Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Privacy Law

Private Lives At Home And Public Lives In Court: Protecting The Privacy Of Federal Judges' Home Addresses, Hannah Elias Sbaity Jul 2021

Private Lives At Home And Public Lives In Court: Protecting The Privacy Of Federal Judges' Home Addresses, Hannah Elias Sbaity

Journal of Intellectual Property Law

Targeted murders of federal judges and their families at their private homes date back to May 29, 1979. Most recently, in July 2020, Judge Esther Salas’s only son, Daniel, was murdered and her husband near-fatally shot at their home. Individuals wishing to inflict such harm or death at federal judges’ homes have been able to do so because of federal judges’ publicly available home addresses. Because personally identifying information (PII) is defined differently from statute to statute, home addresses largely remain public information in most states and can be found in real estate records, data broker websites, social media platforms, …


A Deep Dive Into Technical Encryption Concepts To Better Understand Cybersecurity & Data Privacy Legal & Policy Issues, Anthony Volini Jul 2021

A Deep Dive Into Technical Encryption Concepts To Better Understand Cybersecurity & Data Privacy Legal & Policy Issues, Anthony Volini

Journal of Intellectual Property Law

Lawyers wishing to exercise a meaningful degree of leadership at the intersection of technology and the law could benefit greatly from a deep understanding of the use and application of encryption, considering it arises in so many legal scenarios. For example, in FTC v. Wyndham1 the defendant failed to implement nearly every conceivable cybersecurity control, including lack of encryption for stored data, resulting in multiple data breaches and a consequent FTC enforcement action for unfair and deceptive practices. Other examples of legal issues requiring use of encryption and other technology concepts include compliance with security requirements of GLBA & HIPAA, …


Cybersecurity, Shareholders, And The Boardroom: An Analysis Of Current And Proposed Measures For Protecting Corporate Intellectual Property, Kathryn V. Wymer Dec 2018

Cybersecurity, Shareholders, And The Boardroom: An Analysis Of Current And Proposed Measures For Protecting Corporate Intellectual Property, Kathryn V. Wymer

Journal of Intellectual Property Law

No abstract provided.


A Duty To Safeguard: Data Breach Litigation Through A Quasi-Bailment Lens, Miles Christian Skedvold Dec 2018

A Duty To Safeguard: Data Breach Litigation Through A Quasi-Bailment Lens, Miles Christian Skedvold

Journal of Intellectual Property Law

No abstract provided.


The Georgia Open Records Law Electronic Signature Exception: The Intersection Of Privacy, Technology, And Open Records, Michael L. Van Cise Oct 2016

The Georgia Open Records Law Electronic Signature Exception: The Intersection Of Privacy, Technology, And Open Records, Michael L. Van Cise

Journal of Intellectual Property Law

No abstract provided.


Taking A Bite Out Of Michael Vick's Publicity Rights: An Analysis Of How Teh Right Of Publicity Should Be Treated After A Celebrity Is Convicted Of A Crime, Stephen Reginald Fowler Jun 2016

Taking A Bite Out Of Michael Vick's Publicity Rights: An Analysis Of How Teh Right Of Publicity Should Be Treated After A Celebrity Is Convicted Of A Crime, Stephen Reginald Fowler

Journal of Intellectual Property Law

No abstract provided.


Rights Of Publicity: A Practitioner's Enigma, Gil N. Peles Esq. Jun 2016

Rights Of Publicity: A Practitioner's Enigma, Gil N. Peles Esq.

Journal of Intellectual Property Law

No abstract provided.