Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Selected Works (21)
- UIC School of Law (17)
- Schulich School of Law, Dalhousie University (11)
- The Catholic University of America, Columbus School of Law (4)
- Pace University (3)
-
- Loyola Marymount University and Loyola Law School (2)
- Seattle University School of Law (2)
- University of Maryland Francis King Carey School of Law (2)
- University of Richmond (2)
- Case Western Reserve University School of Law (1)
- Cleveland State University (1)
- Cornell University Law School (1)
- Fordham Law School (1)
- Georgetown University Law Center (1)
- Golden Gate University School of Law (1)
- Maurer School of Law: Indiana University (1)
- New York Law School (1)
- Pepperdine University (1)
- The Peter A. Allard School of Law (1)
- University of Michigan Law School (1)
- Valparaiso University (1)
- Vanderbilt University Law School (1)
- William & Mary Law School (1)
- Keyword
-
- Privacy (14)
- Internet (8)
- Social media (5)
- Big data (3)
- NSA (3)
-
- Privacy Law (3)
- Behavioral advertising (2)
- Choice (2)
- Cybersecurity (2)
- Data Privacy (2)
- Freedom of speech (2)
- Governance (2)
- ISP (2)
- International law (2)
- Internet Law (2)
- Law (2)
- Notice (2)
- Online tracking (2)
- Privacy law (2)
- Privacy policies (2)
- Self-regulation (2)
- Stored Communications Act (2)
- Twitter (2)
- 3D printing and intellectual property (1)
- ACLU v. Alvarez (1)
- Access (1)
- Account (1)
- All Other Telecommunications (1)
- Anonymity (1)
- Anonymous third-party (1)
- Publication
-
- UIC John Marshall Journal of Information Technology & Privacy Law (15)
- Canadian Journal of Law and Technology (9)
- David E. Sorkin (9)
- Catholic University Journal of Law and Technology (4)
- Ann M. Lousin (2)
-
- Articles, Book Chapters, & Popular Press (2)
- Faculty Scholarship (2)
- Pace Law Review (2)
- Richmond Journal of Law & Technology (2)
- Seattle University Law Review (2)
- UIC Law Review (2)
- Alberto Bernabe (1)
- Articles & Chapters (1)
- Cornell Law School J.D. Student Research Papers (1)
- Faculty Publications (1)
- GGU Law Review Blog (1)
- Georgetown Law Faculty Publications and Other Works (1)
- Homeland Security Publications (1)
- Indiana Law Journal (1)
- Journal of Law, Technology, & the Internet (1)
- Law Faculty Articles and Essays (1)
- Law Faculty Publications (1)
- Lorrie F Cranor (1)
- Loyola of Los Angeles Entertainment Law Review (1)
- Loyola of Los Angeles Law Review (1)
- Mark E. Wojcik (1)
- Pace Intellectual Property, Sports & Entertainment Law Forum (1)
- Pepperdine Law Review (1)
- Raizel Liebler (1)
- Robert Sprague (1)
- Publication Type
- File Type
Articles 61 - 78 of 78
Full-Text Articles in Privacy Law
The Right To Be Forgotten: A Step In The Right Direction For Cyberspace Law And Policy, Lyndsay Cook
The Right To Be Forgotten: A Step In The Right Direction For Cyberspace Law And Policy, Lyndsay Cook
Journal of Law, Technology, & the Internet
This comment examines a case referred to the Court of Justice of the European Union (“EU”) on “a Spanish citizen’s complaint against Google Spain and Google Inc.. arguing that an auction notice of his repossessed home on Google’s search results, violated his privacy rights because the repossession proceeding had been resolved long ago, and was no longer relevant. The EU court was asked to decide whether an individual has the right to request that his or her personal data be removed from accessibility via a search engine (‘the right to be forgotten’). In a landmark decision, the EU court held …
Merger And Acquisition Due Diligence: A Proposed Framework To Incorporate Data Privacy, Information Security, E-Discovery, And Information Governance Into Due Diligence Practices, James A. Sherer, Taylor M. Hoffman, Eugenio E. Ortiz
Merger And Acquisition Due Diligence: A Proposed Framework To Incorporate Data Privacy, Information Security, E-Discovery, And Information Governance Into Due Diligence Practices, James A. Sherer, Taylor M. Hoffman, Eugenio E. Ortiz
Richmond Journal of Law & Technology
Merger and Acquisition or “M&A” deals are both figuratively and literally big business, where the stakes for the organization are often the highest. While casual observers might expect that the importance attached to these deals makes each new deal the vanguard for incorporating metrics and practices regarding every efficiency and contingency, existing research demonstrates that this is decidedly not the case.
Amending Rape Shield Laws: Outdated Statutes Fail To Protect Victims On Social Media, 48 J. Marshall L. Rev. 1087 (2015), Sydney Janzen
Amending Rape Shield Laws: Outdated Statutes Fail To Protect Victims On Social Media, 48 J. Marshall L. Rev. 1087 (2015), Sydney Janzen
UIC Law Review
This Comment will first discuss the discoverability and admissibility of social media evidence in criminal and/or civil sexual assault cases. Section II(A) provides a broad overview of both federal and state rape shield laws, including the legislative policies behind their enactments, as well as the modern expansion of social media in the context of the legal system. Section II(B) will address the modern utility of social media in the context of the legal system. Section III first analyzes how courts look at discoverability and admissibility of social media evidence generally, and then focuses on sexual assault cases specifically. Further, Section …
Furtive Encryption: Power, Trusts, And The Constitutional Cost Of Collective Surveillance, Jeffrey L. Vagle
Furtive Encryption: Power, Trusts, And The Constitutional Cost Of Collective Surveillance, Jeffrey L. Vagle
Indiana Law Journal
Recent revelations of heretofore secret U.S. government surveillance programs have sparked national conversations about their constitutionality and the delicate balance between security and civil liberties in a constitutional democracy. Among the revealed policies asserted by the National Security Agency (NSA) is a provision found in the “minimization procedures” required under section 702 of the Foreign Intelligence Surveillance Act of 1978. This provision allows the NSA to collect and keep indefinitely any encrypted information collected from domestic communications—including the communications of U.S. citizens. That is, according to the U.S. government, the mere fact that a U.S. citizen has encrypted her electronic …
Who Is Reading Whom Now: Privacy In Education From Books To Moocs, Jules Polonetsky, Omer Tene
Who Is Reading Whom Now: Privacy In Education From Books To Moocs, Jules Polonetsky, Omer Tene
Vanderbilt Journal of Entertainment & Technology Law
This Article is the most comprehensive study to date of the policy issues and privacy concerns arising from the surge of ed tech innovation. It surveys the burgeoning market of ed tech solutions, which range from free Android and iPhone apps to comprehensive learning management systems and digitized curricula delivered via the Internet. It discusses the deployment of big data analytics by education institutions to enhance student performance, evaluate teachers, improve education techniques, customize programs, and better leverage scarce resources to optimize education results.
This Article seeks to untangle ed tech privacy concerns from the broader policy debates surrounding standardization, …
Dear Yahoo: A Comment On In Re Yahoo Mail Litigation, Nareen Melkonian
Dear Yahoo: A Comment On In Re Yahoo Mail Litigation, Nareen Melkonian
Loyola of Los Angeles Law Review
No abstract provided.
The Cycles Of Global Telecommunication Censorship And Surveillance, Jonathon Penney
The Cycles Of Global Telecommunication Censorship And Surveillance, Jonathon Penney
Articles, Book Chapters, & Popular Press
Internet censorship and surveillance is on the rise globally and cyber-warfare increasing in scope and intensity. To help understand these new threats commentators have grasped at historical analogies often with little regard for historical complexity or international perspective. Unfortunately, helpful new works on telecommunications history have focused primarily on U.S. history with little focus on international developments. There is thus a need for further internationally oriented investigation of telecommunications technologies, and their history. This essay attempts to help fill that void, drawing on case studies wherein global telecommunications technologies have been disrupted or censored — telegram censorship and surveillance, high …
An Introduction To The Intellectual Property Law Implications Of 3d Printing, Michael Rimock
An Introduction To The Intellectual Property Law Implications Of 3d Printing, Michael Rimock
Canadian Journal of Law and Technology
Put simply, 3D printing allows people to print physical objects that are scanned, downloaded, or created digitally. There are an astonishing number of uses, benefits, and advantages associated with 3D printing. However, as with any new technology with so much potential, 3D printing presents a number of threats and challenges to many who benefit from the way manufacturing currently operates. While 3D printers will likely have a tremendous economic and socio- cultural impact, the following will provide an overview of some of its implications relating to intellectual property law. I will begin by briefly discussing the history of 3D printing …
"Records Management Law" - A Necessary Major Field Of The Practice Of Law, Ken Chasse
"Records Management Law" - A Necessary Major Field Of The Practice Of Law, Ken Chasse
Canadian Journal of Law and Technology
‘‘Records management law” will be a necessary area of specialization because: (1) electronic records are now produced by most commercial, communication, transmission of data, and social, formal, and semi-formal interactions; (2) therefore they are the foundation of many kinds of legislation; (3) records are the most frequently used kind of evidence in legal proceedings; and, (4) electronic records are as important to daily living as are motor vehicles, and will become more important. But the legal infrastructure of statutes, guidelines, and case law that controls the use of electronic records as evidence is very inadequate because it ignores these facts: …
Technological Neutrality Explained & Applied To Cbc V. Sodrac, Cameron J. Hutchison
Technological Neutrality Explained & Applied To Cbc V. Sodrac, Cameron J. Hutchison
Canadian Journal of Law and Technology
This article explores technological neutrality in the factual context of CBC v. SODRAC, heard before the Supreme Court of Canada in March of 2015 with decision pending at the time of publication. After outlining the history of the case in the first part, this article concludes with an application of the principle of technological neutrality, as non-interference, to the case. The only result coherent with the Supreme Court’s prior case law is to not treat non-usable or dormant incidental copies as reproductions under the Act. The status of permanent copies that serve a useful and identifiable purpose, e.g. archived copies, …
Signing Your Next Deal With Your Twitter @Username: The Legal Uses Of Identity-Based Cryptography, Jillian Friedman
Signing Your Next Deal With Your Twitter @Username: The Legal Uses Of Identity-Based Cryptography, Jillian Friedman
Canadian Journal of Law and Technology
This article will look at the legal framework for electronic signatures under Canadian law and through the UNCITRAL Model Law on Electronic Signatures and evaluate the potential use of identity-based cryptography as a type of electronic signature. While most jurisdictions permit electronic signatures to replace their handwritten predecessors, the criteria of validity for an electronic signature range from liberal to restrictive. Public key infrastructure (PKI) cryptography schemes are considered to meet the juridical conditions of a legal signature under more rigorous legislation that requires an electronic signature to possess certain security attributes. In common law jurisdictions, digital signature schemes such …
Law As An Ally Or Enemy In The War On Cyberbullying: Exploring The Contested Terrain Of Privacy And Other Legal Concepts In The Age Of Technology And Social Media, A. Wayne Mackay
Articles, Book Chapters, & Popular Press
This article focuses on the role and limits of law as a response to cyberbullying. The problem of cyberbullying engages many of our most fundamental legal concepts and provides an interesting case study. Even when there is general agreement that the problem merits a legal response, there are significant debates about what that response should be. Which level and what branch of government can and should best respond? What is the most appropriate legal process for pursuing cyberbullies—traditional legal avenues or more creative restorative approaches? How should the rights and responsibilities of perpetrators, victims and even bystanders be balanced? Among …
Can A One-Star Review Get You Sued? The Right To Anonymous Speech On The Internet And The Future Of Internet “Unmasking” Statutes, 48 J. Marshall L. Rev. 693 (2015), Jesse Lively
UIC Law Review
No abstract provided.
Disagreeable Privacy Policies: Mismatches Between Meaning And Users’ Understanding, Joel R. Reidenberg, Travis Breaux, Lorrie F. Cranor, Brian M. French, Amanda Grannis, James T. Graves, Fei Liu, Aleecia Mcdonald, Thomas B. Norton, Rohan Ramanath, N. Cameron Russell, Norman Sadeh, Florian Schaub
Disagreeable Privacy Policies: Mismatches Between Meaning And Users’ Understanding, Joel R. Reidenberg, Travis Breaux, Lorrie F. Cranor, Brian M. French, Amanda Grannis, James T. Graves, Fei Liu, Aleecia Mcdonald, Thomas B. Norton, Rohan Ramanath, N. Cameron Russell, Norman Sadeh, Florian Schaub
Faculty Scholarship
Privacy policies are verbose, difficult to understand, take too long to read, and may be the least-read items on most websites even as users express growing concerns about information collection practices. For all their faults, though, privacy policies remain the single most important source of information for users to attempt to learn how companies collect, use, and share data. Likewise, these policies form the basis for the self-regulatory notice and choice framework that is designed and promoted as a replacement for regulation. The underlying value and legitimacy of notice and choice depends, however, on the ability of users to understand …
Privacy As Trust: Sharing Personal Information In A Networked World, Ari Ezra Waldman
Privacy As Trust: Sharing Personal Information In A Networked World, Ari Ezra Waldman
Articles & Chapters
This Article is the first in a series on the legal and sociological aspects of privacy, arguing that private contexts are defined by relationships of trust among individuals. The argument reorients privacy scholarship from an individual right to social relationships of disclosure. This has implications for a wide variety of vexing problems of modern privacy law, from limited disclosures to “revenge porn.”
The common everyday understanding is that privacy is about choice, autonomy, and individual freedom. It encompasses the individual’s right to determine what he will keep hidden and what, how, and when he will disclose to the public. Privacy …
The Dawn Of Social Intelligence (Socint), Laura K. Donohue
The Dawn Of Social Intelligence (Socint), Laura K. Donohue
Georgetown Law Faculty Publications and Other Works
More information about citizens’ lives is recorded than ever before. Because the data is digitized, it can be accessed, analyzed, shared, and combined with other information to generate new knowledge. In a post-9/11 environment, the legal standards impeding access to such data have fallen. Simultaneously, the advent of global communications and cloud computing, along with network convergence, have expanded the scope of information available. The U.S. government has begun to collect and to analyze the associated data.
The result is the emergence of what can be termed “social intelligence” (SOCINT), which this Article defines as the collection of digital data …
Introduction À Quelques Aspects Du Droit Américain, W. Gregory Voss
Introduction À Quelques Aspects Du Droit Américain, W. Gregory Voss
W. Gregory Voss
This is an introduction (in French) to my contributions on U.S. law for the workshop -- "Les défis du numérique dans l'entreprise en Europe" ("The Challenges of Digital Technologies in Europe") held at the Toulouse Business School on February 27, 2015. One of my contributions, which is unpublished -- "Les conditions générales d’utilisation des sites web soumis au droit américain et quelques protections pour les consommateurs" -- is available on this website. Another -- "Les données personnelles dans l'entreprise vues au travers du prisme du droit américain" -- was published in the October 2015 issue of the Revue Lamy Droit …
Information Superhighway Patrol, Raizel Liebler