Fitbit Data And The Fourth Amendment: Why The Collection Of Data From A Fitbit Constitutes A Search And Should Require A Warrant In Light Of Carpenter V. United States, Alxis Rodis
William & Mary Bill of Rights Journal
No abstract provided.
Discussing Privacy In Sec Subpoena Practice After Carpenter V. United States, 2021 Chicago-Kent College of Law
Discussing Privacy In Sec Subpoena Practice After Carpenter V. United States, William A. Ballentine
Chicago-Kent Law Review
No abstract provided.
Bipa: What Does It Stand For?, 2021 Chicago-Kent College of Law
Bipa: What Does It Stand For?, Paige Smith
Chicago-Kent Law Review
No abstract provided.
Sharing More Than You Thought: Facebook Cannot Assert The Party Exception To Avoid Liability Under The Wiretap Act, 2021 Boston College Law School
Sharing More Than You Thought: Facebook Cannot Assert The Party Exception To Avoid Liability Under The Wiretap Act, Emily A. Jordan
Boston College Law Review
On April 9, 2020, the United States Court of Appeals for the Ninth Circuit, in Davis v. Facebook, Inc. (In re Facebook), held that unauthorized third parties receiving simultaneous, direct copies of a party’s communication do not fall within the scope of the Party Exception of the Wiretap Act, 18 U.S.C. § 2510–2523. In doing so, the Ninth Circuit, based its holding on the legislative history and purpose of the Wiretap Act and reasoned that the Party Exception requires a narrow construction. Further, it held that to interpret the exception as inclusive of actors like Facebook risks ...
The Privacy Cost Of Currency, 2021 University of Michigan Law School
The Privacy Cost Of Currency, Karin Thrasher
Michigan Journal of International Law
Banknotes, or cash, can be used continuously by any person for nearly every transaction and provide anonymity for the parties. However, as digitization increases, the role and form of money is changing. In response to pressure produced by the increase in new forms of money and the potential for a cashless society, states are exploring potential substitutes to cash. Governments have begun to investigate the intersection of digitization and fiat currency: Central Bank Digital Currencies (“CBDC”).
States have begun researching and developing CBDCs to serve in lieu of cash. Central banks are analyzing the potential for a CBDC that could ...
Emergent Medical Data: Health Information Inferred By Artificial Intelligence, 2021 University of California, Irvine School of Law
Emergent Medical Data: Health Information Inferred By Artificial Intelligence, Mason Marks
UC Irvine Law Review
Artificial intelligence (AI) can infer health data from people’s behavior even when their behavior has no apparent connection to their health. AI can monitor one’s location to track the spread of infectious disease, scrutinize retail purchases to identify pregnant customers, and analyze social media to predict who might attempt suicide. These feats are possible because, in modern societies, people continuously interact with internet-enabled software and devices. Smartphones, wearables, and online platforms monitor people’s actions and produce digital traces, the electronic remnants of their behavior.
In their raw form, digital traces might not be very interesting or useful ...
The “P” Isn’T For Privacy: The Conflict Between Bankruptcy Rules And Hipaa Compliance, 2021 Washington and Lee University School of Law
The “P” Isn’T For Privacy: The Conflict Between Bankruptcy Rules And Hipaa Compliance, Sophie R. Rogers Churchill
Washington and Lee Law Review
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) included a now-ubiquitous provision designed to protect the privacy of patients’ protected health information. The provision prohibits covered entities, including health care providers and their agents, from disclosing any demographic information that may identify a patient and that relates to that patient’s medical care. The provision is broad and can include such simple information as which doctor a patient consults or the date of a patient’s consultation with a physician.
Unfortunately, such protections become impracticable in the bankruptcy setting. When a health care provider files bankruptcy, it files ...
Bitcoin Searches And Preserving The Third-Party Doctrine, 2021 St. Mary's University School of Law
Bitcoin Searches And Preserving The Third-Party Doctrine, Christine A. Cortez
St. Mary's Law Journal
Overruling Roe V. Wade: Lessons From The Death Penalty, 2021 Pepperdine University
Overruling Roe V. Wade: Lessons From The Death Penalty, Paul Benjamin Linton
Pepperdine Law Review
In Furman v. Georgia (1972), the Supreme Court struck down the Georgia and Texas death penalty statutes, thereby calling into question the validity of every other state death penalty statute. In their concurring opinions, Justices Brennan and Marshall expressed the view that, given society’s gradual abandonment of the death penalty, capital punishment violated the Eighth Amendment’s prohibition of “cruel and unusual punishments.” Justice Powell and three other justices dissented, arguing that the Court had misread the state of the law regarding society’s acceptance of the death penalty. Four years after Furman, in a quintet of cases, the ...
Finders Keepers: Who Has Say Over Private Property In Space, 2021 Texas A&M University School of Law
Finders Keepers: Who Has Say Over Private Property In Space, Jose A. Martin Del Campo
Texas A&M Journal of Property Law
Current space law is unclear as to whether private entities may claim possession of resources extracted from their endeavors in outer space. The lack of certainty prevents private entities from entirely investing in infrastructure and capabilities to access new deposits of resources due to the depletion of minerals and resources on Earth. The establishment of a new space regime devoid of non-appropriation principles found in international law is necessary to motivate private entities to invest the capital in extracting and transporting space resources back to Earth. This Comment seeks to understand how the current framework of space law impacts the ...
Cloudy With A Chance Of Government Intrusion: The Third-Party Doctrine In The 21st Century, 2021 The Catholic University of America, Columbus School of Law
Cloudy With A Chance Of Government Intrusion: The Third-Party Doctrine In The 21st Century, Steven Arango
Catholic University Law Review
Technology may be created by humans, but we are dependent on it. Look around you: what technology is near you as you read this abstract? An iPhone? A laptop? Perhaps even an Amazon Echo. What do all these devices have in common? They store data in the cloud. And this data can contain some of our most sensitive information, such as business records or medical documents.
Even if you manage this cloud storage account, the government may be able to search your data without a warrant. Federal law provides little protection for cloud stored data. And the Fourth Amendment may ...
Hacks, Leaks, And Data Dumps: The Right To Publish Illegally Acquired Information Twenty Years After Bartnicki V. Vopper, 2021 University of Washington School of Law
Hacks, Leaks, And Data Dumps: The Right To Publish Illegally Acquired Information Twenty Years After Bartnicki V. Vopper, Erik Ugland, Christina Mazzeo
Washington Law Review
This Article addresses a fluid and increasingly salient category of cases involving the First Amendment right to publish information that was hacked, stolen, or illegally leaked by someone else. Twenty years ago, in Bartnicki v. Vopper, the Supreme Court appeared to give broad constitutional cover to journalists and other publishers in these situations, but Justice Stevens’s inexact opinion for the Court and Justice Breyer’s muddling concurrence left the boundaries unclear. The Bartnicki framework is now implicated in dozens of new cases— from the extradition and prosecution of Julian Assange, to Donald Trump’s threatened suit of The New ...
Revising Reasonableness In The Cloud, 2021 University of Washington School of Law
Revising Reasonableness In The Cloud, Ian Walsh
Washington Law Review
Save everything—just in case––and search for it later. This is a modern mantra fueled by the ubiquity of smartphones, laptops, tablets, and free or low-cost data storage that leads users to store massive amounts of data in the cloud. But when users trust third-party cloud storage providers with private communications, they also surrender Fourth Amendment constitutional certainty. Existing statutory safeguards for these communications are lower than Fourth Amendment warrant and probable cause standards; this permits the government to seize large quantities of users’ private communications stored in the cloud with only minimal justification. Due to the revealing nature ...
Data Autonomy, 2021 Texas A&M University School of Law
Data Autonomy, Cesare Fracassi, William Magnuson
In recent years, “data privacy” has vaulted to the forefront of public attention. Scholars, policymakers, and the media have, nearly in unison, decried the lack of data privacy in the modern world. In response, they have put forth various proposals to remedy the situation, from the imposition of fiduciary obligations on technology platforms to the creation of rights to be forgotten for individuals. All these proposals, however, share one essential assumption: we must raise greater protective barriers around data. As a scholar of corporate finance and a scholar of corporate law, respectively, we find this assumption problematic. Data, after all ...
Surveillance Capitalism, 2021 University of Florida Levin College of Law
Surveillance Capitalism, William Hamilton
Journal of Technology Law & Policy
In 2019, Harvard Business School Professor Shoshana Zuboff published The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. What I hope to accomplish in this short presentation is to unpack some of the salient themes of this interesting, important book. I believe her book will lend context and urgency to this conference. Her book is a combination of excellent research, journalism, and scholarship. It is also a call, a plea, a supplication. Thus, the sub-title, The Fight for a Human Future at the New Frontier of Power, presages an unrelenting critical study ...
Defending Face-Recognition Technology (And Defending Against It), 2021 University of Florida Levin College of Law
Defending Face-Recognition Technology (And Defending Against It), Henry H. Perritt Jr.
Journal of Technology Law & Policy
This Article looks beneath the surface of attacks on face-recognition technology and explains how it can be an exceptionally useful tool for law enforcement, complementing traditional forensic evidence such as fingerprints and DNA. It punctures myths about the technology and explains how existing rules of criminal procedure, developed for other kinds of forensic evidence, are readily adaptable to face-recognition. It opposes across-the-board restrictions on use of face-recognition technologies and advocates a more sophisticated set of guarantees of defendant access to the information necessary to probe reliability of computerized face-matches. Defendants must have reasonable access to the details of the technology ...
A Faustian Bargain That Undermines Research Participants’ Privacy Rights And Return Of Results, 2021 University of Florida Levin College of Law
A Faustian Bargain That Undermines Research Participants’ Privacy Rights And Return Of Results, Barbara J. Evans, Susan M. Wolf
Florida Law Review
A 2018 committee report published by the highly respected National Academies of Science, Engineering, and Medicine (the Report) recommends stripping research participants of crucial data privacy rights and discarding decades of carefully deliberated consensus guidelines for the ethical return of results and data from research. This Article traces these disturbing recommendations to three root causes: (1) a statement of task that blocked careful and impartial analysis of a disputed legal matter central to the Report; (2) a piecemeal legal analysis that omitted relevant strands of law; and (3) the inappropriate conflation of two distinct concepts—the return of individual research ...
Employee Privacy Rights While Working From Home, 2021 Golden Gate University School of Law
Employee Privacy Rights While Working From Home, Kourtney Speer
GGU Law Review Blog
Over the past few decades and especially under the circumstances of the COVID-19 pandemic, there has been a merger of office and home life. More and more employees are working from home. By bringing work home, employees may be unknowingly bringing a diminished expectation of privacy inside their home as well.
Sales, Acquisitions, And Mergers Of Direct-To-Consumer Genetic Testing Companies: The Risks And A Solution, 2021 Texas A&M University School of Law (Student)
Sales, Acquisitions, And Mergers Of Direct-To-Consumer Genetic Testing Companies: The Risks And A Solution, Alyssa K Mcleod
Texas A&M Law Review
Direct-to-consumer genetic tests have become increasingly popular in the United States within the last few years. However, these tests pose many risks to the consumer, most notably privacy risks. A subset of these privacy risks involves the issue of company mergers, acquisitions, and sales. Many companies in the direct-to-consumer genetic testing market have privacy policies that contain a variation of a “business transfer” clause. These clauses specify that in the event the company goes through a business transition such as a sale, merger, or acquisition, the consumer’s personal information—including the consumer’s DNA—will be among the assets ...
Fact Or Phallus? Considering The Constitutionality Of Texas's Cyber-Flashing Law Under The True Threat Doctrine, 2021 Texas A&M University School of Law (Student)
Fact Or Phallus? Considering The Constitutionality Of Texas's Cyber-Flashing Law Under The True Threat Doctrine, Brenna Cheyne Miller
Texas A&M Law Review
As societal reliance on digital and online communication continues to grow, courts are grappling with how best to provide legal recourse for novel, technology-related issues while still protecting American citizens’ First Amendment right to free speech. The State of Texas recently enacted Penal Code section 21.19, which criminalizes the transmission of unsolicited sexually explicit images to another person—or as it is commonly known, “cyber-flashing.” Cyber-flashing occurs through digital and online platforms, including text messages, apps, and social media. Section 21.19 is one of the first statutes of its kind in the United States. In the age of ...