Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2,260 Full-Text Articles 2,220 Authors 714,965 Downloads 118 Institutions

All Articles in Privacy Law

Faceted Search

2,260 full-text articles. Page 50 of 57.

Session I: The Legacy Of Justice Arthur Goldberg, 29 J. Marshall J. Computer & Info. L. 285 (2012), Samuel R. Olken, Gerald Berendt, Gilbert A. Cornfield, Gilbert Feldman, David Stebenne, Milton I. Shadur 2012 John Marshall Law School

Session I: The Legacy Of Justice Arthur Goldberg, 29 J. Marshall J. Computer & Info. L. 285 (2012), Samuel R. Olken, Gerald Berendt, Gilbert A. Cornfield, Gilbert Feldman, David Stebenne, Milton I. Shadur

The John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Back To The Future: Revisiting Zippo In Light Of "Modern Concerns", 29 J. Marshall J. Computer & Info. L. 231 (2012), David Swetnam-Burland, Stacy O. Stitham 2012 John Marshall Law School

Back To The Future: Revisiting Zippo In Light Of "Modern Concerns", 29 J. Marshall J. Computer & Info. L. 231 (2012), David Swetnam-Burland, Stacy O. Stitham

The John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


"Tinkering" With The First Amendment's Protection Of Student Speech On The Internet, 29 J. Marshall J. Computer & Info. L. 167 (2012), Steven M. Puiszis 2012 John Marshall Law School

"Tinkering" With The First Amendment's Protection Of Student Speech On The Internet, 29 J. Marshall J. Computer & Info. L. 167 (2012), Steven M. Puiszis

The John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


World Wide Web Of Love, Lies, And Legislation: Why Online Dating Websites Should Screen Members, 29 J. Marshall J. Computer & Info. L. 251 (2012), Maureen Horcher 2012 John Marshall Law School

World Wide Web Of Love, Lies, And Legislation: Why Online Dating Websites Should Screen Members, 29 J. Marshall J. Computer & Info. L. 251 (2012), Maureen Horcher

The John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The 20th Belle R. And Joseph H. Braun Memorial Symposium: The Development Of Privacy Law From Brandeis To Today: Opening Remarks, 29 J. Marshall J. Computer & Info. L. 279 (2012), Ralph Ruebner, Leslie Ann Reis, David E. Sorkin 2012 John Marshall Law School

The 20th Belle R. And Joseph H. Braun Memorial Symposium: The Development Of Privacy Law From Brandeis To Today: Opening Remarks, 29 J. Marshall J. Computer & Info. L. 279 (2012), Ralph Ruebner, Leslie Ann Reis, David E. Sorkin

The John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Session Ii: Historical Perspectives On Privacy In American Law, 29 J. Marshall J. Computer & Info. L. 319 (2012), Steven D. Schwinn, Alberto Bernabe, Kathryn Kolbert, Adam D. Moore, Marc Rotenberg 2012 John Marshall Law School

Session Ii: Historical Perspectives On Privacy In American Law, 29 J. Marshall J. Computer & Info. L. 319 (2012), Steven D. Schwinn, Alberto Bernabe, Kathryn Kolbert, Adam D. Moore, Marc Rotenberg

The John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Session Iii: Privacy Regulation And Policy Perspectives, 29 J. Marshall J. Computer & Info. L. 343 (2012), Leslie Ann Reis, Mary Ellen Callahan, Renard Francois, Peter P. Swire, C. William O'Neill 2012 John Marshall Law School

Session Iii: Privacy Regulation And Policy Perspectives, 29 J. Marshall J. Computer & Info. L. 343 (2012), Leslie Ann Reis, Mary Ellen Callahan, Renard Francois, Peter P. Swire, C. William O'Neill

The John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Dedication Of The Arthur J. Goldberg Memorial Courtroom, 29 J. Marshall J. Computer & Info. L. 405 (2012), Hon. Antonin Scalia 2012 John Marshall Law School

Dedication Of The Arthur J. Goldberg Memorial Courtroom, 29 J. Marshall J. Computer & Info. L. 405 (2012), Hon. Antonin Scalia

The John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Session Iv: Technology And The Future Of Privacy, 29 J. Marshall J. Computer & Info. L. 379 (2012), David E. Sorkin, Ann Bartow, Robert S. Gurwin, Doris E. Long 2012 John Marshall Law School

Session Iv: Technology And The Future Of Privacy, 29 J. Marshall J. Computer & Info. L. 379 (2012), David E. Sorkin, Ann Bartow, Robert S. Gurwin, Doris E. Long

The John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


A Liberal Communitarian Conception Of Privacy, 29 J. Marshall J. Computer & Info. L. 419 (2012), Amitai Etzioni 2012 John Marshall Law School

A Liberal Communitarian Conception Of Privacy, 29 J. Marshall J. Computer & Info. L. 419 (2012), Amitai Etzioni

The John Marshall Journal of Information Technology & Privacy Law

In a large and complex society, anti-social behavior cannot be restrained by government intervention alone—without it becoming a police state. Informal social controls are necessary to keep deviance from societal norms and values at a socially acceptable level, and one of the levers of this social pressure is the observation of and reaction to the personal conduct of members of one’s community.

This article argues that in several areas of contemporary American life decreasing privacy by strengthening informal social controls will lessen the need for state surveillance and regulation, which tends to be act with a heavier hand ...


Drug Testing And Privacy In The Workplace, 29 J. Marshall J. Computer & Info. L. 463 (2012), Adam D. Moore 2012 John Marshall Law School

Drug Testing And Privacy In The Workplace, 29 J. Marshall J. Computer & Info. L. 463 (2012), Adam D. Moore

The John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Giving Credit Where Credit Is Due: A Comment On The Theoretical Foundation And Historical Origin Of The Tort Remedy For Invasion Of Privacy, 29 J. Marshall J. Computer & Info. L. 493 (2012), Alberto Bernabe 2012 John Marshall Law School

Giving Credit Where Credit Is Due: A Comment On The Theoretical Foundation And Historical Origin Of The Tort Remedy For Invasion Of Privacy, 29 J. Marshall J. Computer & Info. L. 493 (2012), Alberto Bernabe

The John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Cloudy With A Chance Of Waiver: How Cloud Computing Complicates The Attorney-Client Privilege, 46 J. Marshall L. Rev. 383 (2012), Timothy Peterson 2012 John Marshall Law School

Cloudy With A Chance Of Waiver: How Cloud Computing Complicates The Attorney-Client Privilege, 46 J. Marshall L. Rev. 383 (2012), Timothy Peterson

The John Marshall Law Review

No abstract provided.


Where Art Thou, Privacy: Expanding Privacy Rights Of Minors In Regard To Consensual Sex: Statutory Rape Laws And The Need For A Romeo And Juliet Exception In Illinois, 46 J. Marshall L. Rev. 309 (2012), Jordan Franklin 2012 John Marshall Law School

Where Art Thou, Privacy: Expanding Privacy Rights Of Minors In Regard To Consensual Sex: Statutory Rape Laws And The Need For A Romeo And Juliet Exception In Illinois, 46 J. Marshall L. Rev. 309 (2012), Jordan Franklin

The John Marshall Law Review

No abstract provided.


Is It Justice Or A Crime To Record The Police?: A Look At The Illinois Eavesdropping Statute And Its Application, 45 J. Marshall L. Rev. 485 (2012), Stephanie Claiborne 2012 John Marshall Law School

Is It Justice Or A Crime To Record The Police?: A Look At The Illinois Eavesdropping Statute And Its Application, 45 J. Marshall L. Rev. 485 (2012), Stephanie Claiborne

The John Marshall Law Review

No abstract provided.


Privacy & The Personal Prospectus: Should We Introduce Privacy Agents Or Regulate Privacy Intermediaries, Scott R. Peppet 2012 University of Colorado Law School

Privacy & The Personal Prospectus: Should We Introduce Privacy Agents Or Regulate Privacy Intermediaries, Scott R. Peppet

Articles

No abstract provided.


Cybercrime, Ronald C. Griffin 2012 Florida A & M University College of Law

Cybercrime, Ronald C. Griffin

Journal Publications

This essay recounts campaigns against privacy; the fortifications erected against them; and hi-jinx attributable to hackers, crackers, and miscreants under the Fair Credit Reporting Act.


Privacy In The Age Of The Hacker: Balancing Global Privacy And Data Security Law, Cunningham, Mckay, McKay Cunningham 2012 Concordia University School of Law

Privacy In The Age Of The Hacker: Balancing Global Privacy And Data Security Law, Cunningham, Mckay, Mckay Cunningham

Faculty Scholarship

The twin goals of privacy and data security share a fascinating symbiotic relationship: too much of one undermines the other. The international regulatory climate, embodied principally by the European Union’s 1995 Directive, increasingly promotes privacy. In the last two decades, fifty-three countries enacted national legislation largely patterned after the E.U. Directive. These laws, by and large, protect privacy by restricting data processing and data transfers.

At the same time, hacking, malware, and other cyber-threats continue to grow in frequency and sophistication. In 2010, one security firm recorded 286 million variants of malware and reported that 232.4 million ...


The Need To Prevent Employers From Accessing Private Social Network Profiles, Brett Novick 2012 University of Michigan Law School

The Need To Prevent Employers From Accessing Private Social Network Profiles, Brett Novick

University of Michigan Journal of Law Reform Caveat

In March 2012, social network privacy became a conversation topic after news reports of the story of Justin Bassett, a job applicant who withdrew his application in the middle of an interview when the interviewer asked him for the username and password of his private Facebook account. Although the issue has received much attention from the public and media, the Department of Justice (DOJ) has stated that it has no interest in prosecuting employers for asking for social networking account information. Fortunately, legislation that would make it illegal for employers to ask for the username and passwords for social networking ...


The Once And Future Networked Self, Steven Wilf 2012 University of Connecticut School of Law

The Once And Future Networked Self, Steven Wilf

Faculty Articles and Papers

No abstract provided.


Digital Commons powered by bepress