Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Constitutional Law

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 361 - 383 of 383

Full-Text Articles in Computer Law

Bond Repudiation, Tax Codes, The Appropriations Process And Restitution Post-Eminent Domain Reform, John H. Ryskamp Jun 2006

Bond Repudiation, Tax Codes, The Appropriations Process And Restitution Post-Eminent Domain Reform, John H. Ryskamp

ExpressO

This brief comment suggests where the anti-eminent domain movement might be heading next.


Privacy And Access To Public Records In The Information Age, Sol Bermann May 2006

Privacy And Access To Public Records In The Information Age, Sol Bermann

ExpressO

Online public record access brings a wealth of benefits ranging from greater government access and accountability to increased cost-savings and efficiencies. However, due to the presence of highly sensitive, personal data, an increase in public records access also brings potential dangers, including heightened risk of identity theft and frivolous snooping into the affairs of others.

Historically, public records have had some measure of public accessibility in order to empower citizens with the ability to observe the goings-on of government, leading to greater government accountability. Until the rise of the internet, citizens have had their privacy protected through practical obscurity (the …


Buried Online: State Laws That Limit E-Commerce In Caskets, Jerry Ellig, Asheesh Agarwal Mar 2006

Buried Online: State Laws That Limit E-Commerce In Caskets, Jerry Ellig, Asheesh Agarwal

ExpressO

Consumers seeking to purchase caskets online could benefit from the Supreme Court’s 2005 decision that states cannot discriminate against interstate direct wine shipment. Federal courts have reached conflicting conclusions when asked whether state laws requiring casket sellers to be licensed funeral directors violate the U.S. Constitution’s Due Process Clause. In Powers v. Harris, the 10th Circuit even offered an unprecedented ruling that economic protectionism is a legitimate state interest that can justify otherwise unconstitutional policies. In Granholm v. Heald, however, the Supreme Court declared that discriminatory barriers to interstate wine shipment must be justified by a legitimate state interest, and …


The Secret Is Out: Patent Law Preempts Mass Market License Terms Barring Reverse Engineering For Interoperability Purposes, Daniel Laster Feb 2006

The Secret Is Out: Patent Law Preempts Mass Market License Terms Barring Reverse Engineering For Interoperability Purposes, Daniel Laster

ExpressO

As patent protection has emerged to protect software, courts and commentators have mistakenly focused on copyright law and overlooked the centrality of patent preemption to limit contract law where a mass market license which prohibits reverse engineering (RE) for purposes of developing interoperable products leads to patent-like protection. Review of copyright fair use cases on RE and Congress’s policy favoring RE for interoperability purposes in the Digital Millennium Copyright Act reinforce the case for patent preemption. Also, the fundamental freedom to RE embodied in state trade secret law, coupled with federal patent and copyright law and policies, cumulatively should override …


Choice In Government Software Procurement: A Winning Combination, Mclean Sieverding Feb 2006

Choice In Government Software Procurement: A Winning Combination, Mclean Sieverding

ExpressO

Governments are such significant purchasers of IT products and services that their purchasing decisions have a substantial impact on the world’s IT marketplace. This fact calls into question the wisdom of decisions by a few policymakers (on national, state, and local levels) around the world that have sought to require that governmental procurement officials give varying degrees of preference to open source software (OSS) when evaluating competing software solutions, claiming, among other things, that such preferences are justified because OSS is cheaper and more interoperable than proprietary software and needs government handicapping in order to enter the market to compete …


Breaking The Bank: Revisiting Central Bank Of Denver After Enron And Sarbanes-Oxley, Celia Taylor Sep 2005

Breaking The Bank: Revisiting Central Bank Of Denver After Enron And Sarbanes-Oxley, Celia Taylor

ExpressO

No abstract provided.


Preventing "You've Got Mail"™ From Meaning "You've Been Served": How Service Of Process By E-Mail Does Not Meet Constitutional Procedure Due Process Requirements, 38 J. Marshall L. Rev. 1121 (2005), Matthew R. Schreck Jan 2005

Preventing "You've Got Mail"™ From Meaning "You've Been Served": How Service Of Process By E-Mail Does Not Meet Constitutional Procedure Due Process Requirements, 38 J. Marshall L. Rev. 1121 (2005), Matthew R. Schreck

UIC Law Review

No abstract provided.


Nothing New Under The Sun? A Technologically Rational Doctrine Of Fourth Amendment Search, Stephen E. Henderson Dec 2004

Nothing New Under The Sun? A Technologically Rational Doctrine Of Fourth Amendment Search, Stephen E. Henderson

Stephen E Henderson

The Fourth Amendment to the United States Constitution prohibits unreasonable searches and seizures. Yet as interpreted by the United States Supreme Court, the Amendment places no restriction on police combing through financial records; telephone, e-mail and website transactional records; or garbage left for collection. Indeed there is no protection for any information knowingly provided to a third party, because the provider is said to retain no reasonable expectation of privacy in that information. As technology dictates that more and more of our personal lives are available to anyone equipped to receive them, and as social norms dictate that more and …


Thinking Outside The Pandora's Box: Why The Dmca Is Unconstitutional Under Article I §8 Of The U.S. Constitution, Joshua L. Schwartz Nov 2004

Thinking Outside The Pandora's Box: Why The Dmca Is Unconstitutional Under Article I §8 Of The U.S. Constitution, Joshua L. Schwartz

ExpressO

No abstract provided.


The First Amendment, The Public-Private Distinction, And Nongovernmental Suppression Of Wartime Political Debate, Gregory P. Magarian Jul 2004

The First Amendment, The Public-Private Distinction, And Nongovernmental Suppression Of Wartime Political Debate, Gregory P. Magarian

Working Paper Series

This article proposes a major expansion in the scope of First Amendment law and offers a fresh way of understanding the public-private distinction. It contends that the Supreme Court should invoke the First Amendment to enjoin nongovernmental behavior that substantially impedes public political debate during times of war and national emergency. As the article explains, the present campaign against international terrorism has seen employers, property owners, and media corporations restrict political discussion more frequently and aggressively than the government has. If political debate is the most important object of First Amendment protection – which the article contends it is – …


Copyright And Free Expression: The Convergence Of Conflicting Normative Frameworks, Shyamkrishna Balganesh Jan 2004

Copyright And Free Expression: The Convergence Of Conflicting Normative Frameworks, Shyamkrishna Balganesh

All Faculty Scholarship

Recent attempts to expand the domain of copyright law in different parts of the world have necessitated renewed efforts to evaluate the philosophical justifications that are advocated for its existence as an independent institution. Copyright, conceived of as a proprietary institution, reveals an interesting philosophical interaction with other libertarian interests, most notably the right to free expression. This paper seeks to understand the nature of this interaction and the resulting normative decisions. The paper seeks to analyze copyright law and its recent expansions, specifically from the perspective of the human rights discourse. It looks at the historical origins of modern …


Manual De Derecho Procesal Civil, Edward Ivan Cueva Feb 2003

Manual De Derecho Procesal Civil, Edward Ivan Cueva

Edward Ivan Cueva

No abstract provided.


Teoría General De La Prueba Judicial, Edward Ivan Cueva Jan 2002

Teoría General De La Prueba Judicial, Edward Ivan Cueva

Edward Ivan Cueva

No abstract provided.


Reflecting On The Virtual Child Porn Decision, 36 J. Marshall L. Rev. 211 (2002), David L. Hudson Jan 2002

Reflecting On The Virtual Child Porn Decision, 36 J. Marshall L. Rev. 211 (2002), David L. Hudson

UIC Law Review

No abstract provided.


Constitutional Issues In Information Privacy, Fred H. Cate, Robert E. Litan Jan 2002

Constitutional Issues In Information Privacy, Fred H. Cate, Robert E. Litan

Articles by Maurer Faculty

The U.S. Constitution has been largely ignored in the recent flurry of privacy laws and regulations designed to protect personal information from incursion by the private sector, despite the fact that many of these enactments and efforts to enforce them significantly implicate the First Amendment. Questions about the role of the Constitution have assumed new importance in the aftermath of the September 11 terrorist attacks on the World Trade Center and the Pentagon. Efforts to identify and bring to justice the perpetrators and to protect against future terrorist attacks, while threatening to weaken constitutional protections against government intrusions into personal …


Is Zippo's Sliding Scale A Slippery Slope Of Uncertainty? A Case For Abolishing Web Site Interactivity As A Conclusive Factor In Assessing Minimum Contacts In Cyberspace, 34 J. Marshall L. Rev. 1051 (2001), Jason Green Jan 2001

Is Zippo's Sliding Scale A Slippery Slope Of Uncertainty? A Case For Abolishing Web Site Interactivity As A Conclusive Factor In Assessing Minimum Contacts In Cyberspace, 34 J. Marshall L. Rev. 1051 (2001), Jason Green

UIC Law Review

No abstract provided.


First Amendment Freedoms And The Encryption Export Battle: Deciphering The Importance Of Bernstein V. United States Department Of Justice, 176 F.3d 1132 (9th Cir. 1999), David Mcclure Jan 2000

First Amendment Freedoms And The Encryption Export Battle: Deciphering The Importance Of Bernstein V. United States Department Of Justice, 176 F.3d 1132 (9th Cir. 1999), David Mcclure

Scholarly Works

For many years, a battle has raged over export restrictions on strong encryption products. Encryption ensures confidential and secure communications among individuals, and the Commerce Department and the State Department have long restricted its export because of national security concerns. Industry and privacy groups have fought against the restrictions for various reasons, ranging from the desire to sell encryption software in new markets to preventing government from accessing personal communications between individuals. Daniel Bernstein, a computer science graduate student, challenged these restrictions in 1996, placing himself in the center of this ongoing battle. In 1999, the Ninth Circuit Court of …


The Medium Is The Mistake: The Law Of Software For The First Amendment, R. Polk Wagner Jan 1999

The Medium Is The Mistake: The Law Of Software For The First Amendment, R. Polk Wagner

All Faculty Scholarship

Is computer software ? code written by humans that instructs a computer to perform certain tasks ? protected by the First Amendment? The answer to this question will significantly impact the course of future technological regulation, and will affect the scope of free expression rights in new media. In this note, I attempt to establish a framework for analysis, noting at the outset that the truly important question in this context is the threshold question: what is "speech or . . . the press"? I first describe two general ways that the Supreme Court has addressed the threshold question. One …


Pc Peep Show: Computers, Privacy, And Child Pornography, 27 J. Marshall L. Rev. 989 (1994), John C. Scheller Jan 1994

Pc Peep Show: Computers, Privacy, And Child Pornography, 27 J. Marshall L. Rev. 989 (1994), John C. Scheller

UIC Law Review

No abstract provided.


Information Law Overview, 18 J. Marshall L. Rev. 815 (1985), George B. Trubow Jan 1985

Information Law Overview, 18 J. Marshall L. Rev. 815 (1985), George B. Trubow

UIC Law Review

No abstract provided.


Personal Privacy In The Computer Age: The Challenge Of A New Technology In An Information-Oriented Society, Arthur R. Miller Apr 1969

Personal Privacy In The Computer Age: The Challenge Of A New Technology In An Information-Oriented Society, Arthur R. Miller

Michigan Law Review

The purpose of this Article is to survey the new technology's implications for personal privacy and to evaluate the contemporary common-law and statutory pattern relating to data-handling. In the course of this examination, it will appraise the existing framework's capacity to deal with the problems created by society's growing awareness of the primordial character of information. The Article is intended to be suggestive; any attempt at definitiveness would be premature. Avowedly, it was written with the bias of one who believes that the new information technology has enormous long-range societal implications and who is concerned about the consequences of the …


Nociones Generales De Derecho Procesal Civil, Edward Ivan Cueva Jan 1966

Nociones Generales De Derecho Procesal Civil, Edward Ivan Cueva

Edward Ivan Cueva

No abstract provided.


Fundamentos Del Derecho Procesal Civil, Edward Ivan Cueva Jan 1958

Fundamentos Del Derecho Procesal Civil, Edward Ivan Cueva

Edward Ivan Cueva

No abstract provided.