Open Access. Powered by Scholars. Published by Universities.®
- Institution
Articles 1 - 13 of 13
Full-Text Articles in Law
Private Letters And The Law: Edith Wharton’S Questions About Ownership And The Right To Publish Private Letters, Deborah Hecht
Private Letters And The Law: Edith Wharton’S Questions About Ownership And The Right To Publish Private Letters, Deborah Hecht
Touro Law Review
No abstract provided.
Cookie Monster: Balancing Internet Privacy With Commerce, Technology And Terrorism, Nichoel Forrett
Cookie Monster: Balancing Internet Privacy With Commerce, Technology And Terrorism, Nichoel Forrett
Touro Law Review
No abstract provided.
A Cloudy Forecast: Divergence In The Cloud Computing Laws Of The United States, European Union, And China, Tina Cheng
A Cloudy Forecast: Divergence In The Cloud Computing Laws Of The United States, European Union, And China, Tina Cheng
Georgia Journal of International & Comparative Law
No abstract provided.
Hidden Home Videos: Surreptitious Video Surveillance In Divorce, Rebecca V. Lyon
Hidden Home Videos: Surreptitious Video Surveillance In Divorce, Rebecca V. Lyon
Chicago-Kent Law Review
In divorce court, often a very contentious and emotional court, parties frequently use what they can to gain the upper hand. The invention of new technology gives them an even wider arsenal. While tracking each other on the computer or checking phone records has become common, courts are now encountering instances where one spouse has placed hidden video cameras around the house to catch the other spouse doing something wrong. Under many state laws, courts have been forced to conclude that the surreptitious video recordings are not illegal. Perhaps more surprisingly, a few courts have concluded that the law either …
Privacy, Trusts And Cross-Border Transfers Of Personal Information: The Quebec Perspective In The Canadian Context, Eloise Gratton, Pierre-Christian Collins Hoffman
Privacy, Trusts And Cross-Border Transfers Of Personal Information: The Quebec Perspective In The Canadian Context, Eloise Gratton, Pierre-Christian Collins Hoffman
Dalhousie Law Journal
This paper argues that data protection laws apply to prevent the disclosure of certain information relating to trusts, which are increasingly being used .as business and investment vehicles. Given the broad scope of the concept of "personal information" found under both provincial and federal personal information protection statutes, arguments can be made that information relating to trust beneficiaries or trustees, where such beneficiaries or trustees are natural persons, enjoy some level of protection. Even where a trust contains an express choice of law clause providing that the laws of another province or country apply, Quebec conflict of laws rules may …
Privacy In Social Media: To Tweet Or Not To Tweet?, Tara M. Breslawski
Privacy In Social Media: To Tweet Or Not To Tweet?, Tara M. Breslawski
Touro Law Review
No abstract provided.
The Post-Tsa Airport: A Constitution Free Zone?, Daniel S. Harawa
The Post-Tsa Airport: A Constitution Free Zone?, Daniel S. Harawa
Pepperdine Law Review
No abstract provided.
Facebook Is Not Your Friend: Protecting A Private Employee's Expectation Of Privacy In Social Networking Content In The Twenty-First Century Workplace, Cara Magatelli
The Journal of Business, Entrepreneurship & the Law
This Comment explores the implications SNS postings have on private employers concerning the off-duty, non-work related conduct of their employees. This argument recognizes that an employee is entitled to engage in whatever legal off-duty conduct he chooses, so long as the behavior does not damage his employer's legitimate business interests. An employer should not be able to use information gleaned from an employee's SNS postings, unrelated to an employer's business interests, to punish an employee for her choices outside the work place. Disciplining or terminating an employee for his off-duty lifestyle choices permits the morals and standards of the employer …
Give Me Your Password: The Intrusive Social Media Policies In Our Schools, Talon Hurst
Give Me Your Password: The Intrusive Social Media Policies In Our Schools, Talon Hurst
CommLaw Conspectus: Journal of Communications Law and Technology Policy (1993-2015)
No abstract provided.
Forget Me, Forget Me Not: Reconciling Two Different Paradigms Of The Right To Be Forgotten, Lawrence Siry
Forget Me, Forget Me Not: Reconciling Two Different Paradigms Of The Right To Be Forgotten, Lawrence Siry
Kentucky Law Journal
In May of 2014, the Court of Justice of the European Union handed down its decision in the case of Google Spain SL v. Agencia Española de Protección de Datos. This landmark decision ignited a firestorm of debate over the "right to be forgotten": the right of users to withdraw information about themselves available on the internet. With concerns about the restriction of the freedom of expression on the internet, many commentators have criticized the decision as unworkable and dangerous. Others have recognized continuity in the development of privacy and data protection jurisprudence within the European courts. Meanwhile in …
Fouling The First Amendment: Why Colleges Can't, And Shouldn't, Control Student Athletes' Speech On Social Media, Frank D. Lomonte
Fouling The First Amendment: Why Colleges Can't, And Shouldn't, Control Student Athletes' Speech On Social Media, Frank D. Lomonte
Journal of Business & Technology Law
No abstract provided.
Policing The Social Media Water Cooler: Recent Nlrb Decisions Should Make Employers Think Twice Before Terminating An Employee For Comments Posted On Social Media Sites, Eric Raphan, Sean Kirby
Policing The Social Media Water Cooler: Recent Nlrb Decisions Should Make Employers Think Twice Before Terminating An Employee For Comments Posted On Social Media Sites, Eric Raphan, Sean Kirby
Journal of Business & Technology Law
No abstract provided.
Electronic Privacy Information Center V. National Security Agency: How Glomar Responses Benefit Businesses And Provide An Epic Blow To Individuals, Joshua R. Chazen
Electronic Privacy Information Center V. National Security Agency: How Glomar Responses Benefit Businesses And Provide An Epic Blow To Individuals, Joshua R. Chazen
Journal of Business & Technology Law
No abstract provided.