Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- ECPA (2)
- ABA (1)
- ARPANET (1)
- AVUSI (1)
- Allison v. Aetna (1)
-
- Amburgy v. Express Scripts (1)
- American Bar Association (1)
- American Federation of Government Employees v. Hawley (1)
- Association for Unmanned Vehicle Systems International (1)
- BYOD (1)
- Bartnicki v. Vopper (1)
- Bring your own device (1)
- CERCLA (1)
- COPE (1)
- COPPA (1)
- California v. Greenwood (1)
- Caudle v. Towers (1)
- Children’s Online Privacy Protection Act (1)
- City of Los Angeles v. Lyons (1)
- Clapper v. Amnesty International (1)
- Comprehensive Environmental Response Compensation and Liability Act (1)
- CompuServe v. Patterson (1)
- Cybersell (1)
- DOT (1)
- Daniel Solove (1)
- Database Breach Notification Security Act (1)
- Department of Justice v. Reporters Committee for Freedom of the Press (1)
- Department of Transportation (1)
- Doe v. Chao (1)
- ERISA (1)
Articles 1 - 7 of 7
Full-Text Articles in Privacy Law
Welcome To The Machine: Privacy And Workplace Implications Of Predictive Analytics, Robert Sprague
Welcome To The Machine: Privacy And Workplace Implications Of Predictive Analytics, Robert Sprague
Richmond Journal of Law & Technology
Privacy is not simply an absence of information about us in the minds of others; rather it is the control we have over information about ourselves. The volume of information that people create themselves—the full range of communications from voice calls, e-mails and texts to uploaded pictures, video, and music—pales in comparison to the amount of digital information created about them each day.
Commercial Drones And Privacy: Can We Trust States With ‘Drone Federalism’?, Robert H. Gruber
Commercial Drones And Privacy: Can We Trust States With ‘Drone Federalism’?, Robert H. Gruber
Richmond Journal of Law & Technology
Judge Andrew Napolitano said recently of unmanned aircraft systems (“UAS”), or “drones,” that “[t]he first American patriot that shoots down one of these drones that comes too close to his children in his backyard will be an American hero.”
Wherever You Go, There You Are (With Your Mobile Device): Privacy Risks And Legal Complexities Associated With International ‘Bring Your Own Device’ Programs, Melinda L. Mclellan, James A. Sherer, Emily R. Fedeles
Wherever You Go, There You Are (With Your Mobile Device): Privacy Risks And Legal Complexities Associated With International ‘Bring Your Own Device’ Programs, Melinda L. Mclellan, James A. Sherer, Emily R. Fedeles
Richmond Journal of Law & Technology
The cross-use of mobile devices for personal and professional purposes—commonly referred to as “Bring Your Own Device” or “BYOD” for short—has created a new backdrop for doing business that was scarcely imaginable even ten years ago.
Clapper V. Amnesty International And Data Privacy Litigation: Is A Change To The Law “Certainly Impending”?, John L. Jacobus, Benjamin B. Watson
Clapper V. Amnesty International And Data Privacy Litigation: Is A Change To The Law “Certainly Impending”?, John L. Jacobus, Benjamin B. Watson
Richmond Journal of Law & Technology
On December 19, 2013, the retailer Target announced that unauthorized third parties had gained access to its customer payment information. While Target originally estimated that the security breach affected 40 million of its customers, a subsequent investigation revealed that anywhere from 70 to 110 million people—almost one in three Americans—may have had their sensitive payment information stolen. In response, the retailer offered free credit monitoring services and assured affected customers that they would not be responsible for fraudulent charges made with their payment information.
California's Database Breach Notification Security Act: The First State Breah Notification Law Is Is Not Yet A Suitable Template For National Identity Theft Legislation, Timothy H. Skinner
California's Database Breach Notification Security Act: The First State Breah Notification Law Is Is Not Yet A Suitable Template For National Identity Theft Legislation, Timothy H. Skinner
Richmond Journal of Law & Technology
Attacks on poorly-secured information systems containing personal information are nearing epidemic proportion. Hardly a month passes without a news story regarding a security breach that exposed hundreds or thousands of data subjects’ personal information. As dependence on e-Commerce continues to expand, personal information stolen from poorly secured systems is becoming a multi-billion-dollar industry.
United States V. Keystone Sanitation Company: E-Mail And The Attorney-Client Privilege, Karen M. Coon
United States V. Keystone Sanitation Company: E-Mail And The Attorney-Client Privilege, Karen M. Coon
Richmond Journal of Law & Technology
The rapid growth and sophistication of technology have changed the way people communicate. E-mail and the Internet have begun to affect the way attorneys communicate with their clients. E-mail is fast and convenient, but it is not without risks. The risk of illegal interception and the risk of inadvertent disclosure are serious issues that attorneys need to be aware of and try to prevent so that the attorney-client privilege is protected as much as possible. Although communicating with a client by e-mail may be risky, the risks posed by e-mail are no different from those posed by communicating by postal …
Ucita: The Uniform Computer Information Transactions Act, Michael J. Lockerby
Ucita: The Uniform Computer Information Transactions Act, Michael J. Lockerby
Richmond Journal of Law & Technology
From the heated rhetoric of both proponents and opponents of UCITA, one would think that UCITA represented a radical change from current law. From the standpoint of this practitioner, however, UCITA represents more of an evolutionary than a revolutionary change in the law. In at least three critical areas, the enforceability of "paperless contracts," dispute resolution, and "self-help" remedies, UCITA is arguably consistent with current law or at least the trend of current law. Indeed, the main inconsistency between UCITA and current law is that current law is at times inconsistent. From the standpoint of most businesses, certainty is preferable …