Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Selected Works (6)
- Maurer School of Law: Indiana University (5)
- Schulich School of Law, Dalhousie University (5)
- University of Pennsylvania Carey Law School (5)
- Vanderbilt University Law School (4)
-
- Fordham Law School (3)
- The Catholic University of America, Columbus School of Law (3)
- University of Michigan Law School (3)
- University of New Hampshire (3)
- Georgetown University Law Center (2)
- New York Law School (2)
- Southern Methodist University (2)
- American University Washington College of Law (1)
- Butler University (1)
- Chicago-Kent College of Law (1)
- DePaul University (1)
- Florida A&M University College of Law (1)
- Loyola Marymount University and Loyola Law School (1)
- Loyola University Chicago, School of Law (1)
- Mitchell Hamline School of Law (1)
- Northwestern Pritzker School of Law (1)
- Roger Williams University (1)
- Seattle University School of Law (1)
- SelectedWorks (1)
- Texas A&M University School of Law (1)
- University at Buffalo School of Law (1)
- University of Colorado Law School (1)
- University of Florida Levin College of Law (1)
- University of Georgia School of Law (1)
- University of Kentucky (1)
- Publication Year
- Publication
-
- All Faculty Scholarship (5)
- Canadian Journal of Law and Technology (5)
- Catholic University Journal of Law and Technology (3)
- Fordham Intellectual Property, Media and Entertainment Law Journal (3)
- Vanderbilt Journal of Entertainment & Technology Law (3)
-
- Articles by Maurer Faculty (2)
- Georgetown Law Faculty Publications and Other Works (2)
- IP Theory (2)
- Journal Articles (2)
- Law Faculty Scholarship (2)
- Michigan Telecommunications & Technology Law Review (2)
- Articles & Chapters (1)
- Articles in Law Reviews & Other Academic Journals (1)
- Chicago-Kent Law Review (1)
- Continuing Legal Education Materials (1)
- Cybaris® (1)
- Daniel Harris Brean (1)
- Daxton "Chip" Stewart (1)
- DePaul Journal of Art, Technology & Intellectual Property Law (1)
- Faculty Publications & Other Works (1)
- Faculty Scholarship (1)
- Fellow, Adjunct, Lecturer, and Research Scholar Works (1)
- Georgia Journal of International & Comparative Law (1)
- Graduate Scholarship and Professional Work (1)
- Indiana Law Journal (1)
- Jeffrey L Harrison (1)
- Jonathan I. Ezor (1)
- Journal Publications (1)
- Juan Carlos Riofrío Martínez-Villalba (1)
- Law School Blogs (1)
- Publication Type
- File Type
Articles 31 - 60 of 62
Full-Text Articles in Privacy Law
Balancing A Right To Be Forgotten With A Right To Freedom Of Expression In The Wake Of Google Spain V. Aepd, Shaniqua Singleton
Balancing A Right To Be Forgotten With A Right To Freedom Of Expression In The Wake Of Google Spain V. Aepd, Shaniqua Singleton
Georgia Journal of International & Comparative Law
No abstract provided.
Trending @ Rwu Law: Linn F. Freedman's Post: The Goal Of Gender Equality In Cybersecurity 08/23/2016, Linn F. Freedman
Trending @ Rwu Law: Linn F. Freedman's Post: The Goal Of Gender Equality In Cybersecurity 08/23/2016, Linn F. Freedman
Law School Blogs
No abstract provided.
Review Essay: Sara M. Smyth, Cybercrime In Canadian Criminal Law, 2nd Edition (Toronton: Carswell, 2015), Christopher D. Ram
Review Essay: Sara M. Smyth, Cybercrime In Canadian Criminal Law, 2nd Edition (Toronton: Carswell, 2015), Christopher D. Ram
Canadian Journal of Law and Technology
Dr. Smyth’s book is ambitious in its scope, seeking to trace the criminology and evolution of information technologies and cybercrime as the basis of current Canadian legislation and jurisprudence. It is intended as a concise student reference text or resource for those who are new to the subject area, studying in criminology and other areas, as opposed to law. A list of concepts and issues for discussion appears at the conclusion of each chapter and there is a glossary of technical (but not legal) terms at the end of the book. It takes a neutral and professorial approach, seeking to …
Where Copyright Meets Privacy In The Big Data Era: Access To And Control Over User Data In Agriculture And The Role Of Copyright, Tesh W. Dagne
Where Copyright Meets Privacy In The Big Data Era: Access To And Control Over User Data In Agriculture And The Role Of Copyright, Tesh W. Dagne
Vanderbilt Journal of Entertainment & Technology Law
The application of big data in different sectors of the economy and its transformative value has recently attracted considerable attention. However, this transformation, driven by the application of advanced technologies that utilize big data—such as the Internet of Things (IoT), artificial intelligence (AI), and software systems—raises concerns about access to and control over the user data that results from the uptake in using digital technologies. This Article examines the role different legal regimes have in framing access to and control over various forms of user data from the perspective of technology users in the agriculture sector. This Article then goes …
Copyrights, Privacy, And The Blockchain, Tom W. Bell
Copyrights, Privacy, And The Blockchain, Tom W. Bell
Tom W. Bell
Private Technology (Foreword), Daniel Harris Brean
Private Technology (Foreword), Daniel Harris Brean
Daniel Harris Brean
Implications For The Future Of Global Data Security And Privacy: The Territorial Application Of The Stored Communications Act And The Microsoft Case, Russell Hsiao
Catholic University Journal of Law and Technology
No abstract provided.
El Derecho Al Secreto Y La Teoría Del Cono, Juan Carlos Riofrío Martínez-Villalba
El Derecho Al Secreto Y La Teoría Del Cono, Juan Carlos Riofrío Martínez-Villalba
Juan Carlos Riofrío Martínez-Villalba
El presente estudio contiene una teoría general del derecho de los secretos, que sirve para determinar el peso específico de cada secreto, a efectos de realizar una correcta ponderación de derechos. La teoría explica las relaciones que existen entre los diversos tipos de secreto, utilizando y desarrollando la teoría del cono de García Morente, que se muestra como una herramienta apropiada para dilucidar cuándo hay derecho al secreto, cuando no lo hay y en qué medida. La metodología utilizada es inductiva. El análisis se estructura de la siguiente manera: (i) se recapitula la teoría general del derecho de los secretos; …
Dear Yahoo: A Comment On In Re Yahoo Mail Litigation, Nareen Melkonian
Dear Yahoo: A Comment On In Re Yahoo Mail Litigation, Nareen Melkonian
Loyola of Los Angeles Law Review
No abstract provided.
Privacy, Copyright, And Letters, Jeffrey Harrison
Privacy, Copyright, And Letters, Jeffrey Harrison
Jeffrey L Harrison
The focus of this Essay is the privacy of letters – the written manifestations of thoughts, intents, and the recollections of facts directed to a person or a narrowly defined audience. The importance of this privacy is captured in the novel Atonement by Ian McEwan and in the film based on the novel. The fulcrum from which the action springs is a letter that is read by someone to whom it was not addressed. The result is literally life-changing, even disastrous for a number of characters. One person dies, two people seemingly meant for each other are torn apart and …
Do Androids Dream Of Electric Free Speech? Visions Of The Future Of Copyright, Privacy And The First Amendment In Science Fiction, Daxton R. Stewart
Do Androids Dream Of Electric Free Speech? Visions Of The Future Of Copyright, Privacy And The First Amendment In Science Fiction, Daxton R. Stewart
Daxton "Chip" Stewart
Science fiction authors have long projected the future of technology, including communication devices and the way in which future societies may use them. In this essay, these visions of future technology, and their implications on the future of media law and policy, are explored in three areas in particular – copyright, privacy, and the First Amendment. Themes examined include moving toward massively open copyright systems, problems of perpetual surveillance by the state, addressing rights of obscurity in public places threatened by wearable and implantable computing devices, and considering free speech rights of autonomous machines created by humans. In conclusion, the …
Big Business, Big Government And Big Legal Questions, Michael Mattioli, Todd Vare
Big Business, Big Government And Big Legal Questions, Michael Mattioli, Todd Vare
Articles by Maurer Faculty
No abstract provided.
Intellectual Property’S Lessons For Information Privacy, Mark Bartholomew
Intellectual Property’S Lessons For Information Privacy, Mark Bartholomew
Journal Articles
There is an inherent tension between an individual’s desire to safeguard her personal information and the expressive rights of businesses seeking to communicate that information to others. This tension has multiplied as consumers generate and businesses collect more and more personal data online, forcing efforts to strike an appropriate balance between privacy and commercial speech. No consensus on this balance has been reached. Some privacy scholars bemoan what they see as a slanted playing field in favor of those wishing to profit from the private details of other people’s lives. Others contend that the right in free expression must always …
Flawed Transparency: Shared Data Collection And Disclosure Challenges For Google Glass And Similar Technologies, Jonathan I. Ezor
Flawed Transparency: Shared Data Collection And Disclosure Challenges For Google Glass And Similar Technologies, Jonathan I. Ezor
Jonathan I. Ezor
Current privacy law and best practices assume that the party collecting the data is able to describe and disclose its practices to those from and about whom the data are collected. With emerging technologies such as Google Glass, the information being collected by the wearer may be automatically shared to one or more third parties whose use may be substantially different from that of the wearer. Often, the wearer may not even know what information is being uploaded, and how it may be used. This paper will analyze the current state of U.S. law and compliance regarding personal information collection …
Geographically Restricted Streaming Content And Evasion Of Geolocation: The Applicability Of The Copyright Anticircumvention Rules, Jerusha Burnett
Geographically Restricted Streaming Content And Evasion Of Geolocation: The Applicability Of The Copyright Anticircumvention Rules, Jerusha Burnett
Michigan Telecommunications & Technology Law Review
A number of methods currently exist or are being developed to determine where Internet users are located geographically when they access a particular webpage. Yet regardless of the precautions taken by website operators to limit the locations from which they allow access, it is likely that users will find ways to gain access to restricted content. Should the evasion of geolocation constitute circumvention of access controls so that § 1201 of the Digital Millennium Copyright Act ("DMCA") applies? Because location data can properly be considered personally identifiable information ("PII"), this Note argues that § 1201 should not apply absent a …
Intellectual Property And Public Health – A White Paper, Ryan G. Vacca, James Ming Chen, Jay Dratler Jr., Thomas Folsom, Timothy S. Hall, Yaniv Heled, Frank A. Pasquale Iii, Elizabeth A. Reilly, Jeffrey Samuels, Katherine J. Strandburg, Kara W. Swanson, Andrew W. Torrance, Katharine A. Van Tassel
Intellectual Property And Public Health – A White Paper, Ryan G. Vacca, James Ming Chen, Jay Dratler Jr., Thomas Folsom, Timothy S. Hall, Yaniv Heled, Frank A. Pasquale Iii, Elizabeth A. Reilly, Jeffrey Samuels, Katherine J. Strandburg, Kara W. Swanson, Andrew W. Torrance, Katharine A. Van Tassel
Law Faculty Scholarship
On October 26, 2012, the University of Akron School of Law’s Center for Intellectual Property and Technology hosted its Sixth Annual IP Scholars Forum. In attendance were thirteen legal scholars with expertise and an interest in IP and public health who met to discuss problems and potential solutions at the intersection of these fields. This report summarizes this discussion by describing the problems raised, areas of agreement and disagreement between the participants, suggestions and solutions made by participants and the subsequent evaluations of these suggestions and solutions. Led by the moderator, participants at the Forum focused generally on three broad …
The Inalienable Right Of Publicity, Jennifer E. Rothman
The Inalienable Right Of Publicity, Jennifer E. Rothman
All Faculty Scholarship
This article challenges the conventional wisdom that the right of publicity is universally and uncontroversially alienable. Courts and scholars have routinely described the right as a freely transferable property right, akin to patents or copyrights. Despite such broad claims of unfettered alienability, courts have limited the transferability of publicity rights in a variety of instances. No one has developed a robust account of why such limits should exist or what their contours should be. This article remedies this omission and concludes that the right of publicity must have significantly limited alienability to protect the rights of individuals to control the …
Privacy, Copyright, And Letters, Jeffrey L. Harrison
Privacy, Copyright, And Letters, Jeffrey L. Harrison
UF Law Faculty Publications
The focus of this Essay is the privacy of letters – the written manifestations of thoughts, intents, and the recollections of facts directed to a person or a narrowly defined audience. The importance of this privacy is captured in the novel Atonement by Ian McEwan and in the film based on the novel. The fulcrum from which the action springs is a letter that is read by someone to whom it was not addressed. The result is literally life-changing, even disastrous for a number of characters. One person dies, two people seemingly meant for each other are torn apart and …
Property As Control: The Case Of Information, Jane B. Baron
Property As Control: The Case Of Information, Jane B. Baron
Michigan Telecommunications & Technology Law Review
If heath policy makers' wishes come true, by the end of the current decade the paper charts in which most of our medical information is currently recorded will be replaced by networked electronic health records ("EHRs").[...] Like all computerized records, networked EHRs are difficult to secure, and the information in EHRs is both particularly sensitive and particularly valuable for commercial purposes. Sadly, the existing federal statute meant to address this problem, the Health Insurance Portability and Accountability Act of 1996 ("HIPAA"), is probably inadequate to the task.[...] Health law, privacy, and intellectual property scholars have all suggested that the river …
Liberating Copyright: Thinking Beyond Free Speech, Jennifer E. Rothman
Liberating Copyright: Thinking Beyond Free Speech, Jennifer E. Rothman
All Faculty Scholarship
Scholars have often turned to the First Amendment to limit the scope of ever-expanding copyright law. This approach has mostly failed to convince courts that independent review is merited and has offered little to individuals engaged in personal rather than political or cultural expression. In this Article, I consider the value of an alternative paradigm using the lens of substantive due process and liberty to evaluate users’ rights. A liberty-based approach uses this other developed body of constitutional law to demarcate justifiable personal, identity-based uses of copyrighted works. Uses that are essential for mental integrity, intimacy promotion, communication, or religious …
Nieves V. Home Box Office, Inc., Andrew Nieh
Coding Privacy, Lilian Edwards
Coding Privacy, Lilian Edwards
Chicago-Kent Law Review
Lawrence Lessig famously and usefully argues that cyberspace is regulated not just by law but also by norms, markets and architecture or "code." His insightful work might also lead the unwary to conclude, however, that code is inherently anti-privacy, and thus that an increasingly digital world must therefore also be increasingly devoid of privacy. This paper argues briefly that since technology is a neutral tool, code can be designed as much to fight for privacy as against it, and that what matters now is to look at what incentivizes the creation of pro- rather than anti-privacy code in the mainstream …
Dredging Up The Past: Lifelogging, Memory And Surveillance, Anita L. Allen
Dredging Up The Past: Lifelogging, Memory And Surveillance, Anita L. Allen
All Faculty Scholarship
The term “lifelog” refers to a comprehensive archive of an individual's quotidian existence, created with the help of pervasive computing technologies. Lifelog technologies would record and store everyday conversations, actions, and experiences of their users, enabling future replay and aiding remembrance. Products to assist lifelogging are already on the market; but the technology that will enable people fully and continuously to document their entire lives is still in the research and development phase. For generals, edgy artists and sentimental grandmothers alike, lifelogging could someday replace or complement, existing memory preservation practices. Like a traditional diary, journal or day-book, the lifelog …
Privacy, Crime And Terror: Legal Rights And Security In A Time Of Peril By Stanley A. Cohen (Markham: Lexisnexis Butterworths, 2005), Teresa Scassa
Privacy, Crime And Terror: Legal Rights And Security In A Time Of Peril By Stanley A. Cohen (Markham: Lexisnexis Butterworths, 2005), Teresa Scassa
Canadian Journal of Law and Technology
It is now trite to say that the events of September 11, 2001 have had a profound impact on our national security, in terms of its institutional and normative dimensions, and also in terms of a more general public anxiety. The hastily enacted Anti-terrorism Act of 2001 brought about significant changes to a wide range of statutes including, among others, the Criminal Code, the Official Secrets Act, the Canada Evidence Act, and the Proceeds of Crime (Money Laundering) Act. An early conference and resultant book on the Anti-terrorism Act raised serious concerns about the potential impact of the changes on …
Structural Rights In Privacy, Harry Surden
Structural Rights In Privacy, Harry Surden
Publications
This Essay challenges the view that privacy interests are protected primarily by law. Based upon the understanding that society relies upon nonlegal devices such as markets, norms, and structure to regulate human behavior, this Essay calls attention to a class of regulatory devices known as latent structural constraints and provides a positive account of their role in regulating privacy. Structural constraints are physical or technological barriers which regulate conduct; they can be either explicit or latent. An example of an explicit structural constraint is a fence which is designed to prevent entry onto real property, thereby effectively enforcing property rights. …
Personal Medical Information: Privacy Or Personal Data Protection?, Wilhelm Peekhaus
Personal Medical Information: Privacy Or Personal Data Protection?, Wilhelm Peekhaus
Canadian Journal of Law and Technology
Some of the existing literature concerning the privacy of health information seems to suggest that medical information has a particularly special nature; either through its oft-cited association with dignity or the need for its ‘‘unobstructed’’ use by health care practitioners for a variety of reasons. It is against such a backdrop that this paper will review and compare a number of legislative mechanisms that have been designed to meet the challenge of safeguarding the privacy of personal information without completely hindering the continued flow of information required by economic and health care systems. An attempt will be made to situate …
Equal Protection In The World Of Art And Obscenity: The Art Photographer's Latent Struggle With Obscenity Standards In Contemporary America, Elaine Wang
Vanderbilt Journal of Entertainment & Technology Law
Part I of this article describes the initial hurdles that all visual art forms, including photography, face with respect to First Amendment protection given the power of visual imagery and the three-pronged test for obscenity set forth in Miller v. California. Of particular relevance is the "serious artistic value" prong of the Miller test and the problems inherent in determining who is to judge as well as how one might judge whether a work, particularly a photograph that may be construed to have a non-artistic function, possesses "serious artistic value."
Part II addresses the overall approach to photography in three …
4th Annual Computer & Technology Law Institute, Office Of Continuing Legal Education At The University Of Kentucky College Of Law
4th Annual Computer & Technology Law Institute, Office Of Continuing Legal Education At The University Of Kentucky College Of Law
Continuing Legal Education Materials
Materials from the 4th Annual Computer & Technology Law Institute held by UK/CLE in November 2002.
Social Issues Of Genome Innovation And Intellectual Property, Elaine Alma Draper
Social Issues Of Genome Innovation And Intellectual Property, Elaine Alma Draper
RISK: Health, Safety & Environment (1990-2002)
Dr. Draper's focus is the use of personal information derived from genome research. She identifies several potential problems, including access to and control of genetic information, employment discrimination and social stratification. She also recommends possible solutions.
The Single Publication Rule: One Action Not One Law, Debra R. Cohen
The Single Publication Rule: One Action Not One Law, Debra R. Cohen
Journal Articles
Recovery in one action under one state's law for violation of the right of publicity-the right to control the commercial use of one's identity-arising out of multistate publication2 seems to be the trend of the nineties. When Samsung ran a nationwide print advertisement for VCRs depicting a robot dressed to resemble her, Vanna White sued for violation of her right of publicity.3 Under California law she recovered $403,000. 4 When a SalsaRio Doritos radio commercial imitating Tom Waits's distinctive raspy and gravelly voice aired nationwide, he sued Frito Lay for violation of his right of publicity.5 Under California law he …