Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Law

Hearsay In The Smiley Face: Analyzing The Use Of Emojis As Evidence, Erin Janssen Jun 2018

Hearsay In The Smiley Face: Analyzing The Use Of Emojis As Evidence, Erin Janssen

St. Mary's Law Journal

Abstract forthcoming


Fbi's Carnivore: Under The Fourth Amendment And The Usa Patriot Act, Scott Griner Sep 2017

Fbi's Carnivore: Under The Fourth Amendment And The Usa Patriot Act, Scott Griner

Oklahoma Journal of Law and Technology

No abstract provided.


Emailer Beware: The Fourth Amendment And Electronic Mail, E. Parker Lowe Sep 2017

Emailer Beware: The Fourth Amendment And Electronic Mail, E. Parker Lowe

Oklahoma Journal of Law and Technology

No abstract provided.


"Hacking" Service Of Process: Using Social Media To Provide Constitutionally Sufficient Notice Of Process, Angela Upchurch Jun 2016

"Hacking" Service Of Process: Using Social Media To Provide Constitutionally Sufficient Notice Of Process, Angela Upchurch

University of Arkansas at Little Rock Law Review

No abstract provided.


Dear Yahoo: A Comment On In Re Yahoo Mail Litigation, Nareen Melkonian Jan 2015

Dear Yahoo: A Comment On In Re Yahoo Mail Litigation, Nareen Melkonian

Loyola of Los Angeles Law Review

No abstract provided.


How Much Spam Can Can-Spam Can?: Evaluating The Effectiveness Of The Can-Spam Act In The Wake Of White Buffalo Ventures V. University Of Texas, Fay Katayama Jun 2014

How Much Spam Can Can-Spam Can?: Evaluating The Effectiveness Of The Can-Spam Act In The Wake Of White Buffalo Ventures V. University Of Texas, Fay Katayama

Touro Law Review

No abstract provided.


Spoliation Of Electronic Evidence: Sanctions Versus Advocacy, Charles W. Adams Jan 2011

Spoliation Of Electronic Evidence: Sanctions Versus Advocacy, Charles W. Adams

Michigan Telecommunications & Technology Law Review

This Article proposes that courts should refrain from imposing adverse inference jury instructions as sanctions for the spoliation of evidence. This proposal bears some similarity to the approach taken twenty years ago by the 1993 amendments to Rule 11, which constrained courts' ability to sanction. Instead of imposing an adverse jury instruction as a sanction for spoliation of evidence, courts should allow evidence of spoliation to be admitted at trial if a reasonable jury could find that spoliation had occurred and if the spoliation was relevant to a material issue. If a court allows the introduction of evidence of spoliation …


The Need For Revisions To The Law Of Wiretapping And Interception Of Email, Robert A. Pikowsky Oct 2003

The Need For Revisions To The Law Of Wiretapping And Interception Of Email, Robert A. Pikowsky

Michigan Telecommunications & Technology Law Review

I argue that a person's privacy interest in his email is the same as his privacy interest in a telephone conversation. Moreover, the privacy interest in email remains unchanged regardless of whether it is intercepted in transmission or covertly accessed from the recipient's mailbox. If one accepts this assumption, it follows that the level of protection against surveillance by law enforcement officers should be the same[...] As technology continues to blur the distinction between wire and electronic communication, it becomes apparent that a new methodology must be developed in order to provide logical and consistent protection to private communications. The …


Zoning Speech On The Internet: A Legal And Technical Model, Lawrence Lessig, Paul Resnick Nov 1999

Zoning Speech On The Internet: A Legal And Technical Model, Lawrence Lessig, Paul Resnick

Michigan Law Review

Speech, it is said, divides into three sorts - (1) speech that everyone has a right to (political speech, speech about public affairs); (2) speech that no one has a right to (obscene speech, child porn); and (3) speech that some have a right to but others do not (in the United States, Ginsberg speech, or speech that is "harmful to minors," to which adults have a right but kids do not). Speech-protective regimes, on this view, are those where category (1) speech predominates; speech-repressive regimes are those where categories (2) and (3) prevail. This divide has meaning for speech …


Building A Community Through Workplace E-Mail: The New Privacy Frontier, Peter Schnaitman Jun 1999

Building A Community Through Workplace E-Mail: The New Privacy Frontier, Peter Schnaitman

Michigan Telecommunications & Technology Law Review

The relatively new technology of electronic mail (e-mail) presents an entirely new issue of workplace privacy. Currently, whether a person has a privacy interest in their workplace e-mail communications is as unsettled an issue as it has been since the technology emerged in the early part of this decade as the preferred mode of communication in the workplace. Indeed, e-mail may soon be the preferred mode of communication in general. This comment will argue that all e-mail users have a privacy interest in workplace e-mail communications and that the current law does not afford e-mail users any type of protection …


Electronic Mail And Michigan's Public Disclosure Laws: The Argument For Public Access To Governmental Electronic Mail, Daniel F. Hunter Jun 1995

Electronic Mail And Michigan's Public Disclosure Laws: The Argument For Public Access To Governmental Electronic Mail, Daniel F. Hunter

University of Michigan Journal of Law Reform

This Note explores the potential for citizens to request electronic mail (e-mail) records from government agencies using public disclosure laws, with emphasis on the Michigan Freedom of Information Act (FOIA). E-mail is a medium that has come to replace both telephone calls and paper documents for many purposes. The applicability of public disclosure laws to e-mail, however, is less than clear. Telephone conversations by public employees for most purposes are confidential, while paper records created by those same employees can be requested under the FOIA. Thus, should public e-mail remain private and confidential or should it be subject to FOIA …


White House Electronic Mail And Federal Recordkeeping Law: Press "D" To Delect History, James D. Lewis Feb 1995

White House Electronic Mail And Federal Recordkeeping Law: Press "D" To Delect History, James D. Lewis

Michigan Law Review

This Note argues that federal recordkeeping law should promote the preservation of history above all other concerns. First, courts should construe and apply the recordkeeping statutes with this goal in mind. Second, Congress should amend the recordkeeping statutes to correct enforcement deficiencies that leave irresponsible recordkeeping practices unchecked and risk the loss of a historical record of White House decisionmaking. Finally, executive officials should adopt guidelines that identify and preserve historically significant materials regardless of the medium in which they are captured.

Part I of this Note examines the statutes that currently regulate the management and public disclosure of White …