Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Science and Technology Law (10)
- Constitutional Law (9)
- Fourth Amendment (6)
- First Amendment (4)
- Internet Law (4)
-
- National Security Law (4)
- Health Law and Policy (3)
- Medical Jurisprudence (3)
- Administrative Law (2)
- Computer Law (2)
- Consumer Protection Law (2)
- Legal Ethics and Professional Responsibility (2)
- Air and Space Law (1)
- Civil Procedure (1)
- Criminal Law (1)
- European Law (1)
- Fourteenth Amendment (1)
- Judges (1)
- Jurisprudence (1)
- Labor and Employment Law (1)
- Legal History (1)
- Legislation (1)
- Litigation (1)
- Military, War, and Peace (1)
- Supreme Court of the United States (1)
- Transportation Law (1)
- Keyword
-
- Privacy (12)
- Technology (5)
- Abortion (4)
- Fourth Amendment (4)
- Big data (3)
-
- Constitutional law (3)
- First Amendment (3)
- National security (3)
- Data Privacy (2)
- Patriot Act (2)
- Privacy law (2)
- Roe v. Wade (2)
- Search (2)
- Seizure (2)
- Smartphone (2)
- Surveillance (2)
- Fourth Amendment (1)
- covert searches (1)
- "sneak and peek" (1)
- 18 USC §1461 (1)
- Abortion Ban (1)
- Abortion pill (1)
- Airport screening (1)
- Airport security (1)
- Amnesty International (1)
- Analytics (1)
- Applications (1)
- Association for Unmanned Vehicle Systems International (1)
- Avatars (1)
- BIPA (1)
- Publication Year
Articles 1 - 25 of 25
Full-Text Articles in Privacy Law
The Post-Dobbs Reality: Privacy Expectations For Period-Tracking Apps In Criminal Abortion Prosecutions, Sophie L. Nelson
The Post-Dobbs Reality: Privacy Expectations For Period-Tracking Apps In Criminal Abortion Prosecutions, Sophie L. Nelson
Pepperdine Law Review
The Supreme Court’s decision to overturn Roe v. Wade and Planned Parenthood v. Casey in June 2022 was met with waves of both support and criticism throughout the United States. Several states immediately implemented or began drafting trigger laws that criminalize seeking and providing an abortion. These laws prompted several period-tracking app companies to encrypt their users’ data to make it more difficult for the government to access period- and pregnancy-related information for criminal investigations. This Comment explores whether the Fourth Amendment and U.S. privacy statutes protect users of period-tracking apps from government surveillance. More specifically, this Comment argues that …
Does Federal Law Ban Mailing Abortion Drugs? A Textual Analysis Of 18 U.S.C. § 1461, Peter Allevato
Does Federal Law Ban Mailing Abortion Drugs? A Textual Analysis Of 18 U.S.C. § 1461, Peter Allevato
Pepperdine Law Review
As the regulation of abortion availability returned to the States, many have grappled with so-called trigger laws: dormant laws that were set to take effect to restrict or ensure access to abortion should constitutional protection be revoked. While the federal government has no true trigger law, it does have long-unenforced laws prohibiting the mailing of “[e]very article or thing designed, adapted, or intended for producing abortion.” 18 U.S.C. § 1461 is an old law, and it has not been enforced for at least fifty years. But the law’s potential effect on the growing practice of mail-distribution of chemical abortion pills …
Complying With New And Existing Biometric Data Privacy Laws, Ariel Latzer
Complying With New And Existing Biometric Data Privacy Laws, Ariel Latzer
The Journal of Business, Entrepreneurship & the Law
After providing an overview of the history behind biometric information, this article will discuss the Illinois Biometric Privacy Act (BIPA)—which laid the foundation for biometric privacy regulations in the United States—and then discuss the California Consumer Privacy Act (CCPA) and its amendments in the California Privacy Rights Act (CPRA). It will also briefly touch on biometric information regulations in other states and then delve into how some notable companies are currently using individuals’ biometric information to give readers a general idea of what is happening to their personal information and highlight areas businesses should take note of in order to …
The Wages Of Crying Life: What States Must Do To Protect Children After The Fall Of Roe, Leah A. Plunkett, Michael S. Lewis
The Wages Of Crying Life: What States Must Do To Protect Children After The Fall Of Roe, Leah A. Plunkett, Michael S. Lewis
Pepperdine Law Review
In the post-Roe world, can a state rationally claim that the value of human life justifies the imposition of abortion bans but does not demand that a state protect the vulnerable young who are “born human beings”—commonly called “minors” or “children”—and are entitled to protection under a state’s laws? This essay advances the claim that it cannot. This essay asks that those who say they are “Pro-life” in politics and law demonstrate that they protect vulnerable life beyond the abortion context, and that they do so in the most minimal fashion: through a demonstrated commitment to protecting the basic welfare …
The Case For A Liberal Communitarian Jurisprudence, Amitai Etzioni
The Case For A Liberal Communitarian Jurisprudence, Amitai Etzioni
Journal of the National Association of Administrative Law Judiciary
This article seeks to show that courts face difficulties without a principled, constitutional anchoring for the conception of the common good. Courts could divine the common good from the penumbra of the Fourth Amendment in the same way the Supreme Court created a right to privacy. In addition to creating a “common good” constitutional principle, the judicial branch should establish criteria to determine when this principle should take precedence over individual rights expressly preserved in the Constitution.
Overruling Roe V. Wade: Lessons From The Death Penalty, Paul Benjamin Linton
Overruling Roe V. Wade: Lessons From The Death Penalty, Paul Benjamin Linton
Pepperdine Law Review
In Furman v. Georgia (1972), the Supreme Court struck down the Georgia and Texas death penalty statutes, thereby calling into question the validity of every other state death penalty statute. In their concurring opinions, Justices Brennan and Marshall expressed the view that, given society’s gradual abandonment of the death penalty, capital punishment violated the Eighth Amendment’s prohibition of “cruel and unusual punishments.” Justice Powell and three other justices dissented, arguing that the Court had misread the state of the law regarding society’s acceptance of the death penalty. Four years after Furman, in a quintet of cases, the Court held that …
The First Amendment And Data Privacy: Securing Data Privacy Laws That Withstand Constitutional Muster, Kathryn Peyton
The First Amendment And Data Privacy: Securing Data Privacy Laws That Withstand Constitutional Muster, Kathryn Peyton
Pepperdine Law Review
Given the growing ubiquity of digital technology’s presence in people’s lives today, it is becoming increasingly more necessary to secure data privacy protections. People interact with technology constantly, ranging from when engaging in business activates, such as corresponding through emails or doing research online, to more innocuous activities like driving, shopping, or talking with friends and family. The advances in technology have made possible the creation of digital trails whenever someone interacts with such technology. Companies aggregate data from data trails and use predictive analytics to create detailed profiles about citizen-consumers. This information is typically used for profit generating purposes. …
Emerging Technology & Regulation Panel Transcript, Bill Goodwin, Ryan Hagemann, Brooks Rainwater, Caleb Watney
Emerging Technology & Regulation Panel Transcript, Bill Goodwin, Ryan Hagemann, Brooks Rainwater, Caleb Watney
Pepperdine Law Review
No abstract provided.
Modern Privacy Advocacy: An Approach At War With Privacy Itself?, Justin "Gus" Hurwitz, Jamil N. Jaffer
Modern Privacy Advocacy: An Approach At War With Privacy Itself?, Justin "Gus" Hurwitz, Jamil N. Jaffer
Pepperdine Law Review
This Article argues that the modern concept of privacy itself, particularly as framed by some of its most ardent advocates today, is fundamentally incoherent. The Article highlights that many common arguments made in support of privacy, while initially seeming to protect this critical value, nonetheless undermine it in the long run. Using both recent and older examples of applying classic privacy advocacy positions to key technological innovations, the authors demonstrate how these positions, while seemingly privacy-enhancing at the time, actually resulted in outcomes that were less beneficial for consumers and citizens, including from a purely privacy-focused perspective. As a result, …
The Gdpr And The Consequences Of Big Regulation, Matthew R. A. Heiman
The Gdpr And The Consequences Of Big Regulation, Matthew R. A. Heiman
Pepperdine Law Review
This Article summarizes the key features of the European Union’s General Data Privacy Regulation (GDPR) that became effective on May 25, 2018. The stated purpose of the law is to give individuals greater control over personal information that is handled by companies and organizations. The Article argues that the GDPR is fundamentally flawed. Key terms within the GDPR are undefined; the burdens of the GDPR will fall heaviest on small businesses; the GDPR disrupts a valuable business model; the GDPR will stymie growth, innovation, and information sharing; and it may be the product of protectionist impulses rather than concerns for …
When Considering Federal Privacy Legislation, Neil Chilson
When Considering Federal Privacy Legislation, Neil Chilson
Pepperdine Law Review
Legislators, advocates, and business interests are proposing federal privacy legislation with new urgency. The United States has a long-established federal framework for addressing commercial privacy concerns, including general consumer protection law and sector-specific legislation. But the calls to expand or replace this approach have grown louder since Europe’s General Data Protection Regulation went into effect and since California adopted detailed and prescriptive privacy legislation. Should we create a U.S. federal privacy law, and if so, how? When considering any kind of privacy regulation, three concepts are fundamental. First, no one can control all information about them. Second, all privacy laws …
Ethical Implications Of Forensic Genealogy In Criminal Cases, Solana Lund
Ethical Implications Of Forensic Genealogy In Criminal Cases, Solana Lund
The Journal of Business, Entrepreneurship & the Law
The use of forensic genealogy to solve criminal cases is likely to increase in the coming years, especially given its success in solving cold cases. While its potential for good is impressive, there are also legitimate ethical concerns that need to be addressed. As society sees an increase in the use of forensic genealogy and DTC databases in criminal investigations as well as an increase in the media attention it garners, there will be more discussion regarding ethical implications. Legal scholars say that it is only a matter of time before courts weigh in on the privacy of DNA and …
Mining For Children’S Data In Today’S Digital World, Damin Park
Mining For Children’S Data In Today’S Digital World, Damin Park
Journal of the National Association of Administrative Law Judiciary
No abstract provided.
Pii In Context: Video Privacy And A Factor-Based Test For Assessing Personal Information, Daniel L. Macioce Jr.
Pii In Context: Video Privacy And A Factor-Based Test For Assessing Personal Information, Daniel L. Macioce Jr.
Pepperdine Law Review
As a central concept in American information privacy law, personally identifiable information (PII) plays a critical role in determining whether a privacy violation has occurred. Under the Video Privacy Protection Act of 1988 (VPPA), PII “includes information which identifies a person as having requested or obtained specific video materials or services.” Despite the clarity that these words may have when the Statute was enacted, the line separating PII from non-PII in the context of streaming video is not easily drawn, in part due to the prevalence of behavior tracking technologies and the emergence of “big data” analytics. The First Circuit, …
The Outer Limits: Imsi-Catchers, Technology, And The Future Of The Fourth Amendment, Ryan C. Chapman
The Outer Limits: Imsi-Catchers, Technology, And The Future Of The Fourth Amendment, Ryan C. Chapman
Pepperdine Law Review
Recent advances in technology are posing new challenges for a legal system based on decades-old precedent. Nowhere is this more apparent than in law enforcement’s warrantless use of IMSI Catchers. These devices mimic a cell phone tower, and when the device is activated, cell phones will naturally connect to them. Law enforcement officers can use those intercepted cell phone signals to track a suspect’s movements in real time with startling accuracy. Scholarly commentary on these devices has largely concluded that their use requires a warrant. This Comment engages in a close examination of Fourth Amendment precedent and argues that, as …
Children’S Anatomy V. Children’S Autonomy: A Precarious Balancing Act With Preimplantation Genetic Diagnosis And The Creation Of “Savior Siblings”, Marley Mcclean
Pepperdine Law Review
On February 3, 2015, Members of the United Kingdom’s Parliament, in an historical move, voted to approve the creation of human beings from three different parents, i.e., the creation of three-person DNA. In doing so, it became the first country ever to approve laws regulating such a procedure. The procedure uses a customized version of in vitro fertilization (IVF) to mix the DNA of two parents with the healthy mitochondria of a donor woman. While three-person DNA is not yet practiced in the United States, there is a controversial ART procedure practiced and unregulated in the United States that also …
Litigating In The 21st Century: Amending Challenges For Cause In Light Of Big Data, Andrew Kasabian
Litigating In The 21st Century: Amending Challenges For Cause In Light Of Big Data, Andrew Kasabian
Pepperdine Law Review
The amount of data generated daily is growing exponentially. The majority of this data is unstructured data. Big Data analytics provides the capability to analyze sets of unrelated data to find hidden and meaningful correlations and predict an individual’s future actions. Therefore, Big Data can alter trial preparation by opening up new sets of information for lawyers to analyze in the jury selection process. Privacy concerns may follow Big Data’s incorporation because Big Data aggregates an individual’s information and predicts future actions. This Comment details how Big Data will provide a net benefit to trial preparation. In order to protect …
Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu
Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu
Pepperdine Law Review
This Article highlights some of the critical distinctions between small data surveillance and big data cybersurveillance as methods of intelligence gathering. Specifically, in the intelligence context, it appears that “collect-it-all” tools in a big data world can now potentially facilitate the construction, by the intelligence community, of other individuals' digital avatars. The digital avatar can be understood as a virtual representation of our digital selves and may serve as a potential proxy for an actual person. This construction may be enabled through processes such as the data fusion of biometric and biographic data, or the digital data fusion of the …
Standing And Covert Surveillance, Christopher Slobogin
Standing And Covert Surveillance, Christopher Slobogin
Pepperdine Law Review
This Article describes and analyzes standing doctrine as it applies to covert government surveillance, focusing on practices thought to be conducted by the National Security Agency. Primarily because of its desire to avoid judicial incursions into the political process, the Supreme Court has construed its standing doctrine in a way that makes challenges to covert surveillance very difficult. Properly understood, however, such challenges do not call for judicial trenching on the power of the legislative and executive branches. Instead, they ask the courts to ensure that the political branches function properly. This political process theory of standing can rejuvenate the …
Charting The Course For Use Of Small Unmanned Aerial Systems In Newsgathering, Mickey H. Osterreicher
Charting The Course For Use Of Small Unmanned Aerial Systems In Newsgathering, Mickey H. Osterreicher
Pepperdine Law Review
News organizations and individual journalists eagerly anticipate safely utilizing Small Unmanned Aerial Systems (sUAS) for newsgathering purposes as lawmakers integrate sUAS into the National Air Space (NAS). For now, these potential users may be flying over an "unchartered" regulatory landscape while the FAA struggles to complete its administrative rulemaking. In order to better understand how media organizations and individual journalists intend to use sUAS for newsgathering purposes, the National Press Photographers Association (NPPA) developed a survey consisting of twenty-one multiple choice questions, with space for elaboration, and three questions seeking narrative responses. The survey was distributed via email to approximately …
Sacrificing Privacy For Convenience: The Need For Stricter Ftc Regulations In An Age Of Smartphone Surveillance, Ashton Mckinnon
Sacrificing Privacy For Convenience: The Need For Stricter Ftc Regulations In An Age Of Smartphone Surveillance, Ashton Mckinnon
Journal of the National Association of Administrative Law Judiciary
This comment aims to focus on the most frequently used connector that consumers treasure not only for convenience but also as a lifelong necessity - the smartphone. The FTC needs to enforce federally mandated guidelines that will allow the consumer to use technology without the technology using the consumer. Part II of this comment focuses on the type of information that can be collected by various companies, service providers, and agencies from an individual's smartphone, and the intentions of these collectors behind use of this information. Part III evaluates how applications (apps) contribute to this scheme, and, specifically, apps' recordkeeping …
Clapper V. Amnesty International Usa: Balancing National Security And Individuals' Privacy, Kristen Choi
Clapper V. Amnesty International Usa: Balancing National Security And Individuals' Privacy, Kristen Choi
Journal of the National Association of Administrative Law Judiciary
No abstract provided.
The Rapid Rise Of Delayed Notice Searches, And The Fourth Amendment “Rule Requiring Notice”, Jonathan Witmer-Rich
The Rapid Rise Of Delayed Notice Searches, And The Fourth Amendment “Rule Requiring Notice”, Jonathan Witmer-Rich
Pepperdine Law Review
This article documents the rapid rise of covert searching, through delayed notice search warrants, and argues that covert searching in its current form presumptively violates the Fourth Amendment’s “rule requiring notice.” Congress authorized these “sneak and peek” warrants in the USA Patriot Act, in 2001, and soon after added a reporting requirement to monitor this invasive search technique. Since 2001, the use of delayed notice search warrants has risen dramatically, from around 25 in 2002 to 5,601 in 2012, suggesting that “sneak and peek” searches are becoming alarmingly common. In fact, it is not at all clear whether true “sneak …
The Post-Tsa Airport: A Constitution Free Zone?, Daniel S. Harawa
The Post-Tsa Airport: A Constitution Free Zone?, Daniel S. Harawa
Pepperdine Law Review
No abstract provided.
Facebook Is Not Your Friend: Protecting A Private Employee's Expectation Of Privacy In Social Networking Content In The Twenty-First Century Workplace, Cara Magatelli
The Journal of Business, Entrepreneurship & the Law
This Comment explores the implications SNS postings have on private employers concerning the off-duty, non-work related conduct of their employees. This argument recognizes that an employee is entitled to engage in whatever legal off-duty conduct he chooses, so long as the behavior does not damage his employer's legitimate business interests. An employer should not be able to use information gleaned from an employee's SNS postings, unrelated to an employer's business interests, to punish an employee for her choices outside the work place. Disciplining or terminating an employee for his off-duty lifestyle choices permits the morals and standards of the employer …