Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Selected Works (21)
- UIC School of Law (15)
- Schulich School of Law, Dalhousie University (9)
- Pepperdine University (3)
- The Catholic University of America, Columbus School of Law (3)
-
- University of Miami Law School (3)
- Seattle University School of Law (2)
- University of Colorado Law School (2)
- Vanderbilt University Law School (2)
- American University Washington College of Law (1)
- Chicago-Kent College of Law (1)
- Georgetown University Law Center (1)
- Georgia State University College of Law (1)
- The University of Akron (1)
- Touro University Jacob D. Fuchsberg Law Center (1)
- University at Buffalo School of Law (1)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (1)
- University of Pittsburgh School of Law (1)
- William & Mary Law School (1)
- Keyword
-
- Privacy (15)
- Surveillance (6)
- Fourth Amendment (5)
- Law (4)
- Technology (4)
-
- Big data (3)
- Data Privacy (3)
- Drones (3)
- National security (3)
- Robots (3)
- Cybersecurity (2)
- Data collection (2)
- FTC (2)
- Federal Trade Commission (2)
- Freedom of Speech; First Amendment; Constitutional Law;Technology; Drones (2)
- Privacy Law (2)
- Search (2)
- Stored Communications Act (2)
- 3D printing and intellectual property (1)
- Amnesty International (1)
- Analytics (1)
- Apps (1)
- Automobiles (1)
- Avatars (1)
- Big Data (1)
- Biographic data (1)
- Biometric data (1)
- Black box (1)
- CAN-SPAM Act (1)
- CBC v. SODRAC (1)
- Publication
-
- UIC John Marshall Journal of Information Technology & Privacy Law (15)
- Canadian Journal of Law and Technology (9)
- David E. Sorkin (9)
- Articles (4)
- Catholic University Journal of Law and Technology (3)
-
- Ann M. Lousin (2)
- Journal of the National Association of Administrative Law Judiciary (2)
- Publications (2)
- Seattle University Law Review (2)
- Vanderbilt Journal of Entertainment & Technology Law (2)
- William B.T. Mock (2)
- Akron Law Review (1)
- Alberto Bernabe (1)
- Articles in Law Reviews & Other Academic Journals (1)
- Buffalo Law Review (1)
- Caren Myers Morrison (1)
- Chicago-Kent Law Review (1)
- Faculty Publications (1)
- Faculty Publications By Year (1)
- Georgetown Law Faculty Publications and Other Works (1)
- Lori B. Andrews (1)
- Mark E. Wojcik (1)
- Nevada Law Journal (1)
- Pepperdine Law Review (1)
- Samuel R. Olken (1)
- Sara Smyth (1)
- Stephen E Henderson (1)
- Steven D. Schwinn (1)
- Touro Law Review (1)
- Publication Type
- File Type
Articles 1 - 30 of 70
Full-Text Articles in Science and Technology Law
Table Of Contents
Catholic University Journal of Law and Technology
No abstract provided.
Implications For The Future Of Global Data Security And Privacy: The Territorial Application Of The Stored Communications Act And The Microsoft Case, Russell Hsiao
Catholic University Journal of Law and Technology
No abstract provided.
Submarine Cables, Cybersecurity And International Law: An Intersectional Analysis, Tara Davenport
Submarine Cables, Cybersecurity And International Law: An Intersectional Analysis, Tara Davenport
Catholic University Journal of Law and Technology
No abstract provided.
The First Amendment And The Rpas, Caren M. Morrison
The First Amendment And The Rpas, Caren M. Morrison
Caren Myers Morrison
No abstract provided.
Session Ii: Historical Perspectives On Privacy In American Law, 29 J. Marshall J. Computer & Info. L. 319 (2012), Steven D. Schwinn, Alberto Bernabe, Kathryn Kolbert, Adam D. Moore, Marc Rotenberg
Session Ii: Historical Perspectives On Privacy In American Law, 29 J. Marshall J. Computer & Info. L. 319 (2012), Steven D. Schwinn, Alberto Bernabe, Kathryn Kolbert, Adam D. Moore, Marc Rotenberg
Alberto Bernabe
No abstract provided.
Eliminating The No Number, No List Response; Keeping The Cia Within The Scope Of The Law Amidst America's Global War On Terror, Joseph Meissner
Eliminating The No Number, No List Response; Keeping The Cia Within The Scope Of The Law Amidst America's Global War On Terror, Joseph Meissner
Nevada Law Journal
No abstract provided.
The Greening Of Canadian Cyber Laws: What Environmental Law Can Teach And Cyber Law Can Learn, Sara Smyth
The Greening Of Canadian Cyber Laws: What Environmental Law Can Teach And Cyber Law Can Learn, Sara Smyth
Sara Smyth
This article examines whether Canadian environmental law and policy could serve as a model for cyber crime regulation. A wide variety of offences are now committed through digital technologies, including thievery, identity theft, fraud, the misdirection of communications, intellectual property theft, espionage, system disruption, the destruction of data, money laundering, hacktivism, and terrorism, among others. The focus of this Article is on the problem of data security breaches, which target businesses and consumers. Following the Introduction, Part I provides an overview of the parallels that can be drawn between threats in the natural environment and on the Internet. Both disciplines …
On The Centrality Of Information Law: A Rational Choice Discussion Of Information Law And Transparency, 17 J. Marshall J. Computer & Info. L. 1069 (1999), William B.T. Mock
On The Centrality Of Information Law: A Rational Choice Discussion Of Information Law And Transparency, 17 J. Marshall J. Computer & Info. L. 1069 (1999), William B.T. Mock
William B.T. Mock
The purpose of this Article is to establish the importance of information law and to encourage its further study. By applying information technology theory, economic theory and, and political theory insights, the Article examines the centrality of information law in open societies. Information law rests upon two premises. The first of which is that information is a legally cognizable concept- that it can be framed in legal terms and has legal significance. The second premise is that there exists a rationale for government regulation and provision of information, either explicitly or implicitly. Transparency is a flexible concept used in a …
Copyright & Privacy - Through The Wide-Angle Lens, 4 J. Marshall Rev. Intell. Prop. L. 285 (2005), William W. Fisher Iii, Howard P. Knopf, Fred Von Lohmann, William B.T. Mock, Marybeth Peters, R. Anthony Reese
Copyright & Privacy - Through The Wide-Angle Lens, 4 J. Marshall Rev. Intell. Prop. L. 285 (2005), William W. Fisher Iii, Howard P. Knopf, Fred Von Lohmann, William B.T. Mock, Marybeth Peters, R. Anthony Reese
William B.T. Mock
Some have proposed “alternative compensation schemes” as a means of compensating copyright owners and creators for P2P activity while avoiding litigation. Some have proposed a streamlined dispute resolution system that would allow for enforcement in a manner analogous to the UDRP model. Others question whether private copying should necessarily be viewed as illegal and whether any alternative compensation scheme is viable. With all of these proposals, the question remains as to whether “alternative compensation” is really alternative.
Data Privacy Regulation In The Age Of Smartphones, Matthew Hettrich
Data Privacy Regulation In The Age Of Smartphones, Matthew Hettrich
Touro Law Review
No abstract provided.
Copyright & Privacy - Through The Privacy Lens, 4 J. Marshall Rev. Intell. Prop. L. 273 (2005), Julie E. Cohen, David E. Sorkin, Peter P. Swire
Copyright & Privacy - Through The Privacy Lens, 4 J. Marshall Rev. Intell. Prop. L. 273 (2005), Julie E. Cohen, David E. Sorkin, Peter P. Swire
David E. Sorkin
What legal tools do privacy advocates have available to defend an individual’s right to privacy? How far does this right go? How should these rights be defended—or if necessary—curtailed? What is the role of Government, of the practicing bar and of academics?
1997 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 16 J. Marshall J. Computer & Info. L. 685 (1998), David E. Sorkin, Steven A. Mcauley, David B. Nash Iii
1997 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 16 J. Marshall J. Computer & Info. L. 685 (1998), David E. Sorkin, Steven A. Mcauley, David B. Nash Iii
David E. Sorkin
Many public libraries provide patrons with free public-access Internet terminals, largely for accessing information available on the World Wide Web. However, public concern exists over the ability of children who browse the Web without adult supervision to view sexually explicit materials and other inappropriate items. This concern has led to the development of various Internet filtering software programs. Some filtering programs operate by blocking access to documents containing certain words or phrases or combinations thereof. However, more common programs permit access only to documents or sites that appear in a pre-selected, "safe" database or that block access to documents that …
The Twenty-Fifth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 24 J. Marshall J. Computer & Info. L. 673 (2006), David E. Sorkin, Larisa V. Benitez-Morgan, J. Preston Carter, William P. Greubel Iii, Matthew Hector, Kellen Keaty, Lisa Rodriguez
The Twenty-Fifth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 24 J. Marshall J. Computer & Info. L. 673 (2006), David E. Sorkin, Larisa V. Benitez-Morgan, J. Preston Carter, William P. Greubel Iii, Matthew Hector, Kellen Keaty, Lisa Rodriguez
David E. Sorkin
No abstract provided.
Session Iv: Technology And The Future Of Privacy, 29 J. Marshall J. Computer & Info. L. 379 (2012), David E. Sorkin, Ann Bartow, Robert S. Gurwin, Doris E. Long
Session Iv: Technology And The Future Of Privacy, 29 J. Marshall J. Computer & Info. L. 379 (2012), David E. Sorkin, Ann Bartow, Robert S. Gurwin, Doris E. Long
David E. Sorkin
No abstract provided.
Spam Legislation In The United States, 22 J. Marshall J. Computer & Info. L. 3 (2003), David E. Sorkin
Spam Legislation In The United States, 22 J. Marshall J. Computer & Info. L. 3 (2003), David E. Sorkin
David E. Sorkin
This article examines the effect of spam legislation in the United States. It discusses state legislation and the common provisions of state spam legislation, such as disclosure and labeling requirements and opt-out provisions. It also analyzes the consequences of state anti-spam legislation. Federal legislation is analyzed, with a brief look at the CAN-SPAM Act of 2003. The article concludes that legislation has not had a big impact on spam, and the CAN-SPAM Act is not likely to change or curb spam.
1996 John Marshall National Moot Court Competition In Information And Privacy Law: Bench Memorandum, 15 J. Marshall J. Computer & Info. L. 587 (1997), David E. Sorkin
1996 John Marshall National Moot Court Competition In Information And Privacy Law: Bench Memorandum, 15 J. Marshall J. Computer & Info. L. 587 (1997), David E. Sorkin
David E. Sorkin
No abstract provided.
Copyright & Privacy - Through The Technology Lens, 4 J. Marshall Rev. Intell. Prop. L. 242 (2005), Michael A. Geist, Doris E. Long, Leslie Ann Reis, David E. Sorkin, Fred Von Lohmann
Copyright & Privacy - Through The Technology Lens, 4 J. Marshall Rev. Intell. Prop. L. 242 (2005), Michael A. Geist, Doris E. Long, Leslie Ann Reis, David E. Sorkin, Fred Von Lohmann
David E. Sorkin
How is new technology impacting on the more general question of privacy in cyberspace? Is the original notion of an expectation of anonymity on the internet still viable? Can technology pierce through the expectation of privacy even without judicial interference? Do individuals need protection from such technology? Is there technology available to protect the individual? Should these technological tools be regulated? Should the law differentiate between various types of alleged “illegal” behavior; e.g., IP infringement, defamation, possession of pornography and terrorism? Are there international standards that can assist in regulating the intersection between technology and privacy in cyberspace?
The 20th Belle R. And Joseph H. Braun Memorial Symposium: The Development Of Privacy Law From Brandeis To Today: Opening Remarks, 29 J. Marshall J. Computer & Info. L. 279 (2012), Ralph Ruebner, Leslie Ann Reis, David E. Sorkin
The 20th Belle R. And Joseph H. Braun Memorial Symposium: The Development Of Privacy Law From Brandeis To Today: Opening Remarks, 29 J. Marshall J. Computer & Info. L. 279 (2012), Ralph Ruebner, Leslie Ann Reis, David E. Sorkin
David E. Sorkin
No abstract provided.
The Twenty-Sixth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 25 J. Marshall J. Computer & Info. L. 305 (2008), Leslie Ann Reis, David E. Sorkin, Panagiota Kelali, Jessica Diehl, Carlos A. Encinas, Matthew Hector, Gina Spada, Steven Tseng, Priya Krishnamoorthy Venkat
The Twenty-Sixth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 25 J. Marshall J. Computer & Info. L. 305 (2008), Leslie Ann Reis, David E. Sorkin, Panagiota Kelali, Jessica Diehl, Carlos A. Encinas, Matthew Hector, Gina Spada, Steven Tseng, Priya Krishnamoorthy Venkat
David E. Sorkin
No abstract provided.
Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu
Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu
Pepperdine Law Review
This Article highlights some of the critical distinctions between small data surveillance and big data cybersurveillance as methods of intelligence gathering. Specifically, in the intelligence context, it appears that “collect-it-all” tools in a big data world can now potentially facilitate the construction, by the intelligence community, of other individuals' digital avatars. The digital avatar can be understood as a virtual representation of our digital selves and may serve as a potential proxy for an actual person. This construction may be enabled through processes such as the data fusion of biometric and biographic data, or the digital data fusion of the …
Lawyers Who Lie On-Line: How Should The Legal Profession Respond To Ebay Ethics, 18 J. Marshall J. Computer & Info. L. 875 (2000), Mark E. Wojcik
Lawyers Who Lie On-Line: How Should The Legal Profession Respond To Ebay Ethics, 18 J. Marshall J. Computer & Info. L. 875 (2000), Mark E. Wojcik
Mark E. Wojcik
A recent scandal erupted in the press when a painting that was offered for sale on an Internet auction site was believed to be a lost contemporary masterpiece. The seller appeared to be a married man who was cleaning junk out of his garage, including a painting that his wife would not let him hang in the house. A bidding frenzy drove the price from the opening bid of 25 cents to more than $135,000 from a buyer in the Netherlands. After the sale was finished (it was ended by EBay when they learned he bid on the painting himself …
Trading Privacy For Angry Birds: A Call For Courts To Reevaluate Privacy Expectations In Modern Smartphones, Jeremy Andrew Ciarabellini
Trading Privacy For Angry Birds: A Call For Courts To Reevaluate Privacy Expectations In Modern Smartphones, Jeremy Andrew Ciarabellini
Seattle University Law Review
Of all the smartphone uses, the calling function is probably used the least. Rather, individuals more commonly use their smartphone for surfing the web, checking Facebook, and playing games. Highlighting the “smart” in smartphone, these phones often know more about their users’ daily activities than the users. Without requiring any sort of input, smartphones can tell the user how many steps they walk each day, when it is time to leave for work (also, of course, determining the traveling time with the most up-to-date traffic reports), and when an item recently ordered on Amazon will be delivered. Smartphone users may …
Authorized Investigation: A Temperate Alternative To Cyber Insecurity, Casey M. Bruner
Authorized Investigation: A Temperate Alternative To Cyber Insecurity, Casey M. Bruner
Seattle University Law Review
This Note aims to show that legal structures created to protect the Internet in its original form are completely insufficient to protect what the Internet has become. This antiquated legal framework is exacerbating the problem. The breadth of activity that the current law restricts severely limits the remedies that cyberattack victims can pursue, and it must be updated. While full hack-back may prove necessary in the long run, I argue for a more temperate initial response to the problem—I call this response “authorized investigation.” Specifically, the Computer Fraud and Abuse Act should be amended to allow victims access to their …
How Privacy Killed Katz: A Tale Of Cognitive Freedom And The Property Of Personhood As Fourth Amendment Norm, Christian M. Halliburton
How Privacy Killed Katz: A Tale Of Cognitive Freedom And The Property Of Personhood As Fourth Amendment Norm, Christian M. Halliburton
Akron Law Review
With each passing day, new technologies push the horizons of official government investigative and surveillance activity deeper and deeper into the mind and consciousness of the surveilled subject. While law enforcement agencies have always relied on observing the behavior and activity of suspicious targets, and there has been little judicial ink spent preserving the confidentiality of such observable activity, the law has been slow to respond to rapid increases in the capacity or scope of official observation that the advance of technologically sophisticated surveillance techniques helped facilitate. The sampling of techniques at the center of this Article allow the operators …
The Article 2b Symposium: A Foreword, 16 J. Marshall J. Computer & Info. L. 205 (1998), Ann Lousin
The Article 2b Symposium: A Foreword, 16 J. Marshall J. Computer & Info. L. 205 (1998), Ann Lousin
Ann M. Lousin
No abstract provided.
Foreword: Uniform Computer Information Transaction Act, 18 J. Marshall J. Computer & Info. L. 275 (2000), Ann Lousin
Foreword: Uniform Computer Information Transaction Act, 18 J. Marshall J. Computer & Info. L. 275 (2000), Ann Lousin
Ann M. Lousin
No abstract provided.
Coming To A Car Dealership Near You: Standardizing Event Data Recorder Technology Use In Automobiles, Kara Ryan
Coming To A Car Dealership Near You: Standardizing Event Data Recorder Technology Use In Automobiles, Kara Ryan
Chicago-Kent Law Review
Event Data Recorders are receiving more attention as owners of automobiles have begun to realize that their driving histories are recorded. Event Data Recorders are the “black boxes” in automobiles that are installed in the vast majority of vehicles currently on the road. In the majority of states, the restrictions on what information can be retrieved from Event Data Recorders and used by police officers, advertising firms, and insurance companies remains a gray area. State laws governing Event Data Recorder technology greatly fluctuates by jurisdiction. If Event Data Recorder information falls into the wrong hands, the possession of the data …
Session Ii: Historical Perspectives On Privacy In American Law, 29 J. Marshall J. Computer & Info. L. 319 (2012), Steven D. Schwinn, Alberto Bernabe, Kathryn Kolbert, Adam D. Moore, Marc Rotenberg
Session Ii: Historical Perspectives On Privacy In American Law, 29 J. Marshall J. Computer & Info. L. 319 (2012), Steven D. Schwinn, Alberto Bernabe, Kathryn Kolbert, Adam D. Moore, Marc Rotenberg
Steven D. Schwinn
No abstract provided.
Session I: The Legacy Of Justice Arthur Goldberg, 29 J. Marshall J. Computer & Info. L. 285 (2012), Samuel R. Olken, Gerald Berendt, Gilbert A. Cornfield, Gilbert Feldman, David Stebenne, Milton I. Shadur
Session I: The Legacy Of Justice Arthur Goldberg, 29 J. Marshall J. Computer & Info. L. 285 (2012), Samuel R. Olken, Gerald Berendt, Gilbert A. Cornfield, Gilbert Feldman, David Stebenne, Milton I. Shadur
Samuel R. Olken
No abstract provided.
"Three Parent Babies": Techniques Explained, Objections Examined, Rebecca Carr
"Three Parent Babies": Techniques Explained, Objections Examined, Rebecca Carr
Canadian Journal of Law and Technology
The UK Parliament has approved regulations, which come into force in October 2015, that permit the use of new treatment techniques to prevent the transmission of serious mitochondrial diseases from women to their children. The introduction of these techniques—which are not currently carried out in any country in the world—will fly in the face of the opposition that has been raised since discussions to permit clinical applications of the techniques first arose. After outlining some background to the techniques, this article briefly examines three of the objections that have been made against them: that the safety and effectiveness of the …