Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Privacy Law

2005

Institution
Keyword
Publication
Publication Type
File Type

Articles 61 - 81 of 81

Full-Text Articles in Law

Genetic Use Restriction (Or Terminator) Technologies (Gurts) In Agricultural Biotechnology: The Limits Of Technological Alternatives To Intellectual Property, Chidi Oguamanam Jan 2005

Genetic Use Restriction (Or Terminator) Technologies (Gurts) In Agricultural Biotechnology: The Limits Of Technological Alternatives To Intellectual Property, Chidi Oguamanam

Canadian Journal of Law and Technology

This article examines the adequacy of terminator technology as a potential substitute for traditional intellectual property. It acknowledges that the technology provides a stronger protection and reward mechanism than that offered by the traditional intellectual property rights regime. However, terminator technology or any other technology for that matter, is outside the pantheon of intellectual property regimes. Fundamentally, terminator is a technological answer to the quest by private sector interests to improve appropriability of returns on investments in agrobiotech. It potentially represents a panacea to the long standing industry struggle over the profitability of private research in agrobiotech and the need …


Whazup With The Whois?, Sheldon Burshtein Jan 2005

Whazup With The Whois?, Sheldon Burshtein

Canadian Journal of Law and Technology

The WHOIS is a database directory of domain names and relevant contact information maintained by each top-level domain (TLD) registry, which lists all relevant registrant contact information for each domain name registration. Through its contracts, the Internet Corporation for Assigned Names and Numbers (ICANN) requires registries and registrars to collect and display technical information and contact details for all registrants. The WHOIS is an important component of the domain name system (DNS). The WHOIS is used for a wide variety of purposes by registries, registrars, registrants, law enforcement authorities, consumers, and the general public. The WHOIS may enable identification of …


Transgovernmental Networks Vs. Democracy: The Case Of The European Information Privacy Network, Francesca Bignami Jan 2005

Transgovernmental Networks Vs. Democracy: The Case Of The European Information Privacy Network, Francesca Bignami

Michigan Journal of International Law

The perspective offered by this Article is twofold. The emergence of transgovernmental networks gives rise to two questions, one causal and the other normative. First, how do we explain transnational cooperation through networks? Why do governments and regulators choose to establish networks rather than retain virtually limitless discretion over policymaking, conditioned only by international legal obligations? Based on the author’s examination of the records of the intergovernmental negotiations on the Data Protection Directive, this Article concludes that one precondition for fettering national discretion through networks is common preferences among governments on the substance of the policy to be administered. Compared …


Preventing "You've Got Mail"™ From Meaning "You've Been Served": How Service Of Process By E-Mail Does Not Meet Constitutional Procedure Due Process Requirements, 38 J. Marshall L. Rev. 1121 (2005), Matthew R. Schreck Jan 2005

Preventing "You've Got Mail"™ From Meaning "You've Been Served": How Service Of Process By E-Mail Does Not Meet Constitutional Procedure Due Process Requirements, 38 J. Marshall L. Rev. 1121 (2005), Matthew R. Schreck

UIC Law Review

No abstract provided.


Controlling Identity: Plessy, Privacy, And Racial Defamation, Jonathan Kahn Jan 2005

Controlling Identity: Plessy, Privacy, And Racial Defamation, Jonathan Kahn

Faculty Scholarship

This Article explores the origins of privacy law in early twentieth century America in relation to the legal solidification of Jim Crow in the aftermath of Plessy v. Ferguson. It considers some distinctively southern aspects of the origins of the right to privacy and argues that by viewing privacy, racial defamation, and Jim Crow in relation to each other, we can gain new insights into each-coming to understand that Plessy was not just about controlling space, or property, or even equality but also about controlling identity itself, and coming to see that in its origins, the right to privacy had …


A Review Of Canadian Radiocommunications Law Around "Jammers", Tyson Macauley Jan 2005

A Review Of Canadian Radiocommunications Law Around "Jammers", Tyson Macauley

Canadian Journal of Law and Technology

This comment argues that the Radiocommunications Act should be amended to relax the prohibition on specific types of ‘‘smart’’ jamming in the Industry Science Medicine (ISM) bands. Specifically, the legislation requires increased flexibility and granularity to accom- modate new wireless technologies in the ISM bands — particularly wireless LAN (WLAN) technologies like IEEEE 802.11b/IEEE 802.11g (WiFi), and IEEE 802.11a (henceforth collectively know as ‘‘ISM radios’’).

The availability of cheap, mass-produced ISM radios hardware and the proliferation of applications using the ISM spectrum bands of 2.4Ghz and 5Ghz present a variety of security and privacy concerns that cannot be effectively addressed …


Public Availability Or Practical Obscurity: The Debate Over Public Access To Court Records On The Internet, Arminda Bradford Bepko Jan 2005

Public Availability Or Practical Obscurity: The Debate Over Public Access To Court Records On The Internet, Arminda Bradford Bepko

NYLS Law Review

No abstract provided.


Neither Big Brother Nor Dead Brother: The Need For A New Fourth Amendment Standard Applying To Emerging Technologies, Casey Holland Jan 2005

Neither Big Brother Nor Dead Brother: The Need For A New Fourth Amendment Standard Applying To Emerging Technologies, Casey Holland

Kentucky Law Journal

No abstract provided.


Privacy And The Criminal Arrestee Or Suspect: In Search Of A Right, In Need Of A Rule, Sadiq Reza Jan 2005

Privacy And The Criminal Arrestee Or Suspect: In Search Of A Right, In Need Of A Rule, Sadiq Reza

Faculty Scholarship

Criminal accusation stigmatizes. Merely having been accused of a crime lasts in the public eye, damaging one's reputation and threatening current and future employment, relationships, social status, and more. But vast numbers of criminal cases are dismissed soon after arrest, and countless accusations are unfounded or unprovable. Nevertheless, police officers and prosecutors routinely name criminal accusees to the public upon arrest or suspicion, with no obligation to publicize a defendant's exoneration, or the dismissal of his case, or a decision not to file charges against him at all. Other individuals caught up in the criminal process enjoy protections against the …


Copyright & Privacy - Through The Copyright Lens, 4 J. Marshall Rev. Intell. Prop. L. 212 (2005), Sarah B. Deutsch, Roderick G. Dorman, Michael A. Geist, Hugh C. Hansen, Howard P. Knopf, Ralph Oman, Matthew J. Oppenheim, John G. Palfrey Jan 2005

Copyright & Privacy - Through The Copyright Lens, 4 J. Marshall Rev. Intell. Prop. L. 212 (2005), Sarah B. Deutsch, Roderick G. Dorman, Michael A. Geist, Hugh C. Hansen, Howard P. Knopf, Ralph Oman, Matthew J. Oppenheim, John G. Palfrey

UIC Review of Intellectual Property Law

This panel examines the recent litigation by the recording industry against peer-to-peer (“P2P”) users in the U.S. and Canada. How are users’ identities being obtained? Is the process working well enough or too well? What are the technical, evidentiary, procedural, privacy and substantive copyright issues in play?


Copyright & Privacy - Through The Technology Lens, 4 J. Marshall Rev. Intell. Prop. L. 242 (2005), Michael A. Geist, Doris E. Long, Leslie Ann Reis, David E. Sorkin, Fred Von Lohmann Jan 2005

Copyright & Privacy - Through The Technology Lens, 4 J. Marshall Rev. Intell. Prop. L. 242 (2005), Michael A. Geist, Doris E. Long, Leslie Ann Reis, David E. Sorkin, Fred Von Lohmann

UIC Review of Intellectual Property Law

How is new technology impacting on the more general question of privacy in cyberspace? Is the original notion of an expectation of anonymity on the internet still viable? Can technology pierce through the expectation of privacy even without judicial interference? Do individuals need protection from such technology? Is there technology available to protect the individual? Should these technological tools be regulated? Should the law differentiate between various types of alleged “illegal” behavior; e.g., IP infringement, defamation, possession of pornography and terrorism? Are there international standards that can assist in regulating the intersection between technology and privacy in cyberspace?


Copyright & Privacy - Through The Legislative Lens, 4 J. Marshall Rev. Intell. Prop. L. 266 (2005), Marybeth Peters Jan 2005

Copyright & Privacy - Through The Legislative Lens, 4 J. Marshall Rev. Intell. Prop. L. 266 (2005), Marybeth Peters

UIC Review of Intellectual Property Law

The Honorable Marybeth Peters, who has served since 1994 as the Register of Copyrights for the United States Copyright Office of the Library of Congress, presented a post-election report on the legislative agenda in Washington, D.C. regarding rejected, pending and future amendments to the copyright law of the United States. Register Peters also discussed the current policy role of the United States Copyright Office and several court actions that contest the constitutionality of various provisions of the copyright law.


Copyright & Privacy - Through The Privacy Lens, 4 J. Marshall Rev. Intell. Prop. L. 273 (2005), Julie E. Cohen, David E. Sorkin, Peter P. Swire Jan 2005

Copyright & Privacy - Through The Privacy Lens, 4 J. Marshall Rev. Intell. Prop. L. 273 (2005), Julie E. Cohen, David E. Sorkin, Peter P. Swire

UIC Review of Intellectual Property Law

What legal tools do privacy advocates have available to defend an individual’s right to privacy? How far does this right go? How should these rights be defended—or if necessary—curtailed? What is the role of Government, of the practicing bar and of academics?


Copyright & Privacy - Through The Wide-Angle Lens, 4 J. Marshall Rev. Intell. Prop. L. 285 (2005), William W. Fisher Iii, Howard P. Knopf, Fred Von Lohmann, William B.T. Mock, Marybeth Peters, R. Anthony Reese Jan 2005

Copyright & Privacy - Through The Wide-Angle Lens, 4 J. Marshall Rev. Intell. Prop. L. 285 (2005), William W. Fisher Iii, Howard P. Knopf, Fred Von Lohmann, William B.T. Mock, Marybeth Peters, R. Anthony Reese

UIC Review of Intellectual Property Law

Some have proposed “alternative compensation schemes” as a means of compensating copyright owners and creators for P2P activity while avoiding litigation. Some have proposed a streamlined dispute resolution system that would allow for enforcement in a manner analogous to the UDRP model. Others question whether private copying should necessarily be viewed as illegal and whether any alternative compensation scheme is viable. With all of these proposals, the question remains as to whether “alternative compensation” is really alternative.


Copyright & Privacy - Through The Political Lens, 4 J. Marshall Rev. Intell. Prop. L. 306 (2005), William W. Fisher Iii, Hugh C. Hansen, Christopher Jay Hoofnagle, Howard P. Knopf, Declan Mccullagh, Ralph Oman, Matthew J. Oppenheim Jan 2005

Copyright & Privacy - Through The Political Lens, 4 J. Marshall Rev. Intell. Prop. L. 306 (2005), William W. Fisher Iii, Hugh C. Hansen, Christopher Jay Hoofnagle, Howard P. Knopf, Declan Mccullagh, Ralph Oman, Matthew J. Oppenheim

UIC Review of Intellectual Property Law

Veteran beltway players discuss the politics of P2P technology and Privacy. How far can or should Congress go? Can the United States export its values or its laws in this area? Are content owners in a losing Luddite struggle? What is the role of litigators, lobbyists and legislators in this war?


Welfare, Dialectic, And Mediation In Corporate Law, William W. Bratton Jan 2005

Welfare, Dialectic, And Mediation In Corporate Law, William W. Bratton

All Faculty Scholarship

No abstract provided.


Privacy And The Criminal Arrestee Or Suspect: In Search Of A Right, In Need Of A Rule, Sadiq Reza Jan 2005

Privacy And The Criminal Arrestee Or Suspect: In Search Of A Right, In Need Of A Rule, Sadiq Reza

Articles & Chapters

Criminal accusation stigmatizes. Merely having been accused of a crime lasts in the public eye, damaging one's reputation and threatening current and future employment, relationships, social status, and more. But vast numbers of criminal cases are dismissed soon after arrest, and countless accusations are unfounded orunprovable. Nevertheless, police officers and prosecutors routinely name criminal accusees to the public upon arrest or suspicion, with no obligation to publicize a defendant's exoneration, or the dismissal of his case, or a decision not to file charges against him at all. Other individuals caught up in the criminal process enjoy protections against the public …


Beyond The "War" On Terrorism: Towards The New Intelligence Network, Ronald D. Lee, Paul M. Schwartz Jan 2005

Beyond The "War" On Terrorism: Towards The New Intelligence Network, Ronald D. Lee, Paul M. Schwartz

Michigan Law Review

In Terrorism, Freedom, and Security, Philip B. Heymann undertakes a wide-ranging study of how the United States can - and in his view should - respond to the threat of international terrorism. A former Deputy Attorney General of the United States Department of Justice ("DOJ") and current James Barr Ames Professor of Law at Harvard Law School, Heymann draws on his governmental experience and jurisprudential background in developing a series of nuanced approaches to preventing terrorism. Heymann makes clear his own policy and legal preferences. First, as his choice of subtitle suggests, he firmly rejects the widely used metaphor …


Subpoenas And Privacy, Christopher Slobogin Jan 2005

Subpoenas And Privacy, Christopher Slobogin

Vanderbilt Law School Faculty Publications

This symposium article, the first of two on regulation of government's efforts to obtain paper and digital records of our activities, analyzes the constitutional legitimacy of subpoenas. Whether issued by a grand jury or an administrative agency, subpoenas are extremely easy to enforce, merely requiring the government to demonstrate that the items sought pursuant to the subpoena are "relevant" to a investigation. Yet today subpoenas and pseudo-subpoenas are routinely used not only to obtain business records and the like, but also documents containing significant amounts of personal information about individuals, including medical, financial, and email records. Part I provides an …


Incomparability And The Passive Virtues Ofad Hoc Privacy Policy, James P. Nehf Jan 2005

Incomparability And The Passive Virtues Ofad Hoc Privacy Policy, James P. Nehf

University of Colorado Law Review

No abstract provided.


Nothing New Under The Sun? A Technologically Rational Doctrine Of Fourth Amendment Search, Stephen E. Henderson Dec 2004

Nothing New Under The Sun? A Technologically Rational Doctrine Of Fourth Amendment Search, Stephen E. Henderson

Stephen E Henderson

The Fourth Amendment to the United States Constitution prohibits unreasonable searches and seizures. Yet as interpreted by the United States Supreme Court, the Amendment places no restriction on police combing through financial records; telephone, e-mail and website transactional records; or garbage left for collection. Indeed there is no protection for any information knowingly provided to a third party, because the provider is said to retain no reasonable expectation of privacy in that information. As technology dictates that more and more of our personal lives are available to anyone equipped to receive them, and as social norms dictate that more and …