Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Law

Selected Works

Legislation

Articles 1 - 4 of 4

Full-Text Articles in Law

No Surfing Allowed: A Review And Analysis Of Legislation Prohibiting Employers From Demanding Access To Employees’ And Job Applicants’ Social Media Accounts, Robert Sprague Dec 2013

No Surfing Allowed: A Review And Analysis Of Legislation Prohibiting Employers From Demanding Access To Employees’ And Job Applicants’ Social Media Accounts, Robert Sprague

Robert Sprague

This article examines recent state legislation prohibiting employers from requesting username and password information from employees and job applicants in order to access restricted portions of those employees’ and job applicants’ personal social media accounts. This article raises the issue of whether this legislation is even needed, from both practical and legal perspectives, focusing on: (a) how prevalent the practice is of requesting employees’ and job applicants’ social media access information; (b) whether alternative laws already exist which prohibit employers from requesting employees’ and job applicants’ social media access information; and (c) whether any benefits can be derived from this …


The Constitutional Infirmity Of Warrantless Nsa Surveillance: The Abuse Of Presidential Power And The Injury To The Fourth Amendment, Robert M. Bloom, William J. Dunn Oct 2013

The Constitutional Infirmity Of Warrantless Nsa Surveillance: The Abuse Of Presidential Power And The Injury To The Fourth Amendment, Robert M. Bloom, William J. Dunn

Robert Bloom

In recent months, there have been many revelations about the tactics used by the Bush Administration to prosecute their war on terrorism. These stories involve the exploitation of technologies that allow the government, with the cooperation of phone companies and financial institutions, to access phone and financial records. This paper focuses on the revelation and widespread criticism of the Bush Administration’s operation of a warrantless electronic surveillance program to monitor international phone calls and emails that originate or terminate with a United States party. The powerful and secret National Security Agency heads the program and leverages its significant intelligence collection …


Interests In The Balance: Fda Regulations Under The Biologics Price Competition And Innovation Act, Parker Tresemer Dec 2011

Interests In The Balance: Fda Regulations Under The Biologics Price Competition And Innovation Act, Parker Tresemer

Parker Tresemer

Recent biotechnology advances are yielding potentially life-saving therapies, but without FDA regulations designed to minimize product costs, patients will continue to be unable to afford these expensive biologic products. Many believe that these prohibitive costs stem from weak competition from generic biologic products, also known as follow-on biologics. To correct this deficiency, and to address the often conflicting regulatory and policy concerns associated with biologic products, Congress enacted the Biologics Price Competition and Innovation Act. The Act created an abbreviated approval pathway for biologic products and, if effective, could increase competition while driving down product costs. But legislation alone is …


Somebody's Watching Me: Protecting Patient Privacy In De-Identified Prescription Health Information, Christopher R. Smith Dec 2010

Somebody's Watching Me: Protecting Patient Privacy In De-Identified Prescription Health Information, Christopher R. Smith

Christopher R Smith

Increasingly, legal scholars, state legislatures and the federal courts are examining patient privacy concerns that arise in the context of the dissemination, distribution and use of patient prescription information. However, less attention has been paid to the sharing of de-identified or encrypted patient prescription information versus identifiable patient prescription information. Though many patients may not realize it, identifiable, de-identified and encrypted patient prescription information is being used for a host of purposes other than insurance reimbursement and treatment, most notably for pharmaceutical marketing purposes. Existing state and federal laws and ethical guidelines provide some protection for the privacy of patient …