Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Law

2013

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 37

Full-Text Articles in Privacy Law

Stymieing Controversy Over Generic Top-Level Domains (Gtlds) And Other Internet Governance Decisions With Content Neutrality, Nafees Uddin Dec 2013

Stymieing Controversy Over Generic Top-Level Domains (Gtlds) And Other Internet Governance Decisions With Content Neutrality, Nafees Uddin

Seattle Journal for Social Justice

No abstract provided.


Should The Default Be "Social"? Canada's Pushback Against Oversharing By Facebook, Karen Tanenbaum Oct 2013

Should The Default Be "Social"? Canada's Pushback Against Oversharing By Facebook, Karen Tanenbaum

Georgia Journal of International & Comparative Law

No abstract provided.


Flawed Transparency: Shared Data Collection And Disclosure Challenges For Google Glass And Similar Technologies, Jonathan I. Ezor Oct 2013

Flawed Transparency: Shared Data Collection And Disclosure Challenges For Google Glass And Similar Technologies, Jonathan I. Ezor

Jonathan I. Ezor

Current privacy law and best practices assume that the party collecting the data is able to describe and disclose its practices to those from and about whom the data are collected. With emerging technologies such as Google Glass, the information being collected by the wearer may be automatically shared to one or more third parties whose use may be substantially different from that of the wearer. Often, the wearer may not even know what information is being uploaded, and how it may be used. This paper will analyze the current state of U.S. law and compliance regarding personal information collection …


The Singapore Personal Data Protection Act And An Assessment Of Future Trends In Data Privacy, Warren B. Chik Oct 2013

The Singapore Personal Data Protection Act And An Assessment Of Future Trends In Data Privacy, Warren B. Chik

Research Collection Yong Pung How School Of Law

In the first part of this paper, I will present and explain the Singapore Personal Data Protection Act (“PDPA”) in the context of legislative developments in the Asian region and against the well-established international baseline privacy standards. In the course of the above evaluation, reference will be made to the national laws and policy on data privacy prior to the enactment of the PDPA as well as current social and market practices in relation to personal data. In the second part of this paper, I will decipher and assess the future trends in data privacy reform and the future development …


Tor Exit Nodes: Legal And Policy Considerations, Sarah Campbell Eagle, Abigail St. Hilaire, Kelly Sherwood Sep 2013

Tor Exit Nodes: Legal And Policy Considerations, Sarah Campbell Eagle, Abigail St. Hilaire, Kelly Sherwood

Technology Law and Public Policy Clinic

Anonymity Networks

The Internet is a constant companion to people the world over and as technology improves it is becoming more accessible every day. With the amount of communication that occurs online, it was only a matter of time before anonymity became an important topic of discussion. Several so-called “anonymity networks” have been developed to facilitate anonymous communication by the citizens of the web. Because the use of these networks is already so widespread, the time is ripe for a discussion of their merits and potential government responses to this phenomenon. An anonymity network “enables users to access the Web …


Migración A La Nube: ¿Está Segura Nuestra Información?, Rodolfo C. Rivas Rea Esq., Marco A. Vargas Iñiguez Esq. Jun 2013

Migración A La Nube: ¿Está Segura Nuestra Información?, Rodolfo C. Rivas Rea Esq., Marco A. Vargas Iñiguez Esq.

Rodolfo C. Rivas

The authors discuss the benefits and risks of moving your business data to the cloud through case studies and offer practical tips to protect business confidential information stored in the cloud. //////////////////////// Los autores estudian los beneficios y los riesgos de almacenar datos e información en la nube a través de casos de estudio y ofrecen consejos prácticos para proteger la información comercial confidencial almacenada en la nube.


Patent-Backed Securization For Innovation And Economic Growth In The Life Sciences: A Proposal For Incremental Securities Law Reform, Grace Sweeney Jun 2013

Patent-Backed Securization For Innovation And Economic Growth In The Life Sciences: A Proposal For Incremental Securities Law Reform, Grace Sweeney

Canadian Journal of Law and Technology

In this section, the historical balance struck by securities law between conservatism and innovation was considered in the context of a shifting economic landscape.

In Section II, the life sciences sector will be chosen to illustrate the current barriers impeding capital flow to high-value enterprise, resulting in decreased innovation and economic growth. These include the existence of “ever greening”, non-practicing entities, patent thickets, and onerous transaction costs on upstream patent holders with limited competency.

In Section III, the tool of intangible asset finance will be introduced as a means of harnessing the value of intellectual property assets, and leveraging them …


Proof And Progress: Coping With The Law Of Evidence In A Technological Age, David M. Paciocco Jun 2013

Proof And Progress: Coping With The Law Of Evidence In A Technological Age, David M. Paciocco

Canadian Journal of Law and Technology

This article outlines those rules of evidence that are most likely to be called upon to fit new technologies. It identifies some of the challenges that are presented, and identifies modest techniques or suggestions for coping. Those suggestions include taking the kind of relaxed view as to when expert evidence is being offered illustrated by the Ontario Court of Appeal in R. v. Hamilton; taking a functional approach to judicial notice; ensuring that authentication and the “best evidence” rule for electronic records are not applied in a highly technical fashion; understanding the law of hearsay and remaining familiar with …


Social Media: The Law Simply Stated, Steve Coughlan, Robert J. Currie Jun 2013

Social Media: The Law Simply Stated, Steve Coughlan, Robert J. Currie

Canadian Journal of Law and Technology

It is a challenge to simply state the law about social media, because there is no such thing as “social media law.” Rather, the law bumps up against social media in many ways. In some cases, existing law can be seamlessly applied to new technologies and means of interaction. In other cases, entirely new paradigms will likely need to be adopted to handle new challenges. Many other cases will fall somewhere in between.

Our goal in this Law Simply Stated is to provide some background on the nature of social media themselves, and then to state the basic law in …


Implementing Technology In The Justice Sector: A Canadian Perspective, Jane Bailey, Jacquelyn Burkell Jun 2013

Implementing Technology In The Justice Sector: A Canadian Perspective, Jane Bailey, Jacquelyn Burkell

Canadian Journal of Law and Technology

Despite the many technological advances that could benefit the court system, the use of computers and network technology to facilitate court procedures is still in its infancy, and court procedures largely remain attached to paper documents and to the physical presence of the parties at all stages. More and more research is focusing on the use of technology to make the legal system more efficient and to reduce excessive legal costs and delays. The goal of this exploratory research project is to examine the experience of justice sector technology implementation from the perspective of individuals involved first-hand in the implementation …


Regulatory Issues Concerning New Media Alternatives To Television, Michael Rimock Jun 2013

Regulatory Issues Concerning New Media Alternatives To Television, Michael Rimock

Canadian Journal of Law and Technology

This article will begin by discussing the significance of over-the-top (OTT) video services in Canada and briefly outline the CRTC’s recent efforts and findings in relation to new media trends. It will then describe the problems with the current regulatory framework and some of the proposed solutions. While some have argued that regulating OTT services like Netflix would level the playing field, I will argue that encouraging competition and decreasing some of the onerous regulations that are currently imposed on Canadian broadcasters would be the best solution since it would benefit both consumers and Canadian corporations.


Striking A Balance Between Privacy And Online Commerce, Mark Bartholomew Jan 2013

Striking A Balance Between Privacy And Online Commerce, Mark Bartholomew

Utah OnLaw: The Utah Law Review Online Supplement

It is becoming commonplace to note that privacy and online commerce are on a collision course. Corporate entities archive and monetize more and more personal information. Citizens increasingly resent the intrusive nature of such data collection and use. Just noticing this conflict, however, tells us little. In Informing and Reforming the Marketplace of Ideas: The Public-Private Model for Data Production and the First Amendment, Professor Shubha Ghosh not only notes the tension between the costs and benefits of data commercialization, but suggests three normative perspectives for balancing privacy and commercial speech. This is valuable because without a rich theoretical framework …


The Emerging Reality Of Social Media: Erosion Of Individual Privacy Through Cyber-Vetting And Law’S Inability To Catch Up, 12 J. Marshall Rev. Intell. Prop. L. 551 (2013), Saby Ghoshray Jan 2013

The Emerging Reality Of Social Media: Erosion Of Individual Privacy Through Cyber-Vetting And Law’S Inability To Catch Up, 12 J. Marshall Rev. Intell. Prop. L. 551 (2013), Saby Ghoshray

UIC Review of Intellectual Property Law

The rise of social media means that data about a large number of people is available in public and quasi-public digital locations. Employers, keen on taking advantage of this additional data to decrease the risk associated with an offer of employment, are engaging in “cyber-vetting”—non-consenting social media searches conducted by third parties or the employers themselves. To the extent that current law applies to this practice, the regulation it provides is weak and attacks only part of the problem. Left unchecked, cyber-vetting has the potential to fundamentally alter the scope of prospective employees’ rights. This article surveys the legal and …


Navigating Through The Fog Of Cloud Computing Contracts, 30 J. Marshall J. Info. Tech. & Privacy L.13 (2013), T. Noble Foster Jan 2013

Navigating Through The Fog Of Cloud Computing Contracts, 30 J. Marshall J. Info. Tech. & Privacy L.13 (2013), T. Noble Foster

UIC John Marshall Journal of Information Technology & Privacy Law

This paper explores legal issues associated with cloud computing, provides analysis and commentary on typical clauses found in contracts offered by well-known cloud service providers, and identifies strategies to mitigate the risk of exposure to cloud-based legal claims in the critical areas of data security, privacy, and confidentiality. While current research offers numerous case studies, viewpoints, and technical descriptions of cloud processes, our research provides a close examination of the language used in cloud contract terms. Analysis of these contract terms supports the finding that most standard cloud computing contracts are unevenly balanced in favor of the cloud service provider. …


My Iphone Is My Castle: One Aspect Of Protecting Privacy In A Digital Age, 30 J. Marshall J. Info. Tech. & Privacy L. 1 (2013), Joan Catherine Bohl Jan 2013

My Iphone Is My Castle: One Aspect Of Protecting Privacy In A Digital Age, 30 J. Marshall J. Info. Tech. & Privacy L. 1 (2013), Joan Catherine Bohl

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Why Arthur Goldberg Cared So Much About Privacy, 30 J. Marshall J. Info. Tech. & Privacy L. 67 (2013), David Stebenne Jan 2013

Why Arthur Goldberg Cared So Much About Privacy, 30 J. Marshall J. Info. Tech. & Privacy L. 67 (2013), David Stebenne

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Crisis On Impact: Responding To Cyber Attacks On Critical Information Infrastructures, 30 J. Marshall J. Info. Tech. & Privacy L. 31 (2013), Eugenia Georgiades, William Caelli, Sharon Christensen, W.D. Duncan Jan 2013

Crisis On Impact: Responding To Cyber Attacks On Critical Information Infrastructures, 30 J. Marshall J. Info. Tech. & Privacy L. 31 (2013), Eugenia Georgiades, William Caelli, Sharon Christensen, W.D. Duncan

UIC John Marshall Journal of Information Technology & Privacy Law

In the developing digital economy, the notion of traditional attack on enterprises of national significance or interest has transcended into different modes of electronic attack, surpassing accepted traditional forms of physical attack upon a target. The terrorist attacks that took place in the United States on September 11, 2001 demonstrated the physical devastation that could occur if any nation were the target of a large-scale terrorist attack. Therefore, there is a need to protect critical national infrastructure and critical information infrastructure. In particular, this protection is crucial for the proper functioning of a modern society and for a government to …


Prism And The European Union’S Data Protection Directive, 30 J. Marshall J. Info. Tech. & Privacy L. 227 (2013), Liane Colonna Jan 2013

Prism And The European Union’S Data Protection Directive, 30 J. Marshall J. Info. Tech. & Privacy L. 227 (2013), Liane Colonna

UIC John Marshall Journal of Information Technology & Privacy Law

.


How Far Can The Government’S Hand Reach Inside Your Personal Inbox?: Problems With The Sca, 30 J. Marshall J. Info. Tech. & Privacy L.75 (2013), Dana T. Benedetti Jan 2013

How Far Can The Government’S Hand Reach Inside Your Personal Inbox?: Problems With The Sca, 30 J. Marshall J. Info. Tech. & Privacy L.75 (2013), Dana T. Benedetti

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Tweet Tweet: A First Amendment Wake Up Call Regarding Social Media In The Sports Arena, 30 J. Marshall J. Info. Tech. & Privacy L. 117 (2013), Samantha Levin Jan 2013

Tweet Tweet: A First Amendment Wake Up Call Regarding Social Media In The Sports Arena, 30 J. Marshall J. Info. Tech. & Privacy L. 117 (2013), Samantha Levin

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Lemons Problem In Crowdfunding, 30 J. Marshall J. Info. Tech. & Privacy L. 253 (2013), Gmeleen Faye Tomboc Jan 2013

The Lemons Problem In Crowdfunding, 30 J. Marshall J. Info. Tech. & Privacy L. 253 (2013), Gmeleen Faye Tomboc

UIC John Marshall Journal of Information Technology & Privacy Law

Crowdfunding, an offshoot of crowdsourcing, is being touted as an alternative to traditional sources of financing for small businesses. Despite all its promise, crowdfunding is not without potential problems. To the extent feasible, these possible issues must be anticipated well in advance so that crowdfunding can fulfill its goal of democratizing access to capital.

This paper explores how asymmetrical information in the crowd-funding market can lead to a lemons problem, where high quality start-ups are driven out of the market by low quality projects. Understanding how the lemons problem can arise is critical in determining what reforms are needed to …


Sometimes I Feel Like Somebody’S Watching Me . . . Read?: A Comment On The Need For Heightened Privacy Rights For Consumers Of Ebooks, 30 J. Marshall J. Info. Tech. & Privacy L. 281 (2013), Meredith Mays Espino Jan 2013

Sometimes I Feel Like Somebody’S Watching Me . . . Read?: A Comment On The Need For Heightened Privacy Rights For Consumers Of Ebooks, 30 J. Marshall J. Info. Tech. & Privacy L. 281 (2013), Meredith Mays Espino

UIC John Marshall Journal of Information Technology & Privacy Law

.


The Thirty-Second Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 30 J. Marshall J. Computer & Info. L. 339 (2013), Dana Benedetti, Daniel Johnson, Kalli Kling, Samantha Levin, Zayna Nubani, Pamela Szelung Jan 2013

The Thirty-Second Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 30 J. Marshall J. Computer & Info. L. 339 (2013), Dana Benedetti, Daniel Johnson, Kalli Kling, Samantha Levin, Zayna Nubani, Pamela Szelung

UIC John Marshall Journal of Information Technology & Privacy Law

.


The Thirty-Second Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 30 J. Marshall J. Computer & Info. L. 373 (2013), Eliana Albelbaisi, Robert Koehl, Todd Smith Jan 2013

The Thirty-Second Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 30 J. Marshall J. Computer & Info. L. 373 (2013), Eliana Albelbaisi, Robert Koehl, Todd Smith

UIC John Marshall Journal of Information Technology & Privacy Law

.


My Life Is Not My Own: Do Criminal Arrestees’ Privacy Interests In Mug Shots Outweigh Public’S Desire For Disclosure?, 30 J. Marshall J. Computer & Info. L. 307 (2013), Jocelyn Watkins Jan 2013

My Life Is Not My Own: Do Criminal Arrestees’ Privacy Interests In Mug Shots Outweigh Public’S Desire For Disclosure?, 30 J. Marshall J. Computer & Info. L. 307 (2013), Jocelyn Watkins

UIC John Marshall Journal of Information Technology & Privacy Law

.


Warrantless Government Drone Surveillance: A Challenge To The Fourth Amendment, 30 J. Marshall J. Info. Tech. & Privacy L. 155 (2013), Jennifer O'Brien Jan 2013

Warrantless Government Drone Surveillance: A Challenge To The Fourth Amendment, 30 J. Marshall J. Info. Tech. & Privacy L. 155 (2013), Jennifer O'Brien

UIC John Marshall Journal of Information Technology & Privacy Law

The Federal Aviation Administration Modernization and Reform Act of 2012 aims to integrate drones into the United States national airspace by 2015. While the thought of prevalent private and public daily drone use might seem implausible now, the combination of this new legislation and the increasing availability of inexpensive, technologically advanced small drones will make it a reality. From detectaphones to pen registers and most recently, the GPS, the Supreme Court has faced a plethora of unreasonable search challenges to the warrantless use of such sense augmentation devices by law enforcement to collect information. Acting as the privacy safeguard of …


The Thirty-Second Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 30 J. Marshall J. Computer & Info. L. 403 (2013), Samuel Bragg, Leslie Brockhoeft, Matthew Vinson Jan 2013

The Thirty-Second Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 30 J. Marshall J. Computer & Info. L. 403 (2013), Samuel Bragg, Leslie Brockhoeft, Matthew Vinson

UIC John Marshall Journal of Information Technology & Privacy Law

.


Voir Dire In The #Lol Society: Jury Selection Needs Drastic Updates To Remain Relevant In The Digital Age, 47 J. Marshall L. Rev. 459 (2013), Zachary Mesenbourg Jan 2013

Voir Dire In The #Lol Society: Jury Selection Needs Drastic Updates To Remain Relevant In The Digital Age, 47 J. Marshall L. Rev. 459 (2013), Zachary Mesenbourg

UIC Law Review

No abstract provided.


Agriculture Under Threat - A Crisis Of Confidence? The Solution: Redefine Adventitious Presence Maximum Levels From Zero To Zero++, Mark Perry, Ramesh Karky Jan 2013

Agriculture Under Threat - A Crisis Of Confidence? The Solution: Redefine Adventitious Presence Maximum Levels From Zero To Zero++, Mark Perry, Ramesh Karky

Canadian Journal of Law and Technology

The issue of Adventitious Presence (AP) of genes, those that are not “naturally” present in food and crops but rather have been placed there using recombinant deoxyribonucleic acid (DNA) technology, has become a hot issue for producers and consumers. It can also be a major problem for exporters. Part of this problem is the reality that zero presence is now impossible to guarantee in some crops and products. Pressure has arisen to establish a Low Level Presence (LLP) threshold, one that is above zero, to be determined at an international level. This would allow crops to be imported and exported …


C-11 Et L'Information Sur Le Régime Des Droits: Regard Rétrospectif Et Prospectif, Antoine Guilman Jan 2013

C-11 Et L'Information Sur Le Régime Des Droits: Regard Rétrospectif Et Prospectif, Antoine Guilman

Canadian Journal of Law and Technology

La récente adoption du projet de loi C-11, portant modification de la Loi sur le droit d’auteur, change aujourd’hui considérablement la donne. En effet, son article 41.22 instaure désormais un régime propre à l’information sur le régime des droits. Il devient dès lors nécessaire de remettre en contexte ce texte, pour l’appréhender pleinement et comprendre l’approche retenue par le Canada en matière de protection de l’information sur le régime des droits.

Dans cette perspective, nous porterons, d’une part, un regard rétrospectif sur l’évolution technologique récente et les solutions apportées au plan juridique en matière d’information sur le régime des droits …