Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- UIC School of Law (32)
- Schulich School of Law, Dalhousie University (11)
- University of Georgia School of Law (5)
- University of Maryland Francis King Carey School of Law (4)
- Pepperdine University (3)
-
- Touro University Jacob D. Fuchsberg Law Center (3)
- University of Baltimore Law (3)
- University of Oklahoma College of Law (3)
- Brigham Young University Law School (2)
- Loyola University Chicago, School of Law (2)
- University of Kentucky (2)
- University of Richmond (2)
- Vanderbilt University Law School (2)
- American University Washington College of Law (1)
- Chicago-Kent College of Law (1)
- Duke Law (1)
- Maurer School of Law: Indiana University (1)
- Notre Dame Law School (1)
- Pace University (1)
- Seattle University School of Law (1)
- The Catholic University of America, Columbus School of Law (1)
- University at Buffalo School of Law (1)
- University of Miami Law School (1)
- University of the Pacific (1)
- Washington and Lee University School of Law (1)
- West Virginia University (1)
- Keyword
-
- Privacy (13)
- Social media (6)
- Electronic Communications Privacy Act (4)
- American Bar Association (3)
- ECPA (3)
-
- Fourth Amendment (3)
- Fourth amendment (3)
- Internet (3)
- Searches and seizures (3)
- Constitutional law (2)
- Electronic records (2)
- Katz (2)
- Patriot Act (2)
- Right of privacy (2)
- Right to privacy (2)
- Social networking (2)
- Surveillance (2)
- Fourth Amendment (1)
- covert searches (1)
- "sneak and peek" (1)
- Airport screening (1)
- Airport security (1)
- Allison v. Aetna (1)
- Amburgy v. Express Scripts (1)
- American Federation of Government Employees v. Hawley (1)
- And Glomar Response. (1)
- Anti-counterfeiting policies (1)
- Anti-virus (1)
- Arizona v. Gant (1)
- Artificial Insemination (1)
- Publication
-
- UIC John Marshall Journal of Information Technology & Privacy Law (29)
- Canadian Journal of Law and Technology (10)
- Georgia Journal of International & Comparative Law (5)
- Journal of Business & Technology Law (4)
- Oklahoma Law Review (3)
-
- Touro Law Review (3)
- Children's Legal Rights Journal (2)
- Kentucky Law Journal (2)
- Pepperdine Law Review (2)
- Richmond Journal of Law & Technology (2)
- UIC Law Review (2)
- University of Baltimore Law Review (2)
- BYU Law Review (1)
- Brigham Young University Education and Law Journal (1)
- Buffalo Law Review (1)
- Chicago-Kent Law Review (1)
- CommLaw Conspectus: Journal of Communications Law and Technology Policy (1993-2015) (1)
- Dalhousie Law Journal (1)
- Duke Law & Technology Review (1)
- Indiana Law Journal (1)
- McGeorge Law Review (1)
- Notre Dame Law Review (1)
- Pace Intellectual Property, Sports & Entertainment Law Forum (1)
- Seattle University Law Review (1)
- The Journal of Business, Entrepreneurship & the Law (1)
- The Modern American (1)
- UIC Review of Intellectual Property Law (1)
- University of Baltimore Law Forum (1)
- University of Miami Business Law Review (1)
- Vanderbilt Journal of Entertainment & Technology Law (1)
Articles 1 - 30 of 87
Full-Text Articles in Law
Private Letters And The Law: Edith Wharton’S Questions About Ownership And The Right To Publish Private Letters, Deborah Hecht
Private Letters And The Law: Edith Wharton’S Questions About Ownership And The Right To Publish Private Letters, Deborah Hecht
Touro Law Review
No abstract provided.
Cookie Monster: Balancing Internet Privacy With Commerce, Technology And Terrorism, Nichoel Forrett
Cookie Monster: Balancing Internet Privacy With Commerce, Technology And Terrorism, Nichoel Forrett
Touro Law Review
No abstract provided.
Rediscovering Trespass: Towards A Regulatory Approach To Defining Fourth Amendment Scope In A World Of Advancing Technology, Martin R. Gardner
Rediscovering Trespass: Towards A Regulatory Approach To Defining Fourth Amendment Scope In A World Of Advancing Technology, Martin R. Gardner
Buffalo Law Review
No abstract provided.
The Creation Of Hipaa Culture: Prioritizing Privacy Paranoia Over Patient Care, Jessica Jardine Wilkes
The Creation Of Hipaa Culture: Prioritizing Privacy Paranoia Over Patient Care, Jessica Jardine Wilkes
BYU Law Review
No abstract provided.
Stopping Police In Their Tracks: Protecting Cellular Location Information Privacy In The Twenty-First Century, Stephen Wagner
Stopping Police In Their Tracks: Protecting Cellular Location Information Privacy In The Twenty-First Century, Stephen Wagner
Duke Law & Technology Review
Only a small fraction of law enforcement agencies in the United States obtain a warrant before tracking the cell phones of suspects and persons of interest. This is due, in part, to the fact that courts have struggled to keep pace with a changing technological landscape. Indeed, courts around the country have issued a disparate array of holdings on the issue of warrantless cell phone tracking. This lack of judicial uniformity has led to confusion for both law enforcement agencies and the public alike. In order to protect reasonable expectations of privacy in the twenty-first century, Congress should pass legislation …
License To Discriminate: How A Washington Florist Is Making The Case For Applying Intermediary Scrutiny To Sexual Orientation, Kendra Lacour
License To Discriminate: How A Washington Florist Is Making The Case For Applying Intermediary Scrutiny To Sexual Orientation, Kendra Lacour
Seattle University Law Review
Over the past few decades, the debate over sexual orientation has risen to the forefront of civil rights issues. Though the focus has generally been on the right to marriage, peripheral issues associated with the right to marriage—and with sexual orientation generally—have become more common in recent years. As the number of states permitting same-sex marriage—along with states prohibiting discrimination on the basis of sexual orientation—increases, so too does the conflict between providers of public accommodations and those seeking their services. Never is this situation more problematic than when religious beliefs are cited as the basis for denying services to …
Procreating From Prison: Evaluating British Prisoners' Right To Artificially Inseminate Their Wives Under The United Kingdom's New Human Rights Act And The 2001 Mellor Case, Pollybeth Proctor
Georgia Journal of International & Comparative Law
No abstract provided.
Loud Talk About A Quiet Issue: The International Atomic Energy Agency's Struggle To Maintain The Confidentiality Of Information Gained In Nuclear Facility Inspections, Alison Van Lear
Georgia Journal of International & Comparative Law
No abstract provided.
Redefining The Right To Be Let Alone: Privacy Rights And The Constitutionality Of Technical Surveillance Measures In Germany And The United States, Nicole Jacoby
Georgia Journal of International & Comparative Law
No abstract provided.
Maryland V. King And The Road Already Traveled: How The United Kingdome Tried--And Failed--To Balance State Interests With Privacy Rights, Courtney Coons Poole
Maryland V. King And The Road Already Traveled: How The United Kingdome Tried--And Failed--To Balance State Interests With Privacy Rights, Courtney Coons Poole
Georgia Journal of International & Comparative Law
No abstract provided.
Minding Your Meds: Balancing The Needs For Patient Privacy And Law Enforcement In Prescription Drug Monitoring Programs, Devon T. Unger
Minding Your Meds: Balancing The Needs For Patient Privacy And Law Enforcement In Prescription Drug Monitoring Programs, Devon T. Unger
West Virginia Law Review
No abstract provided.
Putting The Brakes On Driver Privacy: Black Boxes, Data Collection, And The Fourth Amendment, Thayer Case
Putting The Brakes On Driver Privacy: Black Boxes, Data Collection, And The Fourth Amendment, Thayer Case
Washington and Lee Journal of Civil Rights and Social Justice
No abstract provided.
A Cloudy Forecast: Divergence In The Cloud Computing Laws Of The United States, European Union, And China, Tina Cheng
A Cloudy Forecast: Divergence In The Cloud Computing Laws Of The United States, European Union, And China, Tina Cheng
Georgia Journal of International & Comparative Law
No abstract provided.
Protecting A Celebrity’S Child From Harassment: Is California’S Amendment Penal Code § 11414 Too Vague To Be Constitutional?, Michelle N. Robinson
Protecting A Celebrity’S Child From Harassment: Is California’S Amendment Penal Code § 11414 Too Vague To Be Constitutional?, Michelle N. Robinson
Pace Intellectual Property, Sports & Entertainment Law Forum
This Note will describe a brief history of the legal attempts to restrict the paparazzi and the legislative history behind A.B. 3592 and its amendment, S.B. 606. The bills are controversial and have received a significant amount of criticism, due to the fact that they restrict speech by essentially prohibiting paparazzi, known for their harassing behavior, from taking pictures of the children of celebrities. The Note will conclude with an analysis utilizing the void-for-vagueness doctrine of whether the bill is in violation of the First Amendment.
The Dangers Of Overbroad Transgender Legislation, Case Law, And Policy In Education: California's Ab 1266 Dismisses Concerns About Student Safety And Privacy, Tyler Brown
Brigham Young University Education and Law Journal
No abstract provided.
With Great Power Comes Little Responsibility: The Role Of Online Payment Service Providers With Regards To Websites Selling Counterfeit Goods, J. Bruce Richardson
With Great Power Comes Little Responsibility: The Role Of Online Payment Service Providers With Regards To Websites Selling Counterfeit Goods, J. Bruce Richardson
Canadian Journal of Law and Technology
This article will explain the current avenues for intellectual property rights holders to make use of existing anti-counterfeiting policies made available by financial companies dealing in electronic payments, and argue that current policies, while helpful, are not sufficient. The article will conclude by demonstrating that policy makers have options to intervene and regulate the use of online payment services, either directly through legislation or indirectly through facilitating “best practices.”
Rethinking Online Privacy In Canada: Commentary On Voltage Pictures V. John And Jane Doe, Ngozi Okidegbe
Rethinking Online Privacy In Canada: Commentary On Voltage Pictures V. John And Jane Doe, Ngozi Okidegbe
Canadian Journal of Law and Technology
This article examines the Voltage decision, with the view that the bona fide standard safeguards intellectual property rights at the cost of online privacy rights and will proceed in three parts. Part I provides a brief contextualization of the issues. Part II is an analysis of the Voltage decision. Part III examines how the bona fide standard is a relatively low threshold. This article concludes by considering the possibility of shifting to a higher standard for disclosure, as well as a possible solution for the effect that a higher standard could have on copyright owners.
Access Of Evil? Legislating Online Youth Privacy In The Information Age, Agathon Fric
Access Of Evil? Legislating Online Youth Privacy In The Information Age, Agathon Fric
Canadian Journal of Law and Technology
This article seeks to address what constitutes youth online privacy, how youth conceive of their privacy, whether their privacy needs protecting, and, if so, how youth privacy should be regulated online. First, the article begins by rooting the issue of online youth privacy in the current social, technological, economic, political, and legal context, drawing on social science research to demonstrate both the threats and opportunities created by technology for youth privacy.
Second, the analysis focuses on the relative strengths and weaknesses of current federal legislation as the primary law governing the collection, use, and disclosure of youth’s personal information through …
The Song Remains The Same: Preserving The First Sale Doctrine For A Secondary Market Of Digital Music, Marco Figliomeni
The Song Remains The Same: Preserving The First Sale Doctrine For A Secondary Market Of Digital Music, Marco Figliomeni
Canadian Journal of Law and Technology
This article will explore the origins and rationale for the first sale doctrine. A review of the most recent American case law shows the court rejecting the doctrine’s applicability in a digital sphere. I suggest that in spite of the court’s rigid interpretation of the U.S. Copyright Act, formulating a digital first sale doctrine is a matter better left to lawmakers. A flourishing digital secondary market can promote competition and innovation while making content more accessible to the public, but its endorsement requires an appreciation of its adverse effect on the primary market for copyright owners. The article fast-forwards to …
Combining Familial Searching And Abandoned Dna: Potential Privacy Outcomes And The Future Of Canada's National Dna Data Bank, Amy Conroy
Canadian Journal of Law and Technology
This article aims to respond to the government’s request by explaining the nature of that relationship and by arguing that the combined use of familial searching and analysis of abandoned DNA would present a serious risk for genetic privacy. The risk is particularly acute given that it would effectively circumvent the existing justification for the NDDB, leading to inclusion of individuals whose DNA profiles have not been uploaded directly onto the data bank. To substantiate this main argument, this article proceeds in three parts. The first describes the current Canadian law on familial searching and the ongoing interest in amending …
The Rapid Rise Of Delayed Notice Searches, And The Fourth Amendment “Rule Requiring Notice”, Jonathan Witmer-Rich
The Rapid Rise Of Delayed Notice Searches, And The Fourth Amendment “Rule Requiring Notice”, Jonathan Witmer-Rich
Pepperdine Law Review
This article documents the rapid rise of covert searching, through delayed notice search warrants, and argues that covert searching in its current form presumptively violates the Fourth Amendment’s “rule requiring notice.” Congress authorized these “sneak and peek” warrants in the USA Patriot Act, in 2001, and soon after added a reporting requirement to monitor this invasive search technique. Since 2001, the use of delayed notice search warrants has risen dramatically, from around 25 in 2002 to 5,601 in 2012, suggesting that “sneak and peek” searches are becoming alarmingly common. In fact, it is not at all clear whether true “sneak …
Hidden Home Videos: Surreptitious Video Surveillance In Divorce, Rebecca V. Lyon
Hidden Home Videos: Surreptitious Video Surveillance In Divorce, Rebecca V. Lyon
Chicago-Kent Law Review
In divorce court, often a very contentious and emotional court, parties frequently use what they can to gain the upper hand. The invention of new technology gives them an even wider arsenal. While tracking each other on the computer or checking phone records has become common, courts are now encountering instances where one spouse has placed hidden video cameras around the house to catch the other spouse doing something wrong. Under many state laws, courts have been forced to conclude that the surreptitious video recordings are not illegal. Perhaps more surprisingly, a few courts have concluded that the law either …
Privacy, Trusts And Cross-Border Transfers Of Personal Information: The Quebec Perspective In The Canadian Context, Eloise Gratton, Pierre-Christian Collins Hoffman
Privacy, Trusts And Cross-Border Transfers Of Personal Information: The Quebec Perspective In The Canadian Context, Eloise Gratton, Pierre-Christian Collins Hoffman
Dalhousie Law Journal
This paper argues that data protection laws apply to prevent the disclosure of certain information relating to trusts, which are increasingly being used .as business and investment vehicles. Given the broad scope of the concept of "personal information" found under both provincial and federal personal information protection statutes, arguments can be made that information relating to trust beneficiaries or trustees, where such beneficiaries or trustees are natural persons, enjoy some level of protection. Even where a trust contains an express choice of law clause providing that the laws of another province or country apply, Quebec conflict of laws rules may …
Reviving Implied Confidentiality, Woodrow Hartzog
Reviving Implied Confidentiality, Woodrow Hartzog
Indiana Law Journal
The law of online relationships has a significant flaw—it regularly fails to account for the possibility of an implied confidence. The established doctrine of implied confidentiality is, without explanation, almost entirely absent from online jurisprudence in environments where it has traditionally been applied offline, such as with sensitive data sets and intimate social interactions.
Courts’ abandonment of implied confidentiality in online environments should have been foreseen. The concept has not been developed enough to be consistently applied in environments such as the Internet that lack obvious physical or contextual cues of confidence. This absence is significant because implied confidentiality could …
Privacy In Social Media: To Tweet Or Not To Tweet?, Tara M. Breslawski
Privacy In Social Media: To Tweet Or Not To Tweet?, Tara M. Breslawski
Touro Law Review
No abstract provided.
Online Terms Of Service: A Shield For First Amendment Scrutiny Of Government Action, Jacquelyn E. Fradette
Online Terms Of Service: A Shield For First Amendment Scrutiny Of Government Action, Jacquelyn E. Fradette
Notre Dame Law Review
Part I of this Note will canvas popular opinions and perceptions about First Amendment rights on the Internet using examples of public outcry over recent instances of speech limitation. It will also discuss the state action doctrine generally and how the presence of this doctrine most likely renders certain popular public constitutional intuitions about the First Amendment erroneous.
Part II will provide an overview of how courts have taken an expansive and protective view of private ordering between online parties. It will discuss how courts have developed a robust freedom to contract jurisprudence in the Internet context. Because courts essentially …
The Post-Tsa Airport: A Constitution Free Zone?, Daniel S. Harawa
The Post-Tsa Airport: A Constitution Free Zone?, Daniel S. Harawa
Pepperdine Law Review
No abstract provided.
Facebook Is Not Your Friend: Protecting A Private Employee's Expectation Of Privacy In Social Networking Content In The Twenty-First Century Workplace, Cara Magatelli
The Journal of Business, Entrepreneurship & the Law
This Comment explores the implications SNS postings have on private employers concerning the off-duty, non-work related conduct of their employees. This argument recognizes that an employee is entitled to engage in whatever legal off-duty conduct he chooses, so long as the behavior does not damage his employer's legitimate business interests. An employer should not be able to use information gleaned from an employee's SNS postings, unrelated to an employer's business interests, to punish an employee for her choices outside the work place. Disciplining or terminating an employee for his off-duty lifestyle choices permits the morals and standards of the employer …
Give Me Your Password: The Intrusive Social Media Policies In Our Schools, Talon Hurst
Give Me Your Password: The Intrusive Social Media Policies In Our Schools, Talon Hurst
CommLaw Conspectus: Journal of Communications Law and Technology Policy (1993-2015)
No abstract provided.
Around The World: The Struggle Between Confidentiality And The Need For Transparency In German Child Abuse Reporting Laws, Jasmine Prokscha
Around The World: The Struggle Between Confidentiality And The Need For Transparency In German Child Abuse Reporting Laws, Jasmine Prokscha
Children's Legal Rights Journal
No abstract provided.