New Edition of Information Privacy Law Casebooks
The new edition of my casebook, Information Privacy Law (4th edition) (with Paul M. Schwartz) is hot off the presses. And there’s a new edition of my casebook, Privacy, Information, and Technology...
View ArticleTwo New Cases Regarding NSA Surveillance
The 9th Circuit has decided a pair of cases involving the NSA Surveillance Program. In Jewel v. NSA, the 9th Circuit concluded that plaintiffs had standing to raise constitutional challenges against...
View ArticleNeeded Steps Forward on the Privacy and Civil Liberties Oversight Board
Thanks to terrific privacy blogger Melissa Ngo and privacy scholar and change maker Peter Swire, I’ve learned about some exciting developments about the Privacy and Civil Liberties Oversight Board....
View ArticleCybersecurity Puzzles
Cybersecurity is in the news: a network intrusion allegedly interfered with railroad signals in the Northwest in December; the Obama administration refused to support the Stop Online Piracy Act due to...
View ArticleThe Potentially Profound Implications of United States v. Jones
I must respectfully disagree with a recent post by Renee Hutchins on our blog about the recent U.S. Supreme Court case, United States v. Jones. She concludes: With full knowledge of this history,...
View ArticleKennedy and Szoka on U.S. v. Jones
Charlie Kennedy and Berin Szoka of TechFreedom have an insightful op-ed in c/net yesterday. It resonates with some of what my co-blogger Dan Solove said in his post and urges Congress to move on ECPA...
View ArticleStanford Law Review Online: The Privacy Paradox 2012 Symposium Issue
Our 2012 Symposium Issue, The Privacy Paradox: Privacy and Its Conflicting Values, is now available online: Essays A Reasonableness Approach to Searches After the Jones GPS Tracking Case by Peter...
View ArticleSurveillance, Apologize (Sometimes), and Repeat
On February 19, 2009, the North Central Texas Fusion Center issued a bulletin to over a hundred law enforcement agencies that urged officers to report activities of pro-Islam groups. As the bulletin...
View ArticleOn the Colloquy: The Fourth Amendment and Airport Screening Issues
The online companion to the Northwestern University Law Review is proud to feature companion essays on the Fourth Amendment and newly invasive airport screening methods. In Revisiting “Special Needs”...
View ArticleSymposium on Configuring the Networked Self: Cohen’s Methodological...
Julie Cohen’s extraordinarily illuminating book Configuring the Networked Self makes fundamental contributions to the field of law and technology. In this post, I’d like to focus on methodology and...
View ArticlePakistan Scrubs the Net
Pakistan, which has long censored the Internet, has decided to upgrade its cybersieves. And, like all good bureaucracies, the government has put the initiative out for bid. According to the New York...
View ArticleCybersecurity Legislation and the Privacy and Civil Liberties Oversight Board
Along with a lot of other privacy folks, I have a lot of concerns about the cybersecurity legislation moving through Congress. I had an op-ed in The Hill yesterday going through some of the concerns,...
View ArticleBRIGHT IDEAS: Q&A with Bruce Schneier about Liars and Outliers
Bruce Schneier has recently published a new book, Liars and Outliers: Enabling the Trust that Society Needs to Thrive (Wiley 2012). Bruce is a renowned security expert, having written several great...
View ArticleBig Data Brokers as Fiduciaries
In a piece entitled “You for Sale,” Sunday’s New York Times raised important concerns about the data broker industry. Let us add some more perils and seek to reframe the debate about how to regulate...
View ArticleUnited States v. Skinner: Developments in the Surveillance State and a Response
It’s not news to CoOp readers that Fourth Amendment law is in a state of confusion over how to deal with ever-expanding capacities of state agents to collect information about our movements and...
View ArticleBiometric Databases and Quantitative Privacy
The new $1 billion Next Generation Identification (NGI) system is now in its roll out phase. NGI–a joint project of federal, state, and local law enforcement and other agencies — is a nationwide...
View ArticleLaws Regulating PII
My co-author Sasha Romanosky asks me to post the following: I am involved in a research project that examines state laws affecting the flow of personal information in some way. This information could...
View ArticleWhy Justice Goldberg Cared So Much About Privacy
David Stebenne gave a fascinating talk today about how the personal experiences of Justice Goldberg made him very sensitive to privacy, and led to his strong pro-privacy concurrence in the Griswold...
View ArticleOn systematic government access to private sector data
The Sixth Circuit Court of Appeals has recently decided in United States v. Skinner that police does not need a warrant to obtain GPS location data for mobile phones. The decision, based on the holding...
View ArticleMore on government access to private sector data
Last week I blogged here about a comprehensive survey on systematic government access to private sector data, which will be published in the next issue of International Data Privacy Law, an Oxford...
View Article
More Pages to Explore .....