Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 42

Full-Text Articles in Computer Law

Foreword: Reflections On Cyberspace Governance, Standards And Control, 16 J. Marshall J. Computer & Info. L. 1 (1997), George B. Trubow Jan 1997

Foreword: Reflections On Cyberspace Governance, Standards And Control, 16 J. Marshall J. Computer & Info. L. 1 (1997), George B. Trubow

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Internet Red Light Districts: A Domain Name Proposal For Regulatory Zoning Of Obscene Content, 16 J. Marshall J. Computer & Info. L. 21 (1997), April Mara Major Jan 1997

Internet Red Light Districts: A Domain Name Proposal For Regulatory Zoning Of Obscene Content, 16 J. Marshall J. Computer & Info. L. 21 (1997), April Mara Major

UIC John Marshall Journal of Information Technology & Privacy Law

The author argues that the Internet must be regulated in order to ensure stability to the Internet community and viability as a communications medium. She offers two proposals: (1) the "secondary effect" of the Internet destroying its own legitimacy satisfies a substantial governmental need for zoning regulation as set forth in several cases; and (2) the most effective way to implement such zoning regulation is to reinforce accepted Internet standards, specifically the domain naming system. The author explains the difficulty in comparing the Internet to other media. Then the she explains the domain name system, e.g., the domain hierarchies, and …


Time To Pay Up: Internet Service Providers' Universal Service Obligations Under The Telecommunications Act Of 1996, 16 J. Marshall J. Computer & Info. L. 37 (1997), Jamie N. Nafziger Jan 1997

Time To Pay Up: Internet Service Providers' Universal Service Obligations Under The Telecommunications Act Of 1996, 16 J. Marshall J. Computer & Info. L. 37 (1997), Jamie N. Nafziger

UIC John Marshall Journal of Information Technology & Privacy Law

Universal Service was originally set-up to provide everyone with telephone service -- regardless of their ability to pay. Telephone service is considered vital to health, public safety, governmental involvement, ability to obtain jobs, and to the building of community. Universal Service was paid for through cross-subsidies: businesses were charged more; all customers, regardless of locale were charged the same rate; long distance rates were artificially high and local calls were priced artificially low; phone costs were kept to a nationwide average. In 1982, the divestment of what had been a monopoly, Bell Telephone, was final. In order to continue support …


Trademark Law On The Internet - Will It Scale? The Challenge To Develop International Trademark Law, 16 J. Marshall J. Computer & Info. L. 3 (1997), David W. Maher Jan 1997

Trademark Law On The Internet - Will It Scale? The Challenge To Develop International Trademark Law, 16 J. Marshall J. Computer & Info. L. 3 (1997), David W. Maher

UIC John Marshall Journal of Information Technology & Privacy Law

The author states that the rapid growth of the Internet has caused a serious collision between the efficient functioning of Domain Name Systems and the claims of trademark owners. U.S. Courts have recognized that domain names can have trademark implications. Trademarks are important because organizations responsible for allocation and registration of domain names must take trademarks and trademark law into account. The International Trademark Association (INTA) sets forth principles that should apply to the use of trademarks in the Domain Name System. The author's comment focuses on how to accommodate the interests and rights of trademark owners in the DNS …


The Doors Are Locked But The Thieves And Vandals Are Still Getting In: A Proposal In Tort To Alleviate Corporate America's Cyber-Crime Problem, 16 J. Marshall J. Computer & Info. L. 167 (1997), David L. Gripman Jan 1997

The Doors Are Locked But The Thieves And Vandals Are Still Getting In: A Proposal In Tort To Alleviate Corporate America's Cyber-Crime Problem, 16 J. Marshall J. Computer & Info. L. 167 (1997), David L. Gripman

UIC John Marshall Journal of Information Technology & Privacy Law

This article addresses the problem of computer hackers, breaking into the computer systems of businesses, and the third party injuries that are ultimately caused by such acts. This is a multimillion dollar problem for the business community. The article discusses the current methods companies use to protect against hackers, and then the author makes some suggestions for protection that include the latest technology available. However, the paper's main focus is on ways to put pressure on businesses to ensure that its computers are protected against hackers to avoid third party injuries. The author looks to tort law to do just …


Commercialism And The Downfall Of Internet Self Governance: An Application Of Antitrust Law, 16 J. Marshall J. Computer & Info. L. 125 (1997), David A. Gottardo Jan 1997

Commercialism And The Downfall Of Internet Self Governance: An Application Of Antitrust Law, 16 J. Marshall J. Computer & Info. L. 125 (1997), David A. Gottardo

UIC John Marshall Journal of Information Technology & Privacy Law

This article discusses the proliferation of on-line commercialism on the Internet and the various problems related to the increase of commercialism. Spamming, which is defined as the distribution of large amounts of unsolicited information, has been the major form of commercialism and arguably the most problematic. The article emphasizes the attempts to reduce the problem of on-line commercialism through preventative measures, such as self-governance on the Internet. While the author states that self-governance may be a solution to the problem of excessive commercialism, he also states that self-governance may give rise to problems, such as intervention by the federal government …


Nba V. Motorola And Stats, Inc.: The Second Circuit Properly Limits The "Hot News Doctrine", 16 J. Marshall J. Computer & Info. L. 197 (1997), Alan D. Lieb Jan 1997

Nba V. Motorola And Stats, Inc.: The Second Circuit Properly Limits The "Hot News Doctrine", 16 J. Marshall J. Computer & Info. L. 197 (1997), Alan D. Lieb

UIC John Marshall Journal of Information Technology & Privacy Law

The Second Circuit Court of Appeals recently handed down a decision which can be seen as a victory for supporters of free dissemination on the Internet. At issue was whether dissemination of real-time sports data infringed the NBA's copyright of broadcast material, and if not whether the use of NBA game statistics was a misappropriation of the NBA's property. In 1994, Motorola teamed up with STATS (Sports Team Analysis and Tracking Systems of Missouri, Inc.) to provide real-time updates of professional sports scores and information to subscribers of pagers as well as on-line services. STATS also provides sports information to …


Electronic Commerce On The Internet: Legal Developments In Taiwan, 16 J. Marshall J. Computer & Info. L. 77 (1997), George C. C. Chen Jan 1997

Electronic Commerce On The Internet: Legal Developments In Taiwan, 16 J. Marshall J. Computer & Info. L. 77 (1997), George C. C. Chen

UIC John Marshall Journal of Information Technology & Privacy Law

The purpose of this article is to share information about "outstanding legal issues" that Taiwan has experienced in its use of the Internet. It does through five topics. First, the issue of contracts is addressed using the present laws in Taiwan. Contracts are based on an "offer" by one party and "acceptance" of a second party. Digital products displayed on the Internet are said to constitute an offer when it bears a price, but a legal question arises out of how to constitute acceptance. Taiwan law looks to the law of the country where the offer was made to govern …


Mapping Legal Metaphors In Cyberspace: Evolving The Underlying Paradigm, 16 J. Marshall J. Computer & Info. L. 579 (1998), Robert Reilly Jan 1997

Mapping Legal Metaphors In Cyberspace: Evolving The Underlying Paradigm, 16 J. Marshall J. Computer & Info. L. 579 (1998), Robert Reilly

UIC John Marshall Journal of Information Technology & Privacy Law

Courts often succumb to the temptation to analogize new electronic media to present technologies since the courts can rely upon already existing models. However, the arrival of cyberspace and the World Wide Web has stretched the concept of linking legal precedents to actions to the breaking point. Any attempt to map existing legal metaphors, based on mechanical similarities, onto territory as unknown and changeable as cyberspace is difficult. Instead, it may be more productive to view the World Wide Web as an organic entity or model similar to that of a developing community. The shift from print to electronic information …


Cryptography And Liberty: An International Survey Of Encryption Policy, 16 J. Marshall J. Computer & Info. L. 475 (1998), Wayne Madsen, David L. Sobel, Marc Rotenberg, David Banisar Jan 1997

Cryptography And Liberty: An International Survey Of Encryption Policy, 16 J. Marshall J. Computer & Info. L. 475 (1998), Wayne Madsen, David L. Sobel, Marc Rotenberg, David Banisar

UIC John Marshall Journal of Information Technology & Privacy Law

The speedy progress of the "digital revolution" has significantly changed the manner in which individuals and other entities communicate and exchange information. Since traditional paper based media for communication is being replaced by high tech means, new security measures such as cryptographic security techniques are sought to ensure individual privacy. This is a drastic change because encryption technology was traditionally utilized by military and diplomatic communications. Human rights activists, political dissidents and journalists employ encryption technology to protect communication from government surveillance. The Global Internet Liberty Campaign ("GILC") was organized to protect civil liberties and human rights in the on-line …


The Best Of Both Worlds: Financing Software Filters For The Classroom And Avoiding First Amendment Liability, 16 J. Marshall J. Computer & Info. L. 659 (1998), Peter G. Drever Iii Jan 1997

The Best Of Both Worlds: Financing Software Filters For The Classroom And Avoiding First Amendment Liability, 16 J. Marshall J. Computer & Info. L. 659 (1998), Peter G. Drever Iii

UIC John Marshall Journal of Information Technology & Privacy Law

As the Internet expands, educational institutions have become interested in the medium for the purpose of expanding learning opportunities. Information that may be objectionable to some members of the community, however, would then be available to children in schools with Internet access. Attempts to regulate the content of the Internet have yet to pass a First Amendment challenge. Concern over what children will be exposed to when the Internet is introduced in the classroom is currently being addressed by educators and legislators alike. The Communications Decency Act was the first to attempt to address the issue of Internet access in …


On-Site Fingerprinting In The Banking Industry: Inconvenience Or Invasion Of Privacy, 16 J. Marshall J. Computer & Info. L. 597 (1998), Patrick J. Waltz Jan 1997

On-Site Fingerprinting In The Banking Industry: Inconvenience Or Invasion Of Privacy, 16 J. Marshall J. Computer & Info. L. 597 (1998), Patrick J. Waltz

UIC John Marshall Journal of Information Technology & Privacy Law

In order to prevent check fraud, many banking institutions are implementing programs of on-site fingerprinting. On-site fingerprinting is a process whereby individuals are subject to fingerprinting before being allowed to cash a check. Currently, two methods are used by the banking industry to obtain these fingerprints. The first method is the old fashioned way which the finger is inked and the ink mark is placed on the back of the check. Today, invisible ink is used. The second means by which these fingerprints are obtained is through biometrics or digital recording. The person attempting to cash a check places his …


We've Got Your Number: An Overview Of Legislation And Decisions To Control The Use Of Social Security Numbers As Personal Identifiers, 16 J. Marshall J. Computer & Info. L. 529 (1998), Flavio L. Komuves Jan 1997

We've Got Your Number: An Overview Of Legislation And Decisions To Control The Use Of Social Security Numbers As Personal Identifiers, 16 J. Marshall J. Computer & Info. L. 529 (1998), Flavio L. Komuves

UIC John Marshall Journal of Information Technology & Privacy Law

In the face of technology which allows for the storage and sharing of information on individuals in an unprecedented way, individuals still maintain the right to informational privacy. However, the extensive use of Social Security numbers as universal identifiers is one of the most serious manifestations of privacy concerns in the United States. Numerous private sources, such as financial institutions and blood banks, and governmental sources, such as the Internal Revenue Service and the courts, use these numbers as identifiers either by voluntary choice or as required by law. Inadequate restrictions on these uses have led to serious violations of …


Rating Internet Content And The Spectre Of Government Regulation, 16 J. Marshall J. Computer & Info. L. 625 (1998), James V. Dobeus Jan 1997

Rating Internet Content And The Spectre Of Government Regulation, 16 J. Marshall J. Computer & Info. L. 625 (1998), James V. Dobeus

UIC John Marshall Journal of Information Technology & Privacy Law

Parents and legislators have become increasingly concerned about access by children to Internet websites. The Communications Decency Act was the first to attempt to address the issue, but it failed to pass a constitutional challenge. Logically, the next step is to rate websites on the Internet. However, mandatory rating legislation will force providers to rate their sites using rating vocabularies such as RSACi, which they might not agree with. A voluntary rating system or old fashioned parental authority seems like a good solution, but both are based on a subjective determination that everyone may not agree with. Society has a …


1997 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 16 J. Marshall J. Computer & Info. L. 685 (1998), David E. Sorkin, Steven A. Mcauley, David B. Nash Iii Jan 1997

1997 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 16 J. Marshall J. Computer & Info. L. 685 (1998), David E. Sorkin, Steven A. Mcauley, David B. Nash Iii

UIC John Marshall Journal of Information Technology & Privacy Law

Many public libraries provide patrons with free public-access Internet terminals, largely for accessing information available on the World Wide Web. However, public concern exists over the ability of children who browse the Web without adult supervision to view sexually explicit materials and other inappropriate items. This concern has led to the development of various Internet filtering software programs. Some filtering programs operate by blocking access to documents containing certain words or phrases or combinations thereof. However, more common programs permit access only to documents or sites that appear in a pre-selected, "safe" database or that block access to documents that …


1997 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 16 J. Marshall J. Computer & Info. L. 709 (1998), John Cartaina, Robert Dixon, Eric Rogers Jan 1997

1997 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 16 J. Marshall J. Computer & Info. L. 709 (1998), John Cartaina, Robert Dixon, Eric Rogers

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


1997 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 16 J. Marshall J. Computer & Info. L. 743 (1998), Michelle Regal Herrmann, Jennifer L. Johnson, Candace A. Ourso Jan 1997

1997 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 16 J. Marshall J. Computer & Info. L. 743 (1998), Michelle Regal Herrmann, Jennifer L. Johnson, Candace A. Ourso

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Eggs In Baskets: Distributing The Risks Of Electronic Signatures, 15 J. Marshall J. Computer & Info. L. 189 (1997), Benjamin Wright Jan 1997

Eggs In Baskets: Distributing The Risks Of Electronic Signatures, 15 J. Marshall J. Computer & Info. L. 189 (1997), Benjamin Wright

UIC John Marshall Journal of Information Technology & Privacy Law

Many risks are prevalent with the traditional signing of a paper document. The most notable is forgery. Under current law, the burden of proving the authenticity of a signature is on the recipient, not the signer. This burden motivates the recipient to be responsible. For instance, when accepting a signature, the recipient may wish to elicit further evidence of genuineness and request the signer to acknowledge his or her signature before a notary public. Considering the many risks associated with the authentication of paper documents, the authentication of electronic documents and signatures will not be different. Strategies have been developed …


Right On The Mark: Defining The Nexus Between Trademarks And Internet Domain Names, 15 J. Marshall J. Computer & Info. L. 277 (1997), G. Peter Albert Jr. Jan 1997

Right On The Mark: Defining The Nexus Between Trademarks And Internet Domain Names, 15 J. Marshall J. Computer & Info. L. 277 (1997), G. Peter Albert Jr.

UIC John Marshall Journal of Information Technology & Privacy Law

The Internet is a rapidly expanding global network. The Internet provides a virtual marketplace in which many small companies are given the opportunity to have increased leverage to compete with their larger corporate counterparts. Businesses are establishing their presence on the Internet through the creation of a domain name. The domain name is an alphanumeric address that identifies a specific location on the Internet. Each domain name reflects a distinct address that distinguishes it from any other. Similarly, qualification of a word or symbol as a trademark must include the following three elements: (1) "function" to identify and distinguish the …


Use Tax Collection On Internet Purchases: Should The Mail Order Industry Serve As A Model, 15 J. Marshall J. Computer & Info. L. 203 (1997), Steven J. Forte Jan 1997

Use Tax Collection On Internet Purchases: Should The Mail Order Industry Serve As A Model, 15 J. Marshall J. Computer & Info. L. 203 (1997), Steven J. Forte

UIC John Marshall Journal of Information Technology & Privacy Law

Federal intervention is necessary to grant states the authority to collect state sales and use tax from Internet vendors who sell goods within their boundaries but reside elsewhere. With such federal intervention, local retailers, who must charge state use and sales tax to their customers, can compete more fairly with Internet vendors. In addition, state governments can access a large and growing revenue source. Under the Commerce Clause of the United States Constitution, a vendor must have a physical presence on a state before a state can require the vendor to collect and remit sales and use tax. In addition, …


Foreword: The Cyberspace Scramble: Domain Names, 15 J. Marshall J. Computer & Info. L. 411 (1997), Stephen E. Marshall Jan 1997

Foreword: The Cyberspace Scramble: Domain Names, 15 J. Marshall J. Computer & Info. L. 411 (1997), Stephen E. Marshall

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Scientological Defenestration Of Choice-Of-Law Doctrines For Publication Torts On The Internet, 15 J. Marshall J. Computer & Info. L. 361 (1997), Christopher P. Beall Jan 1997

The Scientological Defenestration Of Choice-Of-Law Doctrines For Publication Torts On The Internet, 15 J. Marshall J. Computer & Info. L. 361 (1997), Christopher P. Beall

UIC John Marshall Journal of Information Technology & Privacy Law

Two major doctrines exist for choosing which state's law applies to an interstate tort: the "lex loci deliciti" (the law of the place of the wrong) approach and the "most significant relationship" approach. In the context of the Internet, the "lex loci deliciti" approach has been criticized for its harshness. For example, it is possible for an e-mail posting to be non-actionable where written, but actionable where read. Likewise, the "most significant relationship" approach has been criticized for its indeterminacy and lack of predictability because the outcome as to the extent of liability for a publication tort on the Internet …


A Request To The High Court: Don't Let The Patent Laws Be Distracted By A Flashy Trade Dress, 15 J. Marshall J. Computer & Info. L. 323 (1997), Manotti L. Jenkins Jan 1997

A Request To The High Court: Don't Let The Patent Laws Be Distracted By A Flashy Trade Dress, 15 J. Marshall J. Computer & Info. L. 323 (1997), Manotti L. Jenkins

UIC John Marshall Journal of Information Technology & Privacy Law

The United States Court of Appeals for the Tenth Circuit, in Vornado Air Circulation Systems Inc. v. Duracraft Corp., held in the negative the issue of "whether a product configuration is entitled to trade dress protection when it is or has been a significant inventive component of an invention covered by a utility patent." The court viewed the case involved as an issue of the "intersection of the Patent Act and the Lanham Trade-Mark Act," and reasoned that "patent policy dictates" that the Patent Act should prevail in these situations. The United States Supreme Court denied certiorari upon appeal by …


Using The Dna Profile As The Unique Patient Identifier In The Community Health Information Network: Legal Implications, 15 J. Marshall J. Computer & Info. L. 227 (1997), Lisa L. Dahm Jan 1997

Using The Dna Profile As The Unique Patient Identifier In The Community Health Information Network: Legal Implications, 15 J. Marshall J. Computer & Info. L. 227 (1997), Lisa L. Dahm

UIC John Marshall Journal of Information Technology & Privacy Law

One of the greatest obstacles to electronic medical record keeping is the absence of a unique patient identifier. With the sharing of patient's information, an increased risk of error exists. Among these risks are the transmission of the wrong patient's records and security of confidential patient information. Implementation of a uniform patient identifier will eliminate the obstacle to cooperation and information-sharing of health data. This article proposes the application of a unique protocol, which utilizes DNA fingerprints as a patient's personal identifier. Since each individual's DNA profile is distinctly different, the fingerprint would act as the patient's personal bar code, …


Blackhole In Cyberspace: The Legal Void In The Internet, 15 J. Marshall J. Computer & Info. L. 413 (1997), Alexander Gigante Jan 1997

Blackhole In Cyberspace: The Legal Void In The Internet, 15 J. Marshall J. Computer & Info. L. 413 (1997), Alexander Gigante

UIC John Marshall Journal of Information Technology & Privacy Law

Most people surf the Internet with little concern for who makes decisions regarding Internet administrative matters and who has the authority to make those decisions. Initially, as the Internet evolved out of a project sponsored by the U.S. Department of Defense in 1969, many "founder groups," such as the Internet Assigned Numbers Authority, formed under the auspices of the federal government to administer the network's development. While these groups continue to function today as the main decision-making bodies over all aspects of the Internet's governance, several newer organizations, such as the Internet Society, have taken an important role in the …


Keeping Business Out Of The Bedroom: Protecting Personal Privacy Interests From The Retail World, 15 J. Marshall J. Computer & Info. L. 391 (1997), David J. Klein Jan 1997

Keeping Business Out Of The Bedroom: Protecting Personal Privacy Interests From The Retail World, 15 J. Marshall J. Computer & Info. L. 391 (1997), David J. Klein

UIC John Marshall Journal of Information Technology & Privacy Law

The federal government as well as private companies maintain personality profile lists containing records of personal information touching on many aspects of an individual's life. Some companies seek to acquire these lists from the federal government or from other businesses in order to increase their profits by targeting those individuals within the lists who appear most likely to buy their products or services. Therefore, personal information that consumers initially disclosed to a business in confidence becomes public knowledge shared among other businesses. As a result, consumers feel that the list creator invaded their privacy. Frustrated consumers attempt to keep such …


A Primer On Trademark Law And Internet Addresses, 15 J. Marshall J. Computer & Info. L. 465 (1997), David J. Loundy Jan 1997

A Primer On Trademark Law And Internet Addresses, 15 J. Marshall J. Computer & Info. L. 465 (1997), David J. Loundy

UIC John Marshall Journal of Information Technology & Privacy Law

The conflicts arising over Internet addresses generally fall within four categories: trademarks as second-level domains; second-level domains that are similar to trademarks; trademarks as third-level domain/machine names; and trademarks as userIDs. When confronted with the four categories, a court will generally analyze the problem by looking at the likelihood of confusion, applying the dilution statutes, and determining if the trademark has been blurred or tarnished. The likelihood of confusion analysis looks at: the degree of similarity between the marks in appearance and suggestion; the similarity of the product or services; the area and manner of concurrent use; the degree of …


Orderly Expansion Of The International Top-Level Domains: Concurrent Trademark Users Need A Way Out Of The Internet Trademark Quagmire, 15 J. Marshall J. Computer & Info. L. 521 (1997), David B. Nash Jan 1997

Orderly Expansion Of The International Top-Level Domains: Concurrent Trademark Users Need A Way Out Of The Internet Trademark Quagmire, 15 J. Marshall J. Computer & Info. L. 521 (1997), David B. Nash

UIC John Marshall Journal of Information Technology & Privacy Law

Organizations that want to conduct business on the Internet have to register with Network Solutions, Inc. (NSI). The Internet was created as a network designed by the Defense Department to test a fail safe network. The National Science Foundation connects to the Internet five supercomputing centers, which connects most public colleges to the Internet. The World Wide Web was the first service that was opened to individuals and for commercial use. Commercial success on the Internet depends on the ease with which consumers can find the organization on-line. If the company has established good will in the public, the company …


Remedies In Domain Name Lawsuits: How Is A Domain Name Like A Cow?, 15 J. Marshall J. Computer & Info. L. 437 (1997), Carl Oppedahl Jan 1997

Remedies In Domain Name Lawsuits: How Is A Domain Name Like A Cow?, 15 J. Marshall J. Computer & Info. L. 437 (1997), Carl Oppedahl

UIC John Marshall Journal of Information Technology & Privacy Law

A court sitting in equity should take five factors into consideration when determining whether a domain name address should be transferred. First, the court must ask whether the trademark is coined, not in the dictionary and unique. It is important to note that famous does not mean unique. Uniqueness helps a court to simplify the issue by focusing the issue to whether only one company is entitled to the address. This question requires a party seeking a remedy to conduct a search of the entire Internet using search engines, on-line trademark databases, and company name searches. The court should only …


The Federal Government Giveth And Taketh Away: How Nsi's Domain Name Dispute Policy (Revision 02) Usurps A Domain Name Owner's Fifth Amendment Procedural Due Process, 15 J. Marshall J. Computer & Info. L. 547 (1997), Steven A. Mcauley Jan 1997

The Federal Government Giveth And Taketh Away: How Nsi's Domain Name Dispute Policy (Revision 02) Usurps A Domain Name Owner's Fifth Amendment Procedural Due Process, 15 J. Marshall J. Computer & Info. L. 547 (1997), Steven A. Mcauley

UIC John Marshall Journal of Information Technology & Privacy Law

The Internet, which links millions of computer networks together worldwide for the purpose of automated communication, is the forefront of communications technology. An Internet domain name, which functions as a computer user's "address" on the Internet, not only identifies individuals and organizations, but is an important commercial source designator for businesses. The Internet Network Information Center ("InterNIC") is a central resource center for Internet users that operates the Internet Domain Name System ("DNS"). InterNIC, which comprises NSI and AT&T, performs various Internet services, including NSI's Internet domain name coordination and registration. Along with the positive effects that the Internet has …