Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Science and Technology Law (21)
- Computer Law (20)
- Internet Law (20)
- Legal History (4)
- Consumer Protection Law (3)
-
- Legal Writing and Research (3)
- Criminal Law (2)
- Education Law (2)
- Intellectual Property Law (2)
- Juvenile Law (2)
- Marketing Law (2)
- State and Local Government Law (2)
- Courts (1)
- First Amendment (1)
- Gaming Law (1)
- Judges (1)
- Legal Ethics and Professional Responsibility (1)
- Legislation (1)
- Sexuality and the Law (1)
- Supreme Court of the United States (1)
- Torts (1)
Articles 1 - 23 of 23
Full-Text Articles in Privacy Law
Back To The Future: Revisiting Zippo In Light Of "Modern Concerns", 29 J. Marshall J. Computer & Info. L. 231 (2012), David Swetnam-Burland, Stacy O. Stitham
Back To The Future: Revisiting Zippo In Light Of "Modern Concerns", 29 J. Marshall J. Computer & Info. L. 231 (2012), David Swetnam-Burland, Stacy O. Stitham
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
"Tinkering" With The First Amendment's Protection Of Student Speech On The Internet, 29 J. Marshall J. Computer & Info. L. 167 (2012), Steven M. Puiszis
"Tinkering" With The First Amendment's Protection Of Student Speech On The Internet, 29 J. Marshall J. Computer & Info. L. 167 (2012), Steven M. Puiszis
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
World Wide Web Of Love, Lies, And Legislation: Why Online Dating Websites Should Screen Members, 29 J. Marshall J. Computer & Info. L. 251 (2012), Maureen Horcher
World Wide Web Of Love, Lies, And Legislation: Why Online Dating Websites Should Screen Members, 29 J. Marshall J. Computer & Info. L. 251 (2012), Maureen Horcher
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The 20th Belle R. And Joseph H. Braun Memorial Symposium: The Development Of Privacy Law From Brandeis To Today: Opening Remarks, 29 J. Marshall J. Computer & Info. L. 279 (2012), Ralph Ruebner, Leslie Ann Reis, David E. Sorkin
The 20th Belle R. And Joseph H. Braun Memorial Symposium: The Development Of Privacy Law From Brandeis To Today: Opening Remarks, 29 J. Marshall J. Computer & Info. L. 279 (2012), Ralph Ruebner, Leslie Ann Reis, David E. Sorkin
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Session I: The Legacy Of Justice Arthur Goldberg, 29 J. Marshall J. Computer & Info. L. 285 (2012), Samuel R. Olken, Gerald Berendt, Gilbert A. Cornfield, Gilbert Feldman, David Stebenne, Milton I. Shadur
Session I: The Legacy Of Justice Arthur Goldberg, 29 J. Marshall J. Computer & Info. L. 285 (2012), Samuel R. Olken, Gerald Berendt, Gilbert A. Cornfield, Gilbert Feldman, David Stebenne, Milton I. Shadur
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Session Ii: Historical Perspectives On Privacy In American Law, 29 J. Marshall J. Computer & Info. L. 319 (2012), Steven D. Schwinn, Alberto Bernabe, Kathryn Kolbert, Adam D. Moore, Marc Rotenberg
Session Ii: Historical Perspectives On Privacy In American Law, 29 J. Marshall J. Computer & Info. L. 319 (2012), Steven D. Schwinn, Alberto Bernabe, Kathryn Kolbert, Adam D. Moore, Marc Rotenberg
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Dedication Of The Arthur J. Goldberg Memorial Courtroom, 29 J. Marshall J. Computer & Info. L. 405 (2012), Hon. Antonin Scalia
Dedication Of The Arthur J. Goldberg Memorial Courtroom, 29 J. Marshall J. Computer & Info. L. 405 (2012), Hon. Antonin Scalia
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Giving Credit Where Credit Is Due: A Comment On The Theoretical Foundation And Historical Origin Of The Tort Remedy For Invasion Of Privacy, 29 J. Marshall J. Computer & Info. L. 493 (2012), Alberto Bernabe
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Session Iv: Technology And The Future Of Privacy, 29 J. Marshall J. Computer & Info. L. 379 (2012), David E. Sorkin, Ann Bartow, Robert S. Gurwin, Doris E. Long
Session Iv: Technology And The Future Of Privacy, 29 J. Marshall J. Computer & Info. L. 379 (2012), David E. Sorkin, Ann Bartow, Robert S. Gurwin, Doris E. Long
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Session Iii: Privacy Regulation And Policy Perspectives, 29 J. Marshall J. Computer & Info. L. 343 (2012), Leslie Ann Reis, Mary Ellen Callahan, Renard Francois, Peter P. Swire, C. William O'Neill
Session Iii: Privacy Regulation And Policy Perspectives, 29 J. Marshall J. Computer & Info. L. 343 (2012), Leslie Ann Reis, Mary Ellen Callahan, Renard Francois, Peter P. Swire, C. William O'Neill
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
What's Mine Is Yours: Targeting Privacy Issues And Determining The Best Solutions For Behavioral Advertising, 29 J. Marshall J. Computer & Info. L. 637 (2012), Sarah Cathryn Brandon
What's Mine Is Yours: Targeting Privacy Issues And Determining The Best Solutions For Behavioral Advertising, 29 J. Marshall J. Computer & Info. L. 637 (2012), Sarah Cathryn Brandon
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Drug Testing And Privacy In The Workplace, 29 J. Marshall J. Computer & Info. L. 463 (2012), Adam D. Moore
Drug Testing And Privacy In The Workplace, 29 J. Marshall J. Computer & Info. L. 463 (2012), Adam D. Moore
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
A Liberal Communitarian Conception Of Privacy, 29 J. Marshall J. Computer & Info. L. 419 (2012), Amitai Etzioni
A Liberal Communitarian Conception Of Privacy, 29 J. Marshall J. Computer & Info. L. 419 (2012), Amitai Etzioni
UIC John Marshall Journal of Information Technology & Privacy Law
In a large and complex society, anti-social behavior cannot be restrained by government intervention alone—without it becoming a police state. Informal social controls are necessary to keep deviance from societal norms and values at a socially acceptable level, and one of the levers of this social pressure is the observation of and reaction to the personal conduct of members of one’s community.
This article argues that in several areas of contemporary American life decreasing privacy by strengthening informal social controls will lessen the need for state surveillance and regulation, which tends to be act with a heavier hand and is …
Turning Points In Telecommunications History, 29 J. Marshall J. Computer & Info. L. 513 (2012), Paul J. Larkin, Jr.
Turning Points In Telecommunications History, 29 J. Marshall J. Computer & Info. L. 513 (2012), Paul J. Larkin, Jr.
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Curious Case Of Convenience Casinos: How Internet Sweepstakes Cafes Survive In A Gray Area Between Unlawful Gambling And Legitimate Business Promotions, 29 J. Marshall J. Computer & Info. L. 594 (2012), Steve Silver
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Thirty-First Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 29 J. Marshall J. Computer & Info. L. 701 (2012), Kyle Fonville, Grace Hwang, Nivesh Oudit
The Thirty-First Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 29 J. Marshall J. Computer & Info. L. 701 (2012), Kyle Fonville, Grace Hwang, Nivesh Oudit
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Right To Information Identity, 29 J. Marshall J. Computer & Info. L. 539 (2012), Elad Oreg
Right To Information Identity, 29 J. Marshall J. Computer & Info. L. 539 (2012), Elad Oreg
UIC John Marshall Journal of Information Technology & Privacy Law
Inspired by the famous Warren and Brandeis conceptualization of the “right to privacy,” this article tries to answer a modern, conceptual lacuna and presents the argument for the need to conceptualize and recognize a new, independent legal principle of a “right to information identity.” This is the right of an individual to the functionality of the information platforms that enable others to identify and know him and to remember who and what he is. Changes in technology and social standards make the very notion of identity increasingly fluid, transforming the way it is treated and opening new and fascinating ways …
The Thirty-First Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 29 J. Marshall J. Computer & Info. L. 673 (2012), Russell Bottom, Greer Herman, Catherine Nance, Robin Ann Sowizrol, Gina Spada
The Thirty-First Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 29 J. Marshall J. Computer & Info. L. 673 (2012), Russell Bottom, Greer Herman, Catherine Nance, Robin Ann Sowizrol, Gina Spada
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Thirty-First Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 29 J. Marshall J. Computer & Info. L. 733 (2012), Christopher Dabney, Kara Franklin
The Thirty-First Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 29 J. Marshall J. Computer & Info. L. 733 (2012), Christopher Dabney, Kara Franklin
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Where Art Thou, Privacy: Expanding Privacy Rights Of Minors In Regard To Consensual Sex: Statutory Rape Laws And The Need For A Romeo And Juliet Exception In Illinois, 46 J. Marshall L. Rev. 309 (2012), Jordan Franklin
UIC Law Review
No abstract provided.
Cloudy With A Chance Of Waiver: How Cloud Computing Complicates The Attorney-Client Privilege, 46 J. Marshall L. Rev. 383 (2012), Timothy Peterson
Cloudy With A Chance Of Waiver: How Cloud Computing Complicates The Attorney-Client Privilege, 46 J. Marshall L. Rev. 383 (2012), Timothy Peterson
UIC Law Review
No abstract provided.
Is It Justice Or A Crime To Record The Police?: A Look At The Illinois Eavesdropping Statute And Its Application, 45 J. Marshall L. Rev. 485 (2012), Stephanie Claiborne
Is It Justice Or A Crime To Record The Police?: A Look At The Illinois Eavesdropping Statute And Its Application, 45 J. Marshall L. Rev. 485 (2012), Stephanie Claiborne
UIC Law Review
No abstract provided.
The Ownership And Exploitation Of Personal Identity In The New Media Age, 12 J. Marshall Rev. Intell. Prop. L. 1 (2012), Thomas Hemnes
The Ownership And Exploitation Of Personal Identity In The New Media Age, 12 J. Marshall Rev. Intell. Prop. L. 1 (2012), Thomas Hemnes
UIC Review of Intellectual Property Law
Personally Identifiable Information (“PII”) has never been more valuable. In today’s networked world, seemingly trivial facts can be collected, molded into a marketable economic profile, and transferred in the blink of an eye. To be sure, the commodification of PII allows for provision of dramatically more efficient and effective services. Yet the potential for privacy abuses is substantial. What interest does one have in the constellation of facts that defines one’s identity? Is it something one can own, like their right of publicity? Or are others free to use what they learn about a person? This article surveys current privacy …