Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Privacy (9)
- Right of privacy (6)
- Right to privacy (4)
- Internet (2)
- Kentucky (2)
-
- Software licenses (2)
- United States (2)
- 1st amendment (1)
- 4th amendment (1)
- Adoptive parents (1)
- Authority (1)
- Biology (1)
- Board Policy (1)
- Book review (1)
- Border (1)
- Broadband access (1)
- Business method (1)
- Children (1)
- Citizenship (1)
- Cloud (1)
- Conception (1)
- Confidentiality (1)
- Confidentiality limitations (1)
- Contextual Integrity (1)
- Contract law (1)
- Contracts (1)
- Cybercrime (1)
- Cyberspace (1)
- Data (1)
- Digital (1)
- Publication Year
- Publication
- Publication Type
Articles 1 - 30 of 38
Full-Text Articles in Law
The Protection Of Student Data Privacy In Wisconsin School Board Policies, Curtis Clyde Rees
The Protection Of Student Data Privacy In Wisconsin School Board Policies, Curtis Clyde Rees
Theses and Dissertations--Education Sciences
American schools have increasingly adopted technology resources to fulfill their educational obligations. These tools are for instruction, communication, and storing and analyzing student information. Student data can be directory information, enrollment records, achievement data, and student-created products. This increased utilization began with the passage of No Child Left Behind in 2001, and the COVID-19 pandemic led to more educational technology use of student data. Districts turned to third-party vendors for assistance with data systems and virtual learning resources. Before, during, and after the pandemic, stakeholders were concerned about information security and the students' privacy. School leaders looked to federal regulations …
A Work Place Surveillance: Who's Watching?, Mark E. Heath
A Work Place Surveillance: Who's Watching?, Mark E. Heath
Journal of Natural Resources & Environmental Law
No abstract provided.
Don't Forget To Subscribe: Regulation Of Online Advertising Evaluated Through Youtube's Monetization Problem, Nicole E. Pottinger
Don't Forget To Subscribe: Regulation Of Online Advertising Evaluated Through Youtube's Monetization Problem, Nicole E. Pottinger
Kentucky Law Journal
No abstract provided.
Redefining The Third-Party Doctrine: Carpenter's Effect On Dna Privacy, Drew M. Baldwin
Redefining The Third-Party Doctrine: Carpenter's Effect On Dna Privacy, Drew M. Baldwin
Kentucky Law Journal
No abstract provided.
Determinants Of Personal Information Protection Activities In South Korea, Pilku Kang
Determinants Of Personal Information Protection Activities In South Korea, Pilku Kang
MPA/MPP/MPFM Capstone Projects
The purpose of this paper is to investigate how people’s awareness and ways to obtain relevant materials of personal information have influenced individual’s information privacy protection activities. This study uses the data of a 2016 survey on information security published by Korea Information and Security Agency.
The dependent variables of this study are preventive measures for the security of a Personal Computer (PC) and preventive measures against personal information breach. I classify independent variables into four types. They are internet users’ perception about information privacy, such as awareness of the importance of protecting one’s personal information, and awareness of information …
New Frontiers In Medical Privacy: Protecting The Biometric Data Of Patients In The Healthcare Industry, Jordan T. Shewmaker
New Frontiers In Medical Privacy: Protecting The Biometric Data Of Patients In The Healthcare Industry, Jordan T. Shewmaker
Kentucky Law Journal
No abstract provided.
Keeping Up With New Legal Titles, Franklin L. Runge
Keeping Up With New Legal Titles, Franklin L. Runge
Law Faculty Scholarly Articles
In this book review, Franklin L. Runge discusses The Future of Foreign Intelligence: Privacy and Surveillance in a Digital Age (2016) by Laura K. Donohue.
Against Data Exceptionalism, Andrew Keane Woods
Against Data Exceptionalism, Andrew Keane Woods
Law Faculty Scholarly Articles
One of the great regulatory challenges of the Internet era—indeed, one of today's most pressing privacy questions—is how to define the limits of government access to personal data stored in the cloud. This is particularly true today because the cloud has gone global, raising a number of questions about the proper reach of one state's authority over cloud-based data. The prevailing response to these questions by scholars, practitioners, and major Internet companies like Google and Facebook has been to argue that data is different. Data is “unterritorial,” they argue, and therefore incompatible with existing territorial notions of jurisdiction. This Article …
Protecting Online Privacy, Stephanie D. Winkler
Protecting Online Privacy, Stephanie D. Winkler
Theses and Dissertations--Communication
Online privacy has become one of the greatest concerns in the United States today. There are currently multiple stakeholders with interests in online privacy including the public, industry, and the United States government. This study examines the issues surrounding the protection of online privacy. Privacy laws in the United States are currently outdated and do little to protect online privacy. These laws are unlikely to be changed as both the government and industry have interests in keeping these privacy laws lax. To bridge the gap between the desired level of online privacy and what is provided legally users may turn …
Surveillance At The Source, David Thaw
Surveillance At The Source, David Thaw
Kentucky Law Journal
Contemporary discussions concerning surveillance focus predominantly on government activity. These discussions are important for a variety of reasons, but they generally ignore a critical aspect of the surveillance--harm calculus--the source from which government entities derive the information they use. The source of surveillance data is the information "gathering" activity itself which is where harms like "chilling" of speech and behavior begin.
Unlike the days where satellite imaging, communications intercepts, and other forms of information gathering were limited to advanced law enforcement, military, and intelligence activities, private corporations now play a dominant role in the collection of information about individuals' activities. …
That's Unfair! Or Is It? Big Data, Discrimination And The Ftc's Unfairness Authority, Dennis D. Hirsch
That's Unfair! Or Is It? Big Data, Discrimination And The Ftc's Unfairness Authority, Dennis D. Hirsch
Kentucky Law Journal
No abstract provided.
Privacy And Health Information: The United States And The European Union, Leslie Francis
Privacy And Health Information: The United States And The European Union, Leslie Francis
Kentucky Law Journal
No abstract provided.
Data Privacy As A Civil Right: The Eu Gets It?, Raymond Shih Ray Ku
Data Privacy As A Civil Right: The Eu Gets It?, Raymond Shih Ray Ku
Kentucky Law Journal
No abstract provided.
The Right To Be Forgotten: Who Decides What The World Forgets?, Patricia Sánchez Abril, Jacqueline D. Lipton
The Right To Be Forgotten: Who Decides What The World Forgets?, Patricia Sánchez Abril, Jacqueline D. Lipton
Kentucky Law Journal
In May 2014, the Court of Justice for the European Union ("CJEU") surprised the global cyber law community by holding that search engines like Google are "controllers" of the processing of personal data under the European Union Data Protection Directive. This means that they are obliged in some circumstances to remove links from search results that pertain to information that infringes on an individual's rights under the Directive. This obligation has come to be referred to as an aspect of a digital "right to be forgotten." The search results in question related to a mortgage sale of property in a …
Forget Me, Forget Me Not: Reconciling Two Different Paradigms Of The Right To Be Forgotten, Lawrence Siry
Forget Me, Forget Me Not: Reconciling Two Different Paradigms Of The Right To Be Forgotten, Lawrence Siry
Kentucky Law Journal
In May of 2014, the Court of Justice of the European Union handed down its decision in the case of Google Spain SL v. Agencia Española de Protección de Datos. This landmark decision ignited a firestorm of debate over the "right to be forgotten": the right of users to withdraw information about themselves available on the internet. With concerns about the restriction of the freedom of expression on the internet, many commentators have criticized the decision as unworkable and dangerous. Others have recognized continuity in the development of privacy and data protection jurisprudence within the European courts. Meanwhile in …
The Facebook Frontier: Responding To The Changing Face Of Privacy On The Internet, Samantha L. Millier
The Facebook Frontier: Responding To The Changing Face Of Privacy On The Internet, Samantha L. Millier
Kentucky Law Journal
No abstract provided.
You Are Being Watched: The Need For Notice In Employer Electronic Monitoring, Mindy C. Calisti
You Are Being Watched: The Need For Notice In Employer Electronic Monitoring, Mindy C. Calisti
Kentucky Law Journal
No abstract provided.
Neither Big Brother Nor Dead Brother: The Need For A New Fourth Amendment Standard Applying To Emerging Technologies, Casey Holland
Neither Big Brother Nor Dead Brother: The Need For A New Fourth Amendment Standard Applying To Emerging Technologies, Casey Holland
Kentucky Law Journal
No abstract provided.
4th Annual Computer & Technology Law Institute, Office Of Continuing Legal Education At The University Of Kentucky College Of Law
4th Annual Computer & Technology Law Institute, Office Of Continuing Legal Education At The University Of Kentucky College Of Law
Continuing Legal Education Materials
Materials from the 4th Annual Computer & Technology Law Institute held by UK/CLE in November 2002.
2nd Annual Computer & Technology Law Institute, Office Of Continuing Legal Education At The University Of Kentucky College Of Law, Carlyle C. Ring, Holly K. Towle, Timothy E. Nielander, John G. Hundley, J. Mark Grundy, Matthew M. Clark, David E. Fleenor, William L. Montague Jr., Jack E. Toliver, Joel T. Beres, Cynthia L. Stewart, Kenneth J. Tuggle, Kenneth R. Sagan, Stephen E. Gillen
2nd Annual Computer & Technology Law Institute, Office Of Continuing Legal Education At The University Of Kentucky College Of Law, Carlyle C. Ring, Holly K. Towle, Timothy E. Nielander, John G. Hundley, J. Mark Grundy, Matthew M. Clark, David E. Fleenor, William L. Montague Jr., Jack E. Toliver, Joel T. Beres, Cynthia L. Stewart, Kenneth J. Tuggle, Kenneth R. Sagan, Stephen E. Gillen
Continuing Legal Education Materials
Materials from the 2nd Annual Computer & Technology Law Institute held by UK/CLE in March 2000.
Computer Law Institute, Office Of Continuing Legal Education At The University Of Kentucky College Of Law, Charles R. Keeton, Jay E. Ingle, J. Mark Grundy, Robert F. Duncan, Kenneth J. Tuggle, Joel T. Beres, Bill E. Webb, Stephen J. Davidson, Cynthia L. Stewart, Judge B. Wilson Ii, David J. Beyer, Kurt X. Metzmeier, Shaun E. Esposito
Computer Law Institute, Office Of Continuing Legal Education At The University Of Kentucky College Of Law, Charles R. Keeton, Jay E. Ingle, J. Mark Grundy, Robert F. Duncan, Kenneth J. Tuggle, Joel T. Beres, Bill E. Webb, Stephen J. Davidson, Cynthia L. Stewart, Judge B. Wilson Ii, David J. Beyer, Kurt X. Metzmeier, Shaun E. Esposito
Continuing Legal Education Materials
Materials from the Computer Law Institute held by UK/CLE in May 1999.
The Newsworthiness Defense To The Public Disclosure Tort, Geoff Dendy
The Newsworthiness Defense To The Public Disclosure Tort, Geoff Dendy
Kentucky Law Journal
No abstract provided.
All In The Family: Interspousal And Parental Wiretapping Under Title Iii Of The Omnibus Crime Act, Jonathan D. Niemeyer
All In The Family: Interspousal And Parental Wiretapping Under Title Iii Of The Omnibus Crime Act, Jonathan D. Niemeyer
Kentucky Law Journal
No abstract provided.
Medical And Psychotherapy Privileges And Confidentiality: On Giving With One Hand And Removing With The Other, Steven R. Smith
Medical And Psychotherapy Privileges And Confidentiality: On Giving With One Hand And Removing With The Other, Steven R. Smith
Kentucky Law Journal
No abstract provided.
Surrogate Gestation And The Protection Of Choice, Louise E. Graham
Surrogate Gestation And The Protection Of Choice, Louise E. Graham
Law Faculty Scholarly Articles
Proponents of surrogate gestation contracts base their case on both the constitutional privacy rights of persons involved in the contract and the notion that contractual agreements are capable of sufficiently protecting all interests involved. This article first speculates on how courts might handle surrogate gestation contracts under existing laws and offers arguments for and against such contracts. Although some commentary on the contractual aspect of the agreement exists, little attention has been given to the privacy arguments of the parties. The major focus of this article, therefore, is upon the nature of the privacy claims asserted by the prospective parents …
Doe V. Commonwealth's Attorney: A Set-Back For The Right Of Privacy, Tim O'Neill
Doe V. Commonwealth's Attorney: A Set-Back For The Right Of Privacy, Tim O'Neill
Kentucky Law Journal
No abstract provided.
The First Amendment And Protection Of Reputation And Privacy--New York Times Co. V. Sullivan And How It Grew, William O. Bertelsman
The First Amendment And Protection Of Reputation And Privacy--New York Times Co. V. Sullivan And How It Grew, William O. Bertelsman
Kentucky Law Journal
No abstract provided.
Torts--Right Of Privacy, Durward W. Caudill
Torts--Right Of Privacy, Durward W. Caudill
Kentucky Law Journal
No abstract provided.
Right Of Privacy Collection Cases--Letter Of Creditor To Debtor's Employer, William Deep
Right Of Privacy Collection Cases--Letter Of Creditor To Debtor's Employer, William Deep
Kentucky Law Journal
No abstract provided.
Public Interest As A Limitation Of The Right To Privacy, Dianne Louise Mckaig
Public Interest As A Limitation Of The Right To Privacy, Dianne Louise Mckaig
Kentucky Law Journal
No abstract provided.