Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Privacy Law (7)
- Intellectual Property Law (4)
- Internet Law (4)
- Law and Society (4)
- Commercial Law (2)
-
- Computer Law (2)
- Constitutional Law (2)
- Courts (2)
- Law and Politics (2)
- Legal Writing and Research (2)
- National Security Law (2)
- Science and Technology Law (2)
- Common Law (1)
- Criminal Law (1)
- Criminal Procedure (1)
- Dispute Resolution and Arbitration (1)
- Fourth Amendment (1)
- Human Rights Law (1)
- International Trade Law (1)
- Jurisdiction (1)
- Jurisprudence (1)
- Juvenile Law (1)
- Law and Gender (1)
- Institution
- Publication
- Publication Type
- File Type
Articles 1 - 13 of 13
Full-Text Articles in Law
Your Right To Privacy: A Selective Bibliography, Sandra Klein
Your Right To Privacy: A Selective Bibliography, Sandra Klein
Sandra S. Klein
An awareness of relevant contemporary legal thought in the area of privacy is especially important today in light of what appears to be an increasing hostility to .the notion of individual privacy. The following bibliography considers privacy in terms of concept and application, and should prove useful to scholars, practitioners, and those seeking to gain more knowledge about this very important and complicated area of law.
The Right To Die As An Issue Of Privacy: A Selective Bibliography, Sandra Klein
The Right To Die As An Issue Of Privacy: A Selective Bibliography, Sandra Klein
Sandra S. Klein
The issue of whether or not an individual has the right to choose when he or she will die, is a very controversial one for many reasons. Further complicating the issue is the question of who, if anyone, has the right to decide for those who are unable to choose for themselves. The bibliography which follows includes articles which discuss this topic from a right to privacy perspective, and should prove useful to those researchers who are new to the subject, as well as to those who are already familiar with the many complex issues involved.
Blood And Privacy: Towards A "Testing-As-Search" Paradigm Under The Fourth Amendment, Andrei Nedelcu
Blood And Privacy: Towards A "Testing-As-Search" Paradigm Under The Fourth Amendment, Andrei Nedelcu
Seattle University Law Review
A vehicle on a public thoroughfare is observed driving erratically and careening across the roadway. After the vehicle strikes another passenger car and comes to a stop, the responding officer notices in the driver the telltale symptoms of intoxication—bloodshot eyes, slurred speech, and a distinct odor of intoxicants. On these facts, a lawfully-procured warrant authorizing the extraction of the driver’s blood is obtained. However, the document fails to circumscribe the manner and variety of testing that may be performed on the sample. Does this lack of particularity render the warrant constitutionally infirm as a mandate for chemical analysis of the …
Sex, Lies, And Genetic Testing: What Are Your Rights To Privacy In Florida?, Jon L. Mills
Sex, Lies, And Genetic Testing: What Are Your Rights To Privacy In Florida?, Jon L. Mills
Jon L. Mills
Individual and human rights in this country have evolved from national movements and national standards. The Fourteenth Amendment's application of rights to the states was a landmark in human rights, guaranteeing all citizens, no matter their state of residence, a baseline of protection. The Federal Constitution was the protector-“states' rights” was the code phrase for discrimination. But in the American crucible of cultural diversity a national standard for “community” may result in the lowest common denominator or a definition based on averaging. Would it not be better when the most individual of rights, privacy, is implicated to define that right …
Sharing Research Data And Intellectual Property Law: A Primer, Michael Carroll
Sharing Research Data And Intellectual Property Law: A Primer, Michael Carroll
Articles in Law Reviews & Other Academic Journals
Sharing research data by depositing it in connection with a published article or otherwise making data publicly available sometimes raises intellectual property questions in the minds of depositing researchers, their employers, their funders, and other researchers who seek to reuse research data. In this context or in the drafting of data management plans, common questions are (1) what are the legal rights in data; (2) who has these rights; and (3) how does one with these rights use them to share data in a way that permits or encourages productive downstream uses? Leaving to the side privacy and national security …
Sharing Research Data And Intellectual Property Law: A Primer, Michael W. Carroll
Sharing Research Data And Intellectual Property Law: A Primer, Michael W. Carroll
Joint PIJIP/TLS Research Paper Series
Sharing research data by depositing it in connection with a published article or otherwise making data publicly available sometimes raises intellectual property questions in the minds of depositing researchers, their employers, their funders, and other researchers who seek to reuse research data. In this context or in the drafting of data management plans, common questions are (1) what are the legal rights in data; (2) who has these rights; and (3) how does one with these rights use them to share data in a way that permits or encourages productive downstream uses? Leaving to the side privacy and national security …
Sharing Research Data And Intellectual Property Law: A Primer, Michael W. Carroll
Sharing Research Data And Intellectual Property Law: A Primer, Michael W. Carroll
Michael W. Carroll
Trading Privacy For Angry Birds: A Call For Courts To Reevaluate Privacy Expectations In Modern Smartphones, Jeremy Andrew Ciarabellini
Trading Privacy For Angry Birds: A Call For Courts To Reevaluate Privacy Expectations In Modern Smartphones, Jeremy Andrew Ciarabellini
Seattle University Law Review
Of all the smartphone uses, the calling function is probably used the least. Rather, individuals more commonly use their smartphone for surfing the web, checking Facebook, and playing games. Highlighting the “smart” in smartphone, these phones often know more about their users’ daily activities than the users. Without requiring any sort of input, smartphones can tell the user how many steps they walk each day, when it is time to leave for work (also, of course, determining the traveling time with the most up-to-date traffic reports), and when an item recently ordered on Amazon will be delivered. Smartphone users may …
Authorized Investigation: A Temperate Alternative To Cyber Insecurity, Casey M. Bruner
Authorized Investigation: A Temperate Alternative To Cyber Insecurity, Casey M. Bruner
Seattle University Law Review
This Note aims to show that legal structures created to protect the Internet in its original form are completely insufficient to protect what the Internet has become. This antiquated legal framework is exacerbating the problem. The breadth of activity that the current law restricts severely limits the remedies that cyberattack victims can pursue, and it must be updated. While full hack-back may prove necessary in the long run, I argue for a more temperate initial response to the problem—I call this response “authorized investigation.” Specifically, the Computer Fraud and Abuse Act should be amended to allow victims access to their …
Cracking The One-Way Mirror: How Computational Politics Harms Voter Privacy, And Proposed Regulatory Solutions, Kwame N. Akosah
Cracking The One-Way Mirror: How Computational Politics Harms Voter Privacy, And Proposed Regulatory Solutions, Kwame N. Akosah
Fordham Intellectual Property, Media and Entertainment Law Journal
No abstract provided.
Human Rights Hero: The Supreme Court In Griswold V. Connecticut, Stephen Wermiel
Human Rights Hero: The Supreme Court In Griswold V. Connecticut, Stephen Wermiel
Articles in Law Reviews & Other Academic Journals
No abstract provided.
Law As An Ally Or Enemy In The War On Cyberbullying: Exploring The Contested Terrain Of Privacy And Other Legal Concepts In The Age Of Technology And Social Media, A. Wayne Mackay
Articles, Book Chapters, & Popular Press
This article focuses on the role and limits of law as a response to cyberbullying. The problem of cyberbullying engages many of our most fundamental legal concepts and provides an interesting case study. Even when there is general agreement that the problem merits a legal response, there are significant debates about what that response should be. Which level and what branch of government can and should best respond? What is the most appropriate legal process for pursuing cyberbullies—traditional legal avenues or more creative restorative approaches? How should the rights and responsibilities of perpetrators, victims and even bystanders be balanced? Among …
Information Superhighway Patrol, Raizel Liebler
Information Superhighway Patrol, Raizel Liebler
Raizel Liebler