Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 91 - 104 of 104

Full-Text Articles in Privacy Law

Requiem For Cyberspace: The Effect Of The European General Privacy Regulation On The Global Internet, Steven Tapia Apr 2019

Requiem For Cyberspace: The Effect Of The European General Privacy Regulation On The Global Internet, Steven Tapia

Seattle University Law Review

The dream of a perpetual, limitless, non-dimensional space is an idea that has transfixed clergy, philosophers, and poets for ages. Whether it is called “heaven,” “the afterlife,” “nirvana,” or another linguistic stand-in, the dream of a dimension beyond the bounds of time, space, and the laws of nature seems as universal as any concept ever. From its initial development in the 1970s (as a military, academic, and governmental experiment in creating a wholly alternative means of communication capable of surviving catastrophic failures of any parts of the communications conduits) until essentially now, the Internet seemed to be the closest incarnate …


Regulating The Gdpr: Perspectives From The United Kingdom, Hannah Mccausland Apr 2019

Regulating The Gdpr: Perspectives From The United Kingdom, Hannah Mccausland

Seattle University Law Review

Hannah McCausland leads the international group at the UK Information Commissioner’s Office (ICO). The ICO’s International Engagement functions as the gateway to other data protection and privacy authorities on international matters. She’s involved in the work of the EU European Data Protection Board advising the commissioner and the deputy commissioner on international positioning of the ICO, and she has played a key role over the past six years in the ICO’s strategy on navigating the EU’s data protection framework. Hannah has also played a major role at the global level and advancing the practical tools that data protection and privacy …


Privacy Statements Under The Gdpr, Mike Hintze Apr 2019

Privacy Statements Under The Gdpr, Mike Hintze

Seattle University Law Review

The need to include specific types of information in a privacy statement is a GDPR compliance obligation that does not get as much attention as some other GDPR requirements. Perhaps that is because privacy statements have been much maligned in recent years. They are too long and full of legalese. Nobody reads them. They are part of a notice and consent approach to privacy that puts an unrealistic burden on consumers to make informed choices. But despite these well-known criticisms, the GDPR doubles down on privacy statements. In fact, gauging by the roughly fourfold increase in privacy statement requirements compared …


Privacy, Freedom, And Technology—Or “How Did We Get Into This Mess?”, Alex Alben Apr 2019

Privacy, Freedom, And Technology—Or “How Did We Get Into This Mess?”, Alex Alben

Seattle University Law Review

Can we live in a free society without personal privacy? The question is worth pondering, not only in light of the ongoing debate about government surveillance of private communications, but also because new technologies continue to erode the boundaries of our personal space. This Article examines our loss of freedom in a variety of disparate contexts, all connected by the thread of erosion of personal privacy. In the scenarios explored here, privacy reducing activities vary from government surveillance, personal stalking conducted by individuals, and profiling by data-driven corporations, to political actors manipulating social media platforms. In each case, new technologies …


Table Of Contents, Seattle University Law Review Feb 2019

Table Of Contents, Seattle University Law Review

Seattle University Law Review

No abstract provided.


Send Us The Bitcoin Or Patients Will Die: Addressing The Risks Of Ransomware Attacks On Hospitals, Deborah R. Farringer Jun 2017

Send Us The Bitcoin Or Patients Will Die: Addressing The Risks Of Ransomware Attacks On Hospitals, Deborah R. Farringer

Seattle University Law Review

Part I of this Article describes how the healthcare industry has arrived in this place of vulnerability, including (1) the history of the movement toward EHRs through HIPAA, (2) HIPAA’s meaningful use regulations and the background of current ransomware attacks, and (3) the distinctions between these attacks and other security breaches that have plagued large insurers and health systems within the last five years. Next, Part II will examine current industry culture when it comes to cybersecurity and review current legal and business approaches to address this growing threat. Then, Part III will argue that, while the current laws—including HIPAA …


Privatization Of The Judiciary, Eldar Haber Oct 2016

Privatization Of The Judiciary, Eldar Haber

Seattle University Law Review

The digital era invoked new challenges to judicial systems. The Internet enabled violation of privacy and intellectual property rights and enhanced the magnitude of criminal activity. Recognizing the inability of courts to handle a high magnitude of lawsuits, along with enforcement difficulties, policymakers worldwide chose to delegate quasi-judicial powers to online intermediaries that facilitate or enable such potential violations or infringements of rights. Search engines were first tasked to perform a quasi-judicial role under a notice-and-takedown regime to combat copyright infringement around the world. Recently, the European Union (EU) decided to delegate judicial authority to search engines by granting rights …


Recording A New Frontier In Evidence-Gathering: Police Body-Worn Cameras And Privacy Doctrines In Washington State, Katie Farden Oct 2016

Recording A New Frontier In Evidence-Gathering: Police Body-Worn Cameras And Privacy Doctrines In Washington State, Katie Farden

Seattle University Law Review

This Note contributes to a growing body of work that weighs the gains that communities stand to make from police body-worn cameras against the tangle of concerns about how cameras may infringe on individual liberties and tread on existing privacy laws. While police departments have quickly implemented cameras over the past few years, laws governing the use of the footage body-worn cameras capture still trail behind. Notably, admissibility rules for footage from an officer’s camera, and evidence obtained with the help of that footage, remain on the horizon. This Note focuses exclusively on Washington State’s laws. It takes a clinical …


Wearable Fitness Devices: Personal Health Data Privacy In Washington State, Steven Spann Jul 2016

Wearable Fitness Devices: Personal Health Data Privacy In Washington State, Steven Spann

Seattle University Law Review

Private entities are increasingly targeting individuals in the United States and around the world to gather personal data for such purposes as product development, market identification, and insurance risk assessment. While credit card records and online browsing histories have long been the medium through which this data is gathered, in more recent years, wearable fitness devices have added a new dimension to data production and collection. These devices are capable of gathering a significant amount of data regarding a person’s physical and physiological characteristics, thereby exposing these data producers to personal privacy infringement. Washington State lawmakers and citizens must be …


Blood And Privacy: Towards A "Testing-As-Search" Paradigm Under The Fourth Amendment, Andrei Nedelcu Nov 2015

Blood And Privacy: Towards A "Testing-As-Search" Paradigm Under The Fourth Amendment, Andrei Nedelcu

Seattle University Law Review

A vehicle on a public thoroughfare is observed driving erratically and careening across the roadway. After the vehicle strikes another passenger car and comes to a stop, the responding officer notices in the driver the telltale symptoms of intoxication—bloodshot eyes, slurred speech, and a distinct odor of intoxicants. On these facts, a lawfully-procured warrant authorizing the extraction of the driver’s blood is obtained. However, the document fails to circumscribe the manner and variety of testing that may be performed on the sample. Does this lack of particularity render the warrant constitutionally infirm as a mandate for chemical analysis of the …


Trading Privacy For Angry Birds: A Call For Courts To Reevaluate Privacy Expectations In Modern Smartphones, Jeremy Andrew Ciarabellini Jul 2015

Trading Privacy For Angry Birds: A Call For Courts To Reevaluate Privacy Expectations In Modern Smartphones, Jeremy Andrew Ciarabellini

Seattle University Law Review

Of all the smartphone uses, the calling function is probably used the least. Rather, individuals more commonly use their smartphone for surfing the web, checking Facebook, and playing games. Highlighting the “smart” in smartphone, these phones often know more about their users’ daily activities than the users. Without requiring any sort of input, smartphones can tell the user how many steps they walk each day, when it is time to leave for work (also, of course, determining the traveling time with the most up-to-date traffic reports), and when an item recently ordered on Amazon will be delivered. Smartphone users may …


Authorized Investigation: A Temperate Alternative To Cyber Insecurity, Casey M. Bruner Jul 2015

Authorized Investigation: A Temperate Alternative To Cyber Insecurity, Casey M. Bruner

Seattle University Law Review

This Note aims to show that legal structures created to protect the Internet in its original form are completely insufficient to protect what the Internet has become. This antiquated legal framework is exacerbating the problem. The breadth of activity that the current law restricts severely limits the remedies that cyberattack victims can pursue, and it must be updated. While full hack-back may prove necessary in the long run, I argue for a more temperate initial response to the problem—I call this response “authorized investigation.” Specifically, the Computer Fraud and Abuse Act should be amended to allow victims access to their …


License To Discriminate: How A Washington Florist Is Making The Case For Applying Intermediary Scrutiny To Sexual Orientation, Kendra Lacour Oct 2014

License To Discriminate: How A Washington Florist Is Making The Case For Applying Intermediary Scrutiny To Sexual Orientation, Kendra Lacour

Seattle University Law Review

Over the past few decades, the debate over sexual orientation has risen to the forefront of civil rights issues. Though the focus has generally been on the right to marriage, peripheral issues associated with the right to marriage—and with sexual orientation generally—have become more common in recent years. As the number of states permitting same-sex marriage—along with states prohibiting discrimination on the basis of sexual orientation—increases, so too does the conflict between providers of public accommodations and those seeking their services. Never is this situation more problematic than when religious beliefs are cited as the basis for denying services to …


Survey Of Washington Search And Seizure Law: 2013 Update, Justice Charles W. Johnson, Justice Debra L. Stephens Jul 2013

Survey Of Washington Search And Seizure Law: 2013 Update, Justice Charles W. Johnson, Justice Debra L. Stephens

Seattle University Law Review

This survey is intended to serve as a resource to which Washington lawyers, judges, law enforcement officers, and others can turn as an authoritative starting point for researching Washington search and seizure law. In order to be useful as a research tool, this Survey requires periodic updates to address new cases interpreting the Washington constitution and the U.S. Constitution and to reflect the current state of the law. Many of these cases involve the Washington State Supreme Court’s interpretation of the Washington constitution. Also, as the U.S. Supreme Court has continued to examine Fourth Amendment search and seizure jurisprudence, its …