Journal of Information & Privacy Law

Blog

A Jujitsu Approach to Cybersecurity – How a Hacker Figures Out a Way to Manipulate the Force of the Internet to Defeat It.

By Kasia Dominikowski, Solicitation Editor on Wednesday, January 1st, 2014

We know already how scary it was for those Facebook addicts when their Monday morning ritual of “liking” their friends’ weekend pictures was suddenly halted.  Even worse, the day of October 21st , 2013 was probably the least celebrated birthday morning ever. “What do you mean my friends can’t wish me Happy Birthday?!” screamed my…

Continue Reading...

Social Media as a Means to Effectuate Service of Process

By Nicholas Esterman, Lead Production Editor on Sunday, December 1st, 2013

In May 2011, a Minnesota circuit court judge drafted an order authorizing the service of process on a defendant living in Cote D’Ivoire by “email, Facebook, or any other social networking website.”  Jessica McFae attempted to serve divorce papers on her estranged husband but realized that he had moved back to his native Cote D’Ivoire.  …

Continue Reading...

Are Privacy Concerns Thwarting Technological Growth?

By Zayna Nubani, Symposium Editor on Saturday, November 23rd, 2013

We live in a world of technology.  We live in a world of smartphones, GPS, and robotic check-ups. Technology is a vital part of our everyday lives.  Consumers continuously expect to see new technology, while inventors, innovators, and companies continue to work on providing us with that new technology.  As consumers of technology, we expect…

Continue Reading...

Printing in a Whole New Dimension – 3D Printing has Arrived

By Melinda Tsang, Executive Business Editor on Friday, November 15th, 2013

Instead of printing a 2-dimensional image on paper, you can now purchase a 3D printer that will spray layers upon layers of “ink” to form an object.  This “ink” can be various substances, like plastic, metals, and even human tissue.  First, the object to be duplicated is scanned into the computer.  Alterations can be made…

Continue Reading...

Using Your Fingerprint to Unlock Your Cellphone – Apple’s Touch ID

By Samantha Levin, Communications Editor on Friday, November 1st, 2013

On September 20, 2013, Apple finally released its new phone product, the iPhone 5s. With all the commotion and roar about this new phone and its features, many consumers do not stop and think about the privacy concerns that might be attached with all the high-tech features of the phone, primarily the fingerprint scanner. The…

Continue Reading...

Government Access to Medical Records During Gun Purchases and Due Process

By Erin Walgrave, Production Editor on Tuesday, October 15th, 2013

Reading the supreme law of the land reveals one glaring point, that the United States “Constitution states only one command twice. The Fifth Amendment says to the federal government that no one shall be “deprived of life, liberty or property without due process of law.” The Fourteenth Amendment, ratified in 1868, uses the same eleven words….

Continue Reading...

Welcome to our website!

By Pamela Szelung, Editor-in-Chief on Tuesday, October 1st, 2013

Hello, my name is Pamela Szelung and I am the Editor-in-Chief for the Journal for the 2013-14 academic year. First, let me take a moment to say “Welcome to our new website!”  As the Journal publishes its 30th volume at The John Marshall Law School this year, it has undergone many exciting changes in order…

Continue Reading...
1 4 5 6