Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Intellectual Property Law

2022

Institution
Keyword
Publication
Publication Type

Articles 1 - 29 of 29

Full-Text Articles in Privacy Law

The Law Of Employee Data: Privacy, Property, Governance, Matthew T. Bodie Apr 2022

The Law Of Employee Data: Privacy, Property, Governance, Matthew T. Bodie

Indiana Law Journal

The availability of data related to the employment relationship has ballooned into an unruly mass of performance metrics, personal characteristics, biometric recordings, and creative output. The law governing this collection of information has been awkwardly split between privacy regulations and intellectual property rights, with employees generally losing on both ends. This Article rejects a binary approach that either carves out private spaces ineffectually or renders data into isolated pieces of ownership. Instead, the law should implement a hybrid system that provides workers with continuing input and control without blocking efforts at joint production. In addition, employers should have fiduciary responsibilities …


Right Of Self, Mitchell F. Crusto Apr 2022

Right Of Self, Mitchell F. Crusto

Washington and Lee Law Review

The exercise of free will against tyranny is the single principle that defines the American spirit, our history, and our culture. From the American Revolution through the Civil War, the two World Wars, the Civil Rights Movement, and up to today, Americans have embraced the fundamental rights of the individual against wrongful governmental intrusion. This is reflected in our foundational principles, including the Magna Carta, the Bill of Rights to the United States Constitution, the Reconstruction Amendments, the Nineteenth Amendment, and, more recently, in the Supreme Court’s recognition of fundamental individual rights within the Constitution’s penumbras. However, there is no …


Learning From South Korea’S Covid-19 Response: Why Centralizing The United States Public Health System Is Essential For Future Pandemic Responses, Meghan Ricci Jan 2022

Learning From South Korea’S Covid-19 Response: Why Centralizing The United States Public Health System Is Essential For Future Pandemic Responses, Meghan Ricci

Seattle Journal of Technology, Environmental & Innovation Law

The COVID-19 pandemic revealed stark differences in governmental preparedness across the globe. The United States, once thought of as a global leader in public health, had the theoretical skill and efficiency to handle the pandemic but failed to utilize those skills and resources during an actual health crisis. In the spring of 2020, everyone watched the U.S.’s reaction to the unfolding of the COVID-19 pandemic due to its historic placeholder as a global leader and innovator. However, the performance of the U.S. in response to the global pandemic disappointed both global commentators and U.S. citizens. This paper will compare the …


The Application Of The Right To Be Forgotten In The Machine Learning Context: From The Perspective Of European Laws, Zeyu Zhao Jan 2022

The Application Of The Right To Be Forgotten In The Machine Learning Context: From The Perspective Of European Laws, Zeyu Zhao

Catholic University Journal of Law and Technology

The right to be forgotten has been evolving for decades along with the progress of different statutes and cases and, finally, independently enacted by the General Data Protection Regulation, making it widely applied across Europe. However, the related provisions in the regulation fail to enable machine learning systems to realistically forget the personal information which is stored and processed therein.

This failure is not only because existing European rules do not stipulate standard codes of conduct and corresponding responsibilities for the parties involved, but they also cannot accommodate themselves to the new environment of machine learning, where specific information can …


Masthead, Lead Article Editor Jan 2022

Masthead, Lead Article Editor

Catholic University Journal of Law and Technology

No abstract provided.


Table Of Contents, Lead Article Editor Jan 2022

Table Of Contents, Lead Article Editor

Catholic University Journal of Law and Technology

No abstract provided.


Failed Analogies: Justice Thomas’S Concurrence In Biden V. Knight First Amendment Institute, Sarah S. Seo Jan 2022

Failed Analogies: Justice Thomas’S Concurrence In Biden V. Knight First Amendment Institute, Sarah S. Seo

Fordham Intellectual Property, Media and Entertainment Law Journal

Twenty-six years ago, twenty-six words created the internet. Section 230 of the Communications Decency Act is a short, yet powerful, provision that notably protects social media platforms, among other interactive computer services, from liability for content created by third-party users. At the time of its enactment, Section 230 aimed to encourage the robust growth of the then-nascent internet while protecting it from government regulation. More recently, however, it has been wielded by Big Tech companies like Twitter and Facebook to prevent any liability for real-world harms that stem from virtual interactions conducted over their platforms.

Although the Supreme Court has …


Patching The Data Security Blanket: How A Stronger, Collaborative Ftc Is The Answer Right Under Our Nose, Jose A. Gonzalez Lopez Jan 2022

Patching The Data Security Blanket: How A Stronger, Collaborative Ftc Is The Answer Right Under Our Nose, Jose A. Gonzalez Lopez

Marquette Intellectual Property & Innovation Law Review

None


Table Of Contents Jan 2022

Table Of Contents

Seattle University Law Review

Table of Contents


Let The Machines Do The Dirty Work: Social Media, Machine Learning Technology And The Iteration Of Racialized Surveillance, Subhah Wadhawan Jan 2022

Let The Machines Do The Dirty Work: Social Media, Machine Learning Technology And The Iteration Of Racialized Surveillance, Subhah Wadhawan

Canadian Journal of Law and Technology

Post 9/11, where the current social and cultural temperature has constructed Islam as interchangeable with terrorism, digital intermediaries have responded with increased censorship of speech related to, emerging from, or advocating Islamic ideology. At the heart of this paper is the argument that digital intermediaries have relied on the opaqueness of machine learning technology (‘‘MLT”) to realize racialized surveillance, whereby speech concerning Islamic content has been disproportionally censored. This paper maps out how inherent biases concerning the ideology of Islam have been interwoven into the coding and machine learning used by the major tech giants. As a result of the …


Technologies Of Servitude Understanding Firmware Tpms As Interests In Personal Property, Anthony D. Rosborough Jan 2022

Technologies Of Servitude Understanding Firmware Tpms As Interests In Personal Property, Anthony D. Rosborough

Canadian Journal of Law and Technology

Widespread computerization and embedded system design has facilitated the pervasive and latent implementation of technological protection measures (‘‘TPMs”) to restrict device firmware access. Often referred to as ‘‘digital locks,” these restrictions impose a whole host of limitations on how owners use and manage the increasing number of products and devices in which they are incorporated. In many cases, TPM restrictions can prevent activities with social, environmental, and economical benefits, including repair, repurposing, and interoperability. In response, governments around the world are now revisiting and scrutinizing their TPM anti-circumvention laws within copyright and competition policy. Beyond these perspectives, this article looks …


Delineating The Legal Framework For Data Protection: A Fundamental Rights Approach Or Data Propertization?, Efe Lawrence Ogbeide Jan 2022

Delineating The Legal Framework For Data Protection: A Fundamental Rights Approach Or Data Propertization?, Efe Lawrence Ogbeide

Canadian Journal of Law and Technology

The Charter of Fundamental Rights of the European Union, like other key legal instruments around the globe, grants citizens the right to privacy in Article 7. The Charter, however, further provides for the right to data protection in Article 8. Simply put, the implication of Article 8 of the Charter is that the right to data protection is a fundamental right. The central question in this article is whether data protection indeed qualifies to be categorized as a fundamental right. If not, what other approach(es) to data protection may be implemented?


Officially Obsolete? A Critical Examination Of The Canadian Official Marks Regime And Its Waning Relevancy In Trademark Law, Maddison Tebbutt Jan 2022

Officially Obsolete? A Critical Examination Of The Canadian Official Marks Regime And Its Waning Relevancy In Trademark Law, Maddison Tebbutt

Canadian Journal of Law and Technology

When the Trademark Act (‘‘TMA”) came about in 1985, a unique aspect of Canadian trademark law was created: the official marks regime under section 9(1)(n). The official marks regime is available to public authorities and universities as a means of sidestepping the lengthy and expensive process of trademark registration and providing special protection for official marks. Once public authorities and universities obtain an official mark through this system, they are entitled to an expansive monopoly that allows them to use their mark for commercial use, while simultaneously keeping the official mark out of the public domain. Moreover, while …


Dignity, Intersectional Gendered Harm, And A Flexible Approach: Analysis Of The Right To One’S Image In Quebec, Yuan Stevens Jan 2022

Dignity, Intersectional Gendered Harm, And A Flexible Approach: Analysis Of The Right To One’S Image In Quebec, Yuan Stevens

Canadian Journal of Law and Technology

This article draws on critical feminist theory and the framework of intersectionality to examine how courts in Quebec have begun — and are poised — to respond to the phenomenon of the non-consensual sharing of images, particularly if they are of an intimate or sexual nature. Dunn’s work has demonstrated that Quebec’s dignity-focused approach to the protection of identity and privacy ought to guide the development of similar civil recourse provided in common law Canada. This paper fills a gap by identifying the affordances and gaps of Quebec’s legal approach from the vantage point of equality-seeking groups, with a particular …


Intimate Images And Authors’ Rights: Non- Consensual Disclosure And The Copyright Disconnect, Meghan Sali Jan 2022

Intimate Images And Authors’ Rights: Non- Consensual Disclosure And The Copyright Disconnect, Meghan Sali

Canadian Journal of Law and Technology

This article responds to a brand of legal realpolitik that says using property law to respond to the non-consensual distribution of intimate images (NCDII) is appropriate and even necessary, because its remedial frameworks are well developed and provide the relief that is often most sought after by targets of an assault: the immediate removal of photos from online platforms. While some targets are not considered the ‘‘authors’’ of their intimate images, most of the images that are the subject of NCDII are selfies, taken by the target themselves. In these cases, that person rightfully owns the copyright in those images …


Bringing Section 8 Home: An Argument For Recognizing A Reasonable Expectation Of Privacy In Metadata Collected From Smart Home Devices, Ana Qarri Jan 2022

Bringing Section 8 Home: An Argument For Recognizing A Reasonable Expectation Of Privacy In Metadata Collected From Smart Home Devices, Ana Qarri

Canadian Journal of Law and Technology

Internet of Things devices (also known as smart home devices) are a fast-growing trend in consumer home electronics. The information collected from these devices could prove very useful to law enforcement investigations. These individual pieces of metadata — the collection of which might appear harmless on its face — can be highly revealing when combined with other metadata or information otherwise available to law enforcement. This article builds an argument in favour of recognizing a reasonable expectation of privacy in metadata collected from smart home devices under section 8 of the Canadian Charter of Rights and Freedoms. This article presents …


Artificial Intelligence In Canadian Healthcare: Will The Law Protect Us From Algorithmic Bias Resulting In Discrimination?, Bradley Henderson, Colleen M. Flood, Teresa Scassa Jan 2022

Artificial Intelligence In Canadian Healthcare: Will The Law Protect Us From Algorithmic Bias Resulting In Discrimination?, Bradley Henderson, Colleen M. Flood, Teresa Scassa

Canadian Journal of Law and Technology

In this article, we canvas why AI may perpetuate or exacerbate extant discrimination through a review of the training, development, and implementation of healthcare-related AI applications and set out policy options to militate against such discrimination. The article is divided into eight short parts including this introduction. Part II focuses on explaining AI, some of its basic functions and processes, and its relevance to healthcare. In Part III, we define and explain the difference and relationship between algorithmic bias and data bias, both of which can result in discrimination in healthcare settings, and provide some prominent examples of healthcare-related AI …


Responding To Deficiencies In The Architecture Of Privacy: Co-Regulation As The Path Forward For Data Protection On Social Networking Sites, Laurent Cre ́Peau Jan 2022

Responding To Deficiencies In The Architecture Of Privacy: Co-Regulation As The Path Forward For Data Protection On Social Networking Sites, Laurent Cre ́Peau

Canadian Journal of Law and Technology

Social Networking Sites like Facebook, Twitter and the like are a ubiquitous part of contemporary culture. Yet, as exemplified on numerous occasions, most recently in the Cambridge Analytica scandal that shook Facebook in 2018, these sites pose major concerns for personal data protection. Whereas self-regulation has characterized the general regulatory mindset since the early days of the Internet, it is no longer viable given the threat social media poses to user privacy. This article notes the deficiencies of self-regulatory models of privacy and contends jurisdictions like Canada should ensure they have strong data protection regulations to adequately protect the public. …


Book Review: Mike Zajko, Telecom Tension: Internet Service Providers And Public Policy In Canada*, Matt Malone Jan 2022

Book Review: Mike Zajko, Telecom Tension: Internet Service Providers And Public Policy In Canada*, Matt Malone

Canadian Journal of Law and Technology

The world of telecommunications, writes Mike Zajko in this timely analysis of internet service providers (ISPs), “is a world many of us have never wondered about, just as we are rarely curious about where our sewage goes or how the electricity grid is configured.” Yet ISPs are not just conduits of fast-traveling light pulses that deliver the internet; they transmit, channel, form, and express a multitude of public policy issues, and they have an important level of agency in the construction and exercise of those policies, too. These dynamics have implications for a large bandwidth of topics relevant to Canadians, …


Reframing Technology-Facilitated Gender-Based Violence At The Intersections Of Law & Society, Jane Bailey, Carys Craig, Suzie Dunn, Sonia Lawrence Jan 2022

Reframing Technology-Facilitated Gender-Based Violence At The Intersections Of Law & Society, Jane Bailey, Carys Craig, Suzie Dunn, Sonia Lawrence

Canadian Journal of Law and Technology

This introductory article proceeds in three parts. First, it discusses the origins of this special issue as part of a multi-event, SSHRC-funded conference that focused on pushing beyond a narrow conception of TFGBV; rather than approaching TFGBV as solely an issue of interpersonal behaviours, the animating objective of the conference was to examine the structural, systemic, and design factors that contribute to TFGBV. Second, it explores the importance and promise of reframing TFGBV in this way through intersectional and structural lenses. Third, it briefly highlights some of the key insights from each of the contributions in this special issue. It …


From Nyan Cat To Nfts: Determining How Canada’S Cultural Property Export And Import Act Applies To Digital Works, Mitchel Fleming Jan 2022

From Nyan Cat To Nfts: Determining How Canada’S Cultural Property Export And Import Act Applies To Digital Works, Mitchel Fleming

Canadian Journal of Law and Technology

One of Canada’s principal pieces of legislation enacted to protect its cultural patrimony is not well equipped to deal with the rise of digital content creation. Digital works, particularly NFTs, pose a unique challenge to the established regime. This paper seeks to understand how these artistic developments fit within the current legislative framework and whether legislative action is needed to bring these revolutionary mediums within the scope of the Cultural Property Export and Import Act. Ultimately, the author concludes that while digital works may be captured by the Act under specific circumstances, the protectionist policies of the past are …


“I Bet You Don’T Get What We Get”: An Intersectional Analysis Of Technology-Facilitated Violence Experienced By Racialized Women Anti- Violence Online Activists In Canada, Nasreen Rajani Jan 2022

“I Bet You Don’T Get What We Get”: An Intersectional Analysis Of Technology-Facilitated Violence Experienced By Racialized Women Anti- Violence Online Activists In Canada, Nasreen Rajani

Canadian Journal of Law and Technology

Despite growing attention to violence that women face in online settings, a relatively small proportion of academic work centres on the experiences and perspectives of racialized women in Canada. Informed by an intersectional framework, I draw on semi-structured interviews with nine women across Canada, all of whom are involved in anti-violence online activism, about their experiences of technology-facilitated violence (TFV). Their experiences revealed less prominent narratives, including instances of TFV beyond instances of intimate partner violence (IPV) and beyond sources of anonymous trolling by supposed white men, such as violence perpetrated by peers, white women, and racialized men. In this …


Data Privacy, Human Rights, And Algorithmic Opacity, Sylvia Lu Jan 2022

Data Privacy, Human Rights, And Algorithmic Opacity, Sylvia Lu

Fellow, Adjunct, Lecturer, and Research Scholar Works

Decades ago, it was difficult to imagine a reality in which artificial intelligence (AI) could penetrate every corner of our lives to monitor our innermost selves for commercial interests. Within just a few decades, the private sector has seen a wild proliferation of AI systems, many of which are more powerful and penetrating than anticipated. In many cases, AI systems have become “the power behind the throne,” tracking user activities and making fateful decisions through predictive analysis of personal information. Despite the growing power of AI, proprietary algorithmic systems can be technically complex, legally claimed as trade secrets, and managerially …


‘‘Don’T Take On The Responsibilty Of Somebody Else’S Fu**Ed Up Behavior”: Responding To Online Abuse In The Context Of Barriers To Support, Chandell Gosse Jan 2022

‘‘Don’T Take On The Responsibilty Of Somebody Else’S Fu**Ed Up Behavior”: Responding To Online Abuse In The Context Of Barriers To Support, Chandell Gosse

Canadian Journal of Law and Technology

Responsibilization, in a true circular fashion, is not only born of but also benefits institutional (e.g., social media companies and law enforcement) and cultural power structures (e.g., misogyny and patriarchy). When targets of online abuse take responsibility for the abuse launched against them, that assumption of responsibility requires energy, and that energy is taken away from efforts to hold institutions and perpetrators accountable. Responsibilization tries to tranquilize change in the service of power. The tricky thing about interrupting this process is that it requires more than just offering better support. It also requires exposing, challenging, and dismantling harmful ideologies, belief …


Onlife Harms: Uber And Sexual Violence, Amanda Turnbull Jan 2022

Onlife Harms: Uber And Sexual Violence, Amanda Turnbull

Canadian Journal of Law and Technology

Uber markets itself as a technology company that is managed primarily by ML algorithms with the support of human engineers. Yet, in its 2019 Report, the role that its technology played in relation to sexual violence is, for all intents and purposes, absent. Likewise, solutions dealing specifically with the role of technology in facilitating gender-based violence are also missing from the series of initiatives in which Uber has invested that are aimed at preventing sexual violence. Uber was not sufficiently rigorous in defining the problem it was trying to solve. It was a missed opportunity that has resulted in continued …


On The Internet, Nobody Knows You Are A Dog: Contested Authorship Of Digital Evidence In Cases Of Gender-Based Violence, Suzie Dunn, Moira Aikenhead Jan 2022

On The Internet, Nobody Knows You Are A Dog: Contested Authorship Of Digital Evidence In Cases Of Gender-Based Violence, Suzie Dunn, Moira Aikenhead

Canadian Journal of Law and Technology

We examine various aspects of digital evidence at GBV trials, drawing on relevant Canadian criminal case law. First, we describe some of the unique challenges related to electronic documents generally with respect to determining authorship. Second, we review some of the historical and ongoing practices within the criminal justice system that rely on harmful gendered myths about GBV and note the potential for these myths to emerge in relation to digital evidence. Third, we discuss the duty of investigating police officers to gather the necessary available digital evidence to demonstrate authorship and note potential gaps in current investigatory practices that …


Table Of Contents, Seattle University Law Review Jan 2022

Table Of Contents, Seattle University Law Review

Seattle University Law Review

Table of Contents


Face The Facts, Or Is The Face A Fact?: Biometric Privacy In Publicly Available Data, Daniel Levin Jan 2022

Face The Facts, Or Is The Face A Fact?: Biometric Privacy In Publicly Available Data, Daniel Levin

Fordham Intellectual Property, Media and Entertainment Law Journal

Recent advances in biometric technologies have caused a stir among the privacy community. Specifically, facial recognition technologies facilitated through data scraping practices have called into question the basic precepts we had around exercising biometric privacy. Yet, in spite of emerging case law on the permissibility of data scraping, comparatively little attention has been given to the privacy implications endemic to such practices.

On the one hand, privacy proponents espouse the view that manipulating publicly available data from, for example, our social media profiles, derogates from users’ expectations around the kind of data they share with platforms (and the obligations such …


Navigating The Identity Thicket: Trademark's Lost Theory Of Personality, The Right Of Publicity, And Preemption, Jennifer E. Rothman Jan 2022

Navigating The Identity Thicket: Trademark's Lost Theory Of Personality, The Right Of Publicity, And Preemption, Jennifer E. Rothman

All Faculty Scholarship

Both trademark and unfair competition laws and state right of publicity laws protect against unauthorized uses of a person’s identity. Increasingly, however, these rights are working at odds with one another, and can point in different directions with regard to who controls a person’s name, likeness, and broader indicia of identity. This creates what I call an "identity thicket" of overlapping and conflicting rights over a person’s identity. Current jurisprudence provides little to no guidance on the most basic questions surrounding this thicket, such as what right to use a person’s identity, if any, flows from the transfer of marks …