Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
- Publication Type
Articles 1 - 10 of 10
Full-Text Articles in Law
Ministerial Misfeasance: R. V. Morris And A Unique Early Privacy Breach, Barry Cahill
Ministerial Misfeasance: R. V. Morris And A Unique Early Privacy Breach, Barry Cahill
Dalhousie Law Journal
According to Klein &Kratchanov (Government Information: The Right to Information and Protection of Privacy in Canada, 2nd ed., 2009), "there is one reported case of a successful private prosecution for violation of an access statute through the unauthorized release of personal information. The matter arose under a former Nova Scotia Act and resulted in a modest fine being imposed against a Minister of the Crown who had disclosed information about the complainant." What follows is a close, contextual study of a case unique in the short history of privacy law in Canada, from the perspective of the thirty-year development of …
Best Practices And The State Of Information Security, Kevin Cronin
Best Practices And The State Of Information Security, Kevin Cronin
Chicago-Kent Law Review
The forces of globalization, together with widely available industry standards and best practices, and heightened state legislative activity, are driving the U.S. towards a more unified approach to data security. But the success of this unified approach requires more than free market efficiency and innovation. In order to maintain a state of evolutionary equilibrium in the global information economy, the U.S. must move from a fragmented approach towards data security and privacy standards, towards a more comprehensive set of standards with new penalties and effective enforcement, to better reflect the inherent value of personal data in today's global marketplace.
Coding Privacy, Lilian Edwards
Coding Privacy, Lilian Edwards
Chicago-Kent Law Review
Lawrence Lessig famously and usefully argues that cyberspace is regulated not just by law but also by norms, markets and architecture or "code." His insightful work might also lead the unwary to conclude, however, that code is inherently anti-privacy, and thus that an increasingly digital world must therefore also be increasingly devoid of privacy. This paper argues briefly that since technology is a neutral tool, code can be designed as much to fight for privacy as against it, and that what matters now is to look at what incentivizes the creation of pro- rather than anti-privacy code in the mainstream …
Privacy, Accountability, And The Cooperating Defendant: Towards A New Role For Internet Access To Court Records, Caren M. Morrison
Privacy, Accountability, And The Cooperating Defendant: Towards A New Role For Internet Access To Court Records, Caren M. Morrison
Vanderbilt Law Review
Now that federal court records are available online, anyone can obtain criminal case files instantly over the Internet. But this unfettered flow of information is in fundamental tension with many goals of the criminal justice system, including the integrity of criminal investigations, the accountability of prosecutors, and the security of witnesses. It has also altered the behavior of prosecutors intent on protecting the identity of cooperating defendants who assist them in investigating other targets. As prosecutors and courts collaborate to obscure the process by which cooperators are recruited and rewarded, Internet availability risks degrading the value of the information obtained …
Islam's Fourth Amendment: Search And Seizure In Islamic Doctrine And Muslim Practice, Sadiq Reza
Islam's Fourth Amendment: Search And Seizure In Islamic Doctrine And Muslim Practice, Sadiq Reza
Articles & Chapters
Modern scholars regularly assert that Islamic law contains privacy protections similar to those of the FourthAmendment to the U.S. Constitution. Two Quranic verses in particular - one that commands Muslims not to enter homes without permission, and one that commands them not to 'spy' - are held up, along with reports from the Traditions (Sunna) that repeat and embellish on these commands, as establishing rules that forbid warrantless searches and seizures by state actors and require the exclusion of evidence obtained in violation of these rules. This Article tests these assertions by: (1) presenting rules and doctrines Muslim jurists of …
The Facebook Frontier: Responding To The Changing Face Of Privacy On The Internet, Samantha L. Millier
The Facebook Frontier: Responding To The Changing Face Of Privacy On The Internet, Samantha L. Millier
Kentucky Law Journal
No abstract provided.
Understanding The New Virtualist Paradigm, Jonathon Penney
Understanding The New Virtualist Paradigm, Jonathon Penney
Articles, Book Chapters, & Popular Press
This article discusses the central ideas within an emerging body of cyberlaw scholarship I have elsewhere called the "New Virtualism". We now know that the original "virtualists"- those first generation cyberlaw scholars who believed virtual worlds and spaces were immune to corporate and state control - were wrong; these days, such state and corporate interests are ubiquitous in cyberspace and the Internet. But is this it? Is there not anything else we can learn about cyberlaw from the virtualists and their utopian dreams? I think so. In fact, the New Virtualist paradigm of cyberlaw scholarship draws on the insights of …
Privacy And The New Virtualism, Jonathon Penney
Privacy And The New Virtualism, Jonathon Penney
Articles, Book Chapters, & Popular Press
First generation cyberlaw scholars were deeply influenced by the uniqueness of cyberspace, and believed its technology and scope meant it could not be controlled by any government. Few still ascribe to this utopian vision. However, there is now a growing body of second generation cyberlaw scholarship that speaks not only to the differential character of cyberspace, but also analyzes legal norms within virtual spaces while drawing connections to our experience in real space. I call this the New Virtualism. Situated within this emerging scholarship, this article offers a new approach to privacy in virtual spaces by drawing on what Orin …
Preserving Identities: Protecting Personal Identifying Information Through Enhanced Privacy Policies And Laws, Robert Sprague, Corey Ciocchetti
Preserving Identities: Protecting Personal Identifying Information Through Enhanced Privacy Policies And Laws, Robert Sprague, Corey Ciocchetti
Robert Sprague
This article explores the developing phenomenon of the ongoing collection and dissemination of personal identifying information (PII): first, explaining the nature and form of PII, including the consequences of its collection; second, exploring one of the greatest threats associated with data collection - unauthorized disclosure due to data breaches, including an overview of state and federal legislative reactions to the threats of data breaches and identity theft; third, discussing common law and constitutional privacy protections regarding the collection of personal information, revealing that United States privacy laws provide very little protection to individuals; and fourth, examining current practices by online …
Electronic Surveillance In The Global Workplace: Laws, Ethics, Research And Practice, Roland Kidwell, Robert Sprague
Electronic Surveillance In The Global Workplace: Laws, Ethics, Research And Practice, Roland Kidwell, Robert Sprague
Robert Sprague
This paper considers the legal, ethical and cultural factors that must be addressed in evaluating the appropriateness of employing electronic surveillance (ES) in varying international contexts. It critically evaluates the rationale that underlies the use of ES in a variety of settings and types of organisations. It suggests guidelines for the adoption and use of ES and potential directions for future research.