Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 39

Full-Text Articles in Computer Law

The Clear And Present Internet: Terrorism, Cyberspace, And The First Amendment, Peter Margulies Oct 2008

The Clear And Present Internet: Terrorism, Cyberspace, And The First Amendment, Peter Margulies

Law Faculty Scholarship

No abstract provided.


Rethinking Broadband Internet Access, Daniel F. Spulber, Christopher S. Yoo Jun 2008

Rethinking Broadband Internet Access, Daniel F. Spulber, Christopher S. Yoo

All Faculty Scholarship

The emergence of broadband Internet technologies, such as cable modem and digital subscriber line (DSL) systems, has reopened debates over how the Internet should be regulated. Advocates of network neutrality and open access to cable modem systems have proposed extending the regulatory regime developed to govern conventional telephone and narrowband Internet service to broadband. A critical analysis of the rationales traditionally invoked to justify the regulation of telecommunications networks--such as natural monopoly, network economic effects, vertical exclusion, and the dangers of ruinous competition--reveals that those rationales depend on empirical and theoretical preconditions that do not apply to broadband. In addition, …


Tercer Congreso Nacional De Organismos Públicos Autónomos, Bruno L. Costantini García Jun 2008

Tercer Congreso Nacional De Organismos Públicos Autónomos, Bruno L. Costantini García

Bruno L. Costantini García

Tercer Congreso Nacional de Organismos Públicos Autónomos

"Autonomía, Reforma Legislativa y Gasto Público"


Zappers: Tax Fraud, Technology And Terrorist Funding, Richard Thompson Ainsworth Feb 2008

Zappers: Tax Fraud, Technology And Terrorist Funding, Richard Thompson Ainsworth

Faculty Scholarship

"Zappers," or automated sales suppression devices, have brought unheard of efficiencies and economies of scale to a very simple tax fraud - skimming cash sales at point of sale (POS) terminals (electronic cash registers). Until recently the largest tax fraud case in Connecticut, also the "largest computer driven tax-evasion case in the nation," was a zapper case. Stew Leonard's Dairy in Norwalk Connecticut skimmed $17 million in receipts and hid the cash in St. Martin (a Caribbean island). Talal Chahine and his wife, Elfat El Aouar, owners of the La Shish restaurant chain in Detroit Michigan have the dubious honor …


The General Public License Version 3.0: Making Or Breaking The Foss Movement, Clark D. Asay Jan 2008

The General Public License Version 3.0: Making Or Breaking The Foss Movement, Clark D. Asay

Michigan Telecommunications & Technology Law Review

Free and open source software (FOSS) is a big deal. FOSS has become an undeniably important element for businesses and the global economy in general, as companies increasingly use it internally and attempt to monetize it. Governments have even gotten into the act, as a recent study notes that FOSS plays a critical role in the US Department of Defense's systems. Others have pushed for the adoption of FOSS to help third-world countries develop. Given many of its technological and developmental advantages, FOSS's use, adoption, and development are only projected to grow.[...] The FSF created the most popular version of …


Turned On Its Head?: Norms, Freedom, And Acceptable Terms In Internet Contracting, Richard Warner Jan 2008

Turned On Its Head?: Norms, Freedom, And Acceptable Terms In Internet Contracting, Richard Warner

All Faculty Scholarship

Is the Internet turning contract law on its head? Many commentators contend it is. Precisely this issue arises in current controversies over end user license agreements (EULAs) and Terms of Use agreements (TOUs, the agreements governing our use of web sites). Commentators complain that, in both cases, the formation process unduly restricts buyers’ freedom; and, that sellers and web site owners exploit the process to impose terms that deprive consumers of important intellectual property and privacy rights. The courts ignore the criticisms and routinely enforce EULAs and TOUs. There is truth on both sides of this court/commentator divide. EULAs and …


What Is 'Private' Data?, Karen Mccullagh Jan 2008

What Is 'Private' Data?, Karen Mccullagh

Karen McCullagh

The development of a frontier-free Internal Market and of the so-called 'information society' have resulted in an increase in the flow of personal data between EU Member States. To remove potential obstacles to such transfers data protection legislation was introduced. One of the underpinning principles of Directive 95/46/EC is the protection of privacy. Yet, the legislation does not provide a conclusive understanding of the terms ‘privacy’ or ‘private’ data. Rather, privacy protection is to be achieved through the regulation of the conditions under which personal data may be processed. An assessment of whether, 10 years after the enactment of the …


The Future Of Privacy Policies: A Privacy Nutrition Label Filled With Fair Information Practices, 26 J. Marshall J. Computer & Info. L. 1 (2008), Corey A. Ciocchetti Jan 2008

The Future Of Privacy Policies: A Privacy Nutrition Label Filled With Fair Information Practices, 26 J. Marshall J. Computer & Info. L. 1 (2008), Corey A. Ciocchetti

UIC John Marshall Journal of Information Technology & Privacy Law

The article looks at the threats accompanying online shopping, such as identity theft and aggregated data files. Such issues arise when companies carelessly lose laptops filled with unencrypted data or callously sell data on the open market with collected personally identifying information (PII). The article explains that although privacy policies are supposed to force companies to strengthen their privacy practices they are not always effective because companies often post inconspicuous, vague and legalese-filled policies. These ambiguous postings cause online shoppers to blindly submit PII and ignore privacy practices completely. The article proposes a solution to this problem through the standardization …


United States V. Andrus: Password Protect Your Roommate, Not Your Computer, 26 J. Marshall J. Computer & Info. L. 183 (2008), Sarah M. Knight Jan 2008

United States V. Andrus: Password Protect Your Roommate, Not Your Computer, 26 J. Marshall J. Computer & Info. L. 183 (2008), Sarah M. Knight

UIC John Marshall Journal of Information Technology & Privacy Law

The article looks at the decision in United States v. Andrus, where it was determined that the police could obtain consent from a father to search an adult son’s computer without first checking if the father who gave consent know the password and therefore had apparent authority to search. The police used Encase, software designed to make a forensic copy of a hard drive, without even turning on the computer. The 10th Circuit majority opinion decided the police committed no error when they conducted the search. The article’s author argues that the dissenting opinion took the correct position in its …


Symbiotic Regulation, 26 J. Marshall J. Computer & Info. L. 207 (2008), Andrew Murray Jan 2008

Symbiotic Regulation, 26 J. Marshall J. Computer & Info. L. 207 (2008), Andrew Murray

UIC John Marshall Journal of Information Technology & Privacy Law

In this paper the author points out that complexity is at the heart of much of the work of today’s academia. The paper explains how the role of an academic researcher may be defined as studying and modelling complexity in an effort to make it accessible to a wider audience. This article models the complexity of regulatory relationships in communications networks and in particular the Internet. First, the article models the complexity of the regulatory environment. Next, it explains how regulators may harness the power of the network to achieve effective regulatory settlements by harnessing symbiotic regulation. Finally, it explains …


The Twenty-Seventh Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law:Summary Of Bench Memorandum, 26 J. Marshall J. Computer & Info. L. 259 (2008), Robin Ficke, James Lai, Steven Tseng, Panagiota Kelali Jan 2008

The Twenty-Seventh Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law:Summary Of Bench Memorandum, 26 J. Marshall J. Computer & Info. L. 259 (2008), Robin Ficke, James Lai, Steven Tseng, Panagiota Kelali

UIC John Marshall Journal of Information Technology & Privacy Law

Petitioner, Alex Romero (“Romero”), appeals to the Marshall Supreme Court from an order granting summary judgment in favor of Respondent, Windbucket Entertainment, LLC (“Windbucket”). Romero’s lawsuit alleged that Windbucket and a third party (not a party to the present appeal) were liable to him for invasion of privacy by intrusion upon seclusion. Romero then sought discovery sanctions against Windbucket for violations of Marshall Rule of Civil Procedure 37. The issues in the case concern whether a subscriber to an Internet-based, multiplayer computer game can state a valid invasion of privacy claim against the game’s publisher, when liability is based on …


Wikipedia Made Law? The Federal Judicial Citation Of Wikipedia, 26 J. Marshall J. Computer & Info. L. 229 (2008), Amber Lynn Wagner Jan 2008

Wikipedia Made Law? The Federal Judicial Citation Of Wikipedia, 26 J. Marshall J. Computer & Info. L. 229 (2008), Amber Lynn Wagner

UIC John Marshall Journal of Information Technology & Privacy Law

In this comment the author examines the new and growing body of federal opinions citing Wikipedia an authoritative source. The comment details how Wikipedia articles are generated, and the ease with which anyone can edit them, to illustrate their shortcomings as sources for making judicial determinations. The author provides examples of federal cases where judges rely on Wikipedia to define terms ranging from colloquial phrases to medical equipment. The author points out that in spite of several academic institutions and the U.S. Trade and Patent Office banning it as a source, federal judges continue to rely on Wikipedia in their …


Opening The Red Cross International Tracing Service Archive, 26 J. Marshall J. Computer & Info. L. 161 (2008), Kenneth Waltzer Jan 2008

Opening The Red Cross International Tracing Service Archive, 26 J. Marshall J. Computer & Info. L. 161 (2008), Kenneth Waltzer

UIC John Marshall Journal of Information Technology & Privacy Law

The Red Cross International Tracing Service Archive in Bad Arolsen contains nearly 17.5 million names and nearly 50 million World War II and post-war era documents. The Bonn Accords designated the International Tracing Service (“ITS”) as the sole caretaker of these documents. A recent revision to the Bonn Accords has resulted in a reopening of archives at Bad Arolsen. ITS has started to digitize materials, and the data has been distributed to designated research institutions. The revision also resulted in access to the archives for research purposes. This expanded availability of the information has raised a number of important questions …


The Twenty-Seventh Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 26 J. Marshall J. Computer & Info. L. 283 (2008), David Caras, Jennifer Robbins, Zach Rudisill Jan 2008

The Twenty-Seventh Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 26 J. Marshall J. Computer & Info. L. 283 (2008), David Caras, Jennifer Robbins, Zach Rudisill

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Beyond Whiffle-Ball Bats: Addressing Identity Crime In An Information Economy, 26 J. Marshall J. Computer & Info. L. 47 (2008), Erin Kenneally, Jon Stanley Jan 2008

Beyond Whiffle-Ball Bats: Addressing Identity Crime In An Information Economy, 26 J. Marshall J. Computer & Info. L. 47 (2008), Erin Kenneally, Jon Stanley

UIC John Marshall Journal of Information Technology & Privacy Law

The article discusses the challenges to the protection of private personal information in the age of rapid technological changes and advances with a particular focus on the explosion of Identity Theft Crime (IDC). The paper highlights the compartmentalized and imbalanced roles that the free market and law enforcement (LE) play in response to this emerging threat to privacy, the implications of this dynamic, and recommendations for improving the societal risk management of Identity Crime.


The Twenty-Seventh Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 26 J. Marshall J. Computer & Info. L. 321 (2008), Adam Powell, Erin Blake, Kris Kokotayo Jan 2008

The Twenty-Seventh Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 26 J. Marshall J. Computer & Info. L. 321 (2008), Adam Powell, Erin Blake, Kris Kokotayo

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Internet Infrastructure And Online Alternative Dispute Resolution, 25 J. Marshall J. Computer & Info. L. 217 (2008), Haitham A. Haloush Jan 2008

Internet Infrastructure And Online Alternative Dispute Resolution, 25 J. Marshall J. Computer & Info. L. 217 (2008), Haitham A. Haloush

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


All Or Nothing: This Is The Question? The Application Of Article 3(2) Data Protection Directive 95/46/Ec To The Internet, 25 J. Marshall J. Computer & Info. L. 241 (2008), Rebecca Wong, Joseph Savirimuthu Jan 2008

All Or Nothing: This Is The Question? The Application Of Article 3(2) Data Protection Directive 95/46/Ec To The Internet, 25 J. Marshall J. Computer & Info. L. 241 (2008), Rebecca Wong, Joseph Savirimuthu

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Safety Vs. Security: How Broad But Selective Public Access To Environmental Data Properly Balances Communities' Safety And Homeland Security, 25 J. Marshall J. Computer & Info. L. 273 (2008), Brad Schweiger Jan 2008

Safety Vs. Security: How Broad But Selective Public Access To Environmental Data Properly Balances Communities' Safety And Homeland Security, 25 J. Marshall J. Computer & Info. L. 273 (2008), Brad Schweiger

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Dancing In The Rain: Who Is Your Partner In The Corporate Boardroom?, 25 J. Marshall J. Computer & Info. L. 267 (2008), Maureen Duffy-Lewis, Daniel B. Garrie Jan 2008

Dancing In The Rain: Who Is Your Partner In The Corporate Boardroom?, 25 J. Marshall J. Computer & Info. L. 267 (2008), Maureen Duffy-Lewis, Daniel B. Garrie

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Twenty-Sixth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 25 J. Marshall J. Computer & Info. L. 305 (2008), Leslie Ann Reis, David E. Sorkin, Panagiota Kelali, Jessica Diehl, Carlos A. Encinas, Matthew Hector, Gina Spada, Steven Tseng, Priya Krishnamoorthy Venkat Jan 2008

The Twenty-Sixth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 25 J. Marshall J. Computer & Info. L. 305 (2008), Leslie Ann Reis, David E. Sorkin, Panagiota Kelali, Jessica Diehl, Carlos A. Encinas, Matthew Hector, Gina Spada, Steven Tseng, Priya Krishnamoorthy Venkat

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Twenty-Sixth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 25 J. Marshall J. Computer & Info. L. 337 (2008), Joshua Deitz, Kakuti Lin, Lindsey Shinn Jan 2008

The Twenty-Sixth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 25 J. Marshall J. Computer & Info. L. 337 (2008), Joshua Deitz, Kakuti Lin, Lindsey Shinn

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Deadly Combinations: A Framework For Analyzing The Gpl’S Viral Effect, 25 J. Marshall J. Computer & Info. L. 487 (2008), Ron Phillips Jan 2008

Deadly Combinations: A Framework For Analyzing The Gpl’S Viral Effect, 25 J. Marshall J. Computer & Info. L. 487 (2008), Ron Phillips

UIC John Marshall Journal of Information Technology & Privacy Law

Free and Open Source Software (FOSS) is free to use and can be downloaded from the Internet. This paper argues that adaptations that combine community source licensed software with an organization’s own intellectual property can trigger “viral” terms of the community source licenses in unexpected ways. The author proposes a model framework for analyzing software combinations to determine whether the viral terms are triggered, and illustrate that analysis against various technical combinations of community-sourced and proprietary software. Author Footnote: Vice President and General Counsel, Serlio Software Development Corporation; J.D. MarquetteUniversity Law School; B.S. University of Washington.


The Twenty-Sixth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 25 J. Marshall J. Computer & Info. L. 371 (2008), Stacy Appleton, Adam Butkus, Nick Mutton Jan 2008

The Twenty-Sixth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 25 J. Marshall J. Computer & Info. L. 371 (2008), Stacy Appleton, Adam Butkus, Nick Mutton

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Litigating At The Boundaries, 25 J. Marshall J. Computer & Info. L. 609 (2008), Keith G. Chval Jan 2008

Litigating At The Boundaries, 25 J. Marshall J. Computer & Info. L. 609 (2008), Keith G. Chval

UIC John Marshall Journal of Information Technology & Privacy Law

This article details some of the real world challenges facing the legal processes in the United States as information storage and retrieval technology outstrips legal procedures for dealing with these processes. Describing a “perfect storm” of litigation needs, technology and information concerns, he describes the continuing stumbling blocks in dealing effectively with an information world which is becoming increasingly digital, on more consumer devices that may make the protection and discovery of such information increasingly problematic.


Information Convergence: At The Boundaries Of Access: Introduction, 25 J. Marshall J. Computer & Info. L. 585 (2008), Doris E. Long, Leslie Ann Reis Jan 2008

Information Convergence: At The Boundaries Of Access: Introduction, 25 J. Marshall J. Computer & Info. L. 585 (2008), Doris E. Long, Leslie Ann Reis

UIC John Marshall Journal of Information Technology & Privacy Law

This introduction describes "information convergence," the subject of the Symposium presented at The John Marshall Law School by The Center for Information Technology and Privacy Law and The Center for Intellectual Property Law. The introduction previews the speeches and presentations given at the Symposium and featured in this issue of the Journal.


Potential Pitfalls In High-Tech Copyright Litigation, 25 J. Marshall J. Computer & Info. L. 513 (2008), Peter J. Shurn Iii Jan 2008

Potential Pitfalls In High-Tech Copyright Litigation, 25 J. Marshall J. Computer & Info. L. 513 (2008), Peter J. Shurn Iii

UIC John Marshall Journal of Information Technology & Privacy Law

Alleging software and data-base infringement is probably the most common offensive strategy currently seen in high-tech copyright litigation. In the context of a hypothetical factual setting, this article explores three potential pitfalls attendant to such a strategy, and suggests ways to minimize those risks.


The Future Of Licensing Music Online: The Role Of Collective Rights Organizations And The Effect Of Territoriality, 25 J. Marshall J. Computer & Info. L. 409 (2008), Neil Conley Jan 2008

The Future Of Licensing Music Online: The Role Of Collective Rights Organizations And The Effect Of Territoriality, 25 J. Marshall J. Computer & Info. L. 409 (2008), Neil Conley

UIC John Marshall Journal of Information Technology & Privacy Law

The current licensing regime practiced by collective rights organizations (“CROs”) is preventing rights holders from being able to reap the financial benefits that the Internet and digital transmissions of music can provide. The problem is that CROs license online music on a restrictive, national basis where the online transmission of music is worldwide, unrestricted by national boundaries. This territorially restrictive licensing system began in the nineteenth century and was practical for geographically limited methods by which music was played and transmitted. However, licenses to transmit music online or in the digital environment in general are restricted on a national basis …


Convergence At The Boundaries Of Information Analysis And Security Technology, 25 J. Marshall J. Computer & Info. L. 599 (2008), Charisse Castagnoli Jan 2008

Convergence At The Boundaries Of Information Analysis And Security Technology, 25 J. Marshall J. Computer & Info. L. 599 (2008), Charisse Castagnoli

UIC John Marshall Journal of Information Technology & Privacy Law

This article examines the problems posed to information security as a result of the unintended changes in either technology or the ways in which we interact with new access platforms. From data security to cyberbullying, to the threats posed by the increasing number of medical devices controlled by remote access, she outlines a rapidly changing world where the convergences between information and technology pose serious threats to information security and access.


The Americans With Disabilities Act And Internet Accessibility For The Blind, 25 J. Marshall J. Computer & Info. L. 543 (2008), Katherine Rengel Jan 2008

The Americans With Disabilities Act And Internet Accessibility For The Blind, 25 J. Marshall J. Computer & Info. L. 543 (2008), Katherine Rengel

UIC John Marshall Journal of Information Technology & Privacy Law

This comment analyzes the current debate over Internet accessibility for the blind. The author proposes an amendment to the ADA which would require that all Web sites make reasonable accommodations so they are accessible to the visually impaired. The amendment would comply with the purpose of the ADA, and promote the public policy of equal access to all. Finally, the author concludes that, given the Internet’s prevalence in today’s society, an amendment to the ADA is essential to promote equality and bring the ADA into the Internet age.