Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Case comment (5)
- Technology (5)
- Searches (4)
- Katz v. United States (3)
- Kerr (Orin) (2)
-
- PIPEDA (2)
- Privacy law (2)
- Seizures (2)
- Surveillance (2)
- Wiretapping (2)
- Admissibility of surveillance evidence (1)
- Aggregate data (1)
- Asymmetrical regulation (1)
- Book review (1)
- Book reviews (1)
- CCH (1)
- Canada (1)
- Canadian copyright law (1)
- Canadian regulation (1)
- Commerce Clause (1)
- Commercial information (1)
- Complaint resolution (1)
- Complaint-based enforcement (1)
- Computers & privacy (1)
- Confidentiality (1)
- Copyright infringement (1)
- Criticisms (1)
- Domain names (1)
- Droits d'auteurs (1)
- Droits des studios de cinéma (1)
- Publication
- Publication Type
Articles 1 - 30 of 41
Full-Text Articles in Science and Technology Law
Case Comment: Society Of Composers, Authors And Music Publishers Of Canada V. Canadian Association Of Internet Service Providers, Barry Sookman
Case Comment: Society Of Composers, Authors And Music Publishers Of Canada V. Canadian Association Of Internet Service Providers, Barry Sookman
Canadian Journal of Law and Technology
The exponential growth of the Internet has raised serious issues related to liability for copyright infringement. Who should compensate authors and publishers for the use of their works? What activities constitute infringement? Are Internet intermediaries such as Internet service providers (ISPs) liable for infringement when they provide connectivity to subscribers, when they provide hosting services, or when they use caching technologies? Where does infringement occur? Is the scope of the Copyright Act limited to acts of infringement that occur wholly within Canada or does the Act apply to acts that take place partly in Canada and partly outside of Canada? …
Three Years Under The Pipeda: A Disappointing Beginning, Christopher Berzins
Three Years Under The Pipeda: A Disappointing Beginning, Christopher Berzins
Canadian Journal of Law and Technology
As of January 1, 2004, after a three-year phase-in period, the Personal Information Protection and Electronic Documents Act (PIPEDA) came fully into force. Although considerable uncertainty currently prevails due to unanticipated events such as the resignation and replacement of Commissioner George Radwanski and the late constitutional challenge by Quebec, there is now sufficient experience with the legislation to begin to assess how the PIPEDA is working. It is also a timely juncture to do so with the extension of the legislation to the provincially regulated private sector.
Privacy Of Genetic Information In Canada: A Brief Examination Of The Legal And Ethical Tools That Should Frame Canada's Regulatory Response, Stephen Orr
Canadian Journal of Law and Technology
This article investigates the legal and ethical tools that should inform Canada's regulation of the privacy of genetic information. We are the first generation faced with resolving the unique challenges presented by genetic information. Unfortunately, the patchwork of instruments that could regulate genetic information in Canada is insufficient. The prospect of Canadians increasingly generating genetic information without a satisfactory structure for protecting the information is rather alarming. It is therefore important that we commit to reexamining regulations regarding genetic information. Different loci of governance will likely be required. Canada should look to international law and comparative law for inspiration regarding …
Video Surveillance, Evidence And Pipeda: A Comment On Ferenszy V. Mci Medical Clinic, Anne Uteck
Video Surveillance, Evidence And Pipeda: A Comment On Ferenszy V. Mci Medical Clinic, Anne Uteck
Canadian Journal of Law and Technology
One of the most common uses of surveillance is in the area of evidence gathering for investigation by litigators. Private investigators have long been retained for this purpose, and law enforcement officers routinely utilize surveillance devices to assist in the prosecution of a crime. The admissibility of video surveillance evidence obtained by private and government investigators is obviously not a new issue. What has come to the fore- front is the application of the Personal Information Protection and Electronic Documents Act in the context of video surveillance evidence, and its impact on civil litigators. Privacy interests inherent in the collection, …
No Lego, Yes Logo: The Federal Court Of Appeal Protects Innovation In Kirkbi Ag And Lego Canada Inc. V. Ritvik Holdings Inc., Sean Robertson
No Lego, Yes Logo: The Federal Court Of Appeal Protects Innovation In Kirkbi Ag And Lego Canada Inc. V. Ritvik Holdings Inc., Sean Robertson
Canadian Journal of Law and Technology
This article will discuss the case at the trial and appellate levels. It will specifically address the underlying policy debate between the majority and the dissenting decisions at the Federal Court of Appeal. The author will compare this debate to two similar international cases involving Lego’s infamous intellectual property litigation. With this recent finding in the 40-year-old saga of international case law surrounding Lego’s trade-mark enforcement strategy, the Appeal Division of the Federal Court of Canada joins the ranks of several other courts that have similarly excluded protection for Lego based on the doctrine of functionality. The comment concludes with …
The Law Of Privacy In Canada (Student Edition) By Barbara A. Mcisaac, Rick Shields, Kris Klein (Toronto: Thomson Carswell, 2004), John D. Gregory
The Law Of Privacy In Canada (Student Edition) By Barbara A. Mcisaac, Rick Shields, Kris Klein (Toronto: Thomson Carswell, 2004), John D. Gregory
Canadian Journal of Law and Technology
To help lawyers advise their clients on their rights and obligations in this complex and novel field, the various legal publishers have offered an array of guides and textbooks analyzing the law of privacy. Thomson/Carswell turned for its book to the national law firm of McCarthy Tétrault. Three McCarthy lawyers (Barbara McIsaac, Rick Shields, and Kris Klein) are listed as authors of The Law of Privacy in Canada, and several others have contributed significant parts of the text, and they have done a creditable job in pulling it all together. It seems to be the only thorough and up-to-date analysis …
A Chose By Any Other Name: Domain Names As A Security Interest, Andrew B. Cochran
A Chose By Any Other Name: Domain Names As A Security Interest, Andrew B. Cochran
Canadian Journal of Law and Technology
There has been increasing study of the issues involved in using intellectual property as a security interest, but little corresponding consideration of domain names. The ascendancy in value of domain names to modern business increases their usefulness as a security interest to lenders and borrowers alike. Their use in this respect appears not to be weighed down by two of the most difficult issues facing intellectual property, namely conflicting jurisdiction between federal statutory interests and provincial property interests, together with establishing more readily acceptable methods of valuation. However, there is ambiguity about the actual form of ownership interest involved with …
Ef Cultural Travel V. Explorica: The Protection Of Confidential Commercial Information In The American And Canadian Contexts, Suzanne White
Ef Cultural Travel V. Explorica: The Protection Of Confidential Commercial Information In The American And Canadian Contexts, Suzanne White
Canadian Journal of Law and Technology
Commercial information, once relegated to paper files stored in cabinets, is now more likely to be in digital form, allowing a myriad of people to access its contents. These electronic storehouses can subsequently be stored on the Internet, providing a handy but some- what risky means of archiving valuable information. The United States Court of Appeals (1st Circ.) judgment EF Cultural Travel v. Explorica1 is a clear indicator of the way in which the advent of the Internet has completely changed the constructive meaning of the traditional ‘‘office file’’. This paper attempts to provide an under- standing of the scope …
Recalibrating Copyright Law?: A Comment On The Supreme Court Of Canada's Decision In Cch Canadian Limited Et Al. V. Law Society Of Upper Canada, Teresa Scassa
Canadian Journal of Law and Technology
The Supreme Court of Canada’s unanimous decision in CCH Canadian Ltd. et. al. v. Law Society of Upper Canada marks a second recent decision by the Court that has major implications for the development of copyright law in Canada. In Théberge v. Galerie D’Art du Petit Champlain, the majority of the Court provided a significant articulation of the balance to be struck between the rights of creators and the rights of users of copyright-protected works. In doing so, it embraced an approach to copyright typical of U.S. copyright law in its heyday. The unanimous Court in CCH Canadian makes it …
Electronic Commerce - A Practitioner's Guide Edited By Alan M. Gahtan, Martin P.J. Kratz, And J. Fraser Mann (Toronto: Thomson Carwell, 2003), Harmonie Roesch-West
Electronic Commerce - A Practitioner's Guide Edited By Alan M. Gahtan, Martin P.J. Kratz, And J. Fraser Mann (Toronto: Thomson Carwell, 2003), Harmonie Roesch-West
Canadian Journal of Law and Technology
At a time when there seems to be no clear consensus on how to regulate electronic commerce comes a much-needed discussion of the many salient factors impacting the matter in Electronic Commerce: A Practitioner’s Guide. The collaborative effort includes works from several authors, compiled by Alan M. Gahtan, Martin P.J. Kratz, and J. Fraser Mann. This guide is an excellent first step in clarifying the issues and summarizing the precedents and relevant statute law to date. Although the target is an audience of law professionals, other e-commerce stakeholders, including business pro- fessionals, will find this collection useful.
Of Neighbours And Netizens, Or, Duty Of Care In The Tech Age: A Comment On Cooper V. Hobart, Robert J. Currie
Of Neighbours And Netizens, Or, Duty Of Care In The Tech Age: A Comment On Cooper V. Hobart, Robert J. Currie
Canadian Journal of Law and Technology
The focal point of this comment will be the recent judgment of the Supreme Court of Canada in Cooper v. Hobart, which appears to have made some significant changes to the elements of ‘‘duty of care’’, the foundational negligence concept. The Court framed its decision as refining duty of care analysis in order to properly deal with ‘‘novel claims’’ (i.e., those for which there is not an established or analogous duty of care in the existing case law). Given that the growth of elec- tronic commerce and Internet usage continues to spawn ‘‘novel’’ legal issues, Cooper is an appropriate starting …
Katz Is Dead. Long Live Katz, Peter P. Swire
Katz Is Dead. Long Live Katz, Peter P. Swire
Michigan Law Review
Katz v. United States is the king of Supreme Court surveillance cases. Written in 1967, it struck down the earlier regime of property rules, declaring that "the Fourth Amendment protects people, not places." The concurrence by Justice Harlan announced the new regime - court-issued warrants are required where there is an infringement on a person's "reasonable expectation of privacy." Together with the companion case Berger v. New York, Katz has stood for a grand conception of the Fourth Amendment as a bulwark against wiretaps and other emerging forms of surveillance. Professor Orin Kerr, in his excellent article, shows that …
A World Without Privacy: Why Property Does Not Define The Limits Of The Right Against Unreasonable Searches And Seizures, Sherry F. Colb
A World Without Privacy: Why Property Does Not Define The Limits Of The Right Against Unreasonable Searches And Seizures, Sherry F. Colb
Michigan Law Review
Imagine for a moment that it is the year 2020. An American company has developed a mind-reading device, called the "brain wave recorder" ("BWR"). The BWR is a highly sensitive instrument that detects electrical impulses from any brain within ten feet of the machine. Though previously thought impossible, the BWR can discern the following information about the target individual: (1) whether he or she is happy, sad, anxious, depressed, or irritable; (2) whether he or she is even slightly sexually aroused; (3) whether he or she is taking any medication (and if so, what the medication is); (4) if a …
The Fourth Amendment And New Technologies: Constitutional Myths And The Case For Caution, Orin S. Kerr
The Fourth Amendment And New Technologies: Constitutional Myths And The Case For Caution, Orin S. Kerr
Michigan Law Review
To one who values federalism, federal preemption of state law may significantly threaten the autonomy and core regulatory authority of The Supreme Court recently considered whether a1mmg an infrared thermal imaging device at a suspect's home can violate the Fourth Amendment. Kyllo v. United States announced a new and comprehensive rule: the government's warrantless use of senseenhancing technology that is "not in general use" violates the Fourth Amendment when it yields "details of the home that would previously have been unknowable without physical intrusion." Justice Scalia's majority opinion acknowledged that the Court's rule was not needed to resolve the case …
Technology, Privacy, And The Courts: A Reply To Colb And Swire, Orin S. Kerr
Technology, Privacy, And The Courts: A Reply To Colb And Swire, Orin S. Kerr
Michigan Law Review
I thank Sherry Colb and Peter Swire for devoting their time and considerable talents to responding to my article, The Fourth Amendment and New Technologies: Constitutional Myths and the Case for Caution. I will conclude with a few comments.
Geo-Location Technologies And Other Means Of Placing Borders On The 'Borderless' Internet, 23 J. Marshall J. Computer & Info. L. 101 (2004), Dan Jerker B. Svantenson
Geo-Location Technologies And Other Means Of Placing Borders On The 'Borderless' Internet, 23 J. Marshall J. Computer & Info. L. 101 (2004), Dan Jerker B. Svantenson
UIC John Marshall Journal of Information Technology & Privacy Law
Until recently it was considered impossible or at least pointless to attempt to identify the actual geographic location of Internet users in the online environment. However, this is changing and, although extremely accurate geographical identifiers do not exist, more geo-location technologies are used to track the location of the Internet users for a variety of reasons such as fraud detection, authentication, content targeting, security and network efficiency, conditioning access and legal compliance. The article distinguishes between hard protection provided by geo-location technologies and soft protection provided by non-technical means. It then proceeds in presenting and examining the geo-location technologies, sophisticated …
Open And Closed: Captioning Technology As A Means To Equality, 23 J. Marshall J. Computer & Info. L. 159 (2004), Faye Kuo
UIC John Marshall Journal of Information Technology & Privacy Law
It is well known that going to the movies is an extremely popular pastime for the Americans. However for millions of Americans who are deaf or hard of hearing this is not something that they can enjoy in the same terms as the rest of the other movie goers since most movie theater operators consider that providing “equal access” to deaf or hard of hearing individuals consists only of allowing them to enter the theater, purchase and ticket and sit down not install captioning technology so that deaf or hard of hearing individuals could actually understand the movie shown. The …
To: Client@Workplace.Com: Privilege At Risk?, 23 J. Marshall J. Computer & Info. L. 75 (2004), Dion Messer
To: Client@Workplace.Com: Privilege At Risk?, 23 J. Marshall J. Computer & Info. L. 75 (2004), Dion Messer
UIC John Marshall Journal of Information Technology & Privacy Law
As more attorneys now days use the e-mail as their primary source of communication with their clients, new issues arise regarding the potential threat to attorney-client communication privilege resulting from the standard and systematic employer monitoring of their employees e-mails. Indeed employers monitor their employees’ computer use and in some cases terminate employees as result of this monitoring, for various reasons such as to increase of employee productivity and efficiency, protect their public image, prevent workplace harassment, protect their Intellectual Property assets and their network capacity. Given the systematic workplace monitoring but also the fact that contrary to the American …
The Truth About The Truth In Domain Names Act: Why This Recently Enacted Law Is Unconstitutional, 23 J. Marshall J. Computer & Info. L. 141 (2004), Michael Honig
UIC John Marshall Journal of Information Technology & Privacy Law
In April 2003 the Prosecutorial Remedies and other Tools to End the Exploitation of Children Today Act of 2003 (PROTECT Act) was enacted with the goal to protect children from abduction and abuse and achieve a more aggressive pursuit of the individuals committing crimes against the children. Although the AMBER Alert system is the most known portion of the legislation other provisions including the Truth in Domain Names Act (TDNA) making the use of a misleading Internet domain name to deceive a person to view pornography a criminal offense were also included. This comment first discusses the case of John …
Lessons For The Hague: Internet Jurisdiction In Contract And Tort Cases In The European Community And The United States, 23 J. Marshall J. Computer & Info. L. 1 (2004), Moritz Keller
UIC John Marshall Journal of Information Technology & Privacy Law
With the increasing use of the Internet, all on-line users, web site owners, e-commerce companies and consumers alike, feel the need to be able to rely on clear standards for a potential contract or tort lawsuit following the Internet presence that could lead to multinational litigation. This goal could be achieved if the negotiations of the Hague Convention on international jurisdiction and enforcement of foreign judgments in civil and commercial matters succeed in harmonizing the rules of the different legal systems around the globe, or at least create a minimum standard for legal cases which would benefit greatly e-commerce and …
Privatizing Information And Information Technology – Whose Life Is It Anyway?, 22 J. Marshall J. Computer & Info. L. 375 (2004), Ellen Dannin
UIC John Marshall Journal of Information Technology & Privacy Law
As the United States government collects personal and private information about each of us, the government must also consider ways of preventing that information from falling into the wrong hands. In the wrong hands, that information can be turned against the individual – from blackmailing to more nefarious acts, such as terrorism. However, the government trend of outsourcing information gathering tasks has dramatically increased the chances of the wrong people receiving sensitive information. The government has been outsourcing information gathering tasks because of their failure to develop sufficient in-house expertise to handle information gathering. A second reason is that some …
Defining Cyberterrorism, 22 J. Marshall J. Computer & Info. L. 397 (2004), Mohammad Iqbal
Defining Cyberterrorism, 22 J. Marshall J. Computer & Info. L. 397 (2004), Mohammad Iqbal
UIC John Marshall Journal of Information Technology & Privacy Law
This article explores the definition of the term “cyberterrorism” in light of available literature and recent legislation in an attempt to distinguish cyberterrorism from other cyber activities and crimes. Cyberterrorism is the convergence of terrorism and cyberspace. The author discusses the differences between true cyberterrorism – that is, actual harm caused by cyber attacks – versus less malignant attacks that do more to annoy than harm. The author points out that the main difference between cyberterrorism and other cyber attacks, such as hacking and cracking, is that cyberterrorists are politically motivated, while other cyber attackers have non-politic motives.
The Fourth Amendment And The Wiretap Act Fail To Protect Against Random Isp Monitoring Of E-Mails For The Purpose Of Assisting Law Enforcement, 22 J. Marshall J. Computer & Info. L. 493 (2004), Jim W. Ko
UIC John Marshall Journal of Information Technology & Privacy Law
This article takes the position that the Wiretap Act and the Electronic Communications Privacy Act (ECPA) does little to provide protection against internet service providers (ISPs) that randomly monitor e-mails for the purpose of turning over evidence of criminal activities to law enforcement officials. The article provides a background to the special privacy issues that arise in the context of computer technology and ISPs. An analysis of the Wiretap Act, as amended by the ECPA, reveals that an implicit statutory prohibition against random surveillance by ISPs for the purpose of assisting law enforcement does in fact exist. Further, remedies for …
The Global Rise Of A Duty To Disclose Information Security Breaches, 22 J. Marshall J. Computer & Info. L. 457 (2004), Ethan Preston, Paul Turner
The Global Rise Of A Duty To Disclose Information Security Breaches, 22 J. Marshall J. Computer & Info. L. 457 (2004), Ethan Preston, Paul Turner
UIC John Marshall Journal of Information Technology & Privacy Law
Section 1798.82 requires computer database operators to disclose security breaches involving personal data information to both the subjects of the data and the owners of the personal data. However, this commentary views Section 1798.82 with apprehension, but takes the position that much broader duties to disclose such breaches are already in place. This article begins with a discussion about legislation that expressly require disclosure of computer security breaches, such as Section 1798.82 and Article 4 of the European Union Telecommunications and Electronic Communications Privacy Directives. Then it follows with a discussion about legislation and common law that implicitly requires disclosure …
Www.Yourname.Com: How Useful Is The Uniform Domain Name Dispute Resolution Policy ("Udrp") In Protecting Personal Names From Cybersquatters?, 22 J. Marshall J. Computer & Info. L. 535 (2004), Georgette H. Tarnow
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Democracy In Decline: Can Internet Voting Save The Electoral Process?, 22 J. Marshall J. Computer & Info. L. 409 (2004), Bryan Mercurio
Democracy In Decline: Can Internet Voting Save The Electoral Process?, 22 J. Marshall J. Computer & Info. L. 409 (2004), Bryan Mercurio
UIC John Marshall Journal of Information Technology & Privacy Law
Voter confidence that votes are accurately cast, counted, and kept are at an all time low. The traditional methods of voting has proven itself time and time again to be untrustworthy and unreliable, as evidenced recently in the 2000 presidential elections. The time is now ripe to thoroughly investigate alternative methods of casting ballots as a way to restore voter confidence in the electoral system. Using the Internet to assist the electoral system has emerged as a potential option in order to remedy many defects within the electoral process. However, Internet voting is untested and less transparent than traditional voting …
Dow Jones And The Defamatory Defendant Down Under: A Comparison Of Australian And American Approaches To Libelous Language In Cyberspace, 22 J. Marshall J. Computer & Info. L. 553 (2004), Richard L. Creech
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Destruction Of Media Diversity, Or: How The Fcc Learned To Stop Regulating And Love Corporate Dominated Media, 22 J. Marshall J. Computer & Info. L. 569 (2004), Christa Corrine Mclintock
The Destruction Of Media Diversity, Or: How The Fcc Learned To Stop Regulating And Love Corporate Dominated Media, 22 J. Marshall J. Computer & Info. L. 569 (2004), Christa Corrine Mclintock
UIC John Marshall Journal of Information Technology & Privacy Law
Christa Corrine McLintock’s “The Destruction of Media Diversity, or: How the FCC Learned to Stop Regulating and Love Corporate Dominated Media” investigates the current corporate consolidation climate and the efficacy of alternative media outlets. McLintock examines the history of the Federal Communication Commission (“FCC”) and its current trend toward deregulation. McLintock argues that the Internet has failed to level the playing field between alternative media outlets and mainstream media conglomerates. She concludes that increased regulation is not only the most viable solution to the alternative media’s predicament, but also the means through which to satisfy the FCC’s stated goals, facilitate …
The States And The Electronic Communications Privacy Act: The Need For Legal Processes That Keep Up With The Times, 22 J. Marshall J. Computer & Info. L. 695 (2004), Monique Mattei Ferraro
The States And The Electronic Communications Privacy Act: The Need For Legal Processes That Keep Up With The Times, 22 J. Marshall J. Computer & Info. L. 695 (2004), Monique Mattei Ferraro
UIC John Marshall Journal of Information Technology & Privacy Law
In criminal investigation when hours may mean the difference between successful resolution of a case or not, law enforcement must have an effective method of obtaining necessary information. The author offers an overview of the Electronic Communications Privacy Act (ECPA) and proceeds in a presentation of cybercrime investigations. The article further examines the differences and the occasional conflict existing between the federal and state law, traced into the variety and multitude of state and local laws and procedures regulating the obtaining of information but also into lack of state and local resources. Indeed state and local laws not only differ …
A Normative Critique Of Private Domain Name Dispute Resolution, 22 J. Marshall J. Computer & Info. L. 625 (2004), J.R. Hildenbrand
A Normative Critique Of Private Domain Name Dispute Resolution, 22 J. Marshall J. Computer & Info. L. 625 (2004), J.R. Hildenbrand
UIC John Marshall Journal of Information Technology & Privacy Law
In recent years, much has been made of the rapid expansion and tremendous commercial potential of the Internet. As such, domain names that contain or imply an entities trademarked name have become extremely valuable to these entities. The difficulty, however, is balancing the rights of the trademark owners with Internet users within the burgeoning commercial environment. This comment examines the balance between the Uniform Dispute Resolution Policy (UDRP) and traditional trademark protection. It discusses several persuasive documents including the International Trademark Association’s 1997 White Paper and the United States Department of Commerce’s Green and White papers. The comment further develops …