Open Access. Powered by Scholars. Published by Universities.®

Internet Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 34

Full-Text Articles in Internet Law

Due Process Versus Data Processing: An Analysis Of Computerized Criminal History Information Systems, Donald Doernberg, Donald H. Zeigler Jan 1980

Due Process Versus Data Processing: An Analysis Of Computerized Criminal History Information Systems, Donald Doernberg, Donald H. Zeigler

Articles & Chapters

This article, based on a comprehensive empirical study of New York's computerized criminal history information system and on national surveys of similar systems, concludes that current regulations governing the dispersion of criminal history information are grossly inadequate. Although information drawn from computerized criminal history files is often inaccurate, incomplete, ambiguous or inappropriate, criminal justice officials and judges routinely use such information in making decisions affecting defendants' liberty. This practice is unconstitutional, and the article suggests ways to regulate criminal history information systems that would protect a defendant's right not to be deprived of liberty without due process of law.


Introduction: Electronic Funds Transfer Systems, 2 Computer L.J. 1 (1980), George W. Mitchell Jan 1980

Introduction: Electronic Funds Transfer Systems, 2 Computer L.J. 1 (1980), George W. Mitchell

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The 348 Committee - An Interim Report, 2 Computer L.J. 27 (1980), Robert Haydock Jr. Jan 1980

The 348 Committee - An Interim Report, 2 Computer L.J. 27 (1980), Robert Haydock Jr.

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


An Overview Of The Legal Issues Confronting The Establishment Of Electronic Fund Transfer Services, 2 Computer L.J. 7 (1980), Melvin R. Katskee, Ann L. Wright Jan 1980

An Overview Of The Legal Issues Confronting The Establishment Of Electronic Fund Transfer Services, 2 Computer L.J. 7 (1980), Melvin R. Katskee, Ann L. Wright

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Terminal-Based Eft Services: The Need For Uniform Federal Legislation, 2 Computer L.J. 31 (1980), Theresa A. Einhorn Jan 1980

Terminal-Based Eft Services: The Need For Uniform Federal Legislation, 2 Computer L.J. 31 (1980), Theresa A. Einhorn

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Authentication In Eft: The Legal Standard And The Operational Reality, 2 Computer L.J. 67 (1980), Fred M. Greguras, David J. Sykes Jan 1980

Authentication In Eft: The Legal Standard And The Operational Reality, 2 Computer L.J. 67 (1980), Fred M. Greguras, David J. Sykes

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Book Review: The Law Of Electronic Funds Transfer, 2 Computer L.J. 167 (1980), Howard D. Neal Jan 1980

Book Review: The Law Of Electronic Funds Transfer, 2 Computer L.J. 167 (1980), Howard D. Neal

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Case Digest, 2 Computer L.J. 171 (1980), Michael D. Scott Jan 1980

Case Digest, 2 Computer L.J. 171 (1980), Michael D. Scott

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Problems Of Proof When There's A Computer Goof: Consumers Versus Atms, 2 Computer L.J. 49 (1980), Mark Budnitz Jan 1980

Problems Of Proof When There's A Computer Goof: Consumers Versus Atms, 2 Computer L.J. 49 (1980), Mark Budnitz

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Legal Guidelines For Check Truncation, 2 Computer L.J. 115 (1980), George C. White Jr. Jan 1980

Legal Guidelines For Check Truncation, 2 Computer L.J. 115 (1980), George C. White Jr.

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Competitive Implications Of Eft, 2 Computer L.J. 133 (1980), James L. Pierce Jan 1980

The Competitive Implications Of Eft, 2 Computer L.J. 133 (1980), James L. Pierce

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Is Corporate Eft Coming Of Age?, 2 Computer L.J. 87 (1980), James W. Trotter Jan 1980

Is Corporate Eft Coming Of Age?, 2 Computer L.J. 87 (1980), James W. Trotter

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Electronic Giro For The United States, 2 Computer L.J. 101 (1980), James V. Vergari Jan 1980

Electronic Giro For The United States, 2 Computer L.J. 101 (1980), James V. Vergari

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Implications Of The Informational Nature Of Payments, 2 Computer L.J. 153 (1980), James L. Brown Jan 1980

Implications Of The Informational Nature Of Payments, 2 Computer L.J. 153 (1980), James L. Brown

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Electronic Funds Transfer Systems Bibliography, 2 Computer L.J. 183 (1980), Michael D. Scott Jan 1980

Electronic Funds Transfer Systems Bibliography, 2 Computer L.J. 183 (1980), Michael D. Scott

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


On Charging Computer Crime, 2 Computer L.J. 429 (1980), Donald G. Ingraham Jan 1980

On Charging Computer Crime, 2 Computer L.J. 429 (1980), Donald G. Ingraham

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


A Survey Of Computer Crime Studies, 2 Computer L.J. 275 (1980), John K. Taber Jan 1980

A Survey Of Computer Crime Studies, 2 Computer L.J. 275 (1980), John K. Taber

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Investigation, Prosecution, And Prevention Of Computer Crime: A State-Of-The-Art Review, 2 Computer L.J. 385 (1980), Mary R. Volgyes Jan 1980

The Investigation, Prosecution, And Prevention Of Computer Crime: A State-Of-The-Art Review, 2 Computer L.J. 385 (1980), Mary R. Volgyes

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Computer Abuse Research Update, 2 Computer L.J. 329 (1980), Donn B. Parker Jan 1980

Computer Abuse Research Update, 2 Computer L.J. 329 (1980), Donn B. Parker

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Computer Abuse And Computer Crime As Organizational Activities, 2 Computer L.J. 403 (1980), Rob Kling Jan 1980

Computer Abuse And Computer Crime As Organizational Activities, 2 Computer L.J. 403 (1980), Rob Kling

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Book Reviews, 2 Computer L.J. 773 (1980), Steven I. Smith, Michael D. Scott Jan 1980

Book Reviews, 2 Computer L.J. 773 (1980), Steven I. Smith, Michael D. Scott

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Computer Crime - The Need For Deterrent Legislation, 2 Computer L.J. 353 (1980), Stanley L. Sokolik Jan 1980

Computer Crime - The Need For Deterrent Legislation, 2 Computer L.J. 353 (1980), Stanley L. Sokolik

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Trial Of A Computer Crime, 2 Computer L.J. 441 (1980), Jay Becker Jan 1980

The Trial Of A Computer Crime, 2 Computer L.J. 441 (1980), Jay Becker

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Computer-Assisted Crime In Scandinavia, 2 Computer L.J. 457 (1980), Stein Schjølberg Jan 1980

Computer-Assisted Crime In Scandinavia, 2 Computer L.J. 457 (1980), Stein Schjølberg

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Current And Proposed Computer Crime Legislation, 2 Computer L.J. 721 (1980), Michael M. Krieger Jan 1980

Current And Proposed Computer Crime Legislation, 2 Computer L.J. 721 (1980), Michael M. Krieger

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Case Digest, 2 Computer L.J. 777 (1980), Drew Pomerance Jan 1980

Case Digest, 2 Computer L.J. 777 (1980), Drew Pomerance

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Computer Crimes Bibliography, 2 Computer L.J. 787 (1980), Linda A. Schulte Jan 1980

Computer Crimes Bibliography, 2 Computer L.J. 787 (1980), Linda A. Schulte

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Tax-Exempt Bond Financing Of Computer Telecommunications And Other High Technology Facilities, 2 Computer L.J. 805 (1980), Fred M. Greguras Jan 1980

Tax-Exempt Bond Financing Of Computer Telecommunications And Other High Technology Facilities, 2 Computer L.J. 805 (1980), Fred M. Greguras

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Mathematical Models For Legal Prediction, 2 Computer L.J. 829 (1980), R. Keown Jan 1980

Mathematical Models For Legal Prediction, 2 Computer L.J. 829 (1980), R. Keown

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Rifkin, A Documentary History, 2 Computer L.J. 471 (1980), Jay Becker Jan 1980

Rifkin, A Documentary History, 2 Computer L.J. 471 (1980), Jay Becker

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.