Privacy Law

Print
Comment
Volume 92.4
Identifiable to Whom? Clarifying Biometric Privacy Rights in Illinois and Beyond
Hana Ferrero
B.A. 2021, University of Notre Dame; J.D. Candidate 2026, The University of Chicago Law School.

I would like to thank Jack Brake, Anne Marie Hawley, and Jonah Klausner for their thoughtful edits and Jake Holland for his indispensable advice all throughout the drafting process.

Illinois’s Biometric Information Privacy Act (BIPA) is the country’s most powerful law governing biometric data—data generated from an individual’s biological characteristics, like fingerprints and voiceprints. Over the past decade, BIPA garnered a reputation as an exceptionally plaintiff-friendly statute. But from 2023–2024, the Illinois legislature, Illinois Supreme Court, and Ninth Circuit Court of Appeals all sided with BIPA defendants for the first time. Most significantly, in Zellmer v. Meta Platforms, Inc., the Ninth Circuit dismissed the plaintiff’s BIPA claim because the face scan collected by the defendant could not be used to identify him.

It is unclear whether these developments represent a trend or an exception to BIPA’s plaintiff-friendliness. Which path is charted will largely turn on how courts interpret Zellmer: While Zellmer established that a biometric identifier must be able to identify an individual, lower courts have construed its holding narrowly to require that the entity collecting biometric data must itself be capable of identifying, rather than it being sufficient for any entity to do so. Reading BIPA this narrowly would significantly weaken the statute’s protections.

After detailing how employer and consumer cases catalyzed this recent defendant-friendly shift, this Comment proposes a two-step framework to determine whether a biometric identifier is able to identify, falling under BIPA’s reach. Given BIPA’s broad influence, where courts ultimately land on this question will be crucial to the protection of biometric data nationwide."

Print
Comment
Volume 92.4
Transparency Without Teeth: An Empirical Understanding of Data Broker Regulation
Elijah Greisz
B.S. 2022, University of Washington; M.S. 2023, University of Washington; J.D. Candidate 2026, The University of Chicago Law School.

I would like to thank Professor Lior Strahilevitz and the editors and staff of the University of Chicago Law Review for their thoughtful advice and insight.

Recently, many states have reacted to the growing data economy by passing data privacy statutes. These follow the “interaction model”: they allow consumers to exercise privacy rights against firms by directly interacting with them. But data brokers, firms that buy and sell data for consumers whom they do not directly interact with, are key players in the data economy. How is a consumer meant to exercise their rights against a broker with an “interaction gap” between them?

A handful of states have tried to soften the interaction gap by enacting data-broker-specific legislation under the “transparency model.” These laws, among other things, require brokers to publicly disclose themselves in state registries. The theory is that consumers would exercise their rights against brokers if they knew of the brokers’ existence. California recently went further with the Delete Act, providing consumers data-broker-specific privacy rights.

Assembling brokers’ reported privacy request metrics, this Comment performs an empirical analysis of the transparency model’s efficacy. These findings demonstrate that the transparency model does not effectively facilitate consumers in following through on their expected privacy preferences or meaningfully impacting brokers. Therefore, regulators should follow in the footsteps of the Delete Act and move beyond the transparency model.

Print
Article
Volume 92.3
Decentering Property in Fourth Amendment Law
Michael C. Pollack
Professor of Law & Associate Dean for Faculty Development, Benjamin N. Cardozo School of Law.

The authors share credit and responsibility for this Article equally. The authors are grateful to Maureen Brady, Morgan Cloud, Mailyn Fidler, Barry Friedman, Ben Grunwald, Alma Magaña, and Stewart Sterk, along with participants in the Cardozo Junior Faculty Workshop for helpful conversations, suggestions, comments, and critiques. Michael Pollack thanks the Stephen B. Siegel Program in Real Estate Law for research support.

Matthew Tokson
Professor of Law, University of Utah, S.J. Quinney College of Law.

The authors share credit and responsibility for this Article equally. The authors are grateful to Maureen Brady, Morgan Cloud, Mailyn Fidler, Barry Friedman, Ben Grunwald, Alma Magaña, and Stewart Sterk, along with participants in the Cardozo Junior Faculty Workshop for helpful conversations, suggestions, comments, and critiques. Michael Pollack thanks the Stephen B. Siegel Program in Real Estate Law for research support.

The canonical test for Fourth Amendment searches looks to whether the government has violated a person’s reasonable expectation of privacy. Yet the Supreme Court has recently added a property-based test to address cases involving physical intrusions. Further, influential judges and scholars have proposed relying primarily on property in determining the Fourth Amendment’s scope. This Article exposes the overlooked flaws of a property-centered Fourth Amendment. It examines the complications of property law, explores the malleability of property rights, and reveals how governments can manipulate them. Normatively, Fourth Amendment regimes based on property are likely to be underinclusive and grounded in trivial physical contact while ignoring greater intrusions. Finally, because property is unequally distributed, its use as a determinant of Fourth Amendment protections risks leaving disadvantaged members of society with the least protection. While property concepts will sometimes be relevant, they should be used very carefully, and very little, in Fourth Amendment law.

Print
Article
Volume 91.8
The Reconciliation Roots of Fourth Amendment Privacy
Sophia Z. Lee
Professor of Law, University of Pennsylvania Carey Law School.

I am indebted to my Penn Carey Law colleagues, fellow members of the Writers’ Bloc(k), participants in the Privacy Law Scholars Conference, the Harvard Law School Legal History Workshop, the American Bar Foundation’s Legal History Roundtable, as well as Laura Edwards, Scott Heerman, Orin Kerr, Sandra Mayson, Ajay Mehrotra, Shaun Ossei-Owusu, Nicholas Parrillo, and David Rudovsky for especially generous and helpful feedback. I am immensely grateful to Alana Bevin, Madeline Bruning, Miles Gray, Susan Gualtier, Paul Riermaier, Anna Rosenfeld, Austin Severns, Mary Shelly, and David Sowry for their phenomenal research assistance, as well as to the National Archives and Records Administration staff who made accessing case records amid a pandemic possible.

The Roberts Court has made protecting “the privacies of life” a catchphrase of Fourth Amendment law in the digital era. The time is thus ripe for revisiting the doctrinal and political roots of this newly influential quote from the Court’s 1886 decision Boyd v. United States. This Article makes a novel argument that Boyd and its elevation of protecting the “privacies of life” to an animating principle of the Fourth Amendment was instead a product of Reconstruction and its dismantlement. Fourth Amendment privacy was produced by and helped secure Reconciliation—the process through which White Americans North and South, Democrat and Republican came together to limit Reconstruction, preserve White supremacy, and pave the way for the violent disenfranchisement of newly freed Black men. The Article concludes by considering the divergent doctrinal implications of resituating Boyd and Fourth Amendment privacy in the politics of Reconciliation.

Print
Comment
Volume 91.7
Network Harms
Andy Z. Wang
B.S. 2022, San Jose State University; J.D. Candidate 2025, The University of Chicago Law School.

I would like to thank Professor Omri Ben-Shahar for his tremendous guidance and advice. Thank you to the editors and staff of the University of Chicago Law Review for their tireless editing support. A special thank you to Eric Haupt, Jack Brake, Karan Lala, Tanvi Antoo, Luke White, Jake Holland, Bethany Ao, Emilia Porubcin, Benjamin Wang, and Anastasia Shabalov for their invaluable insights and contributions along the way.

For data, the whole is greater than the sum of its parts. There may be millions of people with the same birthday. But how many also have a dog, a red car, and two kids? The more data is aggregated, the more identifying it becomes. Accordingly, the law has developed safe harbors for firms that take steps to prevent aggregation of the data they sell. A firm might, for instance, anonymize data by removing identifying information. But as computer scientists have shown, clever de-anonymization techniques enable motivated actors to unmask identities even if the data is anonymized. Data brokers collect, process, and sell data. Courts have traditionally calculated data brokering harms without considering the larger data ecosystem. This Comment suggests a broader conception is needed because the harm caused by one broker’s conduct depends on how other brokers behave. De-anonymization techniques, for instance, often cross-reference datasets to make guesses about missing data. A motivated actor can also buy datasets from multiple brokers to combine them. This Comment then offers a framework for courts to consider these “network harms” in the Federal Trade Commission’s (FTC) recent lawsuits against data brokers under its Section 5 authority to prevent unfair acts and practices.

Online
Essay
Privacy Peg, Trade Hole: Why We (Still) Shouldn’t Put Data Privacy in Trade Law
Kristina Irion
Kristina Irion is Associate Professor at the Institute for Information Law (IViR) at the University of Amsterdam.
Margot E. Kaminski
Margot E. Kaminski is Associate Professor of Law at Colorado Law School and Director of the Privacy Initiative at Silicon Flatirons.
Svetlana Yakovleva
Svetlana Yakovleva is a Postdoctoral Researcher at the Institute for Information Law (IViR), University of Amsterdam, Adjunct Professor of Law at Benjamin N. Cardozo School of Law, and Senior Legal Adviser at De Brauw Blackstone Westbroek (Amsterdam).

Authors are listed in alphabetical order and contributed equally.

A Response to Profs. Anupam Chander & Paul Schwartz’s Privacy and/or Trade.

Print
Article
86.1
Taking Data
Michael C. Pollack
Assistant Professor of Law, Benjamin N. Cardozo School of Law.

I am grateful to Miriam Baer, William Baude, Maureen Brady, Christopher Buccafusco, David Carlson, Nestor Davidson, Myriam Gilles, Ben Grunwald, Daniel Hemel, Michael Herz, Orin Kerr, Timothy Mulvaney, Luke Norris, John Rappaport, Shelley Ross Saxer, Ric Simmons, Edward Stein, James Stern, Stewart Sterk, Lior Strahilevitz, Matthew Tokson, Felix Wu, Stephen Yelderman, and participants in the AALS New Voices in Property Law Workshop, Cardozo Junior Faculty Workshop, Law and Society Annual Meeting, Mid-Atlantic Junior Faculty Forum at the University of Richmond Law School, and Southeastern Association of Law Schools New Scholars Workshop for their guidance, suggestions, comments, and critiques. I thank the Stephen B. Siegel Program in Real Estate Law for research support.

On February 16, 2016, a federal court ordered Apple to “assist law enforcement agents in enabling the search” of an iPhone that had been lawfully seized during the investigation into a mass shooting in San Bernardino, California.