Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Data privacy (3)
- Data protection (3)
- Privacy (3)
- Personal data (2)
- Social media (2)
-
- Access to justice (1)
- Adventitious Presence (AP) of genes (1)
- Adventitious Presence policy and legislation (1)
- Anonymity networks (1)
- Apple iTunes (1)
- Applicability of human rights law (1)
- Best evidence rule (1)
- Bugging technology (1)
- Canada (1)
- Cloud (1)
- Cloud computing (1)
- Commercial Law (1)
- Communications Law (1)
- Competition Act (1)
- Computer Law (1)
- Computer search (1)
- Conservatism vs innovation (1)
- Constitutional Law (1)
- Consumer Protection (1)
- Consumer Protection Law (1)
- Content neutrality (1)
- Contracts (1)
- Copyright (1)
- Copyright Modernization Act (1)
- Cybersecurity (1)
- Publication
- Publication Type
Articles 1 - 30 of 37
Full-Text Articles in Computer Law
Stymieing Controversy Over Generic Top-Level Domains (Gtlds) And Other Internet Governance Decisions With Content Neutrality, Nafees Uddin
Stymieing Controversy Over Generic Top-Level Domains (Gtlds) And Other Internet Governance Decisions With Content Neutrality, Nafees Uddin
Seattle Journal for Social Justice
No abstract provided.
Should The Default Be "Social"? Canada's Pushback Against Oversharing By Facebook, Karen Tanenbaum
Should The Default Be "Social"? Canada's Pushback Against Oversharing By Facebook, Karen Tanenbaum
Georgia Journal of International & Comparative Law
No abstract provided.
Flawed Transparency: Shared Data Collection And Disclosure Challenges For Google Glass And Similar Technologies, Jonathan I. Ezor
Flawed Transparency: Shared Data Collection And Disclosure Challenges For Google Glass And Similar Technologies, Jonathan I. Ezor
Jonathan I. Ezor
Current privacy law and best practices assume that the party collecting the data is able to describe and disclose its practices to those from and about whom the data are collected. With emerging technologies such as Google Glass, the information being collected by the wearer may be automatically shared to one or more third parties whose use may be substantially different from that of the wearer. Often, the wearer may not even know what information is being uploaded, and how it may be used. This paper will analyze the current state of U.S. law and compliance regarding personal information collection …
The Singapore Personal Data Protection Act And An Assessment Of Future Trends In Data Privacy, Warren B. Chik
The Singapore Personal Data Protection Act And An Assessment Of Future Trends In Data Privacy, Warren B. Chik
Research Collection Yong Pung How School Of Law
In the first part of this paper, I will present and explain the Singapore Personal Data Protection Act (“PDPA”) in the context of legislative developments in the Asian region and against the well-established international baseline privacy standards. In the course of the above evaluation, reference will be made to the national laws and policy on data privacy prior to the enactment of the PDPA as well as current social and market practices in relation to personal data. In the second part of this paper, I will decipher and assess the future trends in data privacy reform and the future development …
Tor Exit Nodes: Legal And Policy Considerations, Sarah Campbell Eagle, Abigail St. Hilaire, Kelly Sherwood
Tor Exit Nodes: Legal And Policy Considerations, Sarah Campbell Eagle, Abigail St. Hilaire, Kelly Sherwood
Technology Law and Public Policy Clinic
Anonymity Networks
The Internet is a constant companion to people the world over and as technology improves it is becoming more accessible every day. With the amount of communication that occurs online, it was only a matter of time before anonymity became an important topic of discussion. Several so-called “anonymity networks” have been developed to facilitate anonymous communication by the citizens of the web. Because the use of these networks is already so widespread, the time is ripe for a discussion of their merits and potential government responses to this phenomenon. An anonymity network “enables users to access the Web …
Migración A La Nube: ¿Está Segura Nuestra Información?, Rodolfo C. Rivas Rea Esq., Marco A. Vargas Iñiguez Esq.
Migración A La Nube: ¿Está Segura Nuestra Información?, Rodolfo C. Rivas Rea Esq., Marco A. Vargas Iñiguez Esq.
Rodolfo C. Rivas
The authors discuss the benefits and risks of moving your business data to the cloud through case studies and offer practical tips to protect business confidential information stored in the cloud. //////////////////////// Los autores estudian los beneficios y los riesgos de almacenar datos e información en la nube a través de casos de estudio y ofrecen consejos prácticos para proteger la información comercial confidencial almacenada en la nube.
Patent-Backed Securization For Innovation And Economic Growth In The Life Sciences: A Proposal For Incremental Securities Law Reform, Grace Sweeney
Patent-Backed Securization For Innovation And Economic Growth In The Life Sciences: A Proposal For Incremental Securities Law Reform, Grace Sweeney
Canadian Journal of Law and Technology
In this section, the historical balance struck by securities law between conservatism and innovation was considered in the context of a shifting economic landscape.
In Section II, the life sciences sector will be chosen to illustrate the current barriers impeding capital flow to high-value enterprise, resulting in decreased innovation and economic growth. These include the existence of “ever greening”, non-practicing entities, patent thickets, and onerous transaction costs on upstream patent holders with limited competency.
In Section III, the tool of intangible asset finance will be introduced as a means of harnessing the value of intellectual property assets, and leveraging them …
Proof And Progress: Coping With The Law Of Evidence In A Technological Age, David M. Paciocco
Proof And Progress: Coping With The Law Of Evidence In A Technological Age, David M. Paciocco
Canadian Journal of Law and Technology
This article outlines those rules of evidence that are most likely to be called upon to fit new technologies. It identifies some of the challenges that are presented, and identifies modest techniques or suggestions for coping. Those suggestions include taking the kind of relaxed view as to when expert evidence is being offered illustrated by the Ontario Court of Appeal in R. v. Hamilton; taking a functional approach to judicial notice; ensuring that authentication and the “best evidence” rule for electronic records are not applied in a highly technical fashion; understanding the law of hearsay and remaining familiar with …
Social Media: The Law Simply Stated, Steve Coughlan, Robert J. Currie
Social Media: The Law Simply Stated, Steve Coughlan, Robert J. Currie
Canadian Journal of Law and Technology
It is a challenge to simply state the law about social media, because there is no such thing as “social media law.” Rather, the law bumps up against social media in many ways. In some cases, existing law can be seamlessly applied to new technologies and means of interaction. In other cases, entirely new paradigms will likely need to be adopted to handle new challenges. Many other cases will fall somewhere in between.
Our goal in this Law Simply Stated is to provide some background on the nature of social media themselves, and then to state the basic law in …
Implementing Technology In The Justice Sector: A Canadian Perspective, Jane Bailey, Jacquelyn Burkell
Implementing Technology In The Justice Sector: A Canadian Perspective, Jane Bailey, Jacquelyn Burkell
Canadian Journal of Law and Technology
Despite the many technological advances that could benefit the court system, the use of computers and network technology to facilitate court procedures is still in its infancy, and court procedures largely remain attached to paper documents and to the physical presence of the parties at all stages. More and more research is focusing on the use of technology to make the legal system more efficient and to reduce excessive legal costs and delays. The goal of this exploratory research project is to examine the experience of justice sector technology implementation from the perspective of individuals involved first-hand in the implementation …
Regulatory Issues Concerning New Media Alternatives To Television, Michael Rimock
Regulatory Issues Concerning New Media Alternatives To Television, Michael Rimock
Canadian Journal of Law and Technology
This article will begin by discussing the significance of over-the-top (OTT) video services in Canada and briefly outline the CRTC’s recent efforts and findings in relation to new media trends. It will then describe the problems with the current regulatory framework and some of the proposed solutions. While some have argued that regulating OTT services like Netflix would level the playing field, I will argue that encouraging competition and decreasing some of the onerous regulations that are currently imposed on Canadian broadcasters would be the best solution since it would benefit both consumers and Canadian corporations.
Striking A Balance Between Privacy And Online Commerce, Mark Bartholomew
Striking A Balance Between Privacy And Online Commerce, Mark Bartholomew
Utah OnLaw: The Utah Law Review Online Supplement
It is becoming commonplace to note that privacy and online commerce are on a collision course. Corporate entities archive and monetize more and more personal information. Citizens increasingly resent the intrusive nature of such data collection and use. Just noticing this conflict, however, tells us little. In Informing and Reforming the Marketplace of Ideas: The Public-Private Model for Data Production and the First Amendment, Professor Shubha Ghosh not only notes the tension between the costs and benefits of data commercialization, but suggests three normative perspectives for balancing privacy and commercial speech. This is valuable because without a rich theoretical framework …
The Emerging Reality Of Social Media: Erosion Of Individual Privacy Through Cyber-Vetting And Law’S Inability To Catch Up, 12 J. Marshall Rev. Intell. Prop. L. 551 (2013), Saby Ghoshray
UIC Review of Intellectual Property Law
The rise of social media means that data about a large number of people is available in public and quasi-public digital locations. Employers, keen on taking advantage of this additional data to decrease the risk associated with an offer of employment, are engaging in “cyber-vetting”—non-consenting social media searches conducted by third parties or the employers themselves. To the extent that current law applies to this practice, the regulation it provides is weak and attacks only part of the problem. Left unchecked, cyber-vetting has the potential to fundamentally alter the scope of prospective employees’ rights. This article surveys the legal and …
Navigating Through The Fog Of Cloud Computing Contracts, 30 J. Marshall J. Info. Tech. & Privacy L.13 (2013), T. Noble Foster
Navigating Through The Fog Of Cloud Computing Contracts, 30 J. Marshall J. Info. Tech. & Privacy L.13 (2013), T. Noble Foster
UIC John Marshall Journal of Information Technology & Privacy Law
This paper explores legal issues associated with cloud computing, provides analysis and commentary on typical clauses found in contracts offered by well-known cloud service providers, and identifies strategies to mitigate the risk of exposure to cloud-based legal claims in the critical areas of data security, privacy, and confidentiality. While current research offers numerous case studies, viewpoints, and technical descriptions of cloud processes, our research provides a close examination of the language used in cloud contract terms. Analysis of these contract terms supports the finding that most standard cloud computing contracts are unevenly balanced in favor of the cloud service provider. …
Prism And The European Union’S Data Protection Directive, 30 J. Marshall J. Info. Tech. & Privacy L. 227 (2013), Liane Colonna
Prism And The European Union’S Data Protection Directive, 30 J. Marshall J. Info. Tech. & Privacy L. 227 (2013), Liane Colonna
UIC John Marshall Journal of Information Technology & Privacy Law
.
The Lemons Problem In Crowdfunding, 30 J. Marshall J. Info. Tech. & Privacy L. 253 (2013), Gmeleen Faye Tomboc
The Lemons Problem In Crowdfunding, 30 J. Marshall J. Info. Tech. & Privacy L. 253 (2013), Gmeleen Faye Tomboc
UIC John Marshall Journal of Information Technology & Privacy Law
Crowdfunding, an offshoot of crowdsourcing, is being touted as an alternative to traditional sources of financing for small businesses. Despite all its promise, crowdfunding is not without potential problems. To the extent feasible, these possible issues must be anticipated well in advance so that crowdfunding can fulfill its goal of democratizing access to capital.
This paper explores how asymmetrical information in the crowd-funding market can lead to a lemons problem, where high quality start-ups are driven out of the market by low quality projects. Understanding how the lemons problem can arise is critical in determining what reforms are needed to …
The Thirty-Second Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 30 J. Marshall J. Computer & Info. L. 339 (2013), Dana Benedetti, Daniel Johnson, Kalli Kling, Samantha Levin, Zayna Nubani, Pamela Szelung
The Thirty-Second Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 30 J. Marshall J. Computer & Info. L. 339 (2013), Dana Benedetti, Daniel Johnson, Kalli Kling, Samantha Levin, Zayna Nubani, Pamela Szelung
UIC John Marshall Journal of Information Technology & Privacy Law
.
The Thirty-Second Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 30 J. Marshall J. Computer & Info. L. 373 (2013), Eliana Albelbaisi, Robert Koehl, Todd Smith
The Thirty-Second Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 30 J. Marshall J. Computer & Info. L. 373 (2013), Eliana Albelbaisi, Robert Koehl, Todd Smith
UIC John Marshall Journal of Information Technology & Privacy Law
.
My Life Is Not My Own: Do Criminal Arrestees’ Privacy Interests In Mug Shots Outweigh Public’S Desire For Disclosure?, 30 J. Marshall J. Computer & Info. L. 307 (2013), Jocelyn Watkins
UIC John Marshall Journal of Information Technology & Privacy Law
.
Warrantless Government Drone Surveillance: A Challenge To The Fourth Amendment, 30 J. Marshall J. Info. Tech. & Privacy L. 155 (2013), Jennifer O'Brien
Warrantless Government Drone Surveillance: A Challenge To The Fourth Amendment, 30 J. Marshall J. Info. Tech. & Privacy L. 155 (2013), Jennifer O'Brien
UIC John Marshall Journal of Information Technology & Privacy Law
The Federal Aviation Administration Modernization and Reform Act of 2012 aims to integrate drones into the United States national airspace by 2015. While the thought of prevalent private and public daily drone use might seem implausible now, the combination of this new legislation and the increasing availability of inexpensive, technologically advanced small drones will make it a reality. From detectaphones to pen registers and most recently, the GPS, the Supreme Court has faced a plethora of unreasonable search challenges to the warrantless use of such sense augmentation devices by law enforcement to collect information. Acting as the privacy safeguard of …
The Thirty-Second Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 30 J. Marshall J. Computer & Info. L. 403 (2013), Samuel Bragg, Leslie Brockhoeft, Matthew Vinson
The Thirty-Second Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 30 J. Marshall J. Computer & Info. L. 403 (2013), Samuel Bragg, Leslie Brockhoeft, Matthew Vinson
UIC John Marshall Journal of Information Technology & Privacy Law
.
Voir Dire In The #Lol Society: Jury Selection Needs Drastic Updates To Remain Relevant In The Digital Age, 47 J. Marshall L. Rev. 459 (2013), Zachary Mesenbourg
Voir Dire In The #Lol Society: Jury Selection Needs Drastic Updates To Remain Relevant In The Digital Age, 47 J. Marshall L. Rev. 459 (2013), Zachary Mesenbourg
UIC Law Review
No abstract provided.
My Iphone Is My Castle: One Aspect Of Protecting Privacy In A Digital Age, 30 J. Marshall J. Info. Tech. & Privacy L. 1 (2013), Joan Catherine Bohl
My Iphone Is My Castle: One Aspect Of Protecting Privacy In A Digital Age, 30 J. Marshall J. Info. Tech. & Privacy L. 1 (2013), Joan Catherine Bohl
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Crisis On Impact: Responding To Cyber Attacks On Critical Information Infrastructures, 30 J. Marshall J. Info. Tech. & Privacy L. 31 (2013), Eugenia Georgiades, William Caelli, Sharon Christensen, W.D. Duncan
Crisis On Impact: Responding To Cyber Attacks On Critical Information Infrastructures, 30 J. Marshall J. Info. Tech. & Privacy L. 31 (2013), Eugenia Georgiades, William Caelli, Sharon Christensen, W.D. Duncan
UIC John Marshall Journal of Information Technology & Privacy Law
In the developing digital economy, the notion of traditional attack on enterprises of national significance or interest has transcended into different modes of electronic attack, surpassing accepted traditional forms of physical attack upon a target. The terrorist attacks that took place in the United States on September 11, 2001 demonstrated the physical devastation that could occur if any nation were the target of a large-scale terrorist attack. Therefore, there is a need to protect critical national infrastructure and critical information infrastructure. In particular, this protection is crucial for the proper functioning of a modern society and for a government to …
Why Arthur Goldberg Cared So Much About Privacy, 30 J. Marshall J. Info. Tech. & Privacy L. 67 (2013), David Stebenne
Why Arthur Goldberg Cared So Much About Privacy, 30 J. Marshall J. Info. Tech. & Privacy L. 67 (2013), David Stebenne
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
How Far Can The Government’S Hand Reach Inside Your Personal Inbox?: Problems With The Sca, 30 J. Marshall J. Info. Tech. & Privacy L.75 (2013), Dana T. Benedetti
How Far Can The Government’S Hand Reach Inside Your Personal Inbox?: Problems With The Sca, 30 J. Marshall J. Info. Tech. & Privacy L.75 (2013), Dana T. Benedetti
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Tweet Tweet: A First Amendment Wake Up Call Regarding Social Media In The Sports Arena, 30 J. Marshall J. Info. Tech. & Privacy L. 117 (2013), Samantha Levin
Tweet Tweet: A First Amendment Wake Up Call Regarding Social Media In The Sports Arena, 30 J. Marshall J. Info. Tech. & Privacy L. 117 (2013), Samantha Levin
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Sometimes I Feel Like Somebody’S Watching Me . . . Read?: A Comment On The Need For Heightened Privacy Rights For Consumers Of Ebooks, 30 J. Marshall J. Info. Tech. & Privacy L. 281 (2013), Meredith Mays Espino
Sometimes I Feel Like Somebody’S Watching Me . . . Read?: A Comment On The Need For Heightened Privacy Rights For Consumers Of Ebooks, 30 J. Marshall J. Info. Tech. & Privacy L. 281 (2013), Meredith Mays Espino
UIC John Marshall Journal of Information Technology & Privacy Law
.
Agriculture Under Threat - A Crisis Of Confidence? The Solution: Redefine Adventitious Presence Maximum Levels From Zero To Zero++, Mark Perry, Ramesh Karky
Agriculture Under Threat - A Crisis Of Confidence? The Solution: Redefine Adventitious Presence Maximum Levels From Zero To Zero++, Mark Perry, Ramesh Karky
Canadian Journal of Law and Technology
The issue of Adventitious Presence (AP) of genes, those that are not “naturally” present in food and crops but rather have been placed there using recombinant deoxyribonucleic acid (DNA) technology, has become a hot issue for producers and consumers. It can also be a major problem for exporters. Part of this problem is the reality that zero presence is now impossible to guarantee in some crops and products. Pressure has arisen to establish a Low Level Presence (LLP) threshold, one that is above zero, to be determined at an international level. This would allow crops to be imported and exported …
C-11 Et L'Information Sur Le Régime Des Droits: Regard Rétrospectif Et Prospectif, Antoine Guilman
C-11 Et L'Information Sur Le Régime Des Droits: Regard Rétrospectif Et Prospectif, Antoine Guilman
Canadian Journal of Law and Technology
La récente adoption du projet de loi C-11, portant modification de la Loi sur le droit d’auteur, change aujourd’hui considérablement la donne. En effet, son article 41.22 instaure désormais un régime propre à l’information sur le régime des droits. Il devient dès lors nécessaire de remettre en contexte ce texte, pour l’appréhender pleinement et comprendre l’approche retenue par le Canada en matière de protection de l’information sur le régime des droits.
Dans cette perspective, nous porterons, d’une part, un regard rétrospectif sur l’évolution technologique récente et les solutions apportées au plan juridique en matière d’information sur le régime des droits …