Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Privacy Law

2006

Institution
Keyword
Publication
Publication Type

Articles 31 - 60 of 69

Full-Text Articles in Law

Cleaning Metadata On The World Wide Web: Suggestions For A Regulatory Approach, 24 J. Marshall J. Computer & Info. L. 531 (2006), Marcel Gordon Jan 2006

Cleaning Metadata On The World Wide Web: Suggestions For A Regulatory Approach, 24 J. Marshall J. Computer & Info. L. 531 (2006), Marcel Gordon

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Copyright Misuse Doctrine On Computer Software: A Redundant Doctrine Of U.S. Copyright Law Or A Necessary Addition To E.U. Copyright Law?, 24 J. Marshall J. Computer & Info. L. 571 (2006), Haris Apostolopoulos Jan 2006

The Copyright Misuse Doctrine On Computer Software: A Redundant Doctrine Of U.S. Copyright Law Or A Necessary Addition To E.U. Copyright Law?, 24 J. Marshall J. Computer & Info. L. 571 (2006), Haris Apostolopoulos

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Provisional Relief In Transnational Litigation In The Internet Era: What Is In The Us Best Interest?, 24 J. Marshall J. Computer & Info. L. 263 (2006), Panagiota Kelali Jan 2006

Provisional Relief In Transnational Litigation In The Internet Era: What Is In The Us Best Interest?, 24 J. Marshall J. Computer & Info. L. 263 (2006), Panagiota Kelali

UIC John Marshall Journal of Information Technology & Privacy Law

Using the hypothetical of a college student victimized by a fraudulent website, this comment addresses the issue of Internet fraud. In the example presented, the perpetrators are Greek nationals located in Greece. Focusing on the intangible and international nature of the Internet, the comment addresses the complications surrounding litigating an Internet fraud case. The issues discussed include a determination of the forum where the suit should be brought, preservation of the status quo pending determination of the dispute, and the status of a transnational cooperation on the issue of recognition and enforcement of judgments. The comment presents the options available …


Transsexuals And The Family Medical Leave Act, 24 J. Marshall J. Computer & Info. L. 315 (2006), Charles Thomas Little Jan 2006

Transsexuals And The Family Medical Leave Act, 24 J. Marshall J. Computer & Info. L. 315 (2006), Charles Thomas Little

UIC John Marshall Journal of Information Technology & Privacy Law

This article examines the implications for transsexuals seeking sexual reassignment surgery (“SRS”) under the Family Medical Leave Act (“FMLA”). Currently, the scant case law pertaining to the FMLA suggests that the statutes and regulations will likely fail to provide even minimal protection to transsexuals. If applied literally, the FMLA may present barriers to transsexuals seeking SRS in opposition to the true purpose behind the Act, which is to allow employees the opportunity to take reasonable leave from work by mandating more medical leave than the employers might otherwise be willing to grant for things such as the adoption or birth …


Borders Online, Llc V. State Board Of Equalization: It's Time For Congress To Weigh The Possibilities Of This California Decision, 24 J. Marshall J. Computer & Info. L. 641 (2006), Ronnie E. Webb Jan 2006

Borders Online, Llc V. State Board Of Equalization: It's Time For Congress To Weigh The Possibilities Of This California Decision, 24 J. Marshall J. Computer & Info. L. 641 (2006), Ronnie E. Webb

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Twenty-Fifth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 24 J. Marshall J. Computer & Info. L. 673 (2006), David E. Sorkin, Larisa V. Benitez-Morgan, J. Preston Carter, William P. Greubel Iii, Matthew Hector, Kellen Keaty, Lisa Rodriguez Jan 2006

The Twenty-Fifth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 24 J. Marshall J. Computer & Info. L. 673 (2006), David E. Sorkin, Larisa V. Benitez-Morgan, J. Preston Carter, William P. Greubel Iii, Matthew Hector, Kellen Keaty, Lisa Rodriguez

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Twenty-Fifth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 24 J. Marshall J. Computer & Info. L. 699 (2006), Chris Norris, Justin Sisemore, Anndi Queenan Jan 2006

The Twenty-Fifth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 24 J. Marshall J. Computer & Info. L. 699 (2006), Chris Norris, Justin Sisemore, Anndi Queenan

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Twenty-Fifth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 24 J. Marshall J. Computer & Info. L. 733 (2006), Timothy T. Hsieh, Jennifer Simmen Lewin, Jerome C. Pandell Jan 2006

The Twenty-Fifth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 24 J. Marshall J. Computer & Info. L. 733 (2006), Timothy T. Hsieh, Jennifer Simmen Lewin, Jerome C. Pandell

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Intellectual Property Rights At The Crossroad Between Monopolization And Abuse Of Dominant Position: American And European Approaches Compared, 24 J. Marshall J. Computer & Info. L. 455 (2006), Emanuela Arezzo Jan 2006

Intellectual Property Rights At The Crossroad Between Monopolization And Abuse Of Dominant Position: American And European Approaches Compared, 24 J. Marshall J. Computer & Info. L. 455 (2006), Emanuela Arezzo

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Gathering Twilight? Information Privacy On The Internet In The Post-Enlightenment Era, 24 J. Marshall J. Computer & Info. L. 353 (2006), Mark F. Kightlinger Jan 2006

The Gathering Twilight? Information Privacy On The Internet In The Post-Enlightenment Era, 24 J. Marshall J. Computer & Info. L. 353 (2006), Mark F. Kightlinger

UIC John Marshall Journal of Information Technology & Privacy Law

This Article provides a timely examination of U.S. law and policy concerning information privacy on the Internet, a subject that receives almost daily attention in the press. This Article constructs a new theoretical framework from the writings of Alasdair MacIntyre, a major contemporary philosopher and social theorist. Over the past 30 years, MacIntyre has examined the roots and continuing impact of the failure of post-Enlightenment thinkers to produce an account of human nature and action that could replace an older Aristotelian account and command the assent of all rational persons. In addition to extending MacIntyre’s examination of our post-Enlightenment situation, …


Contribution To The Understanding Of The Public Domain, 24 J. Marshall J. Computer & Info. L. 411 (2006), Vincenzo Vinciguerra Jan 2006

Contribution To The Understanding Of The Public Domain, 24 J. Marshall J. Computer & Info. L. 411 (2006), Vincenzo Vinciguerra

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


A Comedy Of Errors: Defining "Component" In A Global Information Technology Market - Accounting For Innovation By Penalizing The Innovators, 24 J. Marshall J. Computer & Info. L. 507 (2006), William Greubel Jan 2006

A Comedy Of Errors: Defining "Component" In A Global Information Technology Market - Accounting For Innovation By Penalizing The Innovators, 24 J. Marshall J. Computer & Info. L. 507 (2006), William Greubel

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Revisiting The American Action For Public Disclosure Of Facts, Brian C. Murchison Jan 2006

Revisiting The American Action For Public Disclosure Of Facts, Brian C. Murchison

Scholarly Articles

None available.


Arkansas’S Public Records Retention Program: Records Retention As A Cornerstone Of Citizenship And Self-Government, Richard J. Peltz Jan 2006

Arkansas’S Public Records Retention Program: Records Retention As A Cornerstone Of Citizenship And Self-Government, Richard J. Peltz

University of Arkansas at Little Rock Law Review

No abstract provided.


Lost In Translation? Data Mining, National Security And The Adverse Inference Problem, Anita Ramasastry Jan 2006

Lost In Translation? Data Mining, National Security And The Adverse Inference Problem, Anita Ramasastry

Articles

To the extent that we permit data mining programs to proceed, they must provide adequate due process and redress mechanisms that permit individuals to clear their names. A crucial criteria for such a mechanism is to allow access to information that was used to make adverse assessments so that errors may be corrected. While some information may have to be kept secret for national security purposes, a degree of transparency is needed when individuals are trying to protect their right to travel or access government services free from suspicion.

Part II of this essay briefly outlines the government's ability to …


In The Service Of Secrets: The U.S. Supreme Court Revisits Totten, 39 J. Marshall L. Rev. 475 (2006), Douglas Kash, Matthew Indrisano Jan 2006

In The Service Of Secrets: The U.S. Supreme Court Revisits Totten, 39 J. Marshall L. Rev. 475 (2006), Douglas Kash, Matthew Indrisano

UIC Law Review

No abstract provided.


Hitching A Ride: Every Time You Take A Drive, The Government Is Riding With You, 39 J. Marshall L. Rev. 1499 (2006), Benjamin Burnham Jan 2006

Hitching A Ride: Every Time You Take A Drive, The Government Is Riding With You, 39 J. Marshall L. Rev. 1499 (2006), Benjamin Burnham

UIC Law Review

No abstract provided.


Equal Protection In The World Of Art And Obscenity: The Art Photographer's Latent Struggle With Obscenity Standards In Contemporary America, Elaine Wang Jan 2006

Equal Protection In The World Of Art And Obscenity: The Art Photographer's Latent Struggle With Obscenity Standards In Contemporary America, Elaine Wang

Vanderbilt Journal of Entertainment & Technology Law

Part I of this article describes the initial hurdles that all visual art forms, including photography, face with respect to First Amendment protection given the power of visual imagery and the three-pronged test for obscenity set forth in Miller v. California. Of particular relevance is the "serious artistic value" prong of the Miller test and the problems inherent in determining who is to judge as well as how one might judge whether a work, particularly a photograph that may be construed to have a non-artistic function, possesses "serious artistic value."

Part II addresses the overall approach to photography in three …


A Feeling Of Unease About Privacy Law, Ann Bartow Jan 2006

A Feeling Of Unease About Privacy Law, Ann Bartow

Law Faculty Scholarship

This essay responds to Daniel Solove's recent article, A Taxonomy of Privacy. I have read many of Daniel Solove's privacy-related writings, and he has made many important scholarly contributions to the field. As with his previous works about privacy and the law, it is an interesting and substantive piece of work. Where it falls short, in my estimation, is in failing to label and categorize the very real harms of privacy invasions in an adequately compelling manner. Most commentators agree that compromising a person's privacy will chill certain behaviors and change others, but a powerful list of the reasons why …


Consumer Privacy And Radio Frequency Identification Technology, Teresa Scassa, Theodore Chiasson, Michael Deturbide, Anne Uteck Jan 2006

Consumer Privacy And Radio Frequency Identification Technology, Teresa Scassa, Theodore Chiasson, Michael Deturbide, Anne Uteck

Articles, Book Chapters, & Popular Press

Radio Frequency ID tags are poised to replace the UPC barcode as a mechanism for inventory control in the wholesale and retail contexts. Yet the tiny chips offer a range of potential uses that go beyond the bar code. In this paper the authors define RFID technology and its applications. They explore the privacy implications of this technology and consider recent attempts in the U.S. and European Union to grapple with the privacy issues raised by the deployment of RFIDs at the retail level. The authors then consider the extent to which Canada's Personal Information Protection and Electronic Documents Act …


The French "Headscarves Ban": Intolerance Or Necessity?, 40 J. Marshall L. Rev. 235 (2006), Reuven (Ruvi) Ziegler Jan 2006

The French "Headscarves Ban": Intolerance Or Necessity?, 40 J. Marshall L. Rev. 235 (2006), Reuven (Ruvi) Ziegler

UIC Law Review

No abstract provided.


If You Love Me Dear, Please Sign Here: Will The "Love Contract" Play A Role In Protecting Employers From Sexual Harassment Liability?, 40 J. Marshall L. Rev. 311 (2006), Jessica Lynn Mok O'Neill Jan 2006

If You Love Me Dear, Please Sign Here: Will The "Love Contract" Play A Role In Protecting Employers From Sexual Harassment Liability?, 40 J. Marshall L. Rev. 311 (2006), Jessica Lynn Mok O'Neill

UIC Law Review

No abstract provided.


Hipaa-Cracy, Carl E. Schneider Jan 2006

Hipaa-Cracy, Carl E. Schneider

Articles

The Department of Health and Human Services has recently been exercising its authority under the (wittily named) "administrative simplification" part of the Health Insurance Portability and Accountability Act to regulate the confidentiality of medical records. I love the goal; I loathe the means. The benefits are obscure; the costs are onerous. Putatively, the regulations protect my autonomy; practically, they ensnarl me in red tape and hijack my money for services I dislike. HIPAA (a misnomer-HIPAA is the statute, not the regulations) is too lengthy, labile, complex, confused, unfinished, and unclear to be summarized intelligibly or reliably. (Brevis esse laboro, …


The Privacy Gambit: Toward A Game Theoretic Approach To International Data Protection, Horace E. Anderson Jr. Jan 2006

The Privacy Gambit: Toward A Game Theoretic Approach To International Data Protection, Horace E. Anderson Jr.

Vanderbilt Journal of Entertainment & Technology Law

This article briefly explores several scenarios in which economic actors compete and cooperate in order to capture the value in personal information. The focus then shifts to one particular scenario: the ongoing interaction between the United States and the European Union in attempting to construct data protection regimes that serve the philosophies and citizens of each jurisdiction as well as provide a strategic economic advantage. A game theoretic model is presented to explain the course of dealings between the two actors, including both unilateral and bilateral actions. Part I ends with an exploration of opportunities for seizing competitive advantage, and …


Privacy Law In The New Millennium: A Tribute To Richard C. Turkington, Gregory P. Magarian Jan 2006

Privacy Law In The New Millennium: A Tribute To Richard C. Turkington, Gregory P. Magarian

Scholarship@WashULaw

At least since Louis Brandeis and Samuel Warren's seminal 1890 article "The Right to Privacy,"' the idea of privacy has sparked some of the most significant and contentious debates in American law. Over the past three decades, Richard Turkington focused his formidable intellect on enriching those debates. Dick's untimely passing in 2004 deprived those of us who knew and worked with him of a treasured friend and a brilliant colleague. The broader legal profession lost a visionary. Probably more than any other scholar of his generation, Dick was responsible for expanding and deepening our understanding of the essential, sometimes elusive, …


Beyond Patents: The Cultural Life Of Native Healing And The Limitations Of The Patent System As A Protective Mechanism For Indigenous Knowledge On The Medicinal Uses Of Plants, Ikechi Mgbeoji Jan 2006

Beyond Patents: The Cultural Life Of Native Healing And The Limitations Of The Patent System As A Protective Mechanism For Indigenous Knowledge On The Medicinal Uses Of Plants, Ikechi Mgbeoji

Canadian Journal of Law and Technology

The question that this paper seeks to tackle is whether in the contest of allegations of biopiracy and in the search for effective mechanisms for the protection of indigenous knowledge of the medicinal uses of plants possessed by traditional healers of southern Nigeria, there is any role for the patent regime. Given the popularity of alternative forms of health care, this question is of importance in contemporary discourse.


Liability For Botnet Attacks, Jennifer A. Chandler Jan 2006

Liability For Botnet Attacks, Jennifer A. Chandler

Canadian Journal of Law and Technology

This paper will consider the possibility of using tort liability to address cyber insecurity. In previous work, I have proposed a hypothetical lawsuit by the victim of a DDoS attack against the vendor of unreasonably insecure software, the flaws of which are exploited to create the DDoS attack army. Indeed, software vendors are facing increasing public disapproval for their contributions to cyber insecurity. However, not all DDoS attack armies are assembled by exploiting flaws in software. Computers are also infected when users voluntarily open infected email attachments or download infected files from file-sharing networks. Accordingly, the cyber insecurity resulting from …


Rfid Et Administration Publique: Le Citoyen Sous Surveillance?, Anthony Hémond Jan 2006

Rfid Et Administration Publique: Le Citoyen Sous Surveillance?, Anthony Hémond

Canadian Journal of Law and Technology

Lorsque les gouvernements et l’Administration se lancent dans la mise en place d’une nouvelle technologie, il leur faut, au préalable, analyser les enjeux et les risques de ce déploiement.

Tel sera l’essentiel de nos développements. Nous verrons comment, notamment à travers la mise en place du e-passeport, la technologie RFID peut être intégrée au sein de l’Administration. Le choix de cette nouvelle génération de passeports n’est pas anodin: si dans certains domaines les donne ́es qu’ils contiennent sont précieuses, dans d’autres, notamment celui de la santé, les informations sur les personnes sont très sensibles. Il faut donc maîtriser les risques …


Review Of Legal Issues In Electronic Commerce, 2nd Edition (Concord, Ontario: Captus Press, 2005), Chidi Oguamanam Jan 2006

Review Of Legal Issues In Electronic Commerce, 2nd Edition (Concord, Ontario: Captus Press, 2005), Chidi Oguamanam

Canadian Journal of Law and Technology

This collection of materials is part of the Canadian Legal Studies Series. According to the publishers, the objective of the Series is to offer ‘‘a wealth of carefully selected, and up-to-date examinations of Canadian legal issues’’. The first of such collections under the same title appeared in 2002. According to Takach, one of the dynamics of computer, and indeed information technology, law is rapid change in technology trends. Thus, after two years, technological developments and corresponding legal responses on the subject of electronic commerce warrant a new edition of materials of this nature.


Remembering The Public Domain, Christine Galbraith Davik Jan 2006

Remembering The Public Domain, Christine Galbraith Davik

Faculty Publications

Rapid advances in communication technology over the past decade have resulted in the previously unimaginable ability to seamlessly exchange ideas and data on a global basis. Nonetheless, despite the undeniable progress that has been made, access to information is ironically becoming progressively more. This is due in large part to the fact that resources which belong in the public domain are increasingly being transformed into private property. The carefully balanced provisions of copyright law are gradually becoming displaced by contractual, technological, and legislative constraints that allow for the tight control of access to and use of the materials in question. …