Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 13 of 13
Full-Text Articles in Law
Messages From The Front: Hard Earned Lessons On Information Security From The Ip Wars, 16 Mich. St. J. Int'l L. 71 (2007), Doris E. Long
Messages From The Front: Hard Earned Lessons On Information Security From The Ip Wars, 16 Mich. St. J. Int'l L. 71 (2007), Doris E. Long
UIC Law Open Access Faculty Scholarship
Cyberspace is often a battlefield with a wide array of armies posed to challenge one another across the increasing array of rhetoric and technology that has made it such a potent arena for global digital commerce. Perry Barlow's infamous demand that cyberspace be left to its own devices because of its unique unregulated nature may have been answered by Larry Lessig's reply that code may in fact be used to regulate cyberspace, but the reality is that social norming demands, the evanescence of technological controls, and the perceived utility of illicit conduct utilizing the internet make any regulation problematic at …
Application Service Providing, Copyright, And Licensing, 25 J. Marshall J. Computer & Info. L. 79 (2007), Michael P. Widmer
Application Service Providing, Copyright, And Licensing, 25 J. Marshall J. Computer & Info. L. 79 (2007), Michael P. Widmer
UIC John Marshall Journal of Information Technology & Privacy Law
Application Service Providing ("ASP"), where a vendor hosts a software application on her server and grants customers access to the application over a network -- without the software application itself being installed on the user’s computer -- is used by many, e.g. in the form of Web based e-mail services, and grows ever more important. This article argues that although ASP mainly raises questions (i) that come up in the context of traditional use of computer programs; or (ii) that have been addressed in the context of online use of works other than software, ASP has significantly different copyright implications …
Ict And Employer-Employee Power Dynamics: A Comparative Perspective Of United States' And Netherlands' Workplace Privacy In Light Of Information And Computer Technology Monitoring And Positioning Of Employees, 25 J. Marshall J. Computer & Info. L. 37 (2007), Colette Cuijpers
UIC John Marshall Journal of Information Technology & Privacy Law
Employees can cause harm to their employers through Information and Computer Technology (ICT) in employment relationships; for example, through surfing for adult material on the Internet or leaking company secrets via a mobile phone. Employers have responded to this development by introducing various surveillance systems. Besides well-known forms of Internet and e-mail surveillance, positioning systems are becoming a new trend. The influence these systems have on the employment relationship can be far-reaching, as they offer the employer an insight into the employee’s whereabouts, outside the company premises as well as outside company hours. As a consequence, the boundaries between the …
The Fda And The Future Of The Brain-Computer Interface: Adapting Fda Device Law To The Challenges Of Human-Machine Enhancement, 25 J. Marshall J. Computer & Info. L. 117 (2007), Eric Chan
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Slingbox: Copyright, Fair Use, And Access To Television Programming Anywhere In The World, 25 J. Marshall J. Computer & Info. L. 187 (2007), Shekar Sathyanarayana
Slingbox: Copyright, Fair Use, And Access To Television Programming Anywhere In The World, 25 J. Marshall J. Computer & Info. L. 187 (2007), Shekar Sathyanarayana
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Angling For A Fair Standard: A Recommendation For A Narrowly Tailored Non-Profit Exemption To The Closed Captioning Requirements, 25 J. Marshall J. Computer & Info. L. 165 (2007), Joshua Pila
UIC John Marshall Journal of Information Technology & Privacy Law
In late 2006, the FCC’s Consumer and Government Affairs Bureau (“CGB”) issued the Anglers Order, providing a wholesale exemption for non-profit entities seeking to avoid the strictures of the Commission’s closed captioning rules. Disability advocates quickly criticized the Anglers Order on administrative law and communications law grounds. This paper avoids administrative law and communications law issues, but instead criticizes the Anglers Order on non-profit law and policy grounds. The paper then recommends and supports a post-application, narrowly-tailored financial test, automatically exempting A) non-profit organizations, with B) less than $25,000 in annual revenue, who C) receive no financial compensation for airing …
From Taylorism To The Omnipticon: Expanding Employee Surveillance Beyond The Workplace, 25 J. Marshall J. Computer & Info. L. 1 (2007), Robert D. Sprague
From Taylorism To The Omnipticon: Expanding Employee Surveillance Beyond The Workplace, 25 J. Marshall J. Computer & Info. L. 1 (2007), Robert D. Sprague
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
"Heads-I-Win, Tails-You-Lose": The Predicament Legitimate Small Entities Face Post Ebay And The Essential Role Of Willful Infringement In The Four-Factor Permanent Injunction Analysis, 41 J. Marshall L. Rev. 189 (2007), William R. Everding
UIC Law Review
No abstract provided.
If You Prompt Them, They Will Rule: The Warranty Of Habitability Meets New Court Information Systems, 40 J. Marshall L. Rev. 425 (2007), Mary Marsh Zulack
If You Prompt Them, They Will Rule: The Warranty Of Habitability Meets New Court Information Systems, 40 J. Marshall L. Rev. 425 (2007), Mary Marsh Zulack
UIC Law Review
No abstract provided.
Gambling And The Law®: The International Law Of Remote Wagering, 40 J. Marshall L. Rev. 1159 (2007), I. Nelson Rose
Gambling And The Law®: The International Law Of Remote Wagering, 40 J. Marshall L. Rev. 1159 (2007), I. Nelson Rose
UIC Law Review
No abstract provided.
Identity Theft: Plugging The Massive Data Leaks With A Stricter Nationwide Breach-Notification Law, 40 J. Marshall L. Rev. 681 (2007), Amanda Draper
Identity Theft: Plugging The Massive Data Leaks With A Stricter Nationwide Breach-Notification Law, 40 J. Marshall L. Rev. 681 (2007), Amanda Draper
UIC Law Review
No abstract provided.
Will Youtube Sail Into The Dmca's Safe Harbor Or Sink For Internet Piracy?, 6 J. Marshall Rev. Intell. Prop. L. 550 (2007), Michael Driscoll
Will Youtube Sail Into The Dmca's Safe Harbor Or Sink For Internet Piracy?, 6 J. Marshall Rev. Intell. Prop. L. 550 (2007), Michael Driscoll
UIC Review of Intellectual Property Law
Is YouTube, the popular video sharing website, a new revolution in information sharing or a profitable clearing-house for unauthorized distribution of copyrighted material? YouTube’s critics claim that it falls within the latter category, in line with Napster and Grokster. This comment, however, determines that YouTube is fundamentally different from past infringers in that it complies with statutory provisions concerning the removal of copyrighted materials. Furthermore, YouTube’s central server architecture distinguishes it from peer-to-peer file sharing websites. This comment concludes that any comparison to Napster or Grokster issuperficial, and overlooks the potential benefits of YouTube to copyright
Remedying The Lose-Lose Game Of Compulsive Gambling: Voluntary Exclusions, Mandatory Exclusions, Or An Alternative Method?, 40 J. Marshall L. Rev. 1221 (2007), William N. Thompson, Robert W. Stocker Ii, Peter J. Kulick
Remedying The Lose-Lose Game Of Compulsive Gambling: Voluntary Exclusions, Mandatory Exclusions, Or An Alternative Method?, 40 J. Marshall L. Rev. 1221 (2007), William N. Thompson, Robert W. Stocker Ii, Peter J. Kulick
UIC Law Review
No abstract provided.