首页 > 最新文献

Pittsburgh Journal of Technology Law & Policy最新文献

英文 中文
First Amendment Concerns in Governmental Acquisition and Analysis of Mobile Device Location Data 第一修正案对政府获取和分析移动设备位置数据的关注
Pub Date : 2013-05-30 DOI: 10.5195/tlp.2013.121
Gerald J. Votava
{"title":"First Amendment Concerns in Governmental Acquisition and Analysis of Mobile Device Location Data","authors":"Gerald J. Votava","doi":"10.5195/tlp.2013.121","DOIUrl":"https://doi.org/10.5195/tlp.2013.121","url":null,"abstract":"","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124781962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The New Privacy Battle: How the Expanding Use of Drones Continues to Erode Our Concept of Privacy and Privacy Rights 新的隐私之战:无人机的广泛使用如何继续侵蚀我们的隐私和隐私权概念
Pub Date : 2013-05-30 DOI: 10.5195/TLP.2013.123
Chris Schlag
The exciting, thriving and developing technology that everybody has been talking about recently is drones. Due to recent technological developments, which make drones an affordable and universal tool, drones have expanded out of military use and into domestic applications. The enactment of the FAA Modernization and Reform Act in 2012 further pushed for the development and expansion of drone use in the United States’ airspace, by requiring the FAA to license over 30,000 drone operators. While drone use has an unlimited potential for beneficial use within society, drone technology is not without risks. For example, drone use in domestic airspace raises the significant and undeniable risk of individual privacy invasions through the use of drones by both public entities and third parties. This article argues current common law and legislative protections of potential privacy invasions resulting from drone use are drastically insufficient as neither affords strong protection of an individual’s privacy from such sophisticated technology’s potential. The article concludes by recommending a federal baseline consumer protection act that would establish a reasonable level of protection for an individual’s privacy by ensuring drone use was being monitored from a privacy protection standpoint and limiting the use of drones in a way that would invade an individual’s privacy expectations. Normal 0 false false false EN-US JA X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:12.0pt; font-family:"Cambria","serif"; mso-ascii-font-family:Cambria; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Cambria; mso-hansi-theme-font:minor-latin;}
最近每个人都在谈论的令人兴奋、蓬勃发展的技术是无人机。由于最近的技术发展,使无人机成为一种负担得起的通用工具,无人机已经从军事用途扩展到家庭应用。2012年颁布的《联邦航空局现代化和改革法案》进一步推动了无人机在美国空域的发展和扩大,要求联邦航空局向3万多名无人机操作员颁发许可证。虽然无人机在社会中具有无限的有益使用潜力,但无人机技术并非没有风险。例如,在国内空域使用无人机增加了公共实体和第三方通过使用无人机侵犯个人隐私的重大和不可否认的风险。本文认为,目前的普通法和立法对无人机使用可能导致的隐私侵犯的保护远远不够,因为它们都没有提供强有力的个人隐私保护,不受这种复杂技术的影响。文章最后建议制定一项联邦消费者保护基准法案,通过确保从隐私保护的角度监控无人机的使用,并限制无人机的使用,以侵犯个人隐私的期望,为个人隐私建立一个合理的保护水平。正常0 false false false EN-US JA X-NONE /*样式定义*/表。mso-style-name:"Table Normal";mso-tstyle-rowband-size: 0;mso-tstyle-colband-size: 0;mso-style-noshow:是的;mso-style-priority: 99;mso-style-parent:“”;mso- font - family:宋体;mso-para-margin: 0;mso-para-margin-bottom: .0001pt;mso-pagination: widow-orphan;字体大小:12.0分;字体类型:“威尔士”、“衬”;mso-ascii-font-family:威尔士;mso-ascii-theme-font: minor-latin;mso-hansi-font-family:威尔士;mso-hansi-theme-font: minor-latin;}
{"title":"The New Privacy Battle: How the Expanding Use of Drones Continues to Erode Our Concept of Privacy and Privacy Rights","authors":"Chris Schlag","doi":"10.5195/TLP.2013.123","DOIUrl":"https://doi.org/10.5195/TLP.2013.123","url":null,"abstract":"The exciting, thriving and developing technology that everybody has been talking about recently is drones. Due to recent technological developments, which make drones an affordable and universal tool, drones have expanded out of military use and into domestic applications. The enactment of the FAA Modernization and Reform Act in 2012 further pushed for the development and expansion of drone use in the United States’ airspace, by requiring the FAA to license over 30,000 drone operators. While drone use has an unlimited potential for beneficial use within society, drone technology is not without risks. For example, drone use in domestic airspace raises the significant and undeniable risk of individual privacy invasions through the use of drones by both public entities and third parties. This article argues current common law and legislative protections of potential privacy invasions resulting from drone use are drastically insufficient as neither affords strong protection of an individual’s privacy from such sophisticated technology’s potential. The article concludes by recommending a federal baseline consumer protection act that would establish a reasonable level of protection for an individual’s privacy by ensuring drone use was being monitored from a privacy protection standpoint and limiting the use of drones in a way that would invade an individual’s privacy expectations. Normal 0 false false false EN-US JA X-NONE /* Style Definitions */ \u0000 table.MsoNormalTable \u0000 {mso-style-name:\"Table Normal\"; \u0000 mso-tstyle-rowband-size:0; \u0000 mso-tstyle-colband-size:0; \u0000 mso-style-noshow:yes; \u0000 mso-style-priority:99; \u0000 mso-style-parent:\"\"; \u0000 mso-padding-alt:0in 5.4pt 0in 5.4pt; \u0000 mso-para-margin:0in; \u0000 mso-para-margin-bottom:.0001pt; \u0000 mso-pagination:widow-orphan; \u0000 font-size:12.0pt; \u0000 font-family:\"Cambria\",\"serif\"; \u0000 mso-ascii-font-family:Cambria; \u0000 mso-ascii-theme-font:minor-latin; \u0000 mso-hansi-font-family:Cambria; \u0000 mso-hansi-theme-font:minor-latin;}","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"84 3-4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131642047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Drawing the Line: The Legality of Using Wiretaps to Investigate Insider Trading 划清界限:利用窃听调查内幕交易的合法性
Pub Date : 2013-05-30 DOI: 10.5195/tlp.2013.122
S. Miller
{"title":"Drawing the Line: The Legality of Using Wiretaps to Investigate Insider Trading","authors":"S. Miller","doi":"10.5195/tlp.2013.122","DOIUrl":"https://doi.org/10.5195/tlp.2013.122","url":null,"abstract":"","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"2 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114055676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Jailbroken: Examining the Policy and Legal Implications of iPhone Jailbreaking 越狱:检查iPhone越狱的政策和法律含义
Pub Date : 2013-05-30 DOI: 10.5195/TLP.2013.118
Kevin M. Rogers
{"title":"Jailbroken: Examining the Policy and Legal Implications of iPhone Jailbreaking","authors":"Kevin M. Rogers","doi":"10.5195/TLP.2013.118","DOIUrl":"https://doi.org/10.5195/TLP.2013.118","url":null,"abstract":"","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123703865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Copyright in the Mobile Media Era 移动媒体时代的版权
Pub Date : 2013-05-30 DOI: 10.5195/TLP.2013.115
Krysta M. Smith
{"title":"Copyright in the Mobile Media Era","authors":"Krysta M. Smith","doi":"10.5195/TLP.2013.115","DOIUrl":"https://doi.org/10.5195/TLP.2013.115","url":null,"abstract":"","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134433992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Failure of State Texting-While-Driving Laws 国家在开车时发短信法律的失败
Pub Date : 2013-05-30 DOI: 10.5195/TLP.2013.119
Cody J. Harding
{"title":"The Failure of State Texting-While-Driving Laws","authors":"Cody J. Harding","doi":"10.5195/TLP.2013.119","DOIUrl":"https://doi.org/10.5195/TLP.2013.119","url":null,"abstract":"","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128841921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Based on an Almost True Story: Providing Real Life Protection to Real Life Characters 基于一个几乎真实的故事:为现实生活中的人物提供现实生活中的保护
Pub Date : 2012-12-21 DOI: 10.5195/TLP.2012.113
Brandy S. Ringer
{"title":"Based on an Almost True Story: Providing Real Life Protection to Real Life Characters","authors":"Brandy S. Ringer","doi":"10.5195/TLP.2012.113","DOIUrl":"https://doi.org/10.5195/TLP.2012.113","url":null,"abstract":"","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129409057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Technology, Residuals, and the New Threat to Hollywood Screenwriters 技术、剩余收入以及好莱坞编剧面临的新威胁
Pub Date : 2012-12-21 DOI: 10.5195/TLP.2012.112
K. Leary
{"title":"Technology, Residuals, and the New Threat to Hollywood Screenwriters","authors":"K. Leary","doi":"10.5195/TLP.2012.112","DOIUrl":"https://doi.org/10.5195/TLP.2012.112","url":null,"abstract":"","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"361 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132306107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Introduction: Law, Technology, and Entertainment in...Pittsburgh?!? 匹兹堡的法律、科技和娱乐?!?
Pub Date : 2012-12-21 DOI: 10.5195/TLP.2012.107
Steeltown Entertainment
{"title":"Introduction: Law, Technology, and Entertainment in...Pittsburgh?!?","authors":"Steeltown Entertainment","doi":"10.5195/TLP.2012.107","DOIUrl":"https://doi.org/10.5195/TLP.2012.107","url":null,"abstract":"","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121849874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Through A Router Darkly: How New American Copyright Enforcement Initiatives May Hinder Economic Development, Net Neutrality and Creativity 通过路由器的黑暗:新的美国版权执法举措如何阻碍经济发展,网络中立性和创造力
Pub Date : 2012-12-21 DOI: 10.5195/TLP.2012.110
P. Groh
On November 1, 2012, Russia enacted a law putatively aiming to protect Russian children from pedophiles. This law authorizes deep packet inspection (DPI), a method used for monitoring, filtering and shaping internet traffic, which has heightened concerns among many leading privacy groups. These groups are concerned with how the government will use such an intrusive method in prosecuting child predators. Central to this concern is DPI’s capability to allow the Russian government to peer into any citizens’ unencrypted internet traffic and monitor, copy, or even alter the traffic as it moves to its destination. The unresolved question is whether the government’s use of DPI will be restrained and utilized primarily to thwart child predators, or whether it will be expanded to lay the groundwork for a new era of national censorship. Although the United States has not yet adopted similar tactics in regulating its citizens’ internet use, Russia’s implementation of the new DPI monitoring and filtering system will provide an educational opportunity for both privacy advocates and policymakers.
2012年11月1日,俄罗斯颁布了一项旨在保护俄罗斯儿童免受恋童癖侵害的法律。该法案授权深度数据包检测(DPI),这是一种用于监控、过滤和塑造互联网流量的方法,已引起许多主要隐私组织的高度关注。这些组织担心政府将如何使用这种侵入性的方法来起诉儿童掠夺者。这种担忧的核心是DPI允许俄罗斯政府窥视任何公民未加密的互联网流量,并在流量流向目的地时监控、复制甚至改变流量。尚未解决的问题是,政府对DPI的使用是否会受到限制,并主要用于挫败儿童掠夺者,或者是否会扩大其范围,为国家审查的新时代奠定基础。虽然美国还没有采取类似的策略来规范其公民的互联网使用,但俄罗斯实施新的DPI监控和过滤系统将为隐私倡导者和政策制定者提供一个教育机会。
{"title":"Through A Router Darkly: How New American Copyright Enforcement Initiatives May Hinder Economic Development, Net Neutrality and Creativity","authors":"P. Groh","doi":"10.5195/TLP.2012.110","DOIUrl":"https://doi.org/10.5195/TLP.2012.110","url":null,"abstract":"On November 1, 2012, Russia enacted a law putatively aiming to protect Russian children from pedophiles. This law authorizes deep packet inspection (DPI), a method used for monitoring, filtering and shaping internet traffic, which has heightened concerns among many leading privacy groups. These groups are concerned with how the government will use such an intrusive method in prosecuting child predators. Central to this concern is DPI’s capability to allow the Russian government to peer into any citizens’ unencrypted internet traffic and monitor, copy, or even alter the traffic as it moves to its destination. The unresolved question is whether the government’s use of DPI will be restrained and utilized primarily to thwart child predators, or whether it will be expanded to lay the groundwork for a new era of national censorship. Although the United States has not yet adopted similar tactics in regulating its citizens’ internet use, Russia’s implementation of the new DPI monitoring and filtering system will provide an educational opportunity for both privacy advocates and policymakers.","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122025576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Pittsburgh Journal of Technology Law & Policy
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1