Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 18 of 18

Full-Text Articles in Privacy Law

Health Information And Data Security Safeguards, 32 J. Marshall J. Info. Tech. & Privacy L. 133 (2016), Jane Kim, David Zakson Jan 2016

Health Information And Data Security Safeguards, 32 J. Marshall J. Info. Tech. & Privacy L. 133 (2016), Jane Kim, David Zakson

UIC John Marshall Journal of Information Technology & Privacy Law

The healthcare industry possesses information coveted by cyber criminals. Unfortunately, healthcare providers are also among the most vulnerable and unprepared to deal with cyber attacks. The Introduction sets the background of this paper with cyber security statistics of the healthcare sector. Part A of this paper will discuss how new Russian law impacts global data security. Part B takes a broad look at data security safeguards. Part C focuses on U.S. attempts at safeguarding data through NIST and its Presidential Policy Directive. In Part D, the paper explores in greater detail causes that precipitate security breaches and specific security defenses …


Setting Parental Controls: Do Parents Have A Duty To Supervise Their Children’S Use Of The Internet?, 31 J. Marshall J. Info. Tech. & Privacy L. 309 (2014), Alberto Bernabe Jan 2014

Setting Parental Controls: Do Parents Have A Duty To Supervise Their Children’S Use Of The Internet?, 31 J. Marshall J. Info. Tech. & Privacy L. 309 (2014), Alberto Bernabe

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Giving Credit Where Credit Is Due: A Comment On The Theoretical Foundation And Historical Origin Of The Tort Remedy For Invasion Of Privacy, 29 J. Marshall J. Computer & Info. L. 493 (2012), Alberto Bernabe Jan 2012

Giving Credit Where Credit Is Due: A Comment On The Theoretical Foundation And Historical Origin Of The Tort Remedy For Invasion Of Privacy, 29 J. Marshall J. Computer & Info. L. 493 (2012), Alberto Bernabe

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Tort Liability For Software Developers: A Law & Economics Perspective, 27 J. Marshall J. Computer & Info. L. 199 (2009), T. Randolph Beard, George S. Ford, Thomas M. Koutsky, Lawrence J. Spiwak Jan 2009

Tort Liability For Software Developers: A Law & Economics Perspective, 27 J. Marshall J. Computer & Info. L. 199 (2009), T. Randolph Beard, George S. Ford, Thomas M. Koutsky, Lawrence J. Spiwak

UIC John Marshall Journal of Information Technology & Privacy Law

This article explores the economic rationale for applying product liability law to computer software. As demonstrated in the article, a well-designed liability regime must place liability upon all parties who economically control the risks of accidents. Accordingly, this article finds that strict liability may be appropriate for certain types of “intrinsic” software, but not for other types of software requiring that the customer be actively involved in the selection, operation and maintenance thereof. The authors show that for this type of “extrinsic” software, a strict liability rule is unlikely to be economically optimal and, therefore, choosing a generic liability regime …


Lessons For The Hague: Internet Jurisdiction In Contract And Tort Cases In The European Community And The United States, 23 J. Marshall J. Computer & Info. L. 1 (2004), Moritz Keller Jan 2004

Lessons For The Hague: Internet Jurisdiction In Contract And Tort Cases In The European Community And The United States, 23 J. Marshall J. Computer & Info. L. 1 (2004), Moritz Keller

UIC John Marshall Journal of Information Technology & Privacy Law

With the increasing use of the Internet, all on-line users, web site owners, e-commerce companies and consumers alike, feel the need to be able to rely on clear standards for a potential contract or tort lawsuit following the Internet presence that could lead to multinational litigation. This goal could be achieved if the negotiations of the Hague Convention on international jurisdiction and enforcement of foreign judgments in civil and commercial matters succeed in harmonizing the rules of the different legal systems around the globe, or at least create a minimum standard for legal cases which would benefit greatly e-commerce and …


The Doors Are Locked But The Thieves And Vandals Are Still Getting In: A Proposal In Tort To Alleviate Corporate America's Cyber-Crime Problem, 16 J. Marshall J. Computer & Info. L. 167 (1997), David L. Gripman Jan 1997

The Doors Are Locked But The Thieves And Vandals Are Still Getting In: A Proposal In Tort To Alleviate Corporate America's Cyber-Crime Problem, 16 J. Marshall J. Computer & Info. L. 167 (1997), David L. Gripman

UIC John Marshall Journal of Information Technology & Privacy Law

This article addresses the problem of computer hackers, breaking into the computer systems of businesses, and the third party injuries that are ultimately caused by such acts. This is a multimillion dollar problem for the business community. The article discusses the current methods companies use to protect against hackers, and then the author makes some suggestions for protection that include the latest technology available. However, the paper's main focus is on ways to put pressure on businesses to ensure that its computers are protected against hackers to avoid third party injuries. The author looks to tort law to do just …


The Scientological Defenestration Of Choice-Of-Law Doctrines For Publication Torts On The Internet, 15 J. Marshall J. Computer & Info. L. 361 (1997), Christopher P. Beall Jan 1997

The Scientological Defenestration Of Choice-Of-Law Doctrines For Publication Torts On The Internet, 15 J. Marshall J. Computer & Info. L. 361 (1997), Christopher P. Beall

UIC John Marshall Journal of Information Technology & Privacy Law

Two major doctrines exist for choosing which state's law applies to an interstate tort: the "lex loci deliciti" (the law of the place of the wrong) approach and the "most significant relationship" approach. In the context of the Internet, the "lex loci deliciti" approach has been criticized for its harshness. For example, it is possible for an e-mail posting to be non-actionable where written, but actionable where read. Likewise, the "most significant relationship" approach has been criticized for its indeterminacy and lack of predictability because the outcome as to the extent of liability for a publication tort on the Internet …


Restatement (Second) Of Torts Section 324a: An Innovative Theory Of Recovery For Patients Injured Through Use Or Misuse Of Health Care Information Services, 14 J. Marshall J. Computer & Info. L. 73 (1995), Lisa L. Dahm Jan 1995

Restatement (Second) Of Torts Section 324a: An Innovative Theory Of Recovery For Patients Injured Through Use Or Misuse Of Health Care Information Services, 14 J. Marshall J. Computer & Info. L. 73 (1995), Lisa L. Dahm

UIC John Marshall Journal of Information Technology & Privacy Law

The author in this comment discusses how developments in information technology and widespread utilization of technology and software in the patient care context raise the issue of clinical liability for health care information systems vendors. The comment discusses a theory of recovery of tort damages for the negligence of health care information systems vendors under section 324A of the Restatement (Second) of Torts. Section 324A provides in essence that "one who undertakes ... for consideration, to render services to another which he should recognize as necessary for the protection of a third person ... is subject to liability to the …


Obligations Of Hiv-Infected Health Professionals To Inform Patients Of Their Serological Status: Evolving Theories Of Liability, 27 J. Marshall L. Rev. 317 (1994), Theodore R. Leblang Jan 1995

Obligations Of Hiv-Infected Health Professionals To Inform Patients Of Their Serological Status: Evolving Theories Of Liability, 27 J. Marshall L. Rev. 317 (1994), Theodore R. Leblang

UIC Law Review

No abstract provided.


Tort Liability For Artificial Intelligence And Expert Systems, 10 Computer L.J. 127 (1990), George S. Cole Jan 1990

Tort Liability For Artificial Intelligence And Expert Systems, 10 Computer L.J. 127 (1990), George S. Cole

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Florida Star V. B.J.F.: The Rape Of The Right To Privacy, 23 J. Marshall L. Rev. 731 (1990), Barbara Lynn Pedersen Jan 1990

Florida Star V. B.J.F.: The Rape Of The Right To Privacy, 23 J. Marshall L. Rev. 731 (1990), Barbara Lynn Pedersen

UIC Law Review

No abstract provided.


Lovgren V. Citizens First National Bank: Illinois Recognizes The False Light Invasion Of Privacy Tort, 22 J. Marshall L. Rev. 943 (1989), F. John Steffen Jan 1989

Lovgren V. Citizens First National Bank: Illinois Recognizes The False Light Invasion Of Privacy Tort, 22 J. Marshall L. Rev. 943 (1989), F. John Steffen

UIC Law Review

No abstract provided.


Rethinking The Rule Against Corporate Privacy Rights: Some Conceptual Quandries For The Common Law, 20 J. Marshall L. Rev. 607 (1987), Anita L. Allen Jan 1987

Rethinking The Rule Against Corporate Privacy Rights: Some Conceptual Quandries For The Common Law, 20 J. Marshall L. Rev. 607 (1987), Anita L. Allen

UIC Law Review

No abstract provided.


Adolescent Confidentiality And Family Privacy, 20 J. Marshall L. Rev. 641 (1987), Ferdinand Schoeman Jan 1987

Adolescent Confidentiality And Family Privacy, 20 J. Marshall L. Rev. 641 (1987), Ferdinand Schoeman

UIC Law Review

No abstract provided.


Aids: Testing Democracy - Irrational Responses To The Public Health Crisis And The Need For Privacy In Serologic Testing, 19 J. Marshall L. Rev. 835 (1986), Michael L. Closen, Susan Marie Connor, Howard L. Kaufman, Mark E. Wojcik Jan 1986

Aids: Testing Democracy - Irrational Responses To The Public Health Crisis And The Need For Privacy In Serologic Testing, 19 J. Marshall L. Rev. 835 (1986), Michael L. Closen, Susan Marie Connor, Howard L. Kaufman, Mark E. Wojcik

UIC Law Review

No abstract provided.


Douglass V. Hustler Magazine, Inc.: Anatomy Of Privacy For A Public Figure In Illinois, 19 J. Marshall L. Rev. 1053 (1986), Howard L. Teplinsky Jan 1986

Douglass V. Hustler Magazine, Inc.: Anatomy Of Privacy For A Public Figure In Illinois, 19 J. Marshall L. Rev. 1053 (1986), Howard L. Teplinsky

UIC Law Review

No abstract provided.


Preface, 18 J. Marshall L. Rev. 811 (1985) Jan 1985

Preface, 18 J. Marshall L. Rev. 811 (1985)

UIC Law Review

No abstract provided.


Information Law Overview, 18 J. Marshall L. Rev. 815 (1985), George B. Trubow Jan 1985

Information Law Overview, 18 J. Marshall L. Rev. 815 (1985), George B. Trubow

UIC Law Review

No abstract provided.