Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (48)
- Computer Law (38)
- Science and Technology Law (38)
- Intellectual Property Law (17)
- Constitutional Law (9)
-
- First Amendment (9)
- Fourth Amendment (9)
- Communications Law (7)
- Law and Society (7)
- Social and Behavioral Sciences (7)
- Torts (7)
- Communication (6)
- Consumer Protection Law (6)
- Legal History (6)
- Computer Sciences (5)
- Information Security (5)
- International Law (5)
- Labor and Employment Law (5)
- Physical Sciences and Mathematics (5)
- State and Local Government Law (5)
- Criminal Law (4)
- Jurisprudence (4)
- Arts and Humanities (3)
- Criminal Procedure (3)
- Education Law (3)
- Evidence (3)
- Legal Ethics and Professional Responsibility (3)
- Legal Writing and Research (3)
- Institution
-
- UIC School of Law (23)
- Schulich School of Law, Dalhousie University (14)
- University of Michigan Law School (8)
- Maurer School of Law: Indiana University (7)
- Selected Works (5)
-
- University of Pennsylvania Carey Law School (5)
- Vanderbilt University Law School (5)
- University at Buffalo School of Law (4)
- University of Arkansas at Little Rock William H. Bowen School of Law (4)
- Brigham Young University Law School (3)
- Chicago-Kent College of Law (2)
- Pace University (2)
- University of Baltimore Law (2)
- University of Colorado Law School (2)
- University of the District of Columbia School of Law (2)
- Washington and Lee University School of Law (2)
- Brooklyn Law School (1)
- California State University, San Bernardino (1)
- Columbia Law School (1)
- Florida A&M University College of Law (1)
- Georgia State University College of Law (1)
- Loyola University Chicago, School of Law (1)
- Ouachita Baptist University (1)
- United Arab Emirates University (1)
- University of Connecticut (1)
- University of Florida Levin College of Law (1)
- University of Georgia School of Law (1)
- University of Miami Law School (1)
- University of New Hampshire (1)
- West Virginia University (1)
- Keyword
-
- Privacy (29)
- Data protection (6)
- Data privacy (5)
- Facebook (4)
- Information (4)
-
- Internet (4)
- Copyright (3)
- Fourth Amendment (3)
- Freedom of speech (3)
- Law reform (3)
- Privacy Law (3)
- Right of publicity (3)
- Smartphones (3)
- Access to information (2)
- Big data (2)
- Book reviews (2)
- Cloud computing (2)
- Confidentiality (2)
- Constitutional Law (2)
- Criminal Procedure (2)
- Cyberspace (2)
- Employee rights (2)
- Employees (2)
- Employers (2)
- Evidence (2)
- First Amendment (2)
- Google (2)
- International law (2)
- Legal history (2)
- Networks (2)
- Publication
-
- UIC John Marshall Journal of Information Technology & Privacy Law (19)
- Canadian Journal of Law and Technology (11)
- All Faculty Scholarship (8)
- Articles by Maurer Faculty (6)
- Journal Articles (4)
-
- Vanderbilt Journal of Entertainment & Technology Law (4)
- Faculty Scholarship (3)
- Michigan Telecommunications & Technology Law Review (3)
- UIC Law Review (3)
- University of Arkansas at Little Rock Law Review (3)
- Articles, Book Chapters, & Popular Press (2)
- BYU Law Review (2)
- Elisabeth Haub School of Law Faculty Publications (2)
- Michigan Law Review (2)
- Publications (2)
- University of the District of Columbia Law Review (2)
- Alberto Bernabe (1)
- Articles (1)
- Brigham Young University Education and Law Journal (1)
- Chicago-Kent Law Review (1)
- Dissertations (1)
- Faculty Articles and Papers (1)
- Faculty Publications By Year (1)
- Federal Communications Law Journal (1)
- Georgia Law Review (1)
- Honors Theses (1)
- Journal Publications (1)
- LLM Theses (1)
- Law Faculty Scholarship (1)
- Marc Linder (1)
- Publication Type
- File Type
Articles 1 - 30 of 104
Full-Text Articles in Privacy Law
Drone Federalism: Civilian Drones And The Things They Carry, Margot E. Kaminski
Drone Federalism: Civilian Drones And The Things They Carry, Margot E. Kaminski
Publications
Civilian drones are scheduled to be permitted in the national airspace as early as 2015. Many think Congress should establish the necessary nationwide regulations to govern both law enforcement and civilian drone use. That thinking, however, is wrong. This Essay suggests drone federalism instead: a state-based approach to privacy regulation that governs drone use by civilians, drawing on states’ experience regulating other forms of civilian-on-civilian surveillance. This approach will allow necessary experimentation in how to best balance privacy concerns against First Amendment rights in the imminent era of drone-use democratization. This Essay closes by providing some guidance to states as …
Natural Law, Slavery, And The Right To Privacy Tort, Anita L. Allen
Natural Law, Slavery, And The Right To Privacy Tort, Anita L. Allen
All Faculty Scholarship
In 1905 the Supreme Court of Georgia became the first state high court to recognize a freestanding “right to privacy” tort in the common law. The landmark case was Pavesich v. New England Life Insurance Co. Must it be a cause for deep jurisprudential concern that the common law right to privacy in wide currency today originated in Pavesich’s explicit judicial interpretation of the requirements of natural law? Must it be an additional worry that the court which originated the common law privacy right asserted that a free white man whose photograph is published without his consent in …
Tax Glasnost' For Millionaires: Peeking Behind The Veil Of Ignorance Along The Publicity-Privacy Continuum, Marc Linder
Tax Glasnost' For Millionaires: Peeking Behind The Veil Of Ignorance Along The Publicity-Privacy Continuum, Marc Linder
Marc Linder
No abstract provided.
The Inalienable Right Of Publicity, Jennifer E. Rothman
The Inalienable Right Of Publicity, Jennifer E. Rothman
All Faculty Scholarship
This article challenges the conventional wisdom that the right of publicity is universally and uncontroversially alienable. Courts and scholars have routinely described the right as a freely transferable property right, akin to patents or copyrights. Despite such broad claims of unfettered alienability, courts have limited the transferability of publicity rights in a variety of instances. No one has developed a robust account of why such limits should exist or what their contours should be. This article remedies this omission and concludes that the right of publicity must have significantly limited alienability to protect the rights of individuals to control the …
Information Escrows, Ian Ayres, Cait Unkovic
Information Escrows, Ian Ayres, Cait Unkovic
Michigan Law Review
A variety of information escrows - including allegation escrows, suspicion escrows, and shared-interest escrows - hold the promise of reducing the first-mover disadvantage that can deter people with socially valuable private information from disclosing that information to others. Information escrows allow people to transmit sensitive information to a trusted intermediary, an escrow agent, who only forwards the information under prespecified conditions. For example, an allegation escrow for sexual harassment might allow a victim to place a private complaint into escrow with instructions that the complaint be lodged with the proper authorities only if the escrow agent receives at least one …
Survey Of Recent European Union Privacy Developments, W. Gregory Voss
Survey Of Recent European Union Privacy Developments, W. Gregory Voss
W. Gregory Voss
The Spanish law implementing the European Union (EU) Data Protection Directive, advisory guidance on consent, facial recognition and biometric technologies from the European Union Article 29 Data Protection Working Party (WP29) , and proposals for EU data protection law reform are analyzed in this survey piece. EU legislative processes are illustrated by a specific occurence: Spanish Organic Law 15/1999 on the Protection of Personal Data is reviewed in the context of Court of Justice of the European Union (ECJ) joined cases, Asociación Nacional de Establecimientos Financieros de Crédito (ASNEF) v. Administración del Estado, and Federación de Comercio Electrónico y Marketing …
Four Easy Pieces To Balance Privacy And Accountability In Public Higher Education: A Response To Wrongdoing Ranging From Petty Corruption To The Sandusky And Penn State Tragedy, Robert E. Steinbuch
Four Easy Pieces To Balance Privacy And Accountability In Public Higher Education: A Response To Wrongdoing Ranging From Petty Corruption To The Sandusky And Penn State Tragedy, Robert E. Steinbuch
Faculty Scholarship
No abstract provided.
Limits Of The Federal Wiretap Act's Ability To Protect Against Wi-Fi Sniffing, Mani Potnuru
Limits Of The Federal Wiretap Act's Ability To Protect Against Wi-Fi Sniffing, Mani Potnuru
Michigan Law Review
Adoption of Wi-Fi wireless technology continues to see explosive growth. However many users still operate their home Wi-Fi networks in unsecured mode or use publicly available unsecured Wi-Fi networks, thus exposing their communications to the dangers of "packet sniffing," a technique used for eavesdropping on a network. Some have argued that communications over unsecured Wi-Fi networks are "readily accessible to the general public" and that such communications are therefore excluded from the broad protections of the Federal Wiretap Act against intentional interception of electronic communications. This Note examines the Federal Wiretap Act and argues that the current Act's treatment of …
Warrantless Searches And Smartphones: Privacy In The Palm Of Your Hand?, Margaret M. Lawton
Warrantless Searches And Smartphones: Privacy In The Palm Of Your Hand?, Margaret M. Lawton
University of the District of Columbia Law Review
Incident to a drug arrest, a police officer removes a smartphone from the pocket of the defendant. The smartphone may have incriminating evidence-phone numbers, pictures, text messages, and e-mails. But can the officer examine the smartphone on the scene or back at the station? Or does the officer need to show probable cause and obtain a warrant before examining the phone? If the phone were instead the arrestee's wallet or a cigarette package, under the search incident to lawful arrest exception to the Fourth Amendment's warrant requirement the officer could open and search inside either of these "containers." Anything found …
Looking Through The Prism Of Privacy And Trespass: Smartphones And The Fourth Amendment, Saby Ghoshray
Looking Through The Prism Of Privacy And Trespass: Smartphones And The Fourth Amendment, Saby Ghoshray
University of the District of Columbia Law Review
Technology in the twenty-first century has dramatically changed our lives, but the law has not kept pace with technological advances. The treatment of smartphones in Fourth Amendment jurisprudence is no exception. This is made evident by the increasingly scattered outcomes of litigation involving the privacy interests of smartphone owners.' As the cross-jurisdictional inconsistencies of judicial decisions applying the Fourth Amendment to smartphones mount, I am drawn to seek answers from two foundational pillars of the Supreme Court's search and seizure jurisprudence: protection against invasions of privacy and the bulwark against trespass.
Access For All: A Review Of “Law Libraries, Government Transparency, And The Internet,” A Presentation By Daniel Schuman Of The Sunlight Foundation At The All-Sis Meeting, July 22, 2012, Susan David Demaine
Access For All: A Review Of “Law Libraries, Government Transparency, And The Internet,” A Presentation By Daniel Schuman Of The Sunlight Foundation At The All-Sis Meeting, July 22, 2012, Susan David Demaine
Articles by Maurer Faculty
Attendees at the ALL-SIS Breakfast and Business Meeting at the AALL Annual Meeting had the pleasure of hearing from Daniel Schuman of the Sunlight Foundation speak on “Law Libraries, Government Transparency, and the Internet.” The Sunlight Foundation is a nonpartisan, nonprofit organization whose mission is to increase access to federal government information resources through advocacy and the development of information technology tools.
The Class Differential In Privacy Law, Michele E. Gilman
The Class Differential In Privacy Law, Michele E. Gilman
All Faculty Scholarship
This article analyzes how privacy law fails the poor. Due to advanced technologies, all Americans are facing corporate and governmental surveillance. However, privacy law is focused on middle-class concerns about limiting the disclosure of personal data so that it is not misused. By contrast, along the welfare-to-work continuum, poor people face privacy intrusions at the time that the state or their employers gather data. This data collection tends to be stigmatizing and humiliating, and it thus not only compounds the harmful effects of living in poverty, but also dampens democratic participation by the poor. The poor interact with the government …
Walled Gardens Of Privacy Or “Binding Corporate Rules?”: A Critical Look At International Protection Of Online Privacy, Joanna Kulesza
Walled Gardens Of Privacy Or “Binding Corporate Rules?”: A Critical Look At International Protection Of Online Privacy, Joanna Kulesza
University of Arkansas at Little Rock Law Review
A growing concern in the era of cloud computing is protecting Internet users' privacy. This concern is compounded by the fact that there are no effective international solutions. This article considers the latest European Union (EU) proposed development in this area – a regulatory model based on amended Binding Corporate Rules (BCR) – as introduced by the EU Justice Commissioner. These planned changes would have worldwide effects on international companies' online activities in transboundary cyberspace.
After providing a background on the concept of defining privacy in general, the article describes the BCR proposal, and proceeds to consider the likelihood of …
Privacy For Social Networking, Connie Davis Powell
Privacy For Social Networking, Connie Davis Powell
University of Arkansas at Little Rock Law Review
This article begins by considering the emergence of social networks as a major medium of communication and posits that the success of social networks is attributable to their users' willingness to share their information. Next, the article considers the expectation of privacy for users of social networks and whether such expectation is reasonable. In particular, the article discusses the privacy policies and legal terms governing the use of social networks, and tracks the evolution of such terms and policies as they slowly whittle away user control over time. The article then discusses public outcry regarding the disclosure of information contrary …
Electronic Privacy And Employee Speech, Pauline T. Kim
Electronic Privacy And Employee Speech, Pauline T. Kim
Chicago-Kent Law Review
The boundary between work and private life is blurring as a result of changes in the organization of work and advances in technology. Current privacy law is ill-equipped to address these changes and as a result, employees' privacy in their electronic communications is only weakly protected from employer scrutiny. At the same time, the law increasingly protects certain socially valued forms of employee speech. In particular, collective speech, speech that enforces workplace regulations and speech that deters or reports employer wrong-doing are explicitly protected by law from employer reprisals. These two developments—weak protection of employee privacy and increased protection for …
The Progress Of Science And The Useful Arts: Misadventures In Canadian Law On Patent-Eligible Subject Matter, Ken Bousfield
The Progress Of Science And The Useful Arts: Misadventures In Canadian Law On Patent-Eligible Subject Matter, Ken Bousfield
Canadian Journal of Law and Technology
Patent-Eligible Subject-Matter in Canada
The law of patent-eligible subject-matter in Canada has become badly muddled. There has been repeated confusion of subject-matter issues with non-subject matter issues such as novelty, obviousness, and utility. There has also been repeated confusion within the following group of issues pertaining to whether subject-matter is patent-eligible: whether a claim is for a mere idea or aggregation or for a patentable invention; whether claimed subject-matter falls within science and the useful arts; and whether claimed subject-matter falls within the statutory classes listed in the definition of “invention”. Echoes of older UK-based cases, relating to statutory provisions …
Harvesting The "Forbidden Fruit" Of Biotechnology Research: Genetic Engineering, International Law And The Patentability Of Higher Life Forms In Canada, Eugene C. Lim
Canadian Journal of Law and Technology
As the frontiers of science are constantly redefined by the emergence of new technology, patent law often has to struggle to keep pace with the changing conception of what constitutes a protectable “invention”. A key challenge facing patent law in the age of biotechnology lies in ascertaining the extent to which genetically engineered life forms should be protected. A major concern relates to whether such life forms should be excluded from patentability on grounds of ordre public, ethics and morality.
This article critically explores the extent to which patent law in Canada protects this “forbidden fruit” of biotechnological innovation, and …
A Delicate Balance: Defining The Line Between Open Civil Proceedings And The Protection Of Children In The Online Digital Era, Courtney Retter, Shaheen Shariff
A Delicate Balance: Defining The Line Between Open Civil Proceedings And The Protection Of Children In The Online Digital Era, Courtney Retter, Shaheen Shariff
Canadian Journal of Law and Technology
He thought of the telescreen with its never-sleeping ear. They could spy upon you night and day, but if you kept your head you could still outwit them. [. . .] They could lay bare in the utmost detail everything that you had done or said or thought; but the inner heart, whose workings were mysterious even to yourself, remained impregnable.
— George Orwell, 1984
On Thursday September 27, 2012, a few months after our paper was written, the Supreme Court of Canada solidified the rights of children victimized by cyberbullying in the landmark decision of AB (Litigation Guardian of) …
Understanding The Internet As A Human Right, Michael Karanicolas
Understanding The Internet As A Human Right, Michael Karanicolas
Canadian Journal of Law and Technology
Around the world, fundamental human rights have undergone a dramatic conceptual shift as a result of the spread of the Internet. The right to freedom of expression, once largely limited to printing, has exploded in a digital world that provides users with an unprecedented megaphone to broadcast their views. The right to political participation and the right to free assembly have similarly been reborn in an age of instant communication, allowing activists to mobilise hundreds of thousands of followers with a single email, text or tweet. Although these are the most notable examples, the Internet has also had a transformative …
The Limitations Of Regulatory Oversight On Online Video, Jennifer Simpson
The Limitations Of Regulatory Oversight On Online Video, Jennifer Simpson
Canadian Journal of Law and Technology
Discussion in this paper focuses on the factors, attributes, and elements of telecom and broadcast regulation in Canada. Part I of this study briefly outlines the history of online video regulation in Canada to date. In Part II speculation as to how online video might be regulated, based on prior decisions of the CRTC, is presented. Part III considers the challenges of applying the Broadcasting Act to new media entities in order to create a regulatory framework for online video. Part IV looks at judicial decisions related to broadcast law that may be used to define the nature of the …
The Rules Of Corporate Governance In Public Companies In The Uae, Salama Hmoud Hamad Ai Ameri
The Rules Of Corporate Governance In Public Companies In The Uae, Salama Hmoud Hamad Ai Ameri
Dissertations
Due to the recent upheavals and deteriorating global economic outlook, a healthy reevaluation and attention is being focused on the role of corporate governance in global economic and legal debate among policy makers and experts. The urgency has been expedited by the global financial crisis of 2007-2008 ("Financial Crisis") which had negative impact on all corners of the globe. The United Arab Emirates ("UAE") was also affected by the Financial Crisis, albeit in a limited and manageable manner than many other countries around the world.
As a result of the Financial Crisis and its impact, UAE responded with measures to …
Privacy Rights: The Virtue Of Protecting A False Reputation, John A. Humbach
Privacy Rights: The Virtue Of Protecting A False Reputation, John A. Humbach
Elisabeth Haub School of Law Faculty Publications
What is the virtue of protecting a false reputation? The thesis of this paper is that there is none. There is none, at least, that justifies the suppression of free speech. Yet, there is a growing trend to see the protection of reputation from truth as a key function of the so-called “right of privacy.”
Unfortunately, people often do things that they are not proud of or do not want others to know about. Often, however, these are precisely the things that others want or need to know. For our own protection, each of us is better off being aware …
Privacy Rights Left Behind At The Border: The Exhaustive, Exploratory Searches Effectuated In United States V. Cotterman, Aaron Mcknight
Privacy Rights Left Behind At The Border: The Exhaustive, Exploratory Searches Effectuated In United States V. Cotterman, Aaron Mcknight
BYU Law Review
No abstract provided.
Post-Mortem Right Of Publicity In Arkansas: Protecting Against The Unauthorized Use Of A Person’S Identity For Commercial Purposes, Rashauna A. Norment
Post-Mortem Right Of Publicity In Arkansas: Protecting Against The Unauthorized Use Of A Person’S Identity For Commercial Purposes, Rashauna A. Norment
University of Arkansas at Little Rock Law Review
The right of publicity protects a person against the use of his or her name, identity, likeness, or other personal characteristics for commercial purposes without consent. Many states have implemented a statutory right of publicity or have recognized the right under common law. Currently, only three states have a post-mortem right of publicity. This article discusses jurisdictions that have adopted a postmortem right of publicity, and advocates that Arkansas adopt a postmortem right of publicity for everyone.
Specifically, the article argues that traditional protection stemming from actions for invasion of a right of privacy, trademark infringement, and copyright infringement cannot …
Wiretapping The Internet: The Expansion Of The Communications Assistance To Law Enforcement Act To Extend Government Surveillance, Christa M. Hibbard
Wiretapping The Internet: The Expansion Of The Communications Assistance To Law Enforcement Act To Extend Government Surveillance, Christa M. Hibbard
Federal Communications Law Journal
Criminal use of the Internet to circumvent traditional government phone wiretaps has inspired the Obama Administration to create a proposal to expand the Communications Assistance to Law Enforcement Act ("CALEA"). CALEA was passed in 1994 to regulate telephone and broadband companies to ensure compliance with standards to enable government wiretapping. The proposed amendment of CALEA would allow the government to require all communications service providers to meet technical standards necessary to comply with a wiretap order. The expansion of CALEA would likely widen its scope to social networking sites, instant messaging, gaming consoles that allow conversation among multiple players, and …
The Guatemala Std Inoculation Study As The Incentive To Change Modern Informed Consent Standards, Marie Constance Scheperle
The Guatemala Std Inoculation Study As The Incentive To Change Modern Informed Consent Standards, Marie Constance Scheperle
Washington and Lee Journal of Civil Rights and Social Justice
No abstract provided.
(Un)Reasonable Expectation Of Digital Privacy, Brandon T. Crowther
(Un)Reasonable Expectation Of Digital Privacy, Brandon T. Crowther
BYU Law Review
No abstract provided.
Public Education And Student Privacy: Application Of The Fourth Amendment To Dormitories At Public Colleges And Universities, Bryan R. Lemons
Public Education And Student Privacy: Application Of The Fourth Amendment To Dormitories At Public Colleges And Universities, Bryan R. Lemons
Brigham Young University Education and Law Journal
No abstract provided.
First Amendment Privacy And The Battle For Progressively Liberal Social Change, Anita L. Allen
First Amendment Privacy And The Battle For Progressively Liberal Social Change, Anita L. Allen
All Faculty Scholarship
No abstract provided.
Hard To Believe: The High Cost Of A Biometric Identity Card, A. Michael Froomkin, Jonathan Weinberg
Hard To Believe: The High Cost Of A Biometric Identity Card, A. Michael Froomkin, Jonathan Weinberg
Short Works
No abstract provided.