privacy law
Recently Published Documents


TOTAL DOCUMENTS

343
(FIVE YEARS 104)

H-INDEX

9
(FIVE YEARS 3)

2022 ◽  
pp. 125-145
Author(s):  
Pedro Pina

Advances in the field of digital technology are constantly introducing new levels of controversy into copyright policy. Blockchain is the most recent technology with significative impact in digital copyright. Combined with smart contracts, blockchain enables new efficient forms of distribution of copyrighted works and also a new model of private ordering regarding the control of uses of works on the Internet. The chapter aims to examine the relationship and the most relevant intersections between blockchain, digital exploitation of copyrighted works, copyright law, and privacy law.


2021 ◽  
Author(s):  
Kevin McGillivray

In Government Cloud Procurement, Kevin McGillivray explores the question of whether governments can adopt cloud computing services and still meet their legal requirements and other obligations to citizens. The book focuses on the interplay between the technical properties of cloud computing services and the complex legal requirements applicable to cloud adoption and use. The legal issues evaluated include data privacy law (GDPR and the US regime), jurisdictional issues, contracts, and transnational private law approaches to addressing legal requirements. McGillivray also addresses the unique position of governments when they outsource core aspects of their information and communications technology to cloud service providers. His analysis is supported by extensive research examining actual cloud contracts obtained through Freedom of Information Act requests. With the demand for cloud computing on the rise, this study fills a gap in legal literature and offers guidance to organizations considering cloud computing.


2021 ◽  
Author(s):  
◽  
Abby Ward

<p>This paper examines the potential impact of recent English privacy jurisprudence on the New Zealand tort of privacy. The paper contrasts the New Zealand Court of Appeal’s aversion towards an over-expansive privacy right expressed in Hosking v Runting with an increasing readiness to override freedom of expression in favour of privacy interests in the United Kingdom. Three central conflicts in the courts’ reasoning are addressed in detail, namely privacy’s relationship with public places, individuals with public profiles and mediums of publication. While developments in English privacy law highlight reasoning flaws and theoretical shortcomings in Hosking, the increasing influence European jurisprudence on English law may nevertheless justify some divergence in the two jurisdictions’ balancing of privacy and freedom of expression.</p>


2021 ◽  
Author(s):  
◽  
Abby Ward

<p>This paper examines the potential impact of recent English privacy jurisprudence on the New Zealand tort of privacy. The paper contrasts the New Zealand Court of Appeal’s aversion towards an over-expansive privacy right expressed in Hosking v Runting with an increasing readiness to override freedom of expression in favour of privacy interests in the United Kingdom. Three central conflicts in the courts’ reasoning are addressed in detail, namely privacy’s relationship with public places, individuals with public profiles and mediums of publication. While developments in English privacy law highlight reasoning flaws and theoretical shortcomings in Hosking, the increasing influence European jurisprudence on English law may nevertheless justify some divergence in the two jurisdictions’ balancing of privacy and freedom of expression.</p>


2021 ◽  
Author(s):  
◽  
Zuryati Mohamed Yusoff

<p>In Malaysia, the rights and liberties of the individual are recognised in the Federal Constitution of Malaysia. However, the right to privacy does not have the express constitutional recognition enjoyed by other rights such as the right to life and liberty and freedom of expression. This thesis identifies gaps in the protection of privacy interests in the current legal framework. There is no self-standing law on privacy in Malaysia, though there are several laws which provide limited rights to privacy such as the laws on data protection and criminal law. The existing laws are inadequate to protect private information and to protect against the intrusion of privacy. The importation of foreign principles through the reception of English Common Law offers only limited protection. Malaysia should, therefore, have a specific law to protect privacy. With a view to attaining that goal for Malaysia, this thesis undertakes a comparative analysis of two different experiences of the development of the law of privacy. They are the privacy law in England, which is largely based on the law of breach of confidence, and the privacy law in New Zealand, which has a distinct privacy tort recognised in its case law. The conclusion is that those countries’ experience can inform developments in Malaysia, and that the best way for Malaysia to develop its law now is by the enactment of a specific Privacy Act.</p>


2021 ◽  
Author(s):  
◽  
Zuryati Mohamed Yusoff

<p>In Malaysia, the rights and liberties of the individual are recognised in the Federal Constitution of Malaysia. However, the right to privacy does not have the express constitutional recognition enjoyed by other rights such as the right to life and liberty and freedom of expression. This thesis identifies gaps in the protection of privacy interests in the current legal framework. There is no self-standing law on privacy in Malaysia, though there are several laws which provide limited rights to privacy such as the laws on data protection and criminal law. The existing laws are inadequate to protect private information and to protect against the intrusion of privacy. The importation of foreign principles through the reception of English Common Law offers only limited protection. Malaysia should, therefore, have a specific law to protect privacy. With a view to attaining that goal for Malaysia, this thesis undertakes a comparative analysis of two different experiences of the development of the law of privacy. They are the privacy law in England, which is largely based on the law of breach of confidence, and the privacy law in New Zealand, which has a distinct privacy tort recognised in its case law. The conclusion is that those countries’ experience can inform developments in Malaysia, and that the best way for Malaysia to develop its law now is by the enactment of a specific Privacy Act.</p>


Author(s):  
Michele Estrin Gilman

Feminism has long centered on breaking down the public and private divide that traditionally organized social relations and subordinated women. Privacy is lauded for giving women space for self-determination, but it is also criticized for creating spaces where patriarchy and misogyny can flourish unchecked. Cyberspace heightens the stakes of this tension because it creates almost limitless access to people’s personal data. We live in a datafied society powered by digital profiling, automated decisionmaking, and surveillance systems in which we no longer control our personal data; rather, it is used to control us. Women face multiple, gendered harms in cyberspace, including online harassment, digital discrimination, and sexual surveillance by the “femtech” industry. Yet the United States lacks comprehensive privacy laws, and its analog-era antidiscrimination statutes are no match for the digital world. American privacy protections hinge upon a notice-and-consent regime that puts the onus on users to protect their privacy rather than the entities that benefit from gathering individual’s personal data. Women and other marginalized people have suffered through a loss of privacy in the digital age, but activists have made efforts to ameliorate the harms of cyberspace and to shape privacy norms in a feminist and inclusive manner. It is important to understand the meaning of privacy through four waves of feminist theorizing and activism, to analyze how American privacy law responds to major gender equity challenges in cyberspace, and to examine current feminist theories and models of resistance.


2021 ◽  
Vol 41 (1) ◽  
pp. 100-13
Author(s):  
Michele Estrin Gilman

Menstruation is being monetized and surveilled, with the voluntary participation of millions of women. Thousands of downloadable apps promise to help women monitor their periods and manage their fertility. These apps are part of the broader, multi-billion dollar, Femtech industry, which sells technology to help women understand and improve their health. Femtech is marketed with the language of female autonomy and feminist empowerment. Despite this rhetoric, Femtech is part of a broader business strategy of data extraction, in which companies are extracting people’s personal data for profit, typically without their knowledge or meaningful consent. Femtech can oppress menstruators in several ways. Menstruators lose control over their personal data and how it is used. Some of these uses can potentially disadvantage women in the workplace, insurance markets, and credit scoring. In addition, these apps can force users into a gendered binary that does not always comport with their identity. Further, period trackers are sometimes inaccurate, leading to unwanted pregnancies. Additionally, the data is nearly impossible to erase, leading some women to be tracked relentlessly across the web with assumptions about their childbearing and fertility. Despite these harms, there are few legal restraints on menstrual surveillance. American data privacy law largely hinges on the concept of notice and consent, which puts the onus on people to protect their own privacy rather than placing responsibility on the entities that gather and use data. Yet notice and consent is a myth because consumers do not read, cannot comprehend, and have no opportunities to negotiate the terms of privacy policies. Notice and consent is an individualistic approach to data privacy that envisions an atomized person pursing their own self-interest in a competitive marketplace. Menstruators’ needs do not fit this model. Accordingly, this Essay seeks to reconceptualize Femtech within an expanded menstrual justice framework that recognizes the tenets of data feminism. In this vision, Femtech would be an empowering and accurate health tool rather than a data extraction device.


2021 ◽  
Author(s):  
Ari Ezra Waldman

In Industry Unbound, Ari Ezra Waldman exposes precisely how the tech industry conducts its ongoing crusade to undermine our privacy. With research based on interviews with scores of tech employees and internal documents outlining corporate strategies, Waldman reveals that companies don't just lobby against privacy law; they also manipulate how we think about privacy, how their employees approach their work, and how they weaken the law to make data-extractive products the norm. In contrast to those who claim that privacy law is getting stronger, Waldman shows why recent shifts in privacy law are precisely the kinds of changes that corporations want and how even those who think of themselves as privacy advocates often unwittingly facilitate corporate malfeasance. This powerful account should be ready by anyone who wants to understand why privacy laws are not working and how corporations trap us into giving up our personal information.


Sign in / Sign up

Export Citation Format

Share Document