Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Journal

Northwestern Pritzker School of Law

Discipline
Keyword
Publication Year
Publication

Articles 1 - 21 of 21

Full-Text Articles in Privacy Law

Data Is What Data Does: Regulating Based On Harm And Risk Instead Of Sensitive Data, Daniel J. Solove Jan 2024

Data Is What Data Does: Regulating Based On Harm And Risk Instead Of Sensitive Data, Daniel J. Solove

Northwestern University Law Review

Heightened protection for sensitive data is becoming quite trendy in privacy laws around the world. Originating in European Union (EU) data protection law and included in the EU’s General Data Protection Regulation, sensitive data singles out certain categories of personal data for extra protection. Commonly recognized special categories of sensitive data include racial or ethnic origin, political opinions, religious or philosophical beliefs, trade union membership, health, sexual orientation and sex life, and biometric and genetic data.

Although heightened protection for sensitive data appropriately recognizes that not all situations involving personal data should be protected uniformly, the sensitive data approach is …


China Data Flows And Power In The Era Of Chinese Big Tech, W. Gregory Voss, Emmanuel Pernot-Leplay Jan 2024

China Data Flows And Power In The Era Of Chinese Big Tech, W. Gregory Voss, Emmanuel Pernot-Leplay

Northwestern Journal of International Law & Business

Personal data have great economic interest today and their possession and control are the object of geopolitics, leading to their regulation by means that vary dependent on the strategic objectives of the jurisdiction considered. This study fills a gap in the literature in this area by analyzing holistically the regulation of personal data flows both into and from China, the world’s second largest economy. In doing so, it focuses on laws and regulations of three major power blocs: the United States, the European Union, and China, seen within the framework of geopolitics, and considering the rise of Chinese big tech. …


About-Face: How Facebook’S Restrictions On User Posts Could Violate Antitrust Law, Efrem Berk Apr 2023

About-Face: How Facebook’S Restrictions On User Posts Could Violate Antitrust Law, Efrem Berk

Northwestern Journal of Technology and Intellectual Property

This Note examines whether Facebook’s restrictions on its users’ posts are subject to Sherman Act § 2. This Note looks at the economic activity generated by social media activity and argues that posts are commerce. While this piece finds that current antitrust jurisprudence likely favors Facebook, an alternative approach sought by some antitrust scholars could influence judges to preclude the platform’s restrictions.


Law Informs Code: A Legal Informatics Approach To Aligning Artificial Intelligence With Humans, John J. Nay Apr 2023

Law Informs Code: A Legal Informatics Approach To Aligning Artificial Intelligence With Humans, John J. Nay

Northwestern Journal of Technology and Intellectual Property

Artificial Intelligence (AI) capabilities are rapidly advancing. Highly capable AI could cause radically different futures depending on how it is developed and deployed. We are unable to specify human goals and societal values in a way that reliably directs AI behavior. Specifying the desirability (value) of AI taking a particular action in a particular state of the world is unwieldy beyond a very limited set of state-action-values. The purpose of machine learning is to train on a subset of states and have the resulting agent generalize an ability to choose high value actions in unencountered circumstances. Inevitably, the function ascribing …


A Loaded God Complex: The Unconstitutionality Of The Executive Branch’S Unilaterally Withholding Zero-Days, Brendan Gilligan Apr 2023

A Loaded God Complex: The Unconstitutionality Of The Executive Branch’S Unilaterally Withholding Zero-Days, Brendan Gilligan

Northwestern Journal of Technology and Intellectual Property

No abstract provided.


Information Privacy And The Inference Economy, Alicia Solow-Niederman Oct 2022

Information Privacy And The Inference Economy, Alicia Solow-Niederman

Northwestern University Law Review

Information privacy is in trouble. Contemporary information privacy protections emphasize individuals’ control over their own personal information. But machine learning, the leading form of artificial intelligence, facilitates an inference economy that pushes this protective approach past its breaking point. Machine learning provides pathways to use data and make probabilistic predictions—inferences—that are inadequately addressed by the current regime. For one, seemingly innocuous or irrelevant data can generate machine learning insights, making it impossible for an individual to anticipate what kinds of data warrant protection. Moreover, it is possible to aggregate myriad individuals’ data within machine learning models, identify patterns, and then …


Deepfake Privacy: Attitudes And Regulation, Matthew B. Kugler, Carly Pace Nov 2021

Deepfake Privacy: Attitudes And Regulation, Matthew B. Kugler, Carly Pace

Northwestern University Law Review

Using only a series of images of a person’s face and publicly available software, it is now possible to insert the person’s likeness into a video and show them saying or doing almost anything. This “deepfake” technology has permitted an explosion of political satire and, especially, fake pornography. Several states have already passed laws regulating deepfakes, and more are poised to do so. This Article presents three novel empirical studies that assess public attitudes toward this new technology. In our main study, a representative sample of the U.S. adult population perceived nonconsensually created pornographic deepfake videos as extremely harmful and …


Winter Is Here: The Impossibility Of Schrems Ii For U.S.-Based Direct-To-Consumer Companies, Vanessa Zimmer Oct 2021

Winter Is Here: The Impossibility Of Schrems Ii For U.S.-Based Direct-To-Consumer Companies, Vanessa Zimmer

Northwestern Journal of International Law & Business

In this paper, Vanessa Zimmer exposes the precarious position of Direct-to-Consumer (DTC) companies that are physically located in the United States but still subject to the European General Data Protection Regulation (GDPR) under Article 3(2) because they offer goods or services to European consumers online. Standard Contractual Clauses (SCCs) and supplementary measures have dominated privacy conversions in the year since the European Court of Justice invalidated the EU-U.S. Privacy Shield framework with its Schrems II decision.

However, Zimmer argues that the greater issue for U.S.-based DTC companies is the lack of clarity over what constitutes an international, or restricted, transfer …


Comparative Limitations On Abortions: The United States Supreme Court V. The European Court Of Human Rights, Sunaya Padmanabhan Oct 2021

Comparative Limitations On Abortions: The United States Supreme Court V. The European Court Of Human Rights, Sunaya Padmanabhan

Northwestern Journal of Law & Social Policy

This Note compares the balancing tests implemented by the United States Supreme Court and the European Court of Human Rights to determine the legal status of abortion within their jurisdictions. This Note will argue that the Supreme Court’s balancing test better protects a woman’s legal path to an abortion because it A) limits states’ restrictions to specific categories and B) regulates the extent to which states can restrict a woman’s pre-viability abortion.

This Note will also examine the ways in which each court’s abortion jurisprudence substantively restricts a woman’s ability to obtain an abortion, even where legal avenues to the …


The Genetic Panopticon: Genetic Genealogy Searches And The Fourth Amendment, Genevieve Carter May 2021

The Genetic Panopticon: Genetic Genealogy Searches And The Fourth Amendment, Genevieve Carter

Northwestern Journal of Technology and Intellectual Property

As consumer DNA testing gains widespread popularity, so has law enforcement’s interest in leveraging genetic databases for criminal investigations. Consumer DNA testing products like 23andMe and Ancestry allow private individuals access to their genetic data on private databases. However, once coded, genetic data is free to be downloaded by users and uploaded to public databases. Police identify suspects by uploading cold case DNA to public genetic databases and find familial matches. If they identify a familial match, they narrow the field of suspects using traditional methods of investigation, which often includes extracting suspect DNA from a piece of their abandoned …


Send The Word Over There: An Offshore Solution To The Right To Be Forgotten, Jay Kaganoff Jan 2021

Send The Word Over There: An Offshore Solution To The Right To Be Forgotten, Jay Kaganoff

Northwestern Journal of International Law & Business

The right to be forgotten is a subject of contention in both the United States and the European Union. In the E.U., the right to be forgotten gives one the right to demand that information—even if published legitimately—be taken down or removed from search engine results. While well-intentioned, this has led to concerns of free press restrictions. In contrast, the right to be forgotten is not recognized in the U.S., although there are scholars who would like to see such a right here. This Note takes the view that introducing a right to be forgotten would be contrary to the …


Outsourcing The Police: How Reliance On The Private Sector For Law Enforcement Threatens Privacy Legislation Around The World, Karl Colbary Jan 2021

Outsourcing The Police: How Reliance On The Private Sector For Law Enforcement Threatens Privacy Legislation Around The World, Karl Colbary

Northwestern Journal of International Law & Business

Data privacy is an increasingly important issue in the world today. People are increasingly aware of, and concerned about, their digital footprint. As a result, many jurisdictions around the world—the United States excluded—have enacted legislation with an eye towards giving their citizens greater control over their data. However, the movement to give individuals greater control over how their data is used by tech providers often overlooks the fact that the government is one of the biggest consumers of the data that tech providers collect. Therefore, data privacy regimes that allow the flow of personal information to the government do not …


Trading Privacy For Promotion? Fourth Amendment Implications Of Employers Using Wearable Sensors To Assess Worker Performance, George M. Dery Iii Dec 2020

Trading Privacy For Promotion? Fourth Amendment Implications Of Employers Using Wearable Sensors To Assess Worker Performance, George M. Dery Iii

Northwestern Journal of Law & Social Policy

This Article considers the Fourth Amendment implications of a study on a passive monitoring system where employees shared data from wearables, phone applications, and position beacons that provided private information such as weekend phone use, sleep patterns in the bedroom, and emotional states. The study’s authors hope to use the data collected to create a new system for objectively assessing employee performance that will replace the current system which is plagued by the inherent bias of self-reporting and peer-review and which is labor intensive and inefficient. The researchers were able to successfully link the data collected with the quality of …


Screened Out Of Housing: The Impact Of Misleading Tenant Screening Reports And The Potential For Criminal Expungement As A Model For Effectively Sealing Evictions, Katelyn Polk Apr 2020

Screened Out Of Housing: The Impact Of Misleading Tenant Screening Reports And The Potential For Criminal Expungement As A Model For Effectively Sealing Evictions, Katelyn Polk

Northwestern Journal of Law & Social Policy

Having an eviction record “blacklists” tenants from finding future housing. Even renters with mere eviction filings—not eviction orders—on their records face the harsh collateral consequences of eviction. This Note argues that eviction records should be sealed at filing and only released into the public record if a landlord prevails in court. Juvenile record expungement mechanisms in Illinois serve as a model for one way to protect people with eviction records. Recent updates to the Illinois juvenile expungement process provided for the automatic expungement of certain records and strengthened the confidentiality protections of juvenile records. Illinois protects juvenile records because it …


Do You Accept These Cookies? How The General Data Protection Regulation Keeps Consumer Information Safe, Jayne Chorpash Jan 2020

Do You Accept These Cookies? How The General Data Protection Regulation Keeps Consumer Information Safe, Jayne Chorpash

Northwestern Journal of International Law & Business

Abstract:

This note examines the General Data Protection Regulation implemented in the EU in 2018. The GDPR was the result of a long history of data privacy laws that have been met with varying levels of success. While the GDPR has retained many characteristics that have made past privacy laws successful, it has also made some important changes. Most notably, the GDPR gives generous rights to consumers to guard and protect their data, which is of growing concern in light of how easy it is to share information in our modern age. Additionally, the GDPR has a much broader territorial …


Disentangling The Right Of Publicity, Eric E. Johnson Jun 2017

Disentangling The Right Of Publicity, Eric E. Johnson

Northwestern University Law Review

Despite the increasing importance attached to the right of publicity, its doctrinal scope has yet to be clearly articulated. The right of publicity supposedly allows a cause of action for the commercial exploitation of a person’s name, voice, or image. The inconvenient reality, however, is that only a tiny fraction of such instances are truly actionable. This Article tackles the mismatch between the blackletter doctrine and the shape of the case law, and it aims to elucidate, in straightforward terms, what the right of publicity actually is.

This Article explains how, in the absence of a clear enunciation of its …


Knowledge And Fourth Amendment Privacy, Matthew Tokson Dec 2016

Knowledge And Fourth Amendment Privacy, Matthew Tokson

Northwestern University Law Review

This Article examines the central role that knowledge plays in determining the Fourth Amendment’s scope. What people know about surveillance practices or new technologies often shapes the “reasonable expectations of privacy” that define the Fourth Amendment’s boundaries. From early decisions dealing with automobile searches to recent cases involving advanced information technologies, courts have relied on assessments of knowledge in a wide variety of Fourth Amendment contexts. Yet the analysis of knowledge in Fourth Amendment law is rarely if ever studied on its own.

This Article fills that gap. It starts by identifying the characteristics of Fourth Amendment knowledge. It finds, …


Outing Privacy, Scott Skinner-Thompson Dec 2015

Outing Privacy, Scott Skinner-Thompson

Northwestern University Law Review

The government regularly outs information concerning people’s sexuality, gender identity, and HIV status. Notwithstanding the implications of such outings, the Supreme Court has yet to resolve whether the Constitution contains a right to informational privacy—a right to limit the government’s ability to collect and disseminate personal information.

This Article probes informational privacy theory and jurisprudence to better understand the judiciary’s reluctance to fully embrace a constitutional right to informational privacy. The Article argues that while existing scholarly theories of informational privacy encourage us to broadly imagine the right and its possibilities, often focusing on informational privacy’s ability to promote individual …


Reviving The Privacy Protection Act Of 1980, Elizabeth B. Uzelac Jan 2015

Reviving The Privacy Protection Act Of 1980, Elizabeth B. Uzelac

Northwestern University Law Review

The federal privacy legislative scheme is composed of a fragmented patchwork of aging sector-specific statutes—many enacted prior to the advent of the home computer—that supplement the Fourth Amendment to regulate government access to information. The Privacy Protection Act of 1980 is one such statute, though few understand or utilize its protections. The Act prohibits law enforcement officials from searching for or seizing information from people who disseminate information to the public, such as reporters. Where it applies, the Act requires law enforcement officials to instead rely on compliance with a subpoena or the target’s voluntary cooperation to gain access to …


Mug Shot Disclosure Under Foia: Does Privacy Or Public Interest Prevail?, Kathryn Shephard Jan 2015

Mug Shot Disclosure Under Foia: Does Privacy Or Public Interest Prevail?, Kathryn Shephard

Northwestern University Law Review

No abstract provided.


Do-Not-Track As Default, Joshua A.T. Fairfield Sep 2013

Do-Not-Track As Default, Joshua A.T. Fairfield

Northwestern Journal of Technology and Intellectual Property

Do-Not-Track is a developing online legal and technological standard that permits consumers to express their desire not to be tracked by online advertisers. Do-Not-Track has the ability to change the relationship between consumers and advertisers in the information market. Everything will depend on implementation. The most effective way to allow users to achieve their privacy preferences is to implement Do-Not-Track as a default feature.

The World Wide Web Consortium’s (W3C) standard setting body for Do-Not-Track has, however, endorsed a corrosive standard in its Tracking Preferences Expression (TPE) draft. This standard requires consumers to set their privacy preference by hand. This …