Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication Year
- Publication
- Publication Type
Articles 1 - 16 of 16
Full-Text Articles in Law
The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine
The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine
Catholic University Journal of Law and Technology
No abstract provided.
Taking Disability Public, Jasmine E. Harris
Taking Disability Public, Jasmine E. Harris
All Faculty Scholarship
Anti-discrimination laws enforce the idea that no one should be forced or encouraged to hide their race, gender, sexuality or other characteristics of their identity. So why is disability rights law the glaring exception? Other areas of anti-discrimination law have eschewed forms of enforced privacy about protected classes and, as a result, re-frame privacy norms as problematic, antigenic, and, at times, counter to structural reform goals. In contrast, disability rights law values privacy norms to preempt discrimination; in other words, if you never reveal the information, no one can discriminate against you because of that information. This Article argues that …
A Dangerous Inheritance: A Child’S Digital Identity, Kate Hamming
A Dangerous Inheritance: A Child’S Digital Identity, Kate Hamming
Seattle University Law Review
This Comment begins with one family’s story of its experience with social media that many others can relate to in today’s ever-growing world of technology and the Internet. Technology has made it possible for a person’s online presence to grow exponentially through continuous sharing by other Internet users. This ability to communicate and share information amongst family, friends, and strangers all over the world, while beneficial in some regard, comes with its privacy downfalls. The risks to privacy are elevated when children’s information is being revealed, which often stems from a child’s own parents conduct online. Parents all over the …
Sb 104 - Carjacking, Fentanyl And "Upskirting", Katherine H. Krouse, Lauren R. Light
Sb 104 - Carjacking, Fentanyl And "Upskirting", Katherine H. Krouse, Lauren R. Light
Georgia State University Law Review
The Act includes various amendments to Georgia’s criminal code. Three changes are most notable. First, the Act designates the offense of hijacking a motor vehicle as hijacking a motor vehicle in the first degree and creates the offense of hijacking a motor vehicle in the second degree. Second, the Act criminalizes the use of a device to film underneath or through an individual’s clothing. Lastly, the Act adds the drug Fentanyl and its various analogs to the list of controlled substances.
Blood And Privacy: Towards A "Testing-As-Search" Paradigm Under The Fourth Amendment, Andrei Nedelcu
Blood And Privacy: Towards A "Testing-As-Search" Paradigm Under The Fourth Amendment, Andrei Nedelcu
Seattle University Law Review
A vehicle on a public thoroughfare is observed driving erratically and careening across the roadway. After the vehicle strikes another passenger car and comes to a stop, the responding officer notices in the driver the telltale symptoms of intoxication—bloodshot eyes, slurred speech, and a distinct odor of intoxicants. On these facts, a lawfully-procured warrant authorizing the extraction of the driver’s blood is obtained. However, the document fails to circumscribe the manner and variety of testing that may be performed on the sample. Does this lack of particularity render the warrant constitutionally infirm as a mandate for chemical analysis of the …
Trading Privacy For Angry Birds: A Call For Courts To Reevaluate Privacy Expectations In Modern Smartphones, Jeremy Andrew Ciarabellini
Trading Privacy For Angry Birds: A Call For Courts To Reevaluate Privacy Expectations In Modern Smartphones, Jeremy Andrew Ciarabellini
Seattle University Law Review
Of all the smartphone uses, the calling function is probably used the least. Rather, individuals more commonly use their smartphone for surfing the web, checking Facebook, and playing games. Highlighting the “smart” in smartphone, these phones often know more about their users’ daily activities than the users. Without requiring any sort of input, smartphones can tell the user how many steps they walk each day, when it is time to leave for work (also, of course, determining the traveling time with the most up-to-date traffic reports), and when an item recently ordered on Amazon will be delivered. Smartphone users may …
Authorized Investigation: A Temperate Alternative To Cyber Insecurity, Casey M. Bruner
Authorized Investigation: A Temperate Alternative To Cyber Insecurity, Casey M. Bruner
Seattle University Law Review
This Note aims to show that legal structures created to protect the Internet in its original form are completely insufficient to protect what the Internet has become. This antiquated legal framework is exacerbating the problem. The breadth of activity that the current law restricts severely limits the remedies that cyberattack victims can pursue, and it must be updated. While full hack-back may prove necessary in the long run, I argue for a more temperate initial response to the problem—I call this response “authorized investigation.” Specifically, the Computer Fraud and Abuse Act should be amended to allow victims access to their …
Law As An Ally Or Enemy In The War On Cyberbullying: Exploring The Contested Terrain Of Privacy And Other Legal Concepts In The Age Of Technology And Social Media, A. Wayne Mackay
Articles, Book Chapters, & Popular Press
This article focuses on the role and limits of law as a response to cyberbullying. The problem of cyberbullying engages many of our most fundamental legal concepts and provides an interesting case study. Even when there is general agreement that the problem merits a legal response, there are significant debates about what that response should be. Which level and what branch of government can and should best respond? What is the most appropriate legal process for pursuing cyberbullies—traditional legal avenues or more creative restorative approaches? How should the rights and responsibilities of perpetrators, victims and even bystanders be balanced? Among …
Facebook Fallacies, Geoffrey C. Hazard Jr.
Facebook Fallacies, Geoffrey C. Hazard Jr.
All Faculty Scholarship
No abstract provided.
Gender And Privacy In Cyberspace, Anita L. Allen
Gender And Privacy In Cyberspace, Anita L. Allen
All Faculty Scholarship
No abstract provided.
Privacy-As-Data Control: Conceptual, Practical, And Moral Limits Of The Paradigm, Anita L. Allen
Privacy-As-Data Control: Conceptual, Practical, And Moral Limits Of The Paradigm, Anita L. Allen
All Faculty Scholarship
No abstract provided.
Coercing Privacy, Anita L. Allen
Lying To Protect Privacy, Anita L. Allen
Lying To Protect Privacy, Anita L. Allen
All Faculty Scholarship
No abstract provided.
Genetic Testing, Nature, And Trust, Anita L. Allen
Genetic Testing, Nature, And Trust, Anita L. Allen
All Faculty Scholarship
No abstract provided.
The Power Of Private Facts, Anita L. Allen
The Power Of Private Facts, Anita L. Allen
All Faculty Scholarship
No abstract provided.
Privacy, Surrogacy, And The Baby M Case, Anita L. Allen
Privacy, Surrogacy, And The Baby M Case, Anita L. Allen
All Faculty Scholarship
No abstract provided.