Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (26)
- Information Security (26)
- Physical Sciences and Mathematics (26)
- Internet Law (19)
- Computer Law (15)
-
- International Law (15)
- Science and Technology Law (15)
- Social and Behavioral Sciences (9)
- European Law (7)
- Asian Studies (5)
- Comparative and Foreign Law (5)
- First Amendment (5)
- Intellectual Property Law (5)
- International and Area Studies (5)
- Fourth Amendment (4)
- Health Law and Policy (4)
- Constitutional Law (3)
- Consumer Protection Law (3)
- Human Rights Law (3)
- Administrative Law (2)
- Business (2)
- Business Organizations Law (2)
- Commercial Law (2)
- Communications Law (2)
- International Trade Law (2)
- Law and Race (2)
- Law and Society (2)
- Legislation (2)
- Institution
-
- Maurer School of Law: Indiana University (30)
- Boston University School of Law (10)
- Singapore Management University (6)
- Schulich School of Law, Dalhousie University (5)
- University of Michigan Law School (5)
-
- Selected Works (4)
- Duke Law (3)
- University of Pennsylvania Carey Law School (3)
- Chicago-Kent College of Law (2)
- Loyola University Chicago, School of Law (2)
- University of Baltimore Law (2)
- University of Colorado Law School (2)
- Barry University School of Law (1)
- City University of New York (CUNY) (1)
- Cornell University Law School (1)
- Embry-Riddle Aeronautical University (1)
- Georgetown University Law Center (1)
- Texas A&M University School of Law (1)
- The Peter A. Allard School of Law (1)
- University of Maryland Francis King Carey School of Law (1)
- University of Massachusetts School of Law (1)
- University of Washington School of Law (1)
- Vanderbilt University Law School (1)
- Washington and Lee University School of Law (1)
- Western University (1)
- Publication Year
- Publication
-
- Articles by Maurer Faculty (30)
- Faculty Scholarship (15)
- All Faculty Scholarship (5)
- Canadian Journal of Law and Technology (4)
- Research Collection Yong Pung How School Of Law (4)
-
- Michigan Telecommunications & Technology Law Review (3)
- Centre for AI & Data Governance (2)
- Faculty Publications & Other Works (2)
- Publications (2)
- W. Gregory Voss (2)
- Articles (1)
- Chicago-Kent Law Review (1)
- Cornell Law Review (1)
- Dalhousie Law Journal (1)
- Dissertations and Theses (1)
- Electronic Thesis and Dissertation Repository (1)
- Elizabeth De Armond (1)
- Faculty Publications (1)
- Fellow, Adjunct, Lecturer, and Research Scholar Works (1)
- Georgetown Law Faculty Publications and Other Works (1)
- International Journal of Aviation, Aeronautics, and Aerospace (1)
- Maryland Law Review (1)
- Michigan Journal of Race and Law (1)
- Penn Program on Regulation Podcasts (1)
- Transnational Business Governance Interactions Working Papers (1)
- Vanderbilt Journal of Entertainment & Technology Law (1)
- Warren Bartholomew CHIK (1)
- Washington and Lee Journal of Civil Rights and Social Justice (1)
- Publication Type
Articles 31 - 60 of 87
Full-Text Articles in Privacy Law
Introducing The Global Data Privacy Prize, Fred H. Cate, Christopher Kuner, Orla Lynskey, Christopher Millard, Nora Ni Loideain, Dan Jerker B. Svantesson
Introducing The Global Data Privacy Prize, Fred H. Cate, Christopher Kuner, Orla Lynskey, Christopher Millard, Nora Ni Loideain, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
If The Legislature Had Been Serious About Data Privacy..., Fred H. Cate, Christopher Kuner, Orla Lynskey, Christopher Millard, Nora Ni Loideain, Dan Jerker B. Svantesson
If The Legislature Had Been Serious About Data Privacy..., Fred H. Cate, Christopher Kuner, Orla Lynskey, Christopher Millard, Nora Ni Loideain, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
The Pathologies Of Digital Consent, Neil M. Richards, Woodrow Hartzog
The Pathologies Of Digital Consent, Neil M. Richards, Woodrow Hartzog
Faculty Scholarship
Consent permeates both our law and our lives — especially in the digital context. Consent is the foundation of the relationships we have with search engines, social networks, commercial web sites, and any one of the dozens of other digitally mediated businesses we interact with regularly. We are frequently asked to consent to terms of service, privacy notices, the use of cookies, and so many other commercial practices. Consent is important, but it’s possible to have too much of a good thing. As a number of scholars have documented, while consent models permeate the digital consumer landscape, the practical conditions …
Protecting Consumers' Personal Data In The Digital World: Challenges And Changes, Man Yip
Protecting Consumers' Personal Data In The Digital World: Challenges And Changes, Man Yip
Research Collection Yong Pung How School Of Law
At the Personal Data Protection Seminar 2017, Dr Yaacob Ibrahim, Minister for Communications and Information, said that Singapore must “aspire towards a high standard of data protection that strengthens trust with the public, gives confidence to customers whose data is collected and used, while providing an environment for companies to thrive in the digital economy”.
Protecting Consumers' Personal Data In The Digital World: Challenges And Changes, Man Yip
Protecting Consumers' Personal Data In The Digital World: Challenges And Changes, Man Yip
Research Collection Yong Pung How School Of Law
At the Personal Data Protection Seminar 2017, Dr Yaacob Ibrahim, Minister for Communications and Information, said that Singapore must “aspire towards a high standard of data protection that strengthens trust with the public, gives confidence to customers whose data is collected and used, while providing an environment for companies to thrive in the digital economy”.
Prioritizing Privacy In The Courts And Beyond, Babette Boliek
Prioritizing Privacy In The Courts And Beyond, Babette Boliek
Cornell Law Review
Big data has affected American life and business in a variety of ways—inspiring both technological development and industrial change. The legal protections for a person’s right to his or her own personal information, however, have not matched the growth in the collection and aggregation of data. These legal shortcomings are exacerbated when third party privacy interests are at stake in litigation. Judicial orders to compel sensitive data are expressly permitted even under the few privacy statutes that may limit data transfers. Historically, the Federal Rules of Civil Procedure favor generous disclosure of information. But as litigation becomes more technical and …
Humans Forget, Machines Remember: Artificial Intelligence And The Right To Be Forgotten, Tiffany Li, Eduard Fosch Villaronga, Peter Kieseberg
Humans Forget, Machines Remember: Artificial Intelligence And The Right To Be Forgotten, Tiffany Li, Eduard Fosch Villaronga, Peter Kieseberg
Faculty Scholarship
To understand the Right to be Forgotten in context of artificial intelligence, it is necessary to first delve into an overview of the concepts of human and AI memory and forgetting. Our current law appears to treat human and machine memory alike – supporting a fictitious understanding of memory and forgetting that does not comport with reality. (Some authors have already highlighted the concerns on the perfect remembering.) This Article will examine the problem of AI memory and the Right to be Forgotten, using this example as a model for understanding the failures of current privacy law to reflect the …
Tactful Inattention: Erving Goffman, Privacy In The Digital Age, And The Virtue Of Averting One's Eyes, Elizabeth De Armond
Tactful Inattention: Erving Goffman, Privacy In The Digital Age, And The Virtue Of Averting One's Eyes, Elizabeth De Armond
All Faculty Scholarship
No abstract provided.
Expanding The Artificial Intelligence-Data Protection Debate, Fred H. Cate, Christopher Kuner, Orla Lynskey, Christopher Millard, Nora Ni Loideain, Dan Jerker B. Svantesson
Expanding The Artificial Intelligence-Data Protection Debate, Fred H. Cate, Christopher Kuner, Orla Lynskey, Christopher Millard, Nora Ni Loideain, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
The Case Against Idealising Control, Woodrow Hartzog
The Case Against Idealising Control, Woodrow Hartzog
Faculty Scholarship
Seemingly everyone, from scholars, industry, and privacy advocates to lawmakers, regulators, and judges seems to have settled on the idea that the key to privacy is control over personal information. But in practice, there is only so much a person can do. Control is far too precious and finite of a concept to meaningfully scale. It will never work for personal data mediated by technology.
Now we have an entire empire of data protection built around the crumbling edifice of control. The idealisation of control in modern data protection regimes like the GDPR and the ePrivacy Directive creates a pursuit …
Blockchain Versus Data Protection, Fred H. Cate, Christopher Kuner, Orla Lynskey, Christopher Millard, Nora Ni Loideain, Dan Jerker B. Svantesson
Blockchain Versus Data Protection, Fred H. Cate, Christopher Kuner, Orla Lynskey, Christopher Millard, Nora Ni Loideain, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
An Unstoppable Force And An Immoveable Object? Eu Data Protection Law And National Security, Fred H. Cate, Christopher Kuner, Orla Lynskey, Christopher Millard, Nora Ni Loideain, Dan Jerker B. Svantesson
An Unstoppable Force And An Immoveable Object? Eu Data Protection Law And National Security, Fred H. Cate, Christopher Kuner, Orla Lynskey, Christopher Millard, Nora Ni Loideain, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
Tactful Inattention: Erving Goffman, Privacy In The Digital Age, And The Virtue Of Averting One's Eyes, Elizabeth De Armond
Tactful Inattention: Erving Goffman, Privacy In The Digital Age, And The Virtue Of Averting One's Eyes, Elizabeth De Armond
Elizabeth De Armond
No abstract provided.
The Inadequate, Invaluable Fair Information Practices, Woodrow Hartzog
The Inadequate, Invaluable Fair Information Practices, Woodrow Hartzog
Maryland Law Review
No abstract provided.
The Rise Of Cybersecurity And Its Impact On Data Protection, Fred H. Cate, Christopher Kuner, Dan Jerker B. Svantesson, Orla Lynskey, Christopher Millard
The Rise Of Cybersecurity And Its Impact On Data Protection, Fred H. Cate, Christopher Kuner, Dan Jerker B. Svantesson, Orla Lynskey, Christopher Millard
Articles by Maurer Faculty
No abstract provided.
The Gdpr As A Chance To Break Down Borders, Fred H. Cate, Christopher Kuner, Dan Jerker B. Svantesson, Orla Lynskey, Nora Ni Loideain
The Gdpr As A Chance To Break Down Borders, Fred H. Cate, Christopher Kuner, Dan Jerker B. Svantesson, Orla Lynskey, Nora Ni Loideain
Articles by Maurer Faculty
No abstract provided.
Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen
Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen
All Faculty Scholarship
Big Data is the vast quantities of information amenable to large-scale collection, storage, and analysis. Using such data, companies and researchers can deploy complex algorithms and artificial intelligence technologies to reveal otherwise unascertained patterns, links, behaviors, trends, identities, and practical knowledge. The information that comprises Big Data arises from government and business practices, consumer transactions, and the digital applications sometimes referred to as the “Internet of Things.” Individuals invisibly contribute to Big Data whenever they live digital lifestyles or otherwise participate in the digital economy, such as when they shop with a credit card, get treated at a hospital, apply …
The Shaky Ground Of The Right To Be Delisted, Miquel Peguera
The Shaky Ground Of The Right To Be Delisted, Miquel Peguera
Vanderbilt Journal of Entertainment & Technology Law
It has long been discussed whether individuals should have a "right to be forgotten" online to suppress old information that could seriously interfere with their privacy and data protection rights. In the landmark case of Google Spain v. Agencia Espafiola de Proteccion de Datos, the Court of Justice of the European Union (CJEU) addressed the particular question of whether, under EU Data Protection Law, individuals have a right to have links delisted from the list of search results in searches made on the basis of their name. It found that they do have this right--which can be best described as …
The Notion And Practice Of Reputation And Professional Identity In Social Networking: From K-12 Through Law School, Roberta Bobbie Studwell
The Notion And Practice Of Reputation And Professional Identity In Social Networking: From K-12 Through Law School, Roberta Bobbie Studwell
Faculty Scholarship
No abstract provided.
The Language Of Data Privacy Law (And How It Differs From Reality), Fred H. Cate, Christopher Kuner, Dan Jerker B. Svantesson, Orla Lynskey, Christopher Millard
The Language Of Data Privacy Law (And How It Differs From Reality), Fred H. Cate, Christopher Kuner, Dan Jerker B. Svantesson, Orla Lynskey, Christopher Millard
Articles by Maurer Faculty
No abstract provided.
A Time Of Turmoil, Fred H. Cate, Christopher Kuner, Dan Jerker B. Svantesson, Orla Lynsky, Christopher Millard
A Time Of Turmoil, Fred H. Cate, Christopher Kuner, Dan Jerker B. Svantesson, Orla Lynsky, Christopher Millard
Articles by Maurer Faculty
No abstract provided.
The Global Data Protection Implications Of "Brexit", Fred H. Cate, Christopher Kuner, Dan Jerker B. Svantesson, Orla Lynskey, Christopher Millard
The Global Data Protection Implications Of "Brexit", Fred H. Cate, Christopher Kuner, Dan Jerker B. Svantesson, Orla Lynskey, Christopher Millard
Articles by Maurer Faculty
No abstract provided.
Is There Anybody Out There? Analyzing The Regulation Of Children’S Privacy Online In The United States Of America And The European Union According To The Tbgi Analytical Framework By Eberlein Et Al, Nachshon Goltz
Transnational Business Governance Interactions Working Papers
This article analyzes the regulation of children’s privacy online, especially in the context of personal information collection as a commodity, in the United States of America (USA) and the European Union (EU) according to the Transnational Business Governance Interactions analytical framework proposed by Eberlein et al. This article reviews the regulatory structure of the field in these two jurisdictions, including global organizations, according to Elberlein et al components and questions. In the analysis, a map of the regulatory interactions within this global realm will be presented and discussed. Analysis of the influence of each interacting party and the degree of …
The Pond Betwixt: Differences In The U.S.-Eu Data Protection/Safe Harbor Negotiation, Richard J. Peltz-Steele
The Pond Betwixt: Differences In The U.S.-Eu Data Protection/Safe Harbor Negotiation, Richard J. Peltz-Steele
Faculty Publications
This article analyzes the differing perspectives that animate US and EU conceptions of privacy in the context of data protection. It begins by briefly reviewing the two continental approaches to data protection and then explains how the two approaches arise in a context of disparate cultural traditions with respect to the role of law in society. In light of those disparities, Underpinning contemporary data protection regulation is the normative value that both US and EU societies place on personal privacy. Both cultures attribute modern privacy to the famous Warren-Brandeis article in 1890, outlining a "right to be let alone." But …
The Data Protection Credibility Crisis, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson, Orla Lynskey
The Data Protection Credibility Crisis, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson, Orla Lynskey
Articles by Maurer Faculty
No abstract provided.
Risk Management In Data Protection, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson, Orla Lynskey
Risk Management In Data Protection, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson, Orla Lynskey
Articles by Maurer Faculty
No abstract provided.
Internet Balkanization Gathers Pace: Is Privacy The Real Driver?, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson, Orla Lynskey
Internet Balkanization Gathers Pace: Is Privacy The Real Driver?, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson, Orla Lynskey
Articles by Maurer Faculty
No abstract provided.
The Singapore Personal Data Protection Act And An Assessment Of Future Trends In Data Privacy, Warren B. Chik
The Singapore Personal Data Protection Act And An Assessment Of Future Trends In Data Privacy, Warren B. Chik
Warren Bartholomew CHIK
In the first part of this paper, I will present and explain the Singapore Personal Data Protection Act (“PDPA”) in the context of legislative developments in the Asian region and against the well-established international baseline privacy standards. In the course of the above evaluation, reference will be made to the national laws and policy on data privacy prior to the enactment of the PDPA as well as current social and market practices in relation to personal data. In the second part of this paper, I will decipher and assess the future trends in data privacy reform and the future development …
Privacy, Trusts And Cross-Border Transfers Of Personal Information: The Quebec Perspective In The Canadian Context, Eloise Gratton, Pierre-Christian Collins Hoffman
Privacy, Trusts And Cross-Border Transfers Of Personal Information: The Quebec Perspective In The Canadian Context, Eloise Gratton, Pierre-Christian Collins Hoffman
Dalhousie Law Journal
This paper argues that data protection laws apply to prevent the disclosure of certain information relating to trusts, which are increasingly being used .as business and investment vehicles. Given the broad scope of the concept of "personal information" found under both provincial and federal personal information protection statutes, arguments can be made that information relating to trust beneficiaries or trustees, where such beneficiaries or trustees are natural persons, enjoy some level of protection. Even where a trust contains an express choice of law clause providing that the laws of another province or country apply, Quebec conflict of laws rules may …
The (Data Privacy) Law Hasn't Even Checked In When Technology Takes Off, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
The (Data Privacy) Law Hasn't Even Checked In When Technology Takes Off, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.