Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (36)
- Computer Law (27)
- Science and Technology Law (24)
- Intellectual Property Law (14)
- Constitutional Law (8)
-
- First Amendment (6)
- Fourth Amendment (6)
- Education Law (5)
- Marketing Law (5)
- Juvenile Law (4)
- Law and Society (4)
- Comparative and Foreign Law (3)
- Consumer Protection Law (3)
- Legal Writing and Research (3)
- Military, War, and Peace (3)
- Civil Law (2)
- Criminal Law (2)
- Health Law and Policy (2)
- Law Enforcement and Corrections (2)
- Law and Gender (2)
- Sexuality and the Law (2)
- Civil Rights and Discrimination (1)
- Communication (1)
- Communications Law (1)
- Contracts (1)
- Criminal Procedure (1)
- Entertainment, Arts, and Sports Law (1)
- Family Law (1)
- Institution
-
- UIC School of Law (18)
- Schulich School of Law, Dalhousie University (10)
- University of Richmond (5)
- Vanderbilt University Law School (5)
- University of Michigan Law School (4)
-
- Pace University (3)
- University of Oklahoma College of Law (3)
- West Virginia University (3)
- New York Law School (2)
- Georgia State University College of Law (1)
- University of Baltimore Law (1)
- University of New Hampshire (1)
- University of San Diego (1)
- University of Washington School of Law (1)
- University of the District of Columbia School of Law (1)
- University of the Pacific (1)
- Keyword
-
- Privacy (11)
- Internet (4)
- Social networking (4)
- Fourth Amendment (3)
- Information (3)
-
- E-discovery (2)
- Federal Trade Commission (2)
- Free speech (2)
- Freedom of expression (2)
- Griswold v. Connecticut (2)
- Human rights (2)
- Law enforcement (2)
- Access to information (1)
- Advertising (1)
- Advertising of pharmaceuticals (1)
- Anonymity (1)
- Anonymous (1)
- Anonymous online comments (1)
- Assisted Outpatient Treatment (AOT) (1)
- Atkins v. Commonwealth (1)
- Authorization (1)
- Bavarian Lager (1)
- Behavior (1)
- Boring v. Google Inc (1)
- Britain (1)
- British Gas (1)
- British Gas Trading v. Data Protection Registrar (1)
- COPPA (1)
- Child Online Privacy Protection Act (1)
- Children's privacy online (1)
- Publication
-
- UIC John Marshall Journal of Information Technology & Privacy Law (12)
- Canadian Journal of Law and Technology (10)
- UIC Law Review (6)
- Pace Law Review (3)
- Richmond Journal of Law & Technology (3)
-
- Vanderbilt Journal of Entertainment & Technology Law (3)
- West Virginia Law Review (3)
- Michigan Telecommunications & Technology Law Review (2)
- NYLS Law Review (2)
- Oklahoma Law Review (2)
- American Indian Law Review (1)
- Georgia State University Law Review (1)
- Global Business & Development Law Journal (1)
- Michigan Law Review (1)
- Richmond Journal of Law and the Public Interest (1)
- Richmond Public Interest Law Review (1)
- San Diego Law Review (1)
- The University of New Hampshire Law Review (1)
- University of Baltimore Law Review (1)
- University of Michigan Journal of Law Reform (1)
- University of the District of Columbia Law Review (1)
- Vanderbilt Journal of Transnational Law (1)
- Vanderbilt Law Review (1)
- Washington International Law Journal (1)
Articles 1 - 30 of 60
Full-Text Articles in Privacy Law
An Illusory Expectation Of Privacy: The Ecpa Is Insufficient To Provide Meaningful Protection For Advanced Communication Tools, Sara E. Brown
An Illusory Expectation Of Privacy: The Ecpa Is Insufficient To Provide Meaningful Protection For Advanced Communication Tools, Sara E. Brown
West Virginia Law Review
No abstract provided.
Do Sexting Prosecutions Violate Teenagers' Constitutional Rights?, Joanne Sweeny
Do Sexting Prosecutions Violate Teenagers' Constitutional Rights?, Joanne Sweeny
San Diego Law Review
The media has recently been highlighting a rash of prosecutions of teenagers who engage in "sexting"--sending nude or sexually explicit images of themselves or their peers--under child pornography laws. These prosecutions have led to mass criticism for threatening teens with long prison terms and registration as sex offenders for activities that are perceived to be relatively innocent. Many, if not most, of these sexting teens are legally permitted to engage in sexual activities through their states' statutory rape laws, which leads to an absurd situation in which teens are permitted to engage in sex but not photograph it. This mismatch …
Protecting Anonymous Expression: The Internet's Role In Washington State's Disclosure Laws And The Direct Democracy Process, Karen Cullinane
Protecting Anonymous Expression: The Internet's Role In Washington State's Disclosure Laws And The Direct Democracy Process, Karen Cullinane
University of Michigan Journal of Law Reform
This Note proposes that the Washington State Legislature amend its Public Records Act to exempt from public disclosure personal information legally required to be disclosed by signers of referendum petitions. This Note also proposes that the Washington State Legislature designate an electronic system, to be detailed in its election law, by which referendum petitions can be checked for fraud without violating the right to anonymous expression protected by the First Amendment. Part I describes Washington State's referendum process and the path of Doe v. Reed, the case animating the reform presented in this Note. Part II illustrates how the rise …
Overcoming The Digital Tsunami In E-Discovery: Is Visual Analysis The Answer?, Victoria L. Lemieux, Jason R. Baron
Overcoming The Digital Tsunami In E-Discovery: Is Visual Analysis The Answer?, Victoria L. Lemieux, Jason R. Baron
Canadian Journal of Law and Technology
New technologies are generating potentially discoverable evidence in electronic form in ever increasing volumes. As a result, traditional techniques of document search and retrieval in pursuit of electronic discovery in litigation are becoming less viable. One potential new technological solution to the e-discovery search and retrieval challenge is Visual Analysis (VA). VA is a technology that combines the computational power of the computer with graphical representations of large datasets to enable interactive analytic capabilities. This article provides an overview of VA technology and how it is being applied in the analysis of e-mail and other electronic documents in the field …
The Internet And Protection Of Children Online: Time For Change, Jill Scott
The Internet And Protection Of Children Online: Time For Change, Jill Scott
Canadian Journal of Law and Technology
This article explores the risks for children online and their privacy, with particular focus on the implications of widespread collection, use and retention of data about them. It touches on international standards and national laws that impact Internet activities and the special risk to children’s privacy in today’s ubiquitous computing environment. This is a complex topic that transcends national boundaries and involves both legal and policy issues confronting governments across the world.
Section I provides a brief outline of the online risks for children arising from the scope of data collection and the regulatory challenges of the Internet as it …
Location-Based Services And Privacy, Teresa Scassa, Anca Sattler
Location-Based Services And Privacy, Teresa Scassa, Anca Sattler
Canadian Journal of Law and Technology
In this paper we begin by describing location-based services, their evolution and their future directions. We then outline privacy issues raised by such services. In Part III we consider how current Canadian data protection laws apply to location-based services, and indicate where such laws fall short of addressing the full range of issues raised by location-based services. Part IV of the paper explores some technological methods to address the privacy challenges raised by location-based services. The paper concludes with a series of recommendations.
Electronic Discovery- Sedona Canada Is Inadequate On Records Management - Here's Sedona Canada In Amended Form, Ken Chasse
Canadian Journal of Law and Technology
A paper record can exist without its records system; an electronic record cannot. To use, corrupt, or destroy a paper record, one needs physical access to the records system wherein it is stored. But to use, corrupt, or destroy an electronic record one merely needs electronic access to its records system, from anywhere. Therefore any set of rules or principles for controlling the use of electronic records for any purpose, including electronic discovery, should incorporate the established policies and practices of electronic records management.
As to cost, rules of electronic discovery are needed with which to punish par- ties with …
Tax Implications For Non-Residents Conducting E-Commerce In Canada, Mike Nienhuis
Tax Implications For Non-Residents Conducting E-Commerce In Canada, Mike Nienhuis
Canadian Journal of Law and Technology
This paper focuses on taxation issues faced by non-resident e-commerce companies with no sustained presence in Canada apart from a web site. The tax liability of foreign corporations with a Canadian subsidiary, a physical Canadian office, or Canadian-based employees or agents will not be considered, even though there is substantial overlap in some of the relevant issues. By e-commerce companies we refer broadly to any firms conducting their primary business — whether business- to-business (B2B) or business-to-consumer (B2C) — by means of the internet.
In the first section we outline the framework for Canada’s taxation of non-residents conducting business in …
Institutional Liability In The E-Health Era, James Williams, Craig Kuziemsky
Institutional Liability In The E-Health Era, James Williams, Craig Kuziemsky
Canadian Journal of Law and Technology
This paper examines the jurisprudence on institutional liability for medical er- ror. We argue that the existing jurisprudence relies on assumptions that have been made obsolete by technological advances. In particular, we concentrate on the use of information and communication technologies (ICTs) in the health care domain. As we demonstrate, the use of these tools does not merely increase efficiency and support new health care functions; among other effects, ICT can have a profound influence on how health care practitioners make observations, exercise judgment and perform tasks. These tools influence human capabilities (at both the individual and systems level) in …
Prohibiting Medical Method Patents: A Criticism Of The Status Quo, Mark S. Wilke
Prohibiting Medical Method Patents: A Criticism Of The Status Quo, Mark S. Wilke
Canadian Journal of Law and Technology
Methods of medical treatment are not patentable in Canada. This means that inventions involving the performance of surgery, administration of medicine, or extraction of fluids or tissue for diagnostic tests cannot directly be protected under the current patent regime. However, this prohibition is not an absolute ban. Many medical innovations are patentable, including surgical tools and devices, drugs and other chemical compounds, medical “uses”, diagnostic assays and methods of treat- ing “natural” conditions. The practical reality is that the distinction between what is and what is not patentable is poorly defined. This uncertainty presents a steep challenge for inventors and …
L'Impact D'Internet Sur Les Paradigmes De La Régulation De L'Audiovisuel, Gilles De Saint Exupéry
L'Impact D'Internet Sur Les Paradigmes De La Régulation De L'Audiovisuel, Gilles De Saint Exupéry
Canadian Journal of Law and Technology
Nous nous intéresserons particulièrement à la mutation du paradigme de la régulation de l’audiovisuel classique13 dû à plusieurs facteurs: pour être diffuseur sur les ondes hertzienne il fallait être titulaire d’une licence accordé par l’Etat, sur Internet tout le monde peut l’être à sa guise. Les moyens techniques et financiers ne sont plus une barrière à l’ entrée, le nombre de joueurs qui e ́ tait jusque-là restreint devient, en théorie, incalculable. Le mécanisme de responsabilité mis en place est remis en cause, par la dilution des frontières, l’anonymat, ou l’insolvabilité des diffuseurs. Les modèles d’affaires doivent être revus, le …
Direct-To-Consumer Advertising Of Pharmaceuticals On Television: A Charter Challenge, Elvina C. Chow
Direct-To-Consumer Advertising Of Pharmaceuticals On Television: A Charter Challenge, Elvina C. Chow
Canadian Journal of Law and Technology
The Supreme Court of Canada has consistently wrestled with the conflict between legislation designed to protect consumers’ health and the constitutional guarantee of the fundamental freedom of expression. This paper investigates the justification for the current regulatory framework for pharmaceutical advertising on television. Aware that the provisions in the FDA are able to withstand Charter of Rights and Freedoms (Charter) scrutiny, several possible policy initiations are nevertheless proposed.
The paper is divided into five separate sections. Having first introduced DTCA of pharmaceuticals on television in Section I, I will now turn to a more comprehensive examination of DTCA in Canada …
Lessons From Bilski, Haewon Chung
Lessons From Bilski, Haewon Chung
Canadian Journal of Law and Technology
In this paper, I will examine how the U.S. and Canadian courts have approached the patentability of intangible inventions and discuss whether any lessons can be learned from the U.S.’s patent dilemma. In section 2, I will review the American jurisprudence on patentability of intangible inventions. In section 3, I will discuss the potential impact Bilski may have on the American jurisprudence. Section 4 will assess the Canadian jurisprudence on patentability of intangible inventions. In section 5, I will discuss the Federal Court of Canada’s decision in Amazon/FCC. I argue that based on recent events in the American jurisprudence, Canadian …
London, Libel Capital No Longer? The Draft Defamation Act 2011 And The Future Of Libel Tourism, Thomas Sanchez
London, Libel Capital No Longer? The Draft Defamation Act 2011 And The Future Of Libel Tourism, Thomas Sanchez
The University of New Hampshire Law Review
[Excerpt] “In the past decade, London emerged as the forum of choice for “libel tourists”—strategic, often foreign, plaintiffs who bring defamation actions in a jurisdiction with plaintiff-friendly libel laws, even if they and the defamatory material at issue lack a substantial connection with that jurisdiction. England’s defamation laws and procedures make it significantly easier for claimants to commence and prevail in libel actions than do the laws and procedures of many other countries, particularly the United States. As a result, English courts have entertained several high-profile defamation cases involving foreign parties who have only tenuous connections to England, such as …
Text Offenders: Privacy, Text Messages, And The Failure Of The Title Iii Minimization Requirement, Seth M. Hyatt
Text Offenders: Privacy, Text Messages, And The Failure Of The Title Iii Minimization Requirement, Seth M. Hyatt
Vanderbilt Law Review
For the past forty years, theory and practice in electronic surveillance have enjoyed an uneasy coexistence. In theory, under ("Title III"), government agents must use wire and electronic taps sparingly, and only under strict judicial supervision. In practice, however, federal courts have recognized countless loopholes and exceptions, leading critics to wonder whether Title III meaningfully limits state investigatory power.
Nowhere is this tension more apparent than in the context of "minimization." Under Title III, government agents conducting electronic surveillance must "minimize the interception of communications not otherwise subject to interception under this chapter." They must not listen in on any …
A Blogger, Google, And A "Skank": An Analysis Of Whether Google Has A Fiduciary Obligation To Its Bloggers, Michael W. Taylor
A Blogger, Google, And A "Skank": An Analysis Of Whether Google Has A Fiduciary Obligation To Its Bloggers, Michael W. Taylor
West Virginia Law Review
No abstract provided.
Home Is Where The Crime Is, I. Bennett Capers
Home Is Where The Crime Is, I. Bennett Capers
Michigan Law Review
Think of home. Go on. Maybe not your parents' home, which for this reviewer would be enough to induce heavy breathing and general anxiety. Rather, think about the concept of home. Think about the idea of home. Think about Home with a capital letter. Think of home as in The Wizard of Oz and Dorothy's famous "There's no place like home." Think "home sweet home." Or "home is where the heart is." Go on. Of course, there may be other associations that come to mind when one thinks of home. There's security. Safety. Control. Home rule. After all, in the …
The Child Online Privacy Protection Act: The Relationship Between Constitutional Rights And The Protection Of Children, Sasha Grandison
The Child Online Privacy Protection Act: The Relationship Between Constitutional Rights And The Protection Of Children, Sasha Grandison
University of the District of Columbia Law Review
No abstract provided.
From Facebook To Mug Shot: How The Dearth Of Social Networking Privacy Rights Revolutionized Online Government Surveillance, Junichi P. Semitsu
From Facebook To Mug Shot: How The Dearth Of Social Networking Privacy Rights Revolutionized Online Government Surveillance, Junichi P. Semitsu
Pace Law Review
No abstract provided.
Social Media And The Vanishing Points Of Ethical And Constitutional Boundaries, Ken Strutin
Social Media And The Vanishing Points Of Ethical And Constitutional Boundaries, Ken Strutin
Pace Law Review
No abstract provided.
“You Already Have Zero Privacy. Get Over It!” Would Warren And Brandeis Argue For Privacy For Social Networking?, Connie Davis Powell
“You Already Have Zero Privacy. Get Over It!” Would Warren And Brandeis Argue For Privacy For Social Networking?, Connie Davis Powell
Pace Law Review
No abstract provided.
Lochner, Lawrence, And Liberty, Joseph F. Morrissey
Lochner, Lawrence, And Liberty, Joseph F. Morrissey
Georgia State University Law Review
Many of the states of the United States have statutes, constitutional provisions, and court decisions that deny individuals the right to have a family, specifically a spouse and children, based on sexual orientation.
Advocates have made a wide variety of arguments attacking such restrictions. Scholars and litigants frequently argue that such acts violate constitutional guarantees of equal protection or invade a constitutional right to privacy. However, such arguments are often defeated by counter arguments presented with religious, moral, and even emotional fervor.
This article presents and defends a new analytical framework based on liberty of contract to advance gay rights. …
Blackberry's Jam: Research In Motion's Struggle To Protect Smartphone Users' Internet Privacy Highlights Need For Shared Industry Standards, Darren R. Sweetwood
Blackberry's Jam: Research In Motion's Struggle To Protect Smartphone Users' Internet Privacy Highlights Need For Shared Industry Standards, Darren R. Sweetwood
Global Business & Development Law Journal
No abstract provided.
Does Law Matter Online - Empirical Evidence On Privacy Law Compliance, Michael Birnhack, Niva Elkin-Koren
Does Law Matter Online - Empirical Evidence On Privacy Law Compliance, Michael Birnhack, Niva Elkin-Koren
Michigan Telecommunications & Technology Law Review
Does law matter in the information environment? What can we learn from the experience of applying a particular legal regime to the online environment? Informational privacy (or to use the European term, data protection) provides an excellent illustration of the challenges faced by regulators who seek to secure user rights and shape online behavior. A comprehensive study of Israeli website compliance with information privacy regulation in 2003 and 2006 provides insights for understanding these challenges. The study examined the information privacy practices of 1360 active websites, determining the extent to which these sites comply with applicable legal requirements related to …
A Path Toward User Control Of Online Profiling, Tracy A. Steindel
A Path Toward User Control Of Online Profiling, Tracy A. Steindel
Michigan Telecommunications & Technology Law Review
Online profiling is "the practice of tracking information about consumers' interests by monitoring their movements online." A primary purpose of online profiling is to "deliver advertising tailored to the individual's interests," a practice known as online behavioral advertising (OBA). In order to accomplish this, publishers and advertisers track a individual's online behavior using cookies and other means. Publishers and advertisers aggregate the information, often compile it with information from offline sources, and sort individuals into groups based on characteristics such as age, income, and hobbies. Advertisers can then purchase access to these consumer groups, controlling their selections with such specificity …
Protecting The Ivory Tower: Sensible Security Or Invasion Of Privacy, Stephen D. Lichtenstein
Protecting The Ivory Tower: Sensible Security Or Invasion Of Privacy, Stephen D. Lichtenstein
Richmond Public Interest Law Review
Our beginning point is a recognition that the modern American college is not an insurer of the safety of its students. Whatever may have been its responsibility in an earlier era, the authoritarian role of today's college administrations has been notably diluted in recent decades. Trustees, administrators, and faculties have been required to yield to the expanding rights and privileges of their students. By constitutional amendment, written and unwritten law, and through the evolution of new customs, rights formerly possessed by college administrations have been transferred to students. College students today are no longer ninors; they are now regarded as …
The Board's Responsibility For Information Technology Governance, 28 J. Marshall J. Computer & Info. L. 313 (2011), Lawrence J. Trautman, Kara Altenbaumer-Price
The Board's Responsibility For Information Technology Governance, 28 J. Marshall J. Computer & Info. L. 313 (2011), Lawrence J. Trautman, Kara Altenbaumer-Price
UIC John Marshall Journal of Information Technology & Privacy Law
With accusations that boards of directors of financial institutions were asleep at the wheel while their companies engaged in risky behavior that erased millions of dollars of shareholder value and plunged the country into recession, increasing pressure is now being placed on public company boards to shoulder the burden of risk oversight for the companies they serve. This article provides an overview of some of the main considerations relative to every director’s duty to govern IT risk. In particular, this comment will address directors’ roles in the risk oversight of the corporations they serve, their role in governance of IT, …
The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, 28 J. Marshall Computer & Info. L. 523 (2011), Moonho Song, Carrie Leonetti
The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, 28 J. Marshall Computer & Info. L. 523 (2011), Moonho Song, Carrie Leonetti
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
My Teacher Sux! [Censored]: Protecting Students' Right To Free Speech On The Internet, 28 J. Marshall J. Computer & Info. L. 385 (2011), Katherine Hokenson
My Teacher Sux! [Censored]: Protecting Students' Right To Free Speech On The Internet, 28 J. Marshall J. Computer & Info. L. 385 (2011), Katherine Hokenson
UIC John Marshall Journal of Information Technology & Privacy Law
This comment will discusses the problem posed by student speech made on the Internet, how free speech issues are generally addressed by courts, the Supreme Court cases that have specifically addressed the First Amendment rights of students, and factors that courts dealing with student speech made on the Internet have attempted to use in their decisions. The comment will further look at how courts have analyzed online student speech cases in light of available Supreme Court precedent, and will propose that the Court adopt a hybrid of the Tinker test when addressing student speech made on the Internet, which will …
Schools: Where Fewer Rights Are Reasonable? Why The Reasonableness Standard Is Inappropriate To Measure The Use Of Rfid Tracking Devices On Students, 28 J. Marshall J. Computer & Info. L. 411 (2011), Alexandra C. Hirsch
UIC John Marshall Journal of Information Technology & Privacy Law
In an unsuccessful attempt to heighten security, schools are implementing a technology that offers access to children’s personal information and minute-by-minute location. Although not entirely new, Radio Frequency Identification (RFID) technology use has recently been expanding within the school arena. Skeptics knowledgeable about the downfalls of the technology, however, have reason to be concerned. In order to understand the true urgency of this issue, this comment will explain the background of RFID technology, specifically what RFID tags are, how they are used, their purposes, and how they have become unsafe. Included will be an explanation of the reasons that schools …