Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 42

Full-Text Articles in Privacy Law

Content Moderation As Surveillance, Hannah Bloch-Wehba Oct 2022

Content Moderation As Surveillance, Hannah Bloch-Wehba

Faculty Scholarship

Technology platforms are the new governments, and content moderation is the new law, or so goes a common refrain. As platforms increasingly turn toward new, automated mechanisms of enforcing their rules, the apparent power of the private sector seems only to grow. Yet beneath the surface lies a web of complex relationships between public and private authorities that call into question whether platforms truly possess such unilateral power. Law enforcement and police are exerting influence over platform content rules, giving governments a louder voice in supposedly “private” decisions. At the same time, law enforcement avails itself of the affordances of …


Agonistic Privacy & Equitable Democracy, Scott Skinner-Thompson Jan 2021

Agonistic Privacy & Equitable Democracy, Scott Skinner-Thompson

Publications

This Essay argues that legal privacy protections—which enable individuals to control their visibility within public space—play a vital role in disrupting the subordinating, antidemocratic impacts of surveillance and should be at the forefront of efforts to reform the operation of both digital and physical public space. Robust privacy protections are a touchstone for empowering members of different marginalized groups with the ability to safely participate in both the physical and digital public squares, while also preserving space for vibrant subaltern counterpublics. By increasing heterogeneity within the public sphere, privacy can also help decrease polarization by breaking down echo chambers and …


Catalyzing Privacy Law, Anupam Chander, Margot E. Kaminski, William Mcgeveran Jan 2021

Catalyzing Privacy Law, Anupam Chander, Margot E. Kaminski, William Mcgeveran

Publications

The United States famously lacks a comprehensive federal data privacy law. In the past year, however, over half the states have proposed broad privacy bills or have established task forces to propose possible privacy legislation. Meanwhile, congressional committees are holding hearings on multiple privacy bills. What is catalyzing this legislative momentum? Some believe that Europe’s General Data Protection Regulation (GDPR), which came into force in 2018, is the driving factor. But with the California Consumer Privacy Act (CCPA) which took effect in January 2020, California has emerged as an alternate contender in the race to set the new standard for …


The First Amendment And The Right(S) Of Publicity, Jennifer E. Rothman, Robert C. Post Oct 2020

The First Amendment And The Right(S) Of Publicity, Jennifer E. Rothman, Robert C. Post

All Faculty Scholarship

The right of publicity protects persons against unauthorized uses of their identity, most typically their names, images, or voices. The right is in obvious tension with freedom of speech. Yet courts seeking to reconcile the right with the First Amendment have to date produced only a notoriously confused muddle of inconsistent constitutional doctrine. In this Article, we suggest a way out of the maze. We propose a relatively straightforward framework for analyzing how the right of publicity should be squared with First Amendment principles.

At the root of contemporary constitutional confusion lies a failure to articulate the precise state interests …


Automation In Moderation, Hannah Bloch-Wehba Mar 2020

Automation In Moderation, Hannah Bloch-Wehba

Faculty Scholarship

This Article assesses recent efforts to encourage online platforms to use automated means to prevent the dissemination of unlawful online content before it is ever seen or distributed. As lawmakers in Europe and around the world closely scrutinize platforms’ “content moderation” practices, automation and artificial intelligence appear increasingly attractive options for ridding the Internet of many kinds of harmful online content, including defamation, copyright infringement, and terrorist speech. Proponents of these initiatives suggest that requiring platforms to screen user content using automation will promote healthier online discourse and will aid efforts to limit Big Tech’s power.

In fact, however, the …


News As Surveillance, Erin C. Carroll Jan 2020

News As Surveillance, Erin C. Carroll

Georgetown Law Faculty Publications and Other Works

As inhabitants of the Information Age, we are increasingly aware of the amount and kind of data that technology platforms collect on us. Far less publicized, however, is how much data news organizations collect on us as we read the news online and how they allow third parties to collect that personal data as well. A handful of studies by computer scientists reveal that, as a group, news websites are among the Internet’s worst offenders when it comes to tracking their visitors.

On the one hand, this surveillance is unsurprising. It is capitalism at work. The press’s business model has …


Deep Fakes: A Looming Challenge For Privacy, Democracy, And National Security, Danielle K. Citron, Robert Chesney Dec 2019

Deep Fakes: A Looming Challenge For Privacy, Democracy, And National Security, Danielle K. Citron, Robert Chesney

Faculty Scholarship

Harmful lies are nothing new. But the ability to distort reality has taken an exponential leap forward with “deep fake” technology. This capability makes it possible to create audio and video of real people saying and doing things they never said or did. Machine learning techniques are escalating the technology’s sophistication, making deep fakes ever more realistic and increasingly resistant to detection. Deep-fake technology has characteristics that enable rapid and widespread diffusion, putting it into the hands of both sophisticated and unsophisticated actors. While deep-fake technology will bring with it certain benefits, it also will introduce many harms. The marketplace …


Law School News: Logan To Serve As Adviser On Restatement Third Of Torts 11-07-2019, Michael M. Bowden Nov 2019

Law School News: Logan To Serve As Adviser On Restatement Third Of Torts 11-07-2019, Michael M. Bowden

Life of the Law School (1993- )

No abstract provided.


Recording As Heckling, Scott Skinner-Thompson Jan 2019

Recording As Heckling, Scott Skinner-Thompson

Publications

A growing body of authority recognizes that citizen recording of police officers and public space is protected by the First Amendment. But the judicial and scholarly momentum behind the emerging “right to record” fails to fully incorporate recording’s cost to another important right that also furthers First Amendment principles: the right to privacy.

This Article helps fill that gap by comprehensively analyzing the First Amendment interests of both the right to record and the right to privacy in public while highlighting the role of technology in altering the First Amendment landscape. Recording information can be critical to future speech and, …


Global Platform Governance: Private Power In The Shadow Of The State, Hannah Bloch-Wehba Jan 2019

Global Platform Governance: Private Power In The Shadow Of The State, Hannah Bloch-Wehba

Faculty Scholarship

Online intermediaries—search engines, social media platforms, even e-commerce businesses—are increasingly required to make critical decisions about free expression, individual privacy, and property rights under domestic law. These requirements arise in contexts that include the right to be forgotten, hate speech, “terrorist” speech, and copyright and intellectual property. At the same time, these disputes about online speech are increasingly borderless. Many laws targeting online speech and privacy are explicitly extraterritorial in scope. Even when not, some courts have ruled that they have jurisdiction to enforce compliance on a global scale. And governments are also demanding that platforms remove content—on a global …


Rwu First Amendment Blog: David Logan's Blog: Discovering Trump 06-22-2018, David A. Logan Jun 2018

Rwu First Amendment Blog: David Logan's Blog: Discovering Trump 06-22-2018, David A. Logan

Law School Blogs

No abstract provided.


Defamation And Privacy In The Social Media Age: What Would Justice Brennan Think?, Stephen Wermiel Jan 2018

Defamation And Privacy In The Social Media Age: What Would Justice Brennan Think?, Stephen Wermiel

Articles in Law Reviews & Other Academic Journals

No abstract provided.


Privacy's Double Standards, Scott Skinner-Thompson Jan 2018

Privacy's Double Standards, Scott Skinner-Thompson

Publications

Where the right to privacy exists, it should be available to all people. If not universally available, then privacy rights should be particularly accessible to marginalized individuals who are subject to greater surveillance and are less able to absorb the social costs of privacy violations. But in practice, there is evidence that people of privilege tend to fare better when they bring privacy tort claims than do non-privileged individuals. This disparity occurs despite doctrine suggesting that those who occupy prominent and public social positions are entitled to diminished privacy tort protections.

This Article unearths disparate outcomes in public disclosure tort …


Newsroom: Logan On Trump And Libel Law 01-03-2017, Roger Williams University School Of Law Jan 2017

Newsroom: Logan On Trump And Libel Law 01-03-2017, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


Performative Privacy, Scott Skinner-Thompson Jan 2017

Performative Privacy, Scott Skinner-Thompson

Publications

Broadly speaking, privacy doctrine suggests that the right to privacy is non-existent once one enters the public realm. Although some scholars contend that privacy ought to exist in public, “public privacy” has been defended largely with reference to other, ancillary values privacy may serve. For instance, public privacy may be necessary to make the freedom of association meaningful in practice.

This Article identifies a new dimension of public privacy, supplementing extant justifications for the right, by arguing that many efforts to maintain privacy while in “public” are properly conceptualized as forms of performative, expressive resistance against an ever-pervasive surveillance society. …


Privacy And The Right To Record, Margot E. Kaminski Jan 2017

Privacy And The Right To Record, Margot E. Kaminski

Publications

Many U.S. laws protect privacy by governing recording. Recently, however, courts have recognized a First Amendment “right to record.” This Article addresses how courts should handle privacy laws in light of the developing First Amendment right to record.

The privacy harms addressed by recording laws are situated harms. Recording changes the way people behave in physical spaces by altering the nature of those spaces. Thus, recording laws can be placed within a long line of First Amendment case law that recognizes a valid government interest in managing the qualities of rivalrous physical space, so as not to allow one person’s …


Making News: Balancing Newsworthiness And Privacy In The Age Of Algorithms, Erin C. Carroll Jan 2017

Making News: Balancing Newsworthiness And Privacy In The Age Of Algorithms, Erin C. Carroll

Georgetown Law Faculty Publications and Other Works

In deciding privacy lawsuits against media defendants, courts have for decades deferred to the media. They have given it wide berth to determine what is newsworthy and so, what is protected under the First Amendment. And in doing so, they have often spoken reverently of the editorial process and journalistic decision-making.

Yet, in just the last several years, news production and consumption has changed dramatically. As we get more of our news from digital and social media sites, the role of information gatekeeper is shifting from journalists to computer engineers, programmers, and app designers. The algorithms that the latter write …


When Privacy Almost Won: Time, Inc. V. Hill (1967), Samantha Barbas Dec 2015

When Privacy Almost Won: Time, Inc. V. Hill (1967), Samantha Barbas

Journal Articles

Drawing on previously unexplored and unpublished archival papers of Richard Nixon, the plaintiffs’ lawyer in the case, and the justices of the Warren Court, this article tells the story of the seminal First Amendment case Time, Inc. v. Hill (1967). In Hill, the Supreme Court for the first time addressed the conflict between the right to privacy and freedom of the press. The Court constitutionalized tort liability for invasion of privacy, acknowledging that it raised First Amendment issues and must be governed by constitutional standards. Hill substantially diminished privacy rights; today it is difficult if not impossible to recover against …


The Pond Betwixt: Differences In The U.S.-Eu Data Protection/Safe Harbor Negotiation, Richard J. Peltz-Steele Jan 2015

The Pond Betwixt: Differences In The U.S.-Eu Data Protection/Safe Harbor Negotiation, Richard J. Peltz-Steele

Faculty Publications

This article analyzes the differing perspectives that animate US and EU conceptions of privacy in the context of data protection. It begins by briefly reviewing the two continental approaches to data protection and then explains how the two approaches arise in a context of disparate cultural traditions with respect to the role of law in society. In light of those disparities, Underpinning contemporary data protection regulation is the normative value that both US and EU societies place on personal privacy. Both cultures attribute modern privacy to the famous Warren-Brandeis article in 1890, outlining a "right to be let alone." But …


Outing Privacy, Scott Skinner-Thompson Jan 2015

Outing Privacy, Scott Skinner-Thompson

Publications

The government regularly outs information concerning people's sexuality, gender identity, and HIV status. Notwithstanding the implications of such outings, the Supreme Court has yet to resolve whether the Constitution contains a right to informational privacy - a right to limit the government's ability to collect and disseminate personal information.

This Article probes informational privacy theory and jurisprudence to better understand the judiciary's reluctance to fully embrace a constitutional right to informational privacy. The Article argues that while existing scholarly theories of informational privacy encourage us to broadly imagine the right and its possibilities, often focusing on informational privacy's ability to …


Regulating Real-World Surveillance, Margot E. Kaminski Jan 2015

Regulating Real-World Surveillance, Margot E. Kaminski

Publications

A number of laws govern information gathering, or surveillance, by private parties in the physical world. But we lack a compelling theory of privacy harm that accounts for the state's interest in enacting these laws. Without a theory of privacy harm, these laws will be enacted piecemeal. Legislators will have a difficult time justifying the laws to constituents; the laws will not be adequately tailored to legislative interest; and courts will find it challenging to weigh privacy harms against other strong values, such as freedom of expression.

This Article identifies the government interest in enacting laws governing surveillance by private …


Book Review. Balancing Privacy And Free Speech: Unwanted Attention In The Age Of Social Media By Mark Tunick, Kimberly Mattioli Jan 2015

Book Review. Balancing Privacy And Free Speech: Unwanted Attention In The Age Of Social Media By Mark Tunick, Kimberly Mattioli

Articles by Maurer Faculty

No abstract provided.


Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo Jan 2015

Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo

Articles

In 1986, Congress passed the Stored Communications Act (“SCA”) to provide additional protections for individuals’ private communications content held in electronic storage by third parties. Acting out of direct concern for the implications of the Third-Party Records Doctrine — a judicially created doctrine that generally eliminates Fourth Amendment protections for information entrusted to third parties — Congress sought to tailor the SCA to electronic communications sent via and stored by third parties. Yet, because Congress crafted the SCA with language specific to the technology of 1986, courts today have struggled to apply the SCA consistently with regard to similar private …


Online Privacy And The First Amendment: An Opt-In Approach To Data Processing, Joseph A. Tomain Jan 2014

Online Privacy And The First Amendment: An Opt-In Approach To Data Processing, Joseph A. Tomain

Articles by Maurer Faculty

An individual has little to no ability to prevent online commercial actors from collecting, using, or disclosing data about her. This lack of individual choice is problematic in the Big Data era because individual privacy interests are threatened by the ever increasing number of actors processing data, as well as the ever increasing amount and types of data being processed. This Article argues that online commercial actors should be required to receive an individual’s opt-in consent prior to data processing as a way of protecting individual privacy. I analyze whether an opt-in requirement is constitutionally permissible under the First Amendment …


Real Masks And Real Name Policies: Applying Anti-Mask Case Law To Anonymous Online Speech, Margot E. Kaminski Jan 2013

Real Masks And Real Name Policies: Applying Anti-Mask Case Law To Anonymous Online Speech, Margot E. Kaminski

Publications

The First Amendment protects anonymous speech, but the scope of that protection has been the subject of much debate. This Article adds to the discussion of anonymous speech by examining anti-mask statutes and cases as an analogue for the regulation of anonymous speech online. Anti-mask case law answers a number of questions left open by the Supreme Court. It shows that courts have used the First Amendment to protect anonymity beyond core political speech, when mask-wearing is expressive conduct or shows a nexus with free expression. This Article explores what the anti-mask cases teach us about anonymity online, including proposed …


Durkheim's Internet: Social And Political Theory In Online Society, Ari Ezra Waldman Jan 2013

Durkheim's Internet: Social And Political Theory In Online Society, Ari Ezra Waldman

Articles & Chapters

While the Internet has changed dramatically since the early 1990s, the legal regime governing the right to privacy online and Internet speech is still steeped in a myth of the Internet user, completely hidden from others, in total control of his online experience, and free to come and go as he pleases. This false image of the “virtual self” has also contributed to an ethos of lawlessness, irresponsibility, and radical individuation online, allowing the evisceration of online privacy and the proliferation of hate and harassment.

I argue that the myth of the online anonym is not only false as a …


Drone Federalism: Civilian Drones And The Things They Carry, Margot E. Kaminski Dec 2012

Drone Federalism: Civilian Drones And The Things They Carry, Margot E. Kaminski

Publications

Civilian drones are scheduled to be permitted in the national airspace as early as 2015. Many think Congress should establish the necessary nationwide regulations to govern both law enforcement and civilian drone use. That thinking, however, is wrong. This Essay suggests drone federalism instead: a state-based approach to privacy regulation that governs drone use by civilians, drawing on states’ experience regulating other forms of civilian-on-civilian surveillance. This approach will allow necessary experimentation in how to best balance privacy concerns against First Amendment rights in the imminent era of drone-use democratization. This Essay closes by providing some guidance to states as …


Privacy Rights: The Virtue Of Protecting A False Reputation, John A. Humbach May 2012

Privacy Rights: The Virtue Of Protecting A False Reputation, John A. Humbach

Elisabeth Haub School of Law Faculty Publications

What is the virtue of protecting a false reputation? The thesis of this paper is that there is none. There is none, at least, that justifies the suppression of free speech. Yet, there is a growing trend to see the protection of reputation from truth as a key function of the so-called “right of privacy.”

Unfortunately, people often do things that they are not proud of or do not want others to know about. Often, however, these are precisely the things that others want or need to know. For our own protection, each of us is better off being aware …


The Sidis Case And The Origins Of Modern Privacy Law, Samantha Barbas Jan 2012

The Sidis Case And The Origins Of Modern Privacy Law, Samantha Barbas

Journal Articles

The American press, it’s been said, is freer to invade personal privacy than perhaps any other in the world. The tort law of privacy, as a shield against unwanted media exposure of private life, is very weak. The usual reason given for the weakness of U.S. privacy law as a bar on the publication of private information is the strong tradition of First Amendment freedom. But “freedom of the press” alone cannot explain why liberty to publish has been interpreted as a right to print truly intimate matters or to thrust people into the spotlight against their will. Especially in …


William H. Sorrell, Attorney General Of Vermont, Et Al. V. Ims Health Inc., Et Al. - Amicus Brief In Support Of Petitioners, Kevin Outterson, David Orentlicher, Christopher T. Robertson, Frank A. Pasquale Jan 2011

William H. Sorrell, Attorney General Of Vermont, Et Al. V. Ims Health Inc., Et Al. - Amicus Brief In Support Of Petitioners, Kevin Outterson, David Orentlicher, Christopher T. Robertson, Frank A. Pasquale

Faculty Scholarship

On April 26, 2011, the US Supreme Court will hear oral arguments in the Vermont data mining case, Sorrell v. IMS Health Inc. Respondents claim this is the most important commercial speech case in a decade. Petitioner (the State of Vermont) argues this is the most important medical privacy case since Whalen v. Roe.

The is an amicus brief supporting Vermont, written by law professors and submitted on behalf of the New England Journal of Medicine