Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (26)
- Information Security (26)
- Physical Sciences and Mathematics (26)
- Internet Law (19)
- Computer Law (15)
-
- International Law (15)
- Science and Technology Law (15)
- Social and Behavioral Sciences (9)
- European Law (7)
- Asian Studies (5)
- Comparative and Foreign Law (5)
- First Amendment (5)
- Intellectual Property Law (5)
- International and Area Studies (5)
- Fourth Amendment (4)
- Health Law and Policy (4)
- Constitutional Law (3)
- Consumer Protection Law (3)
- Human Rights Law (3)
- Administrative Law (2)
- Business (2)
- Business Organizations Law (2)
- Commercial Law (2)
- Communications Law (2)
- International Trade Law (2)
- Law and Race (2)
- Law and Society (2)
- Legislation (2)
- Institution
-
- Maurer School of Law: Indiana University (30)
- Boston University School of Law (10)
- Singapore Management University (6)
- Schulich School of Law, Dalhousie University (5)
- University of Michigan Law School (5)
-
- Selected Works (4)
- Duke Law (3)
- University of Pennsylvania Carey Law School (3)
- Chicago-Kent College of Law (2)
- Loyola University Chicago, School of Law (2)
- University of Baltimore Law (2)
- University of Colorado Law School (2)
- Barry University School of Law (1)
- City University of New York (CUNY) (1)
- Cornell University Law School (1)
- Embry-Riddle Aeronautical University (1)
- Georgetown University Law Center (1)
- Texas A&M University School of Law (1)
- The Peter A. Allard School of Law (1)
- University of Maryland Francis King Carey School of Law (1)
- University of Massachusetts School of Law (1)
- University of Washington School of Law (1)
- Vanderbilt University Law School (1)
- Washington and Lee University School of Law (1)
- Western University (1)
- Publication Year
- Publication
-
- Articles by Maurer Faculty (30)
- Faculty Scholarship (15)
- All Faculty Scholarship (5)
- Canadian Journal of Law and Technology (4)
- Research Collection Yong Pung How School Of Law (4)
-
- Michigan Telecommunications & Technology Law Review (3)
- Centre for AI & Data Governance (2)
- Faculty Publications & Other Works (2)
- Publications (2)
- W. Gregory Voss (2)
- Articles (1)
- Chicago-Kent Law Review (1)
- Cornell Law Review (1)
- Dalhousie Law Journal (1)
- Dissertations and Theses (1)
- Electronic Thesis and Dissertation Repository (1)
- Elizabeth De Armond (1)
- Faculty Publications (1)
- Fellow, Adjunct, Lecturer, and Research Scholar Works (1)
- Georgetown Law Faculty Publications and Other Works (1)
- International Journal of Aviation, Aeronautics, and Aerospace (1)
- Maryland Law Review (1)
- Michigan Journal of Race and Law (1)
- Penn Program on Regulation Podcasts (1)
- Transnational Business Governance Interactions Working Papers (1)
- Vanderbilt Journal of Entertainment & Technology Law (1)
- Warren Bartholomew CHIK (1)
- Washington and Lee Journal of Civil Rights and Social Justice (1)
- Publication Type
Articles 61 - 87 of 87
Full-Text Articles in Privacy Law
Taking Stock After Four Years, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Taking Stock After Four Years, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
Systematic Government Access To Private-Sector Data Redux, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Systematic Government Access To Private-Sector Data Redux, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
When Two Worlds Collide: The Interface Between Competition Law And Data Protection, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson, Orla Lynskey
When Two Worlds Collide: The Interface Between Competition Law And Data Protection, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson, Orla Lynskey
Articles by Maurer Faculty
No abstract provided.
European Union Data Privacy Law Developments, W. Gregory Voss
European Union Data Privacy Law Developments, W. Gregory Voss
W. Gregory Voss
This article explores recent developments in European Union data privacy and data protection law, through an analysis of European Union advisory guidance, independent administrative agency enforcement action, case law, and legislative reform in the areas of digital technologies, the internet, telecommunications and personal data. In the first case, Article 29 Working Party guidance on anonymization techniques – so important in the field of big data – is discussed and distinguished from pseudonymization. Next, Google privacy policy enforcement action by various EU Member State data protection agencies (inter alia, France, Germany, Italy, the Netherlands and Spain) is chronicled, with lessons being …
The Singapore Personal Data Protection Act And An Assessment Of Future Trends In Data Privacy, Warren B. Chik
The Singapore Personal Data Protection Act And An Assessment Of Future Trends In Data Privacy, Warren B. Chik
Research Collection Yong Pung How School Of Law
In the first part of this paper, I will present and explain the Singapore Personal Data Protection Act (“PDPA”) in the context of legislative developments in the Asian region and against the well-established international baseline privacy standards. In the course of the above evaluation, reference will be made to the national laws and policy on data privacy prior to the enactment of the PDPA as well as current social and market practices in relation to personal data. In the second part of this paper, I will decipher and assess the future trends in data privacy reform and the future development …
The Business Of Privacy, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
The Business Of Privacy, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
Face-To-Data -- Another Developing Privacy Threat?, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Face-To-Data -- Another Developing Privacy Threat?, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
The Extraterritoriality Of Data Privacy Laws -- An Explosive Issue Yet To Detonate, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
The Extraterritoriality Of Data Privacy Laws -- An Explosive Issue Yet To Detonate, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
Prism And Privacy: Will This Change Everything?, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Prism And Privacy: Will This Change Everything?, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
Survey Of Recent European Union Privacy Developments, W. Gregory Voss
Survey Of Recent European Union Privacy Developments, W. Gregory Voss
W. Gregory Voss
The Spanish law implementing the European Union (EU) Data Protection Directive, advisory guidance on consent, facial recognition and biometric technologies from the European Union Article 29 Data Protection Working Party (WP29) , and proposals for EU data protection law reform are analyzed in this survey piece. EU legislative processes are illustrated by a specific occurence: Spanish Organic Law 15/1999 on the Protection of Personal Data is reviewed in the context of Court of Justice of the European Union (ECJ) joined cases, Asociación Nacional de Establecimientos Financieros de Crédito (ASNEF) v. Administración del Estado, and Federación de Comercio Electrónico y Marketing …
The Supreme Court And Information Privacy, Fred H. Cate, Beth E. Cate
The Supreme Court And Information Privacy, Fred H. Cate, Beth E. Cate
Articles by Maurer Faculty
Advances in technology—including the growing use of cloud computing by individuals, agencies, and organizations to conduct operations and store and process records—are enabling the systematic collection and use of personal data by state and federal governments for a variety of purposes.
These purposes range from battling crime and terrorism to assessing public policy initiatives and enforcing regulatory regimes. To aid these efforts, governments are promoting mandatory retention and reporting of data by online service providers and the expansion of laws that facilitate wiretaps to greater portions of the web.
The legal framework for protecting individual privacy within this growing world …
The Challenge Of "Big Data" For Data Protection, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
The Challenge Of "Big Data" For Data Protection, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
Systematic Government Access To Private-Sector Data, Fred H. Cate, James X. Dempsey, Ira S. Rubenstein
Systematic Government Access To Private-Sector Data, Fred H. Cate, James X. Dempsey, Ira S. Rubenstein
Articles by Maurer Faculty
No abstract provided.
The Intricacies Of Independence, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantession
The Intricacies Of Independence, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantession
Articles by Maurer Faculty
No abstract provided.
The End Of The Beginning, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
The End Of The Beginning, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
Editorial, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Editorial, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
Let's Not Kill All The Privacy Laws (And Lawyers), Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Let's Not Kill All The Privacy Laws (And Lawyers), Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
Privacy -- An Elusive Concept, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Privacy -- An Elusive Concept, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
Moving Forward Together, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Moving Forward Together, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
Returning To A Principled Basis For Data Protection, Gus Hosein
Returning To A Principled Basis For Data Protection, Gus Hosein
Chicago-Kent Law Review
Society must remain conscious of both pragmatic and principle-based rationales for information security rules. The identity card debate in the United Kingdom provides an example of exactly why a governmental information security approach that is sensitive to civil liberties would be the best approach to data protection. In contrast, we should be cautious of a balancing test that places security in parity with civil liberties and, therefore, erroneously allows pragmatism to triumph over principle.
When Mobile Phones Are Rfid-Equipped - Finding E.U.-U.S. Solutions To Protect Consumer Privacy And Facilitate Mobile Commerce, Nancy J. King
When Mobile Phones Are Rfid-Equipped - Finding E.U.-U.S. Solutions To Protect Consumer Privacy And Facilitate Mobile Commerce, Nancy J. King
Michigan Telecommunications & Technology Law Review
New mobile phones have been designed to include delivery of mobile advertising and other useful location-based services, but have they also been designed to protect consumers' privacy? One of the key enabling technologies for these new types of phones and new mobile services is Radio Frequency Identification (RFID), a wireless communication technology that enables the unique identification of tagged objects. In the case of RFID-enabled mobile phones, the personal nature of the devices makes it very likely that, by locating a phone, businesses will also be able to locate its owner. Consumers are currently testing new RFID-enabled phones around the …
Personal Medical Information: Privacy Or Personal Data Protection?, Wilhelm Peekhaus
Personal Medical Information: Privacy Or Personal Data Protection?, Wilhelm Peekhaus
Canadian Journal of Law and Technology
Some of the existing literature concerning the privacy of health information seems to suggest that medical information has a particularly special nature; either through its oft-cited association with dignity or the need for its ‘‘unobstructed’’ use by health care practitioners for a variety of reasons. It is against such a backdrop that this paper will review and compare a number of legislative mechanisms that have been designed to meet the challenge of safeguarding the privacy of personal information without completely hindering the continued flow of information required by economic and health care systems. An attempt will be made to situate …
'Code' And The Slow Erosion Of Privacy, Bert-Jaap Koops, Ronald Leenes
'Code' And The Slow Erosion Of Privacy, Bert-Jaap Koops, Ronald Leenes
Michigan Telecommunications & Technology Law Review
The notion of software code replacing legal code as a mechanism to control human behavior--"code as law"--is often illustrated with examples in intellectual property and freedom of speech. This Article examines the neglected issue of the impact of "code as law" on privacy. To what extent is privacy-related "code" being used, either to undermine or to enhance privacy? On the basis of cases in the domains of law enforcement, national security, E-government, and commerce, it is concluded that technology rarely incorporates specific privacy-related norms. At the same time, however, technology very often does have clear effects on privacy, as it …
Collateralizing Internet Privacy, Xuan-Thao Nguyen
Collateralizing Internet Privacy, Xuan-Thao Nguyen
Articles
Collateralizing privacy is a pervasive conduct committed by many on-line companies. Yet most don't even realize that they are engaging in collateralizing privacy. Worse yet, governmental agencies and consumer groups are not even aware of the violation of on-line consumer privacy by the collateralization of privacy. Professor Nguyen argues that collateralizing privacy occurs under the existing privacy regime and the architecture of article 9 of the Uniform Commercial Code. Professor Nguyen critiques the violation of privacy through collateralization dilemmas and proposes a solution involving modifications of the contents of the financing statement and security agreement in secured transactions where consumer …
Constitutional Issues In Information Privacy, Fred H. Cate, Robert Litan
Constitutional Issues In Information Privacy, Fred H. Cate, Robert Litan
Michigan Telecommunications & Technology Law Review
The U.S. Constitution has been largely ignored in the recent flurry of privacy laws and regulations designed to protect personal information from incursion by the private sector despite the fact that many of these enactments and efforts to enforce them significantly implicate the First Amendment. Questions about the role of the Constitution have assumed new importance in the aftermath of the September 11, 2001 terrorist attacks on the World Trade Center and the Pentagon. Recent efforts to identify and apprehend terrorists and to protect against future attacks threaten to weaken constitutional protections against government intrusions into personal privacy. However, these …
Freedom Of Information And The Eu Data Protection Directive, James Maxeiner
Freedom Of Information And The Eu Data Protection Directive, James Maxeiner
All Faculty Scholarship
The EU Data Protection Directive attempts to balance protection of privacy and freedom of information acquisition. It does this by authorizing Member States to provide exemptions and derogations in their individual legislation.
Business Information And "Personal Data": Some Common-Law Observations About The Eu Draft Data Protection Directive, James Maxeiner
Business Information And "Personal Data": Some Common-Law Observations About The Eu Draft Data Protection Directive, James Maxeiner
All Faculty Scholarship
Discusses the public interest in the free flow of information.