Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Database

Discipline
Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 85

Full-Text Articles in Law

Law Library Blog (October 2022): Legal Beagle's Blog Archive, Roger Williams University School Of Law Oct 2022

Law Library Blog (October 2022): Legal Beagle's Blog Archive, Roger Williams University School Of Law

Law Library Newsletters/Blog

No abstract provided.


Database Floklore Dalam Undang-Undang Tentang Hak Cipta Dan Undang-Undang Tentang Pemajuan Kebudayaan, Lora Sinta Sulistiorini Sep 2022

Database Floklore Dalam Undang-Undang Tentang Hak Cipta Dan Undang-Undang Tentang Pemajuan Kebudayaan, Lora Sinta Sulistiorini

Jurnal Hukum & Pembangunan

Law 28/2014 on Copyright and Law 5/2017 on Cultural Promotion have a major role in regulating and protecting floklore. This can be seen from the norms that regulate the mechanism for protecting floklore in Article 38 paragraph (2) of the Copyright Law, which states that the state is obliged to make an inventory, maintain, and maintain traditional cultural expressions.law a quo also regulates the procedures for recording as contained in Articles 66-72. Not only that, the Law for the Advancement of Culture also regulates the floklore database through Articles 16-26 of a quo. The two laws then raise the question, …


Solving Crimes With 23andme: Dna Databases And The Future Of Law Enforcement, Meghan Mcloughlin Apr 2022

Solving Crimes With 23andme: Dna Databases And The Future Of Law Enforcement, Meghan Mcloughlin

Journal of Civil Rights and Economic Development

(Excerpt)

“It could never happen to me though, right?”

Sitting on our comfortable couches in our secure homes and watching news stories about people who have lost loved ones to the most terrible, violent crimes, we think to ourselves: “That’s awful for them, but it won’t happen to me.” But what if it did?

Becoming a victim of a violent crime or loving someone who becomes a victim of a crime in the United States is not uncommon. In 2016, 2.9 million people in the United States were victims of at least one “violent crime”—crimes defined by their inherent violence, …


Law Library Blog (March 2022): Legal Beagle's Blog Archive, Roger Williams University School Of Law Mar 2022

Law Library Blog (March 2022): Legal Beagle's Blog Archive, Roger Williams University School Of Law

Law Library Newsletters/Blog

No abstract provided.


Law Library Blog (January 2022): Legal Beagle's Blog Archive, Roger Williams University School Of Law Jan 2022

Law Library Blog (January 2022): Legal Beagle's Blog Archive, Roger Williams University School Of Law

Law Library Newsletters/Blog

No abstract provided.


Law Library Blog (September 2021): Legal Beagle's Blog Archive, Roger Williams University School Of Law Sep 2021

Law Library Blog (September 2021): Legal Beagle's Blog Archive, Roger Williams University School Of Law

Law Library Newsletters/Blog

No abstract provided.


A. Part I Mld Mapping Assignment And Instructions, Maryanne Kowaleski, Camila Marcone Feb 2021

A. Part I Mld Mapping Assignment And Instructions, Maryanne Kowaleski, Camila Marcone

Digital Pedagogy: Medieval Londoners Mapping Project

Notes the aims of the assignment, lists resources to help students do research on the deeds, and gives detailed instructions for A) structuring the data about people in the deed into the MLD Mapping Sheet and B) preparing the data about the property for entry into the online mapping platform, Layers of London, using the Layers of London Grid.


Dna Is Different: An Exploration Of The Current Inadequacies Of Genetic Privacy Protection In Recreational Dna Databases, Jamie M. Zeevi Mar 2020

Dna Is Different: An Exploration Of The Current Inadequacies Of Genetic Privacy Protection In Recreational Dna Databases, Jamie M. Zeevi

St. John's Law Review

(Excerpt)

Part I of this Note discusses the fundamental science behind DNA and defines and explains the process of familial DNA searching. Part I also discusses how Carpenter v. United States provides a framework to begin thinking about the unique nature of DNA and privacy implications for its use, and why the revealing nature of this type of data warrants protection. Part II of this Note delves into the lack of constitutional and statutory protections for DNA in recreational DNA databases. First, Part II explains that traditional Fourth Amendment concepts, like search warrants, probable cause, reasonable expectation of privacy, third-party …


Police Brutality And State-Sanctioned Violence In 21st Century America, Itohen Ihaza Jan 2020

Police Brutality And State-Sanctioned Violence In 21st Century America, Itohen Ihaza

Journal of Race, Gender, and Ethnicity

No abstract provided.


The “Step-Child Of Scholarly Investigation”: Preliminary Observations About The Origins Of Academic Jewish Law Scholarship, David Hollander Jan 2020

The “Step-Child Of Scholarly Investigation”: Preliminary Observations About The Origins Of Academic Jewish Law Scholarship, David Hollander

Touro Law Review

No abstract provided.


Law Library Blog (November 2018): Legal Beagle's Blog Archive, Roger Williams University School Of Law Nov 2018

Law Library Blog (November 2018): Legal Beagle's Blog Archive, Roger Williams University School Of Law

Law Library Newsletters/Blog

No abstract provided.


Сivil Legal Protection Of A Database According To The Legislation Of Foreign Countries, Q.A. Mehmonov Mar 2018

Сivil Legal Protection Of A Database According To The Legislation Of Foreign Countries, Q.A. Mehmonov

Review of law sciences

The article considers the legal regime of the database on legislation of the Republic of Uzbekistan. The author analyzes the world experience of determining the legal regime of databases, the sui generis institute due to European law, the opinion of scientists of civilizations on defining the legal regime, established with respect to databases. In conclusion, the author gives his suggestions on improving the legislative framework.


Gun Control To Major Tom: An Analysis Of Failed Gun Regulations And The Terrorist Watchlist, Paolo G. Corso Aug 2017

Gun Control To Major Tom: An Analysis Of Failed Gun Regulations And The Terrorist Watchlist, Paolo G. Corso

University of Massachusetts Law Review

As a division of the Federal Bureau of Investigation’s National Security Branch, the Terrorist Screening Center maintains the Terrorist Watchlist, a central database for identifying individuals known or suspected to engage in terrorism or terrorist activities. Subsumed under the Terrorist Watchlist is the No Fly List, which prohibits individuals from boarding commercial aircrafts in and out of the United States. Placement on either list presumes named individuals as a potential threat to U.S. national security, yet there is no restriction preventing them from legally purchasing firearms. Following a mass shooting at an Orlando nightclub in June of 2016, which was …


Sql Injection: The Longest Running Sequel In Programming History, Matthew Horner, Thomas Hyslip Jun 2017

Sql Injection: The Longest Running Sequel In Programming History, Matthew Horner, Thomas Hyslip

Journal of Digital Forensics, Security and Law

One of the risks to a company operating a public-facing website with a Structure Query Language (SQL) database is an attacker exploiting the SQL injection vulnerability. An attacker can cause an SQL database to perform actions that the developer did not intend like revealing, modifying, or deleting sensitive data. This can cause a loss of confidentiality, integrity, and availability of information in a company’s database, and it can lead to severe costs of up to $196,000 per successful injection attack (NTT Group, 2014). This paper discusses the history of the SQL injection vulnerability, focusing on:

  • How an attacker can exploit …


Trending @ Rwu Law: Raquel Ortiz's Post: Deepening Connections Between Rwu Law And The State Bench And Bar: Library Edition 04-27-2017, Raquel Ortiz Apr 2017

Trending @ Rwu Law: Raquel Ortiz's Post: Deepening Connections Between Rwu Law And The State Bench And Bar: Library Edition 04-27-2017, Raquel Ortiz

Law School Blogs

No abstract provided.


Law Library Blog (April 2017): Legal Beagle's Blog Archive, Roger Williams University School Of Law Apr 2017

Law Library Blog (April 2017): Legal Beagle's Blog Archive, Roger Williams University School Of Law

Law Library Newsletters/Blog

No abstract provided.


Inventarisasi Ekspresi Budaya Tradisional Secara Terstruktur Sebagai Upaya Perlindungan Pengetahuan Tradisional, Isti Novianti Sep 2015

Inventarisasi Ekspresi Budaya Tradisional Secara Terstruktur Sebagai Upaya Perlindungan Pengetahuan Tradisional, Isti Novianti

Jurnal Hukum & Pembangunan

Indonesia is a country that has an assortment of tribes and customs. To be observed the diverse cultures that exist so that governments are required to keep to be preserved properly. To know and recognize traditional cultures of various regions will require a data base that includes the traditional knowledge in Indonesia. This database can also be used as a source of information that can be accessed both international and domestic. In this case the central government and regional governments are given the authority to inventory Traditional Cultural Expressions. Effort into making the database has been started in the discourse …


Law Library Blog (September 2015): Legal Beagle's Blog Archive, Roger Williams University School Of Law Sep 2015

Law Library Blog (September 2015): Legal Beagle's Blog Archive, Roger Williams University School Of Law

Law Library Newsletters/Blog

No abstract provided.


Brief Of Amici Curiae Former Consular Officers In Support Of Respondent, Kerry V. Din, No. 13-1402 United States Supreme Court, Ira J. Kurzban, Edward F. Ramos, Jeffrey D. Kahn, Trina Realmuto Jan 2015

Brief Of Amici Curiae Former Consular Officers In Support Of Respondent, Kerry V. Din, No. 13-1402 United States Supreme Court, Ira J. Kurzban, Edward F. Ramos, Jeffrey D. Kahn, Trina Realmuto

Faculty Journal Articles and Book Chapters

This brief argues that certain visa application denials, particularly those based on information originating from agencies other than the Department of State, can be qualitatively different from denials based on consular discretion. Although the end result looks the same – “Visa Denied” – denials based on database and watchlist information maintained in the United States by the Department of Homeland Security, the FBI, and other agencies, bear little resemblance to the traditional exercise of consular discretion because the specific information which requires the consular officer to deny these visas is usually not available for him or her to evaluate. Real …


A Critique Of The Second Circuit’S Analysis In Nicholas V. Goord, John Dorsett Niles Dec 2014

A Critique Of The Second Circuit’S Analysis In Nicholas V. Goord, John Dorsett Niles

University of Massachusetts Law Review

The Case Note proceeds as follows. Part I traces the historical and procedural facts underlying Nicholas. Part II describes the legal backdrop against which the United States Court of Appeals for the Second Circuit decided the case. Part III steps through the Second Circuit’s majority opinion, and Part IV critiques the opinion. Part V concludes the Case Note by discussing the ramifications of Nicholas for future DNA-indexing cases.


S14rs Sgr No. 12 (Syllabus Database), Latham, Andrew Mullet, Muehleman Apr 2014

S14rs Sgr No. 12 (Syllabus Database), Latham, Andrew Mullet, Muehleman

Student Senate Enrolled Legislation

No abstract provided.


The Coral Triangle Atlas: An Integrated Online Spatial Database System For Improving Coral Reef Management, Annick Cros, Nurulhuda Ahamad Fatan, Alan White, Shwu Jiau Teoh, Stanley Tan, Christian Handayani, Charles Huang, Nate Peterson, Ruben Venegas Li, Hendra Yusran Siry, Ria Fitriana, Jamison Gove, Tomoko Acoba, Maurice Knight, Renerio Acosta, Neil L. Andrew, Doug Beare Jan 2014

The Coral Triangle Atlas: An Integrated Online Spatial Database System For Improving Coral Reef Management, Annick Cros, Nurulhuda Ahamad Fatan, Alan White, Shwu Jiau Teoh, Stanley Tan, Christian Handayani, Charles Huang, Nate Peterson, Ruben Venegas Li, Hendra Yusran Siry, Ria Fitriana, Jamison Gove, Tomoko Acoba, Maurice Knight, Renerio Acosta, Neil L. Andrew, Doug Beare

Faculty of Law, Humanities and the Arts - Papers (Archive)

In this paper we describe the construction of an online GIS database system, hosted by WorldFish, which stores bio-physical, ecological and socio-economic data for the 'Coral Triangle Area' in South-east Asia and the Pacific. The database has been built in partnership with all six (Timor-Leste, Malaysia, Indonesia, The Philippines, Solomon Islands and Papua New Guinea) of the Coral Triangle countries, and represents a valuable source of information for natural resource managers at the regional scale. Its utility is demonstrated using biophysical data, data summarising marine habitats, and data describing the extent of marine protected areas in the region.


Comments On Maryland V. King In 'U.S. Supreme Court To Hear Arguments Over Md. Dna Case: Justices' Decision Will Have National Implications On Future Crime-Fighting Procedures', Colin Starger Feb 2013

Comments On Maryland V. King In 'U.S. Supreme Court To Hear Arguments Over Md. Dna Case: Justices' Decision Will Have National Implications On Future Crime-Fighting Procedures', Colin Starger

All Faculty Scholarship

No abstract provided.


Safe To Be Open: Study On The Protection Of Research Data And Recommendations For Access And Usage, Lucie Guibault, Andreas Wiebe Jan 2013

Safe To Be Open: Study On The Protection Of Research Data And Recommendations For Access And Usage, Lucie Guibault, Andreas Wiebe

Books

Openness has become a common concept in a growing number of scientific and academic fields. Expressions such as Open Access (OA) or Open Content (OC) are often employed for publications of papers and research results, or are contained as conditions in tenders issued by a number of funding agencies. More recently the concept of Open Data (OD) is of growing interest in some fields, particularly those that produce large amounts of data – which are not usually protected by standard legal tools such as copyright. However, a thorough understanding of the meaning of Openness – especially its legal implications – …


Empirical Associative Regulation – Drawing Future Regulatory Tools From The Experience Of The Past, Nachshon Goltz Oct 2012

Empirical Associative Regulation – Drawing Future Regulatory Tools From The Experience Of The Past, Nachshon Goltz

Nachshon Goltz

Traditionally, theories on regulation have suggested choosing the “right” regulatory tool for a given situation of desired behavioral steer, using a broad theoretical approach of understanding the factors involved in the regulatory realm and speculating or deducting from it toward the efficient choice.

In contrast, I am arguing that the process of choosing the “right” regulatory tool should be guided by an opposite process, in which a database of regulatory success and failure case studies will be created. The institute (i.e., governments, regulation agencies, etc.) seeking to steer behavior using regulatory tools (“the regulator”) will search this information body using …


Web Site Review: Elderlawanswers.Com Provides Services To Attorneys And Seniors, Kathryn Hensiak Aug 2012

Web Site Review: Elderlawanswers.Com Provides Services To Attorneys And Seniors, Kathryn Hensiak

Marquette Elder's Advisor

No abstract provided.


Recent French Decisions On Database Protection: Towards A More Consistent And Compliant Approach With The Court Of Justice’S Case Law?, Estelle Derclaye Jan 2012

Recent French Decisions On Database Protection: Towards A More Consistent And Compliant Approach With The Court Of Justice’S Case Law?, Estelle Derclaye

Estelle Derclaye

Since the official date of implementation of the Database Directive , namely the 1 January 1998, 14 years have now already passed. During this decade and a half, French courts have handed down around 30 decisions on database protection. Between 1998 and 2004, the year when the Court of Justice of the European Union (CJEU) handed down its first four parallel rulings on the sui generis right , the French case law on the sui generis right was quite erratic. Admittedly, such state of affairs was not dissimilar in other Member States owing to the sheer novelty of the sui …


Slides: Bmps For Reclamation: Do We Know What Is Effective?, Peter Stahl May 2011

Slides: Bmps For Reclamation: Do We Know What Is Effective?, Peter Stahl

Best Management Practices (BMPs): What? How? And Why? (May 26)

Presenter: Pete Stahl, Wyoming Reclamation and Restoration Center

19 slides


Unraveling The Exclusionary Rule: From Leon To Herring To Robinson - And Back?, David H. Kaye Jan 2011

Unraveling The Exclusionary Rule: From Leon To Herring To Robinson - And Back?, David H. Kaye

Journal Articles

The Fourth Amendment exclusionary rule began to unravel in United States v. Leon. The facts were compelling. Why exclude reliable physical evidence from trial when it was not the constable who blundered, but “a detached and neutral magistrate” who misjudged whether probable cause was present and issued a search warrant? Later cases applied the exception for “good faith” mistakes to a police officer who, pursuing a grudge against a suspect, arrested and searched him and his truck on the basis of a false and negligent report from a clerk in another county of an outstand­ing arrest warrant. The California Supreme …


Vol. Xii, Tab 49 - Declaration Of Thai Le In Support Of Google's Opposition To Partial Summary Judge As To Liability, Thai Le Apr 2010

Vol. Xii, Tab 49 - Declaration Of Thai Le In Support Of Google's Opposition To Partial Summary Judge As To Liability, Thai Le

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?