Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Federal Rules of Civil Procedure (2)
- AOL (1)
- Abuse Act (1)
- Anti-Phishing Act of 2005 (1)
- Barrett (1)
-
- CDA (1)
- Communications Decency Act (1)
- Computer Crimes Act (1)
- Computer Fraud (1)
- Concord Boat Corp. v. Brunswick Corp. (1)
- E-Commerce (1)
- FDIC (1)
- Federal Deposit Insurance Corp (1)
- Forrest v. Verizon Commications (1)
- GFTM Inc. v. Wal-Mart Stores (1)
- Hagemeyer North America Inc. v. Gateway Data Science Corp. (1)
- IBM (1)
- In re DoubleClick (1)
- In re Pharmatrak Inc. Privacy Litigation (1)
- In re: Sealed Case (1)
- International Business Machines (1)
- International Digital Systems Corporation v. Digital Equipment Corporation (1)
- Keir v. UnumProvident Corp. (1)
- Landmark Legal Foundation v. Environmental Protection Agency (1)
- Legal Issues of the Online Retailer in Virginia (1)
- Linnen v. A.H. Robins Co. (1)
- OPENTV v. Liberate Technologies (1)
- Ramey v. Darkside Productions (1)
- Ransamerica Computer v. International Business Machines (1)
- SCA (1)
Articles 1 - 6 of 6
Full-Text Articles in Law
A Duty Everlasting: The Perils Of Applying Traditional Doctrines Of Spoliation To Electronic Discovery, Michael R. Nelson, Mark H. Rosenberg
A Duty Everlasting: The Perils Of Applying Traditional Doctrines Of Spoliation To Electronic Discovery, Michael R. Nelson, Mark H. Rosenberg
Richmond Journal of Law & Technology
Amendments to the Federal Rules of Civil Procedure regarding electronic discovery are expected to take effect on December 1, 2006. These amendments are designed to alleviate the burden, expense and uncertainty that has resulted from the application of traditional discovery principles in the electronic age. These principles worked well in an era where discovery was primarily limited to the production of paper documentation, but have proved unworkable when applied to the discovery of electronic data, particularly in the “corporate world,” where even the most routine business discussions are captured in electronic format.5
Bigger Phish To Fry: Californias Anti- Phishing Statute And Its Potential Imposition Of Secondary Liability On Internet Service Providers, Camille Calman
Bigger Phish To Fry: Californias Anti- Phishing Statute And Its Potential Imposition Of Secondary Liability On Internet Service Providers, Camille Calman
Richmond Journal of Law & Technology
The incidence of phishing, a form of internet fraud, has increased dramatically since 2003. Identity thieves searching for vulnerabilities in internet security have realized that customers are the weak link. Using mass e-mailings and websites purporting to be those of well-known and trusted corporations, “phishers” trick customers into revealing personal and financial information.
Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Jon S. Player
Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Jon S. Player
Richmond Journal of Law & Technology
The Richmond Journal of Law and Technology is proud to present its second issue of the 2006–2007 academic school year. The Journal staff has worked diligently during the first half of the year to produce an exceptional issue.
Waiving The Privilege In A Storm Of Data: An Argument For Uniformity And Rationality In Dealing With The Inadvertent Production Of Privileged Materials In The Age Of Electronically Stored Information, Dennis R. Kiker
Richmond Journal of Law & Technology
At the point where one of the most venerable principles of common law and the reality of modern information management collide, even the most diligent attorneys may become victims of the resulting fallout.
Teaching A Man To Fish: Why National Legislation Anchored In Notice And Consent Provisions Is The Most Effective Solution To The Spyware Problem, M. Angela Buenaventura
Teaching A Man To Fish: Why National Legislation Anchored In Notice And Consent Provisions Is The Most Effective Solution To The Spyware Problem, M. Angela Buenaventura
Richmond Journal of Law & Technology
The term “spyware” encompasses a wide range of software designed to intercept or take partial control of a computer. Spyware slows down computers and forces computer users to expend resources on repair and installation of protective software. Consumers also face the danger that personal information gathered through spyware will be misused. Thus, most people agree that spyware is an annoying and costly problem. However, there is no consensus on the best way to solve the spyware problem. This article examines the methods currently being used to battle spyware, as well as proposed national spyware legislation. The article outlines the various …
Shifting Burdens And Concealing Electronic Evidence: Discovery In The Digital Era, Rebecca Rockwood
Shifting Burdens And Concealing Electronic Evidence: Discovery In The Digital Era, Rebecca Rockwood
Richmond Journal of Law & Technology
In the twenty-first century, persons involved in the legal profession will be forced to confront technological issues. Computers and technology have pervaded every aspect of society, and the legal system is no exception. The discovery process is a dramatic example of how lawyers and courts strain to keep up with technological advances. Traditional discovery practices have been severely overhauled as electronic information becomes increasingly prevalent. What was once a simple discovery request can now become an overwhelming task, as defendants must wade through a plethora of electronic documents in an attempt to comply with the court’s discovery orders.