Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 14 of 14

Full-Text Articles in Privacy Law

Tweet Tweet: A First Amendment Wake Up Call Regarding Social Media In The Sports Arena, 30 J. Marshall J. Info. Tech. & Privacy L. 117 (2013), Samantha Levin Jan 2013

Tweet Tweet: A First Amendment Wake Up Call Regarding Social Media In The Sports Arena, 30 J. Marshall J. Info. Tech. & Privacy L. 117 (2013), Samantha Levin

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


As Seen On Tv: Your Compromising Cameo On National Reality Programming, 12 J. Marshall Rev. Intell. Prop. L. 403 (2013), Ryan Westerman Jan 2013

As Seen On Tv: Your Compromising Cameo On National Reality Programming, 12 J. Marshall Rev. Intell. Prop. L. 403 (2013), Ryan Westerman

UIC Review of Intellectual Property Law

The pop-culture phenomenon of reality television has taken over national programming. With the click of a remote, viewers can gain an inside look into the daily lives of celebrity families, toddler pageant queens, wealthy housewives, even pregnant teenagers. Reality television also profiles different professions: repo-men, pawn shop owners, and real estate agents all have television time slots. While it seems everyone is desperate for their fifteen minutes of fame, there are still those who wish to avoid the public spotlight. However, a recent Illinois ruling may make avoiding prime-time attention impossible for certain individuals caught on tape in compromising, and …


The Olympic Meddle: The International Olympic Committee's Intrusion Of Athletes' Privacy Through The Discriminatory Practice Of Gender Verification Testing, 28 J. Marshall J. Computer & Info. L. 49 (2010), Raheel Saleem Jan 2010

The Olympic Meddle: The International Olympic Committee's Intrusion Of Athletes' Privacy Through The Discriminatory Practice Of Gender Verification Testing, 28 J. Marshall J. Computer & Info. L. 49 (2010), Raheel Saleem

UIC John Marshall Journal of Information Technology & Privacy Law

The IOC and the IAAF act as governing bodies for athletes and, therefore, are innately responsible for their actions. However, the gender verification rule exemplifies that irresponsible actions by these governing agencies adversely effects its athletes. The gender verification rule empowers both the IOC and the IAAF to make life-changing decisions without any restriction, leaving athletes susceptible to the unfettered power and abuse of the rule. The legal foundation established by the international human rights declarations support the argument that gender verification testing must be abolished because of its embedded discrimination and intrusive nature. An application of the ICCPR provides …


Slingbox: Copyright, Fair Use, And Access To Television Programming Anywhere In The World, 25 J. Marshall J. Computer & Info. L. 187 (2007), Shekar Sathyanarayana Jan 2007

Slingbox: Copyright, Fair Use, And Access To Television Programming Anywhere In The World, 25 J. Marshall J. Computer & Info. L. 187 (2007), Shekar Sathyanarayana

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Yours For Keeps: Mgm V. Grokster, 23 J. Marshall J. Computer & Info. L. 209 (2005), Max Stul Oppenheimer Jan 2005

Yours For Keeps: Mgm V. Grokster, 23 J. Marshall J. Computer & Info. L. 209 (2005), Max Stul Oppenheimer

UIC John Marshall Journal of Information Technology & Privacy Law

Millions of people download billions of music files over the Internet, using peer-to-peer ("P2P") services such as Grokster, StreamCast, Morpheus, and Kazaa. This practice has been challenged as violative of copyright and, it has been argued, the magnitude of copyright violations facilitated by P2P services justifies banning the services entirely. This argument has been based on the assumption that most transfers over P2P services violate copyright. The starting point for this discussion is the recent decision of the United States Supreme Court to grant the certiorari petition of Metro-Goldwyn-Mayer Studios et al. to review the Ninth Circuit decision in MGM …


Copy Protection Of Cds: The Recording Industry's Latest Attempt At Preventing The Unauthorized Digital Distribution Of Music, 21 J. Marshall J. Computer & Info. L. 241 (2003), Amy K. Jensen Jan 2003

Copy Protection Of Cds: The Recording Industry's Latest Attempt At Preventing The Unauthorized Digital Distribution Of Music, 21 J. Marshall J. Computer & Info. L. 241 (2003), Amy K. Jensen

UIC John Marshall Journal of Information Technology & Privacy Law

This comment focuses on the need of the music industry to control the use and digital distribution of music. The author also addresses the privacy issues that arise through the various methods the music industry implements in order to control the unauthorized distribution of digital music via computer technology. The author particularly addresses the privacy issues that arise with the use of undetectable signals that send information about a consumer’s use of that Compact Disc over computer lines, all unbeknownst and unauthorized by the consumer.


Riaa V. Napster: A Window Onto The Future Of Copyright Law In The Internet Age, 18 J. Marshall J. Computer & Info. L. 755 (2000), Ariel Berschadsky Jan 2000

Riaa V. Napster: A Window Onto The Future Of Copyright Law In The Internet Age, 18 J. Marshall J. Computer & Info. L. 755 (2000), Ariel Berschadsky

UIC John Marshall Journal of Information Technology & Privacy Law

This article uses the Napster controversy as a stepping stone to discussing copyright law in the Internet age. Section II of the article discusses music piracy over the internet and MP3 files. Section III of the article discusses the birth of Napster and its functions. Section IV details the allegations against Napster by the RIAA. Section V. discusses Copyright Law in the digital age. Various forms of copyright infringement such as direct liability, contributory liability, vicarious liability are fully assessed. Furthermore, the author discusses the response of legislative efforts to emerging copyright challenges on the internet. Section VI examines Napter's …


The Erosion Of American Copyright Protection: The Fairness In Music Licensing Act, 18 J. Marshall J. Computer & Info. L. 791 (2000), Ralph Carter Jan 2000

The Erosion Of American Copyright Protection: The Fairness In Music Licensing Act, 18 J. Marshall J. Computer & Info. L. 791 (2000), Ralph Carter

UIC John Marshall Journal of Information Technology & Privacy Law

The author of this article begins by giving the reader a taste of the history of American copyright protection. A synopsis of the statutes, case history, and industry development are fully explained. Furthermore, the author criticizes the enactment of the Fairness in Music Licensing Act. The author further refutes arguments made by proponents of the Act and examines the underlying motives of restaurant lobbyists. This comment also shows the real victims of the Act's exemptions---the songwriters. The comment concludes by advocating the return of the "home use exemption" in the Copyright Act of 1976.


Regulation Of Music Videos: Should The Fcc "Beat It?", 8 Computer L.J. 287 (1988), Aloma H. Park Jan 1998

Regulation Of Music Videos: Should The Fcc "Beat It?", 8 Computer L.J. 287 (1988), Aloma H. Park

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Tracking Stolen Artworks On The Internet: A New Standard For Due Diligence, 16 J. Marshall J. Computer & Info. L. 937 (1998), Laura Mcfarland-Taylor Jan 1998

Tracking Stolen Artworks On The Internet: A New Standard For Due Diligence, 16 J. Marshall J. Computer & Info. L. 937 (1998), Laura Mcfarland-Taylor

UIC John Marshall Journal of Information Technology & Privacy Law

This comment proposes adopting an internationally recognized standard of due diligence in reporting lost or stolen artworks utilizing the Internet. To insure that the proposed standard of due diligence is acceptable internationally, this Comment proposes the creation of a readily accessible database in which the theft of artworks is tracked utilizing the Internet. First this Comment briefly discusses the history of stolen artworks. Second, this Comment discusses the various legal standards the courts use in analyzing stolen art cases: statute of limitations, due diligence and adverse possession. To analyze the standards now used, four cases are discussed: O'Keeffe v. Snyder, …


The Rodney King Beating: Beyond Fair Use: A Broadcaster's Right To Air Copyrighted Videotape As Part Of A Newscast, 13 J. Marshall J. Computer & Info. L. 269 (1995), Leslie Ann Reis Jan 1995

The Rodney King Beating: Beyond Fair Use: A Broadcaster's Right To Air Copyrighted Videotape As Part Of A Newscast, 13 J. Marshall J. Computer & Info. L. 269 (1995), Leslie Ann Reis

UIC John Marshall Journal of Information Technology & Privacy Law

This article discusses the copyright implications of news broadcasters using videotape and other images in their newscasts. News broadcasters obtain audio and video materials for use in their broadcasts, and on most occasions they obtain these materials from a variety of sources. The broadcaster cannot infringe on the copyright of the news source unless given permission by the source or decide to use it under the Fair Use Doctrine. However, a newscaster may also use the copyrighted material under a possible exception created by the First Amendment right to freedom of the press. The law that provides a creator with …


Digital Sound Sampling And A Federal Right Of Publicity: Is It Live Or Is It Macintosh?, 10 Computer L.J. 365 (1990), Tamara J. Byram Jan 1990

Digital Sound Sampling And A Federal Right Of Publicity: Is It Live Or Is It Macintosh?, 10 Computer L.J. 365 (1990), Tamara J. Byram

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Douglass V. Hustler Magazine, Inc.: Anatomy Of Privacy For A Public Figure In Illinois, 19 J. Marshall L. Rev. 1053 (1986), Howard L. Teplinsky Jan 1986

Douglass V. Hustler Magazine, Inc.: Anatomy Of Privacy For A Public Figure In Illinois, 19 J. Marshall L. Rev. 1053 (1986), Howard L. Teplinsky

UIC Law Review

No abstract provided.


Video Games And The First Amendment: Are Restrictive Regulations Constitutional?, 5 Computer L.J. 493 (1985), Lisa E. Kranitz Jan 1985

Video Games And The First Amendment: Are Restrictive Regulations Constitutional?, 5 Computer L.J. 493 (1985), Lisa E. Kranitz

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.