Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Law

Making Virtual Copyright Work, Matthew R. Farley Oct 2010

Making Virtual Copyright Work, Matthew R. Farley

Law Student Publications

This Article proposes measures that attempt to strike the balance between creation and access. The virtual-world community is not likely to persevere with the little copyright protection it currently enjoys. Creativity will dwindle and the rich, energetic settings that make virtual worlds so attractive to businesses and entertainers will follow suit. At the same time, because much of the creativity in virtual worlds is derivative in nature, virtual creators are also unlikely to benefit from strong copyright protections. Therefore, current interpretation of copyright law must be revisited and revised before applying it to virtual worlds. Part I details virtual worlds …


Prosecute The Cheerleader, Save The World?: Asserting Federal Jurisdiction Over Child Pornography Crimes Committed Through "Sexting", Isaac A. Mcbeth May 2010

Prosecute The Cheerleader, Save The World?: Asserting Federal Jurisdiction Over Child Pornography Crimes Committed Through "Sexting", Isaac A. Mcbeth

University of Richmond Law Review

No abstract provided.


Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Francis C. Oroszlan Jan 2010

Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Francis C. Oroszlan

Richmond Journal of Law & Technology

The Richmond Journal of Law and Technology is proud to present the first issue of the 2010–2011 academic year. This issue addresses topics ranging across the legal and technological spectrums, and tackles subject matter at the forefront and future of legal debate.


A Review Of The Law In Jurisdictions Requiring Electronic Recording Of Custodial Interrogations, Alan M. Gershel Jan 2010

A Review Of The Law In Jurisdictions Requiring Electronic Recording Of Custodial Interrogations, Alan M. Gershel

Richmond Journal of Law & Technology

Although not constitutionally required, it has become considerably more commonplace for law enforcement to electronically record a suspect’s custodial interrogation. This includes a complete recording, beginning with the advice of rights and continuing through the end of the interrogation. In fact, society now recognizes it as a useful, if not necessary, tool for law enforcement.


Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Robert Michaux Jan 2010

Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Robert Michaux

Richmond Journal of Law & Technology

The Richmond Journal of Law and Technology is proud to present the fourth issue of the 2009–2010 academic year. In this issue, we explore the ever expanding duties of counsel responsible for electronically stored information, the application of 3D imaging technology to improve arson investigation, and the need for expanding copyright protection over the lawless Darknet.


Time For An Upgrade: Amending The Federal Rules Of Evidence To Address The Challenges Of Electronically Stored Information In Civil Litigation, Jonathan L. Moore Jan 2010

Time For An Upgrade: Amending The Federal Rules Of Evidence To Address The Challenges Of Electronically Stored Information In Civil Litigation, Jonathan L. Moore

Law Student Publications

In recent years, electronically stored information (ESI) has begun to play an increasingly important role in civil litigation. Although the e-discovery amendments to the Federal Rules of Civil Procedure in 2006 provided guidelines for the discovery of this information, no accompanying changes were made to the Federal Rules of Evidence to govern the admissibility of this information at trial. This article outlines the vastly different ways courts have addressed this problem in three areas: authentication, hearsay, and the best evidence rule. After discussing the various approaches courts take in these areas, this article proposes specific amendments to the Federal Rules …


Making The Punishment Fit The (Computer) Crime: Rebooting Notions Of Possession For The Federal Sentencing Of Child Pornography Offenses, Jelani Jefferson Exum Jan 2010

Making The Punishment Fit The (Computer) Crime: Rebooting Notions Of Possession For The Federal Sentencing Of Child Pornography Offenses, Jelani Jefferson Exum

Richmond Journal of Law & Technology

Sexual exploitation of children is a real and disturbing problem. However, when it comes to the sentencing of child pornography possessors, the U.S. federal system has a problem, as well. This Article adds to the current, heated discussion on what is happening in the sentencing of federal child pornography possession offenses, why nobody is satisfied, and how much the Federal Sentencing Guidelines are to blame. At the heart of this Article are the forgotten players in the discussion—computers and the Internet—and their role in changing the realities of child pornography possession. This Article argues that computers and the Internet are …


Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Nancy Porcari Jan 2010

Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Nancy Porcari

Richmond Journal of Law & Technology

The Richmond Journal of Law and Technology is proud to present our Annual Survey issue, the third issue of the 2009–2010 academic year.


The Expanding Duties Of Esi And In-House Counsel: Providing Defensible Preservation And Production Efforts After Swofford V. Eslinger, David W. Degnan Jan 2010

The Expanding Duties Of Esi And In-House Counsel: Providing Defensible Preservation And Production Efforts After Swofford V. Eslinger, David W. Degnan

Richmond Journal of Law & Technology

As a general rule, companies and government agencies should plan for preservation and production before litigation is probable. This means having a document retention program. These programs ensure that documents are retained or deleted in an orderly fashion. If a company properly follows its policies and procedures, this retention program acts as a “shield” against the incomplete preservation of relevant (or “hot”) documents deleted before the proper initiation of a litigation hold. If parties do not follow, or inconsistently follow, such a program, they might have to explain what happened to a missing relevant document. Thus, a retention program might …


Protecting The Children: Challenges That Result In, And Consequences Resulting From, Inconsistent Prosecution Of Child Pornography Cases In A Technical World, Francis S. Monterosso Jan 2010

Protecting The Children: Challenges That Result In, And Consequences Resulting From, Inconsistent Prosecution Of Child Pornography Cases In A Technical World, Francis S. Monterosso

Richmond Journal of Law & Technology

Of all the sinister things that Internet viruses do, this might be the worst: They can make you an unsuspecting collector of child pornography. Heinous pictures and videos can be deposited on computers by viruses—the malicious programs better known for swiping your credit card numbers. In this twist, it’s your reputation that’s stolen. Pedophiles can exploit virus-infected PCs to remotely store and view their stash without fear they’ll get caught. Pranksters or someone trying to frame you can tap viruses to make it appear that you surf illegal Web sites. Whatever the motivation, you get child porn on your computer—and …


The Darknet: A Digital Copyright Revolution, Jessica A. Wood Jan 2010

The Darknet: A Digital Copyright Revolution, Jessica A. Wood

Richmond Journal of Law & Technology

We are in the midst of a digital revolution. In this “Age of Peer Production,” armies of amateur participants demand the freedom to rip, remix, and share their own digital culture. Aided by the newest iteration of file sharing networks, digital media users now have the option to retreat underground, by using secure, private, and anonymous file sharing networks, to share freely and breathe new life into digital media. These underground networks, collectively termed “the Darknet[,] will grow in scope, resilience, and effectiveness in direct proportion to [increasing] digital restrictions the public finds untenable.” The Darknet has been called the …


The Not-So-Risky Business Of High-End Escorts And The Internet In The 21st Century, Robert Rigg Jan 2010

The Not-So-Risky Business Of High-End Escorts And The Internet In The 21st Century, Robert Rigg

Richmond Journal of Law & Technology

Prostitution is often referred to as “the world’s oldest profession.” It is defined as “[t]he act or practice of engaging in sexual activity for money or its equivalent.” As a service industry, it fulfills specific human desires. Nevertheless, most states condemn and criminalize both the act of prostitution and those who solicit such services.