Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Fourth Amendment (8)
- Science and Technology Law (8)
- Constitutional Law (7)
- Criminal Procedure (6)
- Computer Law (4)
-
- First Amendment (4)
- Internet Law (4)
- Intellectual Property Law (3)
- Property Law and Real Estate (3)
- Air and Space Law (2)
- Law Enforcement and Corrections (2)
- Legislation (2)
- National Security Law (2)
- Public Law and Legal Theory (2)
- Torts (2)
- Administrative Law (1)
- Civil Rights and Discrimination (1)
- Contracts (1)
- Criminal Law (1)
- Fourteenth Amendment (1)
- Jurisprudence (1)
- Labor and Employment Law (1)
- Land Use Law (1)
- Law and Society (1)
- Keyword
-
- Privacy (9)
- Fourth amendment (6)
- Search (5)
- Cybersurveillance (2)
- Dataveillance (2)
-
- Drone (2)
- Seizure (2)
- Technology (2)
- Uas (2)
- Uav (2)
- And pseudonymity (1)
- Anonymity (1)
- Avatars (1)
- Behavioral ethics (1)
- Big data (1)
- Bill of rights (1)
- Biographic data (1)
- Biometric data (1)
- Block chain (1)
- Body camera (1)
- Business law (1)
- Cell site location (1)
- Cell tower (1)
- Community policing (1)
- Compliance (1)
- Computer Law (1)
- Concerted activity (1)
- Copyright (1)
- Corporate compliance (1)
- Corporate governance (1)
- Publication
Articles 1 - 20 of 20
Full-Text Articles in Privacy Law
Private Norms And Public Spaces, Nicole Stelle Garnett
Private Norms And Public Spaces, Nicole Stelle Garnett
Nicole Stelle Garnett
This Essay explores the role of private norms in the allocation of urban public spaces as well as local governments' efforts to enforce these norms. The Essay was prepared for the 2008 Brigham-Kanner Property Rights Conference, William and Mary School of Law, as a tribute to Robert Ellickson. community policing, informal norms
Privacy And Court Records: An Empirical Study, David S. Ardia, Anne Klinefelter
Privacy And Court Records: An Empirical Study, David S. Ardia, Anne Klinefelter
Anne Klinefelter
No abstract provided.
Private Law In The Gaps, Jeffrey A. Pojanowski
Private Law In The Gaps, Jeffrey A. Pojanowski
Jeffrey A. Pojanowski
Private law subjects like tort, contract, and property are traditionally taken to be at the core of the common law tradition, yet statutes increasingly intersect with these bodies of doctrine. This Article draws on recent work in private law theory and statutory interpretation to consider afresh what courts should do with private law in statutory gaps. In particular, it focuses on statutes touching on tort law, a field at the leading edge of private law theory. This Article's analysis unsettles some conventional wisdom about the intersection of private law and statutes. Many leading tort scholars and jurists embrace a regulatory …
Testimony On Unmanned Aircraft Systems Rules And Regulations, Stephen E. Henderson
Testimony On Unmanned Aircraft Systems Rules And Regulations, Stephen E. Henderson
Stephen E Henderson
Modern-Day Monitorships, Veronica Root
Modern-Day Monitorships, Veronica Root
Veronica Root
When a sexual abuse scandal rocked Penn State, when Apple engaged in anticompetitive behavior, and when servicers like Bank of America improperly foreclosed upon hundreds of thousands of homeowners, each organization entered into a Modern-Day Monitorship. Modern-Day Monitorships are utilized in an array of contexts to assist in widely varying remediation efforts. They provide outsiders a unique source of information about the efficacy of the tarnished organization’s efforts to remediate misconduct. Yet despite their use in high-profile and serious matters of organizational wrongdoing, they are not an outgrowth of careful study and deliberate planning. Instead, Modern-Day Monitorships have been employed …
If You Fly A Drone, So Can Police, Stephen E. Henderson
If You Fly A Drone, So Can Police, Stephen E. Henderson
Stephen E Henderson
Responding To Takedown Requests For Digital Library Repositories, Kristina L. Niedringhaus
Responding To Takedown Requests For Digital Library Repositories, Kristina L. Niedringhaus
Kristina L Niedringhaus
No abstract provided.
We Are All Cyborgs Now: A Cognitive Theory Of The Third-Party Doctrine, H. Brian Holland
We Are All Cyborgs Now: A Cognitive Theory Of The Third-Party Doctrine, H. Brian Holland
H. Brian Holland
No abstract provided.
Ou Professor: Fourth Amendment At Heart Of Dispute Between Fbi, Apple, Stephen E. Henderson
Ou Professor: Fourth Amendment At Heart Of Dispute Between Fbi, Apple, Stephen E. Henderson
Stephen E Henderson
Making Sure Byod Does Not Stand For "Breach Your Organization's Data", Allyson Haynes Stuart
Making Sure Byod Does Not Stand For "Breach Your Organization's Data", Allyson Haynes Stuart
Allyson Haynes Stuart
No abstract provided.
Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu
Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu
Margaret Hu
This Article highlights some of the critical distinctions between small data surveillance and big data cybersurveillance as methods of intelligence gathering. Specifically, in the intelligence context, it appears that “collect-it-all” tools in a big data world can now potentially facilitate the construction, by the intelligence community, of other individuals' digital avatars. The digital avatar can be understood as a virtual representation of our digital selves and may serve as a potential proxy for an actual person. This construction may be enabled through processes such as the data fusion of biometric and biographic data, or the digital data fusion of the …
Taxonomy Of The Snowden Disclosures, Margaret Hu
Taxonomy Of The Snowden Disclosures, Margaret Hu
Margaret Hu
This brief Essay offers a proposed taxonomy of the Snowden Disclosures. An informed discussion on the legality and constitutionality of the emerging cybersurveillance and mass dataveillance programs revealed by former NSA contractor Edward Snowden necessitates the furtherance of cybersurveillance aptitude. This Essay contends, therefore, that a detailed examination of the Snowden disclosures requires not just a careful inquiry into the legal and constitutional framework that guides the oversight of these programs. A close interrogation also requires a careful inquiry into the big data architecture that guides them. This inquiry includes examining the underlying theories of data science and the rationales …
The Right To Be Forgotten V. Free Speech (Symposium) (Forthcoming), Edward Lee
The Right To Be Forgotten V. Free Speech (Symposium) (Forthcoming), Edward Lee
Edward Lee
No abstract provided.
Employee Electronic Communications In A Boundaryless World, Robert Sprague
Employee Electronic Communications In A Boundaryless World, Robert Sprague
Robert Sprague
Copyrights, Privacy, And The Blockchain, Tom W. Bell
Copyrights, Privacy, And The Blockchain, Tom W. Bell
Tom W. Bell
I'Ll See: How Surveillance Undermines Privacy By Eroding Trust, Richard Warner, Robert H. Sloan
I'Ll See: How Surveillance Undermines Privacy By Eroding Trust, Richard Warner, Robert H. Sloan
Richard Warner
No abstract provided.
Private Technology (Foreword), Daniel Harris Brean
Private Technology (Foreword), Daniel Harris Brean
Daniel Harris Brean
Lawn Signs: A Fourth Amendment For Constitutional Curmudgeons, Stephen E. Henderson, Andrew G. Ferguson
Lawn Signs: A Fourth Amendment For Constitutional Curmudgeons, Stephen E. Henderson, Andrew G. Ferguson
Stephen E Henderson
A Rose By Any Other Name: Regulating Law Enforcement Bulk Metadata Collection, Stephen E. Henderson
A Rose By Any Other Name: Regulating Law Enforcement Bulk Metadata Collection, Stephen E. Henderson
Stephen E Henderson
Fourth Amendment Time Machines (And What They Might Say About Police Body Cameras), Stephen E. Henderson
Fourth Amendment Time Machines (And What They Might Say About Police Body Cameras), Stephen E. Henderson
Stephen E Henderson