Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

1986

Discipline
Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 38

Full-Text Articles in Privacy Law

The Right Of Publicity: Commercial Exploitation Of The Associative Value Of Personality, Sheldon W. Halpern Oct 1986

The Right Of Publicity: Commercial Exploitation Of The Associative Value Of Personality, Sheldon W. Halpern

Vanderbilt Law Review

For more than thirty years, dispute and confusion have marked the emergence and development of the so-called "right of publicity,"' a right that is concerned with the use of attributes of a generally identifiable person to enhance the commercial value of an enterprise. A dense, complex array of cases, accompanied by and analyzed in an even denser array of commentary, has been the vehicle for adumbrating the emergent right. Battle lines are drawn over whether the creature emerging from the fermenting ooze of modern mass communications is a species of "property" or a purely personal "privacy" interest."Everywhere one finds the …


Clark Memorandum: Fall 1986, J. Reuben Clark Law School, J. Reuben Clark Law Society Oct 1986

Clark Memorandum: Fall 1986, J. Reuben Clark Law School, J. Reuben Clark Law Society

The Clark Memorandum


The Origin And Development Of Washington's Independent Exclusionary Rule: Constitutional Right And Constitutionally Compelled Remedy, Sanford E. Pitler Apr 1986

The Origin And Development Of Washington's Independent Exclusionary Rule: Constitutional Right And Constitutionally Compelled Remedy, Sanford E. Pitler

Washington Law Review

Underlying any court's analysis of the exclusionary rule are certain basic theoretical elements that determine whether a court takes a unitary or a bifurcated approach to exclusion. To determine what theoretical elements underlie the Washington rule, the court must familiarize itself with the state rule's long history of independent application, which has never been fully explored. The court must also recognize the historical relationship between the state exclusionary rule and certain provisions of the Declaration of Rights. 6 Analysis of the Washington exclusionary rule's development reveals that, at minimum, exclusion is constitutionally compelled as the most effective remedy available to …


Privacy, Abortion, And Judicial Review: Haunted By The Ghost Of Lochner, Helen Garfield Apr 1986

Privacy, Abortion, And Judicial Review: Haunted By The Ghost Of Lochner, Helen Garfield

Washington Law Review

This article poses the question whether Lochner can finally be laid to rest without repudiating all applications of substantive due process, particularly protection of privacy and autonomy. The answer to that question requires a closer look at Lochner itself, and then at Griswold, Roe, and a few of the cases in between. The answers suggested by Ely, Perry, Choper, and others will then be discussed. Finally, this article will examine the ideas and ideals of the man who first conceived the common law right of privacy, Justice Louis D. Brandeis.


System Operator Liability For Defamtory Statements Appearing On An Electronic Bulletin Board, 19 J. Marshall L. Rev. 1107 (1986), George B. Trubow Jan 1986

System Operator Liability For Defamtory Statements Appearing On An Electronic Bulletin Board, 19 J. Marshall L. Rev. 1107 (1986), George B. Trubow

UIC Law Review

No abstract provided.


A New Means Of International Protection Of Computer Programs Through The Paris Convention - A New Concept Of Utility Model, 7 Computer L.J. 1 (1986), Takaharu Higashima, Kenji Ushiku Jan 1986

A New Means Of International Protection Of Computer Programs Through The Paris Convention - A New Concept Of Utility Model, 7 Computer L.J. 1 (1986), Takaharu Higashima, Kenji Ushiku

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Computers: The Link To Missing Children, 7 Computer L.J. 73 (1986), Michelle M. Fujimoto Jan 1986

Computers: The Link To Missing Children, 7 Computer L.J. 73 (1986), Michelle M. Fujimoto

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Computer Data And Reliability: A Call For Authentication Of Business Records Under The Federal Rules Of Evidence, 7 Computer L.J. 23 (1986), Rudolph J. Peritz Jan 1986

Computer Data And Reliability: A Call For Authentication Of Business Records Under The Federal Rules Of Evidence, 7 Computer L.J. 23 (1986), Rudolph J. Peritz

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Flagler Dog Track Case, 7 Computer L.J. 117 (1986), Marilyn Hochman Jan 1986

The Flagler Dog Track Case, 7 Computer L.J. 117 (1986), Marilyn Hochman

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Threat From Within: Cable Television And The Invasion Of Privacy, 7 Computer L.J. 89 (1986), Glen R. Segal Jan 1986

The Threat From Within: Cable Television And The Invasion Of Privacy, 7 Computer L.J. 89 (1986), Glen R. Segal

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Operation Exodus: The United States Government's Program To Intercept Illegal Exports Of High Technology, 7 Computer L.J. 203 (1986), Bruce B. Weyhrauch Jan 1986

Operation Exodus: The United States Government's Program To Intercept Illegal Exports Of High Technology, 7 Computer L.J. 203 (1986), Bruce B. Weyhrauch

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


17 U.S.C. § 117: Is The Amendment To The Copyright Act Adequate To Regulate The Computer Software Market?, 7 Computer L.J. 227 (1986), Robin Michael Jan 1986

17 U.S.C. § 117: Is The Amendment To The Copyright Act Adequate To Regulate The Computer Software Market?, 7 Computer L.J. 227 (1986), Robin Michael

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


A Chip Off The Old Block: Copyright Law And The Semiconductor Chip Protection Act, 7 Computer L.J. 245 (1986), Frederic M. Wilf Jan 1986

A Chip Off The Old Block: Copyright Law And The Semiconductor Chip Protection Act, 7 Computer L.J. 245 (1986), Frederic M. Wilf

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Semiconductor Chip Protection Act Of 1984: Is Copyright Protection For Utilitarian Articles Desirable?, 7 Computer L.J. 129 (1986), Theodore Shih Jan 1986

The Semiconductor Chip Protection Act Of 1984: Is Copyright Protection For Utilitarian Articles Desirable?, 7 Computer L.J. 129 (1986), Theodore Shih

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Tear-Me-Open Software License Agreements: A Uniform Commercial Code Perspective On An Innovative Contract Of Adhesion, 7 Computer L.J. 261 (1986), Michael Schwarz Jan 1986

Tear-Me-Open Software License Agreements: A Uniform Commercial Code Perspective On An Innovative Contract Of Adhesion, 7 Computer L.J. 261 (1986), Michael Schwarz

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The 1984 Federal Computer Crime Statute: A Partial Answer To A Pervasive Problem, 6 Computer L.J. 459 (1986), Joseph B. Tompkins Jr., Linda A. Mar Jan 1986

The 1984 Federal Computer Crime Statute: A Partial Answer To A Pervasive Problem, 6 Computer L.J. 459 (1986), Joseph B. Tompkins Jr., Linda A. Mar

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Copyrightability Of Object Code And Rom In Japan, Australia, And Germany: Surpassing Traditional Copyright Limits, 6 Computer L.J. 513 (1985), Noah J. Gordon Jan 1986

Copyrightability Of Object Code And Rom In Japan, Australia, And Germany: Surpassing Traditional Copyright Limits, 6 Computer L.J. 513 (1985), Noah J. Gordon

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Third-Party Computer Leases: The Effect Of The Lessor's Bankruptcy, 6 Computer L.J. 573 (1986), Charles S. Cohen Jan 1986

Third-Party Computer Leases: The Effect Of The Lessor's Bankruptcy, 6 Computer L.J. 573 (1986), Charles S. Cohen

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Litigating Computer Trade Secrets In California, 6 Computer L.J. 485 (1985), George S. Burns Jan 1986

Litigating Computer Trade Secrets In California, 6 Computer L.J. 485 (1985), George S. Burns

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Venture Capital Financing In The Computer Industry, 6 Computer L.J. 387 (1986), Duncan M. Davidson, Jean A. Davidson Jan 1986

Venture Capital Financing In The Computer Industry, 6 Computer L.J. 387 (1986), Duncan M. Davidson, Jean A. Davidson

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Copyright Law And Integrated Circuit Protection: When The Chips Are Down, 6 Computer L.J. 543 (1985), Michael D. Stokes Jan 1986

Copyright Law And Integrated Circuit Protection: When The Chips Are Down, 6 Computer L.J. 543 (1985), Michael D. Stokes

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Defamation And The Public Official: The Big Chill, 6 Computer L.J. 725 (1985), Ronit Mandelbaum Jan 1986

Defamation And The Public Official: The Big Chill, 6 Computer L.J. 725 (1985), Ronit Mandelbaum

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Legal Protection Of Semiconductor Mask Works In The United States, 6 Computer L.J. 589 (1986), Stephen A. Becker Jan 1986

Legal Protection Of Semiconductor Mask Works In The United States, 6 Computer L.J. 589 (1986), Stephen A. Becker

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Data Accuracy In Criminal Justice Information Systems: The Need For Legislation To Minimize Constitutional Harm, 6 Computer L.J. 677 (1985), Mark A. Beskind Jan 1986

Data Accuracy In Criminal Justice Information Systems: The Need For Legislation To Minimize Constitutional Harm, 6 Computer L.J. 677 (1985), Mark A. Beskind

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Requiring An Election Of Protection For Patentable/Copyrightable Computer Programs, 6 Computer L.J. 607 (1985), Michael J. Kline Jan 1986

Requiring An Election Of Protection For Patentable/Copyrightable Computer Programs, 6 Computer L.J. 607 (1985), Michael J. Kline

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Can Mental Health Professionals Predict Judicial Decisionmaking? Constitutional And Tort Liability Aspects Of The Right Of The Institutionalized Mentally Disabled To Refuse Treatment: On The Cutting Edge, Michael L. Perlin Jan 1986

Can Mental Health Professionals Predict Judicial Decisionmaking? Constitutional And Tort Liability Aspects Of The Right Of The Institutionalized Mentally Disabled To Refuse Treatment: On The Cutting Edge, Michael L. Perlin

Touro Law Review

No abstract provided.


Aids: Testing Democracy - Irrational Responses To The Public Health Crisis And The Need For Privacy In Serologic Testing, 19 J. Marshall L. Rev. 835 (1986), Michael L. Closen, Susan Marie Connor, Howard L. Kaufman, Mark E. Wojcik Jan 1986

Aids: Testing Democracy - Irrational Responses To The Public Health Crisis And The Need For Privacy In Serologic Testing, 19 J. Marshall L. Rev. 835 (1986), Michael L. Closen, Susan Marie Connor, Howard L. Kaufman, Mark E. Wojcik

UIC Law Review

No abstract provided.


Privacy Implications Of Consumer Credit Protection Laws, 19 J. Marshall L. Rev. 941 (1986), Paul B. Rasor Jan 1986

Privacy Implications Of Consumer Credit Protection Laws, 19 J. Marshall L. Rev. 941 (1986), Paul B. Rasor

UIC Law Review

No abstract provided.


The Ninth Amendment: Source Of A Substantive Right To Privacy, 19 J. Marshall L. Rev. 959 (1986), Gerald G. Watson Jan 1986

The Ninth Amendment: Source Of A Substantive Right To Privacy, 19 J. Marshall L. Rev. 959 (1986), Gerald G. Watson

UIC Law Review

No abstract provided.


Conceptualizing National Identification: Informational Privacy Rights Protected, 19 J. Marshall L. Rev. 1007 (1986), Eric Grossman Jan 1986

Conceptualizing National Identification: Informational Privacy Rights Protected, 19 J. Marshall L. Rev. 1007 (1986), Eric Grossman

UIC Law Review

No abstract provided.