Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- ISP (2)
- UCITA (2)
- UETA (2)
- Arizona Retail Systems Inc. v. Software Link (1)
- Barbri (1)
-
- Berger v. New York (1)
- Biennial Symposium (1)
- Bloom v. Commonwealth (1)
- Brower v. Gateway 200 Inc. (1)
- Buspirone Patent and Antitrust Litigation (1)
- C. Itoh & Co. v. Jordan International Co. (1)
- CALEA (1)
- CMA (1)
- COPPA (1)
- CRADA (1)
- Caspi v. Microsoft Network LLC (1)
- CcTLD (1)
- Children's Online Privacy Protection Act (1)
- Code Red (1)
- Communications Assistance for Law Enforcement Act (1)
- Community for Creative Non-Violence v. Reid (1)
- CompuServe Inc. v. Cyber Promotions (1)
- Computer Fraud and Abuse Act of 1986 (1)
- Computer Misuse Act (1)
- Computer Virus Eradication Act (1)
- Computer crimes (1)
- Cooperative Research and Development Agreement (1)
- Copyright Act (1)
- Council of Europe (1)
- Country code top-level domains (1)
Articles 1 - 11 of 11
Full-Text Articles in Law
Technology Law, J. Douglas Cuthbertson, Glen L. Gross
Technology Law, J. Douglas Cuthbertson, Glen L. Gross
University of Richmond Law Review
No abstract provided.
Letter From The Editor, Paul A. Fritzinger
Letter From The Editor, Paul A. Fritzinger
Richmond Journal of Law & Technology
Welcome to Volume VIII, Issue 3, The Richmond Journal of Law & Technology's final issue of the 2001-2002 academic year. In this issue, the Journal breaks from tradition for the second time this year and presents its readers with a unique reading experience. Because we received a wealth of outstanding student submissions, we decided to dedicate this installment of the Journal to those students we feel have presented us with particularly outstanding and insightful pieces. We hope you will enjoy them as much as we did.
Fbi Internet Surveillance: The Need For A Natural Rights Application Of The Fourth Amendment To Insure Internet Privacy, Catherine M. Barrett
Fbi Internet Surveillance: The Need For A Natural Rights Application Of The Fourth Amendment To Insure Internet Privacy, Catherine M. Barrett
Richmond Journal of Law & Technology
Last year, the Federal Bureau of Investigation (“FBI”) acknowledged that it used an Internet electronic surveillance system called Carnivore to investigate and prosecute criminal suspects in more than two dozen cases. Carnivore is a software program developed by the FBI that can be installed on the network of an Internet Service Provider (“ISP”), such as America Online, to monitor, intercept and collect e-mail messages and other Internet activity made and received by individuals suspected of criminal activity. To date, the full capability of Carnivore remains a secret—the FBI refuses to disclose the source code (computer language) that would reveal how …
The Legislative Response To The Evolution Of Computer Viruses, Mark R. Colombell
The Legislative Response To The Evolution Of Computer Viruses, Mark R. Colombell
Richmond Journal of Law & Technology
On July 19, 2001, and again on July 31, 2001, the United States Government was attacked by a worm. The Code Red worm, a malevolent computer program, spread across the Internet impacting thousands of computers globally. The initial target of the Code Red worm was the White House website. Just days after the terrorist attacks in New York, Washington D.C., and Pennsylvania on September 11, the Nimda virus was unleashed on the Internet. By consuming up to ten percent of the Internet's capacity, Nimda quickly received the distinction as the worst computer infestation to date.
Letter From The Editor, John Joseph Meadows
Letter From The Editor, John Joseph Meadows
Richmond Journal of Law & Technology
Welcome, readers, to the ninth year of publication at the Richmond Journal of Law and Technology. The entire Journal Editorial Board and Staff are pleased to report that our inundation with submissions since last Spring has permitted us to be quite choosy in selecting articles for this Issue and we hope you will enjoy them and find them to be insightful and current.
In Search Of A Balance Between Police Power And Privacy In The Cybercrime Treaty, D.C. Kennedy
In Search Of A Balance Between Police Power And Privacy In The Cybercrime Treaty, D.C. Kennedy
Richmond Journal of Law & Technology
Imagine that you wake up one morning, turn on your computer, and open an e-mail message with a catchy phrase in the subject line. Immediately after opening the e-mail’s attachment, your personal computer is severely damaged. Obviously having a bad day, you head to your job as an attorney for a multinational corporation. By the time you arrive at work, there has been damage to company computers across the globe. The monetary costs of the damage, coupled with the downtime, are astronomical. The CEO of your company is furious. You hope to diffuse the situation by informing your boss that …
Digital Handshakes In Cyberspace Under E-Sign: "There's A New Sheriff In Town!", Michael H. Dessent
Digital Handshakes In Cyberspace Under E-Sign: "There's A New Sheriff In Town!", Michael H. Dessent
University of Richmond Law Review
Without doubt, electronic commerce has increased the efficiency of businesses and consumers seeking to purchase goods, services, or intangibles by placing these objects just a keystroke away. If you already enjoy buying lingerie and foie gras over the Internet, you will love the new Electronic Signatures in Global and National Commerce Act ("E-SIGN") Want to borrow $10,000 at four in the morning over the Internet to buy a car? E-SIGN allows it. Or how about entering a "cybersigning chat room," extending a "digital handshake," and then buying that cherished wedding gown? E-SIGN allows this to happen. In this era of …
Bloom V. Commonwealth: Identifying The Face Behind The Instant Message, Jessica Clair Cobaugh
Bloom V. Commonwealth: Identifying The Face Behind The Instant Message, Jessica Clair Cobaugh
Richmond Journal of Law & Technology
"You have an instant message from Naturalbornkiller2000. Would you like to accept it?" A similar message to this one flashes on computers throughout the United States and the world, inviting computer users to "chat" or "IM" with friends, family and perfect strangers alike. While the opportunity to engage in real-time conversation over the Internet provides an interesting and often less expensive way to keep in touch with friends or to meet new people, instant messages and other Internet communications increasingly appear as a means for adults to interact inappropriately with young children. The use of Internet communication for the solicitation …
Sovereign Domains: A Declaration Of Independence Of Cctlds From Foreign Control, Kim G. Von Arx, Gregory R. Hagan
Sovereign Domains: A Declaration Of Independence Of Cctlds From Foreign Control, Kim G. Von Arx, Gregory R. Hagan
Richmond Journal of Law & Technology
In the year 2000, the Government Advisory Committee (“GAC”) of the Internet Corporation for Assigned Names and Numbers (“ICANN”) passed a set of principles that essentially claimed national sovereignty over country code top-level domains (“ccTLD”s) such as .us, .ca, .uk and .au. Shortly thereafter, ICANN redelegated several ccTLDs in accordance with new GAC principles. Despite the outcry accompanying the passage of these principles and ICANN’s self-professed adherence thereto, the entire exercise could easily be criticized as merely symbolic because of the overriding power of ICANN in the operation of the Domain Name System (“DNS”). Indeed, Stuart Lynn, ICANN’s current president, …
The Legal Implications Of Online Universities, Elizabeth D. Kaiser
The Legal Implications Of Online Universities, Elizabeth D. Kaiser
Richmond Journal of Law & Technology
Aspiring screen writers, novelists and photographers need not look any further than the closest computer and Internet connection to learn tools of the trade from experts in the entertainment field. Through the Online Extension Program at the University of California, Los Angeles, a student can learn television script writing from a Hollywood professional and earn a UCLA diploma from a desktop computer as far away as Omaha, Nebraska.
Cyberian Signals, Steven A. Hetcher
Cyberian Signals, Steven A. Hetcher
University of Richmond Law Review
In Law and Social Norms, Eric Posner offers an original and important theory of the emergence of norms. According to Posner, norms are collections of signals. He develops his signaling account in a variety of contexts, including criminal law, family law, political participation, and racial discrimination. This article extends Posner's theory to cyberspace, a domain of social organization not touched on in Posner's book. In particular, I will test Posner's theory by examining how well it explains the emergence of Web site privacy norms. Part One will examine signaling theory. Part Two will explore privacy norms in some detail, and …