This Article addresses the need to recognize a property-based right in personal data and to limit the amount of personal information that can be lawfully collected about individuals online. The Fourth Amendment, protecting “persons, houses, papers, and effects” from unreasonable searches must be interpreted to ensure privacy for personal data. The evolving nature of data privacy protections and global data privacy standards emphasizes the necessity to develop clear standards and statutes to protect an individual’s interest in their personal data. Statutes such as the E.U.’s GDPR and California’s CCPA, provide a regulatory framework on how to approach data privacy on the federal level. Using a property-based approach to “effects” and persona...
Websites and mobile applications provide immeasurable benefits to both users and companies. These se...
As the creation of data has exponentially increased with Internet usage, U.S. companies have found a...
In this Article, I will review the origins of data protection laws and reestablish the concept of “d...
This Article addresses the need to recognize a property-based right in personal data and to limit th...
For decades, courts have used a “reasonable expectation of privacy” standard to determine whether a ...
In this article, Professor Solove examines the increasing information flow from the private sector t...
The computer revolution has created a world where communication is cheap and instantaneous, and wher...
Given the growing ubiquity of digital technology’s presence in people’s lives today, it is becoming ...
The federal privacy legislative scheme is composed of a fragmented patchwork of aging sector-specifi...
The United States has yet to enact federal privacy legislation to regulate the use of personally ide...
The relationship between privacy, technology, and law is complex. Thomas Jefferson’s prescient ninet...
This paper proposes revisions to the OECD Guidelines that include basic changes essential for the pr...
The Supreme Court\u27s Fourth Amendment jurisprudence is often critiqued, particularly the Court\u27...
Technology has transformed government surveillance and opened traditionally private information to o...
The digital age has paved the way for unforeseen and unconscionable harms. Recent experiences with s...
Websites and mobile applications provide immeasurable benefits to both users and companies. These se...
As the creation of data has exponentially increased with Internet usage, U.S. companies have found a...
In this Article, I will review the origins of data protection laws and reestablish the concept of “d...
This Article addresses the need to recognize a property-based right in personal data and to limit th...
For decades, courts have used a “reasonable expectation of privacy” standard to determine whether a ...
In this article, Professor Solove examines the increasing information flow from the private sector t...
The computer revolution has created a world where communication is cheap and instantaneous, and wher...
Given the growing ubiquity of digital technology’s presence in people’s lives today, it is becoming ...
The federal privacy legislative scheme is composed of a fragmented patchwork of aging sector-specifi...
The United States has yet to enact federal privacy legislation to regulate the use of personally ide...
The relationship between privacy, technology, and law is complex. Thomas Jefferson’s prescient ninet...
This paper proposes revisions to the OECD Guidelines that include basic changes essential for the pr...
The Supreme Court\u27s Fourth Amendment jurisprudence is often critiqued, particularly the Court\u27...
Technology has transformed government surveillance and opened traditionally private information to o...
The digital age has paved the way for unforeseen and unconscionable harms. Recent experiences with s...
Websites and mobile applications provide immeasurable benefits to both users and companies. These se...
As the creation of data has exponentially increased with Internet usage, U.S. companies have found a...
In this Article, I will review the origins of data protection laws and reestablish the concept of “d...