Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 55

Full-Text Articles in Law

Policing Online Pharmacies: Bioterrorism Meets The War On Drugs, Mark Sweet Nov 2001

Policing Online Pharmacies: Bioterrorism Meets The War On Drugs, Mark Sweet

Duke Law & Technology Review

In light of the recent terrorists attacks and the increasing threat of bioterrorism, many U.S. citizens have turned to the Internet in an attempt to gather the supplies needed to protect them and their loved ones. Central to the effort is the increased purchasing of prescription drugs over the Internet. This iBrief explores the benefits and risks to consumers from buying drugs online, and examines recent initiatives to police the online pharmacy industry.


Liberty For Security, Morgan Streetman Oct 2001

Liberty For Security, Morgan Streetman

Duke Law & Technology Review

On 11 September 2001, we collectively endured the worst tragedy to touch American soil since the Civil War. In the wake of this horrible event, a national hysteria erupted. People are anxious to restore the lost security; but at what cost? Many Americans seem not to care about the costs, and national polls show that now, more than ever, Americans are willing to trade their precious civil liberties in an attempt to restore security. As the ACLU has stated these are difficult days. Not only are they difficult, they will define the future of America. This iBrief explores the reactions …


Protecting Against International Infringements In The Digital Age Using United States Copyright Law: A Critical Analysis Of The Current State Of The Law, Brandon Dalling Sep 2001

Protecting Against International Infringements In The Digital Age Using United States Copyright Law: A Critical Analysis Of The Current State Of The Law, Brandon Dalling

BYU Law Review

No abstract provided.


Carnivore: Will It Devour Your Privacy?, Joseph Goodman, Angela Murphy, Morgan Streetman, Mark Sweet Aug 2001

Carnivore: Will It Devour Your Privacy?, Joseph Goodman, Angela Murphy, Morgan Streetman, Mark Sweet

Duke Law & Technology Review

Perhaps you have written an e-mail that looks something like this:


Virtual Las Vegas: Regulate Or Prohibit?, Cara Franklin Jun 2001

Virtual Las Vegas: Regulate Or Prohibit?, Cara Franklin

Duke Law & Technology Review

With online gambling becoming increasingly accessible and popular, state and federal politicians are asking themselves how to make the prohibition on online gambling effective. Nevertheless, questions still linger as to whether outright prohibition is truly the right answer.


Can You Yahoo!? The Internet’S Digital Fences, Brendon Fowler, Cara Franklin, Bob Hyde Mar 2001

Can You Yahoo!? The Internet’S Digital Fences, Brendon Fowler, Cara Franklin, Bob Hyde

Duke Law & Technology Review

The Yahoo! auction case illustrates the problems inherent in the lack of a common Internet jurisdictional structure. This iBrief argues that the application of local law allowed France to win a victory against domestic hate groups, but dealt a blow to free speech everywhere.


Internet Securities Fraud: Old Trick, New Medium, Brendon Fowler, Cara Franklin, Robert Hyde Feb 2001

Internet Securities Fraud: Old Trick, New Medium, Brendon Fowler, Cara Franklin, Robert Hyde

Duke Law & Technology Review

Billions of securities are traded every day in public and private markets around the world. This practice is hundreds of years old and as long as securities have been traded, someone has tried to defraud the system to make a quick buck. With the advent of the Internet, new securities fraud schemes have appeared.


An Overview Of The Virginia Ucita, Carlyle C. Ring Jr. Jan 2001

An Overview Of The Virginia Ucita, Carlyle C. Ring Jr.

Richmond Journal of Law & Technology

Virginia has taken a strong and important leadership in establishing rules for the Information Highway through the Joint Committee on Technology and Science (JCOTS) and Delegate Joe T. May. Without the Uniform Computer Information Transactions Act (UCITA) no established rules exist in common law for the Information Highway, which means that each judge must create the rules in each case as it arises. Every judge will make his own rules for the particular case. This results in great inconsistency and uncertainty adversely affecting the realization of the full potential of the Information Age economy. Governor Gilmore states: In 2000, Virginia …


Remarks On Technology Growth In Virginia: How Ucita Will Help, Terry Riley Jan 2001

Remarks On Technology Growth In Virginia: How Ucita Will Help, Terry Riley

Richmond Journal of Law & Technology

I'm Terry Riley from the Hampton Roads Technology Council, and technology councils represent business. But predominantly we represent small business, and predominantly we represent users of software, not developers and sellers of software. In the case of my own technology council down [in the] southeastern part of the state, 85 percent of our members have 25 or fewer employees. Less than 5 percent of our members are developers, sellers, or licensors of software. So to a very substantial extent my views and my representations of the interests of my membership have to do with their concerns or their rights as …


State Cybercrime Legislation In The United States Of America: A Survey, Susan W. Brenner Jan 2001

State Cybercrime Legislation In The United States Of America: A Survey, Susan W. Brenner

Richmond Journal of Law & Technology

In the United States, cybercrimes are the focus of legislation adopted at both the state and federal levels. The U.S. Constitution allocates lawmaking authority between the two levels according to certain principles, one of which is that even when federal jurisdiction to legislate exists, federal legislation is appropriate only when federal intervention is required. And while federal legislative authority can pre-empt the states' ability to legislate in a given area, it rarely does, so it is not unusual for federal criminal laws to overlap with state prohibitions that address essentially the same issues.


United States V. Keystone Sanitation Company: E-Mail And The Attorney-Client Privilege, Karen M. Coon Jan 2001

United States V. Keystone Sanitation Company: E-Mail And The Attorney-Client Privilege, Karen M. Coon

Richmond Journal of Law & Technology

The rapid growth and sophistication of technology have changed the way people communicate. E-mail and the Internet have begun to affect the way attorneys communicate with their clients. E-mail is fast and convenient, but it is not without risks. The risk of illegal interception and the risk of inadvertent disclosure are serious issues that attorneys need to be aware of and try to prevent so that the attorney-client privilege is protected as much as possible. Although communicating with a client by e-mail may be risky, the risks posed by e-mail are no different from those posed by communicating by postal …


Internet Jurisdiction Today, Adria Allen Jan 2001

Internet Jurisdiction Today, Adria Allen

Northwestern Journal of International Law & Business

This paper will use the Yahoo case to illustrate the unique jurisdictional dilemma posed by the Internet as countries try to enforce their laws in an era when laws may be broken, through the use of the Internet, from other countries with conflicting laws.' Part I of this paper will address the Yahoo case and its importance to Internet jurisdiction. Part II will explore traditional jurisdiction and apply it to the Yahoo case. Part III will identify twopotential theories of Internet jurisdiction and investigate whether they are feasible solutions to the problem posed by the Yahoo case. Part IV will …


Self-Prescribing Medication: Regulating Prescription Drug Sales On The Internet, 20 J. Marshall J. Computer & Info. L. 57 (2001), Kristin Yoo Jan 2001

Self-Prescribing Medication: Regulating Prescription Drug Sales On The Internet, 20 J. Marshall J. Computer & Info. L. 57 (2001), Kristin Yoo

UIC John Marshall Journal of Information Technology & Privacy Law

"Online pharmacies, your friendly neighborhood drugstores." The Internet is not only a great telecommunication medium but also a low-cost and convenient commercial marketplace. It is no exception that online pharmacies flourished as a result, but the consequences of such development pose grave danger to the public and great challenges to regulations. The author discusses the benefits and risk of online pharmacies, the different types of online pharmacies, state governments' involvement in regulating online prescriptions and federal involvements. Despite both state and federal legislations and regulations, proliferation of online pharmacies, established inside and outside of the US, proves to be a …


2001 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 20 J. Marshall J. Computer & Info. L. 91 (2001), Ryan Alexander, Robert S. Gurwin, Dominick Lanzito, Nicole D. Milos, Bridget O'Neill Jan 2001

2001 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 20 J. Marshall J. Computer & Info. L. 91 (2001), Ryan Alexander, Robert S. Gurwin, Dominick Lanzito, Nicole D. Milos, Bridget O'Neill

UIC John Marshall Journal of Information Technology & Privacy Law

In this bench memo, the Supreme Court of the state of Marshall is asked to decide whether the actions of defendant, Marshall Manatees, evidence a theory of false light invasion of privacy as defined by the Restatement (Second) of Torts and whether defendant's actions of comparing the digital photographic images collected at the Marshall Center to their database and ultimately posting plaintiff's photo on its billboard constituted an actionable claim for misappropriation. Plaintiff, Allen Sanders, attended a professional basketball game where the Marshall Manatees were hosting an opposing team at the Marshall Center. He purchased the ticket online and received …


Consequential Damages Exclusions Under Ucita, 19 J. Marshall J. Computer & Info. L. 295 (2001), Douglas E. Phillips Jan 2001

Consequential Damages Exclusions Under Ucita, 19 J. Marshall J. Computer & Info. L. 295 (2001), Douglas E. Phillips

UIC John Marshall Journal of Information Technology & Privacy Law

The Uniform Computer Information Transactions Act ("UCITA") elicits both love and hate, but decision time is here. Two states have enacted UCITA, several others are considering it, and UCITA choice-of-law clauses are already beginning to appear in software license agreements and other computer information contracts. This article focuses on how UCITA affects a pivotal issue: enforceability of contract clauses that exclude consequential damages. Losses from software development gone awry often far exceed the customer's investment and the developer's return. Under the Uniform Commercial Code, questions remain about the enforceability in certain circumstances of consequential damages exclusions. UCITA answers these questions …


Privacy Protection For Electronic Communications And The “Interception Unauthorized Access” Dilemma, 19 J. Marshall J. Computer & Info. L. 435 (2001), Carlos Perez-Albuerne, Lawrence Friedman Jan 2001

Privacy Protection For Electronic Communications And The “Interception Unauthorized Access” Dilemma, 19 J. Marshall J. Computer & Info. L. 435 (2001), Carlos Perez-Albuerne, Lawrence Friedman

UIC John Marshall Journal of Information Technology & Privacy Law

When Congress foresaw the need for privacy protection for personal and commercial communications, it modified the Wire and Electronic Communications Interception and Interception of Oral Communications Act (“Wire-Tap Act”) through the Electronic Communications Privacy Act (ECPA) and added the Stored Communications Act to broaden the scope of prohibitions against electronic eavesdropping. Some questions, however, are raised by the interpretation of the Wiretap Act’s definition of “intercept” and the Stored Communications Act’s definition of “unauthorized access.” The authors of this comment explore the decisions in the cases Steve Jackson Games v. U.S. and Konop v. Hawaiian Airlines to resolve this question …


Internet Business Method Patents: The Federal Circuit Vacates The Preliminary Injunction In Amazon.Com V. Barnesandnoble.Com, 19 J. Marshall J. Computer & Info. L. 523 (2001), Sue Ann Mota Jan 2001

Internet Business Method Patents: The Federal Circuit Vacates The Preliminary Injunction In Amazon.Com V. Barnesandnoble.Com, 19 J. Marshall J. Computer & Info. L. 523 (2001), Sue Ann Mota

UIC John Marshall Journal of Information Technology & Privacy Law

This article is a casenote that examines the appellate decision in Amazon.com v. Barnesandnoble.com. The first section of the article reviews the history of business method patents and the precedent case of State St. Bank & Trust Co. v. Signature Fin. Group, Inc. The second section looks at the history of the Amazon.com case. The final section examines the major developments in business method patents since the Amazon.com case.


Fair Warning: Preemption And Navigating The Bermuda Triangle Of E-Sign, Ueta, And State Digital Signature Laws, 19 J. Marshall J. Computer & Info. L. 401 (2001), Renard Francois Jan 2001

Fair Warning: Preemption And Navigating The Bermuda Triangle Of E-Sign, Ueta, And State Digital Signature Laws, 19 J. Marshall J. Computer & Info. L. 401 (2001), Renard Francois

UIC John Marshall Journal of Information Technology & Privacy Law

Problems with authenticity, integrity, and repudiation can create a barrier for both individuals and businesses using the Internet for transactions and negotiations. To help address these issues, the federal government enacted E-Sign. This statute protects consumers and ensures no signature will be denied legal effect. E-Sign is sometimes in conflict with state adopted statute, UETA. E-Sign has preemption provisions that are inconsistent with the goals of creating legal uniformity. This comment suggests amending E-Sign so that it is clear that any modification to UETA will cause the state’s version of UETA to be completely preempted.


Cyberslapp Suits And John Doe Subpoenas: Balancing Anonymity And Accountability In Cyberspace, 19 J. Marshall J. Computer & Info. L. 493 (2001), Shaun B. Spencer Jan 2001

Cyberslapp Suits And John Doe Subpoenas: Balancing Anonymity And Accountability In Cyberspace, 19 J. Marshall J. Computer & Info. L. 493 (2001), Shaun B. Spencer

UIC John Marshall Journal of Information Technology & Privacy Law

The first section of the article examines the history of cyberSLAPP (Strategic Litigation Against Public Participation) suits. The second section looks at the conflicting goals of anonymity and accountability. The third section discusses how existing law does not adequately protection the people whose names are being subpoenaed. The final section proposes an amendment to the Electronic Communications Privacy Act.


Privacy Rights In Personal Information: Hipaa And The Privacy Gap Between Fundamental Privacy Rights And Medical Information, 19 J. Marshall J. Computer & Info. L. 535 (2001), Kevin B. Davis Jan 2001

Privacy Rights In Personal Information: Hipaa And The Privacy Gap Between Fundamental Privacy Rights And Medical Information, 19 J. Marshall J. Computer & Info. L. 535 (2001), Kevin B. Davis

UIC John Marshall Journal of Information Technology & Privacy Law

Advancements in computers and technology have affected nearly every aspect of health care. Although many of the effects of modern technology have benefited health care, a vast increase in the amount of people with access to medical information has led to numerous privacy concerns. In response to these new problems, and at the direction of Congress through the Health Insurance Portability & Accountability Act of 1996 (“HIPAA”), Health and Human Services (“HHS”) implemented the Privacy Rule. The Privacy Rule “protects privacy by regulating the ways in which certain medical information may be used by certain entities.” The constitutional right to …


Cybermedicine: Mainstream Medicine By 2020/Crossing Boundaries, 19 J. Marshall J. Computer & Info. L. 557 (2001), Kim Solez, Sheila Moriber Katz Jan 2001

Cybermedicine: Mainstream Medicine By 2020/Crossing Boundaries, 19 J. Marshall J. Computer & Info. L. 557 (2001), Kim Solez, Sheila Moriber Katz

UIC John Marshall Journal of Information Technology & Privacy Law

Cybermedicine, or “the discipline of applying the Internet to medicine,” is rapidly becoming more and more mainstream, and it will ultimately transform medicine completely. Cybermedicine uses “global networking to educate, innovate and communicate in ways that promote medical practice, commerce, scholarship, and empowerment.” Cybermedicine is taking place all over the world and in all walks of life. Currently, Web and e-mail based programs connect doctors to patients, doctors to doctors, and patients to patients with numerous beneficial results. E-mail is particularly important today because not everyone has access to high-speed Internet connections. The impending improvements in technology and the possibilities …


Issues For Healthcare Companies When Contracting With Asps, 19 J. Marshall J. Computer & Info. L. 569 (2001), Karen K. Harris Jan 2001

Issues For Healthcare Companies When Contracting With Asps, 19 J. Marshall J. Computer & Info. L. 569 (2001), Karen K. Harris

UIC John Marshall Journal of Information Technology & Privacy Law

The first section of the article gives the reader information on what to look for when choosing an outsourcing or ASP provider. The second section provides information negotiating a service level agreement, including information on service levels, payment terms, customer responsibility, dispute resolution and confidentiality.


Do You Want To Step Outside? An Overview Of Online Alternative Dispute Resolution, 19 J. Marshall J. Computer & Info. L. 457 (2001), William Krause Jan 2001

Do You Want To Step Outside? An Overview Of Online Alternative Dispute Resolution, 19 J. Marshall J. Computer & Info. L. 457 (2001), William Krause

UIC John Marshall Journal of Information Technology & Privacy Law

The first section of the article discusses the different sites of online Alternative Means of Dispute Resolution (ADR). The author discusses Virtual Magistrate, settlement sites (focusing on ClickNSettle), SquareTrade, iLevel, Internet Neutral, and the Uniform Domain Name Resolution Process of the Internet Corporation for Assigned Names and Numbers. The second section of the article addresses the usefulness and policy issues surrounding online ADR. Among the issues discussed in this section are the effect on consumer confidence, jurisdiction and enforcement, fees, and limited hearings and discovery.


Cybermedicine: How Computing Empowers Doctors And Patients For Better Health Care, 19 J. Marshall J. Computer & Info. L. 589 (2001), William B. Powers Jan 2001

Cybermedicine: How Computing Empowers Doctors And Patients For Better Health Care, 19 J. Marshall J. Computer & Info. L. 589 (2001), William B. Powers

UIC John Marshall Journal of Information Technology & Privacy Law

In Cybermedicine: How Computing Empowers Doctors and Patients for Better Health Care, Dr. Warner V. Slack takes the reader on an interesting journey from the advent of experimental computer usage in the early 1960s, to comprehensive, hospital-wide computing systems in the 1980s, and into the future. As a professor of medicine and psychiatry at Harvard Medical School and co-president of the Center for Clinical Computing and co-director of the Division for Clinical Computing at Beth Israel Deaconess Medical Center, Dr. Slack, who has been involved with computers in medicine for some thirty-five years, demonstrates how the use of computers can …


Letter From The Editor, Dharmesh Vashee Jan 2001

Letter From The Editor, Dharmesh Vashee

Richmond Journal of Law & Technology

Welcome to the third issue of The Richmond Journal of Law and Technology's seventh publication term! The 2000-2001 academic year has proved to be one of the most productive and exciting in the Journal's decorated history. Our Editorial Board and staff have done a phenomenal job on the Journal's seventh volume and we are very proud of the issue we have worked to prepare for you today.


The Validation Of Shrink-Wrap And Click-Wrap Licenses By Virginia's Uniform Computer Information Transactions Act, Scott J. Spooner Jan 2001

The Validation Of Shrink-Wrap And Click-Wrap Licenses By Virginia's Uniform Computer Information Transactions Act, Scott J. Spooner

Richmond Journal of Law & Technology

Shrink-wrap and click-wrap licenses play a vital role in enabling businesses and consumers to gain access to and use a variety of computer hardware and software. Such licenses effectively transfer computer-related technology to customers, vendors, and consumers by defining the terms of use of the software without implicating the "first sale doctrine" of the Copyright Act. While shrink-wrap and click-wrap licenses have become essential to the software industry and the new economy as a whole, the law applicable to such licenses has been unclear and unsettled. Courts have struggled to develop a coherent framework governing the validity and enforceability of …


Will A Lawsuit A Day Keep The Cyberdocs Away? Modern Theories Of Medical Malpractice As Applied To Cybermedicine, Ruth Ellen Smalley Jan 2001

Will A Lawsuit A Day Keep The Cyberdocs Away? Modern Theories Of Medical Malpractice As Applied To Cybermedicine, Ruth Ellen Smalley

Richmond Journal of Law & Technology

Rivaled only by lawyers, those who earn their livelihood by practicing medicine are viewed by many as America's Public Enemy No. 1. This perception is due to the rising cost of medicine, the over-scheduling of patients, and the poor bedside manner that many people associate with a trip to the doctor's office. However, the advent of the Internet and its proliferation into schools, offices, and homes has placed medical opinions only a mouse click away. Websites, such as cyberdocs.com, allow patients to type in a description of their ailments and receive diagnoses and treatment advice from an on-line medical professional …


Remarks On The Background And Development Of Ucita, Carlyle Ring Jan 2001

Remarks On The Background And Development Of Ucita, Carlyle Ring

Richmond Journal of Law & Technology

It's a real pleasure to be here. My formal name as introduced is Carlyle Ring, but as Barbara Beach who was assistant city attorney when I sat on the City Council for Alexandria, knows well, everybody calls me Connie. And so please address me by my nickname: Connie.


Ucita And The Virginia General Assembly, Joe T. May Jan 2001

Ucita And The Virginia General Assembly, Joe T. May

Richmond Journal of Law & Technology

The outline for Joe T. May's speech.


Letter From The Editor, Paul A. Fritzinger Jan 2001

Letter From The Editor, Paul A. Fritzinger

Richmond Journal of Law & Technology

Over the last few years, the problems attendant to software licensing regulation have occupied an important position in the minds of legislators at the federal, state and local levels. In the early nineties, the National Conference of Commissioners for Uniform State Laws (NCCUSL) recognized the potential for licensing problems presented by the use of computer software in the national arena as well as on the Internet and saw a clear need for regulations that would transcend state boundaries. In 1999, as a result of years of planning and careful drafting, NCCUSL promulgated the Uniform Computer Information Transactions Act (UCITA) in …