Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Computer Law

El Derecho De Sucesiones Se Debe Atemperar A Los Cambios De La Sociedad Del Siglo Xxi, Edward Ivan Cueva Feb 2011

El Derecho De Sucesiones Se Debe Atemperar A Los Cambios De La Sociedad Del Siglo Xxi, Edward Ivan Cueva

Edward Ivan Cueva

No abstract provided.


My Teacher Sux! [Censored]: Protecting Students' Right To Free Speech On The Internet, 28 J. Marshall J. Computer & Info. L. 385 (2011), Katherine Hokenson Jan 2011

My Teacher Sux! [Censored]: Protecting Students' Right To Free Speech On The Internet, 28 J. Marshall J. Computer & Info. L. 385 (2011), Katherine Hokenson

UIC John Marshall Journal of Information Technology & Privacy Law

This comment will discusses the problem posed by student speech made on the Internet, how free speech issues are generally addressed by courts, the Supreme Court cases that have specifically addressed the First Amendment rights of students, and factors that courts dealing with student speech made on the Internet have attempted to use in their decisions. The comment will further look at how courts have analyzed online student speech cases in light of available Supreme Court precedent, and will propose that the Court adopt a hybrid of the Tinker test when addressing student speech made on the Internet, which will …


Schools: Where Fewer Rights Are Reasonable? Why The Reasonableness Standard Is Inappropriate To Measure The Use Of Rfid Tracking Devices On Students, 28 J. Marshall J. Computer & Info. L. 411 (2011), Alexandra C. Hirsch Jan 2011

Schools: Where Fewer Rights Are Reasonable? Why The Reasonableness Standard Is Inappropriate To Measure The Use Of Rfid Tracking Devices On Students, 28 J. Marshall J. Computer & Info. L. 411 (2011), Alexandra C. Hirsch

UIC John Marshall Journal of Information Technology & Privacy Law

In an unsuccessful attempt to heighten security, schools are implementing a technology that offers access to children’s personal information and minute-by-minute location. Although not entirely new, Radio Frequency Identification (RFID) technology use has recently been expanding within the school arena. Skeptics knowledgeable about the downfalls of the technology, however, have reason to be concerned. In order to understand the true urgency of this issue, this comment will explain the background of RFID technology, specifically what RFID tags are, how they are used, their purposes, and how they have become unsafe. Included will be an explanation of the reasons that schools …


School Discipline Of Cyber-Bullies: A Proposed Threshold That Respects Constitutional Rights, 45 J. Marshall L. Rev. 85 (2011), Laura Pavlik Raatjes Jan 2011

School Discipline Of Cyber-Bullies: A Proposed Threshold That Respects Constitutional Rights, 45 J. Marshall L. Rev. 85 (2011), Laura Pavlik Raatjes

UIC Law Review

No abstract provided.


Requirements Of A Valid Islamic Marriage Vis-À-Vis Requirements Of A Valid Customary Marriage In Nigeria, Olanike Sekinat Odewale Mrs Dec 2010

Requirements Of A Valid Islamic Marriage Vis-À-Vis Requirements Of A Valid Customary Marriage In Nigeria, Olanike Sekinat Odewale Mrs

Olanike Sekinat Adelakun

Marriage is a universal institution which is recognized and respected all over the world. As a social institution, marriage is founded on and governed by the social and religious norms of the society. Consequently, the sanctity of marriage is a well accepted principle in the world community .
Marriage could either be monogamous or polygamous in nature. A monogamous marriage has bee described as ‘…the voluntary union for life of one man and one woman to the exclusion of all others’ . A polygamous marriage on the other hand can be defined as a voluntary union for life of one …