Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Privacy (2)
- Artificial intelligence (1)
- Clapper (1)
- Computer law (1)
- Computers (1)
-
- Cyberlaw (1)
- Cybersecurity (1)
- Cyberspace (1)
- Data Breach (1)
- Data Security (1)
- Data protection (1)
- EU law (1)
- GDPR (1)
- Harassment (1)
- Harms (1)
- Internet (1)
- Law (1)
- Privacy law (1)
- Right to be forgotten (1)
- Section 230 (1)
- Sexual privacy (1)
- Spokeo (1)
- Standing (1)
- Technology (1)
- Technology law (1)
Articles 1 - 3 of 3
Full-Text Articles in Privacy Law
Humans Forget, Machines Remember: Artificial Intelligence And The Right To Be Forgotten, Tiffany Li, Eduard Fosch Villaronga, Peter Kieseberg
Humans Forget, Machines Remember: Artificial Intelligence And The Right To Be Forgotten, Tiffany Li, Eduard Fosch Villaronga, Peter Kieseberg
Faculty Scholarship
To understand the Right to be Forgotten in context of artificial intelligence, it is necessary to first delve into an overview of the concepts of human and AI memory and forgetting. Our current law appears to treat human and machine memory alike – supporting a fictitious understanding of memory and forgetting that does not comport with reality. (Some authors have already highlighted the concerns on the perfect remembering.) This Article will examine the problem of AI memory and the Right to be Forgotten, using this example as a model for understanding the failures of current privacy law to reflect the …
Risk And Anxiety: A Theory Of Data Breach Harms, Danielle K. Citron, Daniel Solove
Risk And Anxiety: A Theory Of Data Breach Harms, Danielle K. Citron, Daniel Solove
Faculty Scholarship
In lawsuits about data breaches, the issue of harm has confounded courts. Harm is central to whether plaintiffs have standing to sue in federal court and whether their claims are viable. Plaintiffs have argued that data breaches create a risk of future injury from identity theft or fraud and that breaches cause them to experience anxiety about this risk. Courts have been reaching wildly inconsistent conclusions on the issue of harm, with most courts dismissing data breach lawsuits for failure to allege harm. A sound and principled approach to harm has yet to emerge, resulting in a lack of consensus …
Sexual Privacy, Danielle Keats Citron
Sexual Privacy, Danielle Keats Citron
Faculty Scholarship
Those who wish to control and expose the identities of women and people from marginalized communities routinely do so by invading their privacy. People are secretly recorded in bedrooms and public bathrooms, and “up their skirts.” They are coerced into sharing nude photographs and filming sex acts under the threat of public disclosure of their nude images. People’s nude images are posted online without permission. Machine-learning technology is used to create digitally manipulated “deep fake” sex videos that swap people’s faces into pornography.
At the heart of these abuses is an invasion of sexual privacy—the behaviors and expectations that manage …