Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 19 of 19

Full-Text Articles in Privacy Law

The Thirty-Third Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 31 J. Marshall J. Computer & Info. L. 237 (2014), Adam Florek, Anisha Mehta, Danielle Young, Michael Greene Jan 2014

The Thirty-Third Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 31 J. Marshall J. Computer & Info. L. 237 (2014), Adam Florek, Anisha Mehta, Danielle Young, Michael Greene

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Thirty-Third Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 31 J. Marshall J. Computer & Info. L. 251 (2014), Amany Awad, Kelly O'Neill, Arlo Walsman Jan 2014

The Thirty-Third Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 31 J. Marshall J. Computer & Info. L. 251 (2014), Amany Awad, Kelly O'Neill, Arlo Walsman

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Thirty-Third Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 31 J. Marshall J. Computer & Info. L. 285 (2014), Sara Schroeder, Austin Hoffman, Becky Fey Jan 2014

The Thirty-Third Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 31 J. Marshall J. Computer & Info. L. 285 (2014), Sara Schroeder, Austin Hoffman, Becky Fey

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Emerging Reality Of Social Media: Erosion Of Individual Privacy Through Cyber-Vetting And Law’S Inability To Catch Up, 12 J. Marshall Rev. Intell. Prop. L. 551 (2013), Saby Ghoshray Jan 2013

The Emerging Reality Of Social Media: Erosion Of Individual Privacy Through Cyber-Vetting And Law’S Inability To Catch Up, 12 J. Marshall Rev. Intell. Prop. L. 551 (2013), Saby Ghoshray

UIC Review of Intellectual Property Law

The rise of social media means that data about a large number of people is available in public and quasi-public digital locations. Employers, keen on taking advantage of this additional data to decrease the risk associated with an offer of employment, are engaging in “cyber-vetting”—non-consenting social media searches conducted by third parties or the employers themselves. To the extent that current law applies to this practice, the regulation it provides is weak and attacks only part of the problem. Left unchecked, cyber-vetting has the potential to fundamentally alter the scope of prospective employees’ rights. This article surveys the legal and …


May An Employer Require Employees To Wear “Genes” In The Workplace? An Exploration Of Title Ii Of The Genetic Information Nondiscrimination Act Of 2008, 26 J. Marshall J. Computer & Info. L. 501 (2009), Erin Murphy Hillstrom Jan 2009

May An Employer Require Employees To Wear “Genes” In The Workplace? An Exploration Of Title Ii Of The Genetic Information Nondiscrimination Act Of 2008, 26 J. Marshall J. Computer & Info. L. 501 (2009), Erin Murphy Hillstrom

UIC John Marshall Journal of Information Technology & Privacy Law

The comment first provides a brief discussion of genetics and genetic testing. Section II provides a basic introduction to genetics, genetic testing, and genetic discrimination. Additionally, Section II provides a brief overview of current federal laws that address genetic discrimination in the workplace. Finally, Section II also examines the major employment provisions of the Genetic Information Nondiscrimination Act of 2008 ("GINA"). Section III of the comment examines whether there was a need for GINA, and argues that GINA will not have the full effect intended by Congress. The major sources of litigation under GINA are then reviewed based on the …


Is The Door Open Or Closed? Evaluating The Future Of The Federal Medical Peer-Review Privilege, 42 J. Marshall L. Rev. 561 (2009), Ghazal Sharifi Jan 2009

Is The Door Open Or Closed? Evaluating The Future Of The Federal Medical Peer-Review Privilege, 42 J. Marshall L. Rev. 561 (2009), Ghazal Sharifi

UIC Law Review

No abstract provided.


Orwell Was An Optimist: The Evolution Of Privacy In The United States And Its De-Evolution For American Employees, 42 J. Marshall L. Rev. 83 (2008), Robert Sprague Jan 2008

Orwell Was An Optimist: The Evolution Of Privacy In The United States And Its De-Evolution For American Employees, 42 J. Marshall L. Rev. 83 (2008), Robert Sprague

UIC Law Review

No abstract provided.


Ict And Employer-Employee Power Dynamics: A Comparative Perspective Of United States' And Netherlands' Workplace Privacy In Light Of Information And Computer Technology Monitoring And Positioning Of Employees, 25 J. Marshall J. Computer & Info. L. 37 (2007), Colette Cuijpers Jan 2007

Ict And Employer-Employee Power Dynamics: A Comparative Perspective Of United States' And Netherlands' Workplace Privacy In Light Of Information And Computer Technology Monitoring And Positioning Of Employees, 25 J. Marshall J. Computer & Info. L. 37 (2007), Colette Cuijpers

UIC John Marshall Journal of Information Technology & Privacy Law

Employees can cause harm to their employers through Information and Computer Technology (ICT) in employment relationships; for example, through surfing for adult material on the Internet or leaking company secrets via a mobile phone. Employers have responded to this development by introducing various surveillance systems. Besides well-known forms of Internet and e-mail surveillance, positioning systems are becoming a new trend. The influence these systems have on the employment relationship can be far-reaching, as they offer the employer an insight into the employee’s whereabouts, outside the company premises as well as outside company hours. As a consequence, the boundaries between the …


From Taylorism To The Omnipticon: Expanding Employee Surveillance Beyond The Workplace, 25 J. Marshall J. Computer & Info. L. 1 (2007), Robert D. Sprague Jan 2007

From Taylorism To The Omnipticon: Expanding Employee Surveillance Beyond The Workplace, 25 J. Marshall J. Computer & Info. L. 1 (2007), Robert D. Sprague

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


In The Service Of Secrets: The U.S. Supreme Court Revisits Totten, 39 J. Marshall L. Rev. 475 (2006), Douglas Kash, Matthew Indrisano Jan 2006

In The Service Of Secrets: The U.S. Supreme Court Revisits Totten, 39 J. Marshall L. Rev. 475 (2006), Douglas Kash, Matthew Indrisano

UIC Law Review

No abstract provided.


If You Love Me Dear, Please Sign Here: Will The "Love Contract" Play A Role In Protecting Employers From Sexual Harassment Liability?, 40 J. Marshall L. Rev. 311 (2006), Jessica Lynn Mok O'Neill Jan 2006

If You Love Me Dear, Please Sign Here: Will The "Love Contract" Play A Role In Protecting Employers From Sexual Harassment Liability?, 40 J. Marshall L. Rev. 311 (2006), Jessica Lynn Mok O'Neill

UIC Law Review

No abstract provided.


To: Client@Workplace.Com: Privilege At Risk?, 23 J. Marshall J. Computer & Info. L. 75 (2004), Dion Messer Jan 2004

To: Client@Workplace.Com: Privilege At Risk?, 23 J. Marshall J. Computer & Info. L. 75 (2004), Dion Messer

UIC John Marshall Journal of Information Technology & Privacy Law

As more attorneys now days use the e-mail as their primary source of communication with their clients, new issues arise regarding the potential threat to attorney-client communication privilege resulting from the standard and systematic employer monitoring of their employees e-mails. Indeed employers monitor their employees’ computer use and in some cases terminate employees as result of this monitoring, for various reasons such as to increase of employee productivity and efficiency, protect their public image, prevent workplace harassment, protect their Intellectual Property assets and their network capacity. Given the systematic workplace monitoring but also the fact that contrary to the American …


A Further Darkside To Unsolicited Commercial E-Mail? An Assessment Of Potential Employer Liability For Spam E-Mail, 22 J. Marshall J. Computer & Info. L. 179 (2003), Ben Dahl Jan 2003

A Further Darkside To Unsolicited Commercial E-Mail? An Assessment Of Potential Employer Liability For Spam E-Mail, 22 J. Marshall J. Computer & Info. L. 179 (2003), Ben Dahl

UIC John Marshall Journal of Information Technology & Privacy Law

This article looks at employer liability for pornographic spam in the workplace. It begins with an analysis of the risks and unique problems posed by employees’ Internet use while at work. The article makes note of some trouble areas where employers may be held vicariously liable for sexual harassment. It is suggested that employers protect themselves by taking steps to: 1) reduce the prevalence of unsolicited commercial e-mail in the workplace; 2) mute the potential harm of offensive e-mail; and 3) create a paper trail indicating diligence in the fight to protect employees. Employers may reach these goals by the …


Robert Kratovil Memorial Seminar In Construction Law - Multidisciplinary Practice: A Construction Law Perspective, 33 J. Marshall L. Rev. 413 (2000), Christopher L. Noble Jan 2000

Robert Kratovil Memorial Seminar In Construction Law - Multidisciplinary Practice: A Construction Law Perspective, 33 J. Marshall L. Rev. 413 (2000), Christopher L. Noble

UIC Law Review

No abstract provided.


Who Owns The Web Site?: The Ultimate Question When A Hiring Party Has A Falling-Out With The Web Site Designer, 16 J. Marshall J. Computer & Info. L. 857 (1998), Rinaldo Del Gallo Iii Jan 1998

Who Owns The Web Site?: The Ultimate Question When A Hiring Party Has A Falling-Out With The Web Site Designer, 16 J. Marshall J. Computer & Info. L. 857 (1998), Rinaldo Del Gallo Iii

UIC John Marshall Journal of Information Technology & Privacy Law

The question is "Who owns your web site?" This question is difficult to answer absent a copyright assignment clause since no one knows who the owner of the web site is under current law. There are several problems that occur when a web designer is placed in a position against the hiring party in determining ownership rights to a web site. It is important to distinguish ownership rights to a web site, since most contractual agreements between a web site designer and a hiring party do not address this issue. Every day, hundreds of new web sites are appearing and …


Watch Your E-Mail - Employee E-Mail Monitoring And Privacy Law In The Age Of The Electronic Sweatshop, 28 J. Marshall L. Rev. 139 (1994), Laurie Thomas Lee Jan 1994

Watch Your E-Mail - Employee E-Mail Monitoring And Privacy Law In The Age Of The Electronic Sweatshop, 28 J. Marshall L. Rev. 139 (1994), Laurie Thomas Lee

UIC Law Review

No abstract provided.


Privacy: The Workplace Issue Of The '90s, 23 J. Marshall L. Rev. 591 (1990), David F. Linowes, Ray C. Spencer Jan 1990

Privacy: The Workplace Issue Of The '90s, 23 J. Marshall L. Rev. 591 (1990), David F. Linowes, Ray C. Spencer

UIC Law Review

No abstract provided.


That's No Beep, That's My Boss: Congress Seeks To Disconnect The Secrecy Of Telephone Monitoring In The Workplace, 21 J. Marshall L. Rev. 881 (1988), Connie Barba Jan 1988

That's No Beep, That's My Boss: Congress Seeks To Disconnect The Secrecy Of Telephone Monitoring In The Workplace, 21 J. Marshall L. Rev. 881 (1988), Connie Barba

UIC Law Review

No abstract provided.


Bench Memorandum, 21 J. Marshall L. Rev. 940 (1988), Mark A. Absher Jan 1988

Bench Memorandum, 21 J. Marshall L. Rev. 940 (1988), Mark A. Absher

UIC Law Review

No abstract provided.