Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 52

Full-Text Articles in Privacy Law

The Fourth Amendment And New Technologies: Constitutional Myths And The Case For Caution, Orin S. Kerr Jul 2019

The Fourth Amendment And New Technologies: Constitutional Myths And The Case For Caution, Orin S. Kerr

Orin Kerr

To one who values federalism, federal preemption of state law may significantly threaten the autonomy and core regulatory authority of The Supreme Court recently considered whether a1mmg an infrared thermal imaging device at a suspect's home can violate the Fourth Amendment. Kyllo v. United States announced a new and comprehensive rule: the government's warrantless use of senseenhancing technology that is "not in general use" violates the Fourth Amendment when it yields "details of the home that would previously have been unknowable without physical intrusion." Justice Scalia's majority opinion acknowledged that the Court's rule was not needed to resolve the case …


Age Verification In The 21st Century: Swiping Away Your Privacy, 23 J. Marshall J. Computer & Info. L. 363 (2005), John T. Cross Apr 2019

Age Verification In The 21st Century: Swiping Away Your Privacy, 23 J. Marshall J. Computer & Info. L. 363 (2005), John T. Cross

John Cross

Today a lot of private businesses have adopted the practice of driver's license swiping where proof of age or security issues arise. This practice has beneficial uses for both private entities, in identifying underage persons and those with fake identification, and law enforcement. However, the problem arise when the private sector, businesses are not using the information to merely identify underage customers or those with fake identification but store the information encoded on the barcode in a computer database. No federal laws and very few state laws regulate the collection and use of this information while the private sector is …


Is It Time For A Universal Genetic Forensic Database?, Christopher Slobogin, Ellen Wright Clayton, J. W. Hazel, B. A. Malin Mar 2019

Is It Time For A Universal Genetic Forensic Database?, Christopher Slobogin, Ellen Wright Clayton, J. W. Hazel, B. A. Malin

Christopher Slobogin

The ethical objections to mandating forensic profiling of newborns and/or compelling every citizen or visitor to submit to a buccal swab or to spit in a cup when they have done nothing wrong are not trivial. But newborns are already subject to compulsory medical screening, and people coming from foreign countries to the United States already submit to fingerprinting. It is also worth noting that concerns about coercion or invasions of privacy did not give pause to legislatures (or, for that matter, even the European Court) when authorizing compelled DNA sampling from arrestees, who should not forfeit genetic privacy interests …


Is It Time For A Universal Genetic Forensic Database?, Christopher Slobogin, Ellen Wright Clayton, J. W. Hazel, B. A. Malin Mar 2019

Is It Time For A Universal Genetic Forensic Database?, Christopher Slobogin, Ellen Wright Clayton, J. W. Hazel, B. A. Malin

Ellen Wright Clayton

The ethical objections to mandating forensic profiling of newborns and/or compelling every citizen or visitor to submit to a buccal swab or to spit in a cup when they have done nothing wrong are not trivial. But newborns are already subject to compulsory medical screening, and people coming from foreign countries to the United States already submit to fingerprinting. It is also worth noting that concerns about coercion or invasions of privacy did not give pause to legislatures (or, for that matter, even the European Court) when authorizing compelled DNA sampling from arrestees, who should not forfeit genetic privacy interests …


Testimony On Unmanned Aircraft Systems Rules And Regulations, Stephen E. Henderson Sep 2016

Testimony On Unmanned Aircraft Systems Rules And Regulations, Stephen E. Henderson

Stephen E Henderson

Chairman Barrington, Vice Chair Brooks, members of the Committee on Public Safety, Senators, and distinguished guests, I am grateful for the opportunity to speak to you today about unmanned aerial systems, or drones, and more particularly about their federal constitutional implications and what might be the constitutional restrictions on any legislation you might like to enact. I am the Judge Haskell A. Holloman Professor of Law at the University of Oklahoma, where my teaching and research focus on criminal law and procedure and privacy, including the constitutional rights pertaining thereto.

My topic is not an easy one. The constitutional law …


If You Fly A Drone, So Can Police, Stephen E. Henderson May 2016

If You Fly A Drone, So Can Police, Stephen E. Henderson

Stephen E Henderson


According to the U.S. Constitution, the more you fly your drone, the more police can fly theirs. “Come on,” you might reply, “that hoary document”—and, yes, sorry to make you the sort who drops words like hoary—“that hoary document surely says nothing about drones.” But in fact it does. At least it does as interpreted by the courts. In particular, it is how they interpret the Fourth Amendment. So, to understand this aspect of drones, we first must understand this provision of the Bill of Rights...


Responding To Takedown Requests For Digital Library Repositories, Kristina L. Niedringhaus Apr 2016

Responding To Takedown Requests For Digital Library Repositories, Kristina L. Niedringhaus

Kristina L Niedringhaus

No abstract provided.


Ou Professor: Fourth Amendment At Heart Of Dispute Between Fbi, Apple, Stephen E. Henderson Mar 2016

Ou Professor: Fourth Amendment At Heart Of Dispute Between Fbi, Apple, Stephen E. Henderson

Stephen E Henderson

The dispute between the FBI and Apple Inc. over the unlocking of the iPhone used by one of the San Bernadino shooters is important to all Americans. And so it's good that it is getting a wide airing. But when it comes to issues that have complicated tradeoffs, it can be important not just that we have the conversation, but that we use the right words. And here the debate deserves very mixed reviews. . . .


Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu Feb 2016

Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu

Margaret Hu

This Article highlights some of the critical distinctions between small data surveillance and big data cybersurveillance as methods of intelligence gathering. Specifically, in the intelligence context, it appears that “collect-it-all” tools in a big data world can now potentially facilitate the construction, by the intelligence community, of other individuals' digital avatars. The digital avatar can be understood as a virtual representation of our digital selves and may serve as a potential proxy for an actual person. This construction may be enabled through processes such as the data fusion of biometric and biographic data, or the digital data fusion of the …


Copyrights, Privacy, And The Blockchain, Tom W. Bell Dec 2015

Copyrights, Privacy, And The Blockchain, Tom W. Bell

Tom W. Bell

The law of the United States forces authors to choose between copyrights and privacy rights. Federal lawmakers have noticed and tried to remedy that problem. The Copyright Act makes express provisions for anonymous and pseudonymous works. The Copyright Office has tried to remedy that tension, too; copyright registration forms do not outwardly require authors to reveal their real world identities. Nonetheless, authors still face a choice between protecting their privacy and enjoying one of copyright’s most powerful incentives: the prospect of transferring to another the exclusive right to use a copyrighted work. That power proves useful, to say the least, …


A Rose By Any Other Name: Regulating Law Enforcement Bulk Metadata Collection, Stephen E. Henderson Dec 2015

A Rose By Any Other Name: Regulating Law Enforcement Bulk Metadata Collection, Stephen E. Henderson

Stephen E Henderson

In Other People’s Papers, Jane Bambauer argues for careful reform of the Fourth Amendment’s third party doctrine, providing an important contribution to an increasingly rich field of scholarship, judicial opinion, statute, and law reform.  Bambauer is especially concerned with access to bodies of third-party data that can be filtered and mined, as they can be privacy invasive but also effective and less subject to traditional investigative prejudices and limitations.  Although her article provocatively overclaims in trying to set itself apart from existing proposals, by analyzing existing constitutional and statutory law—including what I have termed a “limited” third party doctrine—and comparing …


Fourth Amendment Time Machines (And What They Might Say About Police Body Cameras), Stephen E. Henderson Dec 2015

Fourth Amendment Time Machines (And What They Might Say About Police Body Cameras), Stephen E. Henderson

Stephen E Henderson

When it comes to criminal investigation, time travel is increasingly possible.  Despite longstanding roots in traditional investigation, science is today providing something fundamentally different in the form of remarkably complete digital records.  And those big data records not only store our past, but thanks to data mining they are in many circumstances eerily good at predicting our future.  So, now that we stand on the threshold of investigatory time travel, how should the Fourth Amendment and legislation respond?  How should we approach bulk government capture, such as by a solar-powered drone employing wide-area persistent stare technology?  Is it meaningfully different …


The First Amendment And The Rpas, Caren M. Morrison Nov 2015

The First Amendment And The Rpas, Caren M. Morrison

Caren Myers Morrison

No abstract provided.


Session Ii: Historical Perspectives On Privacy In American Law, 29 J. Marshall J. Computer & Info. L. 319 (2012), Steven D. Schwinn, Alberto Bernabe, Kathryn Kolbert, Adam D. Moore, Marc Rotenberg Oct 2015

Session Ii: Historical Perspectives On Privacy In American Law, 29 J. Marshall J. Computer & Info. L. 319 (2012), Steven D. Schwinn, Alberto Bernabe, Kathryn Kolbert, Adam D. Moore, Marc Rotenberg

Alberto Bernabe

No abstract provided.


The Greening Of Canadian Cyber Laws: What Environmental Law Can Teach And Cyber Law Can Learn, Sara Smyth Aug 2015

The Greening Of Canadian Cyber Laws: What Environmental Law Can Teach And Cyber Law Can Learn, Sara Smyth

Sara Smyth

This article examines whether Canadian environmental law and policy could serve as a model for cyber crime regulation. A wide variety of offences are now committed through digital technologies, including thievery, identity theft, fraud, the misdirection of communications, intellectual property theft, espionage, system disruption, the destruction of data, money laundering, hacktivism, and terrorism, among others. The focus of this Article is on the problem of data security breaches, which target businesses and consumers. Following the Introduction, Part I provides an overview of the parallels that can be drawn between threats in the natural environment and on the Internet. Both disciplines …


On The Centrality Of Information Law: A Rational Choice Discussion Of Information Law And Transparency, 17 J. Marshall J. Computer & Info. L. 1069 (1999), William B.T. Mock Aug 2015

On The Centrality Of Information Law: A Rational Choice Discussion Of Information Law And Transparency, 17 J. Marshall J. Computer & Info. L. 1069 (1999), William B.T. Mock

William B.T. Mock

The purpose of this Article is to establish the importance of information law and to encourage its further study. By applying information technology theory, economic theory and, and political theory insights, the Article examines the centrality of information law in open societies. Information law rests upon two premises. The first of which is that information is a legally cognizable concept- that it can be framed in legal terms and has legal significance. The second premise is that there exists a rationale for government regulation and provision of information, either explicitly or implicitly. Transparency is a flexible concept used in a …


Copyright & Privacy - Through The Wide-Angle Lens, 4 J. Marshall Rev. Intell. Prop. L. 285 (2005), William W. Fisher Iii, Howard P. Knopf, Fred Von Lohmann, William B.T. Mock, Marybeth Peters, R. Anthony Reese Aug 2015

Copyright & Privacy - Through The Wide-Angle Lens, 4 J. Marshall Rev. Intell. Prop. L. 285 (2005), William W. Fisher Iii, Howard P. Knopf, Fred Von Lohmann, William B.T. Mock, Marybeth Peters, R. Anthony Reese

William B.T. Mock

Some have proposed “alternative compensation schemes” as a means of compensating copyright owners and creators for P2P activity while avoiding litigation. Some have proposed a streamlined dispute resolution system that would allow for enforcement in a manner analogous to the UDRP model. Others question whether private copying should necessarily be viewed as illegal and whether any alternative compensation scheme is viable. With all of these proposals, the question remains as to whether “alternative compensation” is really alternative.


Copyright & Privacy - Through The Privacy Lens, 4 J. Marshall Rev. Intell. Prop. L. 273 (2005), Julie E. Cohen, David E. Sorkin, Peter P. Swire Jul 2015

Copyright & Privacy - Through The Privacy Lens, 4 J. Marshall Rev. Intell. Prop. L. 273 (2005), Julie E. Cohen, David E. Sorkin, Peter P. Swire

David E. Sorkin

What legal tools do privacy advocates have available to defend an individual’s right to privacy? How far does this right go? How should these rights be defended—or if necessary—curtailed? What is the role of Government, of the practicing bar and of academics?


1997 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 16 J. Marshall J. Computer & Info. L. 685 (1998), David E. Sorkin, Steven A. Mcauley, David B. Nash Iii Jul 2015

1997 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 16 J. Marshall J. Computer & Info. L. 685 (1998), David E. Sorkin, Steven A. Mcauley, David B. Nash Iii

David E. Sorkin

Many public libraries provide patrons with free public-access Internet terminals, largely for accessing information available on the World Wide Web. However, public concern exists over the ability of children who browse the Web without adult supervision to view sexually explicit materials and other inappropriate items. This concern has led to the development of various Internet filtering software programs. Some filtering programs operate by blocking access to documents containing certain words or phrases or combinations thereof. However, more common programs permit access only to documents or sites that appear in a pre-selected, "safe" database or that block access to documents that …


The Twenty-Fifth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 24 J. Marshall J. Computer & Info. L. 673 (2006), David E. Sorkin, Larisa V. Benitez-Morgan, J. Preston Carter, William P. Greubel Iii, Matthew Hector, Kellen Keaty, Lisa Rodriguez Jul 2015

The Twenty-Fifth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 24 J. Marshall J. Computer & Info. L. 673 (2006), David E. Sorkin, Larisa V. Benitez-Morgan, J. Preston Carter, William P. Greubel Iii, Matthew Hector, Kellen Keaty, Lisa Rodriguez

David E. Sorkin

No abstract provided.


Session Iv: Technology And The Future Of Privacy, 29 J. Marshall J. Computer & Info. L. 379 (2012), David E. Sorkin, Ann Bartow, Robert S. Gurwin, Doris E. Long Jul 2015

Session Iv: Technology And The Future Of Privacy, 29 J. Marshall J. Computer & Info. L. 379 (2012), David E. Sorkin, Ann Bartow, Robert S. Gurwin, Doris E. Long

David E. Sorkin

No abstract provided.


Spam Legislation In The United States, 22 J. Marshall J. Computer & Info. L. 3 (2003), David E. Sorkin Jul 2015

Spam Legislation In The United States, 22 J. Marshall J. Computer & Info. L. 3 (2003), David E. Sorkin

David E. Sorkin

This article examines the effect of spam legislation in the United States. It discusses state legislation and the common provisions of state spam legislation, such as disclosure and labeling requirements and opt-out provisions. It also analyzes the consequences of state anti-spam legislation. Federal legislation is analyzed, with a brief look at the CAN-SPAM Act of 2003. The article concludes that legislation has not had a big impact on spam, and the CAN-SPAM Act is not likely to change or curb spam.


1996 John Marshall National Moot Court Competition In Information And Privacy Law: Bench Memorandum, 15 J. Marshall J. Computer & Info. L. 587 (1997), David E. Sorkin Jul 2015

1996 John Marshall National Moot Court Competition In Information And Privacy Law: Bench Memorandum, 15 J. Marshall J. Computer & Info. L. 587 (1997), David E. Sorkin

David E. Sorkin

No abstract provided.


Copyright & Privacy - Through The Technology Lens, 4 J. Marshall Rev. Intell. Prop. L. 242 (2005), Michael A. Geist, Doris E. Long, Leslie Ann Reis, David E. Sorkin, Fred Von Lohmann Jul 2015

Copyright & Privacy - Through The Technology Lens, 4 J. Marshall Rev. Intell. Prop. L. 242 (2005), Michael A. Geist, Doris E. Long, Leslie Ann Reis, David E. Sorkin, Fred Von Lohmann

David E. Sorkin

How is new technology impacting on the more general question of privacy in cyberspace? Is the original notion of an expectation of anonymity on the internet still viable? Can technology pierce through the expectation of privacy even without judicial interference? Do individuals need protection from such technology? Is there technology available to protect the individual? Should these technological tools be regulated? Should the law differentiate between various types of alleged “illegal” behavior; e.g., IP infringement, defamation, possession of pornography and terrorism? Are there international standards that can assist in regulating the intersection between technology and privacy in cyberspace?


The 20th Belle R. And Joseph H. Braun Memorial Symposium: The Development Of Privacy Law From Brandeis To Today: Opening Remarks, 29 J. Marshall J. Computer & Info. L. 279 (2012), Ralph Ruebner, Leslie Ann Reis, David E. Sorkin Jul 2015

The 20th Belle R. And Joseph H. Braun Memorial Symposium: The Development Of Privacy Law From Brandeis To Today: Opening Remarks, 29 J. Marshall J. Computer & Info. L. 279 (2012), Ralph Ruebner, Leslie Ann Reis, David E. Sorkin

David E. Sorkin

No abstract provided.


The Twenty-Sixth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 25 J. Marshall J. Computer & Info. L. 305 (2008), Leslie Ann Reis, David E. Sorkin, Panagiota Kelali, Jessica Diehl, Carlos A. Encinas, Matthew Hector, Gina Spada, Steven Tseng, Priya Krishnamoorthy Venkat Jul 2015

The Twenty-Sixth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 25 J. Marshall J. Computer & Info. L. 305 (2008), Leslie Ann Reis, David E. Sorkin, Panagiota Kelali, Jessica Diehl, Carlos A. Encinas, Matthew Hector, Gina Spada, Steven Tseng, Priya Krishnamoorthy Venkat

David E. Sorkin

No abstract provided.


Lawyers Who Lie On-Line: How Should The Legal Profession Respond To Ebay Ethics, 18 J. Marshall J. Computer & Info. L. 875 (2000), Mark E. Wojcik Jul 2015

Lawyers Who Lie On-Line: How Should The Legal Profession Respond To Ebay Ethics, 18 J. Marshall J. Computer & Info. L. 875 (2000), Mark E. Wojcik

Mark E. Wojcik

A recent scandal erupted in the press when a painting that was offered for sale on an Internet auction site was believed to be a lost contemporary masterpiece. The seller appeared to be a married man who was cleaning junk out of his garage, including a painting that his wife would not let him hang in the house. A bidding frenzy drove the price from the opening bid of 25 cents to more than $135,000 from a buyer in the Netherlands. After the sale was finished (it was ended by EBay when they learned he bid on the painting himself …


The Article 2b Symposium: A Foreword, 16 J. Marshall J. Computer & Info. L. 205 (1998), Ann Lousin Jun 2015

The Article 2b Symposium: A Foreword, 16 J. Marshall J. Computer & Info. L. 205 (1998), Ann Lousin

Ann M. Lousin

No abstract provided.


Foreword: Uniform Computer Information Transaction Act, 18 J. Marshall J. Computer & Info. L. 275 (2000), Ann Lousin Jun 2015

Foreword: Uniform Computer Information Transaction Act, 18 J. Marshall J. Computer & Info. L. 275 (2000), Ann Lousin

Ann M. Lousin

No abstract provided.


Session Ii: Historical Perspectives On Privacy In American Law, 29 J. Marshall J. Computer & Info. L. 319 (2012), Steven D. Schwinn, Alberto Bernabe, Kathryn Kolbert, Adam D. Moore, Marc Rotenberg Jun 2015

Session Ii: Historical Perspectives On Privacy In American Law, 29 J. Marshall J. Computer & Info. L. 319 (2012), Steven D. Schwinn, Alberto Bernabe, Kathryn Kolbert, Adam D. Moore, Marc Rotenberg

Steven D. Schwinn

No abstract provided.