Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Science and Technology Law (32)
- Privacy Law (31)
- Comparative and Foreign Law (7)
- Marketing Law (7)
- Consumer Protection Law (5)
-
- Intellectual Property Law (5)
- Labor and Employment Law (4)
- Family Law (3)
- Legal Writing and Research (3)
- Communications Law (2)
- Litigation (2)
- Transnational Law (2)
- Communication (1)
- Communication Technology and New Media (1)
- Dispute Resolution and Arbitration (1)
- Education Law (1)
- Entertainment, Arts, and Sports Law (1)
- European Law (1)
- First Amendment (1)
- Fourth Amendment (1)
- Health Law and Policy (1)
- Information Literacy (1)
- Insurance Law (1)
- International Law (1)
- Interpersonal and Small Group Communication (1)
- Juvenile Law (1)
- Law and Gender (1)
- Publication
- Publication Type
Articles 31 - 33 of 33
Full-Text Articles in Internet Law
Breach Notification Requirements Under The European Union Legal Framework: Convergence, Conflicts, And Complexity In Compliance, 31 J. Marshall J. Info. Tech. & Privacy L. 317 (2014), Samson Esayas
UIC John Marshall Journal of Information Technology & Privacy Law
The European Union (EU) legal landscape on data privacy and information security is undergoing significant changes. A prominent legislative development in recent years is the introduction of breach notification requirements within a number of regulatory instruments. In only the past two years, the Community legislator has adopted, and proposed, four different regulatory instruments containing breach notification requirements. There are also existing requirements for the telecom sector. This creates a complex mesh of regulatory frameworks for breach notification where different aspects of the same breach within the same company might have to be dealt with under different regulatory instruments, making compliance …
It Is Time For Investment Advisers To Join The Conversation About Social Media, 31 J. Marshall J. Info. Tech. & Privacy L. 423 (2014), Sarah Tanaka
UIC John Marshall Journal of Information Technology & Privacy Law
Section II will detail the creation of the SEC, including key that shaped the establishment, goals, and mission of the SEC. Furthermore, it will focus on who is an investment adviser under the Investment Advisers Act of 1940, the controlling legislation on the matter. Section II will also examine the SEC‟s current guidance on investment advisers‟ use of social media and the public policy behind the new provisions. With social media revolutionizing the way individuals communicate and share information, Section III will discuss the advantages and disadvantages of the current guidance regarding investment advisers‟ use of social media. It will …
Navigating Cybersquatting Enforcement In The Expanding Internet, 13 J. Marshall Rev. Intell. Prop. L. 321 (2014), Jordan A. Arnot
Navigating Cybersquatting Enforcement In The Expanding Internet, 13 J. Marshall Rev. Intell. Prop. L. 321 (2014), Jordan A. Arnot
UIC Review of Intellectual Property Law
It has always been a considerable task to police something as vast at the Internet for trademark violations and abuse. As the Internet develops with the ongoing launch of hundreds of new generic Top-Level Domains, so does the host of enforcement options available to those seeking to protect the value of trademarks and other intellectual property. This article outlines seven criteria to consider when selecting a remedy, or combination of remedies. The traditional cease and desist letter is still a viable and effective option, and so, of course, is litigation. These tools were greatly enhanced in 1999 when the Internet …