Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 90

Full-Text Articles in Law

Reflections From The Chair-The Road Taken: Honoring The Decade Of Scholarship By Law Professors Of Color In U.S. Law Schools And The People Of Color Movement (1989-1999), 20 B. C. Third World L. J. 13 (2000), Linda R. Crane Jan 2000

Reflections From The Chair-The Road Taken: Honoring The Decade Of Scholarship By Law Professors Of Color In U.S. Law Schools And The People Of Color Movement (1989-1999), 20 B. C. Third World L. J. 13 (2000), Linda R. Crane

UIC Law Open Access Faculty Scholarship

No abstract provided.


Supreme Court's Iolta Decision: Of Dogs, Mangers, And The Ghost Of Mrs. Frothingham, 30 Seton Hall L. Rev. 846 (2000), Donald L. Beschle Jan 2000

Supreme Court's Iolta Decision: Of Dogs, Mangers, And The Ghost Of Mrs. Frothingham, 30 Seton Hall L. Rev. 846 (2000), Donald L. Beschle

UIC Law Open Access Faculty Scholarship

No abstract provided.


Grading Law School Examinations: Making A Case For Objective Exams To Cure What Ails “Objectified” Exams, 34 New Eng. L. Rev. 785 (2000), Linda R. Crane Jan 2000

Grading Law School Examinations: Making A Case For Objective Exams To Cure What Ails “Objectified” Exams, 34 New Eng. L. Rev. 785 (2000), Linda R. Crane

UIC Law Open Access Faculty Scholarship

No abstract provided.


Cultivating Our Emerging Voices: The Road To Scholarship, 20 B. C. Third World L. J. 77 (2000), Kevin Hopkins Jan 2000

Cultivating Our Emerging Voices: The Road To Scholarship, 20 B. C. Third World L. J. 77 (2000), Kevin Hopkins

UIC Law Open Access Faculty Scholarship

No abstract provided.


Corporate Transparency And Human Rights, 8 Tulsa. J. Comp. & Int'l L. 15 (2000), William B.T. Mock Jan 2000

Corporate Transparency And Human Rights, 8 Tulsa. J. Comp. & Int'l L. 15 (2000), William B.T. Mock

UIC Law Open Access Faculty Scholarship

No abstract provided.


Why Truth Is Not A Defense In Paternity Actions, 10 Tex. J. Women & L. 69 (2000), Diane S. Kaplan Jan 2000

Why Truth Is Not A Defense In Paternity Actions, 10 Tex. J. Women & L. 69 (2000), Diane S. Kaplan

UIC Law Open Access Faculty Scholarship

No abstract provided.


An Interdisciplinary Introduction To Legal Transparency: A Tool For Rational Development, 18 Dick. J. Int'l L. 293 (2000), William B.T. Mock Jan 2000

An Interdisciplinary Introduction To Legal Transparency: A Tool For Rational Development, 18 Dick. J. Int'l L. 293 (2000), William B.T. Mock

UIC Law Open Access Faculty Scholarship

No abstract provided.


Human Rights And Corporate Responsibility, 8 Tulsa. J. Comp. & Int'l L. 1 (2000), Mark E. Wojcik Jan 2000

Human Rights And Corporate Responsibility, 8 Tulsa. J. Comp. & Int'l L. 1 (2000), Mark E. Wojcik

UIC Law Open Access Faculty Scholarship

No abstract provided.


Discrimination After Death, 53 Okla. L. Rev. 389 (2000), Mark E. Wojcik Jan 2000

Discrimination After Death, 53 Okla. L. Rev. 389 (2000), Mark E. Wojcik

UIC Law Open Access Faculty Scholarship

No abstract provided.


The Constitutional Flaws In The New Illinois Religious Freedom Restoration Act: Why Rfras Don't Work, 31 Loy. U. Chi. L.J. 153 (2000), Mary Jean Dolan Jan 2000

The Constitutional Flaws In The New Illinois Religious Freedom Restoration Act: Why Rfras Don't Work, 31 Loy. U. Chi. L.J. 153 (2000), Mary Jean Dolan

UIC Law Open Access Faculty Scholarship

No abstract provided.


Science Fact Or Science Fiction? The Implications Of Court-Ordered Genetic Testing Under Rule 35, 34 U.S.F. L. Rev. 295 (2000), Anthony Niedwiecki Jan 2000

Science Fact Or Science Fiction? The Implications Of Court-Ordered Genetic Testing Under Rule 35, 34 U.S.F. L. Rev. 295 (2000), Anthony Niedwiecki

UIC Law Open Access Faculty Scholarship

No abstract provided.


Blood, Sweat, And Tears: Toward A New Paradigm For Protecting Donor Privacy, 7 Va. J. Soc. Pol'y & L. 141 (2000), Kevin Hopkins Jan 2000

Blood, Sweat, And Tears: Toward A New Paradigm For Protecting Donor Privacy, 7 Va. J. Soc. Pol'y & L. 141 (2000), Kevin Hopkins

UIC Law Open Access Faculty Scholarship

No abstract provided.


The Finality Of Judgment And Sentence Prerequisite In The United States-Peru Bilateral Prisoner Transfer Treaty: Calling Congress And The President To Reform And Justifying Jurisdiction Of The Inter-American Human Rights Commission And Court, 15 Am. U. Int'l L. Rev. 1071 (2000), Ralph Ruebner, Lisa Carroll Jan 2000

The Finality Of Judgment And Sentence Prerequisite In The United States-Peru Bilateral Prisoner Transfer Treaty: Calling Congress And The President To Reform And Justifying Jurisdiction Of The Inter-American Human Rights Commission And Court, 15 Am. U. Int'l L. Rev. 1071 (2000), Ralph Ruebner, Lisa Carroll

UIC Law Open Access Faculty Scholarship

No abstract provided.


Another Attempt To Solve The Prior Restraint Mystery: Applying The Nebraska Press Standard To Media Disclosure Of Attorney-Client Communications, 18 Cardozo Arts & Ent. L.J. 307 (2000), Alberto Bernabe Jan 2000

Another Attempt To Solve The Prior Restraint Mystery: Applying The Nebraska Press Standard To Media Disclosure Of Attorney-Client Communications, 18 Cardozo Arts & Ent. L.J. 307 (2000), Alberto Bernabe

UIC Law Open Access Faculty Scholarship

No abstract provided.


In Re Moot Court, 29 Stetson L. Rev. 1217 (2000), Darby Dickerson Jan 2000

In Re Moot Court, 29 Stetson L. Rev. 1217 (2000), Darby Dickerson

UIC Law Open Access Faculty Scholarship

No abstract provided.


Citation Frustrations--And Solutions, 30 Stetson L. Rev. 477 (2000), Darby Dickerson Jan 2000

Citation Frustrations--And Solutions, 30 Stetson L. Rev. 477 (2000), Darby Dickerson

UIC Law Open Access Faculty Scholarship

Working with citations is a fact of life on law journals. Because citation work is detail-oriented, requires great concentration, and is sometimes perceived as "drudge work,"' it often generates a high level of frustration among law review staff, editors, and authors.
This Article will address the primary frustrations suffered by each group and will propose solutions for alleviating those frustrations.


Complaint, Robbins V. Chac Inc, Docket No. 1:00-Cv-02037 (Northern District Of Illinois, Apr 04, 2000), F. Willis Caruso, John Marshall Law School Fair Housing Legal Clinic Jan 2000

Complaint, Robbins V. Chac Inc, Docket No. 1:00-Cv-02037 (Northern District Of Illinois, Apr 04, 2000), F. Willis Caruso, John Marshall Law School Fair Housing Legal Clinic

Court Documents and Proposed Legislation

No abstract provided.


The Case For A U.S. Privacy Commissioner: A Canadian Commissioner’S Perspective, 19 J. Marshall J. Computer & Info. L. 1 (2000), William S. Challis, Ann Cavoukian Jan 2000

The Case For A U.S. Privacy Commissioner: A Canadian Commissioner’S Perspective, 19 J. Marshall J. Computer & Info. L. 1 (2000), William S. Challis, Ann Cavoukian

UIC John Marshall Journal of Information Technology & Privacy Law

The demands of social democratic government, the growth of electronic commerce, and the advance of technology have fueled the debate over internet privacy. Technology offers unprecedented opportunities but can also become tools of abuse. Debate in the United States centers around the conflicting interests of industry self-control versus government regulation. Technological and market-based solutions are ineffective because they lead to inadequate and inconsistent protection. Many user-driven privacy choices can impede the growth of consumer trust. Voluntarily adopted privacy policies are either extremely limited or easily circumvented with tracking technology that allows no consumer control over the collection of their personal …


Recent Developments In Private Sector Personal Data Protection In Australia: Will There Be An Upside Down Under, 19 J. Marshall J. Computer & Info. L. 71 (2000), Paul Kelly Jan 2000

Recent Developments In Private Sector Personal Data Protection In Australia: Will There Be An Upside Down Under, 19 J. Marshall J. Computer & Info. L. 71 (2000), Paul Kelly

UIC John Marshall Journal of Information Technology & Privacy Law

Although the United States enacted the one of the first data protection laws, many Americans are suspicious of European data protection regulations. The U.S. and Japan are notable exceptions to the modern trend toward comprehensive informational privacy regulation. European data protection laws are stricter, more comprehensive, and more bureaucratic than non-European counterparts. Newer regulatory models, such as those introduced in Australia, provide an acceptable compromise between the American self-regulatory approach and the comprehensive European approach. Australia has a federal agency responsible for administering its information privacy laws and is moving towards a co-regulatory approach between government and the private sector.


Protecting Individual On-Line Privacy Rights: Making The Case For A Separately Dedicated, Independent Regulatory Agency, 19 J. Marshall J. Computer & Info. L. 93 (2000), Jack Karnes Jan 2000

Protecting Individual On-Line Privacy Rights: Making The Case For A Separately Dedicated, Independent Regulatory Agency, 19 J. Marshall J. Computer & Info. L. 93 (2000), Jack Karnes

UIC John Marshall Journal of Information Technology & Privacy Law

Few issues have caused more legal consternation than the level to which individual online privacy rights should be protected. Modern equipment and software enables those who seek to violate privacy rights render a less knowledgeable citizen helpless. Traditional privacy protection is inadequate to protect a fundamental right. Neither Congress nor the courts have dealt with the issue in an effective manner like they have dealt with other areas like telephone and wireless phone communications. The online privacy dilemma is reaching a crisis point. Employers are able to monitor employees’ uses of equipment to prevent any and all personal uses of …


The De Facto Federal Privacy Commission, 19 J. Marshall J. Computer & Info. L. 109 (2000), Steven Hetcher Jan 2000

The De Facto Federal Privacy Commission, 19 J. Marshall J. Computer & Info. L. 109 (2000), Steven Hetcher

UIC John Marshall Journal of Information Technology & Privacy Law

The United States is well on its way to having a federal agency that regulates online privacy. In the last five years, the Federal Trade Commission (FTC) has assumed increasing jurisdiction over online privacy. The FTC’s true intent to regulate online privacy became evident when it recommended that Congress enact legislation to strengthen its growing power to regulate internet privacy. The FTC uses threats of administrative enforcement actions to guide industry self-regulation through the use of unfair trade practices actions. The FTC acts because consumers feel entitled to data privacy and promotes Web site privacy practices through education and attempts …


Regulating The Free Flow Of Information: A Privacy Czar As The Ultimate Big Brother, 19 J. Marshall J. Computer & Info. L. 37 (2000), Jonathan M. Winer Jan 2000

Regulating The Free Flow Of Information: A Privacy Czar As The Ultimate Big Brother, 19 J. Marshall J. Computer & Info. L. 37 (2000), Jonathan M. Winer

UIC John Marshall Journal of Information Technology & Privacy Law

The free flow if information is critical to open society. In the United States, the tradition of open information provides the intellectual oxygen for the development American freedom, knowledge, technology, and commerce. In contrast to the right to communicate and obtain information, privacy is not an established right in the United States, except with respect to physical trespass by the government and reproductive freedom. A federal privacy czar would necessarily limit the unauthorized collection, use, and dissemination of personal information. Privacy czars invariably become privacy advocates and take active stances to discourage the free flow of information about persons and …


Pornography, Privacy, And Digital Self-Help, 19 J. Marshall J. Computer & Info. L. 133 (2000), Tom W. Bell Jan 2000

Pornography, Privacy, And Digital Self-Help, 19 J. Marshall J. Computer & Info. L. 133 (2000), Tom W. Bell

UIC John Marshall Journal of Information Technology & Privacy Law

Pornography and privacy share a subtle relationship in internet law and policy. Legislation attempting to restrict online speech considered indecent or harmful to minors is subject to exacting scrutiny. Legislation that regulates online speech thought to be harmful to its readers because of privacy concerns should be subjected to the same level of scrutiny. The availability of self-help remedies should govern the scope of legislation affecting online privacy and the alternatives offered by digital self-help solutions makes state regulation constitutionally suspect and functionally inferior. Self-help can be more effective than legislation in protecting online privacy. Cookie management software, use of …


Toward An Architecture Of Privacy For The Virtual World, 19 J. Marshall J. Computer & Info. L. 151 (2000), Paul Toscano Jan 2000

Toward An Architecture Of Privacy For The Virtual World, 19 J. Marshall J. Computer & Info. L. 151 (2000), Paul Toscano

UIC John Marshall Journal of Information Technology & Privacy Law

The internet is expanding. As users become more computer literate, the world becomes more reliant on the virtual one. The internet and wireless communications have fostered global commerce on an unprecedented scale. Because it lacks boundaries, cyberspace is difficult for regulate with traditional methods of governance. Security, privacy, and integrity of information are thus available to only a minority of users in restricted communities. Outside, users are on their own or must rely on the partial solutions available to them. To date, there is no consensus on what security, privacy, and integrity of information really mean. The internet needs a …


Database Nation: Does Information Technology Of The 21st Century Pose A Daunting Threat To Personal Privacy In America, 19 J. Marshall J. Computer & Info. L. 197 (2000), Robert S. Gurwin, Nicole D. Milos Jan 2000

Database Nation: Does Information Technology Of The 21st Century Pose A Daunting Threat To Personal Privacy In America, 19 J. Marshall J. Computer & Info. L. 197 (2000), Robert S. Gurwin, Nicole D. Milos

UIC John Marshall Journal of Information Technology & Privacy Law

In this book review of Simon Garfinkel's "Database Nation: The death of privacy in the 21st century," the author echoes George Orwell's prophetic vision of a totalitarian government prying on citizens' privacy in "1984." However, Database Nation presents a future where privacy has become a costly commodity: individuals fight dearly to hold such privacy from prying eyes. From the history of information age to advocating privacy protection legislations, the author discusses how Garfinkel pieces together the forming of the database nation. From health care providers to credit bureaus and from satellite surveillance to consumer purchasing habits, Garfinkel urges readers to …


The Establishment Of A U.S. Federal Data Protection Agency To Define And Regulate Internet Privacy And Its Impact On Us-China Relations: Marco Polo, Where Are You?, 19 J. Marshall J. Computer & Info. L. 169 (2000), Omar Saleem Jan 2000

The Establishment Of A U.S. Federal Data Protection Agency To Define And Regulate Internet Privacy And Its Impact On Us-China Relations: Marco Polo, Where Are You?, 19 J. Marshall J. Computer & Info. L. 169 (2000), Omar Saleem

UIC John Marshall Journal of Information Technology & Privacy Law

The desire to explore new worlds and to exchange ideas and goods should be the impetus behind the Internet, the virtual Silk Road connecting the east and west. The Chinese government considers the Internet a vital part of its modernization plans. There are millions of Chinese citizens online and that number continues to grow. China’s policy towards online privacy regulation will have a significant impact on the rest of the world. Technology has outpaced law in the arena of privacy regulation. Some scholars believe the Internet should be unregulated. Others fear that commerce will overrun privacy concerns. The sheer volume …


2000 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent,19 J. Marshall J. Computer & Info. L. 261 (2000), Jennifer Kipke, Stacey-Ann Prince, Cindy Holcomb Jan 2000

2000 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent,19 J. Marshall J. Computer & Info. L. 261 (2000), Jennifer Kipke, Stacey-Ann Prince, Cindy Holcomb

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


2000 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner,19 J. Marshall J. Computer & Info. L. 225 (2000), Matt Caligur, Mark Callender, Alexandra Smoots Hogan Jan 2000

2000 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner,19 J. Marshall J. Computer & Info. L. 225 (2000), Matt Caligur, Mark Callender, Alexandra Smoots Hogan

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


2000 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 19 J. Marshall J. Computer & Info. L. 207 (2000), Robert S. Gurwin Jan 2000

2000 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 19 J. Marshall J. Computer & Info. L. 207 (2000), Robert S. Gurwin

UIC John Marshall Journal of Information Technology & Privacy Law

In this bench memo, the high court is asked to decide two issues: whether the information disseminated by defendant invaded plaintiff's privacy as defined by the Restatement (Second) of Torts governing public disclosure of private facts; and whether defendant's use of cookie technology to gather the information displayed about plaintiff constituted an invasion of her privacy. Defendant provides a commercial online job search services that provides employment assistance to online users. In return of the free service, users are required to create a "profile" with personal identifying information such as name, phone number, address and e-mail. At the bottom of …


Service Provider Liability For Acts Committed By Users: What You Don't Know Can Hurt You, 18 J. Marshall J. Computer & Info. L. 591 (2000), Mitchell P. Goldstein Jan 2000

Service Provider Liability For Acts Committed By Users: What You Don't Know Can Hurt You, 18 J. Marshall J. Computer & Info. L. 591 (2000), Mitchell P. Goldstein

UIC John Marshall Journal of Information Technology & Privacy Law

This article probes into the liabilities that service providers may incur on the internet. Liabilities such as copyright infringement , pornography, and defamation are common sources of liability on the Internet. The author begins by discussing the different types of copyright infringement. These include direct infringement, contributory infringement, and vicarious liability. In response to these different types of infringements, Congress and the President signed the Digital Millennium Copyright Act, DMCA. The author next investigates the issue of pornography on the Internet by giving a case history of the development of obscene pornography. This section of the article is concluded with …