Volume 17

Through a Glass Darkly: From Privacy Notices to Effective Transparency

Volume 17, Issue 4 (May 2016)

Openness is the first fundamental principle of fair information practices with “notice” serving to practically implement openness in most commercial transactions. However, current notices have been widely criticized as being too complex, legalistic, lengthy, and opaque. This Article argues that to achieve the openness required by the first fair information practice principle, data protection and privacy should move from a “notice”

Download Full Text PDF

Paula J. Bruening & Mary J. Culnan, Through a Glass Darkly: From Privacy Notices to Effective Transparency, 17 N.C.J.L. & Tech. 515 (2016), available at http://ncjolt.org/wp-content/uploads/2016/05/BrueningCulnan_Final.pdf.

The Internet of Heirlooms and Disposable Things

Volume 17, Issue 4 (May 2016)

The Internet of Things (“IoT”) is here, and we seem to be going all in. We are trying to put a microchip in nearly every object that is not nailed down and even a few that are. Soon, your cars, toasters, toys, and even your underwear will be wired up to make your lives better. The general thought seems

Download Full Text PDF

Woodrow Hartzog & Evan Selinger, The Internet of Heirlooms and Disposable Things, 17 N.C.J.L. & Tech. 581 (2016), available at http://ncjolt.org/wp-content/uploads/2016/05/Hartzog_Final.pdf.

You Can’t Always Get What You Want: How Will Law Enforcement Get What it Needs in a Post-CALEA, Cybersecurity-Centric Encryption Era?

Volume 17, Issue 4 (May 2016)

In recent years, many technology companies have enabled encryption by default in their products, thereby burdening law enforcement efforts to intercept communications content or access data stored on smartphones by traditional means. Even before such encryption technologies were widely used, however, the Federal Bureau of Investigation (“FBI”) claimed its surveillance capabilities were “Going Dark” due

Download Full Text PDF

Stephanie K. Pell,You Can't Always Get What You Want: How Will Law Enforcement Get What it Needs in a Post-CALEA, Cybersecurity-Centric Encryption Era?, 17 N.C.J.L. & Tech. 599 (2016), available at http://ncjolt.org/wp-content/uploads/2016/05/Pell_Final.pdf.

The Electronic Communications Privacy Act: Does the Act Let the Government Snoop Through Your Emails and Will It Continue?

Volume 17, Online Edition (May 2016)

The Securities and Exchange Commission (“SEC”) is an enforcement powerhouse that has historically relied on the 1986 Electronic Communications Privacy Act (“ECPA”) to collect electronic communications directly from Internet Service Providers (“ISPs”) with a subpoena. The ECPA shields recent or unopened electronic communications from government eyes, but treats all others as abandoned and thus subject to warrantless government search and seizure. In

Download Full Text PDF

Brittany Brattain, The Electronic Communications Privacy Act: Does the Act Let the Government Snoop Through Your Emails and Will It Continue?, 17 N.C.J.L. & Tech. On. 185 (2016), available at http://ncjolt.org/wp-content/uploads/2016/05/Brattain_Final.pdf.

LegalZoom: Closing the Justice Gap or Unauthorized Practice of Law?

Volume 17, Online Edition (May 2016)

Over the past several years, legal services provided through online platforms have become a popular, low cost alternative to traditional legal services. LegalZoom offers a range of legal services, through its website, at a more affordable price than traditional legal services. Affordable legal services help to remedy the current disparity in the United States between low-income individuals with legal needs and

Download Full Text PDF

Caroline E. Brown, LegalZoom: Closing the Justice Gap or Unauthorized Practice of Law?, 17 N.C.J.L. & Tech. On. 219 (2016), available at http://ncjolt.org/wp-content/uploads/2016/05/Brown_Final.pdf.

Is Fair Use Actually Fair? Analyzing Fair Use and the Potential For Compulsory Licensing in Authors Guild v. Google

Volume 17, Online Edition (May 2016)

As books are becoming electronic, people are now conducting more research online instead of venturing into bookstores and libraries. The number of bookstores in the nation is declining as people replace the relationship they once had with these stores with online sources. Particularly, in services such as Google Books, people use search engines to browse books in the same manner they

Download Full Text PDF

Varsha Mangal, Is Fair Use Actually Fair? Analyzing Fair Use and the Potential For Compulsory Licensing in Authors Guild v. Google, 17 N.C.J.L. & Tech. On. 251 (2016), available at http://ncjolt.org/wp-content/uploads/2016/07/Mangal_Final.pdf.

Thunderstruck: The Government Accountability Office’s Recent Ruling on Agency Social Media Use

Volume 17, Online Edition (May 2016)

Social media is a powerful and useful tool for facilitating communication between federal agencies and their constituents. However, the recent ruling by the Government Accountability Office (“GAO”) that a social media campaign undertaken by the Environmental Protection Agency (“EPA”) violated both the Federal Antideficiency Act (“FADA”) and the prohibition on grass-roots lobbying has raised questions regarding how agencies can continue to utilize

Download Full Text PDF

Shannon O’Neil, Thunderstruck: The Government Accountability Office's Recent Ruling on Agency Social Media Use,17 N.C.J.L. & Tech. On. 293 (2016), available at http://ncjolt.org/wp-content/uploads/2016/05/ONeil_Final.pdf.

The TSA Opting-Out of Opt-Outs: The New TSA Full-Body Scanner Guidelines and Travelers’ Right to Privacy

Volume 17, Online Edition (May 2016)

Imagine—your taxi arrives at the airport terminal, you quickly check your bags, and then join hundreds of other passengers in line for security screening. The line seems to be moving even more slowly than usual, and you glare ahead when you notice the hold up—Transportation Security Administration (“TSA”) officials removing snakes and tortoises from a passenger’s pants. This bizarre scenario made

Download Full Text PDF

Elizabeth Windham, The TSA Opting-Out of Opt-Outs: The New TSA Full-Body Scanner Guidelines and Travelers' Right to Privacy, 17 N.C.J.L. & Tech. On. 329 (2016), available at http://ncjolt.org/wp-content/uploads/2016/05/Windham_Final.pdf.

North Carolina Abusive Patent Assertions Act: A Powerful Gun, but Will It Hold Up in a Gunfight?

Volume 17, Issue 3 (Mar 2016)

In the wake of press reports of abusive patent behavior, the North Carolina legislature followed other states and passed a state law designed to curb abusive patent practices. The Abusive Patents Assertions Act (the Act), passed in 2014, creates a state law tort action for a bad faith assertion of patent infringement. A business that believes it has been

Download Full Text PDF

Jason D. Gardner & Stephen J. E. Dew, North Carolina Abusive Patent Assertions Act: A Powerful Gun, but Will It Hold Up in a Gunfight?, 17 N.C.J.L. & Tech. 391 (2016), available at http://ncjolt.org/wp-content/uploads/2016/03/Gardner_Final.pdf.

The Right to Obscurity: How We Can Implement the Google Spain Decision

Volume 17, Issue 3 (Mar 2016)

On May 13, 2014, the Court of Justice of the European Union (“CJEU”) announced its judgment in Google Spain SL, Google Inc. v. Agencia Espanola de Proteccion de Datos, Mario Consteja González. The decision required Google to delist certain internet search results when a search query was made using an individual’s name. Commentators worldwide have referred to this delisting as the

Download Full Text PDF

David Hoffman, Paula Bruening & Sophia Carter, The Right to Obscurity: How We Can Implement the Google Spain Decision, 17 N.C.J.L. & Tech. 437 (2016), available at http://ncjolt.org/wp-content/uploads/2016/03/Hoffman_Final.pdf.

The North Carolina Journal of Law & Technology has adopted the Open Access Program, a part of the Scholar’s Copyright Project created by Science Commons. Authors designate the conditions under which their articles are licensed. By downloading articles, you agree to comply with the license terms specified. Please contact NC JOLT at eic.ncjolt@gmail.com with permissions inquiries.