Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 60 of 794

Full-Text Articles in Law

Japanese And American Privacy Laws, Comparative Analysis, 32 J. Marshall J. Info. Tech. & Privacy L. 1 (2015), Jane Kim Jan 2015

Japanese And American Privacy Laws, Comparative Analysis, 32 J. Marshall J. Info. Tech. & Privacy L. 1 (2015), Jane Kim

UIC John Marshall Journal of Information Technology & Privacy Law

To understand the laws of a foreign nation, one must first under-stand that nation’s culture. Its people and their customs will provide in-sight into the proper interpretation and application of such laws. For those reasons, this commentary commences with cursory background on Japanese people, followed by a brief comparative analysis of Health In-surance Portability and Accountability Act (“HIPAA”) (enacted in 1996) and its Japanese counterpart, the Act on the Protection of Personal In-formation (“APPI”) (enacted in 2003). The Japanese have borrowed a lot of American concepts of privacy laws. This paper will explore how these imported privacy concepts may not …


Legal Problems In Data Management: The Impact Of International Data Restriction Laws On U.S. Companies, 31 J. Marshall J. Info. Tech. & Privacy L. 609 (2015) Jan 2015

Legal Problems In Data Management: The Impact Of International Data Restriction Laws On U.S. Companies, 31 J. Marshall J. Info. Tech. & Privacy L. 609 (2015)

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Industry Self-Regulation Of Consumer Data Privacy And Security, 32 J. Marshall J. Info. Tech. & Privacy L. 15 (2015), Siona Listokin Jan 2015

Industry Self-Regulation Of Consumer Data Privacy And Security, 32 J. Marshall J. Info. Tech. & Privacy L. 15 (2015), Siona Listokin

UIC John Marshall Journal of Information Technology & Privacy Law

Industry self-regulation of consumer data privacy and security has been proposed as a flexible alternative and compliment to traditional government regulation. This study analyzes whether different types of existing industry-led standards improve online privacy and security. This paper examines which types of firms join voluntary standards and whether there is a difference in outcomes between trade association memberships (like the Digital Advertising Alliance) and certification programs (like TRUSTe). Results suggest that more trafficked websites are more likely to adopt standards, and that trade association member-ship does not have an effect on privacy and security performance. This article highlights the need …


Legal Problems In Data Management: It & Privacy At The Forefront: Developments In Cybersecurity Law And Best Practices, 31 J. Marshall J. Info. Tech. & Privacy L. 587 (2015) Jan 2015

Legal Problems In Data Management: It & Privacy At The Forefront: Developments In Cybersecurity Law And Best Practices, 31 J. Marshall J. Info. Tech. & Privacy L. 587 (2015)

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Legal Problems In Data Management: Global Approach To Data Privacy: Safe Harbor, 31 J. Marshall J. Info. Tech. & Privacy L. 633 (2015) Jan 2015

Legal Problems In Data Management: Global Approach To Data Privacy: Safe Harbor, 31 J. Marshall J. Info. Tech. & Privacy L. 633 (2015)

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


‘The Greatest Wealth Is Health’: Patient Protected Health Information In The Hands Of Hackers, 31 J. Marshall J. Info. Tech. & Privacy L. 657 (2015), Samantha Singer Jan 2015

‘The Greatest Wealth Is Health’: Patient Protected Health Information In The Hands Of Hackers, 31 J. Marshall J. Info. Tech. & Privacy L. 657 (2015), Samantha Singer

UIC John Marshall Journal of Information Technology & Privacy Law

This comment will analyze the specific requirements and stages that EPs/EHs must comply with in order to receive its Medicare and Medicaid incentives, how EHR technologies are being implemented, how EHR technologies are affecting patients' privacy with regard to hacking a patient‟s PHI, and what EHR technology vendors and EPs/EHs should be doing to improve patient privacy and security to prevent hacking and other breaches.

Part I of this comment will address hacking of PHI. Part II will analyze the security measures that EHR vendors must currently incorporate into EHR technology and how the lack of required security measures impacts …


The Truth Behind Data Collection And Analysis, 32 J. Marshall J. Info. Tech. & Privacy L. 33 (2015), Morgan Hochheiser Jan 2015

The Truth Behind Data Collection And Analysis, 32 J. Marshall J. Info. Tech. & Privacy L. 33 (2015), Morgan Hochheiser

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


E-Discovery: Reasonable Search, Proportionality, Cooperation, And Advancing Technology, 30 J. Marshall J. Info. Tech. & Privacy L. 433 (2014), Steven Bennett Jan 2014

E-Discovery: Reasonable Search, Proportionality, Cooperation, And Advancing Technology, 30 J. Marshall J. Info. Tech. & Privacy L. 433 (2014), Steven Bennett

UIC John Marshall Journal of Information Technology & Privacy Law

Rule 26(g)(1)(A) of the Federal Rules of Civil Procedure (the “Federal Rules”) requires that an attorney responding to a discovery request verify by signature, after “reasonable inquiry,” that the disclosure is, to the best of the attorney’s knowledge, “complete and correct.” In a digital environment, with masses of data in multiple formats and locations, the determination of whether a “reasonable” effort to meet the completeness requirement has occurred may turn on an assessment of the practices used to conduct a search of electronic materials. Those practices, in turn, must be judged on a standard of “proportionality” (i.e., that the effort …


From Morris To Nosal: The History Of Exceeding Authorization And The Need For A Change, 30 J. Marshall J. Info. Tech. & Privacy L. 465 (2014), Vasileios Karagiannopoulos Jan 2014

From Morris To Nosal: The History Of Exceeding Authorization And The Need For A Change, 30 J. Marshall J. Info. Tech. & Privacy L. 465 (2014), Vasileios Karagiannopoulos

UIC John Marshall Journal of Information Technology & Privacy Law

This Article discusses and examines the various cases that pertain to the issue of exceeding authorized access throughout the years from United States v. Morris to the recent United States v. Nosal. Further, this Article thoroughly examines the Ninth Circuit’s approach regarding the issue of exceeding authorization; specifically, the need for the Ninth Circuit’s narrower interpretation in United States v. Brekka and Nosal. Finally, this Article proposes an alternative phrasing for the term “exceeding authorization,” and a revised interpretation of the phrase and the relevant offenses under the Computer Fraud and Abuse Act. This recommended interpretation suggests establishing different degrees …


Cloud Computing, Regulatory Compliance, And Student Privacy: A Guide For School Administrators And Legal Counsel, 30 J. Marshall J. Info. Tech. & Privacy L. 511 (2014), Steve Mutkoski Jan 2014

Cloud Computing, Regulatory Compliance, And Student Privacy: A Guide For School Administrators And Legal Counsel, 30 J. Marshall J. Info. Tech. & Privacy L. 511 (2014), Steve Mutkoski

UIC John Marshall Journal of Information Technology & Privacy Law

Rapid change in the technology landscape has resulted in the introduction of a range of new technologies into the classroom. But unlike the past use of technology in schools, many of these new products and services introduce two new dynamics that school counsel (and the teachers and administrators they support) need to understand fully. First, many of these new products and services are run “in the cloud” by a third party service provider as opposed to on servers operated by the school’s information technology (IT) staff. This third party operation and control can raise important new regulatory compliance issues, including …


“Bring Your Own Glass”: The Privacy Implications Of Google Glass In The Workplace, 30 J. Marshall J. Info. Tech. & Privacy L. 607 (2014), Anisha Mehta Jan 2014

“Bring Your Own Glass”: The Privacy Implications Of Google Glass In The Workplace, 30 J. Marshall J. Info. Tech. & Privacy L. 607 (2014), Anisha Mehta

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Bitcoins: Technological Innovation Or Emerging Threat?, 30 J. Marshall J. Info. Tech. & Privacy L. 535 (2014), R. Joseph Cook Jan 2014

Bitcoins: Technological Innovation Or Emerging Threat?, 30 J. Marshall J. Info. Tech. & Privacy L. 535 (2014), R. Joseph Cook

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Problems With Prism: How A Modern Definition Of Privacy Necessarily Protects Privacy Interests In Digital Communications, 30 J. Marshall J. Info. Tech. & Privacy L. 571 (2014), Adam Florek Jan 2014

The Problems With Prism: How A Modern Definition Of Privacy Necessarily Protects Privacy Interests In Digital Communications, 30 J. Marshall J. Info. Tech. & Privacy L. 571 (2014), Adam Florek

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Control Over Personal Data, Privacy And Administrative Discretion In Europe And The Usa: The Paradox Of Italian “Data Protection Authority”, 30 J. Marshall J. Info. Tech. & Privacy L. 721 (2014), Marco Quiroz Vitale Jan 2014

Control Over Personal Data, Privacy And Administrative Discretion In Europe And The Usa: The Paradox Of Italian “Data Protection Authority”, 30 J. Marshall J. Info. Tech. & Privacy L. 721 (2014), Marco Quiroz Vitale

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Right To Travel And Privacy: Intersecting Fundamental Freedoms, 30 J. Marshall J. Info. Tech. & Privacy L. 639 (2014), Richard Sobel Jan 2014

The Right To Travel And Privacy: Intersecting Fundamental Freedoms, 30 J. Marshall J. Info. Tech. & Privacy L. 639 (2014), Richard Sobel

UIC John Marshall Journal of Information Technology & Privacy Law

As a fundamental right inherent in American citizenship and the nature of the federal union, the right to travel in the United States is basic to American liberty. The right precedes the creation of the United States and appears in the Articles of Confederation. The U.S. Constitution and Supreme Court recognize and protect the right to interstate travel. The travel right entails privacy and free domestic movement without governmental abridgement.

In the era of surveillance, the imposition of official photo identification for travel, watchlist prescreening programs, and invasive airport scans and searches unreasonably burden the right to travel. They undermine …


Uncle Sam Knows What’S In Your Medicine Cabinet: The Security And Privacy Protection Of Health Records Under The Hitech Act, 30 J. Marshall J. Info. Tech. & Privacy L. 667 (2014), Ranjit Janardhanan Jan 2014

Uncle Sam Knows What’S In Your Medicine Cabinet: The Security And Privacy Protection Of Health Records Under The Hitech Act, 30 J. Marshall J. Info. Tech. & Privacy L. 667 (2014), Ranjit Janardhanan

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Where Has Privacy Gone? How Surveillance Programs Threaten Expectations Of Privacy, 30 J. Marshall J. Info. Tech. & Privacy L. 795 (2014), Michael Greene Jan 2014

Where Has Privacy Gone? How Surveillance Programs Threaten Expectations Of Privacy, 30 J. Marshall J. Info. Tech. & Privacy L. 795 (2014), Michael Greene

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Now You See It, Now You Don’T . . . Or Do You?: Snapchat’S Deceptive Promotion Of Vanishing Messages Violates Federal Trade Commission Regulations, 30 J. Marshall J. Info. Tech. & Privacy L. 827 (2014), Danielle Young Jan 2014

Now You See It, Now You Don’T . . . Or Do You?: Snapchat’S Deceptive Promotion Of Vanishing Messages Violates Federal Trade Commission Regulations, 30 J. Marshall J. Info. Tech. & Privacy L. 827 (2014), Danielle Young

UIC John Marshall Journal of Information Technology & Privacy Law

This Comment will explore the recently popular application Snapchat, and discuss the ways in which the app's privacy policy has violated FTC regulations, responding to a recent complaint filed by The Electronic Privacy Center. Particularly, this Comment will focus on Snapchat's deceptive promotion of "disappearing" photographs and videos. Section II will illustrate the basic structure of Snapchat, detailing various illustrations of its use. Section II will also examine the regulations set forth by the FTC that Snapchat is required to follow. Section III will discuss possible methods that the average user can do in order to bypass the very thing …


The Policing Of Religious Marriage Prohibitions In Israel: Religion, State, And Information Technology, 31 J. Marshall J. Info. Tech. & Privacy L. 23 (2014), Akiva Miller Jan 2014

The Policing Of Religious Marriage Prohibitions In Israel: Religion, State, And Information Technology, 31 J. Marshall J. Info. Tech. & Privacy L. 23 (2014), Akiva Miller

UIC John Marshall Journal of Information Technology & Privacy Law

The State of Israel applies religious law in all matters of marriage and divorce. For the Jewish population of Israel, the law of marriage includes religious prohibitions on certain kinds of marriages, most notably the prohibition against intermarriage and the prohibition against marrying a mamzer. Over the years, Israel‘s state-religious authorities have adopted a variety of methods and practices for policing these prohibitions. These include stringent procedures for premarital registration inquiries; use of databases for collecting information on prohibited persons; recording the possibility of mamzer status of newborn children; special Beit Din proceedings for handling cases of possible marriage prohibitions; …


California’S Eavesdropping Law Endangers Victims Of Domestic Violence, 31 J. Marshall J. Info. Tech. & Privacy L. 57 (2014), John E.B. Myers Jan 2014

California’S Eavesdropping Law Endangers Victims Of Domestic Violence, 31 J. Marshall J. Info. Tech. & Privacy L. 57 (2014), John E.B. Myers

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Canada’S Anti-Spam Legislation: A Constitutional Analysis, 31 J. Marshall J. Info. Tech. & Privacy L. 1 (2014), Emir Crowne, Stephanie Provato Jan 2014

Canada’S Anti-Spam Legislation: A Constitutional Analysis, 31 J. Marshall J. Info. Tech. & Privacy L. 1 (2014), Emir Crowne, Stephanie Provato

UIC John Marshall Journal of Information Technology & Privacy Law

On December 15th, 2010, the Government of Canada agreed to Bill C-28, the Fighting Internet and Wireless Spam Act, with the intent to “deter the most damaging and deceptive forms of spam… from occurring in Canada and to help to drive out spammers.” Canada‟s Anti- Spam Legislation (“CASL”) was born. Although CASL has only been in force since July 1st, 2014, we argue that the Act may not survive constitutional scrutiny as it unduly restricts freedom of speech.


The Online Gun Marketplace And The Dangerous Loophole In The National Instant Background Check System, 30 J. Marshall J. Info. Tech. & Privacy L. 757 (2014), Ann Daniels Jan 2014

The Online Gun Marketplace And The Dangerous Loophole In The National Instant Background Check System, 30 J. Marshall J. Info. Tech. & Privacy L. 757 (2014), Ann Daniels

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Shutting Down The Ex Parte Party: How To Keep Bittorrent Copyright Trolls From Abusing The Federal Court’S Discovery System, 31 J. Marshall J. Info. Tech. & Privacy L. 105 (2014), Jennifer L. Hunter Jan 2014

Shutting Down The Ex Parte Party: How To Keep Bittorrent Copyright Trolls From Abusing The Federal Court’S Discovery System, 31 J. Marshall J. Info. Tech. & Privacy L. 105 (2014), Jennifer L. Hunter

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Ethical Implications Of Cloud Computing For Lawyers, 31 J. Marshall J. Info. Tech. & Privacy L. 71 (2014), Stuart Pardau, Blake Edwards Jan 2014

The Ethical Implications Of Cloud Computing For Lawyers, 31 J. Marshall J. Info. Tech. & Privacy L. 71 (2014), Stuart Pardau, Blake Edwards

UIC John Marshall Journal of Information Technology & Privacy Law

This paper aims to isolate the pertinent ethical issues of cloud computing and chart a sensible path forward for lawyers. Part II briefly introduces the concept of cloud computing. Part III discusses the lawyer‟s duties of confidentiality, of competence, to protect client property, and to oversee non-lawyers who are providing assistance. Part III also examines the application of these duties by the various state bar associations to the problem of cloud computing. Part IV looks at sample terms of use of some of the more popular vendors. Part V suggests that securing informed consent, employing specialty cloud providers, and purchasing …


The Right To Be Forgotten: Forced Amnesia In A Technological Age, 31 J. Marshall J. Info. Tech. & Privacy L. 133 (2014), Robert Bolton Jan 2014

The Right To Be Forgotten: Forced Amnesia In A Technological Age, 31 J. Marshall J. Info. Tech. & Privacy L. 133 (2014), Robert Bolton

UIC John Marshall Journal of Information Technology & Privacy Law

In the modern era, the connection between technology and one’s personal life has increased the number of moments recorded for posterity. While in many circumstances this is an ideal opportunity for fond recollection, it has the downside of displaying for others our less flattering moments. Because the Internet has such a wide scope, once something has entered its domain, it is virtually impossible to permanently remove. With a public increasingly perceiving this winnowing of privacy as a negative tendency, legislators both at home and abroad have made proposals that attempt to place restrictions on what content social media is allowed …


The Thirty-Third Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 31 J. Marshall J. Computer & Info. L. 237 (2014), Adam Florek, Anisha Mehta, Danielle Young, Michael Greene Jan 2014

The Thirty-Third Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 31 J. Marshall J. Computer & Info. L. 237 (2014), Adam Florek, Anisha Mehta, Danielle Young, Michael Greene

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Bulk Telephony Metadata Collection And The Fourth Amendment: The Case For Revisiting The Third-Party Disclosure Doctrine In The Digital Age, 31 J. Marshall J. Info. Tech. & Privacy L. 191 (2014), Timothy Geverd Jan 2014

Bulk Telephony Metadata Collection And The Fourth Amendment: The Case For Revisiting The Third-Party Disclosure Doctrine In The Digital Age, 31 J. Marshall J. Info. Tech. & Privacy L. 191 (2014), Timothy Geverd

UIC John Marshall Journal of Information Technology & Privacy Law

This Article argues that federal courts should seize the opportunity presented by the Snowden leaks to reexamine the continued vitality of the current third-party disclosure doctrine in Fourth Amendment jurisprudence. Specifically, this Article argues that Smith v. Maryland simply cannot continue to act as the “North Star” for judges navigating the “Fourth Amendment waters” of the digital age, and that instead, Smith should apply more narrowly in the digital age. In so arguing, this Article advocates that courts apply a modified, twostep test to evaluating third-party disclosures rather than applying the traditional binary rubric that courts have drawn from Smith …


Eyes On The Road Program In Taiwan―Information Privacy Issues Under The Taiwan Personal Data Protection Act, 31 J. Marshall J. Info. Tech. & Privacy L. 145 (2015), Chen-Hung Chang Jan 2014

Eyes On The Road Program In Taiwan―Information Privacy Issues Under The Taiwan Personal Data Protection Act, 31 J. Marshall J. Info. Tech. & Privacy L. 145 (2015), Chen-Hung Chang

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Thirty-Third Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 31 J. Marshall J. Computer & Info. L. 251 (2014), Amany Awad, Kelly O'Neill, Arlo Walsman Jan 2014

The Thirty-Third Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 31 J. Marshall J. Computer & Info. L. 251 (2014), Amany Awad, Kelly O'Neill, Arlo Walsman

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Thirty-Third Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 31 J. Marshall J. Computer & Info. L. 285 (2014), Sara Schroeder, Austin Hoffman, Becky Fey Jan 2014

The Thirty-Third Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 31 J. Marshall J. Computer & Info. L. 285 (2014), Sara Schroeder, Austin Hoffman, Becky Fey

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.