Privacy In Pandemic: Law, Technology, And Public Health In The Covid-19 Crisis, 2020 Boston University School of Law
Privacy In Pandemic: Law, Technology, And Public Health In The Covid-19 Crisis, Tiffany Li
The COVID-19 pandemic has caused millions of deaths and disastrous consequences around the world, with lasting repercussions for every field of law, including privacy and technology. The unique characteristics of this pandemic have precipitated an increase in use of new technologies, including remote communications platforms, healthcare robots, and medical AI. Public and private actors are using new technologies, like heat sensing, and technologically-influenced programs, like contact tracing, alike in response, leading to a rise in government and corporate surveillance in sectors like healthcare, employment, education, and commerce. Advocates have raised the alarm for privacy and civil liberties violations, but the ...
State Enforcement In A Polycentric World, 2020 Brigham Young University Law School
State Enforcement In A Polycentric World, David A. Hyman, William E. Kovacic
BYU Law Review
No abstract provided.
Cryptography, Passwords, Privacy, And The Fifth Amendment, 2020 Gary Kessler Associates / Embry-Riddle Aeronautical University - Daytona Beach
Cryptography, Passwords, Privacy, And The Fifth Amendment, Gary C. Kessler, Ann M. Phillips
Journal of Digital Forensics, Security and Law
Military-grade cryptography has been widely available at no cost for personal and commercial use since the early 1990s. Since the introduction of Pretty Good Privacy (PGP), more and more people encrypt files and devices, and we are now at the point where our smartphones are encrypted by default. While this ostensibly provides users with a high degree of privacy, compelling a user to provide a password has been interpreted by some courts as a violation of our Fifth Amendment protections, becoming an often insurmountable hurdle to law enforcement lawfully executing a search warrant. This paper will explore some of the ...
Compliance Management Systems: Do They Make A Difference?, 2020 University of Pennsylvania Carey Law School
Compliance Management Systems: Do They Make A Difference?, Cary Coglianese, Jennifer Nash
Faculty Scholarship at Penn Law
Regulatory compliance is vital for promoting the public values served by regulation. Yet many businesses remain out of compliance with some of the regulations that apply to them—presenting not only possible dangers to the public but also exposing themselves to potentially significant liability risk. Compliance management systems (CMSs) may help reduce the likelihood of noncompliance. In recent years, managers have begun using CMSs in an effort to address compliance issues in a variety of domains: environment, workplace health and safety, finance, health care, and aviation, among others. CMSs establish systematic, checklist-like processes by which managers seek to improve their ...
“My Computer Is My Castle”: New Privacy Frameworks To Regulate Police Hacking, 2020 Brigham Young University Law School
“My Computer Is My Castle”: New Privacy Frameworks To Regulate Police Hacking, Ivan Škorvánek, Bert-Jaap Koops, Bryce Clayton Newell, Andrew Roberts
BYU Law Review
Several countries have recently introduced laws allowing the police to hack into suspects’ computers. Legislators recognize that police hacking is highly intrusive to personal privacy but consider it justified by the increased use of encryption and mobile computing—both of which challenge traditional investigative methods. Police hacking also exemplifies a major challenge to the way legal systems deal with, and conceptualize, privacy. Existing conceptualizations of privacy and privacy rights do not always adequately address the types and degrees of intrusion into individuals’ private lives that police hacking powers enable.
Traditional privacy pillars such as the home and secrecy of communications ...
Copyright’S Memory Hole, 2020 Brigham Young University Law School
Copyright’S Memory Hole, Eric Goldman, Jessica Silbey
BYU Law Review
There is growing interest in using copyright to protect the privacy and reputation of people depicted in copyrighted works. This pressure is driven by heightened concerns about privacy and reputation on the Internet, plus copyright’s plaintiff-favorable attributes compared to traditional privacy and reputation torts.
The Constitution authorizes copyright law because its exclusive rights benefit society by increasing our knowledge. But copyright law is being misdeployed by suppressing socially valuable works in a counterproductive attempt to advance privacy and reputation interests. This results in “memory holes” in society’s knowledge, analogous to those discussed in George Orwell’s dystopian novel ...
Wire(Less) Tapping: Protecting Arkansans' Fourth Amendment Right In The Era Of The Cloud, 2020 University of Arkansas, Fayetteville
Wire(Less) Tapping: Protecting Arkansans' Fourth Amendment Right In The Era Of The Cloud, Erin James
Arkansas Law Review
Every day we surround ourselves with dozens of devices that monitor our every move, every request, all connecting with one another and sending massive amounts of data back to the device manufacturers. The idea of the prosecution placing the little black cylinder of your Amazon Alexa on the witness stand and asking Alexa to testify against you seems like something pulled from an Orwellian nightmare. But, in reality, it is already occurring.
The Law Of Black Mirror - Syllabus, 2020 CUNY Bernard M Baruch College
The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin
Open Educational Resources
Using episodes from the show Black Mirror as a study tool - a show that features tales that explore techno-paranoia - the course analyzes legal and policy considerations of futuristic or hypothetical case studies. The case studies tap into the collective unease about the modern world and bring up a variety of fascinating key philosophical, legal, and economic-based questions.
How Legislations Of Tajikistan And Kyrgyzstan Regulate The Issue Of Validity Of A Consent For The Processing Of Personal Data, Faridun Yusufov
English Language Institute
This research explores differences in legislations of Tajikistan and Kyrgyzstan and compares provisions contained therein about the validity of consent to process individual data which are also evaluated in terms of their compliance with elements of validity of the consent researched by some authors.
A Too Permeating Police Surveillance: Consumer Genetic Genealogy And The Fourth Amendment After Carpenter, 2020 Loyola Marymount University and Loyola Law School
A Too Permeating Police Surveillance: Consumer Genetic Genealogy And The Fourth Amendment After Carpenter, Michael I. Selvin
Loyola of Los Angeles Law Review
No abstract provided.
Is Data Localization A Solution For Schrems Ii?, 2020 Georgetown University Law Center
Is Data Localization A Solution For Schrems Ii?, Anupam Chander
Georgetown Law Faculty Publications and Other Works
For the second time this decade, the Court of Justice of the European Union has struck a blow against the principal mechanisms for personal data transfer to the United States. In Data Protection Commissioner v Facebook Ireland, Maximillian Schrems, the Court declared the EU-US Privacy Shield invalid and placed significant hurdles to the process of transferring personal data from the European Union to the United States via the mechanism of Standard Contractual Clauses. Many have begun to suggest data localization as the solution to the problem of data transfer; that is, don’t transfer the data at all. I argue ...
Privacy And Surveillance In The Workplace: Closing The Electronic Surveillance Gap, 2020 The University of Western Ontario
Privacy And Surveillance In The Workplace: Closing The Electronic Surveillance Gap, Christina Catenacci
Electronic Thesis and Dissertation Repository
This dissertation argues that there is an electronic surveillance gap in the employment context in Canada, a gap that is best understood as an absence of appropriate legal provisions to regulate employers’ electronic surveillance of employees both inside and outside the workplace. This dissertation aims to identify and articulate principles and values that can be used to close the electronic surveillance gap in Canada and suggests that, through the synthesis of social theories of surveillance and privacy, together with analyses of privacy provisions and workplace privacy cases, a new and better workplace privacy regime can be designed. This dissertation uses ...
The First Amendment And Data Privacy: Securing Data Privacy Laws That Withstand Constitutional Muster, 2020 Pepperdine University
The First Amendment And Data Privacy: Securing Data Privacy Laws That Withstand Constitutional Muster, Kathryn Peyton
Pepperdine Law Review
Given the growing ubiquity of digital technology’s presence in people’s lives today, it is becoming increasingly more necessary to secure data privacy protections. People interact with technology constantly, ranging from when engaging in business activates, such as corresponding through emails or doing research online, to more innocuous activities like driving, shopping, or talking with friends and family. The advances in technology have made possible the creation of digital trails whenever someone interacts with such technology. Companies aggregate data from data trails and use predictive analytics to create detailed profiles about citizen-consumers. This information is typically used for profit ...
Cybersecurity-The Internet Of Things, 2020 CUNY Hostos Community College
Cybersecurity-The Internet Of Things, Amy J. Ramson
Open Educational Resources
With 38.5 billion smart devices in existence in 2020 and increasing every year, the potential for security breaches in the Internet of things is also escalating at a dramatic pace. The goal of this team activity is to facilitate team work, critical thinking, and presentation skills in the area of cybersecurity and the Internet of Things. Students will be grouped into two teams. As a team, they will analyze cases about security cameras and smart dolls through the questions presented in the activity. They will present their analysis to the class.
Sharenting And The (Potential) Right To Be Forgotten, 2020 Indiana University, Maurer School of Law
Sharenting And The (Potential) Right To Be Forgotten, Keltie Haley
Indiana Law Journal
Part I of this Note serves as an evaluation of parental use of social media and
further seeks to draw attention to the social and developmental impact parental
oversharing can have on children. Part II examines the tension between parents’
constitutional rights to direct the upbringing of their children, as well as their First
Amendment interest in online expression, and their children’s interest in personal
data security and privacy. Part III provides an overview of the European Union’s
right to be forgotten framework in the sharenting context and considers the
plausibility of implementing such a framework in the ...
Surveillance Technology Toward A Dystopian Future, 2020 Northeastern Illinois University
Surveillance Technology Toward A Dystopian Future, Sandy Hernandez
University Honors Program Senior Projects
There is a continual debate between individuals who attempt to measure the individual’s right to privacy against the government’s right to know as an exchange to provide for the security of all citizens. Questions that demand an answer are whether the individual’s right to privacy outweighs the government’s duty to provide security; and if security is considered more important, can there even be a right to privacy. When questioning the right to privacy and state surveillance, there are three key goals. First, to investigate whether the human right to privacy should exist, considering the continued threat ...
Teaching Information Privacy Law, 2020 Indiana University Maurer School of Law
Teaching Information Privacy Law, Joseph A. Tomain
Articles by Maurer Faculty
Teaching information privacy law is exciting and challenging because of the fast pace of technological and legal development and because "information privacy law" sprawls across a vast array of disparate areas of substantive law that do not automatically connect. This Essay provides one approach to teaching this fascinating, doctrinally diverse, and rapidly moving area of law. Through the framework of ten key course themes, this pedagogical approach seeks to help students find a common thread that connects these various areas of law into a cohesive whole. This framework provides a way to think about not only privacy law, but also ...
Patel V. Facebook, Inc.: The Collection, Storage, And Use Of Biometric Data As A Concrete Injury Under Bipa, 2020 Golden Gate University School of Law
Patel V. Facebook, Inc.: The Collection, Storage, And Use Of Biometric Data As A Concrete Injury Under Bipa, Jessica Robles
Golden Gate University Law Review
Facebook, Inc. (“Facebook”) amassed one of the most extensive facial- template databases in the world through the use of facial-recognition technology. However, Facebook is not alone; both private and public sector entities are heavily investing in improving their facial-identification technology. Facial geometry data are unique to each person and can be used to identify an individual. Once a facial image has been captured and stored in a facial-template database, “the individual has no recourse” because one cannot change facial geometry as quickly as a password or a social security number.
Although companies may use facial-recognition technology for valid purposes, uses ...
The New Regulatory Imperative For Insurance, 2020 Rutgers Law School
The New Regulatory Imperative For Insurance, Rick Swedloff
Boston College Law Review
This Article addresses emerging gaps in consumer protection. Insurers, like companies in other industries, are revolutionizing their practices with artificial intelligence and big data. Insurers are finding new ways to price risks and policies, tailor coverage, offer advice to purchasers, identify fraud, and sequence the payment of claims. These changes have subverted consumer protections built into current regulatory regimes, and regulators are struggling to adapt. This is not a niche problem. Insurance is a vital part of the U.S. economy: it rakes in over 1.2 trillion dollars in premiums a year; employs more than 2.7 million people ...
The Criminal, Regulatory, And Civil Issues Surrounding Intellectual Property And Cybersecurity, 2020 Brooklyn Law School
The Criminal, Regulatory, And Civil Issues Surrounding Intellectual Property And Cybersecurity, Ernest Edward Badway, Christie Mcguinness
Brooklyn Journal of Corporate, Financial & Commercial Law
Cyber-attacks have affected all organizations and individual consumers. Dissemination of relevant information and attention to strong information security practices is an important tool in fighting this cyber “pandemic.” Additionally, the legal and regulatory liability companies face from cyber-attacks as well as general strategies and practical solutions companies may implement to protect against cyber-intrusions and respond effectively in the event of an attack are considered. There are many iterations of cyber-crime, and we address the various methods cybercriminals use and the many ways cyber-attacks can take place, as well as the entities and victims affected. Moreover, the legal liability and regulatory ...