Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2012

Journal

Discipline
Institution
Keyword
Publication

Articles 1 - 30 of 58

Full-Text Articles in Privacy Law

Information Escrows, Ian Ayres, Cait Unkovic Nov 2012

Information Escrows, Ian Ayres, Cait Unkovic

Michigan Law Review

A variety of information escrows - including allegation escrows, suspicion escrows, and shared-interest escrows - hold the promise of reducing the first-mover disadvantage that can deter people with socially valuable private information from disclosing that information to others. Information escrows allow people to transmit sensitive information to a trusted intermediary, an escrow agent, who only forwards the information under prespecified conditions. For example, an allegation escrow for sexual harassment might allow a victim to place a private complaint into escrow with instructions that the complaint be lodged with the proper authorities only if the escrow agent receives at least one …


Limits Of The Federal Wiretap Act's Ability To Protect Against Wi-Fi Sniffing, Mani Potnuru Oct 2012

Limits Of The Federal Wiretap Act's Ability To Protect Against Wi-Fi Sniffing, Mani Potnuru

Michigan Law Review

Adoption of Wi-Fi wireless technology continues to see explosive growth. However many users still operate their home Wi-Fi networks in unsecured mode or use publicly available unsecured Wi-Fi networks, thus exposing their communications to the dangers of "packet sniffing," a technique used for eavesdropping on a network. Some have argued that communications over unsecured Wi-Fi networks are "readily accessible to the general public" and that such communications are therefore excluded from the broad protections of the Federal Wiretap Act against intentional interception of electronic communications. This Note examines the Federal Wiretap Act and argues that the current Act's treatment of …


Warrantless Searches And Smartphones: Privacy In The Palm Of Your Hand?, Margaret M. Lawton Sep 2012

Warrantless Searches And Smartphones: Privacy In The Palm Of Your Hand?, Margaret M. Lawton

University of the District of Columbia Law Review

Incident to a drug arrest, a police officer removes a smartphone from the pocket of the defendant. The smartphone may have incriminating evidence-phone numbers, pictures, text messages, and e-mails. But can the officer examine the smartphone on the scene or back at the station? Or does the officer need to show probable cause and obtain a warrant before examining the phone? If the phone were instead the arrestee's wallet or a cigarette package, under the search incident to lawful arrest exception to the Fourth Amendment's warrant requirement the officer could open and search inside either of these "containers." Anything found …


Looking Through The Prism Of Privacy And Trespass: Smartphones And The Fourth Amendment, Saby Ghoshray Sep 2012

Looking Through The Prism Of Privacy And Trespass: Smartphones And The Fourth Amendment, Saby Ghoshray

University of the District of Columbia Law Review

Technology in the twenty-first century has dramatically changed our lives, but the law has not kept pace with technological advances. The treatment of smartphones in Fourth Amendment jurisprudence is no exception. This is made evident by the increasingly scattered outcomes of litigation involving the privacy interests of smartphone owners.' As the cross-jurisdictional inconsistencies of judicial decisions applying the Fourth Amendment to smartphones mount, I am drawn to seek answers from two foundational pillars of the Supreme Court's search and seizure jurisprudence: protection against invasions of privacy and the bulwark against trespass.


Privacy For Social Networking, Connie Davis Powell Jul 2012

Privacy For Social Networking, Connie Davis Powell

University of Arkansas at Little Rock Law Review

This article begins by considering the emergence of social networks as a major medium of communication and posits that the success of social networks is attributable to their users' willingness to share their information. Next, the article considers the expectation of privacy for users of social networks and whether such expectation is reasonable. In particular, the article discusses the privacy policies and legal terms governing the use of social networks, and tracks the evolution of such terms and policies as they slowly whittle away user control over time. The article then discusses public outcry regarding the disclosure of information contrary …


Walled Gardens Of Privacy Or “Binding Corporate Rules?”: A Critical Look At International Protection Of Online Privacy, Joanna Kulesza Jul 2012

Walled Gardens Of Privacy Or “Binding Corporate Rules?”: A Critical Look At International Protection Of Online Privacy, Joanna Kulesza

University of Arkansas at Little Rock Law Review

A growing concern in the era of cloud computing is protecting Internet users' privacy. This concern is compounded by the fact that there are no effective international solutions. This article considers the latest European Union (EU) proposed development in this area – a regulatory model based on amended Binding Corporate Rules (BCR) – as introduced by the EU Justice Commissioner. These planned changes would have worldwide effects on international companies' online activities in transboundary cyberspace.

After providing a background on the concept of defining privacy in general, the article describes the BCR proposal, and proceeds to consider the likelihood of …


Electronic Privacy And Employee Speech, Pauline T. Kim Jun 2012

Electronic Privacy And Employee Speech, Pauline T. Kim

Chicago-Kent Law Review

The boundary between work and private life is blurring as a result of changes in the organization of work and advances in technology. Current privacy law is ill-equipped to address these changes and as a result, employees' privacy in their electronic communications is only weakly protected from employer scrutiny. At the same time, the law increasingly protects certain socially valued forms of employee speech. In particular, collective speech, speech that enforces workplace regulations and speech that deters or reports employer wrong-doing are explicitly protected by law from employer reprisals. These two developments—weak protection of employee privacy and increased protection for …


The Progress Of Science And The Useful Arts: Misadventures In Canadian Law On Patent-Eligible Subject Matter, Ken Bousfield Jun 2012

The Progress Of Science And The Useful Arts: Misadventures In Canadian Law On Patent-Eligible Subject Matter, Ken Bousfield

Canadian Journal of Law and Technology

Patent-Eligible Subject-Matter in Canada

The law of patent-eligible subject-matter in Canada has become badly muddled. There has been repeated confusion of subject-matter issues with non-subject matter issues such as novelty, obviousness, and utility. There has also been repeated confusion within the following group of issues pertaining to whether subject-matter is patent-eligible: whether a claim is for a mere idea or aggregation or for a patentable invention; whether claimed subject-matter falls within science and the useful arts; and whether claimed subject-matter falls within the statutory classes listed in the definition of “invention”. Echoes of older UK-based cases, relating to statutory provisions …


Harvesting The "Forbidden Fruit" Of Biotechnology Research: Genetic Engineering, International Law And The Patentability Of Higher Life Forms In Canada, Eugene C. Lim Jun 2012

Harvesting The "Forbidden Fruit" Of Biotechnology Research: Genetic Engineering, International Law And The Patentability Of Higher Life Forms In Canada, Eugene C. Lim

Canadian Journal of Law and Technology

As the frontiers of science are constantly redefined by the emergence of new technology, patent law often has to struggle to keep pace with the changing conception of what constitutes a protectable “invention”. A key challenge facing patent law in the age of biotechnology lies in ascertaining the extent to which genetically engineered life forms should be protected. A major concern relates to whether such life forms should be excluded from patentability on grounds of ordre public, ethics and morality.

This article critically explores the extent to which patent law in Canada protects this “forbidden fruit” of biotechnological innovation, and …


A Delicate Balance: Defining The Line Between Open Civil Proceedings And The Protection Of Children In The Online Digital Era, Courtney Retter, Shaheen Shariff Jun 2012

A Delicate Balance: Defining The Line Between Open Civil Proceedings And The Protection Of Children In The Online Digital Era, Courtney Retter, Shaheen Shariff

Canadian Journal of Law and Technology

He thought of the telescreen with its never-sleeping ear. They could spy upon you night and day, but if you kept your head you could still outwit them. [. . .] They could lay bare in the utmost detail everything that you had done or said or thought; but the inner heart, whose workings were mysterious even to yourself, remained impregnable.

— George Orwell, 1984

On Thursday September 27, 2012, a few months after our paper was written, the Supreme Court of Canada solidified the rights of children victimized by cyberbullying in the landmark decision of AB (Litigation Guardian of) …


Understanding The Internet As A Human Right, Michael Karanicolas Jun 2012

Understanding The Internet As A Human Right, Michael Karanicolas

Canadian Journal of Law and Technology

Around the world, fundamental human rights have undergone a dramatic conceptual shift as a result of the spread of the Internet. The right to freedom of expression, once largely limited to printing, has exploded in a digital world that provides users with an unprecedented megaphone to broadcast their views. The right to political participation and the right to free assembly have similarly been reborn in an age of instant communication, allowing activists to mobilise hundreds of thousands of followers with a single email, text or tweet. Although these are the most notable examples, the Internet has also had a transformative …


The Limitations Of Regulatory Oversight On Online Video, Jennifer Simpson Jun 2012

The Limitations Of Regulatory Oversight On Online Video, Jennifer Simpson

Canadian Journal of Law and Technology

Discussion in this paper focuses on the factors, attributes, and elements of telecom and broadcast regulation in Canada. Part I of this study briefly outlines the history of online video regulation in Canada to date. In Part II speculation as to how online video might be regulated, based on prior decisions of the CRTC, is presented. Part III considers the challenges of applying the Broadcasting Act to new media entities in order to create a regulatory framework for online video. Part IV looks at judicial decisions related to broadcast law that may be used to define the nature of the …


Privacy Rights Left Behind At The Border: The Exhaustive, Exploratory Searches Effectuated In United States V. Cotterman, Aaron Mcknight May 2012

Privacy Rights Left Behind At The Border: The Exhaustive, Exploratory Searches Effectuated In United States V. Cotterman, Aaron Mcknight

BYU Law Review

No abstract provided.


Post-Mortem Right Of Publicity In Arkansas: Protecting Against The Unauthorized Use Of A Person’S Identity For Commercial Purposes, Rashauna A. Norment Apr 2012

Post-Mortem Right Of Publicity In Arkansas: Protecting Against The Unauthorized Use Of A Person’S Identity For Commercial Purposes, Rashauna A. Norment

University of Arkansas at Little Rock Law Review

The right of publicity protects a person against the use of his or her name, identity, likeness, or other personal characteristics for commercial purposes without consent. Many states have implemented a statutory right of publicity or have recognized the right under common law. Currently, only three states have a post-mortem right of publicity. This article discusses jurisdictions that have adopted a postmortem right of publicity, and advocates that Arkansas adopt a postmortem right of publicity for everyone.

Specifically, the article argues that traditional protection stemming from actions for invasion of a right of privacy, trademark infringement, and copyright infringement cannot …


Wiretapping The Internet: The Expansion Of The Communications Assistance To Law Enforcement Act To Extend Government Surveillance, Christa M. Hibbard Mar 2012

Wiretapping The Internet: The Expansion Of The Communications Assistance To Law Enforcement Act To Extend Government Surveillance, Christa M. Hibbard

Federal Communications Law Journal

Criminal use of the Internet to circumvent traditional government phone wiretaps has inspired the Obama Administration to create a proposal to expand the Communications Assistance to Law Enforcement Act ("CALEA"). CALEA was passed in 1994 to regulate telephone and broadband companies to ensure compliance with standards to enable government wiretapping. The proposed amendment of CALEA would allow the government to require all communications service providers to meet technical standards necessary to comply with a wiretap order. The expansion of CALEA would likely widen its scope to social networking sites, instant messaging, gaming consoles that allow conversation among multiple players, and …


The Guatemala Std Inoculation Study As The Incentive To Change Modern Informed Consent Standards, Marie Constance Scheperle Mar 2012

The Guatemala Std Inoculation Study As The Incentive To Change Modern Informed Consent Standards, Marie Constance Scheperle

Washington and Lee Journal of Civil Rights and Social Justice

No abstract provided.


(Un)Reasonable Expectation Of Digital Privacy, Brandon T. Crowther Mar 2012

(Un)Reasonable Expectation Of Digital Privacy, Brandon T. Crowther

BYU Law Review

No abstract provided.


Public Education And Student Privacy: Application Of The Fourth Amendment To Dormitories At Public Colleges And Universities, Bryan R. Lemons Mar 2012

Public Education And Student Privacy: Application Of The Fourth Amendment To Dormitories At Public Colleges And Universities, Bryan R. Lemons

Brigham Young University Education and Law Journal

No abstract provided.


The Need To Prevent Employers From Accessing Private Social Network Profiles, Brett Novick Jan 2012

The Need To Prevent Employers From Accessing Private Social Network Profiles, Brett Novick

University of Michigan Journal of Law Reform Caveat

In March 2012, social network privacy became a conversation topic after news reports of the story of Justin Bassett, a job applicant who withdrew his application in the middle of an interview when the interviewer asked him for the username and password of his private Facebook account. Although the issue has received much attention from the public and media, the Department of Justice (DOJ) has stated that it has no interest in prosecuting employers for asking for social networking account information. Fortunately, legislation that would make it illegal for employers to ask for the username and passwords for social networking …


Privacy Policies, Terms Of Service, And Ftc Enforcement: Broadening Unfairness Regulation For A New Era, G. S. Hans Jan 2012

Privacy Policies, Terms Of Service, And Ftc Enforcement: Broadening Unfairness Regulation For A New Era, G. S. Hans

Michigan Telecommunications & Technology Law Review

This Note examines website privacy policies in the context of FTC regulation. The relevant portion of Section 5 of the Federal Trade Commission Act, 15 U.S.C. § 45(a), uses the following language to define the scope of the agency's regulatory authority: "Unfair methods of competition in or affecting commerce, and unfair or deceptive acts or practices in or affecting commerce, are hereby declared unlawful." Specifically, this Note analyzes the FTC's power to regulate unfair practices (referred to as the FTC's "unfairness power") granted by Section 5, and also discusses the deception prong of Section 5, which allows the agency to …


Property As Control: The Case Of Information, Jane B. Baron Jan 2012

Property As Control: The Case Of Information, Jane B. Baron

Michigan Telecommunications & Technology Law Review

If heath policy makers' wishes come true, by the end of the current decade the paper charts in which most of our medical information is currently recorded will be replaced by networked electronic health records ("EHRs").[...] Like all computerized records, networked EHRs are difficult to secure, and the information in EHRs is both particularly sensitive and particularly valuable for commercial purposes. Sadly, the existing federal statute meant to address this problem, the Health Insurance Portability and Accountability Act of 1996 ("HIPAA"), is probably inadequate to the task.[...] Health law, privacy, and intellectual property scholars have all suggested that the river …


No Cause Of Action: Video Surveillance In New York City, Olivia J. Greer Jan 2012

No Cause Of Action: Video Surveillance In New York City, Olivia J. Greer

Michigan Telecommunications & Technology Law Review

In 2010, New York City Police Commissioner Raymond Kelly announced a new network of video surveillance in the City. The new network would be able to prevent future terrorist attacks by identifying suspicious behavior before catastrophic events could take place. Kelly told reporters, "If we're looking for a person in a red jacket, we can call up all the red jackets filmed in the last 30 days," and "[w]e're beginning to use software that can identify suspicious objects or behaviors." Gothamist later made a witticism of Kelly's statement, remarking, "Note to terrorists: red jackets are not a good look for …


Big Brother Has Big Shoulders: Defining Privacy In The Face Of E-Discovery Expansion And Foia Reform, Natnael Moges Jan 2012

Big Brother Has Big Shoulders: Defining Privacy In The Face Of E-Discovery Expansion And Foia Reform, Natnael Moges

Public Interest Law Reporter

No abstract provided.


Back To The Future: Revisiting Zippo In Light Of "Modern Concerns", 29 J. Marshall J. Computer & Info. L. 231 (2012), David Swetnam-Burland, Stacy O. Stitham Jan 2012

Back To The Future: Revisiting Zippo In Light Of "Modern Concerns", 29 J. Marshall J. Computer & Info. L. 231 (2012), David Swetnam-Burland, Stacy O. Stitham

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


"Tinkering" With The First Amendment's Protection Of Student Speech On The Internet, 29 J. Marshall J. Computer & Info. L. 167 (2012), Steven M. Puiszis Jan 2012

"Tinkering" With The First Amendment's Protection Of Student Speech On The Internet, 29 J. Marshall J. Computer & Info. L. 167 (2012), Steven M. Puiszis

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


World Wide Web Of Love, Lies, And Legislation: Why Online Dating Websites Should Screen Members, 29 J. Marshall J. Computer & Info. L. 251 (2012), Maureen Horcher Jan 2012

World Wide Web Of Love, Lies, And Legislation: Why Online Dating Websites Should Screen Members, 29 J. Marshall J. Computer & Info. L. 251 (2012), Maureen Horcher

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The 20th Belle R. And Joseph H. Braun Memorial Symposium: The Development Of Privacy Law From Brandeis To Today: Opening Remarks, 29 J. Marshall J. Computer & Info. L. 279 (2012), Ralph Ruebner, Leslie Ann Reis, David E. Sorkin Jan 2012

The 20th Belle R. And Joseph H. Braun Memorial Symposium: The Development Of Privacy Law From Brandeis To Today: Opening Remarks, 29 J. Marshall J. Computer & Info. L. 279 (2012), Ralph Ruebner, Leslie Ann Reis, David E. Sorkin

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Session I: The Legacy Of Justice Arthur Goldberg, 29 J. Marshall J. Computer & Info. L. 285 (2012), Samuel R. Olken, Gerald Berendt, Gilbert A. Cornfield, Gilbert Feldman, David Stebenne, Milton I. Shadur Jan 2012

Session I: The Legacy Of Justice Arthur Goldberg, 29 J. Marshall J. Computer & Info. L. 285 (2012), Samuel R. Olken, Gerald Berendt, Gilbert A. Cornfield, Gilbert Feldman, David Stebenne, Milton I. Shadur

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Session Ii: Historical Perspectives On Privacy In American Law, 29 J. Marshall J. Computer & Info. L. 319 (2012), Steven D. Schwinn, Alberto Bernabe, Kathryn Kolbert, Adam D. Moore, Marc Rotenberg Jan 2012

Session Ii: Historical Perspectives On Privacy In American Law, 29 J. Marshall J. Computer & Info. L. 319 (2012), Steven D. Schwinn, Alberto Bernabe, Kathryn Kolbert, Adam D. Moore, Marc Rotenberg

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Dedication Of The Arthur J. Goldberg Memorial Courtroom, 29 J. Marshall J. Computer & Info. L. 405 (2012), Hon. Antonin Scalia Jan 2012

Dedication Of The Arthur J. Goldberg Memorial Courtroom, 29 J. Marshall J. Computer & Info. L. 405 (2012), Hon. Antonin Scalia

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.