Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Accounting (1)
- Administrative Law (1)
- Admiralty (1)
- Agency (1)
- Agriculture Law (1)
-
- Air and Space Law (1)
- Animal Law (1)
- Arts and Entertainment (1)
- Banking and Finance (1)
- Bankruptcy Law (1)
- Biography (1)
- Civil Law (1)
- Civil Rights and Discrimination (1)
- Commercial Law (1)
- Communications Law (1)
- Comparative and Foreign Law (1)
- Computer Law (1)
- Conflict of Laws (1)
- Constitutional Law (1)
- Consumer Protection Law (1)
- Contracts (1)
- Corporations (1)
- Courts (1)
- Criminal Law and Procedure (1)
- Dispute Resolution (1)
- Domestic Relations (1)
- Economics (1)
- Education Law (1)
- Elder Law (1)
- Employment Practice (1)
- Publication
- Publication Type
Articles 1 - 3 of 3
Full-Text Articles in Computer Law
Breaking The Bank: Revisiting Central Bank Of Denver After Enron And Sarbanes-Oxley, Celia Taylor
Breaking The Bank: Revisiting Central Bank Of Denver After Enron And Sarbanes-Oxley, Celia Taylor
ExpressO
No abstract provided.
Preventing "You've Got Mail"™ From Meaning "You've Been Served": How Service Of Process By E-Mail Does Not Meet Constitutional Procedure Due Process Requirements, 38 J. Marshall L. Rev. 1121 (2005), Matthew R. Schreck
UIC Law Review
No abstract provided.
Nothing New Under The Sun? A Technologically Rational Doctrine Of Fourth Amendment Search, Stephen E. Henderson
Nothing New Under The Sun? A Technologically Rational Doctrine Of Fourth Amendment Search, Stephen E. Henderson
Stephen E Henderson
The Fourth Amendment to the United States Constitution prohibits unreasonable searches and seizures. Yet as interpreted by the United States Supreme Court, the Amendment places no restriction on police combing through financial records; telephone, e-mail and website transactional records; or garbage left for collection. Indeed there is no protection for any information knowingly provided to a third party, because the provider is said to retain no reasonable expectation of privacy in that information. As technology dictates that more and more of our personal lives are available to anyone equipped to receive them, and as social norms dictate that more and …