4,179 results on '"Right of privacy -- Laws, regulations and rules"'
Search Results
2. Texas Challenges HHS's HIPAA Rule Protecting Reproductive Health Information From State Investigative Bodies
- Author
-
Paolillo, Cassandra
- Subjects
United States. Department of Health and Human Services -- Powers and duties ,Powers and duties ,Laws, regulations and rules ,Government regulation ,Data security issue ,Data security -- Laws, regulations and rules ,Medical records -- Laws, regulations and rules ,Reproductive health -- Laws, regulations and rules ,Right of privacy -- Laws, regulations and rules ,Privacy, Right of -- Laws, regulations and rules ,Health Insurance Portability and Accountability Act of 1996 - Abstract
Last week, Texas Attorney General Ken Paxton filed a complaint in federal district court against HHS and the Office for Civil Rights (OCR) challenging a recently issued rule strengthening protection [...]
- Published
- 2024
3. Evaluation Of The Use Of E-NABIZ Records By Insurance Companies Under The Personal Data Protection Law No. 6698
- Author
-
Ersoy, Eren Can
- Subjects
Evaluation ,Laws, regulations and rules ,Government regulation ,Data security issue ,Insurance industry ,Insurance industry -- Laws, regulations and rules ,Data security -- Laws, regulations and rules ,Information storage and retrieval systems -- Laws, regulations and rules -- Evaluation ,Medical records -- Laws, regulations and rules ,Personal information -- Laws, regulations and rules ,Right of privacy -- Laws, regulations and rules ,Privacy, Right of -- Laws, regulations and rules ,Turkey. Personal Data Protection Law - Abstract
Data Protection Ⅰ. Introduction e-Nabız is a platform that stores individuals health data in a centralized system, providing both healthcare providers and insurance companies with quick and easy access to [...]
- Published
- 2024
4. HIPAA Privacy Rule Revisions Address Reproductive Protected Health Information
- Author
-
Anderson, Victoria E.
- Subjects
United States. Department of Health and Human Services -- Powers and duties ,Powers and duties ,Laws, regulations and rules ,Health care industry ,Government regulation ,Data security issue ,Data security -- Laws, regulations and rules ,Medical records -- Laws, regulations and rules ,Health care industry -- Laws, regulations and rules ,Reproductive health -- Laws, regulations and rules ,Right of privacy -- Laws, regulations and rules ,Privacy, Right of -- Laws, regulations and rules ,Health Insurance Portability and Accountability Act of 1996 - Abstract
The Department of Health and Human Services (the 'HHS') recently issued a final rule (the 'Final Rule') amending the Health Insurance Portability and Accountability Act ('HIPAA') Privacy Rule. Among other [...]
- Published
- 2024
5. OCP Warns About Patient Privacy In Electronic Messaging
- Author
-
Kapur, Alisha
- Subjects
Access control ,Laws, regulations and rules ,Government regulation ,Text messaging ,Data security issue ,Data security -- Laws, regulations and rules ,Text messaging -- Laws, regulations and rules ,Medical records -- Access control -- Laws, regulations and rules ,Right of privacy -- Laws, regulations and rules ,Privacy, Right of -- Laws, regulations and rules ,Canada. Personal Health Information Protection Act 2004 - Abstract
In May 2023, the Ontario College of Pharmacists ('OCP') noted that it has been seeing an increase in the use of unsecured electronic methods by pharmacy professionals. These include communications [...]
- Published
- 2024
6. GENOMIC RESEARCH AND DATA-SHARING: TIME TO REVISIT AUSTRALIAN LAWS?
- Author
-
Jowett, Stephanie, Dallaston, Elizabeth, and Bennett, Belinda
- Subjects
Research ethics -- Laws, regulations and rules ,Data security -- Laws, regulations and rules ,Genetic research -- Laws, regulations and rules -- Safety and security measures -- Ethical aspects ,Human genetics -- Access control -- Laws, regulations and rules ,Right of privacy -- Laws, regulations and rules ,Government regulation ,Data security issue ,Queensland. Public Health Act 2005 ,Queensland. Information Privacy Act 2009 ,Australia. Privacy Act 1988 ,Queensland. Hospital and Health Boards Act 2011 - Abstract
I INTRODUCTION In the early 2000s the Australian Law Reform Commission ('ALRC') and the Australian Health Ethics Committee ('AHEC') of the National Health and Medical Research Council ('NHMRC') embarked on [...], This article analyses the ethical and legal aspects of data-sharing and genomic research. It begins in Part II with an overview of the nature of genomic information, and whether it is exceptional when compared to other forms of health information. Part III considers the role of data-sharing in genomic research, with the importance of public trust in supporting genomic research considered in Part IV. The Australian regulatory framework for data-sharing in genomic research is considered in Parts V and VI, with reform options discussed in Part VII. The article concludes that advances in genomic research and the complexity of the current regulatory framework make it timely to review Australian laws to ensure that they maintain their relevance for this rapidly developing field of research.
- Published
- 2020
7. The Standing of Article III Standing for Data Breach Litigants: Proposing a Judicial and a Legislative Solution.
- Author
-
Urness, Devin
- Subjects
Computer crimes -- Laws, regulations and rules -- Remedies ,Data security -- Laws, regulations and rules ,Standing (Law) -- Laws, regulations and rules ,Right of privacy -- Laws, regulations and rules ,Right of action -- Laws, regulations and rules ,Government regulation ,Data security issue ,Computer crime ,United States Constitution (U.S. Const. art. 3) - Abstract
INTRODUCTION 1518 I. BACKGROUND 1521 A. The Development of Article III Standing and 1522 Data Breach Litigation B. Private Rights of Action and Standing 1527 II. ANALYSIS 1531 A. The [...], Data breaches are not going away. Yet victims still face uncertainty when deciding whether and where to file cases against companies or other institutions that may have mishandled their information. This is especially true if the victims have not yet experienced a financial harm, like identity theft, as a result of a data breach. Much of the uncertainty revolves around the standing doctrine and the Supreme Court's guidance (or lack thereof) on what constitutes a substantial risk of harm sufficient to establish an injury in fact. Federal circuit courts have come to divergent results in data breach cases based on the Supreme Court's guidance. This Note analyzes these divergent results and shows that the circuits are not as far apart as some commentators have suggested. This Note then proposes two possible clarifying measures--one judicial and one legislative. The judicial solution is a test the Supreme Court should adopt for evaluating standing in data breach litigation. The test would have courts assess three factors and would allow plaintiffs who have not yet had their data misused to establish standing. Under the test, courts would examine (1) whether the breach was targeted; (2) whether the thief attained information that could lead to financial harm; and (3) whether any portion of the compromised data has been misused. For the legislative solution, this Note proposes language for a private right of action that could be inserted into federal legislation, either as part of comprehensive privacy legislation or in sector-specific privacy legislation.
- Published
- 2020
8. DOES CARPENTER PUT A NAIL IN WARRANTLESS POLICE SEARCHES OF SMARTPHONE CELL SITE LOCATION INFORMATION?
- Author
-
Trafford, Christopher G.
- Subjects
Warrantless searches -- Laws, regulations and rules ,Electronic surveillance -- Laws, regulations and rules ,Cell-site simulators -- Access control -- Laws, regulations and rules ,Property rights -- Laws, regulations and rules ,Original intent (Law) -- Analysis ,Third parties (Law) -- Laws, regulations and rules ,Precedents (Law) -- Analysis ,Probable cause -- Standards -- Laws, regulations and rules ,Right of privacy -- Laws, regulations and rules ,Carpenter v. United States (138 S. Ct. 2206 (2018)) ,Government regulation ,United States Constitution (U.S. Const. amend. 4) ,Electronic Communications Privacy Act - Abstract
INTRODUCTION Introduction 1477 I. Understanding Carpenter and Evolving Police Surveillance Laws 1479 A. Carpenter: Phone Thief Nabbed after His Own Cell Phone's Location Was Warrantlessly Searched 1479 i. RadioShack Robbery: [...]
- Published
- 2020
9. HEALTHCARE DATA BREACHES IN SOUTH DAKOTA: POST-BREACH LEGISLATION IS NOT ENOUGH.
- Author
-
Mabee, Michael J.
- Subjects
Computer crimes -- Laws, regulations and rules -- Statistics -- Prevention ,Data security -- Laws, regulations and rules ,Medical records -- Access control -- Laws, regulations and rules ,Notice (Law) -- Laws, regulations and rules ,Right of privacy -- Laws, regulations and rules ,Government regulation ,Data security issue ,Computer crime ,Health Insurance Portability and Accountability Act of 1996 - Abstract
I. INTRODUCTION In July 2015, Siouxland Anesthesiology, Ltd., suffered a data breach of 13,000 patient records due to a "hacking/IT incident" later determined to be a criminal malware attack.' The [...], Reading about major data breaches in the news is a disturbing, but all too common, occurrence these days, and South Dakota companies are no exception. In fact, since South Dakota's data breach notification law. Senate Bill 62, became effective on July 1, 2018, fifty-five data breaches have been reported to the South Dakota Attorney General. While some of these breaches are known to have occurred in the healthcare sector due to HIPAA breach reporting requirements, identifying other industries is not possible because the information is not available to the public. While the act strengthens post-breach reporting on some organizations not subject to federal legislation, others, like "covered entities " and "business associates "falling under HIPAA's purview, are only required to meet HIPAA's Privacy and Security Rules. In the absence of a comprehensive, industry-neutral federal data security regulatory scheme, South Dakota needs to adopt a proactive statutory measure to strengthen protections for South Dakota residents' Personally Identifiable Information ("PII") and Protected Health Information ("PHI"). This comment will highlight healthcare data breaches in South Dakota, as they are readily identifiable and a significant source of data breaches within the state, while also providing an overview of data breach trends. Additionally, this comment will explore the legal landscape of health information data security in South Dakota and how other states, like Nebraska, are taking action to protect the data and privacy of their residents. Finally, this comment will argue for proactive legislation beyond data breach notification laws.
- Published
- 2020
10. ON PRIVACY ISSUES WITH GOOGLE STREET VIEW.
- Author
-
Gallo, Patrick and Kettani, Houssain
- Subjects
Google Street View (Geographic information system) -- Safety and security measures -- Laws, regulations and rules ,Data security -- Laws, regulations and rules ,Right of privacy -- Laws, regulations and rules ,Government regulation ,Data security issue - Abstract
I. INTRODUCTION "There's an app for that!", the known past response for any one person looking to digitize just one piece of their life with their mobile device. Now, we [...], Mapping data gathered by governments, corporations, and private individuals can be published freely across the web for use in diverse application sets. Upon its collection, other data, private data, may become subject to the public eye. Evolving from multiple acquisitions in its almost twenty-year history, Google's Street View application offers the public historical and 360-degree views of the globe from across the world. With users serving as the target of marketing techniques, which often create a game of chess between developers, the privacy practices of other companies often come to light. In this paper, we consider these issues and suggest some mitigations that public, private, and partnership entities may take in this shared effort. Keywords-Cyber Security, Data Privacy, Google, Street View.
- Published
- 2020
11. A CRUCIAL ASPECT OF NATIONAL SECURITY IN NEED OF REFORM: SECTION 702 OF THE FISA AMENDMENTS ACT.
- Author
-
Gemar, Stephen
- Subjects
Antiterrorism measures -- Laws, regulations and rules ,Abuse of power -- Laws, regulations and rules -- Remedies ,Warrantless searches -- Laws, regulations and rules ,National security -- Laws, regulations and rules ,Electronic intelligence -- Laws, regulations and rules -- Remedies ,Right of privacy -- Laws, regulations and rules ,Exceptions (Law) -- Laws, regulations and rules ,Government regulation ,Foreign Intelligence Surveillance Act Amendments Act of 2008 (50 U.S.C. 1881a) ,United States Constitution (U.S. Const. amend. 4) - Abstract
I. INTRODUCTION One of the more effective ways that the United States collects intelligence on terrorism is also one of its most controversial. (1) In 2016, the Federal Bureau of [...], In 2008, Congress passed the 2008 FISA Amendments Act. Included in this hill was Section 702, which authorized government agencies to collect data of foreign targets, with the stated goal being to protect the national security of the United States. Section 702 has proven to be instrumental in stopping potential terrorist attacks, both in the United States and abroad. However, data of United States citizens may be collected as well, and the process used to collect data on foreign targets by intelligence agencies can be exploited. This raises constitutional concerns with Section 702, most notably, United States citizens' Fourth Amendment rights to be protected from unreasonable searches and seizures. In examining Section 702, this comment will show how Section 702 has been abused by intelligence agencies. It will also examine constitutional challenges and offer solutions regarding how to curtail these abuses without hindering Section 702's primary goal of protecting the United States National Security.
- Published
- 2020
12. People v. Robots: A Roadmap for Enforcing California's New Online Bot Disclosure Act.
- Author
-
Stricke, Barry
- Subjects
Disclosure of information -- Laws, regulations and rules ,Intelligent agents -- Laws, regulations and rules ,Immunity (Law) -- Laws, regulations and rules ,Subpoena -- Laws, regulations and rules ,Freedom of speech -- Laws, regulations and rules ,Internet service providers -- Privileges and immunities -- Laws, regulations and rules ,Right of privacy -- Laws, regulations and rules ,Intelligent agent ,Government regulation ,Internet service provider ,California. Bolstering Online Transparency Act ,California. Unfair Competition Act ,United States Constitution (U.S. Const. amend. 1) - Abstract
I. INTRODUCTION On September 28, 2018, Governor Jerry Brown signed into law California Senate Bill 1001, the so-called Bolstering Online Transparency Act (the "CA Bot Act"). (1) Bots (short for [...], Bots are software applications that complete tasks automatically. A bot's communication is disembodied, so humans can mistake it for a real person, and their misbelief can be exploited by the bot owner to deploy malware or phish personal data. Bots also pose as consumers posting online product reviews or spread (often fake) news, and a bot owner can coordinate multiple social-network accounts to trick a network's "trending" algorithms, boosting the visibility of specific content, sowing and exacerbating controversy, or fabricating an impression of mass individual consensus. California's 2019 Bolstering Online Transparency Act (the "CA Bot Act") imposes conspicuous disclosure requirements on bots when they communicate or interact with humans in California. Call it Isaac Asimov's fourth Rule of Robotics: A robot may not pretend to be a human being. By requiring bots to "self-identify" as such, the CA Bot Act is a pioneer in laws regulating artificial intelligence. Most of its criticism points to the act's lack of an enforcement mechanism to incentivize compliance. Accordingly, this Article lays out a map to sanction violations of the act with civil actions under California's Unfair Competition Law and statutory tort law of fraudulent deceit. It outlines what is prohibited, who can be sued, and who has standing to sue, then addresses First Amendment limits on unmasking John Doe defendants via subpoena. For many reasons, attempts to hold CA Bot Act violators liable are most likely to prevail in the commercial arena. But a willful use of bots to undermine a political election or prevent voting might also be a worthy target. Ultimately, the law could be strengthened with an articulated enforcement provision. But if the CA Bot Act aims a first salvo against malicious online bots, this Article hopes to spark the powder. TABLE OF CONTENTS I. Introduction 841 II. Which Bots Have to Disclose (and How)? 845 A. Interpreting the CA Bot Act's Statutory Language 846 B. What Constitutes a Bot Under the CA Bot Act? 847 C. Which Bot Behavior Triggers the CA Bot Act's Disclosure Requirement? 848 1. The CA Bot Act Regulates Bots that Talk to People 848 a. Bots that Talk to Computers: Spiders, Crawlers, and Web Scrapers 849 b. Bots that Talk Directly to People: Chatbots 850 c. Bots that Talk Indirectly to People: Social Bots 852 2. The CA Bot Act Regulates Bots that Pose as Humans 854 a. Chatbots 854 b. Social Bots 856 3. The CA Bot Act Regulates Bots that Try to Influence People 857 a. The Commercial Prong 858 b. The Political Prong 858 D. Adequate Disclosure Under the CA Bot Act 858 1. Disclosure Must Be Proven in a UCL or Concealment Action 859 2. What Constitutes Adequate Disclosure? 859 III. Suing to Sanction a CA Bot Act Violation 860 A. Enforcing the CA Bot Act Requires Showing Causation and Harm 860 B. Two Legal Frameworks for Sanctioning CA Bot Act Violations 861 1. California's Unfair Competition Law 861 a. The UCL Permits "Borrowing" Laws to Define 861 "Unlawful" Business Practices b. The UCL's Borrowing Doctrine and the CA Bot Act 862 2. Fraudulent Deceit 863 a. Violations of Disclosure Statutes Can Constitute Fraudulent Concealment 863 b. Violations of the CA Bot Act's Political Prong Can 863 Be Concealment C. Public Prosecution for CA Bot Act Violations via the UCL 864 1. Standing to Sue in California 864 2. Compelling Government Action to Enforce the UCL Against CA Bot Act Violators 865 D. Reliance on the Mistaken Belief that a Bot Is a Person 866 1. Reliance Under the UCL 867 a. Purchasers Relying on a Product's Mislabeling Have Standing Under the UCL 867 b. Online Bots Seek to Induce Commercial Transactions by Posing as People 868 c. Online Users Could Show Injury Was as a Result of Deceptive Bot Speech 871 2. Reliance Under the Law of Fraudulent Deceit 871 a. Misrepresentation Need Only Enter into the Decision-Making 872 b. Plaintiffs Are Not Expected to Guess Who Is a Bot 872 c. Reliance Should Be Clearly Articulated in Detail 873 E. How Does a CA Bot Act Violation Cause Harm? 873 1. Economic Harm 874 a. Harm Under the UCL 874 b. Harm Under Fraudulent Deceit 877 2. Noneconomic Harm 878 a. Physical Pain, Mental Suffering, and Emotional Distress 878 b. Harm to a Plaintiff's Right to Vote in an Election 882 3. Remedies 884 a. Remedies at Law 884 b. Equitable Remedies 885 IV. Unmasking Anonymous Online Speech 886 A. Subpoenaing ISPs and Online Social Networks' Immunity 886 B. The CA Bot Act Would Likely Survive Judicial Review Under the First Amendment 887 1. Constitutional Analysis of the Commercial Prong 888 2. Constitutional Analysis of the Political Prong 889 C. Enforcement of a Doe Subpoena in California 890 V. Conclusion 892
- Published
- 2020
13. Equity's Wergeld: Monetary Remedies for Emotional Distress by way of the Equitable Obligation of Confidence.
- Author
-
Khun, William
- Subjects
Fiduciary duties -- Laws, regulations and rules ,Compensatory damages -- Laws, regulations and rules ,Mental distress (Law) -- Laws, regulations and rules -- Remedies ,Equity (Law) -- Laws, regulations and rules ,Confidential communications -- Access control -- Psychological aspects -- Laws, regulations and rules ,Right of privacy -- Laws, regulations and rules ,Equitable remedies -- Laws, regulations and rules ,Government regulation - Abstract
Abstract Many aspects of social and commercial life depend on our ability to confide secrets in others. The law, responsive to societal needs, developed the action for breach of confidence, [...]
- Published
- 2020
14. RISKS OF BLOCKCHAIN FOR DATA PROTECTION: A EUROPEAN APPROACH.
- Author
-
Jimenez-Gomez, Briseida Sofia
- Subjects
Risk management -- Methods -- Laws, regulations and rules ,Data security -- Laws, regulations and rules -- Management ,Cryptocurrencies -- Safety and security measures -- Laws, regulations and rules ,Extraterritoriality -- Laws, regulations and rules ,Right of privacy -- Laws, regulations and rules ,Blockchains (Databases) -- Safety and security measures -- Laws, regulations and rules -- Management ,Government regulation ,Company business management ,Data security issue ,Risk management ,European Charter of Fundamental Rights, 2000 (art. 8) ,Treaty Amending the Treaty on European Union and the Treaty Establishing the European Community, 2007 (art. 16) - Abstract
Contents I. Data Protection as a Fundamental Right II. Exploring Blockchain Technologies A. Basics of Blockchain Terminology B. Classification of Blockchain Technologies C. Applications of Blockchain D. Limits of Blockchain [...], Blockchain has come to revolutionize commerce, driving faster and more efficient transactions. This new technology was born to work in a trustless environment, without any need for trusted intermediaries or supervision by state agencies, leaving a digital print that is mostly public and permanent. Nonetheless, the main problem it presents is that the use of blockchain can interfere with an individual's privacy rights. This article explores the challenges posed by blockchain to data protection. Looking into the characteristics of blockchain will be necessary to explore its advantages and limits, especially from a privacy point of view. Blockchain is a kind of technology that is currently disruptive, but its applications can be modulated and configured in different ways depending on the needs. This article examines the territorial and material scope of the General Data Protection Regulation in order to clarify whether it is applicable to blockchain technologies. The issue of identifiers on a blockchain, the allocation of responsibility to participants, the tension with data subjects ' rights and, in particular, the right to erasure are discussed. Some recommendations for reconciling data protection and blockchain technologies are proposed, in particular, projecting the privacy by design principle to blockchain applications. Technological developments should not suppose a deterioration of the rights of individuals. However, some technical solutions entail significant trade-offs, as the case on anonymity in cryptocurrencies illustrates.
- Published
- 2020
15. PRIVACY AS SAFETY.
- Author
-
Froomkin, Michael and Colangelo, Zak
- Subjects
Data security -- Laws, regulations and rules ,Electronic surveillance -- Laws, regulations and rules ,Smart growth (Land use planning) -- Safety and security measures -- Laws, regulations and rules ,Right of privacy -- Laws, regulations and rules ,Public safety crimes -- Laws, regulations and rules -- Prevention ,Government regulation ,Data security issue - Abstract
Abstract: The idea that privacy makes you safer is unjustly neglected: public officials emphasize the dangers of privacy while contemporary privacy theorists acknowledge that privacy may have safety implications but [...]
- Published
- 2020
16. PROPERTY RIGHTS IN CHILDREN.
- Author
-
Adler, Barry E. and Alvarez, Alexis A.
- Subjects
Parent and child (Law) -- Laws, regulations and rules ,Surrogate motherhood -- Contracts -- Laws, regulations and rules ,Property rights -- Laws, regulations and rules ,Right of privacy -- Laws, regulations and rules ,Government regulation ,Contract agreement - Abstract
INTRODUCTION The Economics of the Baby Shortage, (1) by Elisabeth Landes and Richard Posner, described a suboptimal landscape of child adoption in the United States. Many children went unadopted, raised [...], In 1978, Dr. Elisabeth Landes and then-Professor, later-Judge Richard Posner, published The Economics of the Baby Shortage. The article openly discussed how economic analysis can address the allocation of babies available for adoption. The ideas expressed in the article were widely denounced as an inhumane commodification of children, something tolerable only in the twisted minds of academic authors. Despite the backlash, an odd thing happened in the more than four decades since Landes and Posner wrote on this topic: their ideas began to take hold. Today, almost all states in the United States permit, in some form, the contractual assignment of parental rights; that is, almost all states now permit the sale of babies. We suggest, an ironic reason for the change: the modern technology of in vitro fertilization has quieted or overcome complaints about the commodification of children by moiling surrogacy contracts into a long-accepted, though euphemistically labeled, realm of parental property rights in children.
- Published
- 2020
17. CYBERDAMAGES.
- Author
-
Black, Stephen T.
- Subjects
Computer crimes -- Laws, regulations and rules -- Remedies ,Data security -- Laws, regulations and rules ,Class action lawsuits -- Laws, regulations and rules -- Remedies ,Damages (Law) -- Laws, regulations and rules ,Standing (Law) -- Laws, regulations and rules ,Tort liability -- Laws, regulations and rules -- Remedies ,Right of privacy -- Laws, regulations and rules ,Government regulation ,Data security issue ,Computer crime ,United States Constitution (U.S. Const. art. 3) - Abstract
INTRODUCTION I. The law of theft A. What is "Theft?" B. Theft of Intangibles C. Cyber Theft II. The Law of Torts A. Cyber Remedies in Tort B. Bailment as [...], Theft of personal property is easy to consider, but theft of information poses unique problems. Courts and legislatures dealing with victims of data breaches grapple with whether the victim has been harmed--in a manner that the law can redress. In most cases, the thief is gone, and the victims--the individual whose data was taken and the company it was entrusted to--are engaged in a lawsuit. This article engages in a discussion on the nature of such "cyberdamage," and whether a mere showing of damage to privacy is enough, or if a showing of financial harm is required.
- Published
- 2020
18. PEREZ V. CITY OF ROSEVILLE: CONSTITUTIONAL PROTECTION FOR THE PUBLIC EMPLOYEE IN MATTERS PERTAINING TO SEX.
- Author
-
McCain, Allyson M.
- Subjects
Sexual behavior -- Laws, regulations and rules ,Government employees -- Laws, regulations and rules ,Right of privacy -- Laws, regulations and rules ,Perez v. City of Roseville (926 F.3d 511 (9th Cir. 2019)) ,Government regulation ,Civil Rights Act of 1871 (42 U.S.C. 1983) - Abstract
INTRODUCTION The late Judge Reinhardt posited the following: As a society, we must remain solicitous of the constitutional liberties of public employees, as of any citizens, to the greatest degree [...]
- Published
- 2020
19. BETWEEN YOU, ME, AND ALEXA: ON THE LEGALITY OF VIRTUAL ASSISTANT DEVICES IN TWO-PARTY CONSENT STATES.
- Author
-
Kuruvilla, Ria
- Subjects
Consent (Law) -- Laws, regulations and rules ,Electronic surveillance -- Laws, regulations and rules ,Right of privacy -- Laws, regulations and rules ,I/O devices -- Laws, regulations and rules ,Government regulation ,I/O device - Abstract
Abstract: When an Amazon Echo is activated, the device is constantly recording and sending those recordings to Amazon's cloud. For an always recording device such as the Echo, getting consent [...]
- Published
- 2019
20. COOKIE MONSTER: Kabir Barclay, founder of OneTrust, is a first-generation American entrepreneur-and was early to realize that online privacy laws are creating a massive new market
- Author
-
Foster, Tom
- Subjects
Entrepreneurs -- Laws, regulations and rules ,Privacy -- Laws, regulations and rules ,Software industry -- Laws, regulations and rules ,Right of privacy -- Laws, regulations and rules ,Government regulation ,Privacy issue ,Business, general ,Business - Abstract
'There's a lot that goes on behind the cookie banner,' says Kabir Barday, the founder and CEO of OneTrust. He's talking about that now-ubiquitous pop-up on websites that lets you [...]
- Published
- 2020
21. Patel v. Facebook, Inc.
- Author
-
Wang, Shuyu
- Subjects
Data security -- Laws, regulations and rules ,Class action lawsuits -- Laws, regulations and rules ,Standing (Law) -- Laws, regulations and rules ,Biometry -- Access control -- Laws, regulations and rules ,Online social networks -- Laws, regulations and rules ,Face recognition technology -- Laws, regulations and rules ,Right of privacy -- Laws, regulations and rules ,Patel v. Facebook, Inc. (932 F.3d 1264 (9th Cir. 2019)) ,Government regulation ,Data security issue ,Federal Rules of Civil Procedure (Fed. R. Civ. P. 23) ,Illinois. Biometric Information Privacy Act of 2008 (740 Ill. Comp. Stat. 14/15(a)-14/15(b)) - Abstract
932 F.3D 1264 (9TH CIR. 2019) In Patel v. Facebook, Inc., (1) the United States Court of Appeals for the Ninth Circuit affirmed the United States District Court for the [...]
- Published
- 2020
22. If You Think Your DNA Is Anonymous, Think Again!
- Author
-
Dixon, Judge Herbert B., Jr.
- Subjects
DNA identification -- Laws, regulations and rules -- Genetic aspects ,Search warrants -- Laws, regulations and rules ,Criminal investigation -- Laws, regulations and rules ,Criminal suspects -- Genetic aspects -- Family -- Laws, regulations and rules ,DNA banks -- Access control -- Laws, regulations and rules -- Genetic aspects ,Right of privacy -- Laws, regulations and rules ,Government regulation ,United States Constitution (U.S. Const. amend. 4) - Abstract
Are you among the millions who have sought to find long-lost relatives or learn more about your ancestry? Did you spit into a tiny tube or rub a long Q-tip [...]
- Published
- 2020
23. The Automated Tipster: How Implicit Bias Turns Suspicion Algorithms into BBQ Beckys.
- Author
-
Kumar, Christine
- Subjects
Cognitive biases -- Influence -- Laws, regulations and rules ,Race discrimination -- Laws, regulations and rules -- Prevention ,Community policing -- Laws, regulations and rules -- Demographic aspects ,Data security -- Laws, regulations and rules ,Algorithms -- Demographic aspects -- Laws, regulations and rules ,Big data -- Laws, regulations and rules -- Demographic aspects ,Emergency reporting systems (Telephone) -- Demographic aspects -- Laws, regulations and rules ,Artificial intelligence -- Demographic aspects -- Laws, regulations and rules ,Probable cause -- Laws, regulations and rules ,Right of privacy -- Laws, regulations and rules ,Government regulation ,Algorithm ,Data security issue ,Artificial intelligence - Abstract
Table of Contents I. Introduction 98 II. The Wrongful Mobilization of the Police : How Implicit Bias in Humans and Technologies can Influence Policing 101 A. Implicit Bias in Human [...]
- Published
- 2020
24. DNA and the Fourth Amendment: Would a Defendant Succeed on a Challenge to a Familial DNA Search?
- Author
-
Ortyl, Elaine
- Subjects
Warrantless searches -- Genetic aspects -- Laws, regulations and rules -- Methods ,Genealogical databases and libraries -- Genetic aspects -- Evidence -- Usage ,DNA evidence -- Access control -- Laws, regulations and rules -- Usage ,Right of privacy -- Laws, regulations and rules ,Carpenter v. United States (138 S. Ct. 2206 (2018)) ,Maryland v. King (133 S. Ct. 1958 (2013)) ,Government regulation - Abstract
I. INTRODUCTION A new Deoxyribonucleic Acid ("DNA") analysis tool has gained popularity among law enforcement agencies: familial DNA searching. (1) Unlike typical DNA testing, familial DNA searching compares areas of [...]
- Published
- 2019
- Full Text
- View/download PDF
25. The Erosion of Smith v. Maryland.
- Author
-
Ramirez, Geneva
- Subjects
Search warrants -- Laws, regulations and rules ,Data security -- Laws, regulations and rules ,Cell-site simulators -- Access control -- Laws, regulations and rules ,Third parties (Law) -- Laws, regulations and rules ,Right of privacy -- Laws, regulations and rules ,Carpenter v. United States (138 S. Ct. 2206 (2018)) ,Smith v. Maryland (442 U.S. 735 (1979)) ,Government regulation ,Data security issue ,United States Constitution (U.S. Const. amend. 4) - Abstract
CONTENTS INTRODUCTION I. SMITH V. MARYLAND A. The Facts B. The Supreme Court's Majority Opinion C. The Supreme Court Dissenting Opinions 1. Justice Stewart 2. Justice Marshall II. THE ERODING [...]
- Published
- 2019
26. Planting In A Walled Garden: Data Portability Policies To Inform Consumers How Much (if any) Of The Harvest Is Their Share.
- Author
-
Nixdorf, Whitney
- Subjects
Computer crimes -- Laws, regulations and rules -- Prevention ,Data security -- Laws, regulations and rules ,Consumer protection -- Laws, regulations and rules ,Right of privacy -- Laws, regulations and rules ,Government regulation ,Data security issue ,Computer crime - Abstract
INTRODUCTION I. THE CONCEPT OF DATA PORTABILITY IN THE UNITED STATES A. Emergence of Data Portability B. Laws Including an Access or Portability Right C. Why Conditions are Right for [...]
- Published
- 2019
27. SHOULD THE USE OF AUTOMATED LICENSE PLATE READERS CONSTITUTE A SEARCH AFTER CARPENTER V. UNITED STATES?
- Author
-
Foster, Stephanie
- Subjects
Electronic surveillance -- Laws, regulations and rules ,License plates (Motor vehicles) -- Laws, regulations and rules ,Right of privacy -- Laws, regulations and rules ,Searches and seizures -- Laws, regulations and rules ,Carpenter v. United States (138 S. Ct. 2206 (2018)) ,Government regulation - Abstract
INTRODUCTION Are our privacy interests implicated when police keep records of each and every time our cars are spotted by automated license plate readers? For many years, police have used [...]
- Published
- 2019
28. THE CONSTANT AND EXPANDING CLASSROOM: SURVEILLANCE IN K-12 PUBLIC SCHOOLS.
- Author
-
Fedders, Barbara
- Subjects
Minority students -- Laws, regulations and rules ,Child development -- Educational aspects -- Social aspects ,Electronic surveillance -- Laws, regulations and rules ,School safety -- Laws, regulations and rules ,Right of privacy -- Laws, regulations and rules ,Government regulation - Abstract
INTRODUCTION 1674 I. THE STUDENT SURVEILLANCE REGIME 1677 A. Surveillance: What Is It? 1678 B. Typology 1679 1. Technologies for Watching 1680 a. Digital Learning and Data Capture 1680 b. [...], New technologies are expanding schools' ability to keep students under surveillance--inside and outside the classroom--during the school year and after it ends. Schools have moved quickly to adopt a dizzying array of new tools. These include digital learning products that capture and store student data; anonymous tip lines encouraging students to report on each other; and software that monitors students' emails and social media posts, even when they are written from home. Steadily growing numbers of police officers stationed in schools can access this information, compounding the technologies 'power. Advocates of these tools argue that they improve student safety and learning outcomes, but this Article reveals that the evidence for this argument is in fact quite thin. Moreover, policymakers have failed to consider important countervailing considerations--most notably, student privacy and its significance for child development; unequal impact, particularly for poor, Black, and LGBTQ youth; and potential liability for school administrators. Using North Carolina's public schools as a case study, this Article makes three contributions to the burgeoning literature on the surveillance state. First, it provides a comprehensive typology that shows the full range of student surveillance. Second, it identifies key procedural and substantive objections to student surveillance that shoidd be--but are not--taken into account by policymakers. Third, it proposes principles to guide the selection, implementation, and oversight of student surveillance.
- Published
- 2019
29. Integrating Social Media into Online Education
- Author
-
Jensen, Lucas John
- Subjects
Learning management systems -- Usage ,Social media -- Educational aspects -- Laws, regulations and rules ,Online education -- Laws, regulations and rules ,Right of privacy -- Laws, regulations and rules ,Americans ,Social networks ,Web site management software ,Education ,Web sites (World Wide Web) ,Video recordings ,Government regulation ,Library and information science - Abstract
Online education has a reputation for being insular and isolating, with low levels of participation, disconnected from the creative, discursive, and tumultuous world of social media. (1) Bringing social media [...]
- Published
- 2019
30. THE IRONIC PRIVACY ACT.
- Author
-
Hu, Margaret
- Subjects
Social media -- Laws, regulations and rules -- Political aspects -- Remedies ,Electronic surveillance -- Laws, regulations and rules -- Political aspects -- Social aspects ,Right of privacy -- Laws, regulations and rules ,Data collection -- Laws, regulations and rules -- Political aspects -- Social aspects ,Government regulation ,Privacy Act of 1974 - Abstract
ABSTRACT This Article contends that the Privacy Act of 1974, a law intended to engender trust in government records, can be implemented in a way that inverts its intent. Specifically, [...]
- Published
- 2019
31. CARPENTER'S LEGACY: LIMITING THE SCOPE OF THE ELECTRONIC PRIVATE SEARCH DOCTRINE.
- Author
-
Mezera, Sarah A.
- Subjects
Mobile devices -- Access control -- Laws, regulations and rules ,Right of privacy -- Laws, regulations and rules ,Searches and seizures -- Laws, regulations and rules ,Technology ,Containers ,Carpenter v. United States (138 S. Ct. 2206 (2018)) ,Government regulation - Abstract
One of the most significant challenges confronting courts and legal scholars in the twenty-first century is the application of Fourth Amendment doctrine to new technology. The circuit split over the [...]
- Published
- 2019
32. THE FUTURE OF BLOCKCHAIN: AS TECHNOLOGY SPREADS, IT MAY WARRANT MORE PRIVACY PROTECTION FOR INFORMATION STORED WITH BLOCKCHAIN.
- Author
-
Longman, Ashley N.
- Subjects
Blockchains (Databases) -- Laws, regulations and rules ,Right of privacy -- Laws, regulations and rules ,Digital communications -- Access control -- Laws, regulations and rules ,Carpenter v. United States (138 S. Ct. 2206 (2018)) - Abstract
I. INTRODUCTION There are approximately 22 million Bitcoin wallets set up across the globe. (1) However, the number of users has been predominantly left to guesswork because many users own [...]
- Published
- 2019
33. New laws bring much tougher data protections: The California Consumer Privacy Act and the EU's General Data Protection Regulation grant more rights to consumers and impose obligations on businesses.
- Author
-
Myers, Kerry, Lively, Heather, and Andrews, Christine
- Subjects
Data security -- Laws, regulations and rules ,Right of privacy -- Laws, regulations and rules ,Data collection -- Laws, regulations and rules ,Government regulation ,Data security issue ,California. Consumer Privacy Act of 2018 - Abstract
Sweeping data protection laws are in the process of reshaping the landscape for consumer data and rights in the United States. On Jan. 1, 2020, only a couple of months [...]
- Published
- 2019
34. No Hiding Your Face?
- Author
-
Bubar, Joe
- Subjects
Face recognition technology -- Laws, regulations and rules -- Usage -- Methods ,Police departments -- Technology application ,Right of privacy -- Laws, regulations and rules ,Technology ,Privacy ,Biometry ,Government regulation ,Technology application ,General interest ,News, opinion and commentary - Abstract
More police departments are using facial recognition to help solve crimes. But as the use of the technology grows, so do privacy concerns. It was all caught on camera. In [...]
- Published
- 2019
35. Shh! Analyzing Surreptitious Recordings by Soldiers.
- Author
-
Camire, Victoria L.
- Subjects
Evidence (Law) -- Laws, regulations and rules -- Military aspects -- Management ,Sound recordings -- Analysis -- Evidence -- Usage ,Consent (Law) -- Laws, regulations and rules ,Video evidence -- Analysis -- Usage ,Right of privacy -- Laws, regulations and rules ,Government regulation ,Company business management ,Wire Interception and Interception of Oral Communication Act of 1968 - Abstract
"Privacy is one of the biggest problems in this new electronic age." (2) In these technologically advanced times, Soldiers are discovering more innovative ways to obtain evidence in their favor [...]
- Published
- 2019
36. The 10 Problems of the GDPR: The US can learn from the EU's mistakes and leapfrog its policy
- Author
-
Layton, Roslyn
- Subjects
Data security -- Laws, regulations and rules ,Right of privacy -- Laws, regulations and rules ,Privacy -- Laws, regulations and rules ,Personal information ,University research ,Retail trade ,Chairpersons ,Technology ,Government regulation ,Data security issue ,Privacy issue ,Social sciences - Abstract
Chairman Graham, Ranking Member Feinstein, and Members of the Committee, thank you for the opportunity to discuss the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA). It [...]
- Published
- 2019
37. Are You Hip to HIPAA? Here's a refresher course
- Author
-
Gilliard, Kate W.
- Subjects
Medical records -- Laws, regulations and rules ,Privacy -- Laws, regulations and rules ,Health care industry -- Laws, regulations and rules ,Right of privacy -- Laws, regulations and rules ,Health insurance industry -- Laws, regulations and rules ,Insurance law ,Physical therapists ,President of the United States ,Health care industry ,Government regulation ,Privacy issue ,Health ,Sports and fitness ,Health Insurance Portability and Accountability Act of 1996 - Abstract
The Health Insurance Portability and Accountability Act (HIPAA) is hardly new--it was signed into law by President Bill Clinton in 1996. By now, all health care providers, including physical therapists [...]
- Published
- 2019
38. GENE MACHINE: I SPIT IN A TUBE AND UNCOVERED SECRETS ABOUT MY FAMILY HISTORY LONG HELD UNDER WRAPS BY THE GOVERNMENT. MY CASE FOR CONSUMER DNA KITS
- Author
-
Segal, Adam Elliott
- Subjects
DNA identification -- Forecasts and trends -- Safety and security measures -- Laws, regulations and rules ,Right of privacy -- Laws, regulations and rules ,Criminal investigation ,Family ,DNA ,Market trend/market analysis ,Government regulation ,Arts, visual and performing ,Ethnic, cultural, racial issues/studies ,Political science - Abstract
IN THE WINTER OF 2018, like millions of others across the world, I ordered a DNA test. For $99, Ancestry.com promised me a look into my family roots, using just [...]
- Published
- 2019
39. Privacy at the Border: Applying the Border Search Exception to Digital Searches at the United States Border.
- Author
-
Nowell, Laura
- Subjects
Border searches -- Laws, regulations and rules ,Right of privacy -- Laws, regulations and rules ,Warrantless searches -- Laws, regulations and rules ,Mobile devices -- Access control -- Laws, regulations and rules ,Border security ,Containers ,Privacy ,Riley v. California (134 S. Ct. 1126 (2014)) ,Government regulation - Abstract
Table of Contents I. Introduction 87 II. Background 88 A. The Single Purpose Container Exception 89 B. The Exigent Circumstances Exception 90 C. The Search Incident to Lawful Arrest Exception [...]
- Published
- 2019
40. Abortion Protests and the Limits of Freedom of Political Communication: Clubb v. Edwards; Preston v. Avery.
- Author
-
Morrist, Shireen and Stone, Adrienne
- Subjects
Abortion -- Laws, regulations and rules -- Political aspects ,Political protest -- Laws, regulations and rules ,Freedom of speech -- Laws, regulations and rules ,Proportionality (Law) -- Laws, regulations and rules ,Right of privacy -- Laws, regulations and rules ,Undue burden (Law) -- Laws, regulations and rules ,Government regulation ,Political issue - Abstract
AbstractTwo cases currently before the High Court of Australia--Clubb v Edwards and Preston v Avery--raise the validity of state laws that seek to prohibit certain communication and protest outside abortion [...]
- Published
- 2018
41. 'I Call Alexa to the Stand': The Privacy Implications of Anthropomorphizing Virtual Assistants Accompanying Smart-Home Technology.
- Author
-
Burkett, Christopher B.
- Subjects
Personhood -- Analysis -- Laws, regulations and rules ,Voice I/O equipment -- Influence -- Laws, regulations and rules ,Anthropomorphism -- Influence -- Laws, regulations and rules ,Virtual assistants -- Influence -- Laws, regulations and rules ,Right of privacy -- Laws, regulations and rules ,Government regulation ,Voice I/O device - Abstract
TABLE OF CONTENTS I. BACKGROUND 1186 A. Anthropomorphism and Attributions of Agency 1187 1. Promiscuous Agency Account 1189 2. Selective Agency Account 1191 3. Transition Model 1193 B. Legal Doctrines [...], This Note offers a solution to the unique privacy issues posed by the increasingly humanlike interactions users have with virtual assistants, such as Amazon's Alexa, which accompany smart-home technology. These interactions almost certainly result in the users engaging in the cognitive phenomenon of anthropomorphism--more specifically, an assignment of agency. This is a phenomenon that has heretofore been ignored in the legal context, but both the rapidity of technological advancement and inadequacy of current applicable legal doctrine necessitate its consideration now. Since users view these anthropomorphized virtual assistants as persons rather than machines, the law should treat them as such. To accommodate this reality, either the courts or Congress should grant them legal personhood. This can be accomplished through the application of an objective test that is satisfied by the establishment of social and moral connections with these virtual assistants. Further, due to the paramount privacy concerns resulting from this technology's use within the home, courts should establish a new privilege that protects the communications between users and their virtual assistants.
- Published
- 2018
42. PRIVACY IN THE CLOUD: THE FOURTH AMENDMENT FOG.
- Author
-
Aitchison, Sarah
- Subjects
Data security -- Laws, regulations and rules ,Cloud computing -- Access control -- Laws, regulations and rules ,Right of privacy -- Laws, regulations and rules ,Searches and seizures -- Laws, regulations and rules ,Government regulation ,Data security issue ,Electronic Communications Privacy Act - Abstract
Abstract: The Cloud has changed how individuals record, store, and aggregate their personal information. As technology's capacity for holding an individual's most intimate details and recording day-to-day experiences increases, Fourth [...]
- Published
- 2018
43. 'WE KNOW NOT WHERE WE GO': PROTECTING DIGITAL PRIVACY IN NEW YORK CITY'S MUNICIPAL WI-FI NETWORK.
- Author
-
Hornbeck, Eric
- Subjects
Wi-Fi -- Usage -- Laws, regulations and rules ,Electronic surveillance -- Usage -- Laws, regulations and rules ,Kiosks -- Usage -- Laws, regulations and rules ,Right of privacy -- Laws, regulations and rules ,Government regulation ,United States Constitution (U.S. Const. amend. 4) - Abstract
Introduction 700 I. LinkNYC: Narrowing the Digital Divide While Widening Digital Surveillance Concerns 701 A. Closing New York City's Digital Divide as Mobile Broadband Usage Increases 701 B. The Smart [...]
- Published
- 2018
44. Privacy, press, and the right to be forgotten in the United States.
- Author
-
Gajda, Amy
- Subjects
Freedom of the press -- Laws, regulations and rules ,Freedom of speech -- Laws, regulations and rules ,Right of privacy -- Laws, regulations and rules ,Government regulation ,Freedom of Information Act - Abstract
Abstract: When the European Court of Justice in effect accepted a Right to Be Forgotten in 2014, ruling that a man had a right to privacy in his past economic [...]
- Published
- 2018
45. ALEXA, WHAT SHOULD WE DO ABOUT PRIVACY? PROTECTING PRIVACY FOR USERS OF VOICE ACTIVATED DEVICES.
- Author
-
Pfeifle, Anne
- Subjects
Personal digital assistants -- Usage -- Laws, regulations and rules ,Speech recognition equipment -- Usage -- Laws, regulations and rules ,Right of privacy -- Laws, regulations and rules ,Government regulation ,Personal digital assistant ,Pocket PC ,Electronic Communications Privacy Act - Abstract
Abstract: Alexa, Amazon's digital voice assistant, and devices like it, are increasingly common. With this trend comes growing problems, as illustrated by a murder investigation in Bentonville, Arkansas. Police wanted [...]
- Published
- 2018
46. Government Hacking.
- Author
-
Mayer, Jonathan
- Subjects
Malware -- Laws, regulations and rules -- Political aspects -- Usage ,Criminal procedure -- Laws, regulations and rules ,Government investigations -- Laws, regulations and rules -- Methods -- Remedies ,Right of privacy -- Laws, regulations and rules ,Searches and seizures -- Laws, regulations and rules -- Remedies ,Government regulation ,United States Constitution (U.S. Const. amend. 4) - Abstract
AUTHOR. Cyber Initiative Fellow, Stanford University; Assistant Professor of Computer Science and Public Affairs, Princeton University (effective March 2018); J.D., Stanford Law School; Ph.D. candidate, Stanford University Department of Computer [...], TheUnited States government hacks computer systems for law enforcement purposes. As encryption and anonymization tools become more prevalent, the government will fore-seeably increase its resort to malware. Law enforcement hacking poses novel puzzles for criminal procedure. Courts are just beginning to piece through the doctrine, and scholarship is scant. This Article provides the first comprehensive examination of how federal law regulates government malware. Part I of the Article considers whether the Fourth Amendment regulates law enforcement hacking. This issue has sharply divided district courts because, unlike a conventional computer search, hacking usually does not involve physical contact with a suspect's property. The Article provides a technical framework for analyzing government malware, then argues that a faithful application of Fourth Amendment principles compels the conclusion that government hacking is inherently a search. Part II analyzes the positive law that governs law enforcement hacking, answering fundamental criminal procedure questions about initiating a search, establishing probable cause and particularity, venue, search duration, and notice. A review of unsealed court filings demonstrates that the government has a spotty compliance record with these procedural requirements. The Article also argues for reinvigorating super-warrant procedures and applying them to law enforcement hacking. Finally, Part III uses government malware to illuminate longstanding scholarly debates about Fourth Amendment law and the structure of surveillance regulation. Law enforcement hacking sheds new light on the interbranch dynamics of surveillance, equilibrium adjustment theories for calibrating Fourth Amendment law, and the interplay between statutory and constitutional privacy protections.
- Published
- 2018
47. Preparing for Biometric Litigation from COVID-19
- Author
-
Briones, Joshua, Morales, Esteban, and Korn, Adam B.
- Subjects
Privacy -- Laws, regulations and rules ,State laws ,Employers -- Laws, regulations and rules ,Right of privacy -- Laws, regulations and rules ,COVID-19 -- Laws, regulations and rules ,Government regulation ,Privacy issue ,Business ,Human resources and labor relations ,Insurance - Abstract
Over the past few years, Arkansas, California, Illinois, New York, Texas and Washington have all enacted legislation that impacts how businesses can use an individual's biometric data. As a result [...]
- Published
- 2020
48. Rosenbach v. Six Flags Entertainment Corp.
- Author
-
Swafford, Julia
- Subjects
Data security -- Laws, regulations and rules ,Biometry -- Access control -- Laws, regulations and rules ,Standing (Law) -- Laws, regulations and rules ,Damages (Law) -- Laws, regulations and rules ,Recall of judicial decisions -- Laws, regulations and rules ,Right of privacy -- Laws, regulations and rules ,Rosenbach v. Six Flags Entertainment Corp. (129 N.E.3d 1197 (Ill. 2019)) ,Government regulation ,Data security issue ,Illinois. Biometric Information Privacy Act of 2008 - Abstract
129 N.E.3D 1197 (ILL. 2019) In Rosenbach v. Six Flags Entertainment Corp., the Supreme Court of Illinois reversed the appellate court's holding and found that a technical violation of Illinois's [...]
- Published
- 2020
49. Understanding PRIVACY BY DESIGN: The General Data Protection Regulation mandates organisations to embed privacy by design into the development of new initiatives involving the use of personal data. Donal Murray discusses the impact of privacy by design from a practical perspective, and explores its benefits
- Author
-
Murray, Donal
- Subjects
Data security -- Laws, regulations and rules ,Privacy -- Laws, regulations and rules ,Right of privacy -- Laws, regulations and rules ,Personal information -- Laws, regulations and rules ,Government regulation ,Data security issue ,Privacy issue ,Banking, finance and accounting industries ,Business ,Business, international - Abstract
The General Data Protection Regulation (GDPR) has changed European privacy rules significantly. The introduction of the concept of privacy by design (PbD) is one of these changes but many organisations [...]
- Published
- 2020
50. THE THIRD-PARTY DOCTRINE AND THE FUTURE OF THE CLOUD.
- Author
-
Richards, Neil
- Subjects
Electronic evidence -- Access control -- Laws, regulations and rules ,Cloud computing -- Access control -- Laws, regulations and rules ,Warrantless searches -- Laws, regulations and rules ,Third parties (Law) -- Laws, regulations and rules ,Right of privacy -- Laws, regulations and rules ,Government regulation ,Electronic Communications Privacy Act - Abstract
ABSTRACT When the government seeks electronic documents held in the cloud, what legal standard should apply? This simple question raises fundamental questions about the future of our civil liberties in [...]
- Published
- 2017
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.