Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Law

Journal

1996

Articles 1 - 6 of 6

Full-Text Articles in Entire DC Network

Allocating The Risk Of Loss For Bank Card Fraud On The Internet, 15 J. Marshall J. Computer & Info. L. 39 (1996), Randy Gainer Jan 1996

Allocating The Risk Of Loss For Bank Card Fraud On The Internet, 15 J. Marshall J. Computer & Info. L. 39 (1996), Randy Gainer

UIC John Marshall Journal of Information Technology & Privacy Law

The Internet presents many opportunities for the user to purchase merchandise using a credit card or bank card. However, until planned security measures for the Internet are proven to be effective, a question is raised: Who will pay for the loss if a criminal diverts the bank card data used by a consumer over the Internet? Two federal statutes generally prevent banks and credit card associations from charging consumers for losses incurred by fraudulent use of bank cards. The 1970 amendment to the Federal Consumer Protection Act (FCPA) and the Electronic Funds Transfer Act of 1978 (EFTA) contain provisions that …


Don't Shoot The Messenger: Protecting Speech On Editorially Controlled Bulletin Board Services By Applying Sullivan Malice, 14 J. Marshall J. Computer & Info. L. 347 (1996), Iris Ferosie Jan 1996

Don't Shoot The Messenger: Protecting Speech On Editorially Controlled Bulletin Board Services By Applying Sullivan Malice, 14 J. Marshall J. Computer & Info. L. 347 (1996), Iris Ferosie

UIC John Marshall Journal of Information Technology & Privacy Law

Courts must determine the standard of liability for Internet Service Providers (ISPs) that proactively edit their Bulletin Board Systems (BBSs) for defamatory content. ISPs are computer services that provide data processing and communication services to customers - individual computer users who subscribe to the ISP's service. BBSs are computer programs that act like a traditional bulletin board. They are centrally located on the ISP's computers, and people who subscribe to the ISP can access that bulletin board to publish (or "post") messages on the board, and read and respond to other people's messages. Some ISPs allow people to post messages …


Commerce On The Net: Surfing Through Cyberspace Without Getting Wet, 14 J. Marshall J. Computer & Info. L. 247 (1996), Diana J. P. Mckenzie Jan 1996

Commerce On The Net: Surfing Through Cyberspace Without Getting Wet, 14 J. Marshall J. Computer & Info. L. 247 (1996), Diana J. P. Mckenzie

UIC John Marshall Journal of Information Technology & Privacy Law

It's business as usual: parties transacting business with paper, pens, phone calls, faxes, etc. With the convenience of computers in the market places, however, the business landscape is no longer the same: no more paper or less face-to-face contacts. Cyberspace provides an environment that obliterate physical time and space, but it also brings along risk fertile to create liabilities. In this article, the author attempts to address areas such as advertising; selling of money or goods; direct distributing of digitized products; contracting; intellectual property rights; common law torts and right to privacy on the Internet. At the end, the author …


Cryptography And The First Amendment: The Right To Be Unheard, 14 J. Marshall J. Computer & Info. L. 325 (1996), Phillip E. Reiman Jan 1996

Cryptography And The First Amendment: The Right To Be Unheard, 14 J. Marshall J. Computer & Info. L. 325 (1996), Phillip E. Reiman

UIC John Marshall Journal of Information Technology & Privacy Law

The author proposes that current technology has made cryptography an important element in maintaining a society's right to free speech. Cryptography is the process of using secret codes to protect information. This protection increases society's privacy because cryptographers can limit the amount of information that is seen by others. The world is becoming a place where there is virtually no privacy. Everyone is open to surveillance through the Internet, use of a credit card or being filmed on a security camera. Cryptography is a means in which a person can protect his privacy. Through this protection, the author states that …


Learning To Love "The Ultimate Peripheral" - Virtual Vices Like "Cyberprostitution" Suggest A New Paradigm To Regulate Online Expression, 14 J. Marshall J. Computer & Info. L. 779 (1996), D. James Nahikian Jan 1996

Learning To Love "The Ultimate Peripheral" - Virtual Vices Like "Cyberprostitution" Suggest A New Paradigm To Regulate Online Expression, 14 J. Marshall J. Computer & Info. L. 779 (1996), D. James Nahikian

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Foreword: Reflections On Computer Technology And The Law, 15 J. Marshall J. Computer & Info. L. 1 (1996), George B. Trubow Jan 1996

Foreword: Reflections On Computer Technology And The Law, 15 J. Marshall J. Computer & Info. L. 1 (1996), George B. Trubow

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.