The New Kinship: Constructing Donor-Conceived Families

By: Ashley Jacoby Introduction: In The New Kinship: Constructing Donor Conceived Families, author Naomi Cahn examines how families and relationships form when individuals utilize assisted reproductive technology (“ART”) to conceive and bear children. Cahn proposes that The New Kinship serves three purposes: firstly, it explores how emotional connections are created and develop within families who opt to use donor gametes, and documents these evolving relationships; secondly, it offers a legal foundation for promoting the development of these communities, and argues that current law should not be primarily focused on medicine, technology, and commodification, but rather family and constitutional law; thirdly, The New Kinship illustrates how donor families simultaneously reinforce and complicate the meaning of family, thereby offering an opportunity to reconsider the meaning of family generally. In seeking to offer an in-depth look at how “donor families” both support and confuse the social, cultural, economic, and legal meaning of family, Cahn offers a chronological and thematic exploration of the donor world. Consequently, this review will begin by examining the basic meaning of family and outlining the composition of the donor world. The second section of the review will address the questions of “who” searches for donor-based relationships, and “why.” The third section examines the law’s approach to, and relationship with, donor-conceived families. The last section discusses Cahn’s proposals for legal reform in this emerging area of law. The review will conclude by addressing the broader implications and benefits of allowing for the expansive construction and conception of the meaning of family.

The European Union’s General Data Protection Regulation: How Will it Affect Non-EU Enterprises?

By: Manu J. Sebastian Introduction: In a world where technology is ever changing and personal data is being processed and saved at every turn, corporations must be held accountable for the data they collect, store, and use. The consumer truly does not understand the levels of data capture and retention that corporations employ, and the European Union’s (“EU”) government is on a mission to ensure that its citizens are protected because it believes personal data protection is a fundamental right that all people should enjoy. The EU created the General Data Protection Regulation (“GDPR”) in an attempt to protect data without detrimentally inhibiting cross-border data flow. The GDPR is in its final stages of adoption and corporations around the world are working to preemptively establish controls within their internal structures in order to be compliant. These new changes will protect personal data on a level that has never before been seen, but it will come at a great cost to the consumer. The data that is being protected moves far beyond identification numbers and medical data. The GDPR seeks to protect names, phone numbers, addresses, economical data, cultural identity, racial origin, social identity, profiling data, and online identifiers such as IP address and location data, on top of the normal protections of health data and biological samples. The regulation is based on the notion that every single person has the right to have his personal data protected and it protects all people in the EU. These new changes make us ask a very important question: How exactly will Non-EU enterprises be affected?

Domestic Presence in the Skies: Why Americans Should Care About Private Drone Regulation

By: Tyler Hite Introduction: Within the past decade, drone strikes and the concept of Unmanned Aerial Vehicles (UAVs) have become not only commonplace among major news headlines, but continue to lead the way for modern warfare tactics and strategy. With precision missile and surveillance capabilities, Predator drones have led to the successful elimination of high-valued targets listed as terrorists by the United States. However such success is not absolute, with several documented mishaps ending with civilian casualties. While the United States Military continues to implement UAVs overseas, American citizens should become cognizant that drone activity above U.S. soil is on the precipice of a market explosion comparable to that of Apple in the 1980’s. Yet these drones will not be operated by military personnel under specific military orders, but by fellow citizens, local governmental officials, and even neighbors regulated by yet-to-be developed laws and restrictions. Thus the driving question becomes, what limitations will be developed for individuals who purchase and operate private drones? With some drones currently on sale for as little as $300, potential problems are primed to become actual issues. Additionally, federalism concerns arise regarding whether the regulation of drones will be left to the States to decide how to craft restrictions within their jurisdiction, or whether the Federal government is better suited to enforce private drone regulations. This paper will attempt to shed light not only on the capabilities and functions of privately owned drones, developed for use by private individuals, but will also look to the developing regulations already emanating from both state and federal governments, and how those regulations will shape the expansion of the private drone market. While legislators still have yet to determine the exact guidelines for private drone operation, the logical solution seems to be registration and licensing of unmanned aerial vehicle operation, either with the federal government or the several states.

I Know Who You Are and I Saw What You Did [Social Networks and the Death of Privacy]

By: Justin McHugh Introduction: Since the creation of Facebook, people have been flocking to social media to have their voices heard. Facebook now has over 750 million members making it the “third largest nation in the world.” With so many followers, Facebook has essentially become its own nation with its own followers, financial system, legal system, and relationships with fellow real world nations. Just like with any nation, there are issues of privacy and governmental intrusion into people’s lives. Generally, Facebook and the Internet have never given great reverence to users’ privacy. Instead, Facebook and sites like Spokeo continue to collect data on people and sell it to the highest bidder. Spokeo and Facebook are a part of a “multibillion-dollar industry of data aggregators.” These companies take Internet users data, bundle it up into neat little packages, and sell it to all sorts of interested third parties. Advertising agencies, businesses, and government agencies can all benefit from the research and use of this data. Advertising agencies can develop more narrowly tailored marketing strategies to get individuals to buy things that they do not really need. Businesses can perform intrusive background checks on potential employees. Lastly, the government or big brother can keep a better eye on us with promises of better security and protection. The true repercussions of the continued sale of our search histories and Internet use are the loss of our privacy. Sadly, one judge even went as far to say that once you start using Internet services, “the right to privacy is lost, upon your affirmative keystroke.”

To Protect and Serve, But Not Drive: Police Use of Autonomous Vehicles

By: Geoffrey Wills Introduction: Images of Knight Rider, Herbie the Love Bug, or HAL from 2001: A Space Odyssey might be the first thing people think of when discussing artificial intelligence and self-driving vehicles, but that is quickly changing. While a self-driving car used to be just a pipe dream, an ever-increasing number of car manufacturers are taking off with the concept, but technology still needs to be developed and perfected before autonomous vehicles can be mass produced and used for daily use. Currently, fully autonomous vehicles have traveled safely at speeds up to 31 miles per hour. Car manufacturers including General Motors, Audi, Nissan, and BMW all expect fully autonomous, driverless cars to be in dealership showrooms by 2020. As curiosity and demand for these vehicles increase, the need for understanding how the law applies to them also increases. This leads to an important question that could have major implications for the future: what if police departments use this technology to patrol the streets and keep cities safe? This note will analyze and attempt to answer these questions, and will also discuss the technological history of autonomous vehicles, as well as the evolution of applicable law that will dictate the use of these “driverless” cars. This essay will be broken down into several parts. Part I will give a brief rundown of how autonomous vehicle technology works. Part II will discuss the legality of vehicle automation and the technologies inside the car, including how many of these technologies not only currently exist, but are legally permissible for crime prevention and surveillance purposes. Part II will also look at social acceptability of autonomous vehicles patrolling the streets and enforcing laws. Finally, Part III considers how autonomous vehicles will have the capability to take subjectivity, discretion, and potential prejudice out of patrolling and traffic stops, as well as increasing officer safety and efficiency.

Privacy Expectations in Online Video Games: In Light of Edward Snowden’s NSA Document Leak

By: Matthew Knopf Introduction: On December 9, 2013, the British Newspaper The Guardian published documents from the National Security Administration (“NSA documents”) provided by the whistleblower Edward Snowden. These documents revealed that surveillance agencies of the United States and United Kingdom governments were conducting intelligence operations in a search for terrorists inside of massive multiplayer online (“MMO”) video games such as World of Warcraft and Second Life. The documents contained a memo and a series of essays that detailed the ways in which video games, even those video games that do not directly connect to the Internet, could be used as recruitment and communication tools for terrorists. However, these operations have brought about privacy concerns for some who worry that their government could or would listen to their conversations as they are playing these videos games. It is not clear how the government collected or accessed the data or communication from these video games. It is likely that government agents created their own profiles and avatars in these games to access the virtual worlds. Additionally, privacy concerns have not be assuaged by the fact that there is no indication from the documents that any of the intelligence operations led to the foiling of any terrorist plots or to the arrest of any criminal. The National Security Administration (“NSA”) and the federal government may have free reign to spy on foreign peoples and foreign governments, but under the U.S. Constitution it does not have the legal authority to spy on American citizens without a warrant. Online video games have players who live across the globe and within the United States. Many of the computer servers on which the video games operate and communicate are inside of the United States. Since the intelligence collecting process has not been revealed, it is unclear if the NSA or other federal agencies have been accessing the data and the monitoring communications of innocent Americans whose identity and nationality may have been concealed behind their virtual avatar. The debate over the expectation of privacy concerning different types of Internet communication is growing, especially concerning social media. Violations of privacy could hinder player anonymity, which is a key component of certain types of online gaming that encourages escapism. On the other hand, ending anonymity could encourage fairer and more civil discourse in the virtual gaming worlds. The revelations of these documents has led to the question of whether there are any expectations of privacy for video game players and the communications between players which occur within those video games.