Open Access. Powered by Scholars. Published by Universities.®

Criminal Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Consumer Protection Law

Criminal Law and Procedure

Articles 1 - 8 of 8

Full-Text Articles in Criminal Law

The High Price Of Poverty: A Study Of How The Majority Of Current Court System Procedures For Collecting Court Costs And Fees, As Well As Fines, Have Failed To Adhere To Established Precedent And The Constitutional Guarantees They Advocate., Trevor J. Calligan Jul 2015

The High Price Of Poverty: A Study Of How The Majority Of Current Court System Procedures For Collecting Court Costs And Fees, As Well As Fines, Have Failed To Adhere To Established Precedent And The Constitutional Guarantees They Advocate., Trevor J. Calligan

Trevor J Calligan

No abstract provided.


The Evolution Of The Digital Millennium Copyright Act; Changing Interpretations Of The Dmca And Future Implications For Copyright Holders, Hillary A. Henderson Jan 2014

The Evolution Of The Digital Millennium Copyright Act; Changing Interpretations Of The Dmca And Future Implications For Copyright Holders, Hillary A. Henderson

Hillary A Henderson

Copyright law rewards an artificial monopoly to individual authors for their creations. This reward is based on the belief that, by granting authors the exclusive right to reproduce their works, they receive an incentive and means to create, which in turn advances the welfare of the general public by “promoting the progress of science and useful arts.” Copyright protection subsists . . . in original works of authorship fixed in any tangible medium of expression, now known or later developed, from which they can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or …


Cyber-Extortion: Duties And Liabilities Related To The Elephant In The Server Room, Adam J. Sulkowski Jan 2007

Cyber-Extortion: Duties And Liabilities Related To The Elephant In The Server Room, Adam J. Sulkowski

ExpressO

This is a comprehensive analysis of the legal frameworks related to cyber-extortion – the practice of demanding money in exchange for not carrying out threats to commit harm that would involve a victim's information systems. The author hopes it will catalyze an urgently needed discussion of relevant public policy concerns.

Cyber-extortion has, by all accounts, become a common, professionalized and profit-driven criminal pursuit targeting businesses. 17% of businesses in a recent survey indicated having received a cyber-extortion demand. An additional 13% of respondents were not sure if their business had received such a demand.

Awareness of the risks of cybercrime …


A Complete Property Right Amendment, John H. Ryskamp Oct 2006

A Complete Property Right Amendment, John H. Ryskamp

ExpressO

The trend of the eminent domain reform and "Kelo plus" initiatives is toward a comprehensive Constitutional property right incorporating the elements of level of review, nature of government action, and extent of compensation. This article contains a draft amendment which reflects these concerns.


Technoconsen(T)Sus, Andrea M. Matwyshyn Aug 2006

Technoconsen(T)Sus, Andrea M. Matwyshyn

ExpressO

Law is contributing to an information security paradox. Consumers are regularly “consenting” to the installation of computer code that makes them more vulnerable to harms such as identity theft. In particular, digital rights management technology accompanying digital music has recently left a wake of compromised user machines. Using the case study of security-invasive digital rights management technology, this article argues that a fundamental tension exists among intellectual property law, computer intrusion law and contract law regarding meaningful consumer consent in digital contexts. This article proposes to ease the noise in consent doctrine through creating an objective “reasonable digital consumer” standard …


Bond Repudiation, Tax Codes, The Appropriations Process And Restitution Post-Eminent Domain Reform, John H. Ryskamp Jun 2006

Bond Repudiation, Tax Codes, The Appropriations Process And Restitution Post-Eminent Domain Reform, John H. Ryskamp

ExpressO

This brief comment suggests where the anti-eminent domain movement might be heading next.


Review Essay: Using All Available Information, Max Huffman May 2006

Review Essay: Using All Available Information, Max Huffman

ExpressO

This is a review essay entitled “Using All Available Information,” in which I review and comment on Justice Stephen Breyer’s new book, Active Liberty: Interpreting Our Democratic Constitution, published in September 2005. Justice Breyer’s book, adapted from the Tanner Lectures given in 2005 at Harvard Law School, serves partly as a response to Justice Scalia’s 1997 volume A Matter of Interpretation: Federal Courts and the Law. I review Justice Breyer’s book in part by comparison to and contrast with Justice Scalia’s. I propose that much about Justice Breyer’s interpretive philosophy, which centers on determining the “purposes” of texts and interpreting …


Breaking The Bank: Revisiting Central Bank Of Denver After Enron And Sarbanes-Oxley, Celia Taylor Sep 2005

Breaking The Bank: Revisiting Central Bank Of Denver After Enron And Sarbanes-Oxley, Celia Taylor

ExpressO

No abstract provided.