Journal of Information & Privacy Law

Blog

Americans’ Virtual Safety in Sochi Winter Olympics

By Melinda Tsang, Executive Business Editor on Tuesday, February 18th, 2014

Many countries have taken precautions to ensure the safety of their citizens while in Sochi, Russia, for the 2014 Winter Olympics.  In the event of a terror attack, the United States is ready to whisk away American athletes, coaches, and spectators. Two U.S. war ships are on standby in the Black Sea, equipped with helicopters. …

Continue Reading...

Will Safe Harbour be Destroyed by the Snowden Storm?

By Meredith Mays Espino, Solicitation Editor on Saturday, February 8th, 2014

With the passage of European Commission’s Council Directive 95/46/EC, Protection of Individuals with regard to the Processing of Personal Data and on the Free Movement of Such Data, the European Union became the leader in data privacy, setting the bar for other nations.  Aside from the European Union, more and more nation-states are following the…

Continue Reading...

Google Reaches into Homes with Nest Acquisition

By Kalli Kling, Managing Editor on Saturday, January 25th, 2014

On January 13, 2014 Google acquired Nest Lab, Inc. for $3.2 billion. Currently, Nest only sells two products designed to make life easier for its consumers: a thermostat and a smoke/ carbon monoxide detector. However, what makes these devices unique is the innovative qualities the creators included to save energy and make managing a person’s…

Continue Reading...

Is the NSA’s Surveillance of Telephone Data Really a Violation of Our Privacy?

By Pamela Szelung, Editor-in-Chief on Wednesday, January 8th, 2014

Edward J. Snowden’s actions in early 2013 created an international uproar against the U.S. government’s secret surveillance programs.  The U.S. National Security Agency (NSA) was directly attacked for secretly monitoring the phone numbers of world leaders and for asking U.S. officials to “share their Rolodexes so the agency can add the phone numbers of leading…

Continue Reading...

A Jujitsu Approach to Cybersecurity – How a Hacker Figures Out a Way to Manipulate the Force of the Internet to Defeat It.

By Kasia Dominikowski, Solicitation Editor on Wednesday, January 1st, 2014

We know already how scary it was for those Facebook addicts when their Monday morning ritual of “liking” their friends’ weekend pictures was suddenly halted.  Even worse, the day of October 21st , 2013 was probably the least celebrated birthday morning ever. “What do you mean my friends can’t wish me Happy Birthday?!” screamed my…

Continue Reading...

Social Media as a Means to Effectuate Service of Process

By Nicholas Esterman, Lead Production Editor on Sunday, December 1st, 2013

In May 2011, a Minnesota circuit court judge drafted an order authorizing the service of process on a defendant living in Cote D’Ivoire by “email, Facebook, or any other social networking website.”  Jessica McFae attempted to serve divorce papers on her estranged husband but realized that he had moved back to his native Cote D’Ivoire.  …

Continue Reading...

Are Privacy Concerns Thwarting Technological Growth?

By Zayna Nubani, Symposium Editor on Saturday, November 23rd, 2013

We live in a world of technology.  We live in a world of smartphones, GPS, and robotic check-ups. Technology is a vital part of our everyday lives.  Consumers continuously expect to see new technology, while inventors, innovators, and companies continue to work on providing us with that new technology.  As consumers of technology, we expect…

Continue Reading...

Printing in a Whole New Dimension – 3D Printing has Arrived

By Melinda Tsang, Executive Business Editor on Friday, November 15th, 2013

Instead of printing a 2-dimensional image on paper, you can now purchase a 3D printer that will spray layers upon layers of “ink” to form an object.  This “ink” can be various substances, like plastic, metals, and even human tissue.  First, the object to be duplicated is scanned into the computer.  Alterations can be made…

Continue Reading...

Using Your Fingerprint to Unlock Your Cellphone – Apple’s Touch ID

By Samantha Levin, Communications Editor on Friday, November 1st, 2013

On September 20, 2013, Apple finally released its new phone product, the iPhone 5s. With all the commotion and roar about this new phone and its features, many consumers do not stop and think about the privacy concerns that might be attached with all the high-tech features of the phone, primarily the fingerprint scanner. The…

Continue Reading...