Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Law

PDF

Journal

2004

Institution
Keyword
Publication

Articles 31 - 60 of 78

Full-Text Articles in Law

The Accidental And Inherent Anticipation Doctrines: Where Do We Stand And Where Are We Going?, 4 J. Marshall Rev. Intell. Prop. L. 63 (2004), Anne Brown, Mark Polyakov Jan 2004

The Accidental And Inherent Anticipation Doctrines: Where Do We Stand And Where Are We Going?, 4 J. Marshall Rev. Intell. Prop. L. 63 (2004), Anne Brown, Mark Polyakov

UIC Review of Intellectual Property Law

It is often unclear when a prior occurrence or disclosure of a claimed invention falls under the patent law doctrines of inherent or accidental anticipation. Courts have applied various tests in determining whether anticipation is inherent or accidental, and the cases are difficult to reconcile. Tests seemingly dispositive to establish an accident in one case may also appear dispositive to establish inherency. As a result of our analysis, we have developed a two-step test that can be used to reconcile the two doctrines and determine whether a product or process anticipates. The first prong is concerned with whether the prior …


Geo-Location Technologies And Other Means Of Placing Borders On The 'Borderless' Internet, 23 J. Marshall J. Computer & Info. L. 101 (2004), Dan Jerker B. Svantenson Jan 2004

Geo-Location Technologies And Other Means Of Placing Borders On The 'Borderless' Internet, 23 J. Marshall J. Computer & Info. L. 101 (2004), Dan Jerker B. Svantenson

UIC John Marshall Journal of Information Technology & Privacy Law

Until recently it was considered impossible or at least pointless to attempt to identify the actual geographic location of Internet users in the online environment. However, this is changing and, although extremely accurate geographical identifiers do not exist, more geo-location technologies are used to track the location of the Internet users for a variety of reasons such as fraud detection, authentication, content targeting, security and network efficiency, conditioning access and legal compliance. The article distinguishes between hard protection provided by geo-location technologies and soft protection provided by non-technical means. It then proceeds in presenting and examining the geo-location technologies, sophisticated …


Open And Closed: Captioning Technology As A Means To Equality, 23 J. Marshall J. Computer & Info. L. 159 (2004), Faye Kuo Jan 2004

Open And Closed: Captioning Technology As A Means To Equality, 23 J. Marshall J. Computer & Info. L. 159 (2004), Faye Kuo

UIC John Marshall Journal of Information Technology & Privacy Law

It is well known that going to the movies is an extremely popular pastime for the Americans. However for millions of Americans who are deaf or hard of hearing this is not something that they can enjoy in the same terms as the rest of the other movie goers since most movie theater operators consider that providing “equal access” to deaf or hard of hearing individuals consists only of allowing them to enter the theater, purchase and ticket and sit down not install captioning technology so that deaf or hard of hearing individuals could actually understand the movie shown. The …


To: Client@Workplace.Com: Privilege At Risk?, 23 J. Marshall J. Computer & Info. L. 75 (2004), Dion Messer Jan 2004

To: Client@Workplace.Com: Privilege At Risk?, 23 J. Marshall J. Computer & Info. L. 75 (2004), Dion Messer

UIC John Marshall Journal of Information Technology & Privacy Law

As more attorneys now days use the e-mail as their primary source of communication with their clients, new issues arise regarding the potential threat to attorney-client communication privilege resulting from the standard and systematic employer monitoring of their employees e-mails. Indeed employers monitor their employees’ computer use and in some cases terminate employees as result of this monitoring, for various reasons such as to increase of employee productivity and efficiency, protect their public image, prevent workplace harassment, protect their Intellectual Property assets and their network capacity. Given the systematic workplace monitoring but also the fact that contrary to the American …


The Truth About The Truth In Domain Names Act: Why This Recently Enacted Law Is Unconstitutional, 23 J. Marshall J. Computer & Info. L. 141 (2004), Michael Honig Jan 2004

The Truth About The Truth In Domain Names Act: Why This Recently Enacted Law Is Unconstitutional, 23 J. Marshall J. Computer & Info. L. 141 (2004), Michael Honig

UIC John Marshall Journal of Information Technology & Privacy Law

In April 2003 the Prosecutorial Remedies and other Tools to End the Exploitation of Children Today Act of 2003 (PROTECT Act) was enacted with the goal to protect children from abduction and abuse and achieve a more aggressive pursuit of the individuals committing crimes against the children. Although the AMBER Alert system is the most known portion of the legislation other provisions including the Truth in Domain Names Act (TDNA) making the use of a misleading Internet domain name to deceive a person to view pornography a criminal offense were also included. This comment first discusses the case of John …


Lessons For The Hague: Internet Jurisdiction In Contract And Tort Cases In The European Community And The United States, 23 J. Marshall J. Computer & Info. L. 1 (2004), Moritz Keller Jan 2004

Lessons For The Hague: Internet Jurisdiction In Contract And Tort Cases In The European Community And The United States, 23 J. Marshall J. Computer & Info. L. 1 (2004), Moritz Keller

UIC John Marshall Journal of Information Technology & Privacy Law

With the increasing use of the Internet, all on-line users, web site owners, e-commerce companies and consumers alike, feel the need to be able to rely on clear standards for a potential contract or tort lawsuit following the Internet presence that could lead to multinational litigation. This goal could be achieved if the negotiations of the Hague Convention on international jurisdiction and enforcement of foreign judgments in civil and commercial matters succeed in harmonizing the rules of the different legal systems around the globe, or at least create a minimum standard for legal cases which would benefit greatly e-commerce and …


Privatizing Information And Information Technology – Whose Life Is It Anyway?, 22 J. Marshall J. Computer & Info. L. 375 (2004), Ellen Dannin Jan 2004

Privatizing Information And Information Technology – Whose Life Is It Anyway?, 22 J. Marshall J. Computer & Info. L. 375 (2004), Ellen Dannin

UIC John Marshall Journal of Information Technology & Privacy Law

As the United States government collects personal and private information about each of us, the government must also consider ways of preventing that information from falling into the wrong hands. In the wrong hands, that information can be turned against the individual – from blackmailing to more nefarious acts, such as terrorism. However, the government trend of outsourcing information gathering tasks has dramatically increased the chances of the wrong people receiving sensitive information. The government has been outsourcing information gathering tasks because of their failure to develop sufficient in-house expertise to handle information gathering. A second reason is that some …


Defining Cyberterrorism, 22 J. Marshall J. Computer & Info. L. 397 (2004), Mohammad Iqbal Jan 2004

Defining Cyberterrorism, 22 J. Marshall J. Computer & Info. L. 397 (2004), Mohammad Iqbal

UIC John Marshall Journal of Information Technology & Privacy Law

This article explores the definition of the term “cyberterrorism” in light of available literature and recent legislation in an attempt to distinguish cyberterrorism from other cyber activities and crimes. Cyberterrorism is the convergence of terrorism and cyberspace. The author discusses the differences between true cyberterrorism – that is, actual harm caused by cyber attacks – versus less malignant attacks that do more to annoy than harm. The author points out that the main difference between cyberterrorism and other cyber attacks, such as hacking and cracking, is that cyberterrorists are politically motivated, while other cyber attackers have non-politic motives.


The Fourth Amendment And The Wiretap Act Fail To Protect Against Random Isp Monitoring Of E-Mails For The Purpose Of Assisting Law Enforcement, 22 J. Marshall J. Computer & Info. L. 493 (2004), Jim W. Ko Jan 2004

The Fourth Amendment And The Wiretap Act Fail To Protect Against Random Isp Monitoring Of E-Mails For The Purpose Of Assisting Law Enforcement, 22 J. Marshall J. Computer & Info. L. 493 (2004), Jim W. Ko

UIC John Marshall Journal of Information Technology & Privacy Law

This article takes the position that the Wiretap Act and the Electronic Communications Privacy Act (ECPA) does little to provide protection against internet service providers (ISPs) that randomly monitor e-mails for the purpose of turning over evidence of criminal activities to law enforcement officials. The article provides a background to the special privacy issues that arise in the context of computer technology and ISPs. An analysis of the Wiretap Act, as amended by the ECPA, reveals that an implicit statutory prohibition against random surveillance by ISPs for the purpose of assisting law enforcement does in fact exist. Further, remedies for …


The Global Rise Of A Duty To Disclose Information Security Breaches, 22 J. Marshall J. Computer & Info. L. 457 (2004), Ethan Preston, Paul Turner Jan 2004

The Global Rise Of A Duty To Disclose Information Security Breaches, 22 J. Marshall J. Computer & Info. L. 457 (2004), Ethan Preston, Paul Turner

UIC John Marshall Journal of Information Technology & Privacy Law

Section 1798.82 requires computer database operators to disclose security breaches involving personal data information to both the subjects of the data and the owners of the personal data. However, this commentary views Section 1798.82 with apprehension, but takes the position that much broader duties to disclose such breaches are already in place. This article begins with a discussion about legislation that expressly require disclosure of computer security breaches, such as Section 1798.82 and Article 4 of the European Union Telecommunications and Electronic Communications Privacy Directives. Then it follows with a discussion about legislation and common law that implicitly requires disclosure …


Www.Yourname.Com: How Useful Is The Uniform Domain Name Dispute Resolution Policy ("Udrp") In Protecting Personal Names From Cybersquatters?, 22 J. Marshall J. Computer & Info. L. 535 (2004), Georgette H. Tarnow Jan 2004

Www.Yourname.Com: How Useful Is The Uniform Domain Name Dispute Resolution Policy ("Udrp") In Protecting Personal Names From Cybersquatters?, 22 J. Marshall J. Computer & Info. L. 535 (2004), Georgette H. Tarnow

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Democracy In Decline: Can Internet Voting Save The Electoral Process?, 22 J. Marshall J. Computer & Info. L. 409 (2004), Bryan Mercurio Jan 2004

Democracy In Decline: Can Internet Voting Save The Electoral Process?, 22 J. Marshall J. Computer & Info. L. 409 (2004), Bryan Mercurio

UIC John Marshall Journal of Information Technology & Privacy Law

Voter confidence that votes are accurately cast, counted, and kept are at an all time low. The traditional methods of voting has proven itself time and time again to be untrustworthy and unreliable, as evidenced recently in the 2000 presidential elections. The time is now ripe to thoroughly investigate alternative methods of casting ballots as a way to restore voter confidence in the electoral system. Using the Internet to assist the electoral system has emerged as a potential option in order to remedy many defects within the electoral process. However, Internet voting is untested and less transparent than traditional voting …


Dow Jones And The Defamatory Defendant Down Under: A Comparison Of Australian And American Approaches To Libelous Language In Cyberspace, 22 J. Marshall J. Computer & Info. L. 553 (2004), Richard L. Creech Jan 2004

Dow Jones And The Defamatory Defendant Down Under: A Comparison Of Australian And American Approaches To Libelous Language In Cyberspace, 22 J. Marshall J. Computer & Info. L. 553 (2004), Richard L. Creech

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Destruction Of Media Diversity, Or: How The Fcc Learned To Stop Regulating And Love Corporate Dominated Media, 22 J. Marshall J. Computer & Info. L. 569 (2004), Christa Corrine Mclintock Jan 2004

The Destruction Of Media Diversity, Or: How The Fcc Learned To Stop Regulating And Love Corporate Dominated Media, 22 J. Marshall J. Computer & Info. L. 569 (2004), Christa Corrine Mclintock

UIC John Marshall Journal of Information Technology & Privacy Law

Christa Corrine McLintock’s “The Destruction of Media Diversity, or: How the FCC Learned to Stop Regulating and Love Corporate Dominated Media” investigates the current corporate consolidation climate and the efficacy of alternative media outlets. McLintock examines the history of the Federal Communication Commission (“FCC”) and its current trend toward deregulation. McLintock argues that the Internet has failed to level the playing field between alternative media outlets and mainstream media conglomerates. She concludes that increased regulation is not only the most viable solution to the alternative media’s predicament, but also the means through which to satisfy the FCC’s stated goals, facilitate …


The States And The Electronic Communications Privacy Act: The Need For Legal Processes That Keep Up With The Times, 22 J. Marshall J. Computer & Info. L. 695 (2004), Monique Mattei Ferraro Jan 2004

The States And The Electronic Communications Privacy Act: The Need For Legal Processes That Keep Up With The Times, 22 J. Marshall J. Computer & Info. L. 695 (2004), Monique Mattei Ferraro

UIC John Marshall Journal of Information Technology & Privacy Law

In criminal investigation when hours may mean the difference between successful resolution of a case or not, law enforcement must have an effective method of obtaining necessary information. The author offers an overview of the Electronic Communications Privacy Act (ECPA) and proceeds in a presentation of cybercrime investigations. The article further examines the differences and the occasional conflict existing between the federal and state law, traced into the variety and multitude of state and local laws and procedures regulating the obtaining of information but also into lack of state and local resources. Indeed state and local laws not only differ …


A Normative Critique Of Private Domain Name Dispute Resolution, 22 J. Marshall J. Computer & Info. L. 625 (2004), J.R. Hildenbrand Jan 2004

A Normative Critique Of Private Domain Name Dispute Resolution, 22 J. Marshall J. Computer & Info. L. 625 (2004), J.R. Hildenbrand

UIC John Marshall Journal of Information Technology & Privacy Law

In recent years, much has been made of the rapid expansion and tremendous commercial potential of the Internet. As such, domain names that contain or imply an entities trademarked name have become extremely valuable to these entities. The difficulty, however, is balancing the rights of the trademark owners with Internet users within the burgeoning commercial environment. This comment examines the balance between the Uniform Dispute Resolution Policy (UDRP) and traditional trademark protection. It discusses several persuasive documents including the International Trademark Association’s 1997 White Paper and the United States Department of Commerce’s Green and White papers. The comment further develops …


Retention Of Communications Data: A Bumpy Road Ahead, 22 J. Marshall J. Computer & Info. L. 731 (2004), Abu Bakar Munir, Siti Hajar Mohd Yasin Jan 2004

Retention Of Communications Data: A Bumpy Road Ahead, 22 J. Marshall J. Computer & Info. L. 731 (2004), Abu Bakar Munir, Siti Hajar Mohd Yasin

UIC John Marshall Journal of Information Technology & Privacy Law

The EU Electronic Privacy Directive of 2002 requires members to ensure the confidentiality of communications but allows member states to restrict the scope of such protection for national security and defense reasons as well as to prevent, investigate detect and prosecute crimes. Despite the criticism a provision on retention of communications date was inserted, reversing thus the position taken under the previous EU Telecommunications Privacy Directive of 1997. This article presents the evolution of the EU Electronic Privacy Directive of 2002 starting from the initial proposal of 2000 which did not include a retention of data provision, to the final …


"You Have The Right To Remain Silent . . . You Have No Right To Your Dna" Louisiana's Dna Detection Of Sexual And Violent Offender's Act: An Impermissible Infringement On Fourth Amendment Search And Seizure, 22 J. Marshall J. Computer & Info. L. 759 (2004), Reneé A. Germaine Jan 2004

"You Have The Right To Remain Silent . . . You Have No Right To Your Dna" Louisiana's Dna Detection Of Sexual And Violent Offender's Act: An Impermissible Infringement On Fourth Amendment Search And Seizure, 22 J. Marshall J. Computer & Info. L. 759 (2004), Reneé A. Germaine

UIC John Marshall Journal of Information Technology & Privacy Law

In 2003 Louisiana legislature enacted the DNA Detection Of Sexual And Violent Offenders Act requiring that any person arrested for certain offenses must submit to a DNA sample extraction to be stored with the State’s DNA databank, for the purpose to be utilized as a tool for identification in the criminal investigation and in discovering missing persons. The comment, after a brief presentation of the history of the Act and the DNA technology overview, argues that the Act infringes the Fourth Amendment protections against unreasonable search and seizure. It presents the already established standards of probable cause as well as …


Is The Acpa A Safe Haven For Trademark Infringers? - Rethinking The Unilateral Application Of The Lanham Act, 22 J. Marshall J. Computer & Info. L. 655 (2004), Jinku Hwang Jan 2004

Is The Acpa A Safe Haven For Trademark Infringers? - Rethinking The Unilateral Application Of The Lanham Act, 22 J. Marshall J. Computer & Info. L. 655 (2004), Jinku Hwang

UIC John Marshall Journal of Information Technology & Privacy Law

The Anticybersquatting Consumer Protection Act (ACPA) was enacted in 1999 as a response to international disputes over Internet domain names because according to the Congress’ point of view, courts could not successfully protected American businesses in cases where nothing more that the registration of a trademark or its variation in a domain name had occurred. This article analyzes recent court decisions regarding domain name disputes after the enactment of ACPA focusing on reverse domain name hijacking in international, trademark related and gTLD disputes. The author argues that the in rem jurisdiction provided by the ACPA and the consequent extraterritorial effect …


The Concept Of "Harm" In Computer-Generated Images Of Child Pornography, 22 J. Marshall J. Computer & Info. L. 717 (2004), Jisuk Woo Jan 2004

The Concept Of "Harm" In Computer-Generated Images Of Child Pornography, 22 J. Marshall J. Computer & Info. L. 717 (2004), Jisuk Woo

UIC John Marshall Journal of Information Technology & Privacy Law

There has been a lot of controversy about the harm caused by computer-generated child pornography. This article examines the new ways in which technological development has created new concerns about child pornography especially in the context of challenging the concept of “harm” in the existing child pornography law. The author presents and discusses the existing child pornography laws and jurisprudence as well as the relevant arguments raised against it most of which are based on the “harm” caused by child pornography. This concept of “harm” and the different ways it is conceived and understood is analyzed and empirical evidence supporting …


Direct-To-Consumer Genetic Tests, Government Oversight, And The First Amendment: What The Government Can (And Can't) Do To Protect The Public's Health, Gail H. Javitt, Erica Stanley, Kathy Hudson Jan 2004

Direct-To-Consumer Genetic Tests, Government Oversight, And The First Amendment: What The Government Can (And Can't) Do To Protect The Public's Health, Gail H. Javitt, Erica Stanley, Kathy Hudson

Oklahoma Law Review

No abstract provided.


A Traitor In Our Midst: Is It Your Tivo?, Teresa W. Chan Jan 2004

A Traitor In Our Midst: Is It Your Tivo?, Teresa W. Chan

Vanderbilt Journal of Entertainment & Technology Law

Part I of this Note provides a backdrop of the different aspects of privacy law, focusing on the federal statutory schemes that are applicable to the issue of information gathering and the different possible uses of that information as a violation of privacy rights that have appeared in similar technology cases up to this point in time. This section will also focus on the capabilities of TiVo in more depth.

Part II of the Note examines both of TiVo's questionable actions: first, whether gathering information to sell to advertisers and networks in the form of aggregate data violates privacy rights; …


Law As Film: Representing Justice In The Age Of Moving Images, Shulamit Almog, Ely Aharonson Jan 2004

Law As Film: Representing Justice In The Age Of Moving Images, Shulamit Almog, Ely Aharonson

Canadian Journal of Law and Technology

Two main theses are presented here. The first is that there is a conceptual resemblance between the ways in which messages are transmitted in the courtroom and the ways in which they are transmitted in the cinema. The second is that the evolution of legal procedure is being influenced by developments taking place in visual culture generally and film specifically. Taken together, these theses lead to the conclusion that the development of a theory of ‘‘law-as-film’’ can provide insights into the contemporary practice of law that might otherwise be overlooked.


Following The Right Lead: Gutnick And The Dance Of Internet Jurisdiction, Mary Paterson Jan 2004

Following The Right Lead: Gutnick And The Dance Of Internet Jurisdiction, Mary Paterson

Canadian Journal of Law and Technology

As improving methods of travel and communication facilitated the shift from an agrarian to an industrial society, the common law courts increasingly faced interjurisdictional disputes. Although British paternalism dominated early cases in which courts assumed jurisdiction over people, property, and actions in distant lands, these cases and the imperial attitudes informing them were slowly replaced by more modest jurisdictional assertions based on a sense of comity. The shift from an industrial society to an information-based society and the simultaneous growth of a global infrastructure based on satellite, telephone, cable, and cellular technologies have stretched jurisdictional doctrines in new ways, calling …


Les Consommateurs Et Les Clubs Vidéo Ont-Ils Le Droit De Modifier Les Films À Leur Guise?, René Pépin Jan 2004

Les Consommateurs Et Les Clubs Vidéo Ont-Ils Le Droit De Modifier Les Films À Leur Guise?, René Pépin

Canadian Journal of Law and Technology

Dans un premier temps, nous voulons étudier le litige en cours. Même si aucune décision sur le fond n’est susceptible d’être rendue à court terme, nous pouvons scruter les prétentions des parties et voir l’état du droit aux États-Unis sur ce sujet. Nous examinerons ensuite comment cette problématique serait traitée au Canada.

Et c’est ici que la question soulevée dans le litige revêt tout son intérêt, car elle met en jeu des notions fonda- mentales en matière de droit d’auteur. On devra ainsi se demander si le fait pour une personne ou une entreprise de retrancher des séquences représentant quelques …


Turning Worms: Some Thoughts On Liabilities For Spreading Computer Infections, Richard Owens Jan 2004

Turning Worms: Some Thoughts On Liabilities For Spreading Computer Infections, Richard Owens

Canadian Journal of Law and Technology

Two aspects of the virus/worm liability problem are of particular note. The first is how tightly the Internet binds together many possible defendants; those who build and run it, those who populate it with increasingly complex electronic commerce Web sites, those who provide terminal software, those who send electronic mails, those who design its security algorithms, those who insure it, and those who hack it, amongst others.

The second aspect is how speculative such a review is. Little case law pertains. Even the language of the law(what does it really mean when we assess liability on the basis of a …


Foreign Investment Restrictions As Industrial Policy: The Case Of Canadian Telecommunications, Robert Crandall, Hal Singer Jan 2004

Foreign Investment Restrictions As Industrial Policy: The Case Of Canadian Telecommunications, Robert Crandall, Hal Singer

Canadian Journal of Law and Technology

We assess the economic harms that would accrue if Canada were to adopt asymmetric rules of foreign ownership for incumbent carriers and entrants. We explain the current Canadian regulatory climate surrounding foreign investment in Canadian telecommunications. Competition in the telecommunications industry is generally robust, which suggests that rules aimed at favouring entrants are not necessary. Moreover, Canadian entrants are equally capable of attracting foreign capital as Canadian incumbents, which suggests that foreign investment rules aimed at favouring entrants are especially unwise.

Next, we review the U.S. attempt to stimulate competition in local telecommunications markets through an analogous form of asymmetrical …


Biotechnology Law: A Tale Of Peptides And Lasers: Is Integra Lifesciences I, Ltd. V. Kgaa The End Of The Experimental Use Defense For Biomedical Innovation, Or Does § 271(E)(1) Of The Patent Act Save The Day, Melissa J. Alcorn Ph.D. Jan 2004

Biotechnology Law: A Tale Of Peptides And Lasers: Is Integra Lifesciences I, Ltd. V. Kgaa The End Of The Experimental Use Defense For Biomedical Innovation, Or Does § 271(E)(1) Of The Patent Act Save The Day, Melissa J. Alcorn Ph.D.

Oklahoma Law Review

No abstract provided.


How To Keep The Lights On: An Exploration Of The Abrogration Of Wholesale Energy Contracts, 38 J. Marshall L. Rev. 303 (2004), Brian Bassett Jan 2004

How To Keep The Lights On: An Exploration Of The Abrogration Of Wholesale Energy Contracts, 38 J. Marshall L. Rev. 303 (2004), Brian Bassett

UIC Law Review

No abstract provided.


Ownership Of Human Tissue: A Proposal For Federal Recognition Of Human Research Participants' Property Rights In Their Biological Material, Donna M. Gitter Jan 2004

Ownership Of Human Tissue: A Proposal For Federal Recognition Of Human Research Participants' Property Rights In Their Biological Material, Donna M. Gitter

Washington and Lee Law Review

No abstract provided.