Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

2009

Discipline
Institution
Keyword
Publication
Publication Type

Articles 31 - 60 of 65

Full-Text Articles in Privacy Law

Social Networking As A Communications Weapon To Harm Victims: Facebook, Myspace, And Twitter Demonstrate A Need To Amend Section 230 Of The Communications Decency Act, 26 J. Marshall J. Computer & Info. L. 415 (2009), Joshua N. Azriel Jan 2009

Social Networking As A Communications Weapon To Harm Victims: Facebook, Myspace, And Twitter Demonstrate A Need To Amend Section 230 Of The Communications Decency Act, 26 J. Marshall J. Computer & Info. L. 415 (2009), Joshua N. Azriel

UIC John Marshall Journal of Information Technology & Privacy Law

The article discusses how social networking sites can pose a danger to victims of online offensive content. Part II provides an overall analysis of the dangers the Internet, especially social networking, poses to victims. Part III reviews Section 230 of the CDA, including the “Good Samaritan” provisions for social networking websites such as Twitter and Facebook. Part IV analyzes three recent court cases that demonstrate how these social networking tools are used as weapons to harm victims. Part V concludes with a discussion of how the growing number of online incidents stem from social networking sites. It recommends that Congress …


Average Teenager Or Sex Offender? Solutions To The Legal Dilemma Caused By Sexting, 26 J. Marshall J. Computer & Info. L. 431 (2009), Shannon Shafron-Perez Jan 2009

Average Teenager Or Sex Offender? Solutions To The Legal Dilemma Caused By Sexting, 26 J. Marshall J. Computer & Info. L. 431 (2009), Shannon Shafron-Perez

UIC John Marshall Journal of Information Technology & Privacy Law

The Comment broadly considers the failure of the law to adapt to developments in technology and communication, untangles the different approaches taken by a sample of states, and considers which legal remedy is most appropriate. This discussion primarily focuses on the criminal aspects of: (1) minors who voluntarily create and disseminate nude text messages of themselves; and (2) minors who receive nude photographs of other minors. Part II traces the development of sexting. Part III describes the history and rationale behind prohibiting child pornography. In Part IV, the article examines the application of child pornography laws to sexting cases in …


The Black Box Canon Of Statutory Interpretation: Why The Courts Should Treat Technology Like A Black Box In Interpreting Computer Crime Statutes, 26 J. Marshall J. Computer & Info. L. 487 (2009), Peter V. Roman Jan 2009

The Black Box Canon Of Statutory Interpretation: Why The Courts Should Treat Technology Like A Black Box In Interpreting Computer Crime Statutes, 26 J. Marshall J. Computer & Info. L. 487 (2009), Peter V. Roman

UIC John Marshall Journal of Information Technology & Privacy Law

The author points out that when reading computer crime statutes, federal courts sometimes study the minutiae of technology at the expense of congressional intent, plain language, and fair warning to criminal defendants. The author asserts that by focusing on the actual, but transient and morally irrelevant, design of information systems, the courts are undermining criminal law in the digital world. The author explains how traditional tools of statutory interpretation have failed to stop this approach to the interpretation of computer crime statutes. To solve this dilemma, the author points out that courts need a new tool to help them apply …


Antitrust Law - A Stranger In The Wikinomics World? Regulating Anti-Competitive Use Of The Drm/Dmca Regime, 27 J. Marshall J. Computer & Info. L. 1 (2009), Rachel Aridor-Hershkovitz Jan 2009

Antitrust Law - A Stranger In The Wikinomics World? Regulating Anti-Competitive Use Of The Drm/Dmca Regime, 27 J. Marshall J. Computer & Info. L. 1 (2009), Rachel Aridor-Hershkovitz

UIC John Marshall Journal of Information Technology & Privacy Law

Unlike traditional markets, Information Technology (“IT”) markets are characterized by special and unique features that shall be discussed in this paper. Competition in IT markets is dynamic; nonmarket based information production models (‘peer production’) play a significant role in IT markets; and IT market are usually data market rather than product market. The combination of the legal rule prohibiting circumvention of technological measure under the DMCA and the use of DRMs, created a new regime, the DRM/DMCA regime, which bestows the entertainment industry with a new and strong right to control the access to and use of the copyrighted work. …


Virtual Venues: Improving Online Dispute Resolution As An Alternative To Cost Intensive Litigation, 27 J. Marshall J. Computer & Info. L. 81 (2009), Shekhar Kumar Jan 2009

Virtual Venues: Improving Online Dispute Resolution As An Alternative To Cost Intensive Litigation, 27 J. Marshall J. Computer & Info. L. 81 (2009), Shekhar Kumar

UIC John Marshall Journal of Information Technology & Privacy Law

This paper looks at the growing presence of online alternative dispute resolution in the commercial setting, with the eventual goal of making suggestions to improve current online systems. While out-of-court dispute resolutions such as arbitration and mediation have been a long-time alternative to lengthy litigation, the development of the internet and other advanced forms of communication has lead to an increased presence of, and increased possibilities for, online dispute resolution. The first section of this paper provides a succinct review of the history of online dispute resolution. The focus of the section is two-pronged. The first prong discusses how technological …


2009 John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 27 J. Marshall J. Computer & Info. L. 95 (2009), Sarah M. Knight, William S. Weltman, Andrew T. Call, Panagiota Kelali Jan 2009

2009 John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 27 J. Marshall J. Computer & Info. L. 95 (2009), Sarah M. Knight, William S. Weltman, Andrew T. Call, Panagiota Kelali

UIC John Marshall Journal of Information Technology & Privacy Law

Petitioner, Phillip Nevilson, appeals to the Marshall Supreme Court from a decision affirming the granting of summary judgment in favor of Respondent, Marshoogle, Inc., on his claims of intrusion upon seclusion, publication of private facts, and tortious interference with business expectancy claims. The issues in this case concern whether an individual can state a claim for invasion of privacy against an Internet search engine provider where liability is based on taking a photograph of an individual in his home and the publication of such photograph on a website. The final issue concerns whether the act of publication of the photograph …


2009 John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 27 J. Marshall J. Computer & Info. L. 131 (2009), Megan Peterson, Tyler Rench Jan 2009

2009 John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 27 J. Marshall J. Computer & Info. L. 131 (2009), Megan Peterson, Tyler Rench

UIC John Marshall Journal of Information Technology & Privacy Law

SUMMARY OF THE ARGUMENT: As encroaching technologies shrink the realm of privacy and expose intimate details of the home, courts must craft a solution that will provide a remedy to the injured. When Marshoogle’s prying cameras took photographs of Nevilson seated inside his home, they invaded his privacy by intruding into his private area of seclusion and this court should give Nevilson the opportunity to seek a remedy. Because Nevilson was inside his home when the images were captured, he had a reasonable expectation of privacy, which cannot be lost simply by leaving his curtains open. Marshoogle’s cameras were intentionally …


2009 John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 27 J. Marshall J. Computer & Info. L. 169 (2009), Michael Jones, Stuart Ladner, Sabrina Stone Jan 2009

2009 John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 27 J. Marshall J. Computer & Info. L. 169 (2009), Michael Jones, Stuart Ladner, Sabrina Stone

UIC John Marshall Journal of Information Technology & Privacy Law

SUMMARY OF THE ARGUMENT: Nevilson has not raised a genuine issue of material fact on his intrusion upon seclusion claim. First, Nevilson cannot show Marshoogle intentionally invaded Nevilson’s privacy. When Marshoogle captured the images for its Marshall Avenue Perspective feature, no one physically entered Nevilson’s property or used sensory enhancements or telephoto lenses to pry into his private space. Second, Marshoogle’s actions were not highly offensive to a reasonable person because the photographs were not captured in an effort to exploit or defame Nevilson, but rather were captured in an effort to produce a free and effective virtual map for …


Two Notions Of Privacy Online, Avner Levin, Patricia S. Abril Jan 2009

Two Notions Of Privacy Online, Avner Levin, Patricia S. Abril

Vanderbilt Journal of Entertainment & Technology Law

Users of social networking websites tend to disclose much personal information online yet seem to retain some form of an expectation of privacy. Is this expectation of privacy always unreasonable? How do users of online social networks define their expectations of privacy online?

These questions were the impetus behind an empirical study, the findings of which are presented in this Article. The project, simultaneously conducted in Canada, at Ryerson University, and in the United States, at the University of Miami, consisted of a survey regarding personal information protection and expectations of privacy on online social networks (OSNs). Approximately 2,500 young …


Conflict Of Law And Surreptitious Taping Of Telephone Conversations, Carol M. Bast Jan 2009

Conflict Of Law And Surreptitious Taping Of Telephone Conversations, Carol M. Bast

NYLS Law Review

No abstract provided.


Entry And Service Of Protective Orders In Virginia: Are You Really Protected, Susheela Varky Jan 2009

Entry And Service Of Protective Orders In Virginia: Are You Really Protected, Susheela Varky

Richmond Public Interest Law Review

According to the Virginia Department of State Police, there has been a legislative effort in 2008 and 2009 over the past two years to ensure that essential data from protective orders1 is entered into the Virginia Criminal Information Network ("VCIN") immediately upon the order's issuance. While data entry may seem like a dull topic, the following story highlights the dire significance of this seemingly mundane task.


The Facebook Frontier: Responding To The Changing Face Of Privacy On The Internet, Samantha L. Millier Jan 2009

The Facebook Frontier: Responding To The Changing Face Of Privacy On The Internet, Samantha L. Millier

Kentucky Law Journal

No abstract provided.


David Doe V. Goliath, Inc.: Judicial Ferment In 2009 For Business Plaintiffs Seeking The Identities Of Anonymous Online Speakers, 43 J. Marshall L. Rev. 1 (2009), Clay Calvert, Kayla Gutierrez, Karla D. Kennedy, Kara Carnley Murrhee Jan 2009

David Doe V. Goliath, Inc.: Judicial Ferment In 2009 For Business Plaintiffs Seeking The Identities Of Anonymous Online Speakers, 43 J. Marshall L. Rev. 1 (2009), Clay Calvert, Kayla Gutierrez, Karla D. Kennedy, Kara Carnley Murrhee

UIC Law Review

No abstract provided.


Updating Data Protection: Part I -- Identifying The Objectives, Fred H. Cate Jan 2009

Updating Data Protection: Part I -- Identifying The Objectives, Fred H. Cate

Articles by Maurer Faculty

No abstract provided.


In The Matter Of Ottinger V. Non-Party The Journal News, Daniel Haier Jan 2009

In The Matter Of Ottinger V. Non-Party The Journal News, Daniel Haier

NYLS Law Review

No abstract provided.


Changing Tides: A Lesser Expectation Of Privacy In A Post 9/11 World, Derek M. Alphran Jan 2009

Changing Tides: A Lesser Expectation Of Privacy In A Post 9/11 World, Derek M. Alphran

Richmond Public Interest Law Review

In sum, the Court has in recent years balanced the degree of government intrusion of the individual or place searched against the government's need for the search. This article addresses some of the questions posed by the evolution of the Fourth Amendment doctrine in light of terrorist concerns since 9/11. Part II will address the history of Fourth Amendment jurisprudence, from the Boyd Era of property protection and the use of general warrants to discover evidence of crime, to Olmstead and the development of the right of privacy under the Fourth Amendment. Part III will address the modern test under …


Race, Gender, And Genetic Technologies: A New Reproductive Dystopia?, Dorothy E. Roberts Jan 2009

Race, Gender, And Genetic Technologies: A New Reproductive Dystopia?, Dorothy E. Roberts

All Faculty Scholarship

No abstract provided.


Dying To Know: A Demand For Genuine Public Access To Clinical Trial Results Data, Christine Galbraith Davik Jan 2009

Dying To Know: A Demand For Genuine Public Access To Clinical Trial Results Data, Christine Galbraith Davik

Faculty Publications

Four years ago at the age of 34, I heard the awful words "I'm sorry, but you have breast cancer" coming from my doctor. After the initial shock of the diagnosis wore off, I like many others who have faced life-threatening diseases began to work with a team of physicians to develop an appropriate treatment plan, which included contemplating enrollment in a clinical trial. Quite unexpectedly, my position as an intellectual property professor whose scholarship focuses primarily on information control, my role as a member of my university's Institutional Review Board that oversees studies involving human subjects, and my newly …


Private Norms And Public Spaces, Nicole Stelle Garnett Jan 2009

Private Norms And Public Spaces, Nicole Stelle Garnett

Journal Articles

This Essay explores the role of private norms in the allocation of urban public spaces as well as local governments' efforts to enforce these norms. The Essay was prepared for the 2008 Brigham-Kanner Property Rights Conference, William and Mary School of Law, as a tribute to Robert Ellickson. community policing, informal norms


The U.S. Discovery-Eu Privacy Directive Conflict: Constructing A Three-Tiered Compliance Strategy, Carla L. Reyes Jan 2009

The U.S. Discovery-Eu Privacy Directive Conflict: Constructing A Three-Tiered Compliance Strategy, Carla L. Reyes

Faculty Journal Articles and Book Chapters

This note examines the conflicts of laws issue faced by trans-border civil litigants attempting to comply with both the U.S. Federal Rules of Civil Procedure and the requirements of the EU Privacy Directive. This note first sifts through the quagmire of regulations, and then attempts to help trans-border litigants view the U.S. discovery-EU data protection conflict through a transnational legal lens, and concludes by constructing a three-tiered strategy for compliance that respects U.S., EU and international law.


Le Développement De L’Évaluation De La Menace De La Criminalité Organisée Et L’Architecure De Sécurité Intérieure (Development Of The Organised Crime Threat Assessment (Octa) And Internal Security Architecture), Benjamin J. Goold Jan 2009

Le Développement De L’Évaluation De La Menace De La Criminalité Organisée Et L’Architecure De Sécurité Intérieure (Development Of The Organised Crime Threat Assessment (Octa) And Internal Security Architecture), Benjamin J. Goold

All Faculty Publications

Cette note propose une vue d’ensemble de l’approche européenne des questions de sécurité, de lutte contre le terrorisme et contre la criminalité organisée. Elle aborde plus particulièrement le rôle de la Stratégie européenne de sécurité (SES) dans l’élaboration des politiques et des dispositions institutionnelles, ainsi que l’influence de l’OCTA (Évaluation de la menace de la criminalité organisée). cette note recommande qu’un certain nombre de mesures soient prises pour recentrer et rationaliser les structures existantes attachées aux questions de sécurité et de lutte contre le terrorisme et le crime organisé. Le nombre d’agences directement ou indirectement impliquées dans le recueil d’informations, …


Separated By A Common Language?, Yesha Yadav Jan 2009

Separated By A Common Language?, Yesha Yadav

Vanderbilt Law School Faculty Publications

This paper examines recent controversies in the legal and policy debate between the U.S. and the EU on the sharing of data in the implementation of transatlantic counter-terrorism measures. The nexus between law and policy in this area is particularly close, reflecting the preferences each jurisdiction has in protecting civil liberty and security interests. While the U.S. and the EU offer differing legal frameworks on data privacy, the strategic importance of data in counter-terrorism law and policy necessitates a joint approach. A failure to arrive at such an approach can result in a series of bilateral agreements between the U.S. …


Rethinking Free Speech And Civil Liability, Neil M. Richards, Daniel J. Solove Jan 2009

Rethinking Free Speech And Civil Liability, Neil M. Richards, Daniel J. Solove

Scholarship@WashULaw

One of the most important and unresolved quandaries of First Amendment jurisprudence involves when civil liability for speech will trigger First Amendment protections. When speech results in civil liability, two starkly opposing rules are potentially applicable. Since New York Times v. Sullivan, the First Amendment requires heightened protection against tort liability for speech, such as defamation and invasion of privacy. But in other contexts involving civil liability for speech, the First Amendment provides virtually no protection. According to Cohen v. Cowles, there is no First Amendment scrutiny for speech restricted by promissory estoppel and contract. The First Amendment rarely requires …


Privacy And The Limits Of History, Neil M. Richards Jan 2009

Privacy And The Limits Of History, Neil M. Richards

Scholarship@WashULaw

A short review essay of Lawrence Friedman's "Guarding Life's Dark Secrets: Legal and Social Controls over Reputation, Propriety, and Privacy" (Stanford Press 2007). The essay argues that Friedman tells a nuanced and compelling story of the rise and fall of the "Victorian Compromise," a series of interlocking legal doctrines protecting the reputations of elites around the turn of the twentieth century. "Dark Secrets" undeniably advances our understanding of both the genesis of privacy law and the relationships between law and culture in the Gilded Age. As a work of legal history, it is an instant classic–a must-read for anyone interested …


Cybercrimes Vs. Cyberliberties, Nadine Strossen Jan 2009

Cybercrimes Vs. Cyberliberties, Nadine Strossen

Articles & Chapters

Cybercrimes vs. Cyberliberties, Chapter 8 in Internet Policy and Economics: Challenges and Perspectives 2nd ed. at 110-127 ( W.H. Lehr & L.M. Pupillo, eds. Springer, 2009).


Islam's Fourth Amendment: Search And Seizure In Islamic Doctrine And Muslim Practice, Sadiq Reza Jan 2009

Islam's Fourth Amendment: Search And Seizure In Islamic Doctrine And Muslim Practice, Sadiq Reza

Articles & Chapters

Modern scholars regularly assert that Islamic law contains privacy protections similar to those of the FourthAmendment to the U.S. Constitution. Two Quranic verses in particular - one that commands Muslims not to enter homes without permission, and one that commands them not to 'spy' - are held up, along with reports from the Traditions (Sunna) that repeat and embellish on these commands, as establishing rules that forbid warrantless searches and seizures by state actors and require the exclusion of evidence obtained in violation of these rules. This Article tests these assertions by: (1) presenting rules and doctrines Muslim jurists of …


Surveillance And The Political Value Of Privacy, Benjamin J. Goold Jan 2009

Surveillance And The Political Value Of Privacy, Benjamin J. Goold

All Faculty Publications

The steady expansion in the use of surveillance technologies by the state and private sector represents a substantial threat to the privacy of ordinary individuals. Yet despite the best efforts of civil libertarians, many members of the public still struggle to understand why privacy is valuable and deserves to be protected as a basic right. In part, this is a result of the inherent complexity of the idea of privacy, but it is also due a tendency on the part of privacy advocates to focus on the individual - as opposed to the social and political dimensions - of privacy. …


Putting Surveillance On The Political Agenda – A Short Defence Of Surveillance: Citizens And The State, Benjamin J. Goold, Charles D. Raab Jan 2009

Putting Surveillance On The Political Agenda – A Short Defence Of Surveillance: Citizens And The State, Benjamin J. Goold, Charles D. Raab

All Faculty Publications

In February 2009 the House of Lords Constitutional Committee in the United Kingdom published the report Surveillance: Citizens and the State. Some have hailed this as a landmark document. Volume 6(3) of Surveillance & Society published 4 invited responses to this report written by prominent scholars. In the attached paper the two Specialist Advisers to this Committee set the context for the report and provide a brief rejoinder to the four responses. NOTE: The authors write in their academic and personal capacities, and not as representatives of the Committee.


Tuck-It-Away Associates, L.P. V. Empire State Development Corp., Kelly D. Fisher Jan 2009

Tuck-It-Away Associates, L.P. V. Empire State Development Corp., Kelly D. Fisher

NYLS Law Review

No abstract provided.


Privacy And The New Virtualism, Jonathon Penney Jan 2009

Privacy And The New Virtualism, Jonathon Penney

Articles, Book Chapters, & Popular Press

First generation cyberlaw scholars were deeply influenced by the uniqueness of cyberspace, and believed its technology and scope meant it could not be controlled by any government. Few still ascribe to this utopian vision. However, there is now a growing body of second generation cyberlaw scholarship that speaks not only to the differential character of cyberspace, but also analyzes legal norms within virtual spaces while drawing connections to our experience in real space. I call this the New Virtualism. Situated within this emerging scholarship, this article offers a new approach to privacy in virtual spaces by drawing on what Orin …