An Amazon Echo device is the subject of a prosecutor’s search warrant related to an Arkansas murder case. Nicole Black illuminates how such devices are complicating issues related to consumer privacy and vendor responses to search warrants. The ubiquity of Internet of Things (IoT) devices in homes will no doubt result in more warrants for the data they collect.
Examples of the use of visualizations and graphical representations of data and documents in the legal arena are increasing. Alan Rothman’s article includes examples from the public and private sectors as well as academia.
2014 has been a watershed for the national and international role of citizen photo journalists who have impacted in myriad ways events which have in turn sparked debate, protests, and legal action – increasing the scrutiny of activity conducted by groups including law enforcement. Ken Strutin’s timely, informative and significant article collects noteworthy news, litigation, and legal analyses concerning civilians and journalists photo-documenting the activities of law enforcement as well as police use of cameras to record their work.
Marcus P. Zillman’s guide is a comprehensive listing of privacy resources currently available on the Internet that impact your email, smartphones, websites, hard drives, files and data. Sources include associations, indexes, search engines as well as individual websites and organizations that provide the latest technology and information to raise awareness of privacy and security as you interact with others using the internet.
Adobes laxness with e-book data shows the need for a library-controlled ecosystem for library e-books
David Rothman highlights the recent revelation of an Adobe e-book reader data collection privacy issue, and suggests this security vulnerability offers a key opportunity for libraries to collaborate with other organizations to diminish data breaches, increase reader privacy, and empower libraries as stakeholders in a new relationship with vendors and customers.
In the second article of a four part series, Daniel J. Solove explains how the law is struggling to deal with privacy and data security harms.
Daniel J. Solove is a Law professor at George Washington University Law School, an expert in information privacy law, and founder of TeachPrivacy, a privacy and security training company. In the first of a four part series, Prof. Solove’s article focuses on the ramifications of increasingly common instances of personal data theft or improper data disclosure, and the subsequent ramifications for those compromised.
The International Privacy Law Library on WorldLII has been expanded. The Library’s 32 databases include about 3,600 decisions of 13 privacy and data protection authorities, from New Zealand, Ireland, the United Kingdom, Hong Kong, Australia, Korea, Macau, Mauritius, the United States and the European Union.
Criminal law expert Ken Strutin’s article addresses how DNA forensics is about information, privacy and the presumption of innocence. It has become the determinant for identification, solving cold cases and exonerating the innocent. Strutin describes that at its core, it is an inestimable library of personal data. Due to the increasingly important role of Personally identifiable information (PII), courts and legislatures have been attempting to balance the interests of the individual in protecting their genetic information with the usefulness and necessity of that same data for criminal investigation. Strutin notes clearly that any DNA or forensic database is a composite of intertwined informational and legal values that pose competing and conflicting questions about the analytics (accuracy, reliability and validity) of the data and the lawfulness (constitutionality) of its gathering. His article collects recent notable decisions and scholarship appearing in the aftermath of Maryland v. King.
Professor Annemarie Bridy challenges the increasingly common use of mandatory Facebook login for Internet users trying to gain access to a third-party service – including posting comments to news stories, as well as viewing white papers, studies, reports and other documents.