Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Internet Law

UIC John Marshall Journal of Information Technology & Privacy Law

2013

Articles 1 - 14 of 14

Full-Text Articles in Computer Law

Navigating Through The Fog Of Cloud Computing Contracts, 30 J. Marshall J. Info. Tech. & Privacy L.13 (2013), T. Noble Foster Jan 2013

Navigating Through The Fog Of Cloud Computing Contracts, 30 J. Marshall J. Info. Tech. & Privacy L.13 (2013), T. Noble Foster

UIC John Marshall Journal of Information Technology & Privacy Law

This paper explores legal issues associated with cloud computing, provides analysis and commentary on typical clauses found in contracts offered by well-known cloud service providers, and identifies strategies to mitigate the risk of exposure to cloud-based legal claims in the critical areas of data security, privacy, and confidentiality. While current research offers numerous case studies, viewpoints, and technical descriptions of cloud processes, our research provides a close examination of the language used in cloud contract terms. Analysis of these contract terms supports the finding that most standard cloud computing contracts are unevenly balanced in favor of the cloud service provider. …


My Iphone Is My Castle: One Aspect Of Protecting Privacy In A Digital Age, 30 J. Marshall J. Info. Tech. & Privacy L. 1 (2013), Joan Catherine Bohl Jan 2013

My Iphone Is My Castle: One Aspect Of Protecting Privacy In A Digital Age, 30 J. Marshall J. Info. Tech. & Privacy L. 1 (2013), Joan Catherine Bohl

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Why Arthur Goldberg Cared So Much About Privacy, 30 J. Marshall J. Info. Tech. & Privacy L. 67 (2013), David Stebenne Jan 2013

Why Arthur Goldberg Cared So Much About Privacy, 30 J. Marshall J. Info. Tech. & Privacy L. 67 (2013), David Stebenne

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Crisis On Impact: Responding To Cyber Attacks On Critical Information Infrastructures, 30 J. Marshall J. Info. Tech. & Privacy L. 31 (2013), Eugenia Georgiades, William Caelli, Sharon Christensen, W.D. Duncan Jan 2013

Crisis On Impact: Responding To Cyber Attacks On Critical Information Infrastructures, 30 J. Marshall J. Info. Tech. & Privacy L. 31 (2013), Eugenia Georgiades, William Caelli, Sharon Christensen, W.D. Duncan

UIC John Marshall Journal of Information Technology & Privacy Law

In the developing digital economy, the notion of traditional attack on enterprises of national significance or interest has transcended into different modes of electronic attack, surpassing accepted traditional forms of physical attack upon a target. The terrorist attacks that took place in the United States on September 11, 2001 demonstrated the physical devastation that could occur if any nation were the target of a large-scale terrorist attack. Therefore, there is a need to protect critical national infrastructure and critical information infrastructure. In particular, this protection is crucial for the proper functioning of a modern society and for a government to …


Prism And The European Union’S Data Protection Directive, 30 J. Marshall J. Info. Tech. & Privacy L. 227 (2013), Liane Colonna Jan 2013

Prism And The European Union’S Data Protection Directive, 30 J. Marshall J. Info. Tech. & Privacy L. 227 (2013), Liane Colonna

UIC John Marshall Journal of Information Technology & Privacy Law

.


How Far Can The Government’S Hand Reach Inside Your Personal Inbox?: Problems With The Sca, 30 J. Marshall J. Info. Tech. & Privacy L.75 (2013), Dana T. Benedetti Jan 2013

How Far Can The Government’S Hand Reach Inside Your Personal Inbox?: Problems With The Sca, 30 J. Marshall J. Info. Tech. & Privacy L.75 (2013), Dana T. Benedetti

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Tweet Tweet: A First Amendment Wake Up Call Regarding Social Media In The Sports Arena, 30 J. Marshall J. Info. Tech. & Privacy L. 117 (2013), Samantha Levin Jan 2013

Tweet Tweet: A First Amendment Wake Up Call Regarding Social Media In The Sports Arena, 30 J. Marshall J. Info. Tech. & Privacy L. 117 (2013), Samantha Levin

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Lemons Problem In Crowdfunding, 30 J. Marshall J. Info. Tech. & Privacy L. 253 (2013), Gmeleen Faye Tomboc Jan 2013

The Lemons Problem In Crowdfunding, 30 J. Marshall J. Info. Tech. & Privacy L. 253 (2013), Gmeleen Faye Tomboc

UIC John Marshall Journal of Information Technology & Privacy Law

Crowdfunding, an offshoot of crowdsourcing, is being touted as an alternative to traditional sources of financing for small businesses. Despite all its promise, crowdfunding is not without potential problems. To the extent feasible, these possible issues must be anticipated well in advance so that crowdfunding can fulfill its goal of democratizing access to capital.

This paper explores how asymmetrical information in the crowd-funding market can lead to a lemons problem, where high quality start-ups are driven out of the market by low quality projects. Understanding how the lemons problem can arise is critical in determining what reforms are needed to …


Sometimes I Feel Like Somebody’S Watching Me . . . Read?: A Comment On The Need For Heightened Privacy Rights For Consumers Of Ebooks, 30 J. Marshall J. Info. Tech. & Privacy L. 281 (2013), Meredith Mays Espino Jan 2013

Sometimes I Feel Like Somebody’S Watching Me . . . Read?: A Comment On The Need For Heightened Privacy Rights For Consumers Of Ebooks, 30 J. Marshall J. Info. Tech. & Privacy L. 281 (2013), Meredith Mays Espino

UIC John Marshall Journal of Information Technology & Privacy Law

.


The Thirty-Second Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 30 J. Marshall J. Computer & Info. L. 339 (2013), Dana Benedetti, Daniel Johnson, Kalli Kling, Samantha Levin, Zayna Nubani, Pamela Szelung Jan 2013

The Thirty-Second Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 30 J. Marshall J. Computer & Info. L. 339 (2013), Dana Benedetti, Daniel Johnson, Kalli Kling, Samantha Levin, Zayna Nubani, Pamela Szelung

UIC John Marshall Journal of Information Technology & Privacy Law

.


The Thirty-Second Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 30 J. Marshall J. Computer & Info. L. 373 (2013), Eliana Albelbaisi, Robert Koehl, Todd Smith Jan 2013

The Thirty-Second Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 30 J. Marshall J. Computer & Info. L. 373 (2013), Eliana Albelbaisi, Robert Koehl, Todd Smith

UIC John Marshall Journal of Information Technology & Privacy Law

.


My Life Is Not My Own: Do Criminal Arrestees’ Privacy Interests In Mug Shots Outweigh Public’S Desire For Disclosure?, 30 J. Marshall J. Computer & Info. L. 307 (2013), Jocelyn Watkins Jan 2013

My Life Is Not My Own: Do Criminal Arrestees’ Privacy Interests In Mug Shots Outweigh Public’S Desire For Disclosure?, 30 J. Marshall J. Computer & Info. L. 307 (2013), Jocelyn Watkins

UIC John Marshall Journal of Information Technology & Privacy Law

.


Warrantless Government Drone Surveillance: A Challenge To The Fourth Amendment, 30 J. Marshall J. Info. Tech. & Privacy L. 155 (2013), Jennifer O'Brien Jan 2013

Warrantless Government Drone Surveillance: A Challenge To The Fourth Amendment, 30 J. Marshall J. Info. Tech. & Privacy L. 155 (2013), Jennifer O'Brien

UIC John Marshall Journal of Information Technology & Privacy Law

The Federal Aviation Administration Modernization and Reform Act of 2012 aims to integrate drones into the United States national airspace by 2015. While the thought of prevalent private and public daily drone use might seem implausible now, the combination of this new legislation and the increasing availability of inexpensive, technologically advanced small drones will make it a reality. From detectaphones to pen registers and most recently, the GPS, the Supreme Court has faced a plethora of unreasonable search challenges to the warrantless use of such sense augmentation devices by law enforcement to collect information. Acting as the privacy safeguard of …


The Thirty-Second Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 30 J. Marshall J. Computer & Info. L. 403 (2013), Samuel Bragg, Leslie Brockhoeft, Matthew Vinson Jan 2013

The Thirty-Second Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 30 J. Marshall J. Computer & Info. L. 403 (2013), Samuel Bragg, Leslie Brockhoeft, Matthew Vinson

UIC John Marshall Journal of Information Technology & Privacy Law

.