Open Access. Powered by Scholars. Published by Universities.®

Internet Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Richmond Journal of Law & Technology

2009

Discipline
Keyword

Articles 1 - 11 of 11

Full-Text Articles in Internet Law

Corporate Privacy Trend: The “Value” Of Personally Identifiable Information (“Pii”) Equals The “Value” Of Financial Assets, John T. Soma, J. Zachary Courson, John Cadkin Jan 2009

Corporate Privacy Trend: The “Value” Of Personally Identifiable Information (“Pii”) Equals The “Value” Of Financial Assets, John T. Soma, J. Zachary Courson, John Cadkin

Richmond Journal of Law & Technology

Corporate America’s increasing dependence on the electronic use of personally identifiable information (“PII”) necessitates a reexamination and expansion of the traditional conception of corporate assets. PII is now a commodity that companies trade and sell. As technological development increases, aspects of day-to-day business involving PII are performed electronically in a more cost effective and efficient manner. PII, which companies obtain at little cost, has quantifiable value that is rapidly reaching a level comparable to the value of traditional financial assets.


The Ethics Of E-Mail, Thomas E. Spahn Jan 2009

The Ethics Of E-Mail, Thomas E. Spahn

Richmond Journal of Law & Technology

In many ways, communicating by e-mail and other forms of electronic transmission reflects a fundamentally different way of human interaction. Historians eventually will put this in perspective, but one could easily conclude that e-mails are essentially a “third way” for people to communicate.


Students’ Free Speech Rights Shed At The Cyber Gate, Vivian Lei Jan 2009

Students’ Free Speech Rights Shed At The Cyber Gate, Vivian Lei

Richmond Journal of Law & Technology

Education is one of the most important functions of the government. Because public schools are under the control of state and local authorities, the administrators and teachers of these schools are subject to requirements established in the United States Constitution. For example, for more than thirty years, the Supreme Court has supported the due process rights of students facing a deprivation of liberty and property interests in education.


“Medical” Monitoring For Non-Medical Harms: Evaluating The Reasonable Necessity Of Measures To Avoid Identity Fraud After A Data Breach, James Graves Jan 2009

“Medical” Monitoring For Non-Medical Harms: Evaluating The Reasonable Necessity Of Measures To Avoid Identity Fraud After A Data Breach, James Graves

Richmond Journal of Law & Technology

In July 2005, “reformed” hacker Albert Gonzalez noticed an insecure wireless network at a Marshalls department store in Miami. After exploiting the vulnerability, Gonzalez and his accomplices installed programs that captured credit card numbers. They stored the credit card numbers on servers in Latvia and Ukraine, created ATM cards using some of the numbers, and used those cards to withdraw hundreds of thousands of dollars in cash. Fifteen months later, Marshalls’ parent company, TJX, announced that forty-five million of its customers’ credit card numbers had been exposed to the thieves.


Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Robert Michaux Jan 2009

Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Robert Michaux

Richmond Journal of Law & Technology

The Richmond Journal of Law and Technology is proud to present the first issue of the 2009–2010 academic year.


Databases, E-Discovery And Criminal Law, Ken Strutin Jan 2009

Databases, E-Discovery And Criminal Law, Ken Strutin

Richmond Journal of Law & Technology

The enduring value of the Constitution is the fundamental approach to human rights transcending time and technology. The modern complexity and variety of electronically stored information was unknown in the eighteenth century, but the elemental due process concepts forged then can be applied now. At some point, the accumulation of information surpassed the boundaries of living witnesses and paper records. The advent of computers and databases ushered in an entirely new order, giving rise to massive libraries of factual details and powerful investigative tools. But electronically collected information sources are a double-edged sword. Their accuracy and reliability are critical issues …


Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Jessica M. Yoke Jan 2009

Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Jessica M. Yoke

Richmond Journal of Law & Technology

The Richmond Journal of Law and Technology is proud to present the third issue of the 2008–2009 academic school year, which also is our Annual Survey on E-Discovery.


Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Bridget Murray Jan 2009

Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Bridget Murray

Richmond Journal of Law & Technology

The Richmond Journal of Law and Technology is proud to present the fourth issue of the 2008–2009 academic school year. Our authors analyze a variety of controversial legal topics that are at the forefront of debates regarding the intersection of technology and law.


Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Robert Michaux Jan 2009

Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Robert Michaux

Richmond Journal of Law & Technology

The Richmond Journal of Law and Technology is proud to present the second issue of the 2009–2010 academic year.


Dissonant Paradigms And Unintended Consequences: Can (And Should) The Law Save Us From Technology?, Donald Labriola Jan 2009

Dissonant Paradigms And Unintended Consequences: Can (And Should) The Law Save Us From Technology?, Donald Labriola

Richmond Journal of Law & Technology

Technologies like digital audio, the Internet, and broadband communications spur economic growth and foster new patterns of commerce and social interaction. But they also spawn disruptive innovations that force established industries to forge novel responses or risk falling by the wayside. The horse-and-buggy industry, vaudeville, and video-rental stores are but a few examples of thriving markets that found themselves on the scrap heap of obsolescence because they failed to react quickly to the devastating effects of new technology.


Electronic Discovery In Large Organizations, Jason Fliegel, Robert Entwisle Jan 2009

Electronic Discovery In Large Organizations, Jason Fliegel, Robert Entwisle

Richmond Journal of Law & Technology

The continuing expansion and virtually limitless array of technology and media available to store electronic information has had an immeasurable impact on the amount of information large organizations create and maintain. In many instances, this information continues to be available long after it has served the originator’s purposes. Yet, such information is not exempt from discovery in litigation, and attempting to identify, preserve, collect, review, and produce that information results in a significant burden on litigants, while the failure to do so can result in draconian sanctions or adverse publicity.