Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (32)
- Computer Law (26)
- Science and Technology Law (23)
- Constitutional Law (7)
- First Amendment (5)
-
- Fourth Amendment (5)
- National Security Law (5)
- Law and Society (4)
- Legal Writing and Research (4)
- State and Local Government Law (4)
- Communications Law (3)
- Courts (3)
- Dispute Resolution and Arbitration (3)
- Health Law and Policy (3)
- Jurisprudence (3)
- Legal History (3)
- Legislation (3)
- Social and Behavioral Sciences (3)
- Administrative Law (2)
- Comparative and Foreign Law (2)
- Consumer Protection Law (2)
- Criminal Law (2)
- Intellectual Property Law (2)
- Judges (2)
- Labor and Employment Law (2)
- Legal Studies (2)
- Litigation (2)
- Medical Jurisprudence (2)
- Institution
-
- UIC School of Law (22)
- New York Law School (5)
- Chicago-Kent College of Law (4)
- Schulich School of Law, Dalhousie University (4)
- University of Richmond (4)
-
- Vanderbilt University Law School (4)
- The Peter A. Allard School of Law (3)
- University of Michigan Law School (2)
- University of Washington School of Law (2)
- Washington University in St. Louis (2)
- Brooklyn Law School (1)
- Cornell University Law School (1)
- Maurer School of Law: Indiana University (1)
- Notre Dame Law School (1)
- Seattle University School of Law (1)
- Selected Works (1)
- Southern Methodist University (1)
- University of Baltimore Law (1)
- University of Kentucky (1)
- University of Maine School of Law (1)
- University of Maryland Francis King Carey School of Law (1)
- University of Missouri School of Law (1)
- University of Pennsylvania Carey Law School (1)
- Keyword
-
- Privacy (9)
- Technology (5)
- Cyberspace (4)
- Internet (4)
- Data security (3)
-
- Defamation (3)
- Externalist (3)
- First Amendment (3)
- Internal (3)
- Realist (3)
- Social media (3)
- Virtualism (3)
- Virtualist (3)
- Constitution (2)
- Exclusionary rule (2)
- Facebook (2)
- Fair information practices (2)
- Information privacy (2)
- Internet Law (2)
- Libel (2)
- Proportionality (2)
- Reputation (2)
- Access (1)
- Agency (1)
- Anonymous (1)
- Canada (1)
- Civil Liability (1)
- Civil Procedure (1)
- Civil liberties (1)
- Closed circuit television (1)
- Publication
-
- UIC John Marshall Journal of Information Technology & Privacy Law (19)
- Chicago-Kent Law Review (4)
- All Faculty Publications (3)
- Articles, Book Chapters, & Popular Press (3)
- NYLS Law Review (3)
-
- UIC Law Review (3)
- Articles & Chapters (2)
- Faculty Publications (2)
- Faculty Scholarship (2)
- Richmond Journal of Law and the Public Interest (2)
- Richmond Public Interest Law Review (2)
- Scholarship@WashULaw (2)
- All Faculty Scholarship (1)
- Articles (1)
- Articles by Maurer Faculty (1)
- Cornell Law Faculty Publications (1)
- Dalhousie Law Journal (1)
- Faculty Articles (1)
- Faculty Journal Articles and Book Chapters (1)
- Journal Articles (1)
- Kentucky Law Journal (1)
- Lisa Smith-Butler (1)
- Michigan Law Review (1)
- University of Baltimore Law Review (1)
- University of Michigan Journal of Law Reform (1)
- Vanderbilt Journal of Entertainment & Technology Law (1)
- Vanderbilt Journal of Transnational Law (1)
- Vanderbilt Law Review (1)
- Vanderbilt Law School Faculty Publications (1)
- Washington Journal of Law, Technology & Arts (1)
- Publication Type
Articles 31 - 60 of 65
Full-Text Articles in Privacy Law
Social Networking As A Communications Weapon To Harm Victims: Facebook, Myspace, And Twitter Demonstrate A Need To Amend Section 230 Of The Communications Decency Act, 26 J. Marshall J. Computer & Info. L. 415 (2009), Joshua N. Azriel
UIC John Marshall Journal of Information Technology & Privacy Law
The article discusses how social networking sites can pose a danger to victims of online offensive content. Part II provides an overall analysis of the dangers the Internet, especially social networking, poses to victims. Part III reviews Section 230 of the CDA, including the “Good Samaritan” provisions for social networking websites such as Twitter and Facebook. Part IV analyzes three recent court cases that demonstrate how these social networking tools are used as weapons to harm victims. Part V concludes with a discussion of how the growing number of online incidents stem from social networking sites. It recommends that Congress …
Average Teenager Or Sex Offender? Solutions To The Legal Dilemma Caused By Sexting, 26 J. Marshall J. Computer & Info. L. 431 (2009), Shannon Shafron-Perez
Average Teenager Or Sex Offender? Solutions To The Legal Dilemma Caused By Sexting, 26 J. Marshall J. Computer & Info. L. 431 (2009), Shannon Shafron-Perez
UIC John Marshall Journal of Information Technology & Privacy Law
The Comment broadly considers the failure of the law to adapt to developments in technology and communication, untangles the different approaches taken by a sample of states, and considers which legal remedy is most appropriate. This discussion primarily focuses on the criminal aspects of: (1) minors who voluntarily create and disseminate nude text messages of themselves; and (2) minors who receive nude photographs of other minors. Part II traces the development of sexting. Part III describes the history and rationale behind prohibiting child pornography. In Part IV, the article examines the application of child pornography laws to sexting cases in …
The Black Box Canon Of Statutory Interpretation: Why The Courts Should Treat Technology Like A Black Box In Interpreting Computer Crime Statutes, 26 J. Marshall J. Computer & Info. L. 487 (2009), Peter V. Roman
UIC John Marshall Journal of Information Technology & Privacy Law
The author points out that when reading computer crime statutes, federal courts sometimes study the minutiae of technology at the expense of congressional intent, plain language, and fair warning to criminal defendants. The author asserts that by focusing on the actual, but transient and morally irrelevant, design of information systems, the courts are undermining criminal law in the digital world. The author explains how traditional tools of statutory interpretation have failed to stop this approach to the interpretation of computer crime statutes. To solve this dilemma, the author points out that courts need a new tool to help them apply …
Antitrust Law - A Stranger In The Wikinomics World? Regulating Anti-Competitive Use Of The Drm/Dmca Regime, 27 J. Marshall J. Computer & Info. L. 1 (2009), Rachel Aridor-Hershkovitz
Antitrust Law - A Stranger In The Wikinomics World? Regulating Anti-Competitive Use Of The Drm/Dmca Regime, 27 J. Marshall J. Computer & Info. L. 1 (2009), Rachel Aridor-Hershkovitz
UIC John Marshall Journal of Information Technology & Privacy Law
Unlike traditional markets, Information Technology (“IT”) markets are characterized by special and unique features that shall be discussed in this paper. Competition in IT markets is dynamic; nonmarket based information production models (‘peer production’) play a significant role in IT markets; and IT market are usually data market rather than product market. The combination of the legal rule prohibiting circumvention of technological measure under the DMCA and the use of DRMs, created a new regime, the DRM/DMCA regime, which bestows the entertainment industry with a new and strong right to control the access to and use of the copyrighted work. …
Virtual Venues: Improving Online Dispute Resolution As An Alternative To Cost Intensive Litigation, 27 J. Marshall J. Computer & Info. L. 81 (2009), Shekhar Kumar
UIC John Marshall Journal of Information Technology & Privacy Law
This paper looks at the growing presence of online alternative dispute resolution in the commercial setting, with the eventual goal of making suggestions to improve current online systems. While out-of-court dispute resolutions such as arbitration and mediation have been a long-time alternative to lengthy litigation, the development of the internet and other advanced forms of communication has lead to an increased presence of, and increased possibilities for, online dispute resolution. The first section of this paper provides a succinct review of the history of online dispute resolution. The focus of the section is two-pronged. The first prong discusses how technological …
2009 John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 27 J. Marshall J. Computer & Info. L. 95 (2009), Sarah M. Knight, William S. Weltman, Andrew T. Call, Panagiota Kelali
2009 John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 27 J. Marshall J. Computer & Info. L. 95 (2009), Sarah M. Knight, William S. Weltman, Andrew T. Call, Panagiota Kelali
UIC John Marshall Journal of Information Technology & Privacy Law
Petitioner, Phillip Nevilson, appeals to the Marshall Supreme Court from a decision affirming the granting of summary judgment in favor of Respondent, Marshoogle, Inc., on his claims of intrusion upon seclusion, publication of private facts, and tortious interference with business expectancy claims. The issues in this case concern whether an individual can state a claim for invasion of privacy against an Internet search engine provider where liability is based on taking a photograph of an individual in his home and the publication of such photograph on a website. The final issue concerns whether the act of publication of the photograph …
2009 John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 27 J. Marshall J. Computer & Info. L. 131 (2009), Megan Peterson, Tyler Rench
2009 John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 27 J. Marshall J. Computer & Info. L. 131 (2009), Megan Peterson, Tyler Rench
UIC John Marshall Journal of Information Technology & Privacy Law
SUMMARY OF THE ARGUMENT: As encroaching technologies shrink the realm of privacy and expose intimate details of the home, courts must craft a solution that will provide a remedy to the injured. When Marshoogle’s prying cameras took photographs of Nevilson seated inside his home, they invaded his privacy by intruding into his private area of seclusion and this court should give Nevilson the opportunity to seek a remedy. Because Nevilson was inside his home when the images were captured, he had a reasonable expectation of privacy, which cannot be lost simply by leaving his curtains open. Marshoogle’s cameras were intentionally …
2009 John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 27 J. Marshall J. Computer & Info. L. 169 (2009), Michael Jones, Stuart Ladner, Sabrina Stone
2009 John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 27 J. Marshall J. Computer & Info. L. 169 (2009), Michael Jones, Stuart Ladner, Sabrina Stone
UIC John Marshall Journal of Information Technology & Privacy Law
SUMMARY OF THE ARGUMENT: Nevilson has not raised a genuine issue of material fact on his intrusion upon seclusion claim. First, Nevilson cannot show Marshoogle intentionally invaded Nevilson’s privacy. When Marshoogle captured the images for its Marshall Avenue Perspective feature, no one physically entered Nevilson’s property or used sensory enhancements or telephoto lenses to pry into his private space. Second, Marshoogle’s actions were not highly offensive to a reasonable person because the photographs were not captured in an effort to exploit or defame Nevilson, but rather were captured in an effort to produce a free and effective virtual map for …
Two Notions Of Privacy Online, Avner Levin, Patricia S. Abril
Two Notions Of Privacy Online, Avner Levin, Patricia S. Abril
Vanderbilt Journal of Entertainment & Technology Law
Users of social networking websites tend to disclose much personal information online yet seem to retain some form of an expectation of privacy. Is this expectation of privacy always unreasonable? How do users of online social networks define their expectations of privacy online?
These questions were the impetus behind an empirical study, the findings of which are presented in this Article. The project, simultaneously conducted in Canada, at Ryerson University, and in the United States, at the University of Miami, consisted of a survey regarding personal information protection and expectations of privacy on online social networks (OSNs). Approximately 2,500 young …
Conflict Of Law And Surreptitious Taping Of Telephone Conversations, Carol M. Bast
Conflict Of Law And Surreptitious Taping Of Telephone Conversations, Carol M. Bast
NYLS Law Review
No abstract provided.
Entry And Service Of Protective Orders In Virginia: Are You Really Protected, Susheela Varky
Entry And Service Of Protective Orders In Virginia: Are You Really Protected, Susheela Varky
Richmond Public Interest Law Review
According to the Virginia Department of State Police, there has been a legislative effort in 2008 and 2009 over the past two years to ensure that essential data from protective orders1 is entered into the Virginia Criminal Information Network ("VCIN") immediately upon the order's issuance. While data entry may seem like a dull topic, the following story highlights the dire significance of this seemingly mundane task.
The Facebook Frontier: Responding To The Changing Face Of Privacy On The Internet, Samantha L. Millier
The Facebook Frontier: Responding To The Changing Face Of Privacy On The Internet, Samantha L. Millier
Kentucky Law Journal
No abstract provided.
David Doe V. Goliath, Inc.: Judicial Ferment In 2009 For Business Plaintiffs Seeking The Identities Of Anonymous Online Speakers, 43 J. Marshall L. Rev. 1 (2009), Clay Calvert, Kayla Gutierrez, Karla D. Kennedy, Kara Carnley Murrhee
David Doe V. Goliath, Inc.: Judicial Ferment In 2009 For Business Plaintiffs Seeking The Identities Of Anonymous Online Speakers, 43 J. Marshall L. Rev. 1 (2009), Clay Calvert, Kayla Gutierrez, Karla D. Kennedy, Kara Carnley Murrhee
UIC Law Review
No abstract provided.
Updating Data Protection: Part I -- Identifying The Objectives, Fred H. Cate
Updating Data Protection: Part I -- Identifying The Objectives, Fred H. Cate
Articles by Maurer Faculty
No abstract provided.
In The Matter Of Ottinger V. Non-Party The Journal News, Daniel Haier
In The Matter Of Ottinger V. Non-Party The Journal News, Daniel Haier
NYLS Law Review
No abstract provided.
Changing Tides: A Lesser Expectation Of Privacy In A Post 9/11 World, Derek M. Alphran
Changing Tides: A Lesser Expectation Of Privacy In A Post 9/11 World, Derek M. Alphran
Richmond Public Interest Law Review
In sum, the Court has in recent years balanced the degree of government intrusion of the individual or place searched against the government's need for the search. This article addresses some of the questions posed by the evolution of the Fourth Amendment doctrine in light of terrorist concerns since 9/11. Part II will address the history of Fourth Amendment jurisprudence, from the Boyd Era of property protection and the use of general warrants to discover evidence of crime, to Olmstead and the development of the right of privacy under the Fourth Amendment. Part III will address the modern test under …
Race, Gender, And Genetic Technologies: A New Reproductive Dystopia?, Dorothy E. Roberts
Race, Gender, And Genetic Technologies: A New Reproductive Dystopia?, Dorothy E. Roberts
All Faculty Scholarship
No abstract provided.
Dying To Know: A Demand For Genuine Public Access To Clinical Trial Results Data, Christine Galbraith Davik
Dying To Know: A Demand For Genuine Public Access To Clinical Trial Results Data, Christine Galbraith Davik
Faculty Publications
Four years ago at the age of 34, I heard the awful words "I'm sorry, but you have breast cancer" coming from my doctor. After the initial shock of the diagnosis wore off, I like many others who have faced life-threatening diseases began to work with a team of physicians to develop an appropriate treatment plan, which included contemplating enrollment in a clinical trial. Quite unexpectedly, my position as an intellectual property professor whose scholarship focuses primarily on information control, my role as a member of my university's Institutional Review Board that oversees studies involving human subjects, and my newly …
Private Norms And Public Spaces, Nicole Stelle Garnett
Private Norms And Public Spaces, Nicole Stelle Garnett
Journal Articles
This Essay explores the role of private norms in the allocation of urban public spaces as well as local governments' efforts to enforce these norms. The Essay was prepared for the 2008 Brigham-Kanner Property Rights Conference, William and Mary School of Law, as a tribute to Robert Ellickson. community policing, informal norms
The U.S. Discovery-Eu Privacy Directive Conflict: Constructing A Three-Tiered Compliance Strategy, Carla L. Reyes
The U.S. Discovery-Eu Privacy Directive Conflict: Constructing A Three-Tiered Compliance Strategy, Carla L. Reyes
Faculty Journal Articles and Book Chapters
This note examines the conflicts of laws issue faced by trans-border civil litigants attempting to comply with both the U.S. Federal Rules of Civil Procedure and the requirements of the EU Privacy Directive. This note first sifts through the quagmire of regulations, and then attempts to help trans-border litigants view the U.S. discovery-EU data protection conflict through a transnational legal lens, and concludes by constructing a three-tiered strategy for compliance that respects U.S., EU and international law.
Le Développement De L’Évaluation De La Menace De La Criminalité Organisée Et L’Architecure De Sécurité Intérieure (Development Of The Organised Crime Threat Assessment (Octa) And Internal Security Architecture), Benjamin J. Goold
All Faculty Publications
Cette note propose une vue d’ensemble de l’approche européenne des questions de sécurité, de lutte contre le terrorisme et contre la criminalité organisée. Elle aborde plus particulièrement le rôle de la Stratégie européenne de sécurité (SES) dans l’élaboration des politiques et des dispositions institutionnelles, ainsi que l’influence de l’OCTA (Évaluation de la menace de la criminalité organisée). cette note recommande qu’un certain nombre de mesures soient prises pour recentrer et rationaliser les structures existantes attachées aux questions de sécurité et de lutte contre le terrorisme et le crime organisé. Le nombre d’agences directement ou indirectement impliquées dans le recueil d’informations, …
Separated By A Common Language?, Yesha Yadav
Separated By A Common Language?, Yesha Yadav
Vanderbilt Law School Faculty Publications
This paper examines recent controversies in the legal and policy debate between the U.S. and the EU on the sharing of data in the implementation of transatlantic counter-terrorism measures. The nexus between law and policy in this area is particularly close, reflecting the preferences each jurisdiction has in protecting civil liberty and security interests. While the U.S. and the EU offer differing legal frameworks on data privacy, the strategic importance of data in counter-terrorism law and policy necessitates a joint approach. A failure to arrive at such an approach can result in a series of bilateral agreements between the U.S. …
Rethinking Free Speech And Civil Liability, Neil M. Richards, Daniel J. Solove
Rethinking Free Speech And Civil Liability, Neil M. Richards, Daniel J. Solove
Scholarship@WashULaw
One of the most important and unresolved quandaries of First Amendment jurisprudence involves when civil liability for speech will trigger First Amendment protections. When speech results in civil liability, two starkly opposing rules are potentially applicable. Since New York Times v. Sullivan, the First Amendment requires heightened protection against tort liability for speech, such as defamation and invasion of privacy. But in other contexts involving civil liability for speech, the First Amendment provides virtually no protection. According to Cohen v. Cowles, there is no First Amendment scrutiny for speech restricted by promissory estoppel and contract. The First Amendment rarely requires …
Privacy And The Limits Of History, Neil M. Richards
Privacy And The Limits Of History, Neil M. Richards
Scholarship@WashULaw
A short review essay of Lawrence Friedman's "Guarding Life's Dark Secrets: Legal and Social Controls over Reputation, Propriety, and Privacy" (Stanford Press 2007). The essay argues that Friedman tells a nuanced and compelling story of the rise and fall of the "Victorian Compromise," a series of interlocking legal doctrines protecting the reputations of elites around the turn of the twentieth century. "Dark Secrets" undeniably advances our understanding of both the genesis of privacy law and the relationships between law and culture in the Gilded Age. As a work of legal history, it is an instant classic–a must-read for anyone interested …
Cybercrimes Vs. Cyberliberties, Nadine Strossen
Cybercrimes Vs. Cyberliberties, Nadine Strossen
Articles & Chapters
Cybercrimes vs. Cyberliberties, Chapter 8 in Internet Policy and Economics: Challenges and Perspectives 2nd ed. at 110-127 ( W.H. Lehr & L.M. Pupillo, eds. Springer, 2009).
Islam's Fourth Amendment: Search And Seizure In Islamic Doctrine And Muslim Practice, Sadiq Reza
Islam's Fourth Amendment: Search And Seizure In Islamic Doctrine And Muslim Practice, Sadiq Reza
Articles & Chapters
Modern scholars regularly assert that Islamic law contains privacy protections similar to those of the FourthAmendment to the U.S. Constitution. Two Quranic verses in particular - one that commands Muslims not to enter homes without permission, and one that commands them not to 'spy' - are held up, along with reports from the Traditions (Sunna) that repeat and embellish on these commands, as establishing rules that forbid warrantless searches and seizures by state actors and require the exclusion of evidence obtained in violation of these rules. This Article tests these assertions by: (1) presenting rules and doctrines Muslim jurists of …
Surveillance And The Political Value Of Privacy, Benjamin J. Goold
Surveillance And The Political Value Of Privacy, Benjamin J. Goold
All Faculty Publications
The steady expansion in the use of surveillance technologies by the state and private sector represents a substantial threat to the privacy of ordinary individuals. Yet despite the best efforts of civil libertarians, many members of the public still struggle to understand why privacy is valuable and deserves to be protected as a basic right. In part, this is a result of the inherent complexity of the idea of privacy, but it is also due a tendency on the part of privacy advocates to focus on the individual - as opposed to the social and political dimensions - of privacy. …
Putting Surveillance On The Political Agenda – A Short Defence Of Surveillance: Citizens And The State, Benjamin J. Goold, Charles D. Raab
Putting Surveillance On The Political Agenda – A Short Defence Of Surveillance: Citizens And The State, Benjamin J. Goold, Charles D. Raab
All Faculty Publications
In February 2009 the House of Lords Constitutional Committee in the United Kingdom published the report Surveillance: Citizens and the State. Some have hailed this as a landmark document. Volume 6(3) of Surveillance & Society published 4 invited responses to this report written by prominent scholars. In the attached paper the two Specialist Advisers to this Committee set the context for the report and provide a brief rejoinder to the four responses. NOTE: The authors write in their academic and personal capacities, and not as representatives of the Committee.
Tuck-It-Away Associates, L.P. V. Empire State Development Corp., Kelly D. Fisher
Tuck-It-Away Associates, L.P. V. Empire State Development Corp., Kelly D. Fisher
NYLS Law Review
No abstract provided.
Privacy And The New Virtualism, Jonathon Penney
Privacy And The New Virtualism, Jonathon Penney
Articles, Book Chapters, & Popular Press
First generation cyberlaw scholars were deeply influenced by the uniqueness of cyberspace, and believed its technology and scope meant it could not be controlled by any government. Few still ascribe to this utopian vision. However, there is now a growing body of second generation cyberlaw scholarship that speaks not only to the differential character of cyberspace, but also analyzes legal norms within virtual spaces while drawing connections to our experience in real space. I call this the New Virtualism. Situated within this emerging scholarship, this article offers a new approach to privacy in virtual spaces by drawing on what Orin …