Intimate life is under constant surveillance. Firms track people’s periods, hot flashes, abortions, sexual assaults, sex toy use, sexual fantasies, and nude photos. Individuals hardly appreciate the extent of the monitoring, and even if they did, little can be done to curtail it. What is big business for firms is a big risk for individuals. Corporate intimate surveillance undermines sexual privacy—the social norms that manage access to, and information about, human bodies, sex, sexuality, gender, and sexual and reproductive health. At stake is sexual autonomy, self-expression, dignity, intimacy, and equality. So are people’s jobs, housing, insurance, and other life opportunities. Women and minorities shoulder a disproportionate amount of that burden. Privacy law is failing us. Not only is the private-sector’s handling of intimate information largely unrestrained by American consumer protection law, but it is treated as inevitable and valuable. This Article offers a new compact for sexual privacy. Reform efforts should focus on stemming the tidal wave of collection, restricting uses of intimate data, and expanding the remedies available in court to include orders to stop processing intimate data.
The per se rule against specific enforcement of personal service contracts is well established under Anglo-American contract law. At the same time...
History and precedent tell us that the just compensation requirement has been implemented by a complex network of remedies providing multiple avenues...
This Essay expounds on the outsized role of private law in governing ownership of new technologies and data. As scholars lament gaps between law and...
Large language models (LLMs) now perform extremely well on many natural language processing tasks. Their ability to convert legal texts to data may...
Privacy is a key issue in AI regulation, especially in a sensitive area such as healthcare. The United States (US) has taken a sectoral approach to...
The 2024 edition of Selected Intellectual Property, Internet, and Information Law, Statutes, Regulations, and Treaties, edited by Professors Sharon K...
Fifty years ago, federal and state lawmakers called for the regulation of a criminal justice “databank” connecting federal, state, and local agencies...
The use of autonomy to initiate force, which states may begin to view as necessary to protect against hypersonic attacks and other forms of ‘hyperwar...
This chapter provides an overview of computational text analysis techniques used to study judicial behavior and decision-making. As legal texts become...
A crucial first step in addressing intimate-image abuse is its proper conceptualization. Intimate-image abuse amounts to a violation of intimate...
We live in a golden age of student surveillance. Some surveillance is old school: video cameras, school resource officers, and tip lines. Old-school...
A resilience agenda is an essential part of protecting national security in a digital age. Digital technologies impact nearly all aspects of everyday...
Cyber stalking involves repeated, often relentless targeting of someone with abuse. Death and rape threats may be part of a perpetrator’s playbook...
There is a live debate going on over whether antitrust should take a broader view of the economics of market concentration. When antitrust reformers...
Generative AI is already beginning to alter legal practice. If optimistic forecasts prove warranted, how might this technology transform judicial...
Working hand-in-hand with the private sector, largely in a regulatory vacuum, policing agencies at the federal, state, and local level are acquiring...
The idea of institutionalism figures prominently in today’s debates about the role of federal courts in American democracy. For example, Chief Justice...
Over the past twenty-five years, Congress has enacted several major reforms for employer-sponsored retirement plans and individual retirement accounts...