Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2010

Privacy Law

Journal

Institution
Keyword
Publication

Articles 1 - 30 of 60

Full-Text Articles in Law

Privacy Implications Of Smart Meters, Cheryl Dancey Balough Dec 2010

Privacy Implications Of Smart Meters, Cheryl Dancey Balough

Chicago-Kent Law Review

Many people worry about the erosion of privacy in our society given developments in technology, but that loss of privacy may take a quantum leap as electric "smart meters" make it possible for strangers to know on a real-time basis what is occurring in our houses and apartments. Perhaps the greatest concern is that current laws and regulations do not fully protect us from this unprecedented threat to two of our most basic rights—to be left alone in our own homes and to control personal information. Utility companies across the country are replacing conventional electric meters with smart meters designed …


Approval Of New Pharmacogenomic Tests: Is The Canadian Regulatory Process Adequate?, Yann Joly, Emma Ramos-Paque Oct 2010

Approval Of New Pharmacogenomic Tests: Is The Canadian Regulatory Process Adequate?, Yann Joly, Emma Ramos-Paque

Canadian Journal of Law and Technology

In the first part of our analysis, we will examine the impact which pharmacogenomics is expected to have on drug research and development, on the drug approval process and on post-marketing surveillance and clinical practice. This will allow us to show how pharmacogenomic testing could be beneficial to drug companies, regulatory bodies, and patients. The second part of our analysis will focus on the regulatory framework applicable to the approval of pharmacoge- nomic tests in Canada, although we are aware of the fact that most manufacturers decide to approve their tests outside of Canada. As mentioned, the applicable regu- lations …


The Puzzle Of Brandeis, Privacy, And Speech, Neil M. Richards Oct 2010

The Puzzle Of Brandeis, Privacy, And Speech, Neil M. Richards

Vanderbilt Law Review

The Right to Privacy' and his dissent in Olmstead v. United States. In The Right to Privacy, Brandeis and Samuel Warren argued that intrusion into and public disclosure of private affairs by the press was deeply hurtful, and that the common law should be read to recognize a tort remedy for such violations. Their short article is considered by scholars to have established not just the privacy torts but the field of privacy law itself. Brandeis is also famous (though less so) for his Olmstead dissent-a document which introduced modern concepts of privacy into constitutional law, and ultimately led not …


The Admissibility Of Electronic Business Records, Ken Chasse Oct 2010

The Admissibility Of Electronic Business Records, Ken Chasse

Canadian Journal of Law and Technology

The business record provisions of the Evidence Acts determine a record’s admissibility by evidence of its history, which must be the product of “the usual and ordinary course of business” (or comparable “business activity” wording). The electronic record provisions determine a record’s admissibility by the, “integrity of the electronic records system in which it is recorded or stored.” The difference is, records management (RM) based on “paper records concepts” versus “electronic records systems concepts.” The former is subjective — each business determines its own “usual and ordinary course of business”; the latter, objective — in accor- dance with authoritative standards …


Personalization, Analytics, And Sponsored Services: The Challenges Of Applying Pipeda To Online Tracking And Profiling Activities, Eloïse Gratton Oct 2010

Personalization, Analytics, And Sponsored Services: The Challenges Of Applying Pipeda To Online Tracking And Profiling Activities, Eloïse Gratton

Canadian Journal of Law and Technology

No abstract provided.


Canada's Digital Economy Strategy: Toward An Openness Framework, Michael Geist Oct 2010

Canada's Digital Economy Strategy: Toward An Openness Framework, Michael Geist

Canadian Journal of Law and Technology

This essay is an expanded version of my submission to the digital economy consultation. It opens with general issues such as digital policy leadership, cost issues, and emphasizes the need for a principle-based strategy that embraces the benefits associated with “open,” whether open access, open spectrum or open data. It then provides specific recommendations on a wide range of issues including tele- communications policy, privacy, and copyright.


Interpreting Copyright Law And Internet Facts, Cameron Hutchison Oct 2010

Interpreting Copyright Law And Internet Facts, Cameron Hutchison

Canadian Journal of Law and Technology

This paper probes interpretation issues elicited by the impact of digital technologies and the Internet on copyright law. The purpose of the paper is to instill a coherent framework for analyzing copyright law when it encounters Internet or digital facts. In part one, I propose a methodology of statutory interpretation that helps suitably adapt statutory language to technological developments. In essence it is this: courts should examine the language of the operative provision in its statutory context and in light of its purpose. A contextual interpretation of a broadly conceived rule can reveal a legislative intention that certain kinds of …


Location Surveillance By Gps: Balancing An Employer's Business Interest With Employee Privacy, Kendra Rosenberg Oct 2010

Location Surveillance By Gps: Balancing An Employer's Business Interest With Employee Privacy, Kendra Rosenberg

Washington Journal of Law, Technology & Arts

Employers are increasingly using GPS tracking devices as business tools to monitor employee movements. Recent judicial decisions have found an employer’s interest in using location surveillance on employer-owned property generally trumps an employee’s privacy interests. However, employers deciding to use GPS should be aware of the potential limitations on tracking an employee based on state constitutional, statutory, and common law rights to privacy. This Article focuses on the permissible scope of an employer’s use of GPS to track employees in the workplace.


The Regulation Of Personal Health Record Systems In Canada, James Williams, Jens H. Weber-Jahnke Oct 2010

The Regulation Of Personal Health Record Systems In Canada, James Williams, Jens H. Weber-Jahnke

Canadian Journal of Law and Technology

This paper analyzes the regulatory regime for PHR systems in Canada. The first part of the paper consists of an introduction to some of the major issues associ- ated with these applications, with a focus on privacy, security, data quality, and interoperability. Following this preliminary discussion, the bulk of the analysis deals with the legal instruments that apply to PHR products developed by private sector organizations. Due to space constraints, the paper concentrates on legislative and regulatory instruments, deferring a discussion of the possible impacts of tort, product liability, and contract law on PHR systems. Despite this omission, it is …


Taking Out The Context: A Critical Analysis Of Associated Press V. Canterbury, Kevin Gillen Sep 2010

Taking Out The Context: A Critical Analysis Of Associated Press V. Canterbury, Kevin Gillen

West Virginia Law Review

No abstract provided.


From Scanning To Sexting: The Scope Of Protection Of Dignity-Based Privacy In Canadian Child Pornography Law, Andrea Slane Jul 2010

From Scanning To Sexting: The Scope Of Protection Of Dignity-Based Privacy In Canadian Child Pornography Law, Andrea Slane

Osgoode Hall Law Journal

The Canadian approach to privacy rights in one's body is embedded in the relationship between interests in privacy, bodily integrity, and human dignity. Clarifying these interests is complicated by Canada's middle-ground stance between the European "dignity-based" approach to privacy and the US "liberty-based" orientation. The Canadian approach is closer to the European model when intrusions upon the body are conceived as wholly or mostly non-consensual (e.g., strip searches, voyeurism, and most child pornography). However, once consent plays a potentially determinative rote, the US liberty-based approach gains ground. This reluctance to fully align dignity with privacy results in confusion about the …


Google Analytics: Analyzing The Latest Wave Of Legal Concerns For Google In The U.S. And The E.U., Raizel Liebler, Keidra Chaney Jul 2010

Google Analytics: Analyzing The Latest Wave Of Legal Concerns For Google In The U.S. And The E.U., Raizel Liebler, Keidra Chaney

Buffalo Intellectual Property Law Journal

No abstract provided.


Data Protection: The Challenges Facing Social Networking, Daniel B. Garrie, Maureen Duffy-Lewis, Rebecca Wong, Richard L. Gillespie Jun 2010

Data Protection: The Challenges Facing Social Networking, Daniel B. Garrie, Maureen Duffy-Lewis, Rebecca Wong, Richard L. Gillespie

Brigham Young University International Law & Management Review

No abstract provided.


Inadequate: The Apec Privacy Framework & Article 25 Of The European Data Protection Directive, Stuart Hargreaves Jun 2010

Inadequate: The Apec Privacy Framework & Article 25 Of The European Data Protection Directive, Stuart Hargreaves

Canadian Journal of Law and Technology

The EU and APEC approaches represent two different ways of thinking about the purpose of privacy rights in personal information (a.k.a. “informational privacy” or “data privacy”). The European approach sees integrity and control over information about oneself as inherent to human dignity; informational privacy is treated as a fundamental right subject only to limited restrictions. In contrast, the approach evinced by APEC is a market-oriented cost/benefit calculus; control over personal information is seen as a beneficial policy goal when it can increase consumer confi- dence and promote economic growth — the implication being that it can also more easily give …


La Cyberintimidation: Analyse Juridique, Karen D. Levin Jun 2010

La Cyberintimidation: Analyse Juridique, Karen D. Levin

Canadian Journal of Law and Technology

Dans ce mémoire va être traitée une analyse juridique de la cyberintimidation. Dans une première partie, nous tenterons de définir le terme « cyberintimidation » et les enjeux qui s’y rattachent. En deuxième lieu, nous examinerons la motivation qui mène à la cyberintimidation, ainsi que la manière dans laquelle l’acte se produit. Troisièmement, nous évaluerons les provisions du droit criminel fédéral, des droits de la personne, et du droit des délits civils afin de déterminer l’efficacité de notre système juridique à détourner la cyberintimidation. Finalement, nous trancherons la question de réforme qui se propose au Canada, la comparant aux réformes …


Canada's Current Position With Respect To Sound Marks Registration: A Need For Change?, Marie-Jeanne Provost Jun 2010

Canada's Current Position With Respect To Sound Marks Registration: A Need For Change?, Marie-Jeanne Provost

Canadian Journal of Law and Technology

This paper analyses and criticizes Canada’s position on sound marks registration in order to recommend the ways in which Canadian policy-makers could further act in order to advance this area of law. The first part of this paper exposes the fundamental concepts of trade-marks as they are necessary to the comprehension of the problems surrounding the registration of sound marks. In the second part, legal considerations associated with the registration of sound marks are discussed. More specifically, the visual requirement, the issue of “use,” the concept of distinctiveness and the question of overlap with copyright are assessed. In the third …


Canadian Personal Data Protection Legislation And Electronic Health Records: Transfers Of Personal Health Information In It Outsourcing Agreements, Dara Lambie Jun 2010

Canadian Personal Data Protection Legislation And Electronic Health Records: Transfers Of Personal Health Information In It Outsourcing Agreements, Dara Lambie

Canadian Journal of Law and Technology

Personal data protection and privacy of personal health information in the electronic era is a broad topic that includes consent, security measures and access considerations. The focus of this article is on one component of the larger picture: data transfers of personal health information that occur in the context of informa- tion technology (“IT”) outsourcing. If the societal good envisioned by an inter-jurisdictional EHR is to be fully realized, then the necessity of outsourcing is a reality that must be addressed.


Book Review - Intellectual Property Rights And The Life Science Industries: Past, Present, And Future, Chidi Oguamanam Jun 2010

Book Review - Intellectual Property Rights And The Life Science Industries: Past, Present, And Future, Chidi Oguamanam

Canadian Journal of Law and Technology

Our so-called post-industrial society is one whose axial feature is the interac- tion between computer-driven digital and life science-driven bio-technologies. The primary legal mechanism that undergirds the allocation of rights in this new infor- mation-centred epoch is intellectual property. Perhaps only a few industrial sectors have benefitted more from the dynamics of that interaction than the pharmaceutical industry. Perhaps also, only a few industrial sectors have fully appreciated and opti- mally exploited the power of intellectual property than that sector. How did that happen? How has it continued to unfold, and what does the future hold for the continued co-evolution …


Arrested Development: Arizona V. Gant And Article I, Section 7 Of The Washington State Constitution, Jacob R. Brown May 2010

Arrested Development: Arizona V. Gant And Article I, Section 7 Of The Washington State Constitution, Jacob R. Brown

Washington Law Review

In Arizona v. Gant, the United States Supreme Court held that the search of a vehicle incident to arrest is permissible in only two situations: (1) when the arrestee is unsecured and within reaching distance of the passenger compartment; or (2) when it is reasonable to believe that evidence relevant to the crime of arrest may be found in the vehicle. Because Gant expressed a standard more protective than that established by the Washington State Supreme Court, Gant induced a state of confusion in Washington, where it has long been maintained that article I, section 7 of the Washington …


Privacy Revisited: Gps Tracking As Search And Seizure, Bennett L. Gershman Apr 2010

Privacy Revisited: Gps Tracking As Search And Seizure, Bennett L. Gershman

Pace Law Review

Part I of this Article discusses the facts in People v. Weaver, the majority and dissenting opinions in the Appellate Division, Third Department decision, and the majority and dissenting opinions in the Court of Appeals decision. Part II addresses the question that has yet to be decided by the U.S. Supreme Court—whether GPS tracking of a vehicle by law enforcement constitutes a search under the Fourth Amendment. Part III addresses the separate question that the Court of Appeals did not address in Weaver—whether the surreptitious attachment of a GPS device to a vehicle constitutes a seizure under the Fourth Amendment. …


Flexing Judicial Muscles: Did The Ninth Circuit Abandon Judicial Restraint In United States V. Comprehensive Druge Testing, Inc.?, Allen H. Quist Mar 2010

Flexing Judicial Muscles: Did The Ninth Circuit Abandon Judicial Restraint In United States V. Comprehensive Druge Testing, Inc.?, Allen H. Quist

Brigham Young University Journal of Public Law

No abstract provided.


Coping With Metadata: Ten Key Steps, Steven C. Bennett, Jeremy Cloud Mar 2010

Coping With Metadata: Ten Key Steps, Steven C. Bennett, Jeremy Cloud

Mercer Law Review

Nearly every electronic document contains "metadata," information that typically does not appear in the paper form of the document but that can be retrieved from electronic files. Metadata is often harmless and irrelevant, but in some cases, it can reveal much about the creation, alteration, and transmission of a document. Metadata, moreover, may contain privileged and confidential information. In some instances, electronic documents cannot be reviewed or used efficiently without metadata. Because modern businesses and law firms depend heavily on electronic communication, data management, and word processing, lawyers must learn to cope with metadata and its legal implications.

This Article …


Lock The Closet Door: Does Private Mean Secret, Whitney Kristen Mcbride Jan 2010

Lock The Closet Door: Does Private Mean Secret, Whitney Kristen Mcbride

McGeorge Law Review

No abstract provided.


There Is A Time To Keep Silent And A Time To Speak, The Hard Part Is Knowing Which Is Which: Striking The Balance Between Privacy Protection And The Flow Of Health Care Information, Daniel J. Gilman, James C. Cooper Jan 2010

There Is A Time To Keep Silent And A Time To Speak, The Hard Part Is Knowing Which Is Which: Striking The Balance Between Privacy Protection And The Flow Of Health Care Information, Daniel J. Gilman, James C. Cooper

Michigan Telecommunications & Technology Law Review

Health information technology (HIT) has become a signal element of federal health policy, especially as the recently enacted American Recovery and Reinvestment Act of 2009 (Recovery Act or ARRA) comprises numerous provisions related to HIT and commits tens of billions of dollars to its development and adoption. These provisions charge various agencies of the federal government with both general and specific HIT-related implementation tasks including, inter alia, providing funding for HIT in various contexts: the implementation of interoperable HIT, HIT-related infrastructure, and HIT-related training and research. The Recovery Act also contains various regulatory provisions pertaining to HIT. Provisions of the …


Gina's Genotypes, David H. Kaye Jan 2010

Gina's Genotypes, David H. Kaye

Michigan Law Review First Impressions

In August 2009, the Board of Trustees of the University of Akron added to the university's employment policy the following proviso: "any applicant may be asked to submit fingerprints or DNA sample for purpose of a federal criminal background check." Although the federal government does not do background checks with DNA, the policy is significant because it highlights a largely unexplored feature of the Genetic Information Nondiscrimination Act of 2008 ("GINA"). Hailed by the late Senator Edward Kennedy as "the first civil rights bill of the new century of life sciences," GINA generally prohibits employers from asking for "genetic information." …


Fair Dealing Or Fare Stealing?: Implications Of Canadian Copyright Law Reform On The Online Classroom, Louis Grilli, Daniel Huff, Andrea Shakespeare, Michael Bliemel Jan 2010

Fair Dealing Or Fare Stealing?: Implications Of Canadian Copyright Law Reform On The Online Classroom, Louis Grilli, Daniel Huff, Andrea Shakespeare, Michael Bliemel

Canadian Journal of Law and Technology

This article first examines Canadian copyright law as it pertains to distance education with a detailed review of literature, legislation and jurisprudence, including a comparison with influential law from the United States. Included in this analysis are the opinions of specialists and experts on distance education and copyright in the university environment, who were interviewed during this research. Based on the research findings, we have identified three distinct legislative outcomes. For each, we provide recommendations on how a university and other stakeholders might best protect their interests when confronted with any of these three possibilities.


Cyberwar Policy, 27 J. Marshall J. Computer & Info. L. 303 (2010), Matthew Borton, Samuel Liles, Sydney Liles Jan 2010

Cyberwar Policy, 27 J. Marshall J. Computer & Info. L. 303 (2010), Matthew Borton, Samuel Liles, Sydney Liles

UIC John Marshall Journal of Information Technology & Privacy Law

Cyberwarfare is a very real threat to the security of the nation. Yet there is confusion and disagreement as to which government body is most appropriate to assume the cyberwar mission. The Strategy to Secure Cyberspace treats the threat primarily as a criminal issue, and assigns responsibility to the Department of Homeland Security. The National Defense Strategy implies that cyberwarfare is a military issue. Both documents may be correct, depending on the case. The cyberspace terrain transcends boundaries, quickly blurring the line between civil or criminal action and an act of war, leaving the government with the issue of assigning …


Law School & The Web Of Group Affiliation: Socializing, Socialization, And Social Network Site Use Among Law Students, 27 J. Marshall J. Computer & Info. L. 325 (2010), Eric M. Fink Jan 2010

Law School & The Web Of Group Affiliation: Socializing, Socialization, And Social Network Site Use Among Law Students, 27 J. Marshall J. Computer & Info. L. 325 (2010), Eric M. Fink

UIC John Marshall Journal of Information Technology & Privacy Law

Online social network sites (“SNS”) have emerged as a significant socio-technical phenomenon in the past several years. Scholars from various disciplines have examined these sites to develop a better understanding of their social significance and implications from a variety of perspectives. Within the burgeoning field of SNS studies, one strand of work focuses on the place of SNSs in students’ educational experiences and the potential pedagogical applications of SNSs. However, the SNS phenomenon generally, and its educational/pedagogical significance in particular, have received scant attention from legal scholars. This article examines the place of SNSs within the contemporary law school experience, …


Cyber Fatwās And Classical Islamic Jurisprudence, 27 J. Marshall J. Computer & Info. L. 577 (2010), Derek John Illar Jan 2010

Cyber Fatwās And Classical Islamic Jurisprudence, 27 J. Marshall J. Computer & Info. L. 577 (2010), Derek John Illar

UIC John Marshall Journal of Information Technology & Privacy Law

The first section of this paper will explain what fatwâs are, why they are important, and what is the relationship between fatwâs and the Islamic judiciary. This section will also address who can issue such opinions and how scholars reach their conclusions. In the second part of this paper, I will explore the recent emergence of cyber fatwâs. This section specifically will focus on how Muslims have used this medium and how fatwâs have manifested themselves therein. The third portion of this paper will identity the problems that cyber fatwâs create and why they fail to comport with particular tenets …


How Safe Is This Shore? - Data Protection And Bpos In India, 27 J. Marshall J. Computer & Info. L. 539 (2010), Kritika Bharadwaj Jan 2010

How Safe Is This Shore? - Data Protection And Bpos In India, 27 J. Marshall J. Computer & Info. L. 539 (2010), Kritika Bharadwaj

UIC John Marshall Journal of Information Technology & Privacy Law

India has one of the fastest growing demographics of personal computer and Internet usage, following the U.S. and the U.K. In the light of this progress, there is no doubt that India has benefited from the worldwide process of outsourcing. On the same note, the service offered by India has rendered her indispensible to countries around the world, including the U.S. and the U.K. However, where convenience, speed, and accessibility are taken for granted in this digital era, this paradigm shift has consequently resulted in changes in its management and control, safeguard measures, and a surge of unprecedented threats and …