Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (42)
- Computer Law (34)
- Science and Technology Law (34)
- Intellectual Property Law (14)
- Fourth Amendment (5)
-
- Communications Law (4)
- First Amendment (4)
- Legal History (4)
- State and Local Government Law (4)
- Consumer Protection Law (3)
- Education Law (3)
- Legal Writing and Research (3)
- Legislation (3)
- Torts (3)
- Administrative Law (2)
- Constitutional Law (2)
- Criminal Law (2)
- Evidence (2)
- Health Law and Policy (2)
- Juvenile Law (2)
- Labor and Employment Law (2)
- Marketing Law (2)
- Civil Law (1)
- Civil Rights and Discrimination (1)
- Contracts (1)
- Courts (1)
- Gaming Law (1)
- Human Rights Law (1)
- Institution
-
- UIC School of Law (23)
- Schulich School of Law, Dalhousie University (11)
- University of Michigan Law School (6)
- Vanderbilt University Law School (4)
- Brigham Young University Law School (3)
-
- University of Arkansas at Little Rock William H. Bowen School of Law (3)
- University of the District of Columbia School of Law (2)
- Chicago-Kent College of Law (1)
- Loyola University Chicago, School of Law (1)
- Maurer School of Law: Indiana University (1)
- University of Georgia School of Law (1)
- Washington and Lee University School of Law (1)
- West Virginia University (1)
- Keyword
-
- Privacy (10)
- Information (4)
- Internet (4)
- Facebook (3)
- Book reviews (2)
-
- Copyright (2)
- Employee rights (2)
- Fourth Amendment (2)
- Freedom of speech (2)
- Google (2)
- Law reform (2)
- Networks (2)
- Personal information (2)
- Security (2)
- Smartphones (2)
- Twitter (2)
- AB (Litigation Guardian of) v Bragg Communications Inc. (1)
- Access to information (1)
- Actions & defenses (1)
- Benefits (1)
- Binding Corporate Rules (1)
- Biotechnology patents (1)
- Buyer preferences (1)
- CALEA (1)
- California (1)
- Canadian Patent Act (1)
- Civil tort (1)
- Cloud computing (1)
- Collective speech (1)
- Commercial purposes (1)
- Publication
-
- UIC John Marshall Journal of Information Technology & Privacy Law (19)
- Canadian Journal of Law and Technology (11)
- Vanderbilt Journal of Entertainment & Technology Law (4)
- Michigan Telecommunications & Technology Law Review (3)
- UIC Law Review (3)
-
- University of Arkansas at Little Rock Law Review (3)
- BYU Law Review (2)
- Michigan Law Review (2)
- University of the District of Columbia Law Review (2)
- Brigham Young University Education and Law Journal (1)
- Chicago-Kent Law Review (1)
- Federal Communications Law Journal (1)
- Georgia Law Review (1)
- Public Interest Law Reporter (1)
- UIC Review of Intellectual Property Law (1)
- University of Michigan Journal of Law Reform Caveat (1)
- Washington and Lee Journal of Civil Rights and Social Justice (1)
- West Virginia Law Review (1)
Articles 1 - 30 of 58
Full-Text Articles in Privacy Law
Information Escrows, Ian Ayres, Cait Unkovic
Information Escrows, Ian Ayres, Cait Unkovic
Michigan Law Review
A variety of information escrows - including allegation escrows, suspicion escrows, and shared-interest escrows - hold the promise of reducing the first-mover disadvantage that can deter people with socially valuable private information from disclosing that information to others. Information escrows allow people to transmit sensitive information to a trusted intermediary, an escrow agent, who only forwards the information under prespecified conditions. For example, an allegation escrow for sexual harassment might allow a victim to place a private complaint into escrow with instructions that the complaint be lodged with the proper authorities only if the escrow agent receives at least one …
Limits Of The Federal Wiretap Act's Ability To Protect Against Wi-Fi Sniffing, Mani Potnuru
Limits Of The Federal Wiretap Act's Ability To Protect Against Wi-Fi Sniffing, Mani Potnuru
Michigan Law Review
Adoption of Wi-Fi wireless technology continues to see explosive growth. However many users still operate their home Wi-Fi networks in unsecured mode or use publicly available unsecured Wi-Fi networks, thus exposing their communications to the dangers of "packet sniffing," a technique used for eavesdropping on a network. Some have argued that communications over unsecured Wi-Fi networks are "readily accessible to the general public" and that such communications are therefore excluded from the broad protections of the Federal Wiretap Act against intentional interception of electronic communications. This Note examines the Federal Wiretap Act and argues that the current Act's treatment of …
Warrantless Searches And Smartphones: Privacy In The Palm Of Your Hand?, Margaret M. Lawton
Warrantless Searches And Smartphones: Privacy In The Palm Of Your Hand?, Margaret M. Lawton
University of the District of Columbia Law Review
Incident to a drug arrest, a police officer removes a smartphone from the pocket of the defendant. The smartphone may have incriminating evidence-phone numbers, pictures, text messages, and e-mails. But can the officer examine the smartphone on the scene or back at the station? Or does the officer need to show probable cause and obtain a warrant before examining the phone? If the phone were instead the arrestee's wallet or a cigarette package, under the search incident to lawful arrest exception to the Fourth Amendment's warrant requirement the officer could open and search inside either of these "containers." Anything found …
Looking Through The Prism Of Privacy And Trespass: Smartphones And The Fourth Amendment, Saby Ghoshray
Looking Through The Prism Of Privacy And Trespass: Smartphones And The Fourth Amendment, Saby Ghoshray
University of the District of Columbia Law Review
Technology in the twenty-first century has dramatically changed our lives, but the law has not kept pace with technological advances. The treatment of smartphones in Fourth Amendment jurisprudence is no exception. This is made evident by the increasingly scattered outcomes of litigation involving the privacy interests of smartphone owners.' As the cross-jurisdictional inconsistencies of judicial decisions applying the Fourth Amendment to smartphones mount, I am drawn to seek answers from two foundational pillars of the Supreme Court's search and seizure jurisprudence: protection against invasions of privacy and the bulwark against trespass.
Privacy For Social Networking, Connie Davis Powell
Privacy For Social Networking, Connie Davis Powell
University of Arkansas at Little Rock Law Review
This article begins by considering the emergence of social networks as a major medium of communication and posits that the success of social networks is attributable to their users' willingness to share their information. Next, the article considers the expectation of privacy for users of social networks and whether such expectation is reasonable. In particular, the article discusses the privacy policies and legal terms governing the use of social networks, and tracks the evolution of such terms and policies as they slowly whittle away user control over time. The article then discusses public outcry regarding the disclosure of information contrary …
Walled Gardens Of Privacy Or “Binding Corporate Rules?”: A Critical Look At International Protection Of Online Privacy, Joanna Kulesza
Walled Gardens Of Privacy Or “Binding Corporate Rules?”: A Critical Look At International Protection Of Online Privacy, Joanna Kulesza
University of Arkansas at Little Rock Law Review
A growing concern in the era of cloud computing is protecting Internet users' privacy. This concern is compounded by the fact that there are no effective international solutions. This article considers the latest European Union (EU) proposed development in this area – a regulatory model based on amended Binding Corporate Rules (BCR) – as introduced by the EU Justice Commissioner. These planned changes would have worldwide effects on international companies' online activities in transboundary cyberspace.
After providing a background on the concept of defining privacy in general, the article describes the BCR proposal, and proceeds to consider the likelihood of …
Electronic Privacy And Employee Speech, Pauline T. Kim
Electronic Privacy And Employee Speech, Pauline T. Kim
Chicago-Kent Law Review
The boundary between work and private life is blurring as a result of changes in the organization of work and advances in technology. Current privacy law is ill-equipped to address these changes and as a result, employees' privacy in their electronic communications is only weakly protected from employer scrutiny. At the same time, the law increasingly protects certain socially valued forms of employee speech. In particular, collective speech, speech that enforces workplace regulations and speech that deters or reports employer wrong-doing are explicitly protected by law from employer reprisals. These two developments—weak protection of employee privacy and increased protection for …
The Progress Of Science And The Useful Arts: Misadventures In Canadian Law On Patent-Eligible Subject Matter, Ken Bousfield
The Progress Of Science And The Useful Arts: Misadventures In Canadian Law On Patent-Eligible Subject Matter, Ken Bousfield
Canadian Journal of Law and Technology
Patent-Eligible Subject-Matter in Canada
The law of patent-eligible subject-matter in Canada has become badly muddled. There has been repeated confusion of subject-matter issues with non-subject matter issues such as novelty, obviousness, and utility. There has also been repeated confusion within the following group of issues pertaining to whether subject-matter is patent-eligible: whether a claim is for a mere idea or aggregation or for a patentable invention; whether claimed subject-matter falls within science and the useful arts; and whether claimed subject-matter falls within the statutory classes listed in the definition of “invention”. Echoes of older UK-based cases, relating to statutory provisions …
Harvesting The "Forbidden Fruit" Of Biotechnology Research: Genetic Engineering, International Law And The Patentability Of Higher Life Forms In Canada, Eugene C. Lim
Canadian Journal of Law and Technology
As the frontiers of science are constantly redefined by the emergence of new technology, patent law often has to struggle to keep pace with the changing conception of what constitutes a protectable “invention”. A key challenge facing patent law in the age of biotechnology lies in ascertaining the extent to which genetically engineered life forms should be protected. A major concern relates to whether such life forms should be excluded from patentability on grounds of ordre public, ethics and morality.
This article critically explores the extent to which patent law in Canada protects this “forbidden fruit” of biotechnological innovation, and …
A Delicate Balance: Defining The Line Between Open Civil Proceedings And The Protection Of Children In The Online Digital Era, Courtney Retter, Shaheen Shariff
A Delicate Balance: Defining The Line Between Open Civil Proceedings And The Protection Of Children In The Online Digital Era, Courtney Retter, Shaheen Shariff
Canadian Journal of Law and Technology
He thought of the telescreen with its never-sleeping ear. They could spy upon you night and day, but if you kept your head you could still outwit them. [. . .] They could lay bare in the utmost detail everything that you had done or said or thought; but the inner heart, whose workings were mysterious even to yourself, remained impregnable.
— George Orwell, 1984
On Thursday September 27, 2012, a few months after our paper was written, the Supreme Court of Canada solidified the rights of children victimized by cyberbullying in the landmark decision of AB (Litigation Guardian of) …
Understanding The Internet As A Human Right, Michael Karanicolas
Understanding The Internet As A Human Right, Michael Karanicolas
Canadian Journal of Law and Technology
Around the world, fundamental human rights have undergone a dramatic conceptual shift as a result of the spread of the Internet. The right to freedom of expression, once largely limited to printing, has exploded in a digital world that provides users with an unprecedented megaphone to broadcast their views. The right to political participation and the right to free assembly have similarly been reborn in an age of instant communication, allowing activists to mobilise hundreds of thousands of followers with a single email, text or tweet. Although these are the most notable examples, the Internet has also had a transformative …
The Limitations Of Regulatory Oversight On Online Video, Jennifer Simpson
The Limitations Of Regulatory Oversight On Online Video, Jennifer Simpson
Canadian Journal of Law and Technology
Discussion in this paper focuses on the factors, attributes, and elements of telecom and broadcast regulation in Canada. Part I of this study briefly outlines the history of online video regulation in Canada to date. In Part II speculation as to how online video might be regulated, based on prior decisions of the CRTC, is presented. Part III considers the challenges of applying the Broadcasting Act to new media entities in order to create a regulatory framework for online video. Part IV looks at judicial decisions related to broadcast law that may be used to define the nature of the …
Privacy Rights Left Behind At The Border: The Exhaustive, Exploratory Searches Effectuated In United States V. Cotterman, Aaron Mcknight
Privacy Rights Left Behind At The Border: The Exhaustive, Exploratory Searches Effectuated In United States V. Cotterman, Aaron Mcknight
BYU Law Review
No abstract provided.
Post-Mortem Right Of Publicity In Arkansas: Protecting Against The Unauthorized Use Of A Person’S Identity For Commercial Purposes, Rashauna A. Norment
Post-Mortem Right Of Publicity In Arkansas: Protecting Against The Unauthorized Use Of A Person’S Identity For Commercial Purposes, Rashauna A. Norment
University of Arkansas at Little Rock Law Review
The right of publicity protects a person against the use of his or her name, identity, likeness, or other personal characteristics for commercial purposes without consent. Many states have implemented a statutory right of publicity or have recognized the right under common law. Currently, only three states have a post-mortem right of publicity. This article discusses jurisdictions that have adopted a postmortem right of publicity, and advocates that Arkansas adopt a postmortem right of publicity for everyone.
Specifically, the article argues that traditional protection stemming from actions for invasion of a right of privacy, trademark infringement, and copyright infringement cannot …
Wiretapping The Internet: The Expansion Of The Communications Assistance To Law Enforcement Act To Extend Government Surveillance, Christa M. Hibbard
Wiretapping The Internet: The Expansion Of The Communications Assistance To Law Enforcement Act To Extend Government Surveillance, Christa M. Hibbard
Federal Communications Law Journal
Criminal use of the Internet to circumvent traditional government phone wiretaps has inspired the Obama Administration to create a proposal to expand the Communications Assistance to Law Enforcement Act ("CALEA"). CALEA was passed in 1994 to regulate telephone and broadband companies to ensure compliance with standards to enable government wiretapping. The proposed amendment of CALEA would allow the government to require all communications service providers to meet technical standards necessary to comply with a wiretap order. The expansion of CALEA would likely widen its scope to social networking sites, instant messaging, gaming consoles that allow conversation among multiple players, and …
The Guatemala Std Inoculation Study As The Incentive To Change Modern Informed Consent Standards, Marie Constance Scheperle
The Guatemala Std Inoculation Study As The Incentive To Change Modern Informed Consent Standards, Marie Constance Scheperle
Washington and Lee Journal of Civil Rights and Social Justice
No abstract provided.
(Un)Reasonable Expectation Of Digital Privacy, Brandon T. Crowther
(Un)Reasonable Expectation Of Digital Privacy, Brandon T. Crowther
BYU Law Review
No abstract provided.
Public Education And Student Privacy: Application Of The Fourth Amendment To Dormitories At Public Colleges And Universities, Bryan R. Lemons
Public Education And Student Privacy: Application Of The Fourth Amendment To Dormitories At Public Colleges And Universities, Bryan R. Lemons
Brigham Young University Education and Law Journal
No abstract provided.
The Need To Prevent Employers From Accessing Private Social Network Profiles, Brett Novick
The Need To Prevent Employers From Accessing Private Social Network Profiles, Brett Novick
University of Michigan Journal of Law Reform Caveat
In March 2012, social network privacy became a conversation topic after news reports of the story of Justin Bassett, a job applicant who withdrew his application in the middle of an interview when the interviewer asked him for the username and password of his private Facebook account. Although the issue has received much attention from the public and media, the Department of Justice (DOJ) has stated that it has no interest in prosecuting employers for asking for social networking account information. Fortunately, legislation that would make it illegal for employers to ask for the username and passwords for social networking …
Privacy Policies, Terms Of Service, And Ftc Enforcement: Broadening Unfairness Regulation For A New Era, G. S. Hans
Privacy Policies, Terms Of Service, And Ftc Enforcement: Broadening Unfairness Regulation For A New Era, G. S. Hans
Michigan Telecommunications & Technology Law Review
This Note examines website privacy policies in the context of FTC regulation. The relevant portion of Section 5 of the Federal Trade Commission Act, 15 U.S.C. § 45(a), uses the following language to define the scope of the agency's regulatory authority: "Unfair methods of competition in or affecting commerce, and unfair or deceptive acts or practices in or affecting commerce, are hereby declared unlawful." Specifically, this Note analyzes the FTC's power to regulate unfair practices (referred to as the FTC's "unfairness power") granted by Section 5, and also discusses the deception prong of Section 5, which allows the agency to …
Property As Control: The Case Of Information, Jane B. Baron
Property As Control: The Case Of Information, Jane B. Baron
Michigan Telecommunications & Technology Law Review
If heath policy makers' wishes come true, by the end of the current decade the paper charts in which most of our medical information is currently recorded will be replaced by networked electronic health records ("EHRs").[...] Like all computerized records, networked EHRs are difficult to secure, and the information in EHRs is both particularly sensitive and particularly valuable for commercial purposes. Sadly, the existing federal statute meant to address this problem, the Health Insurance Portability and Accountability Act of 1996 ("HIPAA"), is probably inadequate to the task.[...] Health law, privacy, and intellectual property scholars have all suggested that the river …
No Cause Of Action: Video Surveillance In New York City, Olivia J. Greer
No Cause Of Action: Video Surveillance In New York City, Olivia J. Greer
Michigan Telecommunications & Technology Law Review
In 2010, New York City Police Commissioner Raymond Kelly announced a new network of video surveillance in the City. The new network would be able to prevent future terrorist attacks by identifying suspicious behavior before catastrophic events could take place. Kelly told reporters, "If we're looking for a person in a red jacket, we can call up all the red jackets filmed in the last 30 days," and "[w]e're beginning to use software that can identify suspicious objects or behaviors." Gothamist later made a witticism of Kelly's statement, remarking, "Note to terrorists: red jackets are not a good look for …
Big Brother Has Big Shoulders: Defining Privacy In The Face Of E-Discovery Expansion And Foia Reform, Natnael Moges
Big Brother Has Big Shoulders: Defining Privacy In The Face Of E-Discovery Expansion And Foia Reform, Natnael Moges
Public Interest Law Reporter
No abstract provided.
Back To The Future: Revisiting Zippo In Light Of "Modern Concerns", 29 J. Marshall J. Computer & Info. L. 231 (2012), David Swetnam-Burland, Stacy O. Stitham
Back To The Future: Revisiting Zippo In Light Of "Modern Concerns", 29 J. Marshall J. Computer & Info. L. 231 (2012), David Swetnam-Burland, Stacy O. Stitham
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
"Tinkering" With The First Amendment's Protection Of Student Speech On The Internet, 29 J. Marshall J. Computer & Info. L. 167 (2012), Steven M. Puiszis
"Tinkering" With The First Amendment's Protection Of Student Speech On The Internet, 29 J. Marshall J. Computer & Info. L. 167 (2012), Steven M. Puiszis
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
World Wide Web Of Love, Lies, And Legislation: Why Online Dating Websites Should Screen Members, 29 J. Marshall J. Computer & Info. L. 251 (2012), Maureen Horcher
World Wide Web Of Love, Lies, And Legislation: Why Online Dating Websites Should Screen Members, 29 J. Marshall J. Computer & Info. L. 251 (2012), Maureen Horcher
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The 20th Belle R. And Joseph H. Braun Memorial Symposium: The Development Of Privacy Law From Brandeis To Today: Opening Remarks, 29 J. Marshall J. Computer & Info. L. 279 (2012), Ralph Ruebner, Leslie Ann Reis, David E. Sorkin
The 20th Belle R. And Joseph H. Braun Memorial Symposium: The Development Of Privacy Law From Brandeis To Today: Opening Remarks, 29 J. Marshall J. Computer & Info. L. 279 (2012), Ralph Ruebner, Leslie Ann Reis, David E. Sorkin
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Session I: The Legacy Of Justice Arthur Goldberg, 29 J. Marshall J. Computer & Info. L. 285 (2012), Samuel R. Olken, Gerald Berendt, Gilbert A. Cornfield, Gilbert Feldman, David Stebenne, Milton I. Shadur
Session I: The Legacy Of Justice Arthur Goldberg, 29 J. Marshall J. Computer & Info. L. 285 (2012), Samuel R. Olken, Gerald Berendt, Gilbert A. Cornfield, Gilbert Feldman, David Stebenne, Milton I. Shadur
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Session Ii: Historical Perspectives On Privacy In American Law, 29 J. Marshall J. Computer & Info. L. 319 (2012), Steven D. Schwinn, Alberto Bernabe, Kathryn Kolbert, Adam D. Moore, Marc Rotenberg
Session Ii: Historical Perspectives On Privacy In American Law, 29 J. Marshall J. Computer & Info. L. 319 (2012), Steven D. Schwinn, Alberto Bernabe, Kathryn Kolbert, Adam D. Moore, Marc Rotenberg
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Dedication Of The Arthur J. Goldberg Memorial Courtroom, 29 J. Marshall J. Computer & Info. L. 405 (2012), Hon. Antonin Scalia
Dedication Of The Arthur J. Goldberg Memorial Courtroom, 29 J. Marshall J. Computer & Info. L. 405 (2012), Hon. Antonin Scalia
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.