Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Law and Society
Public School Funding And Mccleary V. State Of Washington—A Violation Of The Separation Of Powers Doctrine Or A Legitimate Exercise Of Judicial Autonomy?, Jessica R. Burns
Public School Funding And Mccleary V. State Of Washington—A Violation Of The Separation Of Powers Doctrine Or A Legitimate Exercise Of Judicial Autonomy?, Jessica R. Burns
Seattle University Law Review
Public school funding has been contentiously litigated throughout the United States, and the Washington Supreme Court has addressed the inadequacy of public school funding in two pivotal cases: Seattle School District No. 1 v. State and McCleary v. State. In both decisions, the Washington Supreme Court held that the State failed to provide an adequate basic education for its public school students; however, in its attempt to remedy the situation, the court took drastically different approaches.
Trading Privacy For Angry Birds: A Call For Courts To Reevaluate Privacy Expectations In Modern Smartphones, Jeremy Andrew Ciarabellini
Trading Privacy For Angry Birds: A Call For Courts To Reevaluate Privacy Expectations In Modern Smartphones, Jeremy Andrew Ciarabellini
Seattle University Law Review
Of all the smartphone uses, the calling function is probably used the least. Rather, individuals more commonly use their smartphone for surfing the web, checking Facebook, and playing games. Highlighting the “smart” in smartphone, these phones often know more about their users’ daily activities than the users. Without requiring any sort of input, smartphones can tell the user how many steps they walk each day, when it is time to leave for work (also, of course, determining the traveling time with the most up-to-date traffic reports), and when an item recently ordered on Amazon will be delivered. Smartphone users may …
Authorized Investigation: A Temperate Alternative To Cyber Insecurity, Casey M. Bruner
Authorized Investigation: A Temperate Alternative To Cyber Insecurity, Casey M. Bruner
Seattle University Law Review
This Note aims to show that legal structures created to protect the Internet in its original form are completely insufficient to protect what the Internet has become. This antiquated legal framework is exacerbating the problem. The breadth of activity that the current law restricts severely limits the remedies that cyberattack victims can pursue, and it must be updated. While full hack-back may prove necessary in the long run, I argue for a more temperate initial response to the problem—I call this response “authorized investigation.” Specifically, the Computer Fraud and Abuse Act should be amended to allow victims access to their …