Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Law (44)
- Science and Technology Law (44)
- Internet Law (43)
- Privacy Law (42)
- Legal History (22)
-
- Criminal Law (19)
- Constitutional Law (18)
- Criminal Procedure (17)
- Legislation (17)
- Intellectual Property Law (12)
- Litigation (12)
- Courts (10)
- Jurisprudence (10)
- Legal Writing and Research (10)
- State and Local Government Law (9)
- Comparative and Foreign Law (8)
- Law and Race (8)
- Human Rights Law (7)
- Health Law and Policy (6)
- Law Enforcement and Corrections (6)
- Business Organizations Law (5)
- Civil Rights and Discrimination (5)
- Fourth Amendment (5)
- International Law (5)
- Housing Law (4)
- Legal Profession (4)
- Medical Jurisprudence (4)
- Commercial Law (3)
- Consumer Protection Law (3)
- Keyword
- Publication
- Publication Type
Articles 31 - 60 of 96
Full-Text Articles in Law
1997 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 16 J. Marshall J. Computer & Info. L. 685 (1998), David E. Sorkin, Steven A. Mcauley, David B. Nash Iii
1997 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 16 J. Marshall J. Computer & Info. L. 685 (1998), David E. Sorkin, Steven A. Mcauley, David B. Nash Iii
UIC John Marshall Journal of Information Technology & Privacy Law
Many public libraries provide patrons with free public-access Internet terminals, largely for accessing information available on the World Wide Web. However, public concern exists over the ability of children who browse the Web without adult supervision to view sexually explicit materials and other inappropriate items. This concern has led to the development of various Internet filtering software programs. Some filtering programs operate by blocking access to documents containing certain words or phrases or combinations thereof. However, more common programs permit access only to documents or sites that appear in a pre-selected, "safe" database or that block access to documents that …
1997 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 16 J. Marshall J. Computer & Info. L. 709 (1998), John Cartaina, Robert Dixon, Eric Rogers
1997 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 16 J. Marshall J. Computer & Info. L. 709 (1998), John Cartaina, Robert Dixon, Eric Rogers
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
1997 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 16 J. Marshall J. Computer & Info. L. 743 (1998), Michelle Regal Herrmann, Jennifer L. Johnson, Candace A. Ourso
1997 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 16 J. Marshall J. Computer & Info. L. 743 (1998), Michelle Regal Herrmann, Jennifer L. Johnson, Candace A. Ourso
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Eggs In Baskets: Distributing The Risks Of Electronic Signatures, 15 J. Marshall J. Computer & Info. L. 189 (1997), Benjamin Wright
Eggs In Baskets: Distributing The Risks Of Electronic Signatures, 15 J. Marshall J. Computer & Info. L. 189 (1997), Benjamin Wright
UIC John Marshall Journal of Information Technology & Privacy Law
Many risks are prevalent with the traditional signing of a paper document. The most notable is forgery. Under current law, the burden of proving the authenticity of a signature is on the recipient, not the signer. This burden motivates the recipient to be responsible. For instance, when accepting a signature, the recipient may wish to elicit further evidence of genuineness and request the signer to acknowledge his or her signature before a notary public. Considering the many risks associated with the authentication of paper documents, the authentication of electronic documents and signatures will not be different. Strategies have been developed …
Right On The Mark: Defining The Nexus Between Trademarks And Internet Domain Names, 15 J. Marshall J. Computer & Info. L. 277 (1997), G. Peter Albert Jr.
Right On The Mark: Defining The Nexus Between Trademarks And Internet Domain Names, 15 J. Marshall J. Computer & Info. L. 277 (1997), G. Peter Albert Jr.
UIC John Marshall Journal of Information Technology & Privacy Law
The Internet is a rapidly expanding global network. The Internet provides a virtual marketplace in which many small companies are given the opportunity to have increased leverage to compete with their larger corporate counterparts. Businesses are establishing their presence on the Internet through the creation of a domain name. The domain name is an alphanumeric address that identifies a specific location on the Internet. Each domain name reflects a distinct address that distinguishes it from any other. Similarly, qualification of a word or symbol as a trademark must include the following three elements: (1) "function" to identify and distinguish the …
Use Tax Collection On Internet Purchases: Should The Mail Order Industry Serve As A Model, 15 J. Marshall J. Computer & Info. L. 203 (1997), Steven J. Forte
Use Tax Collection On Internet Purchases: Should The Mail Order Industry Serve As A Model, 15 J. Marshall J. Computer & Info. L. 203 (1997), Steven J. Forte
UIC John Marshall Journal of Information Technology & Privacy Law
Federal intervention is necessary to grant states the authority to collect state sales and use tax from Internet vendors who sell goods within their boundaries but reside elsewhere. With such federal intervention, local retailers, who must charge state use and sales tax to their customers, can compete more fairly with Internet vendors. In addition, state governments can access a large and growing revenue source. Under the Commerce Clause of the United States Constitution, a vendor must have a physical presence on a state before a state can require the vendor to collect and remit sales and use tax. In addition, …
Foreword: The Cyberspace Scramble: Domain Names, 15 J. Marshall J. Computer & Info. L. 411 (1997), Stephen E. Marshall
Foreword: The Cyberspace Scramble: Domain Names, 15 J. Marshall J. Computer & Info. L. 411 (1997), Stephen E. Marshall
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Scientological Defenestration Of Choice-Of-Law Doctrines For Publication Torts On The Internet, 15 J. Marshall J. Computer & Info. L. 361 (1997), Christopher P. Beall
The Scientological Defenestration Of Choice-Of-Law Doctrines For Publication Torts On The Internet, 15 J. Marshall J. Computer & Info. L. 361 (1997), Christopher P. Beall
UIC John Marshall Journal of Information Technology & Privacy Law
Two major doctrines exist for choosing which state's law applies to an interstate tort: the "lex loci deliciti" (the law of the place of the wrong) approach and the "most significant relationship" approach. In the context of the Internet, the "lex loci deliciti" approach has been criticized for its harshness. For example, it is possible for an e-mail posting to be non-actionable where written, but actionable where read. Likewise, the "most significant relationship" approach has been criticized for its indeterminacy and lack of predictability because the outcome as to the extent of liability for a publication tort on the Internet …
A Request To The High Court: Don't Let The Patent Laws Be Distracted By A Flashy Trade Dress, 15 J. Marshall J. Computer & Info. L. 323 (1997), Manotti L. Jenkins
A Request To The High Court: Don't Let The Patent Laws Be Distracted By A Flashy Trade Dress, 15 J. Marshall J. Computer & Info. L. 323 (1997), Manotti L. Jenkins
UIC John Marshall Journal of Information Technology & Privacy Law
The United States Court of Appeals for the Tenth Circuit, in Vornado Air Circulation Systems Inc. v. Duracraft Corp., held in the negative the issue of "whether a product configuration is entitled to trade dress protection when it is or has been a significant inventive component of an invention covered by a utility patent." The court viewed the case involved as an issue of the "intersection of the Patent Act and the Lanham Trade-Mark Act," and reasoned that "patent policy dictates" that the Patent Act should prevail in these situations. The United States Supreme Court denied certiorari upon appeal by …
Using The Dna Profile As The Unique Patient Identifier In The Community Health Information Network: Legal Implications, 15 J. Marshall J. Computer & Info. L. 227 (1997), Lisa L. Dahm
UIC John Marshall Journal of Information Technology & Privacy Law
One of the greatest obstacles to electronic medical record keeping is the absence of a unique patient identifier. With the sharing of patient's information, an increased risk of error exists. Among these risks are the transmission of the wrong patient's records and security of confidential patient information. Implementation of a uniform patient identifier will eliminate the obstacle to cooperation and information-sharing of health data. This article proposes the application of a unique protocol, which utilizes DNA fingerprints as a patient's personal identifier. Since each individual's DNA profile is distinctly different, the fingerprint would act as the patient's personal bar code, …
Blackhole In Cyberspace: The Legal Void In The Internet, 15 J. Marshall J. Computer & Info. L. 413 (1997), Alexander Gigante
Blackhole In Cyberspace: The Legal Void In The Internet, 15 J. Marshall J. Computer & Info. L. 413 (1997), Alexander Gigante
UIC John Marshall Journal of Information Technology & Privacy Law
Most people surf the Internet with little concern for who makes decisions regarding Internet administrative matters and who has the authority to make those decisions. Initially, as the Internet evolved out of a project sponsored by the U.S. Department of Defense in 1969, many "founder groups," such as the Internet Assigned Numbers Authority, formed under the auspices of the federal government to administer the network's development. While these groups continue to function today as the main decision-making bodies over all aspects of the Internet's governance, several newer organizations, such as the Internet Society, have taken an important role in the …
Keeping Business Out Of The Bedroom: Protecting Personal Privacy Interests From The Retail World, 15 J. Marshall J. Computer & Info. L. 391 (1997), David J. Klein
UIC John Marshall Journal of Information Technology & Privacy Law
The federal government as well as private companies maintain personality profile lists containing records of personal information touching on many aspects of an individual's life. Some companies seek to acquire these lists from the federal government or from other businesses in order to increase their profits by targeting those individuals within the lists who appear most likely to buy their products or services. Therefore, personal information that consumers initially disclosed to a business in confidence becomes public knowledge shared among other businesses. As a result, consumers feel that the list creator invaded their privacy. Frustrated consumers attempt to keep such …
A Primer On Trademark Law And Internet Addresses, 15 J. Marshall J. Computer & Info. L. 465 (1997), David J. Loundy
A Primer On Trademark Law And Internet Addresses, 15 J. Marshall J. Computer & Info. L. 465 (1997), David J. Loundy
UIC John Marshall Journal of Information Technology & Privacy Law
The conflicts arising over Internet addresses generally fall within four categories: trademarks as second-level domains; second-level domains that are similar to trademarks; trademarks as third-level domain/machine names; and trademarks as userIDs. When confronted with the four categories, a court will generally analyze the problem by looking at the likelihood of confusion, applying the dilution statutes, and determining if the trademark has been blurred or tarnished. The likelihood of confusion analysis looks at: the degree of similarity between the marks in appearance and suggestion; the similarity of the product or services; the area and manner of concurrent use; the degree of …
Orderly Expansion Of The International Top-Level Domains: Concurrent Trademark Users Need A Way Out Of The Internet Trademark Quagmire, 15 J. Marshall J. Computer & Info. L. 521 (1997), David B. Nash
UIC John Marshall Journal of Information Technology & Privacy Law
Organizations that want to conduct business on the Internet have to register with Network Solutions, Inc. (NSI). The Internet was created as a network designed by the Defense Department to test a fail safe network. The National Science Foundation connects to the Internet five supercomputing centers, which connects most public colleges to the Internet. The World Wide Web was the first service that was opened to individuals and for commercial use. Commercial success on the Internet depends on the ease with which consumers can find the organization on-line. If the company has established good will in the public, the company …
Remedies In Domain Name Lawsuits: How Is A Domain Name Like A Cow?, 15 J. Marshall J. Computer & Info. L. 437 (1997), Carl Oppedahl
Remedies In Domain Name Lawsuits: How Is A Domain Name Like A Cow?, 15 J. Marshall J. Computer & Info. L. 437 (1997), Carl Oppedahl
UIC John Marshall Journal of Information Technology & Privacy Law
A court sitting in equity should take five factors into consideration when determining whether a domain name address should be transferred. First, the court must ask whether the trademark is coined, not in the dictionary and unique. It is important to note that famous does not mean unique. Uniqueness helps a court to simplify the issue by focusing the issue to whether only one company is entitled to the address. This question requires a party seeking a remedy to conduct a search of the entire Internet using search engines, on-line trademark databases, and company name searches. The court should only …
The Federal Government Giveth And Taketh Away: How Nsi's Domain Name Dispute Policy (Revision 02) Usurps A Domain Name Owner's Fifth Amendment Procedural Due Process, 15 J. Marshall J. Computer & Info. L. 547 (1997), Steven A. Mcauley
UIC John Marshall Journal of Information Technology & Privacy Law
The Internet, which links millions of computer networks together worldwide for the purpose of automated communication, is the forefront of communications technology. An Internet domain name, which functions as a computer user's "address" on the Internet, not only identifies individuals and organizations, but is an important commercial source designator for businesses. The Internet Network Information Center ("InterNIC") is a central resource center for Internet users that operates the Internet Domain Name System ("DNS"). InterNIC, which comprises NSI and AT&T, performs various Internet services, including NSI's Internet domain name coordination and registration. Along with the positive effects that the Internet has …
An Island In The Net: Domain Naming And English Administrative Law, 15 J. Marshall J. Computer & Info. L. 493 (1997), Mark Gould
UIC John Marshall Journal of Information Technology & Privacy Law
The United Kingdom's system for assigning domain names is privately run and follows some Internet standard for assignments and revocations. However, there are some internal restrictions that reflect the policy of accommodating existing domains and avoiding DNS lock up, which might occur with badly configured domain name servers. Nominet does not easily fit into definitions of a private function since it does have some public characteristics. In addition, no British counterpart to the Internet Service OC exists. The policies followed by Nominet in allocating domain names reflects conventions established prior to its existence. These policies do not appear to take …
1996 John Marshall National Moot Court Competition In Information And Privacy Law: Brief For The Petitioner, 15 J. Marshall J. Computer & Info. L. 609 (1997), Donna Blevins, Kathy Partain, Jay Ray
1996 John Marshall National Moot Court Competition In Information And Privacy Law: Brief For The Petitioner, 15 J. Marshall J. Computer & Info. L. 609 (1997), Donna Blevins, Kathy Partain, Jay Ray
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Federal Trade Commission's Commitment To On-Line Consumer Protection, 15 J. Marshall J. Computer & Info. L. 679 (1997), Roscoe B. Starek Iii, Lynda M. Rozelle
The Federal Trade Commission's Commitment To On-Line Consumer Protection, 15 J. Marshall J. Computer & Info. L. 679 (1997), Roscoe B. Starek Iii, Lynda M. Rozelle
UIC John Marshall Journal of Information Technology & Privacy Law
This article deals with the Federal Trade Commission's (FTC) efforts to apply consumer protection statutes to on-line activity. The article describes the role of the FTC and explains how it operates. It also discusses the applicability of the Mail or Telephone Order Merchandise Rule, the Fair Credit Billing Act and the Electronic Fund Transfer Act to on-line commerce. Lastly, it describes and examines Section 5 of the FTC Act, which prohibits unfair and deceptive acts or practices in or affecting commerce. This article also examines recent cases that involved on-line crimes, as well as "sweeps" that the FTC regularly executes …
Perfecting A Security Interest In Computer Software Copyrights: Getting It Right, 15 J. Marshall J. Computer & Info. L. 855 (1997), Aimee A. Watterberg
Perfecting A Security Interest In Computer Software Copyrights: Getting It Right, 15 J. Marshall J. Computer & Info. L. 855 (1997), Aimee A. Watterberg
UIC John Marshall Journal of Information Technology & Privacy Law
The rapid development of computer technology has led software companies to seek financial support from various commercial lenders. Lenders are typically unaccustomed and unwilling to lend money on the security of intellectual property. The fear of lenders is well founded because lenders face a considerable risk in lending money on contemporary and intangible collateral. As a result of the unavailability of funds, technology based companies would be hindered in their efforts to promote new programs. The unclarity of laws with respect to obtaining a security interest has created obstacles for parties on both sides of the transaction -- the lender …
The West German Smorgasbord Approach To Intellectual Property Protection Of Computer Software, 15 J. Marshall J. Computer & Info. L. 883 (1997), Larry N. Woodard
The West German Smorgasbord Approach To Intellectual Property Protection Of Computer Software, 15 J. Marshall J. Computer & Info. L. 883 (1997), Larry N. Woodard
UIC John Marshall Journal of Information Technology & Privacy Law
There is a lack of efficient protection for intellectual property within the computer software medium. Intellectual property of computer software has traditionally been protected by copyrights and relatively recently has been afforded protection of its intellectual property via patents. The distinction between a computer's hardware and a computer's software is decreasing; likewise, the distinction for such protection, namely patents and copyrights, respectively, should be decreased or eliminated, as well. After a brief comparative analysis of patent and copyright protection for computer software, an alternative to the current system of protection for software intellectual property exists. The nature of the software …
1996 John Marshall National Moot Court Competition In Information And Privacy Law: Bench Memorandum, 15 J. Marshall J. Computer & Info. L. 587 (1997), David E. Sorkin
1996 John Marshall National Moot Court Competition In Information And Privacy Law: Bench Memorandum, 15 J. Marshall J. Computer & Info. L. 587 (1997), David E. Sorkin
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Notaries Public - Lost In Cyberspace, Or Key Business Professionals Of The Future?, 15 J. Marshall J. Computer & Info. L. 703 (1997), Michael L. Closen, R. Jason Richards
Notaries Public - Lost In Cyberspace, Or Key Business Professionals Of The Future?, 15 J. Marshall J. Computer & Info. L. 703 (1997), Michael L. Closen, R. Jason Richards
UIC John Marshall Journal of Information Technology & Privacy Law
This article examines past and future problems that notaries and cybernotaries face. The article discusses the lack of notaries' business worth because of their inadequate knowledge of their responsibilities and poor job performance. The authors explain the reasons for notaries' inadequate knowledge of their responsibilities, ranging from failure to test before commission renewal to failure to describe the duties of the office. In addition, the authors examine the reasons behind poor job performance, such as negligence, misunderstanding and even illegal conduct. The article discusses the procedure to become a notary, ranging from the qualifications to become a notary to the …
Personal Jurisdiction In Cyberspace: The Constitutional Boundary Of Minimum Contacts Limited To A Web Site, 15 J. Marshall J. Computer & Info. L. 819 (1997), David L. Stott
UIC John Marshall Journal of Information Technology & Privacy Law
This comment analyzes the limits of personal jurisdiction arising from cyberspace contacts through a discussion of the traditional framework of personal jurisdiction, including a minimum contacts analysis. It examines pertinent decisions wherein the courts apply the personal jurisdiction framework to contacts limited to the Internet, such as CompuServe v. Patterson, Zippo Manufacturing v. Zippo Dot Com, Bensusan v. King, and Hearst v. Goldberger. The comment further analogizes the minimum contacts involved in cyberspace transactions by using the narrow "stream of commerce" analysis adopted by Justice O'Connor in Asahi requiring additional activity within a jurisdiction for personal jurisdiction to exist within …
1996 John Marshall National Moot Court Competition In Information And Privacy Law: Brief For The Respondent, 15 J. Marshall J. Computer & Info. L. 645 (1997), Stacey Mckinley, Elizabeth Schmidt, Jeffrey Whitesell
1996 John Marshall National Moot Court Competition In Information And Privacy Law: Brief For The Respondent, 15 J. Marshall J. Computer & Info. L. 645 (1997), Stacey Mckinley, Elizabeth Schmidt, Jeffrey Whitesell
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Copyright Battle: Emerging International Rules And Roadblocks On The Global Information Infrastructure, 15 J. Marshall J. Computer & Info. L. 759 (1997), Stephen Fraser
UIC John Marshall Journal of Information Technology & Privacy Law
This article discusses intellectual property rights on the Global Information Infrastructure (GII) as affected by the evolution of the Internet. It outlines the battle between the advocates of total copyright protection and the advocates of minimal copyright protection. The article examines all of the proposed national and international laws affecting copyright protection on the GII, beginning with the minimal protections outlined in the Berne Convention and the problems involved in its enforcement and continuing with its successors, the General Agreement on Tariffs and Trade (GATT)/World Trade Organization (WTO). The article reviews the history of international copyright protection and the different …
Legal Aspects - Software Reverse Engineering And Copyright: Past, Present And Future, 31 J. Marshall L. Rev. 1 (1997), Brian C. Behrens, Reuven R. Levary
Legal Aspects - Software Reverse Engineering And Copyright: Past, Present And Future, 31 J. Marshall L. Rev. 1 (1997), Brian C. Behrens, Reuven R. Levary
UIC Law Review
No abstract provided.
Fetal Tissue Research: State Regulation Of The Donation Of Aborted Fetuses Without The Consent Of The Mother, 31 J. Marshall L. Rev. 277 (1997), Christie A. Seifert
Fetal Tissue Research: State Regulation Of The Donation Of Aborted Fetuses Without The Consent Of The Mother, 31 J. Marshall L. Rev. 277 (1997), Christie A. Seifert
UIC Law Review
No abstract provided.
Race-Based Jury Nullification: Case-In-Chief, 30 J. Marshall L. Rev. 911 (1997), Paul D. Butler
Race-Based Jury Nullification: Case-In-Chief, 30 J. Marshall L. Rev. 911 (1997), Paul D. Butler
UIC Law Review
No abstract provided.
Women's Powerless Tool: How Congress Overreached The Constitution With The Civil Rights Remedy Of The Violence Against Women Act, 30 J. Marshall L. Rev. 803 (1997), Lisa A. Carroll
UIC Law Review
No abstract provided.