Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Law

Journal

2006

Institution
Keyword
Publication

Articles 31 - 60 of 91

Full-Text Articles in Law

The Protection Of Maps And Spatial Databases In Europe And The United States By Copyright And The Sui Generis Right, 24 J. Marshall J. Computer & Info. L. 195 (2006), Katleen Janssen, Jos Dumortier Jan 2006

The Protection Of Maps And Spatial Databases In Europe And The United States By Copyright And The Sui Generis Right, 24 J. Marshall J. Computer & Info. L. 195 (2006), Katleen Janssen, Jos Dumortier

UIC John Marshall Journal of Information Technology & Privacy Law

Spatial data and applications play an ever-increasing part in our economy and in our society in general, but the protection of spatial databases by intellectual property rights seems to be a challenge because the Internet and information technology have caused a considerable increase in the copying of data, maps, route descriptions, hiking trails, etc. The illegal copying of spatial data, however, has caused the data producers to turn to several means of protection, such as intellectual property legislation, unfair competition, confidentiality and privacy. This paper begins by determining what is meant by spatial data. Thereafter, the paper reflects on the …


Voip Goes The Bad Guy: Understanding The Legal Impact Of The Use Of Voice Over Ip Communications In Cases Of Nsa Warrantless Eavesdropping, 24 J. Marshall J. Computer & Info. L. 227 (2006), Eric Koester Jan 2006

Voip Goes The Bad Guy: Understanding The Legal Impact Of The Use Of Voice Over Ip Communications In Cases Of Nsa Warrantless Eavesdropping, 24 J. Marshall J. Computer & Info. L. 227 (2006), Eric Koester

UIC John Marshall Journal of Information Technology & Privacy Law

For purposes of national security, the Bush administration delegated authority to the National Security Administration (“NSA”) to conduct warrantless surveillance of Americans; and such surveillance defies tradition. At the same time, emerging communications technology, like Voice over Internet Protocol (“VoIP”), complicates the already controversial issue by generating uncertainty about how courts will analyze warrantless surveillance of such forums. The problem lies in outdated communications and surveillance regulations, which effectively address older communications forums, like the telephone, but encounter stifling ambiguity vis-à-vis VoIP and other new forums. VoIP is a relatively new technology, but it encompasses the large and ever-growing use …


The Federal Election Commission & Political Blogging: A Perfect Balance Or Just Not Enough?, 24 J. Marshall J. Computer & Info. L. 611 (2006), Niki Vlachos Jan 2006

The Federal Election Commission & Political Blogging: A Perfect Balance Or Just Not Enough?, 24 J. Marshall J. Computer & Info. L. 611 (2006), Niki Vlachos

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Cleaning Metadata On The World Wide Web: Suggestions For A Regulatory Approach, 24 J. Marshall J. Computer & Info. L. 531 (2006), Marcel Gordon Jan 2006

Cleaning Metadata On The World Wide Web: Suggestions For A Regulatory Approach, 24 J. Marshall J. Computer & Info. L. 531 (2006), Marcel Gordon

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Copyright Misuse Doctrine On Computer Software: A Redundant Doctrine Of U.S. Copyright Law Or A Necessary Addition To E.U. Copyright Law?, 24 J. Marshall J. Computer & Info. L. 571 (2006), Haris Apostolopoulos Jan 2006

The Copyright Misuse Doctrine On Computer Software: A Redundant Doctrine Of U.S. Copyright Law Or A Necessary Addition To E.U. Copyright Law?, 24 J. Marshall J. Computer & Info. L. 571 (2006), Haris Apostolopoulos

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Provisional Relief In Transnational Litigation In The Internet Era: What Is In The Us Best Interest?, 24 J. Marshall J. Computer & Info. L. 263 (2006), Panagiota Kelali Jan 2006

Provisional Relief In Transnational Litigation In The Internet Era: What Is In The Us Best Interest?, 24 J. Marshall J. Computer & Info. L. 263 (2006), Panagiota Kelali

UIC John Marshall Journal of Information Technology & Privacy Law

Using the hypothetical of a college student victimized by a fraudulent website, this comment addresses the issue of Internet fraud. In the example presented, the perpetrators are Greek nationals located in Greece. Focusing on the intangible and international nature of the Internet, the comment addresses the complications surrounding litigating an Internet fraud case. The issues discussed include a determination of the forum where the suit should be brought, preservation of the status quo pending determination of the dispute, and the status of a transnational cooperation on the issue of recognition and enforcement of judgments. The comment presents the options available …


Transsexuals And The Family Medical Leave Act, 24 J. Marshall J. Computer & Info. L. 315 (2006), Charles Thomas Little Jan 2006

Transsexuals And The Family Medical Leave Act, 24 J. Marshall J. Computer & Info. L. 315 (2006), Charles Thomas Little

UIC John Marshall Journal of Information Technology & Privacy Law

This article examines the implications for transsexuals seeking sexual reassignment surgery (“SRS”) under the Family Medical Leave Act (“FMLA”). Currently, the scant case law pertaining to the FMLA suggests that the statutes and regulations will likely fail to provide even minimal protection to transsexuals. If applied literally, the FMLA may present barriers to transsexuals seeking SRS in opposition to the true purpose behind the Act, which is to allow employees the opportunity to take reasonable leave from work by mandating more medical leave than the employers might otherwise be willing to grant for things such as the adoption or birth …


Borders Online, Llc V. State Board Of Equalization: It's Time For Congress To Weigh The Possibilities Of This California Decision, 24 J. Marshall J. Computer & Info. L. 641 (2006), Ronnie E. Webb Jan 2006

Borders Online, Llc V. State Board Of Equalization: It's Time For Congress To Weigh The Possibilities Of This California Decision, 24 J. Marshall J. Computer & Info. L. 641 (2006), Ronnie E. Webb

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Twenty-Fifth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 24 J. Marshall J. Computer & Info. L. 673 (2006), David E. Sorkin, Larisa V. Benitez-Morgan, J. Preston Carter, William P. Greubel Iii, Matthew Hector, Kellen Keaty, Lisa Rodriguez Jan 2006

The Twenty-Fifth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 24 J. Marshall J. Computer & Info. L. 673 (2006), David E. Sorkin, Larisa V. Benitez-Morgan, J. Preston Carter, William P. Greubel Iii, Matthew Hector, Kellen Keaty, Lisa Rodriguez

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Twenty-Fifth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 24 J. Marshall J. Computer & Info. L. 699 (2006), Chris Norris, Justin Sisemore, Anndi Queenan Jan 2006

The Twenty-Fifth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 24 J. Marshall J. Computer & Info. L. 699 (2006), Chris Norris, Justin Sisemore, Anndi Queenan

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Twenty-Fifth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 24 J. Marshall J. Computer & Info. L. 733 (2006), Timothy T. Hsieh, Jennifer Simmen Lewin, Jerome C. Pandell Jan 2006

The Twenty-Fifth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 24 J. Marshall J. Computer & Info. L. 733 (2006), Timothy T. Hsieh, Jennifer Simmen Lewin, Jerome C. Pandell

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Intellectual Property Rights At The Crossroad Between Monopolization And Abuse Of Dominant Position: American And European Approaches Compared, 24 J. Marshall J. Computer & Info. L. 455 (2006), Emanuela Arezzo Jan 2006

Intellectual Property Rights At The Crossroad Between Monopolization And Abuse Of Dominant Position: American And European Approaches Compared, 24 J. Marshall J. Computer & Info. L. 455 (2006), Emanuela Arezzo

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Gathering Twilight? Information Privacy On The Internet In The Post-Enlightenment Era, 24 J. Marshall J. Computer & Info. L. 353 (2006), Mark F. Kightlinger Jan 2006

The Gathering Twilight? Information Privacy On The Internet In The Post-Enlightenment Era, 24 J. Marshall J. Computer & Info. L. 353 (2006), Mark F. Kightlinger

UIC John Marshall Journal of Information Technology & Privacy Law

This Article provides a timely examination of U.S. law and policy concerning information privacy on the Internet, a subject that receives almost daily attention in the press. This Article constructs a new theoretical framework from the writings of Alasdair MacIntyre, a major contemporary philosopher and social theorist. Over the past 30 years, MacIntyre has examined the roots and continuing impact of the failure of post-Enlightenment thinkers to produce an account of human nature and action that could replace an older Aristotelian account and command the assent of all rational persons. In addition to extending MacIntyre’s examination of our post-Enlightenment situation, …


Contribution To The Understanding Of The Public Domain, 24 J. Marshall J. Computer & Info. L. 411 (2006), Vincenzo Vinciguerra Jan 2006

Contribution To The Understanding Of The Public Domain, 24 J. Marshall J. Computer & Info. L. 411 (2006), Vincenzo Vinciguerra

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


A Comedy Of Errors: Defining "Component" In A Global Information Technology Market - Accounting For Innovation By Penalizing The Innovators, 24 J. Marshall J. Computer & Info. L. 507 (2006), William Greubel Jan 2006

A Comedy Of Errors: Defining "Component" In A Global Information Technology Market - Accounting For Innovation By Penalizing The Innovators, 24 J. Marshall J. Computer & Info. L. 507 (2006), William Greubel

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


A Duty Everlasting: The Perils Of Applying Traditional Doctrines Of Spoliation To Electronic Discovery, Michael R. Nelson, Mark H. Rosenberg Jan 2006

A Duty Everlasting: The Perils Of Applying Traditional Doctrines Of Spoliation To Electronic Discovery, Michael R. Nelson, Mark H. Rosenberg

Richmond Journal of Law & Technology

Amendments to the Federal Rules of Civil Procedure regarding electronic discovery are expected to take effect on December 1, 2006. These amendments are designed to alleviate the burden, expense and uncertainty that has resulted from the application of traditional discovery principles in the electronic age. These principles worked well in an era where discovery was primarily limited to the production of paper documentation, but have proved unworkable when applied to the discovery of electronic data, particularly in the “corporate world,” where even the most routine business discussions are captured in electronic format.5


Virtual Espionage: Spyware And The Common Law Privacy Torts, Don Corbett Jan 2006

Virtual Espionage: Spyware And The Common Law Privacy Torts, Don Corbett

University of Baltimore Law Review

No abstract provided.


Bigger Phish To Fry: Californias Anti- Phishing Statute And Its Potential Imposition Of Secondary Liability On Internet Service Providers, Camille Calman Jan 2006

Bigger Phish To Fry: Californias Anti- Phishing Statute And Its Potential Imposition Of Secondary Liability On Internet Service Providers, Camille Calman

Richmond Journal of Law & Technology

The incidence of phishing, a form of internet fraud, has increased dramatically since 2003. Identity thieves searching for vulnerabilities in internet security have realized that customers are the weak link. Using mass e-mailings and websites purporting to be those of well-known and trusted corporations, “phishers” trick customers into revealing personal and financial information.


Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Jon S. Player Jan 2006

Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Jon S. Player

Richmond Journal of Law & Technology

The Richmond Journal of Law and Technology is proud to present its second issue of the 2006–2007 academic school year. The Journal staff has worked diligently during the first half of the year to produce an exceptional issue.


Waiving The Privilege In A Storm Of Data: An Argument For Uniformity And Rationality In Dealing With The Inadvertent Production Of Privileged Materials In The Age Of Electronically Stored Information, Dennis R. Kiker Jan 2006

Waiving The Privilege In A Storm Of Data: An Argument For Uniformity And Rationality In Dealing With The Inadvertent Production Of Privileged Materials In The Age Of Electronically Stored Information, Dennis R. Kiker

Richmond Journal of Law & Technology

At the point where one of the most venerable principles of common law and the reality of modern information management collide, even the most diligent attorneys may become victims of the resulting fallout.


Teaching A Man To Fish: Why National Legislation Anchored In Notice And Consent Provisions Is The Most Effective Solution To The Spyware Problem, M. Angela Buenaventura Jan 2006

Teaching A Man To Fish: Why National Legislation Anchored In Notice And Consent Provisions Is The Most Effective Solution To The Spyware Problem, M. Angela Buenaventura

Richmond Journal of Law & Technology

The term “spyware” encompasses a wide range of software designed to intercept or take partial control of a computer. Spyware slows down computers and forces computer users to expend resources on repair and installation of protective software. Consumers also face the danger that personal information gathered through spyware will be misused. Thus, most people agree that spyware is an annoying and costly problem. However, there is no consensus on the best way to solve the spyware problem. This article examines the methods currently being used to battle spyware, as well as proposed national spyware legislation. The article outlines the various …


Shifting Burdens And Concealing Electronic Evidence: Discovery In The Digital Era, Rebecca Rockwood Jan 2006

Shifting Burdens And Concealing Electronic Evidence: Discovery In The Digital Era, Rebecca Rockwood

Richmond Journal of Law & Technology

In the twenty-first century, persons involved in the legal profession will be forced to confront technological issues. Computers and technology have pervaded every aspect of society, and the legal system is no exception. The discovery process is a dramatic example of how lawyers and courts strain to keep up with technological advances. Traditional discovery practices have been severely overhauled as electronic information becomes increasingly prevalent. What was once a simple discovery request can now become an overwhelming task, as defendants must wade through a plethora of electronic documents in an attempt to comply with the court’s discovery orders.


The Design Of An Undergraduate Degree Program In Computer & Digital Forensics, Gary C. Kessler, Michael E. Schirling Jan 2006

The Design Of An Undergraduate Degree Program In Computer & Digital Forensics, Gary C. Kessler, Michael E. Schirling

Journal of Digital Forensics, Security and Law

Champlain College formally started an undergraduate degree program in Computer & Digital Forensics in 2003. The underlying goals were that the program be multidisciplinary, bringing together the law, computer technology, and the basics of digital investigations; would be available as on online and oncampus offering; and would have a process-oriented focus. Success of this program has largely been due to working closely with practitioners, maintaining activity in events related to both industry and academia, and flexibility to respond to ever-changing needs. This paper provides an overview of how this program was conceived, developed, and implemented; its evolution over time; and …


Propertization, Contract, Competition, And Communication: Law's Struggle To Adapt To The Transformative Powers Of The Internet, David Barnhizer Jan 2006

Propertization, Contract, Competition, And Communication: Law's Struggle To Adapt To The Transformative Powers Of The Internet, David Barnhizer

Cleveland State Law Review

This Symposium focuses in part on the ideas of Margaret Jane Radin as a point of departure for the various contributions. A key part of the analysis includes the process she calls propertization in the context of intellectual property rules and the Internet. The approach taken in this introductory essay is twofold. The first part presents some key points raised by the Symposium contributors. Of course, that overview is necessarily incomplete, because the contributions represent a rich group of analyses about vital concerns relating to how our legal system should respond to the challenge of the Internet and information systems …


Propertization Metaphors For Bargaining Power And Control Of The Self In The Information Age, Daniel D. Barnhizer Jan 2006

Propertization Metaphors For Bargaining Power And Control Of The Self In The Information Age, Daniel D. Barnhizer

Cleveland State Law Review

This Article argues that the threatening consequences of this commodification and propertization of consumers' electronic selves represent only part of the picture. Information era technological developments provide more tools than ever available before by which consumers can place boundaries around their right to consent and exclude others from that arena. Thus, Internet-based contracting allows consumers to access a broad range of bargaining power inputs to protect their power to withhold consent. Instead of an amorphous, indefinable quality of contracting parties, bargaining power may now be characterized as a series of discrete inputs that can be identified, evaluated, exchanged and owned. …


Metaphor, Objects, And Commodities, George H. Taylor, Michael J. Madison Jan 2006

Metaphor, Objects, And Commodities, George H. Taylor, Michael J. Madison

Cleveland State Law Review

As its two main Parts will evidence, this Comment remains the product of two distinct if overlapping voices. Part II returns to the conceptual origins of Radin's theory in her general critique of objectification and commodification. It asks whether a more positive concept of objectification can be recovered that is distinguishable from reification, the latter seeming to be the more appropriate locus of Radin's criticism. Part III's response to Radin is similar, but it tries to exemplify both our appreciation of and our differences from her work through more detailed analysis of intellectual property law and theory.


Diverging Perspectives On Electronic Contracting In The U.S. And Eu, Jane K. Winn, Brian H. Bix Jan 2006

Diverging Perspectives On Electronic Contracting In The U.S. And Eu, Jane K. Winn, Brian H. Bix

Cleveland State Law Review

Margaret Jane Radin's paper discusses the ways modern technologies have prompted new thinking within and about property, and the way the legal response has failed to take sufficiently into account the countervailing considerations that have shaped earlier Property Law developments. Some new technologies have also caused intellectual and practical struggles within Contract Law. This paper will consider some of the developments of Contract Law related to these changes, in particular the transactions relating to the sale, leasing or free use of computer software and the purchase of computers. Part I of this paper introduces the topic and offers an overview …


Monism, Nominalism, And Public-Private In The Work Of Margaret Jane Radin, Christopher L. Sagers Jan 2006

Monism, Nominalism, And Public-Private In The Work Of Margaret Jane Radin, Christopher L. Sagers

Cleveland State Law Review

This essay begins by situating the distinction in history generally and in American legal thought. Its historical aspect seems important because it suggests that the distinction is not predetermined—it is historically and culturally contingent. That fact has been largely ignored in the American legal academy, and among most of the judiciary it is all but outright socialist treachery to suggest it.

The essay moves on to consider Radin's work itself. The prominence of the distinction is relatively obvious in some of her work on technological marketing and design issues, but I will suggest that in fact it runs quietly just …


The Growth Of Cost-Shifting In Response To The Rising Cost And Importance Of Computerized Data In Litigation, Ross Chaffin Jan 2006

The Growth Of Cost-Shifting In Response To The Rising Cost And Importance Of Computerized Data In Litigation, Ross Chaffin

Oklahoma Law Review

No abstract provided.


Can Systems Analysis Help Us To Understand C.O.B.R.A.?: A Challenge To Employment-Based Health Insurance, 39 J. Marshall L. Rev. 753 (2006), Alison Mcmorran Sulentic Jan 2006

Can Systems Analysis Help Us To Understand C.O.B.R.A.?: A Challenge To Employment-Based Health Insurance, 39 J. Marshall L. Rev. 753 (2006), Alison Mcmorran Sulentic

UIC Law Review

No abstract provided.