Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (13)
- Science and Technology Law (10)
- Social and Behavioral Sciences (10)
- Law and Society (9)
- Constitutional Law (8)
-
- First Amendment (8)
- Fourth Amendment (7)
- National Security Law (7)
- Computer Law (6)
- Consumer Protection Law (5)
- Air and Space Law (4)
- Communications Law (4)
- Health Law and Policy (4)
- International Law (4)
- Law Enforcement and Corrections (4)
- Computer Sciences (3)
- Contracts (3)
- Criminal Law (3)
- Criminology and Criminal Justice (3)
- Information Security (3)
- Legal Studies (3)
- Library and Information Science (3)
- Physical Sciences and Mathematics (3)
- President/Executive Department (3)
- Supreme Court of the United States (3)
- Torts (3)
- Asian Studies (2)
- Business Organizations Law (2)
- Institution
-
- Roger Williams University (6)
- Boston University School of Law (4)
- Maurer School of Law: Indiana University (4)
- New York Law School (4)
- University of Maryland Francis King Carey School of Law (4)
-
- Duke Law (3)
- Georgia State University College of Law (3)
- Singapore Management University (3)
- University of Colorado Law School (3)
- University of Miami Law School (3)
- University of Washington School of Law (3)
- William & Mary Law School (3)
- American University Washington College of Law (2)
- Pace University (2)
- Schulich School of Law, Dalhousie University (2)
- University at Buffalo School of Law (2)
- University of Nebraska - Lincoln (2)
- Case Western Reserve University School of Law (1)
- City University of New York (CUNY) (1)
- Cleveland State University (1)
- Columbia Law School (1)
- Cornell University Law School (1)
- Florida State University College of Law (1)
- Fordham Law School (1)
- Georgetown University Law Center (1)
- Golden Gate University School of Law (1)
- Illinois State University (1)
- Southern Methodist University (1)
- Texas A&M University School of Law (1)
- The Peter A. Allard School of Law (1)
- Keyword
-
- Privacy (34)
- Surveillance (13)
- Technology (8)
- Internet (7)
- Data protection (5)
-
- Fourth Amendment (5)
- First Amendment (4)
- NSA (4)
- Robots (4)
- Data protection laws (3)
- Electronic surveillance (3)
- FTC (3)
- Mass surveillance (3)
- Big data (2)
- Confidentiality (2)
- Criminal procedure (2)
- Cybersecurity (2)
- Data (2)
- Data breach (2)
- Data collection (2)
- Data privacy (2)
- Data security (2)
- Drone (2)
- Drones (2)
- Due process (2)
- European Union (2)
- FISA (2)
- Information privacy (2)
- International privacy law (2)
- Law (2)
- Publication
-
- Faculty Scholarship (13)
- Articles (8)
- Faculty Publications (6)
- Articles & Chapters (4)
- Articles by Maurer Faculty (4)
-
- Faculty Publications By Year (3)
- Journal Articles (3)
- Publications (3)
- Articles in Law Reviews & Other Academic Journals (2)
- Articles, Book Chapters, & Popular Press (2)
- Elisabeth Haub School of Law Faculty Publications (2)
- Law Faculty Scholarship (2)
- Life of the Law School (1993- ) (2)
- Research Collection Yong Pung How School Of Law (2)
- All Faculty Scholarship (1)
- Cornell Law School J.D. Student Research Papers (1)
- Faculty Journal Articles and Book Chapters (1)
- Faculty and Staff Publications – Milner Library (1)
- GGU Law Review Blog (1)
- Georgetown Law Faculty Publications and Other Works (1)
- Homeland Security Publications (1)
- LACUNY Institute 2015 (1)
- Law Faculty Articles and Essays (1)
- Law Faculty Publications (1)
- Law School Blogs (1)
- Nebraska College of Law: Faculty Publications (1)
- Research Collection School of Social Sciences (1)
- Scholarly Publications (1)
- School of Law Conferences, Lectures & Events (1)
- Transnational Business Governance Interactions Working Papers (1)
Articles 1 - 30 of 73
Full-Text Articles in Privacy Law
When Privacy Almost Won: Time, Inc. V. Hill (1967), Samantha Barbas
When Privacy Almost Won: Time, Inc. V. Hill (1967), Samantha Barbas
Journal Articles
Drawing on previously unexplored and unpublished archival papers of Richard Nixon, the plaintiffs’ lawyer in the case, and the justices of the Warren Court, this article tells the story of the seminal First Amendment case Time, Inc. v. Hill (1967). In Hill, the Supreme Court for the first time addressed the conflict between the right to privacy and freedom of the press. The Court constitutionalized tort liability for invasion of privacy, acknowledging that it raised First Amendment issues and must be governed by constitutional standards. Hill substantially diminished privacy rights; today it is difficult if not impossible to recover against …
Newsroom: Logan On Drone Law, Roger Williams University School Of Law
Newsroom: Logan On Drone Law, Roger Williams University School Of Law
Life of the Law School (1993- )
No abstract provided.
Cybersecurity And Law Enforcement: The Cutting Edge : Symposium, Roger Williams University School Of Law
Cybersecurity And Law Enforcement: The Cutting Edge : Symposium, Roger Williams University School Of Law
School of Law Conferences, Lectures & Events
No abstract provided.
The Continuing Battle Over Privacy Vs. Security, Ellen Cornelius
The Continuing Battle Over Privacy Vs. Security, Ellen Cornelius
Homeland Security Publications
No abstract provided.
Schrems And The Faa’S “Foreign Affairs” Prong: The Costs Of Reform, Peter Margulies
Schrems And The Faa’S “Foreign Affairs” Prong: The Costs Of Reform, Peter Margulies
Law Faculty Scholarship
No abstract provided.
Trending @ Rwulaw: Professor Peter Margulies's Post: Cybersecurity: A 'Must-Know' For Lawyers And Citizens, Peter Margulies
Trending @ Rwulaw: Professor Peter Margulies's Post: Cybersecurity: A 'Must-Know' For Lawyers And Citizens, Peter Margulies
Law School Blogs
No abstract provided.
Taxonomy Of The Snowden Disclosures, Margaret Hu
Taxonomy Of The Snowden Disclosures, Margaret Hu
Faculty Publications
This brief Essay offers a proposed taxonomy of the Snowden Disclosures. An informed discussion on the legality and constitutionality of the emerging cybersurveillance and mass dataveillance programs revealed by former NSA contractor Edward Snowden necessitates the furtherance of cybersurveillance aptitude. This Essay contends, therefore, that a detailed examination of the Snowden disclosures requires not just a careful inquiry into the legal and constitutional framework that guides the oversight of these programs. A close interrogation also requires a careful inquiry into the big data architecture that guides them. This inquiry includes examining the underlying theories of data science and the rationales …
A New Test To Reconcile The Right Of Publicity With Core First Amendment Values, Nat Stern, Mark Joseph Stern
A New Test To Reconcile The Right Of Publicity With Core First Amendment Values, Nat Stern, Mark Joseph Stern
Scholarly Publications
No abstract provided.
Wisconsin School For Girls Inmate Record Books: A Case Study Of Redacted Digitization, Eric Willey, Laura Farley
Wisconsin School For Girls Inmate Record Books: A Case Study Of Redacted Digitization, Eric Willey, Laura Farley
Faculty and Staff Publications – Milner Library
The Wisconsin School for Girls collection housed in the Wisconsin Historical Society (WHS) archives contains a variety of documents from the institution’s period of operation. Inmates who were admitted to the institution were predominately juvenile females at the time of the records’ creation; because of this, the contents of the records are protected by Wisconsin state statutes, which mandate restricted access for patrons as well as limitations on the use of the information contained within the records. This article examines how the restrictions on the collection continue to protect the privacy of the inmates and their descendants, what procedures WHS …
Appropriate(D) Moments, Richard H. Chused
Newsroom: Fcc's Sohn On Consumer Protection, Roger Williams University School Of Law
Newsroom: Fcc's Sohn On Consumer Protection, Roger Williams University School Of Law
Life of the Law School (1993- )
No abstract provided.
Big Data Blacklisting, Margaret Hu
Big Data Blacklisting, Margaret Hu
Faculty Publications
“Big data blacklisting” is the process of categorizing individuals as administratively “guilty until proven innocent” by virtue of suspicious digital data and database screening results. Database screening and digital watchlisting systems are increasingly used to determine who can work, vote, fly, etc. In a big data world, through the deployment of these big data tools, both substantive and procedural due process protections may be threatened in new and nearly invisible ways. Substantive due process rights safeguard fundamental liberty interests. Procedural due process rights prevent arbitrary deprivations by the government of constitutionally protected interests. This Article frames the increasing digital mediation …
Will We Pick Privacy Over Convenience When It Comes To Drones?, Caren M. Morrison
Will We Pick Privacy Over Convenience When It Comes To Drones?, Caren M. Morrison
Faculty Publications By Year
No abstract provided.
Will We Pick Privacy Over Drone-Drops From Amazon?, Caren M. Morrison
Will We Pick Privacy Over Drone-Drops From Amazon?, Caren M. Morrison
Faculty Publications By Year
No abstract provided.
Internet Giants As Quasi-Governmental Actors And The Limits Of Contractual Consent, D. A. Jeremy Telman
Internet Giants As Quasi-Governmental Actors And The Limits Of Contractual Consent, D. A. Jeremy Telman
Law Faculty Publications
Although the government’s data-mining program relied heavily on information and technology that the government received from private companies, relatively little of the public outrage generated by Edward Snowden’s revelations was directed at those private companies. We argue that the mystique of the Internet giants and the myth of contractual consent combine to mute criticisms that otherwise might be directed at the real data-mining masterminds. As a result, consumers are deemed to have consented to the use of their private information in ways that they would not agree to had they known the purposes to which their information would be put …
Defining Foreign Affairs In Section 702 Of The Fisa Amendments Act: The Virtues And Deficits Of Post-Snowden Dialogue On U.S. Surveillance Policy, Peter Margulies
Defining Foreign Affairs In Section 702 Of The Fisa Amendments Act: The Virtues And Deficits Of Post-Snowden Dialogue On U.S. Surveillance Policy, Peter Margulies
Law Faculty Scholarship
No abstract provided.
Librarians As Advocates For Social Media Privacy, Sarah Lamdan
Librarians As Advocates For Social Media Privacy, Sarah Lamdan
LACUNY Institute 2015
Librarians must continue their traditional roles as privacy rights activists and intellectual freedom upholders into the digital age, and across electronic information sources, including social media fora. Social media is quickly becoming a major source of information and center for information seeking, and librarians have an opportunity to promote and help shape social media policies that protect users’ privacy and assure that users can seek information without inhibition. One way librarians can be involved in the promotion of online privacy is by joining the social media user rights movement and advocating terms of use agreements that protect information seekers that …
Killing New Vistas With The Over-Regulation Of Recreational 'Drone' Use, Siyuan Chen
Killing New Vistas With The Over-Regulation Of Recreational 'Drone' Use, Siyuan Chen
Research Collection Yong Pung How School Of Law
In the last few years, there has been a dramatic increase in the use of remote-controlled copters – often given the convenient but misleading epithets of unmanned aerial vehicles or “drones” – by recreational users to capture aerial photographs and videos on an unprecedented scale. Asia is no exception. The convergence of cutting-edge technological developments in gyroscopic gimbals, long-range wireless transmissions, GPS-enabled stabilisation, GPS-enabled flightpath-preprogramming, first-person-views, and compact digital imaging has led to the proliferation of affordable camera-carrying “drones” that even hobbyists can pilot with reasonable safety. Thus far, despite purported controversies there have not been any reports of serious …
Data Breaches And Privacy Law: Lawyers’ Challenges In Handling Personal Information, Charlotte Duc-Bragues
Data Breaches And Privacy Law: Lawyers’ Challenges In Handling Personal Information, Charlotte Duc-Bragues
Cornell Law School J.D. Student Research Papers
Sharing personal information with a lawyer potentially represents the greatest source of vulnerability for an individual. Since the first major security breach in 2005, law firms have been pressed both by public authorities and clients to take action in order to protect confidential information from potential harmful breaches.
This paper seeks to provide an overview of the challenges faced by lawyers in handling personal information with regard to potential security breaches. The aim is to analyze this issue through the focal of privacy law; statistics on security breaches and tools to prevent this phenomenon, extensively studied in class, are given …
Youtube Kids – Luring Kids In, One App At A Time, Courtney Serrato
Youtube Kids – Luring Kids In, One App At A Time, Courtney Serrato
GGU Law Review Blog
Whether you’re an overnight sensation like Justin Bieber or you’re uploading a tutorial on how to apply the perfect make up; YouTube has become the go‑to site for watching all the hottest videos. Technologically speaking, the cyber world has significantly changed over the years, especially with the Internet now being easily accessible from mobile devices. But the most alarming and overlooked trend is the ubiquitous use of the Internet by children.
Today, children use iPhones, tablets and computers to access the Internet as early as three years‑old. With the amount of time children spend online, some have become skilled navigators. …
Are They Worth Reading? An In-Depth Analysis Of Online Trackers’ Privacy Policies, Candice Hoke, Lorrie Faith Cranor, Pedro Giovanni Leon, Alyssa Au
Are They Worth Reading? An In-Depth Analysis Of Online Trackers’ Privacy Policies, Candice Hoke, Lorrie Faith Cranor, Pedro Giovanni Leon, Alyssa Au
Law Faculty Articles and Essays
We analyzed the privacy policies of 75 online tracking companies with the goal of assessing whether they contain information relevant for users to make privacy decisions. We compared privacy policies from large companies, companies that are members of self-regulatory organizations, and nonmember companies and found that many of them are silent with regard to important consumer-relevant practices including the collection and use of sensitive information and linkage of tracking data with personally-identifiable information. We evaluated these policies against self-regulatory guidelines and found that many policies are not fully compliant. Furthermore, the overly general requirements established in those guidelines allow companies …
Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu
Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu
Faculty Publications
This Article highlights some of the critical distinctions between small data surveillance and big data cybersurveillance as methods of intelligence gathering. Specifically, in the intelligence context, it appears that "collect-it-all" tools in a big data world can now potentially facilitate the construction, by the intelligence community, of other individuals' digital avatars. The digital avatar can be understood as a virtual representation of our digital selves and may serve as a potential proxy for an actual person. This construction may be enabled through processes such as the data fusion of biometric and biographic data, or the digital data fusion of the …
The 4th Amendment To The U.S. Constitution, Article 3 Of The Ala Code Of Ethics, And Section 215 Of The Usa Patriot Act: Squaring The Triangle, Sue Ann Gardner
The 4th Amendment To The U.S. Constitution, Article 3 Of The Ala Code Of Ethics, And Section 215 Of The Usa Patriot Act: Squaring The Triangle, Sue Ann Gardner
University of Nebraska-Lincoln Libraries: Conference Presentations and Speeches
Librarians in the United States have many professional guideposts to inform their work. A patron's right to privacy is one tenet that tends to be upheld tenaciously, and is informed first by the 4th Amendment to the U.S. Constitution, among other Amendments, as well as Article III of the American Library Association Code of Ethics. Section 215 of the USA PATRIOT Act, the so-called "library provision," contradicts both the 4th Amendment and Article III of the ALA Code of Ethics, making it a weak third leg of a triangle of guideposts. The speaker explains how Section 215 allows for confiscation …
Spying Inc., Danielle K. Citron
Spying Inc., Danielle K. Citron
Faculty Scholarship
The latest spying craze is the “stalking app.” Once installed on someone’s cell phone, the stalking app provides continuous access to the person’s calls, texts, snap chats, photos, calendar updates, and movements. Domestic abusers and stalkers frequently turn to stalking apps because they are undetectable even to sophisticated phone owners.
Business is booming for stalking app providers, even though their entire enterprise is arguably illegal. Federal and state wiretapping laws ban the manufacture, sale, or advertisement of devices knowing their design makes them primarily useful for the surreptitious interception of electronic communications. But those laws are rarely, if ever, enforced. …
Show And Tell?: Students' Personal Lives, Schools, And Parents, Emily Gold Waldman
Show And Tell?: Students' Personal Lives, Schools, And Parents, Emily Gold Waldman
Elisabeth Haub School of Law Faculty Publications
Public schools learn about their students' personal lives in many ways. Some are passive: a teacher observes a student kissing someone, or overhears a conversation among friends. But schools also engage in more active information-gathering about students' personal lives, through surveys and informal conversations between students and teachers, administrators, school psychologists, counselors, coaches, and other personnel. This Article explores the competing privacy considerations that result from such encounters. Once schools have learned highly personal information about their students, does it violate those students' privacy rights to disclose that information to their parents? Or does keeping the information secret violate the …
The Federalist Provenance Of The Principle Of Privacy, Elvin T. Lim
The Federalist Provenance Of The Principle Of Privacy, Elvin T. Lim
Research Collection School of Social Sciences
The right to privacy is the centerpiece of modern liberal constitutional thought in the United States. But liberals rarely invoke “the Founding” to justify this right, as if conceding that the right to privacy was somehow a radical departure from “original meaning,” perhaps pulled out of the hat by “activist” judges taking great interpretive liberties with the constitutional text. Far from being an unorthodox and modern invention, I argue here that privacy is a principle grounded in the very architecture of the Constitution as enumerated in its Articles, perhaps even more so than in particular sections of the Bill of …
Privacy And Competing Library Goals: How Can Library Directors Lead When Values Collide?, Anne Klinefelter
Privacy And Competing Library Goals: How Can Library Directors Lead When Values Collide?, Anne Klinefelter
Faculty Publications
No abstract provided.
Avoiding Unintended Disclosure: Representing Clients With Hiv And Aids, Lashanda Taylor Adams
Avoiding Unintended Disclosure: Representing Clients With Hiv And Aids, Lashanda Taylor Adams
Journal Articles
When the HIV/AIDS epidemic was initially recognized in the United States, many attorneys wondered what it would mean to represent a client with HIV. As the number of HIV-infected individuals grew, so did the need for attorneys to represent them. Specifically, attorneys questioned whether or not their duty of confidentiality would expose them to civil liability from failing to protect a third party.1 In response to this concern, several law review articles were written discussing the dilemma faced by attorneys bound by professional rules of conduct.2 These articles focused on the needs of the attorney and the public rather than …
Is There Anybody Out There? Analyzing The Regulation Of Children’S Privacy Online In The United States Of America And The European Union According To The Tbgi Analytical Framework By Eberlein Et Al, Nachshon Goltz
Transnational Business Governance Interactions Working Papers
This article analyzes the regulation of children’s privacy online, especially in the context of personal information collection as a commodity, in the United States of America (USA) and the European Union (EU) according to the Transnational Business Governance Interactions analytical framework proposed by Eberlein et al. This article reviews the regulatory structure of the field in these two jurisdictions, including global organizations, according to Elberlein et al components and questions. In the analysis, a map of the regulatory interactions within this global realm will be presented and discussed. Analysis of the influence of each interacting party and the degree of …
Big Data And Predictive Reasonable Suspicion, Andrew Ferguson
Big Data And Predictive Reasonable Suspicion, Andrew Ferguson
Articles in Law Reviews & Other Academic Journals
The Fourth Amendment requires “reasonable suspicion” to seize a suspect. As a general matter, the suspicion derives from information a police officer observes or knows. It is individualized to a particular person at a particular place. Most reasonable suspicion cases involve police confronting unknown suspects engaged in observable suspicious activities. Essentially, the reasonable suspicion doctrine is based on “small data” – discrete facts involving limited information and little knowledge about the suspect.But what if this small data is replaced by “big data”? What if police can “know” about the suspect through new networked information sources? Or, what if predictive analytics …