Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Privacy Law

2014

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 54

Full-Text Articles in Computer Law

Self, Privacy, And Power: Is It All Over?, Richard Warner, Robert H. Sloan Oct 2014

Self, Privacy, And Power: Is It All Over?, Richard Warner, Robert H. Sloan

All Faculty Scholarship

The realization of a multifaceted self is an ideal one strives to realize. One realizes such a self in large part through interaction with others in various social roles. Such realization requires a significant degree of informational privacy. Informational privacy is the ability to determine for yourself when others may collect and how they may use your information. The realization of multifaceted selves requires informational privacy in public. There is no contradiction here: informational privacy is a matter of control, and you can have such control in public. Current information processing practices greatly reduce privacy in public thereby threatening the …


Systematic Ict Surveillance By Employers: Are Your Personal Activities Private?, Arlene J. Nicholas Jul 2014

Systematic Ict Surveillance By Employers: Are Your Personal Activities Private?, Arlene J. Nicholas

Faculty and Staff - Articles & Papers

This paper reviews the various methods of information and communications technology (ICT) that is used by employers to peer into the work lives and, in some cases, private lives of employees. Some of the most common methods – such as computer and Internet monitoring, video surveillance, and global positioning systems (GPS) – have resulted in employee disciplines that have been challenged in courts. This paper provides background information on United States (U.S.) laws and court cases which, in this age of easily accessible information, mostly support the employer. Assessments regarding regulations and policies, which will need to be continually updated …


The Singapore Personal Data Protection Act And An Assessment Of Future Trends In Data Privacy, Warren B. Chik Jun 2014

The Singapore Personal Data Protection Act And An Assessment Of Future Trends In Data Privacy, Warren B. Chik

Warren Bartholomew CHIK

In the first part of this paper, I will present and explain the Singapore Personal Data Protection Act (“PDPA”) in the context of legislative developments in the Asian region and against the well-established international baseline privacy standards. In the course of the above evaluation, reference will be made to the national laws and policy on data privacy prior to the enactment of the PDPA as well as current social and market practices in relation to personal data. In the second part of this paper, I will decipher and assess the future trends in data privacy reform and the future development …


With Great Power Comes Little Responsibility: The Role Of Online Payment Service Providers With Regards To Websites Selling Counterfeit Goods, J. Bruce Richardson Jun 2014

With Great Power Comes Little Responsibility: The Role Of Online Payment Service Providers With Regards To Websites Selling Counterfeit Goods, J. Bruce Richardson

Canadian Journal of Law and Technology

This article will explain the current avenues for intellectual property rights holders to make use of existing anti-counterfeiting policies made available by financial companies dealing in electronic payments, and argue that current policies, while helpful, are not sufficient. The article will conclude by demonstrating that policy makers have options to intervene and regulate the use of online payment services, either directly through legislation or indirectly through facilitating “best practices.”


Rethinking Online Privacy In Canada: Commentary On Voltage Pictures V. John And Jane Doe, Ngozi Okidegbe Jun 2014

Rethinking Online Privacy In Canada: Commentary On Voltage Pictures V. John And Jane Doe, Ngozi Okidegbe

Canadian Journal of Law and Technology

This article examines the Voltage decision, with the view that the bona fide standard safeguards intellectual property rights at the cost of online privacy rights and will proceed in three parts. Part I provides a brief contextualization of the issues. Part II is an analysis of the Voltage decision. Part III examines how the bona fide standard is a relatively low threshold. This article concludes by considering the possibility of shifting to a higher standard for disclosure, as well as a possible solution for the effect that a higher standard could have on copyright owners.


Access Of Evil? Legislating Online Youth Privacy In The Information Age, Agathon Fric Jun 2014

Access Of Evil? Legislating Online Youth Privacy In The Information Age, Agathon Fric

Canadian Journal of Law and Technology

This article seeks to address what constitutes youth online privacy, how youth conceive of their privacy, whether their privacy needs protecting, and, if so, how youth privacy should be regulated online. First, the article begins by rooting the issue of online youth privacy in the current social, technological, economic, political, and legal context, drawing on social science research to demonstrate both the threats and opportunities created by technology for youth privacy.

Second, the analysis focuses on the relative strengths and weaknesses of current federal legislation as the primary law governing the collection, use, and disclosure of youth’s personal information through …


The Song Remains The Same: Preserving The First Sale Doctrine For A Secondary Market Of Digital Music, Marco Figliomeni Jun 2014

The Song Remains The Same: Preserving The First Sale Doctrine For A Secondary Market Of Digital Music, Marco Figliomeni

Canadian Journal of Law and Technology

This article will explore the origins and rationale for the first sale doctrine. A review of the most recent American case law shows the court rejecting the doctrine’s applicability in a digital sphere. I suggest that in spite of the court’s rigid interpretation of the U.S. Copyright Act, formulating a digital first sale doctrine is a matter better left to lawmakers. A flourishing digital secondary market can promote competition and innovation while making content more accessible to the public, but its endorsement requires an appreciation of its adverse effect on the primary market for copyright owners. The article fast-forwards to …


Combining Familial Searching And Abandoned Dna: Potential Privacy Outcomes And The Future Of Canada's National Dna Data Bank, Amy Conroy Jun 2014

Combining Familial Searching And Abandoned Dna: Potential Privacy Outcomes And The Future Of Canada's National Dna Data Bank, Amy Conroy

Canadian Journal of Law and Technology

This article aims to respond to the government’s request by explaining the nature of that relationship and by arguing that the combined use of familial searching and analysis of abandoned DNA would present a serious risk for genetic privacy. The risk is particularly acute given that it would effectively circumvent the existing justification for the NDDB, leading to inclusion of individuals whose DNA profiles have not been uploaded directly onto the data bank. To substantiate this main argument, this article proceeds in three parts. The first describes the current Canadian law on familial searching and the ongoing interest in amending …


Online Terms Of Service: A Shield For First Amendment Scrutiny Of Government Action, Jacquelyn E. Fradette Feb 2014

Online Terms Of Service: A Shield For First Amendment Scrutiny Of Government Action, Jacquelyn E. Fradette

Notre Dame Law Review

Part I of this Note will canvas popular opinions and perceptions about First Amendment rights on the Internet using examples of public outcry over recent instances of speech limitation. It will also discuss the state action doctrine generally and how the presence of this doctrine most likely renders certain popular public constitutional intuitions about the First Amendment erroneous.

Part II will provide an overview of how courts have taken an expansive and protective view of private ordering between online parties. It will discuss how courts have developed a robust freedom to contract jurisprudence in the Internet context. Because courts essentially …


Near-Field Communication Technology: Regulatory And Legal Recommendations For Embracing The Nfc Revolution, Allan Richarz Jan 2014

Near-Field Communication Technology: Regulatory And Legal Recommendations For Embracing The Nfc Revolution, Allan Richarz

Canadian Journal of Law and Technology

Despite its ease and convenience, NFC technology raises a number of privacy issues. Chief among these concerns are the collection, retention, and usage of personally-identifying information contained within NFC-enabled devices by both private and public entities. Within that category, the most pressing privacy issues inherent in the collection and usage of such information relate to real-time tracking or after-the-fact habit profiling and identity theft. As well, privacy issues persist around the means used, if any, to secure and protect that information from unauthorized third parties both at the end-user and systemic database levels.

In light of these concerns, it is …


Review And Reflection: Copyright Hearings And Related Discourse In The Nation’S Capital, 13 J. Marshall Rev. Intell. Prop. L. 487 (2014), Maria A. Pallante Jan 2014

Review And Reflection: Copyright Hearings And Related Discourse In The Nation’S Capital, 13 J. Marshall Rev. Intell. Prop. L. 487 (2014), Maria A. Pallante

UIC Review of Intellectual Property Law

On February 28, 2014, the Register of Copyrights of the United States and Director of the U.S. Copyright Office Maria A. Pallante delivered a keynote speech on the copyright hearings and related discourse in the nation’s capital. The speech was given at The John Marshall Law School’s 58th Annual Intellectual Property Conference. This article is based on her speech at the Conference.


Here We Are Now, Entertain Us: Defining The Line Between Personal And Professional Context On Social Media, 35 Pace L. Rev. 398 (2014), Raizel Liebler, Keidra Chaney Jan 2014

Here We Are Now, Entertain Us: Defining The Line Between Personal And Professional Context On Social Media, 35 Pace L. Rev. 398 (2014), Raizel Liebler, Keidra Chaney

UIC Law Open Access Faculty Scholarship

Social media platforms such as Facebook, Twitter, and Instagram allow individuals and companies to connect directly and regularly with an audience of peers or with the public at large. These websites combine the audience-building platforms of mass media with the personal data and relationships of in-person social networks. Due to a combination of evolving user activity and frequent updates to functionality and user features, social media tools blur the line of whether a speaker is perceived as speaking to a specific and presumed private audience, a public expression of one’s own personal views, or a representative viewpoint of an entire …


E-Discovery: Reasonable Search, Proportionality, Cooperation, And Advancing Technology, 30 J. Marshall J. Info. Tech. & Privacy L. 433 (2014), Steven Bennett Jan 2014

E-Discovery: Reasonable Search, Proportionality, Cooperation, And Advancing Technology, 30 J. Marshall J. Info. Tech. & Privacy L. 433 (2014), Steven Bennett

UIC John Marshall Journal of Information Technology & Privacy Law

Rule 26(g)(1)(A) of the Federal Rules of Civil Procedure (the “Federal Rules”) requires that an attorney responding to a discovery request verify by signature, after “reasonable inquiry,” that the disclosure is, to the best of the attorney’s knowledge, “complete and correct.” In a digital environment, with masses of data in multiple formats and locations, the determination of whether a “reasonable” effort to meet the completeness requirement has occurred may turn on an assessment of the practices used to conduct a search of electronic materials. Those practices, in turn, must be judged on a standard of “proportionality” (i.e., that the effort …


From Morris To Nosal: The History Of Exceeding Authorization And The Need For A Change, 30 J. Marshall J. Info. Tech. & Privacy L. 465 (2014), Vasileios Karagiannopoulos Jan 2014

From Morris To Nosal: The History Of Exceeding Authorization And The Need For A Change, 30 J. Marshall J. Info. Tech. & Privacy L. 465 (2014), Vasileios Karagiannopoulos

UIC John Marshall Journal of Information Technology & Privacy Law

This Article discusses and examines the various cases that pertain to the issue of exceeding authorized access throughout the years from United States v. Morris to the recent United States v. Nosal. Further, this Article thoroughly examines the Ninth Circuit’s approach regarding the issue of exceeding authorization; specifically, the need for the Ninth Circuit’s narrower interpretation in United States v. Brekka and Nosal. Finally, this Article proposes an alternative phrasing for the term “exceeding authorization,” and a revised interpretation of the phrase and the relevant offenses under the Computer Fraud and Abuse Act. This recommended interpretation suggests establishing different degrees …


Cloud Computing, Regulatory Compliance, And Student Privacy: A Guide For School Administrators And Legal Counsel, 30 J. Marshall J. Info. Tech. & Privacy L. 511 (2014), Steve Mutkoski Jan 2014

Cloud Computing, Regulatory Compliance, And Student Privacy: A Guide For School Administrators And Legal Counsel, 30 J. Marshall J. Info. Tech. & Privacy L. 511 (2014), Steve Mutkoski

UIC John Marshall Journal of Information Technology & Privacy Law

Rapid change in the technology landscape has resulted in the introduction of a range of new technologies into the classroom. But unlike the past use of technology in schools, many of these new products and services introduce two new dynamics that school counsel (and the teachers and administrators they support) need to understand fully. First, many of these new products and services are run “in the cloud” by a third party service provider as opposed to on servers operated by the school’s information technology (IT) staff. This third party operation and control can raise important new regulatory compliance issues, including …


“Bring Your Own Glass”: The Privacy Implications Of Google Glass In The Workplace, 30 J. Marshall J. Info. Tech. & Privacy L. 607 (2014), Anisha Mehta Jan 2014

“Bring Your Own Glass”: The Privacy Implications Of Google Glass In The Workplace, 30 J. Marshall J. Info. Tech. & Privacy L. 607 (2014), Anisha Mehta

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Bitcoins: Technological Innovation Or Emerging Threat?, 30 J. Marshall J. Info. Tech. & Privacy L. 535 (2014), R. Joseph Cook Jan 2014

Bitcoins: Technological Innovation Or Emerging Threat?, 30 J. Marshall J. Info. Tech. & Privacy L. 535 (2014), R. Joseph Cook

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Problems With Prism: How A Modern Definition Of Privacy Necessarily Protects Privacy Interests In Digital Communications, 30 J. Marshall J. Info. Tech. & Privacy L. 571 (2014), Adam Florek Jan 2014

The Problems With Prism: How A Modern Definition Of Privacy Necessarily Protects Privacy Interests In Digital Communications, 30 J. Marshall J. Info. Tech. & Privacy L. 571 (2014), Adam Florek

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Control Over Personal Data, Privacy And Administrative Discretion In Europe And The Usa: The Paradox Of Italian “Data Protection Authority”, 30 J. Marshall J. Info. Tech. & Privacy L. 721 (2014), Marco Quiroz Vitale Jan 2014

Control Over Personal Data, Privacy And Administrative Discretion In Europe And The Usa: The Paradox Of Italian “Data Protection Authority”, 30 J. Marshall J. Info. Tech. & Privacy L. 721 (2014), Marco Quiroz Vitale

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Right To Travel And Privacy: Intersecting Fundamental Freedoms, 30 J. Marshall J. Info. Tech. & Privacy L. 639 (2014), Richard Sobel Jan 2014

The Right To Travel And Privacy: Intersecting Fundamental Freedoms, 30 J. Marshall J. Info. Tech. & Privacy L. 639 (2014), Richard Sobel

UIC John Marshall Journal of Information Technology & Privacy Law

As a fundamental right inherent in American citizenship and the nature of the federal union, the right to travel in the United States is basic to American liberty. The right precedes the creation of the United States and appears in the Articles of Confederation. The U.S. Constitution and Supreme Court recognize and protect the right to interstate travel. The travel right entails privacy and free domestic movement without governmental abridgement.

In the era of surveillance, the imposition of official photo identification for travel, watchlist prescreening programs, and invasive airport scans and searches unreasonably burden the right to travel. They undermine …


Uncle Sam Knows What’S In Your Medicine Cabinet: The Security And Privacy Protection Of Health Records Under The Hitech Act, 30 J. Marshall J. Info. Tech. & Privacy L. 667 (2014), Ranjit Janardhanan Jan 2014

Uncle Sam Knows What’S In Your Medicine Cabinet: The Security And Privacy Protection Of Health Records Under The Hitech Act, 30 J. Marshall J. Info. Tech. & Privacy L. 667 (2014), Ranjit Janardhanan

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Where Has Privacy Gone? How Surveillance Programs Threaten Expectations Of Privacy, 30 J. Marshall J. Info. Tech. & Privacy L. 795 (2014), Michael Greene Jan 2014

Where Has Privacy Gone? How Surveillance Programs Threaten Expectations Of Privacy, 30 J. Marshall J. Info. Tech. & Privacy L. 795 (2014), Michael Greene

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Now You See It, Now You Don’T . . . Or Do You?: Snapchat’S Deceptive Promotion Of Vanishing Messages Violates Federal Trade Commission Regulations, 30 J. Marshall J. Info. Tech. & Privacy L. 827 (2014), Danielle Young Jan 2014

Now You See It, Now You Don’T . . . Or Do You?: Snapchat’S Deceptive Promotion Of Vanishing Messages Violates Federal Trade Commission Regulations, 30 J. Marshall J. Info. Tech. & Privacy L. 827 (2014), Danielle Young

UIC John Marshall Journal of Information Technology & Privacy Law

This Comment will explore the recently popular application Snapchat, and discuss the ways in which the app's privacy policy has violated FTC regulations, responding to a recent complaint filed by The Electronic Privacy Center. Particularly, this Comment will focus on Snapchat's deceptive promotion of "disappearing" photographs and videos. Section II will illustrate the basic structure of Snapchat, detailing various illustrations of its use. Section II will also examine the regulations set forth by the FTC that Snapchat is required to follow. Section III will discuss possible methods that the average user can do in order to bypass the very thing …


The Policing Of Religious Marriage Prohibitions In Israel: Religion, State, And Information Technology, 31 J. Marshall J. Info. Tech. & Privacy L. 23 (2014), Akiva Miller Jan 2014

The Policing Of Religious Marriage Prohibitions In Israel: Religion, State, And Information Technology, 31 J. Marshall J. Info. Tech. & Privacy L. 23 (2014), Akiva Miller

UIC John Marshall Journal of Information Technology & Privacy Law

The State of Israel applies religious law in all matters of marriage and divorce. For the Jewish population of Israel, the law of marriage includes religious prohibitions on certain kinds of marriages, most notably the prohibition against intermarriage and the prohibition against marrying a mamzer. Over the years, Israel‘s state-religious authorities have adopted a variety of methods and practices for policing these prohibitions. These include stringent procedures for premarital registration inquiries; use of databases for collecting information on prohibited persons; recording the possibility of mamzer status of newborn children; special Beit Din proceedings for handling cases of possible marriage prohibitions; …


California’S Eavesdropping Law Endangers Victims Of Domestic Violence, 31 J. Marshall J. Info. Tech. & Privacy L. 57 (2014), John E.B. Myers Jan 2014

California’S Eavesdropping Law Endangers Victims Of Domestic Violence, 31 J. Marshall J. Info. Tech. & Privacy L. 57 (2014), John E.B. Myers

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Canada’S Anti-Spam Legislation: A Constitutional Analysis, 31 J. Marshall J. Info. Tech. & Privacy L. 1 (2014), Emir Crowne, Stephanie Provato Jan 2014

Canada’S Anti-Spam Legislation: A Constitutional Analysis, 31 J. Marshall J. Info. Tech. & Privacy L. 1 (2014), Emir Crowne, Stephanie Provato

UIC John Marshall Journal of Information Technology & Privacy Law

On December 15th, 2010, the Government of Canada agreed to Bill C-28, the Fighting Internet and Wireless Spam Act, with the intent to “deter the most damaging and deceptive forms of spam… from occurring in Canada and to help to drive out spammers.” Canada‟s Anti- Spam Legislation (“CASL”) was born. Although CASL has only been in force since July 1st, 2014, we argue that the Act may not survive constitutional scrutiny as it unduly restricts freedom of speech.


The Online Gun Marketplace And The Dangerous Loophole In The National Instant Background Check System, 30 J. Marshall J. Info. Tech. & Privacy L. 757 (2014), Ann Daniels Jan 2014

The Online Gun Marketplace And The Dangerous Loophole In The National Instant Background Check System, 30 J. Marshall J. Info. Tech. & Privacy L. 757 (2014), Ann Daniels

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Shutting Down The Ex Parte Party: How To Keep Bittorrent Copyright Trolls From Abusing The Federal Court’S Discovery System, 31 J. Marshall J. Info. Tech. & Privacy L. 105 (2014), Jennifer L. Hunter Jan 2014

Shutting Down The Ex Parte Party: How To Keep Bittorrent Copyright Trolls From Abusing The Federal Court’S Discovery System, 31 J. Marshall J. Info. Tech. & Privacy L. 105 (2014), Jennifer L. Hunter

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Ethical Implications Of Cloud Computing For Lawyers, 31 J. Marshall J. Info. Tech. & Privacy L. 71 (2014), Stuart Pardau, Blake Edwards Jan 2014

The Ethical Implications Of Cloud Computing For Lawyers, 31 J. Marshall J. Info. Tech. & Privacy L. 71 (2014), Stuart Pardau, Blake Edwards

UIC John Marshall Journal of Information Technology & Privacy Law

This paper aims to isolate the pertinent ethical issues of cloud computing and chart a sensible path forward for lawyers. Part II briefly introduces the concept of cloud computing. Part III discusses the lawyer‟s duties of confidentiality, of competence, to protect client property, and to oversee non-lawyers who are providing assistance. Part III also examines the application of these duties by the various state bar associations to the problem of cloud computing. Part IV looks at sample terms of use of some of the more popular vendors. Part V suggests that securing informed consent, employing specialty cloud providers, and purchasing …


The Right To Be Forgotten: Forced Amnesia In A Technological Age, 31 J. Marshall J. Info. Tech. & Privacy L. 133 (2014), Robert Bolton Jan 2014

The Right To Be Forgotten: Forced Amnesia In A Technological Age, 31 J. Marshall J. Info. Tech. & Privacy L. 133 (2014), Robert Bolton

UIC John Marshall Journal of Information Technology & Privacy Law

In the modern era, the connection between technology and one’s personal life has increased the number of moments recorded for posterity. While in many circumstances this is an ideal opportunity for fond recollection, it has the downside of displaying for others our less flattering moments. Because the Internet has such a wide scope, once something has entered its domain, it is virtually impossible to permanently remove. With a public increasingly perceiving this winnowing of privacy as a negative tendency, legislators both at home and abroad have made proposals that attempt to place restrictions on what content social media is allowed …