Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Internet Law

2002

Institution
Keyword
Publication
Publication Type

Articles 31 - 57 of 57

Full-Text Articles in Computer Law

Face Recognition Technology: The Potential Orwellian Implications And Constitutionality Of Current Uses Under The Fourth Amendment, 20 J. Marshall J. Computer & Info. L. 321 (2002), Robert H. Thornburg Jan 2002

Face Recognition Technology: The Potential Orwellian Implications And Constitutionality Of Current Uses Under The Fourth Amendment, 20 J. Marshall J. Computer & Info. L. 321 (2002), Robert H. Thornburg

UIC John Marshall Journal of Information Technology & Privacy Law

Did you smile at the 2001 Super Bowl at Tampa's Raymond James Stadium? Hope you did because the facial recognition cameras certainly got your smile, applause, disappointment and kisses in that great American sports night. If you missed your 15-second of fame, try it again at the Salt Lake City Winter Olympics. With the use of facial recognition technology at the 2001 Super Bowl and Salt Lake City Winter Olympics, the author seeks to explore the use of this facial recognition technology. He further discusses the constitutionality of it under the Fourth Amendment. In doing so, he analyzes how facial …


Big Media: Its Effect On The Marketplace Of Ideas And How To Slow The Urge To Merge, 20 J. Marshall J. Computer & Info. L. 247 (2002), Donald R. Simon Jan 2002

Big Media: Its Effect On The Marketplace Of Ideas And How To Slow The Urge To Merge, 20 J. Marshall J. Computer & Info. L. 247 (2002), Donald R. Simon

UIC John Marshall Journal of Information Technology & Privacy Law

"The free flow of information is the life-blood of democracy." Americans are experiencing many media corporate mergers in recent years, and one is likely to ponder whether the idea of "marketplace of ideas" still holds true. In this article, the author discusses how economically driven censorship of journalism is blinding the public by market concentration and cross-ownership of media corporations. The fears of the Founding Fathers still lurk in the background as James Madison wrote: "a popular government without popular information, or the means of acquiring it, is but a prologue to a farce or a tragedy, or perhaps both." …


An "Opposition" To The Recently-Proposed Legislation Related To Business Model Patents, 20 J. Marshall J. Computer & Info. L. 397 (2002), Gregory J. Maier, Thomas J. Fisher, Philippe J. C. Signore Jan 2002

An "Opposition" To The Recently-Proposed Legislation Related To Business Model Patents, 20 J. Marshall J. Computer & Info. L. 397 (2002), Gregory J. Maier, Thomas J. Fisher, Philippe J. C. Signore

UIC John Marshall Journal of Information Technology & Privacy Law

The authors in this article review the history of the business method exception before and after the State Street Bank case. In that case, the Court of Appeals for the Federal Circuit decided that there was no business method exception, and never had been. The court pointed out that previous decisions were decided on other grounds found in the statutes. The authors argue that, because of the timing and economic environment of the decision, the case gained much popularity and discussion. However, the patent law has not changed since then and the business method exception is still not a patentable …


Transnational Evidence Gathering And Local Prosecution Of International Cybercrime, 20 J. Marshall J. Computer & Info. L. 347 (2002), Susan W. Brenner, Joseph J. Schwerha Iv Jan 2002

Transnational Evidence Gathering And Local Prosecution Of International Cybercrime, 20 J. Marshall J. Computer & Info. L. 347 (2002), Susan W. Brenner, Joseph J. Schwerha Iv

UIC John Marshall Journal of Information Technology & Privacy Law

By analyzing two high-profile cybercrime cases, the authors discuss legal and procedural issues involved when gathering evidence across national borders. In US v. Gorshkov, the FBI was asked to investigate a series of intrusions into the computer systems of businesses in the US from Russia. The second incident is when system administrators at the Rom Air Development Center at Griffis Air Force Base in New York discovered hackers had installed password sniffer programs on all system networks. One of the hackers was identified to be a British citizen. The first thing to start a transnational evidence gathering is to determine …


E-Korean Dsl Policy: Implications For The United States, 20 J. Marshall J. Computer & Info. L. 417 (2002), Junseong An Jan 2002

E-Korean Dsl Policy: Implications For The United States, 20 J. Marshall J. Computer & Info. L. 417 (2002), Junseong An

UIC John Marshall Journal of Information Technology & Privacy Law

In a comparative study of the DSL service developments between the US and South Korea, the author discusses the strength of South Korea in this regard and how the US counterpart can learn from the examples. First, the author argues the laws and regulations in South Korea make the DSL deployment flourish. The urban development in Seoul, for example, gets people "wired" easier and cheaper as city dwellers live in multi-dwelling units. In addition, the forward thinking of the South Korean government in laying the Korean Information Infrastructure culminates this rapid development. With a comprehensive plan in place, the economics …


O' Big Brother Where Art Thou?: The Constitutional Use Of Facial-Recognition Technology, 20 J. Marshall J. Computer & Info. L. 471 (2002), Susan Mccoy Jan 2002

O' Big Brother Where Art Thou?: The Constitutional Use Of Facial-Recognition Technology, 20 J. Marshall J. Computer & Info. L. 471 (2002), Susan Mccoy

UIC John Marshall Journal of Information Technology & Privacy Law

How to balance the protection of personal privacy and security in light of the use of facial recognition technology? The author argues that the use of facial recognition technology does not violate individual's Fourth Amendment rights to privacy. First, there is no reasonable expectation of privacy in public places. Second, the database used only contains the identities of known criminal and terrorists. Third, facial recognition technology only facilitates existing methods of screening and comparing mug shots of known criminals on the street. With these arguments, the author proposes suggestions to legislations that cover facial recognition or other biometric technologies. In …


Does What Works For “.Com” Also Work For “.Cn”?: Comparative Study Of Anti-Cybersquatting Legal Systems In The United States And China, 20 J. Marshall J. Computer & Info. L. 541 (2002), Fang Fang, Jiarui Lui Jan 2002

Does What Works For “.Com” Also Work For “.Cn”?: Comparative Study Of Anti-Cybersquatting Legal Systems In The United States And China, 20 J. Marshall J. Computer & Info. L. 541 (2002), Fang Fang, Jiarui Lui

UIC John Marshall Journal of Information Technology & Privacy Law

On July 24, 2001, the Supreme People's Court issued a judicial interpretation as a guideline for all Chinese courts in deciding cybersquatting cases. However, the interpretation followed closely to the U.S. Anti-Cybersquatting Consumer Protection Act. With inherent legal and judicial differences between the two countries, the authors analyze whether and to what extent China can transplant the American experience to construct Chinese effective legal mechanisms against cybersquatters. In so doing, authors first discuss the Lanham Act and using trademark infringement as a cause of action. Authors are quick to point out that cybersquatters do not use registered trademarks to conduct …


Cybersurgery: Innovation Or A Means To Close Community Hospitals And Displace Physicians?, 20 J. Marshall J. Computer & Info. L. 495 (2002), Thomas R. Mclean Jan 2002

Cybersurgery: Innovation Or A Means To Close Community Hospitals And Displace Physicians?, 20 J. Marshall J. Computer & Info. L. 495 (2002), Thomas R. Mclean

UIC John Marshall Journal of Information Technology & Privacy Law

Cybersurgery is a surgical technique that allows a surgeon, using a telecommunication conduit connected to a robotic instrument, to operate on a remote patient. As a medical doctor, the author discusses the place of cybersurgery in the U.S. health care system of the new millennium. The author first reviews the field of cybersurgery and how the automatic surgeon will make off-line remote surgery possible. Then, he examines the global economy in health care systems and the impact of cybersurgery on closure of community hospitals and displacing physicians. Consequently, he discusses the ability of these entities to protect themselves with trade …


In Re Mastercard International, Inc.: The Inapplicability Of The Wire Act To Tradistional Casino-Style Games, 20 J. Marshall J. Computer & Info. L. 445 (2002), Elizabeth A. Walsh Jan 2002

In Re Mastercard International, Inc.: The Inapplicability Of The Wire Act To Tradistional Casino-Style Games, 20 J. Marshall J. Computer & Info. L. 445 (2002), Elizabeth A. Walsh

UIC John Marshall Journal of Information Technology & Privacy Law

Using the online gambling and gaming as the background, the author discusses the impact of the Wire Communications Act of 1961 and the Racketeer Influenced and Corrupt Organizations Act (RICO) on the gaming industry. The story goes like this: Bob stumbled upon an online gambling Web site. While excited, he charges his credit card to open a gambling account with the site. He did not need to leave home to enjoy this great adventure. However, when the luck runs out, Bob realizes he has $3,000 in debt. Unwilling to pay, Bob decides to sue someone. In the end, Bob decides …


Vietnam’S Antitrust Legislation And Subscription To E-Asean: An End To The Bamboo Firewall Over Internet Regulation, 20 J. Marshall J. Computer & Info. L. 631 (2002), Robert Neil Wilkey Jan 2002

Vietnam’S Antitrust Legislation And Subscription To E-Asean: An End To The Bamboo Firewall Over Internet Regulation, 20 J. Marshall J. Computer & Info. L. 631 (2002), Robert Neil Wilkey

UIC John Marshall Journal of Information Technology & Privacy Law

As a result of an unprecedented congestion of its Internet and mobile phone communications, many technocrats in Vietnam trace such problems to government policy driven by security concerns. Therefore, the author in this article analyzes Vietnam's regulatory response to Internet technology. The author first discusses the historical background of Vietnam's management and regulatory policy over the Internet. He argues that the policy is essentially the result of socialist assumptions of the state's dominant role in the country's economic growth. Under its 1997 decree regarding Internet usage, the General Director of the General Postal Bureau has the exclusive authority and primary …


A Digital Free Trade Zone And Necessarily-Regulated Self-Governance For Electronic Commerce: The World Trade Organization, International Law, And Classical Liberalism In Cyberspace, 20 J. Marshall J. Computer & Info. L. 595 (2002), Kristi L. Bergemann Jan 2002

A Digital Free Trade Zone And Necessarily-Regulated Self-Governance For Electronic Commerce: The World Trade Organization, International Law, And Classical Liberalism In Cyberspace, 20 J. Marshall J. Computer & Info. L. 595 (2002), Kristi L. Bergemann

UIC John Marshall Journal of Information Technology & Privacy Law

In the absence of a world government, cross border trade is always subject to rules that must be politically negotiated among nations that are sovereign in their own realm but not outside their borders. The author explores the development of an international trade and e-commerce paradigm in two main phases as the Internet superhighway bridges nations together. She argues that the construction of an international trading framework must strike the appropriate balance between institutional order and norms and the human and business realities of free trade and democracy. She further argues that the balance can be achieved by creating an …


The Legislative Response To The Evolution Of Computer Viruses, Mark R. Colombell Jan 2002

The Legislative Response To The Evolution Of Computer Viruses, Mark R. Colombell

Richmond Journal of Law & Technology

On July 19, 2001, and again on July 31, 2001, the United States Government was attacked by a worm. The Code Red worm, a malevolent computer program, spread across the Internet impacting thousands of computers globally. The initial target of the Code Red worm was the White House website. Just days after the terrorist attacks in New York, Washington D.C., and Pennsylvania on September 11, the Nimda virus was unleashed on the Internet. By consuming up to ten percent of the Internet's capacity, Nimda quickly received the distinction as the worst computer infestation to date.


Letter From The Editor, John Joseph Meadows Jan 2002

Letter From The Editor, John Joseph Meadows

Richmond Journal of Law & Technology

Welcome, readers, to the ninth year of publication at the Richmond Journal of Law and Technology. The entire Journal Editorial Board and Staff are pleased to report that our inundation with submissions since last Spring has permitted us to be quite choosy in selecting articles for this Issue and we hope you will enjoy them and find them to be insightful and current.


In Search Of A Balance Between Police Power And Privacy In The Cybercrime Treaty, D.C. Kennedy Jan 2002

In Search Of A Balance Between Police Power And Privacy In The Cybercrime Treaty, D.C. Kennedy

Richmond Journal of Law & Technology

Imagine that you wake up one morning, turn on your computer, and open an e-mail message with a catchy phrase in the subject line. Immediately after opening the e-mail’s attachment, your personal computer is severely damaged. Obviously having a bad day, you head to your job as an attorney for a multinational corporation. By the time you arrive at work, there has been damage to company computers across the globe. The monetary costs of the damage, coupled with the downtime, are astronomical. The CEO of your company is furious. You hope to diffuse the situation by informing your boss that …


Avoiding The Un-Real Estate Deal: Has The Uniform Electronic Transactions Act Gone Too Far?, 35 J. Marshall L. Rev. 311 (2002), Derek Witte Jan 2002

Avoiding The Un-Real Estate Deal: Has The Uniform Electronic Transactions Act Gone Too Far?, 35 J. Marshall L. Rev. 311 (2002), Derek Witte

UIC Law Review

No abstract provided.


The Draft Hague Convention On Jurisdiction And Enforcement Of Judgments And The Internet-A New Jurisdictional Framework, 36 J. Marshall L. Rev. 223 (2002), Kristen Hudson Clayton Jan 2002

The Draft Hague Convention On Jurisdiction And Enforcement Of Judgments And The Internet-A New Jurisdictional Framework, 36 J. Marshall L. Rev. 223 (2002), Kristen Hudson Clayton

UIC Law Review

No abstract provided.


Who Was That Masked Man? Online Defamation, Freedom Of Expression, And The Right To Speak Anonymously, Jonathon T. Feasby Jan 2002

Who Was That Masked Man? Online Defamation, Freedom Of Expression, And The Right To Speak Anonymously, Jonathon T. Feasby

Canadian Journal of Law and Technology

As the internet continues to reach into the lives of people around the world, it facilitates interaction and the exchange of ideas between far-flung individuals and groups to an extent unprecedented in communications history. However, with this positive effect, the potential of the internet as a forum for defamation and other malfeasance has increased as well. Words online can be heard or read in places conventional forms of speech might never reach. As the United States Supreme Court put it, with the aid of the internet ". . . any person with a phone line can become a town crier …


Is Internet Gaming Legal In Canada: A Look At Starnet, C. Ian Kyer, Danielle Hough Jan 2002

Is Internet Gaming Legal In Canada: A Look At Starnet, C. Ian Kyer, Danielle Hough

Canadian Journal of Law and Technology

The development of the Internet has kindled many new business opportunities in the online environment. Despite the recent slump in online business growth and popularity, one line of online business is generating profit and growing at a rapid rate: the business of online gaming.

The legality of such businesses is questionable in Canada and there are few gaming cases to assist Canadian lawyers. The following analysis must be considered in light of the dearth of jurisprudence in this area and should not be considered legal advice. This area of the law is in flux and developments may be unpredictable.

When …


Book Review: The Personal Information Protection And Electronic Documents Act: An Annotated Guide By Stephanie Perrin, Heather H. Black, David H. Flaherty And T. Murray Rankin, Q.C. (Concord, Ont.: Irwin Law, 2001), Teresa Scassa Jan 2002

Book Review: The Personal Information Protection And Electronic Documents Act: An Annotated Guide By Stephanie Perrin, Heather H. Black, David H. Flaherty And T. Murray Rankin, Q.C. (Concord, Ont.: Irwin Law, 2001), Teresa Scassa

Canadian Journal of Law and Technology

In April 2000, the Personal Information Protection and Electronic Documents Act was passed by the House of Commons. The legislation dealt with both personal information privacy and the use and validity of electronic documents in areas governed by federal law. On January 1, 2001, the portion of the Act dealing with electronic documents took effect, as did the privacy provisions, to the extent that they related to the collection use or disclosure of personal information inter-provincially, or in connection with a federal work, undertaking or business. The Act applied to personal health information as of January 1, 2002, and will …


Book Review: A Guide To Electronic Legal Research By A. Zivanovic (Markham Ont.: Butterworths Canada, 2001), David H. Michels Jan 2002

Book Review: A Guide To Electronic Legal Research By A. Zivanovic (Markham Ont.: Butterworths Canada, 2001), David H. Michels

Canadian Journal of Law and Technology

No abstract provided.


Prospecting Or Cybersquatting: Registering Your Name Before Someone Else Does, 35 J. Marshall L. Rev. 287 (2002), Benjamin B. Cotton Jan 2002

Prospecting Or Cybersquatting: Registering Your Name Before Someone Else Does, 35 J. Marshall L. Rev. 287 (2002), Benjamin B. Cotton

UIC Law Review

No abstract provided.


Reflecting On The Virtual Child Porn Decision, 36 J. Marshall L. Rev. 211 (2002), David L. Hudson Jan 2002

Reflecting On The Virtual Child Porn Decision, 36 J. Marshall L. Rev. 211 (2002), David L. Hudson

UIC Law Review

No abstract provided.


Free Speech In A Digital Economy: An Analysis Of How Intellectual Property Rights Have Been Elevated At The Expense Of Free Speech, 36 J. Marshall L. Rev. 109 (2002), Bernard E. Nodzon Jr. Jan 2002

Free Speech In A Digital Economy: An Analysis Of How Intellectual Property Rights Have Been Elevated At The Expense Of Free Speech, 36 J. Marshall L. Rev. 109 (2002), Bernard E. Nodzon Jr.

UIC Law Review

No abstract provided.


Form And Substance In Cyberspace, A. Michael Froomkin Jan 2002

Form And Substance In Cyberspace, A. Michael Froomkin

Articles

In this Response to the preceding article by Joe Sims and Cynthia Bauerly, A. Michael Froomkin defends his earlier critique of ICANN. This Response first summarizes the arguments in Wrong Turn In Cyberspace, which explained why ICANN lacks procedural and substantive legitimacy. This Response focuses on how the U.S. government continues to assert control over the domain name system, and how this control violates the APA, the nondelegation doctrine as articulated by the Supreme Court in Carter Coal, and public policy. Professor Froomkin then proposes that ICANN's role be more narrowly focused away from policy making towards true …


How Far Have We Come, And Where Do We Go From Here: The Status Of Global Computer Software Protection Under The Trips Agreement, Aaron D. Charfoos Jan 2002

How Far Have We Come, And Where Do We Go From Here: The Status Of Global Computer Software Protection Under The Trips Agreement, Aaron D. Charfoos

Northwestern Journal of International Law & Business

The TRIPS agreement made significant advances over the pre-TRIPS international regime with respect to the protection of computer software. There are at least two significant advances. First, computer software protections have been embedded into the new dispute resolution procedures. Second, both object and source code are protected under the copyright sections of the Agreement. The dispute resolution procedures provide back-end protection (protection after offenses have occurred), while new copyright provisions provide affirmative front-end protection (protection deterring such offenses). However, the Agreement could have, and should have, gone farther to protect the software industry. By not formally deciding on the ability …


International Commercial Arbitration In Cyberspace: Recent Developments, Ljiljana Biukovic Jan 2002

International Commercial Arbitration In Cyberspace: Recent Developments, Ljiljana Biukovic

Northwestern Journal of International Law & Business

This article examines some features of virtual arbitration and argues that the use of new technology and the development of e-commerce raise some interesting questions to international arbitration laws. Part It describes initiatives to develop online dispute resolution. Part III discusses virtual dispute resolution centers, including, how, why, and where they function. More importantly, however, Part III investigates the differences between online and off-line arbitration, where the focus remains on three questions. The first question is a crucial one. It has been debated by scholars and practitioners but still remains unresolved: will arbitration agreements concluded online and arbitration awards rendered …


Suing The Insecure?: A Duty Of Care In Cyberspace, Stephen E. Henderson, Matthew E. Yarbrough Dec 2001

Suing The Insecure?: A Duty Of Care In Cyberspace, Stephen E. Henderson, Matthew E. Yarbrough

Stephen E Henderson

The Internet, already of major significance throughout much of the globe, is expected to become increasingly pervasive in diverse arenas, from health care, to commerce, to entertainment, and is expected to become increasingly critical to essential infrastructures, including banking, power, and telecommunications. Yet the medium is both inherently and unnecessarily insecure. In particular, today’s Internet can be crippled by distributed denial-of-service attacks launched by relatively unsophisticated and judgment-proof parties. Not every computing system involved in such attacks, however, is necessarily without resources. Application of traditional negligence liability, coupled with other government incentives and support institutions, will encourage better security and …