Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (33)
- Computer Law (27)
- Science and Technology Law (23)
- Constitutional Law (7)
- Fourth Amendment (5)
-
- National Security Law (5)
- First Amendment (4)
- Law and Society (4)
- Legal Writing and Research (4)
- State and Local Government Law (4)
- Communications Law (3)
- Courts (3)
- Dispute Resolution and Arbitration (3)
- Health Law and Policy (3)
- Jurisprudence (3)
- Labor and Employment Law (3)
- Legislation (3)
- Administrative Law (2)
- Comparative and Foreign Law (2)
- Consumer Protection Law (2)
- Criminal Law (2)
- Intellectual Property Law (2)
- Judges (2)
- Legal History (2)
- Litigation (2)
- Medical Jurisprudence (2)
- Torts (2)
- Agency (1)
- Institution
-
- UIC School of Law (22)
- New York Law School (5)
- Chicago-Kent College of Law (4)
- Schulich School of Law, Dalhousie University (4)
- University of Richmond (4)
-
- Vanderbilt University Law School (4)
- Selected Works (3)
- The Peter A. Allard School of Law (3)
- University of Michigan Law School (2)
- University of Washington School of Law (2)
- Brooklyn Law School (1)
- Cornell University Law School (1)
- Maurer School of Law: Indiana University (1)
- Notre Dame Law School (1)
- Seattle University School of Law (1)
- Southern Methodist University (1)
- University of Baltimore Law (1)
- University of Kentucky (1)
- University of Maine School of Law (1)
- University of Maryland Francis King Carey School of Law (1)
- University of Missouri School of Law (1)
- University of Pennsylvania Carey Law School (1)
- Keyword
-
- Privacy (10)
- Technology (5)
- Cyberspace (4)
- Internet (4)
- Data security (3)
-
- Externalist (3)
- Internal (3)
- Realist (3)
- Social media (3)
- Virtualism (3)
- Virtualist (3)
- Constitution (2)
- Defamation (2)
- Exclusionary rule (2)
- Facebook (2)
- Fair information practices (2)
- First Amendment (2)
- Information privacy (2)
- Internet Law (2)
- Law and Technology (2)
- Libel (2)
- Proportionality (2)
- Access (1)
- Agency (1)
- Anonymous (1)
- Canada (1)
- Civil Procedure (1)
- Civil liberties (1)
- Closed circuit television (1)
- Code (1)
- Publication
-
- UIC John Marshall Journal of Information Technology & Privacy Law (19)
- Chicago-Kent Law Review (4)
- All Faculty Publications (3)
- Articles, Book Chapters, & Popular Press (3)
- NYLS Law Review (3)
-
- UIC Law Review (3)
- Articles & Chapters (2)
- Faculty Publications (2)
- Faculty Scholarship (2)
- Richmond Journal of Law and the Public Interest (2)
- Richmond Public Interest Law Review (2)
- Robert Sprague (2)
- All Faculty Scholarship (1)
- Articles (1)
- Articles by Maurer Faculty (1)
- Cornell Law Faculty Publications (1)
- Dalhousie Law Journal (1)
- Faculty Articles (1)
- Faculty Journal Articles and Book Chapters (1)
- Journal Articles (1)
- Kentucky Law Journal (1)
- Lisa Smith-Butler (1)
- Michigan Law Review (1)
- University of Baltimore Law Review (1)
- University of Michigan Journal of Law Reform (1)
- Vanderbilt Journal of Entertainment & Technology Law (1)
- Vanderbilt Journal of Transnational Law (1)
- Vanderbilt Law Review (1)
- Vanderbilt Law School Faculty Publications (1)
- Washington Journal of Law, Technology & Arts (1)
- Publication Type
Articles 61 - 65 of 65
Full-Text Articles in Privacy Law
Le Développement De L’Évaluation De La Menace De La Criminalité Organisée Et L’Architecure De Sécurité Intérieure (Development Of The Organised Crime Threat Assessment (Octa) And Internal Security Architecture), Benjamin J. Goold
All Faculty Publications
Cette note propose une vue d’ensemble de l’approche européenne des questions de sécurité, de lutte contre le terrorisme et contre la criminalité organisée. Elle aborde plus particulièrement le rôle de la Stratégie européenne de sécurité (SES) dans l’élaboration des politiques et des dispositions institutionnelles, ainsi que l’influence de l’OCTA (Évaluation de la menace de la criminalité organisée). cette note recommande qu’un certain nombre de mesures soient prises pour recentrer et rationaliser les structures existantes attachées aux questions de sécurité et de lutte contre le terrorisme et le crime organisé. Le nombre d’agences directement ou indirectement impliquées dans le recueil d’informations, …
The Facebook Frontier: Responding To The Changing Face Of Privacy On The Internet, Samantha L. Millier
The Facebook Frontier: Responding To The Changing Face Of Privacy On The Internet, Samantha L. Millier
Kentucky Law Journal
No abstract provided.
Preserving Identities: Protecting Personal Identifying Information Through Enhanced Privacy Policies And Laws, Robert Sprague, Corey Ciocchetti
Preserving Identities: Protecting Personal Identifying Information Through Enhanced Privacy Policies And Laws, Robert Sprague, Corey Ciocchetti
Robert Sprague
This article explores the developing phenomenon of the ongoing collection and dissemination of personal identifying information (PII): first, explaining the nature and form of PII, including the consequences of its collection; second, exploring one of the greatest threats associated with data collection - unauthorized disclosure due to data breaches, including an overview of state and federal legislative reactions to the threats of data breaches and identity theft; third, discussing common law and constitutional privacy protections regarding the collection of personal information, revealing that United States privacy laws provide very little protection to individuals; and fourth, examining current practices by online …
Electronic Surveillance In The Global Workplace: Laws, Ethics, Research And Practice, Roland Kidwell, Robert Sprague
Electronic Surveillance In The Global Workplace: Laws, Ethics, Research And Practice, Roland Kidwell, Robert Sprague
Robert Sprague
This paper considers the legal, ethical and cultural factors that must be addressed in evaluating the appropriateness of employing electronic surveillance (ES) in varying international contexts. It critically evaluates the rationale that underlies the use of ES in a variety of settings and types of organisations. It suggests guidelines for the adoption and use of ES and potential directions for future research.
Workplace Privacy: We'll Be Watching You, Lisa Smith-Butler
Workplace Privacy: We'll Be Watching You, Lisa Smith-Butler
Lisa Smith-Butler
No abstract provided.