Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

1701 Full-Text Articles 1717 Authors 419223 Downloads 79 Institutions

All Articles in Privacy Law

Faceted Search

1701 full-text articles. Page 1 of 37.

Taking A Bite Out Of Michael Vick's Publicity Rights: An Analysis Of How Teh Right Of Publicity Should Be Treated After A Celebrity Is Convicted Of A Crime, Stephen Reginald Fowler 2016 University of Georgia School of Law

Taking A Bite Out Of Michael Vick's Publicity Rights: An Analysis Of How Teh Right Of Publicity Should Be Treated After A Celebrity Is Convicted Of A Crime, Stephen Reginald Fowler

Journal of Intellectual Property Law

No abstract provided.


Rights Of Publicity: A Practitioner's Enigma, Gil N. Peles Esq. 2016 Proskauer Rose LLP

Rights Of Publicity: A Practitioner's Enigma, Gil N. Peles Esq.

Journal of Intellectual Property Law

No abstract provided.


Beyond Irbs: Ethical Guidelines For Data Research, Omer Tene, Jules Polonetsky 2016 Future of Privacy Forum

Beyond Irbs: Ethical Guidelines For Data Research, Omer Tene, Jules Polonetsky

Washington and Lee Law Review Online

No abstract provided.


It Stands To Reason: An Argument For Article Iii Standing Based On The Threat Of Future Harm In Data Breach Litigation, John Biglow 2016 University of Minnesota Law School

It Stands To Reason: An Argument For Article Iii Standing Based On The Threat Of Future Harm In Data Breach Litigation, John Biglow

Minnesota Journal of Law, Science & Technology

No abstract provided.


An Unconstitutional Work Of Art: Discussing Where The Federal Government's Discrete Intrusions Into One's Privacy Become An Unconstitutional Search Through Mosaic Theory, Steven Graziano 2016 University of Minnesota Law School

An Unconstitutional Work Of Art: Discussing Where The Federal Government's Discrete Intrusions Into One's Privacy Become An Unconstitutional Search Through Mosaic Theory, Steven Graziano

Minnesota Journal of Law, Science & Technology

No abstract provided.


Clapper Dethroned: Imminent Injury And Standing For Data Breach Lawsuits In Light Of Ashley Madison, Arthur R. Vorbrodt 2016 Washington and Lee University School of Law

Clapper Dethroned: Imminent Injury And Standing For Data Breach Lawsuits In Light Of Ashley Madison, Arthur R. Vorbrodt

Washington and Lee Law Review Online

No abstract provided.


If You Fly A Drone, So Can Police, Stephen E. Henderson 2016 University of Oklahoma College of Law

If You Fly A Drone, So Can Police, Stephen E. Henderson

Stephen E Henderson


According to the U.S. Constitution, the more you fly your drone, the more police can fly theirs. “Come on,” you might reply, “that hoary document”—and, yes, sorry to make you the sort who drops words like hoary—“that hoary document surely says nothing about drones.” But in fact it does. At least it does as interpreted by the courts. In particular, it is how they interpret the Fourth Amendment. So, to understand this aspect of drones, we first must understand this provision of the Bill of Rights...


Baring All: Legal Ethics And Confidentiality Of Electronically Stored Information In The Cloud, Whitney Morgan 2016 Catholic University of America (Student)

Baring All: Legal Ethics And Confidentiality Of Electronically Stored Information In The Cloud, Whitney Morgan

Catholic University Journal of Law and Technology

No abstract provided.


Wearable Devices As Admissible Evidence: Technology Is Killing Our Opportunity To Lie, Nicole Chauriye 2016 Catholic University of America, Columbus School of Law

Wearable Devices As Admissible Evidence: Technology Is Killing Our Opportunity To Lie, Nicole Chauriye

Catholic University Journal of Law and Technology

No abstract provided.


Table Of Contents, 2016 The Catholic University of America, Columbus School of Law

Table Of Contents

Catholic University Journal of Law and Technology

No abstract provided.


Exporting Internet Law Through International Trade Agreements: Recalibrating U.S. Trade Policy In The Digital Age, Markham C. Erickson, Sarah K. Leggin 2016 Steptoe & Johnson LLP

Exporting Internet Law Through International Trade Agreements: Recalibrating U.S. Trade Policy In The Digital Age, Markham C. Erickson, Sarah K. Leggin

Catholic University Journal of Law and Technology

No abstract provided.


The Connected State Of Things: A Lawyer’S Survival Guide In An Internet Of Things World, Antigone Peyton 2016 Cloudigy Law PLLC

The Connected State Of Things: A Lawyer’S Survival Guide In An Internet Of Things World, Antigone Peyton

Catholic University Journal of Law and Technology

No abstract provided.


Masthead, 2016 The Catholic University of America, Columbus School of Law

Masthead

Catholic University Journal of Law and Technology

No abstract provided.


Time To Rethink Cybersecurity Reform: The Opm Data Breach And The Case For Centralized Cybersecurity Infrastructure, Zachary Figueroa 2016 Catholic University of America, Columbus School of Law

Time To Rethink Cybersecurity Reform: The Opm Data Breach And The Case For Centralized Cybersecurity Infrastructure, Zachary Figueroa

Catholic University Journal of Law and Technology

No abstract provided.


Decrypting Our Security: A Bipartisan Argument For A Rational Solution To The Encryption Challenge, Jamil N. Jaffer, Daniel J. Rosenthal 2016 George Mason University Law School

Decrypting Our Security: A Bipartisan Argument For A Rational Solution To The Encryption Challenge, Jamil N. Jaffer, Daniel J. Rosenthal

Catholic University Journal of Law and Technology

No abstract provided.


The Negative Effects Of Cumulative Abortion Regulations: Why The 5th Circuit Was Wrong In Upholding Regulations On Medication Abortions (Planned Parenthood Of Greater Texas Surgical Health Services V. Abbott), Benjamin A. Hooper 2016 University of Cincinnati Law Review

The Negative Effects Of Cumulative Abortion Regulations: Why The 5th Circuit Was Wrong In Upholding Regulations On Medication Abortions (Planned Parenthood Of Greater Texas Surgical Health Services V. Abbott), Benjamin A. Hooper

University of Cincinnati Law Review

No abstract provided.


Children’S Anatomy V. Children’S Autonomy: A Precarious Balancing Act With Preimplantation Genetic Diagnosis And The Creation Of “Savior Siblings”, Marley McClean 2016 Pepperdine University

Children’S Anatomy V. Children’S Autonomy: A Precarious Balancing Act With Preimplantation Genetic Diagnosis And The Creation Of “Savior Siblings”, Marley Mcclean

Pepperdine Law Review

On February 3, 2015, Members of the United Kingdom’s Parliament, in an historical move, voted to approve the creation of human beings from three different parents, i.e., the creation of three-person DNA. In doing so, it became the first country ever to approve laws regulating such a procedure. The procedure uses a customized version of in vitro fertilization (IVF) to mix the DNA of two parents with the healthy mitochondria of a donor woman. While three-person DNA is not yet practiced in the United States, there is a controversial ART procedure practiced and unregulated in the United States ...


National Security Or Consumer Privacy? A Question Even Siri Couldn’T Answer, Rebecca Knight 2016 Contributing Member for IPCLJ (2015-2016), University of Cincinnati College of Law

National Security Or Consumer Privacy? A Question Even Siri Couldn’T Answer, Rebecca Knight

The University of Cincinnati Intellectual Property and Computer Law Journal

No abstract provided.


The Positive Law Model Of The Fourth Amendment, William Baude, James Y. Stern 2016 William & Mary Law School

The Positive Law Model Of The Fourth Amendment, William Baude, James Y. Stern

Faculty Publications

For fifty years, courts have used a “reasonable expectation of privacy” standard to define “searches” under the Fourth Amendment. As others have recognized, that doctrine is subjective, unpredictable, and conceptually confused, but viable alternatives have been slow to emerge. This Article supplies one.

We argue that Fourth Amendment protection should be anchored in background positive law. The touchstone of the search-and-seizure analysis should be whether government officials have done something forbidden to private parties. It is those actions that should be subjected to Fourth Amendment reasonableness review and the presumptive requirement to obtain a warrant. In short, Fourth Amendment protection ...


In Her Words: Recognizing And Preventing Abusive Litigation Against Domestic Violence Survivors, David Ward 2016 Seattle University School of Law

In Her Words: Recognizing And Preventing Abusive Litigation Against Domestic Violence Survivors, David Ward

Seattle Journal for Social Justice

No abstract provided.


Digital Commons powered by bepress