{"title":"First Amendment Concerns in Governmental Acquisition and Analysis of Mobile Device Location Data","authors":"Gerald J. Votava","doi":"10.5195/tlp.2013.121","DOIUrl":"https://doi.org/10.5195/tlp.2013.121","url":null,"abstract":"","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124781962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The exciting, thriving and developing technology that everybody has been talking about recently is drones. Due to recent technological developments, which make drones an affordable and universal tool, drones have expanded out of military use and into domestic applications. The enactment of the FAA Modernization and Reform Act in 2012 further pushed for the development and expansion of drone use in the United States’ airspace, by requiring the FAA to license over 30,000 drone operators. While drone use has an unlimited potential for beneficial use within society, drone technology is not without risks. For example, drone use in domestic airspace raises the significant and undeniable risk of individual privacy invasions through the use of drones by both public entities and third parties. This article argues current common law and legislative protections of potential privacy invasions resulting from drone use are drastically insufficient as neither affords strong protection of an individual’s privacy from such sophisticated technology’s potential. The article concludes by recommending a federal baseline consumer protection act that would establish a reasonable level of protection for an individual’s privacy by ensuring drone use was being monitored from a privacy protection standpoint and limiting the use of drones in a way that would invade an individual’s privacy expectations. Normal 0 false false false EN-US JA X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:12.0pt; font-family:"Cambria","serif"; mso-ascii-font-family:Cambria; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Cambria; mso-hansi-theme-font:minor-latin;}
最近每个人都在谈论的令人兴奋、蓬勃发展的技术是无人机。由于最近的技术发展,使无人机成为一种负担得起的通用工具,无人机已经从军事用途扩展到家庭应用。2012年颁布的《联邦航空局现代化和改革法案》进一步推动了无人机在美国空域的发展和扩大,要求联邦航空局向3万多名无人机操作员颁发许可证。虽然无人机在社会中具有无限的有益使用潜力,但无人机技术并非没有风险。例如,在国内空域使用无人机增加了公共实体和第三方通过使用无人机侵犯个人隐私的重大和不可否认的风险。本文认为,目前的普通法和立法对无人机使用可能导致的隐私侵犯的保护远远不够,因为它们都没有提供强有力的个人隐私保护,不受这种复杂技术的影响。文章最后建议制定一项联邦消费者保护基准法案,通过确保从隐私保护的角度监控无人机的使用,并限制无人机的使用,以侵犯个人隐私的期望,为个人隐私建立一个合理的保护水平。正常0 false false false EN-US JA X-NONE /*样式定义*/表。mso-style-name:"Table Normal";mso-tstyle-rowband-size: 0;mso-tstyle-colband-size: 0;mso-style-noshow:是的;mso-style-priority: 99;mso-style-parent:“”;mso- font - family:宋体;mso-para-margin: 0;mso-para-margin-bottom: .0001pt;mso-pagination: widow-orphan;字体大小:12.0分;字体类型:“威尔士”、“衬”;mso-ascii-font-family:威尔士;mso-ascii-theme-font: minor-latin;mso-hansi-font-family:威尔士;mso-hansi-theme-font: minor-latin;}
{"title":"The New Privacy Battle: How the Expanding Use of Drones Continues to Erode Our Concept of Privacy and Privacy Rights","authors":"Chris Schlag","doi":"10.5195/TLP.2013.123","DOIUrl":"https://doi.org/10.5195/TLP.2013.123","url":null,"abstract":"The exciting, thriving and developing technology that everybody has been talking about recently is drones. Due to recent technological developments, which make drones an affordable and universal tool, drones have expanded out of military use and into domestic applications. The enactment of the FAA Modernization and Reform Act in 2012 further pushed for the development and expansion of drone use in the United States’ airspace, by requiring the FAA to license over 30,000 drone operators. While drone use has an unlimited potential for beneficial use within society, drone technology is not without risks. For example, drone use in domestic airspace raises the significant and undeniable risk of individual privacy invasions through the use of drones by both public entities and third parties. This article argues current common law and legislative protections of potential privacy invasions resulting from drone use are drastically insufficient as neither affords strong protection of an individual’s privacy from such sophisticated technology’s potential. The article concludes by recommending a federal baseline consumer protection act that would establish a reasonable level of protection for an individual’s privacy by ensuring drone use was being monitored from a privacy protection standpoint and limiting the use of drones in a way that would invade an individual’s privacy expectations. Normal 0 false false false EN-US JA X-NONE /* Style Definitions */ \u0000 table.MsoNormalTable \u0000 {mso-style-name:\"Table Normal\"; \u0000 mso-tstyle-rowband-size:0; \u0000 mso-tstyle-colband-size:0; \u0000 mso-style-noshow:yes; \u0000 mso-style-priority:99; \u0000 mso-style-parent:\"\"; \u0000 mso-padding-alt:0in 5.4pt 0in 5.4pt; \u0000 mso-para-margin:0in; \u0000 mso-para-margin-bottom:.0001pt; \u0000 mso-pagination:widow-orphan; \u0000 font-size:12.0pt; \u0000 font-family:\"Cambria\",\"serif\"; \u0000 mso-ascii-font-family:Cambria; \u0000 mso-ascii-theme-font:minor-latin; \u0000 mso-hansi-font-family:Cambria; \u0000 mso-hansi-theme-font:minor-latin;}","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"84 3-4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131642047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Drawing the Line: The Legality of Using Wiretaps to Investigate Insider Trading","authors":"S. Miller","doi":"10.5195/tlp.2013.122","DOIUrl":"https://doi.org/10.5195/tlp.2013.122","url":null,"abstract":"","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"2 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114055676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Jailbroken: Examining the Policy and Legal Implications of iPhone Jailbreaking","authors":"Kevin M. Rogers","doi":"10.5195/TLP.2013.118","DOIUrl":"https://doi.org/10.5195/TLP.2013.118","url":null,"abstract":"","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123703865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Copyright in the Mobile Media Era","authors":"Krysta M. Smith","doi":"10.5195/TLP.2013.115","DOIUrl":"https://doi.org/10.5195/TLP.2013.115","url":null,"abstract":"","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134433992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Failure of State Texting-While-Driving Laws","authors":"Cody J. Harding","doi":"10.5195/TLP.2013.119","DOIUrl":"https://doi.org/10.5195/TLP.2013.119","url":null,"abstract":"","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128841921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Based on an Almost True Story: Providing Real Life Protection to Real Life Characters","authors":"Brandy S. Ringer","doi":"10.5195/TLP.2012.113","DOIUrl":"https://doi.org/10.5195/TLP.2012.113","url":null,"abstract":"","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129409057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Technology, Residuals, and the New Threat to Hollywood Screenwriters","authors":"K. Leary","doi":"10.5195/TLP.2012.112","DOIUrl":"https://doi.org/10.5195/TLP.2012.112","url":null,"abstract":"","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"361 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132306107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Introduction: Law, Technology, and Entertainment in...Pittsburgh?!?","authors":"Steeltown Entertainment","doi":"10.5195/TLP.2012.107","DOIUrl":"https://doi.org/10.5195/TLP.2012.107","url":null,"abstract":"","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121849874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
On November 1, 2012, Russia enacted a law putatively aiming to protect Russian children from pedophiles. This law authorizes deep packet inspection (DPI), a method used for monitoring, filtering and shaping internet traffic, which has heightened concerns among many leading privacy groups. These groups are concerned with how the government will use such an intrusive method in prosecuting child predators. Central to this concern is DPI’s capability to allow the Russian government to peer into any citizens’ unencrypted internet traffic and monitor, copy, or even alter the traffic as it moves to its destination. The unresolved question is whether the government’s use of DPI will be restrained and utilized primarily to thwart child predators, or whether it will be expanded to lay the groundwork for a new era of national censorship. Although the United States has not yet adopted similar tactics in regulating its citizens’ internet use, Russia’s implementation of the new DPI monitoring and filtering system will provide an educational opportunity for both privacy advocates and policymakers.
{"title":"Through A Router Darkly: How New American Copyright Enforcement Initiatives May Hinder Economic Development, Net Neutrality and Creativity","authors":"P. Groh","doi":"10.5195/TLP.2012.110","DOIUrl":"https://doi.org/10.5195/TLP.2012.110","url":null,"abstract":"On November 1, 2012, Russia enacted a law putatively aiming to protect Russian children from pedophiles. This law authorizes deep packet inspection (DPI), a method used for monitoring, filtering and shaping internet traffic, which has heightened concerns among many leading privacy groups. These groups are concerned with how the government will use such an intrusive method in prosecuting child predators. Central to this concern is DPI’s capability to allow the Russian government to peer into any citizens’ unencrypted internet traffic and monitor, copy, or even alter the traffic as it moves to its destination. The unresolved question is whether the government’s use of DPI will be restrained and utilized primarily to thwart child predators, or whether it will be expanded to lay the groundwork for a new era of national censorship. Although the United States has not yet adopted similar tactics in regulating its citizens’ internet use, Russia’s implementation of the new DPI monitoring and filtering system will provide an educational opportunity for both privacy advocates and policymakers.","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122025576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}