Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 15 of 15

Full-Text Articles in Privacy Law

Do Not Touch My Data: Exploring A Disclosure-Based Framework To Address Data Access, Francis Morency Apr 2023

Do Not Touch My Data: Exploring A Disclosure-Based Framework To Address Data Access, Francis Morency

Washington and Lee Journal of Civil Rights and Social Justice

Companies have too much control over people’s information. In the data marketplace, companies package and sell individuals’ data, and these individuals have little to no bargaining power over the process. Companies may freely buy and sell people’s data in the private sector for targeted marketing and behavior manipulation. In the justice system, an unchecked data marketplace leaves black and brown communities vulnerable to serious data access issues caused by predictive sentencing, for example. Risk assessment algorithms in predictive sentencing rely on data on individuals and run all relevant data points to provide the likelihood that a defendant will recidivate low …


Delineating The Legal Framework For Data Protection: A Fundamental Rights Approach Or Data Propertization?, Efe Lawrence Ogbeide Jan 2022

Delineating The Legal Framework For Data Protection: A Fundamental Rights Approach Or Data Propertization?, Efe Lawrence Ogbeide

Canadian Journal of Law and Technology

The Charter of Fundamental Rights of the European Union, like other key legal instruments around the globe, grants citizens the right to privacy in Article 7. The Charter, however, further provides for the right to data protection in Article 8. Simply put, the implication of Article 8 of the Charter is that the right to data protection is a fundamental right. The central question in this article is whether data protection indeed qualifies to be categorized as a fundamental right. If not, what other approach(es) to data protection may be implemented?


Responding To Deficiencies In The Architecture Of Privacy: Co-Regulation As The Path Forward For Data Protection On Social Networking Sites, Laurent Cre ́Peau Jan 2022

Responding To Deficiencies In The Architecture Of Privacy: Co-Regulation As The Path Forward For Data Protection On Social Networking Sites, Laurent Cre ́Peau

Canadian Journal of Law and Technology

Social Networking Sites like Facebook, Twitter and the like are a ubiquitous part of contemporary culture. Yet, as exemplified on numerous occasions, most recently in the Cambridge Analytica scandal that shook Facebook in 2018, these sites pose major concerns for personal data protection. Whereas self-regulation has characterized the general regulatory mindset since the early days of the Internet, it is no longer viable given the threat social media poses to user privacy. This article notes the deficiencies of self-regulatory models of privacy and contends jurisdictions like Canada should ensure they have strong data protection regulations to adequately protect the public. …


Use Of Unmanned Aircraft Systems And Regulatory Landscape: Unravelling The Future Challenges In The High Sky, K Kirthan Shenoy, Divya Tyagi Jan 2022

Use Of Unmanned Aircraft Systems And Regulatory Landscape: Unravelling The Future Challenges In The High Sky, K Kirthan Shenoy, Divya Tyagi

International Journal of Aviation, Aeronautics, and Aerospace

The individuals on the ground nowadays often observe objects distantly hover over the sky, which raises the question of who might be operating the object or what the object might record. Unmanned Aircraft Systems (UAS) or Drones today have quickly penetrated civilian, military, and commercial sectors. The drones or UAS, with the advancement of technology, are now capable of traversing long distances, having long endurance, and having multipurpose functionality. The UAS industry is fast expanding, with trade investment touching the billion-dollar mark in flourishing economies. The advent of the Covid 19 pandemic saw a steep rise in the use of …


Moving On From The Ombuds Model For Data Protection In Canada, Teresa Scassa Jun 2019

Moving On From The Ombuds Model For Data Protection In Canada, Teresa Scassa

Canadian Journal of Law and Technology

Both the Personal Information Protection and Electronic Documents Act (PIPEDA) and the Privacy Act adopt an ombuds model when it comes to addressing complaints by members of the public. This model is also present in other data protection laws, including public sector data protection laws at the provincial level, as well as personal health information protection legislation. The focus of this short paper is the model adopted in PIPEDA and its ongoing suitability. PIPEDA was designed to apply across the full range of private sector actors and is increasingly under strain in the big data society. These factors may make …


Digital Colonialism: The 21st Century Scramble For Africa Through The Extraction And Control Of User Data And The Limitations Of Data Protection Laws, Danielle Coleman May 2019

Digital Colonialism: The 21st Century Scramble For Africa Through The Extraction And Control Of User Data And The Limitations Of Data Protection Laws, Danielle Coleman

Michigan Journal of Race and Law

As Western technology companies increasingly rely on user data globally, extensive data protection laws and regulations emerged to ensure ethical use of that data. These same protections, however, do not exist uniformly in the resource-rich, infrastructure-poor African countries, where Western tech seeks to establish its presence. These conditions provide an ideal landscape for digital colonialism.

Digital colonialism refers to a modern-day “Scramble for Africa” where largescale tech companies extract, analyze, and own user data for profit and market influence with nominal benefit to the data source. Under the guise of altruism, large scale tech companies can use their power and …


Prioritizing Privacy In The Courts And Beyond, Babette Boliek Jul 2018

Prioritizing Privacy In The Courts And Beyond, Babette Boliek

Cornell Law Review

Big data has affected American life and business in a variety of ways—inspiring both technological development and industrial change. The legal protections for a person’s right to his or her own personal information, however, have not matched the growth in the collection and aggregation of data. These legal shortcomings are exacerbated when third party privacy interests are at stake in litigation. Judicial orders to compel sensitive data are expressly permitted even under the few privacy statutes that may limit data transfers. Historically, the Federal Rules of Civil Procedure favor generous disclosure of information. But as litigation becomes more technical and …


The Inadequate, Invaluable Fair Information Practices, Woodrow Hartzog Jun 2017

The Inadequate, Invaluable Fair Information Practices, Woodrow Hartzog

Maryland Law Review

No abstract provided.


The Shaky Ground Of The Right To Be Delisted, Miquel Peguera Jan 2016

The Shaky Ground Of The Right To Be Delisted, Miquel Peguera

Vanderbilt Journal of Entertainment & Technology Law

It has long been discussed whether individuals should have a "right to be forgotten" online to suppress old information that could seriously interfere with their privacy and data protection rights. In the landmark case of Google Spain v. Agencia Espafiola de Proteccion de Datos, the Court of Justice of the European Union (CJEU) addressed the particular question of whether, under EU Data Protection Law, individuals have a right to have links delisted from the list of search results in searches made on the basis of their name. It found that they do have this right--which can be best described as …


Privacy, Trusts And Cross-Border Transfers Of Personal Information: The Quebec Perspective In The Canadian Context, Eloise Gratton, Pierre-Christian Collins Hoffman Apr 2014

Privacy, Trusts And Cross-Border Transfers Of Personal Information: The Quebec Perspective In The Canadian Context, Eloise Gratton, Pierre-Christian Collins Hoffman

Dalhousie Law Journal

This paper argues that data protection laws apply to prevent the disclosure of certain information relating to trusts, which are increasingly being used .as business and investment vehicles. Given the broad scope of the concept of "personal information" found under both provincial and federal personal information protection statutes, arguments can be made that information relating to trust beneficiaries or trustees, where such beneficiaries or trustees are natural persons, enjoy some level of protection. Even where a trust contains an express choice of law clause providing that the laws of another province or country apply, Quebec conflict of laws rules may …


Returning To A Principled Basis For Data Protection, Gus Hosein Jun 2009

Returning To A Principled Basis For Data Protection, Gus Hosein

Chicago-Kent Law Review

Society must remain conscious of both pragmatic and principle-based rationales for information security rules. The identity card debate in the United Kingdom provides an example of exactly why a governmental information security approach that is sensitive to civil liberties would be the best approach to data protection. In contrast, we should be cautious of a balancing test that places security in parity with civil liberties and, therefore, erroneously allows pragmatism to triumph over principle.


When Mobile Phones Are Rfid-Equipped - Finding E.U.-U.S. Solutions To Protect Consumer Privacy And Facilitate Mobile Commerce, Nancy J. King Jan 2008

When Mobile Phones Are Rfid-Equipped - Finding E.U.-U.S. Solutions To Protect Consumer Privacy And Facilitate Mobile Commerce, Nancy J. King

Michigan Telecommunications & Technology Law Review

New mobile phones have been designed to include delivery of mobile advertising and other useful location-based services, but have they also been designed to protect consumers' privacy? One of the key enabling technologies for these new types of phones and new mobile services is Radio Frequency Identification (RFID), a wireless communication technology that enables the unique identification of tagged objects. In the case of RFID-enabled mobile phones, the personal nature of the devices makes it very likely that, by locating a phone, businesses will also be able to locate its owner. Consumers are currently testing new RFID-enabled phones around the …


Personal Medical Information: Privacy Or Personal Data Protection?, Wilhelm Peekhaus Apr 2006

Personal Medical Information: Privacy Or Personal Data Protection?, Wilhelm Peekhaus

Canadian Journal of Law and Technology

Some of the existing literature concerning the privacy of health information seems to suggest that medical information has a particularly special nature; either through its oft-cited association with dignity or the need for its ‘‘unobstructed’’ use by health care practitioners for a variety of reasons. It is against such a backdrop that this paper will review and compare a number of legislative mechanisms that have been designed to meet the challenge of safeguarding the privacy of personal information without completely hindering the continued flow of information required by economic and health care systems. An attempt will be made to situate …


'Code' And The Slow Erosion Of Privacy, Bert-Jaap Koops, Ronald Leenes Sep 2005

'Code' And The Slow Erosion Of Privacy, Bert-Jaap Koops, Ronald Leenes

Michigan Telecommunications & Technology Law Review

The notion of software code replacing legal code as a mechanism to control human behavior--"code as law"--is often illustrated with examples in intellectual property and freedom of speech. This Article examines the neglected issue of the impact of "code as law" on privacy. To what extent is privacy-related "code" being used, either to undermine or to enhance privacy? On the basis of cases in the domains of law enforcement, national security, E-government, and commerce, it is concluded that technology rarely incorporates specific privacy-related norms. At the same time, however, technology very often does have clear effects on privacy, as it …


Constitutional Issues In Information Privacy, Fred H. Cate, Robert Litan Oct 2002

Constitutional Issues In Information Privacy, Fred H. Cate, Robert Litan

Michigan Telecommunications & Technology Law Review

The U.S. Constitution has been largely ignored in the recent flurry of privacy laws and regulations designed to protect personal information from incursion by the private sector despite the fact that many of these enactments and efforts to enforce them significantly implicate the First Amendment. Questions about the role of the Constitution have assumed new importance in the aftermath of the September 11, 2001 terrorist attacks on the World Trade Center and the Pentagon. Recent efforts to identify and apprehend terrorists and to protect against future attacks threaten to weaken constitutional protections against government intrusions into personal privacy. However, these …