Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Communications Law (2)
- Computer Law (2)
- Consumer Protection Law (2)
- Science and Technology (2)
- Administrative Law (1)
-
- Arts (1)
- Arts and Entertainment (1)
- Bill Clinton (1)
- Biography (1)
- Civil Law (1)
- Comparative and Foreign Law (1)
- Conflict of Laws (1)
- Constitutional Law (1)
- Contracts (1)
- Copyright (1)
- Corporations (1)
- Courts (1)
- Criminal Law and Procedure (1)
- Cybersecurity (1)
- DMCA (1)
- Digital (1)
- Digital millennium copyright act (1)
- Dispute Resolution (1)
- Employment Practice (1)
- Entertainment (1)
- Fair use (1)
- First Amendment (1)
- Gaming (1)
- General Law (1)
- HIPAA (1)
- Publication
- Publication Type
Articles 1 - 9 of 9
Full-Text Articles in Consumer Protection Law
The Unexamined Life In The Era Of Big Data: Toward A Udaap For Data, Sean Brian
The Unexamined Life In The Era Of Big Data: Toward A Udaap For Data, Sean Brian
Sean Brian
No abstract provided.
The Evolution Of The Digital Millennium Copyright Act; Changing Interpretations Of The Dmca And Future Implications For Copyright Holders, Hillary A. Henderson
The Evolution Of The Digital Millennium Copyright Act; Changing Interpretations Of The Dmca And Future Implications For Copyright Holders, Hillary A. Henderson
Hillary A Henderson
Copyright law rewards an artificial monopoly to individual authors for their creations. This reward is based on the belief that, by granting authors the exclusive right to reproduce their works, they receive an incentive and means to create, which in turn advances the welfare of the general public by “promoting the progress of science and useful arts.” Copyright protection subsists . . . in original works of authorship fixed in any tangible medium of expression, now known or later developed, from which they can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or …
Now You See It, Now You Don’T . . . Or Do You?: Snapchat’S Deceptive Promotion Of Vanishing Messages Violates Federal Trade Commission Regulations, 30 J. Marshall J. Info. Tech. & Privacy L. 827 (2014), Danielle Young
UIC John Marshall Journal of Information Technology & Privacy Law
This Comment will explore the recently popular application Snapchat, and discuss the ways in which the app's privacy policy has violated FTC regulations, responding to a recent complaint filed by The Electronic Privacy Center. Particularly, this Comment will focus on Snapchat's deceptive promotion of "disappearing" photographs and videos. Section II will illustrate the basic structure of Snapchat, detailing various illustrations of its use. Section II will also examine the regulations set forth by the FTC that Snapchat is required to follow. Section III will discuss possible methods that the average user can do in order to bypass the very thing …
California’S Eavesdropping Law Endangers Victims Of Domestic Violence, 31 J. Marshall J. Info. Tech. & Privacy L. 57 (2014), John E.B. Myers
California’S Eavesdropping Law Endangers Victims Of Domestic Violence, 31 J. Marshall J. Info. Tech. & Privacy L. 57 (2014), John E.B. Myers
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Canada’S Anti-Spam Legislation: A Constitutional Analysis, 31 J. Marshall J. Info. Tech. & Privacy L. 1 (2014), Emir Crowne, Stephanie Provato
Canada’S Anti-Spam Legislation: A Constitutional Analysis, 31 J. Marshall J. Info. Tech. & Privacy L. 1 (2014), Emir Crowne, Stephanie Provato
UIC John Marshall Journal of Information Technology & Privacy Law
On December 15th, 2010, the Government of Canada agreed to Bill C-28, the Fighting Internet and Wireless Spam Act, with the intent to “deter the most damaging and deceptive forms of spam… from occurring in Canada and to help to drive out spammers.” Canada‟s Anti- Spam Legislation (“CASL”) was born. Although CASL has only been in force since July 1st, 2014, we argue that the Act may not survive constitutional scrutiny as it unduly restricts freedom of speech.
The Right To Be Forgotten: Forced Amnesia In A Technological Age, 31 J. Marshall J. Info. Tech. & Privacy L. 133 (2014), Robert Bolton
The Right To Be Forgotten: Forced Amnesia In A Technological Age, 31 J. Marshall J. Info. Tech. & Privacy L. 133 (2014), Robert Bolton
UIC John Marshall Journal of Information Technology & Privacy Law
In the modern era, the connection between technology and one’s personal life has increased the number of moments recorded for posterity. While in many circumstances this is an ideal opportunity for fond recollection, it has the downside of displaying for others our less flattering moments. Because the Internet has such a wide scope, once something has entered its domain, it is virtually impossible to permanently remove. With a public increasingly perceiving this winnowing of privacy as a negative tendency, legislators both at home and abroad have made proposals that attempt to place restrictions on what content social media is allowed …
Facebook Messenger: Eroding User Privacy In Order To Collect, Analyze, And Sell Your Personal Information, 31 J. Marshall J. Info. Tech. & Privacy L. 393 (2014), Erica Jaeger
UIC John Marshall Journal of Information Technology & Privacy Law
This comment will examine Facebook‘s new standalone Facebook Messenger app, and review how the Privacy Policy, Data Use Policy, and the list of permissions violate Section 5 of the Federal Trade Commission Act. The comment will focus on Facebook Messenger‘s deceptive methods of accessing users‘ personal information and how Facebook uses that personal information. Section II will explain social networking sites and the configuration of Facebook, Facebook Messenger, and Facebook‘ s evolving policies. Section II will also discuss the Federal Trade Commission and the Federal Trade Commission Act that was created to protect consumers against unfair, deceptive, or fraudulent practices.15 …
Surveillance At The Source, David Thaw
Surveillance At The Source, David Thaw
Articles
Contemporary discussion concerning surveillance focuses predominantly on government activity. These discussions are important for a variety of reasons, but generally ignore a critical aspect of the surveillance-harm calculus – the source from which government entities derive the information they use. The source of surveillance data is the information "gathering" activity itself, which is where harms like "chilling" of speech and behavior begin.
Unlike the days where satellite imaging, communications intercepts, and other forms of information gathering were limited to advanced law enforcement, military, and intelligence activities, private corporations now play a dominant role in the collection of information about individuals' …
Enlightened Regulatory Capture, David Thaw
Enlightened Regulatory Capture, David Thaw
Articles
Regulatory capture generally evokes negative images of private interests exerting excessive influence on government action to advance their own agendas at the expense of the public interest. There are some cases, however, where this conventional wisdom is exactly backwards. This Article explores the first verifiable case, taken from healthcare cybersecurity, where regulatory capture enabled regulators to harness private expertise to advance exclusively public goals. Comparing this example to other attempts at harnessing industry expertise reveals a set of characteristics under which regulatory capture can be used in the public interest. These include: 1) legislatively-mandated adoption of recommendations by an advisory …