Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- E-discovery (2)
- ESI (2)
- A Critical Look at the Anti-Counterfeiting Trade Agreement (1)
- Access to information (1)
- Advertising of pharmaceuticals (1)
-
- Amazon Kindle (1)
- Amazon.com (1)
- Antitrust law (1)
- Anything but Academic: How Copyright’s Work-for-Hire Doctrine Affects Professors Graduate Students and K-12 Teachers in the Information Age (1)
- Arrangement (1)
- Better Late Than Never: How the Online Advertising Industry’s Response to Proposed Privacy Legislation Eliminates the Need for Regulation (1)
- CMMI (1)
- Capability Maturity Model Integration (1)
- Children's privacy online (1)
- Children’s privacy rights (1)
- Classification (1)
- Computer Fraud and Abuse Act (1)
- Consumer Rights Legislation (1)
- Copyright law (1)
- Copyright protection (1)
- Cosmetic treatments (1)
- Current and Emerging Transportation Technology: Final Nails in the Coffin of the Dying Right of Privacy? (1)
- DOJ (1)
- Data protection laws (1)
- Databases (1)
- Department of Justice (1)
- Digital Age (1)
- Do Not Track: Revising the EU’s Data Protection Framework to Require Meaningful Consent for Behavioral Advertising (1)
- E-Books (1)
- E-health (1)
Articles 1 - 30 of 44
Full-Text Articles in Computer Law
Attention All Internet Users: How Proposed Amendments To The Communications Decency Act Could Save Your Reputation, Niki Blumentritt
Attention All Internet Users: How Proposed Amendments To The Communications Decency Act Could Save Your Reputation, Niki Blumentritt
Legislation and Policy Brief
Imagine a beautiful fall day on a Southern college campus. The leaves are changing, and the sound of the band practicing for this weekend’s big game echoes throughout campus. Jane, a college freshman, is walking through campus on the way back to her dorm from her Biology 101 class. Usually, Jane’s walk is uneventful, aside from the occasional run-in with a friend or sorority sister; however, today is much different. Jane notices that many people are staring, pointing, and snickering at her. Is there something on her face? She quickly pulls out her compact and realizes that all makeup is …
Must The House Always Win?: A Critique Of Rousso V. State, Rachel J. Schaefer
Must The House Always Win?: A Critique Of Rousso V. State, Rachel J. Schaefer
Seattle University Law Review
Gambling enthusiasts in Washington may be dismayed to learn that while it is legal to place a wager at one of the numerous brick-and-mortar casinos located in the state, placing the same wager over the Internet is a crime. This result arises from a 2006 amendment to Washington Revised Code 9.46.240 (the Gambling Act), which effectively bans individuals from placing bets or wagers over the Internet from Washington. In addition to prohibiting bets made by individuals, the law also prohibits Internet gambling businesses from receiving bets placed by individuals in Washington—even if those gambling businesses operate far from the state’s …
Overcoming The Digital Tsunami In E-Discovery: Is Visual Analysis The Answer?, Victoria L. Lemieux, Jason R. Baron
Overcoming The Digital Tsunami In E-Discovery: Is Visual Analysis The Answer?, Victoria L. Lemieux, Jason R. Baron
Canadian Journal of Law and Technology
New technologies are generating potentially discoverable evidence in electronic form in ever increasing volumes. As a result, traditional techniques of document search and retrieval in pursuit of electronic discovery in litigation are becoming less viable. One potential new technological solution to the e-discovery search and retrieval challenge is Visual Analysis (VA). VA is a technology that combines the computational power of the computer with graphical representations of large datasets to enable interactive analytic capabilities. This article provides an overview of VA technology and how it is being applied in the analysis of e-mail and other electronic documents in the field …
The Internet And Protection Of Children Online: Time For Change, Jill Scott
The Internet And Protection Of Children Online: Time For Change, Jill Scott
Canadian Journal of Law and Technology
This article explores the risks for children online and their privacy, with particular focus on the implications of widespread collection, use and retention of data about them. It touches on international standards and national laws that impact Internet activities and the special risk to children’s privacy in today’s ubiquitous computing environment. This is a complex topic that transcends national boundaries and involves both legal and policy issues confronting governments across the world.
Section I provides a brief outline of the online risks for children arising from the scope of data collection and the regulatory challenges of the Internet as it …
Location-Based Services And Privacy, Teresa Scassa, Anca Sattler
Location-Based Services And Privacy, Teresa Scassa, Anca Sattler
Canadian Journal of Law and Technology
In this paper we begin by describing location-based services, their evolution and their future directions. We then outline privacy issues raised by such services. In Part III we consider how current Canadian data protection laws apply to location-based services, and indicate where such laws fall short of addressing the full range of issues raised by location-based services. Part IV of the paper explores some technological methods to address the privacy challenges raised by location-based services. The paper concludes with a series of recommendations.
Electronic Discovery- Sedona Canada Is Inadequate On Records Management - Here's Sedona Canada In Amended Form, Ken Chasse
Canadian Journal of Law and Technology
A paper record can exist without its records system; an electronic record cannot. To use, corrupt, or destroy a paper record, one needs physical access to the records system wherein it is stored. But to use, corrupt, or destroy an electronic record one merely needs electronic access to its records system, from anywhere. Therefore any set of rules or principles for controlling the use of electronic records for any purpose, including electronic discovery, should incorporate the established policies and practices of electronic records management.
As to cost, rules of electronic discovery are needed with which to punish par- ties with …
Tax Implications For Non-Residents Conducting E-Commerce In Canada, Mike Nienhuis
Tax Implications For Non-Residents Conducting E-Commerce In Canada, Mike Nienhuis
Canadian Journal of Law and Technology
This paper focuses on taxation issues faced by non-resident e-commerce companies with no sustained presence in Canada apart from a web site. The tax liability of foreign corporations with a Canadian subsidiary, a physical Canadian office, or Canadian-based employees or agents will not be considered, even though there is substantial overlap in some of the relevant issues. By e-commerce companies we refer broadly to any firms conducting their primary business — whether business- to-business (B2B) or business-to-consumer (B2C) — by means of the internet.
In the first section we outline the framework for Canada’s taxation of non-residents conducting business in …
Institutional Liability In The E-Health Era, James Williams, Craig Kuziemsky
Institutional Liability In The E-Health Era, James Williams, Craig Kuziemsky
Canadian Journal of Law and Technology
This paper examines the jurisprudence on institutional liability for medical er- ror. We argue that the existing jurisprudence relies on assumptions that have been made obsolete by technological advances. In particular, we concentrate on the use of information and communication technologies (ICTs) in the health care domain. As we demonstrate, the use of these tools does not merely increase efficiency and support new health care functions; among other effects, ICT can have a profound influence on how health care practitioners make observations, exercise judgment and perform tasks. These tools influence human capabilities (at both the individual and systems level) in …
Prohibiting Medical Method Patents: A Criticism Of The Status Quo, Mark S. Wilke
Prohibiting Medical Method Patents: A Criticism Of The Status Quo, Mark S. Wilke
Canadian Journal of Law and Technology
Methods of medical treatment are not patentable in Canada. This means that inventions involving the performance of surgery, administration of medicine, or extraction of fluids or tissue for diagnostic tests cannot directly be protected under the current patent regime. However, this prohibition is not an absolute ban. Many medical innovations are patentable, including surgical tools and devices, drugs and other chemical compounds, medical “uses”, diagnostic assays and methods of treat- ing “natural” conditions. The practical reality is that the distinction between what is and what is not patentable is poorly defined. This uncertainty presents a steep challenge for inventors and …
L'Impact D'Internet Sur Les Paradigmes De La Régulation De L'Audiovisuel, Gilles De Saint Exupéry
L'Impact D'Internet Sur Les Paradigmes De La Régulation De L'Audiovisuel, Gilles De Saint Exupéry
Canadian Journal of Law and Technology
Nous nous intéresserons particulièrement à la mutation du paradigme de la régulation de l’audiovisuel classique13 dû à plusieurs facteurs: pour être diffuseur sur les ondes hertzienne il fallait être titulaire d’une licence accordé par l’Etat, sur Internet tout le monde peut l’être à sa guise. Les moyens techniques et financiers ne sont plus une barrière à l’ entrée, le nombre de joueurs qui e ́ tait jusque-là restreint devient, en théorie, incalculable. Le mécanisme de responsabilité mis en place est remis en cause, par la dilution des frontières, l’anonymat, ou l’insolvabilité des diffuseurs. Les modèles d’affaires doivent être revus, le …
Direct-To-Consumer Advertising Of Pharmaceuticals On Television: A Charter Challenge, Elvina C. Chow
Direct-To-Consumer Advertising Of Pharmaceuticals On Television: A Charter Challenge, Elvina C. Chow
Canadian Journal of Law and Technology
The Supreme Court of Canada has consistently wrestled with the conflict between legislation designed to protect consumers’ health and the constitutional guarantee of the fundamental freedom of expression. This paper investigates the justification for the current regulatory framework for pharmaceutical advertising on television. Aware that the provisions in the FDA are able to withstand Charter of Rights and Freedoms (Charter) scrutiny, several possible policy initiations are nevertheless proposed.
The paper is divided into five separate sections. Having first introduced DTCA of pharmaceuticals on television in Section I, I will now turn to a more comprehensive examination of DTCA in Canada …
Lessons From Bilski, Haewon Chung
Lessons From Bilski, Haewon Chung
Canadian Journal of Law and Technology
In this paper, I will examine how the U.S. and Canadian courts have approached the patentability of intangible inventions and discuss whether any lessons can be learned from the U.S.’s patent dilemma. In section 2, I will review the American jurisprudence on patentability of intangible inventions. In section 3, I will discuss the potential impact Bilski may have on the American jurisprudence. Section 4 will assess the Canadian jurisprudence on patentability of intangible inventions. In section 5, I will discuss the Federal Court of Canada’s decision in Amazon/FCC. I argue that based on recent events in the American jurisprudence, Canadian …
Tanggung Jawab Hukum Penyelenggara Sistem Elektronik (Law Responsibility Of The Electronic System Providers), Abdul Salam
Tanggung Jawab Hukum Penyelenggara Sistem Elektronik (Law Responsibility Of The Electronic System Providers), Abdul Salam
Indonesia Law Review
Reviewing Edmon Makarim’s book which is about Law Responsibility of the Electronic System Providers, remind us that easiness and availability of electronic system in electronic transaction in private or public happen because the role of electronic system providers. Behind the important and central role, there is big responsibility for electronic system providers. But because of wide of definition of provision of electronic system and so many people who involve in electronic system providers, there is a question in our mind, how is the shape of responsibility of the electronic system providers if the electronic system which is held is broken …
Jurisprudence For A Digital Age: Free Software And The Need For A New Media Legal Authority, Nicholas Clark
Jurisprudence For A Digital Age: Free Software And The Need For A New Media Legal Authority, Nicholas Clark
University of the District of Columbia Law Review
No abstract provided.
Revising The Analysis Of Personal Jurisdiction To Accommodate Internet-Based Personal Contacts, Matthew L. Perdoni
Revising The Analysis Of Personal Jurisdiction To Accommodate Internet-Based Personal Contacts, Matthew L. Perdoni
University of the District of Columbia Law Review
From online banking, to cyber-shopping, to the growth of social-networking websites, the Internet is a medium for human interaction as much as it is a part of modern commerce and business, and now encompasses nearly every facet of American life. By all indications, use will become more widespread and complex over time. The Internet now facilitates the modern functional equivalent of human interaction, and provides worldwide access to users with the mere click of a button. For these reasons, examining the role of the Internet in the law is critical. Particularly, it is necessary to consider whether and to what …
Restraining Amazon.Com's Orwellian Potential: The Computer Fraud And Abuse Act As Consumer Rights Legislation, Alicia C. Sanders
Restraining Amazon.Com's Orwellian Potential: The Computer Fraud And Abuse Act As Consumer Rights Legislation, Alicia C. Sanders
Federal Communications Law Journal
In 2009, Amazon.com decided to correct a potential copyright violation by deleting e-books by George Orwell and Ayn Rand from the Kindles of users who had already purchased the offending texts. Two of those users, Justin Gawronski and Antoine Bruguier, claimed that Amazon.com had violated the Computer Fraud and Abuse Act (CFAA) by accessing their Kindles without authorization. The plaintiffs also relied on other causes of action, including breach of contract and trespass to chattels. Although the dispute quickly settled, the Gawronski lawsuit remains a useful case study that shows why the CFAA is a useful protection for consumers. Recently, …
Databases And Dynamism, Michal Shur-Ofry
Databases And Dynamism, Michal Shur-Ofry
University of Michigan Journal of Law Reform
Databases are generally perceived in legal scholarship as static warehouses, storing up valuable facts and information. Accordingly, scholarship on copyright protection of databases typically concentrates on the social need to access their content. This Article seeks to shift the focus of the debate, arguing that the copyrightdatabases debate is not merely a static "access to information" story. Instead, it is a dynamic story of relations, hierarchies, and interactions between pieces of information, determined by database creators. It is also a story of patterns, categories, selections, and taxonomies that are often invisible to the naked eye, but that influence our perceptions …
Technology-Assisted Review In E-Discovery Can Be More Effective And More Efficient Than Exhaustive Manual Review, Maura R. Grossman, Gordon V. Cormack
Technology-Assisted Review In E-Discovery Can Be More Effective And More Efficient Than Exhaustive Manual Review, Maura R. Grossman, Gordon V. Cormack
Richmond Journal of Law & Technology
E-discovery processes that use automated tools to prioritize and select documents for review are typically regarded as potential cost-savers – but inferior alternatives – to exhaustive manual review, in which a cadre of reviewers assesses every document for responsiveness to a production request, and for privilege. This Article offers evidence that such technology-assisted processes, while indeed more efficient, can also yield results superior to those of exhaustive manual review, as measured by recall and precision, as well as F1, a summary measure combining both recall and precision. The evidence derives from an analysis of data collected from the TREC 2009 …
Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Stephen J. Rancourt
Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Stephen J. Rancourt
Richmond Journal of Law & Technology
The Richmond Journal of Law and Technology is proud to present its Annual Survey issue of the 2010–2011 academic year. The Journal strives to find interesting and contemporary topics that bisect technology and the law, and publish authors who provide in-depth and practical analysis of these topics to the legal community and beyond. To that end, this year’s Annual Survey is devoted exclusively to the topic of electronic discovery. In the two years since the Journal last published on this important issue, the availability of electronic information has increased exponentially, courts have continued to struggle with the 2006 Amendments to …
The Board's Responsibility For Information Technology Governance, 28 J. Marshall J. Computer & Info. L. 313 (2011), Lawrence J. Trautman, Kara Altenbaumer-Price
The Board's Responsibility For Information Technology Governance, 28 J. Marshall J. Computer & Info. L. 313 (2011), Lawrence J. Trautman, Kara Altenbaumer-Price
UIC John Marshall Journal of Information Technology & Privacy Law
With accusations that boards of directors of financial institutions were asleep at the wheel while their companies engaged in risky behavior that erased millions of dollars of shareholder value and plunged the country into recession, increasing pressure is now being placed on public company boards to shoulder the burden of risk oversight for the companies they serve. This article provides an overview of some of the main considerations relative to every director’s duty to govern IT risk. In particular, this comment will address directors’ roles in the risk oversight of the corporations they serve, their role in governance of IT, …
The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, 28 J. Marshall Computer & Info. L. 523 (2011), Moonho Song, Carrie Leonetti
The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, 28 J. Marshall Computer & Info. L. 523 (2011), Moonho Song, Carrie Leonetti
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
My Teacher Sux! [Censored]: Protecting Students' Right To Free Speech On The Internet, 28 J. Marshall J. Computer & Info. L. 385 (2011), Katherine Hokenson
My Teacher Sux! [Censored]: Protecting Students' Right To Free Speech On The Internet, 28 J. Marshall J. Computer & Info. L. 385 (2011), Katherine Hokenson
UIC John Marshall Journal of Information Technology & Privacy Law
This comment will discusses the problem posed by student speech made on the Internet, how free speech issues are generally addressed by courts, the Supreme Court cases that have specifically addressed the First Amendment rights of students, and factors that courts dealing with student speech made on the Internet have attempted to use in their decisions. The comment will further look at how courts have analyzed online student speech cases in light of available Supreme Court precedent, and will propose that the Court adopt a hybrid of the Tinker test when addressing student speech made on the Internet, which will …
Schools: Where Fewer Rights Are Reasonable? Why The Reasonableness Standard Is Inappropriate To Measure The Use Of Rfid Tracking Devices On Students, 28 J. Marshall J. Computer & Info. L. 411 (2011), Alexandra C. Hirsch
UIC John Marshall Journal of Information Technology & Privacy Law
In an unsuccessful attempt to heighten security, schools are implementing a technology that offers access to children’s personal information and minute-by-minute location. Although not entirely new, Radio Frequency Identification (RFID) technology use has recently been expanding within the school arena. Skeptics knowledgeable about the downfalls of the technology, however, have reason to be concerned. In order to understand the true urgency of this issue, this comment will explain the background of RFID technology, specifically what RFID tags are, how they are used, their purposes, and how they have become unsafe. Included will be an explanation of the reasons that schools …
Bugs For Sale: Legal And Ethical Proprieties Of The Market In Software Vulnerabilities, 28 J. Marshall J. Computer & Info. L. 451 (2011), Taiwo A. Oriola
Bugs For Sale: Legal And Ethical Proprieties Of The Market In Software Vulnerabilities, 28 J. Marshall J. Computer & Info. L. 451 (2011), Taiwo A. Oriola
UIC John Marshall Journal of Information Technology & Privacy Law
The pertinent questions therefore are: first, could software vulnerabilities be obviated simply by ameliorating factors responsible for market failure as canvassed by the literature on the economics of software security, drawing on the strength of the theory of information asymmetry, or are vulnerabilities inevitable irrespective of market dynamics and solutions? Second, to what extent is vulnerabilities research or the surreptitious exploitation of software vulnerabilities by hackers tantamount to trespass, and what are the legal implications, if any? Third, to what extent is the peddling of software vulnerabilities valid or enforceable in law? Fourth, what are the implications of software vulnerabilities …
Carry That Weight: Victim Privacy Within The Military Sexual Assault Reporting Methods, 28 J. Marshall Computer & Info. L. 551 (2011), Emily Hansen
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Need For Better Analysis Of High Capacity Services, 28 J. Marshall J. Computer & Info. L. 343 (2011), George S. Ford, Lawrence J. Spiwak
The Need For Better Analysis Of High Capacity Services, 28 J. Marshall J. Computer & Info. L. 343 (2011), George S. Ford, Lawrence J. Spiwak
UIC John Marshall Journal of Information Technology & Privacy Law
In 1999, the Federal Communications Commission (“FCC”) began to grant incumbent local exchange carriers (“LECs”) pricing flexibility on special access services in some Metropolitan Statistical Areas (“MSAs”) when specific evidence of competitive alternatives is present. The propriety of that deregulatory move by the FCC has been criticized by the purchasers of such services ever since. Proponents of special access price regulation rely on three central arguments to support a retreat to strict price regulation: (1) the market(s) for special access and similar services is unduly concentrated; (2) rates of return on special access services, computed using FCC ARMIS data, are …
The Thirtieth Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 29 J. Marshall J. Computer & Info. L. 75 (2011), Russell Bottom, Matthew T. Andris, Robin Ann Sowizrol
The Thirtieth Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 29 J. Marshall J. Computer & Info. L. 75 (2011), Russell Bottom, Matthew T. Andris, Robin Ann Sowizrol
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Stuxnet As Cyberwarfare: Applying The Law Of War To The Virtual Battlefield, 29 J. Marshall J. Computer & Info. L. 1 (2011), John Richardson
Stuxnet As Cyberwarfare: Applying The Law Of War To The Virtual Battlefield, 29 J. Marshall J. Computer & Info. L. 1 (2011), John Richardson
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Thirtieth Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 29 J. Marshall J. Computer & Info. L. 139 (2011), Elena Jacob, Steven Osit, Darya Zuravicky
The Thirtieth Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 29 J. Marshall J. Computer & Info. L. 139 (2011), Elena Jacob, Steven Osit, Darya Zuravicky
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Amended Eu Law On Eprivacy And Electronic Communications After Its 2011 Implentation; New Rules On Data Protection, Spam, Data Breaches And Protection Of Intellectual Property Rights, 29 J. Marshall J. Computer & Info. L. 29 (2011), Vagelis Papakonstantinou, Paul De Hert
The Amended Eu Law On Eprivacy And Electronic Communications After Its 2011 Implentation; New Rules On Data Protection, Spam, Data Breaches And Protection Of Intellectual Property Rights, 29 J. Marshall J. Computer & Info. L. 29 (2011), Vagelis Papakonstantinou, Paul De Hert
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.