Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Science and Technology Law (52)
- Internet Law (49)
- Computer Law (48)
- Intellectual Property Law (27)
- Constitutional Law (7)
-
- Legal Writing and Research (6)
- Criminal Law (5)
- Criminal Procedure (5)
- Fourth Amendment (5)
- Juvenile Law (5)
- Civil Rights and Discrimination (4)
- Comparative and Foreign Law (3)
- Courts (3)
- Election Law (3)
- Family Law (3)
- First Amendment (3)
- Health Law and Policy (3)
- Jurisprudence (3)
- Law Enforcement and Corrections (3)
- Legal History (3)
- Legal Remedies (3)
- Litigation (3)
- Arts and Humanities (2)
- Business (2)
- Common Law (2)
- Consumer Protection Law (2)
- Education Law (2)
- Entertainment, Arts, and Sports Law (2)
- Institution
-
- UIC School of Law (36)
- Schulich School of Law, Dalhousie University (17)
- University of Michigan Law School (3)
- Vanderbilt University Law School (3)
- West Virginia University (3)
-
- Loyola University Chicago, School of Law (2)
- New York Law School (2)
- Selected Works (2)
- University of Washington School of Law (2)
- Boston University School of Law (1)
- Brigham Young University Law School (1)
- Brooklyn Law School (1)
- Florida State University College of Law (1)
- Maurer School of Law: Indiana University (1)
- Mitchell Hamline School of Law (1)
- Seattle University School of Law (1)
- University of Colorado Law School (1)
- University of Kentucky (1)
- University of Pennsylvania Carey Law School (1)
- Washington and Lee University School of Law (1)
- Keyword
-
- Privacy (7)
- Right of privacy (3)
- Access doctrine (2)
- Anonymity (2)
- Anonymous (2)
-
- Arrest (2)
- Arrest records (2)
- Arrestee (2)
- Book reviews (2)
- Case comment (2)
- Common law privacy (2)
- Confidentiality (2)
- Corporations (2)
- Criminal (2)
- Criminal defendant (2)
- E-commerce (2)
- Fourth amendment (2)
- Government information (2)
- Information (2)
- Informational privacy (2)
- Intellectual property (2)
- Internet (2)
- Juvenile (2)
- Personal information (2)
- Private facts (2)
- Probable cause (2)
- Pseudonymous (2)
- Public disclosure (2)
- Reputation (2)
- Secrecy (2)
- Publication
-
- UIC John Marshall Journal of Information Technology & Privacy Law (27)
- Canadian Journal of Law and Technology (17)
- UIC Review of Intellectual Property Law (6)
- Faculty Scholarship (3)
- West Virginia Law Review (3)
-
- Public Interest Law Reporter (2)
- UIC Law Review (2)
- Vanderbilt Law School Faculty Publications (2)
- All Faculty Scholarship (1)
- Articles & Chapters (1)
- Articles by Maurer Faculty (1)
- Brigham Young University International Law & Management Review (1)
- Kentucky Law Journal (1)
- Michigan Journal of International Law (1)
- Michigan Law Review (1)
- Michigan Telecommunications & Technology Law Review (1)
- NYLS Law Review (1)
- Scholarly Articles (1)
- Scholarly Publications (1)
- Seattle Journal for Social Justice (1)
- Stephen E Henderson (1)
- UIC Law Open Access Faculty Scholarship (1)
- Ugo Mattei (1)
- University of Colorado Law Review (1)
- Vanderbilt Law Review (1)
- Washington International Law Journal (1)
- Washington Journal of Law, Technology & Arts (1)
- Publication Type
Articles 1 - 30 of 81
Full-Text Articles in Privacy Law
Small Hope Floats: How The Lower Courts Have Sunk The Right Of Privacy, Stephanie D. Taylor
Small Hope Floats: How The Lower Courts Have Sunk The Right Of Privacy, Stephanie D. Taylor
West Virginia Law Review
No abstract provided.
A Local Distinction: State Education Privacy Laws For Public School Children, Susan P. Stuart
A Local Distinction: State Education Privacy Laws For Public School Children, Susan P. Stuart
West Virginia Law Review
No abstract provided.
Taking The Stand: The Lessons Of The Three Men Who Took The Japanese American Internment To Court, Lorraine K. Bannai
Taking The Stand: The Lessons Of The Three Men Who Took The Japanese American Internment To Court, Lorraine K. Bannai
Seattle Journal for Social Justice
No abstract provided.
The Revamped Fisa: Striking A Better Balance Between The Government's Need To Protect Itself And The 4th Amendment, J. Christopher Champion
The Revamped Fisa: Striking A Better Balance Between The Government's Need To Protect Itself And The 4th Amendment, J. Christopher Champion
Vanderbilt Law Review
The investigations of the 9/11 terrorist attacks highlighted a series of lapses in intelligence-sharing within the federal government regarding terrorist operations. One area closely examined by Congress,' the judiciary, and many legal and political commentators is the appropriate scope of intelligence collection within the United States "concerning foreign threats to the nation's security" ("foreign intelligence"). Domestic intelligence collection is a particularly complex sphere of national security as gathering intelligence on American soil requires balancing the privacy rights of individuals guaranteed by the Fourth Amendment against the nation's need to protect itself.
The Foreign Intelligence Surveillance Act of 1978 ("FISA") governs …
'Code' And The Slow Erosion Of Privacy, Bert-Jaap Koops, Ronald Leenes
'Code' And The Slow Erosion Of Privacy, Bert-Jaap Koops, Ronald Leenes
Michigan Telecommunications & Technology Law Review
The notion of software code replacing legal code as a mechanism to control human behavior--"code as law"--is often illustrated with examples in intellectual property and freedom of speech. This Article examines the neglected issue of the impact of "code as law" on privacy. To what extent is privacy-related "code" being used, either to undermine or to enhance privacy? On the basis of cases in the domains of law enforcement, national security, E-government, and commerce, it is concluded that technology rarely incorporates specific privacy-related norms. At the same time, however, technology very often does have clear effects on privacy, as it …
The Material-Fetal Conflict: The Right Of A Woman To Refuse A Cesarean Section Versus The State's Interest In Saving The Life Of The Fetus, Daniel R. Levy Esq.
The Material-Fetal Conflict: The Right Of A Woman To Refuse A Cesarean Section Versus The State's Interest In Saving The Life Of The Fetus, Daniel R. Levy Esq.
West Virginia Law Review
No abstract provided.
The Eu Data Protection Directive: Implementing A Worldwide Data Protection Regime And How The U.S. Position Has Progressed, Seth P. Hobby
The Eu Data Protection Directive: Implementing A Worldwide Data Protection Regime And How The U.S. Position Has Progressed, Seth P. Hobby
Brigham Young University International Law & Management Review
No abstract provided.
Safe Harbor Agreement—Boon Or Bane?, Sylvia Mercado Kierkegaard
Safe Harbor Agreement—Boon Or Bane?, Sylvia Mercado Kierkegaard
Washington Journal of Law, Technology & Arts
U.S. businesses that handle personal information about individuals living in European Union countries should be aware that, as a general rule, it is unlawful for them to transfer that data out of the European Union to the United States. Exceptions to this general prohibition apply in specified circumstances, that is, where there is consent to the transfer or where there is some assurance that U.S. businesses will comply with the transfers requirements of EU privacy laws when handling that information. These restrictions apply to U.S. businesses that have employees or customers in EU countries, as well as U.S. businesses that …
Unmasking The John Does Of Cyberspace: Surveillance By Private Copyright Owners, Amy Min-Chee Fong
Unmasking The John Does Of Cyberspace: Surveillance By Private Copyright Owners, Amy Min-Chee Fong
Canadian Journal of Law and Technology
The goals of this paper are to: (1) explore the expectations of cyberspace privacy in a peer-to-peer context; (2) examine the consequences to Internet users arising from the surveillance tactics of private copyright owners; and (3) discuss possible ways in which a balance can be achieved between privacy and intellectual property rights. Part II of this paper sets out the meaning of information privacy, discusses the widespread use of peer-to-peer networks for trading copyrighted content, and examines the expectations of privacy in peer-to-peer networks. Part III discusses the surveillance tactics of private copyright owners, and explains how the surveillance of …
What The Dormouse Said: How The Sixties Counterculture Shaped The Personal Computer By John Markoff (New York: Penguin, 2005), Vaughan Black
What The Dormouse Said: How The Sixties Counterculture Shaped The Personal Computer By John Markoff (New York: Penguin, 2005), Vaughan Black
Canadian Journal of Law and Technology
What the Dormouse Said is the revisionary back- story of Silicon Valley; in particular, the roots of the current model of human interface with personal com- puters (video screen, keyboard, mouse) and the early stabs at creating the Internet. Markoff is a long-standing hi-tech reporter for the New York Times who, over the past 20 years, has co-written three computer-related books. In Dormouse, his fourth book (but first solo effort), he takes us back to the pre-ironic age — ‘‘the Flintstones era of computers’’ — when batch processing and beatniks still roamed the earth. His claim is that the various …
The Role Of Levies In Canada's Digital Music Marketplace, Jeremy F. Debeer
The Role Of Levies In Canada's Digital Music Marketplace, Jeremy F. Debeer
Canadian Journal of Law and Technology
This paper considers whether such initiatives are a desirable alternative to the current system of exclusive proprietary copyrights. My goal is not to evaluate the nuances of any particular levy scheme or proposal, but to consider the implications of the concept from a specifically Canadian perspective. Despite the generality of the analysis, many of the observations and conclusions about the viability of levy schemes relate to Canada’s actual experiences with its existing private copying levy.
The paper concludes that tariffs or levies on the products and services of third parties are not the best method to support the Canadian music …
Cryptography Export Controls - Canada's Dichotomous Cryptography Policy, Paul Bates
Cryptography Export Controls - Canada's Dichotomous Cryptography Policy, Paul Bates
Canadian Journal of Law and Technology
The effort to erect strong legal barriers to trans-national distribution of cryptography has significant gaps because strong cryptography can be obtained and used within Canada without legal restrictions. This paper advocates that Canada should exercise its discretion under the WA to diminish, not fortify, the restrictions of the export control regime.
Legal Restrictions On Transborder Data Flows To Prevent Government Access To Personal Data: Lessons From British Columbia, Fred H. Cate
Legal Restrictions On Transborder Data Flows To Prevent Government Access To Personal Data: Lessons From British Columbia, Fred H. Cate
Articles by Maurer Faculty
No abstract provided.
Commercial Trusts In European Private Law, Ugo Mattei, Lionel D. Smith, Michele Graziadei
Commercial Trusts In European Private Law, Ugo Mattei, Lionel D. Smith, Michele Graziadei
Ugo Mattei
In European legal systems, a variety of approaches to trust and relationships of trust meet the universal professionalisation of asset management services. This book explores that interface in order to seek a better understanding of the legal regulation of the entrustment of wealth. Within the methodology of the Common Core of European Private Law, the book sets out cases on the establishment and termination of management relationships, obligations of loyalty and of professionalism, and the choice of law. More specialized cases address collective investment, collective secured lending, pension funds, and securitisation. Reports on these cases from fifteen jurisdictions of the …
Genetic Information, Privacy And Insolvency, Edward J. Janger
Genetic Information, Privacy And Insolvency, Edward J. Janger
Faculty Scholarship
No abstract provided.
Rising Governmental Use Of Biometric Technology: An Analysis Of The United States Visitor And Immigrant Status Indicator Technology Program, Lisa Madelon Campbell
Rising Governmental Use Of Biometric Technology: An Analysis Of The United States Visitor And Immigrant Status Indicator Technology Program, Lisa Madelon Campbell
Canadian Journal of Law and Technology
This article explores increased governmental interest in the use of biometric measurements as a means of identifying individuals and tracing their movements. Private industries, of course, are equally interested in biometrics, and often similarly capable of collecting and storing biometric information. For example, merchants in the United Kingdom require customers who pay by cheque to provide a thumbprint as an additional security measure against potential fraud. The issues raised by the use of biometrics in the private sector are somewhat different than those that arise in the public context. This article explores the increased reli- ance upon individual biometric measurements …
I Click, You Click, We All Click - But Do We Have A Contract? A Case Comment On Aspenceri.Com V. Paysystems, Charles Morgan
I Click, You Click, We All Click - But Do We Have A Contract? A Case Comment On Aspenceri.Com V. Paysystems, Charles Morgan
Canadian Journal of Law and Technology
It is trite to say that e-commerce has exploded over the last several years. Canadian individuals and businesses are entering into thousands and thousands of contracts online all the time. Yet, oddly enough, there is surprisingly little legal certainty or consistency regarding an essential legal question: what approach to online contract formation will create a binding legal contract? Such legal uncertainty is unfortunate, since buyers need to know when to ‘‘beware’’, merchants need to be able to manage risk, and courts need to have clear guidelines in order to be able to render informed, coherent decisions.
The issue of online …
Intelligent Agents: Authors, Makers, And Owners Of Computer-Generated Works In Canadian Copyright Law, Rex M. Shoyama
Intelligent Agents: Authors, Makers, And Owners Of Computer-Generated Works In Canadian Copyright Law, Rex M. Shoyama
Canadian Journal of Law and Technology
The central objective of this article is to propose a clarification of copyright law as applied to works created by intelligent agents. In Part I, the concepts of artificial intelligence and intelligent agents are introduced. Part II identifies the challenges that are presented to the tests of originality and authorship in the application of copyright to works generated by intelligent agents. It is argued that works created by intelligent agents may meet the tests of originality and authorship. It is also argued that the con- cepts of ‘‘author’’, ‘‘owner’’, and ‘‘maker’’ are distinct from one another in Canadian copyright law. …
L'Affaire Huntsman C. Soderbergh Ou Le Droit D'Expurger Les Films, René Pépin
L'Affaire Huntsman C. Soderbergh Ou Le Droit D'Expurger Les Films, René Pépin
Canadian Journal of Law and Technology
Deux éléments nous motivent. D’abord, comme on le devine, la technologie évolue à un rythme rapide en ce domaine. On n’en est plus au temps où les films étaient produits unique- ment sur une véritable pellicule de plastique qu’un censeur pouvait insérer dans une machine qui lui permettait littéralement de couper des parties indésirables et de recoller les embouts. L’informatique a envahi ce domaine. Il y a maintenant des logiciels sophistiqués qui agissent comme interface entre un disque DVD et l’écran, permettant au consommateur de choisir lui-même les séquences qui seront enlevées dans un film. On comprend que ceci pose …
Biotechnology Unglued: Science, Society, And Social Cohesion By Michael D. Mehta, Ed. (Vancouver: Ubc Press, 2005), Chidi Oguamanam
Biotechnology Unglued: Science, Society, And Social Cohesion By Michael D. Mehta, Ed. (Vancouver: Ubc Press, 2005), Chidi Oguamanam
Canadian Journal of Law and Technology
In Biotechnology Unglued, Mehta and his thirteen-member interdisciplinary team, comprising mainly of social scientists using a number of ‘‘case studies’’, explore in nine essays ‘‘how advances in agricultural, medical, and forensic biotechnology may threaten the social cohesiveness of different kinds of communities and at different scales’’. In a way, the project is a successful attempt to underscore the theme of (and imperative for) social accountability of science and bio/technological innovations. This 208-page collection of nine essays in a corresponding number of chapters is a remarkable effort. It is a departure from the traditional concerns regarding biotechnology innovations which, hitherto, emphasized …
Virtual Playgrounds And Buddybots: A Data-Minefield For Tweens, Valerie Steeves, Ian R. Kerr
Virtual Playgrounds And Buddybots: A Data-Minefield For Tweens, Valerie Steeves, Ian R. Kerr
Canadian Journal of Law and Technology
This article examines the online places where tweens play, chat, and hang out. We argue that the vision behind these places is defined by commercial imperatives that seek to embed surveillance deeper and deeper into children’s playgrounds and social interactions. Online marketers do more than implant branded products into a child’s play; they collect the minute details of a child’s life so they can build a ‘‘relationship’’ of ‘‘trust’’ between the child and brand. Although marketing to children is not new, a networked environment magnifies the effect on a child’s identity because it opens up a child’s private online spaces …
Privacy And The Criminal Arrestee Or Suspect: In Search Of A Right, In Need Of A Rule, Sadiq Reza
Privacy And The Criminal Arrestee Or Suspect: In Search Of A Right, In Need Of A Rule, Sadiq Reza
Articles & Chapters
Criminal accusation stigmatizes. Merely having been accused of a crime lasts in the public eye, damaging one's reputation and threatening current and future employment, relationships, social status, and more. But vast numbers of criminal cases are dismissed soon after arrest, and countless accusations are unfounded orunprovable. Nevertheless, police officers and prosecutors routinely name criminal accusees to the public upon arrest or suspicion, with no obligation to publicize a defendant's exoneration, or the dismissal of his case, or a decision not to file charges against him at all. Other individuals caught up in the criminal process enjoy protections against the public …
California School Abandons Electronic Tracking Program, Maura Deady
California School Abandons Electronic Tracking Program, Maura Deady
Public Interest Law Reporter
No abstract provided.
Government, Business Tries To Keep Pace With Growing Identity Theft Crisis, Eileen Hughes
Government, Business Tries To Keep Pace With Growing Identity Theft Crisis, Eileen Hughes
Public Interest Law Reporter
No abstract provided.
Fundamentals Of Information Technology By Sunny Handa (Markham: Lexisnexis Canada Inc., 2004), Barbara Darby
Fundamentals Of Information Technology By Sunny Handa (Markham: Lexisnexis Canada Inc., 2004), Barbara Darby
Canadian Journal of Law and Technology
In the early 1990s, I purchased my first stereo with a CD player. I found myself trapped in a conversation with someone who tried to convince me that it was utter folly not to buy a turntable, because CD technology simply couldn’t replicate the ‘‘warmth’’ of vinyl. Had I only Handa’s book to hand, I could have provided a straight- forward and understandable explanation for why my records were well enough left in my parents’ basement; although ‘‘digitization . . . fails to record all characteristics of analog data, even at the highest finite sampling rate . . . Complete …
Calling In The Dogs: Suspicionless Sniff Searches And Reasonable Expectations Of Privacy, 56 Case W. Res. L. Rev. 285 (2005), Cecil J. Hunt Ii
Calling In The Dogs: Suspicionless Sniff Searches And Reasonable Expectations Of Privacy, 56 Case W. Res. L. Rev. 285 (2005), Cecil J. Hunt Ii
UIC Law Open Access Faculty Scholarship
No abstract provided.
Copyright & Privacy - Through The Legislative Lens, 4 J. Marshall Rev. Intell. Prop. L. 266 (2005), Marybeth Peters
Copyright & Privacy - Through The Legislative Lens, 4 J. Marshall Rev. Intell. Prop. L. 266 (2005), Marybeth Peters
UIC Review of Intellectual Property Law
The Honorable Marybeth Peters, who has served since 1994 as the Register of Copyrights for the United States Copyright Office of the Library of Congress, presented a post-election report on the legislative agenda in Washington, D.C. regarding rejected, pending and future amendments to the copyright law of the United States. Register Peters also discussed the current policy role of the United States Copyright Office and several court actions that contest the constitutionality of various provisions of the copyright law.
Copyright & Privacy - Through The Privacy Lens, 4 J. Marshall Rev. Intell. Prop. L. 273 (2005), Julie E. Cohen, David E. Sorkin, Peter P. Swire
Copyright & Privacy - Through The Privacy Lens, 4 J. Marshall Rev. Intell. Prop. L. 273 (2005), Julie E. Cohen, David E. Sorkin, Peter P. Swire
UIC Review of Intellectual Property Law
What legal tools do privacy advocates have available to defend an individual’s right to privacy? How far does this right go? How should these rights be defended—or if necessary—curtailed? What is the role of Government, of the practicing bar and of academics?
Copyright & Privacy - Through The Copyright Lens, 4 J. Marshall Rev. Intell. Prop. L. 212 (2005), Sarah B. Deutsch, Roderick G. Dorman, Michael A. Geist, Hugh C. Hansen, Howard P. Knopf, Ralph Oman, Matthew J. Oppenheim, John G. Palfrey
Copyright & Privacy - Through The Copyright Lens, 4 J. Marshall Rev. Intell. Prop. L. 212 (2005), Sarah B. Deutsch, Roderick G. Dorman, Michael A. Geist, Hugh C. Hansen, Howard P. Knopf, Ralph Oman, Matthew J. Oppenheim, John G. Palfrey
UIC Review of Intellectual Property Law
This panel examines the recent litigation by the recording industry against peer-to-peer (“P2P”) users in the U.S. and Canada. How are users’ identities being obtained? Is the process working well enough or too well? What are the technical, evidentiary, procedural, privacy and substantive copyright issues in play?
Copyright & Privacy - Through The Technology Lens, 4 J. Marshall Rev. Intell. Prop. L. 242 (2005), Michael A. Geist, Doris E. Long, Leslie Ann Reis, David E. Sorkin, Fred Von Lohmann
Copyright & Privacy - Through The Technology Lens, 4 J. Marshall Rev. Intell. Prop. L. 242 (2005), Michael A. Geist, Doris E. Long, Leslie Ann Reis, David E. Sorkin, Fred Von Lohmann
UIC Review of Intellectual Property Law
How is new technology impacting on the more general question of privacy in cyberspace? Is the original notion of an expectation of anonymity on the internet still viable? Can technology pierce through the expectation of privacy even without judicial interference? Do individuals need protection from such technology? Is there technology available to protect the individual? Should these technological tools be regulated? Should the law differentiate between various types of alleged “illegal” behavior; e.g., IP infringement, defamation, possession of pornography and terrorism? Are there international standards that can assist in regulating the intersection between technology and privacy in cyberspace?