Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (7)
- Constitutional Law (3)
- Law and Society (3)
- Science and Technology Law (3)
- Communications Law (2)
-
- First Amendment (2)
- Legal Ethics and Professional Responsibility (2)
- Administrative Law (1)
- Civil Procedure (1)
- Computer Law (1)
- Courts (1)
- Criminal Procedure (1)
- Entertainment, Arts, and Sports Law (1)
- Fourteenth Amendment (1)
- Fourth Amendment (1)
- Health Law and Policy (1)
- Human Rights Law (1)
- Intellectual Property Law (1)
- Judges (1)
- Labor and Employment Law (1)
- Legal Profession (1)
- Legal Remedies (1)
- Legislation (1)
- Organizations Law (1)
- Public Law and Legal Theory (1)
- State and Local Government Law (1)
- Torts (1)
- Institution
-
- Pace University (2)
- Touro University Jacob D. Fuchsberg Law Center (2)
- Maurer School of Law: Indiana University (1)
- Schulich School of Law, Dalhousie University (1)
- St. Mary's University (1)
-
- The Catholic University of America, Columbus School of Law (1)
- University of Arkansas at Little Rock William H. Bowen School of Law (1)
- University of Florida Levin College of Law (1)
- University of Maryland Francis King Carey School of Law (1)
- University of Michigan Law School (1)
- University of Pennsylvania Carey Law School (1)
- Publication
- Publication Type
Articles 1 - 13 of 13
Full-Text Articles in Privacy Law
A 'Public' Journey Through Covid-19: Donald Trump, Twitter, And The Secrecy Of U.S. Presidents’ Health, Mark Fenster
A 'Public' Journey Through Covid-19: Donald Trump, Twitter, And The Secrecy Of U.S. Presidents’ Health, Mark Fenster
UF Law Faculty Publications
Donald Trump ignored numerous governance norms in his one term as U.S. President, especially those that prescribe disclosure of official and personal financial information. His brief period of illness from COVID-19, which he broadcast to the world via his Twitter account, revealed the complexity of Trump’s relationship to the concept and norms of transparency that presume information’s necessity for a functional and accountable state. At the same time that Trump offered little in the way of coherent and authoritative information about his health, he also provided an enormous amount of seemingly “inside” and direct accounts of the progress of his …
Sharenting And The (Potential) Right To Be Forgotten, Keltie Haley
Sharenting And The (Potential) Right To Be Forgotten, Keltie Haley
Indiana Law Journal
Part I of this Note serves as an evaluation of parental use of social media and
further seeks to draw attention to the social and developmental impact parental
oversharing can have on children. Part II examines the tension between parents’
constitutional rights to direct the upbringing of their children, as well as their First
Amendment interest in online expression, and their children’s interest in personal
data security and privacy. Part III provides an overview of the European Union’s
right to be forgotten framework in the sharenting context and considers the
plausibility of implementing such a framework in the United States. …
From Innovation To Abuse: Does The Internet Still Need Section 230 Immunity?, Benjamin Volpe
From Innovation To Abuse: Does The Internet Still Need Section 230 Immunity?, Benjamin Volpe
Catholic University Law Review
In 1996, Congress passed the Communications Decency Act to allow the screening of offensive material from the internet, while preserving the continued development of the internet economy without burdensome regulation. However, for years, online intermediaries have successfully used the Act as a shield from liability when third parties use their online services to commit tortious or criminal acts. This Comment argues that a wholly-unregulated internet is no longer necessary to preserve the once-fledgling internet economy. After evaluating various approaches to intermediary liability, this Comment also argues that Congress should take a more comprehensive look at consumer protection online and establish …
Privacy And Legal Automation: The Dmca As A Case Study, Jonathon Penney
Privacy And Legal Automation: The Dmca As A Case Study, Jonathon Penney
Articles, Book Chapters, & Popular Press
Advances in artificial intelligence, machine learning, computing capacity, and big data analytics are creating exciting new possibilities for legal automation. At the same time, these changes pose serious risks for civil liberties and other societal interests. Yet, existing scholarship is narrow, leaving uncertainty on a range of issues, including a glaring lack of systematic empirical work as to how legal automation may impact people’s privacy and freedom. This article addresses this gap with an original empirical analysis of the Digital Millennium Copyright Act (DMCA), which today sits at the forefront of algorithmic law due to its automated enforcement of copyright …
A Status Update For Texas Voir Dire: Advocating For Pre-Trial Internet Investigation Of Prospective Jurors, Luke A. Harle
A Status Update For Texas Voir Dire: Advocating For Pre-Trial Internet Investigation Of Prospective Jurors, Luke A. Harle
St. Mary's Law Journal
The Internet provides trial attorneys an additional tool to investigate the backgrounds of prospective jurors during voir dire. Online searches of a person’s name and social media accounts can reveal information that could be used as grounds for a challenge for cause or to facilitate intelligent use of peremptory strikes. Texas lawmakers have not yet provided any official guidance as to whether attorneys can investigate prospective jurors online or how they might do so, should it be allowed. Texas’s current voir dire structure, judicial opinions, and ethics opinions, together, support the notion that Texas trial attorneys should be given opportunities …
Wide Right: How Isp Immunity And Current Laws Are Off The Mark In Protecting The Modern Athlete On Social Media, Dominick J. Mingione
Wide Right: How Isp Immunity And Current Laws Are Off The Mark In Protecting The Modern Athlete On Social Media, Dominick J. Mingione
Pace Intellectual Property, Sports & Entertainment Law Forum
“[Y]our tranny looking dad is a disgrace to American football,” “I would rape the shit out of her,” and “[The] [B]ears are easier than you on prom night,” are just a sampling of some of the alarmingly harassing tweets received by Chloe Trestman between the night of November 9, 2014 and November 10, 2014. Who is Chloe Trestman, and what could she have possibly done to warrant such abuse? Chloe’s father is Marc Trestman, the head coach of the Chicago Bears. And the twitter vitriol, or “twitriol,” directed toward Chloe was in response to the Bears’ blowout loss to their …
Here We Are Now, Entertain Us: Defining The Line Between Personal And Professional Context On Social Media, Raizel Liebler, Keidra Chaney
Here We Are Now, Entertain Us: Defining The Line Between Personal And Professional Context On Social Media, Raizel Liebler, Keidra Chaney
Pace Law Review
Social media platforms such as Facebook, Twitter, and Instagram allow individuals and companies to connect directly and regularly with an audience of peers or with the public at large. These websites combine the audience-building platforms of mass media with the personal data and relationships of in-person social networks. Due to a combination of evolving user activity and frequent updates to functionality and user features, social media tools blur the line of whether a speaker is perceived as speaking to a specific and presumed private audience, a public expression of one’s own personal views, or a representative viewpoint of an entire …
Interview On The Black Box Society, Lawrence Joseph, Frank A. Pasquale
Interview On The Black Box Society, Lawrence Joseph, Frank A. Pasquale
Faculty Scholarship
Hidden algorithms drive decisions at major Silicon Valley and Wall Street firms. Thanks to automation, those firms can approve credit, rank websites, and make myriad other decisions instantaneously. But what are the costs of their methods? And what exactly are they doing with their digital profiles of us?
Leaks, whistleblowers, and legal disputes have shed new light on corporate surveillance and the automated judgments it enables. Self-serving and reckless behavior is surprisingly common, and easy to hide in code protected by legal and real secrecy. Even after billions of dollars of fines have been levied, underfunded regulators may have only …
Privacy In Social Media: To Tweet Or Not To Tweet?, Tara M. Breslawski
Privacy In Social Media: To Tweet Or Not To Tweet?, Tara M. Breslawski
Touro Law Review
No abstract provided.
Identity Theft On Social Networking Sites: Developing Issues Of Internet Impersonation, Maksim Reznik
Identity Theft On Social Networking Sites: Developing Issues Of Internet Impersonation, Maksim Reznik
Touro Law Review
This Comment focuses on the dangers of social media sites when a person gains access to another's online account through two different methods: (1) stealing the third party's password, or (2) creating a completely fake profile and subsequently impersonating that person.
An Ethical Duty To Protect One’S Own Information Privacy?, Anita L. Allen
An Ethical Duty To Protect One’S Own Information Privacy?, Anita L. Allen
All Faculty Scholarship
People freely disclose vast quantities of personal and personally identifiable information. The central question of this Meador Lecture in Morality is whether they have a moral (or ethical) obligation (or duty) to withhold information about themselves or otherwise to protect information about themselves from disclosure. Moreover, could protecting one’s own information privacy be called for by important moral virtues, as well as obligations or duties? Safeguarding others’ privacy is widely understood to be a responsibility of government, business, and individuals. The “virtue” of fairness and the “duty” or “obligation” of respect for persons arguably ground other-regarding responsibilities of confidentiality and …
Privacy For Social Networking, Connie Davis Powell
Privacy For Social Networking, Connie Davis Powell
University of Arkansas at Little Rock Law Review
This article begins by considering the emergence of social networks as a major medium of communication and posits that the success of social networks is attributable to their users' willingness to share their information. Next, the article considers the expectation of privacy for users of social networks and whether such expectation is reasonable. In particular, the article discusses the privacy policies and legal terms governing the use of social networks, and tracks the evolution of such terms and policies as they slowly whittle away user control over time. The article then discusses public outcry regarding the disclosure of information contrary …
Privacy Policies, Terms Of Service, And Ftc Enforcement: Broadening Unfairness Regulation For A New Era, G. S. Hans
Privacy Policies, Terms Of Service, And Ftc Enforcement: Broadening Unfairness Regulation For A New Era, G. S. Hans
Michigan Telecommunications & Technology Law Review
This Note examines website privacy policies in the context of FTC regulation. The relevant portion of Section 5 of the Federal Trade Commission Act, 15 U.S.C. § 45(a), uses the following language to define the scope of the agency's regulatory authority: "Unfair methods of competition in or affecting commerce, and unfair or deceptive acts or practices in or affecting commerce, are hereby declared unlawful." Specifically, this Note analyzes the FTC's power to regulate unfair practices (referred to as the FTC's "unfairness power") granted by Section 5, and also discusses the deception prong of Section 5, which allows the agency to …