Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Science and Technology Law (14)
- Fourth Amendment (12)
- Internet Law (12)
- Constitutional Law (11)
- Computer Law (10)
-
- Law and Society (10)
- Family Law (7)
- Intellectual Property Law (7)
- Law and Politics (7)
- Legislation (7)
- National Security Law (7)
- Civil Law (6)
- Commercial Law (6)
- Contracts (6)
- Human Rights Law (6)
- International Law (6)
- Law and Gender (6)
- Public Law and Legal Theory (6)
- Social Welfare Law (6)
- Supreme Court of the United States (6)
- Bankruptcy Law (5)
- Business Organizations Law (5)
- Civil Rights and Discrimination (5)
- Criminal Law (5)
- Criminal Procedure (5)
- First Amendment (5)
- Health Law and Policy (5)
- International Trade Law (5)
- Institution
-
- Seattle University School of Law (4)
- University of Massachusetts School of Law (4)
- Selected Works (3)
- Boston University School of Law (2)
- Claremont Colleges (2)
-
- Columbia Law School (2)
- Roger Williams University (2)
- Schulich School of Law, Dalhousie University (2)
- The Catholic University of America, Columbus School of Law (2)
- Universitas Indonesia (2)
- University of Colorado Law School (2)
- University of Richmond (2)
- American University Washington College of Law (1)
- Bowdoin College (1)
- Butler University (1)
- Chicago-Kent College of Law (1)
- Embry-Riddle Aeronautical University (1)
- Georgetown University Law Center (1)
- Loyola Marymount University and Loyola Law School (1)
- Mississippi State University (1)
- Southern Methodist University (1)
- St. Thomas University College of Law (1)
- University of New Hampshire (1)
- Publication Year
- Publication
-
- Seattle University Law Review (4)
- Faculty Publications (3)
- Faculty Scholarship (3)
- "Dharmasisya” Jurnal Program Magister Hukum FHUI (2)
- CMC Senior Theses (2)
-
- Publications (2)
- Reports & Public Policy Documents (2)
- University of Richmond Law Review (2)
- All Faculty Scholarship (1)
- Catholic University Law Review (1)
- CommLaw Conspectus: Journal of Communications Law and Technology Policy (1993-2015) (1)
- Daxton "Chip" Stewart (1)
- Elizabeth De Armond (1)
- Emancipations: A Journal of Critical Social Analysis (1)
- Faculty Books (1)
- Faculty Journal Articles and Book Chapters (1)
- Georgetown Law Faculty Publications and Other Works (1)
- Graduate Scholarship and Professional Work (1)
- Honors Projects (1)
- Joint PIJIP/TLS Research Paper Series (1)
- Journal of Digital Forensics, Security and Law (1)
- Law Faculty Scholarship (1)
- Law School Blogs (1)
- Life of the Law School (1993- ) (1)
- Lori B. Andrews (1)
- Loyola of Los Angeles Entertainment Law Review (1)
- St. Thomas Law Review (1)
- University of Massachusetts Law Review (1)
- Publication Type
Articles 1 - 30 of 40
Full-Text Articles in Privacy Law
How To Interpret The Securities Laws?, Zachary J. Gubler
How To Interpret The Securities Laws?, Zachary J. Gubler
Seattle University Law Review
In discussions of the federal securities laws, the SEC usually gets most of the attention. This makes some sense. After all, it is the agency charged with administrating the securities laws and regulating the industry as a whole. It makes the majority of the laws; it engages in enforcement actions; it reacts to crises; and it, or sometimes even its individual commissioners, intervene publicly in policy debates. Often overlooked in such discussion, however, is the role of the Supreme Court in shaping securities law, and a new book by Adam Pritchard and Robert Thompson demonstrates why this is an oversight. …
Unavoidability In U.S. Privacy Law, Laura M. Moy
Unavoidability In U.S. Privacy Law, Laura M. Moy
Georgetown Law Faculty Publications and Other Works
Why is U.S. privacy law structured the way it is, with a series of sectoral laws rather than a cross-sectoral law or laws? Why does U.S. privacy law protect information shared in certain contexts—such as information shared with an attorney, a healthcare provider, or a financial provider—rather than particular types of information? One possibility is that sectoral laws apply to contexts in which people typically share highly “sensitive” information containing intimate secrets or with the potential to harm them financially or psychologically.
But this Article argues that there is something else at play—that in fact, an under-discussed and underappreciated factor …
Asking For It: Gendered Dimensions Of Surveillance Capitalism, Jessica Rizzo
Asking For It: Gendered Dimensions Of Surveillance Capitalism, Jessica Rizzo
Emancipations: A Journal of Critical Social Analysis
Advertising and privacy were once seen as mutually antagonistic. In the 1950s and 1960s, Americans went to court to fight for their right to be free from the invasion of privacy presented by unwanted advertising, but a strange realignment took place in the 1970s. Radical feminists were among those who were extremely concerned about the collection and computerization of personal data—they worried about private enterprise getting a hold of that data and using it to target women—but liberal feminists went in a different direction, making friends with advertising because they saw it as strategically valuable.
Liberal feminists argued that in …
Confused About Copyright?, Sara Anne Hook
Confused About Copyright?, Sara Anne Hook
Graduate Scholarship and Professional Work
No abstract provided.
Sanksi Hukuman Mati Bagi Penyalahguna Narkotika Dalam Perspektif Ham Berdasarkan Konstitusi, Dharma Rozali Azhar D
Sanksi Hukuman Mati Bagi Penyalahguna Narkotika Dalam Perspektif Ham Berdasarkan Konstitusi, Dharma Rozali Azhar D
"Dharmasisya” Jurnal Program Magister Hukum FHUI
The death penalty is a legal act that is legitimized by the state. In the context of the constitution, the death penalty has created a contradiction in the norms in Article 28 I paragraph (1) and Article 28 J paragraph (1) and paragraph (2) which specifically focus on the right to life as a fundamental right that is very fundamental and divine in nature and the right to life of people. others who also may not be removed by anyone on purpose for any reason. The death penalty in the context of narcotics does not aim to repay crime for …
A Synthesis Of The Science And Law Relating To Eyewitness Misidentifications And Recommendations For How Police And Courts Can Reduce Wrongful Convictions Based On Them, Henry F. Fradella
A Synthesis Of The Science And Law Relating To Eyewitness Misidentifications And Recommendations For How Police And Courts Can Reduce Wrongful Convictions Based On Them, Henry F. Fradella
Seattle University Law Review
The empirical literature on perception and memory consistently demonstrates the pitfalls of eyewitness identifications. Exoneration data lend external validity to these studies. With the goal of informing law enforcement officers, prosecutors, criminal defense attorneys, judges, and judicial law clerks about what they can do to reduce wrongful convictions based on misidentifications, this Article presents a synthesis of the scientific knowledge relevant to how perception and memory affect the (un)reliability of eyewitness identifications. The Article situates that body of knowledge within the context of leading case law. The Article then summarizes the most current recommendations for how law enforcement personnel should—and …
Politik Hukum Dalam Penegakan Hukum Di Indonesia, Anita Anita
Politik Hukum Dalam Penegakan Hukum Di Indonesia, Anita Anita
"Dharmasisya” Jurnal Program Magister Hukum FHUI
Law is a guide and rules related to the concept of social life and will always be in accordance with the conditions of society. Law is a demand to be able to provide justice, meaning that the law is always faced with the question of whether the law can bring about justice. In relation to the legal concept, legal politics is defined as an activity that determines the patterns and methods of shaping law, supervises the operation of the law, and reforms the law for the purposes of the State. Therefore, law is a determinant of politics, and is also …
Three Observations About Justice Alito's Draft Opinion In Dobbs - Commentary, John M. Greabe
Three Observations About Justice Alito's Draft Opinion In Dobbs - Commentary, John M. Greabe
Law Faculty Scholarship
[Excerpt] "There is much to say about Justice Samuel Alito's draft opinion in Dobbs v. Jackson Women's Health Organization, which was leaked from the United States Supreme Court on May 2 [2022].
Obviously, the most significant direct consequence of the proposed decision, which overrules Roe v. Wade (1973) and Planned Parenthood v. Casey (1992) while upholding the constitutionality of a Mississippi law that outlaws most abortions after 15 weeks of pregnancy, would be the restriction or elimination of abortion services throughout much of the nation. This will have all sorts of attendant consequences, large and smaller, many of which …
Submission To The Province Of Nova Scotia On Its Review Of The Intimate Images And Cyber-Protection Act - Leaf, Suzie Dunn, Rosel Kim
Submission To The Province Of Nova Scotia On Its Review Of The Intimate Images And Cyber-Protection Act - Leaf, Suzie Dunn, Rosel Kim
Reports & Public Policy Documents
The Women’s Legal Education and Action Fund (LEAF) commends the Nova Scotia government for reviewing its Intimate Images and Cyber-protection Act (the Act) and seeking public input for this review. Nova Scotia has been, and continues to be, a leader in Canada for its role in advancing innovative laws and supports for people targeted by technology-facilitated violence (TFV), digital abuse, and the non-consensual distribution of intimate images (NCDII). As these forms of harmful behaviour evolve and become better understood, it is important to revisit this legislation to assess whether it is providing meaningful and accessible responses to such serious social …
Chinese Technology Platforms Operating In The United States: Assessing The Threat (Originally Published As A Joint Report Of The National Security, Technology, And Law Working Group At The Hoover Institution At Stanford University And The Tech, Law & Security Program At American University Washington College Of Law), Gary Corn, Jennifer Daskal, Jack Goldsmith, Chris Inglis, Paul Rosenzweig, Samm Sacks, Bruce Schneier, Alex Stamos, Vincent Stewart
Chinese Technology Platforms Operating In The United States: Assessing The Threat (Originally Published As A Joint Report Of The National Security, Technology, And Law Working Group At The Hoover Institution At Stanford University And The Tech, Law & Security Program At American University Washington College Of Law), Gary Corn, Jennifer Daskal, Jack Goldsmith, Chris Inglis, Paul Rosenzweig, Samm Sacks, Bruce Schneier, Alex Stamos, Vincent Stewart
Joint PIJIP/TLS Research Paper Series
No abstract provided.
Privacy-As-Property: A New Fundamental Approach To The Right To Privacy And The Impact This Will Have On The Law And Corporations, Sevion Dacosta
Privacy-As-Property: A New Fundamental Approach To The Right To Privacy And The Impact This Will Have On The Law And Corporations, Sevion Dacosta
CMC Senior Theses
The most popular conception of the right to privacy stems from Warren and Brandeis’s description of privacy as “the right to be left alone.” This theory ultimately points to a more fundamental approach to the right to privacy rooted in property rights. This fundamental approach - which I call privacy-as-property - is what I establish in this paper. I argue that the Lockean concept of property that “every man has a property in his own person” provides the foundation for the right to privacy. Privacy-as-property begins with the fundamental right to control oneself. Because of this intrinsic right, your property …
Cryptography, Passwords, Privacy, And The Fifth Amendment, Gary C. Kessler, Ann M. Phillips
Cryptography, Passwords, Privacy, And The Fifth Amendment, Gary C. Kessler, Ann M. Phillips
Journal of Digital Forensics, Security and Law
Military-grade cryptography has been widely available at no cost for personal and commercial use since the early 1990s. Since the introduction of Pretty Good Privacy (PGP), more and more people encrypt files and devices, and we are now at the point where our smartphones are encrypted by default. While this ostensibly provides users with a high degree of privacy, compelling a user to provide a password has been interpreted by some courts as a violation of our Fifth Amendment protections, becoming an often insurmountable hurdle to law enforcement lawfully executing a search warrant. This paper will explore some of the …
Law In The Time Of Covid-19, Katharina Pistor
Law In The Time Of Covid-19, Katharina Pistor
Faculty Books
The COVID-19 crisis has ended and upended lives around the globe. In addition to killing over 160,000 people, more than 35,000 in the United States alone, its secondary effects have been as devastating. These secondary effects pose fundamental challenges to the rules that govern our social, political, and economic lives. These rules are the domain of lawyers. Law in the Time of COVID-19 is the product of a joint effort by members of the faculty of Columbia Law School and several law professors from other schools.
This volume offers guidance for thinking about some the most pressing legal issues the …
Governing The Internet: The Extraterritorial Effects Of The General Data Protection Regulation, Sasa Jovanovic
Governing The Internet: The Extraterritorial Effects Of The General Data Protection Regulation, Sasa Jovanovic
Honors Projects
The advent of the commercial Internet has introduced novel challenges to global governance because of the transnational nature of shared data flows, creating interdependence that may result in inter-state cooperation or competition. Data protection laws that are designed to ensure citizens’ right to privacy are one of the primary tool used by states to extend control over data flows. The European Union’s (EU) General Data Protection Regulation (2016) is widely regarded as the strongest data protection law in the world, and therefore may serve as a barrier to the openness of the Internet. The GDPR is both an instance of …
An Analysis On Biometric Privacy Data Regulation: A Pivot Towards Legislation Which Supports The Individual Consumer's Privacy Rights In Spite Of Corporate Protections, Carla Llaneza
St. Thomas Law Review
This Comment will address the different ways in which biometric data has become an integral part of everyday American life, whether it be through the use of facial recognition for national security or the use of fingerprinting to access an individual’s smartphone. Part II will further discuss how biometric data privacy legislation, specifically as set out in the Biometric Illinois Privacy Act (“BIPA”), has become prominent and will analyze its effects on the legal rights of consumers to bring suit against private entities. Part III will discuss the present solutions available to consumers who fall victim to companies who distribute …
Law School News: A Spring Break That Teaches - And Gives Back 03/11/2019, Edward Fitzpatrick
Law School News: A Spring Break That Teaches - And Gives Back 03/11/2019, Edward Fitzpatrick
Life of the Law School (1993- )
No abstract provided.
From Innovation To Abuse: Does The Internet Still Need Section 230 Immunity?, Benjamin Volpe
From Innovation To Abuse: Does The Internet Still Need Section 230 Immunity?, Benjamin Volpe
Catholic University Law Review
In 1996, Congress passed the Communications Decency Act to allow the screening of offensive material from the internet, while preserving the continued development of the internet economy without burdensome regulation. However, for years, online intermediaries have successfully used the Act as a shield from liability when third parties use their online services to commit tortious or criminal acts. This Comment argues that a wholly-unregulated internet is no longer necessary to preserve the once-fledgling internet economy. After evaluating various approaches to intermediary liability, this Comment also argues that Congress should take a more comprehensive look at consumer protection online and establish …
Humans Forget, Machines Remember: Artificial Intelligence And The Right To Be Forgotten, Tiffany Li, Eduard Fosch Villaronga, Peter Kieseberg
Humans Forget, Machines Remember: Artificial Intelligence And The Right To Be Forgotten, Tiffany Li, Eduard Fosch Villaronga, Peter Kieseberg
Faculty Scholarship
To understand the Right to be Forgotten in context of artificial intelligence, it is necessary to first delve into an overview of the concepts of human and AI memory and forgetting. Our current law appears to treat human and machine memory alike – supporting a fictitious understanding of memory and forgetting that does not comport with reality. (Some authors have already highlighted the concerns on the perfect remembering.) This Article will examine the problem of AI memory and the Right to be Forgotten, using this example as a model for understanding the failures of current privacy law to reflect the …
Planet Netsweeper, Jakub Dalek, Lex Gill, Bill Marczak, Sarah Mckune, Naser Noor, Joshua Oliver, Jonathon Penney, Adam Senft, Ronald Deibert
Planet Netsweeper, Jakub Dalek, Lex Gill, Bill Marczak, Sarah Mckune, Naser Noor, Joshua Oliver, Jonathon Penney, Adam Senft, Ronald Deibert
Reports & Public Policy Documents
Internet filtering technologies play a critical role in shaping access to information online. Whether we are connecting to the Internet from our homes, coffee shops, libraries, or places of work, software that inspects, manages, and/or blocks our communications has become commonplace. When used at the level of large, consumer-facing Internet Service Providers (ISPs), Internet filtering technologies can have significant human rights impacts. A growing number of governments employ Internet filtering systems at this scale in order to undertake national-level censorship of the Internet. Filtered content ranges from pornography, hate speech, and speech promoting or inciting violence, to political opposition websites, …
Tactful Inattention: Erving Goffman, Privacy In The Digital Age, And The Virtue Of Averting One's Eyes, Elizabeth De Armond
Tactful Inattention: Erving Goffman, Privacy In The Digital Age, And The Virtue Of Averting One's Eyes, Elizabeth De Armond
All Faculty Scholarship
No abstract provided.
Ferpa Close-Up: When Video Captures Violence And Injury, Richard J. Peltz-Steele, Kitty L. Cone
Ferpa Close-Up: When Video Captures Violence And Injury, Richard J. Peltz-Steele, Kitty L. Cone
Faculty Publications
Federal privacy law is all to often misconstrued or perverted to preclude the disclosure of video recordings that capture students victimized by violent crime or tortious injury. This misuse of federal law impedes transparency and accountability and, in many cases, even jeopardizes the health, safety, and lives of children. When properly construed, however, federal law is no bar to disclosure and, at least in public schools, works in tandem with freedom of information laws to ensure disclosure. This Article posits that without unequivocal guidance from federal administrative authorities, uncertainty regarding the disclosure of such recordings will continue to linger, jeopardizing …
Katz V. United States: Back To The Future?, Michael Vitiello
Katz V. United States: Back To The Future?, Michael Vitiello
University of Richmond Law Review
No abstract provided.
Tactful Inattention: Erving Goffman, Privacy In The Digital Age, And The Virtue Of Averting One's Eyes, Elizabeth De Armond
Tactful Inattention: Erving Goffman, Privacy In The Digital Age, And The Virtue Of Averting One's Eyes, Elizabeth De Armond
Elizabeth De Armond
No abstract provided.
"I Want My File": Surveillance Data, Minimization, And Historical Accountability, Douglas Cox
"I Want My File": Surveillance Data, Minimization, And Historical Accountability, Douglas Cox
University of Richmond Law Review
No abstract provided.
Carpenter Privacy Case Vexes Justices, While Tech Giant Microsoft Battles Government In Second U.S. Supreme Court Privacy Case With International Implications, Richard J. Peltz-Steele
Carpenter Privacy Case Vexes Justices, While Tech Giant Microsoft Battles Government In Second U.S. Supreme Court Privacy Case With International Implications, Richard J. Peltz-Steele
Faculty Publications
Fall 2017 saw a major privacy case with international implications reach the U.S. Supreme Court this term, Carpenter v. United States. Now a second such case pits the Government against Big Tech in United States v. Microsoft. Carpenter is a criminal case involving federal seizure of cell phone location data from service providers. Arising under the “reasonable grounds” provision of the Stored Communications Act (SCA), the case accentuates Americans’ lack of constitutional protection for personal data in third-party hands, in contrast with emerging global privacy norms. The second major privacy case headed for Supreme Court decision in 2018 also arises …
Trending @ Rwu Law: Linn F. Freedman's Post: The Goal Of Gender Equality In Cybersecurity 08/23/2016, Linn F. Freedman
Trending @ Rwu Law: Linn F. Freedman's Post: The Goal Of Gender Equality In Cybersecurity 08/23/2016, Linn F. Freedman
Law School Blogs
No abstract provided.
"If That's The Way It Must Be, Okay": Campbell V. Acuff-Rose On Rewind
"If That's The Way It Must Be, Okay": Campbell V. Acuff-Rose On Rewind
Loyola of Los Angeles Entertainment Law Review
The 1994 Supreme Court case Campbell v. Acuff-Rose established broad protections for parody in U.S. copyright law. While the case is well known, the facts behind the case are not. None of the three courts that heard the case were told that the alleged parody by 2 Live Crew appeared only on a “sanitized” version of the group’s controversial album. Thus the work had a heightened commercial purpose: filling up a meager album so that album could serve as a market stopgap for its controversial cousin. Although commercial purpose is a key factor in the fair use calculus, no court …
Good Cause Is Bad News: How The Good Cause Standard For Record Access Impacts Adult Adoptees Seeking Personal Information And A Proposal For Reform, Christopher G.A. Loriot
Good Cause Is Bad News: How The Good Cause Standard For Record Access Impacts Adult Adoptees Seeking Personal Information And A Proposal For Reform, Christopher G.A. Loriot
University of Massachusetts Law Review
There are many hurdles that adult adoptees face when seeking access to personal information contained in original birth records or adoption proceedings. One such hurdle is the widely-used good cause standard, which requires adoptees seeking information to show good cause to obtain access. This standard is problematic primarily for its vagueness. Very few jurisdictions that use this standard define “good cause” in any meaningful way, and case law interpreting good cause statutory language is inconsistent at best. Although it is meant to protect the privacy interests of all parties in an adoption proceeding, the good cause standard acts as a …
Trading Privacy For Angry Birds: A Call For Courts To Reevaluate Privacy Expectations In Modern Smartphones, Jeremy Andrew Ciarabellini
Trading Privacy For Angry Birds: A Call For Courts To Reevaluate Privacy Expectations In Modern Smartphones, Jeremy Andrew Ciarabellini
Seattle University Law Review
Of all the smartphone uses, the calling function is probably used the least. Rather, individuals more commonly use their smartphone for surfing the web, checking Facebook, and playing games. Highlighting the “smart” in smartphone, these phones often know more about their users’ daily activities than the users. Without requiring any sort of input, smartphones can tell the user how many steps they walk each day, when it is time to leave for work (also, of course, determining the traveling time with the most up-to-date traffic reports), and when an item recently ordered on Amazon will be delivered. Smartphone users may …
Authorized Investigation: A Temperate Alternative To Cyber Insecurity, Casey M. Bruner
Authorized Investigation: A Temperate Alternative To Cyber Insecurity, Casey M. Bruner
Seattle University Law Review
This Note aims to show that legal structures created to protect the Internet in its original form are completely insufficient to protect what the Internet has become. This antiquated legal framework is exacerbating the problem. The breadth of activity that the current law restricts severely limits the remedies that cyberattack victims can pursue, and it must be updated. While full hack-back may prove necessary in the long run, I argue for a more temperate initial response to the problem—I call this response “authorized investigation.” Specifically, the Computer Fraud and Abuse Act should be amended to allow victims access to their …