Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Internet Law

2015

Institution
Keyword
Publication
Publication Type
File Type

Articles 61 - 78 of 78

Full-Text Articles in Privacy Law

The Right To Be Forgotten: A Step In The Right Direction For Cyberspace Law And Policy, Lyndsay Cook Jan 2015

The Right To Be Forgotten: A Step In The Right Direction For Cyberspace Law And Policy, Lyndsay Cook

Journal of Law, Technology, & the Internet

This comment examines a case referred to the Court of Justice of the European Union (“EU”) on “a Spanish citizen’s complaint against Google Spain and Google Inc.. arguing that an auction notice of his repossessed home on Google’s search results, violated his privacy rights because the repossession proceeding had been resolved long ago, and was no longer relevant. The EU court was asked to decide whether an individual has the right to request that his or her personal data be removed from accessibility via a search engine (‘the right to be forgotten’). In a landmark decision, the EU court held …


Merger And Acquisition Due Diligence: A Proposed Framework To Incorporate Data Privacy, Information Security, E-Discovery, And Information Governance Into Due Diligence Practices, James A. Sherer, Taylor M. Hoffman, Eugenio E. Ortiz Jan 2015

Merger And Acquisition Due Diligence: A Proposed Framework To Incorporate Data Privacy, Information Security, E-Discovery, And Information Governance Into Due Diligence Practices, James A. Sherer, Taylor M. Hoffman, Eugenio E. Ortiz

Richmond Journal of Law & Technology

Merger and Acquisition or “M&A” deals are both figuratively and literally big business, where the stakes for the organization are often the highest. While casual observers might expect that the importance attached to these deals makes each new deal the vanguard for incorporating metrics and practices regarding every efficiency and contingency, existing research demonstrates that this is decidedly not the case.


Amending Rape Shield Laws: Outdated Statutes Fail To Protect Victims On Social Media, 48 J. Marshall L. Rev. 1087 (2015), Sydney Janzen Jan 2015

Amending Rape Shield Laws: Outdated Statutes Fail To Protect Victims On Social Media, 48 J. Marshall L. Rev. 1087 (2015), Sydney Janzen

UIC Law Review

This Comment will first discuss the discoverability and admissibility of social media evidence in criminal and/or civil sexual assault cases. Section II(A) provides a broad overview of both federal and state rape shield laws, including the legislative policies behind their enactments, as well as the modern expansion of social media in the context of the legal system. Section II(B) will address the modern utility of social media in the context of the legal system. Section III first analyzes how courts look at discoverability and admissibility of social media evidence generally, and then focuses on sexual assault cases specifically. Further, Section …


Furtive Encryption: Power, Trusts, And The Constitutional Cost Of Collective Surveillance, Jeffrey L. Vagle Jan 2015

Furtive Encryption: Power, Trusts, And The Constitutional Cost Of Collective Surveillance, Jeffrey L. Vagle

Indiana Law Journal

Recent revelations of heretofore secret U.S. government surveillance programs have sparked national conversations about their constitutionality and the delicate balance between security and civil liberties in a constitutional democracy. Among the revealed policies asserted by the National Security Agency (NSA) is a provision found in the “minimization procedures” required under section 702 of the Foreign Intelligence Surveillance Act of 1978. This provision allows the NSA to collect and keep indefinitely any encrypted information collected from domestic communications—including the communications of U.S. citizens. That is, according to the U.S. government, the mere fact that a U.S. citizen has encrypted her electronic …


Who Is Reading Whom Now: Privacy In Education From Books To Moocs, Jules Polonetsky, Omer Tene Jan 2015

Who Is Reading Whom Now: Privacy In Education From Books To Moocs, Jules Polonetsky, Omer Tene

Vanderbilt Journal of Entertainment & Technology Law

This Article is the most comprehensive study to date of the policy issues and privacy concerns arising from the surge of ed tech innovation. It surveys the burgeoning market of ed tech solutions, which range from free Android and iPhone apps to comprehensive learning management systems and digitized curricula delivered via the Internet. It discusses the deployment of big data analytics by education institutions to enhance student performance, evaluate teachers, improve education techniques, customize programs, and better leverage scarce resources to optimize education results.

This Article seeks to untangle ed tech privacy concerns from the broader policy debates surrounding standardization, …


Dear Yahoo: A Comment On In Re Yahoo Mail Litigation, Nareen Melkonian Jan 2015

Dear Yahoo: A Comment On In Re Yahoo Mail Litigation, Nareen Melkonian

Loyola of Los Angeles Law Review

No abstract provided.


The Cycles Of Global Telecommunication Censorship And Surveillance, Jonathon Penney Jan 2015

The Cycles Of Global Telecommunication Censorship And Surveillance, Jonathon Penney

Articles, Book Chapters, & Popular Press

Internet censorship and surveillance is on the rise globally and cyber-warfare increasing in scope and intensity. To help understand these new threats commentators have grasped at historical analogies often with little regard for historical complexity or international perspective. Unfortunately, helpful new works on telecommunications history have focused primarily on U.S. history with little focus on international developments. There is thus a need for further internationally oriented investigation of telecommunications technologies, and their history. This essay attempts to help fill that void, drawing on case studies wherein global telecommunications technologies have been disrupted or censored — telegram censorship and surveillance, high …


An Introduction To The Intellectual Property Law Implications Of 3d Printing, Michael Rimock Jan 2015

An Introduction To The Intellectual Property Law Implications Of 3d Printing, Michael Rimock

Canadian Journal of Law and Technology

Put simply, 3D printing allows people to print physical objects that are scanned, downloaded, or created digitally. There are an astonishing number of uses, benefits, and advantages associated with 3D printing. However, as with any new technology with so much potential, 3D printing presents a number of threats and challenges to many who benefit from the way manufacturing currently operates. While 3D printers will likely have a tremendous economic and socio- cultural impact, the following will provide an overview of some of its implications relating to intellectual property law. I will begin by briefly discussing the history of 3D printing …


"Records Management Law" - A Necessary Major Field Of The Practice Of Law, Ken Chasse Jan 2015

"Records Management Law" - A Necessary Major Field Of The Practice Of Law, Ken Chasse

Canadian Journal of Law and Technology

‘‘Records management law” will be a necessary area of specialization because: (1) electronic records are now produced by most commercial, communication, transmission of data, and social, formal, and semi-formal interactions; (2) therefore they are the foundation of many kinds of legislation; (3) records are the most frequently used kind of evidence in legal proceedings; and, (4) electronic records are as important to daily living as are motor vehicles, and will become more important. But the legal infrastructure of statutes, guidelines, and case law that controls the use of electronic records as evidence is very inadequate because it ignores these facts: …


Technological Neutrality Explained & Applied To Cbc V. Sodrac, Cameron J. Hutchison Jan 2015

Technological Neutrality Explained & Applied To Cbc V. Sodrac, Cameron J. Hutchison

Canadian Journal of Law and Technology

This article explores technological neutrality in the factual context of CBC v. SODRAC, heard before the Supreme Court of Canada in March of 2015 with decision pending at the time of publication. After outlining the history of the case in the first part, this article concludes with an application of the principle of technological neutrality, as non-interference, to the case. The only result coherent with the Supreme Court’s prior case law is to not treat non-usable or dormant incidental copies as reproductions under the Act. The status of permanent copies that serve a useful and identifiable purpose, e.g. archived copies, …


Signing Your Next Deal With Your Twitter @Username: The Legal Uses Of Identity-Based Cryptography, Jillian Friedman Jan 2015

Signing Your Next Deal With Your Twitter @Username: The Legal Uses Of Identity-Based Cryptography, Jillian Friedman

Canadian Journal of Law and Technology

This article will look at the legal framework for electronic signatures under Canadian law and through the UNCITRAL Model Law on Electronic Signatures and evaluate the potential use of identity-based cryptography as a type of electronic signature. While most jurisdictions permit electronic signatures to replace their handwritten predecessors, the criteria of validity for an electronic signature range from liberal to restrictive. Public key infrastructure (PKI) cryptography schemes are considered to meet the juridical conditions of a legal signature under more rigorous legislation that requires an electronic signature to possess certain security attributes. In common law jurisdictions, digital signature schemes such …


Law As An Ally Or Enemy In The War On Cyberbullying: Exploring The Contested Terrain Of Privacy And Other Legal Concepts In The Age Of Technology And Social Media, A. Wayne Mackay Jan 2015

Law As An Ally Or Enemy In The War On Cyberbullying: Exploring The Contested Terrain Of Privacy And Other Legal Concepts In The Age Of Technology And Social Media, A. Wayne Mackay

Articles, Book Chapters, & Popular Press

This article focuses on the role and limits of law as a response to cyberbullying. The problem of cyberbullying engages many of our most fundamental legal concepts and provides an interesting case study. Even when there is general agreement that the problem merits a legal response, there are significant debates about what that response should be. Which level and what branch of government can and should best respond? What is the most appropriate legal process for pursuing cyberbullies—traditional legal avenues or more creative restorative approaches? How should the rights and responsibilities of perpetrators, victims and even bystanders be balanced? Among …


Can A One-Star Review Get You Sued? The Right To Anonymous Speech On The Internet And The Future Of Internet “Unmasking” Statutes, 48 J. Marshall L. Rev. 693 (2015), Jesse Lively Jan 2015

Can A One-Star Review Get You Sued? The Right To Anonymous Speech On The Internet And The Future Of Internet “Unmasking” Statutes, 48 J. Marshall L. Rev. 693 (2015), Jesse Lively

UIC Law Review

No abstract provided.


Disagreeable Privacy Policies: Mismatches Between Meaning And Users’ Understanding, Joel R. Reidenberg, Travis Breaux, Lorrie F. Cranor, Brian M. French, Amanda Grannis, James T. Graves, Fei Liu, Aleecia Mcdonald, Thomas B. Norton, Rohan Ramanath, N. Cameron Russell, Norman Sadeh, Florian Schaub Jan 2015

Disagreeable Privacy Policies: Mismatches Between Meaning And Users’ Understanding, Joel R. Reidenberg, Travis Breaux, Lorrie F. Cranor, Brian M. French, Amanda Grannis, James T. Graves, Fei Liu, Aleecia Mcdonald, Thomas B. Norton, Rohan Ramanath, N. Cameron Russell, Norman Sadeh, Florian Schaub

Faculty Scholarship

Privacy policies are verbose, difficult to understand, take too long to read, and may be the least-read items on most websites even as users express growing concerns about information collection practices. For all their faults, though, privacy policies remain the single most important source of information for users to attempt to learn how companies collect, use, and share data. Likewise, these policies form the basis for the self-regulatory notice and choice framework that is designed and promoted as a replacement for regulation. The underlying value and legitimacy of notice and choice depends, however, on the ability of users to understand …


Privacy As Trust: Sharing Personal Information In A Networked World, Ari Ezra Waldman Jan 2015

Privacy As Trust: Sharing Personal Information In A Networked World, Ari Ezra Waldman

Articles & Chapters

This Article is the first in a series on the legal and sociological aspects of privacy, arguing that private contexts are defined by relationships of trust among individuals. The argument reorients privacy scholarship from an individual right to social relationships of disclosure. This has implications for a wide variety of vexing problems of modern privacy law, from limited disclosures to “revenge porn.”

The common everyday understanding is that privacy is about choice, autonomy, and individual freedom. It encompasses the individual’s right to determine what he will keep hidden and what, how, and when he will disclose to the public. Privacy …


The Dawn Of Social Intelligence (Socint), Laura K. Donohue Jan 2015

The Dawn Of Social Intelligence (Socint), Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

More information about citizens’ lives is recorded than ever before. Because the data is digitized, it can be accessed, analyzed, shared, and combined with other information to generate new knowledge. In a post-9/‌11 environment, the legal standards impeding access to such data have fallen. Simultaneously, the advent of global communications and cloud computing, along with network convergence, have expanded the scope of information available. The U.S. government has begun to collect and to analyze the associated data.

The result is the emergence of what can be termed “social intelligence” (SOCINT), which this Article defines as the collection of digital data …


Introduction À Quelques Aspects Du Droit Américain, W. Gregory Voss Dec 2014

Introduction À Quelques Aspects Du Droit Américain, W. Gregory Voss

W. Gregory Voss

This is an introduction (in French) to my contributions on U.S. law for the workshop -- "Les défis du numérique dans l'entreprise en Europe" ("The Challenges of Digital Technologies in Europe") held at the Toulouse Business School on February 27, 2015. One of my contributions, which is unpublished -- "Les conditions générales d’utilisation des sites web soumis au droit américain et quelques protections pour les consommateurs" -- is available on this website. Another -- "Les données personnelles dans l'entreprise vues au travers du prisme du droit américain" -- was published in the October 2015 issue of the Revue Lamy Droit …


Information Superhighway Patrol, Raizel Liebler Dec 2014

Information Superhighway Patrol, Raizel Liebler

Raizel Liebler

Mary Anne Franks discusses some of the legal points of regulating cyber harassment and why it's important to have real protection in the "virtual" world.