Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 15 of 15

Full-Text Articles in Entire DC Network

Technology And Client Community Access To Legal Services - Suggestive Scenarios On Community Legal Education, Intake And Referral And Pro Se, Michael Genz Sep 2000

Technology And Client Community Access To Legal Services - Suggestive Scenarios On Community Legal Education, Intake And Referral And Pro Se, Michael Genz

University of the District of Columbia Law Review

The papers prepared for the Conference provide a broad perspective on emerging technologies and the potential they offer Legal Services. This paper, building on those perspectives, first offers a real world scenario showing how these technologies might be deployed to maximize client and community access to Legal Services resources. For each scenario, the paper then lays out what needs to be in place - technologically, managerially and institutionally, for the scenario to be made real.


New Technologies And Appellate Practice, Philip A. Talmadge Jul 2000

New Technologies And Appellate Practice, Philip A. Talmadge

The Journal of Appellate Practice and Process

Technology can help enhance appellate practices. In particular, technology can improve appellate courts’: (1) electronic filing and argument of appellate cases; (2) digital maintenance of the record; (3) briefs; (4) dissemination of opinions; and (5) record storage.


Cd-Rom Briefs: Are We There Yet?, Marilyn Devin Jul 2000

Cd-Rom Briefs: Are We There Yet?, Marilyn Devin

The Journal of Appellate Practice and Process

Three years after the first CD-ROM brief was accepted, there is debate on acceptance as a regular practice. Issues include what the legal profession and the courts have done about adopting CD-ROM briefs, what obstacles are being encountered, and how those obstacles are being dealt with. Both views are examined along with the circumstances in which a CD-ROM brief is likely to be accepted favorably by a court.


The Case For A U.S. Privacy Commissioner: A Canadian Commissioner’S Perspective, 19 J. Marshall J. Computer & Info. L. 1 (2000), William S. Challis, Ann Cavoukian Jan 2000

The Case For A U.S. Privacy Commissioner: A Canadian Commissioner’S Perspective, 19 J. Marshall J. Computer & Info. L. 1 (2000), William S. Challis, Ann Cavoukian

UIC John Marshall Journal of Information Technology & Privacy Law

The demands of social democratic government, the growth of electronic commerce, and the advance of technology have fueled the debate over internet privacy. Technology offers unprecedented opportunities but can also become tools of abuse. Debate in the United States centers around the conflicting interests of industry self-control versus government regulation. Technological and market-based solutions are ineffective because they lead to inadequate and inconsistent protection. Many user-driven privacy choices can impede the growth of consumer trust. Voluntarily adopted privacy policies are either extremely limited or easily circumvented with tracking technology that allows no consumer control over the collection of their personal …


The De Facto Federal Privacy Commission, 19 J. Marshall J. Computer & Info. L. 109 (2000), Steven Hetcher Jan 2000

The De Facto Federal Privacy Commission, 19 J. Marshall J. Computer & Info. L. 109 (2000), Steven Hetcher

UIC John Marshall Journal of Information Technology & Privacy Law

The United States is well on its way to having a federal agency that regulates online privacy. In the last five years, the Federal Trade Commission (FTC) has assumed increasing jurisdiction over online privacy. The FTC’s true intent to regulate online privacy became evident when it recommended that Congress enact legislation to strengthen its growing power to regulate internet privacy. The FTC uses threats of administrative enforcement actions to guide industry self-regulation through the use of unfair trade practices actions. The FTC acts because consumers feel entitled to data privacy and promotes Web site privacy practices through education and attempts …


Toward An Architecture Of Privacy For The Virtual World, 19 J. Marshall J. Computer & Info. L. 151 (2000), Paul Toscano Jan 2000

Toward An Architecture Of Privacy For The Virtual World, 19 J. Marshall J. Computer & Info. L. 151 (2000), Paul Toscano

UIC John Marshall Journal of Information Technology & Privacy Law

The internet is expanding. As users become more computer literate, the world becomes more reliant on the virtual one. The internet and wireless communications have fostered global commerce on an unprecedented scale. Because it lacks boundaries, cyberspace is difficult for regulate with traditional methods of governance. Security, privacy, and integrity of information are thus available to only a minority of users in restricted communities. Outside, users are on their own or must rely on the partial solutions available to them. To date, there is no consensus on what security, privacy, and integrity of information really mean. The internet needs a …


Database Nation: Does Information Technology Of The 21st Century Pose A Daunting Threat To Personal Privacy In America, 19 J. Marshall J. Computer & Info. L. 197 (2000), Robert S. Gurwin, Nicole D. Milos Jan 2000

Database Nation: Does Information Technology Of The 21st Century Pose A Daunting Threat To Personal Privacy In America, 19 J. Marshall J. Computer & Info. L. 197 (2000), Robert S. Gurwin, Nicole D. Milos

UIC John Marshall Journal of Information Technology & Privacy Law

In this book review of Simon Garfinkel's "Database Nation: The death of privacy in the 21st century," the author echoes George Orwell's prophetic vision of a totalitarian government prying on citizens' privacy in "1984." However, Database Nation presents a future where privacy has become a costly commodity: individuals fight dearly to hold such privacy from prying eyes. From the history of information age to advocating privacy protection legislations, the author discusses how Garfinkel pieces together the forming of the database nation. From health care providers to credit bureaus and from satellite surveillance to consumer purchasing habits, Garfinkel urges readers to …


The Establishment Of A U.S. Federal Data Protection Agency To Define And Regulate Internet Privacy And Its Impact On Us-China Relations: Marco Polo, Where Are You?, 19 J. Marshall J. Computer & Info. L. 169 (2000), Omar Saleem Jan 2000

The Establishment Of A U.S. Federal Data Protection Agency To Define And Regulate Internet Privacy And Its Impact On Us-China Relations: Marco Polo, Where Are You?, 19 J. Marshall J. Computer & Info. L. 169 (2000), Omar Saleem

UIC John Marshall Journal of Information Technology & Privacy Law

The desire to explore new worlds and to exchange ideas and goods should be the impetus behind the Internet, the virtual Silk Road connecting the east and west. The Chinese government considers the Internet a vital part of its modernization plans. There are millions of Chinese citizens online and that number continues to grow. China’s policy towards online privacy regulation will have a significant impact on the rest of the world. Technology has outpaced law in the arena of privacy regulation. Some scholars believe the Internet should be unregulated. Others fear that commerce will overrun privacy concerns. The sheer volume …


Halve The Baby: An Obvious Solution To The Troubling Use Of Trademarks As Metatags, 18 J. Marshall J. Computer & Info. L. 643 (2000), Dan Mccuaig Jan 2000

Halve The Baby: An Obvious Solution To The Troubling Use Of Trademarks As Metatags, 18 J. Marshall J. Computer & Info. L. 643 (2000), Dan Mccuaig

UIC John Marshall Journal of Information Technology & Privacy Law

In this article, the author proposes a solution to decide when metatags of other companies' trademarked terms should be allowed. First the author begins by describing the nature and function of metatags. A brief discussion of the relevant aspects of trademark law as they apply to trademark-metatags are fully investigated. The author then provides two significant cases in this field to support his contention. Following this discussion, the author proposes a solution to the use of trademark-metatags. Finally, the author ends this article with a discussion of anticipated market reactions to the "trademarks" metatag.


In Congress Electric: The Need For On-Line Parliamentary Procedure, 18 J. Marshall J. Computer & Info. L. 963 (2000), Phil Reiman Jan 2000

In Congress Electric: The Need For On-Line Parliamentary Procedure, 18 J. Marshall J. Computer & Info. L. 963 (2000), Phil Reiman

UIC John Marshall Journal of Information Technology & Privacy Law

Building a set of rules for operating an ordered, effective online association is the first step toward building virtual communities and the first step toward a democratic "e-government." Disputes online are not rare; they are just rarely resolved. Currently, online forums are watched over by a moderator, who is charged with keeping the discussion on track, and to keeping the debate from getting personal. Almost everyone who has been in an online discussion is aware of "Netiquette", the informal rules that govern chat room conversations. Everyone is equally aware that these rules are often ignored. While the exchange of ideas …


The Postman Always Rings 4,000 Times: New Approaches To Curb Spam, 18 J. Marshall J. Computer & Info. L. 915 (2000), Credence E. Fogo Jan 2000

The Postman Always Rings 4,000 Times: New Approaches To Curb Spam, 18 J. Marshall J. Computer & Info. L. 915 (2000), Credence E. Fogo

UIC John Marshall Journal of Information Technology & Privacy Law

Before 1994, the average Internet user received little unsolicited commercial email, or "spam." But that all changed in April 1994, when enterprising Arizona lawyers Laurence Canter and Martha Siegel sent spam advertising their immigration law "services" to approximately 8,000 Usenet newsgroups reaching approximately 20 million people. It inspired irate Usenet users to flame Canter and Siegel in such great volume that the attorneys' ISP's computer crashed. The computer overloads Canter and Siegel's stunt caused also completely knocked out New Zealand's Internet access. But the ads must have worked because despite the fallout, Cander and Siegel persisted in their spam ad …


Privacy On Federal Civilian Computer Networks: A Fourth Amendment Analysis Of The Federal Intrusion Detection Network, 18 J. Marshall J. Computer & Info. L. 1049 (2000), David Hueneman Jan 2000

Privacy On Federal Civilian Computer Networks: A Fourth Amendment Analysis Of The Federal Intrusion Detection Network, 18 J. Marshall J. Computer & Info. L. 1049 (2000), David Hueneman

UIC John Marshall Journal of Information Technology & Privacy Law

This comment explores the relationship between the privacy of the users of the federal non-public civilian computer networks and the government's power to monitor such networks. The background explains what a network is, how cyber-terrorists can greatly damage a system, what the government is planning to do about the problem, and the constitutional protections involved. The analysis moves on to examine the Fourth Amendment and the Electronic Communications Privacy Act and considers their respective effects on the implementation of FIDNet -- a proposed government system designed to protect America's infrastructure from cyber- attack. The FIDNet plan calls for the creation …


Big Brother Is At Your Back Door: An Examination Of The Effect Of Encryption Regulation On Privacy And Crime, 18 J. Marshall J. Computer & Info. L. 825 (2000), Hillary Victor Jan 2000

Big Brother Is At Your Back Door: An Examination Of The Effect Of Encryption Regulation On Privacy And Crime, 18 J. Marshall J. Computer & Info. L. 825 (2000), Hillary Victor

UIC John Marshall Journal of Information Technology & Privacy Law

This article compares the need of individuals for privacy and the U.S. government's desire for encryption regulation. The impact that CESA on cyberspace security and crime are fully discussed. Furthermore, a brief background on the advantages and disadvantages of encryption are investigated. A history of legislative effort to provide decryption tools are examined and outlined. Next, the comment provides an analysis of CESA, its legal implications and issues involving its effectiveness are discussed. A solution proposed by the author to redraft and amend CESA provides individuals with privacy protection.


Invasion Of The Information Snatchers: Creating Liability For Corporations With Vulnerable Computer Networks, 18 J. Marshall J. Computer & Info. L. 1019 (2000), Sarah Faulkner Jan 2000

Invasion Of The Information Snatchers: Creating Liability For Corporations With Vulnerable Computer Networks, 18 J. Marshall J. Computer & Info. L. 1019 (2000), Sarah Faulkner

UIC John Marshall Journal of Information Technology & Privacy Law

Computer hackers are a serious threat to businesses and their customers, particularly if those businesses operate complex computer networks or operate as on-line businesses. However, now that corporate telecommunication networks are becoming more sophisticated, a company's phone system may also be susceptible to invasion. These telephonic hackers, called phone phreaks (and telecom hacking itself is known as phreaking), can cause large monetary losses as well. The question of who is liable for these losses, losses that are specifically caused by illegal activity, is the subject of this comment. This comment addresses the issue of liability for monetary losses in the …


Lawyers Who Lie On-Line: How Should The Legal Profession Respond To Ebay Ethics, 18 J. Marshall J. Computer & Info. L. 875 (2000), Mark E. Wojcik Jan 2000

Lawyers Who Lie On-Line: How Should The Legal Profession Respond To Ebay Ethics, 18 J. Marshall J. Computer & Info. L. 875 (2000), Mark E. Wojcik

UIC John Marshall Journal of Information Technology & Privacy Law

A recent scandal erupted in the press when a painting that was offered for sale on an Internet auction site was believed to be a lost contemporary masterpiece. The seller appeared to be a married man who was cleaning junk out of his garage, including a painting that his wife would not let him hang in the house. A bidding frenzy drove the price from the opening bid of 25 cents to more than $135,000 from a buyer in the Netherlands. After the sale was finished (it was ended by EBay when they learned he bid on the painting himself …