Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Privacy Law (5)
- Internet Law (3)
- Science and Technology Law (3)
- Communications Law (2)
- State and Local Government Law (2)
-
- Administrative Law (1)
- Computer Law (1)
- Family Law (1)
- First Amendment (1)
- Fourth Amendment (1)
- Health Law and Policy (1)
- Intellectual Property Law (1)
- Labor and Employment Law (1)
- Law Enforcement and Corrections (1)
- Law and Gender (1)
- Legal History (1)
- Legislation (1)
- National Security Law (1)
- Organizations Law (1)
Articles 1 - 7 of 7
Full-Text Articles in Law
Limits Of The Federal Wiretap Act's Ability To Protect Against Wi-Fi Sniffing, Mani Potnuru
Limits Of The Federal Wiretap Act's Ability To Protect Against Wi-Fi Sniffing, Mani Potnuru
Michigan Law Review
Adoption of Wi-Fi wireless technology continues to see explosive growth. However many users still operate their home Wi-Fi networks in unsecured mode or use publicly available unsecured Wi-Fi networks, thus exposing their communications to the dangers of "packet sniffing," a technique used for eavesdropping on a network. Some have argued that communications over unsecured Wi-Fi networks are "readily accessible to the general public" and that such communications are therefore excluded from the broad protections of the Federal Wiretap Act against intentional interception of electronic communications. This Note examines the Federal Wiretap Act and argues that the current Act's treatment of …
The Need To Prevent Employers From Accessing Private Social Network Profiles, Brett Novick
The Need To Prevent Employers From Accessing Private Social Network Profiles, Brett Novick
University of Michigan Journal of Law Reform Caveat
In March 2012, social network privacy became a conversation topic after news reports of the story of Justin Bassett, a job applicant who withdrew his application in the middle of an interview when the interviewer asked him for the username and password of his private Facebook account. Although the issue has received much attention from the public and media, the Department of Justice (DOJ) has stated that it has no interest in prosecuting employers for asking for social networking account information. Fortunately, legislation that would make it illegal for employers to ask for the username and passwords for social networking …
Privacy Policies, Terms Of Service, And Ftc Enforcement: Broadening Unfairness Regulation For A New Era, G. S. Hans
Privacy Policies, Terms Of Service, And Ftc Enforcement: Broadening Unfairness Regulation For A New Era, G. S. Hans
Michigan Telecommunications & Technology Law Review
This Note examines website privacy policies in the context of FTC regulation. The relevant portion of Section 5 of the Federal Trade Commission Act, 15 U.S.C. § 45(a), uses the following language to define the scope of the agency's regulatory authority: "Unfair methods of competition in or affecting commerce, and unfair or deceptive acts or practices in or affecting commerce, are hereby declared unlawful." Specifically, this Note analyzes the FTC's power to regulate unfair practices (referred to as the FTC's "unfairness power") granted by Section 5, and also discusses the deception prong of Section 5, which allows the agency to …
Property As Control: The Case Of Information, Jane B. Baron
Property As Control: The Case Of Information, Jane B. Baron
Michigan Telecommunications & Technology Law Review
If heath policy makers' wishes come true, by the end of the current decade the paper charts in which most of our medical information is currently recorded will be replaced by networked electronic health records ("EHRs").[...] Like all computerized records, networked EHRs are difficult to secure, and the information in EHRs is both particularly sensitive and particularly valuable for commercial purposes. Sadly, the existing federal statute meant to address this problem, the Health Insurance Portability and Accountability Act of 1996 ("HIPAA"), is probably inadequate to the task.[...] Health law, privacy, and intellectual property scholars have all suggested that the river …
No Cause Of Action: Video Surveillance In New York City, Olivia J. Greer
No Cause Of Action: Video Surveillance In New York City, Olivia J. Greer
Michigan Telecommunications & Technology Law Review
In 2010, New York City Police Commissioner Raymond Kelly announced a new network of video surveillance in the City. The new network would be able to prevent future terrorist attacks by identifying suspicious behavior before catastrophic events could take place. Kelly told reporters, "If we're looking for a person in a red jacket, we can call up all the red jackets filmed in the last 30 days," and "[w]e're beginning to use software that can identify suspicious objects or behaviors." Gothamist later made a witticism of Kelly's statement, remarking, "Note to terrorists: red jackets are not a good look for …
The Devil Comes To Kansas: A Story Of Free Love, Sexual Privacy, And The Law, Charles J. Reid Jr.
The Devil Comes To Kansas: A Story Of Free Love, Sexual Privacy, And The Law, Charles J. Reid Jr.
Michigan Journal of Gender & Law
On Sunday, September 19, 1886, Moses Harman, the editor of the radical newspaper Lucifer the Light-Bearer, presided over an inherently contradictory event-a free-love marriage ceremony between his associate editor, the thirty-seven-year-old Edwin Walker, and Moses' own daughter, the sixteen-year-old Lillian. The case that the two Harmans and Walker wished to present aimed to transform marriage from a public to a private relationship and from a permanent and exclusive one to a temporary one that permitted potentially many partners. State v. Walker and its parties have received some scholarly notice, but the truly radical quality of the arguments Moses, Edwin, and …
The Latest 4th Amendment Privacy Conundrum: "Stingrays", Max Bulinksi
The Latest 4th Amendment Privacy Conundrum: "Stingrays", Max Bulinksi
University of Michigan Journal of Law Reform Caveat
Wired is reporting renewed hubbub regarding statutory and Fourth Amendment protections of individuals’ privacy in the digital age. This time, it comes in the form of federal officers using a fake cellphone tower (called a “stingray”) to locate their suspect, Mr. Rigmaiden, by tracking the location of his cellphone. According to an affidavit submitted to the court, the stingray only captures the equivalent of header information – such as the phone or account number assigned to the aircard as well as dialing, routing and address information involved in the communication.