Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Privacy Law

Welcome To The Machine: Privacy And Workplace Implications Of Predictive Analytics, Robert Sprague Apr 2015

Welcome To The Machine: Privacy And Workplace Implications Of Predictive Analytics, Robert Sprague

Robert Sprague

Predictive analytics use a method known as data mining to identify trends, patterns, or relationships among data, which can then be used to develop a predictive model. Data mining itself relies upon big data, which is “big” not solely because of its size but also because its analytical potential is qualitatively different. “Big data” analysis allows organizations, including government and businesses, to combine diverse digital datasets and then use statistics and other data mining techniques to extract from them both hidden information and surprising correlations. These data are not necessarily tracking transactional records of atomized behavior, such as the purchasing …


Light In The Darkness: How Leatpr Standards Guide Legislators In Regulating Law Enforcement Access To Cell Site Location Records, Susan Freiwald Jun 2014

Light In The Darkness: How Leatpr Standards Guide Legislators In Regulating Law Enforcement Access To Cell Site Location Records, Susan Freiwald

Susan Freiwald

This article measures the new ABA Standards for Criminal Justice: Law Enforcement Access to Third Party Records (LEATPR Standards) success by assessing the guidance they provide legislators interested in updating pertinent law regarding one specific type of data. Scholars should not expect the Standards to yield the same conclusions they would have furnished had they been able to draft a set of standards by themselves. The Standards emerged after years of painstaking consensus building and compromise no individual committee member got entirely what he wanted. Nonetheless, not every product of a committee turns out to have been worth the effort, …


Nothing To Fear Or Nowhere To Hide: Competing Visions Of The Nsa's 215 Program, Susan Freiwald Dec 2013

Nothing To Fear Or Nowhere To Hide: Competing Visions Of The Nsa's 215 Program, Susan Freiwald

Susan Freiwald

Despite Intelligence Community leaders’ assurances, the detailed knowledge of the NSA metadata program (the 215 program) that flowed from the Snowden revelations did not assuage concerns about the program. Three groups, the American Civil Liberties Union, the Electronic Frontier Foundation, and the Electronic Privacy Information Center, brought immediate legal challenges with mixed results in the lower courts. The conflict, in the courts, Congress, and the press, has revealed that the proponents and opponents of Section 215 view the program in diametrically opposed ways. Program proponents see a vital intelligence program operating within legal limits, which has suffered a few compliance …


The Davis Good Faith Rule And Getting Answers To The Questions Jones Left Open, Susan Freiwald Dec 2012

The Davis Good Faith Rule And Getting Answers To The Questions Jones Left Open, Susan Freiwald

Susan Freiwald

The Supreme Court’s decision in United States v. Jones clearly established that use of GPS tracking surveillance constitutes a search under the Fourth Amendment. But the Court left many other questions unanswered about the nature and scope of the constitutional privacy right in location data. A review of lower court decisions in the wake of Jones reveals that, rather than begin to answer the questions that Jones left open, courts are largely avoiding substantive Fourth Amendment analysis of location data privacy. Instead, they are finding that officers who engaged in GPS tracking and related surveillance operated in good faith, based …


Workplace Data: Law & Litigation (With 2014 Supplement), Robert Sprague Dec 2012

Workplace Data: Law & Litigation (With 2014 Supplement), Robert Sprague

Robert Sprague

Workplace Data: Law and Litigation provides an overview of legal issues associated with employment-related electronically stored information (ESI), focusing on discovery issues in particular. Written for employment and labor law practitioners, this new treatise offers a comprehensive overview of today’s discovery challenges, a detailed statute-by-statute analysis of data retention requirements in federal workplace-related laws, a summary of emerging workplace social media and other technology-related issues and a guide to data protection privacy laws in North America, Europe, Asia and Oceania.


Intrusive Monitoring: Employee Privacy Expectations Are Reasonable In Europe, Destroyed In The United States, Lothar Determann, Robert Sprague Dec 2010

Intrusive Monitoring: Employee Privacy Expectations Are Reasonable In Europe, Destroyed In The United States, Lothar Determann, Robert Sprague

Robert Sprague

This Article examines the contrasting policy and legal frameworks relating to data privacy in the United States and the European Union, with a particular focus on workplace privacy and intrusive surveillance technologies and practices. It examines the U.S. perspective on modern work-related employer monitoring practices, the laws giving rise to possible employee privacy rights, and specific types of employer monitoring that may lead to actionable invasions of employee privacy rights. This article then addresses the issue of employee privacy from the EU perspective, beginning with an overview of the formation of authority to protect individual privacy rights, followed by an …