Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2009

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 31 - 60 of 65

Full-Text Articles in Privacy Law

The Computer Fraud And Abuse Act: Reassessing The Damage Requirement, 27 J. Marshall J. Computer & Info. L. 279 (2009), Matthew Andris Jan 2009

The Computer Fraud And Abuse Act: Reassessing The Damage Requirement, 27 J. Marshall J. Computer & Info. L. 279 (2009), Matthew Andris

UIC John Marshall Journal of Information Technology & Privacy Law

This comment explores whether a civil plaintiff needs to claim actual damage to a protected computer to recover against a defendant under the CFAA. Several courts have noted that there is little case law regarding damages, and the case law that exists does not help define the reach of damages. Currently, courts are split as to whether a computer system needs to have actual physical damage in order for recovery under the CFAA. Additionally, courts have not adequately addressed how to assess damages, including whether damages may be aggregated across multiple computer systems. The Third, Fifth, and Ninth Circuit Courts …


Changing Tides: A Lesser Expectation Of Privacy In A Post 9/11 World, Derek M. Alphran Jan 2009

Changing Tides: A Lesser Expectation Of Privacy In A Post 9/11 World, Derek M. Alphran

Richmond Journal of Law and the Public Interest

In sum, the Court has in recent years balanced the degree of government intrusion of the individual or place searched against the government's need for the search. This article addresses some of the questions posed by the evolution of the Fourth Amendment doctrine in light of terrorist concerns since 9/11. Part II will address the history of Fourth Amendment jurisprudence, from the Boyd Era of property protection and the use of general warrants to discover evidence of crime, to Olmstead and the development of the right of privacy under the Fourth Amendment. Part III will address the modern test under …


Entry And Service Of Protective Orders In Virginia: Are You Really Protected, Susheela Varky Jan 2009

Entry And Service Of Protective Orders In Virginia: Are You Really Protected, Susheela Varky

Richmond Public Interest Law Review

According to the Virginia Department of State Police, there has been a legislative effort in 2008 and 2009 over the past two years to ensure that essential data from protective orders1 is entered into the Virginia Criminal Information Network ("VCIN") immediately upon the order's issuance. While data entry may seem like a dull topic, the following story highlights the dire significance of this seemingly mundane task.


Cybercrimes Vs. Cyberliberties, Nadine Strossen Jan 2009

Cybercrimes Vs. Cyberliberties, Nadine Strossen

Articles & Chapters

Cybercrimes vs. Cyberliberties, Chapter 8 in Internet Policy and Economics: Challenges and Perspectives 2nd ed. at 110-127 ( W.H. Lehr & L.M. Pupillo, eds. Springer, 2009).


Anonymity In Cyberspace: What Can We Learn From John Doe?, Lyrissa Lidsky Jan 2009

Anonymity In Cyberspace: What Can We Learn From John Doe?, Lyrissa Lidsky

Faculty Publications

This Article examines the evolution of the law governing libel suits against anonymous “John Doe” defendants based on Internet speech. Between 1999 and 2009, courts crafted new First Amendment doctrines to protect Internet speakers from having their anonymity automatically stripped away upon the filing of a libel action. Courts also adapted existing First Amendment protections for hyperbole, satire and other non-factual speech to protect the distinctive discourse of Internet message boards. Despite these positive developments, the current state of the law is unsatisfactory. Because the scope of protection for anonymous Internet speech varies greatly by jurisdiction, resourceful plaintiffs can make …


Comments: Privacy At Risk: Patients Use New Web Products To Store And Share Personal Health Records, Juliana Bell Jan 2009

Comments: Privacy At Risk: Patients Use New Web Products To Store And Share Personal Health Records, Juliana Bell

University of Baltimore Law Review

No abstract provided.


Tuck-It-Away Associates, L.P. V. Empire State Development Corp., Kelly D. Fisher Jan 2009

Tuck-It-Away Associates, L.P. V. Empire State Development Corp., Kelly D. Fisher

NYLS Law Review

No abstract provided.


Conflict Of Law And Surreptitious Taping Of Telephone Conversations, Carol M. Bast Jan 2009

Conflict Of Law And Surreptitious Taping Of Telephone Conversations, Carol M. Bast

NYLS Law Review

No abstract provided.


In The Matter Of Ottinger V. Non-Party The Journal News, Daniel Haier Jan 2009

In The Matter Of Ottinger V. Non-Party The Journal News, Daniel Haier

NYLS Law Review

No abstract provided.


Separated By A Common Language?, Yesha Yadav Jan 2009

Separated By A Common Language?, Yesha Yadav

Vanderbilt Law School Faculty Publications

This paper examines recent controversies in the legal and policy debate between the U.S. and the EU on the sharing of data in the implementation of transatlantic counter-terrorism measures. The nexus between law and policy in this area is particularly close, reflecting the preferences each jurisdiction has in protecting civil liberty and security interests. While the U.S. and the EU offer differing legal frameworks on data privacy, the strategic importance of data in counter-terrorism law and policy necessitates a joint approach. A failure to arrive at such an approach can result in a series of bilateral agreements between the U.S. …


Changing Tides: A Lesser Expectation Of Privacy In A Post 9/11 World, Derek M. Alphran Jan 2009

Changing Tides: A Lesser Expectation Of Privacy In A Post 9/11 World, Derek M. Alphran

Richmond Public Interest Law Review

In sum, the Court has in recent years balanced the degree of government intrusion of the individual or place searched against the government's need for the search. This article addresses some of the questions posed by the evolution of the Fourth Amendment doctrine in light of terrorist concerns since 9/11. Part II will address the history of Fourth Amendment jurisprudence, from the Boyd Era of property protection and the use of general warrants to discover evidence of crime, to Olmstead and the development of the right of privacy under the Fourth Amendment. Part III will address the modern test under …


Entry And Service Of Protective Orders In Virginia: Are You Really Protected, Susheela Varky Jan 2009

Entry And Service Of Protective Orders In Virginia: Are You Really Protected, Susheela Varky

Richmond Journal of Law and the Public Interest

According to the Virginia Department of State Police, there has been a legislative effort in 2008 and 2009 over the past two years to ensure that essential data from protective orders1 is entered into the Virginia Criminal Information Network ("VCIN") immediately upon the order's issuance. While data entry may seem like a dull topic, the following story highlights the dire significance of this seemingly mundane task.


Is The Door Open Or Closed? Evaluating The Future Of The Federal Medical Peer-Review Privilege, 42 J. Marshall L. Rev. 561 (2009), Ghazal Sharifi Jan 2009

Is The Door Open Or Closed? Evaluating The Future Of The Federal Medical Peer-Review Privilege, 42 J. Marshall L. Rev. 561 (2009), Ghazal Sharifi

UIC Law Review

No abstract provided.


Legal Aspects Of Prior Informed Consent On Access To Genetic Resources, Kuei-Jung Ni Jan 2009

Legal Aspects Of Prior Informed Consent On Access To Genetic Resources, Kuei-Jung Ni

Vanderbilt Journal of Transnational Law

Since the Convention on Biological Diversity (CBD) has been in force, national implementation of the access to and benefit-sharing (ABS) requirement on genetic resources has been flourishing. A requirement of prior informed consent (PIC) by the people controlling access to genetic resources constitutes a major instrument to deter illegal bioprospecting and to ensure fair access to genetic resources.

This Article aims to analyze the continuing global lawmaking on PIC and to conduct a comparative study on how genetically rich nations implement the PIC requirement with a view to examining whether the genuine mandate of the CBD has been fulfilled.

This …


When Is Lying Illegal? When Should It Be? A Critical Analysis Of The Federal False Statements Act, 43 J. Marshall L. Rev. 111 (2009), Steven R. Morrison Jan 2009

When Is Lying Illegal? When Should It Be? A Critical Analysis Of The Federal False Statements Act, 43 J. Marshall L. Rev. 111 (2009), Steven R. Morrison

UIC Law Review

No abstract provided.


Islam's Fourth Amendment: Search And Seizure In Islamic Doctrine And Muslim Practice, Sadiq Reza Jan 2009

Islam's Fourth Amendment: Search And Seizure In Islamic Doctrine And Muslim Practice, Sadiq Reza

Articles & Chapters

Modern scholars regularly assert that Islamic law contains privacy protections similar to those of the FourthAmendment to the U.S. Constitution. Two Quranic verses in particular - one that commands Muslims not to enter homes without permission, and one that commands them not to 'spy' - are held up, along with reports from the Traditions (Sunna) that repeat and embellish on these commands, as establishing rules that forbid warrantless searches and seizures by state actors and require the exclusion of evidence obtained in violation of these rules. This Article tests these assertions by: (1) presenting rules and doctrines Muslim jurists of …


How Privacy Killed Katz: A Tale Of Cognitive Freedom And The Property Of Personhood As Fourth Amendment Norm, Christian Halliburton Jan 2009

How Privacy Killed Katz: A Tale Of Cognitive Freedom And The Property Of Personhood As Fourth Amendment Norm, Christian Halliburton

Faculty Articles

This article seeks for the very first time to inform that debate with a notion of property as an essential aspect of human identity in a "mash-up of sorts that might be called Fourth Amendment jurisprudence meets the Radinesque Property of Personhood. Using an expanded version of the notion of property developed by Professor Margaret Radin in her pioneering work Property and Personhood, the Fourth Amendment must contend with the social reality that some aspects of "ownership" or entitlement to property, and some level of vindication of those interests, are essential to the formation and viability of complete human beings. …


Understanding The New Virtualist Paradigm, Jonathon Penney Jan 2009

Understanding The New Virtualist Paradigm, Jonathon Penney

Articles, Book Chapters, & Popular Press

This article discusses the central ideas within an emerging body of cyberlaw scholarship I have elsewhere called the "New Virtualism". We now know that the original "virtualists"- those first generation cyberlaw scholars who believed virtual worlds and spaces were immune to corporate and state control - were wrong; these days, such state and corporate interests are ubiquitous in cyberspace and the Internet. But is this it? Is there not anything else we can learn about cyberlaw from the virtualists and their utopian dreams? I think so. In fact, the New Virtualist paradigm of cyberlaw scholarship draws on the insights of …


Understanding The New Virtualist Paradigm, Jonathon Penney Jan 2009

Understanding The New Virtualist Paradigm, Jonathon Penney

Articles, Book Chapters, & Popular Press

This article discusses the central ideas within an emerging body of cyberlaw scholarship I have elsewhere called the "New Virtualism". We now know that the original "virtualists"- those first generation cyberlaw scholars who believed virtual worlds and spaces were immune to corporate and state control - were wrong; these days, such state and corporate interests are ubiquitous in cyberspace and the Internet. But is this it? Is there not anything else we can learn about cyberlaw from the virtualists and their utopian dreams? I think so. In fact, the New Virtualist paradigm of cyberlaw scholarship draws on the insights of …


Privacy And The New Virtualism, Jonathon Penney Jan 2009

Privacy And The New Virtualism, Jonathon Penney

Articles, Book Chapters, & Popular Press

First generation cyberlaw scholars were deeply influenced by the uniqueness of cyberspace, and believed its technology and scope meant it could not be controlled by any government. Few still ascribe to this utopian vision. However, there is now a growing body of second generation cyberlaw scholarship that speaks not only to the differential character of cyberspace, but also analyzes legal norms within virtual spaces while drawing connections to our experience in real space. I call this the New Virtualism. Situated within this emerging scholarship, this article offers a new approach to privacy in virtual spaces by drawing on what Orin …


Putting Surveillance On The Political Agenda – A Short Defence Of Surveillance: Citizens And The State, Benjamin J. Goold, Charles D. Raab Jan 2009

Putting Surveillance On The Political Agenda – A Short Defence Of Surveillance: Citizens And The State, Benjamin J. Goold, Charles D. Raab

All Faculty Publications

In February 2009 the House of Lords Constitutional Committee in the United Kingdom published the report Surveillance: Citizens and the State. Some have hailed this as a landmark document. Volume 6(3) of Surveillance & Society published 4 invited responses to this report written by prominent scholars. In the attached paper the two Specialist Advisers to this Committee set the context for the report and provide a brief rejoinder to the four responses. NOTE: The authors write in their academic and personal capacities, and not as representatives of the Committee.


Dying To Know: A Demand For Genuine Public Access To Clinical Trial Results Data, Christine Galbraith Davik Jan 2009

Dying To Know: A Demand For Genuine Public Access To Clinical Trial Results Data, Christine Galbraith Davik

Faculty Publications

Four years ago at the age of 34, I heard the awful words "I'm sorry, but you have breast cancer" coming from my doctor. After the initial shock of the diagnosis wore off, I like many others who have faced life-threatening diseases began to work with a team of physicians to develop an appropriate treatment plan, which included contemplating enrollment in a clinical trial. Quite unexpectedly, my position as an intellectual property professor whose scholarship focuses primarily on information control, my role as a member of my university's Institutional Review Board that oversees studies involving human subjects, and my newly …


Two Notions Of Privacy Online, Avner Levin, Patricia S. Abril Jan 2009

Two Notions Of Privacy Online, Avner Levin, Patricia S. Abril

Vanderbilt Journal of Entertainment & Technology Law

Users of social networking websites tend to disclose much personal information online yet seem to retain some form of an expectation of privacy. Is this expectation of privacy always unreasonable? How do users of online social networks define their expectations of privacy online?

These questions were the impetus behind an empirical study, the findings of which are presented in this Article. The project, simultaneously conducted in Canada, at Ryerson University, and in the United States, at the University of Miami, consisted of a survey regarding personal information protection and expectations of privacy on online social networks (OSNs). Approximately 2,500 young …


Are "Better" Security Breach Notification Laws Possible?, Jane K. Winn Jan 2009

Are "Better" Security Breach Notification Laws Possible?, Jane K. Winn

Articles

This Article will evaluate the provisions of California's pioneering security breach notification law (SBNL) in light of "better regulation" or "smart regulation" criteria in order to highlight the costs of taking a narrowly focused, piecemeal approach and the benefits of taking a more comprehensive perspective to the problems of identity theft and information security. Just as the basic structure of SBNLs was borrowed from environmental law, this Article will borrow from decades of analysis of the impact of environmental regulation to evaluate the likely impact of SBNLs.

Just as environmental laws can be used to reduce externalities created through the …


Race, Gender, And Genetic Technologies: A New Reproductive Dystopia?, Dorothy E. Roberts Jan 2009

Race, Gender, And Genetic Technologies: A New Reproductive Dystopia?, Dorothy E. Roberts

All Faculty Scholarship

No abstract provided.


The U.S. Discovery-Eu Privacy Directive Conflict: Constructing A Three-Tiered Compliance Strategy, Carla L. Reyes Jan 2009

The U.S. Discovery-Eu Privacy Directive Conflict: Constructing A Three-Tiered Compliance Strategy, Carla L. Reyes

Faculty Journal Articles and Book Chapters

This note examines the conflicts of laws issue faced by trans-border civil litigants attempting to comply with both the U.S. Federal Rules of Civil Procedure and the requirements of the EU Privacy Directive. This note first sifts through the quagmire of regulations, and then attempts to help trans-border litigants view the U.S. discovery-EU data protection conflict through a transnational legal lens, and concludes by constructing a three-tiered strategy for compliance that respects U.S., EU and international law.


David Doe V. Goliath, Inc.: Judicial Ferment In 2009 For Business Plaintiffs Seeking The Identities Of Anonymous Online Speakers, 43 J. Marshall L. Rev. 1 (2009), Clay Calvert, Kayla Gutierrez, Karla D. Kennedy, Kara Carnley Murrhee Jan 2009

David Doe V. Goliath, Inc.: Judicial Ferment In 2009 For Business Plaintiffs Seeking The Identities Of Anonymous Online Speakers, 43 J. Marshall L. Rev. 1 (2009), Clay Calvert, Kayla Gutierrez, Karla D. Kennedy, Kara Carnley Murrhee

UIC Law Review

No abstract provided.


Updating Data Protection: Part I -- Identifying The Objectives, Fred H. Cate Jan 2009

Updating Data Protection: Part I -- Identifying The Objectives, Fred H. Cate

Articles by Maurer Faculty

No abstract provided.


Private Norms And Public Spaces, Nicole Stelle Garnett Jan 2009

Private Norms And Public Spaces, Nicole Stelle Garnett

Journal Articles

This Essay explores the role of private norms in the allocation of urban public spaces as well as local governments' efforts to enforce these norms. The Essay was prepared for the 2008 Brigham-Kanner Property Rights Conference, William and Mary School of Law, as a tribute to Robert Ellickson. community policing, informal norms


Surveillance And The Political Value Of Privacy, Benjamin J. Goold Jan 2009

Surveillance And The Political Value Of Privacy, Benjamin J. Goold

All Faculty Publications

The steady expansion in the use of surveillance technologies by the state and private sector represents a substantial threat to the privacy of ordinary individuals. Yet despite the best efforts of civil libertarians, many members of the public still struggle to understand why privacy is valuable and deserves to be protected as a basic right. In part, this is a result of the inherent complexity of the idea of privacy, but it is also due a tendency on the part of privacy advocates to focus on the individual - as opposed to the social and political dimensions - of privacy. …