Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Embry-Riddle Aeronautical University (11)
- Seattle University School of Law (9)
- Vanderbilt University Law School (6)
- Schulich School of Law, Dalhousie University (5)
- The Catholic University of America, Columbus School of Law (4)
-
- University of Michigan Law School (4)
- Duke Law (3)
- Pepperdine University (3)
- Chicago-Kent College of Law (2)
- Loyola Marymount University and Loyola Law School (2)
- Northwestern Pritzker School of Law (2)
- Penn State Dickinson Law (2)
- SJ Quinney College of Law, University of Utah (2)
- University of Maryland Francis King Carey School of Law (2)
- Washington and Lee University School of Law (2)
- West Virginia University (2)
- American University Washington College of Law (1)
- DePaul University (1)
- Georgia State University College of Law (1)
- Maurer School of Law: Indiana University (1)
- National Law School of India University (1)
- New York Law School (1)
- Old Dominion University (1)
- Southern Methodist University (1)
- St. Mary's University (1)
- Touro University Jacob D. Fuchsberg Law Center (1)
- Universitas Indonesia (1)
- University of Georgia School of Law (1)
- University of Miami Law School (1)
- University of Oklahoma College of Law (1)
- Publication Year
- Publication
-
- Journal of Digital Forensics, Security and Law (11)
- Seattle University Law Review (8)
- Canadian Journal of Law and Technology (5)
- Catholic University Journal of Law and Technology (4)
- Vanderbilt Journal of Entertainment & Technology Law (4)
-
- Duke Law & Technology Review (3)
- Michigan Telecommunications & Technology Law Review (3)
- Chicago-Kent Law Review (2)
- Dickinson Law Review (2017-Present) (2)
- Journal of Business & Technology Law (2)
- Loyola of Los Angeles Law Review (2)
- Pepperdine Law Review (2)
- Washington and Lee Journal of Civil Rights and Social Justice (2)
- West Virginia Law Review (2)
- "Dharmasisya” Jurnal Program Magister Hukum FHUI (1)
- American University Business Law Review (1)
- DePaul Journal of Art, Technology & Intellectual Property Law (1)
- Georgia Journal of International & Comparative Law (1)
- Georgia State University Law Review (1)
- Indian Journal of Law and Technology (1)
- Indiana Journal of Global Legal Studies (1)
- Journal of the National Association of Administrative Law Judiciary (1)
- NYLS Law Review (1)
- Northwestern Journal of International Law & Business (1)
- Northwestern Journal of Technology and Intellectual Property (1)
- Oklahoma Journal of Law and Technology (1)
- SMU Science and Technology Law Review (1)
- Seattle Journal of Technology, Environmental & Innovation Law (1)
- St. Mary's Journal on Legal Malpractice & Ethics (1)
- The Journal of Sociotechnical Critique (1)
Articles 61 - 77 of 77
Full-Text Articles in Law
Striking A Balance Between Privacy And Online Commerce, Mark Bartholomew
Striking A Balance Between Privacy And Online Commerce, Mark Bartholomew
Utah OnLaw: The Utah Law Review Online Supplement
It is becoming commonplace to note that privacy and online commerce are on a collision course. Corporate entities archive and monetize more and more personal information. Citizens increasingly resent the intrusive nature of such data collection and use. Just noticing this conflict, however, tells us little. In Informing and Reforming the Marketplace of Ideas: The Public-Private Model for Data Production and the First Amendment, Professor Shubha Ghosh not only notes the tension between the costs and benefits of data commercialization, but suggests three normative perspectives for balancing privacy and commercial speech. This is valuable because without a rich theoretical framework …
International Travel With A "Digital Briefcase": If Customs Officials Can Search A Laptop, Will The Right Against Self-Incrimination Contravene This Authority?, Ashley H. Verdon
International Travel With A "Digital Briefcase": If Customs Officials Can Search A Laptop, Will The Right Against Self-Incrimination Contravene This Authority?, Ashley H. Verdon
Pepperdine Law Review
No abstract provided.
Property As Control: The Case Of Information, Jane B. Baron
Property As Control: The Case Of Information, Jane B. Baron
Michigan Telecommunications & Technology Law Review
If heath policy makers' wishes come true, by the end of the current decade the paper charts in which most of our medical information is currently recorded will be replaced by networked electronic health records ("EHRs").[...] Like all computerized records, networked EHRs are difficult to secure, and the information in EHRs is both particularly sensitive and particularly valuable for commercial purposes. Sadly, the existing federal statute meant to address this problem, the Health Insurance Portability and Accountability Act of 1996 ("HIPAA"), is probably inadequate to the task.[...] Health law, privacy, and intellectual property scholars have all suggested that the river …
A Risk Not Worth The Reward: The Stored Communications Act And Employers’ Collection Of Employees’ And Job Applicants’ Social Networking Passwords, Nicholas D. Beadle
A Risk Not Worth The Reward: The Stored Communications Act And Employers’ Collection Of Employees’ And Job Applicants’ Social Networking Passwords, Nicholas D. Beadle
American University Business Law Review
No abstract provided.
Cloudy Privacy Protections: Why The Stored Communications Act Fails To Protect The Privacy Of Communications Stored In The Cloud, Ilana R. Kattan
Cloudy Privacy Protections: Why The Stored Communications Act Fails To Protect The Privacy Of Communications Stored In The Cloud, Ilana R. Kattan
Vanderbilt Journal of Entertainment & Technology Law
The advent of new communications technologies has generated debate over the applicability of the Fourth Amendment's warrant requirement to communications sent through, and stored in, technologies not anticipated by the Framers. In 1986, Congress responded to perceived gaps in the protections of the warrant requirement as applied to newer technologies, such as email, by passing the Stored Communications Act (SCA). As originally enacted, the SCA attempted to balance the interests of law enforcement against individual privacy rights by dictating the mechanisms by which the government could compel a particular service provider to disclose communications stored on behalf of its customers. …
Civilians In Cyberwarfare: Conscripts, Susan W. Brenner, Leo L. Clarke
Civilians In Cyberwarfare: Conscripts, Susan W. Brenner, Leo L. Clarke
Vanderbilt Journal of Transnational Law
Civilian-owned and -operated entities will almost certainly be a target in cyberwarfare because cyberattackers are likely to be more focused on undermining the viability of the targeted state than on invading its territory. Cyberattackers will probably target military computer systems, at least to some extent, but in a departure from traditional warfare, they will also target companies that operate aspects of the victim nation's infrastructure. Cyberwarfare, in other words, will penetrate the territorial borders of the attacked state and target high-value civilian businesses. Nation-states will therefore need to integrate the civilian employees of these (and perhaps other) companies into their …
Best Practices And The State Of Information Security, Kevin Cronin
Best Practices And The State Of Information Security, Kevin Cronin
Chicago-Kent Law Review
The forces of globalization, together with widely available industry standards and best practices, and heightened state legislative activity, are driving the U.S. towards a more unified approach to data security. But the success of this unified approach requires more than free market efficiency and innovation. In order to maintain a state of evolutionary equilibrium in the global information economy, the U.S. must move from a fragmented approach towards data security and privacy standards, towards a more comprehensive set of standards with new penalties and effective enforcement, to better reflect the inherent value of personal data in today's global marketplace.
Coding Privacy, Lilian Edwards
Coding Privacy, Lilian Edwards
Chicago-Kent Law Review
Lawrence Lessig famously and usefully argues that cyberspace is regulated not just by law but also by norms, markets and architecture or "code." His insightful work might also lead the unwary to conclude, however, that code is inherently anti-privacy, and thus that an increasingly digital world must therefore also be increasingly devoid of privacy. This paper argues briefly that since technology is a neutral tool, code can be designed as much to fight for privacy as against it, and that what matters now is to look at what incentivizes the creation of pro- rather than anti-privacy code in the mainstream …
The 2007 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andy Jones, Craig Valli, Glenn S. Dardick, Iain Sutherland
The 2007 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andy Jones, Craig Valli, Glenn S. Dardick, Iain Sutherland
Journal of Digital Forensics, Security and Law
All organisations, whether in the public or private sector, increasingly use computers and other devices that contain computer hard disks for the storage and processing of information relating to their business, their employees or their customers. Individual home users also increasingly use computers and other devices containing computer hard disks for the storage and processing of information relating to their private, personal affairs. It continues to be clear that the majority of organisations and individual home users still remain ignorant or misinformed of the volume and type of information that is stored on the hard disks that these devices contain …
Steganography: Forensic, Security, And Legal Issues, Merrill Warkentin, Ernst Bekkering, Mark B. Schmidt
Steganography: Forensic, Security, And Legal Issues, Merrill Warkentin, Ernst Bekkering, Mark B. Schmidt
Journal of Digital Forensics, Security and Law
Steganography has long been regarded as a tool used for illicit and destructive purposes such as crime and warfare. Currently, digital tools are widely available to ordinary computer users also. Steganography software allows both illicit and legitimate users to hide messages so that they will not be detected in transit. This article provides a brief history of steganography, discusses the current status in the computer age, and relates this to forensic, security, and legal issues. The paper concludes with recommendations for digital forensics investigators, IT staff, individual users, and other stakeholders.
Analysis Of Information Remaining On Hand Held Devices Offered For Sale On The Second Hand, Andy Jones, Craig Valli, Iain Sutherland
Analysis Of Information Remaining On Hand Held Devices Offered For Sale On The Second Hand, Andy Jones, Craig Valli, Iain Sutherland
Journal of Digital Forensics, Security and Law
The ownership and use of mobile phones, Personal Digital Assistants and other hand held devices is now ubiquitous both for home and business use. The majority of these devices have a high initial cost, a relatively short period before they become obsolescent and a relatively low second hand value. As a result of this, when the devices are replaced, there are indications that they tend to be discarded. As technology has continued to develop, it has led to an increasing diversity in the number and type of devices that are available, and the processing power and the storage capacity of …
Privacy, Crime And Terror: Legal Rights And Security In A Time Of Peril By Stanley A. Cohen (Markham: Lexisnexis Butterworths, 2005), Teresa Scassa
Privacy, Crime And Terror: Legal Rights And Security In A Time Of Peril By Stanley A. Cohen (Markham: Lexisnexis Butterworths, 2005), Teresa Scassa
Canadian Journal of Law and Technology
It is now trite to say that the events of September 11, 2001 have had a profound impact on our national security, in terms of its institutional and normative dimensions, and also in terms of a more general public anxiety. The hastily enacted Anti-terrorism Act of 2001 brought about significant changes to a wide range of statutes including, among others, the Criminal Code, the Official Secrets Act, the Canada Evidence Act, and the Proceeds of Crime (Money Laundering) Act. An early conference and resultant book on the Anti-terrorism Act raised serious concerns about the potential impact of the changes on …
Personal Medical Information: Privacy Or Personal Data Protection?, Wilhelm Peekhaus
Personal Medical Information: Privacy Or Personal Data Protection?, Wilhelm Peekhaus
Canadian Journal of Law and Technology
Some of the existing literature concerning the privacy of health information seems to suggest that medical information has a particularly special nature; either through its oft-cited association with dignity or the need for its ‘‘unobstructed’’ use by health care practitioners for a variety of reasons. It is against such a backdrop that this paper will review and compare a number of legislative mechanisms that have been designed to meet the challenge of safeguarding the privacy of personal information without completely hindering the continued flow of information required by economic and health care systems. An attempt will be made to situate …
'Code' And The Slow Erosion Of Privacy, Bert-Jaap Koops, Ronald Leenes
'Code' And The Slow Erosion Of Privacy, Bert-Jaap Koops, Ronald Leenes
Michigan Telecommunications & Technology Law Review
The notion of software code replacing legal code as a mechanism to control human behavior--"code as law"--is often illustrated with examples in intellectual property and freedom of speech. This Article examines the neglected issue of the impact of "code as law" on privacy. To what extent is privacy-related "code" being used, either to undermine or to enhance privacy? On the basis of cases in the domains of law enforcement, national security, E-government, and commerce, it is concluded that technology rarely incorporates specific privacy-related norms. At the same time, however, technology very often does have clear effects on privacy, as it …
Information Privacy In Virtual Worlds: Identifying Unique Concerns Beyond The Online And Offline Worlds, Tal Z. Zarksy
Information Privacy In Virtual Worlds: Identifying Unique Concerns Beyond The Online And Offline Worlds, Tal Z. Zarksy
NYLS Law Review
No abstract provided.
Computer Searches And Seizures: Some Unresolved Issues, Susan W. Brenner, Barbara A. Frederiksen
Computer Searches And Seizures: Some Unresolved Issues, Susan W. Brenner, Barbara A. Frederiksen
Michigan Telecommunications & Technology Law Review
The goal of this article is to illustrate the issues that arise in the context of computer search and seizures by examining several areas in which the application of Fourth Amendment concepts to computer searches and/or seizures can be problematic. In order to illustrate this point, the article will build on a hypothetical. The hypothetical situation assumes law enforcement officers have lawfully obtained a warrant to search for and seize evidence concerning the commission of one or more crimes. It will also be assumed that computer technology played some role in the commission of these crimes, so computer equipment and …
Transborder Data Flow: Separating The Privacy Interests Of Individuals And Corporations, Garry S. Grossman
Transborder Data Flow: Separating The Privacy Interests Of Individuals And Corporations, Garry S. Grossman
Northwestern Journal of International Law & Business
The merger of computer and communications technologies in the past two decades has revolutionized information processing throughout the world. The most recent telecommunications advances possible direct international transfers of sensitive personal data via computer-satellite links. Computerized data bases containing commercial information identifying citizens of one country are now routinely transferred to and stored in another, often without the knowledge of the individuals identified in the data. Numerous European countries have enacted data protection legislation with the avowed intent to protect their citizens from the improper use of personal information that is transferred extranationally. These data protection laws prohibit the export …