Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

State and Local Government Law

UIC School of Law

UIC John Marshall Journal of Information Technology & Privacy Law

Articles 1 - 8 of 8

Full-Text Articles in Law

How An Acoustic Sensor Can Catch A Gunman, 32 J. Marshall J. Info. Tech. & Privacy L. 211 (2016), Amanda Busljeta Jan 2016

How An Acoustic Sensor Can Catch A Gunman, 32 J. Marshall J. Info. Tech. & Privacy L. 211 (2016), Amanda Busljeta

UIC John Marshall Journal of Information Technology & Privacy Law

Conversations said in public do not have an expectation of privacy, and therefore, the ShotSpotter does not violate the right to privacy. This comment will address the following: a) ShotSpotter technology is a necessity in all neighborhoods; b) ShotSpotter does not violate an individual’s expectation of privacy; c) the need for ShotSpotter outweighs the cost of the device; and e) regulations and economic solutions will allow cities to use ShotSpotter while still protecting the individual’s privacy rights.


Selected State Laws Governing The Safeguarding And Disposing Of Personal Information, 31 J. Marshall J. Info. Tech. & Privacy L. 487 (2015), Bruce Radke, Michael Waters Jan 2015

Selected State Laws Governing The Safeguarding And Disposing Of Personal Information, 31 J. Marshall J. Info. Tech. & Privacy L. 487 (2015), Bruce Radke, Michael Waters

UIC John Marshall Journal of Information Technology & Privacy Law

Numerous states have adopted laws mandating the protection and disposal of personal information. Under those laws, businesses are required to implement and maintain reasonable security procedures and practices appropriate to the nature of the information in order to protect the personal information from unauthorized access, destruction, use, modification, or disclosure. Although the definition of “personal information” varies from state to state, “personal information” is generally defined as an individual’s first name or initial and last name in combination with any one or more of the following data elements, when either the name or the data elements are not encrypted or …


California’S Eavesdropping Law Endangers Victims Of Domestic Violence, 31 J. Marshall J. Info. Tech. & Privacy L. 57 (2014), John E.B. Myers Jan 2014

California’S Eavesdropping Law Endangers Victims Of Domestic Violence, 31 J. Marshall J. Info. Tech. & Privacy L. 57 (2014), John E.B. Myers

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Yes, I Destroyed The Evidence - Sue Me? Intentional Spoliation Of Evidence In Illinois, 27 J. Marshall J. Computer & Info. L. 235 (2009), Michael A. Zuckerman Jan 2009

Yes, I Destroyed The Evidence - Sue Me? Intentional Spoliation Of Evidence In Illinois, 27 J. Marshall J. Computer & Info. L. 235 (2009), Michael A. Zuckerman

UIC John Marshall Journal of Information Technology & Privacy Law

Many Illinois litigators have encountered spoliation of evidence, which is the loss, destruction, or alteration of evidence. Examples of spoliation are seemingly endless and include the failure to preserve the scene of a train derailment, the accidental destruction of evidence on a lawyer’s desk by a janitor, the loss of a heater that exploded, the removal of wires from a car that caught on fire, the loss and alteration of medical equipment, and the intentional erasing of a computer image relevant to a copyright lawsuit. To combat spoliation, Illinois and many other states have developed common law and statutory methods …


The States And The Electronic Communications Privacy Act: The Need For Legal Processes That Keep Up With The Times, 22 J. Marshall J. Computer & Info. L. 695 (2004), Monique Mattei Ferraro Jan 2004

The States And The Electronic Communications Privacy Act: The Need For Legal Processes That Keep Up With The Times, 22 J. Marshall J. Computer & Info. L. 695 (2004), Monique Mattei Ferraro

UIC John Marshall Journal of Information Technology & Privacy Law

In criminal investigation when hours may mean the difference between successful resolution of a case or not, law enforcement must have an effective method of obtaining necessary information. The author offers an overview of the Electronic Communications Privacy Act (ECPA) and proceeds in a presentation of cybercrime investigations. The article further examines the differences and the occasional conflict existing between the federal and state law, traced into the variety and multitude of state and local laws and procedures regulating the obtaining of information but also into lack of state and local resources. Indeed state and local laws not only differ …


The Legislative Jurisdiction Of States Over Transactions In International Electronic Commerce, 18 J. Marshall J. Computer & Info. L. 689 (2000), Tapio Puurunen Jan 2000

The Legislative Jurisdiction Of States Over Transactions In International Electronic Commerce, 18 J. Marshall J. Computer & Info. L. 689 (2000), Tapio Puurunen

UIC John Marshall Journal of Information Technology & Privacy Law

With increasing growth and development of E-commerce and a rapid increase in the number of Internet Users, government assessment of current protections granted to consumers in their states is encouraged. The author's purpose is to examine national legislation on e-commerce regulation and its limits, to resolve jurisdictional conflict of laws associated with e-commerce, and to propose possible solutions to these emerging problems. This article covers market functions between business and consumer transactions. First, government should not ignore consumer e-commerce since e-commerce trade is significant on both national and international levels. Secondly, the author pushes for an extensive effort to unify …


Potential Liability Under The Illinois Electronic Commerce Security Act: Is It A Risk Worth Taking?, 17 J. Marshall J. Computer & Info. L. 909 (1999), Stephen G. Myers Jan 1999

Potential Liability Under The Illinois Electronic Commerce Security Act: Is It A Risk Worth Taking?, 17 J. Marshall J. Computer & Info. L. 909 (1999), Stephen G. Myers

UIC John Marshall Journal of Information Technology & Privacy Law

This Comment argues that the potential liability of digital signatures under the Act is too great and, therefore, is not an effective mode of communication. Part II of this Comment explains the purpose, the significance, and the traditional role of the handwritten signature. Furthermore, Part II establishes the basics of the digital signature process as it relates to each participant. The participants in a digital signature process consist of a subscriber, a recipient, and a certification authority. Part III of this Comment analyzes and argues why the use of digital signatures, under the Act, is too great of a liability …


Use Tax Collection On Internet Purchases: Should The Mail Order Industry Serve As A Model, 15 J. Marshall J. Computer & Info. L. 203 (1997), Steven J. Forte Jan 1997

Use Tax Collection On Internet Purchases: Should The Mail Order Industry Serve As A Model, 15 J. Marshall J. Computer & Info. L. 203 (1997), Steven J. Forte

UIC John Marshall Journal of Information Technology & Privacy Law

Federal intervention is necessary to grant states the authority to collect state sales and use tax from Internet vendors who sell goods within their boundaries but reside elsewhere. With such federal intervention, local retailers, who must charge state use and sales tax to their customers, can compete more fairly with Internet vendors. In addition, state governments can access a large and growing revenue source. Under the Commerce Clause of the United States Constitution, a vendor must have a physical presence on a state before a state can require the vendor to collect and remit sales and use tax. In addition, …