Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 15 of 15

Full-Text Articles in Computer Law

City Of Los Angeles V. Patel: The Upcoming Supreme Court Case No One Is Talking About, Adam Lamparello Dec 2014

City Of Los Angeles V. Patel: The Upcoming Supreme Court Case No One Is Talking About, Adam Lamparello

Adam Lamparello

Focusing solely on whether a hotel owner has a reasonable expectation of privacy in a guest registry is akin to asking whether Verizon Wireless has a reasonable expectation of privacy in its customer lists. The answer to those questions should be yes, but the sixty-four thousand dollar question—and the proverbial elephant in the room—is whether hotel occupants and cell phone users forfeit their privacy rights simply because they check into the Beverly Hills Hotel or call their significant others from a Smart Phone on the Santa Monica Freeway. Put differently, a hotel owner’s expectation of privacy in a guest registry …


The Replicator And The First Amendment, Kyle Langvardt Aug 2014

The Replicator And The First Amendment, Kyle Langvardt

Kyle Langvardt

As 3D printing technology improves, the theoretical endpoint comes into view: a machine that, like the “replicators” of Star Trek, can produce anything the user asks for out of thin air from a digital blueprint. Real-life technology may never reach that endpoint, but our progress toward it has accelerated sharply over the past few years—sharply enough, indeed, for legal scholars to weigh in on the phenomenon’s disruptive potential in areas ranging from intellectual property to gun rights. This paper is concerned with the First Amendment status of the digital blueprints. As of August 2014, it is the first law review …


Omnipresent Student Speech And The Schoolhouse Gate: Interpreting Tinker In The Digital Age, Watt L. Black Jr. Feb 2014

Omnipresent Student Speech And The Schoolhouse Gate: Interpreting Tinker In The Digital Age, Watt L. Black Jr.

Watt Lesley Black Jr.

This paper focuses primarily on federal circuit level decisions regarding public school district's ability to discipline students who engage in electronic speech while off-campus and not involved in school activities. Particular attention is paid to the question of whether and how appeals courts have been willing to apply the "material and substantial disruption" standard from the Supreme Court's 1969 Tinker v. Des Moines decision to speech occurring off-campus. The paper, which is targeted toward both legal scholars and school administrators, draws together the common threads from the various circuits and weaves them into a set of guidelines for school administrators …


A Comprehensive Approach To Bridging The Gap Between Cyberbullying Rules And Regulations And The Protections Offered By The First Amendment For Off-Campus Student Speech, Vahagn Amirian Aug 2013

A Comprehensive Approach To Bridging The Gap Between Cyberbullying Rules And Regulations And The Protections Offered By The First Amendment For Off-Campus Student Speech, Vahagn Amirian

Vahagn Amirian

No abstract provided.


Testing The Social Media Waters - First Amendment Entanglement Beyond The Schoolhouse Gates, Lily M. Strumwasser Jan 2013

Testing The Social Media Waters - First Amendment Entanglement Beyond The Schoolhouse Gates, Lily M. Strumwasser

Lily M Strumwasser

Dear Editor:

I am a third-year student at The John Marshall Law School in Chicago, Illinois, where I serve as the executive student publications editor of The John Marshall Law Review. In September 2013, I will work as an associate at Seyfarth Shaw in its labor and employment practice group. I am writing to submit my article, "Testing The Social Media Waters - First Amendment Entanglement Beyond The Schoolhouse Gates" My article considers the contours of student free speech rights within the context of public schools. I think and hope you will find it to be interesting and …


Emerging Technologies And Dwindling Speech, Jorge R. Roig Dec 2012

Emerging Technologies And Dwindling Speech, Jorge R. Roig

Jorge R Roig

Inspired in part by the recent holding in Bland v. Roberts that the use of the “Like” feature in Facebook is not covered by the Free Speech Clause, this article makes a brief foray into the approach that courts have taken in the recent past towards questions of First Amendment coverage in the context of emerging technologies. Specifically, this article will take a closer look at how courts have dealt with the issue of functionality in the context of First Amendment coverage of computer source code. The analysis of this and other recent experiences, when put in a larger context, …


Decoding First Amendment Coverage Of Computer Source Code In The Age Of Youtube, Facebook And The Arab Spring, Jorge R. Roig Dec 2011

Decoding First Amendment Coverage Of Computer Source Code In The Age Of Youtube, Facebook And The Arab Spring, Jorge R. Roig

Jorge R Roig

Computer source code is the lifeblood of the Internet. It is also the brick and mortar of cyberspace. As such, it has been argued that the degree of control that a government can wield over code can be a powerful tool for controlling new technologies. With the advent and proliferation in the Internet of social networking media and platforms for the publication and sharing of user-generated content, the ability of individuals across the world to communicate with each other has reached truly revolutionary dimensions.
The influence of Facebook in the popular revolutions of the Arab Spring has been well documented. …


An Illustration Of Hashing And Its Effect On Illegal File Content In The Digital Age, Stephen Hoffman Apr 2010

An Illustration Of Hashing And Its Effect On Illegal File Content In The Digital Age, Stephen Hoffman

Stephen P. Hoffman

I aim to show, through practical examples, that computer forensics techniques such as the use of hash values are inherently flawed in tracking illegal computer files. First, I describe the underlying theory of hashing algorithms and hash values, as well as explain that several U.S. government agencies keep detailed file databases in order to track or detect illegal files, e.g. pirated media or child pornography. These databases include the file’s unique hash values. Then, I provide real examples of hash values using MD5 and SHA-1 hashing algorithms to show how extremely minor alterations to a computer file produce radically different …


Surfing Past The Pall Of Orthodoxy: Why The First Amendment Virtually Guarantees Online Law School Graduates Will Breach The Aba Accreditation Barrier, Nicholas C. Dranias Jan 2007

Surfing Past The Pall Of Orthodoxy: Why The First Amendment Virtually Guarantees Online Law School Graduates Will Breach The Aba Accreditation Barrier, Nicholas C. Dranias

ExpressO

The impact of the constitutional dilemma created by the ABA’s aversion to Internet schooling is widespread. Currently, 18 states and 2 U.S. territories restrict bar exam eligibility to graduates of ABA-accredited law schools. Additionally, 29 states and 1 U.S. territory restrict admission to practice on motion to graduates of ABA-accredited law schools.

Although numerous lawsuits have been filed in ultimately failed efforts to strike down bar admission rules that restrict eligibility to graduates of ABA-accredited law schools, none has challenged the ABA-accreditation requirement based on the First Amendment’s prohibition on media discrimination. This Article makes that case.

Despite accelerating technological …


A Complete Property Right Amendment, John H. Ryskamp Oct 2006

A Complete Property Right Amendment, John H. Ryskamp

ExpressO

The trend of the eminent domain reform and "Kelo plus" initiatives is toward a comprehensive Constitutional property right incorporating the elements of level of review, nature of government action, and extent of compensation. This article contains a draft amendment which reflects these concerns.


Bond Repudiation, Tax Codes, The Appropriations Process And Restitution Post-Eminent Domain Reform, John H. Ryskamp Jun 2006

Bond Repudiation, Tax Codes, The Appropriations Process And Restitution Post-Eminent Domain Reform, John H. Ryskamp

ExpressO

This brief comment suggests where the anti-eminent domain movement might be heading next.


Buried Online: State Laws That Limit E-Commerce In Caskets, Jerry Ellig, Asheesh Agarwal Mar 2006

Buried Online: State Laws That Limit E-Commerce In Caskets, Jerry Ellig, Asheesh Agarwal

ExpressO

Consumers seeking to purchase caskets online could benefit from the Supreme Court’s 2005 decision that states cannot discriminate against interstate direct wine shipment. Federal courts have reached conflicting conclusions when asked whether state laws requiring casket sellers to be licensed funeral directors violate the U.S. Constitution’s Due Process Clause. In Powers v. Harris, the 10th Circuit even offered an unprecedented ruling that economic protectionism is a legitimate state interest that can justify otherwise unconstitutional policies. In Granholm v. Heald, however, the Supreme Court declared that discriminatory barriers to interstate wine shipment must be justified by a legitimate state interest, and …


The Secret Is Out: Patent Law Preempts Mass Market License Terms Barring Reverse Engineering For Interoperability Purposes, Daniel Laster Feb 2006

The Secret Is Out: Patent Law Preempts Mass Market License Terms Barring Reverse Engineering For Interoperability Purposes, Daniel Laster

ExpressO

As patent protection has emerged to protect software, courts and commentators have mistakenly focused on copyright law and overlooked the centrality of patent preemption to limit contract law where a mass market license which prohibits reverse engineering (RE) for purposes of developing interoperable products leads to patent-like protection. Review of copyright fair use cases on RE and Congress’s policy favoring RE for interoperability purposes in the Digital Millennium Copyright Act reinforce the case for patent preemption. Also, the fundamental freedom to RE embodied in state trade secret law, coupled with federal patent and copyright law and policies, cumulatively should override …


Choice In Government Software Procurement: A Winning Combination, Mclean Sieverding Feb 2006

Choice In Government Software Procurement: A Winning Combination, Mclean Sieverding

ExpressO

Governments are such significant purchasers of IT products and services that their purchasing decisions have a substantial impact on the world’s IT marketplace. This fact calls into question the wisdom of decisions by a few policymakers (on national, state, and local levels) around the world that have sought to require that governmental procurement officials give varying degrees of preference to open source software (OSS) when evaluating competing software solutions, claiming, among other things, that such preferences are justified because OSS is cheaper and more interoperable than proprietary software and needs government handicapping in order to enter the market to compete …


Breaking The Bank: Revisiting Central Bank Of Denver After Enron And Sarbanes-Oxley, Celia Taylor Sep 2005

Breaking The Bank: Revisiting Central Bank Of Denver After Enron And Sarbanes-Oxley, Celia Taylor

ExpressO

No abstract provided.