Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Privacy Law

When Mobile Phones Are Rfid-Equipped - Finding E.U.-U.S. Solutions To Protect Consumer Privacy And Facilitate Mobile Commerce, Nancy J. King Jan 2008

When Mobile Phones Are Rfid-Equipped - Finding E.U.-U.S. Solutions To Protect Consumer Privacy And Facilitate Mobile Commerce, Nancy J. King

Michigan Telecommunications & Technology Law Review

New mobile phones have been designed to include delivery of mobile advertising and other useful location-based services, but have they also been designed to protect consumers' privacy? One of the key enabling technologies for these new types of phones and new mobile services is Radio Frequency Identification (RFID), a wireless communication technology that enables the unique identification of tagged objects. In the case of RFID-enabled mobile phones, the personal nature of the devices makes it very likely that, by locating a phone, businesses will also be able to locate its owner. Consumers are currently testing new RFID-enabled phones around the …


Welfare, Privacy, And Feminism, Michele E. Gilman Jan 2008

Welfare, Privacy, And Feminism, Michele E. Gilman

University of Baltimore Law Forum

Feminism has long been concerned with privacy. Second-wave feminists assailed the divide between the public and the private spheres that trapped women in the home, excluded them from the workforce, and subjected them to domestic abuse. Second-wave feminists also argued in favor of a sphere of privacy that would allow women to make reproductive choices without state interference. These were powerful critiques of existing power structures, but they tended to overlook the experiences of poor women. As a condition of receiving welfare benefits, poor women have been subjected to drug tests, and they continue to face unannounced home inspections by …


You Are Being Watched: The Need For Notice In Employer Electronic Monitoring, Mindy C. Calisti Jan 2008

You Are Being Watched: The Need For Notice In Employer Electronic Monitoring, Mindy C. Calisti

Kentucky Law Journal

No abstract provided.


Six Clicks Of Separation: The Legal Ramifications Of Employers Using Social Networking Sites To Research Applicants, Ian Byrnside Jan 2008

Six Clicks Of Separation: The Legal Ramifications Of Employers Using Social Networking Sites To Research Applicants, Ian Byrnside

Vanderbilt Journal of Entertainment & Technology Law

As social networking sites like Facebook.com and MySpace.com continue to grow in popularity, college students and other job applicants voluntarily divulge an increasing amount of personal information on them, often unaware of the potential negative effects it may have on their search for employment. Employers are beginning to take note of this trend and are increasingly using applicants' social networking profiles to supplement traditional application information. Many applicants feel that employers should not base employment decisions on social networking profiles in any way and believe that it is illegal for employers to do so. Yet, it appears that employers that …


The Fair Use Doctrine And Trackjacking: Beautiful Animal Or Destroyer Of Worlds?, S. Wayne Clemons, Jr. Jan 2008

The Fair Use Doctrine And Trackjacking: Beautiful Animal Or Destroyer Of Worlds?, S. Wayne Clemons, Jr.

Vanderbilt Journal of Entertainment & Technology Law

"Trackjacking" is the unauthorized replacement of the original soundtrack of an audiovisual recording, such as a movie or television show, with another that is designed to alter substantially the plot and/or characters of the original work. While trackjacking is a creative and entertaining form of art, it may also constitute copyright infringement if the original work is one that is copyrighted. However, if certain criteria are met, the "fair use" doctrine provides a mechanism for courts to excuse what otherwise would be considered copyright infringement. Because the unique nature of trackjacking allows the new work to be distributed in such …