Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Universitas Indonesia (122)
- Seattle University School of Law (70)
- SelectedWorks (34)
- Selected Works (26)
- DePaul University (15)
-
- Fordham Law School (13)
- UIC School of Law (12)
- BLR (9)
- University of Pennsylvania Carey Law School (8)
- The Catholic University of America, Columbus School of Law (5)
- University of Colorado Law School (4)
- Brooklyn Law School (3)
- Georgia State University College of Law (3)
- St. Mary's University (3)
- University of Michigan Law School (3)
- University of Washington School of Law (3)
- Columbia Law School (2)
- Duke Law (2)
- Florida State University College of Law (2)
- Maurer School of Law: Indiana University (2)
- New York Law School (2)
- Northwestern Pritzker School of Law (2)
- Pace University (2)
- Penn State Law (2)
- Roger Williams University (2)
- Schulich School of Law, Dalhousie University (2)
- Texas A&M University School of Law (2)
- University of Cincinnati College of Law (2)
- University of Minnesota Law School (2)
- Villanova University Charles Widger School of Law (2)
- Keyword
-
- Privacy (27)
- First Amendment (26)
- Computer Law (20)
- Constitutional Law (19)
- Copyright (15)
-
- Law and Technology (15)
- Science and Technology (14)
- Intellectual Property (12)
- Internet (12)
- Criminal law; symposium; communications law; international law; first amendment (11)
- Intellectual Property Law (11)
- Communications Law (10)
- Bruno (9)
- Costantini (9)
- Law and Society (9)
- Technology (9)
- Artificial intelligence (8)
- Fourth Amendment (8)
- Law (8)
- Presentaciones (8)
- Public Law and Legal Theory (8)
- Surveillance (8)
- Contracts (7)
- Courts (7)
- Education Law (7)
- First amendment (7)
- Fourth amendment (7)
- General Law (7)
- International Law (7)
- Legislation (7)
- Publication Year
- Publication
-
- "Dharmasisya” Jurnal Program Magister Hukum FHUI (122)
- Seattle University Law Review (67)
- Bruno L. Costantini García (16)
- DePaul Business & Commercial Law Journal (15)
- Fordham Law Review (13)
-
- Rodolfo C. Rivas (12)
- UIC Law Review (12)
- ExpressO (9)
- All Faculty Scholarship (8)
- Edward Ivan Cueva (7)
- Stephen E Henderson (5)
- Catholic University Journal of Law and Technology (4)
- Publications (4)
- Faculty Scholarship (3)
- Georgia State University Law Review (3)
- Hari Priya (3)
- St. Mary's Law Journal (3)
- Articles, Book Chapters, & Popular Press (2)
- Duke Law & Technology Review (2)
- Florida State University Law Review (2)
- Greg Sergienko (2)
- Jorge R Roig (2)
- Kyle Langvardt (2)
- Law Faculty Scholarship (2)
- Minnesota Journal of Law, Science & Technology (2)
- NYLS Law Review (2)
- Seattle Journal of Technology, Environmental & Innovation Law (2)
- Washington Journal of Law, Technology & Arts (2)
- Adam Lamparello (1)
- Articles (1)
- Publication Type
- File Type
Articles 361 - 383 of 383
Full-Text Articles in Computer Law
Bond Repudiation, Tax Codes, The Appropriations Process And Restitution Post-Eminent Domain Reform, John H. Ryskamp
Bond Repudiation, Tax Codes, The Appropriations Process And Restitution Post-Eminent Domain Reform, John H. Ryskamp
ExpressO
This brief comment suggests where the anti-eminent domain movement might be heading next.
Privacy And Access To Public Records In The Information Age, Sol Bermann
Privacy And Access To Public Records In The Information Age, Sol Bermann
ExpressO
Online public record access brings a wealth of benefits ranging from greater government access and accountability to increased cost-savings and efficiencies. However, due to the presence of highly sensitive, personal data, an increase in public records access also brings potential dangers, including heightened risk of identity theft and frivolous snooping into the affairs of others.
Historically, public records have had some measure of public accessibility in order to empower citizens with the ability to observe the goings-on of government, leading to greater government accountability. Until the rise of the internet, citizens have had their privacy protected through practical obscurity (the …
Buried Online: State Laws That Limit E-Commerce In Caskets, Jerry Ellig, Asheesh Agarwal
Buried Online: State Laws That Limit E-Commerce In Caskets, Jerry Ellig, Asheesh Agarwal
ExpressO
Consumers seeking to purchase caskets online could benefit from the Supreme Court’s 2005 decision that states cannot discriminate against interstate direct wine shipment. Federal courts have reached conflicting conclusions when asked whether state laws requiring casket sellers to be licensed funeral directors violate the U.S. Constitution’s Due Process Clause. In Powers v. Harris, the 10th Circuit even offered an unprecedented ruling that economic protectionism is a legitimate state interest that can justify otherwise unconstitutional policies. In Granholm v. Heald, however, the Supreme Court declared that discriminatory barriers to interstate wine shipment must be justified by a legitimate state interest, and …
The Secret Is Out: Patent Law Preempts Mass Market License Terms Barring Reverse Engineering For Interoperability Purposes, Daniel Laster
The Secret Is Out: Patent Law Preempts Mass Market License Terms Barring Reverse Engineering For Interoperability Purposes, Daniel Laster
ExpressO
As patent protection has emerged to protect software, courts and commentators have mistakenly focused on copyright law and overlooked the centrality of patent preemption to limit contract law where a mass market license which prohibits reverse engineering (RE) for purposes of developing interoperable products leads to patent-like protection. Review of copyright fair use cases on RE and Congress’s policy favoring RE for interoperability purposes in the Digital Millennium Copyright Act reinforce the case for patent preemption. Also, the fundamental freedom to RE embodied in state trade secret law, coupled with federal patent and copyright law and policies, cumulatively should override …
Choice In Government Software Procurement: A Winning Combination, Mclean Sieverding
Choice In Government Software Procurement: A Winning Combination, Mclean Sieverding
ExpressO
Governments are such significant purchasers of IT products and services that their purchasing decisions have a substantial impact on the world’s IT marketplace. This fact calls into question the wisdom of decisions by a few policymakers (on national, state, and local levels) around the world that have sought to require that governmental procurement officials give varying degrees of preference to open source software (OSS) when evaluating competing software solutions, claiming, among other things, that such preferences are justified because OSS is cheaper and more interoperable than proprietary software and needs government handicapping in order to enter the market to compete …
Breaking The Bank: Revisiting Central Bank Of Denver After Enron And Sarbanes-Oxley, Celia Taylor
Breaking The Bank: Revisiting Central Bank Of Denver After Enron And Sarbanes-Oxley, Celia Taylor
ExpressO
No abstract provided.
Preventing "You've Got Mail"™ From Meaning "You've Been Served": How Service Of Process By E-Mail Does Not Meet Constitutional Procedure Due Process Requirements, 38 J. Marshall L. Rev. 1121 (2005), Matthew R. Schreck
UIC Law Review
No abstract provided.
Nothing New Under The Sun? A Technologically Rational Doctrine Of Fourth Amendment Search, Stephen E. Henderson
Nothing New Under The Sun? A Technologically Rational Doctrine Of Fourth Amendment Search, Stephen E. Henderson
Stephen E Henderson
The Fourth Amendment to the United States Constitution prohibits unreasonable searches and seizures. Yet as interpreted by the United States Supreme Court, the Amendment places no restriction on police combing through financial records; telephone, e-mail and website transactional records; or garbage left for collection. Indeed there is no protection for any information knowingly provided to a third party, because the provider is said to retain no reasonable expectation of privacy in that information. As technology dictates that more and more of our personal lives are available to anyone equipped to receive them, and as social norms dictate that more and …
Thinking Outside The Pandora's Box: Why The Dmca Is Unconstitutional Under Article I §8 Of The U.S. Constitution, Joshua L. Schwartz
Thinking Outside The Pandora's Box: Why The Dmca Is Unconstitutional Under Article I §8 Of The U.S. Constitution, Joshua L. Schwartz
ExpressO
No abstract provided.
The First Amendment, The Public-Private Distinction, And Nongovernmental Suppression Of Wartime Political Debate, Gregory P. Magarian
The First Amendment, The Public-Private Distinction, And Nongovernmental Suppression Of Wartime Political Debate, Gregory P. Magarian
Working Paper Series
This article proposes a major expansion in the scope of First Amendment law and offers a fresh way of understanding the public-private distinction. It contends that the Supreme Court should invoke the First Amendment to enjoin nongovernmental behavior that substantially impedes public political debate during times of war and national emergency. As the article explains, the present campaign against international terrorism has seen employers, property owners, and media corporations restrict political discussion more frequently and aggressively than the government has. If political debate is the most important object of First Amendment protection – which the article contends it is – …
Copyright And Free Expression: The Convergence Of Conflicting Normative Frameworks, Shyamkrishna Balganesh
Copyright And Free Expression: The Convergence Of Conflicting Normative Frameworks, Shyamkrishna Balganesh
All Faculty Scholarship
Recent attempts to expand the domain of copyright law in different parts of the world have necessitated renewed efforts to evaluate the philosophical justifications that are advocated for its existence as an independent institution. Copyright, conceived of as a proprietary institution, reveals an interesting philosophical interaction with other libertarian interests, most notably the right to free expression. This paper seeks to understand the nature of this interaction and the resulting normative decisions. The paper seeks to analyze copyright law and its recent expansions, specifically from the perspective of the human rights discourse. It looks at the historical origins of modern …
Manual De Derecho Procesal Civil, Edward Ivan Cueva
Manual De Derecho Procesal Civil, Edward Ivan Cueva
Edward Ivan Cueva
No abstract provided.
Teoría General De La Prueba Judicial, Edward Ivan Cueva
Teoría General De La Prueba Judicial, Edward Ivan Cueva
Edward Ivan Cueva
No abstract provided.
Reflecting On The Virtual Child Porn Decision, 36 J. Marshall L. Rev. 211 (2002), David L. Hudson
Reflecting On The Virtual Child Porn Decision, 36 J. Marshall L. Rev. 211 (2002), David L. Hudson
UIC Law Review
No abstract provided.
Constitutional Issues In Information Privacy, Fred H. Cate, Robert E. Litan
Constitutional Issues In Information Privacy, Fred H. Cate, Robert E. Litan
Articles by Maurer Faculty
The U.S. Constitution has been largely ignored in the recent flurry of privacy laws and regulations designed to protect personal information from incursion by the private sector, despite the fact that many of these enactments and efforts to enforce them significantly implicate the First Amendment. Questions about the role of the Constitution have assumed new importance in the aftermath of the September 11 terrorist attacks on the World Trade Center and the Pentagon. Efforts to identify and bring to justice the perpetrators and to protect against future terrorist attacks, while threatening to weaken constitutional protections against government intrusions into personal …
Is Zippo's Sliding Scale A Slippery Slope Of Uncertainty? A Case For Abolishing Web Site Interactivity As A Conclusive Factor In Assessing Minimum Contacts In Cyberspace, 34 J. Marshall L. Rev. 1051 (2001), Jason Green
UIC Law Review
No abstract provided.
First Amendment Freedoms And The Encryption Export Battle: Deciphering The Importance Of Bernstein V. United States Department Of Justice, 176 F.3d 1132 (9th Cir. 1999), David Mcclure
Scholarly Works
For many years, a battle has raged over export restrictions on strong encryption products. Encryption ensures confidential and secure communications among individuals, and the Commerce Department and the State Department have long restricted its export because of national security concerns. Industry and privacy groups have fought against the restrictions for various reasons, ranging from the desire to sell encryption software in new markets to preventing government from accessing personal communications between individuals. Daniel Bernstein, a computer science graduate student, challenged these restrictions in 1996, placing himself in the center of this ongoing battle. In 1999, the Ninth Circuit Court of …
The Medium Is The Mistake: The Law Of Software For The First Amendment, R. Polk Wagner
The Medium Is The Mistake: The Law Of Software For The First Amendment, R. Polk Wagner
All Faculty Scholarship
Is computer software ? code written by humans that instructs a computer to perform certain tasks ? protected by the First Amendment? The answer to this question will significantly impact the course of future technological regulation, and will affect the scope of free expression rights in new media. In this note, I attempt to establish a framework for analysis, noting at the outset that the truly important question in this context is the threshold question: what is "speech or . . . the press"? I first describe two general ways that the Supreme Court has addressed the threshold question. One …
Pc Peep Show: Computers, Privacy, And Child Pornography, 27 J. Marshall L. Rev. 989 (1994), John C. Scheller
Pc Peep Show: Computers, Privacy, And Child Pornography, 27 J. Marshall L. Rev. 989 (1994), John C. Scheller
UIC Law Review
No abstract provided.
Information Law Overview, 18 J. Marshall L. Rev. 815 (1985), George B. Trubow
Information Law Overview, 18 J. Marshall L. Rev. 815 (1985), George B. Trubow
UIC Law Review
No abstract provided.
Personal Privacy In The Computer Age: The Challenge Of A New Technology In An Information-Oriented Society, Arthur R. Miller
Personal Privacy In The Computer Age: The Challenge Of A New Technology In An Information-Oriented Society, Arthur R. Miller
Michigan Law Review
The purpose of this Article is to survey the new technology's implications for personal privacy and to evaluate the contemporary common-law and statutory pattern relating to data-handling. In the course of this examination, it will appraise the existing framework's capacity to deal with the problems created by society's growing awareness of the primordial character of information. The Article is intended to be suggestive; any attempt at definitiveness would be premature. Avowedly, it was written with the bias of one who believes that the new information technology has enormous long-range societal implications and who is concerned about the consequences of the …
Nociones Generales De Derecho Procesal Civil, Edward Ivan Cueva
Nociones Generales De Derecho Procesal Civil, Edward Ivan Cueva
Edward Ivan Cueva
No abstract provided.
Fundamentos Del Derecho Procesal Civil, Edward Ivan Cueva
Fundamentos Del Derecho Procesal Civil, Edward Ivan Cueva
Edward Ivan Cueva
No abstract provided.