Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (28)
- Computer Law (14)
- Science and Technology Law (11)
- Constitutional Law (10)
- First Amendment (10)
-
- Intellectual Property Law (9)
- Labor and Employment Law (8)
- Communications Law (6)
- Business (5)
- Consumer Protection Law (4)
- Fourth Amendment (4)
- Business Law, Public Responsibility, and Ethics (3)
- Family Law (3)
- Legal Ethics and Professional Responsibility (3)
- Legislation (3)
- Technology and Innovation (3)
- Administrative Law (2)
- Business Organizations Law (2)
- Civil Procedure (2)
- Criminal Law (2)
- Criminal Procedure (2)
- Entertainment, Arts, and Sports Law (2)
- Health Law and Policy (2)
- Law and Gender (2)
- Law and Society (2)
- Organizational Behavior and Theory (2)
- Social and Behavioral Sciences (2)
- State and Local Government Law (2)
- Institution
-
- Boston University School of Law (4)
- Selected Works (4)
- Pace University (3)
- The Catholic University of America, Columbus School of Law (3)
- Chicago-Kent College of Law (2)
-
- City University of New York (CUNY) (2)
- Cornell University Law School (2)
- Fordham Law School (2)
- Schulich School of Law, Dalhousie University (2)
- St. Mary's University (2)
- Touro University Jacob D. Fuchsberg Law Center (2)
- University of Florida Levin College of Law (2)
- University of Maryland Francis King Carey School of Law (2)
- University of Miami Law School (2)
- University of Pennsylvania Carey Law School (2)
- Washington and Lee University School of Law (2)
- Cleveland State University (1)
- DePaul University (1)
- Florida A&M University College of Law (1)
- Florida State University College of Law (1)
- Loyola Marymount University and Loyola Law School (1)
- Marquette University Law School (1)
- Maurer School of Law: Indiana University (1)
- Mitchell Hamline School of Law (1)
- Pepperdine University (1)
- SJ Quinney College of Law, University of Utah (1)
- Salve Regina University (1)
- Southern Methodist University (1)
- University at Buffalo School of Law (1)
- University of Arkansas at Little Rock William H. Bowen School of Law (1)
- Publication Year
- Publication
-
- Faculty Scholarship (4)
- All Faculty Scholarship (2)
- Canadian Journal of Law and Technology (2)
- Chicago-Kent Law Review (2)
- Cornell Law Faculty Publications (2)
-
- Fordham Intellectual Property, Media and Entertainment Law Journal (2)
- Journal of Business & Technology Law (2)
- Pace Law Review (2)
- Robert Sprague (2)
- Scholarly Articles (2)
- St. Mary's Law Journal (2)
- Touro Law Review (2)
- UF Law Faculty Publications (2)
- University of Miami Business Law Review (2)
- Articles by Maurer Faculty (1)
- Buffalo Law Review (1)
- Catholic University Journal of Law and Technology (1)
- Catholic University Law Review (1)
- Cleveland State Law Review (1)
- CommLaw Conspectus: Journal of Communications Law and Technology Policy (1993-2015) (1)
- DePaul Journal of Art, Technology & Intellectual Property Law (1)
- Faculty Publications (1)
- Faculty and Staff - Articles & Papers (1)
- Florida A & M University Law Review (1)
- Georgia Journal of International & Comparative Law (1)
- LACUNY Institute 2015 (1)
- Loyola of Los Angeles Law Review (1)
- Marquette Law Review (1)
- Mitchell Hamline Law Review (1)
- Pace Intellectual Property, Sports & Entertainment Law Forum (1)
- Publication Type
Articles 1 - 30 of 57
Full-Text Articles in Privacy Law
The Eyes Beyond The Screen: Digital Media Policy And Child Health, Yahia Al-Qudah
The Eyes Beyond The Screen: Digital Media Policy And Child Health, Yahia Al-Qudah
Research Symposium
Background: Modern communication technology and digital media have provided society with a foundation for instant messaging. Pictures, videos, and texts connect individuals with families, friends, and the world. Consequently, digital media has accelerated exposure to risk in which children and adolescents are most vulnerable. This project’s objective is to 1) congregate and highlight current knowledge about the impact of digital media on child health, and 2) underline deficiencies in related laws and regulations as well as offer solutions in digital media policy.
Methods: A systematic literature review was conducted through the JAMA Pediatrics database with keywords such as “digital media,” …
Texas’ War On Social Media: Censorship Or False Flag, Leni Morales
Texas’ War On Social Media: Censorship Or False Flag, Leni Morales
DePaul Journal of Art, Technology & Intellectual Property Law
No abstract provided.
Crowdsourcing Justice, Matthew Dylag
Crowdsourcing Justice, Matthew Dylag
Canadian Journal of Law and Technology
Social media has become ubiquitous in the daily lives of Canadians. Beyond connecting with friends and family, people also turn to social media to find information and seek advice on any number of topics, be it home cooking, workout routines, or automobile purchases. Indeed, social media is a flexible vehicle that can be leveraged for communication on almost any topic. It is not surprising, therefore, that individuals are also turning to social media to help resolve their legal problems. Even a cursory examination of social media will reveal that it is not uncommon for individuals who are experiencing legal difficulties …
Adopting Social Media In Family And Adoption Law, Stacey B. Steinberg, Meredith Burgess, Karla Herrera
Adopting Social Media In Family And Adoption Law, Stacey B. Steinberg, Meredith Burgess, Karla Herrera
Utah Law Review
Social media has dramatically changed the landscape facing families brought together through adoption. Just as adoptive families thirty years ago could not have predicted the impact of DNA technology on postadoption family life, adoptive families are only now beginning to grasp the impact of social media connectivity on the lives of their growing children. This change is related both to social media’s impact on family life and to fundamental shifts in our understanding of privacy more generally. Understanding the legal rights of parents and children in these circumstances is a novel and underexplored area of family law, constitutional law, and …
Beware What You Google: Fourth Amendment Constitutionality Of Keyword Warrants, Chelsa Camille Edano
Beware What You Google: Fourth Amendment Constitutionality Of Keyword Warrants, Chelsa Camille Edano
Washington Law Review
Many Americans have potentially had their privacy rights invaded through invisible, widespread police searches. In recent years, local and federal governments have compelled Google and other search engine companies to produce the personal information of users who have conducted a search query related to a crime. By using keyword warrants, the government can conduct a dragnet search for suspects, imposing suspicion on users and exposing their personal information. The keyword warrant is a symptom of the erosion of the Fourth Amendment protection against suspicionless searches. Not only is scholarship scarce on keyword warrants, but also instances of these warrants are …
Investing In Human Futures: How Big Tech And Social Media Giants Abuse Privacy And Manipulate Consumerism, Brett Dembrow
Investing In Human Futures: How Big Tech And Social Media Giants Abuse Privacy And Manipulate Consumerism, Brett Dembrow
University of Miami Business Law Review
Social media companies such as Facebook, Twitter, and Instagram originated with one seemingly innocent goal: “to bring the world closer together.”1 Now, these Big Tech giants own and operate some of the most powerful platforms in the world simply because of their unethical yet effective strategies to maintain their users’ attention. Social media companies have monetized the amount of time their users spend on their platforms by honing in on the individual preferences of each user and selling that access to advertisers. This heightened access to potential consumers and their preferences has become the most valuable marketing tool for digital …
Responding To Deficiencies In The Architecture Of Privacy: Co-Regulation As The Path Forward For Data Protection On Social Networking Sites, Laurent Cre ́Peau
Responding To Deficiencies In The Architecture Of Privacy: Co-Regulation As The Path Forward For Data Protection On Social Networking Sites, Laurent Cre ́Peau
Canadian Journal of Law and Technology
Social Networking Sites like Facebook, Twitter and the like are a ubiquitous part of contemporary culture. Yet, as exemplified on numerous occasions, most recently in the Cambridge Analytica scandal that shook Facebook in 2018, these sites pose major concerns for personal data protection. Whereas self-regulation has characterized the general regulatory mindset since the early days of the Internet, it is no longer viable given the threat social media poses to user privacy. This article notes the deficiencies of self-regulatory models of privacy and contends jurisdictions like Canada should ensure they have strong data protection regulations to adequately protect the public. …
Toward Racially Equitable And Accountable Tech, Andrea Giampetro-Meyer, Janae James, Sydney Brooke
Toward Racially Equitable And Accountable Tech, Andrea Giampetro-Meyer, Janae James, Sydney Brooke
Marquette Law Review
This Article examines three distinct areas to consider how we might move
toward racially equitable and accountable tech. The three distinct areas are:
(1) fair housing, (2) surveillance, and (3) social media. Fair housing raises
questions about where today’s racially biased algorithms fit within the context
of historical, racist government housing policy. Surveillance raises questions
about how some tech tools render Black faces invisible, while others render
Black faces dangerously conspicuous. Social media highlights the clash
between civil rights and civil liberties, especially when racial justice conflicts
with freedom of speech. Our analysis leads us to consider the extent to …
A 'Public' Journey Through Covid-19: Donald Trump, Twitter, And The Secrecy Of U.S. Presidents’ Health, Mark Fenster
A 'Public' Journey Through Covid-19: Donald Trump, Twitter, And The Secrecy Of U.S. Presidents’ Health, Mark Fenster
UF Law Faculty Publications
Donald Trump ignored numerous governance norms in his one term as U.S. President, especially those that prescribe disclosure of official and personal financial information. His brief period of illness from COVID-19, which he broadcast to the world via his Twitter account, revealed the complexity of Trump’s relationship to the concept and norms of transparency that presume information’s necessity for a functional and accountable state. At the same time that Trump offered little in the way of coherent and authoritative information about his health, he also provided an enormous amount of seemingly “inside” and direct accounts of the progress of his …
Bad Actors: Authenticity, Inauthenticity, Speech, And Capitalism, Sarah C. Haan
Bad Actors: Authenticity, Inauthenticity, Speech, And Capitalism, Sarah C. Haan
Scholarly Articles
“Authenticity” has evolved into an important value that guides social media companies’ regulation of online speech. It is enforced through rules and practices that include real-name policies, Terms of Service requiring users to present only accurate information about themselves, community guidelines that prohibit “coordinated inauthentic behavior,” verification practices, product features, and more.
This Article critically examines authenticity regulation by the social media industry, including companies’ claims that authenticity is a moral virtue, an expressive value, and a pragmatic necessity for online communication. It explains how authenticity regulation provides economic value to companies engaged in “information capitalism,” “data capitalism,” and “surveillance …
Consent, Appropriation By Manipulation, And The 10-Year Challenge: How An Internet Meme Complicated Biometric Information Privacy, Michael J. Slobom
Consent, Appropriation By Manipulation, And The 10-Year Challenge: How An Internet Meme Complicated Biometric Information Privacy, Michael J. Slobom
Mitchell Hamline Law Review
No abstract provided.
Deep Fakes: A Looming Challenge For Privacy, Democracy, And National Security, Danielle K. Citron, Robert Chesney
Deep Fakes: A Looming Challenge For Privacy, Democracy, And National Security, Danielle K. Citron, Robert Chesney
Faculty Scholarship
Harmful lies are nothing new. But the ability to distort reality has taken an exponential leap forward with “deep fake” technology. This capability makes it possible to create audio and video of real people saying and doing things they never said or did. Machine learning techniques are escalating the technology’s sophistication, making deep fakes ever more realistic and increasingly resistant to detection. Deep-fake technology has characteristics that enable rapid and widespread diffusion, putting it into the hands of both sophisticated and unsophisticated actors. While deep-fake technology will bring with it certain benefits, it also will introduce many harms. The marketplace …
The Ironic Privacy Act, Margaret Hu
The Ironic Privacy Act, Margaret Hu
Scholarly Articles
This Article contends that the Privacy Act of 1974, a law intended to engender trust in government records, can be implemented in a way that inverts its intent. Specifically, pursuant to the Privacy Act's reporting requirements, in September 2017, the U.S. Department of Homeland Security (DHS) notified the public that record systems would be modified to encompass the collection of social media data. The notification justified the collection of social media data as a part of national security screening and immigration vetting procedures. However, the collection will encompass social media data on both citizens and noncitizens, and was not explicitly …
The Ironic Privacy Act, Margaret Hu
The Ironic Privacy Act, Margaret Hu
Faculty Publications
This Article contends that the Privacy Act of 1974, a law intended to engender trust in government records, can be implemented in a way that inverts its intent. Specifically, pursuant to the Privacy Act's reporting requirements, in September 2017, the U.S. Department of Homeland Security (DHS) notified the public that record systems would be modified to encompass the collection of social media data. The notification justified the collection of social media data as a part of national security screening and immigration vetting procedures. However, the collection will encompass social media data on both citizens and noncitizens, and was not explicitly …
Data Scraping As A Cause Of Action: Limiting Use Of The Cfaa And Trespass In Online Copying Cases, Kathleen C. Riley
Data Scraping As A Cause Of Action: Limiting Use Of The Cfaa And Trespass In Online Copying Cases, Kathleen C. Riley
Fordham Intellectual Property, Media and Entertainment Law Journal
In recent years, online platforms have used claims such as the Computer Fraud and Abuse Act (“CFAA”) and trespass to curb data scraping, or copying of web content accomplished using robots or web crawlers. However, as the term “data scraping” implies, the content typically copied is data or information that is not protected by intellectual property law, and the means by which the copying occurs is not considered to be hacking. Trespass and the CFAA are both concerned with authorization, but in data scraping cases, these torts are used in such a way that implies that real property norms exist …
Privacy In Gaming, N. Cameron Russell, Joel R. Reidenberg, Sumyung Moon
Privacy In Gaming, N. Cameron Russell, Joel R. Reidenberg, Sumyung Moon
Fordham Intellectual Property, Media and Entertainment Law Journal
Video game platforms and business models are increasingly built on collection, use, and sharing of personal information for purposes of both functionality and revenue. This paper examines privacy issues and explores data practices, technical specifications, and policy statements of the most popular games and gaming platforms to provide an overview of the current privacy legal landscape for mobile gaming, console gaming, and virtual reality devices. The research observes how modern gaming aligns with information privacy notions and norms and how data practices and technologies specific to gaming may affect users and, in particular, child gamers.
After objectively selecting and analyzing …
From Innovation To Abuse: Does The Internet Still Need Section 230 Immunity?, Benjamin Volpe
From Innovation To Abuse: Does The Internet Still Need Section 230 Immunity?, Benjamin Volpe
Catholic University Law Review
In 1996, Congress passed the Communications Decency Act to allow the screening of offensive material from the internet, while preserving the continued development of the internet economy without burdensome regulation. However, for years, online intermediaries have successfully used the Act as a shield from liability when third parties use their online services to commit tortious or criminal acts. This Comment argues that a wholly-unregulated internet is no longer necessary to preserve the once-fledgling internet economy. After evaluating various approaches to intermediary liability, this Comment also argues that Congress should take a more comprehensive look at consumer protection online and establish …
The First Amendment In The Second Gilded Age, Jack M. Balkin
The First Amendment In The Second Gilded Age, Jack M. Balkin
Buffalo Law Review
How do we pay for the digital public sphere? In the Second Gilded Age, the answer is primarily through digital surveillance and through finding ever new ways to make money out of personal data. Digital capitalism in the Second Gilded Age features an implicit bargain: a seemingly unlimited freedom to speak in exchange for the right to surveil and manipulate end users.To protect freedom of speech in the Second Gilded Age we must distinguish the values of free speech from the judicially created doctrines of the First Amendment. That is because the practical freedom to speak online depends on a …
Domestic Asset Tracing And Recovery Of Hidden Assets And The Spoils Of Financial Crime, Nathan Wadlinger, Carl Pacini, Nicole Stowell, William Hopwood, Debra Sinclair
Domestic Asset Tracing And Recovery Of Hidden Assets And The Spoils Of Financial Crime, Nathan Wadlinger, Carl Pacini, Nicole Stowell, William Hopwood, Debra Sinclair
St. Mary's Law Journal
Abstract forthcoming
A Status Update For Texas Voir Dire: Advocating For Pre-Trial Internet Investigation Of Prospective Jurors, Luke A. Harle
A Status Update For Texas Voir Dire: Advocating For Pre-Trial Internet Investigation Of Prospective Jurors, Luke A. Harle
St. Mary's Law Journal
The Internet provides trial attorneys an additional tool to investigate the backgrounds of prospective jurors during voir dire. Online searches of a person’s name and social media accounts can reveal information that could be used as grounds for a challenge for cause or to facilitate intelligent use of peremptory strikes. Texas lawmakers have not yet provided any official guidance as to whether attorneys can investigate prospective jurors online or how they might do so, should it be allowed. Texas’s current voir dire structure, judicial opinions, and ethics opinions, together, support the notion that Texas trial attorneys should be given opportunities …
Scraping The Bottom Of The Barrel: Why It Is No Surprise That Data Scrapers Can Have Access To Public Profiles On Linkedin, Marissa Boulanger
Scraping The Bottom Of The Barrel: Why It Is No Surprise That Data Scrapers Can Have Access To Public Profiles On Linkedin, Marissa Boulanger
SMU Science and Technology Law Review
No abstract provided.
When Whispers Enter The Cloud, Heidi H. Liu
When Whispers Enter The Cloud, Heidi H. Liu
All Faculty Scholarship
With increased awareness of workplace harassment in recent years, the idea of enhanced reporting around sexual misconduct has gained traction. As a result, several technologies – from smartphone apps to well-publicized services – have been introduced with the goals of preventing, enabling reports of, and even predicting sexual misconduct at work, school and in public. But to what extent are these technologies secure and accessible to survivors? This Note documents the existing resources and proposes a framework focusing on privacy and participation for evaluating these tools intended to benefit survivors.
Social Data Discovery And Proportional Privacy, Agnieszka Mcpeak
Social Data Discovery And Proportional Privacy, Agnieszka Mcpeak
Cleveland State Law Review
Social media platforms aggregate large amounts of personal information as "social data" that can be easily downloaded as a complete archive. Litigants in civil cases increasingly seek out broad access to social data during the discovery process, often with few limits on the scope of such discovery. But unfettered access to social data implicates unique privacy concerns—concerns that should help define the proper scope of discovery.
The Federal Rules of Civil Procedure, as amended in 2015, already contain the tools for crafting meaningful limits on intrusive social data discovery. In particular, the proportionality test under Rule 26 weighs the burdens …
The Dark Side Of Social Media Romance: Civil Recourse For Catfish Victims, Armida Derzakarian
The Dark Side Of Social Media Romance: Civil Recourse For Catfish Victims, Armida Derzakarian
Loyola of Los Angeles Law Review
No abstract provided.
Sharenting: Children's Privacy In The Age Of Social Media, Stacey B. Steinberg
Sharenting: Children's Privacy In The Age Of Social Media, Stacey B. Steinberg
UF Law Faculty Publications
Through sharenting, or online sharing about parenting, parents now shape their children’s digital identity long before these young people open their first email. The disclosures parents make online are sure to follow their children into adulthood. Indeed, social media and blogging have dramatically changed the landscape facing today’s children as they come of age.
Children have an interest in privacy. Yet a parent’s right to control the upbringing of his or her children and a parent’s right to free speech may trump this interest. When parents share information about their children online, they do so without their children’s consent. These …
Just Cause Discipline For Social Networking In The New Guilded Age: Will The Law Look The Other Way?, William A. Herbert, Alicia Mcnally
Just Cause Discipline For Social Networking In The New Guilded Age: Will The Law Look The Other Way?, William A. Herbert, Alicia Mcnally
Publications and Research
We live and work in an era with the moniker of the New Gilded Age to describe the growth in societal income inequality. The designation is not limited to evidence of the growing gap in wealth distribution, but also the sharp rise in employment without security, including contingent and part-time work. This article examines the state of workplace procedural protections against discipline as they relate to employee use of social media in the New Gilded Age. In our times, reactions to the rapid distribution of troublesome electronic communications through social networking tend to eclipse patience for enforceable workplace procedures. The …
Employee Electronic Communications In A Boundaryless World, Robert Sprague
Employee Electronic Communications In A Boundaryless World, Robert Sprague
Robert Sprague
Alternative Restrictions Of Sex Offenders' Social Media Use & The Freedom Of Speech, Norah M. Sloss
Alternative Restrictions Of Sex Offenders' Social Media Use & The Freedom Of Speech, Norah M. Sloss
Catholic University Journal of Law and Technology
No abstract provided.
Wide Right: How Isp Immunity And Current Laws Are Off The Mark In Protecting The Modern Athlete On Social Media, Dominick J. Mingione
Wide Right: How Isp Immunity And Current Laws Are Off The Mark In Protecting The Modern Athlete On Social Media, Dominick J. Mingione
Pace Intellectual Property, Sports & Entertainment Law Forum
“[Y]our tranny looking dad is a disgrace to American football,” “I would rape the shit out of her,” and “[The] [B]ears are easier than you on prom night,” are just a sampling of some of the alarmingly harassing tweets received by Chloe Trestman between the night of November 9, 2014 and November 10, 2014. Who is Chloe Trestman, and what could she have possibly done to warrant such abuse? Chloe’s father is Marc Trestman, the head coach of the Chicago Bears. And the twitter vitriol, or “twitriol,” directed toward Chloe was in response to the Bears’ blowout loss to their …
Here We Are Now, Entertain Us: Defining The Line Between Personal And Professional Context On Social Media, Raizel Liebler, Keidra Chaney
Here We Are Now, Entertain Us: Defining The Line Between Personal And Professional Context On Social Media, Raizel Liebler, Keidra Chaney
Pace Law Review
Social media platforms such as Facebook, Twitter, and Instagram allow individuals and companies to connect directly and regularly with an audience of peers or with the public at large. These websites combine the audience-building platforms of mass media with the personal data and relationships of in-person social networks. Due to a combination of evolving user activity and frequent updates to functionality and user features, social media tools blur the line of whether a speaker is perceived as speaking to a specific and presumed private audience, a public expression of one’s own personal views, or a representative viewpoint of an entire …