Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (1860)
- Science and Technology Law (1591)
- Computer Law (1543)
- Intellectual Property Law (702)
- Constitutional Law (685)
-
- Health Law and Policy (463)
- Fourth Amendment (441)
- Criminal Law (388)
- First Amendment (371)
- Legislation (361)
- Criminal Procedure (357)
- International Law (339)
- Law and Society (335)
- Torts (334)
- State and Local Government Law (320)
- Human Rights Law (312)
- Administrative Law (307)
- Family Law (305)
- Supreme Court of the United States (303)
- Legal History (293)
- Courts (288)
- Jurisprudence (282)
- Communications Law (279)
- Marketing Law (277)
- Other Law (275)
- Consumer Protection Law (264)
- Public Law and Legal Theory (261)
- Transnational Law (260)
- Institution
-
- UIC School of Law (911)
- Schulich School of Law, Dalhousie University (302)
- Selected Works (193)
- University of Michigan Law School (169)
- Seattle University School of Law (149)
-
- Vanderbilt University Law School (143)
- Universitas Indonesia (122)
- University of Washington School of Law (105)
- The Catholic University of America, Columbus School of Law (96)
- Maurer School of Law: Indiana University (91)
- Boston University School of Law (81)
- Brooklyn Law School (81)
- University of Pennsylvania Carey Law School (67)
- University of Colorado Law School (61)
- University at Buffalo School of Law (56)
- New York Law School (54)
- University of Richmond (53)
- Washington and Lee University School of Law (53)
- American University Washington College of Law (46)
- William & Mary Law School (45)
- Notre Dame Law School (43)
- University of Maryland Francis King Carey School of Law (43)
- Brigham Young University Law School (42)
- West Virginia University (41)
- University of Kentucky (38)
- Fordham Law School (36)
- Roger Williams University (36)
- Chicago-Kent College of Law (35)
- University of Miami Law School (35)
- University of Georgia School of Law (31)
- Keyword
-
- Privacy (837)
- Surveillance (146)
- Fourth Amendment (145)
- Technology (144)
- Internet (108)
-
- Data protection (87)
- Data privacy (80)
- First Amendment (79)
- Data (75)
- Right to privacy (64)
- Privacy law (62)
- Right of privacy (61)
- Fourth amendment (58)
- Social media (57)
- Cybersecurity (52)
- Law (49)
- Copyright (46)
- Privacy Law (46)
- Information (45)
- Big data (44)
- European Union (39)
- GDPR (38)
- Artificial intelligence (37)
- Security (37)
- Confidentiality (35)
- Data security (34)
- FTC (34)
- Regulation (34)
- Abortion (33)
- Search (33)
- Publication Year
- Publication
-
- UIC John Marshall Journal of Information Technology & Privacy Law (777)
- Canadian Journal of Law and Technology (256)
- Faculty Scholarship (193)
- "Dharmasisya” Jurnal Program Magister Hukum FHUI (121)
- UIC Law Review (111)
-
- Seattle University Law Review (104)
- All Faculty Scholarship (94)
- Catholic University Journal of Law and Technology (84)
- Articles (74)
- Michigan Law Review (73)
- Articles by Maurer Faculty (55)
- Vanderbilt Journal of Entertainment & Technology Law (54)
- Publications (51)
- Washington Law Review (43)
- Faculty Publications (42)
- Vanderbilt Law Review (40)
- West Virginia Law Review (40)
- Articles, Book Chapters, & Popular Press (34)
- Buffalo Law Review (32)
- Journal Articles (32)
- Seattle Journal for Social Justice (29)
- Kentucky Law Journal (28)
- Law Faculty Scholarship (27)
- Vanderbilt Law School Faculty Publications (27)
- Touro Law Review (26)
- Articles & Chapters (25)
- BYU Law Review (25)
- Indiana Law Journal (25)
- NYLS Law Review (25)
- University of Michigan Journal of Law Reform (25)
- Publication Type
- File Type
Articles 2101 - 2130 of 4185
Full-Text Articles in Privacy Law
California’S Eavesdropping Law Endangers Victims Of Domestic Violence, 31 J. Marshall J. Info. Tech. & Privacy L. 57 (2014), John E.B. Myers
California’S Eavesdropping Law Endangers Victims Of Domestic Violence, 31 J. Marshall J. Info. Tech. & Privacy L. 57 (2014), John E.B. Myers
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Canada’S Anti-Spam Legislation: A Constitutional Analysis, 31 J. Marshall J. Info. Tech. & Privacy L. 1 (2014), Emir Crowne, Stephanie Provato
Canada’S Anti-Spam Legislation: A Constitutional Analysis, 31 J. Marshall J. Info. Tech. & Privacy L. 1 (2014), Emir Crowne, Stephanie Provato
UIC John Marshall Journal of Information Technology & Privacy Law
On December 15th, 2010, the Government of Canada agreed to Bill C-28, the Fighting Internet and Wireless Spam Act, with the intent to “deter the most damaging and deceptive forms of spam… from occurring in Canada and to help to drive out spammers.” Canada‟s Anti- Spam Legislation (“CASL”) was born. Although CASL has only been in force since July 1st, 2014, we argue that the Act may not survive constitutional scrutiny as it unduly restricts freedom of speech.
The Online Gun Marketplace And The Dangerous Loophole In The National Instant Background Check System, 30 J. Marshall J. Info. Tech. & Privacy L. 757 (2014), Ann Daniels
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Shutting Down The Ex Parte Party: How To Keep Bittorrent Copyright Trolls From Abusing The Federal Court’S Discovery System, 31 J. Marshall J. Info. Tech. & Privacy L. 105 (2014), Jennifer L. Hunter
Shutting Down The Ex Parte Party: How To Keep Bittorrent Copyright Trolls From Abusing The Federal Court’S Discovery System, 31 J. Marshall J. Info. Tech. & Privacy L. 105 (2014), Jennifer L. Hunter
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Ethical Implications Of Cloud Computing For Lawyers, 31 J. Marshall J. Info. Tech. & Privacy L. 71 (2014), Stuart Pardau, Blake Edwards
The Ethical Implications Of Cloud Computing For Lawyers, 31 J. Marshall J. Info. Tech. & Privacy L. 71 (2014), Stuart Pardau, Blake Edwards
UIC John Marshall Journal of Information Technology & Privacy Law
This paper aims to isolate the pertinent ethical issues of cloud computing and chart a sensible path forward for lawyers. Part II briefly introduces the concept of cloud computing. Part III discusses the lawyer‟s duties of confidentiality, of competence, to protect client property, and to oversee non-lawyers who are providing assistance. Part III also examines the application of these duties by the various state bar associations to the problem of cloud computing. Part IV looks at sample terms of use of some of the more popular vendors. Part V suggests that securing informed consent, employing specialty cloud providers, and purchasing …
The Right To Be Forgotten: Forced Amnesia In A Technological Age, 31 J. Marshall J. Info. Tech. & Privacy L. 133 (2014), Robert Bolton
The Right To Be Forgotten: Forced Amnesia In A Technological Age, 31 J. Marshall J. Info. Tech. & Privacy L. 133 (2014), Robert Bolton
UIC John Marshall Journal of Information Technology & Privacy Law
In the modern era, the connection between technology and one’s personal life has increased the number of moments recorded for posterity. While in many circumstances this is an ideal opportunity for fond recollection, it has the downside of displaying for others our less flattering moments. Because the Internet has such a wide scope, once something has entered its domain, it is virtually impossible to permanently remove. With a public increasingly perceiving this winnowing of privacy as a negative tendency, legislators both at home and abroad have made proposals that attempt to place restrictions on what content social media is allowed …
The Thirty-Third Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 31 J. Marshall J. Computer & Info. L. 237 (2014), Adam Florek, Anisha Mehta, Danielle Young, Michael Greene
The Thirty-Third Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 31 J. Marshall J. Computer & Info. L. 237 (2014), Adam Florek, Anisha Mehta, Danielle Young, Michael Greene
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Bulk Telephony Metadata Collection And The Fourth Amendment: The Case For Revisiting The Third-Party Disclosure Doctrine In The Digital Age, 31 J. Marshall J. Info. Tech. & Privacy L. 191 (2014), Timothy Geverd
UIC John Marshall Journal of Information Technology & Privacy Law
This Article argues that federal courts should seize the opportunity presented by the Snowden leaks to reexamine the continued vitality of the current third-party disclosure doctrine in Fourth Amendment jurisprudence. Specifically, this Article argues that Smith v. Maryland simply cannot continue to act as the “North Star” for judges navigating the “Fourth Amendment waters” of the digital age, and that instead, Smith should apply more narrowly in the digital age. In so arguing, this Article advocates that courts apply a modified, twostep test to evaluating third-party disclosures rather than applying the traditional binary rubric that courts have drawn from Smith …
Eyes On The Road Program In Taiwan―Information Privacy Issues Under The Taiwan Personal Data Protection Act, 31 J. Marshall J. Info. Tech. & Privacy L. 145 (2015), Chen-Hung Chang
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Thirty-Third Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 31 J. Marshall J. Computer & Info. L. 251 (2014), Amany Awad, Kelly O'Neill, Arlo Walsman
The Thirty-Third Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 31 J. Marshall J. Computer & Info. L. 251 (2014), Amany Awad, Kelly O'Neill, Arlo Walsman
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Thirty-Third Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 31 J. Marshall J. Computer & Info. L. 285 (2014), Sara Schroeder, Austin Hoffman, Becky Fey
The Thirty-Third Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 31 J. Marshall J. Computer & Info. L. 285 (2014), Sara Schroeder, Austin Hoffman, Becky Fey
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Setting Parental Controls: Do Parents Have A Duty To Supervise Their Children’S Use Of The Internet?, 31 J. Marshall J. Info. Tech. & Privacy L. 309 (2014), Alberto Bernabe
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Beyond Privacy Rights: Crossborder Cyber-Espionage And International Law, 31 J. Marshall J. Info. Tech. & Privacy L. 369 (2014), Stefan Kirchner
Beyond Privacy Rights: Crossborder Cyber-Espionage And International Law, 31 J. Marshall J. Info. Tech. & Privacy L. 369 (2014), Stefan Kirchner
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Facebook Messenger: Eroding User Privacy In Order To Collect, Analyze, And Sell Your Personal Information, 31 J. Marshall J. Info. Tech. & Privacy L. 393 (2014), Erica Jaeger
UIC John Marshall Journal of Information Technology & Privacy Law
This comment will examine Facebook‘s new standalone Facebook Messenger app, and review how the Privacy Policy, Data Use Policy, and the list of permissions violate Section 5 of the Federal Trade Commission Act. The comment will focus on Facebook Messenger‘s deceptive methods of accessing users‘ personal information and how Facebook uses that personal information. Section II will explain social networking sites and the configuration of Facebook, Facebook Messenger, and Facebook‘ s evolving policies. Section II will also discuss the Federal Trade Commission and the Federal Trade Commission Act that was created to protect consumers against unfair, deceptive, or fraudulent practices.15 …
Cyber-Security Insurance: Navigating The Landscape Of A Growing Field, 31 J. Marshall J. Info. Tech. & Privacy L. 379 (2014), Daniel Garrie, Michael Mann
Cyber-Security Insurance: Navigating The Landscape Of A Growing Field, 31 J. Marshall J. Info. Tech. & Privacy L. 379 (2014), Daniel Garrie, Michael Mann
UIC John Marshall Journal of Information Technology & Privacy Law
In today‟s marketplace where businesses are constantly being threatened by data breaches and cyber-attacks, it is imperative that a global company obtain cyber-security insurance. The cyber-security insurance market is now the fastest growing segment of the insurance industry as cyber-threats are on the rise and business trade partners and consumers are insisting on safeguards for their confidential and sensitive information. Given how great the potential liability and damages resulting from a data breach can be companies cannot afford to be without cyber-security insurance. As this new form of insurance continues to emerge and develop, it is important for companies to …
Breach Notification Requirements Under The European Union Legal Framework: Convergence, Conflicts, And Complexity In Compliance, 31 J. Marshall J. Info. Tech. & Privacy L. 317 (2014), Samson Esayas
UIC John Marshall Journal of Information Technology & Privacy Law
The European Union (EU) legal landscape on data privacy and information security is undergoing significant changes. A prominent legislative development in recent years is the introduction of breach notification requirements within a number of regulatory instruments. In only the past two years, the Community legislator has adopted, and proposed, four different regulatory instruments containing breach notification requirements. There are also existing requirements for the telecom sector. This creates a complex mesh of regulatory frameworks for breach notification where different aspects of the same breach within the same company might have to be dealt with under different regulatory instruments, making compliance …
It Is Time For Investment Advisers To Join The Conversation About Social Media, 31 J. Marshall J. Info. Tech. & Privacy L. 423 (2014), Sarah Tanaka
UIC John Marshall Journal of Information Technology & Privacy Law
Section II will detail the creation of the SEC, including key that shaped the establishment, goals, and mission of the SEC. Furthermore, it will focus on who is an investment adviser under the Investment Advisers Act of 1940, the controlling legislation on the matter. Section II will also examine the SEC‟s current guidance on investment advisers‟ use of social media and the public policy behind the new provisions. With social media revolutionizing the way individuals communicate and share information, Section III will discuss the advantages and disadvantages of the current guidance regarding investment advisers‟ use of social media. It will …
Comments: What's Yours Is Ours? Gamete Donation In The Marital Context: Why Courts And Legislatures Should Not Interfere With An Individual's Fundamental Right To Privacy, Emily K. Alt
University of Baltimore Law Review
No abstract provided.
Comments: Newborn Screening Programs And Privacy: Shifting Responsibility From The Parent To The Laboratory, Michael D. Leeb
Comments: Newborn Screening Programs And Privacy: Shifting Responsibility From The Parent To The Laboratory, Michael D. Leeb
University of Baltimore Law Review
No abstract provided.
Avenging Revenge Porn, Samantha Kopf
The Child Independence Is Born: James Otis And Writs Of Assistance, James M. Farrell
The Child Independence Is Born: James Otis And Writs Of Assistance, James M. Farrell
Communication
This chapter is a reexamination of the Writs of Assistance speech by James Otis. In particular, it is a reconsideration of the evidence upon which rests the historical reputation of Otis’s address. Are the claims by historians who credit Otis with sparking the Revolutionary movement in colonial America warranted or not? That reassessment begins with a detailed review of the nature and function of writs of assistance within the political, legal, and economic environment of colonial Massachusetts. It then turns to an analysis of the legal dispute over writs of assistance in the 1761 trial. From there we will reconstruct …
A Reasonable Expectation Of Privacy Online: "Do Not Track" Legislation, Alicia Shelton
A Reasonable Expectation Of Privacy Online: "Do Not Track" Legislation, Alicia Shelton
University of Baltimore Law Forum
This year marked the twenty-fifth anniversary of the World Wide Web (“Web”), and more than 81% of Americans are now using the internet on a regular basis. Yet, despite the fact that key pieces of personally identifying information—name, address, phone number, email address, and birthday—and sensitive personal data—political opinions, racial or ethnic origin, religious beliefs, and health—can be learned through tracking an individual’s online activity, there continues to be a void of federal legislation protecting the privacy of internet users. In the absence of federal action, state legislatures are tasked with regulating electronic surveillance by both private companies and the …
Politics And The Public’S Right To Know, Lloyd Hitoshi Mayer
Politics And The Public’S Right To Know, Lloyd Hitoshi Mayer
Journal Articles
In the United States it is taken for granted that members of the public should have access to information about their government. This access takes many forms, including the ability to obtain copies of government documents, the ability to attend meetings of government officials, and the related obligations of government officials to document their activities and to reveal certain otherwise private information about themselves. This access also is often limited by countervailing concerns, such as the privacy of individual citizens and national security. Nevertheless, the presumption both at the federal level and in every state is to provide such access. …
Panel Iii: The Future Of The Press And Privacy, Amy Gajda, Clay Calvert, Tom Bivins, Amy Sanders, Stephen Ward
Panel Iii: The Future Of The Press And Privacy, Amy Gajda, Clay Calvert, Tom Bivins, Amy Sanders, Stephen Ward
Faculty Scholarship
No abstract provided.
Cause To Believe What? The Importance Of Defining A Search's Object--Or, How The Aba Would Analyze The Nsa Metadata Surveillance Program, Christopher Slobogin
Cause To Believe What? The Importance Of Defining A Search's Object--Or, How The Aba Would Analyze The Nsa Metadata Surveillance Program, Christopher Slobogin
Vanderbilt Law School Faculty Publications
Courts and scholars have devoted considerable attention to the definition of probable cause and reasonable suspicion. Since the demise of the mere evidence rule in the 1960s, however, they have rarely examined how these central Fourth Amendment concepts interact with the object of the search. That is unfortunate, because this interaction can have significant consequences. For instance, probable cause to believe that a search might lead to evidence of wrongdoing triggers a very different inquiry than probable cause to believe that a search will produce evidence of criminal activity. The failure to address the constraints that should be imposed on …
Electronic Privacy Information Center V. National Security Agency: How Glomar Responses Benefit Businesses And Provide An Epic Blow To Individuals, Joshua R. Chazen
Electronic Privacy Information Center V. National Security Agency: How Glomar Responses Benefit Businesses And Provide An Epic Blow To Individuals, Joshua R. Chazen
Journal of Business & Technology Law
No abstract provided.
Fouling The First Amendment: Why Colleges Can't, And Shouldn't, Control Student Athletes' Speech On Social Media, Frank D. Lomonte
Fouling The First Amendment: Why Colleges Can't, And Shouldn't, Control Student Athletes' Speech On Social Media, Frank D. Lomonte
Journal of Business & Technology Law
No abstract provided.
Policing The Social Media Water Cooler: Recent Nlrb Decisions Should Make Employers Think Twice Before Terminating An Employee For Comments Posted On Social Media Sites, Eric Raphan, Sean Kirby
Policing The Social Media Water Cooler: Recent Nlrb Decisions Should Make Employers Think Twice Before Terminating An Employee For Comments Posted On Social Media Sites, Eric Raphan, Sean Kirby
Journal of Business & Technology Law
No abstract provided.
Maryland's Social Networking Law: No "Friend" To Employers And Employees, Alexander Borman
Maryland's Social Networking Law: No "Friend" To Employers And Employees, Alexander Borman
Journal of Business & Technology Law
No abstract provided.
Riley V. California: The New Katz Or Chimel?, Adam Lamparello, Charles Maclean
Riley V. California: The New Katz Or Chimel?, Adam Lamparello, Charles Maclean
Richmond Journal of Law & Technology
To declare that in the administration of the criminal law the end justifies the means—to declare that the Government may commit crimes in order to secure the conviction of a private criminal—would bring terrible retribution. Against that pernicious doctrine this Court should resolutely set its face.