purposes. …


Sharenting And The (Potential) Right To Be Forgotten, Keltie Haley Jul 2020

Sharenting And The (Potential) Right To Be Forgotten, Keltie Haley

Indiana Law Journal

Part I of this Note serves as an evaluation of parental use of social media and

further seeks to draw attention to the social and developmental impact parental

oversharing can have on children. Part II examines the tension between parents’

constitutional rights to direct the upbringing of their children, as well as their First

Amendment interest in online expression, and their children’s interest in personal

data security and privacy. Part III provides an overview of the European Union’s

right to be forgotten framework in the sharenting context and considers the

plausibility of implementing such a framework in the United States. …


Automation In Moderation, Hannah Bloch-Wehba Mar 2020

Automation In Moderation, Hannah Bloch-Wehba

Faculty Scholarship

This Article assesses recent efforts to encourage online platforms to use automated means to prevent the dissemination of unlawful online content before it is ever seen or distributed. As lawmakers in Europe and around the world closely scrutinize platforms’ “content moderation” practices, automation and artificial intelligence appear increasingly attractive options for ridding the Internet of many kinds of harmful online content, including defamation, copyright infringement, and terrorist speech. Proponents of these initiatives suggest that requiring platforms to screen user content using automation will promote healthier online discourse and will aid efforts to limit Big Tech’s power.

In fact, however, the …


News As Surveillance, Erin C. Carroll Jan 2020

News As Surveillance, Erin C. Carroll

Georgetown Law Faculty Publications and Other Works

As inhabitants of the Information Age, we are increasingly aware of the amount and kind of data that technology platforms collect on us. Far less publicized, however, is how much data news organizations collect on us as we read the news online and how they allow third parties to collect that personal data as well. A handful of studies by computer scientists reveal that, as a group, news websites are among the Internet’s worst offenders when it comes to tracking their visitors.

On the one hand, this surveillance is unsurprising. It is capitalism at work. The press’s business model has …


Privacy, Eavesdropping, And Wiretapping Across The United States: Reasonable Expectation Of Privacy And Judicial Discretion, Carol M. Bast Jan 2020

Privacy, Eavesdropping, And Wiretapping Across The United States: Reasonable Expectation Of Privacy And Judicial Discretion, Carol M. Bast

Catholic University Journal of Law and Technology

One-party consent and all-party consent eavesdropping and wiretapping statutes are two broad pathways for legislation to deal with the problem of secret taping and some states protect conversation under state constitutions. Whether a conversation is protected against being taped as a private conversation is often gauged by the reasonable expectation of privacy standard. Judges in both all-party consent and one-party consent jurisdictions have had to use their leeway under the reasonable expectation of privacy standard to arrive at what at the time seemed to be the most appropriate solution, perhaps in doing so creating a case law exception.


Deep Fakes: A Looming Challenge For Privacy, Democracy, And National Security, Danielle K. Citron, Robert Chesney Dec 2019

Deep Fakes: A Looming Challenge For Privacy, Democracy, And National Security, Danielle K. Citron, Robert Chesney

Faculty Scholarship

Harmful lies are nothing new. But the ability to distort reality has taken an exponential leap forward with “deep fake” technology. This capability makes it possible to create audio and video of real people saying and doing things they never said or did. Machine learning techniques are escalating the technology’s sophistication, making deep fakes ever more realistic and increasingly resistant to detection. Deep-fake technology has characteristics that enable rapid and widespread diffusion, putting it into the hands of both sophisticated and unsophisticated actors. While deep-fake technology will bring with it certain benefits, it also will introduce many harms. The marketplace …


Law School News: Logan To Serve As Adviser On Restatement Third Of Torts 11-07-2019, Michael M. Bowden Nov 2019

Law School News: Logan To Serve As Adviser On Restatement Third Of Torts 11-07-2019, Michael M. Bowden

Life of the Law School (1993- )

No abstract provided.


Rights On Publicity As Remarkably Insignificant, R. George Wright Apr 2019

Rights On Publicity As Remarkably Insignificant, R. George Wright

Cleveland State Law Review

This Article introduces the right of publicity through a brief consideration of high-profile cases involving, respectively, Paris Hilton, human cannonball Hugo Zacchini, and the famous actress Olivia de Havilland. With this background understanding, the Article considers the supposed risks to freedom of speech posed by recognizing rights of publicity in a private party. From there, the Article addresses the nagging concern that the publicity rights cases promote a harmful "celebrification" of culture. Finally, the Article considers whether allowing for meaningful damage recoveries in publicity rights cases appropriately compensates victims in ways promoting the broad public interest.


The Department Of Justice Versus Apple Inc. -- The Great Encryption Debate Between Privacy And National Security, Julia P. Eckart Jan 2019

The Department Of Justice Versus Apple Inc. -- The Great Encryption Debate Between Privacy And National Security, Julia P. Eckart

Catholic University Journal of Law and Technology

This article is an attempt to objectively examine and assess legal arguments made by Apple Inc. (Apple) and the Department of Justice (DOJ) concerning the DOJ’s use of the All Writs Act[1] (AWA) to require Apple to provide technical assistance to the DOJ so that it could access the encrypted data from the locked iPhone of Syed Rizwan Farook, commonly referred to as the San Bernardino shooter. The DOJ’s initial ex parte application focused on meeting the requirements of United States v. New York Telephone Co.[2] concluding the court order was authorized and appropriate. Apple not only argued …


Keeping It Off The Record: Student Social Media Monitoring And The Need For Updated Student Records Laws, Alice Haston Jan 2019

Keeping It Off The Record: Student Social Media Monitoring And The Need For Updated Student Records Laws, Alice Haston

Vanderbilt Journal of Entertainment & Technology Law

An increasing number of school districts work with private companies to monitor public social media and to notify administrators of alarming student information. Although these services help address challenging school safety issues, the Family Educational Rights and Privacy Act (FERPA) and state law offer little guidance on how districts should store student social media data. This Note encourages states to pass student records laws similar to recent California legislation and urges the Department of Education to clarify the relationship between student social media and education records under FERPA. New state and federal initiatives would help ensure that third parties may …


Recording As Heckling, Scott Skinner-Thompson Jan 2019

Recording As Heckling, Scott Skinner-Thompson

Publications

A growing body of authority recognizes that citizen recording of police officers and public space is protected by the First Amendment. But the judicial and scholarly momentum behind the emerging “right to record” fails to fully incorporate recording’s cost to another important right that also furthers First Amendment principles: the right to privacy.

This Article helps fill that gap by comprehensively analyzing the First Amendment interests of both the right to record and the right to privacy in public while highlighting the role of technology in altering the First Amendment landscape. Recording information can be critical to future speech and, …


Global Platform Governance: Private Power In The Shadow Of The State, Hannah Bloch-Wehba Jan 2019

Global Platform Governance: Private Power In The Shadow Of The State, Hannah Bloch-Wehba

Faculty Scholarship

Online intermediaries—search engines, social media platforms, even e-commerce businesses—are increasingly required to make critical decisions about free expression, individual privacy, and property rights under domestic law. These requirements arise in contexts that include the right to be forgotten, hate speech, “terrorist” speech, and copyright and intellectual property. At the same time, these disputes about online speech are increasingly borderless. Many laws targeting online speech and privacy are explicitly extraterritorial in scope. Even when not, some courts have ruled that they have jurisdiction to enforce compliance on a global scale. And governments are also demanding that platforms remove content—on a global …


The First Amendment In The Second Gilded Age, Jack M. Balkin Dec 2018

The First Amendment In The Second Gilded Age, Jack M. Balkin

Buffalo Law Review

How do we pay for the digital public sphere? In the Second Gilded Age, the answer is primarily through digital surveillance and through finding ever new ways to make money out of personal data. Digital capitalism in the Second Gilded Age features an implicit bargain: a seemingly unlimited freedom to speak in exchange for the right to surveil and manipulate end users.To protect freedom of speech in the Second Gilded Age we must distinguish the values of free speech from the judicially created doctrines of the First Amendment. That is because the practical freedom to speak online depends on a …


Rwu First Amendment Blog: David Logan's Blog: Discovering Trump 06-22-2018, David A. Logan Jun 2018

Rwu First Amendment Blog: David Logan's Blog: Discovering Trump 06-22-2018, David A. Logan

Law School Blogs

No abstract provided.


Defamation And Privacy In The Social Media Age: What Would Justice Brennan Think?, Stephen Wermiel Jan 2018

Defamation And Privacy In The Social Media Age: What Would Justice Brennan Think?, Stephen Wermiel

Articles in Law Reviews & Other Academic Journals

No abstract provided.


Privacy's Double Standards, Scott Skinner-Thompson Jan 2018

Privacy's Double Standards, Scott Skinner-Thompson

Publications

Where the right to privacy exists, it should be available to all people. If not universally available, then privacy rights should be particularly accessible to marginalized individuals who are subject to greater surveillance and are less able to absorb the social costs of privacy violations. But in practice, there is evidence that people of privilege tend to fare better when they bring privacy tort claims than do non-privileged individuals. This disparity occurs despite doctrine suggesting that those who occupy prominent and public social positions are entitled to diminished privacy tort protections.

This Article unearths disparate outcomes in public disclosure tort …


When Privacy Almost Won: Time, Inc. V. Hill (1967), Samantha Barbas Nov 2017

When Privacy Almost Won: Time, Inc. V. Hill (1967), Samantha Barbas

Samantha Barbas

Drawing on previously unexplored and unpublished archival papers of Richard Nixon, the plaintiffs’ lawyer in the case, and the justices of the Warren Court, this article tells the story of the seminal First Amendment case Time, Inc. v. Hill (1967). In Hill, the Supreme Court for the first time addressed the conflict between the right to privacy and freedom of the press. The Court constitutionalized tort liability for invasion of privacy, acknowledging that it raised First Amendment issues and must be governed by constitutional standards. Hill substantially diminished privacy rights; today it is difficult if not impossible to recover against …


The Sidis Case And The Origins Of Modern Privacy Law, Samantha Barbas Nov 2017

The Sidis Case And The Origins Of Modern Privacy Law, Samantha Barbas

Samantha Barbas

The American press, it’s been said, is freer to invade personal privacy than perhaps any other in the world. The tort law of privacy, as a shield against unwanted media exposure of private life, is very weak. The usual reason given for the weakness of U.S. privacy law as a bar on the publication of private information is the strong tradition of First Amendment freedom. But “freedom of the press” alone cannot explain why liberty to publish has been interpreted as a right to print truly intimate matters or to thrust people into the spotlight against their will. Especially in …


Second Class For The Second Time: How The Commercial Speech Doctrine Stigmatizes Commercial Use Of Aggregated Public Records, Brian N. Larson, Genelle I. Belmas Oct 2017

Second Class For The Second Time: How The Commercial Speech Doctrine Stigmatizes Commercial Use Of Aggregated Public Records, Brian N. Larson, Genelle I. Belmas

Brian Larson

This Article argues that access to aggregated electronic public records for commercial use should receive protection under the First Amendment in the same measure as the speech acts the access supports. In other words, we view commercial access to aggregated public records as an essential means to valuable speech. For many, however, the taint of the commercial speech doctrine is turning all “information flows” into commercial ones. This, in turn, is threatening the access to government records.


Targeted Advertising And The First Amendment: Student Privacy Vs. Protected Speech, Marco Crocetti Jan 2017

Targeted Advertising And The First Amendment: Student Privacy Vs. Protected Speech, Marco Crocetti

Catholic University Journal of Law and Technology

No abstract provided.