Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

4,162 Full-Text Articles 3,973 Authors 2,628,445 Downloads 156 Institutions

All Articles in Privacy Law

Faceted Search

4,162 full-text articles. Page 61 of 132.

Borders And Bits, Jennifer Daskal 2018 Vanderbilt University Law School

Borders And Bits, Jennifer Daskal

Vanderbilt Law Review

Our personal data is everywhere and anywhere, moving across national borders in ways that defy normal expectations of how things and people travel from Point A to Point B. Yet, whereas data transits the globe without any intrinsic ties to territory, the governments that seek to access or regulate this data operate with territorial-based limits. This Article tackles the inherent tension between how governments and data operate, the jurisdictional conflicts that have emerged, and the power that has been delegated to the multinational corporations that manage our data across borders as a result. It does so through the lens of …


A Drone’S Eye View: Why And How The Federal Aviation Administration Should Regulate Hobbyist Drone Use, Alexandria Tomanelli 2018 Touro University Jacob D. Fuchsberg Law Center

A Drone’S Eye View: Why And How The Federal Aviation Administration Should Regulate Hobbyist Drone Use, Alexandria Tomanelli

Touro Law Review

No abstract provided.


Mobile Instant Messaging Evidence In Criminal Trials, Youngjin Choi 2018 The Catholic University of America, Columbus School of Law

Mobile Instant Messaging Evidence In Criminal Trials, Youngjin Choi

Catholic University Journal of Law and Technology

Mobile instant messaging, such as text messages, are a pervasive aspect of everyday life. The characteristics of the modern mobile instant messaging application, especially in comparison with other forms of more traditional electronic communication platforms, such as e-mail, text messaging, or computer-based instant messaging program, present a variety of evidentiary issues in trial.

To be relevant, mobile instant messaging evidence must be connected to a genuine issue at trial and not too attenuated from it. Authentication is also very important in determining whether it may be considered a non-hearsay statement. Although often otherwise admissible, mobile instant messaging evidence may still …


Dating Dangerously: Risks Lurking Within Mobile Dating Apps, Alyssa Murphy 2018 Catholic University of America (Student)

Dating Dangerously: Risks Lurking Within Mobile Dating Apps, Alyssa Murphy

Catholic University Journal of Law and Technology

In modern society, cell phones have become a virtual extension of most Americans. Advances in cell phone technology have given rise to the popularity of mobile dating applications (“apps”), which are capable of allowing users to date and meet potential partners without leaving the comfort of their own homes. The convenience and allure of mobile dating apps has led to a staggering increase in the number of crimes orchestrated against other users of the apps. Such crimes often include solicitation, stalking, murder, and human trafficking. Unsuspecting and trusting users fall victim to these crimes due to the false sense of …


Market Transparency: How Congress Can Reform Post-Secondary Student Data To Expand Consumer Choice, Benefit Institutions, And Make Higher Education More Transparent, William Holloway 2018 Catholic University of America Columbus School of Law

Market Transparency: How Congress Can Reform Post-Secondary Student Data To Expand Consumer Choice, Benefit Institutions, And Make Higher Education More Transparent, William Holloway

Catholic University Journal of Law and Technology

The federal higher education data system is broken and in need of reform. The Office of Federal Student Aid at the Department of Education has over $1.136 trillion in net liabilities on its balance sheets, most of which consist of federal loans which enable students to access higher education. Despite this large investment, the federal government does not have a coherent way to provide students, parents, institutions, or policy makers with transparent data on student completion, retention, loan repayment, and post-college success, due to federal policies that prevent data from being collected at the student-level. The resulting system is burdensome …


Smart Baby Monitors: The Modern Nanny Or A Home Invader, Sarah Ensenat 2018 The Catholic University of America, Columbus School of Law

Smart Baby Monitors: The Modern Nanny Or A Home Invader, Sarah Ensenat

Catholic University Journal of Law and Technology

Smart baby monitors exist to help parents protect and watch over their children. The smart baby monitors act as a second set of eyes when parents cannot be in the same room as their children. Low-tech hackers take advantage of gaps in the security of smart baby monitors. A hacker violates a consumer’s privacy by gaining access to private information, viewing the home and its occupants, and even speaking to children through the monitor.

This comment advocates for stricter security legislation for smart baby monitors. Without new legislation, manufacturers of smart baby monitors do not apply or invest in the …


Table Of Contents, 2018 The Catholic University of America, Columbus School of Law

Table Of Contents

Catholic University Journal of Law and Technology

No abstract provided.


International Comity And The Non-State Actor, Microsoft: Why Law Enforcement Access To Data Stored Abroad Act (Leads Act) Promotes International Comity, Sabah Siddiqui 2018 Catholic University of America (Student)

International Comity And The Non-State Actor, Microsoft: Why Law Enforcement Access To Data Stored Abroad Act (Leads Act) Promotes International Comity, Sabah Siddiqui

Catholic University Journal of Law and Technology

Currently large email service providers, such as Google, Microsoft and Yahoo are refusing to comply with warrants issued under the Secured Communications Act (“SCA”) because in many instances, the requested information may be stored in servers located abroad. In the dismissed Supreme Court case, In re Warrant to Search a Certain E-Mail Account Controlled & Maintained by Microsoft Corporation, the Supreme Court should have addressed whether an internet service provider must comply with a warrant issued under the SCA when the requested information is stored in a foreign country and whether enforcement of these warrants would be an impermissible …


Deepfake Videos: When Seeing Isn't Believing, Holly Kathleen Hall 2018 Arkansas State University - Main Campus

Deepfake Videos: When Seeing Isn't Believing, Holly Kathleen Hall

Catholic University Journal of Law and Technology

Videos, known as deepfakes, use readily available software to create a work that shows people saying and doing things they may never have uttered or engaged in. The technology making the videos appear very authentic is advancing at such a rate that people may not be able to detect if the videos are fact or fiction. Given the hasty acceptance of other forms of fake news in society, deepfake videos have the ability to affect the nature of information the public receives about candidates and policies. This study examines the potential use of deepfake videos in the democratic process, analyzes …


Masthead, 2018 The Catholic University of America, Columbus School of Law

Masthead

Catholic University Journal of Law and Technology

No abstract provided.


Ng9-1-1, Cybersecurity, And Contributions To The Model Framework For A Secure National Infrastructure, Andrew Jackson Coley 2018 The Catholic University of America, Columbus School of Law

Ng9-1-1, Cybersecurity, And Contributions To The Model Framework For A Secure National Infrastructure, Andrew Jackson Coley

Catholic University Journal of Law and Technology

9-1-1 call networks form the foundation of emergency communications infrastructure. However, a lack of funding and taking such networks for granted has led to a gradual yet predictable outdating of this critical infrastructure. Fortunately, recent efforts have acknowledged as such, and dedicated public safety officials have worked to update 9-1-1 systems to Next Generation 9-1-1 (NG9-1-1).
NG9-1-1 is an IP-based network with 21stcentury technology capable of handling increased call volume, more resilient networks, and providing significantly more data to first responders, among litany of other advancements. With this much needed advancement comes the responsibilities of ensuring a secure …


Assessing Assisted Reproductive Technology, Raymond C. O'Brien 2018 The Catholic University of America, Columbus School of Law

Assessing Assisted Reproductive Technology, Raymond C. O'Brien

Catholic University Journal of Law and Technology

Technological innovation possesses both opportunity and challenge. Because assisted reproductive technology (ART) involves sexual intimacy, parenthood, personhood, gender identity, privacy, legacy, and a plethora of religious, historical, sociological, and ethical underpinnings, the challenges presented in such technological innovation are substantial. Nonetheless, the opportunities are significant and progressive. Because of in vitro fertilization, gestational and genetic surrogacy, posthumous conception, and mitochondrial replacement therapy, humans now have the opportunity to overcome infertility, gender obstacles to parentage, dynastic limitations, and diseases that have long plagued mothers and infants. However, challenges include the exploitation of surrogates, unequal access to ART services, possibilities of cloning …


Privacy Of Information And Dna Testing Kits, Shanna Raye Mason 2018 Catholic University of America (Student)

Privacy Of Information And Dna Testing Kits, Shanna Raye Mason

Catholic University Journal of Law and Technology

In modern times, consumers desire for more control over their own health and healthcare. With this growing interest of control, direct to consumer DNA testing kits have never been more popular. However, many consumers are unaware of the potential privacy concerns associated with such use. This comment examines the popularity and privacy risks that are likely unknown to the individual consumer. This comment also addresses the shortcomings of the Health Insurance Portability and Accountability Act of 1996 (HIPAA), as well as the Genetic Information Nondiscrimination Act of 2008 (GINA) in regard to protecting individual’s genetic information from misuse. This comment …


The Tortoise And The Hare Of International Data Privacy Law: Can The United States Catch Up To Rising Global Standards?, Matthew Humerick 2018 The Catholic University of America, Columbus School of Law

The Tortoise And The Hare Of International Data Privacy Law: Can The United States Catch Up To Rising Global Standards?, Matthew Humerick

Catholic University Journal of Law and Technology

Technological developments spur the development of big data on a global scale. The breadth of data companies collect, maintain, process, and transmit affects nearly every country and organization around the world. Inherent to big data are issues of data protection and transfers to third countries. While many jurisdictions emphasize the importance of protecting consumer data, such as the European Union, others, like the United States, do not. To circumvent this issue, the United States and European Union contracted around data privacy standard discrepancies through the Safe Harbor Agreement, which eased cross-border data transfers. However, the Court of Justice of the …


Are Anti-Bullying Laws Effective?, Ari Ezra Waldman 2018 New York Law School

Are Anti-Bullying Laws Effective?, Ari Ezra Waldman

Articles & Chapters

Since 2010, when several high profile bullying-related suicides brought bullying and cyberharassment into the national consciousness, all 50 states have passed laws that address bullying among the nation’s youth. This essay is the first in a series of three projects on federal, state, municipal, and individual school approaches to bullying. There are only 4 published studies on the relationships between law and bullying rates. This Essay adds several features to the discourse. It offers a comprehensive analysis of the contents of state anti-bullying laws, using a 16-item list of guidelines from the United States Department of Education as a frame. …


Borders And Bits, Jennifer Daskal 2018 American University Washington College of Law

Borders And Bits, Jennifer Daskal

Articles in Law Reviews & Other Academic Journals

Our personal data is everywhere and anywhere, moving across national borders in ways that defy normal expectations of how things and people travel from Point A to Point B. Yet, whereas data transits the globe without any intrinsic ties to territory, the governments that seek to access or regulate this data operate with territorial-based limits. This Article tackles the inherent tension between how governments and data operate, the jurisdictional conflicts that have emerged, and the power that has been delegated to the multinational corporations that manage our data across borders as a result. It does so through the lens of …


Protecting Consumer Data Privacy With Arbitration, Erin O'Hara O'Connor 2018 Florida State University College of Law

Protecting Consumer Data Privacy With Arbitration, Erin O'Hara O'Connor

Scholarly Publications

No abstract provided.


Saving Face: Unfolding The Screen Of Chinese Privacy Law, Tiffany Li, Jill Bronfman, Zhou Zhou 2018 Boston University School of Law

Saving Face: Unfolding The Screen Of Chinese Privacy Law, Tiffany Li, Jill Bronfman, Zhou Zhou

Faculty Scholarship

Privacy is often a subjective value, taking on meaning from specific social, historical, and cultural contexts. Western privacy scholars have so far generally limited academic study to focus on Western ideals of privacy. However, privacy – or some notion of it – can be found in almost every culture and every nation, including the growing economic powerhouse that is the People’s Republic of China. Focusing on China as a case study of non-Western privacy norms is important today, given the rapid rise of the Chinese economy and its corresponding impact on worldwide cultural norms and law. Simply put, it is …


Biometrics And Federal Databases: Could You Be In It?, 51 J. Marshall L. Rev. 589 (2018), Angelica Carrero 2018 UIC School of Law

Biometrics And Federal Databases: Could You Be In It?, 51 J. Marshall L. Rev. 589 (2018), Angelica Carrero

UIC Law Review

No abstract provided.


Masthead, Editor In Chief 2018 The Catholic University of America, Columbus School of Law

Masthead, Editor In Chief

Catholic University Journal of Law and Technology

No abstract provided.


Digital Commons powered by bepress