Journal articles on the topic 'Law Privacy'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Law Privacy.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Grijpink, Jan. "Privacy Law." Computer Law & Security Review 17, no. 3 (May 2001): 154–60. http://dx.doi.org/10.1016/s0267-3649(01)00304-1.
Full textCuijpers, Colette. "A Private Law Approach to Privacy; Mandatory Law Obliged?" SCRIPT-ed 4, no. 4 (December 15, 2007): 304–18. http://dx.doi.org/10.2966/scrip.040407.304.
Full textCornock, Marc. "Privacy Law HandbookPrivacy Law Handbook." Nursing Standard 25, no. 40 (June 8, 2011): 30. http://dx.doi.org/10.7748/ns2011.06.25.40.30.b1216.
Full textDavies, Simon. "Privacy law — Australia." Computer Law & Security Review 13, no. 6 (November 1997): 429–30. http://dx.doi.org/10.1016/s0267-3649(97)89793-2.
Full textMcDonagh, Maeve. "Australian privacy law." Computer Law & Security Review 6, no. 5 (January 1991): 13–17. http://dx.doi.org/10.1016/0267-3649(91)90149-p.
Full textCollins, Hugh. "The Decline of Privacy in Private Law." Journal of Law and Society 14, no. 1 (1987): 91. http://dx.doi.org/10.2307/1410299.
Full textCohen, Julie E. "Turning Privacy Inside Out." Theoretical Inquiries in Law 20, no. 1 (March 16, 2019): 1–31. http://dx.doi.org/10.1515/til-2019-0002.
Full textLemley, Mark. "Privacy, Property, and Publicity." Michigan Law Review, no. 117.6 (2019): 1153. http://dx.doi.org/10.36644/mlr.117.6.privacy.
Full textSerwin, Andrew. "Privacy 3.0-The Principle of Proportionality." University of Michigan Journal of Law Reform, no. 42.4 (2009): 869. http://dx.doi.org/10.36646/mjlr.42.4.privacy.
Full textAustin, Lisa M. "Privacy and Private Law: The Dilemma of Justification." McGill Law Journal 55, no. 2 (December 16, 2010): 165–210. http://dx.doi.org/10.7202/045084ar.
Full textRen, Raphael, Tiong Guan Saw, and Sujata Balan. "IS THERE A PRIVATE RIGHT TO PRIVACY IN MALAYSIA?" IIUM Law Journal 30, no. 1 (July 7, 2022): 1–32. http://dx.doi.org/10.31436/iiumlj.v30i1.648.
Full textMoreham, N. A. "BEYOND INFORMATION: PHYSICAL PRIVACY IN ENGLISH LAW." Cambridge Law Journal 73, no. 2 (July 2014): 350–77. http://dx.doi.org/10.1017/s0008197314000427.
Full textKeenan, Rachel. "Image Rights and Privacy Law – A Summary of the UK Position." Business Law Review 30, Issue 5 (May 1, 2009): 110–15. http://dx.doi.org/10.54648/bula2009024.
Full textLippert, Randy K., and Kevin Walby. "Governing Through Privacy: Authoritarian Liberalism, Law, and Privacy Knowledge." Law, Culture and the Humanities 12, no. 2 (March 26, 2013): 329–52. http://dx.doi.org/10.1177/1743872113478530.
Full textGilmore, Leigh. "Reassembling Privacy: Vernacular Privacy in Law andThe Scarlet Letter." Law & Literature 27, no. 3 (May 18, 2015): 295–312. http://dx.doi.org/10.1080/1535685x.2015.1024921.
Full textBennett, Thomas D. C. "Triangulating Intrusion in Privacy Law." Oxford Journal of Legal Studies 39, no. 4 (2019): 751–78. http://dx.doi.org/10.1093/ojls/gqz024.
Full textMoore, Adam D. "Privacy, Speech, and the Law." Journal of Information Ethics 22, no. 1 (April 1, 2013): 21–43. http://dx.doi.org/10.3172/jie.22.1.21.
Full textSkinner-Thompson, Scott. "Introduction: Privacy Studies, Surveillance Law." Surveillance & Society 20, no. 3 (September 5, 2022): 294–96. http://dx.doi.org/10.24908/ss.v20i3.15774.
Full textLeib, Jennifer R., Elizabeth Hoodfar, Joy Larsen Haidle, and Rebecca Nagy. "The new genetic privacy law." Community Oncology 5, no. 6 (June 2008): 351–54. http://dx.doi.org/10.1016/s1548-5315(11)70468-5.
Full textSaxby, S. "History of US Privacy Law." Computer Law & Security Review 21, no. 3 (January 2005): 276. http://dx.doi.org/10.1016/j.clsr.2005.01.011.
Full textFuller, Caleb S. "Privacy law as price control." European Journal of Law and Economics 45, no. 2 (July 26, 2017): 225–50. http://dx.doi.org/10.1007/s10657-017-9563-6.
Full textHarader, William H. "Drug testing and privacy law." Government Information Quarterly 5, no. 1 (January 1988): 57–72. http://dx.doi.org/10.1016/0740-624x(88)90049-4.
Full textÁlvarez-Valenzuela, Daniel. "The Constitutional System for the Protection of Privacy in Chilean Law." Global Privacy Law Review 2, Issue 2 (June 1, 2021): 131–40. http://dx.doi.org/10.54648/gplr2021017.
Full textO’Callaghan, Patrick. "False Privacy and Information Games." Journal of European Tort Law 4, no. 3 (November 1, 2013): 282–305. http://dx.doi.org/10.1515/jetl-2013-0019.
Full textKohl, Uta. "THE RIGHT TO BE FORGOTTEN IN DATA PROTECTION LAW AND TWO WESTERN CULTURES OF PRIVACY." International and Comparative Law Quarterly 72, no. 3 (July 2023): 737–69. http://dx.doi.org/10.1017/s0020589323000258.
Full textMo, Yun Ching Jojo, and A. K. C. Koo. "A Bolder Step towards Privacy Protection in Hong Kong: A Statutory Cause of Action." Asian Journal of Comparative Law 9 (January 1, 2014): 345–80. http://dx.doi.org/10.1017/s2194607800001034.
Full textBlume, Peter. "Danish Data Protection with Respect to Law Libraries." International Journal of Legal Information 31, no. 3 (2003): 452–61. http://dx.doi.org/10.1017/s0731126500003735.
Full textSembiring, Patricia Edina, Ahmad M. Ramli, and Laina Rafianti. "IMPLEMENTASI DESAIN PRIVASI SEBAGAI PELINDUNGAN PRIVASI ATAS DATA BIOMETRIK." Veritas et Justitia 10, no. 1 (June 29, 2024): 127–52. http://dx.doi.org/10.25123/vej.v10i1.7622.
Full textCulnane, Chris, and Kobi Leins. "Misconceptions in Privacy Protection and Regulation." Law in Context. A Socio-legal Journal 36, no. 2 (April 16, 2020): 1–12. http://dx.doi.org/10.26826/law-in-context.v36i2.110.
Full textPastukhov, Oleksandr. "Leveraging Privacy Torts: A Case for Statutory Damages under European Data Protection Law." Global Privacy Law Review 5, Issue 2 (May 1, 2024): 69–81. http://dx.doi.org/10.54648/gplr2024010.
Full textWang, Yanbing. "Privacy Protection of Public Figures in China—The Case of Yundi Li’s Prostitution." Studies in Law and Justice 2, no. 2 (June 2023): 109–17. http://dx.doi.org/10.56397/slj.2023.06.15.
Full textAshford, Chris, and Mark O'Brien. "Privacy and the public/private divide." Information & Communications Technology Law 17, no. 1 (March 2008): 1–2. http://dx.doi.org/10.1080/13600830801886950.
Full textDecew, Judith W. "Defending the ?private? in constitutional privacy." Journal of Value Inquiry 21, no. 3 (August 1987): 171–84. http://dx.doi.org/10.1007/bf00140359.
Full textHartshorne, John. "The need for an intrusion upon seclusion privacy tort within English law." Common Law World Review 46, no. 4 (November 23, 2017): 287–305. http://dx.doi.org/10.1177/1473779517739798.
Full textDallari, Sueli Gandolfi, Felipe Angel Bocchi Castellaro, and Iara Coelho Zito Guerriero. "Biobanking and Privacy Law in Brazil." Journal of Law, Medicine & Ethics 43, no. 4 (2015): 714–25. http://dx.doi.org/10.1111/jlme.12314.
Full textCapron, Alexander Morgan. "At Law: Privacy: Dead and Gone?" Hastings Center Report 22, no. 1 (January 1992): 43. http://dx.doi.org/10.2307/3562724.
Full textWible, Brad. "Synthetic data, privacy, and the law." Science 364, no. 6438 (April 25, 2019): 348.7–349. http://dx.doi.org/10.1126/science.364.6438.348-g.
Full textLever, Annabelle. "Law and the philosophy of privacy." Contemporary Political Theory 16, no. 3 (August 23, 2016): 402–4. http://dx.doi.org/10.1057/s41296-016-0019-5.
Full textRowlingson, R. R. "Marrying privacy law to information security." Computer Fraud & Security 2006, no. 8 (August 2006): 4–6. http://dx.doi.org/10.1016/s1361-3723(06)70408-0.
Full textHancock, Bill. "US Privacy Law Proposals Cause Concerns." Computers & Security 19, no. 8 (December 2000): 677–78. http://dx.doi.org/10.1016/s0167-4048(00)08015-9.
Full textMeyer, John. "First federal Net privacy law approved." Computers & Security 17, no. 8 (January 1998): 719. http://dx.doi.org/10.1016/s0167-4048(98)90350-9.
Full textHeinlein, Edwin B. "Communications, security, privacy and the law." Computers & Security 13, no. 2 (April 1994): 119–21. http://dx.doi.org/10.1016/0167-4048(94)90058-2.
Full textBoshe, Patricia. "Data privacy law: an international perspective." Information & Communications Technology Law 24, no. 1 (January 2, 2015): 118–20. http://dx.doi.org/10.1080/13600834.2014.996324.
Full textKaminski, Margot. "A recent renaissance in privacy law." Communications of the ACM 63, no. 9 (August 21, 2020): 24–27. http://dx.doi.org/10.1145/3411049.
Full textEnqvist, Lena, and Yana Litins'ka. "Employee Health Data in European Law." Nordic Journal of European Law 5, no. 1 (August 31, 2022): 40–66. http://dx.doi.org/10.36969/njel.v5i1.24498.
Full textPerry, John. "Natural Privacy." Washington University Review of Philosophy 3 (2023): 83–92. http://dx.doi.org/10.5840/wurop202337.
Full textShchukina, Tatiana. "Canada's Digital Charter becomes law." Russia and America in the 21st Century, no. 6 (2022): 0. http://dx.doi.org/10.18254/s207054760023515-3.
Full textDai, Xin. "Privacy, reputation, and control: public figure privacy law in contemporary China." Peking University Law Journal 9, no. 2 (July 3, 2021): 143–86. http://dx.doi.org/10.1080/20517483.2021.2020497.
Full textHughes, Kirsty. "A Behavioural Understanding of Privacy and its Implications for Privacy Law." Modern Law Review 75, no. 5 (September 2012): 806–36. http://dx.doi.org/10.1111/j.1468-2230.2012.00925.x.
Full textCalo, Ryan. "Privacy Law’s Indeterminacy." Theoretical Inquiries in Law 20, no. 1 (March 16, 2019): 33–52. http://dx.doi.org/10.1515/til-2019-0001.
Full text