Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 23 of 23

Full-Text Articles in Privacy Law

Legal Problems In Data Management: It & Privacy At The Forefront: Drafting And Implementing Effective Social Media Policies In The Workplace, 31 J. Marshall J. Info. Tech. & Privacy L. 549 (2015) Jan 2015

Legal Problems In Data Management: It & Privacy At The Forefront: Drafting And Implementing Effective Social Media Policies In The Workplace, 31 J. Marshall J. Info. Tech. & Privacy L. 549 (2015)

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Now You See It, Now You Don’T . . . Or Do You?: Snapchat’S Deceptive Promotion Of Vanishing Messages Violates Federal Trade Commission Regulations, 30 J. Marshall J. Info. Tech. & Privacy L. 827 (2014), Danielle Young Jan 2014

Now You See It, Now You Don’T . . . Or Do You?: Snapchat’S Deceptive Promotion Of Vanishing Messages Violates Federal Trade Commission Regulations, 30 J. Marshall J. Info. Tech. & Privacy L. 827 (2014), Danielle Young

UIC John Marshall Journal of Information Technology & Privacy Law

This Comment will explore the recently popular application Snapchat, and discuss the ways in which the app's privacy policy has violated FTC regulations, responding to a recent complaint filed by The Electronic Privacy Center. Particularly, this Comment will focus on Snapchat's deceptive promotion of "disappearing" photographs and videos. Section II will illustrate the basic structure of Snapchat, detailing various illustrations of its use. Section II will also examine the regulations set forth by the FTC that Snapchat is required to follow. Section III will discuss possible methods that the average user can do in order to bypass the very thing …


Canada’S Anti-Spam Legislation: A Constitutional Analysis, 31 J. Marshall J. Info. Tech. & Privacy L. 1 (2014), Emir Crowne, Stephanie Provato Jan 2014

Canada’S Anti-Spam Legislation: A Constitutional Analysis, 31 J. Marshall J. Info. Tech. & Privacy L. 1 (2014), Emir Crowne, Stephanie Provato

UIC John Marshall Journal of Information Technology & Privacy Law

On December 15th, 2010, the Government of Canada agreed to Bill C-28, the Fighting Internet and Wireless Spam Act, with the intent to “deter the most damaging and deceptive forms of spam… from occurring in Canada and to help to drive out spammers.” Canada‟s Anti- Spam Legislation (“CASL”) was born. Although CASL has only been in force since July 1st, 2014, we argue that the Act may not survive constitutional scrutiny as it unduly restricts freedom of speech.


The Thirty-Third Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 31 J. Marshall J. Computer & Info. L. 237 (2014), Adam Florek, Anisha Mehta, Danielle Young, Michael Greene Jan 2014

The Thirty-Third Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 31 J. Marshall J. Computer & Info. L. 237 (2014), Adam Florek, Anisha Mehta, Danielle Young, Michael Greene

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Thirty-Third Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 31 J. Marshall J. Computer & Info. L. 251 (2014), Amany Awad, Kelly O'Neill, Arlo Walsman Jan 2014

The Thirty-Third Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 31 J. Marshall J. Computer & Info. L. 251 (2014), Amany Awad, Kelly O'Neill, Arlo Walsman

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Thirty-Third Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 31 J. Marshall J. Computer & Info. L. 285 (2014), Sara Schroeder, Austin Hoffman, Becky Fey Jan 2014

The Thirty-Third Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 31 J. Marshall J. Computer & Info. L. 285 (2014), Sara Schroeder, Austin Hoffman, Becky Fey

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Emerging Reality Of Social Media: Erosion Of Individual Privacy Through Cyber-Vetting And Law’S Inability To Catch Up, 12 J. Marshall Rev. Intell. Prop. L. 551 (2013), Saby Ghoshray Jan 2013

The Emerging Reality Of Social Media: Erosion Of Individual Privacy Through Cyber-Vetting And Law’S Inability To Catch Up, 12 J. Marshall Rev. Intell. Prop. L. 551 (2013), Saby Ghoshray

UIC Review of Intellectual Property Law

The rise of social media means that data about a large number of people is available in public and quasi-public digital locations. Employers, keen on taking advantage of this additional data to decrease the risk associated with an offer of employment, are engaging in “cyber-vetting”—non-consenting social media searches conducted by third parties or the employers themselves. To the extent that current law applies to this practice, the regulation it provides is weak and attacks only part of the problem. Left unchecked, cyber-vetting has the potential to fundamentally alter the scope of prospective employees’ rights. This article surveys the legal and …


Tweet Tweet: A First Amendment Wake Up Call Regarding Social Media In The Sports Arena, 30 J. Marshall J. Info. Tech. & Privacy L. 117 (2013), Samantha Levin Jan 2013

Tweet Tweet: A First Amendment Wake Up Call Regarding Social Media In The Sports Arena, 30 J. Marshall J. Info. Tech. & Privacy L. 117 (2013), Samantha Levin

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


As Seen On Tv: Your Compromising Cameo On National Reality Programming, 12 J. Marshall Rev. Intell. Prop. L. 403 (2013), Ryan Westerman Jan 2013

As Seen On Tv: Your Compromising Cameo On National Reality Programming, 12 J. Marshall Rev. Intell. Prop. L. 403 (2013), Ryan Westerman

UIC Review of Intellectual Property Law

The pop-culture phenomenon of reality television has taken over national programming. With the click of a remote, viewers can gain an inside look into the daily lives of celebrity families, toddler pageant queens, wealthy housewives, even pregnant teenagers. Reality television also profiles different professions: repo-men, pawn shop owners, and real estate agents all have television time slots. While it seems everyone is desperate for their fifteen minutes of fame, there are still those who wish to avoid the public spotlight. However, a recent Illinois ruling may make avoiding prime-time attention impossible for certain individuals caught on tape in compromising, and …


Right To Information Identity, 29 J. Marshall J. Computer & Info. L. 539 (2012), Elad Oreg Jan 2012

Right To Information Identity, 29 J. Marshall J. Computer & Info. L. 539 (2012), Elad Oreg

UIC John Marshall Journal of Information Technology & Privacy Law

Inspired by the famous Warren and Brandeis conceptualization of the “right to privacy,” this article tries to answer a modern, conceptual lacuna and presents the argument for the need to conceptualize and recognize a new, independent legal principle of a “right to information identity.” This is the right of an individual to the functionality of the information platforms that enable others to identify and know him and to remember who and what he is. Changes in technology and social standards make the very notion of identity increasingly fluid, transforming the way it is treated and opening new and fascinating ways …


The Ownership And Exploitation Of Personal Identity In The New Media Age, 12 J. Marshall Rev. Intell. Prop. L. 1 (2012), Thomas Hemnes Jan 2012

The Ownership And Exploitation Of Personal Identity In The New Media Age, 12 J. Marshall Rev. Intell. Prop. L. 1 (2012), Thomas Hemnes

UIC Review of Intellectual Property Law

Personally Identifiable Information (“PII”) has never been more valuable. In today’s networked world, seemingly trivial facts can be collected, molded into a marketable economic profile, and transferred in the blink of an eye. To be sure, the commodification of PII allows for provision of dramatically more efficient and effective services. Yet the potential for privacy abuses is substantial. What interest does one have in the constellation of facts that defines one’s identity? Is it something one can own, like their right of publicity? Or are others free to use what they learn about a person? This article surveys current privacy …


The Amended Eu Law On Eprivacy And Electronic Communications After Its 2011 Implentation; New Rules On Data Protection, Spam, Data Breaches And Protection Of Intellectual Property Rights, 29 J. Marshall J. Computer & Info. L. 29 (2011), Vagelis Papakonstantinou, Paul De Hert Jan 2011

The Amended Eu Law On Eprivacy And Electronic Communications After Its 2011 Implentation; New Rules On Data Protection, Spam, Data Breaches And Protection Of Intellectual Property Rights, 29 J. Marshall J. Computer & Info. L. 29 (2011), Vagelis Papakonstantinou, Paul De Hert

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Three Cs Versus The Dinosaur: Updating The Technologically Archaic Fdcpa To Provide Consumers, Collectors, And Courts Clarity, 44 J. Marshall L. Rev. 1033 (2011), Melissa Travis Jan 2011

The Three Cs Versus The Dinosaur: Updating The Technologically Archaic Fdcpa To Provide Consumers, Collectors, And Courts Clarity, 44 J. Marshall L. Rev. 1033 (2011), Melissa Travis

UIC Law Review

No abstract provided.


Free Speech On The Battlefield: Protecting The Use Of Social Media By America's Soldiers, 44 J. Marshall L. Rev. 1085 (2011), David Johnsen Jan 2011

Free Speech On The Battlefield: Protecting The Use Of Social Media By America's Soldiers, 44 J. Marshall L. Rev. 1085 (2011), David Johnsen

UIC Law Review

No abstract provided.


Regulating Online Behavioral Advertising, 44 J. Marshall L. Rev. 899 (2011), Steven C. Bennett Jan 2011

Regulating Online Behavioral Advertising, 44 J. Marshall L. Rev. 899 (2011), Steven C. Bennett

UIC Law Review

No abstract provided.


Social Networking As A Communications Weapon To Harm Victims: Facebook, Myspace, And Twitter Demonstrate A Need To Amend Section 230 Of The Communications Decency Act, 26 J. Marshall J. Computer & Info. L. 415 (2009), Joshua N. Azriel Jan 2009

Social Networking As A Communications Weapon To Harm Victims: Facebook, Myspace, And Twitter Demonstrate A Need To Amend Section 230 Of The Communications Decency Act, 26 J. Marshall J. Computer & Info. L. 415 (2009), Joshua N. Azriel

UIC John Marshall Journal of Information Technology & Privacy Law

The article discusses how social networking sites can pose a danger to victims of online offensive content. Part II provides an overall analysis of the dangers the Internet, especially social networking, poses to victims. Part III reviews Section 230 of the CDA, including the “Good Samaritan” provisions for social networking websites such as Twitter and Facebook. Part IV analyzes three recent court cases that demonstrate how these social networking tools are used as weapons to harm victims. Part V concludes with a discussion of how the growing number of online incidents stem from social networking sites. It recommends that Congress …


The Future Of Privacy Policies: A Privacy Nutrition Label Filled With Fair Information Practices, 26 J. Marshall J. Computer & Info. L. 1 (2008), Corey A. Ciocchetti Jan 2008

The Future Of Privacy Policies: A Privacy Nutrition Label Filled With Fair Information Practices, 26 J. Marshall J. Computer & Info. L. 1 (2008), Corey A. Ciocchetti

UIC John Marshall Journal of Information Technology & Privacy Law

The article looks at the threats accompanying online shopping, such as identity theft and aggregated data files. Such issues arise when companies carelessly lose laptops filled with unencrypted data or callously sell data on the open market with collected personally identifying information (PII). The article explains that although privacy policies are supposed to force companies to strengthen their privacy practices they are not always effective because companies often post inconspicuous, vague and legalese-filled policies. These ambiguous postings cause online shoppers to blindly submit PII and ignore privacy practices completely. The article proposes a solution to this problem through the standardization …


The Federal Election Commission & Political Blogging: A Perfect Balance Or Just Not Enough?, 24 J. Marshall J. Computer & Info. L. 611 (2006), Niki Vlachos Jan 2006

The Federal Election Commission & Political Blogging: A Perfect Balance Or Just Not Enough?, 24 J. Marshall J. Computer & Info. L. 611 (2006), Niki Vlachos

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Www.Yourname.Com: How Useful Is The Uniform Domain Name Dispute Resolution Policy ("Udrp") In Protecting Personal Names From Cybersquatters?, 22 J. Marshall J. Computer & Info. L. 535 (2004), Georgette H. Tarnow Jan 2004

Www.Yourname.Com: How Useful Is The Uniform Domain Name Dispute Resolution Policy ("Udrp") In Protecting Personal Names From Cybersquatters?, 22 J. Marshall J. Computer & Info. L. 535 (2004), Georgette H. Tarnow

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Balancing Individual Privacy Rights And The Rights Of Trademark Owners In Access To The Whois, 38 J. Marshall L. Rev. 357 (2004), Jeffrey Stephen Sobek Jan 2004

Balancing Individual Privacy Rights And The Rights Of Trademark Owners In Access To The Whois, 38 J. Marshall L. Rev. 357 (2004), Jeffrey Stephen Sobek

UIC Law Review

No abstract provided.


Are You Content With The Content? Intellectual Property Implications Of Weblog Publishing, 21 J. Marshall J. Computer & Info. L. 439 (2003), Attiya Malik Jan 2003

Are You Content With The Content? Intellectual Property Implications Of Weblog Publishing, 21 J. Marshall J. Computer & Info. L. 439 (2003), Attiya Malik

UIC John Marshall Journal of Information Technology & Privacy Law

The publicity about weblogs has neglected to warn against the risks of legal liability. Whether you want to impart words of wisdom or copy something that caught your interest, the temptation to "borrow" is too great and too easy in Cyberspace. Whereas the typical Internet user may have heard of "copyright" or "trademark," they are unaware of the complexities and nuances of these areas of law. The legal tests and standards may be too sophisticated for the average user. Even practitioners and courts are grappling with what legal standards and interpretations are to be applied in Cyberspace, thus, leading to …


Who Owns The Web Site?: The Ultimate Question When A Hiring Party Has A Falling-Out With The Web Site Designer, 16 J. Marshall J. Computer & Info. L. 857 (1998), Rinaldo Del Gallo Iii Jan 1998

Who Owns The Web Site?: The Ultimate Question When A Hiring Party Has A Falling-Out With The Web Site Designer, 16 J. Marshall J. Computer & Info. L. 857 (1998), Rinaldo Del Gallo Iii

UIC John Marshall Journal of Information Technology & Privacy Law

The question is "Who owns your web site?" This question is difficult to answer absent a copyright assignment clause since no one knows who the owner of the web site is under current law. There are several problems that occur when a web designer is placed in a position against the hiring party in determining ownership rights to a web site. It is important to distinguish ownership rights to a web site, since most contractual agreements between a web site designer and a hiring party do not address this issue. Every day, hundreds of new web sites are appearing and …


Digital Sound Sampling And A Federal Right Of Publicity: Is It Live Or Is It Macintosh?, 10 Computer L.J. 365 (1990), Tamara J. Byram Jan 1990

Digital Sound Sampling And A Federal Right Of Publicity: Is It Live Or Is It Macintosh?, 10 Computer L.J. 365 (1990), Tamara J. Byram

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.