Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Privacy (4)
- Appropriation (1)
- CFAA (1)
- Children's Online Privacy Protection Act (1)
- China’s censorship laws (1)
-
- China’s data privacy laws China’s privacy policy (1)
- Cloud Service (1)
- Cloud computing (1)
- Cloud consumers (1)
- Cloud-based service (1)
- Computer Fraud and Abuse Act (1)
- Confidentiality (1)
- Cybersecurity (1)
- Daniel Anderl Judicial Security Act (1)
- Data encryption (1)
- Data in transit (1)
- Data mining (1)
- Data privacy laws (1)
- Data privacy legislation (1)
- Digital Signature Guidelines (1)
- Directive on Privacy Electronic Communications (1)
- Dooley v. Davidson (1)
- Driver's Privacy Protection Act (1)
- E-Privacy Directive (1)
- E-Sign Act (1)
- ECPA (1)
- EU Privacy Directive (1)
- Electronic Communications Privacy Act (1)
- Electronic Signatures in Global and National Commerce Act (1)
- Electronic signature (1)
Articles 1 - 9 of 9
Full-Text Articles in Privacy Law
Private Lives At Home And Public Lives In Court: Protecting The Privacy Of Federal Judges' Home Addresses, Hannah Elias Sbaity
Private Lives At Home And Public Lives In Court: Protecting The Privacy Of Federal Judges' Home Addresses, Hannah Elias Sbaity
Journal of Intellectual Property Law
Targeted murders of federal judges and their families at their private homes date back to May 29, 1979. Most recently, in July 2020, Judge Esther Salas’s only son, Daniel, was murdered and her husband near-fatally shot at their home. Individuals wishing to inflict such harm or death at federal judges’ homes have been able to do so because of federal judges’ publicly available home addresses. Because personally identifying information (PII) is defined differently from statute to statute, home addresses largely remain public information in most states and can be found in real estate records, data broker websites, social media platforms, …
A Deep Dive Into Technical Encryption Concepts To Better Understand Cybersecurity & Data Privacy Legal & Policy Issues, Anthony Volini
A Deep Dive Into Technical Encryption Concepts To Better Understand Cybersecurity & Data Privacy Legal & Policy Issues, Anthony Volini
Journal of Intellectual Property Law
Lawyers wishing to exercise a meaningful degree of leadership at the intersection of technology and the law could benefit greatly from a deep understanding of the use and application of encryption, considering it arises in so many legal scenarios. For example, in FTC v. Wyndham1 the defendant failed to implement nearly every conceivable cybersecurity control, including lack of encryption for stored data, resulting in multiple data breaches and a consequent FTC enforcement action for unfair and deceptive practices. Other examples of legal issues requiring use of encryption and other technology concepts include compliance with security requirements of GLBA & HIPAA, …
Judicial Oversight Of Interception Of Communications In The United Kingdom: An Historical And Comparative Analysis, David G. Barnum
Judicial Oversight Of Interception Of Communications In The United Kingdom: An Historical And Comparative Analysis, David G. Barnum
Georgia Journal of International & Comparative Law
No abstract provided.
The Georgia Open Records Law Electronic Signature Exception: The Intersection Of Privacy, Technology, And Open Records, Michael L. Van Cise
The Georgia Open Records Law Electronic Signature Exception: The Intersection Of Privacy, Technology, And Open Records, Michael L. Van Cise
Journal of Intellectual Property Law
No abstract provided.
Rights Of Publicity: A Practitioner's Enigma, Gil N. Peles Esq.
Rights Of Publicity: A Practitioner's Enigma, Gil N. Peles Esq.
Journal of Intellectual Property Law
No abstract provided.
Personal Property Servitudes On The Internet Of Things, Christina Mulligan
Personal Property Servitudes On The Internet Of Things, Christina Mulligan
Georgia Law Review
Small appliances such as thermostats, watches, jewelry, and eyewear are now being made available with networking capability. These networked objects make up the growing Internet of Things-pieces of personal property that run software and connect to the global Internet. These products are typically governed by terms of service or end-user license agreements that create restrictions on how products can be used or transferred- restrictions which would be unenforceable if the inside of the product consisted of gears rather than processing chips. This Article explores the question of when use and transfer restrictions should be enforceable on networked appliances and other …
All Blogs Go To Heaven: Preserving Valuable Digital Assets Without The Uniform Fiduciary Access To Digital Assets Act's Removal Of Third Party Privacy Protections, Elizabeth D. Barwick
All Blogs Go To Heaven: Preserving Valuable Digital Assets Without The Uniform Fiduciary Access To Digital Assets Act's Removal Of Third Party Privacy Protections, Elizabeth D. Barwick
Georgia Law Review
In the age of the Internet, most of us live our lives largely online. As such, one would expect a concomitant increase in concern for privacy, but this is not necessarily the case. It seems that the instantaneous and anonymous nature of the Internet has given rise to thoughtless sharing that simply did not exist when it was necessary to put pen to paper. Understanding that a great deal of our day-to-day activities are now carried out over the Internet, it makes sense that our families and heirs would want or need access to our accounts in the event of …
A Cloudy Forecast: Divergence In The Cloud Computing Laws Of The United States, European Union, And China, Tina Cheng
A Cloudy Forecast: Divergence In The Cloud Computing Laws Of The United States, European Union, And China, Tina Cheng
Georgia Journal of International & Comparative Law
No abstract provided.
Chain-Link Confidentiality, Woodrow Hartzog
Chain-Link Confidentiality, Woodrow Hartzog
Georgia Law Review
Disclosing personal information online often feels like
losing control over one's data forever; but it does not have
to be that way. This Essay proposes a "chain-link
confidentiality" approach to protecting online privacy.
One of the most difficult challenges to guarding privacy in
the digital age is the protection of information once it is
exposed to other people. A chain-link confidentiality
regime would link the disclosure of personal information
to obligations to protect that information as the
information moves downstream. It would focus on the
relationships not only between the discloser of information
and the initial recipient but also between …