Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Privacy Law

Responding To Deficiencies In The Architecture Of Privacy: Co-Regulation As The Path Forward For Data Protection On Social Networking Sites, Laurent Cre ́Peau Jan 2022

Responding To Deficiencies In The Architecture Of Privacy: Co-Regulation As The Path Forward For Data Protection On Social Networking Sites, Laurent Cre ́Peau

Canadian Journal of Law and Technology

Social Networking Sites like Facebook, Twitter and the like are a ubiquitous part of contemporary culture. Yet, as exemplified on numerous occasions, most recently in the Cambridge Analytica scandal that shook Facebook in 2018, these sites pose major concerns for personal data protection. Whereas self-regulation has characterized the general regulatory mindset since the early days of the Internet, it is no longer viable given the threat social media poses to user privacy. This article notes the deficiencies of self-regulatory models of privacy and contends jurisdictions like Canada should ensure they have strong data protection regulations to adequately protect the public. …


Workplace Privacy In The Age Of Social Media, Tess Traylor-Notaro Jul 2018

Workplace Privacy In The Age Of Social Media, Tess Traylor-Notaro

Global Business Law Review

This note addresses the lack of adequate protections in Ohio for social media privacy laws in the workplace and compares proposed legislation in Ohio to legislation that has passed in other states. It examines the provision of the SCA including the definition of "user" and whether social media sites fall under its umbrella. It also looks at the safeguards and limitations of the SCA and how it is used to protect a private employee’s social media account. It analyzes the state statutory laws in Arkansas, Illinois, and California passed specifically to prevent employers from requesting passwords to personal Internet accounts. …


Warrant Canaries Beyond The First Amendment: A Comment, Jonathon Penney Jan 2014

Warrant Canaries Beyond The First Amendment: A Comment, Jonathon Penney

Articles, Book Chapters, & Popular Press

Warrant canaries have emerged as an intriguing tool for Internet companies to provide some measure of transparency for users while also complying with national security laws. Though there is at least a reasonable argument for the legality of warrant canaries in the U.S. based primarily on First Amendment "compelled speech" doctrine, the same cannot be said for the use of warrant canaries in other "Five Eyes” intelligence agency countries — United Kingdom, Canada, New Zealand, and Australia — where the legality of warrant canaries has yet to be examined in either cases or scholarship. This comment, which provides an overview …


Consumer Privacy And Radio Frequency Identification Technology, Teresa Scassa, Theodore Chiasson, Michael Deturbide, Anne Uteck Jan 2006

Consumer Privacy And Radio Frequency Identification Technology, Teresa Scassa, Theodore Chiasson, Michael Deturbide, Anne Uteck

Articles, Book Chapters, & Popular Press

Radio Frequency ID tags are poised to replace the UPC barcode as a mechanism for inventory control in the wholesale and retail contexts. Yet the tiny chips offer a range of potential uses that go beyond the bar code. In this paper the authors define RFID technology and its applications. They explore the privacy implications of this technology and consider recent attempts in the U.S. and European Union to grapple with the privacy issues raised by the deployment of RFIDs at the retail level. The authors then consider the extent to which Canada's Personal Information Protection and Electronic Documents Act …


Foreign Investment Restrictions As Industrial Policy: The Case Of Canadian Telecommunications, Robert Crandall, Hal Singer Jan 2004

Foreign Investment Restrictions As Industrial Policy: The Case Of Canadian Telecommunications, Robert Crandall, Hal Singer

Canadian Journal of Law and Technology

We assess the economic harms that would accrue if Canada were to adopt asymmetric rules of foreign ownership for incumbent carriers and entrants. We explain the current Canadian regulatory climate surrounding foreign investment in Canadian telecommunications. Competition in the telecommunications industry is generally robust, which suggests that rules aimed at favouring entrants are not necessary. Moreover, Canadian entrants are equally capable of attracting foreign capital as Canadian incumbents, which suggests that foreign investment rules aimed at favouring entrants are especially unwise.

Next, we review the U.S. attempt to stimulate competition in local telecommunications markets through an analogous form of asymmetrical …