Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Child Pornography Prevention Act (2)
- A Review of the Law in Jurisdictions Requiring Electronic Recording of Custodial Interrogations (1)
- And Consequences Resulting From (1)
- Ashcroft v. ACLU (1)
- Ashcroft v. Free Speech Coalition (1)
-
- Audio Home Recording Act (1)
- Bending Broken Rules: The Fourth Amendment Implication of Full-Body Scanners in Preflight Screening (1)
- Betamax Case (1)
- BitTorrent (1)
- Blast off? – Strict Liability’s Potential Role in the Development of the Commercial Space Market (1)
- Brown v. Allen (1)
- COPA (1)
- CPPA (1)
- Child Online Protection Act (1)
- Columbia Pictures v. Bunnell (1)
- DMCA (1)
- Darknet (1)
- Dart v. Craigslist (1)
- Digital Millennium Copyright Act (1)
- EFF (1)
- ESI (1)
- Electronic Frontier Foundation (1)
- Electronic Recordation of Custodial Interrogations Act (1)
- Electronically stored information (1)
- Equity Analysis LLC v. Analytics (1)
- F2F (1)
- Facebook Insights (1)
- Federal Rules of Civil Procedure (1)
- Federal Sentencing Guidelines (1)
- Fire Pattern Analysis Junk Science Old Wives Tales and Ipse Dixit: Emerging Forensic 3D Imaging Technologies to the Rescue? (1)
Articles 1 - 9 of 9
Full-Text Articles in Law
Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Francis C. Oroszlan
Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Francis C. Oroszlan
Richmond Journal of Law & Technology
The Richmond Journal of Law and Technology is proud to present the first issue of the 2010–2011 academic year. This issue addresses topics ranging across the legal and technological spectrums, and tackles subject matter at the forefront and future of legal debate.
A Review Of The Law In Jurisdictions Requiring Electronic Recording Of Custodial Interrogations, Alan M. Gershel
A Review Of The Law In Jurisdictions Requiring Electronic Recording Of Custodial Interrogations, Alan M. Gershel
Richmond Journal of Law & Technology
Although not constitutionally required, it has become considerably more commonplace for law enforcement to electronically record a suspect’s custodial interrogation. This includes a complete recording, beginning with the advice of rights and continuing through the end of the interrogation. In fact, society now recognizes it as a useful, if not necessary, tool for law enforcement.
Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Robert Michaux
Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Robert Michaux
Richmond Journal of Law & Technology
The Richmond Journal of Law and Technology is proud to present the fourth issue of the 2009–2010 academic year. In this issue, we explore the ever expanding duties of counsel responsible for electronically stored information, the application of 3D imaging technology to improve arson investigation, and the need for expanding copyright protection over the lawless Darknet.
Making The Punishment Fit The (Computer) Crime: Rebooting Notions Of Possession For The Federal Sentencing Of Child Pornography Offenses, Jelani Jefferson Exum
Making The Punishment Fit The (Computer) Crime: Rebooting Notions Of Possession For The Federal Sentencing Of Child Pornography Offenses, Jelani Jefferson Exum
Richmond Journal of Law & Technology
Sexual exploitation of children is a real and disturbing problem. However, when it comes to the sentencing of child pornography possessors, the U.S. federal system has a problem, as well. This Article adds to the current, heated discussion on what is happening in the sentencing of federal child pornography possession offenses, why nobody is satisfied, and how much the Federal Sentencing Guidelines are to blame. At the heart of this Article are the forgotten players in the discussion—computers and the Internet—and their role in changing the realities of child pornography possession. This Article argues that computers and the Internet are …
Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Nancy Porcari
Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Nancy Porcari
Richmond Journal of Law & Technology
The Richmond Journal of Law and Technology is proud to present our Annual Survey issue, the third issue of the 2009–2010 academic year.
The Expanding Duties Of Esi And In-House Counsel: Providing Defensible Preservation And Production Efforts After Swofford V. Eslinger, David W. Degnan
The Expanding Duties Of Esi And In-House Counsel: Providing Defensible Preservation And Production Efforts After Swofford V. Eslinger, David W. Degnan
Richmond Journal of Law & Technology
As a general rule, companies and government agencies should plan for preservation and production before litigation is probable. This means having a document retention program. These programs ensure that documents are retained or deleted in an orderly fashion. If a company properly follows its policies and procedures, this retention program acts as a “shield” against the incomplete preservation of relevant (or “hot”) documents deleted before the proper initiation of a litigation hold. If parties do not follow, or inconsistently follow, such a program, they might have to explain what happened to a missing relevant document. Thus, a retention program might …
Protecting The Children: Challenges That Result In, And Consequences Resulting From, Inconsistent Prosecution Of Child Pornography Cases In A Technical World, Francis S. Monterosso
Protecting The Children: Challenges That Result In, And Consequences Resulting From, Inconsistent Prosecution Of Child Pornography Cases In A Technical World, Francis S. Monterosso
Richmond Journal of Law & Technology
Of all the sinister things that Internet viruses do, this might be the worst: They can make you an unsuspecting collector of child pornography. Heinous pictures and videos can be deposited on computers by viruses—the malicious programs better known for swiping your credit card numbers. In this twist, it’s your reputation that’s stolen. Pedophiles can exploit virus-infected PCs to remotely store and view their stash without fear they’ll get caught. Pranksters or someone trying to frame you can tap viruses to make it appear that you surf illegal Web sites. Whatever the motivation, you get child porn on your computer—and …
The Darknet: A Digital Copyright Revolution, Jessica A. Wood
The Darknet: A Digital Copyright Revolution, Jessica A. Wood
Richmond Journal of Law & Technology
We are in the midst of a digital revolution. In this “Age of Peer Production,” armies of amateur participants demand the freedom to rip, remix, and share their own digital culture. Aided by the newest iteration of file sharing networks, digital media users now have the option to retreat underground, by using secure, private, and anonymous file sharing networks, to share freely and breathe new life into digital media. These underground networks, collectively termed “the Darknet[,] will grow in scope, resilience, and effectiveness in direct proportion to [increasing] digital restrictions the public finds untenable.” The Darknet has been called the …
The Not-So-Risky Business Of High-End Escorts And The Internet In The 21st Century, Robert Rigg
The Not-So-Risky Business Of High-End Escorts And The Internet In The 21st Century, Robert Rigg
Richmond Journal of Law & Technology
Prostitution is often referred to as “the world’s oldest profession.” It is defined as “[t]he act or practice of engaging in sexual activity for money or its equivalent.” As a service industry, it fulfills specific human desires. Nevertheless, most states condemn and criminalize both the act of prostitution and those who solicit such services.