Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Pace University

Discipline
Keyword
Publication Year
Publication
Publication Type

Articles 1 - 22 of 22

Full-Text Articles in Privacy Law

Privacy And National Politics: Fingerprint And Dna Litigation In Japan And The United States Compared, Dongsheng Zang Oct 2023

Privacy And National Politics: Fingerprint And Dna Litigation In Japan And The United States Compared, Dongsheng Zang

Pace Law Review

No abstract provided.


Can Social Media Corporations Be Held Liable Under International Law For Human Rights Atrocities?, Juliana Palmieri May 2022

Can Social Media Corporations Be Held Liable Under International Law For Human Rights Atrocities?, Juliana Palmieri

Pace International Law Review

This article examines the relevant international law associated with genocide and hate speech and examines whether there are any legal grounds to hold a corporation liable for how people chose to use its product or service in relation to human rights violations. The analysis begins with a brief overview of international criminal and human rights law, relevant treaties, jurisdictional issues, and the legal theories of corporate criminal liability and complicity. Because current international law provides no clear answer, this article proposes that international courts use a balancing test which evaluates a non-exclusive list of ten main factors.


Managing And Monitoring The Menopausal Body, Naomi R. Cahn, Bridget J. Crawford, Emily Gold Waldman Jan 2022

Managing And Monitoring The Menopausal Body, Naomi R. Cahn, Bridget J. Crawford, Emily Gold Waldman

Elisabeth Haub School of Law Faculty Publications

This Essay explores how menopausal bodies are managed and monitored through both menopausal hormone therapy (MHT) and the burgeoning market for technology-driven menopause products and services. While each of these allegedly improves the menopause experience, a closer investigation reveals a more complex interaction of profit motives and traditional notions of gender identity. The Essay identifies problems with—and suggests some solutions for reforming—current practices of monitoring and managing the menopausal body.

Careful consideration of menopause brings this Essay into ongoing conversations about theorizing beyond the gender binary and stereotypical notions of femininity. Purveyors of both MHT and menopause-related digital products and …


An Australian Conundrum: Genomic Technology, Data, And The Covidsafe App, David Morrison, Patrick T. Quirk Dec 2020

An Australian Conundrum: Genomic Technology, Data, And The Covidsafe App, David Morrison, Patrick T. Quirk

Pace International Law Review

This paper examines the difficulties that have arisen in Australia in the use of its contact-tracing app. We examine the privacy implications around the use of the app, the wider economic imperative, and the balancing of those concerns against the health threat of the COVID-19 pandemic. We posit that default options are superior in times of emergency and rather than begging for the adoption of lifesaving technology, we suggest that the evidence gathered by behavioral economists provides an apposite and powerful alternative worthy of consideration.


Privacy Law Disparities Between The United States And The European Union, Brandon Deluca May 2019

Privacy Law Disparities Between The United States And The European Union, Brandon Deluca

Honors College Theses

Data is the world’s most valuable resource today. In the 21st century, big data has overtaken the world’s commonly known large industries to become one of the most sought after markets, and companies pay to own this data (The Economist, 2017). Advertisements may have been targeted towards demographics such as race or sex in past years. However, in the digital age, the capability exists to push advertisements to the screens of specific users with known interests. This has been made possible, in part, by unregulated data collection practices across the globe, including in the United States and the European Union. …


Cashless Societies And The Rise Of The Independent Cryptocurrencies: How Governments Can Use Privacy Laws To Compete With Independent Cryptocurrencies, Matla Garcia Chavolla Mar 2019

Cashless Societies And The Rise Of The Independent Cryptocurrencies: How Governments Can Use Privacy Laws To Compete With Independent Cryptocurrencies, Matla Garcia Chavolla

Pace International Law Review

Many individuals (including governments) envision living in a future world where physical currency is a thing of the past. Many countries have made great strides in their efforts to go cashless. At the same time, there is increasing awareness among citizens of the decreasing amount of privacy in their lives. The potential hazards cashless societies pose to financial privacy may incentivize citizens to hold some of their money in independent cryptocurrencies. This article argues that in order for governments in cashless societies to keep firm control over their money supply, they should enact stronger privacy law protections for its citizens …


Controversy Over Information Privacy Arising From The Taiwan National Health Insurance Database Examining The Taiwan Taipei High Administrative Court Judgement No. 102-Su-36 (Tsai V. Nhia), Chen-Hung Chang Aug 2016

Controversy Over Information Privacy Arising From The Taiwan National Health Insurance Database Examining The Taiwan Taipei High Administrative Court Judgement No. 102-Su-36 (Tsai V. Nhia), Chen-Hung Chang

Pace International Law Review

This article examines the limitations of the application of traditional information privacy theory to disputes relating to modern technologies. If information privacy is understood as an individual’s right to full control over his information, activities involving the collection, process and use of personal data cannot be conducted without the data subject’s consent because his privacy rights would be affected as a result of such activities. Instead of the privacy interest approach, this article introduces a privacy harm approach to reconcile the defects of traditional privacy theory. The privacy interest approach helps identify situations in which an individual’s information privacy conflicts …


Cell Phone Searches After Riley: Establishing Probable Cause And Applying Search Warrant Exceptions, Erica L. Danielsen Aug 2016

Cell Phone Searches After Riley: Establishing Probable Cause And Applying Search Warrant Exceptions, Erica L. Danielsen

Pace Law Review

Part I of this note discusses the Fourth Amendment’s protection against unreasonable search and seizures and its probable cause requirement. The Fourth Amendment’s text remains the same since its enactment. However, interpretation of the Fourth Amendment continues to evolve in order to stay current with society. Interpretation of the Fourth Amendment also varies based on state constitutional law since states can provide its citizens with greater protection than the United States Constitution. This is why the United States Supreme Court, federal district courts, and state courts have all undergone thorough Fourth Amendment analyses when applying the true meaning of the …


Wide Right: How Isp Immunity And Current Laws Are Off The Mark In Protecting The Modern Athlete On Social Media, Dominick J. Mingione Jun 2015

Wide Right: How Isp Immunity And Current Laws Are Off The Mark In Protecting The Modern Athlete On Social Media, Dominick J. Mingione

Pace Intellectual Property, Sports & Entertainment Law Forum

“[Y]our tranny looking dad is a disgrace to American football,” “I would rape the shit out of her,” and “[The] [B]ears are easier than you on prom night,” are just a sampling of some of the alarmingly harassing tweets received by Chloe Trestman between the night of November 9, 2014 and November 10, 2014. Who is Chloe Trestman, and what could she have possibly done to warrant such abuse? Chloe’s father is Marc Trestman, the head coach of the Chicago Bears. And the twitter vitriol, or “twitriol,” directed toward Chloe was in response to the Bears’ blowout loss to their …


Here We Are Now, Entertain Us: Defining The Line Between Personal And Professional Context On Social Media, Raizel Liebler, Keidra Chaney May 2015

Here We Are Now, Entertain Us: Defining The Line Between Personal And Professional Context On Social Media, Raizel Liebler, Keidra Chaney

Pace Law Review

Social media platforms such as Facebook, Twitter, and Instagram allow individuals and companies to connect directly and regularly with an audience of peers or with the public at large. These websites combine the audience-building platforms of mass media with the personal data and relationships of in-person social networks. Due to a combination of evolving user activity and frequent updates to functionality and user features, social media tools blur the line of whether a speaker is perceived as speaking to a specific and presumed private audience, a public expression of one’s own personal views, or a representative viewpoint of an entire …


Social Justice, Social Norms And The Governance Of Social Media, Tal Z. Zarsky May 2015

Social Justice, Social Norms And The Governance Of Social Media, Tal Z. Zarsky

Pace Law Review

This article proceeds as follows: Part II briefly addresses the theoretical arguments regarding the pros and cons of various governance strategies, focusing on the advantages, disadvantages and pitfalls of reliance on private parties. In Part III, the article describes, in general terms, the above-mentioned empirical study, explaining its methodology, the specific challenges to its design and implementation, and how these were met. The discussion specifically centers on a survey taken to establish the nature of social norms. Part IV presents a specific test case: whether pseudonymity should be permitted in social media or should “real names” be mandatory. Part V …


Show And Tell?: Students' Personal Lives, Schools, And Parents, Emily Gold Waldman Feb 2015

Show And Tell?: Students' Personal Lives, Schools, And Parents, Emily Gold Waldman

Elisabeth Haub School of Law Faculty Publications

Public schools learn about their students' personal lives in many ways. Some are passive: a teacher observes a student kissing someone, or overhears a conversation among friends. But schools also engage in more active information-gathering about students' personal lives, through surveys and informal conversations between students and teachers, administrators, school psychologists, counselors, coaches, and other personnel. This Article explores the competing privacy considerations that result from such encounters. Once schools have learned highly personal information about their students, does it violate those students' privacy rights to disclose that information to their parents? Or does keeping the information secret violate the …


Environmental Privacy, Katrina Fischer Kuh Jan 2015

Environmental Privacy, Katrina Fischer Kuh

Elisabeth Haub School of Law Faculty Publications

This Article looks to nuisance doctrine, surveillance under environmental statutes, and Fourth Amendment cases arising in implementation of fish and game laws (the hunter enforcement cases) to better understand our experience, to date, balancing the need for environmental information with privacy. Section A analyzes common law nuisance and its relationship to individual privacy concerns and concludes that the law affords little *7 value to or protection of privacy in the context of at least one type of environmental externality -- conduct that gives rise to a common law nuisance. Recognizing that most environmentally significant individual behaviors do not constitute a …


Protecting A Celebrity’S Child From Harassment: Is California’S Amendment Penal Code § 11414 Too Vague To Be Constitutional?, Michelle N. Robinson Jun 2014

Protecting A Celebrity’S Child From Harassment: Is California’S Amendment Penal Code § 11414 Too Vague To Be Constitutional?, Michelle N. Robinson

Pace Intellectual Property, Sports & Entertainment Law Forum

This Note will describe a brief history of the legal attempts to restrict the paparazzi and the legislative history behind A.B. 3592 and its amendment, S.B. 606. The bills are controversial and have received a significant amount of criticism, due to the fact that they restrict speech by essentially prohibiting paparazzi, known for their harassing behavior, from taking pictures of the children of celebrities. The Note will conclude with an analysis utilizing the void-for-vagueness doctrine of whether the bill is in violation of the First Amendment.


It’S Raining Katz And Jones: The Implications Of United States V. Jones–A Case Of Sound And Fury, Jace C. Gatewood Jul 2013

It’S Raining Katz And Jones: The Implications Of United States V. Jones–A Case Of Sound And Fury, Jace C. Gatewood

Pace Law Review

This Article discusses the implications of Jones in light of emerging technology capable of duplicating the monitoring undertaken in Jones with the same degree of intrusiveness attributable to GPS tracking devices, but without depending on any physical invasion of property. This Article also discusses how the pervasive use of this emerging technology may reshape reasonable expectations of privacy concerning an individual’s public movements, making it all the more difficult to apply the Fourth Amendment constitutional tests outlined in Jones. In this regard, this Article explores recent trends in electronic tracking, surveillance, and other investigative methods that have raised privacy concerns, …


Privacy Rights: The Virtue Of Protecting A False Reputation, John A. Humbach May 2012

Privacy Rights: The Virtue Of Protecting A False Reputation, John A. Humbach

Elisabeth Haub School of Law Faculty Publications

What is the virtue of protecting a false reputation? The thesis of this paper is that there is none. There is none, at least, that justifies the suppression of free speech. Yet, there is a growing trend to see the protection of reputation from truth as a key function of the so-called “right of privacy.”

Unfortunately, people often do things that they are not proud of or do not want others to know about. Often, however, these are precisely the things that others want or need to know. For our own protection, each of us is better off being aware …


Personal Environmental Information: The Promise And Perils Of The Emerging Capacity To Identify Individual Environmental Harms, Katrina Fischer Kuh Jan 2012

Personal Environmental Information: The Promise And Perils Of The Emerging Capacity To Identify Individual Environmental Harms, Katrina Fischer Kuh

Elisabeth Haub School of Law Faculty Publications

This Article begins from the premise that successful regulation of environmentally significant individual behaviors could achieve meaningful environmental benefits and argues that (1) technology is increasingly making information about individual environmental behaviors and associated harms more accessible; (2) better information about environmentally significant individual behaviors could substantially enhance fledgling efforts to regulate those behaviors; and (3) use of technology-enabled personal environmental information in support of regulation will require the resolution of myriad privacy concerns. The Article seeks to generate and inform a discussion about the appropriate balance between access to personal environmental information and privacy by identifying how regulation can …


From Facebook To Mug Shot: How The Dearth Of Social Networking Privacy Rights Revolutionized Online Government Surveillance, Junichi P. Semitsu Mar 2011

From Facebook To Mug Shot: How The Dearth Of Social Networking Privacy Rights Revolutionized Online Government Surveillance, Junichi P. Semitsu

Pace Law Review

No abstract provided.


Social Media And The Vanishing Points Of Ethical And Constitutional Boundaries, Ken Strutin Mar 2011

Social Media And The Vanishing Points Of Ethical And Constitutional Boundaries, Ken Strutin

Pace Law Review

No abstract provided.


“You Already Have Zero Privacy. Get Over It!” Would Warren And Brandeis Argue For Privacy For Social Networking?, Connie Davis Powell Mar 2011

“You Already Have Zero Privacy. Get Over It!” Would Warren And Brandeis Argue For Privacy For Social Networking?, Connie Davis Powell

Pace Law Review

No abstract provided.


Privacy Revisited: Gps Tracking As Search And Seizure, Bennett L. Gershman Apr 2010

Privacy Revisited: Gps Tracking As Search And Seizure, Bennett L. Gershman

Pace Law Review

Part I of this Article discusses the facts in People v. Weaver, the majority and dissenting opinions in the Appellate Division, Third Department decision, and the majority and dissenting opinions in the Court of Appeals decision. Part II addresses the question that has yet to be decided by the U.S. Supreme Court—whether GPS tracking of a vehicle by law enforcement constitutes a search under the Fourth Amendment. Part III addresses the separate question that the Court of Appeals did not address in Weaver—whether the surreptitious attachment of a GPS device to a vehicle constitutes a seizure under the Fourth Amendment. …


Balancing Freedom Of Speech With The Right To Privacy: How To Legally Cope With The Funeral Protest Problem , Anna Zwierz Messar Sep 2007

Balancing Freedom Of Speech With The Right To Privacy: How To Legally Cope With The Funeral Protest Problem , Anna Zwierz Messar

Pace Law Review

No abstract provided.