Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (116)
- Computer Law (109)
- Constitutional Law (89)
- Health Law and Policy (83)
- Science and Technology Law (83)
-
- Human Rights Law (81)
- International Law (79)
- State and Local Government Law (79)
- Supreme Court of the United States (79)
- Family Law (77)
- Legislation (77)
- Criminal Law (76)
- Law and Politics (76)
- Legal History (76)
- Civil Procedure (75)
- Conflict of Laws (74)
- Contracts (74)
- Courts (74)
- Criminal Procedure (74)
- Law and Economics (74)
- Other Law (74)
- Torts (74)
- Administrative Law (73)
- Business Organizations Law (73)
- Civil Law (73)
- Insurance Law (73)
- Military, War, and Peace (73)
- Religion Law (73)
- Institution
-
- Universitas Indonesia (40)
- Seattle University School of Law (38)
- Schulich School of Law, Dalhousie University (19)
- The Catholic University of America, Columbus School of Law (11)
- Brooklyn Law School (5)
-
- Washington and Lee University School of Law (5)
- Florida International University College of Law (4)
- Maurer School of Law: Indiana University (4)
- Vanderbilt University Law School (4)
- Fordham Law School (3)
- Northwestern Pritzker School of Law (3)
- Notre Dame Law School (3)
- Brigham Young University Law School (2)
- DePaul University (2)
- Kennesaw State University (2)
- National Law School of India University (2)
- Pepperdine University (2)
- Touro University Jacob D. Fuchsberg Law Center (2)
- University of Michigan Law School (2)
- University of Washington School of Law (2)
- American University Washington College of Law (1)
- Cleveland State University (1)
- Duquesne University (1)
- Emory University School of Law (1)
- Golden Gate University School of Law (1)
- Lewis & Clark Law School (1)
- Mississippi State University (1)
- Mitchell Hamline School of Law (1)
- Pace University (1)
- Roger Williams University (1)
- Keyword
-
- Privacy (19)
- Artificial intelligence (4)
- Covid-19 (4)
- Data privacy (4)
- Fourth Amendment (4)
-
- AI (3)
- CPRA (3)
- DNA (3)
- Data Privacy (3)
- European Union (3)
- FDA (3)
- Facebook (3)
- GDPR (3)
- HIPAA (3)
- Intellectual property (3)
- Law (3)
- Social media (3)
- Washington (3)
- Abortion (2)
- Arbitration (2)
- BIPA (2)
- Blockchain (2)
- Business Competition (2)
- CCPA (2)
- CRISPR (2)
- Consumer Data (2)
- Consumer Protection (2)
- Coronavirus (2)
- Debt (2)
- FERPA (2)
- Publication
-
- "Dharmasisya” Jurnal Program Magister Hukum FHUI (39)
- Seattle University Law Review (33)
- Canadian Journal of Law and Technology (19)
- Catholic University Journal of Law and Technology (11)
- Seattle Journal of Technology, Environmental & Innovation Law (5)
-
- FIU Law Review (4)
- Brooklyn Journal of International Law (3)
- Northwestern Journal of Technology and Intellectual Property (3)
- Vanderbilt Journal of Entertainment & Technology Law (3)
- Washington and Lee Law Review (3)
- DePaul Journal of Art, Technology & Intellectual Property Law (2)
- Fordham Law Review (2)
- IP Theory (2)
- Indian Journal of Law and Technology (2)
- Journal of Cybersecurity Education, Research and Practice (2)
- Notre Dame Journal on Emerging Technologies (2)
- Touro Law Review (2)
- Washington and Lee Journal of Civil Rights and Social Justice (2)
- American University Law Review (1)
- Animal Law Review (1)
- Arkansas Law Review (1)
- BYU Law Review (1)
- Brigham Young University Journal of Public Law (1)
- Brooklyn Journal of Corporate, Financial & Commercial Law (1)
- Brooklyn Law Review (1)
- Duquesne Law Review (1)
- Emancipations: A Journal of Critical Social Analysis (1)
- Emory Law Journal (1)
- Fordham Journal of Corporate & Financial Law (1)
- Global Business Law Review (1)
Articles 1 - 30 of 176
Full-Text Articles in Privacy Law
It's Finally Time For A National Data Privacy Law: A Discussion Of The American Data Privacy And Protection Act (Adppa), Erin J. An
Brooklyn Journal of Corporate, Financial & Commercial Law
Millions of Americans face unprecedented privacy risks related to their data, often without their awareness. With the increasing value of consumer data and its growing utilization by businesses, there is a growing demand for greater transparency and privacy protections. As of 2023, no comprehensive federal law governs data privacy in the United States, leaving citizens with limited protections. Introduced to Congress on June 21, 2022, the American Data and Privacy Protection Act (ADPPA) successfully passed the House of Representatives Committee on Energy and Commerce, making it the furthest a national comprehensive data privacy bill has progressed through the federal legislative …
How (Not) To Deal With The Bubble Effect In Cyberspace: The Case Of The Eu And Digital Services Act, João Tornada
How (Not) To Deal With The Bubble Effect In Cyberspace: The Case Of The Eu And Digital Services Act, João Tornada
Brooklyn Journal of International Law
Deliberative democracies are based on an ideal process of speech and dialogue that fosters an “uninhibited, robust, and wide-open” public discourse sphere. In cyberspace, social networks and search engine platforms largely operate with recommender systems that tailor content according to the users' interests and online behavior (“profiling”), thus segregating them from different points of view (“bubble effect”). While this personalization of content is particularly efficient to promote commercial goods and services, when it comes to information of common interest, especially on political matters, it undermines consensus-building dialogue and threatens democratic ideals. The theory of a free “marketplace of ideas” justifies …
Regulating The Revolution: A Legal Roadmap To Optimizing Ai In Healthcare, Fazal Khan Md, Jd
Regulating The Revolution: A Legal Roadmap To Optimizing Ai In Healthcare, Fazal Khan Md, Jd
Minnesota Journal of Law, Science & Technology
No abstract provided.
Fintech Lending In India: Taking Stock Of Implications For Privacy And Autonomy, Vidushi Marda, Amber Sinha
Fintech Lending In India: Taking Stock Of Implications For Privacy And Autonomy, Vidushi Marda, Amber Sinha
Indian Journal of Law and Technology
In the last five years, the Fintech sector has thrived in India, with Machine Learning (ML) driven credit scoring based on alternative data, emerging as a growing segment. The credit scoring industry in India needs to be viewed in light of a careful examination of rights, inclusion, appropriate safeguards and discrimination, currently missing from the discourse and practices. In this paper, we explain how ML-based credit scoring works, and the regulatory and commercial factors that have enabled and impeded its growth in India. Through legal and technological analysis, richened by insights from qualitative interviews with entrepreneurs and practitioners, we provide …
The Present And Future Of Ai Usage In The Banking And Financial Decision-Making Processes Within The Developing Indian Economy, Dr. Shouvik Kumar Guha, Bash Savage-Mansary, Dr. Navyajyoti Samanta
The Present And Future Of Ai Usage In The Banking And Financial Decision-Making Processes Within The Developing Indian Economy, Dr. Shouvik Kumar Guha, Bash Savage-Mansary, Dr. Navyajyoti Samanta
Indian Journal of Law and Technology
In course of this paper, the authors have soght to examine the extent to which technology based on artificial intelligence (AI) have made inroads into the banking and financial sectors of a developing economy like India. The paper begins with providing a contextual background to the adoption of such technology in the global financial arena. It then proceeds to identify and categorise the forms of AI currently being used in the Indian financial sector and also considers the different channels of operation where such technology is in vogue. The advantages of using such technology and the future goals for integrating …
Does Federal Law Ban Mailing Abortion Drugs? A Textual Analysis Of 18 U.S.C. § 1461, Peter Allevato
Does Federal Law Ban Mailing Abortion Drugs? A Textual Analysis Of 18 U.S.C. § 1461, Peter Allevato
Pepperdine Law Review
As the regulation of abortion availability returned to the States, many have grappled with so-called trigger laws: dormant laws that were set to take effect to restrict or ensure access to abortion should constitutional protection be revoked. While the federal government has no true trigger law, it does have long-unenforced laws prohibiting the mailing of “[e]very article or thing designed, adapted, or intended for producing abortion.” 18 U.S.C. § 1461 is an old law, and it has not been enforced for at least fifty years. But the law’s potential effect on the growing practice of mail-distribution of chemical abortion pills …
Our Changing Reality: The Metaverse And The Importance Of Privacy Regulations In The United States, Anushkay Raza
Our Changing Reality: The Metaverse And The Importance Of Privacy Regulations In The United States, Anushkay Raza
Global Business Law Review
This Note discusses the legal and pressing digital challenges that arise in connection with the growing use of virtual reality, and more specifically, the metaverse. As this digital realm becomes more integrated into our daily lives, the United States should look towards creating a federal privacy law that protects fundamental individual privacy rights. This Note argues that congress should emulate the European Union's privacy regulations, and further, balances the potential consequences and benefits of adapting European regulations within the United Sates. Finally, this Note provides drafting considerations of future lawyers who will not only be dealing with the rise of …
Perlindungan Hukum Bagi Pembeli Terhadap Gugatan Pembatalan Jual Beli Tanah Oleh Para Ahli Waris Penjual, M Waldi Ali Soraya, Lauditta Humaira ,S.H.,M.Kn.
Perlindungan Hukum Bagi Pembeli Terhadap Gugatan Pembatalan Jual Beli Tanah Oleh Para Ahli Waris Penjual, M Waldi Ali Soraya, Lauditta Humaira ,S.H.,M.Kn.
Lex Patrimonium
In the implementation of the Sale and Purchase Binding Agreement Deed, a dispute may occur. For example, if the land being sold is an inheritance. For example, one of the sellers does not approve of the sale and purchase, or the land is sold by someone who is not an heir. Of course the buyer will be disadvantaged. The aim of the research is to find out the legal provisions governing the unilateral cancellation of the PPJB, to explain the determination of unlawful acts and to analyze the legal protection for buyers in land sale and purchase agreements which are …
Why (And How) The Constitution Should Protect Prisoners From Gratuitous Disclosure Of Their Hiv/Aids Status, Dillon Schweers
Why (And How) The Constitution Should Protect Prisoners From Gratuitous Disclosure Of Their Hiv/Aids Status, Dillon Schweers
William & Mary Law Review
This Note is not the first to advocate for prisoners’ constitutional privacy rights concerning their HIV/AIDS status, but it is the first to focus on isolated incidents of disclosure rather than general policies that tend to lead to disclosure like mandatory testing or segregation based on HIV/AIDS status. This Note argues that the Fourteenth Amendment’s Due Process Clause should protect prisoners from isolated disclosures, meaning prisoners should have a § 1983 cause of action against guards or other prison officials who disclose their HIV/AIDS status in a gratuitous manner.
[...]
The proceeding section of this Note, Part I, details the …
Breaking The Fourth's Wall: The Implications Of Remote Education For Students' Fourth Amendment Rights, Sallie Hatfield
Breaking The Fourth's Wall: The Implications Of Remote Education For Students' Fourth Amendment Rights, Sallie Hatfield
Vanderbilt Journal of Entertainment & Technology Law
As the COVID-19 pandemic forced both public K-12 and higher education institutions to transition to exclusively provide remote education, students’ homes and personal lives were exposed to the government like never before. Zoom classes and remote proctoring were suddenly the norm. Students and their families scrambled to create appropriate offices and classroom spaces in their homes, and many awkward and invasive scenarios soon followed. While many may have been harmlessly captured on camera, like classes that witness a student’s family eating lunch in the background or a dog on the couch, even these harmless instances have insidious implications for the …
“Take Your Pictures, Leave Your (Digital) Footprints”: Increasing Privacy Protections For Children On Social Media, Kodie Mcginley
“Take Your Pictures, Leave Your (Digital) Footprints”: Increasing Privacy Protections For Children On Social Media, Kodie Mcginley
Golden Gate University Law Review
As the digital sphere becomes more prevalent in people’s lives, Congress has tried to keep up. First created in 1998, the Children’s Online Privacy Protection Act (COPPA) requires operators of websites directed at children to obtain consent from parents before collecting any personal information from children. COPPA also requires that operators take reasonable measures to protect the confidentiality of any personal information collected about children. Although COPPA has helped regulate online spaces, its focus is on regulating websites that collect personal information directly from children. This focus leaves a gap in the law that ignores personal data shared on social …
Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim
Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim
Journal of Cybersecurity Education, Research and Practice
This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity resilience. Cameroon's cybersecurity legal framework provides for audits but does not explicitly enumerate controls. Consequently, integrating relevant controls from the NIST frameworks and ISO Standards can improve the cybersecurity posture in Cameroon while waiting for a comprehensive revision of the legal framework. NIST and ISO are internationally recognized as best practices in information …
Privacy Harm And Non-Compliance From A Legal Perspective, Suvineetha Herath, Haywood Gelman, Lisa Mckee
Privacy Harm And Non-Compliance From A Legal Perspective, Suvineetha Herath, Haywood Gelman, Lisa Mckee
Journal of Cybersecurity Education, Research and Practice
In today's data-sharing paradigm, personal data has become a valuable resource that intensifies the risk of unauthorized access and data breach. Increased data mining techniques used to analyze big data have posed significant risks to data security and privacy. Consequently, data breaches are a significant threat to individual privacy. Privacy is a multifaceted concept covering many areas, including the right to access, erasure, and rectify personal data. This paper explores the legal aspects of privacy harm and how they transform into legal action. Privacy harm is the negative impact to an individual as a result of the unauthorized release, gathering, …
Privacy And National Politics: Fingerprint And Dna Litigation In Japan And The United States Compared, Dongsheng Zang
Privacy And National Politics: Fingerprint And Dna Litigation In Japan And The United States Compared, Dongsheng Zang
Pace Law Review
No abstract provided.
Table Of Contents, Seattle University Law Review
Table Of Contents, Seattle University Law Review
Seattle University Law Review
Table of Contents
Confronting Carpenter: Rethinking The Third-Party Doctrine And Location Information, Charlie Brownstein
Confronting Carpenter: Rethinking The Third-Party Doctrine And Location Information, Charlie Brownstein
Fordham Law Review
The third-party doctrine enables law enforcement officers to obtain personal information shared with third parties without a warrant. In an era of highly accessible technology, individuals’ location information is consistently being transmitted to third parties. Due to the third-party doctrine, this shared information has been available to law enforcement, without the individual knowing or having an opportunity to challenge this availability. Law enforcement has utilized this doctrine to obtain comprehensive information regarding individuals’ whereabouts over long periods of time.
The U.S. Supreme Court recently limited the reach of the third-party doctrine regarding location data held by cellphone providers. However, this …
Direct To Consumer Or Direct To All: Home Dna Tests And Lack Of Privacy Regulations In The United States, Karen J. Kukla
Direct To Consumer Or Direct To All: Home Dna Tests And Lack Of Privacy Regulations In The United States, Karen J. Kukla
IP Theory
Although the U.S. has some measures of privacy protection for genetic data, the lack of a comprehensive approach to protecting direct-to-consumer genetic testing results in privacy violations for both consumers and their relatives. This essay explores the critical need for the U.S. government to address these privacy violations and argues that the U.S. should approach the problem and strategize a solution similar to the European Union’s (EU) General Data Protection Regulation (GDPR). Part I identifies current United States law, both federal and state regulations that address DTC-GT and genetic privacy. Part II examines the lack of regulation surrounding current DTC-GT …
A Miscarriage Of Justice: How Femtech Apps And Fog Data Evade Fourth Amendment Privacy Protections, Rachel Silver
A Miscarriage Of Justice: How Femtech Apps And Fog Data Evade Fourth Amendment Privacy Protections, Rachel Silver
Washington and Lee Journal of Civil Rights and Social Justice
After the fall of Roe v. Wade, states across the country have enacted extreme abortion bans. Anti-abortion states, emboldened by their new, unrestricted power to regulate women’s bodies, are only broadening the scope of abortion prosecutions. And modern technology provides law enforcement with unprecedented access to women’s most intimate information, including, for example, their menstrual cycle, weight, body temperature, sexual activity, mood, medications, and pregnancy details. Fourth Amendment law fails to protect this sensitive information stored on femtech apps from government searches. In a largely unregulated private market, femtech apps sell health and location data to third parties like Fog …
Constitutional Confidentiality, Natalie Ram, Jorge L. Contreras, Laura M. Beskow, Leslie E. Wolf
Constitutional Confidentiality, Natalie Ram, Jorge L. Contreras, Laura M. Beskow, Leslie E. Wolf
Washington and Lee Law Review
Federal Certificates of Confidentiality (“Certificates”) protect sensitive information about human research subjects from disclosure and use in judicial, administrative, and legislative proceedings at both the state and federal levels. When they were first authorized by Congress in the 1970s, Certificates covered sensitive information collected in research about drug addiction use. Today, however, they extend to virtually all personal information gathered by biomedical research studies. The broad reach of Certificates, coupled with their power to override state subpoenas and warrants issued in the context of law enforcement, abortion regulation, and other police powers typically under state control, beg the question whether …
Stay Out Of My Head: Neurodata, Privacy, And The First Amendment, Wayne Unger
Stay Out Of My Head: Neurodata, Privacy, And The First Amendment, Wayne Unger
Washington and Lee Law Review
The once science-fictional idea of mind-reading is within reach as advancements in brain-computer interfaces, coupled with advanced artificial intelligence, produce neurodata—the collection of substantive thoughts as storable and processable data. But government access to individuals’ neurodata threatens personal autonomy and the right to privacy. While the Fourth Amendment is traditionally considered the source of privacy protections against government intrusion, the First Amendment provides more robust protections with respect to whether governments can access one’s substantive ideas, thoughts, and beliefs. However, many theorists assert that the concept of privacy conflicts with the First Amendment because privacy restricts the flow of information …
Keep Your Fingerprints To Yourself: New York Needs A Biometric Privacy Law, Brendan Mcnerney
Keep Your Fingerprints To Yourself: New York Needs A Biometric Privacy Law, Brendan Mcnerney
St. John's Law Review
(Excerpt)
Imagine walking into a store, picking something up, and just walking out. No longer is this shoplifting, it is legal. In 2016, Amazon introduced their “Just Walk Out” technology in Seattle. “Just Walk Out” uses cameras located throughout the store to monitor shoppers, document what they pick up, and automatically charge that shoppers’ Amazon account when they leave the store. Recently, Amazon started selling “Just Walk Out” technology to other retailers. Since then, retailers have become increasingly interested in collecting and using customers’ “biometric identifiers and information.” Generally, “biometrics” is used to refer to “measurable human biological and behavioral …
Accept All Cookies: Opting-In To A Comprehensive Federal Data Privacy Framework And Opting-Out Of A Disparate State Regulatory Regime, Lauren A. Di Lella
Accept All Cookies: Opting-In To A Comprehensive Federal Data Privacy Framework And Opting-Out Of A Disparate State Regulatory Regime, Lauren A. Di Lella
Villanova Law Review
No abstract provided.
Information Leaking And The United States Supreme Court, Chad Marzen, Michael Conklin
Information Leaking And The United States Supreme Court, Chad Marzen, Michael Conklin
Brigham Young University Journal of Public Law
No abstract provided.
A Sleeping Giant: Mhelath Applications, The Gdpr, And The Need For Federal Privacy Regulation In The United States, Kali Peeples
A Sleeping Giant: Mhelath Applications, The Gdpr, And The Need For Federal Privacy Regulation In The United States, Kali Peeples
Notre Dame Journal on Emerging Technologies
An analysis of privacy regulation concerning mHealth apps is a multifaceted process that requires the examination of changes within not only the healthcare space but also the technological world, as well as the legislative history and intent of various nations.The main issue being addressed in this paper is whether the United States should create nationwide legislation that directly relates to mHealth data protection or continue with a self-regulatory method. Part I focuses on the development and rapid creation of mHealth apps within the past decade. Part II seeks to illustrate the distinct privacy concerns of mHealth apps by concentrating on …
Deep Dive Into Deepfakes—Safeguarding Our Digital Identity, Yi Yan
Deep Dive Into Deepfakes—Safeguarding Our Digital Identity, Yi Yan
Brooklyn Journal of International Law
Deepfake technology is becoming increasingly sophisticated, and with it, the potential to pose a significant threat to the digital community, democratic institutions, and private individuals. With the creation of highly convincing but entirely fabricated audio, video, and images, there is a pressing need for the international community to address the vulnerabilities posed by deepfake technology in the current legal landscape through unambiguous legislation. This Note explores the ethical, legal, and social implications of deepfakes, including issues of privacy, identity theft, and political manipulation. It also reviews existing international legal frameworks, i.e., the Convention on Cybercrime (“Budapest Convention”) and proposes a …
Battling Baby Brokers: A Comparative Analysis Of The United States’ Versus Europe’S Adoption Policies, Amanda P. Gonzales
Battling Baby Brokers: A Comparative Analysis Of The United States’ Versus Europe’S Adoption Policies, Amanda P. Gonzales
Brooklyn Journal of International Law
Child adoption involves the permanent transfer of parental rights from a child’s biological or legal parents to another party. Parties in the Unites States (US) have engaged in this process in various forms for centuries. Today, over one hundred thousand children are adopted by American families each year. Many of these adoptions take place privately through agencies. An agency assists in the process of matching prospective adoptive parents with birth parents from whom they will adopt a child. In exchange for this assistance, the prospective adoptive parents pay tens of thousands of dollars in fees and expenses to the agency …
Complying With New And Existing Biometric Data Privacy Laws, Ariel Latzer
Complying With New And Existing Biometric Data Privacy Laws, Ariel Latzer
The Journal of Business, Entrepreneurship & the Law
After providing an overview of the history behind biometric information, this article will discuss the Illinois Biometric Privacy Act (BIPA)—which laid the foundation for biometric privacy regulations in the United States—and then discuss the California Consumer Privacy Act (CCPA) and its amendments in the California Privacy Rights Act (CPRA). It will also briefly touch on biometric information regulations in other states and then delve into how some notable companies are currently using individuals’ biometric information to give readers a general idea of what is happening to their personal information and highlight areas businesses should take note of in order to …
Encouraging Public Access To Pharmaceuticals Through Modified Protection Of Clinical Trial Data, Scott M. Nolan Ii
Encouraging Public Access To Pharmaceuticals Through Modified Protection Of Clinical Trial Data, Scott M. Nolan Ii
IP Theory
Part I of this Article investigates the development of pharmaceuticals and clinical trial data with a focus on patent and data protection. Part II evaluates the effects of protection and the challenges it poses to widespread public pharmaceutical access. Part III discusses two scholarly approaches to the public access issue that focus on clinical data protection and their associated challenges. In light of these scholarly works, Part IV suggests a new approach to clinical trial data protection that aims to improve public pharmaceutical access while maintaining the incentives to invent for drug developers.
The Future Of Data Protection Enforcement In Canada: Lessons From The Gdpr, Guilda Rostama, Teresa Scassa
The Future Of Data Protection Enforcement In Canada: Lessons From The Gdpr, Guilda Rostama, Teresa Scassa
Canadian Journal of Law and Technology
Imagine a not-too-distant scenario in which a private sector organization in Canada is investigated by the Privacy Commissioner of Canada jointly with the Commissioners of Quebec, British Columbia (‘‘BC”), and Alberta in relation to complaints that it shared massive quantities of personal data with third parties contrary to its stated practices in its privacy policies. Imagine also that each of the commissioners is empowered under newly amended data protection legislation to issue substantial Administrative Monetary Penalties (‘‘AMPs”). If each of the commissioners finds that its respective laws were breached, should the organization be subject to four different AMPs, or just …
Slouching Toward Regulation: Assessing Bill 88 As A Solution For Workplace Surveillance Harms, Danielle E. Thompson, Adam Molnar
Slouching Toward Regulation: Assessing Bill 88 As A Solution For Workplace Surveillance Harms, Danielle E. Thompson, Adam Molnar
Canadian Journal of Law and Technology
Employee monitoring applications (‘‘EMAs”) are proliferating in Canada and provide employers with sophisticated surveillance tools for the monitoring of workers (e.g., on-device video surveillance, browser activity, and email monitoring). In response to concerns about these increasingly invasive surveillance practices, the Government of Ontario passed Bill 88, the Working for Workers Act, 2022, which requires all employers with 25 or more workers to have a written policy stating whether and how they electronically monitor their employees. Bill 88 marks a more explict attempt to regulate workplace surveillance in a modern digital context in Canada; however; however, an analysis of the Bill’s …