Showing Results for
- Academic Journals (4,175)
Search Results
- 4,175
Academic Journals
- 4,175
- 1From:Health Management Technology (Vol. 35, Issue 9)In 1996, when the Health Insurance Portability and Accountability Act (HIPAA) came into effect, organizations did their best to comply. However, because HIPAA breaches are prosecutable under civil statutes and not...
- 2From:Journal of Internet Law (Vol. 18, Issue 4)According to recent studies conducted by The Nielsen Company, about 206 million Americans were active online during the month of February 2014 (1) and Americans now own on average four digital devices, with the average...
- 3From:Communique (Vol. 42, Issue 6)Many school psychologists are engaging in the largest violation of student confidentiality and privacy of student records in recent memory, yet it is receiving scant notice. It is unlikely that school psychologists who...
- 4From:North Carolina Law Review (Vol. 90, Issue 5) Peer-ReviewedThank you to the UNC Law Review, Professor Anne Klinefelter, Andrew Kasper and others for the invitation to speak. Commissioner Brill, distinguished professors and soon-to-be distinguished students it's a pleasure to be...
- 5From:Journal of Internet Law (Vol. 19, Issue 1)Current critiques of governmental surveillance focus on the government's use of information to discourage and prevent behavior of which it disapproves. Targets of surveillance may include journalists, political...
- 6From:Faulkner Law Review (Vol. 5, Issue 2) Peer-ReviewedI. THE SILENT TAP HEARD 'ROUND THE WORLD In June of 2013, Edward Snowden stirred a lively national and global debate when The Washington Post and the British newspaper The Guardian published stories that the National...
- 7From:Monash University Law Review (Vol. 38, Issue 3) Peer-ReviewedThis paper considers who owns wastewater. Our view is that the common law notions of proprietary rights are incapable of providing the nuanced solution necessary to this question. This solution must encompass the public...
- 8From:Intellectual Property & Technology Law Journal (Vol. 23, Issue 9)Two recent Federal Trade Commission (FTC) cases serve as an important reminder to everyone in corporate America that, while much of the attention on privacy and security (deservedly) goes to customer data, it is...
- 9From:The Journal JurisprudenceIntroduction In Hutchinson and Morgan's 'The Canengusian Connection: The Kaleidoscope of Tort Theory', Wright J (one of their five fictive judges) is a committed defender of corrective justice. (1) In his 'judgment',...
- 10From:Antitrust Law Journal (Vol. 76, Issue 3) Peer-ReviewedSection 2 enforcement by the U.S. antitrust authorities is back--at least, that is what the antitrust enforcers themselves have been saying. (1) An examination of Section 2 enforcement principles could not be more...
- 11From:Information Today (Vol. 27, Issue 4)For the past few weeks, I've been watching the ongoing case of a public school district just outside Philadelphia that recently issued laptops to about 200 of its students. That's good news, but the story doesn't stop...
- 12From:Journal of Law, Medicine & Ethics (Vol. 38, Issue 1) Peer-ReviewedDuring this early stage of HIT adoption, it is critical that we engage in discussions regarding informed consent's proper role in a health care environment in which electronic information sharing holds primary...
- 13From:Benefits Law Journal (Vol. 23, Issue 4)The US Department of Health and Human Services (HHS) has issued a proposed rewrite of the Health Insurance Portability and Accountability Act (HIPAA) privacy and data security regulations. (1) Happily, most of the...
- 14From:Criminal Justice (Vol. 24, Issue 4) Peer-ReviewedAnn Brown lives with her 30-something daughter and granddaughter in a condo she owns. What would happen if the police suspected her daughter of some crime and asked Ann to consent to a search of her daughter's private...
- 15From:Journal of Criminal Law and Criminology (Vol. 100, Issue 4) Peer-ReviewedThis Comment offers a critical analysis of the recent decision of the Ninth Circuit Court of Appeals in United States v. Comprehensive Drug Testing, Inc. First, the Comment discusses the facts of the case and the...
- 16From:Journal of Internet Law (Vol. 18, Issue 8)We are being told repeatedly that individuals have no interest in privacy. Advertisers, marketers, and others companies that benefit from advertising revenues argue that most people will give away very personal details...
- 17From:Benefits Law Journal (Vol. 28, Issue 2)Recent cyber-attacks on health insurers have heightened awareness that sensitive participant and beneficiary information may not be adequately secure. There will undoubtedly be other attacks on data bases maintained by...
- 18From:The Computer & Internet Lawyer (Vol. 29, Issue 3)A bank intern claiming a family emergency only to be seen on Facebook at a Halloween party in a winged fairy costume holding a drink, flight attendants posting unflattering comments on a social network site about their...
- 19From:Journal of Law, Medicine & Ethics (Vol. 39, Issue 4) Peer-ReviewedThe death of a research participant raises numerous ethical and legal issues regarding the return of research results to related family members. This question is particularly acute in the context of genetic research...
- 20From:The Computer & Internet Lawyer (Vol. 27, Issue 12)Multinational and internationally focused businesses in the United States and elsewhere have stepped up their efforts to monitor and comply with data protection laws in recent years. Reasons for this trend include an...