Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- BYOD (2)
- Bring your own device (2)
- FTC (2)
- ACLU v. Alvarez (1)
- AVUSI (1)
-
- Association for Unmanned Vehicle Systems International (1)
- BYOS (1)
- Bartnicki v. Vopper (1)
- Blown to Bits: Your Life Liberty and Happiness After the Digital Explosion (1)
- Bring Your Own Software (1)
- CEA (1)
- COPE (1)
- California v. Greenwood (1)
- Consumer Electronics Association (1)
- Converging Technologies for Improving Human Performance (1)
- DOT (1)
- Daniel Solove (1)
- Department of Justice v. Reporters Committee for Freedom of the Press (1)
- Department of Transportation (1)
- ESI (1)
- Electronically Stored Information (1)
- FAA (1)
- FCRA (1)
- FDA (1)
- Fair Credit Reporting Act (1)
- Federal Aviation Administration (1)
- Food and Drug Administration (1)
- Glik v. Cunniffe (1)
- Google (1)
- IT (1)
Articles 1 - 9 of 9
Full-Text Articles in Law
Dna Without Warrant: Decoding Privacy, Probable Cause And Personhood, Ken Strutin
Dna Without Warrant: Decoding Privacy, Probable Cause And Personhood, Ken Strutin
Richmond Public Interest Law Review
In Part I, this article explores the challenges to privacy, personhood and probable cause raised by DNA collection as identification sanctioned in Maryland v. King. Part II considers the presumed infallibility of DNA testing that undergirds the Supreme Court's embracement of genetic identification. Lastly, in Part III, this article will try to decipher the Court's Fourth Amendment logic in denying privacy to the information in human cells but embracing them in cell phones in Riley v. California
Protecting The Digital Afterlife: Virginia's Privacy Expectation Afterlife And Choices Act, Mark Obesnshain
Protecting The Digital Afterlife: Virginia's Privacy Expectation Afterlife And Choices Act, Mark Obesnshain
Richmond Public Interest Law Review
This article examines Virginia’s Privacy Expectation Afterlife and Choices Act. Part I surveys federal legislation and proposed uniform legislation that attempts to protect digital assets and records. Part II examines opposition to proposed legislation and another proposed law: the Privacy Expectation Afterlife and Choices Act. Part III details Virginia’s final version of the Privacy Expectation Afterlife and Choices Act. Part V concludes the Article.
Protecting The Digital Afterlife: Virginia's Privacy Expectation Afterlife And Choices Act, The Honorable Mark Obesnshain, The Honorable Jay Leftwich
Protecting The Digital Afterlife: Virginia's Privacy Expectation Afterlife And Choices Act, The Honorable Mark Obesnshain, The Honorable Jay Leftwich
Richmond Journal of Law and the Public Interest
This article examines Virginia’s Privacy Expectation Afterlife and Choices Act. Part I surveys federal legislation and proposed uniform legislation that attempts to protect digital assets and records. Part II examines opposition to proposed legislation and another proposed law: the Privacy Expectation Afterlife and Choices Act. Part III details Virginia’s final version of the Privacy Expectation Afterlife and Choices Act. Part V concludes the Article.
The Internet Of Things And Wearable Technology: Addressing Privacy And Security Concerns Without Derailing Innovation, Adam D. Thierer
The Internet Of Things And Wearable Technology: Addressing Privacy And Security Concerns Without Derailing Innovation, Adam D. Thierer
Richmond Journal of Law & Technology
The next great wave of Internet-enabled innovation has arrived, and it is poised to revolutionize the way humans interact with the world around them. This paper highlights some of the opportunities presented by the rise of the so-called Internet of Things (IoT) in general and wearable technology in particular and encourages policymakers to allow these technologies to develop in a relatively unabated fashion.
Welcome To The Machine: Privacy And Workplace Implications Of Predictive Analytics, Robert Sprague
Welcome To The Machine: Privacy And Workplace Implications Of Predictive Analytics, Robert Sprague
Richmond Journal of Law & Technology
Privacy is not simply an absence of information about us in the minds of others; rather it is the control we have over information about ourselves. The volume of information that people create themselves—the full range of communications from voice calls, e-mails and texts to uploaded pictures, video, and music—pales in comparison to the amount of digital information created about them each day.
Commercial Drones And Privacy: Can We Trust States With ‘Drone Federalism’?, Robert H. Gruber
Commercial Drones And Privacy: Can We Trust States With ‘Drone Federalism’?, Robert H. Gruber
Richmond Journal of Law & Technology
Judge Andrew Napolitano said recently of unmanned aircraft systems (“UAS”), or “drones,” that “[t]he first American patriot that shoots down one of these drones that comes too close to his children in his backyard will be an American hero.”
Wherever You Go, There You Are (With Your Mobile Device): Privacy Risks And Legal Complexities Associated With International ‘Bring Your Own Device’ Programs, Melinda L. Mclellan, James A. Sherer, Emily R. Fedeles
Wherever You Go, There You Are (With Your Mobile Device): Privacy Risks And Legal Complexities Associated With International ‘Bring Your Own Device’ Programs, Melinda L. Mclellan, James A. Sherer, Emily R. Fedeles
Richmond Journal of Law & Technology
The cross-use of mobile devices for personal and professional purposes—commonly referred to as “Bring Your Own Device” or “BYOD” for short—has created a new backdrop for doing business that was scarcely imaginable even ten years ago.
Dna Without Warrant: Decoding Privacy, Probable Cause And Personhood, Ken Strutin
Dna Without Warrant: Decoding Privacy, Probable Cause And Personhood, Ken Strutin
Richmond Journal of Law and the Public Interest
In Part I, this article explores the challenges to privacy, personhood and probable cause raised by DNA collection as identification sanctioned in Maryland v. King. Part II considers the presumed infallibility of DNA testing that undergirds the Supreme Court's embracement of genetic identification. Lastly, in Part III, this article will try to decipher the Court's Fourth Amendment logic in denying privacy to the information in human cells but embracing them in cell phones in Riley v. California
Merger And Acquisition Due Diligence: A Proposed Framework To Incorporate Data Privacy, Information Security, E-Discovery, And Information Governance Into Due Diligence Practices, James A. Sherer, Taylor M. Hoffman, Eugenio E. Ortiz
Merger And Acquisition Due Diligence: A Proposed Framework To Incorporate Data Privacy, Information Security, E-Discovery, And Information Governance Into Due Diligence Practices, James A. Sherer, Taylor M. Hoffman, Eugenio E. Ortiz
Richmond Journal of Law & Technology
Merger and Acquisition or “M&A” deals are both figuratively and literally big business, where the stakes for the organization are often the highest. While casual observers might expect that the importance attached to these deals makes each new deal the vanguard for incorporating metrics and practices regarding every efficiency and contingency, existing research demonstrates that this is decidedly not the case.