Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (1861)
- Science and Technology Law (1592)
- Computer Law (1543)
- Intellectual Property Law (702)
- Constitutional Law (685)
-
- Health Law and Policy (462)
- Fourth Amendment (442)
- Criminal Law (388)
- First Amendment (374)
- Legislation (361)
- Criminal Procedure (357)
- International Law (339)
- Law and Society (336)
- Torts (334)
- State and Local Government Law (320)
- Human Rights Law (312)
- Administrative Law (306)
- Family Law (305)
- Supreme Court of the United States (304)
- Legal History (293)
- Courts (288)
- Jurisprudence (282)
- Communications Law (279)
- Marketing Law (277)
- Other Law (275)
- Consumer Protection Law (264)
- Public Law and Legal Theory (261)
- Transnational Law (260)
- Institution
-
- UIC School of Law (911)
- Schulich School of Law, Dalhousie University (302)
- Selected Works (193)
- University of Michigan Law School (172)
- Seattle University School of Law (149)
-
- Vanderbilt University Law School (143)
- Universitas Indonesia (122)
- University of Washington School of Law (105)
- The Catholic University of America, Columbus School of Law (96)
- Maurer School of Law: Indiana University (91)
- Boston University School of Law (81)
- Brooklyn Law School (81)
- University of Pennsylvania Carey Law School (66)
- University of Colorado Law School (63)
- University at Buffalo School of Law (56)
- New York Law School (54)
- University of Richmond (53)
- Washington and Lee University School of Law (53)
- American University Washington College of Law (46)
- William & Mary Law School (45)
- Notre Dame Law School (43)
- University of Maryland Francis King Carey School of Law (43)
- Brigham Young University Law School (42)
- West Virginia University (41)
- University of Kentucky (38)
- Fordham Law School (36)
- Roger Williams University (36)
- University of Miami Law School (36)
- Chicago-Kent College of Law (35)
- University of Georgia School of Law (31)
- Keyword
-
- Privacy (842)
- Surveillance (147)
- Fourth Amendment (145)
- Technology (144)
- Internet (108)
-
- Data protection (87)
- Data privacy (80)
- First Amendment (80)
- Data (75)
- Privacy law (64)
- Right to privacy (64)
- Right of privacy (62)
- Fourth amendment (58)
- Social media (57)
- Cybersecurity (52)
- Law (49)
- Copyright (46)
- Privacy Law (46)
- Information (45)
- Big data (44)
- Artificial intelligence (39)
- European Union (39)
- GDPR (38)
- Security (37)
- Confidentiality (36)
- Abortion (34)
- Data security (34)
- FTC (34)
- Regulation (34)
- Search (34)
- Publication Year
- Publication
-
- UIC John Marshall Journal of Information Technology & Privacy Law (777)
- Canadian Journal of Law and Technology (256)
- Faculty Scholarship (193)
- "Dharmasisya” Jurnal Program Magister Hukum FHUI (121)
- UIC Law Review (111)
-
- Seattle University Law Review (104)
- All Faculty Scholarship (93)
- Catholic University Journal of Law and Technology (84)
- Articles (75)
- Michigan Law Review (74)
- Articles by Maurer Faculty (55)
- Vanderbilt Journal of Entertainment & Technology Law (54)
- Publications (52)
- Washington Law Review (43)
- Faculty Publications (42)
- Vanderbilt Law Review (40)
- West Virginia Law Review (40)
- Articles, Book Chapters, & Popular Press (34)
- Buffalo Law Review (32)
- Journal Articles (32)
- Seattle Journal for Social Justice (29)
- Kentucky Law Journal (28)
- Law Faculty Scholarship (27)
- Vanderbilt Law School Faculty Publications (27)
- Touro Law Review (26)
- Articles & Chapters (25)
- BYU Law Review (25)
- Indiana Law Journal (25)
- NYLS Law Review (25)
- University of Michigan Journal of Law Reform (25)
- Publication Type
- File Type
Articles 1 - 30 of 4194
Full-Text Articles in Privacy Law
Implementing Information Fiduciaries, Samuel E. Marticke
Implementing Information Fiduciaries, Samuel E. Marticke
Georgia State University Law Review
This Note discusses the information fiduciary model, proposed by Jack Balkin, where fiduciary duties would be imposed on data collectors and analyzes how such a model could come to pass in the United States.
Secrecy On Steroids: How Overzealous State Confidentiality Laws Expose Leakers And Whistleblowers To Retaliatory Prosecution, Frank D. Lomonte, Anne Marie Tamburro
Secrecy On Steroids: How Overzealous State Confidentiality Laws Expose Leakers And Whistleblowers To Retaliatory Prosecution, Frank D. Lomonte, Anne Marie Tamburro
University of Miami Law Review
It is well-documented that the federal government has a secrecy problem. Thousands of times a year, inconsequential documents are needlessly stamped “classified,” which can mean prison for anyone who leaks them. But the addiction to secrecy doesn’t stop with the Pentagon. State public-records statutes are riddled with their own local version of “classified information” that puts people at risk of prosecution even for well-intentioned whistleblowing.
The problem is particularly acute in Florida, where one of the state’s highest-ranking elected officials spent almost two years as the target of a criminal investigation for releasing records about an unresolved sexual harassment complaint …
Privacy Or Safety? The Use Of Cameras To Combat Special Ed Abuse, Sarah M. Benites
Privacy Or Safety? The Use Of Cameras To Combat Special Ed Abuse, Sarah M. Benites
University of Massachusetts Law Review
Self-contained classroom students face abuse from educators at disproportionate rates compared to general education students. To combat the abuse, several jurisdictions, including Massachusetts, have proposed or enacted bills enabling cameras to be placed in self-contained classrooms. This has sparked privacy concerns, particularly regarding whether the usage would amount to an infringement on the Fourth Amendment rights of students and educators. This note argues that surveillance is an ineffective deterrent to prevent violent and abusive behavior and should not justify bypassing potential privacy and constitutional violations. It outlines the relevant case law regarding students and teachers and apply these standards to …
Decoding Dobbs: A Typology To Better Understand The Roberts Court's Jurisprudence, Katie Yoder
Decoding Dobbs: A Typology To Better Understand The Roberts Court's Jurisprudence, Katie Yoder
Honors Projects
The U.S. Supreme Court first recognized Substantive Due Process (“SDP”) in the early twentieth century. In Lochner v. New York, the Court established that there are certain unenumerated rights that are implied by the Fourteenth Amendment.Though SDP originated in a case about worker’s rights and liberties, it quickly became relevant to many cases surrounding personal intimate decisions involving health, safety, marriage, sexual activity, and reproduction.Over the past 60 years, the Court relied upon SDP to justify expanding a fundamental right to privacy, liberty, and the right to medical decision making. Specifically, the court applied these concepts to allow for freedoms …
How Close Is Close Enough: A Step-By-Step Analysis To Resolve The Circuit Split Created By Misunderstanding The Spokeo Ruling, Cason Shipp
St. Mary's Law Journal
No abstract provided.
Covid-19: The Federal Government, Federalism, South Dakota, And American Indians, Jordan Janson
Covid-19: The Federal Government, Federalism, South Dakota, And American Indians, Jordan Janson
Helm's School of Government Conference - American Revival: Citizenship & Virtue
This essay assesses the roles of the federal government and its relationship with Tribal Regions and states alike. Additionally, how COVID-19 affected states and localities and how different Presidential Administrations handled and responded to the pandemic while being compared with the state of South Dakota. Assessing whether or not the federal government overstepped reveals the preparedness of states. Certain states handled COVID-19-related issues better than others, and this essay addresses how Tribal Regions in states provided Governors with extreme complexities. Finally, this essay delves into the rights and responsibilities of the federal government and the state pertaining to American Indian …
The Post-Dobbs Reality: Privacy Expectations For Period-Tracking Apps In Criminal Abortion Prosecutions, Sophie L. Nelson
The Post-Dobbs Reality: Privacy Expectations For Period-Tracking Apps In Criminal Abortion Prosecutions, Sophie L. Nelson
Pepperdine Law Review
The Supreme Court’s decision to overturn Roe v. Wade and Planned Parenthood v. Casey in June 2022 was met with waves of both support and criticism throughout the United States. Several states immediately implemented or began drafting trigger laws that criminalize seeking and providing an abortion. These laws prompted several period-tracking app companies to encrypt their users’ data to make it more difficult for the government to access period- and pregnancy-related information for criminal investigations. This Comment explores whether the Fourth Amendment and U.S. privacy statutes protect users of period-tracking apps from government surveillance. More specifically, this Comment argues that …
Barcoding Bodies: Rfid Technology And The Perils Of E-Carceration, Jackson Samples
Barcoding Bodies: Rfid Technology And The Perils Of E-Carceration, Jackson Samples
Duke Law & Technology Review
Electronic surveillance now plays a central role in the criminal legal system. Every year, hundreds of thousands of people are tracked by ankle monitors and smartphone technology. And frighteningly, commentators and policymakers have now proposed implanting radio frequency identification (“RFID”) chips into people’s bodies for surveillance purposes. This Note examines the unique risks of these proposals—particularly with respect to people on probation and parole—and argues that RFID implants would constitute a systematic violation of individual privacy and bodily integrity. As a result, they would also violate the Fourth Amendment.
National Security And Federalizing Data Privacy Infrastructure For Ai Governance, Margaret Hu, Eliott Behar, Davi Ottenheimer
National Security And Federalizing Data Privacy Infrastructure For Ai Governance, Margaret Hu, Eliott Behar, Davi Ottenheimer
Fordham Law Review
This Essay contends that data infrastructure, when implemented on a national scale, can transform the way we conceptualize artificial intelligence (AI) governance. AI governance is often viewed as necessary for a wide range of strategic goals, including national security. It is widely understood that allowing AI and generative AI to remain self-regulated by the U.S. AI industry poses significant national security risks. Data infrastructure and AI oversight can assist in multiple goals, including: maintaining data privacy and data integrity; increasing cybersecurity; and guarding against information warfare threats. This Essay concludes that conceptualizing data infrastructure as a form of critical infrastructure …
Personal Data And Vaccination Hesitancy: Covid-19’S Lessons For Public Health Federalism, Charles D. Curran
Personal Data And Vaccination Hesitancy: Covid-19’S Lessons For Public Health Federalism, Charles D. Curran
Catholic University Law Review
During the COVID-19 vaccination campaign, the federal government adopted a more centralized approach to the collection of public health data. Although the states previously had controlled the storage of vaccination information, the federal government’s Operation Warp Speed plan required the reporting of recipients’ personal information on the grounds that it was needed to monitor the safety of novel vaccines and ensure correct administration of their multi-dose regimens.
Over the course of the pandemic response, this more centralized federal approach to data collection added a new dimension to pre-existing vaccination hesitancy. Requirements that recipients furnish individual information deterred vaccination among undocumented …
Children Seen But Not Heard, Stacey B. Steinberg
Children Seen But Not Heard, Stacey B. Steinberg
UF Law Faculty Publications
Children are expected to abide by the will of their parents. In the last 200 years, American jurisprudence has given parents the ability to control their children’s upbringing with few exceptions. The principle governing this norm is that parents know best and will use their better knowledge to protect their children’s welfare.
The COVID-19 pandemic, public school rules, and children’s privacy laws offer modern examples of regulations in which the interests of parents and children may not align. Minors may want access to vaccines, despite a parent’s refusal to sign a consent form. Minors may want to talk to their …
Content Moderation And The Least Cost Avoider, Paul Rosenzweig
Content Moderation And The Least Cost Avoider, Paul Rosenzweig
Joint PIJIP/TLS Research Paper Series
No abstract provided.
The Lack Of Responsibility Of Higher Educaiton Institutions In Addressing Phishing Emails And Data Breaches, Muxuan (Muriel) Wang
The Lack Of Responsibility Of Higher Educaiton Institutions In Addressing Phishing Emails And Data Breaches, Muxuan (Muriel) Wang
Duke Law & Technology Review
Higher education institutions (HEIs) are highly susceptible to cyberattacks, particularly those facilitated through phishing, due to the substantial volume of confidential student and staff data and valuable research information they hold. Despite federal legislations focusing on bolstering cybersecurity for critical institutions handling medical and financial data, HEIs have not received similar attention. This Note examines the minimal obligations imposed on HEIs by existing federal and state statutes concerning data breaches, the absence of requirements for HEIs to educate employees and students about phishing attacks, and potential strategies to improve student protection against data breaches.
My Body, Whose Choice? A Case For A Fundamental Right To Bodily Autonomy, Miri Trauner
My Body, Whose Choice? A Case For A Fundamental Right To Bodily Autonomy, Miri Trauner
Brooklyn Law Review
In 2022, the US Supreme Court decided Dobbs v. Jackson Women’s Health Organization, which overturned Roe v. Wade and the fundamental right to abortion it had established nearly fifty years prior. The Court’s decision threw into uncertainty the future of not only reproductive rights in this country, but also many other individual rights. At the same time as the decision, the world was still reeling from a global pandemic, and the development of COVID-19 vaccines had spurred widespread controversy over the constitutionality of vaccine mandates. Both advocates for abortion access and opponents to vaccine mandates shared a common cry: “my …
Critical Data Theory, Margaret Hu
Critical Data Theory, Margaret Hu
William & Mary Law Review
Critical Data Theory examines the role of AI and algorithmic decisionmaking at its intersection with the law. This theory aims to deconstruct the impact of AI in law and policy contexts. The tools of AI and automated systems allow for legal, scientific, socioeconomic, and political hierarchies of power that can profitably be interrogated with critical theory. While the broader umbrella of critical theory features prominently in the work of surveillance scholars, legal scholars can also deploy criticality analyses to examine surveillance and privacy law challenges, particularly in an examination of how AI and other emerging technologies have been expanded in …
The Consumer Bundle, Shelly Kreiczer-Levy
The Consumer Bundle, Shelly Kreiczer-Levy
Washington Law Review
Can property law have a consumer protection purpose? One of the most important consumer law concerns today is the limited control consumers have over the digital assets and software-embedded products they purchase. Current proposals for reform focus on classifying the transaction as either license or sale and rely mostly on contract law and consumer protection regulation with a few calls for restoring ownership rights. This Article argues that property law can protect consumers by establishing a minimum bundle of rights for consumers: the “consumer’s bundle.” Working with property theory and an analysis of property values, this Article explains the importance …
The Kids Are Not Alright: Negative Consequences Of Student Device And Account Surveillance, Ashley Peterson
The Kids Are Not Alright: Negative Consequences Of Student Device And Account Surveillance, Ashley Peterson
Washington Law Review
In recent years, student surveillance has rapidly grown. As schools have experimented with new technologies, transitioned to remote and hybrid instruction, and faced pressure to protect student safety, they have increased surveillance of school accounts and school-issued devices. School surveillance extends beyond school premises to monitor student activities that occur off-campus. It reaches students’ most intimate data and spaces, including things students likely believe are private: internet searches, emails, and messages. This Comment focuses on the problems associated with off-campus surveillance of school accounts and school-issued devices, including chilling effects that fundamentally alter student behavior, reinforcement of the school-to-prison pipeline, …
Speaking Back To Sexual Privacy Invasions, Brenda Dvoskin
Speaking Back To Sexual Privacy Invasions, Brenda Dvoskin
Washington Law Review
Many big players in the internet ecosystem do not like hosting sexual expression. They often justify these bans as a protection of sexual privacy. For example, Meta states that it removes sexual imagery to prevent the nonconsensual distribution of sexual images. In response, this Article argues that banning digital sexual expression is counterproductive if the aim is to alleviate the harms inflicted by sexual privacy losses.
Contemporary sexual privacy theory, however, lacks analytical tools to explain why nudity bans harm the interests they intend to protect. This Article aims at building those tools. The main contribution is an invitation to …
Distinguishing Privacy Law: A Critique Of Privacy As Social Taxonomy, María P. Angel, Ryan Calo
Distinguishing Privacy Law: A Critique Of Privacy As Social Taxonomy, María P. Angel, Ryan Calo
Articles
What distinguishes privacy violations from other harms? This has proven a surprisingly difficult question to answer. For over a century, privacy law scholars labored to define the elusive concept of privacy. Then they gave up. Efforts to distinguish privacy were superseded at the turn of the millennium by a new approach: a taxonomy of privacy problems grounded in social recognition. Privacy law became the field that simply studies whatever courts or scholars talk about as related to privacy.
Decades into privacy as social taxonomy, the field has expanded to encompass a broad range of information-based harms—from consumer manipulation to algorithmic …
The Data Heist: Protecting Consumers And Their Information Through Opt-In Consent, John A. Hudson
The Data Heist: Protecting Consumers And Their Information Through Opt-In Consent, John A. Hudson
Arkansas Law Review
This Comment will: (1) compare and contrast the data privacy laws in the United States and the European Union; (2) demonstrate the significant risk American consumers are subject to under the United States’ current laws and regulations; and (3) address the protections provided by the European Union’s explicit opt-in consent requirement that would ensure safer conditions for American consumers.
Privacy Matters: Data Breach Litigation In Japan, Andrew M. Pardieck
Privacy Matters: Data Breach Litigation In Japan, Andrew M. Pardieck
Washington International Law Journal
In 1890, when Brandeis and Warren wrote The Right to Privacy, Japan did not have a word for privacy. Today, it is closely guarded in Japan: the European Data Protection Board has found privacy protections in Japan “equivalent” to those in the EU. This research explores the evolution of privacy law in Japan, focusing on data breach and the legal rights and obligations associated with it. The writing is broken up into two parts: This article discusses private enforcement of privacy norms, as it is the courts that first established and continue to define privacy rights in Japan. A separate …
Redefining The Injury-In-Fact: Treating Personally Identifying Information As Bailed Property, Austin Headrick
Redefining The Injury-In-Fact: Treating Personally Identifying Information As Bailed Property, Austin Headrick
Georgia Law Review
There is a long-existing circuit split among federal courts of appeals as to whether an individual has standing under Article III of the United States Constitution when their personally identifying information (PII) is stolen from an entity to which they entrusted it such as a hospital or bank. Federal courts disagree as to whether an individual whose PII has been stolen—without more—has suffered an injury-in-fact, a necessary element of standing. The disagreement between the courts centers on whether the injury-in-fact has already occurred at the time the PII is stolen or whether the injury occurs once the PII has been …
Data Is What Data Does: Regulating Based On Harm And Risk Instead Of Sensitive Data, Daniel J. Solove
Data Is What Data Does: Regulating Based On Harm And Risk Instead Of Sensitive Data, Daniel J. Solove
Northwestern University Law Review
Heightened protection for sensitive data is becoming quite trendy in privacy laws around the world. Originating in European Union (EU) data protection law and included in the EU’s General Data Protection Regulation, sensitive data singles out certain categories of personal data for extra protection. Commonly recognized special categories of sensitive data include racial or ethnic origin, political opinions, religious or philosophical beliefs, trade union membership, health, sexual orientation and sex life, and biometric and genetic data.
Although heightened protection for sensitive data appropriately recognizes that not all situations involving personal data should be protected uniformly, the sensitive data approach is …
Privacy Purgatory: Why The United States Needs A Comprehensive Federal Data Privacy Law, Emily Stackhouse Taetzsch
Privacy Purgatory: Why The United States Needs A Comprehensive Federal Data Privacy Law, Emily Stackhouse Taetzsch
Journal of Legislation
No abstract provided.
Stakeholder Capitalism’S Greatest Challenge: Reshaping A Public Consensus To Govern A Global Economy, Leo E. Strine Jr., Michael Klain
Stakeholder Capitalism’S Greatest Challenge: Reshaping A Public Consensus To Govern A Global Economy, Leo E. Strine Jr., Michael Klain
Seattle University Law Review
The Berle XIV: Developing a 21st Century Corporate Governance Model Conference asks whether there is a viable 21st Century Stakeholder Governance model. In our conference keynote article, we argue that to answer that question yes requires restoring—to use Berle’s term—a “public consensus” throughout the global economy in favor of the balanced model of New Deal capitalism, within which corporations could operate in a way good for all their stakeholders and society, that Berle himself supported.
The world now faces problems caused in large part by the enormous international power of corporations and the institutional investors who dominate their governance. These …
A Different Approach To Agency Theory And Implications For Esg, Jonathan Bonham, Amoray Riggs-Cragun
A Different Approach To Agency Theory And Implications For Esg, Jonathan Bonham, Amoray Riggs-Cragun
Seattle University Law Review
In conventional agency theory, the agent is modeled as exerting unobservable “effort” that influences the distribution over outcomes the principal cares about. Recent papers instead allow the agent to choose the entire distribution, an assumption that better describes the extensive and flexible control that CEOs have over firm outcomes. Under this assumption, the optimal contract rewards the agent directly for outcomes the principal cares about, rather than for what those outcomes reveal about the agent’s effort. This article briefly summarizes this new agency model and discusses its implications for contracting on ESG activities.
The Esg Information System, Stavros Gadinis, Amelia Miazad
The Esg Information System, Stavros Gadinis, Amelia Miazad
Seattle University Law Review
The mounting focus on ESG has forced internal corporate decision-making into the spotlight. Investors are eager to support companies in innovative “green” technologies and scrutinize companies’ transition plans. Activists are targeting boards whose decisions appear too timid or insufficiently explained. Consumers and employees are incorporating companies sustainability credentials in their purchasing and employment decisions. These actors are asking companies for better information, higher quality reports, and granular data. In response, companies are producing lengthy sustainability reports, adopting ambitious purpose statements, and touting their sustainability credentials. Understandably, concerns about greenwashing and accountability abound, and policymakers are preparing for action.
In this …
Table Of Contents, Seattle University Law Review
Table Of Contents, Seattle University Law Review
Seattle University Law Review
Table of Contents
The Sec, The Supreme Court, And The Administrative State, Paul G. Mahoney
The Sec, The Supreme Court, And The Administrative State, Paul G. Mahoney
Seattle University Law Review
Pritchard and Thompson have given those of us who study the SEC and the securities laws much food for thought. Their methodological focus is on the internal dynamics of the Court’s deliberations, on which they have done detailed and valuable work. The Court did not, however, operate in a vacuum. Intellectual trends in economics and law over the past century can also help us understand the SEC’s fortunes in the federal courts and make predictions about its future.