Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 20 of 20

Full-Text Articles in Computer Law

Rebooting Trademarks For The Twenty-First Century, 49 U. Louisville L. Rev. 517 (2011), Doris E. Long Jan 2011

Rebooting Trademarks For The Twenty-First Century, 49 U. Louisville L. Rev. 517 (2011), Doris E. Long

UIC Law Open Access Faculty Scholarship

Trademarks have long suffered from an "ugly stepsister" status in the realm of intellectual property. Quasi-market regulation tool, quasi-investment property; trademark's historical role as both consumer-information signifier and producer-investment asset has led to increasingly confusing dichotomous treatment under the Lanham Act. The potentially borderless markets of cyberspace, with their new marketing techniques and new competitive spaces, have only heightened this confusion. Stumbling attempts to extend protection for marks under the Lanham Act beyond traditional notions of trademark use and consumer confusion to encompass the investment protection side of trademarks, such as the development of federal dilution and anti-cybersquatting acts, only …


The Board's Responsibility For Information Technology Governance, 28 J. Marshall J. Computer & Info. L. 313 (2011), Lawrence J. Trautman, Kara Altenbaumer-Price Jan 2011

The Board's Responsibility For Information Technology Governance, 28 J. Marshall J. Computer & Info. L. 313 (2011), Lawrence J. Trautman, Kara Altenbaumer-Price

UIC John Marshall Journal of Information Technology & Privacy Law

With accusations that boards of directors of financial institutions were asleep at the wheel while their companies engaged in risky behavior that erased millions of dollars of shareholder value and plunged the country into recession, increasing pressure is now being placed on public company boards to shoulder the burden of risk oversight for the companies they serve. This article provides an overview of some of the main considerations relative to every director’s duty to govern IT risk. In particular, this comment will address directors’ roles in the risk oversight of the corporations they serve, their role in governance of IT, …


The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, 28 J. Marshall Computer & Info. L. 523 (2011), Moonho Song, Carrie Leonetti Jan 2011

The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, 28 J. Marshall Computer & Info. L. 523 (2011), Moonho Song, Carrie Leonetti

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


My Teacher Sux! [Censored]: Protecting Students' Right To Free Speech On The Internet, 28 J. Marshall J. Computer & Info. L. 385 (2011), Katherine Hokenson Jan 2011

My Teacher Sux! [Censored]: Protecting Students' Right To Free Speech On The Internet, 28 J. Marshall J. Computer & Info. L. 385 (2011), Katherine Hokenson

UIC John Marshall Journal of Information Technology & Privacy Law

This comment will discusses the problem posed by student speech made on the Internet, how free speech issues are generally addressed by courts, the Supreme Court cases that have specifically addressed the First Amendment rights of students, and factors that courts dealing with student speech made on the Internet have attempted to use in their decisions. The comment will further look at how courts have analyzed online student speech cases in light of available Supreme Court precedent, and will propose that the Court adopt a hybrid of the Tinker test when addressing student speech made on the Internet, which will …


Schools: Where Fewer Rights Are Reasonable? Why The Reasonableness Standard Is Inappropriate To Measure The Use Of Rfid Tracking Devices On Students, 28 J. Marshall J. Computer & Info. L. 411 (2011), Alexandra C. Hirsch Jan 2011

Schools: Where Fewer Rights Are Reasonable? Why The Reasonableness Standard Is Inappropriate To Measure The Use Of Rfid Tracking Devices On Students, 28 J. Marshall J. Computer & Info. L. 411 (2011), Alexandra C. Hirsch

UIC John Marshall Journal of Information Technology & Privacy Law

In an unsuccessful attempt to heighten security, schools are implementing a technology that offers access to children’s personal information and minute-by-minute location. Although not entirely new, Radio Frequency Identification (RFID) technology use has recently been expanding within the school arena. Skeptics knowledgeable about the downfalls of the technology, however, have reason to be concerned. In order to understand the true urgency of this issue, this comment will explain the background of RFID technology, specifically what RFID tags are, how they are used, their purposes, and how they have become unsafe. Included will be an explanation of the reasons that schools …


Bugs For Sale: Legal And Ethical Proprieties Of The Market In Software Vulnerabilities, 28 J. Marshall J. Computer & Info. L. 451 (2011), Taiwo A. Oriola Jan 2011

Bugs For Sale: Legal And Ethical Proprieties Of The Market In Software Vulnerabilities, 28 J. Marshall J. Computer & Info. L. 451 (2011), Taiwo A. Oriola

UIC John Marshall Journal of Information Technology & Privacy Law

The pertinent questions therefore are: first, could software vulnerabilities be obviated simply by ameliorating factors responsible for market failure as canvassed by the literature on the economics of software security, drawing on the strength of the theory of information asymmetry, or are vulnerabilities inevitable irrespective of market dynamics and solutions? Second, to what extent is vulnerabilities research or the surreptitious exploitation of software vulnerabilities by hackers tantamount to trespass, and what are the legal implications, if any? Third, to what extent is the peddling of software vulnerabilities valid or enforceable in law? Fourth, what are the implications of software vulnerabilities …


Carry That Weight: Victim Privacy Within The Military Sexual Assault Reporting Methods, 28 J. Marshall Computer & Info. L. 551 (2011), Emily Hansen Jan 2011

Carry That Weight: Victim Privacy Within The Military Sexual Assault Reporting Methods, 28 J. Marshall Computer & Info. L. 551 (2011), Emily Hansen

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Need For Better Analysis Of High Capacity Services, 28 J. Marshall J. Computer & Info. L. 343 (2011), George S. Ford, Lawrence J. Spiwak Jan 2011

The Need For Better Analysis Of High Capacity Services, 28 J. Marshall J. Computer & Info. L. 343 (2011), George S. Ford, Lawrence J. Spiwak

UIC John Marshall Journal of Information Technology & Privacy Law

In 1999, the Federal Communications Commission (“FCC”) began to grant incumbent local exchange carriers (“LECs”) pricing flexibility on special access services in some Metropolitan Statistical Areas (“MSAs”) when specific evidence of competitive alternatives is present. The propriety of that deregulatory move by the FCC has been criticized by the purchasers of such services ever since. Proponents of special access price regulation rely on three central arguments to support a retreat to strict price regulation: (1) the market(s) for special access and similar services is unduly concentrated; (2) rates of return on special access services, computed using FCC ARMIS data, are …


The Thirtieth Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 29 J. Marshall J. Computer & Info. L. 75 (2011), Russell Bottom, Matthew T. Andris, Robin Ann Sowizrol Jan 2011

The Thirtieth Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 29 J. Marshall J. Computer & Info. L. 75 (2011), Russell Bottom, Matthew T. Andris, Robin Ann Sowizrol

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Stuxnet As Cyberwarfare: Applying The Law Of War To The Virtual Battlefield, 29 J. Marshall J. Computer & Info. L. 1 (2011), John Richardson Jan 2011

Stuxnet As Cyberwarfare: Applying The Law Of War To The Virtual Battlefield, 29 J. Marshall J. Computer & Info. L. 1 (2011), John Richardson

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Thirtieth Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 29 J. Marshall J. Computer & Info. L. 139 (2011), Elena Jacob, Steven Osit, Darya Zuravicky Jan 2011

The Thirtieth Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 29 J. Marshall J. Computer & Info. L. 139 (2011), Elena Jacob, Steven Osit, Darya Zuravicky

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Amended Eu Law On Eprivacy And Electronic Communications After Its 2011 Implentation; New Rules On Data Protection, Spam, Data Breaches And Protection Of Intellectual Property Rights, 29 J. Marshall J. Computer & Info. L. 29 (2011), Vagelis Papakonstantinou, Paul De Hert Jan 2011

The Amended Eu Law On Eprivacy And Electronic Communications After Its 2011 Implentation; New Rules On Data Protection, Spam, Data Breaches And Protection Of Intellectual Property Rights, 29 J. Marshall J. Computer & Info. L. 29 (2011), Vagelis Papakonstantinou, Paul De Hert

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Thirtieth Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 29 J. Marshall J. Computer & Info. L. 103 (2011), Nate Lindsey, Chris Omlid Jan 2011

The Thirtieth Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 29 J. Marshall J. Computer & Info. L. 103 (2011), Nate Lindsey, Chris Omlid

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Three Cs Versus The Dinosaur: Updating The Technologically Archaic Fdcpa To Provide Consumers, Collectors, And Courts Clarity, 44 J. Marshall L. Rev. 1033 (2011), Melissa Travis Jan 2011

The Three Cs Versus The Dinosaur: Updating The Technologically Archaic Fdcpa To Provide Consumers, Collectors, And Courts Clarity, 44 J. Marshall L. Rev. 1033 (2011), Melissa Travis

UIC Law Review

No abstract provided.


Free Speech On The Battlefield: Protecting The Use Of Social Media By America's Soldiers, 44 J. Marshall L. Rev. 1085 (2011), David Johnsen Jan 2011

Free Speech On The Battlefield: Protecting The Use Of Social Media By America's Soldiers, 44 J. Marshall L. Rev. 1085 (2011), David Johnsen

UIC Law Review

No abstract provided.


School Discipline Of Cyber-Bullies: A Proposed Threshold That Respects Constitutional Rights, 45 J. Marshall L. Rev. 85 (2011), Laura Pavlik Raatjes Jan 2011

School Discipline Of Cyber-Bullies: A Proposed Threshold That Respects Constitutional Rights, 45 J. Marshall L. Rev. 85 (2011), Laura Pavlik Raatjes

UIC Law Review

No abstract provided.


Regulating Online Behavioral Advertising, 44 J. Marshall L. Rev. 899 (2011), Steven C. Bennett Jan 2011

Regulating Online Behavioral Advertising, 44 J. Marshall L. Rev. 899 (2011), Steven C. Bennett

UIC Law Review

No abstract provided.


Right Of Publicity: Is Behavioral Targeting Violating The Right To Control Your Identity Online?, 10 J. Marshall Rev. Intell. Prop. L. 811 (2011), Andrea Stein Fuelleman Jan 2011

Right Of Publicity: Is Behavioral Targeting Violating The Right To Control Your Identity Online?, 10 J. Marshall Rev. Intell. Prop. L. 811 (2011), Andrea Stein Fuelleman

UIC Review of Intellectual Property Law

Behavioral targeting (“BT”) is an advertising technique that receives a great deal of attention due in part to the balkanized self-regulatory policies that address consumer protection issues. The majority of the self-regulation policies, including the BT principles proposed by the Federal Trade Commission (“FTC”) focus on privacy issues but fail to discuss the impact BT may have on the right to control the commercial use of one’s identity. In discussing the right of publicity, many legal scholars agree that everyone has a right to control the commercial use of his or her identity, regardless of his or her status as …


Fifteen Years Of Fame: The Declining Relevance Of Domain Names In The Enduring Conflict Between Trademark And Free Speech Rights, 11 J. Marshall Rev. Intell. Prop. L. 1 (2011), Jude A. Thomas Jan 2011

Fifteen Years Of Fame: The Declining Relevance Of Domain Names In The Enduring Conflict Between Trademark And Free Speech Rights, 11 J. Marshall Rev. Intell. Prop. L. 1 (2011), Jude A. Thomas

UIC Review of Intellectual Property Law

Domain name disputes have been the subject of substantial litigation, legislative action, and scholarly debate over the course of the past fifteen years. Much of the debate is the product of disagreement concerning whether trademark rights naturally extend into the domain name space and to what extent those rights are limited by principles of free speech. Gripe sites are paradigmatic examples of this debate. Society’s investment in defining these rights continues to grow, even as the relevance of domain names may be declining, due to: (1) changes in the way users locate content on the Internet; (2) the growth of …


Rights Versus Commerce: Balancing Online Trademark Policing With The Emerging Marketplace, 11 J. Marshall Rev. Intell. Prop. L. 217 (2011), Jessica L. Hilliard Jan 2011

Rights Versus Commerce: Balancing Online Trademark Policing With The Emerging Marketplace, 11 J. Marshall Rev. Intell. Prop. L. 217 (2011), Jessica L. Hilliard

UIC Review of Intellectual Property Law

In 2008, jeweler Tiffany & Co. (“Tiffany”) commenced an action against eBay after discovering that a significant amount of counterfeit Tiffany jewelry was being sold on the online auction house. Tiffany had previously used eBay’s Verified Rights Owner program to report the infringement and pursued enforcement actions against individual sellers. Nevertheless, Tiffany sued eBay for various causes of action, including contributory trademark infringement. The Second Circuit held that online service providers like eBay are not liable for contributory trademark infringement unless they have specific knowledge of particular instances of infringement. Due to the ruling, Tiffany bears the burden for policing …