Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Communications Law (12)
- Science and Technology Law (12)
- Computer Law (4)
- First Amendment (4)
- Constitutional Law (3)
-
- Criminal Procedure (3)
- Intellectual Property Law (3)
- Other Law (3)
- Comparative and Foreign Law (2)
- Conflict of Laws (2)
- Consumer Protection Law (2)
- Criminal Law (2)
- Family Law (2)
- Fourth Amendment (2)
- International Law (2)
- Law Enforcement and Corrections (2)
- State and Local Government Law (2)
- Torts (2)
- Business Organizations Law (1)
- Civil Procedure (1)
- Civil Rights and Discrimination (1)
- Common Law (1)
- Communication (1)
- Communication Technology and New Media (1)
- Courts (1)
- European Law (1)
- Evidence (1)
Articles 1 - 13 of 13
Full-Text Articles in Privacy Law
A How-To Guide For When Your Favorite Meme Account Is Defamed: Involuntary Public Figures In Defamation, Privacy, And Intentional Infliction Of Emotional Distress Law, Elizabeth Mcmullen
A How-To Guide For When Your Favorite Meme Account Is Defamed: Involuntary Public Figures In Defamation, Privacy, And Intentional Infliction Of Emotional Distress Law, Elizabeth Mcmullen
Catholic University Journal of Law and Technology
The world we live in today has changed infinitely since the inception of our Constitution and early legal doctrine. Our Founding Fathers could never have predicted that we would one day live in a world where anyone living in any corner of the globe could garner millions of followers. Whether someone finds him or herself to be particularly proficient in writing Harry Potter fan fiction or to be the best creator of memes with an American Girl Doll focus, ordinary citizens could find themselves suddenly jolted out of quiet anonymity by one unexpectedly viral post. Despite years of Instagram micro-fame, …
One Size Does Not Fit All: How The California Privacy Rights Act Will Not Improve Employee Data Collection And Privacy Rights, Kayla N. Bushey
One Size Does Not Fit All: How The California Privacy Rights Act Will Not Improve Employee Data Collection And Privacy Rights, Kayla N. Bushey
Catholic University Journal of Law and Technology
No abstract provided.
Passcodes, Protection, And Legal Practicality: The Necessity Of A Digital Fifth Amendment, Ethan Swierczewski
Passcodes, Protection, And Legal Practicality: The Necessity Of A Digital Fifth Amendment, Ethan Swierczewski
Catholic University Journal of Law and Technology
No abstract provided.
The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine
The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine
Catholic University Journal of Law and Technology
No abstract provided.
"Times They Are A Changin'" - Can The Ad Tech Industry Survive In A Privacy Conscious World?, Meaghan Donahue
"Times They Are A Changin'" - Can The Ad Tech Industry Survive In A Privacy Conscious World?, Meaghan Donahue
Catholic University Journal of Law and Technology
The "ad tech ecosystem" is a web of interconnected technologies and intermediaries that facilitate targeted advertising based on consumer data, and supports the free internet while providing users with promotional content relevant to their interests. However, in recent years, lawmakers and consumer advocates have highlighted the dangers associated with the unregulated use of consumer data for advertising purposes, prompting a flurry of legislative action at both the state and federal levels. These various laws and proposed bills impose new challenges on the ad tech industry--threatening to fundamentally change the way the business operates. However, through innovation and creative thinking, the …
Privacy, Eavesdropping, And Wiretapping Across The United States: Reasonable Expectation Of Privacy And Judicial Discretion, Carol M. Bast
Privacy, Eavesdropping, And Wiretapping Across The United States: Reasonable Expectation Of Privacy And Judicial Discretion, Carol M. Bast
Catholic University Journal of Law and Technology
One-party consent and all-party consent eavesdropping and wiretapping statutes are two broad pathways for legislation to deal with the problem of secret taping and some states protect conversation under state constitutions. Whether a conversation is protected against being taped as a private conversation is often gauged by the reasonable expectation of privacy standard. Judges in both all-party consent and one-party consent jurisdictions have had to use their leeway under the reasonable expectation of privacy standard to arrive at what at the time seemed to be the most appropriate solution, perhaps in doing so creating a case law exception.
Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast
Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast
Catholic University Journal of Law and Technology
The goal of this paper is to examine the future of the third-party doctrine with the proliferation of technology and the online data we are surrounded with daily, specifically after the Supreme Court’s decision in Carpenter v. United States. It is imperative that individuals do not forfeit their Constitutional guarantees for the benefit of living in a technologically advanced society. This requires an understanding of the modern-day functional equivalents of “papers” and “effects.”
Looking to the future, this paper contemplates solutions on how to move forward in this technology era by scrutinizing the relevancy of the third-party doctrine due …
Closed Adoption: An Illusory Promise To Birth Parents And The Changing Landscape Of Sealed Adoption Records, Bryn Baffer
Closed Adoption: An Illusory Promise To Birth Parents And The Changing Landscape Of Sealed Adoption Records, Bryn Baffer
Catholic University Journal of Law and Technology
Imagine spitting into a tube and mailing your DNA off only to discover that you had a sibling who had been adopted by another family or that a parent’s affair had resulted in a half-sibling. For many individuals, these family secrets have been exposed due to direct-to-consumer DNA testing companies, such as 23andMe.
By the 1950s, most states had enacted statutes that sealed adoption record files in order to preserve the privacy of the birth parents, adoptees, and adoptive families. While some states have moved toward granting adoptees access to their adoption records, most states still have some type of …
The Department Of Justice Versus Apple Inc. -- The Great Encryption Debate Between Privacy And National Security, Julia P. Eckart
The Department Of Justice Versus Apple Inc. -- The Great Encryption Debate Between Privacy And National Security, Julia P. Eckart
Catholic University Journal of Law and Technology
This article is an attempt to objectively examine and assess legal arguments made by Apple Inc. (Apple) and the Department of Justice (DOJ) concerning the DOJ’s use of the All Writs Act[1] (AWA) to require Apple to provide technical assistance to the DOJ so that it could access the encrypted data from the locked iPhone of Syed Rizwan Farook, commonly referred to as the San Bernardino shooter. The DOJ’s initial ex parte application focused on meeting the requirements of United States v. New York Telephone Co.[2] concluding the court order was authorized and appropriate. Apple not only argued …
Dating Dangerously: Risks Lurking Within Mobile Dating Apps, Alyssa Murphy
Dating Dangerously: Risks Lurking Within Mobile Dating Apps, Alyssa Murphy
Catholic University Journal of Law and Technology
In modern society, cell phones have become a virtual extension of most Americans. Advances in cell phone technology have given rise to the popularity of mobile dating applications (“apps”), which are capable of allowing users to date and meet potential partners without leaving the comfort of their own homes. The convenience and allure of mobile dating apps has led to a staggering increase in the number of crimes orchestrated against other users of the apps. Such crimes often include solicitation, stalking, murder, and human trafficking. Unsuspecting and trusting users fall victim to these crimes due to the false sense of …
Smart Baby Monitors: The Modern Nanny Or A Home Invader, Sarah Ensenat
Smart Baby Monitors: The Modern Nanny Or A Home Invader, Sarah Ensenat
Catholic University Journal of Law and Technology
Smart baby monitors exist to help parents protect and watch over their children. The smart baby monitors act as a second set of eyes when parents cannot be in the same room as their children. Low-tech hackers take advantage of gaps in the security of smart baby monitors. A hacker violates a consumer’s privacy by gaining access to private information, viewing the home and its occupants, and even speaking to children through the monitor.
This comment advocates for stricter security legislation for smart baby monitors. Without new legislation, manufacturers of smart baby monitors do not apply or invest in the …
Targeted Advertising And The First Amendment: Student Privacy Vs. Protected Speech, Marco Crocetti
Targeted Advertising And The First Amendment: Student Privacy Vs. Protected Speech, Marco Crocetti
Catholic University Journal of Law and Technology
No abstract provided.
Implications For The Future Of Global Data Security And Privacy: The Territorial Application Of The Stored Communications Act And The Microsoft Case, Russell Hsiao
Catholic University Journal of Law and Technology
No abstract provided.