Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Institution
Articles 1 - 30 of 40
Full-Text Articles in Privacy Law
Thinking Clearly About Privacy, Thomas Huff
Thinking Clearly About Privacy, Thomas Huff
Washington Law Review
The purpose of this article is to offer a fresh assessment of the right of privacy. It begins with discussion of the privacy norm, drawing on our ordinary judgments and experiences to clarify and elaborate the interest persons have in privacy. It then reviews some of the Supreme Court's reasoning on privacy, explains the Court's confusions, and proposes a way that we and the Court might think more clearly about these difficult matters.
Narrowing The "Routine Use" Exemption To The Privacy Act Of 1974, John W. Finger
Narrowing The "Routine Use" Exemption To The Privacy Act Of 1974, John W. Finger
University of Michigan Journal of Law Reform
This article suggests a balancing test to determine which routine uses of information legitimately fall within the Privacy Act. Part I briefly examines the background of the Act, concentrating on the legislative history of the routine use exemption, and examining problems the exemption presents. Part II then proposes a balancing test, based on notice and need for data, as a means of ascertaining proper routine uses.
Inheritability Of The Right Of Publicity Upon The Death Of The Famous, Ben C. Adams
Inheritability Of The Right Of Publicity Upon The Death Of The Famous, Ben C. Adams
Vanderbilt Law Review
After tracing the evolution of the right of publicity, this Recent Development focuses on these recent decisions confronting the issue of descendibility. This Recent Development then concludes that the right of publicity should be inheritable for a designated period of time and that inheritability should not depend upon previous exploitation of the right.
An Analytical Model To Assure Consideration Of Parental And Familial Interests When Defining The Constitutional Rights Of Minors-An Examination Of In Re Scott K., Matthew Fenn Hilton
An Analytical Model To Assure Consideration Of Parental And Familial Interests When Defining The Constitutional Rights Of Minors-An Examination Of In Re Scott K., Matthew Fenn Hilton
BYU Law Review
No abstract provided.
Police Use Of Cctv Surveillance: Constitutional Implications And Proposed Regulations, Gary C. Robb
Police Use Of Cctv Surveillance: Constitutional Implications And Proposed Regulations, Gary C. Robb
University of Michigan Journal of Law Reform
This article evaluates the constitutionality of CCTV "searches." Part I discusses the present uses being made of closed circuit technology and evaluates the merits of the CCTV surveillance system. The critical policy trade-off is the system's effectiveness in combatting crime against the resulting loss of privacy to individual citizens.
Part II considers the constitutional implications of CCTV use in terms of three major doctrines: the Fourth Amendment prohibition against "unreasonable searches and seizures"; the constitutional right of privacy; and the First Amendment guarantees of free speech and association. This part briefly summarizes the state of the law concerning these constitutional …
Pennsylvania Constitutional Law - Search And Seizure - Right To Privacy - Individual Banking Records, Jane E. L. Miller
Pennsylvania Constitutional Law - Search And Seizure - Right To Privacy - Individual Banking Records, Jane E. L. Miller
Duquesne Law Review
The Pennsylvania Supreme Court has held that the Pennsylvania Constitution protects an individual bank depositor's records from unauthorized police subpoenas when no legal proceedings have been instituted against the individual.
Commonwealth v. DeJohn, 403 A.2d 1283 (Pa. 1979)
Introduction: Electronic Funds Transfer Systems, 2 Computer L.J. 1 (1980), George W. Mitchell
Introduction: Electronic Funds Transfer Systems, 2 Computer L.J. 1 (1980), George W. Mitchell
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The 348 Committee - An Interim Report, 2 Computer L.J. 27 (1980), Robert Haydock Jr.
The 348 Committee - An Interim Report, 2 Computer L.J. 27 (1980), Robert Haydock Jr.
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
An Overview Of The Legal Issues Confronting The Establishment Of Electronic Fund Transfer Services, 2 Computer L.J. 7 (1980), Melvin R. Katskee, Ann L. Wright
An Overview Of The Legal Issues Confronting The Establishment Of Electronic Fund Transfer Services, 2 Computer L.J. 7 (1980), Melvin R. Katskee, Ann L. Wright
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Terminal-Based Eft Services: The Need For Uniform Federal Legislation, 2 Computer L.J. 31 (1980), Theresa A. Einhorn
Terminal-Based Eft Services: The Need For Uniform Federal Legislation, 2 Computer L.J. 31 (1980), Theresa A. Einhorn
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Authentication In Eft: The Legal Standard And The Operational Reality, 2 Computer L.J. 67 (1980), Fred M. Greguras, David J. Sykes
Authentication In Eft: The Legal Standard And The Operational Reality, 2 Computer L.J. 67 (1980), Fred M. Greguras, David J. Sykes
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Book Review: The Law Of Electronic Funds Transfer, 2 Computer L.J. 167 (1980), Howard D. Neal
Book Review: The Law Of Electronic Funds Transfer, 2 Computer L.J. 167 (1980), Howard D. Neal
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Case Digest, 2 Computer L.J. 171 (1980), Michael D. Scott
Case Digest, 2 Computer L.J. 171 (1980), Michael D. Scott
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Problems Of Proof When There's A Computer Goof: Consumers Versus Atms, 2 Computer L.J. 49 (1980), Mark Budnitz
Problems Of Proof When There's A Computer Goof: Consumers Versus Atms, 2 Computer L.J. 49 (1980), Mark Budnitz
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Legal Guidelines For Check Truncation, 2 Computer L.J. 115 (1980), George C. White Jr.
Legal Guidelines For Check Truncation, 2 Computer L.J. 115 (1980), George C. White Jr.
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Competitive Implications Of Eft, 2 Computer L.J. 133 (1980), James L. Pierce
The Competitive Implications Of Eft, 2 Computer L.J. 133 (1980), James L. Pierce
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Is Corporate Eft Coming Of Age?, 2 Computer L.J. 87 (1980), James W. Trotter
Is Corporate Eft Coming Of Age?, 2 Computer L.J. 87 (1980), James W. Trotter
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Electronic Giro For The United States, 2 Computer L.J. 101 (1980), James V. Vergari
Electronic Giro For The United States, 2 Computer L.J. 101 (1980), James V. Vergari
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Implications Of The Informational Nature Of Payments, 2 Computer L.J. 153 (1980), James L. Brown
Implications Of The Informational Nature Of Payments, 2 Computer L.J. 153 (1980), James L. Brown
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Electronic Funds Transfer Systems Bibliography, 2 Computer L.J. 183 (1980), Michael D. Scott
Electronic Funds Transfer Systems Bibliography, 2 Computer L.J. 183 (1980), Michael D. Scott
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
On Charging Computer Crime, 2 Computer L.J. 429 (1980), Donald G. Ingraham
On Charging Computer Crime, 2 Computer L.J. 429 (1980), Donald G. Ingraham
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
A Survey Of Computer Crime Studies, 2 Computer L.J. 275 (1980), John K. Taber
A Survey Of Computer Crime Studies, 2 Computer L.J. 275 (1980), John K. Taber
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Investigation, Prosecution, And Prevention Of Computer Crime: A State-Of-The-Art Review, 2 Computer L.J. 385 (1980), Mary R. Volgyes
The Investigation, Prosecution, And Prevention Of Computer Crime: A State-Of-The-Art Review, 2 Computer L.J. 385 (1980), Mary R. Volgyes
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Computer Abuse Research Update, 2 Computer L.J. 329 (1980), Donn B. Parker
Computer Abuse Research Update, 2 Computer L.J. 329 (1980), Donn B. Parker
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Computer Abuse And Computer Crime As Organizational Activities, 2 Computer L.J. 403 (1980), Rob Kling
Computer Abuse And Computer Crime As Organizational Activities, 2 Computer L.J. 403 (1980), Rob Kling
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Book Reviews, 2 Computer L.J. 773 (1980), Steven I. Smith, Michael D. Scott
Book Reviews, 2 Computer L.J. 773 (1980), Steven I. Smith, Michael D. Scott
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Computer Crime - The Need For Deterrent Legislation, 2 Computer L.J. 353 (1980), Stanley L. Sokolik
Computer Crime - The Need For Deterrent Legislation, 2 Computer L.J. 353 (1980), Stanley L. Sokolik
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Trial Of A Computer Crime, 2 Computer L.J. 441 (1980), Jay Becker
The Trial Of A Computer Crime, 2 Computer L.J. 441 (1980), Jay Becker
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Computer-Assisted Crime In Scandinavia, 2 Computer L.J. 457 (1980), Stein Schjølberg
Computer-Assisted Crime In Scandinavia, 2 Computer L.J. 457 (1980), Stein Schjølberg
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Current And Proposed Computer Crime Legislation, 2 Computer L.J. 721 (1980), Michael M. Krieger
Current And Proposed Computer Crime Legislation, 2 Computer L.J. 721 (1980), Michael M. Krieger
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.