Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- UIC School of Law (21)
- Schulich School of Law, Dalhousie University (15)
- New York Law School (6)
- University of Washington School of Law (4)
- Vanderbilt University Law School (3)
-
- Brooklyn Law School (2)
- University at Buffalo School of Law (2)
- University of Michigan Law School (2)
- University of New Hampshire (2)
- University of the Pacific (2)
- City University of New York (CUNY) (1)
- Columbia Law School (1)
- Loyola University Chicago, School of Law (1)
- Selected Works (1)
- Singapore Management University (1)
- University of Arkansas at Little Rock William H. Bowen School of Law (1)
- University of Baltimore Law (1)
- University of Maine School of Law (1)
- Washington University in St. Louis (1)
- Washington and Lee University School of Law (1)
- Keyword
-
- Privacy (11)
- First Amendment (5)
- Book reviews (3)
- E-commerce (3)
- Copyright (2)
-
- Data mining (2)
- Information (2)
- Internet (2)
- Regulation (2)
- Telecommunications (2)
- 9/11 (1)
- Access (1)
- Administration publique (1)
- Adverse inferences (1)
- Arkansa Office of the Executive Chief Information Officer (1)
- Arkansas ECIO Office (1)
- Baudrillard (1)
- Big data (1)
- Biobanks (1)
- Biopiracy (1)
- Broadband (1)
- Broadcasting legislation (1)
- CRTC (1)
- Canada (1)
- Capital punishment (1)
- Character-based retribution (1)
- Collection (1)
- Commercial relationships (1)
- Commercial value (1)
- Commodification (1)
- Publication
-
- UIC John Marshall Journal of Information Technology & Privacy Law (16)
- Canadian Journal of Law and Technology (14)
- NYLS Law Review (6)
- UIC Law Review (4)
- Faculty Scholarship (3)
-
- Washington Journal of Law, Technology & Arts (3)
- Articles (2)
- Buffalo Intellectual Property Law Journal (2)
- Vanderbilt Journal of Entertainment & Technology Law (2)
- All Faculty Scholarship (1)
- Articles, Book Chapters, & Popular Press (1)
- Faculty Publications (1)
- Law Faculty Scholarship (1)
- McGeorge Law Review (1)
- McGeorge School of Law Scholarly Articles (1)
- Michigan Telecommunications & Technology Law Review (1)
- Public Interest Law Reporter (1)
- Publications and Research (1)
- Research Collection Yong Pung How School Of Law (1)
- Scholarly Articles (1)
- Scholarship@WashULaw (1)
- Stephen E Henderson (1)
- The University of New Hampshire Law Review (1)
- UIC Law White Papers (1)
- University of Arkansas at Little Rock Law Review (1)
- Vanderbilt Law School Faculty Publications (1)
- Publication Type
Articles 31 - 60 of 69
Full-Text Articles in Law
Cleaning Metadata On The World Wide Web: Suggestions For A Regulatory Approach, 24 J. Marshall J. Computer & Info. L. 531 (2006), Marcel Gordon
Cleaning Metadata On The World Wide Web: Suggestions For A Regulatory Approach, 24 J. Marshall J. Computer & Info. L. 531 (2006), Marcel Gordon
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Copyright Misuse Doctrine On Computer Software: A Redundant Doctrine Of U.S. Copyright Law Or A Necessary Addition To E.U. Copyright Law?, 24 J. Marshall J. Computer & Info. L. 571 (2006), Haris Apostolopoulos
The Copyright Misuse Doctrine On Computer Software: A Redundant Doctrine Of U.S. Copyright Law Or A Necessary Addition To E.U. Copyright Law?, 24 J. Marshall J. Computer & Info. L. 571 (2006), Haris Apostolopoulos
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Provisional Relief In Transnational Litigation In The Internet Era: What Is In The Us Best Interest?, 24 J. Marshall J. Computer & Info. L. 263 (2006), Panagiota Kelali
Provisional Relief In Transnational Litigation In The Internet Era: What Is In The Us Best Interest?, 24 J. Marshall J. Computer & Info. L. 263 (2006), Panagiota Kelali
UIC John Marshall Journal of Information Technology & Privacy Law
Using the hypothetical of a college student victimized by a fraudulent website, this comment addresses the issue of Internet fraud. In the example presented, the perpetrators are Greek nationals located in Greece. Focusing on the intangible and international nature of the Internet, the comment addresses the complications surrounding litigating an Internet fraud case. The issues discussed include a determination of the forum where the suit should be brought, preservation of the status quo pending determination of the dispute, and the status of a transnational cooperation on the issue of recognition and enforcement of judgments. The comment presents the options available …
Transsexuals And The Family Medical Leave Act, 24 J. Marshall J. Computer & Info. L. 315 (2006), Charles Thomas Little
Transsexuals And The Family Medical Leave Act, 24 J. Marshall J. Computer & Info. L. 315 (2006), Charles Thomas Little
UIC John Marshall Journal of Information Technology & Privacy Law
This article examines the implications for transsexuals seeking sexual reassignment surgery (“SRS”) under the Family Medical Leave Act (“FMLA”). Currently, the scant case law pertaining to the FMLA suggests that the statutes and regulations will likely fail to provide even minimal protection to transsexuals. If applied literally, the FMLA may present barriers to transsexuals seeking SRS in opposition to the true purpose behind the Act, which is to allow employees the opportunity to take reasonable leave from work by mandating more medical leave than the employers might otherwise be willing to grant for things such as the adoption or birth …
Borders Online, Llc V. State Board Of Equalization: It's Time For Congress To Weigh The Possibilities Of This California Decision, 24 J. Marshall J. Computer & Info. L. 641 (2006), Ronnie E. Webb
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Twenty-Fifth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 24 J. Marshall J. Computer & Info. L. 673 (2006), David E. Sorkin, Larisa V. Benitez-Morgan, J. Preston Carter, William P. Greubel Iii, Matthew Hector, Kellen Keaty, Lisa Rodriguez
The Twenty-Fifth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 24 J. Marshall J. Computer & Info. L. 673 (2006), David E. Sorkin, Larisa V. Benitez-Morgan, J. Preston Carter, William P. Greubel Iii, Matthew Hector, Kellen Keaty, Lisa Rodriguez
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Twenty-Fifth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 24 J. Marshall J. Computer & Info. L. 699 (2006), Chris Norris, Justin Sisemore, Anndi Queenan
The Twenty-Fifth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 24 J. Marshall J. Computer & Info. L. 699 (2006), Chris Norris, Justin Sisemore, Anndi Queenan
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Twenty-Fifth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 24 J. Marshall J. Computer & Info. L. 733 (2006), Timothy T. Hsieh, Jennifer Simmen Lewin, Jerome C. Pandell
The Twenty-Fifth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 24 J. Marshall J. Computer & Info. L. 733 (2006), Timothy T. Hsieh, Jennifer Simmen Lewin, Jerome C. Pandell
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Intellectual Property Rights At The Crossroad Between Monopolization And Abuse Of Dominant Position: American And European Approaches Compared, 24 J. Marshall J. Computer & Info. L. 455 (2006), Emanuela Arezzo
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Gathering Twilight? Information Privacy On The Internet In The Post-Enlightenment Era, 24 J. Marshall J. Computer & Info. L. 353 (2006), Mark F. Kightlinger
The Gathering Twilight? Information Privacy On The Internet In The Post-Enlightenment Era, 24 J. Marshall J. Computer & Info. L. 353 (2006), Mark F. Kightlinger
UIC John Marshall Journal of Information Technology & Privacy Law
This Article provides a timely examination of U.S. law and policy concerning information privacy on the Internet, a subject that receives almost daily attention in the press. This Article constructs a new theoretical framework from the writings of Alasdair MacIntyre, a major contemporary philosopher and social theorist. Over the past 30 years, MacIntyre has examined the roots and continuing impact of the failure of post-Enlightenment thinkers to produce an account of human nature and action that could replace an older Aristotelian account and command the assent of all rational persons. In addition to extending MacIntyre’s examination of our post-Enlightenment situation, …
Contribution To The Understanding Of The Public Domain, 24 J. Marshall J. Computer & Info. L. 411 (2006), Vincenzo Vinciguerra
Contribution To The Understanding Of The Public Domain, 24 J. Marshall J. Computer & Info. L. 411 (2006), Vincenzo Vinciguerra
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
A Comedy Of Errors: Defining "Component" In A Global Information Technology Market - Accounting For Innovation By Penalizing The Innovators, 24 J. Marshall J. Computer & Info. L. 507 (2006), William Greubel
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Revisiting The American Action For Public Disclosure Of Facts, Brian C. Murchison
Revisiting The American Action For Public Disclosure Of Facts, Brian C. Murchison
Scholarly Articles
None available.
Arkansas’S Public Records Retention Program: Records Retention As A Cornerstone Of Citizenship And Self-Government, Richard J. Peltz
Arkansas’S Public Records Retention Program: Records Retention As A Cornerstone Of Citizenship And Self-Government, Richard J. Peltz
University of Arkansas at Little Rock Law Review
No abstract provided.
Lost In Translation? Data Mining, National Security And The Adverse Inference Problem, Anita Ramasastry
Lost In Translation? Data Mining, National Security And The Adverse Inference Problem, Anita Ramasastry
Articles
To the extent that we permit data mining programs to proceed, they must provide adequate due process and redress mechanisms that permit individuals to clear their names. A crucial criteria for such a mechanism is to allow access to information that was used to make adverse assessments so that errors may be corrected. While some information may have to be kept secret for national security purposes, a degree of transparency is needed when individuals are trying to protect their right to travel or access government services free from suspicion.
Part II of this essay briefly outlines the government's ability to …
In The Service Of Secrets: The U.S. Supreme Court Revisits Totten, 39 J. Marshall L. Rev. 475 (2006), Douglas Kash, Matthew Indrisano
In The Service Of Secrets: The U.S. Supreme Court Revisits Totten, 39 J. Marshall L. Rev. 475 (2006), Douglas Kash, Matthew Indrisano
UIC Law Review
No abstract provided.
Hitching A Ride: Every Time You Take A Drive, The Government Is Riding With You, 39 J. Marshall L. Rev. 1499 (2006), Benjamin Burnham
Hitching A Ride: Every Time You Take A Drive, The Government Is Riding With You, 39 J. Marshall L. Rev. 1499 (2006), Benjamin Burnham
UIC Law Review
No abstract provided.
Equal Protection In The World Of Art And Obscenity: The Art Photographer's Latent Struggle With Obscenity Standards In Contemporary America, Elaine Wang
Vanderbilt Journal of Entertainment & Technology Law
Part I of this article describes the initial hurdles that all visual art forms, including photography, face with respect to First Amendment protection given the power of visual imagery and the three-pronged test for obscenity set forth in Miller v. California. Of particular relevance is the "serious artistic value" prong of the Miller test and the problems inherent in determining who is to judge as well as how one might judge whether a work, particularly a photograph that may be construed to have a non-artistic function, possesses "serious artistic value."
Part II addresses the overall approach to photography in three …
A Feeling Of Unease About Privacy Law, Ann Bartow
A Feeling Of Unease About Privacy Law, Ann Bartow
Law Faculty Scholarship
This essay responds to Daniel Solove's recent article, A Taxonomy of Privacy. I have read many of Daniel Solove's privacy-related writings, and he has made many important scholarly contributions to the field. As with his previous works about privacy and the law, it is an interesting and substantive piece of work. Where it falls short, in my estimation, is in failing to label and categorize the very real harms of privacy invasions in an adequately compelling manner. Most commentators agree that compromising a person's privacy will chill certain behaviors and change others, but a powerful list of the reasons why …
Consumer Privacy And Radio Frequency Identification Technology, Teresa Scassa, Theodore Chiasson, Michael Deturbide, Anne Uteck
Consumer Privacy And Radio Frequency Identification Technology, Teresa Scassa, Theodore Chiasson, Michael Deturbide, Anne Uteck
Articles, Book Chapters, & Popular Press
Radio Frequency ID tags are poised to replace the UPC barcode as a mechanism for inventory control in the wholesale and retail contexts. Yet the tiny chips offer a range of potential uses that go beyond the bar code. In this paper the authors define RFID technology and its applications. They explore the privacy implications of this technology and consider recent attempts in the U.S. and European Union to grapple with the privacy issues raised by the deployment of RFIDs at the retail level. The authors then consider the extent to which Canada's Personal Information Protection and Electronic Documents Act …
The French "Headscarves Ban": Intolerance Or Necessity?, 40 J. Marshall L. Rev. 235 (2006), Reuven (Ruvi) Ziegler
The French "Headscarves Ban": Intolerance Or Necessity?, 40 J. Marshall L. Rev. 235 (2006), Reuven (Ruvi) Ziegler
UIC Law Review
No abstract provided.
If You Love Me Dear, Please Sign Here: Will The "Love Contract" Play A Role In Protecting Employers From Sexual Harassment Liability?, 40 J. Marshall L. Rev. 311 (2006), Jessica Lynn Mok O'Neill
If You Love Me Dear, Please Sign Here: Will The "Love Contract" Play A Role In Protecting Employers From Sexual Harassment Liability?, 40 J. Marshall L. Rev. 311 (2006), Jessica Lynn Mok O'Neill
UIC Law Review
No abstract provided.
Hipaa-Cracy, Carl E. Schneider
Hipaa-Cracy, Carl E. Schneider
Articles
The Department of Health and Human Services has recently been exercising its authority under the (wittily named) "administrative simplification" part of the Health Insurance Portability and Accountability Act to regulate the confidentiality of medical records. I love the goal; I loathe the means. The benefits are obscure; the costs are onerous. Putatively, the regulations protect my autonomy; practically, they ensnarl me in red tape and hijack my money for services I dislike. HIPAA (a misnomer-HIPAA is the statute, not the regulations) is too lengthy, labile, complex, confused, unfinished, and unclear to be summarized intelligibly or reliably. (Brevis esse laboro, …
The Privacy Gambit: Toward A Game Theoretic Approach To International Data Protection, Horace E. Anderson Jr.
The Privacy Gambit: Toward A Game Theoretic Approach To International Data Protection, Horace E. Anderson Jr.
Vanderbilt Journal of Entertainment & Technology Law
This article briefly explores several scenarios in which economic actors compete and cooperate in order to capture the value in personal information. The focus then shifts to one particular scenario: the ongoing interaction between the United States and the European Union in attempting to construct data protection regimes that serve the philosophies and citizens of each jurisdiction as well as provide a strategic economic advantage. A game theoretic model is presented to explain the course of dealings between the two actors, including both unilateral and bilateral actions. Part I ends with an exploration of opportunities for seizing competitive advantage, and …
Privacy Law In The New Millennium: A Tribute To Richard C. Turkington, Gregory P. Magarian
Privacy Law In The New Millennium: A Tribute To Richard C. Turkington, Gregory P. Magarian
Scholarship@WashULaw
At least since Louis Brandeis and Samuel Warren's seminal 1890 article "The Right to Privacy,"' the idea of privacy has sparked some of the most significant and contentious debates in American law. Over the past three decades, Richard Turkington focused his formidable intellect on enriching those debates. Dick's untimely passing in 2004 deprived those of us who knew and worked with him of a treasured friend and a brilliant colleague. The broader legal profession lost a visionary. Probably more than any other scholar of his generation, Dick was responsible for expanding and deepening our understanding of the essential, sometimes elusive, …
Beyond Patents: The Cultural Life Of Native Healing And The Limitations Of The Patent System As A Protective Mechanism For Indigenous Knowledge On The Medicinal Uses Of Plants, Ikechi Mgbeoji
Canadian Journal of Law and Technology
The question that this paper seeks to tackle is whether in the contest of allegations of biopiracy and in the search for effective mechanisms for the protection of indigenous knowledge of the medicinal uses of plants possessed by traditional healers of southern Nigeria, there is any role for the patent regime. Given the popularity of alternative forms of health care, this question is of importance in contemporary discourse.
Liability For Botnet Attacks, Jennifer A. Chandler
Liability For Botnet Attacks, Jennifer A. Chandler
Canadian Journal of Law and Technology
This paper will consider the possibility of using tort liability to address cyber insecurity. In previous work, I have proposed a hypothetical lawsuit by the victim of a DDoS attack against the vendor of unreasonably insecure software, the flaws of which are exploited to create the DDoS attack army. Indeed, software vendors are facing increasing public disapproval for their contributions to cyber insecurity. However, not all DDoS attack armies are assembled by exploiting flaws in software. Computers are also infected when users voluntarily open infected email attachments or download infected files from file-sharing networks. Accordingly, the cyber insecurity resulting from …
Rfid Et Administration Publique: Le Citoyen Sous Surveillance?, Anthony Hémond
Rfid Et Administration Publique: Le Citoyen Sous Surveillance?, Anthony Hémond
Canadian Journal of Law and Technology
Lorsque les gouvernements et l’Administration se lancent dans la mise en place d’une nouvelle technologie, il leur faut, au préalable, analyser les enjeux et les risques de ce déploiement.
Tel sera l’essentiel de nos développements. Nous verrons comment, notamment à travers la mise en place du e-passeport, la technologie RFID peut être intégrée au sein de l’Administration. Le choix de cette nouvelle génération de passeports n’est pas anodin: si dans certains domaines les donne ́es qu’ils contiennent sont précieuses, dans d’autres, notamment celui de la santé, les informations sur les personnes sont très sensibles. Il faut donc maîtriser les risques …
Review Of Legal Issues In Electronic Commerce, 2nd Edition (Concord, Ontario: Captus Press, 2005), Chidi Oguamanam
Review Of Legal Issues In Electronic Commerce, 2nd Edition (Concord, Ontario: Captus Press, 2005), Chidi Oguamanam
Canadian Journal of Law and Technology
This collection of materials is part of the Canadian Legal Studies Series. According to the publishers, the objective of the Series is to offer ‘‘a wealth of carefully selected, and up-to-date examinations of Canadian legal issues’’. The first of such collections under the same title appeared in 2002. According to Takach, one of the dynamics of computer, and indeed information technology, law is rapid change in technology trends. Thus, after two years, technological developments and corresponding legal responses on the subject of electronic commerce warrant a new edition of materials of this nature.
Remembering The Public Domain, Christine Galbraith Davik
Remembering The Public Domain, Christine Galbraith Davik
Faculty Publications
Rapid advances in communication technology over the past decade have resulted in the previously unimaginable ability to seamlessly exchange ideas and data on a global basis. Nonetheless, despite the undeniable progress that has been made, access to information is ironically becoming progressively more. This is due in large part to the fact that resources which belong in the public domain are increasingly being transformed into private property. The carefully balanced provisions of copyright law are gradually becoming displaced by contractual, technological, and legislative constraints that allow for the tight control of access to and use of the materials in question. …