Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 38

Full-Text Articles in Law

The Protection Of Student Data Privacy In Wisconsin School Board Policies, Curtis Clyde Rees Jan 2023

The Protection Of Student Data Privacy In Wisconsin School Board Policies, Curtis Clyde Rees

Theses and Dissertations--Education Sciences

American schools have increasingly adopted technology resources to fulfill their educational obligations. These tools are for instruction, communication, and storing and analyzing student information. Student data can be directory information, enrollment records, achievement data, and student-created products. This increased utilization began with the passage of No Child Left Behind in 2001, and the COVID-19 pandemic led to more educational technology use of student data. Districts turned to third-party vendors for assistance with data systems and virtual learning resources. Before, during, and after the pandemic, stakeholders were concerned about information security and the students' privacy. School leaders looked to federal regulations …


A Work Place Surveillance: Who's Watching?, Mark E. Heath May 2021

A Work Place Surveillance: Who's Watching?, Mark E. Heath

Journal of Natural Resources & Environmental Law

No abstract provided.


Don't Forget To Subscribe: Regulation Of Online Advertising Evaluated Through Youtube's Monetization Problem, Nicole E. Pottinger Jan 2019

Don't Forget To Subscribe: Regulation Of Online Advertising Evaluated Through Youtube's Monetization Problem, Nicole E. Pottinger

Kentucky Law Journal

No abstract provided.


Redefining The Third-Party Doctrine: Carpenter's Effect On Dna Privacy, Drew M. Baldwin Jan 2019

Redefining The Third-Party Doctrine: Carpenter's Effect On Dna Privacy, Drew M. Baldwin

Kentucky Law Journal

No abstract provided.


Determinants Of Personal Information Protection Activities In South Korea, Pilku Kang Jan 2018

Determinants Of Personal Information Protection Activities In South Korea, Pilku Kang

MPA/MPP/MPFM Capstone Projects

The purpose of this paper is to investigate how people’s awareness and ways to obtain relevant materials of personal information have influenced individual’s information privacy protection activities. This study uses the data of a 2016 survey on information security published by Korea Information and Security Agency.

The dependent variables of this study are preventive measures for the security of a Personal Computer (PC) and preventive measures against personal information breach. I classify independent variables into four types. They are internet users’ perception about information privacy, such as awareness of the importance of protecting one’s personal information, and awareness of information …


New Frontiers In Medical Privacy: Protecting The Biometric Data Of Patients In The Healthcare Industry, Jordan T. Shewmaker Jan 2018

New Frontiers In Medical Privacy: Protecting The Biometric Data Of Patients In The Healthcare Industry, Jordan T. Shewmaker

Kentucky Law Journal

No abstract provided.


Keeping Up With New Legal Titles, Franklin L. Runge Jan 2017

Keeping Up With New Legal Titles, Franklin L. Runge

Law Faculty Scholarly Articles

In this book review, Franklin L. Runge discusses The Future of Foreign Intelligence: Privacy and Surveillance in a Digital Age (2016) by Laura K. Donohue.


Against Data Exceptionalism, Andrew Keane Woods Apr 2016

Against Data Exceptionalism, Andrew Keane Woods

Law Faculty Scholarly Articles

One of the great regulatory challenges of the Internet era—indeed, one of today's most pressing privacy questions—is how to define the limits of government access to personal data stored in the cloud. This is particularly true today because the cloud has gone global, raising a number of questions about the proper reach of one state's authority over cloud-based data. The prevailing response to these questions by scholars, practitioners, and major Internet companies like Google and Facebook has been to argue that data is different. Data is “unterritorial,” they argue, and therefore incompatible with existing territorial notions of jurisdiction. This Article …


Protecting Online Privacy, Stephanie D. Winkler Jan 2016

Protecting Online Privacy, Stephanie D. Winkler

Theses and Dissertations--Communication

Online privacy has become one of the greatest concerns in the United States today. There are currently multiple stakeholders with interests in online privacy including the public, industry, and the United States government. This study examines the issues surrounding the protection of online privacy. Privacy laws in the United States are currently outdated and do little to protect online privacy. These laws are unlikely to be changed as both the government and industry have interests in keeping these privacy laws lax. To bridge the gap between the desired level of online privacy and what is provided legally users may turn …


Surveillance At The Source, David Thaw Jan 2015

Surveillance At The Source, David Thaw

Kentucky Law Journal

Contemporary discussions concerning surveillance focus predominantly on government activity. These discussions are important for a variety of reasons, but they generally ignore a critical aspect of the surveillance--harm calculus--the source from which government entities derive the information they use. The source of surveillance data is the information "gathering" activity itself which is where harms like "chilling" of speech and behavior begin.

Unlike the days where satellite imaging, communications intercepts, and other forms of information gathering were limited to advanced law enforcement, military, and intelligence activities, private corporations now play a dominant role in the collection of information about individuals' activities. …


That's Unfair! Or Is It? Big Data, Discrimination And The Ftc's Unfairness Authority, Dennis D. Hirsch Jan 2015

That's Unfair! Or Is It? Big Data, Discrimination And The Ftc's Unfairness Authority, Dennis D. Hirsch

Kentucky Law Journal

No abstract provided.


Privacy And Health Information: The United States And The European Union, Leslie Francis Jan 2015

Privacy And Health Information: The United States And The European Union, Leslie Francis

Kentucky Law Journal

No abstract provided.


Data Privacy As A Civil Right: The Eu Gets It?, Raymond Shih Ray Ku Jan 2015

Data Privacy As A Civil Right: The Eu Gets It?, Raymond Shih Ray Ku

Kentucky Law Journal

No abstract provided.


The Right To Be Forgotten: Who Decides What The World Forgets?, Patricia Sánchez Abril, Jacqueline D. Lipton Jan 2014

The Right To Be Forgotten: Who Decides What The World Forgets?, Patricia Sánchez Abril, Jacqueline D. Lipton

Kentucky Law Journal

In May 2014, the Court of Justice for the European Union ("CJEU") surprised the global cyber law community by holding that search engines like Google are "controllers" of the processing of personal data under the European Union Data Protection Directive. This means that they are obliged in some circumstances to remove links from search results that pertain to information that infringes on an individual's rights under the Directive. This obligation has come to be referred to as an aspect of a digital "right to be forgotten." The search results in question related to a mortgage sale of property in a …


Forget Me, Forget Me Not: Reconciling Two Different Paradigms Of The Right To Be Forgotten, Lawrence Siry Jan 2014

Forget Me, Forget Me Not: Reconciling Two Different Paradigms Of The Right To Be Forgotten, Lawrence Siry

Kentucky Law Journal

In May of 2014, the Court of Justice of the European Union handed down its decision in the case of Google Spain SL v. Agencia Española de Protección de Datos. This landmark decision ignited a firestorm of debate over the "right to be forgotten": the right of users to withdraw information about themselves available on the internet. With concerns about the restriction of the freedom of expression on the internet, many commentators have criticized the decision as unworkable and dangerous. Others have recognized continuity in the development of privacy and data protection jurisprudence within the European courts. Meanwhile in …


The Facebook Frontier: Responding To The Changing Face Of Privacy On The Internet, Samantha L. Millier Jan 2009

The Facebook Frontier: Responding To The Changing Face Of Privacy On The Internet, Samantha L. Millier

Kentucky Law Journal

No abstract provided.


You Are Being Watched: The Need For Notice In Employer Electronic Monitoring, Mindy C. Calisti Jan 2008

You Are Being Watched: The Need For Notice In Employer Electronic Monitoring, Mindy C. Calisti

Kentucky Law Journal

No abstract provided.


Neither Big Brother Nor Dead Brother: The Need For A New Fourth Amendment Standard Applying To Emerging Technologies, Casey Holland Jan 2005

Neither Big Brother Nor Dead Brother: The Need For A New Fourth Amendment Standard Applying To Emerging Technologies, Casey Holland

Kentucky Law Journal

No abstract provided.


4th Annual Computer & Technology Law Institute, Office Of Continuing Legal Education At The University Of Kentucky College Of Law Nov 2002

4th Annual Computer & Technology Law Institute, Office Of Continuing Legal Education At The University Of Kentucky College Of Law

Continuing Legal Education Materials

Materials from the 4th Annual Computer & Technology Law Institute held by UK/CLE in November 2002.


2nd Annual Computer & Technology Law Institute, Office Of Continuing Legal Education At The University Of Kentucky College Of Law, Carlyle C. Ring, Holly K. Towle, Timothy E. Nielander, John G. Hundley, J. Mark Grundy, Matthew M. Clark, David E. Fleenor, William L. Montague Jr., Jack E. Toliver, Joel T. Beres, Cynthia L. Stewart, Kenneth J. Tuggle, Kenneth R. Sagan, Stephen E. Gillen Mar 2000

2nd Annual Computer & Technology Law Institute, Office Of Continuing Legal Education At The University Of Kentucky College Of Law, Carlyle C. Ring, Holly K. Towle, Timothy E. Nielander, John G. Hundley, J. Mark Grundy, Matthew M. Clark, David E. Fleenor, William L. Montague Jr., Jack E. Toliver, Joel T. Beres, Cynthia L. Stewart, Kenneth J. Tuggle, Kenneth R. Sagan, Stephen E. Gillen

Continuing Legal Education Materials

Materials from the 2nd Annual Computer & Technology Law Institute held by UK/CLE in March 2000.


Computer Law Institute, Office Of Continuing Legal Education At The University Of Kentucky College Of Law, Charles R. Keeton, Jay E. Ingle, J. Mark Grundy, Robert F. Duncan, Kenneth J. Tuggle, Joel T. Beres, Bill E. Webb, Stephen J. Davidson, Cynthia L. Stewart, Judge B. Wilson Ii, David J. Beyer, Kurt X. Metzmeier, Shaun E. Esposito May 1999

Computer Law Institute, Office Of Continuing Legal Education At The University Of Kentucky College Of Law, Charles R. Keeton, Jay E. Ingle, J. Mark Grundy, Robert F. Duncan, Kenneth J. Tuggle, Joel T. Beres, Bill E. Webb, Stephen J. Davidson, Cynthia L. Stewart, Judge B. Wilson Ii, David J. Beyer, Kurt X. Metzmeier, Shaun E. Esposito

Continuing Legal Education Materials

Materials from the Computer Law Institute held by UK/CLE in May 1999.


The Newsworthiness Defense To The Public Disclosure Tort, Geoff Dendy Jan 1996

The Newsworthiness Defense To The Public Disclosure Tort, Geoff Dendy

Kentucky Law Journal

No abstract provided.


All In The Family: Interspousal And Parental Wiretapping Under Title Iii Of The Omnibus Crime Act, Jonathan D. Niemeyer Jan 1992

All In The Family: Interspousal And Parental Wiretapping Under Title Iii Of The Omnibus Crime Act, Jonathan D. Niemeyer

Kentucky Law Journal

No abstract provided.


Medical And Psychotherapy Privileges And Confidentiality: On Giving With One Hand And Removing With The Other, Steven R. Smith Jan 1987

Medical And Psychotherapy Privileges And Confidentiality: On Giving With One Hand And Removing With The Other, Steven R. Smith

Kentucky Law Journal

No abstract provided.


Surrogate Gestation And The Protection Of Choice, Louise E. Graham Jan 1982

Surrogate Gestation And The Protection Of Choice, Louise E. Graham

Law Faculty Scholarly Articles

Proponents of surrogate gestation contracts base their case on both the constitutional privacy rights of persons involved in the contract and the notion that contractual agreements are capable of sufficiently protecting all interests involved. This article first speculates on how courts might handle surrogate gestation contracts under existing laws and offers arguments for and against such contracts. Although some commentary on the contractual aspect of the agreement exists, little attention has been given to the privacy arguments of the parties. The major focus of this article, therefore, is upon the nature of the privacy claims asserted by the prospective parents …


Doe V. Commonwealth's Attorney: A Set-Back For The Right Of Privacy, Tim O'Neill Jan 1977

Doe V. Commonwealth's Attorney: A Set-Back For The Right Of Privacy, Tim O'Neill

Kentucky Law Journal

No abstract provided.


The First Amendment And Protection Of Reputation And Privacy--New York Times Co. V. Sullivan And How It Grew, William O. Bertelsman Jan 1968

The First Amendment And Protection Of Reputation And Privacy--New York Times Co. V. Sullivan And How It Grew, William O. Bertelsman

Kentucky Law Journal

No abstract provided.


Torts--Right Of Privacy, Durward W. Caudill Jan 1960

Torts--Right Of Privacy, Durward W. Caudill

Kentucky Law Journal

No abstract provided.


Right Of Privacy Collection Cases--Letter Of Creditor To Debtor's Employer, William Deep Jan 1952

Right Of Privacy Collection Cases--Letter Of Creditor To Debtor's Employer, William Deep

Kentucky Law Journal

No abstract provided.


Public Interest As A Limitation Of The Right To Privacy, Dianne Louise Mckaig Jan 1952

Public Interest As A Limitation Of The Right To Privacy, Dianne Louise Mckaig

Kentucky Law Journal

No abstract provided.