Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 7 of 7
Full-Text Articles in Comparative and Foreign Law
Control Over Personal Data, Privacy And Administrative Discretion In Europe And The Usa: The Paradox Of Italian “Data Protection Authority”, 30 J. Marshall J. Info. Tech. & Privacy L. 721 (2014), Marco Quiroz Vitale
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Policing Of Religious Marriage Prohibitions In Israel: Religion, State, And Information Technology, 31 J. Marshall J. Info. Tech. & Privacy L. 23 (2014), Akiva Miller
UIC John Marshall Journal of Information Technology & Privacy Law
The State of Israel applies religious law in all matters of marriage and divorce. For the Jewish population of Israel, the law of marriage includes religious prohibitions on certain kinds of marriages, most notably the prohibition against intermarriage and the prohibition against marrying a mamzer. Over the years, Israel‘s state-religious authorities have adopted a variety of methods and practices for policing these prohibitions. These include stringent procedures for premarital registration inquiries; use of databases for collecting information on prohibited persons; recording the possibility of mamzer status of newborn children; special Beit Din proceedings for handling cases of possible marriage prohibitions; …
Canada’S Anti-Spam Legislation: A Constitutional Analysis, 31 J. Marshall J. Info. Tech. & Privacy L. 1 (2014), Emir Crowne, Stephanie Provato
Canada’S Anti-Spam Legislation: A Constitutional Analysis, 31 J. Marshall J. Info. Tech. & Privacy L. 1 (2014), Emir Crowne, Stephanie Provato
UIC John Marshall Journal of Information Technology & Privacy Law
On December 15th, 2010, the Government of Canada agreed to Bill C-28, the Fighting Internet and Wireless Spam Act, with the intent to “deter the most damaging and deceptive forms of spam… from occurring in Canada and to help to drive out spammers.” Canada‟s Anti- Spam Legislation (“CASL”) was born. Although CASL has only been in force since July 1st, 2014, we argue that the Act may not survive constitutional scrutiny as it unduly restricts freedom of speech.
The Right To Be Forgotten: Forced Amnesia In A Technological Age, 31 J. Marshall J. Info. Tech. & Privacy L. 133 (2014), Robert Bolton
The Right To Be Forgotten: Forced Amnesia In A Technological Age, 31 J. Marshall J. Info. Tech. & Privacy L. 133 (2014), Robert Bolton
UIC John Marshall Journal of Information Technology & Privacy Law
In the modern era, the connection between technology and one’s personal life has increased the number of moments recorded for posterity. While in many circumstances this is an ideal opportunity for fond recollection, it has the downside of displaying for others our less flattering moments. Because the Internet has such a wide scope, once something has entered its domain, it is virtually impossible to permanently remove. With a public increasingly perceiving this winnowing of privacy as a negative tendency, legislators both at home and abroad have made proposals that attempt to place restrictions on what content social media is allowed …
Eyes On The Road Program In Taiwan―Information Privacy Issues Under The Taiwan Personal Data Protection Act, 31 J. Marshall J. Info. Tech. & Privacy L. 145 (2015), Chen-Hung Chang
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Beyond Privacy Rights: Crossborder Cyber-Espionage And International Law, 31 J. Marshall J. Info. Tech. & Privacy L. 369 (2014), Stefan Kirchner
Beyond Privacy Rights: Crossborder Cyber-Espionage And International Law, 31 J. Marshall J. Info. Tech. & Privacy L. 369 (2014), Stefan Kirchner
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Breach Notification Requirements Under The European Union Legal Framework: Convergence, Conflicts, And Complexity In Compliance, 31 J. Marshall J. Info. Tech. & Privacy L. 317 (2014), Samson Esayas
UIC John Marshall Journal of Information Technology & Privacy Law
The European Union (EU) legal landscape on data privacy and information security is undergoing significant changes. A prominent legislative development in recent years is the introduction of breach notification requirements within a number of regulatory instruments. In only the past two years, the Community legislator has adopted, and proposed, four different regulatory instruments containing breach notification requirements. There are also existing requirements for the telecom sector. This creates a complex mesh of regulatory frameworks for breach notification where different aspects of the same breach within the same company might have to be dealt with under different regulatory instruments, making compliance …