Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Law

Rethinking The Process Of Service Of Process, Mary K. Bonilla Feb 2022

Rethinking The Process Of Service Of Process, Mary K. Bonilla

St. Mary's Law Journal

Even as technology evolves, the Federal Rules of Civil Procedure, specifically Federal Rule 4, remains stagnate without a mechanism directly providing for electronic service of process in federal courts. Rule 4(e)(1) allows service through the use of state law—consequently permitting any state-approved electronic service methods—so long as the federal court where proceedings will occur, or the place where service is made, is located within the state supplying the law. Accordingly, this Comment explains that Rule 4 indirectly permits electronic service of process in some states, but not others, despite all 50 states utilizing the same federal court system. With states …


Saving America’S Privacy Rights: Why Carpenter V. United States Was Wrongly Decided And Why Courts Should Be Promoting Legislative Reform Rather Than Extending Existing Privacy Jurisprudence, David Stone Jan 2020

Saving America’S Privacy Rights: Why Carpenter V. United States Was Wrongly Decided And Why Courts Should Be Promoting Legislative Reform Rather Than Extending Existing Privacy Jurisprudence, David Stone

St. Mary's Law Journal

Privacy rights are under assault, but the Supreme Court’s judicial intervention into the issue, starting with Katz v. United States and leading to the Carpenter v. United States decision has created an inconsistent, piecemeal common law of privacy that forestalls a systematic public policy resolution by Congress and the states. In order to reach a satisfactory and longlasting resolution of the problem consistent with separation of powers principles, the states should consider a constitutional amendment that reduces the danger of pervasive technologyaided surveillance and monitoring, together with a series of statutes addressing each new issue posed by technological change as …


Hearsay In The Smiley Face: Analyzing The Use Of Emojis As Evidence, Erin Janssen Jun 2018

Hearsay In The Smiley Face: Analyzing The Use Of Emojis As Evidence, Erin Janssen

St. Mary's Law Journal

Abstract forthcoming


Network Investigation Techniques: Government Hacking And The Need For Adjustment In The Third-Party Doctrine, Eduardo R. Mendoza Jan 2017

Network Investigation Techniques: Government Hacking And The Need For Adjustment In The Third-Party Doctrine, Eduardo R. Mendoza

St. Mary's Law Journal

Modern society is largely dependent on technology, and legal discovery is no longer limited to hard-copy, tangible documents. The clash of technology and the law is an exciting, yet dangerous phenomena; dangerous because our justice system desperately needs technological progress. The clash between scientific advancement and the search for truth has recently taken an interesting form—government hacking. The United States Government has increasingly used Network Investigation Techniques (NITs) to target suspects in criminal investigations. NITs operate by identifying suspects who have taken affirmative steps to conceal their identity while browsing the Internet. The hacking technique has become especially useful to …


Gradually Exploded: Confrontation Vs. The Former Testimony Rule., Tim Donaldson Jan 2015

Gradually Exploded: Confrontation Vs. The Former Testimony Rule., Tim Donaldson

St. Mary's Law Journal

Observing live court testimony allows a jury to determine witness credibility. This is called demeanor evidence. Allowing the introduction of transcripts of prior testimony by a witness offends a defendant's right to confrontation guaranteed by the Sixth Amendment of the United States Constitution. Loss of demeanor evidence can heighten sensitivity surrounding the constitutional demands of unavailability and an opportunity for cross-examination. But the loss of this evidence is discounted when dealing with the admissibility of prior testimony as long as a defendant was formerly afforded an opportunity to cross-examine. Demeanor evidence, however, is still treated as a non-essential component of …


Tangible Or Intangible - Is That The Question - Conflict In The Texas Tax Classification System Of Computer Software Comment., Christine E. Reinhard Jan 1998

Tangible Or Intangible - Is That The Question - Conflict In The Texas Tax Classification System Of Computer Software Comment., Christine E. Reinhard

St. Mary's Law Journal

This Comment evaluates tax classification of computer software in Texas under recent statutory provisions and case law. The author focuses on whether computer software constitutes tangible or intangible property and whether computer software should be taxable or not. Determining property classification is not easy—the term “computer software” is difficult to define, and the multitude of different types of computer software further obscures the formation of a uniform definition. The Texas legislature’s ability to tax both tangible and intangible property makes classifying computer software as either type unnecessary. Texas can resolve the conflict in its tax classification system, wherein computer software …