Quinn: Supreme Court should clarify Fourth Amendment rights in the digital age
""Some members of the court will certainly try to consider the place mobile devices play in modern life," said Jennifer Granick, director of civi…
""Some members of the court will certainly try to consider the place mobile devices play in modern life," said Jennifer Granick, director of civi…
Woodrow Hartzog, Chain Link Confidentiality, 46 Georgia L. Rev. 657 (2012) available at SSRN. Since at least the early 2000s, privacy scholars have illuminated…
One of the greatest challenges of living in the future is that it mostly looks just like the present. We have self-driving cars, commercial spaceflight, powerfu…
This week I had a request for privacy information that went something like this: I am starting a new project and expect people to search my name online. There…
"Citron and Franks both admire his work, but say it can’t stem the larger tide. “It is a drop in the bucket,” says Citron. “There are still over 40 sites d…
"What we need is a way of getting all the relevant privacy information in a timely, applicable and focused fashion. Arvind Narayanan, Assistant Professor o…
This event was hosted by the Stanford Center for Internet and Society. https://cyberlaw.stanford.edu/events/cis-tech-workshop-tom-lowenthal-ema... Pretty-good…
Consider three recent news articles about online privacy: Google+ added a new feature that shows view counts on everything you post, including your photos. It’…
"Q. What is the best part of your job? A. All parts of my job are “the best.” Privacy is a fascinating field that’s evolving with astounding speed and mak…
"Another way to understand the constitutionality of revenge porn statutes is through the lens of confidentiality law. Woodrow Hartzog persuasively contends…
Disclosing someone’s nude image in violation of trust and confidence (often known as nonconsensual pornography or revenge porn) is a destructive invasion of pri…
Today the Fourth Circuit refrained from deciding the first legal challenge to government seizure of the master encryption keys that secure our communications wi…