Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Administrative law (1)
- Anonymous speech (1)
- Antitrust law and competition law (1)
- Antitrust law and trade regulation (1)
- Applications (1)
-
- Broadband (1)
- Communications law and policy (1)
- Computer law and the law of the internet (1)
- Confidentiality (1)
- Cyber Stalking (1)
- Cybertravel hacking DEF CON geolocation cyberlaw evasion internet IPv6 (1)
- Defamation suits (1)
- Digital records (1)
- Domestic Violence (1)
- E-discovery (1)
- Electronically stored information (ESI) (1)
- Firefox (1)
- Google (1)
- ISP (1)
- ISP subpoenas (1)
- International Law Studies (1)
- International Law Studies Series U.S. Naval War College (1)
- Internet (1)
- Internet Service Provider (1)
- Internet Video (1)
- Internet architecture (1)
- Law & technology (1)
- Lawyers (1)
- Legal research (1)
- Managed Internet Services (1)
Articles 1 - 9 of 9
Full-Text Articles in Computer Law
Ombuds In Cloud Of Exabytes--Understanding The Ombuds' Digital Trail, Craig Mousin
Ombuds In Cloud Of Exabytes--Understanding The Ombuds' Digital Trail, Craig Mousin
Mission and Ministry Publications
This article examines Ombuds Standards of Practice as Ombuds increasingly rely upon electronic communication. It first explores the expansion of electronically stored information (ESI) due to the many different electronic devices Ombuds rely upon or interact with including computers, smartphones, and printers. It then reviews how novel legal issues caused by e-discovery--the search for relevant digital documents in litigation--will impact Ombuds. Finally, it offers Ombuds suggestions on managing and controlling ESI while raising the question of whether the International Ombudsman Association must review its Standards of Practice in light of these ESI developments.
The Future Of Cybertravel: Legal Implications Of The Evasion Of Geolocation -- A Presentation, Marketa Trimble
The Future Of Cybertravel: Legal Implications Of The Evasion Of Geolocation -- A Presentation, Marketa Trimble
Boyd Briefs / Road Scholars
Professor Marketa Trimble presented these materials at the Def Con 19 Conference in Las Vegas, Nevada on August 7, 2011. The presentation discussed what the law has (or does not have) to say about evasion of geolocation or "cybertravel" -- acts by which a user makes geolocation tools believe that he is physically located somewhere other than where he is located.
Teens, Technology, And Cyberstalking: The Domestic Violence Wave Of The Future?, Andrew King-Ries
Teens, Technology, And Cyberstalking: The Domestic Violence Wave Of The Future?, Andrew King-Ries
Faculty Law Review Articles
The American criminal justice system, (therefore), is facing a future domestic violence crisis. Unfortunately, authorities-both parents and law enforcement-tend to minimize the seriousness of violence within adolescent relationships and to minimize the seriousness of stalking. In addition, given the prevalence and embrace of technology by teenagers, criminalizing "normal" teenage behavior seems counter-productive. While an effective criminal justice system response to this problem has yet to be developed, the first step will be for parents and law enforcement to recognize the risk and take it seriously. The second step will be to "renorm" unhealthy teenage relationship norms. It is possible that …
Rough Consensus And Running Code: Integrating Engineering Principles Into Internet Policy Debates, Christopher S. Yoo
Rough Consensus And Running Code: Integrating Engineering Principles Into Internet Policy Debates, Christopher S. Yoo
All Faculty Scholarship
This is the introduction to a symposium issue for a conference designed to bring the engineering community, policymakers, legal academics, and industry participants together in an attempt to provide policymakers with a better understanding of the Internet’s technical aspects and to explore emerging issues of particular importance to current broadband policy.
Rebooting Trademarks For The Twenty-First Century, 49 U. Louisville L. Rev. 517 (2011), Doris E. Long
Rebooting Trademarks For The Twenty-First Century, 49 U. Louisville L. Rev. 517 (2011), Doris E. Long
UIC Law Open Access Faculty Scholarship
Trademarks have long suffered from an "ugly stepsister" status in the realm of intellectual property. Quasi-market regulation tool, quasi-investment property; trademark's historical role as both consumer-information signifier and producer-investment asset has led to increasingly confusing dichotomous treatment under the Lanham Act. The potentially borderless markets of cyberspace, with their new marketing techniques and new competitive spaces, have only heightened this confusion. Stumbling attempts to extend protection for marks under the Lanham Act beyond traditional notions of trademark use and consumer confusion to encompass the investment protection side of trademarks, such as the development of federal dilution and anti-cybersquatting acts, only …
Supervising Managed Services, James B. Speta
Supervising Managed Services, James B. Speta
Faculty Working Papers
Many Internet-access providers simultaneously offer Internet access and other services, such as traditional video channels, video on demand, voice calling, and other emerging services, through a single, converged platform. These other services—which can be called "managed services" because the carrier offers them only to its subscribers in a manner designed to ensure some quality of service—in many circumstances will compete with services that are offered by unaffiliated parties as applications or services on the Internet. This situation creates an important interaction effect between the domains of Internet access and managed services, an effect that has largely been missing from the …
To Reveal Or Conceal?—An Isp’S Dilemma, Presenting A New “Anonymous Public Concern Test” For Evaluating Isp Subpoenas In Online Defamation Suits, Cayce Myers
LLM Theses and Essays
This article proposes a new test called the “Anonymous Public Concern Test” which incorporates public concern analysis in enforcing Internet Service Provider [ISP] subpoenas in online defamation suits. Anonymous speech is an important aspect of First Amendment rights that warrants protection. Current tests used by courts to analyze whether to enforce ISP subpoenas are either too pro-plaintiff or too pro-defendant. The article’s proposed “Anonymous Public Concern Test” is the best approach in dealing with ISP subpoenas because it protects both anonymous speeches and preserves online defamation plaintiffs’ rights.
Make Your Life Easier: Free Online Productivity Tools And Resources, Kincaid C. Brown
Make Your Life Easier: Free Online Productivity Tools And Resources, Kincaid C. Brown
Law Librarian Scholarship
CiteGenie works primarily for caselaw and Internet resource research but is experimenting with the ability to add citations for statutes and regulations. CiteGenie provides a number of formatting options and allows you to choose citation rules for a particular state, use parallel citations, remove star-pagination marks from quoted texts, and personalize abbreviations. This tool is easy to use; when researching in Firefox, select CiteGenie from the right-click menu and a pop-up displays the copied text and citation to be pasted.
Cyber Attacks As "Force" Under Un Charter Article 2(4), Matthew C. Waxman
Cyber Attacks As "Force" Under Un Charter Article 2(4), Matthew C. Waxman
Faculty Scholarship
In a 2010 article in Foreign Affairs, Deputy Secretary of Defense William Lynn revealed that in 2008 the Department of Defense suffered "the most significant breach of U.S. military computers ever" when a flash drive inserted into a US military laptop surreptitiously introduced malicious software into US Central Command's classified and unclassified computer systems. Lynn explains that the US government is developing defensive systems to protect military and civilian electronic infrastructure from intrusions and, potentially worse, disruptions and destruction, and it is developing its own cyber-strategy "to defend the United States in the digital age."
To what extent is …