Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 31

Full-Text Articles in Privacy Law

Protecting Anonymous Expression: The Internet's Role In Washington State's Disclosure Laws And The Direct Democracy Process, Karen Cullinane Jul 2011

Protecting Anonymous Expression: The Internet's Role In Washington State's Disclosure Laws And The Direct Democracy Process, Karen Cullinane

University of Michigan Journal of Law Reform

This Note proposes that the Washington State Legislature amend its Public Records Act to exempt from public disclosure personal information legally required to be disclosed by signers of referendum petitions. This Note also proposes that the Washington State Legislature designate an electronic system, to be detailed in its election law, by which referendum petitions can be checked for fraud without violating the right to anonymous expression protected by the First Amendment. Part I describes Washington State's referendum process and the path of Doe v. Reed, the case animating the reform presented in this Note. Part II illustrates how the rise …


Overcoming The Digital Tsunami In E-Discovery: Is Visual Analysis The Answer?, Victoria L. Lemieux, Jason R. Baron Jun 2011

Overcoming The Digital Tsunami In E-Discovery: Is Visual Analysis The Answer?, Victoria L. Lemieux, Jason R. Baron

Canadian Journal of Law and Technology

New technologies are generating potentially discoverable evidence in electronic form in ever increasing volumes. As a result, traditional techniques of document search and retrieval in pursuit of electronic discovery in litigation are becoming less viable. One potential new technological solution to the e-discovery search and retrieval challenge is Visual Analysis (VA). VA is a technology that combines the computational power of the computer with graphical representations of large datasets to enable interactive analytic capabilities. This article provides an overview of VA technology and how it is being applied in the analysis of e-mail and other electronic documents in the field …


The Internet And Protection Of Children Online: Time For Change, Jill Scott Jun 2011

The Internet And Protection Of Children Online: Time For Change, Jill Scott

Canadian Journal of Law and Technology

This article explores the risks for children online and their privacy, with particular focus on the implications of widespread collection, use and retention of data about them. It touches on international standards and national laws that impact Internet activities and the special risk to children’s privacy in today’s ubiquitous computing environment. This is a complex topic that transcends national boundaries and involves both legal and policy issues confronting governments across the world.

Section I provides a brief outline of the online risks for children arising from the scope of data collection and the regulatory challenges of the Internet as it …


Location-Based Services And Privacy, Teresa Scassa, Anca Sattler Jun 2011

Location-Based Services And Privacy, Teresa Scassa, Anca Sattler

Canadian Journal of Law and Technology

In this paper we begin by describing location-based services, their evolution and their future directions. We then outline privacy issues raised by such services. In Part III we consider how current Canadian data protection laws apply to location-based services, and indicate where such laws fall short of addressing the full range of issues raised by location-based services. Part IV of the paper explores some technological methods to address the privacy challenges raised by location-based services. The paper concludes with a series of recommendations.


Electronic Discovery- Sedona Canada Is Inadequate On Records Management - Here's Sedona Canada In Amended Form, Ken Chasse Jun 2011

Electronic Discovery- Sedona Canada Is Inadequate On Records Management - Here's Sedona Canada In Amended Form, Ken Chasse

Canadian Journal of Law and Technology

A paper record can exist without its records system; an electronic record cannot. To use, corrupt, or destroy a paper record, one needs physical access to the records system wherein it is stored. But to use, corrupt, or destroy an electronic record one merely needs electronic access to its records system, from anywhere. Therefore any set of rules or principles for controlling the use of electronic records for any purpose, including electronic discovery, should incorporate the established policies and practices of electronic records management.

As to cost, rules of electronic discovery are needed with which to punish par- ties with …


Tax Implications For Non-Residents Conducting E-Commerce In Canada, Mike Nienhuis Jun 2011

Tax Implications For Non-Residents Conducting E-Commerce In Canada, Mike Nienhuis

Canadian Journal of Law and Technology

This paper focuses on taxation issues faced by non-resident e-commerce companies with no sustained presence in Canada apart from a web site. The tax liability of foreign corporations with a Canadian subsidiary, a physical Canadian office, or Canadian-based employees or agents will not be considered, even though there is substantial overlap in some of the relevant issues. By e-commerce companies we refer broadly to any firms conducting their primary business — whether business- to-business (B2B) or business-to-consumer (B2C) — by means of the internet.

In the first section we outline the framework for Canada’s taxation of non-residents conducting business in …


Institutional Liability In The E-Health Era, James Williams, Craig Kuziemsky Jun 2011

Institutional Liability In The E-Health Era, James Williams, Craig Kuziemsky

Canadian Journal of Law and Technology

This paper examines the jurisprudence on institutional liability for medical er- ror. We argue that the existing jurisprudence relies on assumptions that have been made obsolete by technological advances. In particular, we concentrate on the use of information and communication technologies (ICTs) in the health care domain. As we demonstrate, the use of these tools does not merely increase efficiency and support new health care functions; among other effects, ICT can have a profound influence on how health care practitioners make observations, exercise judgment and perform tasks. These tools influence human capabilities (at both the individual and systems level) in …


Prohibiting Medical Method Patents: A Criticism Of The Status Quo, Mark S. Wilke Jun 2011

Prohibiting Medical Method Patents: A Criticism Of The Status Quo, Mark S. Wilke

Canadian Journal of Law and Technology

Methods of medical treatment are not patentable in Canada. This means that inventions involving the performance of surgery, administration of medicine, or extraction of fluids or tissue for diagnostic tests cannot directly be protected under the current patent regime. However, this prohibition is not an absolute ban. Many medical innovations are patentable, including surgical tools and devices, drugs and other chemical compounds, medical “uses”, diagnostic assays and methods of treat- ing “natural” conditions. The practical reality is that the distinction between what is and what is not patentable is poorly defined. This uncertainty presents a steep challenge for inventors and …


L'Impact D'Internet Sur Les Paradigmes De La Régulation De L'Audiovisuel, Gilles De Saint Exupéry Jun 2011

L'Impact D'Internet Sur Les Paradigmes De La Régulation De L'Audiovisuel, Gilles De Saint Exupéry

Canadian Journal of Law and Technology

Nous nous intéresserons particulièrement à la mutation du paradigme de la régulation de l’audiovisuel classique13 dû à plusieurs facteurs: pour être diffuseur sur les ondes hertzienne il fallait être titulaire d’une licence accordé par l’Etat, sur Internet tout le monde peut l’être à sa guise. Les moyens techniques et financiers ne sont plus une barrière à l’ entrée, le nombre de joueurs qui e ́ tait jusque-là restreint devient, en théorie, incalculable. Le mécanisme de responsabilité mis en place est remis en cause, par la dilution des frontières, l’anonymat, ou l’insolvabilité des diffuseurs. Les modèles d’affaires doivent être revus, le …


Direct-To-Consumer Advertising Of Pharmaceuticals On Television: A Charter Challenge, Elvina C. Chow Jun 2011

Direct-To-Consumer Advertising Of Pharmaceuticals On Television: A Charter Challenge, Elvina C. Chow

Canadian Journal of Law and Technology

The Supreme Court of Canada has consistently wrestled with the conflict between legislation designed to protect consumers’ health and the constitutional guarantee of the fundamental freedom of expression. This paper investigates the justification for the current regulatory framework for pharmaceutical advertising on television. Aware that the provisions in the FDA are able to withstand Charter of Rights and Freedoms (Charter) scrutiny, several possible policy initiations are nevertheless proposed.

The paper is divided into five separate sections. Having first introduced DTCA of pharmaceuticals on television in Section I, I will now turn to a more comprehensive examination of DTCA in Canada …


Lessons From Bilski, Haewon Chung Jun 2011

Lessons From Bilski, Haewon Chung

Canadian Journal of Law and Technology

In this paper, I will examine how the U.S. and Canadian courts have approached the patentability of intangible inventions and discuss whether any lessons can be learned from the U.S.’s patent dilemma. In section 2, I will review the American jurisprudence on patentability of intangible inventions. In section 3, I will discuss the potential impact Bilski may have on the American jurisprudence. Section 4 will assess the Canadian jurisprudence on patentability of intangible inventions. In section 5, I will discuss the Federal Court of Canada’s decision in Amazon/FCC. I argue that based on recent events in the American jurisprudence, Canadian …


Collateral Consequences, Genetic Surveillance, And The New Biopolitics Of Race, Dorothy E. Roberts Apr 2011

Collateral Consequences, Genetic Surveillance, And The New Biopolitics Of Race, Dorothy E. Roberts

All Faculty Scholarship

This Article is part of a Howard Law Journal Symposium on “Collateral Consequences: Who Really Pays the Price for Criminal Justice?,” as well as my larger book project, Fatal Invention: How Science, Politics, and Big Business Re-create Race in the Twenty-First Century (The New Press, 2011). It considers state and federal government expansion of genetic surveillance as a collateral consequence of a criminal record in the context of a new biopolitics of race in America. Part I reviews the expansion of DNA data banking by states and the federal government, extending the collateral impact of a criminal record—in the form …


Blackberry's Jam: Research In Motion's Struggle To Protect Smartphone Users' Internet Privacy Highlights Need For Shared Industry Standards, Darren R. Sweetwood Jan 2011

Blackberry's Jam: Research In Motion's Struggle To Protect Smartphone Users' Internet Privacy Highlights Need For Shared Industry Standards, Darren R. Sweetwood

Global Business & Development Law Journal

No abstract provided.


Supreme Court Amicus Brief Of Aarp And The National Legislative Association On Petition Drug Prices In Support Of Petitioners, William H. Sorrell V. Ims Health, Inc., No. 10-779 (Filed March 1, 2011), Sean Flynn, Meredith Jacob, Stacy Canan Jan 2011

Supreme Court Amicus Brief Of Aarp And The National Legislative Association On Petition Drug Prices In Support Of Petitioners, William H. Sorrell V. Ims Health, Inc., No. 10-779 (Filed March 1, 2011), Sean Flynn, Meredith Jacob, Stacy Canan

Amicus Briefs

This Court should refuse to apply the First Amendment to Vermont’s Prescription Confidentiality Law based on two essential facts. First, the regulation at issue is limited to the commercial use or private-channel distribution of confidential data. It is thus governed by cases of this Court upholding the regulation of uses of information in purely private settings that do not inform or contribute to the public sphere. Bartnicki v. Vopper, 532 U.S. 514, 526-27 n.10 (2001); Dun & Bradstreet, Inc. v. Greenmoss Builders, Inc., 472 U.S. 749 (1985). Second, it concerns the regulation of secondary uses of information where the government …


The Board's Responsibility For Information Technology Governance, 28 J. Marshall J. Computer & Info. L. 313 (2011), Lawrence J. Trautman, Kara Altenbaumer-Price Jan 2011

The Board's Responsibility For Information Technology Governance, 28 J. Marshall J. Computer & Info. L. 313 (2011), Lawrence J. Trautman, Kara Altenbaumer-Price

UIC John Marshall Journal of Information Technology & Privacy Law

With accusations that boards of directors of financial institutions were asleep at the wheel while their companies engaged in risky behavior that erased millions of dollars of shareholder value and plunged the country into recession, increasing pressure is now being placed on public company boards to shoulder the burden of risk oversight for the companies they serve. This article provides an overview of some of the main considerations relative to every director’s duty to govern IT risk. In particular, this comment will address directors’ roles in the risk oversight of the corporations they serve, their role in governance of IT, …


The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, 28 J. Marshall Computer & Info. L. 523 (2011), Moonho Song, Carrie Leonetti Jan 2011

The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, 28 J. Marshall Computer & Info. L. 523 (2011), Moonho Song, Carrie Leonetti

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


My Teacher Sux! [Censored]: Protecting Students' Right To Free Speech On The Internet, 28 J. Marshall J. Computer & Info. L. 385 (2011), Katherine Hokenson Jan 2011

My Teacher Sux! [Censored]: Protecting Students' Right To Free Speech On The Internet, 28 J. Marshall J. Computer & Info. L. 385 (2011), Katherine Hokenson

UIC John Marshall Journal of Information Technology & Privacy Law

This comment will discusses the problem posed by student speech made on the Internet, how free speech issues are generally addressed by courts, the Supreme Court cases that have specifically addressed the First Amendment rights of students, and factors that courts dealing with student speech made on the Internet have attempted to use in their decisions. The comment will further look at how courts have analyzed online student speech cases in light of available Supreme Court precedent, and will propose that the Court adopt a hybrid of the Tinker test when addressing student speech made on the Internet, which will …


Schools: Where Fewer Rights Are Reasonable? Why The Reasonableness Standard Is Inappropriate To Measure The Use Of Rfid Tracking Devices On Students, 28 J. Marshall J. Computer & Info. L. 411 (2011), Alexandra C. Hirsch Jan 2011

Schools: Where Fewer Rights Are Reasonable? Why The Reasonableness Standard Is Inappropriate To Measure The Use Of Rfid Tracking Devices On Students, 28 J. Marshall J. Computer & Info. L. 411 (2011), Alexandra C. Hirsch

UIC John Marshall Journal of Information Technology & Privacy Law

In an unsuccessful attempt to heighten security, schools are implementing a technology that offers access to children’s personal information and minute-by-minute location. Although not entirely new, Radio Frequency Identification (RFID) technology use has recently been expanding within the school arena. Skeptics knowledgeable about the downfalls of the technology, however, have reason to be concerned. In order to understand the true urgency of this issue, this comment will explain the background of RFID technology, specifically what RFID tags are, how they are used, their purposes, and how they have become unsafe. Included will be an explanation of the reasons that schools …


Bugs For Sale: Legal And Ethical Proprieties Of The Market In Software Vulnerabilities, 28 J. Marshall J. Computer & Info. L. 451 (2011), Taiwo A. Oriola Jan 2011

Bugs For Sale: Legal And Ethical Proprieties Of The Market In Software Vulnerabilities, 28 J. Marshall J. Computer & Info. L. 451 (2011), Taiwo A. Oriola

UIC John Marshall Journal of Information Technology & Privacy Law

The pertinent questions therefore are: first, could software vulnerabilities be obviated simply by ameliorating factors responsible for market failure as canvassed by the literature on the economics of software security, drawing on the strength of the theory of information asymmetry, or are vulnerabilities inevitable irrespective of market dynamics and solutions? Second, to what extent is vulnerabilities research or the surreptitious exploitation of software vulnerabilities by hackers tantamount to trespass, and what are the legal implications, if any? Third, to what extent is the peddling of software vulnerabilities valid or enforceable in law? Fourth, what are the implications of software vulnerabilities …


The Need For Better Analysis Of High Capacity Services, 28 J. Marshall J. Computer & Info. L. 343 (2011), George S. Ford, Lawrence J. Spiwak Jan 2011

The Need For Better Analysis Of High Capacity Services, 28 J. Marshall J. Computer & Info. L. 343 (2011), George S. Ford, Lawrence J. Spiwak

UIC John Marshall Journal of Information Technology & Privacy Law

In 1999, the Federal Communications Commission (“FCC”) began to grant incumbent local exchange carriers (“LECs”) pricing flexibility on special access services in some Metropolitan Statistical Areas (“MSAs”) when specific evidence of competitive alternatives is present. The propriety of that deregulatory move by the FCC has been criticized by the purchasers of such services ever since. Proponents of special access price regulation rely on three central arguments to support a retreat to strict price regulation: (1) the market(s) for special access and similar services is unduly concentrated; (2) rates of return on special access services, computed using FCC ARMIS data, are …


The Thirtieth Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 29 J. Marshall J. Computer & Info. L. 75 (2011), Russell Bottom, Matthew T. Andris, Robin Ann Sowizrol Jan 2011

The Thirtieth Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 29 J. Marshall J. Computer & Info. L. 75 (2011), Russell Bottom, Matthew T. Andris, Robin Ann Sowizrol

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Stuxnet As Cyberwarfare: Applying The Law Of War To The Virtual Battlefield, 29 J. Marshall J. Computer & Info. L. 1 (2011), John Richardson Jan 2011

Stuxnet As Cyberwarfare: Applying The Law Of War To The Virtual Battlefield, 29 J. Marshall J. Computer & Info. L. 1 (2011), John Richardson

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Thirtieth Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 29 J. Marshall J. Computer & Info. L. 139 (2011), Elena Jacob, Steven Osit, Darya Zuravicky Jan 2011

The Thirtieth Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 29 J. Marshall J. Computer & Info. L. 139 (2011), Elena Jacob, Steven Osit, Darya Zuravicky

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Amended Eu Law On Eprivacy And Electronic Communications After Its 2011 Implentation; New Rules On Data Protection, Spam, Data Breaches And Protection Of Intellectual Property Rights, 29 J. Marshall J. Computer & Info. L. 29 (2011), Vagelis Papakonstantinou, Paul De Hert Jan 2011

The Amended Eu Law On Eprivacy And Electronic Communications After Its 2011 Implentation; New Rules On Data Protection, Spam, Data Breaches And Protection Of Intellectual Property Rights, 29 J. Marshall J. Computer & Info. L. 29 (2011), Vagelis Papakonstantinou, Paul De Hert

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Thirtieth Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 29 J. Marshall J. Computer & Info. L. 103 (2011), Nate Lindsey, Chris Omlid Jan 2011

The Thirtieth Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 29 J. Marshall J. Computer & Info. L. 103 (2011), Nate Lindsey, Chris Omlid

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Internet Access Rights: A Brief History And Intellectual Origins, Jonathon Penney Jan 2011

Internet Access Rights: A Brief History And Intellectual Origins, Jonathon Penney

Articles, Book Chapters, & Popular Press

If there is anything we have learned from recent protest movements around the world, and the heavy-handed government efforts to block, censor, suspend, and manipulate Internet connectivity, it is that access to the Internet, and its content, is anything but certain, especially when governments feel threatened. Despite these hard truths, the notion that people have a "right" to Internet access gained high-profile international recognition last year. In a report to the United Nations General Assembly in early 2011, Frank La Rue, the UN Special Rapporteur on Freedom of Expression, held that Internet access should be recognized as a "human right". …


Unraveling Privacy: The Personal Prospectus And The Threat Of A Full-Disclosure Future, Scott R. Peppet Jan 2011

Unraveling Privacy: The Personal Prospectus And The Threat Of A Full-Disclosure Future, Scott R. Peppet

Publications

Information technologies are reducing the costs of credible signaling, just as they have reduced the costs of data mining and economic sorting. The burgeoning informational privacy field has ignored this evolution, leaving it unprepared to deal with the consequences of these new signaling mechanisms. In an economy with robust signaling, those with valuable credentials, clean medical records, and impressive credit scores will want to disclose those traits to receive preferential economic treatment. Others may then find that they must also disclose private information to avoid the negative inferences attached to staying silent. This unraveling effect creates new types of privacy …


Following You Here, There, And Everywhere; An Investigation Of Gps Technology, Privacy, And The Fourth Amendment, 45 J. Marshall L. Rev. 1 (2011), Stephanie G. Forbes Jan 2011

Following You Here, There, And Everywhere; An Investigation Of Gps Technology, Privacy, And The Fourth Amendment, 45 J. Marshall L. Rev. 1 (2011), Stephanie G. Forbes

UIC Law Review

No abstract provided.


Disentangling Administrative Searches, Eve Brensike Primus Jan 2011

Disentangling Administrative Searches, Eve Brensike Primus

Articles

Everyone who has been screened at an international border, scanned by an airport metal detector, or drug tested for public employment has been subjected to an administrative search. Since September 11th, the government has increasingly invoked the administrative search exception to justify more checkpoints, unprecedented subway searches, and extensive wiretaps. As science and technology advance, the frequency and scope of administrative searches will only expand. Formulating the boundaries and requirements of administrative search doctrine is therefore a matter of great importance. Yet the rules governing administrative searches are notoriously unclear. This Article seeks to refocus attention on administrative searches and …


When Machines Are Watching: How Warrantless Use Of Gps Surveillance Technology Violates The Fourth Amendment Right Against Unreasonable Searches, David Thaw, Priscilla Smith, Nabiha Syed, Albert Wong Jan 2011

When Machines Are Watching: How Warrantless Use Of Gps Surveillance Technology Violates The Fourth Amendment Right Against Unreasonable Searches, David Thaw, Priscilla Smith, Nabiha Syed, Albert Wong

Articles

Federal and state law enforcement officials throughout the nation are currently using Global Positioning System (GPS) technology for automated, prolonged surveillance without obtaining warrants. As a result, cases are proliferating in which criminal defendants are challenging law enforcement’s warrantless uses of GPS surveillance technology, and courts are looking for direction from the Supreme Court. Most recently, a split has emerged between the Ninth and D.C. Circuit Courts of Appeal on the issue. In United States v. Pineda-Moreno, the Ninth Circuit relied on United States v. Knotts — which approved the limited use of beeper technology without a warrant — to …