Open Access. Powered by Scholars. Published by Universities.®
- Publication Year
- Publication
- Publication Type
Articles 1 - 16 of 16
Full-Text Articles in Privacy Law
Here We Are Now, Entertain Us: Defining The Line Between Personal And Professional Context On Social Media, 35 Pace L. Rev. 398 (2014), Raizel Liebler, Keidra Chaney
Here We Are Now, Entertain Us: Defining The Line Between Personal And Professional Context On Social Media, 35 Pace L. Rev. 398 (2014), Raizel Liebler, Keidra Chaney
UIC Law Open Access Faculty Scholarship
Social media platforms such as Facebook, Twitter, and Instagram allow individuals and companies to connect directly and regularly with an audience of peers or with the public at large. These websites combine the audience-building platforms of mass media with the personal data and relationships of in-person social networks. Due to a combination of evolving user activity and frequent updates to functionality and user features, social media tools blur the line of whether a speaker is perceived as speaking to a specific and presumed private audience, a public expression of one’s own personal views, or a representative viewpoint of an entire …
Tweet Tweet: A First Amendment Wake Up Call Regarding Social Media In The Sports Arena, 30 J. Marshall J. Info. Tech. & Privacy L. 117 (2013), Samantha Levin
Tweet Tweet: A First Amendment Wake Up Call Regarding Social Media In The Sports Arena, 30 J. Marshall J. Info. Tech. & Privacy L. 117 (2013), Samantha Levin
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
As Seen On Tv: Your Compromising Cameo On National Reality Programming, 12 J. Marshall Rev. Intell. Prop. L. 403 (2013), Ryan Westerman
As Seen On Tv: Your Compromising Cameo On National Reality Programming, 12 J. Marshall Rev. Intell. Prop. L. 403 (2013), Ryan Westerman
UIC Review of Intellectual Property Law
The pop-culture phenomenon of reality television has taken over national programming. With the click of a remote, viewers can gain an inside look into the daily lives of celebrity families, toddler pageant queens, wealthy housewives, even pregnant teenagers. Reality television also profiles different professions: repo-men, pawn shop owners, and real estate agents all have television time slots. While it seems everyone is desperate for their fifteen minutes of fame, there are still those who wish to avoid the public spotlight. However, a recent Illinois ruling may make avoiding prime-time attention impossible for certain individuals caught on tape in compromising, and …
The Olympic Meddle: The International Olympic Committee's Intrusion Of Athletes' Privacy Through The Discriminatory Practice Of Gender Verification Testing, 28 J. Marshall J. Computer & Info. L. 49 (2010), Raheel Saleem
UIC John Marshall Journal of Information Technology & Privacy Law
The IOC and the IAAF act as governing bodies for athletes and, therefore, are innately responsible for their actions. However, the gender verification rule exemplifies that irresponsible actions by these governing agencies adversely effects its athletes. The gender verification rule empowers both the IOC and the IAAF to make life-changing decisions without any restriction, leaving athletes susceptible to the unfettered power and abuse of the rule. The legal foundation established by the international human rights declarations support the argument that gender verification testing must be abolished because of its embedded discrimination and intrusive nature. An application of the ICCPR provides …
Slingbox: Copyright, Fair Use, And Access To Television Programming Anywhere In The World, 25 J. Marshall J. Computer & Info. L. 187 (2007), Shekar Sathyanarayana
Slingbox: Copyright, Fair Use, And Access To Television Programming Anywhere In The World, 25 J. Marshall J. Computer & Info. L. 187 (2007), Shekar Sathyanarayana
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Yours For Keeps: Mgm V. Grokster, 23 J. Marshall J. Computer & Info. L. 209 (2005), Max Stul Oppenheimer
Yours For Keeps: Mgm V. Grokster, 23 J. Marshall J. Computer & Info. L. 209 (2005), Max Stul Oppenheimer
UIC John Marshall Journal of Information Technology & Privacy Law
Millions of people download billions of music files over the Internet, using peer-to-peer ("P2P") services such as Grokster, StreamCast, Morpheus, and Kazaa. This practice has been challenged as violative of copyright and, it has been argued, the magnitude of copyright violations facilitated by P2P services justifies banning the services entirely. This argument has been based on the assumption that most transfers over P2P services violate copyright. The starting point for this discussion is the recent decision of the United States Supreme Court to grant the certiorari petition of Metro-Goldwyn-Mayer Studios et al. to review the Ninth Circuit decision in MGM …
Institutions Of Learning Or Havens For Illegal Activities: How The Supreme Court Views Libraries, 25 N. Ill. U. L. Rev. 1 (2004), Raizel Liebler
Institutions Of Learning Or Havens For Illegal Activities: How The Supreme Court Views Libraries, 25 N. Ill. U. L. Rev. 1 (2004), Raizel Liebler
UIC Law Open Access Faculty Scholarship
The role of libraries in American society is varied: libraries act as curators and repositories of American culture's recorded knowledge, as places to communicate with others, and as sources where one can gain information from books, magazines and other printed materials, as well as audio-video materials and the Internet. Courts in the United States have called libraries "the quintessential locus of the receipt of information, "'places that are "dedicated to quiet, to knowledge, and to beauty," and "a mighty resource in the free marketplace of ideas." These positive views of libraries are often in sharp contrast with views by some …
Copy Protection Of Cds: The Recording Industry's Latest Attempt At Preventing The Unauthorized Digital Distribution Of Music, 21 J. Marshall J. Computer & Info. L. 241 (2003), Amy K. Jensen
UIC John Marshall Journal of Information Technology & Privacy Law
This comment focuses on the need of the music industry to control the use and digital distribution of music. The author also addresses the privacy issues that arise through the various methods the music industry implements in order to control the unauthorized distribution of digital music via computer technology. The author particularly addresses the privacy issues that arise with the use of undetectable signals that send information about a consumer’s use of that Compact Disc over computer lines, all unbeknownst and unauthorized by the consumer.
Riaa V. Napster: A Window Onto The Future Of Copyright Law In The Internet Age, 18 J. Marshall J. Computer & Info. L. 755 (2000), Ariel Berschadsky
Riaa V. Napster: A Window Onto The Future Of Copyright Law In The Internet Age, 18 J. Marshall J. Computer & Info. L. 755 (2000), Ariel Berschadsky
UIC John Marshall Journal of Information Technology & Privacy Law
This article uses the Napster controversy as a stepping stone to discussing copyright law in the Internet age. Section II of the article discusses music piracy over the internet and MP3 files. Section III of the article discusses the birth of Napster and its functions. Section IV details the allegations against Napster by the RIAA. Section V. discusses Copyright Law in the digital age. Various forms of copyright infringement such as direct liability, contributory liability, vicarious liability are fully assessed. Furthermore, the author discusses the response of legislative efforts to emerging copyright challenges on the internet. Section VI examines Napter's …
The Erosion Of American Copyright Protection: The Fairness In Music Licensing Act, 18 J. Marshall J. Computer & Info. L. 791 (2000), Ralph Carter
UIC John Marshall Journal of Information Technology & Privacy Law
The author of this article begins by giving the reader a taste of the history of American copyright protection. A synopsis of the statutes, case history, and industry development are fully explained. Furthermore, the author criticizes the enactment of the Fairness in Music Licensing Act. The author further refutes arguments made by proponents of the Act and examines the underlying motives of restaurant lobbyists. This comment also shows the real victims of the Act's exemptions---the songwriters. The comment concludes by advocating the return of the "home use exemption" in the Copyright Act of 1976.
Regulation Of Music Videos: Should The Fcc "Beat It?", 8 Computer L.J. 287 (1988), Aloma H. Park
Regulation Of Music Videos: Should The Fcc "Beat It?", 8 Computer L.J. 287 (1988), Aloma H. Park
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Tracking Stolen Artworks On The Internet: A New Standard For Due Diligence, 16 J. Marshall J. Computer & Info. L. 937 (1998), Laura Mcfarland-Taylor
Tracking Stolen Artworks On The Internet: A New Standard For Due Diligence, 16 J. Marshall J. Computer & Info. L. 937 (1998), Laura Mcfarland-Taylor
UIC John Marshall Journal of Information Technology & Privacy Law
This comment proposes adopting an internationally recognized standard of due diligence in reporting lost or stolen artworks utilizing the Internet. To insure that the proposed standard of due diligence is acceptable internationally, this Comment proposes the creation of a readily accessible database in which the theft of artworks is tracked utilizing the Internet. First this Comment briefly discusses the history of stolen artworks. Second, this Comment discusses the various legal standards the courts use in analyzing stolen art cases: statute of limitations, due diligence and adverse possession. To analyze the standards now used, four cases are discussed: O'Keeffe v. Snyder, …
The Rodney King Beating: Beyond Fair Use: A Broadcaster's Right To Air Copyrighted Videotape As Part Of A Newscast, 13 J. Marshall J. Computer & Info. L. 269 (1995), Leslie Ann Reis
UIC John Marshall Journal of Information Technology & Privacy Law
This article discusses the copyright implications of news broadcasters using videotape and other images in their newscasts. News broadcasters obtain audio and video materials for use in their broadcasts, and on most occasions they obtain these materials from a variety of sources. The broadcaster cannot infringe on the copyright of the news source unless given permission by the source or decide to use it under the Fair Use Doctrine. However, a newscaster may also use the copyrighted material under a possible exception created by the First Amendment right to freedom of the press. The law that provides a creator with …
Digital Sound Sampling And A Federal Right Of Publicity: Is It Live Or Is It Macintosh?, 10 Computer L.J. 365 (1990), Tamara J. Byram
Digital Sound Sampling And A Federal Right Of Publicity: Is It Live Or Is It Macintosh?, 10 Computer L.J. 365 (1990), Tamara J. Byram
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Douglass V. Hustler Magazine, Inc.: Anatomy Of Privacy For A Public Figure In Illinois, 19 J. Marshall L. Rev. 1053 (1986), Howard L. Teplinsky
Douglass V. Hustler Magazine, Inc.: Anatomy Of Privacy For A Public Figure In Illinois, 19 J. Marshall L. Rev. 1053 (1986), Howard L. Teplinsky
UIC Law Review
No abstract provided.
Video Games And The First Amendment: Are Restrictive Regulations Constitutional?, 5 Computer L.J. 493 (1985), Lisa E. Kranitz
Video Games And The First Amendment: Are Restrictive Regulations Constitutional?, 5 Computer L.J. 493 (1985), Lisa E. Kranitz
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.