Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Schulich School of Law, Dalhousie University (23)
- UIC School of Law (16)
- Vanderbilt University Law School (4)
- University of Michigan Law School (3)
- Brigham Young University Law School (2)
-
- New York Law School (2)
- University of Washington School of Law (2)
- Chicago-Kent College of Law (1)
- Mercer University School of Law (1)
- Osgoode Hall Law School of York University (1)
- Pace University (1)
- University at Buffalo School of Law (1)
- University of Colorado Law School (1)
- University of the Pacific (1)
- West Virginia University (1)
- Keyword
-
- Privacy (10)
- PIPEDA (3)
- Book reviews (2)
- Fourth Amendment (2)
- Information (2)
-
- Information privacy (2)
- Records management (2)
- 21st century (1)
- APEC (1)
- Access to information (1)
- Admissibility (1)
- Analytics (1)
- Benefit (1)
- Canada (1)
- Canadian Charter of Rights and Freedoms (1)
- Canadian digital economy (1)
- Canadian tech sector (1)
- Child pornography--Law and legislation (1)
- Conceptualizations (1)
- Constitutional guarantees (1)
- Copyright (1)
- Copyright in the university environment (1)
- Copyright law (1)
- Copyright legislation interpretation (1)
- Cyber bullying (1)
- Cyberintimidation (1)
- Cyberjustice (1)
- Cyberwarfare (1)
- DNA (1)
- DNA identification (1)
- Publication
-
- Canadian Journal of Law and Technology (23)
- UIC John Marshall Journal of Information Technology & Privacy Law (14)
- NYLS Law Review (2)
- UIC Law Review (2)
- Vanderbilt Journal of Entertainment & Technology Law (2)
-
- Brigham Young University International Law & Management Review (1)
- Brigham Young University Journal of Public Law (1)
- Buffalo Intellectual Property Law Journal (1)
- Chicago-Kent Law Review (1)
- McGeorge Law Review (1)
- Mercer Law Review (1)
- Michigan Law Review (1)
- Michigan Law Review First Impressions (1)
- Michigan Telecommunications & Technology Law Review (1)
- Osgoode Hall Law Journal (1)
- Pace Law Review (1)
- University of Colorado Law Review (1)
- Vanderbilt Journal of Transnational Law (1)
- Vanderbilt Law Review (1)
- Washington Journal of Law, Technology & Arts (1)
- Washington Law Review (1)
- West Virginia Law Review (1)
Articles 1 - 30 of 60
Full-Text Articles in Law
Privacy Implications Of Smart Meters, Cheryl Dancey Balough
Privacy Implications Of Smart Meters, Cheryl Dancey Balough
Chicago-Kent Law Review
Many people worry about the erosion of privacy in our society given developments in technology, but that loss of privacy may take a quantum leap as electric "smart meters" make it possible for strangers to know on a real-time basis what is occurring in our houses and apartments. Perhaps the greatest concern is that current laws and regulations do not fully protect us from this unprecedented threat to two of our most basic rights—to be left alone in our own homes and to control personal information. Utility companies across the country are replacing conventional electric meters with smart meters designed …
Approval Of New Pharmacogenomic Tests: Is The Canadian Regulatory Process Adequate?, Yann Joly, Emma Ramos-Paque
Approval Of New Pharmacogenomic Tests: Is The Canadian Regulatory Process Adequate?, Yann Joly, Emma Ramos-Paque
Canadian Journal of Law and Technology
In the first part of our analysis, we will examine the impact which pharmacogenomics is expected to have on drug research and development, on the drug approval process and on post-marketing surveillance and clinical practice. This will allow us to show how pharmacogenomic testing could be beneficial to drug companies, regulatory bodies, and patients. The second part of our analysis will focus on the regulatory framework applicable to the approval of pharmacoge- nomic tests in Canada, although we are aware of the fact that most manufacturers decide to approve their tests outside of Canada. As mentioned, the applicable regu- lations …
The Puzzle Of Brandeis, Privacy, And Speech, Neil M. Richards
The Puzzle Of Brandeis, Privacy, And Speech, Neil M. Richards
Vanderbilt Law Review
The Right to Privacy' and his dissent in Olmstead v. United States. In The Right to Privacy, Brandeis and Samuel Warren argued that intrusion into and public disclosure of private affairs by the press was deeply hurtful, and that the common law should be read to recognize a tort remedy for such violations. Their short article is considered by scholars to have established not just the privacy torts but the field of privacy law itself. Brandeis is also famous (though less so) for his Olmstead dissent-a document which introduced modern concepts of privacy into constitutional law, and ultimately led not …
The Admissibility Of Electronic Business Records, Ken Chasse
The Admissibility Of Electronic Business Records, Ken Chasse
Canadian Journal of Law and Technology
The business record provisions of the Evidence Acts determine a record’s admissibility by evidence of its history, which must be the product of “the usual and ordinary course of business” (or comparable “business activity” wording). The electronic record provisions determine a record’s admissibility by the, “integrity of the electronic records system in which it is recorded or stored.” The difference is, records management (RM) based on “paper records concepts” versus “electronic records systems concepts.” The former is subjective — each business determines its own “usual and ordinary course of business”; the latter, objective — in accor- dance with authoritative standards …
Personalization, Analytics, And Sponsored Services: The Challenges Of Applying Pipeda To Online Tracking And Profiling Activities, Eloïse Gratton
Personalization, Analytics, And Sponsored Services: The Challenges Of Applying Pipeda To Online Tracking And Profiling Activities, Eloïse Gratton
Canadian Journal of Law and Technology
No abstract provided.
Canada's Digital Economy Strategy: Toward An Openness Framework, Michael Geist
Canada's Digital Economy Strategy: Toward An Openness Framework, Michael Geist
Canadian Journal of Law and Technology
This essay is an expanded version of my submission to the digital economy consultation. It opens with general issues such as digital policy leadership, cost issues, and emphasizes the need for a principle-based strategy that embraces the benefits associated with “open,” whether open access, open spectrum or open data. It then provides specific recommendations on a wide range of issues including tele- communications policy, privacy, and copyright.
Interpreting Copyright Law And Internet Facts, Cameron Hutchison
Interpreting Copyright Law And Internet Facts, Cameron Hutchison
Canadian Journal of Law and Technology
This paper probes interpretation issues elicited by the impact of digital technologies and the Internet on copyright law. The purpose of the paper is to instill a coherent framework for analyzing copyright law when it encounters Internet or digital facts. In part one, I propose a methodology of statutory interpretation that helps suitably adapt statutory language to technological developments. In essence it is this: courts should examine the language of the operative provision in its statutory context and in light of its purpose. A contextual interpretation of a broadly conceived rule can reveal a legislative intention that certain kinds of …
Location Surveillance By Gps: Balancing An Employer's Business Interest With Employee Privacy, Kendra Rosenberg
Location Surveillance By Gps: Balancing An Employer's Business Interest With Employee Privacy, Kendra Rosenberg
Washington Journal of Law, Technology & Arts
Employers are increasingly using GPS tracking devices as business tools to monitor employee movements. Recent judicial decisions have found an employer’s interest in using location surveillance on employer-owned property generally trumps an employee’s privacy interests. However, employers deciding to use GPS should be aware of the potential limitations on tracking an employee based on state constitutional, statutory, and common law rights to privacy. This Article focuses on the permissible scope of an employer’s use of GPS to track employees in the workplace.
The Regulation Of Personal Health Record Systems In Canada, James Williams, Jens H. Weber-Jahnke
The Regulation Of Personal Health Record Systems In Canada, James Williams, Jens H. Weber-Jahnke
Canadian Journal of Law and Technology
This paper analyzes the regulatory regime for PHR systems in Canada. The first part of the paper consists of an introduction to some of the major issues associ- ated with these applications, with a focus on privacy, security, data quality, and interoperability. Following this preliminary discussion, the bulk of the analysis deals with the legal instruments that apply to PHR products developed by private sector organizations. Due to space constraints, the paper concentrates on legislative and regulatory instruments, deferring a discussion of the possible impacts of tort, product liability, and contract law on PHR systems. Despite this omission, it is …
Taking Out The Context: A Critical Analysis Of Associated Press V. Canterbury, Kevin Gillen
Taking Out The Context: A Critical Analysis Of Associated Press V. Canterbury, Kevin Gillen
West Virginia Law Review
No abstract provided.
From Scanning To Sexting: The Scope Of Protection Of Dignity-Based Privacy In Canadian Child Pornography Law, Andrea Slane
From Scanning To Sexting: The Scope Of Protection Of Dignity-Based Privacy In Canadian Child Pornography Law, Andrea Slane
Osgoode Hall Law Journal
The Canadian approach to privacy rights in one's body is embedded in the relationship between interests in privacy, bodily integrity, and human dignity. Clarifying these interests is complicated by Canada's middle-ground stance between the European "dignity-based" approach to privacy and the US "liberty-based" orientation. The Canadian approach is closer to the European model when intrusions upon the body are conceived as wholly or mostly non-consensual (e.g., strip searches, voyeurism, and most child pornography). However, once consent plays a potentially determinative rote, the US liberty-based approach gains ground. This reluctance to fully align dignity with privacy results in confusion about the …
Google Analytics: Analyzing The Latest Wave Of Legal Concerns For Google In The U.S. And The E.U., Raizel Liebler, Keidra Chaney
Google Analytics: Analyzing The Latest Wave Of Legal Concerns For Google In The U.S. And The E.U., Raizel Liebler, Keidra Chaney
Buffalo Intellectual Property Law Journal
No abstract provided.
Data Protection: The Challenges Facing Social Networking, Daniel B. Garrie, Maureen Duffy-Lewis, Rebecca Wong, Richard L. Gillespie
Data Protection: The Challenges Facing Social Networking, Daniel B. Garrie, Maureen Duffy-Lewis, Rebecca Wong, Richard L. Gillespie
Brigham Young University International Law & Management Review
No abstract provided.
Inadequate: The Apec Privacy Framework & Article 25 Of The European Data Protection Directive, Stuart Hargreaves
Inadequate: The Apec Privacy Framework & Article 25 Of The European Data Protection Directive, Stuart Hargreaves
Canadian Journal of Law and Technology
The EU and APEC approaches represent two different ways of thinking about the purpose of privacy rights in personal information (a.k.a. “informational privacy” or “data privacy”). The European approach sees integrity and control over information about oneself as inherent to human dignity; informational privacy is treated as a fundamental right subject only to limited restrictions. In contrast, the approach evinced by APEC is a market-oriented cost/benefit calculus; control over personal information is seen as a beneficial policy goal when it can increase consumer confi- dence and promote economic growth — the implication being that it can also more easily give …
La Cyberintimidation: Analyse Juridique, Karen D. Levin
La Cyberintimidation: Analyse Juridique, Karen D. Levin
Canadian Journal of Law and Technology
Dans ce mémoire va être traitée une analyse juridique de la cyberintimidation. Dans une première partie, nous tenterons de définir le terme « cyberintimidation » et les enjeux qui s’y rattachent. En deuxième lieu, nous examinerons la motivation qui mène à la cyberintimidation, ainsi que la manière dans laquelle l’acte se produit. Troisièmement, nous évaluerons les provisions du droit criminel fédéral, des droits de la personne, et du droit des délits civils afin de déterminer l’efficacité de notre système juridique à détourner la cyberintimidation. Finalement, nous trancherons la question de réforme qui se propose au Canada, la comparant aux réformes …
Canada's Current Position With Respect To Sound Marks Registration: A Need For Change?, Marie-Jeanne Provost
Canada's Current Position With Respect To Sound Marks Registration: A Need For Change?, Marie-Jeanne Provost
Canadian Journal of Law and Technology
This paper analyses and criticizes Canada’s position on sound marks registration in order to recommend the ways in which Canadian policy-makers could further act in order to advance this area of law. The first part of this paper exposes the fundamental concepts of trade-marks as they are necessary to the comprehension of the problems surrounding the registration of sound marks. In the second part, legal considerations associated with the registration of sound marks are discussed. More specifically, the visual requirement, the issue of “use,” the concept of distinctiveness and the question of overlap with copyright are assessed. In the third …
Canadian Personal Data Protection Legislation And Electronic Health Records: Transfers Of Personal Health Information In It Outsourcing Agreements, Dara Lambie
Canadian Journal of Law and Technology
Personal data protection and privacy of personal health information in the electronic era is a broad topic that includes consent, security measures and access considerations. The focus of this article is on one component of the larger picture: data transfers of personal health information that occur in the context of informa- tion technology (“IT”) outsourcing. If the societal good envisioned by an inter-jurisdictional EHR is to be fully realized, then the necessity of outsourcing is a reality that must be addressed.
Book Review - Intellectual Property Rights And The Life Science Industries: Past, Present, And Future, Chidi Oguamanam
Book Review - Intellectual Property Rights And The Life Science Industries: Past, Present, And Future, Chidi Oguamanam
Canadian Journal of Law and Technology
Our so-called post-industrial society is one whose axial feature is the interac- tion between computer-driven digital and life science-driven bio-technologies. The primary legal mechanism that undergirds the allocation of rights in this new infor- mation-centred epoch is intellectual property. Perhaps only a few industrial sectors have benefitted more from the dynamics of that interaction than the pharmaceutical industry. Perhaps also, only a few industrial sectors have fully appreciated and opti- mally exploited the power of intellectual property than that sector. How did that happen? How has it continued to unfold, and what does the future hold for the continued co-evolution …
Arrested Development: Arizona V. Gant And Article I, Section 7 Of The Washington State Constitution, Jacob R. Brown
Arrested Development: Arizona V. Gant And Article I, Section 7 Of The Washington State Constitution, Jacob R. Brown
Washington Law Review
In Arizona v. Gant, the United States Supreme Court held that the search of a vehicle incident to arrest is permissible in only two situations: (1) when the arrestee is unsecured and within reaching distance of the passenger compartment; or (2) when it is reasonable to believe that evidence relevant to the crime of arrest may be found in the vehicle. Because Gant expressed a standard more protective than that established by the Washington State Supreme Court, Gant induced a state of confusion in Washington, where it has long been maintained that article I, section 7 of the Washington …
Privacy Revisited: Gps Tracking As Search And Seizure, Bennett L. Gershman
Privacy Revisited: Gps Tracking As Search And Seizure, Bennett L. Gershman
Pace Law Review
Part I of this Article discusses the facts in People v. Weaver, the majority and dissenting opinions in the Appellate Division, Third Department decision, and the majority and dissenting opinions in the Court of Appeals decision. Part II addresses the question that has yet to be decided by the U.S. Supreme Court—whether GPS tracking of a vehicle by law enforcement constitutes a search under the Fourth Amendment. Part III addresses the separate question that the Court of Appeals did not address in Weaver—whether the surreptitious attachment of a GPS device to a vehicle constitutes a seizure under the Fourth Amendment. …
Flexing Judicial Muscles: Did The Ninth Circuit Abandon Judicial Restraint In United States V. Comprehensive Druge Testing, Inc.?, Allen H. Quist
Flexing Judicial Muscles: Did The Ninth Circuit Abandon Judicial Restraint In United States V. Comprehensive Druge Testing, Inc.?, Allen H. Quist
Brigham Young University Journal of Public Law
No abstract provided.
Coping With Metadata: Ten Key Steps, Steven C. Bennett, Jeremy Cloud
Coping With Metadata: Ten Key Steps, Steven C. Bennett, Jeremy Cloud
Mercer Law Review
Nearly every electronic document contains "metadata," information that typically does not appear in the paper form of the document but that can be retrieved from electronic files. Metadata is often harmless and irrelevant, but in some cases, it can reveal much about the creation, alteration, and transmission of a document. Metadata, moreover, may contain privileged and confidential information. In some instances, electronic documents cannot be reviewed or used efficiently without metadata. Because modern businesses and law firms depend heavily on electronic communication, data management, and word processing, lawyers must learn to cope with metadata and its legal implications.
This Article …
Lock The Closet Door: Does Private Mean Secret, Whitney Kristen Mcbride
Lock The Closet Door: Does Private Mean Secret, Whitney Kristen Mcbride
McGeorge Law Review
No abstract provided.
There Is A Time To Keep Silent And A Time To Speak, The Hard Part Is Knowing Which Is Which: Striking The Balance Between Privacy Protection And The Flow Of Health Care Information, Daniel J. Gilman, James C. Cooper
There Is A Time To Keep Silent And A Time To Speak, The Hard Part Is Knowing Which Is Which: Striking The Balance Between Privacy Protection And The Flow Of Health Care Information, Daniel J. Gilman, James C. Cooper
Michigan Telecommunications & Technology Law Review
Health information technology (HIT) has become a signal element of federal health policy, especially as the recently enacted American Recovery and Reinvestment Act of 2009 (Recovery Act or ARRA) comprises numerous provisions related to HIT and commits tens of billions of dollars to its development and adoption. These provisions charge various agencies of the federal government with both general and specific HIT-related implementation tasks including, inter alia, providing funding for HIT in various contexts: the implementation of interoperable HIT, HIT-related infrastructure, and HIT-related training and research. The Recovery Act also contains various regulatory provisions pertaining to HIT. Provisions of the …
Gina's Genotypes, David H. Kaye
Gina's Genotypes, David H. Kaye
Michigan Law Review First Impressions
In August 2009, the Board of Trustees of the University of Akron added to the university's employment policy the following proviso: "any applicant may be asked to submit fingerprints or DNA sample for purpose of a federal criminal background check." Although the federal government does not do background checks with DNA, the policy is significant because it highlights a largely unexplored feature of the Genetic Information Nondiscrimination Act of 2008 ("GINA"). Hailed by the late Senator Edward Kennedy as "the first civil rights bill of the new century of life sciences," GINA generally prohibits employers from asking for "genetic information." …
Fair Dealing Or Fare Stealing?: Implications Of Canadian Copyright Law Reform On The Online Classroom, Louis Grilli, Daniel Huff, Andrea Shakespeare, Michael Bliemel
Fair Dealing Or Fare Stealing?: Implications Of Canadian Copyright Law Reform On The Online Classroom, Louis Grilli, Daniel Huff, Andrea Shakespeare, Michael Bliemel
Canadian Journal of Law and Technology
This article first examines Canadian copyright law as it pertains to distance education with a detailed review of literature, legislation and jurisprudence, including a comparison with influential law from the United States. Included in this analysis are the opinions of specialists and experts on distance education and copyright in the university environment, who were interviewed during this research. Based on the research findings, we have identified three distinct legislative outcomes. For each, we provide recommendations on how a university and other stakeholders might best protect their interests when confronted with any of these three possibilities.
Cyberwar Policy, 27 J. Marshall J. Computer & Info. L. 303 (2010), Matthew Borton, Samuel Liles, Sydney Liles
Cyberwar Policy, 27 J. Marshall J. Computer & Info. L. 303 (2010), Matthew Borton, Samuel Liles, Sydney Liles
UIC John Marshall Journal of Information Technology & Privacy Law
Cyberwarfare is a very real threat to the security of the nation. Yet there is confusion and disagreement as to which government body is most appropriate to assume the cyberwar mission. The Strategy to Secure Cyberspace treats the threat primarily as a criminal issue, and assigns responsibility to the Department of Homeland Security. The National Defense Strategy implies that cyberwarfare is a military issue. Both documents may be correct, depending on the case. The cyberspace terrain transcends boundaries, quickly blurring the line between civil or criminal action and an act of war, leaving the government with the issue of assigning …
Law School & The Web Of Group Affiliation: Socializing, Socialization, And Social Network Site Use Among Law Students, 27 J. Marshall J. Computer & Info. L. 325 (2010), Eric M. Fink
UIC John Marshall Journal of Information Technology & Privacy Law
Online social network sites (“SNS”) have emerged as a significant socio-technical phenomenon in the past several years. Scholars from various disciplines have examined these sites to develop a better understanding of their social significance and implications from a variety of perspectives. Within the burgeoning field of SNS studies, one strand of work focuses on the place of SNSs in students’ educational experiences and the potential pedagogical applications of SNSs. However, the SNS phenomenon generally, and its educational/pedagogical significance in particular, have received scant attention from legal scholars. This article examines the place of SNSs within the contemporary law school experience, …
Cyber Fatwās And Classical Islamic Jurisprudence, 27 J. Marshall J. Computer & Info. L. 577 (2010), Derek John Illar
Cyber Fatwās And Classical Islamic Jurisprudence, 27 J. Marshall J. Computer & Info. L. 577 (2010), Derek John Illar
UIC John Marshall Journal of Information Technology & Privacy Law
The first section of this paper will explain what fatwâs are, why they are important, and what is the relationship between fatwâs and the Islamic judiciary. This section will also address who can issue such opinions and how scholars reach their conclusions. In the second part of this paper, I will explore the recent emergence of cyber fatwâs. This section specifically will focus on how Muslims have used this medium and how fatwâs have manifested themselves therein. The third portion of this paper will identity the problems that cyber fatwâs create and why they fail to comport with particular tenets …
How Safe Is This Shore? - Data Protection And Bpos In India, 27 J. Marshall J. Computer & Info. L. 539 (2010), Kritika Bharadwaj
How Safe Is This Shore? - Data Protection And Bpos In India, 27 J. Marshall J. Computer & Info. L. 539 (2010), Kritika Bharadwaj
UIC John Marshall Journal of Information Technology & Privacy Law
India has one of the fastest growing demographics of personal computer and Internet usage, following the U.S. and the U.K. In the light of this progress, there is no doubt that India has benefited from the worldwide process of outsourcing. On the same note, the service offered by India has rendered her indispensible to countries around the world, including the U.S. and the U.K. However, where convenience, speed, and accessibility are taken for granted in this digital era, this paradigm shift has consequently resulted in changes in its management and control, safeguard measures, and a surge of unprecedented threats and …