{"title":"First Amendment Concerns in Governmental Acquisition and Analysis of Mobile Device Location Data","authors":"Gerald J. Votava","doi":"10.5195/tlp.2013.121","DOIUrl":"https://doi.org/10.5195/tlp.2013.121","url":null,"abstract":"","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124781962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The New Privacy Battle: How the Expanding Use of Drones Continues to Erode Our Concept of Privacy and Privacy Rights","authors":"Chris Schlag","doi":"10.5195/TLP.2013.123","DOIUrl":"https://doi.org/10.5195/TLP.2013.123","url":null,"abstract":"The exciting, thriving and developing technology that everybody has been talking about recently is drones. Due to recent technological developments, which make drones an affordable and universal tool, drones have expanded out of military use and into domestic applications. The enactment of the FAA Modernization and Reform Act in 2012 further pushed for the development and expansion of drone use in the United States’ airspace, by requiring the FAA to license over 30,000 drone operators. While drone use has an unlimited potential for beneficial use within society, drone technology is not without risks. For example, drone use in domestic airspace raises the significant and undeniable risk of individual privacy invasions through the use of drones by both public entities and third parties. This article argues current common law and legislative protections of potential privacy invasions resulting from drone use are drastically insufficient as neither affords strong protection of an individual’s privacy from such sophisticated technology’s potential. The article concludes by recommending a federal baseline consumer protection act that would establish a reasonable level of protection for an individual’s privacy by ensuring drone use was being monitored from a privacy protection standpoint and limiting the use of drones in a way that would invade an individual’s privacy expectations. Normal 0 false false false EN-US JA X-NONE /* Style Definitions */ \u0000 table.MsoNormalTable \u0000 {mso-style-name:\"Table Normal\"; \u0000 mso-tstyle-rowband-size:0; \u0000 mso-tstyle-colband-size:0; \u0000 mso-style-noshow:yes; \u0000 mso-style-priority:99; \u0000 mso-style-parent:\"\"; \u0000 mso-padding-alt:0in 5.4pt 0in 5.4pt; \u0000 mso-para-margin:0in; \u0000 mso-para-margin-bottom:.0001pt; \u0000 mso-pagination:widow-orphan; \u0000 font-size:12.0pt; \u0000 font-family:\"Cambria\",\"serif\"; \u0000 mso-ascii-font-family:Cambria; \u0000 mso-ascii-theme-font:minor-latin; \u0000 mso-hansi-font-family:Cambria; \u0000 mso-hansi-theme-font:minor-latin;}","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"84 3-4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131642047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Drawing the Line: The Legality of Using Wiretaps to Investigate Insider Trading","authors":"S. Miller","doi":"10.5195/tlp.2013.122","DOIUrl":"https://doi.org/10.5195/tlp.2013.122","url":null,"abstract":"","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"2 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114055676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Jailbroken: Examining the Policy and Legal Implications of iPhone Jailbreaking","authors":"Kevin M. Rogers","doi":"10.5195/TLP.2013.118","DOIUrl":"https://doi.org/10.5195/TLP.2013.118","url":null,"abstract":"","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123703865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Copyright in the Mobile Media Era","authors":"Krysta M. Smith","doi":"10.5195/TLP.2013.115","DOIUrl":"https://doi.org/10.5195/TLP.2013.115","url":null,"abstract":"","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134433992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Failure of State Texting-While-Driving Laws","authors":"Cody J. Harding","doi":"10.5195/TLP.2013.119","DOIUrl":"https://doi.org/10.5195/TLP.2013.119","url":null,"abstract":"","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128841921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Based on an Almost True Story: Providing Real Life Protection to Real Life Characters","authors":"Brandy S. Ringer","doi":"10.5195/TLP.2012.113","DOIUrl":"https://doi.org/10.5195/TLP.2012.113","url":null,"abstract":"","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129409057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Technology, Residuals, and the New Threat to Hollywood Screenwriters","authors":"K. Leary","doi":"10.5195/TLP.2012.112","DOIUrl":"https://doi.org/10.5195/TLP.2012.112","url":null,"abstract":"","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"361 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132306107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Introduction: Law, Technology, and Entertainment in...Pittsburgh?!?","authors":"Steeltown Entertainment","doi":"10.5195/TLP.2012.107","DOIUrl":"https://doi.org/10.5195/TLP.2012.107","url":null,"abstract":"","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121849874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Through A Router Darkly: How New American Copyright Enforcement Initiatives May Hinder Economic Development, Net Neutrality and Creativity","authors":"P. Groh","doi":"10.5195/TLP.2012.110","DOIUrl":"https://doi.org/10.5195/TLP.2012.110","url":null,"abstract":"On November 1, 2012, Russia enacted a law putatively aiming to protect Russian children from pedophiles. This law authorizes deep packet inspection (DPI), a method used for monitoring, filtering and shaping internet traffic, which has heightened concerns among many leading privacy groups. These groups are concerned with how the government will use such an intrusive method in prosecuting child predators. Central to this concern is DPI’s capability to allow the Russian government to peer into any citizens’ unencrypted internet traffic and monitor, copy, or even alter the traffic as it moves to its destination. The unresolved question is whether the government’s use of DPI will be restrained and utilized primarily to thwart child predators, or whether it will be expanded to lay the groundwork for a new era of national censorship. Although the United States has not yet adopted similar tactics in regulating its citizens’ internet use, Russia’s implementation of the new DPI monitoring and filtering system will provide an educational opportunity for both privacy advocates and policymakers.","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122025576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}