Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Internet Law

Journal

2015

Institution
Keyword
Publication

Articles 1 - 30 of 44

Full-Text Articles in Privacy Law

Table Of Contents Dec 2015

Table Of Contents

Catholic University Journal of Law and Technology

No abstract provided.


Alternative Restrictions Of Sex Offenders' Social Media Use & The Freedom Of Speech, Norah M. Sloss Dec 2015

Alternative Restrictions Of Sex Offenders' Social Media Use & The Freedom Of Speech, Norah M. Sloss

Catholic University Journal of Law and Technology

No abstract provided.


Implications For The Future Of Global Data Security And Privacy: The Territorial Application Of The Stored Communications Act And The Microsoft Case, Russell Hsiao Dec 2015

Implications For The Future Of Global Data Security And Privacy: The Territorial Application Of The Stored Communications Act And The Microsoft Case, Russell Hsiao

Catholic University Journal of Law and Technology

No abstract provided.


Submarine Cables, Cybersecurity And International Law: An Intersectional Analysis, Tara Davenport Dec 2015

Submarine Cables, Cybersecurity And International Law: An Intersectional Analysis, Tara Davenport

Catholic University Journal of Law and Technology

No abstract provided.


Section 230 Of The Communications Decency Act: The True Culprit Of Internet Defamation, Heather Saint Oct 2015

Section 230 Of The Communications Decency Act: The True Culprit Of Internet Defamation, Heather Saint

Loyola of Los Angeles Entertainment Law Review

This Note highlights the growing concern of Internet defamation and the lack of viable legal remedies available to its victims. Internet defamation is internet speech with the purpose to disparage another’s reputation. At common law, a victim of alleged defamation has the right to file suit against not only the original speaker of the defamatory statements, but the person or entity to give that statement further publication as well. In certain cases even the distributor, such as a newspaper stand, can be held liable for a defamation claim. However, liability due to defamatory speech on the Internet is quite different. …


Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu Jul 2015

Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu

Pepperdine Law Review

This Article highlights some of the critical distinctions between small data surveillance and big data cybersurveillance as methods of intelligence gathering. Specifically, in the intelligence context, it appears that “collect-it-all” tools in a big data world can now potentially facilitate the construction, by the intelligence community, of other individuals' digital avatars. The digital avatar can be understood as a virtual representation of our digital selves and may serve as a potential proxy for an actual person. This construction may be enabled through processes such as the data fusion of biometric and biographic data, or the digital data fusion of the …


Trading Privacy For Angry Birds: A Call For Courts To Reevaluate Privacy Expectations In Modern Smartphones, Jeremy Andrew Ciarabellini Jul 2015

Trading Privacy For Angry Birds: A Call For Courts To Reevaluate Privacy Expectations In Modern Smartphones, Jeremy Andrew Ciarabellini

Seattle University Law Review

Of all the smartphone uses, the calling function is probably used the least. Rather, individuals more commonly use their smartphone for surfing the web, checking Facebook, and playing games. Highlighting the “smart” in smartphone, these phones often know more about their users’ daily activities than the users. Without requiring any sort of input, smartphones can tell the user how many steps they walk each day, when it is time to leave for work (also, of course, determining the traveling time with the most up-to-date traffic reports), and when an item recently ordered on Amazon will be delivered. Smartphone users may …


Authorized Investigation: A Temperate Alternative To Cyber Insecurity, Casey M. Bruner Jul 2015

Authorized Investigation: A Temperate Alternative To Cyber Insecurity, Casey M. Bruner

Seattle University Law Review

This Note aims to show that legal structures created to protect the Internet in its original form are completely insufficient to protect what the Internet has become. This antiquated legal framework is exacerbating the problem. The breadth of activity that the current law restricts severely limits the remedies that cyberattack victims can pursue, and it must be updated. While full hack-back may prove necessary in the long run, I argue for a more temperate initial response to the problem—I call this response “authorized investigation.” Specifically, the Computer Fraud and Abuse Act should be amended to allow victims access to their …


Wide Right: How Isp Immunity And Current Laws Are Off The Mark In Protecting The Modern Athlete On Social Media, Dominick J. Mingione Jun 2015

Wide Right: How Isp Immunity And Current Laws Are Off The Mark In Protecting The Modern Athlete On Social Media, Dominick J. Mingione

Pace Intellectual Property, Sports & Entertainment Law Forum

“[Y]our tranny looking dad is a disgrace to American football,” “I would rape the shit out of her,” and “[The] [B]ears are easier than you on prom night,” are just a sampling of some of the alarmingly harassing tweets received by Chloe Trestman between the night of November 9, 2014 and November 10, 2014. Who is Chloe Trestman, and what could she have possibly done to warrant such abuse? Chloe’s father is Marc Trestman, the head coach of the Chicago Bears. And the twitter vitriol, or “twitriol,” directed toward Chloe was in response to the Bears’ blowout loss to their …


"Three Parent Babies": Techniques Explained, Objections Examined, Rebecca Carr Jun 2015

"Three Parent Babies": Techniques Explained, Objections Examined, Rebecca Carr

Canadian Journal of Law and Technology

The UK Parliament has approved regulations, which come into force in October 2015, that permit the use of new treatment techniques to prevent the transmission of serious mitochondrial diseases from women to their children. The introduction of these techniques—which are not currently carried out in any country in the world—will fly in the face of the opposition that has been raised since discussions to permit clinical applications of the techniques first arose. After outlining some background to the techniques, this article briefly examines three of the objections that have been made against them: that the safety and effectiveness of the …


Leaving Dumb Phones Behind: A Commentary On The Warrantless Searches Of Smartphone Data Granted In R. V. Fearon, Jordan Fine Jun 2015

Leaving Dumb Phones Behind: A Commentary On The Warrantless Searches Of Smartphone Data Granted In R. V. Fearon, Jordan Fine

Canadian Journal of Law and Technology

Given the incredible rate of smartphone technological evolution, is it about time the Supreme Court of Canada devised a special test to give law enforcement agents significantly more power to search through phone data without a warrant upon arrest of a suspect? In R. v. Fearon, the majority did just that. But this article argues the opposite is true: the increasing potential for immense privacy infringements when police search powerful and constantly evolving technological devices demands a greater limitation to police powers.

In recent cases, the Supreme Court has agreed with the position that limitations are needed concerning computers. Additionally, …


Freedom Of Expression, Discrimination, And The Internet: Legislative Responses And Judicial Reactions, Talia Joundi Jun 2015

Freedom Of Expression, Discrimination, And The Internet: Legislative Responses And Judicial Reactions, Talia Joundi

Canadian Journal of Law and Technology

In Part I of this article, I argue that cyber racism is inextricably linked with systemic discrimination. The definition of systemic discrimination relied on was first provided by Judge Abella in the Report of the Royal Commission on Equality in Employment (Abella Report), which states that systemic discrimination points to practices or attitudes that can result in inequality of opportunity for individuals or groups. The Supreme Court of Canada has since adopted this definition, and in some instances, has acknowledged that systemic problems require systemic remedies. The purpose of this discussion is to demonstrate how situating cyber racism within the …


International Law Enforcement Access To User Data: A Survival Guide And Call For Action, Kate Westmoreland, Gail Kent Jun 2015

International Law Enforcement Access To User Data: A Survival Guide And Call For Action, Kate Westmoreland, Gail Kent

Canadian Journal of Law and Technology

Effectively accessing and using online evidence is a critical part of modern investigations and prosecutions, but also has significant implications for users’ privacy. The current system of international sharing of online data in criminal matters is a patchwork of domestic and international law that is slow, uncertain, and not well understood. This article provides an overview of the current system for foreign governments seeking user data from US-based Internet companies. After describing the way in which the system currently operates, it identifies problems with the system, and outlines the reform efforts that are beginning to emerge.


Possession Of "Extreme" Pornography: Where's The Harm?, Jonathan Clough Jun 2015

Possession Of "Extreme" Pornography: Where's The Harm?, Jonathan Clough

Canadian Journal of Law and Technology

For decades, the traditional Western liberal approach to obscene material has been that while the availability of such material may be restricted, individuals are free to possess it so long as they do not distribute to others. Prior to the advent of the Internet, traditional means of control were effective in limiting the availability of such material. However, free of traditional restrictions the Internet allows easy access to a vast array of pornographic material, some of which challenges the most liberal of societies including images of child abuse, sexual violence, bestiality, and necrophilia.

In 2008, the UK became one of …


Here We Are Now, Entertain Us: Defining The Line Between Personal And Professional Context On Social Media, Raizel Liebler, Keidra Chaney May 2015

Here We Are Now, Entertain Us: Defining The Line Between Personal And Professional Context On Social Media, Raizel Liebler, Keidra Chaney

Pace Law Review

Social media platforms such as Facebook, Twitter, and Instagram allow individuals and companies to connect directly and regularly with an audience of peers or with the public at large. These websites combine the audience-building platforms of mass media with the personal data and relationships of in-person social networks. Due to a combination of evolving user activity and frequent updates to functionality and user features, social media tools blur the line of whether a speaker is perceived as speaking to a specific and presumed private audience, a public expression of one’s own personal views, or a representative viewpoint of an entire …


Social Justice, Social Norms And The Governance Of Social Media, Tal Z. Zarsky May 2015

Social Justice, Social Norms And The Governance Of Social Media, Tal Z. Zarsky

Pace Law Review

This article proceeds as follows: Part II briefly addresses the theoretical arguments regarding the pros and cons of various governance strategies, focusing on the advantages, disadvantages and pitfalls of reliance on private parties. In Part III, the article describes, in general terms, the above-mentioned empirical study, explaining its methodology, the specific challenges to its design and implementation, and how these were met. The discussion specifically centers on a survey taken to establish the nature of social norms. Part IV presents a specific test case: whether pseudonymity should be permitted in social media or should “real names” be mandatory. Part V …


Social Media And The Job Market: How To Reconcile Applicant Privacy With Employer Needs, Peter B. Baumhart Jan 2015

Social Media And The Job Market: How To Reconcile Applicant Privacy With Employer Needs, Peter B. Baumhart

University of Michigan Journal of Law Reform

In the modern technological age, social media allows us to communicate vast amounts of personal information to countless people instantaneously. This information is valuable to more than just our “friends” and “followers,” however. Prospective employers can use this personal data to inform hiring decisions, thereby maximizing fit and minimizing potential liability. The question then arises, how best to acquire this information? For job applicants, the counter-question is how best to protect the privacy of their social media accounts. As these two competing desires begin to clash, it is important to find a method to mediate the conflict. Existing privacy law, …


Debatable Premises In Telecom Policy, 31 J. Marshall J. Info. Tech. & Privacy L. 453 (2015), Justin (Gus) Hurwitz, Roslyn Layton Jan 2015

Debatable Premises In Telecom Policy, 31 J. Marshall J. Info. Tech. & Privacy L. 453 (2015), Justin (Gus) Hurwitz, Roslyn Layton

UIC John Marshall Journal of Information Technology & Privacy Law

The five premises that this paper considers are:

1. Everyone needs low-cost access to high speed broadband service

2. High-speed broadband is necessary for education, health, government, and other social services

3. Wireless can‟t compete with cable

4. An open Internet is necessary for innovation and necessarily benefits consumers

5. Telecommunications are better somewhere else.


The Law And 3d Printing, 31 J. Marshall J. Info. Tech. & Privacy L. 505 (2015), Jasper Tran Jan 2015

The Law And 3d Printing, 31 J. Marshall J. Info. Tech. & Privacy L. 505 (2015), Jasper Tran

UIC John Marshall Journal of Information Technology & Privacy Law

Recent years have seen extraordinary growth in the amount of legal scholarship and practice at the intersection of law and 3D printing. To help navigate this emerging field of 3D printing law, I created the accompanying Law and 3D Printing Bibliography. The published bibliography presented herein contains over 100 entries. The brief introductory comments to the published piece discuss the creation and contents of the bibliography, and provide suggestions for where one should begin their research in the area. The comments focus on (1) 3D printing‘s background, (2) historical growth pattern of law and 3D printing scholarship, (3) identification of …


Legal Problems In Data Management: It & Privacy At The Forefront: Opening Remarks, 31 J. Marshall J. Info. Tech. & Privacy L. 521 (2015) Jan 2015

Legal Problems In Data Management: It & Privacy At The Forefront: Opening Remarks, 31 J. Marshall J. Info. Tech. & Privacy L. 521 (2015)

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Selected State Laws Governing The Safeguarding And Disposing Of Personal Information, 31 J. Marshall J. Info. Tech. & Privacy L. 487 (2015), Bruce Radke, Michael Waters Jan 2015

Selected State Laws Governing The Safeguarding And Disposing Of Personal Information, 31 J. Marshall J. Info. Tech. & Privacy L. 487 (2015), Bruce Radke, Michael Waters

UIC John Marshall Journal of Information Technology & Privacy Law

Numerous states have adopted laws mandating the protection and disposal of personal information. Under those laws, businesses are required to implement and maintain reasonable security procedures and practices appropriate to the nature of the information in order to protect the personal information from unauthorized access, destruction, use, modification, or disclosure. Although the definition of “personal information” varies from state to state, “personal information” is generally defined as an individual’s first name or initial and last name in combination with any one or more of the following data elements, when either the name or the data elements are not encrypted or …


Legal Problems In Data Management: It & Privacy At The Forefront: Dual-Use Devices In The Workplace, 31 J. Marshall J. Info. Tech. & Privacy L. 527 (2015) Jan 2015

Legal Problems In Data Management: It & Privacy At The Forefront: Dual-Use Devices In The Workplace, 31 J. Marshall J. Info. Tech. & Privacy L. 527 (2015)

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Legal Problems In Data Management: It & Privacy At The Forefront: “Big Data”: Ownership, Copyright, And Protection, 31 J. Marshall J. Info. Tech. & Privacy L. 565 (2015) Jan 2015

Legal Problems In Data Management: It & Privacy At The Forefront: “Big Data”: Ownership, Copyright, And Protection, 31 J. Marshall J. Info. Tech. & Privacy L. 565 (2015)

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Legal Problems In Data Management: It & Privacy At The Forefront: Drafting And Implementing Effective Social Media Policies In The Workplace, 31 J. Marshall J. Info. Tech. & Privacy L. 549 (2015) Jan 2015

Legal Problems In Data Management: It & Privacy At The Forefront: Drafting And Implementing Effective Social Media Policies In The Workplace, 31 J. Marshall J. Info. Tech. & Privacy L. 549 (2015)

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Legal Problems In Data Management: Ethics Of Big Data Analytics And The Importance Of Disclosure, 31 J. Marshall J. Info. Tech. & Privacy L. 641 (2015) Jan 2015

Legal Problems In Data Management: Ethics Of Big Data Analytics And The Importance Of Disclosure, 31 J. Marshall J. Info. Tech. & Privacy L. 641 (2015)

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Japanese And American Privacy Laws, Comparative Analysis, 32 J. Marshall J. Info. Tech. & Privacy L. 1 (2015), Jane Kim Jan 2015

Japanese And American Privacy Laws, Comparative Analysis, 32 J. Marshall J. Info. Tech. & Privacy L. 1 (2015), Jane Kim

UIC John Marshall Journal of Information Technology & Privacy Law

To understand the laws of a foreign nation, one must first under-stand that nation’s culture. Its people and their customs will provide in-sight into the proper interpretation and application of such laws. For those reasons, this commentary commences with cursory background on Japanese people, followed by a brief comparative analysis of Health In-surance Portability and Accountability Act (“HIPAA”) (enacted in 1996) and its Japanese counterpart, the Act on the Protection of Personal In-formation (“APPI”) (enacted in 2003). The Japanese have borrowed a lot of American concepts of privacy laws. This paper will explore how these imported privacy concepts may not …


Legal Problems In Data Management: The Impact Of International Data Restriction Laws On U.S. Companies, 31 J. Marshall J. Info. Tech. & Privacy L. 609 (2015) Jan 2015

Legal Problems In Data Management: The Impact Of International Data Restriction Laws On U.S. Companies, 31 J. Marshall J. Info. Tech. & Privacy L. 609 (2015)

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Industry Self-Regulation Of Consumer Data Privacy And Security, 32 J. Marshall J. Info. Tech. & Privacy L. 15 (2015), Siona Listokin Jan 2015

Industry Self-Regulation Of Consumer Data Privacy And Security, 32 J. Marshall J. Info. Tech. & Privacy L. 15 (2015), Siona Listokin

UIC John Marshall Journal of Information Technology & Privacy Law

Industry self-regulation of consumer data privacy and security has been proposed as a flexible alternative and compliment to traditional government regulation. This study analyzes whether different types of existing industry-led standards improve online privacy and security. This paper examines which types of firms join voluntary standards and whether there is a difference in outcomes between trade association memberships (like the Digital Advertising Alliance) and certification programs (like TRUSTe). Results suggest that more trafficked websites are more likely to adopt standards, and that trade association member-ship does not have an effect on privacy and security performance. This article highlights the need …


Legal Problems In Data Management: It & Privacy At The Forefront: Developments In Cybersecurity Law And Best Practices, 31 J. Marshall J. Info. Tech. & Privacy L. 587 (2015) Jan 2015

Legal Problems In Data Management: It & Privacy At The Forefront: Developments In Cybersecurity Law And Best Practices, 31 J. Marshall J. Info. Tech. & Privacy L. 587 (2015)

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Legal Problems In Data Management: Global Approach To Data Privacy: Safe Harbor, 31 J. Marshall J. Info. Tech. & Privacy L. 633 (2015) Jan 2015

Legal Problems In Data Management: Global Approach To Data Privacy: Safe Harbor, 31 J. Marshall J. Info. Tech. & Privacy L. 633 (2015)

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.