Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 148

Full-Text Articles in Privacy Law

The Protection Of Pioneer Innovations – Lessons Learnt From The Semiconductor Chip Industry And Its Ip Law Framework, 32 J. Marshall J. Info. Tech. & Privacy L. 151 (2016), Thomas Hoeren Jan 2016

The Protection Of Pioneer Innovations – Lessons Learnt From The Semiconductor Chip Industry And Its Ip Law Framework, 32 J. Marshall J. Info. Tech. & Privacy L. 151 (2016), Thomas Hoeren

UIC John Marshall Journal of Information Technology & Privacy Law

In the second half of the 20th century, semiconductor technology as integrated circuits (IC), commonly known as microchips, became more and more dominating in our lives. Microchips are the control center of simple things like toasters as well as of complex high-tech machines for medical use. Of course, they also define the hearts of each computer. With the invention of semiconductor technology, a whole new economic sector began its rise and soon played a major role in the economies of the large industrial countries like the U.S., Japan and the EC. Especially, it stands out for its innovational power and …


Review And Reflection: Copyright Hearings And Related Discourse In The Nation’S Capital, 13 J. Marshall Rev. Intell. Prop. L. 487 (2014), Maria A. Pallante Jan 2014

Review And Reflection: Copyright Hearings And Related Discourse In The Nation’S Capital, 13 J. Marshall Rev. Intell. Prop. L. 487 (2014), Maria A. Pallante

UIC Review of Intellectual Property Law

On February 28, 2014, the Register of Copyrights of the United States and Director of the U.S. Copyright Office Maria A. Pallante delivered a keynote speech on the copyright hearings and related discourse in the nation’s capital. The speech was given at The John Marshall Law School’s 58th Annual Intellectual Property Conference. This article is based on her speech at the Conference.


Shutting Down The Ex Parte Party: How To Keep Bittorrent Copyright Trolls From Abusing The Federal Court’S Discovery System, 31 J. Marshall J. Info. Tech. & Privacy L. 105 (2014), Jennifer L. Hunter Jan 2014

Shutting Down The Ex Parte Party: How To Keep Bittorrent Copyright Trolls From Abusing The Federal Court’S Discovery System, 31 J. Marshall J. Info. Tech. & Privacy L. 105 (2014), Jennifer L. Hunter

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Right To Be Forgotten: Forced Amnesia In A Technological Age, 31 J. Marshall J. Info. Tech. & Privacy L. 133 (2014), Robert Bolton Jan 2014

The Right To Be Forgotten: Forced Amnesia In A Technological Age, 31 J. Marshall J. Info. Tech. & Privacy L. 133 (2014), Robert Bolton

UIC John Marshall Journal of Information Technology & Privacy Law

In the modern era, the connection between technology and one’s personal life has increased the number of moments recorded for posterity. While in many circumstances this is an ideal opportunity for fond recollection, it has the downside of displaying for others our less flattering moments. Because the Internet has such a wide scope, once something has entered its domain, it is virtually impossible to permanently remove. With a public increasingly perceiving this winnowing of privacy as a negative tendency, legislators both at home and abroad have made proposals that attempt to place restrictions on what content social media is allowed …


The Emerging Reality Of Social Media: Erosion Of Individual Privacy Through Cyber-Vetting And Law’S Inability To Catch Up, 12 J. Marshall Rev. Intell. Prop. L. 551 (2013), Saby Ghoshray Jan 2013

The Emerging Reality Of Social Media: Erosion Of Individual Privacy Through Cyber-Vetting And Law’S Inability To Catch Up, 12 J. Marshall Rev. Intell. Prop. L. 551 (2013), Saby Ghoshray

UIC Review of Intellectual Property Law

The rise of social media means that data about a large number of people is available in public and quasi-public digital locations. Employers, keen on taking advantage of this additional data to decrease the risk associated with an offer of employment, are engaging in “cyber-vetting”—non-consenting social media searches conducted by third parties or the employers themselves. To the extent that current law applies to this practice, the regulation it provides is weak and attacks only part of the problem. Left unchecked, cyber-vetting has the potential to fundamentally alter the scope of prospective employees’ rights. This article surveys the legal and …


As Seen On Tv: Your Compromising Cameo On National Reality Programming, 12 J. Marshall Rev. Intell. Prop. L. 403 (2013), Ryan Westerman Jan 2013

As Seen On Tv: Your Compromising Cameo On National Reality Programming, 12 J. Marshall Rev. Intell. Prop. L. 403 (2013), Ryan Westerman

UIC Review of Intellectual Property Law

The pop-culture phenomenon of reality television has taken over national programming. With the click of a remote, viewers can gain an inside look into the daily lives of celebrity families, toddler pageant queens, wealthy housewives, even pregnant teenagers. Reality television also profiles different professions: repo-men, pawn shop owners, and real estate agents all have television time slots. While it seems everyone is desperate for their fifteen minutes of fame, there are still those who wish to avoid the public spotlight. However, a recent Illinois ruling may make avoiding prime-time attention impossible for certain individuals caught on tape in compromising, and …


Session Iv: Technology And The Future Of Privacy, 29 J. Marshall J. Computer & Info. L. 379 (2012), David E. Sorkin, Ann Bartow, Robert S. Gurwin, Doris E. Long Jan 2012

Session Iv: Technology And The Future Of Privacy, 29 J. Marshall J. Computer & Info. L. 379 (2012), David E. Sorkin, Ann Bartow, Robert S. Gurwin, Doris E. Long

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Ownership And Exploitation Of Personal Identity In The New Media Age, 12 J. Marshall Rev. Intell. Prop. L. 1 (2012), Thomas Hemnes Jan 2012

The Ownership And Exploitation Of Personal Identity In The New Media Age, 12 J. Marshall Rev. Intell. Prop. L. 1 (2012), Thomas Hemnes

UIC Review of Intellectual Property Law

Personally Identifiable Information (“PII”) has never been more valuable. In today’s networked world, seemingly trivial facts can be collected, molded into a marketable economic profile, and transferred in the blink of an eye. To be sure, the commodification of PII allows for provision of dramatically more efficient and effective services. Yet the potential for privacy abuses is substantial. What interest does one have in the constellation of facts that defines one’s identity? Is it something one can own, like their right of publicity? Or are others free to use what they learn about a person? This article surveys current privacy …


Bugs For Sale: Legal And Ethical Proprieties Of The Market In Software Vulnerabilities, 28 J. Marshall J. Computer & Info. L. 451 (2011), Taiwo A. Oriola Jan 2011

Bugs For Sale: Legal And Ethical Proprieties Of The Market In Software Vulnerabilities, 28 J. Marshall J. Computer & Info. L. 451 (2011), Taiwo A. Oriola

UIC John Marshall Journal of Information Technology & Privacy Law

The pertinent questions therefore are: first, could software vulnerabilities be obviated simply by ameliorating factors responsible for market failure as canvassed by the literature on the economics of software security, drawing on the strength of the theory of information asymmetry, or are vulnerabilities inevitable irrespective of market dynamics and solutions? Second, to what extent is vulnerabilities research or the surreptitious exploitation of software vulnerabilities by hackers tantamount to trespass, and what are the legal implications, if any? Third, to what extent is the peddling of software vulnerabilities valid or enforceable in law? Fourth, what are the implications of software vulnerabilities …


The Amended Eu Law On Eprivacy And Electronic Communications After Its 2011 Implentation; New Rules On Data Protection, Spam, Data Breaches And Protection Of Intellectual Property Rights, 29 J. Marshall J. Computer & Info. L. 29 (2011), Vagelis Papakonstantinou, Paul De Hert Jan 2011

The Amended Eu Law On Eprivacy And Electronic Communications After Its 2011 Implentation; New Rules On Data Protection, Spam, Data Breaches And Protection Of Intellectual Property Rights, 29 J. Marshall J. Computer & Info. L. 29 (2011), Vagelis Papakonstantinou, Paul De Hert

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Revisiting Reader Privacy In The Age Of The E-Book, 45 J. Marshall L. Rev. 175 (2011), Bradley Schaufenbuel Jan 2011

Revisiting Reader Privacy In The Age Of The E-Book, 45 J. Marshall L. Rev. 175 (2011), Bradley Schaufenbuel

UIC Law Review

No abstract provided.


Increasing Access To Startup Financing Through Intellectual Property Securitization, 27 J. Marshall J. Computer & Info. L. 613 (2010), Kyle Tondo-Kramer Jan 2010

Increasing Access To Startup Financing Through Intellectual Property Securitization, 27 J. Marshall J. Computer & Info. L. 613 (2010), Kyle Tondo-Kramer

UIC John Marshall Journal of Information Technology & Privacy Law

This paper will discuss how a private company running a single, nationwide database for filing financing agreements can ease the burden on creditors and pave the way for more creditors to enter this market. Part two offers a brief overview of how intellectual property securitization works and some of the impediments to using this type of securitization. Part three proposes a possible solution to the problem creditors face regarding the filing of a financing statement when attempting to securitize intellectual property, and provides an in depth analysis as to why the suggestion that a private company runs a single, nationwide …


The Cathedral And The Bizarre: An Examination Of The "Viral" Aspects Of The Gpl, 27 J. Marshall J. Computer & Info. L. 349 (2010), Michael F. Morgan Jan 2010

The Cathedral And The Bizarre: An Examination Of The "Viral" Aspects Of The Gpl, 27 J. Marshall J. Computer & Info. L. 349 (2010), Michael F. Morgan

UIC John Marshall Journal of Information Technology & Privacy Law

While there is a growing body of literature dealing with the General Public License (“GPL”), the potential viral effects of the GPL do not appear to have been analyzed in a detailed technical manner. This paper will attempt to demonstrate that a proper legal analysis of the viral effects of the GPL is dependent on a detailed technical understanding of the specific mechanisms used for each type of program-to-program interaction. Once these technical mechanisms are properly understood it will then be possible to identify the applicable copyright law needed to assess the viral effects of the GPL.


300 Years Of Copyright Law? A Not So Modest Proposal For Reform, 28 J. Marshall J. Computer & Info. L. 1 (2010), James Gh Griffin Jan 2010

300 Years Of Copyright Law? A Not So Modest Proposal For Reform, 28 J. Marshall J. Computer & Info. L. 1 (2010), James Gh Griffin

UIC John Marshall Journal of Information Technology & Privacy Law

2010 sees the three hundredth anniversary of the U.K.'s Statute of Anne 1710. This paper suggests that with the increased ability of content recipients to re-use works, there is a need to readdress the concerns of stakeholders, namely authors, publishers and content recipients. The paper sets out in detail how this should be achieved. To do so, it utilises the notion of creativity as the benchmark by which to balance the interests of stakeholders. This has been used in early eighteenth century case law in the U.K., and there are also other historical and theoretical justifications. The paper then proceeds …


Antitrust Law - A Stranger In The Wikinomics World? Regulating Anti-Competitive Use Of The Drm/Dmca Regime, 27 J. Marshall J. Computer & Info. L. 1 (2009), Rachel Aridor-Hershkovitz Jan 2009

Antitrust Law - A Stranger In The Wikinomics World? Regulating Anti-Competitive Use Of The Drm/Dmca Regime, 27 J. Marshall J. Computer & Info. L. 1 (2009), Rachel Aridor-Hershkovitz

UIC John Marshall Journal of Information Technology & Privacy Law

Unlike traditional markets, Information Technology (“IT”) markets are characterized by special and unique features that shall be discussed in this paper. Competition in IT markets is dynamic; nonmarket based information production models (‘peer production’) play a significant role in IT markets; and IT market are usually data market rather than product market. The combination of the legal rule prohibiting circumvention of technological measure under the DMCA and the use of DRMs, created a new regime, the DRM/DMCA regime, which bestows the entertainment industry with a new and strong right to control the access to and use of the copyrighted work. …


Application Service Providing, Copyright, And Licensing, 25 J. Marshall J. Computer & Info. L. 79 (2007), Michael P. Widmer Jan 2007

Application Service Providing, Copyright, And Licensing, 25 J. Marshall J. Computer & Info. L. 79 (2007), Michael P. Widmer

UIC John Marshall Journal of Information Technology & Privacy Law

Application Service Providing ("ASP"), where a vendor hosts a software application on her server and grants customers access to the application over a network -- without the software application itself being installed on the user’s computer -- is used by many, e.g. in the form of Web based e-mail services, and grows ever more important. This article argues that although ASP mainly raises questions (i) that come up in the context of traditional use of computer programs; or (ii) that have been addressed in the context of online use of works other than software, ASP has significantly different copyright implications …


Slingbox: Copyright, Fair Use, And Access To Television Programming Anywhere In The World, 25 J. Marshall J. Computer & Info. L. 187 (2007), Shekar Sathyanarayana Jan 2007

Slingbox: Copyright, Fair Use, And Access To Television Programming Anywhere In The World, 25 J. Marshall J. Computer & Info. L. 187 (2007), Shekar Sathyanarayana

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Protection Of Maps And Spatial Databases In Europe And The United States By Copyright And The Sui Generis Right, 24 J. Marshall J. Computer & Info. L. 195 (2006), Katleen Janssen, Jos Dumortier Jan 2006

The Protection Of Maps And Spatial Databases In Europe And The United States By Copyright And The Sui Generis Right, 24 J. Marshall J. Computer & Info. L. 195 (2006), Katleen Janssen, Jos Dumortier

UIC John Marshall Journal of Information Technology & Privacy Law

Spatial data and applications play an ever-increasing part in our economy and in our society in general, but the protection of spatial databases by intellectual property rights seems to be a challenge because the Internet and information technology have caused a considerable increase in the copying of data, maps, route descriptions, hiking trails, etc. The illegal copying of spatial data, however, has caused the data producers to turn to several means of protection, such as intellectual property legislation, unfair competition, confidentiality and privacy. This paper begins by determining what is meant by spatial data. Thereafter, the paper reflects on the …


The Copyright Misuse Doctrine On Computer Software: A Redundant Doctrine Of U.S. Copyright Law Or A Necessary Addition To E.U. Copyright Law?, 24 J. Marshall J. Computer & Info. L. 571 (2006), Haris Apostolopoulos Jan 2006

The Copyright Misuse Doctrine On Computer Software: A Redundant Doctrine Of U.S. Copyright Law Or A Necessary Addition To E.U. Copyright Law?, 24 J. Marshall J. Computer & Info. L. 571 (2006), Haris Apostolopoulos

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Intellectual Property Rights At The Crossroad Between Monopolization And Abuse Of Dominant Position: American And European Approaches Compared, 24 J. Marshall J. Computer & Info. L. 455 (2006), Emanuela Arezzo Jan 2006

Intellectual Property Rights At The Crossroad Between Monopolization And Abuse Of Dominant Position: American And European Approaches Compared, 24 J. Marshall J. Computer & Info. L. 455 (2006), Emanuela Arezzo

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Contribution To The Understanding Of The Public Domain, 24 J. Marshall J. Computer & Info. L. 411 (2006), Vincenzo Vinciguerra Jan 2006

Contribution To The Understanding Of The Public Domain, 24 J. Marshall J. Computer & Info. L. 411 (2006), Vincenzo Vinciguerra

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Yours For Keeps: Mgm V. Grokster, 23 J. Marshall J. Computer & Info. L. 209 (2005), Max Stul Oppenheimer Jan 2005

Yours For Keeps: Mgm V. Grokster, 23 J. Marshall J. Computer & Info. L. 209 (2005), Max Stul Oppenheimer

UIC John Marshall Journal of Information Technology & Privacy Law

Millions of people download billions of music files over the Internet, using peer-to-peer ("P2P") services such as Grokster, StreamCast, Morpheus, and Kazaa. This practice has been challenged as violative of copyright and, it has been argued, the magnitude of copyright violations facilitated by P2P services justifies banning the services entirely. This argument has been based on the assumption that most transfers over P2P services violate copyright. The starting point for this discussion is the recent decision of the United States Supreme Court to grant the certiorari petition of Metro-Goldwyn-Mayer Studios et al. to review the Ninth Circuit decision in MGM …


"Electronic Voting Rights And The Dmca: Another Blast From The Digital Pirates Or A Final Wake Up Call For Reform?", 23 J. Marshall J. Computer & Info. L. 533 (2005), Doris E. Long Jan 2005

"Electronic Voting Rights And The Dmca: Another Blast From The Digital Pirates Or A Final Wake Up Call For Reform?", 23 J. Marshall J. Computer & Info. L. 533 (2005), Doris E. Long

UIC John Marshall Journal of Information Technology & Privacy Law

Electronic voting machines are the new version of pirated music. Like digital music, electronic voting was designed to make voting rights easily available to the masses. However, technology has once again demonstrated how easy it is to circumvent a good idea through better “hacker” technology. In reality, any electronic voting software can be hacked no matter how good the encryption technology protecting it. The issue is not creating a fool-proof anti-circumvention system – an impossible task – but creating the necessary digital safeguards to make circumvention difficult, to make security breaches more readily detectable, and to provide back-up systems to …


American Courts Are Drowning In The "Gene Pool": Excavating The Slippery Slope Mechanisms Behind Judicial Endorsement Of Dna Databases, 39 J. Marshall L. Rev. 115 (2005), Meghan Riley Jan 2005

American Courts Are Drowning In The "Gene Pool": Excavating The Slippery Slope Mechanisms Behind Judicial Endorsement Of Dna Databases, 39 J. Marshall L. Rev. 115 (2005), Meghan Riley

UIC Law Review

No abstract provided.


Copyright & Privacy - Through The Copyright Lens, 4 J. Marshall Rev. Intell. Prop. L. 212 (2005), Sarah B. Deutsch, Roderick G. Dorman, Michael A. Geist, Hugh C. Hansen, Howard P. Knopf, Ralph Oman, Matthew J. Oppenheim, John G. Palfrey Jan 2005

Copyright & Privacy - Through The Copyright Lens, 4 J. Marshall Rev. Intell. Prop. L. 212 (2005), Sarah B. Deutsch, Roderick G. Dorman, Michael A. Geist, Hugh C. Hansen, Howard P. Knopf, Ralph Oman, Matthew J. Oppenheim, John G. Palfrey

UIC Review of Intellectual Property Law

This panel examines the recent litigation by the recording industry against peer-to-peer (“P2P”) users in the U.S. and Canada. How are users’ identities being obtained? Is the process working well enough or too well? What are the technical, evidentiary, procedural, privacy and substantive copyright issues in play?


Copyright & Privacy - Through The Technology Lens, 4 J. Marshall Rev. Intell. Prop. L. 242 (2005), Michael A. Geist, Doris E. Long, Leslie Ann Reis, David E. Sorkin, Fred Von Lohmann Jan 2005

Copyright & Privacy - Through The Technology Lens, 4 J. Marshall Rev. Intell. Prop. L. 242 (2005), Michael A. Geist, Doris E. Long, Leslie Ann Reis, David E. Sorkin, Fred Von Lohmann

UIC Review of Intellectual Property Law

How is new technology impacting on the more general question of privacy in cyberspace? Is the original notion of an expectation of anonymity on the internet still viable? Can technology pierce through the expectation of privacy even without judicial interference? Do individuals need protection from such technology? Is there technology available to protect the individual? Should these technological tools be regulated? Should the law differentiate between various types of alleged “illegal” behavior; e.g., IP infringement, defamation, possession of pornography and terrorism? Are there international standards that can assist in regulating the intersection between technology and privacy in cyberspace?


Copyright & Privacy - Through The Legislative Lens, 4 J. Marshall Rev. Intell. Prop. L. 266 (2005), Marybeth Peters Jan 2005

Copyright & Privacy - Through The Legislative Lens, 4 J. Marshall Rev. Intell. Prop. L. 266 (2005), Marybeth Peters

UIC Review of Intellectual Property Law

The Honorable Marybeth Peters, who has served since 1994 as the Register of Copyrights for the United States Copyright Office of the Library of Congress, presented a post-election report on the legislative agenda in Washington, D.C. regarding rejected, pending and future amendments to the copyright law of the United States. Register Peters also discussed the current policy role of the United States Copyright Office and several court actions that contest the constitutionality of various provisions of the copyright law.


Copyright & Privacy - Through The Privacy Lens, 4 J. Marshall Rev. Intell. Prop. L. 273 (2005), Julie E. Cohen, David E. Sorkin, Peter P. Swire Jan 2005

Copyright & Privacy - Through The Privacy Lens, 4 J. Marshall Rev. Intell. Prop. L. 273 (2005), Julie E. Cohen, David E. Sorkin, Peter P. Swire

UIC Review of Intellectual Property Law

What legal tools do privacy advocates have available to defend an individual’s right to privacy? How far does this right go? How should these rights be defended—or if necessary—curtailed? What is the role of Government, of the practicing bar and of academics?


Copyright & Privacy - Through The Wide-Angle Lens, 4 J. Marshall Rev. Intell. Prop. L. 285 (2005), William W. Fisher Iii, Howard P. Knopf, Fred Von Lohmann, William B.T. Mock, Marybeth Peters, R. Anthony Reese Jan 2005

Copyright & Privacy - Through The Wide-Angle Lens, 4 J. Marshall Rev. Intell. Prop. L. 285 (2005), William W. Fisher Iii, Howard P. Knopf, Fred Von Lohmann, William B.T. Mock, Marybeth Peters, R. Anthony Reese

UIC Review of Intellectual Property Law

Some have proposed “alternative compensation schemes” as a means of compensating copyright owners and creators for P2P activity while avoiding litigation. Some have proposed a streamlined dispute resolution system that would allow for enforcement in a manner analogous to the UDRP model. Others question whether private copying should necessarily be viewed as illegal and whether any alternative compensation scheme is viable. With all of these proposals, the question remains as to whether “alternative compensation” is really alternative.


Copyright & Privacy - Through The Political Lens, 4 J. Marshall Rev. Intell. Prop. L. 306 (2005), William W. Fisher Iii, Hugh C. Hansen, Christopher Jay Hoofnagle, Howard P. Knopf, Declan Mccullagh, Ralph Oman, Matthew J. Oppenheim Jan 2005

Copyright & Privacy - Through The Political Lens, 4 J. Marshall Rev. Intell. Prop. L. 306 (2005), William W. Fisher Iii, Hugh C. Hansen, Christopher Jay Hoofnagle, Howard P. Knopf, Declan Mccullagh, Ralph Oman, Matthew J. Oppenheim

UIC Review of Intellectual Property Law

Veteran beltway players discuss the politics of P2P technology and Privacy. How far can or should Congress go? Can the United States export its values or its laws in this area? Are content owners in a losing Luddite struggle? What is the role of litigators, lobbyists and legislators in this war?