Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Law

Constitutional Issues In Information Privacy, Fred H. Cate, Robert Litan Oct 2002

Constitutional Issues In Information Privacy, Fred H. Cate, Robert Litan

Michigan Telecommunications & Technology Law Review

The U.S. Constitution has been largely ignored in the recent flurry of privacy laws and regulations designed to protect personal information from incursion by the private sector despite the fact that many of these enactments and efforts to enforce them significantly implicate the First Amendment. Questions about the role of the Constitution have assumed new importance in the aftermath of the September 11, 2001 terrorist attacks on the World Trade Center and the Pentagon. Recent efforts to identify and apprehend terrorists and to protect against future attacks threaten to weaken constitutional protections against government intrusions into personal privacy. However, these …


Corporate Cybersmear: Employers File John Doe Defamation Lawsuits Seeking The Identity Of Anonymous Employee Internet Posters, Margo E. K. Reder, Christine Neylon O'Brien Jun 2002

Corporate Cybersmear: Employers File John Doe Defamation Lawsuits Seeking The Identity Of Anonymous Employee Internet Posters, Margo E. K. Reder, Christine Neylon O'Brien

Michigan Telecommunications & Technology Law Review

Communications systems are now wide open and fully accessible, with no limits in range, scope or geography. Targeted audiences are accessible with pinpoint accuracy. Messages reach millions of readers with one click. There is a chat room for everyone. Most importantly, there is no limit on content. Therefore, employees can register their dissatisfaction by posting a message in a chat room. Moreover, the identity of the posting employee is not easily discoverable due to anonymous and pseudonymous communications capabilities. The nature of these online messages is qualitatively different from real-world communications. By way of example, newspapers have a responsibility regarding …


Marking Carnivore's Territory: Rethinking Pen Registers On The Internet, Anthony E. Orr Jun 2002

Marking Carnivore's Territory: Rethinking Pen Registers On The Internet, Anthony E. Orr

Michigan Telecommunications & Technology Law Review

"Carnivore" entered the online world's collective consciousness in June 2000 when the Federal Bureau of Investigation unveiled the Internet surveillance software program to telecommunications industry specialists. The FBI claims the program allows agents to scan the traffic of an Internet Service Provider (ISP) for messages or commands to or from a criminal suspect and then intercept only those messages, capturing copies of e-mails, web site downloads and other file transfers[...] A central issue in the controversy surrounding Carnivore is whether current law permits the FBI to employ the program in the Internet context. Bureau officials claim statutory authority for deployments …


Computer Searches And Seizures: Some Unresolved Issues, Susan W. Brenner, Barbara A. Frederiksen Jun 2002

Computer Searches And Seizures: Some Unresolved Issues, Susan W. Brenner, Barbara A. Frederiksen

Michigan Telecommunications & Technology Law Review

The goal of this article is to illustrate the issues that arise in the context of computer search and seizures by examining several areas in which the application of Fourth Amendment concepts to computer searches and/or seizures can be problematic. In order to illustrate this point, the article will build on a hypothetical. The hypothetical situation assumes law enforcement officers have lawfully obtained a warrant to search for and seize evidence concerning the commission of one or more crimes. It will also be assumed that computer technology played some role in the commission of these crimes, so computer equipment and …


Japan's Communications Interception Act: Unconstitutional Invasion Of Privacy Or Necessary Tool?, Lillian R. Gilmer Jan 2002

Japan's Communications Interception Act: Unconstitutional Invasion Of Privacy Or Necessary Tool?, Lillian R. Gilmer

Vanderbilt Journal of Transnational Law

In August 1999, Japan became the last of the G8 nations to pass legislation to allow law enforcement to wiretap communications. For some, passage of the law was long overdue; for others, its passage marked the beginning of an impermissible government encroachment on civil rights. This Note examines Japan's Communications Interception Act, the forces in Japanese society creating the need for the law, and the reasons why the law is being challenged. Part II examines the policy behind the law, its history, and public reaction to the law. Part III presents the history of organized crime in Japan, and a …


Privacy, Eh! The Impact Of Canada's Personal Information Protection And Electronic Documents Act On Transnational Business, Juliana M. Spaeth, Mark J. Plotkin, Sandra C. Sheets Jan 2002

Privacy, Eh! The Impact Of Canada's Personal Information Protection And Electronic Documents Act On Transnational Business, Juliana M. Spaeth, Mark J. Plotkin, Sandra C. Sheets

Vanderbilt Journal of Entertainment & Technology Law

In 2002, the requirements imposed by PIPEDA will extend to encompass all personal health information. PIPEDA will ultimately extend to the collection, use, or disclosure of all personal information in the course of any commercial activity within a province in 2004. This change in Canadian law carries significant consequences for the general business practices of American companies that conduct, or may conduct, business with Canadians. It is therefore crucial for lawyers with clients collecting personal data on- and offline to familiarize themselves with its requirements in order to counsel clients effectively about their current and future obligations under this privacy …