Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Pepperdine University

Articles 1 - 25 of 25

Full-Text Articles in Privacy Law

The Post-Dobbs Reality: Privacy Expectations For Period-Tracking Apps In Criminal Abortion Prosecutions, Sophie L. Nelson Apr 2024

The Post-Dobbs Reality: Privacy Expectations For Period-Tracking Apps In Criminal Abortion Prosecutions, Sophie L. Nelson

Pepperdine Law Review

The Supreme Court’s decision to overturn Roe v. Wade and Planned Parenthood v. Casey in June 2022 was met with waves of both support and criticism throughout the United States. Several states immediately implemented or began drafting trigger laws that criminalize seeking and providing an abortion. These laws prompted several period-tracking app companies to encrypt their users’ data to make it more difficult for the government to access period- and pregnancy-related information for criminal investigations. This Comment explores whether the Fourth Amendment and U.S. privacy statutes protect users of period-tracking apps from government surveillance. More specifically, this Comment argues that …


Does Federal Law Ban Mailing Abortion Drugs? A Textual Analysis Of 18 U.S.C. § 1461, Peter Allevato Dec 2023

Does Federal Law Ban Mailing Abortion Drugs? A Textual Analysis Of 18 U.S.C. § 1461, Peter Allevato

Pepperdine Law Review

As the regulation of abortion availability returned to the States, many have grappled with so-called trigger laws: dormant laws that were set to take effect to restrict or ensure access to abortion should constitutional protection be revoked. While the federal government has no true trigger law, it does have long-unenforced laws prohibiting the mailing of “[e]very article or thing designed, adapted, or intended for producing abortion.” 18 U.S.C. § 1461 is an old law, and it has not been enforced for at least fifty years. But the law’s potential effect on the growing practice of mail-distribution of chemical abortion pills …


Complying With New And Existing Biometric Data Privacy Laws, Ariel Latzer Jul 2023

Complying With New And Existing Biometric Data Privacy Laws, Ariel Latzer

The Journal of Business, Entrepreneurship & the Law

After providing an overview of the history behind biometric information, this article will discuss the Illinois Biometric Privacy Act (BIPA)—which laid the foundation for biometric privacy regulations in the United States—and then discuss the California Consumer Privacy Act (CCPA) and its amendments in the California Privacy Rights Act (CPRA). It will also briefly touch on biometric information regulations in other states and then delve into how some notable companies are currently using individuals’ biometric information to give readers a general idea of what is happening to their personal information and highlight areas businesses should take note of in order to …


The Wages Of Crying Life: What States Must Do To Protect Children After The Fall Of Roe, Leah A. Plunkett, Michael S. Lewis Oct 2022

The Wages Of Crying Life: What States Must Do To Protect Children After The Fall Of Roe, Leah A. Plunkett, Michael S. Lewis

Pepperdine Law Review

In the post-Roe world, can a state rationally claim that the value of human life justifies the imposition of abortion bans but does not demand that a state protect the vulnerable young who are “born human beings”—commonly called “minors” or “children”—and are entitled to protection under a state’s laws? This essay advances the claim that it cannot. This essay asks that those who say they are “Pro-life” in politics and law demonstrate that they protect vulnerable life beyond the abortion context, and that they do so in the most minimal fashion: through a demonstrated commitment to protecting the basic welfare …


The Case For A Liberal Communitarian Jurisprudence, Amitai Etzioni May 2022

The Case For A Liberal Communitarian Jurisprudence, Amitai Etzioni

Journal of the National Association of Administrative Law Judiciary

This article seeks to show that courts face difficulties without a principled, constitutional anchoring for the conception of the common good. Courts could divine the common good from the penumbra of the Fourth Amendment in the same way the Supreme Court created a right to privacy. In addition to creating a “common good” constitutional principle, the judicial branch should establish criteria to determine when this principle should take precedence over individual rights expressly preserved in the Constitution.


Overruling Roe V. Wade: Lessons From The Death Penalty, Paul Benjamin Linton Mar 2021

Overruling Roe V. Wade: Lessons From The Death Penalty, Paul Benjamin Linton

Pepperdine Law Review

In Furman v. Georgia (1972), the Supreme Court struck down the Georgia and Texas death penalty statutes, thereby calling into question the validity of every other state death penalty statute. In their concurring opinions, Justices Brennan and Marshall expressed the view that, given society’s gradual abandonment of the death penalty, capital punishment violated the Eighth Amendment’s prohibition of “cruel and unusual punishments.” Justice Powell and three other justices dissented, arguing that the Court had misread the state of the law regarding society’s acceptance of the death penalty. Four years after Furman, in a quintet of cases, the Court held that …


The First Amendment And Data Privacy: Securing Data Privacy Laws That Withstand Constitutional Muster, Kathryn Peyton Jul 2020

The First Amendment And Data Privacy: Securing Data Privacy Laws That Withstand Constitutional Muster, Kathryn Peyton

Pepperdine Law Review

Given the growing ubiquity of digital technology’s presence in people’s lives today, it is becoming increasingly more necessary to secure data privacy protections. People interact with technology constantly, ranging from when engaging in business activates, such as corresponding through emails or doing research online, to more innocuous activities like driving, shopping, or talking with friends and family. The advances in technology have made possible the creation of digital trails whenever someone interacts with such technology. Companies aggregate data from data trails and use predictive analytics to create detailed profiles about citizen-consumers. This information is typically used for profit generating purposes. …


Emerging Technology & Regulation Panel Transcript, Bill Goodwin, Ryan Hagemann, Brooks Rainwater, Caleb Watney Jun 2020

Emerging Technology & Regulation Panel Transcript, Bill Goodwin, Ryan Hagemann, Brooks Rainwater, Caleb Watney

Pepperdine Law Review

No abstract provided.


Modern Privacy Advocacy: An Approach At War With Privacy Itself?, Justin "Gus" Hurwitz, Jamil N. Jaffer Jun 2020

Modern Privacy Advocacy: An Approach At War With Privacy Itself?, Justin "Gus" Hurwitz, Jamil N. Jaffer

Pepperdine Law Review

This Article argues that the modern concept of privacy itself, particularly as framed by some of its most ardent advocates today, is fundamentally incoherent. The Article highlights that many common arguments made in support of privacy, while initially seeming to protect this critical value, nonetheless undermine it in the long run. Using both recent and older examples of applying classic privacy advocacy positions to key technological innovations, the authors demonstrate how these positions, while seemingly privacy-enhancing at the time, actually resulted in outcomes that were less beneficial for consumers and citizens, including from a purely privacy-focused perspective. As a result, …


The Gdpr And The Consequences Of Big Regulation, Matthew R. A. Heiman Jun 2020

The Gdpr And The Consequences Of Big Regulation, Matthew R. A. Heiman

Pepperdine Law Review

This Article summarizes the key features of the European Union’s General Data Privacy Regulation (GDPR) that became effective on May 25, 2018. The stated purpose of the law is to give individuals greater control over personal information that is handled by companies and organizations. The Article argues that the GDPR is fundamentally flawed. Key terms within the GDPR are undefined; the burdens of the GDPR will fall heaviest on small businesses; the GDPR disrupts a valuable business model; the GDPR will stymie growth, innovation, and information sharing; and it may be the product of protectionist impulses rather than concerns for …


When Considering Federal Privacy Legislation, Neil Chilson Jun 2020

When Considering Federal Privacy Legislation, Neil Chilson

Pepperdine Law Review

Legislators, advocates, and business interests are proposing federal privacy legislation with new urgency. The United States has a long-established federal framework for addressing commercial privacy concerns, including general consumer protection law and sector-specific legislation. But the calls to expand or replace this approach have grown louder since Europe’s General Data Protection Regulation went into effect and since California adopted detailed and prescriptive privacy legislation. Should we create a U.S. federal privacy law, and if so, how? When considering any kind of privacy regulation, three concepts are fundamental. First, no one can control all information about them. Second, all privacy laws …


Ethical Implications Of Forensic Genealogy In Criminal Cases, Solana Lund May 2020

Ethical Implications Of Forensic Genealogy In Criminal Cases, Solana Lund

The Journal of Business, Entrepreneurship & the Law

The use of forensic genealogy to solve criminal cases is likely to increase in the coming years, especially given its success in solving cold cases. While its potential for good is impressive, there are also legitimate ethical concerns that need to be addressed. As society sees an increase in the use of forensic genealogy and DTC databases in criminal investigations as well as an increase in the media attention it garners, there will be more discussion regarding ethical implications. Legal scholars say that it is only a matter of time before courts weigh in on the privacy of DNA and …


Mining For Children’S Data In Today’S Digital World, Damin Park Sep 2018

Mining For Children’S Data In Today’S Digital World, Damin Park

Journal of the National Association of Administrative Law Judiciary

No abstract provided.


Pii In Context: Video Privacy And A Factor-Based Test For Assessing Personal Information, Daniel L. Macioce Jr. Mar 2018

Pii In Context: Video Privacy And A Factor-Based Test For Assessing Personal Information, Daniel L. Macioce Jr.

Pepperdine Law Review

As a central concept in American information privacy law, personally identifiable information (PII) plays a critical role in determining whether a privacy violation has occurred. Under the Video Privacy Protection Act of 1988 (VPPA), PII “includes information which identifies a person as having requested or obtained specific video materials or services.” Despite the clarity that these words may have when the Statute was enacted, the line separating PII from non-PII in the context of streaming video is not easily drawn, in part due to the prevalence of behavior tracking technologies and the emergence of “big data” analytics. The First Circuit, …


The Outer Limits: Imsi-Catchers, Technology, And The Future Of The Fourth Amendment, Ryan C. Chapman Jul 2017

The Outer Limits: Imsi-Catchers, Technology, And The Future Of The Fourth Amendment, Ryan C. Chapman

Pepperdine Law Review

Recent advances in technology are posing new challenges for a legal system based on decades-old precedent. Nowhere is this more apparent than in law enforcement’s warrantless use of IMSI Catchers. These devices mimic a cell phone tower, and when the device is activated, cell phones will naturally connect to them. Law enforcement officers can use those intercepted cell phone signals to track a suspect’s movements in real time with startling accuracy. Scholarly commentary on these devices has largely concluded that their use requires a warrant. This Comment engages in a close examination of Fourth Amendment precedent and argues that, as …


Children’S Anatomy V. Children’S Autonomy: A Precarious Balancing Act With Preimplantation Genetic Diagnosis And The Creation Of “Savior Siblings”, Marley Mcclean May 2016

Children’S Anatomy V. Children’S Autonomy: A Precarious Balancing Act With Preimplantation Genetic Diagnosis And The Creation Of “Savior Siblings”, Marley Mcclean

Pepperdine Law Review

On February 3, 2015, Members of the United Kingdom’s Parliament, in an historical move, voted to approve the creation of human beings from three different parents, i.e., the creation of three-person DNA. In doing so, it became the first country ever to approve laws regulating such a procedure. The procedure uses a customized version of in vitro fertilization (IVF) to mix the DNA of two parents with the healthy mitochondria of a donor woman. While three-person DNA is not yet practiced in the United States, there is a controversial ART procedure practiced and unregulated in the United States that also …


Litigating In The 21st Century: Amending Challenges For Cause In Light Of Big Data, Andrew Kasabian Feb 2016

Litigating In The 21st Century: Amending Challenges For Cause In Light Of Big Data, Andrew Kasabian

Pepperdine Law Review

The amount of data generated daily is growing exponentially. The majority of this data is unstructured data. Big Data analytics provides the capability to analyze sets of unrelated data to find hidden and meaningful correlations and predict an individual’s future actions. Therefore, Big Data can alter trial preparation by opening up new sets of information for lawyers to analyze in the jury selection process. Privacy concerns may follow Big Data’s incorporation because Big Data aggregates an individual’s information and predicts future actions. This Comment details how Big Data will provide a net benefit to trial preparation. In order to protect …


Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu Jul 2015

Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu

Pepperdine Law Review

This Article highlights some of the critical distinctions between small data surveillance and big data cybersurveillance as methods of intelligence gathering. Specifically, in the intelligence context, it appears that “collect-it-all” tools in a big data world can now potentially facilitate the construction, by the intelligence community, of other individuals' digital avatars. The digital avatar can be understood as a virtual representation of our digital selves and may serve as a potential proxy for an actual person. This construction may be enabled through processes such as the data fusion of biometric and biographic data, or the digital data fusion of the …


Standing And Covert Surveillance, Christopher Slobogin Jul 2015

Standing And Covert Surveillance, Christopher Slobogin

Pepperdine Law Review

This Article describes and analyzes standing doctrine as it applies to covert government surveillance, focusing on practices thought to be conducted by the National Security Agency. Primarily because of its desire to avoid judicial incursions into the political process, the Supreme Court has construed its standing doctrine in a way that makes challenges to covert surveillance very difficult. Properly understood, however, such challenges do not call for judicial trenching on the power of the legislative and executive branches. Instead, they ask the courts to ensure that the political branches function properly. This political process theory of standing can rejuvenate the …


Charting The Course For Use Of Small Unmanned Aerial Systems In Newsgathering, Mickey H. Osterreicher Jul 2015

Charting The Course For Use Of Small Unmanned Aerial Systems In Newsgathering, Mickey H. Osterreicher

Pepperdine Law Review

News organizations and individual journalists eagerly anticipate safely utilizing Small Unmanned Aerial Systems (sUAS) for newsgathering purposes as lawmakers integrate sUAS into the National Air Space (NAS). For now, these potential users may be flying over an "unchartered" regulatory landscape while the FAA struggles to complete its administrative rulemaking. In order to better understand how media organizations and individual journalists intend to use sUAS for newsgathering purposes, the National Press Photographers Association (NPPA) developed a survey consisting of twenty-one multiple choice questions, with space for elaboration, and three questions seeking narrative responses. The survey was distributed via email to approximately …


Sacrificing Privacy For Convenience: The Need For Stricter Ftc Regulations In An Age Of Smartphone Surveillance, Ashton Mckinnon May 2015

Sacrificing Privacy For Convenience: The Need For Stricter Ftc Regulations In An Age Of Smartphone Surveillance, Ashton Mckinnon

Journal of the National Association of Administrative Law Judiciary

This comment aims to focus on the most frequently used connector that consumers treasure not only for convenience but also as a lifelong necessity - the smartphone. The FTC needs to enforce federally mandated guidelines that will allow the consumer to use technology without the technology using the consumer. Part II of this comment focuses on the type of information that can be collected by various companies, service providers, and agencies from an individual's smartphone, and the intentions of these collectors behind use of this information. Part III evaluates how applications (apps) contribute to this scheme, and, specifically, apps' recordkeeping …


Clapper V. Amnesty International Usa: Balancing National Security And Individuals' Privacy, Kristen Choi May 2015

Clapper V. Amnesty International Usa: Balancing National Security And Individuals' Privacy, Kristen Choi

Journal of the National Association of Administrative Law Judiciary

No abstract provided.


The Rapid Rise Of Delayed Notice Searches, And The Fourth Amendment “Rule Requiring Notice”, Jonathan Witmer-Rich Apr 2014

The Rapid Rise Of Delayed Notice Searches, And The Fourth Amendment “Rule Requiring Notice”, Jonathan Witmer-Rich

Pepperdine Law Review

This article documents the rapid rise of covert searching, through delayed notice search warrants, and argues that covert searching in its current form presumptively violates the Fourth Amendment’s “rule requiring notice.” Congress authorized these “sneak and peek” warrants in the USA Patriot Act, in 2001, and soon after added a reporting requirement to monitor this invasive search technique. Since 2001, the use of delayed notice search warrants has risen dramatically, from around 25 in 2002 to 5,601 in 2012, suggesting that “sneak and peek” searches are becoming alarmingly common. In fact, it is not at all clear whether true “sneak …


The Post-Tsa Airport: A Constitution Free Zone?, Daniel S. Harawa Jan 2014

The Post-Tsa Airport: A Constitution Free Zone?, Daniel S. Harawa

Pepperdine Law Review

No abstract provided.


Facebook Is Not Your Friend: Protecting A Private Employee's Expectation Of Privacy In Social Networking Content In The Twenty-First Century Workplace, Cara Magatelli Jan 2014

Facebook Is Not Your Friend: Protecting A Private Employee's Expectation Of Privacy In Social Networking Content In The Twenty-First Century Workplace, Cara Magatelli

The Journal of Business, Entrepreneurship & the Law

This Comment explores the implications SNS postings have on private employers concerning the off-duty, non-work related conduct of their employees. This argument recognizes that an employee is entitled to engage in whatever legal off-duty conduct he chooses, so long as the behavior does not damage his employer's legitimate business interests. An employer should not be able to use information gleaned from an employee's SNS postings, unrelated to an employer's business interests, to punish an employee for her choices outside the work place. Disciplining or terminating an employee for his off-duty lifestyle choices permits the morals and standards of the employer …