Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Internet Law

2015

Institution
Keyword
Publication
Publication Type
File Type

Articles 31 - 60 of 78

Full-Text Articles in Privacy Law

Leaving Dumb Phones Behind: A Commentary On The Warrantless Searches Of Smartphone Data Granted In R. V. Fearon, Jordan Fine Jun 2015

Leaving Dumb Phones Behind: A Commentary On The Warrantless Searches Of Smartphone Data Granted In R. V. Fearon, Jordan Fine

Canadian Journal of Law and Technology

Given the incredible rate of smartphone technological evolution, is it about time the Supreme Court of Canada devised a special test to give law enforcement agents significantly more power to search through phone data without a warrant upon arrest of a suspect? In R. v. Fearon, the majority did just that. But this article argues the opposite is true: the increasing potential for immense privacy infringements when police search powerful and constantly evolving technological devices demands a greater limitation to police powers.

In recent cases, the Supreme Court has agreed with the position that limitations are needed concerning computers. Additionally, …


Freedom Of Expression, Discrimination, And The Internet: Legislative Responses And Judicial Reactions, Talia Joundi Jun 2015

Freedom Of Expression, Discrimination, And The Internet: Legislative Responses And Judicial Reactions, Talia Joundi

Canadian Journal of Law and Technology

In Part I of this article, I argue that cyber racism is inextricably linked with systemic discrimination. The definition of systemic discrimination relied on was first provided by Judge Abella in the Report of the Royal Commission on Equality in Employment (Abella Report), which states that systemic discrimination points to practices or attitudes that can result in inequality of opportunity for individuals or groups. The Supreme Court of Canada has since adopted this definition, and in some instances, has acknowledged that systemic problems require systemic remedies. The purpose of this discussion is to demonstrate how situating cyber racism within the …


International Law Enforcement Access To User Data: A Survival Guide And Call For Action, Kate Westmoreland, Gail Kent Jun 2015

International Law Enforcement Access To User Data: A Survival Guide And Call For Action, Kate Westmoreland, Gail Kent

Canadian Journal of Law and Technology

Effectively accessing and using online evidence is a critical part of modern investigations and prosecutions, but also has significant implications for users’ privacy. The current system of international sharing of online data in criminal matters is a patchwork of domestic and international law that is slow, uncertain, and not well understood. This article provides an overview of the current system for foreign governments seeking user data from US-based Internet companies. After describing the way in which the system currently operates, it identifies problems with the system, and outlines the reform efforts that are beginning to emerge.


Possession Of "Extreme" Pornography: Where's The Harm?, Jonathan Clough Jun 2015

Possession Of "Extreme" Pornography: Where's The Harm?, Jonathan Clough

Canadian Journal of Law and Technology

For decades, the traditional Western liberal approach to obscene material has been that while the availability of such material may be restricted, individuals are free to possess it so long as they do not distribute to others. Prior to the advent of the Internet, traditional means of control were effective in limiting the availability of such material. However, free of traditional restrictions the Internet allows easy access to a vast array of pornographic material, some of which challenges the most liberal of societies including images of child abuse, sexual violence, bestiality, and necrophilia.

In 2008, the UK became one of …


Here We Are Now, Entertain Us: Defining The Line Between Personal And Professional Context On Social Media, Raizel Liebler, Keidra Chaney May 2015

Here We Are Now, Entertain Us: Defining The Line Between Personal And Professional Context On Social Media, Raizel Liebler, Keidra Chaney

Pace Law Review

Social media platforms such as Facebook, Twitter, and Instagram allow individuals and companies to connect directly and regularly with an audience of peers or with the public at large. These websites combine the audience-building platforms of mass media with the personal data and relationships of in-person social networks. Due to a combination of evolving user activity and frequent updates to functionality and user features, social media tools blur the line of whether a speaker is perceived as speaking to a specific and presumed private audience, a public expression of one’s own personal views, or a representative viewpoint of an entire …


Social Justice, Social Norms And The Governance Of Social Media, Tal Z. Zarsky May 2015

Social Justice, Social Norms And The Governance Of Social Media, Tal Z. Zarsky

Pace Law Review

This article proceeds as follows: Part II briefly addresses the theoretical arguments regarding the pros and cons of various governance strategies, focusing on the advantages, disadvantages and pitfalls of reliance on private parties. In Part III, the article describes, in general terms, the above-mentioned empirical study, explaining its methodology, the specific challenges to its design and implementation, and how these were met. The discussion specifically centers on a survey taken to establish the nature of social norms. Part IV presents a specific test case: whether pseudonymity should be permitted in social media or should “real names” be mandatory. Part V …


Welcome To The Machine: Privacy And Workplace Implications Of Predictive Analytics, Robert Sprague Apr 2015

Welcome To The Machine: Privacy And Workplace Implications Of Predictive Analytics, Robert Sprague

Robert Sprague

Predictive analytics use a method known as data mining to identify trends, patterns, or relationships among data, which can then be used to develop a predictive model. Data mining itself relies upon big data, which is “big” not solely because of its size but also because its analytical potential is qualitatively different. “Big data” analysis allows organizations, including government and businesses, to combine diverse digital datasets and then use statistics and other data mining techniques to extract from them both hidden information and surprising correlations. These data are not necessarily tracking transactional records of atomized behavior, such as the purchasing …


Data Breaches And Privacy Law: Lawyers’ Challenges In Handling Personal Information, Charlotte Duc-Bragues Apr 2015

Data Breaches And Privacy Law: Lawyers’ Challenges In Handling Personal Information, Charlotte Duc-Bragues

Cornell Law School J.D. Student Research Papers

Sharing personal information with a lawyer potentially represents the greatest source of vulnerability for an individual. Since the first major security breach in 2005, law firms have been pressed both by public authorities and clients to take action in order to protect confidential information from potential harmful breaches.

This paper seeks to provide an overview of the challenges faced by lawyers in handling personal information with regard to potential security breaches. The aim is to analyze this issue through the focal of privacy law; statistics on security breaches and tools to prevent this phenomenon, extensively studied in class, are given …


Youtube Kids – Luring Kids In, One App At A Time, Courtney Serrato Apr 2015

Youtube Kids – Luring Kids In, One App At A Time, Courtney Serrato

GGU Law Review Blog

Whether you’re an overnight sensation like Justin Bieber or you’re uploading a tutorial on how to apply the perfect make up; YouTube has become the go‑to site for watching all the hottest videos. Technologically speaking, the cyber world has significantly changed over the years, especially with the Internet now being easily accessible from mobile devices. But the most alarming and overlooked trend is the ubiquitous use of the Internet by children.

Today, children use iPhones, tablets and computers to access the Internet as early as three years‑old. With the amount of time children spend online, some have become skilled navigators. …


Are They Worth Reading? An In-Depth Analysis Of Online Trackers’ Privacy Policies, Candice Hoke, Lorrie Faith Cranor, Pedro Giovanni Leon, Alyssa Au Apr 2015

Are They Worth Reading? An In-Depth Analysis Of Online Trackers’ Privacy Policies, Candice Hoke, Lorrie Faith Cranor, Pedro Giovanni Leon, Alyssa Au

Law Faculty Articles and Essays

We analyzed the privacy policies of 75 online tracking companies with the goal of assessing whether they contain information relevant for users to make privacy decisions. We compared privacy policies from large companies, companies that are members of self-regulatory organizations, and nonmember companies and found that many of them are silent with regard to important consumer-relevant practices including the collection and use of sensitive information and linkage of tracking data with personally-identifiable information. We evaluated these policies against self-regulatory guidelines and found that many policies are not fully compliant. Furthermore, the overly general requirements established in those guidelines allow companies …


Information Technology And The Law - Privacy, Ulf Maunsbach Mar 2015

Information Technology And The Law - Privacy, Ulf Maunsbach

Ulf Maunsbach

No abstract provided.


Social Media And The Job Market: How To Reconcile Applicant Privacy With Employer Needs, Peter B. Baumhart Jan 2015

Social Media And The Job Market: How To Reconcile Applicant Privacy With Employer Needs, Peter B. Baumhart

University of Michigan Journal of Law Reform

In the modern technological age, social media allows us to communicate vast amounts of personal information to countless people instantaneously. This information is valuable to more than just our “friends” and “followers,” however. Prospective employers can use this personal data to inform hiring decisions, thereby maximizing fit and minimizing potential liability. The question then arises, how best to acquire this information? For job applicants, the counter-question is how best to protect the privacy of their social media accounts. As these two competing desires begin to clash, it is important to find a method to mediate the conflict. Existing privacy law, …


Is There Anybody Out There? Analyzing The Regulation Of Children’S Privacy Online In The United States Of America And The European Union According To The Tbgi Analytical Framework By Eberlein Et Al, Nachshon Goltz Jan 2015

Is There Anybody Out There? Analyzing The Regulation Of Children’S Privacy Online In The United States Of America And The European Union According To The Tbgi Analytical Framework By Eberlein Et Al, Nachshon Goltz

Transnational Business Governance Interactions Working Papers

This article analyzes the regulation of children’s privacy online, especially in the context of personal information collection as a commodity, in the United States of America (USA) and the European Union (EU) according to the Transnational Business Governance Interactions analytical framework proposed by Eberlein et al. This article reviews the regulatory structure of the field in these two jurisdictions, including global organizations, according to Elberlein et al components and questions. In the analysis, a map of the regulatory interactions within this global realm will be presented and discussed. Analysis of the influence of each interacting party and the degree of …


Privacy, Autonomy, And Internet Platforms, Frank A. Pasquale Jan 2015

Privacy, Autonomy, And Internet Platforms, Frank A. Pasquale

Faculty Scholarship

No abstract provided.


Debatable Premises In Telecom Policy, 31 J. Marshall J. Info. Tech. & Privacy L. 453 (2015), Justin (Gus) Hurwitz, Roslyn Layton Jan 2015

Debatable Premises In Telecom Policy, 31 J. Marshall J. Info. Tech. & Privacy L. 453 (2015), Justin (Gus) Hurwitz, Roslyn Layton

UIC John Marshall Journal of Information Technology & Privacy Law

The five premises that this paper considers are:

1. Everyone needs low-cost access to high speed broadband service

2. High-speed broadband is necessary for education, health, government, and other social services

3. Wireless can‟t compete with cable

4. An open Internet is necessary for innovation and necessarily benefits consumers

5. Telecommunications are better somewhere else.


The Law And 3d Printing, 31 J. Marshall J. Info. Tech. & Privacy L. 505 (2015), Jasper Tran Jan 2015

The Law And 3d Printing, 31 J. Marshall J. Info. Tech. & Privacy L. 505 (2015), Jasper Tran

UIC John Marshall Journal of Information Technology & Privacy Law

Recent years have seen extraordinary growth in the amount of legal scholarship and practice at the intersection of law and 3D printing. To help navigate this emerging field of 3D printing law, I created the accompanying Law and 3D Printing Bibliography. The published bibliography presented herein contains over 100 entries. The brief introductory comments to the published piece discuss the creation and contents of the bibliography, and provide suggestions for where one should begin their research in the area. The comments focus on (1) 3D printing‘s background, (2) historical growth pattern of law and 3D printing scholarship, (3) identification of …


Legal Problems In Data Management: It & Privacy At The Forefront: Opening Remarks, 31 J. Marshall J. Info. Tech. & Privacy L. 521 (2015) Jan 2015

Legal Problems In Data Management: It & Privacy At The Forefront: Opening Remarks, 31 J. Marshall J. Info. Tech. & Privacy L. 521 (2015)

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Selected State Laws Governing The Safeguarding And Disposing Of Personal Information, 31 J. Marshall J. Info. Tech. & Privacy L. 487 (2015), Bruce Radke, Michael Waters Jan 2015

Selected State Laws Governing The Safeguarding And Disposing Of Personal Information, 31 J. Marshall J. Info. Tech. & Privacy L. 487 (2015), Bruce Radke, Michael Waters

UIC John Marshall Journal of Information Technology & Privacy Law

Numerous states have adopted laws mandating the protection and disposal of personal information. Under those laws, businesses are required to implement and maintain reasonable security procedures and practices appropriate to the nature of the information in order to protect the personal information from unauthorized access, destruction, use, modification, or disclosure. Although the definition of “personal information” varies from state to state, “personal information” is generally defined as an individual’s first name or initial and last name in combination with any one or more of the following data elements, when either the name or the data elements are not encrypted or …


Legal Problems In Data Management: It & Privacy At The Forefront: Dual-Use Devices In The Workplace, 31 J. Marshall J. Info. Tech. & Privacy L. 527 (2015) Jan 2015

Legal Problems In Data Management: It & Privacy At The Forefront: Dual-Use Devices In The Workplace, 31 J. Marshall J. Info. Tech. & Privacy L. 527 (2015)

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Legal Problems In Data Management: It & Privacy At The Forefront: “Big Data”: Ownership, Copyright, And Protection, 31 J. Marshall J. Info. Tech. & Privacy L. 565 (2015) Jan 2015

Legal Problems In Data Management: It & Privacy At The Forefront: “Big Data”: Ownership, Copyright, And Protection, 31 J. Marshall J. Info. Tech. & Privacy L. 565 (2015)

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Legal Problems In Data Management: It & Privacy At The Forefront: Drafting And Implementing Effective Social Media Policies In The Workplace, 31 J. Marshall J. Info. Tech. & Privacy L. 549 (2015) Jan 2015

Legal Problems In Data Management: It & Privacy At The Forefront: Drafting And Implementing Effective Social Media Policies In The Workplace, 31 J. Marshall J. Info. Tech. & Privacy L. 549 (2015)

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Legal Problems In Data Management: Ethics Of Big Data Analytics And The Importance Of Disclosure, 31 J. Marshall J. Info. Tech. & Privacy L. 641 (2015) Jan 2015

Legal Problems In Data Management: Ethics Of Big Data Analytics And The Importance Of Disclosure, 31 J. Marshall J. Info. Tech. & Privacy L. 641 (2015)

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Japanese And American Privacy Laws, Comparative Analysis, 32 J. Marshall J. Info. Tech. & Privacy L. 1 (2015), Jane Kim Jan 2015

Japanese And American Privacy Laws, Comparative Analysis, 32 J. Marshall J. Info. Tech. & Privacy L. 1 (2015), Jane Kim

UIC John Marshall Journal of Information Technology & Privacy Law

To understand the laws of a foreign nation, one must first under-stand that nation’s culture. Its people and their customs will provide in-sight into the proper interpretation and application of such laws. For those reasons, this commentary commences with cursory background on Japanese people, followed by a brief comparative analysis of Health In-surance Portability and Accountability Act (“HIPAA”) (enacted in 1996) and its Japanese counterpart, the Act on the Protection of Personal In-formation (“APPI”) (enacted in 2003). The Japanese have borrowed a lot of American concepts of privacy laws. This paper will explore how these imported privacy concepts may not …


Legal Problems In Data Management: The Impact Of International Data Restriction Laws On U.S. Companies, 31 J. Marshall J. Info. Tech. & Privacy L. 609 (2015) Jan 2015

Legal Problems In Data Management: The Impact Of International Data Restriction Laws On U.S. Companies, 31 J. Marshall J. Info. Tech. & Privacy L. 609 (2015)

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Industry Self-Regulation Of Consumer Data Privacy And Security, 32 J. Marshall J. Info. Tech. & Privacy L. 15 (2015), Siona Listokin Jan 2015

Industry Self-Regulation Of Consumer Data Privacy And Security, 32 J. Marshall J. Info. Tech. & Privacy L. 15 (2015), Siona Listokin

UIC John Marshall Journal of Information Technology & Privacy Law

Industry self-regulation of consumer data privacy and security has been proposed as a flexible alternative and compliment to traditional government regulation. This study analyzes whether different types of existing industry-led standards improve online privacy and security. This paper examines which types of firms join voluntary standards and whether there is a difference in outcomes between trade association memberships (like the Digital Advertising Alliance) and certification programs (like TRUSTe). Results suggest that more trafficked websites are more likely to adopt standards, and that trade association member-ship does not have an effect on privacy and security performance. This article highlights the need …


Legal Problems In Data Management: It & Privacy At The Forefront: Developments In Cybersecurity Law And Best Practices, 31 J. Marshall J. Info. Tech. & Privacy L. 587 (2015) Jan 2015

Legal Problems In Data Management: It & Privacy At The Forefront: Developments In Cybersecurity Law And Best Practices, 31 J. Marshall J. Info. Tech. & Privacy L. 587 (2015)

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Legal Problems In Data Management: Global Approach To Data Privacy: Safe Harbor, 31 J. Marshall J. Info. Tech. & Privacy L. 633 (2015) Jan 2015

Legal Problems In Data Management: Global Approach To Data Privacy: Safe Harbor, 31 J. Marshall J. Info. Tech. & Privacy L. 633 (2015)

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


‘The Greatest Wealth Is Health’: Patient Protected Health Information In The Hands Of Hackers, 31 J. Marshall J. Info. Tech. & Privacy L. 657 (2015), Samantha Singer Jan 2015

‘The Greatest Wealth Is Health’: Patient Protected Health Information In The Hands Of Hackers, 31 J. Marshall J. Info. Tech. & Privacy L. 657 (2015), Samantha Singer

UIC John Marshall Journal of Information Technology & Privacy Law

This comment will analyze the specific requirements and stages that EPs/EHs must comply with in order to receive its Medicare and Medicaid incentives, how EHR technologies are being implemented, how EHR technologies are affecting patients' privacy with regard to hacking a patient‟s PHI, and what EHR technology vendors and EPs/EHs should be doing to improve patient privacy and security to prevent hacking and other breaches.

Part I of this comment will address hacking of PHI. Part II will analyze the security measures that EHR vendors must currently incorporate into EHR technology and how the lack of required security measures impacts …


The Truth Behind Data Collection And Analysis, 32 J. Marshall J. Info. Tech. & Privacy L. 33 (2015), Morgan Hochheiser Jan 2015

The Truth Behind Data Collection And Analysis, 32 J. Marshall J. Info. Tech. & Privacy L. 33 (2015), Morgan Hochheiser

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Internet Of Things And Wearable Technology: Addressing Privacy And Security Concerns Without Derailing Innovation, Adam D. Thierer Jan 2015

The Internet Of Things And Wearable Technology: Addressing Privacy And Security Concerns Without Derailing Innovation, Adam D. Thierer

Richmond Journal of Law & Technology

The next great wave of Internet-enabled innovation has arrived, and it is poised to revolutionize the way humans interact with the world around them. This paper highlights some of the opportunities presented by the rise of the so-called Internet of Things (IoT) in general and wearable technology in particular and encourages policymakers to allow these technologies to develop in a relatively unabated fashion.