Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- FTC (2)
- Federal Trade Commission (2)
- 985 Reasons to Comply with Discovery Requests (1)
- ABA LEO (1)
- ABA Model Rules of Professional Conduct (1)
-
- Abuse (1)
- Achieving an Appropriate Balance: The Use of Counsel Sanctions in Connection with the Resolution of E- Discovery Misconduct (1)
- Albert Gonzalez (1)
- Ayers (1)
- BJS (1)
- Bethel School District No. 403 v. Fraser (1)
- Brady v. Maryland (1)
- Bureau of Justice Statistics of the Department of Justice (1)
- COPPA (1)
- CREDO (1)
- Case Review and Enforcement of Discovery Obligations (1)
- Child (1)
- Children’s Online Privacy Protection Act of 1998 (1)
- ChoicePoint (1)
- Cognitive dissonance (1)
- Coleman (Parent) Holdings v. Morgan Stanley & Co. (1)
- Computer (1)
- Corporate Privacy Trend: The “Value” of Personally Identifiable Information (“PII”) Equals the “Value” of Financial Assets (1)
- Cyber (1)
- Databases E-Discovery and Criminal Law (1)
- Dissonant Paradigms and Unintended Consequences: Can (and Should) the Law Save Us from Technology? (1)
- Dreadful Policing: Are the Semiconductor Industry Giants Content with Y esterday’ s International Protection for Integrated Circuits? (1)
- Electronic Discovery in Large Organizations (1)
- FCRA (1)
- Fair Credit Reporting Act (1)
Articles 1 - 12 of 12
Full-Text Articles in Law
Run For The Border: Laptop Searches And The Fourth Amendment, Nathan Alexander Sales
Run For The Border: Laptop Searches And The Fourth Amendment, Nathan Alexander Sales
University of Richmond Law Review
No abstract provided.
Corporate Privacy Trend: The “Value” Of Personally Identifiable Information (“Pii”) Equals The “Value” Of Financial Assets, John T. Soma, J. Zachary Courson, John Cadkin
Corporate Privacy Trend: The “Value” Of Personally Identifiable Information (“Pii”) Equals The “Value” Of Financial Assets, John T. Soma, J. Zachary Courson, John Cadkin
Richmond Journal of Law & Technology
Corporate America’s increasing dependence on the electronic use of personally identifiable information (“PII”) necessitates a reexamination and expansion of the traditional conception of corporate assets. PII is now a commodity that companies trade and sell. As technological development increases, aspects of day-to-day business involving PII are performed electronically in a more cost effective and efficient manner. PII, which companies obtain at little cost, has quantifiable value that is rapidly reaching a level comparable to the value of traditional financial assets.
The Ethics Of E-Mail, Thomas E. Spahn
The Ethics Of E-Mail, Thomas E. Spahn
Richmond Journal of Law & Technology
In many ways, communicating by e-mail and other forms of electronic transmission reflects a fundamentally different way of human interaction. Historians eventually will put this in perspective, but one could easily conclude that e-mails are essentially a “third way” for people to communicate.
Students’ Free Speech Rights Shed At The Cyber Gate, Vivian Lei
Students’ Free Speech Rights Shed At The Cyber Gate, Vivian Lei
Richmond Journal of Law & Technology
Education is one of the most important functions of the government. Because public schools are under the control of state and local authorities, the administrators and teachers of these schools are subject to requirements established in the United States Constitution. For example, for more than thirty years, the Supreme Court has supported the due process rights of students facing a deprivation of liberty and property interests in education.
“Medical” Monitoring For Non-Medical Harms: Evaluating The Reasonable Necessity Of Measures To Avoid Identity Fraud After A Data Breach, James Graves
Richmond Journal of Law & Technology
In July 2005, “reformed” hacker Albert Gonzalez noticed an insecure wireless network at a Marshalls department store in Miami. After exploiting the vulnerability, Gonzalez and his accomplices installed programs that captured credit card numbers. They stored the credit card numbers on servers in Latvia and Ukraine, created ATM cards using some of the numbers, and used those cards to withdraw hundreds of thousands of dollars in cash. Fifteen months later, Marshalls’ parent company, TJX, announced that forty-five million of its customers’ credit card numbers had been exposed to the thieves.
Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Robert Michaux
Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Robert Michaux
Richmond Journal of Law & Technology
The Richmond Journal of Law and Technology is proud to present the first issue of the 2009–2010 academic year.
Databases, E-Discovery And Criminal Law, Ken Strutin
Databases, E-Discovery And Criminal Law, Ken Strutin
Richmond Journal of Law & Technology
The enduring value of the Constitution is the fundamental approach to human rights transcending time and technology. The modern complexity and variety of electronically stored information was unknown in the eighteenth century, but the elemental due process concepts forged then can be applied now. At some point, the accumulation of information surpassed the boundaries of living witnesses and paper records. The advent of computers and databases ushered in an entirely new order, giving rise to massive libraries of factual details and powerful investigative tools. But electronically collected information sources are a double-edged sword. Their accuracy and reliability are critical issues …
Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Jessica M. Yoke
Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Jessica M. Yoke
Richmond Journal of Law & Technology
The Richmond Journal of Law and Technology is proud to present the third issue of the 2008–2009 academic school year, which also is our Annual Survey on E-Discovery.
Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Bridget Murray
Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Bridget Murray
Richmond Journal of Law & Technology
The Richmond Journal of Law and Technology is proud to present the fourth issue of the 2008–2009 academic school year. Our authors analyze a variety of controversial legal topics that are at the forefront of debates regarding the intersection of technology and law.
Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Robert Michaux
Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Robert Michaux
Richmond Journal of Law & Technology
The Richmond Journal of Law and Technology is proud to present the second issue of the 2009–2010 academic year.
Dissonant Paradigms And Unintended Consequences: Can (And Should) The Law Save Us From Technology?, Donald Labriola
Dissonant Paradigms And Unintended Consequences: Can (And Should) The Law Save Us From Technology?, Donald Labriola
Richmond Journal of Law & Technology
Technologies like digital audio, the Internet, and broadband communications spur economic growth and foster new patterns of commerce and social interaction. But they also spawn disruptive innovations that force established industries to forge novel responses or risk falling by the wayside. The horse-and-buggy industry, vaudeville, and video-rental stores are but a few examples of thriving markets that found themselves on the scrap heap of obsolescence because they failed to react quickly to the devastating effects of new technology.
Electronic Discovery In Large Organizations, Jason Fliegel, Robert Entwisle
Electronic Discovery In Large Organizations, Jason Fliegel, Robert Entwisle
Richmond Journal of Law & Technology
The continuing expansion and virtually limitless array of technology and media available to store electronic information has had an immeasurable impact on the amount of information large organizations create and maintain. In many instances, this information continues to be available long after it has served the originator’s purposes. Yet, such information is not exempt from discovery in litigation, and attempting to identify, preserve, collect, review, and produce that information results in a significant burden on litigants, while the failure to do so can result in draconian sanctions or adverse publicity.