Open Access. Powered by Scholars. Published by Universities.®
- Publication
- Publication Type
Articles 1 - 9 of 9
Full-Text Articles in Law
The Protection Of Student Data Privacy In Wisconsin School Board Policies, Curtis Clyde Rees
The Protection Of Student Data Privacy In Wisconsin School Board Policies, Curtis Clyde Rees
Theses and Dissertations--Education Sciences
American schools have increasingly adopted technology resources to fulfill their educational obligations. These tools are for instruction, communication, and storing and analyzing student information. Student data can be directory information, enrollment records, achievement data, and student-created products. This increased utilization began with the passage of No Child Left Behind in 2001, and the COVID-19 pandemic led to more educational technology use of student data. Districts turned to third-party vendors for assistance with data systems and virtual learning resources. Before, during, and after the pandemic, stakeholders were concerned about information security and the students' privacy. School leaders looked to federal regulations …
Keeping Up With New Legal Titles, Franklin L. Runge
Keeping Up With New Legal Titles, Franklin L. Runge
Law Faculty Scholarly Articles
In this book review, Franklin L. Runge discusses The Future of Foreign Intelligence: Privacy and Surveillance in a Digital Age (2016) by Laura K. Donohue.
Against Data Exceptionalism, Andrew Keane Woods
Against Data Exceptionalism, Andrew Keane Woods
Law Faculty Scholarly Articles
One of the great regulatory challenges of the Internet era—indeed, one of today's most pressing privacy questions—is how to define the limits of government access to personal data stored in the cloud. This is particularly true today because the cloud has gone global, raising a number of questions about the proper reach of one state's authority over cloud-based data. The prevailing response to these questions by scholars, practitioners, and major Internet companies like Google and Facebook has been to argue that data is different. Data is “unterritorial,” they argue, and therefore incompatible with existing territorial notions of jurisdiction. This Article …
Forget Me, Forget Me Not: Reconciling Two Different Paradigms Of The Right To Be Forgotten, Lawrence Siry
Forget Me, Forget Me Not: Reconciling Two Different Paradigms Of The Right To Be Forgotten, Lawrence Siry
Kentucky Law Journal
In May of 2014, the Court of Justice of the European Union handed down its decision in the case of Google Spain SL v. Agencia Española de Protección de Datos. This landmark decision ignited a firestorm of debate over the "right to be forgotten": the right of users to withdraw information about themselves available on the internet. With concerns about the restriction of the freedom of expression on the internet, many commentators have criticized the decision as unworkable and dangerous. Others have recognized continuity in the development of privacy and data protection jurisprudence within the European courts. Meanwhile in …
The Facebook Frontier: Responding To The Changing Face Of Privacy On The Internet, Samantha L. Millier
The Facebook Frontier: Responding To The Changing Face Of Privacy On The Internet, Samantha L. Millier
Kentucky Law Journal
No abstract provided.
You Are Being Watched: The Need For Notice In Employer Electronic Monitoring, Mindy C. Calisti
You Are Being Watched: The Need For Notice In Employer Electronic Monitoring, Mindy C. Calisti
Kentucky Law Journal
No abstract provided.
4th Annual Computer & Technology Law Institute, Office Of Continuing Legal Education At The University Of Kentucky College Of Law
4th Annual Computer & Technology Law Institute, Office Of Continuing Legal Education At The University Of Kentucky College Of Law
Continuing Legal Education Materials
Materials from the 4th Annual Computer & Technology Law Institute held by UK/CLE in November 2002.
2nd Annual Computer & Technology Law Institute, Office Of Continuing Legal Education At The University Of Kentucky College Of Law, Carlyle C. Ring, Holly K. Towle, Timothy E. Nielander, John G. Hundley, J. Mark Grundy, Matthew M. Clark, David E. Fleenor, William L. Montague Jr., Jack E. Toliver, Joel T. Beres, Cynthia L. Stewart, Kenneth J. Tuggle, Kenneth R. Sagan, Stephen E. Gillen
2nd Annual Computer & Technology Law Institute, Office Of Continuing Legal Education At The University Of Kentucky College Of Law, Carlyle C. Ring, Holly K. Towle, Timothy E. Nielander, John G. Hundley, J. Mark Grundy, Matthew M. Clark, David E. Fleenor, William L. Montague Jr., Jack E. Toliver, Joel T. Beres, Cynthia L. Stewart, Kenneth J. Tuggle, Kenneth R. Sagan, Stephen E. Gillen
Continuing Legal Education Materials
Materials from the 2nd Annual Computer & Technology Law Institute held by UK/CLE in March 2000.
Surrogate Gestation And The Protection Of Choice, Louise E. Graham
Surrogate Gestation And The Protection Of Choice, Louise E. Graham
Law Faculty Scholarly Articles
Proponents of surrogate gestation contracts base their case on both the constitutional privacy rights of persons involved in the contract and the notion that contractual agreements are capable of sufficiently protecting all interests involved. This article first speculates on how courts might handle surrogate gestation contracts under existing laws and offers arguments for and against such contracts. Although some commentary on the contractual aspect of the agreement exists, little attention has been given to the privacy arguments of the parties. The major focus of this article, therefore, is upon the nature of the privacy claims asserted by the prospective parents …