Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

4,166 Full-Text Articles 3,976 Authors 3,103,715 Downloads 157 Institutions

All Articles in Privacy Law

Faceted Search

4,166 full-text articles. Page 4 of 132.

Brief Of Amici Curiae Privacy And First Amendment Law Professors In Support Of Defendant-Appellant And Reversal, G. S. Hans, Hannah Bloch-Wehba, Danielle K. Citron, Julie E. Cohen, Mary Anne Franks, Woodrow Hartzog, Margot E. Kaminski, Gregory P. Magarian, Frank Pasquale, Neil Richards, Daniel J. Solove 2023 Cornell Law School

Brief Of Amici Curiae Privacy And First Amendment Law Professors In Support Of Defendant-Appellant And Reversal, G. S. Hans, Hannah Bloch-Wehba, Danielle K. Citron, Julie E. Cohen, Mary Anne Franks, Woodrow Hartzog, Margot E. Kaminski, Gregory P. Magarian, Frank Pasquale, Neil Richards, Daniel J. Solove

Faculty Scholarship

STATEMENT OF INTEREST: Amici curiae are law professors and scholars of data privacy, constitutional law, and the First Amendment. Amici write to provide the court with scholarly expertise on the complexities of data privacy law and its intersection with the First Amendment. Amici have collectively written scores of academic articles and multiple books on data privacy, technology, the First Amendment, and constitutional challenges to state and federal privacy regulation.

Amici submit this brief pursuant to Fed. Rule App. P. 29(a) and do not repeat arguments made by the parties. No party’s counsel authored this brief, or any part of …


Perlindungan Hukum Bagi Pembeli Terhadap Gugatan Pembatalan Jual Beli Tanah Oleh Para Ahli Waris Penjual, M Waldi Ali Soraya, Lauditta Humaira ,S.H.,M.Kn. 2023 Universitas Indonesia

Perlindungan Hukum Bagi Pembeli Terhadap Gugatan Pembatalan Jual Beli Tanah Oleh Para Ahli Waris Penjual, M Waldi Ali Soraya, Lauditta Humaira ,S.H.,M.Kn.

Lex Patrimonium

In the implementation of the Sale and Purchase Binding Agreement Deed, a dispute may occur. For example, if the land being sold is an inheritance. For example, one of the sellers does not approve of the sale and purchase, or the land is sold by someone who is not an heir. Of course the buyer will be disadvantaged. The aim of the research is to find out the legal provisions governing the unilateral cancellation of the PPJB, to explain the determination of unlawful acts and to analyze the legal protection for buyers in land sale and purchase agreements which are …


Why (And How) The Constitution Should Protect Prisoners From Gratuitous Disclosure Of Their Hiv/Aids Status, Dillon Schweers 2023 William & Mary Law School

Why (And How) The Constitution Should Protect Prisoners From Gratuitous Disclosure Of Their Hiv/Aids Status, Dillon Schweers

William & Mary Law Review

This Note is not the first to advocate for prisoners’ constitutional privacy rights concerning their HIV/AIDS status, but it is the first to focus on isolated incidents of disclosure rather than general policies that tend to lead to disclosure like mandatory testing or segregation based on HIV/AIDS status. This Note argues that the Fourteenth Amendment’s Due Process Clause should protect prisoners from isolated disclosures, meaning prisoners should have a § 1983 cause of action against guards or other prison officials who disclose their HIV/AIDS status in a gratuitous manner.

[...]

The proceeding section of this Note, Part I, details the …


Breaking The Fourth's Wall: The Implications Of Remote Education For Students' Fourth Amendment Rights, Sallie Hatfield 2023 Vanderbilt University Law School

Breaking The Fourth's Wall: The Implications Of Remote Education For Students' Fourth Amendment Rights, Sallie Hatfield

Vanderbilt Journal of Entertainment & Technology Law

As the COVID-19 pandemic forced both public K-12 and higher education institutions to transition to exclusively provide remote education, students’ homes and personal lives were exposed to the government like never before. Zoom classes and remote proctoring were suddenly the norm. Students and their families scrambled to create appropriate offices and classroom spaces in their homes, and many awkward and invasive scenarios soon followed. While many may have been harmlessly captured on camera, like classes that witness a student’s family eating lunch in the background or a dog on the couch, even these harmless instances have insidious implications for the …


“Take Your Pictures, Leave Your (Digital) Footprints”: Increasing Privacy Protections For Children On Social Media, Kodie McGinley 2023 Golden Gate University School of Law

“Take Your Pictures, Leave Your (Digital) Footprints”: Increasing Privacy Protections For Children On Social Media, Kodie Mcginley

Golden Gate University Law Review

As the digital sphere becomes more prevalent in people’s lives, Congress has tried to keep up. First created in 1998, the Children’s Online Privacy Protection Act (COPPA) requires operators of websites directed at children to obtain consent from parents before collecting any personal information from children. COPPA also requires that operators take reasonable measures to protect the confidentiality of any personal information collected about children. Although COPPA has helped regulate online spaces, its focus is on regulating websites that collect personal information directly from children. This focus leaves a gap in the law that ignores personal data shared on social …


Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim 2023 University of the Free State

Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim

Journal of Cybersecurity Education, Research and Practice

This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity resilience. Cameroon's cybersecurity legal framework provides for audits but does not explicitly enumerate controls. Consequently, integrating relevant controls from the NIST frameworks and ISO Standards can improve the cybersecurity posture in Cameroon while waiting for a comprehensive revision of the legal framework. NIST and ISO are internationally recognized as best practices in information …


Privacy Harm And Non-Compliance From A Legal Perspective, Suvineetha Herath, Haywood Gelman, Lisa McKee 2023 Dakota State University

Privacy Harm And Non-Compliance From A Legal Perspective, Suvineetha Herath, Haywood Gelman, Lisa Mckee

Journal of Cybersecurity Education, Research and Practice

In today's data-sharing paradigm, personal data has become a valuable resource that intensifies the risk of unauthorized access and data breach. Increased data mining techniques used to analyze big data have posed significant risks to data security and privacy. Consequently, data breaches are a significant threat to individual privacy. Privacy is a multifaceted concept covering many areas, including the right to access, erasure, and rectify personal data. This paper explores the legal aspects of privacy harm and how they transform into legal action. Privacy harm is the negative impact to an individual as a result of the unauthorized release, gathering, …


Privacy And National Politics: Fingerprint And Dna Litigation In Japan And The United States Compared, Dongsheng Zang 2023 University of Washington School of Law

Privacy And National Politics: Fingerprint And Dna Litigation In Japan And The United States Compared, Dongsheng Zang

Pace Law Review

No abstract provided.


Table Of Contents, Seattle University Law Review 2023 Seattle University School of Law

Table Of Contents, Seattle University Law Review

Seattle University Law Review

Table of Contents


Direct To Consumer Or Direct To All: Home Dna Tests And Lack Of Privacy Regulations In The United States, Karen J. Kukla 2023 Indiana University Maurer School of Law

Direct To Consumer Or Direct To All: Home Dna Tests And Lack Of Privacy Regulations In The United States, Karen J. Kukla

IP Theory

Although the U.S. has some measures of privacy protection for genetic data, the lack of a comprehensive approach to protecting direct-to-consumer genetic testing results in privacy violations for both consumers and their relatives. This essay explores the critical need for the U.S. government to address these privacy violations and argues that the U.S. should approach the problem and strategize a solution similar to the European Union’s (EU) General Data Protection Regulation (GDPR). Part I identifies current United States law, both federal and state regulations that address DTC-GT and genetic privacy. Part II examines the lack of regulation surrounding current DTC-GT …


A Miscarriage Of Justice: How Femtech Apps And Fog Data Evade Fourth Amendment Privacy Protections, Rachel Silver 2023 Washington and Lee University School of Law

A Miscarriage Of Justice: How Femtech Apps And Fog Data Evade Fourth Amendment Privacy Protections, Rachel Silver

Washington and Lee Journal of Civil Rights and Social Justice

After the fall of Roe v. Wade, states across the country have enacted extreme abortion bans. Anti-abortion states, emboldened by their new, unrestricted power to regulate women’s bodies, are only broadening the scope of abortion prosecutions. And modern technology provides law enforcement with unprecedented access to women’s most intimate information, including, for example, their menstrual cycle, weight, body temperature, sexual activity, mood, medications, and pregnancy details. Fourth Amendment law fails to protect this sensitive information stored on femtech apps from government searches. In a largely unregulated private market, femtech apps sell health and location data to third parties like Fog …


Confronting Carpenter: Rethinking The Third-Party Doctrine And Location Information, Charlie Brownstein 2023 Fordham University School of Law

Confronting Carpenter: Rethinking The Third-Party Doctrine And Location Information, Charlie Brownstein

Fordham Law Review

The third-party doctrine enables law enforcement officers to obtain personal information shared with third parties without a warrant. In an era of highly accessible technology, individuals’ location information is consistently being transmitted to third parties. Due to the third-party doctrine, this shared information has been available to law enforcement, without the individual knowing or having an opportunity to challenge this availability. Law enforcement has utilized this doctrine to obtain comprehensive information regarding individuals’ whereabouts over long periods of time.

The U.S. Supreme Court recently limited the reach of the third-party doctrine regarding location data held by cellphone providers. However, this …


Twenty Years After Krieger V Law Society Of Alberta: Law Society Discipline Of Crown Prosecutors And Government Lawyers, Andrew Flavelle Martin 2023 Schulich School of Law, Dalhousie University

Twenty Years After Krieger V Law Society Of Alberta: Law Society Discipline Of Crown Prosecutors And Government Lawyers, Andrew Flavelle Martin

Articles, Book Chapters, & Popular Press

Krieger v. Law Society of Alberta held that provincial and territorial law societies have disciplinary jurisdiction over Crown prosecutors for conduct outside of prosecutorial discretion. The reasoning in Krieger would also apply to government lawyers. The apparent consensus is that law societies rarely exercise that jurisdiction. But in those rare instances, what conduct do Canadian law societies discipline Crown prosecutors and government lawyers for? In this article, I canvass reported disciplinary decisions to demonstrate that, while law societies sometimes discipline Crown prosecutors for violations unique to those lawyers, they often do so for violations applicable to all lawyers — particularly …


Constitutional Confidentiality, Natalie Ram, Jorge L. Contreras, Laura M. Beskow, Leslie E. Wolf 2023 University of Maryland School of Law

Constitutional Confidentiality, Natalie Ram, Jorge L. Contreras, Laura M. Beskow, Leslie E. Wolf

Washington and Lee Law Review

Federal Certificates of Confidentiality (“Certificates”) protect sensitive information about human research subjects from disclosure and use in judicial, administrative, and legislative proceedings at both the state and federal levels. When they were first authorized by Congress in the 1970s, Certificates covered sensitive information collected in research about drug addiction use. Today, however, they extend to virtually all personal information gathered by biomedical research studies. The broad reach of Certificates, coupled with their power to override state subpoenas and warrants issued in the context of law enforcement, abortion regulation, and other police powers typically under state control, beg the question whether …


Stay Out Of My Head: Neurodata, Privacy, And The First Amendment, Wayne Unger 2023 Quinnipiac University School of Law

Stay Out Of My Head: Neurodata, Privacy, And The First Amendment, Wayne Unger

Washington and Lee Law Review

The once science-fictional idea of mind-reading is within reach as advancements in brain-computer interfaces, coupled with advanced artificial intelligence, produce neurodata—the collection of substantive thoughts as storable and processable data. But government access to individuals’ neurodata threatens personal autonomy and the right to privacy. While the Fourth Amendment is traditionally considered the source of privacy protections against government intrusion, the First Amendment provides more robust protections with respect to whether governments can access one’s substantive ideas, thoughts, and beliefs. However, many theorists assert that the concept of privacy conflicts with the First Amendment because privacy restricts the flow of information …


Continuous Reproductive Surveillance, Michael Ulrich, Leah R. Fowler 2023 Boston University School of Public Health; Boston University School of Law

Continuous Reproductive Surveillance, Michael Ulrich, Leah R. Fowler

Faculty Scholarship

The Dobbs opinion emphasizes that the state’s interest in the fetus extends to “all stages of development.” This essay briefly explores whether state legislators, agencies, and courts could use the “all stages of development” language to expand reproductive surveillance by using novel developments in consumer health technologies to augment those efforts.


The Eyes Beyond The Screen: Digital Media Policy And Child Health, Yahia Al-Qudah 2023 The University of Texas Rio Grande Valley

The Eyes Beyond The Screen: Digital Media Policy And Child Health, Yahia Al-Qudah

Research Symposium

Background: Modern communication technology and digital media have provided society with a foundation for instant messaging. Pictures, videos, and texts connect individuals with families, friends, and the world. Consequently, digital media has accelerated exposure to risk in which children and adolescents are most vulnerable. This project’s objective is to 1) congregate and highlight current knowledge about the impact of digital media on child health, and 2) underline deficiencies in related laws and regulations as well as offer solutions in digital media policy.

Methods: A systematic literature review was conducted through the JAMA Pediatrics database with keywords such as “digital media,” …


Keep Your Fingerprints To Yourself: New York Needs A Biometric Privacy Law, Brendan McNerney 2023 St. John's University School of Law

Keep Your Fingerprints To Yourself: New York Needs A Biometric Privacy Law, Brendan Mcnerney

St. John's Law Review

(Excerpt)

Imagine walking into a store, picking something up, and just walking out. No longer is this shoplifting, it is legal. In 2016, Amazon introduced their “Just Walk Out” technology in Seattle. “Just Walk Out” uses cameras located throughout the store to monitor shoppers, document what they pick up, and automatically charge that shoppers’ Amazon account when they leave the store. Recently, Amazon started selling “Just Walk Out” technology to other retailers. Since then, retailers have become increasingly interested in collecting and using customers’ “biometric identifiers and information.” Generally, “biometrics” is used to refer to “measurable human biological and behavioral …


Accept All Cookies: Opting-In To A Comprehensive Federal Data Privacy Framework And Opting-Out Of A Disparate State Regulatory Regime, Lauren A. Di Lella 2023 Villanova University Charles Widger School of Law

Accept All Cookies: Opting-In To A Comprehensive Federal Data Privacy Framework And Opting-Out Of A Disparate State Regulatory Regime, Lauren A. Di Lella

Villanova Law Review

No abstract provided.


Information Leaking And The United States Supreme Court, Chad Marzen, Michael Conklin 2023 Brigham Young University Law School

Information Leaking And The United States Supreme Court, Chad Marzen, Michael Conklin

Brigham Young University Journal of Public Law

No abstract provided.


Digital Commons powered by bepress