Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Computer Law

Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Jessica M. Yoke Jan 2009

Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Jessica M. Yoke

Richmond Journal of Law & Technology

The Richmond Journal of Law and Technology is proud to present the third issue of the 2008–2009 academic school year, which also is our Annual Survey on E-Discovery.


Virtually Free From Punishment Until Proven Guilty: The Internet, Web-Cameras And The Compelling Necessity Standard, Michael Clements Jan 2005

Virtually Free From Punishment Until Proven Guilty: The Internet, Web-Cameras And The Compelling Necessity Standard, Michael Clements

Richmond Journal of Law & Technology

Few legal maxims have had greater resonance than the tenet that one is innocent until proven guilty. It is a principle that has been traced back to Roman times, and it entered the American legal lexicon through the United States Supreme Court decision Coffin v. United States. It has even been incorporated in the United Nations’1948 Declaration of Human Rights under article eleven, section one.4


New Technology, Old Defenses: Internet Sting Operations And Attempt Liability, Audrey Rogers Jan 2004

New Technology, Old Defenses: Internet Sting Operations And Attempt Liability, Audrey Rogers

University of Richmond Law Review

No abstract provided.


State Cybercrime Legislation In The United States Of America: A Survey, Susan W. Brenner Jan 2001

State Cybercrime Legislation In The United States Of America: A Survey, Susan W. Brenner

Richmond Journal of Law & Technology

In the United States, cybercrimes are the focus of legislation adopted at both the state and federal levels. The U.S. Constitution allocates lawmaking authority between the two levels according to certain principles, one of which is that even when federal jurisdiction to legislate exists, federal legislation is appropriate only when federal intervention is required. And while federal legislative authority can pre-empt the states' ability to legislate in a given area, it rarely does, so it is not unusual for federal criminal laws to overlap with state prohibitions that address essentially the same issues.


Virginia's Response To Computer Abuses: An Act In Five Crimes, Daniel R. Burk Jan 1984

Virginia's Response To Computer Abuses: An Act In Five Crimes, Daniel R. Burk

University of Richmond Law Review

The threat depicted in War Games has been both rebuked as impossible and highlighted as much closer to the realm of possibility than even the creators of the movie may have surmised. Regardless of the actual possibility of a creative mind breaking through the security of the North America Air Defense Command computer with an auto-dialing modem and the simple password "JOSHUA" the adventures of the curious "hackers" and the singularly-directed criminal have been widely publicized and have captured both the fear and respect of computer owners throughout the country.