Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 19 of 19
Full-Text Articles in Privacy Law
The Thirty-Third Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 31 J. Marshall J. Computer & Info. L. 237 (2014), Adam Florek, Anisha Mehta, Danielle Young, Michael Greene
The Thirty-Third Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 31 J. Marshall J. Computer & Info. L. 237 (2014), Adam Florek, Anisha Mehta, Danielle Young, Michael Greene
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Thirty-Third Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 31 J. Marshall J. Computer & Info. L. 251 (2014), Amany Awad, Kelly O'Neill, Arlo Walsman
The Thirty-Third Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 31 J. Marshall J. Computer & Info. L. 251 (2014), Amany Awad, Kelly O'Neill, Arlo Walsman
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Thirty-Third Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 31 J. Marshall J. Computer & Info. L. 285 (2014), Sara Schroeder, Austin Hoffman, Becky Fey
The Thirty-Third Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 31 J. Marshall J. Computer & Info. L. 285 (2014), Sara Schroeder, Austin Hoffman, Becky Fey
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Emerging Reality Of Social Media: Erosion Of Individual Privacy Through Cyber-Vetting And Law’S Inability To Catch Up, 12 J. Marshall Rev. Intell. Prop. L. 551 (2013), Saby Ghoshray
UIC Review of Intellectual Property Law
The rise of social media means that data about a large number of people is available in public and quasi-public digital locations. Employers, keen on taking advantage of this additional data to decrease the risk associated with an offer of employment, are engaging in “cyber-vetting”—non-consenting social media searches conducted by third parties or the employers themselves. To the extent that current law applies to this practice, the regulation it provides is weak and attacks only part of the problem. Left unchecked, cyber-vetting has the potential to fundamentally alter the scope of prospective employees’ rights. This article surveys the legal and …
May An Employer Require Employees To Wear “Genes” In The Workplace? An Exploration Of Title Ii Of The Genetic Information Nondiscrimination Act Of 2008, 26 J. Marshall J. Computer & Info. L. 501 (2009), Erin Murphy Hillstrom
May An Employer Require Employees To Wear “Genes” In The Workplace? An Exploration Of Title Ii Of The Genetic Information Nondiscrimination Act Of 2008, 26 J. Marshall J. Computer & Info. L. 501 (2009), Erin Murphy Hillstrom
UIC John Marshall Journal of Information Technology & Privacy Law
The comment first provides a brief discussion of genetics and genetic testing. Section II provides a basic introduction to genetics, genetic testing, and genetic discrimination. Additionally, Section II provides a brief overview of current federal laws that address genetic discrimination in the workplace. Finally, Section II also examines the major employment provisions of the Genetic Information Nondiscrimination Act of 2008 ("GINA"). Section III of the comment examines whether there was a need for GINA, and argues that GINA will not have the full effect intended by Congress. The major sources of litigation under GINA are then reviewed based on the …
Is The Door Open Or Closed? Evaluating The Future Of The Federal Medical Peer-Review Privilege, 42 J. Marshall L. Rev. 561 (2009), Ghazal Sharifi
Is The Door Open Or Closed? Evaluating The Future Of The Federal Medical Peer-Review Privilege, 42 J. Marshall L. Rev. 561 (2009), Ghazal Sharifi
UIC Law Review
No abstract provided.
Orwell Was An Optimist: The Evolution Of Privacy In The United States And Its De-Evolution For American Employees, 42 J. Marshall L. Rev. 83 (2008), Robert Sprague
UIC Law Review
No abstract provided.
Ict And Employer-Employee Power Dynamics: A Comparative Perspective Of United States' And Netherlands' Workplace Privacy In Light Of Information And Computer Technology Monitoring And Positioning Of Employees, 25 J. Marshall J. Computer & Info. L. 37 (2007), Colette Cuijpers
UIC John Marshall Journal of Information Technology & Privacy Law
Employees can cause harm to their employers through Information and Computer Technology (ICT) in employment relationships; for example, through surfing for adult material on the Internet or leaking company secrets via a mobile phone. Employers have responded to this development by introducing various surveillance systems. Besides well-known forms of Internet and e-mail surveillance, positioning systems are becoming a new trend. The influence these systems have on the employment relationship can be far-reaching, as they offer the employer an insight into the employee’s whereabouts, outside the company premises as well as outside company hours. As a consequence, the boundaries between the …
From Taylorism To The Omnipticon: Expanding Employee Surveillance Beyond The Workplace, 25 J. Marshall J. Computer & Info. L. 1 (2007), Robert D. Sprague
From Taylorism To The Omnipticon: Expanding Employee Surveillance Beyond The Workplace, 25 J. Marshall J. Computer & Info. L. 1 (2007), Robert D. Sprague
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
In The Service Of Secrets: The U.S. Supreme Court Revisits Totten, 39 J. Marshall L. Rev. 475 (2006), Douglas Kash, Matthew Indrisano
In The Service Of Secrets: The U.S. Supreme Court Revisits Totten, 39 J. Marshall L. Rev. 475 (2006), Douglas Kash, Matthew Indrisano
UIC Law Review
No abstract provided.
If You Love Me Dear, Please Sign Here: Will The "Love Contract" Play A Role In Protecting Employers From Sexual Harassment Liability?, 40 J. Marshall L. Rev. 311 (2006), Jessica Lynn Mok O'Neill
If You Love Me Dear, Please Sign Here: Will The "Love Contract" Play A Role In Protecting Employers From Sexual Harassment Liability?, 40 J. Marshall L. Rev. 311 (2006), Jessica Lynn Mok O'Neill
UIC Law Review
No abstract provided.
To: Client@Workplace.Com: Privilege At Risk?, 23 J. Marshall J. Computer & Info. L. 75 (2004), Dion Messer
To: Client@Workplace.Com: Privilege At Risk?, 23 J. Marshall J. Computer & Info. L. 75 (2004), Dion Messer
UIC John Marshall Journal of Information Technology & Privacy Law
As more attorneys now days use the e-mail as their primary source of communication with their clients, new issues arise regarding the potential threat to attorney-client communication privilege resulting from the standard and systematic employer monitoring of their employees e-mails. Indeed employers monitor their employees’ computer use and in some cases terminate employees as result of this monitoring, for various reasons such as to increase of employee productivity and efficiency, protect their public image, prevent workplace harassment, protect their Intellectual Property assets and their network capacity. Given the systematic workplace monitoring but also the fact that contrary to the American …
A Further Darkside To Unsolicited Commercial E-Mail? An Assessment Of Potential Employer Liability For Spam E-Mail, 22 J. Marshall J. Computer & Info. L. 179 (2003), Ben Dahl
UIC John Marshall Journal of Information Technology & Privacy Law
This article looks at employer liability for pornographic spam in the workplace. It begins with an analysis of the risks and unique problems posed by employees’ Internet use while at work. The article makes note of some trouble areas where employers may be held vicariously liable for sexual harassment. It is suggested that employers protect themselves by taking steps to: 1) reduce the prevalence of unsolicited commercial e-mail in the workplace; 2) mute the potential harm of offensive e-mail; and 3) create a paper trail indicating diligence in the fight to protect employees. Employers may reach these goals by the …
Robert Kratovil Memorial Seminar In Construction Law - Multidisciplinary Practice: A Construction Law Perspective, 33 J. Marshall L. Rev. 413 (2000), Christopher L. Noble
Robert Kratovil Memorial Seminar In Construction Law - Multidisciplinary Practice: A Construction Law Perspective, 33 J. Marshall L. Rev. 413 (2000), Christopher L. Noble
UIC Law Review
No abstract provided.
Who Owns The Web Site?: The Ultimate Question When A Hiring Party Has A Falling-Out With The Web Site Designer, 16 J. Marshall J. Computer & Info. L. 857 (1998), Rinaldo Del Gallo Iii
Who Owns The Web Site?: The Ultimate Question When A Hiring Party Has A Falling-Out With The Web Site Designer, 16 J. Marshall J. Computer & Info. L. 857 (1998), Rinaldo Del Gallo Iii
UIC John Marshall Journal of Information Technology & Privacy Law
The question is "Who owns your web site?" This question is difficult to answer absent a copyright assignment clause since no one knows who the owner of the web site is under current law. There are several problems that occur when a web designer is placed in a position against the hiring party in determining ownership rights to a web site. It is important to distinguish ownership rights to a web site, since most contractual agreements between a web site designer and a hiring party do not address this issue. Every day, hundreds of new web sites are appearing and …
Watch Your E-Mail - Employee E-Mail Monitoring And Privacy Law In The Age Of The Electronic Sweatshop, 28 J. Marshall L. Rev. 139 (1994), Laurie Thomas Lee
Watch Your E-Mail - Employee E-Mail Monitoring And Privacy Law In The Age Of The Electronic Sweatshop, 28 J. Marshall L. Rev. 139 (1994), Laurie Thomas Lee
UIC Law Review
No abstract provided.
Privacy: The Workplace Issue Of The '90s, 23 J. Marshall L. Rev. 591 (1990), David F. Linowes, Ray C. Spencer
Privacy: The Workplace Issue Of The '90s, 23 J. Marshall L. Rev. 591 (1990), David F. Linowes, Ray C. Spencer
UIC Law Review
No abstract provided.
That's No Beep, That's My Boss: Congress Seeks To Disconnect The Secrecy Of Telephone Monitoring In The Workplace, 21 J. Marshall L. Rev. 881 (1988), Connie Barba
UIC Law Review
No abstract provided.
Bench Memorandum, 21 J. Marshall L. Rev. 940 (1988), Mark A. Absher
Bench Memorandum, 21 J. Marshall L. Rev. 940 (1988), Mark A. Absher
UIC Law Review
No abstract provided.