Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2050 Full-Text Articles 1996 Authors 687007 Downloads 100 Institutions

All Articles in Privacy Law

Faceted Search

2050 full-text articles. Page 3 of 49.

The Inadequate, Invaluable Fair Information Practices, Woodrow Hartzog 2017 University of Maryland Francis King Carey School of Law

The Inadequate, Invaluable Fair Information Practices, Woodrow Hartzog

Maryland Law Review

No abstract provided.


Disentangling The Right Of Publicity, Eric E. Johnson 2017 University of North Dakota School of Law

Disentangling The Right Of Publicity, Eric E. Johnson

Northwestern University Law Review

Despite the increasing importance attached to the right of publicity, its doctrinal scope has yet to be clearly articulated. The right of publicity supposedly allows a cause of action for the commercial exploitation of a person’s name, voice, or image. The inconvenient reality, however, is that only a tiny fraction of such instances are truly actionable. This Article tackles the mismatch between the blackletter doctrine and the shape of the case law, and it aims to elucidate, in straightforward terms, what the right of publicity actually is.

This Article explains how, in the absence of a clear enunciation of ...


Check Yes For Checkpoints: Suspicionless Stops And Ramifications For Missouri Motorists, Conner Harris 2017 University of Missouri School of Law

Check Yes For Checkpoints: Suspicionless Stops And Ramifications For Missouri Motorists, Conner Harris

Missouri Law Review

One of the great advantages of living in a free society is the enjoyment of general privacy and freedom from unwarranted interference in one’s personal affairs. This advantage benefits citizens in both their private and public interactions. For example, it is expected one could drive to the store across town, the mall in a neighboring city, or somewhere on the other side of the country uninterrupted and unhindered. The Fourth Amendment to the United States Constitution codifies this privacy expectation as a right to be enjoyed by all within its reach. Specifically, the Fourth Amendment protects against “unreasonable searches ...


Automating Threat Sharing: How Companies Can Best Ensure Liability Protection When Sharing Cyber Threat Information With Other Companies Or Organizations, Ari Schwartz, Sejal C. Shah, Matthew H. MacKenzie, Sheena Thomas, Tara Sugiyama Potashnik, Bri Law 2017 Venable LLP

Automating Threat Sharing: How Companies Can Best Ensure Liability Protection When Sharing Cyber Threat Information With Other Companies Or Organizations, Ari Schwartz, Sejal C. Shah, Matthew H. Mackenzie, Sheena Thomas, Tara Sugiyama Potashnik, Bri Law

University of Michigan Journal of Law Reform

This Article takes an in-depth look at the evolution of cybersecurity information sharing legislation, leading to the recent passage of the Cybersecurity Information Sharing Act (CISA) and offers insights into how automated information sharing mechanisms and associated requirements implemented pursuant to CISA can be leveraged to help ensure liability protections when engaging in cyber threat information sharing with and amongst other non-federal government entities.


Is Your Health Data Really Private? The Need To Update Hipaa Regulations To Incorporate Third-Party And Non-Covered Entities, Latena Hazard 2017 Catholic University of America (Student)

Is Your Health Data Really Private? The Need To Update Hipaa Regulations To Incorporate Third-Party And Non-Covered Entities, Latena Hazard

Catholic University Journal of Law and Technology

This note argues that the current framework that governs health care applications and consumer privacy is slacking and outlines strategies to ensure protection against third party accessibility of information that consumers deem private.


Table Of Contents, 2017 The Catholic University of America, Columbus School of Law

Table Of Contents

Catholic University Journal of Law and Technology

No abstract provided.


Masthead, 2017 The Catholic University of America, Columbus School of Law

Masthead

Catholic University Journal of Law and Technology

No abstract provided.


Protecting Privacy In The Era Of Smart Toys: Does Hello Barbie Have A Duty To Report, Corinne Moini 2017 University of Richmond School of Law

Protecting Privacy In The Era Of Smart Toys: Does Hello Barbie Have A Duty To Report, Corinne Moini

Catholic University Journal of Law and Technology

No abstract provided.


How Might The Supreme Court, If It Reviews The Federal Communication's 2015 Open Internet Order, Utilize The Chevron And Arbitrary And Capricious Tests?, John B. Meisel 2017 Southern Illinois University Edwardsville

How Might The Supreme Court, If It Reviews The Federal Communication's 2015 Open Internet Order, Utilize The Chevron And Arbitrary And Capricious Tests?, John B. Meisel

Catholic University Journal of Law and Technology

The article focuses on two Supreme Court decisions, King v. Burwell and FCC v. Fox Televisions Stations, Inc., that provide diametrically different models for how deferential a court should be when it reviews administrative action. The former case addresses how deferential a court should be for an agency’s statutory interpretation of an ambiguous statute for a question that has significant economic and political effects but Congress had not expressly delegated the question to the agency. The latter case addresses how deferential a court should be when an agency’s changes a policy that is within its statutory authority. These ...


Section 337 Of The Tariff Act Of 1930 And Its Impacts On China, Yiqing Yin 2017 Boston University

Section 337 Of The Tariff Act Of 1930 And Its Impacts On China, Yiqing Yin

Catholic University Journal of Law and Technology

337 of the Tariff Act of 1930 (“Section 337”) is one of the statutes that prohibit unfair trade or unfair competition in importation, and it aims at protecting intellectual property at the United States borders. Because of the international impacts of Section 337 and the injunctive nature of its remedies, the application of the statute has profound impacts on the trade between U.S. and other countries.

China is a country that has enormous trade with the U.S and imports large amounts of goods to the U.S. each year. Moreover, the weak intellectual property protection in China has ...


Candidate Appearances, Equal Time, And The Fcc's Online Public File Database: Empirical Data On Tv Station Compliance During The 2016 Presidential Primary, Christopher Terry 2017 University of Minnesota

Candidate Appearances, Equal Time, And The Fcc's Online Public File Database: Empirical Data On Tv Station Compliance During The 2016 Presidential Primary, Christopher Terry

Catholic University Journal of Law and Technology

Following the appearances of presidential candidates Donald Trump, Bernie Sanders and Hillary Clinton on episodes of Saturday Night Live, local television affiliates were required to upload documents related to the appearances to the FCC’s online public file database. After discussing the FCC’s database, the Bona Fide News Exception and the modern application of Section 315’s Equal Time Requirements, this study examines the compliance by the local NBC affiliates in the top 100 television markets with the public file requirements for candidate appearances and subsequent equal time requests as a test of station compliance with the requirements of ...


#Cautionbusinesses: Using Competitors' Hashtags Could Possibly Lead To Trademark Infringement, Debbie Chu 2017 The Catholic University of America, Columbus School of Law

#Cautionbusinesses: Using Competitors' Hashtags Could Possibly Lead To Trademark Infringement, Debbie Chu

Catholic University Journal of Law and Technology

No abstract provided.


Examining The Legalization Of Daily Fantasy Sports, Mark Dourmashkin 2017 Catholic University of America (Student)

Examining The Legalization Of Daily Fantasy Sports, Mark Dourmashkin

Catholic University Journal of Law and Technology

No abstract provided.


Nobody Puts Blockchain In A Corner: The Disruptive Role Of Blockchain Technology In The Financial Services Industry And Current Regulatory Issues, Elizabeth Sara Ross 2017 The Catholic University of America, Columbus School of Law

Nobody Puts Blockchain In A Corner: The Disruptive Role Of Blockchain Technology In The Financial Services Industry And Current Regulatory Issues, Elizabeth Sara Ross

Catholic University Journal of Law and Technology

This Note examines the disruptive effects that distributed ledger technology will have on payment systems and the financial services industry. It discusses how financial technology companies and banks will need to adapt to ensure that American consumers and banks, as well as the American economy at large, remain secure and efficient within an increasingly online and global financial system. This Note argues that the disjointed digital currency licensing regimes and complex landscape of state-by-state money transmission licensing directly threaten to stifle innovation, capital formation, consumer protection, and national cybersecurity. To ensure the U.S. remains competitive in the global financial ...


The Internet Of Things: Privacy Issues In A Connected World; Remarks Given At Protecting Virtual You: Individual And Informational Privacy In The Age Of Big Data, Richard M. Martinez 2017 University of St. Thomas, Minnesota

The Internet Of Things: Privacy Issues In A Connected World; Remarks Given At Protecting Virtual You: Individual And Informational Privacy In The Age Of Big Data, Richard M. Martinez

University of St. Thomas Journal of Law and Public Policy

No abstract provided.


Broadband Privacy Within Network Neutrality: The Fcc's Application & Expansion Of The Cpni Rules, Justin S. Brown 2017 University of St. Thomas, Minnesota

Broadband Privacy Within Network Neutrality: The Fcc's Application & Expansion Of The Cpni Rules, Justin S. Brown

University of St. Thomas Journal of Law and Public Policy

No abstract provided.


Data Analytics In Higher Education: Key Concerns And Open Questions, Alan Rubel, Kyle Jones 2017 University of St. Thomas, Minnesota

Data Analytics In Higher Education: Key Concerns And Open Questions, Alan Rubel, Kyle Jones

University of St. Thomas Journal of Law and Public Policy

No abstract provided.


Relational Privacy: Surveillance, Common Knowledge And Coordination, Robert H. Sloan, Richard Warner 2017 University of St. Thomas, Minnesota

Relational Privacy: Surveillance, Common Knowledge And Coordination, Robert H. Sloan, Richard Warner

University of St. Thomas Journal of Law and Public Policy

No abstract provided.


Who Needs To Know? The Seventh Circuit Accepts Information Sent To Government As Publicly Disclosed In Cause Of Action V. Chicago Transit Authority, Kurtis Brown 2017 Boston College Law School

Who Needs To Know? The Seventh Circuit Accepts Information Sent To Government As Publicly Disclosed In Cause Of Action V. Chicago Transit Authority, Kurtis Brown

Boston College Law Review

On February 29, 2016, the United States Court of Appeals for the Seventh Circuit in Cause of Action v. Chicago Transit Authority held that information disclosed to a government official and acted upon by that official has been publicly disclosed, barring a qui tam action from being brought under the False Claims Act. Several other circuits, including the First, Fourth, and Sixth, in contrast, have all interpreted the public disclosure bar within the False Claims Act to require a disclosure of information beyond the government. This Comment argues that the majority of circuit courts have correctly interpreted the False Claims ...


Data Flow Maps—Increasing Data Processing Transparency And Privacy Compliance In The Enterprise, Jeremy Berkowitz, Michael Mangold, Stephen Sharon 2017 Deloitte & Touche LLP

Data Flow Maps—Increasing Data Processing Transparency And Privacy Compliance In The Enterprise, Jeremy Berkowitz, Michael Mangold, Stephen Sharon

Washington and Lee Law Review Online

In recent years, well-known cyber breaches have placed growing pressure on organizations to implement proper privacy and data protection standards. Attacks involving the theft of employee and customer personal information have damaged the reputations of well-known brands, resulting in significant financial costs. As a result, governments across the globe are actively examining and strengthening laws to better protect the personal data of its citizens. The General Data Protection Regulation (GDPR) updates European privacy law with an array of provisions that better protect consumers and require organizations to focus on accounting for privacy in their business processes through “privacy-by-design” and “privacy ...


Digital Commons powered by bepress