Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (33)
- Computer Law (27)
- Science and Technology Law (23)
- Constitutional Law (7)
- Fourth Amendment (5)
-
- National Security Law (5)
- First Amendment (4)
- Law and Society (4)
- Legal Writing and Research (4)
- State and Local Government Law (4)
- Communications Law (3)
- Courts (3)
- Dispute Resolution and Arbitration (3)
- Health Law and Policy (3)
- Jurisprudence (3)
- Labor and Employment Law (3)
- Legislation (3)
- Administrative Law (2)
- Comparative and Foreign Law (2)
- Consumer Protection Law (2)
- Criminal Law (2)
- Intellectual Property Law (2)
- Judges (2)
- Legal History (2)
- Litigation (2)
- Medical Jurisprudence (2)
- Torts (2)
- Agency (1)
- Institution
-
- UIC School of Law (22)
- New York Law School (5)
- Chicago-Kent College of Law (4)
- Schulich School of Law, Dalhousie University (4)
- University of Richmond (4)
-
- Vanderbilt University Law School (4)
- Selected Works (3)
- The Peter A. Allard School of Law (3)
- University of Michigan Law School (2)
- University of Washington School of Law (2)
- Brooklyn Law School (1)
- Cornell University Law School (1)
- Maurer School of Law: Indiana University (1)
- Notre Dame Law School (1)
- Seattle University School of Law (1)
- Southern Methodist University (1)
- University of Baltimore Law (1)
- University of Kentucky (1)
- University of Maine School of Law (1)
- University of Maryland Francis King Carey School of Law (1)
- University of Missouri School of Law (1)
- University of Pennsylvania Carey Law School (1)
- Keyword
-
- Privacy (10)
- Technology (5)
- Cyberspace (4)
- Internet (4)
- Data security (3)
-
- Externalist (3)
- Internal (3)
- Realist (3)
- Social media (3)
- Virtualism (3)
- Virtualist (3)
- Constitution (2)
- Defamation (2)
- Exclusionary rule (2)
- Facebook (2)
- Fair information practices (2)
- First Amendment (2)
- Information privacy (2)
- Internet Law (2)
- Law and Technology (2)
- Libel (2)
- Proportionality (2)
- Access (1)
- Agency (1)
- Anonymous (1)
- Canada (1)
- Civil Procedure (1)
- Civil liberties (1)
- Closed circuit television (1)
- Code (1)
- Publication
-
- UIC John Marshall Journal of Information Technology & Privacy Law (19)
- Chicago-Kent Law Review (4)
- All Faculty Publications (3)
- Articles, Book Chapters, & Popular Press (3)
- NYLS Law Review (3)
-
- UIC Law Review (3)
- Articles & Chapters (2)
- Faculty Publications (2)
- Faculty Scholarship (2)
- Richmond Journal of Law and the Public Interest (2)
- Richmond Public Interest Law Review (2)
- Robert Sprague (2)
- All Faculty Scholarship (1)
- Articles (1)
- Articles by Maurer Faculty (1)
- Cornell Law Faculty Publications (1)
- Dalhousie Law Journal (1)
- Faculty Articles (1)
- Faculty Journal Articles and Book Chapters (1)
- Journal Articles (1)
- Kentucky Law Journal (1)
- Lisa Smith-Butler (1)
- Michigan Law Review (1)
- University of Baltimore Law Review (1)
- University of Michigan Journal of Law Reform (1)
- Vanderbilt Journal of Entertainment & Technology Law (1)
- Vanderbilt Journal of Transnational Law (1)
- Vanderbilt Law Review (1)
- Vanderbilt Law School Faculty Publications (1)
- Washington Journal of Law, Technology & Arts (1)
- Publication Type
Articles 31 - 60 of 65
Full-Text Articles in Privacy Law
The Computer Fraud And Abuse Act: Reassessing The Damage Requirement, 27 J. Marshall J. Computer & Info. L. 279 (2009), Matthew Andris
The Computer Fraud And Abuse Act: Reassessing The Damage Requirement, 27 J. Marshall J. Computer & Info. L. 279 (2009), Matthew Andris
UIC John Marshall Journal of Information Technology & Privacy Law
This comment explores whether a civil plaintiff needs to claim actual damage to a protected computer to recover against a defendant under the CFAA. Several courts have noted that there is little case law regarding damages, and the case law that exists does not help define the reach of damages. Currently, courts are split as to whether a computer system needs to have actual physical damage in order for recovery under the CFAA. Additionally, courts have not adequately addressed how to assess damages, including whether damages may be aggregated across multiple computer systems. The Third, Fifth, and Ninth Circuit Courts …
Changing Tides: A Lesser Expectation Of Privacy In A Post 9/11 World, Derek M. Alphran
Changing Tides: A Lesser Expectation Of Privacy In A Post 9/11 World, Derek M. Alphran
Richmond Journal of Law and the Public Interest
In sum, the Court has in recent years balanced the degree of government intrusion of the individual or place searched against the government's need for the search. This article addresses some of the questions posed by the evolution of the Fourth Amendment doctrine in light of terrorist concerns since 9/11. Part II will address the history of Fourth Amendment jurisprudence, from the Boyd Era of property protection and the use of general warrants to discover evidence of crime, to Olmstead and the development of the right of privacy under the Fourth Amendment. Part III will address the modern test under …
Entry And Service Of Protective Orders In Virginia: Are You Really Protected, Susheela Varky
Entry And Service Of Protective Orders In Virginia: Are You Really Protected, Susheela Varky
Richmond Public Interest Law Review
According to the Virginia Department of State Police, there has been a legislative effort in 2008 and 2009 over the past two years to ensure that essential data from protective orders1 is entered into the Virginia Criminal Information Network ("VCIN") immediately upon the order's issuance. While data entry may seem like a dull topic, the following story highlights the dire significance of this seemingly mundane task.
Cybercrimes Vs. Cyberliberties, Nadine Strossen
Cybercrimes Vs. Cyberliberties, Nadine Strossen
Articles & Chapters
Cybercrimes vs. Cyberliberties, Chapter 8 in Internet Policy and Economics: Challenges and Perspectives 2nd ed. at 110-127 ( W.H. Lehr & L.M. Pupillo, eds. Springer, 2009).
Anonymity In Cyberspace: What Can We Learn From John Doe?, Lyrissa Lidsky
Anonymity In Cyberspace: What Can We Learn From John Doe?, Lyrissa Lidsky
Faculty Publications
This Article examines the evolution of the law governing libel suits against anonymous “John Doe” defendants based on Internet speech. Between 1999 and 2009, courts crafted new First Amendment doctrines to protect Internet speakers from having their anonymity automatically stripped away upon the filing of a libel action. Courts also adapted existing First Amendment protections for hyperbole, satire and other non-factual speech to protect the distinctive discourse of Internet message boards. Despite these positive developments, the current state of the law is unsatisfactory. Because the scope of protection for anonymous Internet speech varies greatly by jurisdiction, resourceful plaintiffs can make …
Comments: Privacy At Risk: Patients Use New Web Products To Store And Share Personal Health Records, Juliana Bell
Comments: Privacy At Risk: Patients Use New Web Products To Store And Share Personal Health Records, Juliana Bell
University of Baltimore Law Review
No abstract provided.
Tuck-It-Away Associates, L.P. V. Empire State Development Corp., Kelly D. Fisher
Tuck-It-Away Associates, L.P. V. Empire State Development Corp., Kelly D. Fisher
NYLS Law Review
No abstract provided.
Conflict Of Law And Surreptitious Taping Of Telephone Conversations, Carol M. Bast
Conflict Of Law And Surreptitious Taping Of Telephone Conversations, Carol M. Bast
NYLS Law Review
No abstract provided.
In The Matter Of Ottinger V. Non-Party The Journal News, Daniel Haier
In The Matter Of Ottinger V. Non-Party The Journal News, Daniel Haier
NYLS Law Review
No abstract provided.
Separated By A Common Language?, Yesha Yadav
Separated By A Common Language?, Yesha Yadav
Vanderbilt Law School Faculty Publications
This paper examines recent controversies in the legal and policy debate between the U.S. and the EU on the sharing of data in the implementation of transatlantic counter-terrorism measures. The nexus between law and policy in this area is particularly close, reflecting the preferences each jurisdiction has in protecting civil liberty and security interests. While the U.S. and the EU offer differing legal frameworks on data privacy, the strategic importance of data in counter-terrorism law and policy necessitates a joint approach. A failure to arrive at such an approach can result in a series of bilateral agreements between the U.S. …
Changing Tides: A Lesser Expectation Of Privacy In A Post 9/11 World, Derek M. Alphran
Changing Tides: A Lesser Expectation Of Privacy In A Post 9/11 World, Derek M. Alphran
Richmond Public Interest Law Review
In sum, the Court has in recent years balanced the degree of government intrusion of the individual or place searched against the government's need for the search. This article addresses some of the questions posed by the evolution of the Fourth Amendment doctrine in light of terrorist concerns since 9/11. Part II will address the history of Fourth Amendment jurisprudence, from the Boyd Era of property protection and the use of general warrants to discover evidence of crime, to Olmstead and the development of the right of privacy under the Fourth Amendment. Part III will address the modern test under …
Entry And Service Of Protective Orders In Virginia: Are You Really Protected, Susheela Varky
Entry And Service Of Protective Orders In Virginia: Are You Really Protected, Susheela Varky
Richmond Journal of Law and the Public Interest
According to the Virginia Department of State Police, there has been a legislative effort in 2008 and 2009 over the past two years to ensure that essential data from protective orders1 is entered into the Virginia Criminal Information Network ("VCIN") immediately upon the order's issuance. While data entry may seem like a dull topic, the following story highlights the dire significance of this seemingly mundane task.
Is The Door Open Or Closed? Evaluating The Future Of The Federal Medical Peer-Review Privilege, 42 J. Marshall L. Rev. 561 (2009), Ghazal Sharifi
Is The Door Open Or Closed? Evaluating The Future Of The Federal Medical Peer-Review Privilege, 42 J. Marshall L. Rev. 561 (2009), Ghazal Sharifi
UIC Law Review
No abstract provided.
Legal Aspects Of Prior Informed Consent On Access To Genetic Resources, Kuei-Jung Ni
Legal Aspects Of Prior Informed Consent On Access To Genetic Resources, Kuei-Jung Ni
Vanderbilt Journal of Transnational Law
Since the Convention on Biological Diversity (CBD) has been in force, national implementation of the access to and benefit-sharing (ABS) requirement on genetic resources has been flourishing. A requirement of prior informed consent (PIC) by the people controlling access to genetic resources constitutes a major instrument to deter illegal bioprospecting and to ensure fair access to genetic resources.
This Article aims to analyze the continuing global lawmaking on PIC and to conduct a comparative study on how genetically rich nations implement the PIC requirement with a view to examining whether the genuine mandate of the CBD has been fulfilled.
This …
When Is Lying Illegal? When Should It Be? A Critical Analysis Of The Federal False Statements Act, 43 J. Marshall L. Rev. 111 (2009), Steven R. Morrison
When Is Lying Illegal? When Should It Be? A Critical Analysis Of The Federal False Statements Act, 43 J. Marshall L. Rev. 111 (2009), Steven R. Morrison
UIC Law Review
No abstract provided.
Islam's Fourth Amendment: Search And Seizure In Islamic Doctrine And Muslim Practice, Sadiq Reza
Islam's Fourth Amendment: Search And Seizure In Islamic Doctrine And Muslim Practice, Sadiq Reza
Articles & Chapters
Modern scholars regularly assert that Islamic law contains privacy protections similar to those of the FourthAmendment to the U.S. Constitution. Two Quranic verses in particular - one that commands Muslims not to enter homes without permission, and one that commands them not to 'spy' - are held up, along with reports from the Traditions (Sunna) that repeat and embellish on these commands, as establishing rules that forbid warrantless searches and seizures by state actors and require the exclusion of evidence obtained in violation of these rules. This Article tests these assertions by: (1) presenting rules and doctrines Muslim jurists of …
How Privacy Killed Katz: A Tale Of Cognitive Freedom And The Property Of Personhood As Fourth Amendment Norm, Christian Halliburton
How Privacy Killed Katz: A Tale Of Cognitive Freedom And The Property Of Personhood As Fourth Amendment Norm, Christian Halliburton
Faculty Articles
This article seeks for the very first time to inform that debate with a notion of property as an essential aspect of human identity in a "mash-up of sorts that might be called Fourth Amendment jurisprudence meets the Radinesque Property of Personhood. Using an expanded version of the notion of property developed by Professor Margaret Radin in her pioneering work Property and Personhood, the Fourth Amendment must contend with the social reality that some aspects of "ownership" or entitlement to property, and some level of vindication of those interests, are essential to the formation and viability of complete human beings. …
Understanding The New Virtualist Paradigm, Jonathon Penney
Understanding The New Virtualist Paradigm, Jonathon Penney
Articles, Book Chapters, & Popular Press
This article discusses the central ideas within an emerging body of cyberlaw scholarship I have elsewhere called the "New Virtualism". We now know that the original "virtualists"- those first generation cyberlaw scholars who believed virtual worlds and spaces were immune to corporate and state control - were wrong; these days, such state and corporate interests are ubiquitous in cyberspace and the Internet. But is this it? Is there not anything else we can learn about cyberlaw from the virtualists and their utopian dreams? I think so. In fact, the New Virtualist paradigm of cyberlaw scholarship draws on the insights of …
Understanding The New Virtualist Paradigm, Jonathon Penney
Understanding The New Virtualist Paradigm, Jonathon Penney
Articles, Book Chapters, & Popular Press
This article discusses the central ideas within an emerging body of cyberlaw scholarship I have elsewhere called the "New Virtualism". We now know that the original "virtualists"- those first generation cyberlaw scholars who believed virtual worlds and spaces were immune to corporate and state control - were wrong; these days, such state and corporate interests are ubiquitous in cyberspace and the Internet. But is this it? Is there not anything else we can learn about cyberlaw from the virtualists and their utopian dreams? I think so. In fact, the New Virtualist paradigm of cyberlaw scholarship draws on the insights of …
Privacy And The New Virtualism, Jonathon Penney
Privacy And The New Virtualism, Jonathon Penney
Articles, Book Chapters, & Popular Press
First generation cyberlaw scholars were deeply influenced by the uniqueness of cyberspace, and believed its technology and scope meant it could not be controlled by any government. Few still ascribe to this utopian vision. However, there is now a growing body of second generation cyberlaw scholarship that speaks not only to the differential character of cyberspace, but also analyzes legal norms within virtual spaces while drawing connections to our experience in real space. I call this the New Virtualism. Situated within this emerging scholarship, this article offers a new approach to privacy in virtual spaces by drawing on what Orin …
Putting Surveillance On The Political Agenda – A Short Defence Of Surveillance: Citizens And The State, Benjamin J. Goold, Charles D. Raab
Putting Surveillance On The Political Agenda – A Short Defence Of Surveillance: Citizens And The State, Benjamin J. Goold, Charles D. Raab
All Faculty Publications
In February 2009 the House of Lords Constitutional Committee in the United Kingdom published the report Surveillance: Citizens and the State. Some have hailed this as a landmark document. Volume 6(3) of Surveillance & Society published 4 invited responses to this report written by prominent scholars. In the attached paper the two Specialist Advisers to this Committee set the context for the report and provide a brief rejoinder to the four responses. NOTE: The authors write in their academic and personal capacities, and not as representatives of the Committee.
Dying To Know: A Demand For Genuine Public Access To Clinical Trial Results Data, Christine Galbraith Davik
Dying To Know: A Demand For Genuine Public Access To Clinical Trial Results Data, Christine Galbraith Davik
Faculty Publications
Four years ago at the age of 34, I heard the awful words "I'm sorry, but you have breast cancer" coming from my doctor. After the initial shock of the diagnosis wore off, I like many others who have faced life-threatening diseases began to work with a team of physicians to develop an appropriate treatment plan, which included contemplating enrollment in a clinical trial. Quite unexpectedly, my position as an intellectual property professor whose scholarship focuses primarily on information control, my role as a member of my university's Institutional Review Board that oversees studies involving human subjects, and my newly …
Two Notions Of Privacy Online, Avner Levin, Patricia S. Abril
Two Notions Of Privacy Online, Avner Levin, Patricia S. Abril
Vanderbilt Journal of Entertainment & Technology Law
Users of social networking websites tend to disclose much personal information online yet seem to retain some form of an expectation of privacy. Is this expectation of privacy always unreasonable? How do users of online social networks define their expectations of privacy online?
These questions were the impetus behind an empirical study, the findings of which are presented in this Article. The project, simultaneously conducted in Canada, at Ryerson University, and in the United States, at the University of Miami, consisted of a survey regarding personal information protection and expectations of privacy on online social networks (OSNs). Approximately 2,500 young …
Are "Better" Security Breach Notification Laws Possible?, Jane K. Winn
Are "Better" Security Breach Notification Laws Possible?, Jane K. Winn
Articles
This Article will evaluate the provisions of California's pioneering security breach notification law (SBNL) in light of "better regulation" or "smart regulation" criteria in order to highlight the costs of taking a narrowly focused, piecemeal approach and the benefits of taking a more comprehensive perspective to the problems of identity theft and information security. Just as the basic structure of SBNLs was borrowed from environmental law, this Article will borrow from decades of analysis of the impact of environmental regulation to evaluate the likely impact of SBNLs.
Just as environmental laws can be used to reduce externalities created through the …
Race, Gender, And Genetic Technologies: A New Reproductive Dystopia?, Dorothy E. Roberts
Race, Gender, And Genetic Technologies: A New Reproductive Dystopia?, Dorothy E. Roberts
All Faculty Scholarship
No abstract provided.
The U.S. Discovery-Eu Privacy Directive Conflict: Constructing A Three-Tiered Compliance Strategy, Carla L. Reyes
The U.S. Discovery-Eu Privacy Directive Conflict: Constructing A Three-Tiered Compliance Strategy, Carla L. Reyes
Faculty Journal Articles and Book Chapters
This note examines the conflicts of laws issue faced by trans-border civil litigants attempting to comply with both the U.S. Federal Rules of Civil Procedure and the requirements of the EU Privacy Directive. This note first sifts through the quagmire of regulations, and then attempts to help trans-border litigants view the U.S. discovery-EU data protection conflict through a transnational legal lens, and concludes by constructing a three-tiered strategy for compliance that respects U.S., EU and international law.
David Doe V. Goliath, Inc.: Judicial Ferment In 2009 For Business Plaintiffs Seeking The Identities Of Anonymous Online Speakers, 43 J. Marshall L. Rev. 1 (2009), Clay Calvert, Kayla Gutierrez, Karla D. Kennedy, Kara Carnley Murrhee
David Doe V. Goliath, Inc.: Judicial Ferment In 2009 For Business Plaintiffs Seeking The Identities Of Anonymous Online Speakers, 43 J. Marshall L. Rev. 1 (2009), Clay Calvert, Kayla Gutierrez, Karla D. Kennedy, Kara Carnley Murrhee
UIC Law Review
No abstract provided.
Updating Data Protection: Part I -- Identifying The Objectives, Fred H. Cate
Updating Data Protection: Part I -- Identifying The Objectives, Fred H. Cate
Articles by Maurer Faculty
No abstract provided.
Private Norms And Public Spaces, Nicole Stelle Garnett
Private Norms And Public Spaces, Nicole Stelle Garnett
Journal Articles
This Essay explores the role of private norms in the allocation of urban public spaces as well as local governments' efforts to enforce these norms. The Essay was prepared for the 2008 Brigham-Kanner Property Rights Conference, William and Mary School of Law, as a tribute to Robert Ellickson. community policing, informal norms
Surveillance And The Political Value Of Privacy, Benjamin J. Goold
Surveillance And The Political Value Of Privacy, Benjamin J. Goold
All Faculty Publications
The steady expansion in the use of surveillance technologies by the state and private sector represents a substantial threat to the privacy of ordinary individuals. Yet despite the best efforts of civil libertarians, many members of the public still struggle to understand why privacy is valuable and deserves to be protected as a basic right. In part, this is a result of the inherent complexity of the idea of privacy, but it is also due a tendency on the part of privacy advocates to focus on the individual - as opposed to the social and political dimensions - of privacy. …