Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (1610)
- Computer Law (1409)
- Science and Technology Law (1397)
- Intellectual Property Law (643)
- Constitutional Law (499)
-
- Health Law and Policy (365)
- Legislation (329)
- Criminal Law (324)
- State and Local Government Law (298)
- Fourth Amendment (294)
- International Law (293)
- Criminal Procedure (287)
- Torts (280)
- First Amendment (276)
- Administrative Law (273)
- Human Rights Law (273)
- Family Law (272)
- Marketing Law (265)
- Legal History (261)
- Other Law (258)
- Transnational Law (257)
- Supreme Court of the United States (255)
- Courts (253)
- Banking and Finance Law (245)
- Jurisprudence (240)
- Civil Law (239)
- International Trade Law (239)
- Communications Law (234)
- Institution
-
- UIC School of Law (899)
- Schulich School of Law, Dalhousie University (262)
- Seattle University School of Law (145)
- University of Michigan Law School (144)
- Universitas Indonesia (122)
-
- Vanderbilt University Law School (116)
- The Catholic University of America, Columbus School of Law (90)
- University of Washington School of Law (76)
- University of Richmond (49)
- Brooklyn Law School (46)
- University at Buffalo School of Law (42)
- Brigham Young University Law School (41)
- West Virginia University (40)
- Washington and Lee University School of Law (34)
- Maurer School of Law: Indiana University (33)
- University of Oklahoma College of Law (30)
- University of Kentucky (29)
- Fordham Law School (28)
- Notre Dame Law School (28)
- New York Law School (27)
- University of Georgia School of Law (27)
- Loyola University Chicago, School of Law (26)
- Touro University Jacob D. Fuchsberg Law Center (26)
- Pepperdine University (25)
- Chicago-Kent College of Law (22)
- William & Mary Law School (22)
- Northwestern Pritzker School of Law (21)
- American University Washington College of Law (20)
- Loyola Marymount University and Loyola Law School (19)
- University of Miami Law School (19)
- Keyword
-
- Privacy (355)
- Technology (73)
- Fourth Amendment (71)
- Internet (55)
- Right of privacy (43)
-
- Surveillance (41)
- Data (35)
- Data privacy (34)
- Information (34)
- Social media (34)
- First Amendment (32)
- Privacy law (29)
- Copyright (26)
- European Union (26)
- Right to privacy (26)
- Personal information (25)
- Law (24)
- Searches (23)
- Cybersecurity (22)
- Fourth amendment (22)
- GDPR (22)
- Data Privacy (21)
- Data security (21)
- Facebook (21)
- Federal Trade Commission (21)
- Disclosure (20)
- Privacy Law (20)
- FTC (18)
- Regulation (18)
- Supreme Court (18)
- Publication Year
- Publication
-
- UIC John Marshall Journal of Information Technology & Privacy Law (777)
- Canadian Journal of Law and Technology (256)
- "Dharmasisya” Jurnal Program Magister Hukum FHUI (121)
- UIC Law Review (111)
- Seattle University Law Review (104)
-
- Catholic University Journal of Law and Technology (84)
- Michigan Law Review (73)
- Vanderbilt Journal of Entertainment & Technology Law (54)
- Washington Law Review (43)
- Vanderbilt Law Review (40)
- West Virginia Law Review (40)
- Buffalo Law Review (32)
- Seattle Journal for Social Justice (29)
- Kentucky Law Journal (28)
- Touro Law Review (26)
- BYU Law Review (25)
- Indiana Law Journal (25)
- NYLS Law Review (25)
- University of Michigan Journal of Law Reform (25)
- Washington Journal of Law, Technology & Arts (24)
- Michigan Telecommunications & Technology Law Review (23)
- Chicago-Kent Law Review (22)
- Vanderbilt Journal of Transnational Law (22)
- Oklahoma Law Review (21)
- University of Richmond Law Review (21)
- Washington and Lee Law Review (19)
- Pepperdine Law Review (18)
- Richmond Journal of Law & Technology (18)
- Maine Law Review (17)
- Brooklyn Law Review (15)
Articles 1 - 30 of 2902
Full-Text Articles in Privacy Law
How Close Is Close Enough: A Step-By-Step Analysis To Resolve The Circuit Split Created By Misunderstanding The Spokeo Ruling, Cason Shipp
St. Mary's Law Journal
No abstract provided.
The Post-Dobbs Reality: Privacy Expectations For Period-Tracking Apps In Criminal Abortion Prosecutions, Sophie L. Nelson
The Post-Dobbs Reality: Privacy Expectations For Period-Tracking Apps In Criminal Abortion Prosecutions, Sophie L. Nelson
Pepperdine Law Review
The Supreme Court’s decision to overturn Roe v. Wade and Planned Parenthood v. Casey in June 2022 was met with waves of both support and criticism throughout the United States. Several states immediately implemented or began drafting trigger laws that criminalize seeking and providing an abortion. These laws prompted several period-tracking app companies to encrypt their users’ data to make it more difficult for the government to access period- and pregnancy-related information for criminal investigations. This Comment explores whether the Fourth Amendment and U.S. privacy statutes protect users of period-tracking apps from government surveillance. More specifically, this Comment argues that …
Barcoding Bodies: Rfid Technology And The Perils Of E-Carceration, Jackson Samples
Barcoding Bodies: Rfid Technology And The Perils Of E-Carceration, Jackson Samples
Duke Law & Technology Review
Electronic surveillance now plays a central role in the criminal legal system. Every year, hundreds of thousands of people are tracked by ankle monitors and smartphone technology. And frighteningly, commentators and policymakers have now proposed implanting radio frequency identification (“RFID”) chips into people’s bodies for surveillance purposes. This Note examines the unique risks of these proposals—particularly with respect to people on probation and parole—and argues that RFID implants would constitute a systematic violation of individual privacy and bodily integrity. As a result, they would also violate the Fourth Amendment.
National Security And Federalizing Data Privacy Infrastructure For Ai Governance, Margaret Hu, Eliott Behar, Davi Ottenheimer
National Security And Federalizing Data Privacy Infrastructure For Ai Governance, Margaret Hu, Eliott Behar, Davi Ottenheimer
Fordham Law Review
This Essay contends that data infrastructure, when implemented on a national scale, can transform the way we conceptualize artificial intelligence (AI) governance. AI governance is often viewed as necessary for a wide range of strategic goals, including national security. It is widely understood that allowing AI and generative AI to remain self-regulated by the U.S. AI industry poses significant national security risks. Data infrastructure and AI oversight can assist in multiple goals, including: maintaining data privacy and data integrity; increasing cybersecurity; and guarding against information warfare threats. This Essay concludes that conceptualizing data infrastructure as a form of critical infrastructure …
Personal Data And Vaccination Hesitancy: Covid-19’S Lessons For Public Health Federalism, Charles D. Curran
Personal Data And Vaccination Hesitancy: Covid-19’S Lessons For Public Health Federalism, Charles D. Curran
Catholic University Law Review
During the COVID-19 vaccination campaign, the federal government adopted a more centralized approach to the collection of public health data. Although the states previously had controlled the storage of vaccination information, the federal government’s Operation Warp Speed plan required the reporting of recipients’ personal information on the grounds that it was needed to monitor the safety of novel vaccines and ensure correct administration of their multi-dose regimens.
Over the course of the pandemic response, this more centralized federal approach to data collection added a new dimension to pre-existing vaccination hesitancy. Requirements that recipients furnish individual information deterred vaccination among undocumented …
The Lack Of Responsibility Of Higher Educaiton Institutions In Addressing Phishing Emails And Data Breaches, Muxuan (Muriel) Wang
The Lack Of Responsibility Of Higher Educaiton Institutions In Addressing Phishing Emails And Data Breaches, Muxuan (Muriel) Wang
Duke Law & Technology Review
Higher education institutions (HEIs) are highly susceptible to cyberattacks, particularly those facilitated through phishing, due to the substantial volume of confidential student and staff data and valuable research information they hold. Despite federal legislations focusing on bolstering cybersecurity for critical institutions handling medical and financial data, HEIs have not received similar attention. This Note examines the minimal obligations imposed on HEIs by existing federal and state statutes concerning data breaches, the absence of requirements for HEIs to educate employees and students about phishing attacks, and potential strategies to improve student protection against data breaches.
My Body, Whose Choice? A Case For A Fundamental Right To Bodily Autonomy, Miri Trauner
My Body, Whose Choice? A Case For A Fundamental Right To Bodily Autonomy, Miri Trauner
Brooklyn Law Review
In 2022, the US Supreme Court decided Dobbs v. Jackson Women’s Health Organization, which overturned Roe v. Wade and the fundamental right to abortion it had established nearly fifty years prior. The Court’s decision threw into uncertainty the future of not only reproductive rights in this country, but also many other individual rights. At the same time as the decision, the world was still reeling from a global pandemic, and the development of COVID-19 vaccines had spurred widespread controversy over the constitutionality of vaccine mandates. Both advocates for abortion access and opponents to vaccine mandates shared a common cry: “my …
Critical Data Theory, Margaret Hu
Critical Data Theory, Margaret Hu
William & Mary Law Review
Critical Data Theory examines the role of AI and algorithmic decisionmaking at its intersection with the law. This theory aims to deconstruct the impact of AI in law and policy contexts. The tools of AI and automated systems allow for legal, scientific, socioeconomic, and political hierarchies of power that can profitably be interrogated with critical theory. While the broader umbrella of critical theory features prominently in the work of surveillance scholars, legal scholars can also deploy criticality analyses to examine surveillance and privacy law challenges, particularly in an examination of how AI and other emerging technologies have been expanded in …
The Consumer Bundle, Shelly Kreiczer-Levy
The Consumer Bundle, Shelly Kreiczer-Levy
Washington Law Review
Can property law have a consumer protection purpose? One of the most important consumer law concerns today is the limited control consumers have over the digital assets and software-embedded products they purchase. Current proposals for reform focus on classifying the transaction as either license or sale and rely mostly on contract law and consumer protection regulation with a few calls for restoring ownership rights. This Article argues that property law can protect consumers by establishing a minimum bundle of rights for consumers: the “consumer’s bundle.” Working with property theory and an analysis of property values, this Article explains the importance …
The Kids Are Not Alright: Negative Consequences Of Student Device And Account Surveillance, Ashley Peterson
The Kids Are Not Alright: Negative Consequences Of Student Device And Account Surveillance, Ashley Peterson
Washington Law Review
In recent years, student surveillance has rapidly grown. As schools have experimented with new technologies, transitioned to remote and hybrid instruction, and faced pressure to protect student safety, they have increased surveillance of school accounts and school-issued devices. School surveillance extends beyond school premises to monitor student activities that occur off-campus. It reaches students’ most intimate data and spaces, including things students likely believe are private: internet searches, emails, and messages. This Comment focuses on the problems associated with off-campus surveillance of school accounts and school-issued devices, including chilling effects that fundamentally alter student behavior, reinforcement of the school-to-prison pipeline, …
Speaking Back To Sexual Privacy Invasions, Brenda Dvoskin
Speaking Back To Sexual Privacy Invasions, Brenda Dvoskin
Washington Law Review
Many big players in the internet ecosystem do not like hosting sexual expression. They often justify these bans as a protection of sexual privacy. For example, Meta states that it removes sexual imagery to prevent the nonconsensual distribution of sexual images. In response, this Article argues that banning digital sexual expression is counterproductive if the aim is to alleviate the harms inflicted by sexual privacy losses.
Contemporary sexual privacy theory, however, lacks analytical tools to explain why nudity bans harm the interests they intend to protect. This Article aims at building those tools. The main contribution is an invitation to …
The Data Heist: Protecting Consumers And Their Information Through Opt-In Consent, John A. Hudson
The Data Heist: Protecting Consumers And Their Information Through Opt-In Consent, John A. Hudson
Arkansas Law Review
This Comment will: (1) compare and contrast the data privacy laws in the United States and the European Union; (2) demonstrate the significant risk American consumers are subject to under the United States’ current laws and regulations; and (3) address the protections provided by the European Union’s explicit opt-in consent requirement that would ensure safer conditions for American consumers.
Privacy Matters: Data Breach Litigation In Japan, Andrew M. Pardieck
Privacy Matters: Data Breach Litigation In Japan, Andrew M. Pardieck
Washington International Law Journal
In 1890, when Brandeis and Warren wrote The Right to Privacy, Japan did not have a word for privacy. Today, it is closely guarded in Japan: the European Data Protection Board has found privacy protections in Japan “equivalent” to those in the EU. This research explores the evolution of privacy law in Japan, focusing on data breach and the legal rights and obligations associated with it. The writing is broken up into two parts: This article discusses private enforcement of privacy norms, as it is the courts that first established and continue to define privacy rights in Japan. A separate …
Redefining The Injury-In-Fact: Treating Personally Identifying Information As Bailed Property, Austin Headrick
Redefining The Injury-In-Fact: Treating Personally Identifying Information As Bailed Property, Austin Headrick
Georgia Law Review
There is a long-existing circuit split among federal courts of appeals as to whether an individual has standing under Article III of the United States Constitution when their personally identifying information (PII) is stolen from an entity to which they entrusted it such as a hospital or bank. Federal courts disagree as to whether an individual whose PII has been stolen—without more—has suffered an injury-in-fact, a necessary element of standing. The disagreement between the courts centers on whether the injury-in-fact has already occurred at the time the PII is stolen or whether the injury occurs once the PII has been …
Data Is What Data Does: Regulating Based On Harm And Risk Instead Of Sensitive Data, Daniel J. Solove
Data Is What Data Does: Regulating Based On Harm And Risk Instead Of Sensitive Data, Daniel J. Solove
Northwestern University Law Review
Heightened protection for sensitive data is becoming quite trendy in privacy laws around the world. Originating in European Union (EU) data protection law and included in the EU’s General Data Protection Regulation, sensitive data singles out certain categories of personal data for extra protection. Commonly recognized special categories of sensitive data include racial or ethnic origin, political opinions, religious or philosophical beliefs, trade union membership, health, sexual orientation and sex life, and biometric and genetic data.
Although heightened protection for sensitive data appropriately recognizes that not all situations involving personal data should be protected uniformly, the sensitive data approach is …
Privacy Purgatory: Why The United States Needs A Comprehensive Federal Data Privacy Law, Emily Stackhouse Taetzsch
Privacy Purgatory: Why The United States Needs A Comprehensive Federal Data Privacy Law, Emily Stackhouse Taetzsch
Journal of Legislation
No abstract provided.
The Need For Corporate Guardrails In U.S. Industrial Policy, Lenore Palladino
The Need For Corporate Guardrails In U.S. Industrial Policy, Lenore Palladino
Seattle University Law Review
U.S. politicians are actively “marketcrafting”: the passage of the Bipartisan Infrastructure Law, the CHIPS and Science Act, and the Inflation Reduction Act collectively mark a new moment of robust industrial policy. However, these policies are necessarily layered on top of decades of shareholder primacy in corporate governance, in which corporate and financial leaders have prioritized using corporate profits to increase the wealth of shareholders. The Administration and Congress have an opportunity to use industrial policy to encourage a broader reorientation of U.S. businesses away from extractive shareholder primacy and toward innovation and productivity. This Article examines discrete opportunities within the …
The Trade Origins Of Privacy Law, Anupam Chander
The Trade Origins Of Privacy Law, Anupam Chander
Indiana Law Journal
The desire for trade propelled the growth of data privacy law across the world. Countries with strong privacy laws sought to ensure that their citizens’ privacy would not be compromised when their data traveled to other countries. Even before this vaunted Brussels Effect pushed privacy law across the world through the enticement of trade with the European Union, Brussels had to erect privacy law within the Union itself. And as the Union itself expanded, privacy law was a critical condition for accession.
But this coupling of privacy and trade leaves a puzzle: how did the U.S. avoid a comprehensive privacy …
Data In Distress: Effectuating State Data Privacy Laws During Bankruptcy, Cameron Love
Data In Distress: Effectuating State Data Privacy Laws During Bankruptcy, Cameron Love
Emory Law Journal
In 2000, an online toy retailer, Toysmart.com, attempted to liquidate consumer data to pay creditors in its bankruptcy case. The attempted sale drew objections from the Federal Trade Commission and forty-seven state attorneys general. Five years later, Congress attempted to resolve privacy concerns in bankruptcy, amending the Bankruptcy Code to provide clear procedures for the liquidation of “personally identifiable information.” Recently, scholars have criticized these amendments, characterizing them as “limited,” “outdated,” and “privacy theater.” This Comment adds to these criticisms, arguing the amendments’ failure to mandate consideration of relevant nonbankruptcy law puts these permissive sales procedures on a collision course …
Table Of Contents, Seattle University Law Review
Table Of Contents, Seattle University Law Review
Seattle University Law Review
Table of Contents
Public Primacy In Corporate Law, Dorothy S. Lund
Public Primacy In Corporate Law, Dorothy S. Lund
Seattle University Law Review
This Article explores the malleability of agency theory by showing that it could be used to justify a “public primacy” standard for corporate law that would direct fiduciaries to promote the value of the corporation for the benefit of the public. Employing agency theory to describe the relationship between corporate management and the broader public sheds light on aspects of firm behavior, as well as the nature of state contracting with corporations. It also provides a lodestar for a possible future evolution of corporate law and governance: minimize the agency costs created by the divergence of interests between management and …
Shareholder Primacy Versus Shareholder Accountability, William W. Bratton
Shareholder Primacy Versus Shareholder Accountability, William W. Bratton
Seattle University Law Review
When corporations inflict injuries in the course of business, shareholders wielding environmental, social, and governance (“ESG”) principles can, and now sometimes do, intervene to correct the matter. In the emerging fact pattern, corporate social accountability expands out of its historic collectivized frame to become an internal subject matter—a corporate governance topic. As a result, shareholder accountability surfaces as a policy question for the first time. The Big Three index fund managers, BlackRock, Vanguard, and State Street, responded to the accountability question with ESG activism. In so doing, they defected against corporate legal theory’s central tenet, shareholder primacy. Shareholder primacy builds …
The Limits Of Corporate Governance, Cathy Hwang, Emily Winston
The Limits Of Corporate Governance, Cathy Hwang, Emily Winston
Seattle University Law Review
What is the purpose of the corporation? For decades, the answer was clear: to put shareholders’ interests first. In many cases, this theory of shareholder primacy also became synonymous with the imperative to maximize shareholder wealth. In the world where shareholder primacy was a north star, courts, scholars, and policymakers had relatively little to fight about: most debates were minor skirmishes about exactly how to maximize shareholder wealth.
Part I of this Essay discusses the shortcomings of shareholder primacy and stakeholder governance, arguing that neither of these modes of governance provides an adequate framework for incentivizing corporations to do good. …
A History Of Corporate Law Federalism In The Twentieth Century, William W. Bratton
A History Of Corporate Law Federalism In The Twentieth Century, William W. Bratton
Seattle University Law Review
This Article describes the emergence of corporate law federalism across a long twentieth century. The period begins with New Jersey’s successful initiation of charter competition in 1888 and ends with the enactment of the Sarbanes-Oxley Act in 2002. The federalism in question describes the interrelation of state and federal regulation of corporate internal affairs. This Article takes a positive approach, pursuing no normative bottom line. It makes six observations: (1) the federalism describes a division of subject matter, with internal affairs regulated by the states and securities issuance and trading regulated by the federal government; (2) the federalism is an …
How To Interpret The Securities Laws?, Zachary J. Gubler
How To Interpret The Securities Laws?, Zachary J. Gubler
Seattle University Law Review
In discussions of the federal securities laws, the SEC usually gets most of the attention. This makes some sense. After all, it is the agency charged with administrating the securities laws and regulating the industry as a whole. It makes the majority of the laws; it engages in enforcement actions; it reacts to crises; and it, or sometimes even its individual commissioners, intervene publicly in policy debates. Often overlooked in such discussion, however, is the role of the Supreme Court in shaping securities law, and a new book by Adam Pritchard and Robert Thompson demonstrates why this is an oversight. …
The Pioneers, Waves, And Random Walks Of Securities Law In The Supreme Court, Elizabeth Pollman
The Pioneers, Waves, And Random Walks Of Securities Law In The Supreme Court, Elizabeth Pollman
Seattle University Law Review
After the pioneers, waves, and random walks that have animated the history of securities laws in the U.S. Supreme Court, we might now be on the precipice of a new chapter. Pritchard and Thompson’s superb book, A History of Securities Law in the Supreme Court, illuminates with rich archival detail how the Court’s view of the securities laws and the SEC have changed over time and how individuals have influenced this history. The book provides an invaluable resource for understanding nearly a century’s worth of Supreme Court jurisprudence in the area of securities law and much needed context for …
Three Stories: A Comment On Pritchard & Thompson’S A History Of Securities Laws In The Supreme Court, Harwell Wells
Three Stories: A Comment On Pritchard & Thompson’S A History Of Securities Laws In The Supreme Court, Harwell Wells
Seattle University Law Review
Adam Pritchard and Robert Thompson’s A History of Securities Laws in the Supreme Court should stand for decades as the definitive work on the Federal securities laws’ career in the Supreme Court across the twentieth century.1 Like all good histories, it both tells a story and makes an argument. The story recounts how the Court dealt with the major securities laws, as well the agency charged with enforcing them, the Securities and Exchange Commission (SEC), and the rules it promulgated, from the 1930s into the twenty-first century. But the book does not just string together a series of events, “one …
On The Value Of History: A Review Of A.C. Pritchard & Robert B. Thompson’S A History Of Securities Law In The Supreme Court, Joel Seligman
On The Value Of History: A Review Of A.C. Pritchard & Robert B. Thompson’S A History Of Securities Law In The Supreme Court, Joel Seligman
Seattle University Law Review
A.C. Pritchard and Bob Thompson have written a splendid history of securities law decisions in the Supreme Court. Their book is exemplary because of its detailed use of the long unpublished papers of Supreme Court justices, including those of Harry Blackmun, William O. Douglas, Felix Frankfurter and Lewis F. Powell, primary sources which included correspondence with other Justices and law clerks as well as interviews with law clerks. The use of these primary sources recounted throughout the text and 67 pages of End Notes deepens our understanding of the intentions of the Justices and sharpens our understanding of the conflicts …
Eavesdropping: The Forgotten Public Nuisance In The Age Of Alexa, Julia Keller
Eavesdropping: The Forgotten Public Nuisance In The Age Of Alexa, Julia Keller
Vanderbilt Law Review
Always-listening devices have sparked new concerns about privacy while evading regulation, but a potential solution has existed for hundreds of years: public nuisance.
Public nuisance has been stretched to serve as a basis of liability for some of the most prominent cases of modern mass-tort litigation, such as suits against opioid and tobacco manufacturers for creating products that endanger public health. While targeting conduct that arguably interferes with a right common to the public, this use of public nuisance extends far beyond the original understanding of the doctrine. Public nuisance has not been applied, however, to another prominent contemporary issue: …
The Structure Of Corporate Law Revolutions, William Savitt
The Structure Of Corporate Law Revolutions, William Savitt
Seattle University Law Review
Since, call it 1970, corporate law has operated under a dominant conception of governance that identifies profit-maximization for stockholder benefit as the purpose of the corporation. Milton Friedman’s essay The Social Responsibility of Business is to Increase Its Profits, published in September of that year, provides a handy, if admittedly imprecise, marker for the coronation of the shareholder-primacy paradigm. In the decades that followed, corporate law scholars pursued an ever-narrowing research agenda with the purpose and effect of confirming the shareholder-primacy paradigm. Corporate jurisprudence followed a similar path, slowly at first and later accelerating, to discover in the precedents and …