Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- UIC School of Law (36)
- Schulich School of Law, Dalhousie University (17)
- University of Michigan Law School (3)
- Vanderbilt University Law School (3)
- West Virginia University (3)
-
- Loyola University Chicago, School of Law (2)
- New York Law School (2)
- Selected Works (2)
- University of Washington School of Law (2)
- Boston University School of Law (1)
- Brigham Young University Law School (1)
- Brooklyn Law School (1)
- Florida State University College of Law (1)
- Maurer School of Law: Indiana University (1)
- Mitchell Hamline School of Law (1)
- Seattle University School of Law (1)
- University of Colorado Law School (1)
- University of Kentucky (1)
- University of Pennsylvania Carey Law School (1)
- Washington and Lee University School of Law (1)
- Keyword
-
- Privacy (7)
- Right of privacy (3)
- Access doctrine (2)
- Anonymity (2)
- Anonymous (2)
-
- Arrest (2)
- Arrest records (2)
- Arrestee (2)
- Book reviews (2)
- Case comment (2)
- Common law privacy (2)
- Confidentiality (2)
- Corporations (2)
- Criminal (2)
- Criminal defendant (2)
- E-commerce (2)
- Fourth amendment (2)
- Government information (2)
- Information (2)
- Informational privacy (2)
- Intellectual property (2)
- Internet (2)
- Juvenile (2)
- Personal information (2)
- Private facts (2)
- Probable cause (2)
- Pseudonymous (2)
- Public disclosure (2)
- Reputation (2)
- Secrecy (2)
- Publication
-
- UIC John Marshall Journal of Information Technology & Privacy Law (27)
- Canadian Journal of Law and Technology (17)
- UIC Review of Intellectual Property Law (6)
- Faculty Scholarship (3)
- West Virginia Law Review (3)
-
- Public Interest Law Reporter (2)
- UIC Law Review (2)
- Vanderbilt Law School Faculty Publications (2)
- All Faculty Scholarship (1)
- Articles & Chapters (1)
- Articles by Maurer Faculty (1)
- Brigham Young University International Law & Management Review (1)
- Kentucky Law Journal (1)
- Michigan Journal of International Law (1)
- Michigan Law Review (1)
- Michigan Telecommunications & Technology Law Review (1)
- NYLS Law Review (1)
- Scholarly Articles (1)
- Scholarly Publications (1)
- Seattle Journal for Social Justice (1)
- Stephen E Henderson (1)
- UIC Law Open Access Faculty Scholarship (1)
- Ugo Mattei (1)
- University of Colorado Law Review (1)
- Vanderbilt Law Review (1)
- Washington International Law Journal (1)
- Washington Journal of Law, Technology & Arts (1)
- Publication Type
Articles 61 - 81 of 81
Full-Text Articles in Law
Genetic Use Restriction (Or Terminator) Technologies (Gurts) In Agricultural Biotechnology: The Limits Of Technological Alternatives To Intellectual Property, Chidi Oguamanam
Canadian Journal of Law and Technology
This article examines the adequacy of terminator technology as a potential substitute for traditional intellectual property. It acknowledges that the technology provides a stronger protection and reward mechanism than that offered by the traditional intellectual property rights regime. However, terminator technology or any other technology for that matter, is outside the pantheon of intellectual property regimes. Fundamentally, terminator is a technological answer to the quest by private sector interests to improve appropriability of returns on investments in agrobiotech. It potentially represents a panacea to the long standing industry struggle over the profitability of private research in agrobiotech and the need …
Whazup With The Whois?, Sheldon Burshtein
Whazup With The Whois?, Sheldon Burshtein
Canadian Journal of Law and Technology
The WHOIS is a database directory of domain names and relevant contact information maintained by each top-level domain (TLD) registry, which lists all relevant registrant contact information for each domain name registration. Through its contracts, the Internet Corporation for Assigned Names and Numbers (ICANN) requires registries and registrars to collect and display technical information and contact details for all registrants. The WHOIS is an important component of the domain name system (DNS). The WHOIS is used for a wide variety of purposes by registries, registrars, registrants, law enforcement authorities, consumers, and the general public. The WHOIS may enable identification of …
Transgovernmental Networks Vs. Democracy: The Case Of The European Information Privacy Network, Francesca Bignami
Transgovernmental Networks Vs. Democracy: The Case Of The European Information Privacy Network, Francesca Bignami
Michigan Journal of International Law
The perspective offered by this Article is twofold. The emergence of transgovernmental networks gives rise to two questions, one causal and the other normative. First, how do we explain transnational cooperation through networks? Why do governments and regulators choose to establish networks rather than retain virtually limitless discretion over policymaking, conditioned only by international legal obligations? Based on the author’s examination of the records of the intergovernmental negotiations on the Data Protection Directive, this Article concludes that one precondition for fettering national discretion through networks is common preferences among governments on the substance of the policy to be administered. Compared …
Preventing "You've Got Mail"™ From Meaning "You've Been Served": How Service Of Process By E-Mail Does Not Meet Constitutional Procedure Due Process Requirements, 38 J. Marshall L. Rev. 1121 (2005), Matthew R. Schreck
UIC Law Review
No abstract provided.
Controlling Identity: Plessy, Privacy, And Racial Defamation, Jonathan Kahn
Controlling Identity: Plessy, Privacy, And Racial Defamation, Jonathan Kahn
Faculty Scholarship
This Article explores the origins of privacy law in early twentieth century America in relation to the legal solidification of Jim Crow in the aftermath of Plessy v. Ferguson. It considers some distinctively southern aspects of the origins of the right to privacy and argues that by viewing privacy, racial defamation, and Jim Crow in relation to each other, we can gain new insights into each-coming to understand that Plessy was not just about controlling space, or property, or even equality but also about controlling identity itself, and coming to see that in its origins, the right to privacy had …
A Review Of Canadian Radiocommunications Law Around "Jammers", Tyson Macauley
A Review Of Canadian Radiocommunications Law Around "Jammers", Tyson Macauley
Canadian Journal of Law and Technology
This comment argues that the Radiocommunications Act should be amended to relax the prohibition on specific types of ‘‘smart’’ jamming in the Industry Science Medicine (ISM) bands. Specifically, the legislation requires increased flexibility and granularity to accom- modate new wireless technologies in the ISM bands — particularly wireless LAN (WLAN) technologies like IEEEE 802.11b/IEEE 802.11g (WiFi), and IEEE 802.11a (henceforth collectively know as ‘‘ISM radios’’).
The availability of cheap, mass-produced ISM radios hardware and the proliferation of applications using the ISM spectrum bands of 2.4Ghz and 5Ghz present a variety of security and privacy concerns that cannot be effectively addressed …
Public Availability Or Practical Obscurity: The Debate Over Public Access To Court Records On The Internet, Arminda Bradford Bepko
Public Availability Or Practical Obscurity: The Debate Over Public Access To Court Records On The Internet, Arminda Bradford Bepko
NYLS Law Review
No abstract provided.
Neither Big Brother Nor Dead Brother: The Need For A New Fourth Amendment Standard Applying To Emerging Technologies, Casey Holland
Neither Big Brother Nor Dead Brother: The Need For A New Fourth Amendment Standard Applying To Emerging Technologies, Casey Holland
Kentucky Law Journal
No abstract provided.
Privacy And The Criminal Arrestee Or Suspect: In Search Of A Right, In Need Of A Rule, Sadiq Reza
Privacy And The Criminal Arrestee Or Suspect: In Search Of A Right, In Need Of A Rule, Sadiq Reza
Faculty Scholarship
Criminal accusation stigmatizes. Merely having been accused of a crime lasts in the public eye, damaging one's reputation and threatening current and future employment, relationships, social status, and more. But vast numbers of criminal cases are dismissed soon after arrest, and countless accusations are unfounded or unprovable. Nevertheless, police officers and prosecutors routinely name criminal accusees to the public upon arrest or suspicion, with no obligation to publicize a defendant's exoneration, or the dismissal of his case, or a decision not to file charges against him at all. Other individuals caught up in the criminal process enjoy protections against the …
Copyright & Privacy - Through The Copyright Lens, 4 J. Marshall Rev. Intell. Prop. L. 212 (2005), Sarah B. Deutsch, Roderick G. Dorman, Michael A. Geist, Hugh C. Hansen, Howard P. Knopf, Ralph Oman, Matthew J. Oppenheim, John G. Palfrey
Copyright & Privacy - Through The Copyright Lens, 4 J. Marshall Rev. Intell. Prop. L. 212 (2005), Sarah B. Deutsch, Roderick G. Dorman, Michael A. Geist, Hugh C. Hansen, Howard P. Knopf, Ralph Oman, Matthew J. Oppenheim, John G. Palfrey
UIC Review of Intellectual Property Law
This panel examines the recent litigation by the recording industry against peer-to-peer (“P2P”) users in the U.S. and Canada. How are users’ identities being obtained? Is the process working well enough or too well? What are the technical, evidentiary, procedural, privacy and substantive copyright issues in play?
Copyright & Privacy - Through The Technology Lens, 4 J. Marshall Rev. Intell. Prop. L. 242 (2005), Michael A. Geist, Doris E. Long, Leslie Ann Reis, David E. Sorkin, Fred Von Lohmann
Copyright & Privacy - Through The Technology Lens, 4 J. Marshall Rev. Intell. Prop. L. 242 (2005), Michael A. Geist, Doris E. Long, Leslie Ann Reis, David E. Sorkin, Fred Von Lohmann
UIC Review of Intellectual Property Law
How is new technology impacting on the more general question of privacy in cyberspace? Is the original notion of an expectation of anonymity on the internet still viable? Can technology pierce through the expectation of privacy even without judicial interference? Do individuals need protection from such technology? Is there technology available to protect the individual? Should these technological tools be regulated? Should the law differentiate between various types of alleged “illegal” behavior; e.g., IP infringement, defamation, possession of pornography and terrorism? Are there international standards that can assist in regulating the intersection between technology and privacy in cyberspace?
Copyright & Privacy - Through The Legislative Lens, 4 J. Marshall Rev. Intell. Prop. L. 266 (2005), Marybeth Peters
Copyright & Privacy - Through The Legislative Lens, 4 J. Marshall Rev. Intell. Prop. L. 266 (2005), Marybeth Peters
UIC Review of Intellectual Property Law
The Honorable Marybeth Peters, who has served since 1994 as the Register of Copyrights for the United States Copyright Office of the Library of Congress, presented a post-election report on the legislative agenda in Washington, D.C. regarding rejected, pending and future amendments to the copyright law of the United States. Register Peters also discussed the current policy role of the United States Copyright Office and several court actions that contest the constitutionality of various provisions of the copyright law.
Copyright & Privacy - Through The Privacy Lens, 4 J. Marshall Rev. Intell. Prop. L. 273 (2005), Julie E. Cohen, David E. Sorkin, Peter P. Swire
Copyright & Privacy - Through The Privacy Lens, 4 J. Marshall Rev. Intell. Prop. L. 273 (2005), Julie E. Cohen, David E. Sorkin, Peter P. Swire
UIC Review of Intellectual Property Law
What legal tools do privacy advocates have available to defend an individual’s right to privacy? How far does this right go? How should these rights be defended—or if necessary—curtailed? What is the role of Government, of the practicing bar and of academics?
Copyright & Privacy - Through The Wide-Angle Lens, 4 J. Marshall Rev. Intell. Prop. L. 285 (2005), William W. Fisher Iii, Howard P. Knopf, Fred Von Lohmann, William B.T. Mock, Marybeth Peters, R. Anthony Reese
Copyright & Privacy - Through The Wide-Angle Lens, 4 J. Marshall Rev. Intell. Prop. L. 285 (2005), William W. Fisher Iii, Howard P. Knopf, Fred Von Lohmann, William B.T. Mock, Marybeth Peters, R. Anthony Reese
UIC Review of Intellectual Property Law
Some have proposed “alternative compensation schemes” as a means of compensating copyright owners and creators for P2P activity while avoiding litigation. Some have proposed a streamlined dispute resolution system that would allow for enforcement in a manner analogous to the UDRP model. Others question whether private copying should necessarily be viewed as illegal and whether any alternative compensation scheme is viable. With all of these proposals, the question remains as to whether “alternative compensation” is really alternative.
Copyright & Privacy - Through The Political Lens, 4 J. Marshall Rev. Intell. Prop. L. 306 (2005), William W. Fisher Iii, Hugh C. Hansen, Christopher Jay Hoofnagle, Howard P. Knopf, Declan Mccullagh, Ralph Oman, Matthew J. Oppenheim
Copyright & Privacy - Through The Political Lens, 4 J. Marshall Rev. Intell. Prop. L. 306 (2005), William W. Fisher Iii, Hugh C. Hansen, Christopher Jay Hoofnagle, Howard P. Knopf, Declan Mccullagh, Ralph Oman, Matthew J. Oppenheim
UIC Review of Intellectual Property Law
Veteran beltway players discuss the politics of P2P technology and Privacy. How far can or should Congress go? Can the United States export its values or its laws in this area? Are content owners in a losing Luddite struggle? What is the role of litigators, lobbyists and legislators in this war?
Welfare, Dialectic, And Mediation In Corporate Law, William W. Bratton
Welfare, Dialectic, And Mediation In Corporate Law, William W. Bratton
All Faculty Scholarship
No abstract provided.
Privacy And The Criminal Arrestee Or Suspect: In Search Of A Right, In Need Of A Rule, Sadiq Reza
Privacy And The Criminal Arrestee Or Suspect: In Search Of A Right, In Need Of A Rule, Sadiq Reza
Articles & Chapters
Criminal accusation stigmatizes. Merely having been accused of a crime lasts in the public eye, damaging one's reputation and threatening current and future employment, relationships, social status, and more. But vast numbers of criminal cases are dismissed soon after arrest, and countless accusations are unfounded orunprovable. Nevertheless, police officers and prosecutors routinely name criminal accusees to the public upon arrest or suspicion, with no obligation to publicize a defendant's exoneration, or the dismissal of his case, or a decision not to file charges against him at all. Other individuals caught up in the criminal process enjoy protections against the public …
Beyond The "War" On Terrorism: Towards The New Intelligence Network, Ronald D. Lee, Paul M. Schwartz
Beyond The "War" On Terrorism: Towards The New Intelligence Network, Ronald D. Lee, Paul M. Schwartz
Michigan Law Review
In Terrorism, Freedom, and Security, Philip B. Heymann undertakes a wide-ranging study of how the United States can - and in his view should - respond to the threat of international terrorism. A former Deputy Attorney General of the United States Department of Justice ("DOJ") and current James Barr Ames Professor of Law at Harvard Law School, Heymann draws on his governmental experience and jurisprudential background in developing a series of nuanced approaches to preventing terrorism. Heymann makes clear his own policy and legal preferences. First, as his choice of subtitle suggests, he firmly rejects the widely used metaphor …
Subpoenas And Privacy, Christopher Slobogin
Subpoenas And Privacy, Christopher Slobogin
Vanderbilt Law School Faculty Publications
This symposium article, the first of two on regulation of government's efforts to obtain paper and digital records of our activities, analyzes the constitutional legitimacy of subpoenas. Whether issued by a grand jury or an administrative agency, subpoenas are extremely easy to enforce, merely requiring the government to demonstrate that the items sought pursuant to the subpoena are "relevant" to a investigation. Yet today subpoenas and pseudo-subpoenas are routinely used not only to obtain business records and the like, but also documents containing significant amounts of personal information about individuals, including medical, financial, and email records. Part I provides an …
Incomparability And The Passive Virtues Ofad Hoc Privacy Policy, James P. Nehf
Incomparability And The Passive Virtues Ofad Hoc Privacy Policy, James P. Nehf
University of Colorado Law Review
No abstract provided.
Nothing New Under The Sun? A Technologically Rational Doctrine Of Fourth Amendment Search, Stephen E. Henderson
Nothing New Under The Sun? A Technologically Rational Doctrine Of Fourth Amendment Search, Stephen E. Henderson
Stephen E Henderson
The Fourth Amendment to the United States Constitution prohibits unreasonable searches and seizures. Yet as interpreted by the United States Supreme Court, the Amendment places no restriction on police combing through financial records; telephone, e-mail and website transactional records; or garbage left for collection. Indeed there is no protection for any information knowingly provided to a third party, because the provider is said to retain no reasonable expectation of privacy in that information. As technology dictates that more and more of our personal lives are available to anyone equipped to receive them, and as social norms dictate that more and …