Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Journal

University of Georgia School of Law

Discipline
Keyword
Publication Year
Publication

Articles 1 - 27 of 27

Full-Text Articles in Privacy Law

Redefining The Injury-In-Fact: Treating Personally Identifying Information As Bailed Property, Austin Headrick Jan 2024

Redefining The Injury-In-Fact: Treating Personally Identifying Information As Bailed Property, Austin Headrick

Georgia Law Review

There is a long-existing circuit split among federal courts of appeals as to whether an individual has standing under Article III of the United States Constitution when their personally identifying information (PII) is stolen from an entity to which they entrusted it such as a hospital or bank. Federal courts disagree as to whether an individual whose PII has been stolen—without more—has suffered an injury-in-fact, a necessary element of standing. The disagreement between the courts centers on whether the injury-in-fact has already occurred at the time the PII is stolen or whether the injury occurs once the PII has been …


I Spy With My Little--Gps Tracking Device: Why Georgia Should Look To The United Kingdom's Domestic Violence Laws To Deter Innovative Abuses Of Technology, Tyerus Skala May 2022

I Spy With My Little--Gps Tracking Device: Why Georgia Should Look To The United Kingdom's Domestic Violence Laws To Deter Innovative Abuses Of Technology, Tyerus Skala

Georgia Journal of International & Comparative Law

No abstract provided.


Does The Right To Privacy Apply To Facial Biometrics? Specifically, When Analyzed Under The European Convention On Human Rights, Grace Callanan Jul 2021

Does The Right To Privacy Apply To Facial Biometrics? Specifically, When Analyzed Under The European Convention On Human Rights, Grace Callanan

Georgia Journal of International & Comparative Law

No abstract provided.


Private Lives At Home And Public Lives In Court: Protecting The Privacy Of Federal Judges' Home Addresses, Hannah Elias Sbaity Jul 2021

Private Lives At Home And Public Lives In Court: Protecting The Privacy Of Federal Judges' Home Addresses, Hannah Elias Sbaity

Journal of Intellectual Property Law

Targeted murders of federal judges and their families at their private homes date back to May 29, 1979. Most recently, in July 2020, Judge Esther Salas’s only son, Daniel, was murdered and her husband near-fatally shot at their home. Individuals wishing to inflict such harm or death at federal judges’ homes have been able to do so because of federal judges’ publicly available home addresses. Because personally identifying information (PII) is defined differently from statute to statute, home addresses largely remain public information in most states and can be found in real estate records, data broker websites, social media platforms, …


A Deep Dive Into Technical Encryption Concepts To Better Understand Cybersecurity & Data Privacy Legal & Policy Issues, Anthony Volini Jul 2021

A Deep Dive Into Technical Encryption Concepts To Better Understand Cybersecurity & Data Privacy Legal & Policy Issues, Anthony Volini

Journal of Intellectual Property Law

Lawyers wishing to exercise a meaningful degree of leadership at the intersection of technology and the law could benefit greatly from a deep understanding of the use and application of encryption, considering it arises in so many legal scenarios. For example, in FTC v. Wyndham1 the defendant failed to implement nearly every conceivable cybersecurity control, including lack of encryption for stored data, resulting in multiple data breaches and a consequent FTC enforcement action for unfair and deceptive practices. Other examples of legal issues requiring use of encryption and other technology concepts include compliance with security requirements of GLBA & HIPAA, …


Bird's-Eye View: A Comparative Examination Of Drone Regulation Through The Lens Of Privacy Protection, Allison Mcgregor Jun 2021

Bird's-Eye View: A Comparative Examination Of Drone Regulation Through The Lens Of Privacy Protection, Allison Mcgregor

Georgia Journal of International & Comparative Law

No abstract provided.


Mind Your Businesses: Why Georgia Companies Should Worry About European Privacy Law, Emily E. Seaton Jul 2019

Mind Your Businesses: Why Georgia Companies Should Worry About European Privacy Law, Emily E. Seaton

Georgia Journal of International & Comparative Law

No abstract provided.


The End Of Miller’S Time: How Sensitivity Can Categorize Third-Party Data After Carpenter, Michael Gentithes Jan 2019

The End Of Miller’S Time: How Sensitivity Can Categorize Third-Party Data After Carpenter, Michael Gentithes

Georgia Law Review

For over 40 years, the Supreme Court has permitted
government investigators to warrantlessly collect
information that citizens disclose to third-party service
providers. That third-party doctrine is under significant
strain in the modern, networked world. Yet scholarly
responses typically fall into unhelpfully extreme camps,
either championing an absolute version of the doctrine
or calling for its abolition. In Carpenter v. United
States, the Court suggested a middle road, holding that
some categories of data—such as digital location
information collected from cell phones—do not neatly
fall into the third-party doctrine’s dichotomy between
unprotected, disclosed information and protected,
undisclosed information. But the majority …


Cybersecurity, Shareholders, And The Boardroom: An Analysis Of Current And Proposed Measures For Protecting Corporate Intellectual Property, Kathryn V. Wymer Dec 2018

Cybersecurity, Shareholders, And The Boardroom: An Analysis Of Current And Proposed Measures For Protecting Corporate Intellectual Property, Kathryn V. Wymer

Journal of Intellectual Property Law

No abstract provided.


A Duty To Safeguard: Data Breach Litigation Through A Quasi-Bailment Lens, Miles Christian Skedvold Dec 2018

A Duty To Safeguard: Data Breach Litigation Through A Quasi-Bailment Lens, Miles Christian Skedvold

Journal of Intellectual Property Law

No abstract provided.


Judicial Oversight Of Interception Of Communications In The United Kingdom: An Historical And Comparative Analysis, David G. Barnum Jun 2017

Judicial Oversight Of Interception Of Communications In The United Kingdom: An Historical And Comparative Analysis, David G. Barnum

Georgia Journal of International & Comparative Law

No abstract provided.


Simon Didn't Say: When Reconstruction Of A Private Search Goes Awry Under The Private Search Doctrine, John G. Chambers Jan 2017

Simon Didn't Say: When Reconstruction Of A Private Search Goes Awry Under The Private Search Doctrine, John G. Chambers

Georgia Law Review

A privateparty conducting an unreasonablesearch of an
individual need not fear the Fourth Amendment as the
proscriptions therein are applicable against only the
government. The government, however, need not fear the
Fourth Amendment where it replicates that private party's
unreasonable search. As such, the Fourth Amendment is
not offended where the government directs the private

party to "reconstruct" its initial search. This
reconstruction doctrine breeds many questions in
application, particularly in the digital context. In
grappling with these questions, this Note demonstrates
that the current law provides no satisfying answers. It
proposes a new test to assess reconstructed private party …


The Georgia Open Records Law Electronic Signature Exception: The Intersection Of Privacy, Technology, And Open Records, Michael L. Van Cise Oct 2016

The Georgia Open Records Law Electronic Signature Exception: The Intersection Of Privacy, Technology, And Open Records, Michael L. Van Cise

Journal of Intellectual Property Law

No abstract provided.


Balancing A Right To Be Forgotten With A Right To Freedom Of Expression In The Wake Of Google Spain V. Aepd, Shaniqua Singleton Sep 2016

Balancing A Right To Be Forgotten With A Right To Freedom Of Expression In The Wake Of Google Spain V. Aepd, Shaniqua Singleton

Georgia Journal of International & Comparative Law

No abstract provided.


Taking A Bite Out Of Michael Vick's Publicity Rights: An Analysis Of How Teh Right Of Publicity Should Be Treated After A Celebrity Is Convicted Of A Crime, Stephen Reginald Fowler Jun 2016

Taking A Bite Out Of Michael Vick's Publicity Rights: An Analysis Of How Teh Right Of Publicity Should Be Treated After A Celebrity Is Convicted Of A Crime, Stephen Reginald Fowler

Journal of Intellectual Property Law

No abstract provided.


Rights Of Publicity: A Practitioner's Enigma, Gil N. Peles Esq. Jun 2016

Rights Of Publicity: A Practitioner's Enigma, Gil N. Peles Esq.

Journal of Intellectual Property Law

No abstract provided.


All Blogs Go To Heaven: Preserving Valuable Digital Assets Without The Uniform Fiduciary Access To Digital Assets Act's Removal Of Third Party Privacy Protections, Elizabeth D. Barwick Jan 2016

All Blogs Go To Heaven: Preserving Valuable Digital Assets Without The Uniform Fiduciary Access To Digital Assets Act's Removal Of Third Party Privacy Protections, Elizabeth D. Barwick

Georgia Law Review

In the age of the Internet, most of us live our lives largely online. As such, one would expect a concomitant increase in concern for privacy, but this is not necessarily the case. It seems that the instantaneous and anonymous nature of the Internet has given rise to thoughtless sharing that simply did not exist when it was necessary to put pen to paper. Understanding that a great deal of our day-to-day activities are now carried out over the Internet, it makes sense that our families and heirs would want or need access to our accounts in the event of …


Personal Property Servitudes On The Internet Of Things, Christina Mulligan Jan 2016

Personal Property Servitudes On The Internet Of Things, Christina Mulligan

Georgia Law Review

Small appliances such as thermostats, watches, jewelry, and eyewear are now being made available with networking capability. These networked objects make up the growing Internet of Things-pieces of personal property that run software and connect to the global Internet. These products are typically governed by terms of service or end-user license agreements that create restrictions on how products can be used or transferred- restrictions which would be unenforceable if the inside of the product consisted of gears rather than processing chips. This Article explores the question of when use and transfer restrictions should be enforceable on networked appliances and other …


Without A Pilot: Navigating The Space Between The First Amendment And State And Federal Directives Affecting Drone Journalism, Leah M. Davis Jan 2015

Without A Pilot: Navigating The Space Between The First Amendment And State And Federal Directives Affecting Drone Journalism, Leah M. Davis

Georgia Law Review

A new player in American airspace, the drone, creates greater opportunities for news gathering. But with new opportunities, come new rules. Current legislatures, regulators and courts face the challenge of creating and enforcing a legal framework by which this new technology can be integrated into American airspace. The debate surrounding proper drone directives is influenced by competing policies of privacy, security, and First Amendment concerns. This Note surveys past and present state and federal directives on drone use, and argues for the creation of a separate set of guidelines for Press drones. Separate directives would ensure that news outlets are …


Procreating From Prison: Evaluating British Prisoners' Right To Artificially Inseminate Their Wives Under The United Kingdom's New Human Rights Act And The 2001 Mellor Case, Pollybeth Proctor Sep 2014

Procreating From Prison: Evaluating British Prisoners' Right To Artificially Inseminate Their Wives Under The United Kingdom's New Human Rights Act And The 2001 Mellor Case, Pollybeth Proctor

Georgia Journal of International & Comparative Law

No abstract provided.


Loud Talk About A Quiet Issue: The International Atomic Energy Agency's Struggle To Maintain The Confidentiality Of Information Gained In Nuclear Facility Inspections, Alison Van Lear Sep 2014

Loud Talk About A Quiet Issue: The International Atomic Energy Agency's Struggle To Maintain The Confidentiality Of Information Gained In Nuclear Facility Inspections, Alison Van Lear

Georgia Journal of International & Comparative Law

No abstract provided.


Redefining The Right To Be Let Alone: Privacy Rights And The Constitutionality Of Technical Surveillance Measures In Germany And The United States, Nicole Jacoby Sep 2014

Redefining The Right To Be Let Alone: Privacy Rights And The Constitutionality Of Technical Surveillance Measures In Germany And The United States, Nicole Jacoby

Georgia Journal of International & Comparative Law

No abstract provided.


Maryland V. King And The Road Already Traveled: How The United Kingdome Tried--And Failed--To Balance State Interests With Privacy Rights, Courtney Coons Poole Sep 2014

Maryland V. King And The Road Already Traveled: How The United Kingdome Tried--And Failed--To Balance State Interests With Privacy Rights, Courtney Coons Poole

Georgia Journal of International & Comparative Law

No abstract provided.


A Cloudy Forecast: Divergence In The Cloud Computing Laws Of The United States, European Union, And China, Tina Cheng Jun 2014

A Cloudy Forecast: Divergence In The Cloud Computing Laws Of The United States, European Union, And China, Tina Cheng

Georgia Journal of International & Comparative Law

No abstract provided.


Should The Default Be "Social"? Canada's Pushback Against Oversharing By Facebook, Karen Tanenbaum Oct 2013

Should The Default Be "Social"? Canada's Pushback Against Oversharing By Facebook, Karen Tanenbaum

Georgia Journal of International & Comparative Law

No abstract provided.


Genetic Privacy & The Fourth Amendment: Unregulated Surreptitious Dna Harvesting, Albert E. Scherr Jan 2013

Genetic Privacy & The Fourth Amendment: Unregulated Surreptitious Dna Harvesting, Albert E. Scherr

Georgia Law Review

Genetic privacy and police practices have come to the
fore in the criminal justice system. Case law and stories
in the media document that police are surreptitiously
harvesting the out-of-body DNA of putative suspects.
Some sources even indicate that surreptitious data
banking may also be in its infancy. Surreptitious
harvesting of out-of-body DNA by the police is currently
unregulated by the Fourth Amendment. The few courts
that have addressed the issue find that the police are free
to harvest DNA abandoned by a putative suspect in a
public place. Little in the nascent surreptitious harvesting
case law suggests that surreptitious …


Chain-Link Confidentiality, Woodrow Hartzog Jan 2012

Chain-Link Confidentiality, Woodrow Hartzog

Georgia Law Review

Disclosing personal information online often feels like
losing control over one's data forever; but it does not have
to be that way. This Essay proposes a "chain-link
confidentiality" approach to protecting online privacy.
One of the most difficult challenges to guarding privacy in
the digital age is the protection of information once it is
exposed to other people. A chain-link confidentiality
regime would link the disclosure of personal information
to obligations to protect that information as the
information moves downstream. It would focus on the
relationships not only between the discloser of information
and the initial recipient but also between …