Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2015

Series

Discipline
Institution
Keyword
Publication
File Type

Articles 1 - 30 of 73

Full-Text Articles in Privacy Law

When Privacy Almost Won: Time, Inc. V. Hill (1967), Samantha Barbas Dec 2015

When Privacy Almost Won: Time, Inc. V. Hill (1967), Samantha Barbas

Journal Articles

Drawing on previously unexplored and unpublished archival papers of Richard Nixon, the plaintiffs’ lawyer in the case, and the justices of the Warren Court, this article tells the story of the seminal First Amendment case Time, Inc. v. Hill (1967). In Hill, the Supreme Court for the first time addressed the conflict between the right to privacy and freedom of the press. The Court constitutionalized tort liability for invasion of privacy, acknowledging that it raised First Amendment issues and must be governed by constitutional standards. Hill substantially diminished privacy rights; today it is difficult if not impossible to recover against …


Newsroom: Logan On Drone Law, Roger Williams University School Of Law Nov 2015

Newsroom: Logan On Drone Law, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


Cybersecurity And Law Enforcement: The Cutting Edge : Symposium, Roger Williams University School Of Law Oct 2015

Cybersecurity And Law Enforcement: The Cutting Edge : Symposium, Roger Williams University School Of Law

School of Law Conferences, Lectures & Events

No abstract provided.


The Continuing Battle Over Privacy Vs. Security, Ellen Cornelius Oct 2015

The Continuing Battle Over Privacy Vs. Security, Ellen Cornelius

Homeland Security Publications

No abstract provided.


Schrems And The Faa’S “Foreign Affairs” Prong: The Costs Of Reform, Peter Margulies Oct 2015

Schrems And The Faa’S “Foreign Affairs” Prong: The Costs Of Reform, Peter Margulies

Law Faculty Scholarship

No abstract provided.


Trending @ Rwulaw: Professor Peter Margulies's Post: Cybersecurity: A 'Must-Know' For Lawyers And Citizens, Peter Margulies Oct 2015

Trending @ Rwulaw: Professor Peter Margulies's Post: Cybersecurity: A 'Must-Know' For Lawyers And Citizens, Peter Margulies

Law School Blogs

No abstract provided.


Taxonomy Of The Snowden Disclosures, Margaret Hu Oct 2015

Taxonomy Of The Snowden Disclosures, Margaret Hu

Faculty Publications

This brief Essay offers a proposed taxonomy of the Snowden Disclosures. An informed discussion on the legality and constitutionality of the emerging cybersurveillance and mass dataveillance programs revealed by former NSA contractor Edward Snowden necessitates the furtherance of cybersurveillance aptitude. This Essay contends, therefore, that a detailed examination of the Snowden disclosures requires not just a careful inquiry into the legal and constitutional framework that guides the oversight of these programs. A close interrogation also requires a careful inquiry into the big data architecture that guides them. This inquiry includes examining the underlying theories of data science and the rationales …


A New Test To Reconcile The Right Of Publicity With Core First Amendment Values, Nat Stern, Mark Joseph Stern Oct 2015

A New Test To Reconcile The Right Of Publicity With Core First Amendment Values, Nat Stern, Mark Joseph Stern

Scholarly Publications

No abstract provided.


Wisconsin School For Girls Inmate Record Books: A Case Study Of Redacted Digitization, Eric Willey, Laura Farley Oct 2015

Wisconsin School For Girls Inmate Record Books: A Case Study Of Redacted Digitization, Eric Willey, Laura Farley

Faculty and Staff Publications – Milner Library

The Wisconsin School for Girls collection housed in the Wisconsin Historical Society (WHS) archives contains a variety of documents from the institution’s period of operation. Inmates who were admitted to the institution were predominately juvenile females at the time of the records’ creation; because of this, the contents of the records are protected by Wisconsin state statutes, which mandate restricted access for patrons as well as limitations on the use of the information contained within the records. This article examines how the restrictions on the collection continue to protect the privacy of the inmates and their descendants, what procedures WHS …


Appropriate(D) Moments, Richard H. Chused Oct 2015

Appropriate(D) Moments, Richard H. Chused

Articles & Chapters

No abstract provided.


Newsroom: Fcc's Sohn On Consumer Protection, Roger Williams University School Of Law Sep 2015

Newsroom: Fcc's Sohn On Consumer Protection, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


Big Data Blacklisting, Margaret Hu Sep 2015

Big Data Blacklisting, Margaret Hu

Faculty Publications

“Big data blacklisting” is the process of categorizing individuals as administratively “guilty until proven innocent” by virtue of suspicious digital data and database screening results. Database screening and digital watchlisting systems are increasingly used to determine who can work, vote, fly, etc. In a big data world, through the deployment of these big data tools, both substantive and procedural due process protections may be threatened in new and nearly invisible ways. Substantive due process rights safeguard fundamental liberty interests. Procedural due process rights prevent arbitrary deprivations by the government of constitutionally protected interests. This Article frames the increasing digital mediation …


Will We Pick Privacy Over Convenience When It Comes To Drones?, Caren M. Morrison Aug 2015

Will We Pick Privacy Over Convenience When It Comes To Drones?, Caren M. Morrison

Faculty Publications By Year

No abstract provided.


Will We Pick Privacy Over Drone-Drops From Amazon?, Caren M. Morrison Aug 2015

Will We Pick Privacy Over Drone-Drops From Amazon?, Caren M. Morrison

Faculty Publications By Year

No abstract provided.


Internet Giants As Quasi-Governmental Actors And The Limits Of Contractual Consent, D. A. Jeremy Telman Jul 2015

Internet Giants As Quasi-Governmental Actors And The Limits Of Contractual Consent, D. A. Jeremy Telman

Law Faculty Publications

Although the government’s data-mining program relied heavily on information and technology that the government received from private companies, relatively little of the public outrage generated by Edward Snowden’s revelations was directed at those private companies. We argue that the mystique of the Internet giants and the myth of contractual consent combine to mute criticisms that otherwise might be directed at the real data-mining masterminds. As a result, consumers are deemed to have consented to the use of their private information in ways that they would not agree to had they known the purposes to which their information would be put …


Defining Foreign Affairs In Section 702 Of The Fisa Amendments Act: The Virtues And Deficits Of Post-Snowden Dialogue On U.S. Surveillance Policy, Peter Margulies Jul 2015

Defining Foreign Affairs In Section 702 Of The Fisa Amendments Act: The Virtues And Deficits Of Post-Snowden Dialogue On U.S. Surveillance Policy, Peter Margulies

Law Faculty Scholarship

No abstract provided.


Librarians As Advocates For Social Media Privacy, Sarah Lamdan May 2015

Librarians As Advocates For Social Media Privacy, Sarah Lamdan

LACUNY Institute 2015

Librarians must continue their traditional roles as privacy rights activists and intellectual freedom upholders into the digital age, and across electronic information sources, including social media fora. Social media is quickly becoming a major source of information and center for information seeking, and librarians have an opportunity to promote and help shape social media policies that protect users’ privacy and assure that users can seek information without inhibition. One way librarians can be involved in the promotion of online privacy is by joining the social media user rights movement and advocating terms of use agreements that protect information seekers that …


Killing New Vistas With The Over-Regulation Of Recreational 'Drone' Use, Siyuan Chen May 2015

Killing New Vistas With The Over-Regulation Of Recreational 'Drone' Use, Siyuan Chen

Research Collection Yong Pung How School Of Law

In the last few years, there has been a dramatic increase in the use of remote-controlled copters – often given the convenient but misleading epithets of unmanned aerial vehicles or “drones” – by recreational users to capture aerial photographs and videos on an unprecedented scale. Asia is no exception. The convergence of cutting-edge technological developments in gyroscopic gimbals, long-range wireless transmissions, GPS-enabled stabilisation, GPS-enabled flightpath-preprogramming, first-person-views, and compact digital imaging has led to the proliferation of affordable camera-carrying “drones” that even hobbyists can pilot with reasonable safety. Thus far, despite purported controversies there have not been any reports of serious …


Data Breaches And Privacy Law: Lawyers’ Challenges In Handling Personal Information, Charlotte Duc-Bragues Apr 2015

Data Breaches And Privacy Law: Lawyers’ Challenges In Handling Personal Information, Charlotte Duc-Bragues

Cornell Law School J.D. Student Research Papers

Sharing personal information with a lawyer potentially represents the greatest source of vulnerability for an individual. Since the first major security breach in 2005, law firms have been pressed both by public authorities and clients to take action in order to protect confidential information from potential harmful breaches.

This paper seeks to provide an overview of the challenges faced by lawyers in handling personal information with regard to potential security breaches. The aim is to analyze this issue through the focal of privacy law; statistics on security breaches and tools to prevent this phenomenon, extensively studied in class, are given …


Youtube Kids – Luring Kids In, One App At A Time, Courtney Serrato Apr 2015

Youtube Kids – Luring Kids In, One App At A Time, Courtney Serrato

GGU Law Review Blog

Whether you’re an overnight sensation like Justin Bieber or you’re uploading a tutorial on how to apply the perfect make up; YouTube has become the go‑to site for watching all the hottest videos. Technologically speaking, the cyber world has significantly changed over the years, especially with the Internet now being easily accessible from mobile devices. But the most alarming and overlooked trend is the ubiquitous use of the Internet by children.

Today, children use iPhones, tablets and computers to access the Internet as early as three years‑old. With the amount of time children spend online, some have become skilled navigators. …


Are They Worth Reading? An In-Depth Analysis Of Online Trackers’ Privacy Policies, Candice Hoke, Lorrie Faith Cranor, Pedro Giovanni Leon, Alyssa Au Apr 2015

Are They Worth Reading? An In-Depth Analysis Of Online Trackers’ Privacy Policies, Candice Hoke, Lorrie Faith Cranor, Pedro Giovanni Leon, Alyssa Au

Law Faculty Articles and Essays

We analyzed the privacy policies of 75 online tracking companies with the goal of assessing whether they contain information relevant for users to make privacy decisions. We compared privacy policies from large companies, companies that are members of self-regulatory organizations, and nonmember companies and found that many of them are silent with regard to important consumer-relevant practices including the collection and use of sensitive information and linkage of tracking data with personally-identifiable information. We evaluated these policies against self-regulatory guidelines and found that many policies are not fully compliant. Furthermore, the overly general requirements established in those guidelines allow companies …


Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu Apr 2015

Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu

Faculty Publications

This Article highlights some of the critical distinctions between small data surveillance and big data cybersurveillance as methods of intelligence gathering. Specifically, in the intelligence context, it appears that "collect-it-all" tools in a big data world can now potentially facilitate the construction, by the intelligence community, of other individuals' digital avatars. The digital avatar can be understood as a virtual representation of our digital selves and may serve as a potential proxy for an actual person. This construction may be enabled through processes such as the data fusion of biometric and biographic data, or the digital data fusion of the …


The 4th Amendment To The U.S. Constitution, Article 3 Of The Ala Code Of Ethics, And Section 215 Of The Usa Patriot Act: Squaring The Triangle, Sue Ann Gardner Mar 2015

The 4th Amendment To The U.S. Constitution, Article 3 Of The Ala Code Of Ethics, And Section 215 Of The Usa Patriot Act: Squaring The Triangle, Sue Ann Gardner

University of Nebraska-Lincoln Libraries: Conference Presentations and Speeches

Librarians in the United States have many professional guideposts to inform their work. A patron's right to privacy is one tenet that tends to be upheld tenaciously, and is informed first by the 4th Amendment to the U.S. Constitution, among other Amendments, as well as Article III of the American Library Association Code of Ethics. Section 215 of the USA PATRIOT Act, the so-called "library provision," contradicts both the 4th Amendment and Article III of the ALA Code of Ethics, making it a weak third leg of a triangle of guideposts. The speaker explains how Section 215 allows for confiscation …


Spying Inc., Danielle K. Citron Mar 2015

Spying Inc., Danielle K. Citron

Faculty Scholarship

The latest spying craze is the “stalking app.” Once installed on someone’s cell phone, the stalking app provides continuous access to the person’s calls, texts, snap chats, photos, calendar updates, and movements. Domestic abusers and stalkers frequently turn to stalking apps because they are undetectable even to sophisticated phone owners.

Business is booming for stalking app providers, even though their entire enterprise is arguably illegal. Federal and state wiretapping laws ban the manufacture, sale, or advertisement of devices knowing their design makes them primarily useful for the surreptitious interception of electronic communications. But those laws are rarely, if ever, enforced. …


Show And Tell?: Students' Personal Lives, Schools, And Parents, Emily Gold Waldman Feb 2015

Show And Tell?: Students' Personal Lives, Schools, And Parents, Emily Gold Waldman

Elisabeth Haub School of Law Faculty Publications

Public schools learn about their students' personal lives in many ways. Some are passive: a teacher observes a student kissing someone, or overhears a conversation among friends. But schools also engage in more active information-gathering about students' personal lives, through surveys and informal conversations between students and teachers, administrators, school psychologists, counselors, coaches, and other personnel. This Article explores the competing privacy considerations that result from such encounters. Once schools have learned highly personal information about their students, does it violate those students' privacy rights to disclose that information to their parents? Or does keeping the information secret violate the …


The Federalist Provenance Of The Principle Of Privacy, Elvin T. Lim Feb 2015

The Federalist Provenance Of The Principle Of Privacy, Elvin T. Lim

Research Collection School of Social Sciences

The right to privacy is the centerpiece of modern liberal constitutional thought in the United States. But liberals rarely invoke “the Founding” to justify this right, as if conceding that the right to privacy was somehow a radical departure from “original meaning,” perhaps pulled out of the hat by “activist” judges taking great interpretive liberties with the constitutional text. Far from being an unorthodox and modern invention, I argue here that privacy is a principle grounded in the very architecture of the Constitution as enumerated in its Articles, perhaps even more so than in particular sections of the Bill of …


Privacy And Competing Library Goals: How Can Library Directors Lead When Values Collide?, Anne Klinefelter Jan 2015

Privacy And Competing Library Goals: How Can Library Directors Lead When Values Collide?, Anne Klinefelter

Faculty Publications

No abstract provided.


Avoiding Unintended Disclosure: Representing Clients With Hiv And Aids, Lashanda Taylor Adams Jan 2015

Avoiding Unintended Disclosure: Representing Clients With Hiv And Aids, Lashanda Taylor Adams

Journal Articles

When the HIV/AIDS epidemic was initially recognized in the United States, many attorneys wondered what it would mean to represent a client with HIV. As the number of HIV-infected individuals grew, so did the need for attorneys to represent them. Specifically, attorneys questioned whether or not their duty of confidentiality would expose them to civil liability from failing to protect a third party.1 In response to this concern, several law review articles were written discussing the dilemma faced by attorneys bound by professional rules of conduct.2 These articles focused on the needs of the attorney and the public rather than …


Is There Anybody Out There? Analyzing The Regulation Of Children’S Privacy Online In The United States Of America And The European Union According To The Tbgi Analytical Framework By Eberlein Et Al, Nachshon Goltz Jan 2015

Is There Anybody Out There? Analyzing The Regulation Of Children’S Privacy Online In The United States Of America And The European Union According To The Tbgi Analytical Framework By Eberlein Et Al, Nachshon Goltz

Transnational Business Governance Interactions Working Papers

This article analyzes the regulation of children’s privacy online, especially in the context of personal information collection as a commodity, in the United States of America (USA) and the European Union (EU) according to the Transnational Business Governance Interactions analytical framework proposed by Eberlein et al. This article reviews the regulatory structure of the field in these two jurisdictions, including global organizations, according to Elberlein et al components and questions. In the analysis, a map of the regulatory interactions within this global realm will be presented and discussed. Analysis of the influence of each interacting party and the degree of …


Big Data And Predictive Reasonable Suspicion, Andrew Ferguson Jan 2015

Big Data And Predictive Reasonable Suspicion, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

The Fourth Amendment requires “reasonable suspicion” to seize a suspect. As a general matter, the suspicion derives from information a police officer observes or knows. It is individualized to a particular person at a particular place. Most reasonable suspicion cases involve police confronting unknown suspects engaged in observable suspicious activities. Essentially, the reasonable suspicion doctrine is based on “small data” – discrete facts involving limited information and little knowledge about the suspect.But what if this small data is replaced by “big data”? What if police can “know” about the suspect through new networked information sources? Or, what if predictive analytics …