Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Law

2010

Institution
Keyword
Publication
Publication Type
File Type

Articles 31 - 60 of 65

Full-Text Articles in Science and Technology Law

Law School & The Web Of Group Affiliation: Socializing, Socialization, And Social Network Site Use Among Law Students, 27 J. Marshall J. Computer & Info. L. 325 (2010), Eric M. Fink Jan 2010

Law School & The Web Of Group Affiliation: Socializing, Socialization, And Social Network Site Use Among Law Students, 27 J. Marshall J. Computer & Info. L. 325 (2010), Eric M. Fink

UIC John Marshall Journal of Information Technology & Privacy Law

Online social network sites (“SNS”) have emerged as a significant socio-technical phenomenon in the past several years. Scholars from various disciplines have examined these sites to develop a better understanding of their social significance and implications from a variety of perspectives. Within the burgeoning field of SNS studies, one strand of work focuses on the place of SNSs in students’ educational experiences and the potential pedagogical applications of SNSs. However, the SNS phenomenon generally, and its educational/pedagogical significance in particular, have received scant attention from legal scholars. This article examines the place of SNSs within the contemporary law school experience, …


Cyber Fatwās And Classical Islamic Jurisprudence, 27 J. Marshall J. Computer & Info. L. 577 (2010), Derek John Illar Jan 2010

Cyber Fatwās And Classical Islamic Jurisprudence, 27 J. Marshall J. Computer & Info. L. 577 (2010), Derek John Illar

UIC John Marshall Journal of Information Technology & Privacy Law

The first section of this paper will explain what fatwâs are, why they are important, and what is the relationship between fatwâs and the Islamic judiciary. This section will also address who can issue such opinions and how scholars reach their conclusions. In the second part of this paper, I will explore the recent emergence of cyber fatwâs. This section specifically will focus on how Muslims have used this medium and how fatwâs have manifested themselves therein. The third portion of this paper will identity the problems that cyber fatwâs create and why they fail to comport with particular tenets …


How Safe Is This Shore? - Data Protection And Bpos In India, 27 J. Marshall J. Computer & Info. L. 539 (2010), Kritika Bharadwaj Jan 2010

How Safe Is This Shore? - Data Protection And Bpos In India, 27 J. Marshall J. Computer & Info. L. 539 (2010), Kritika Bharadwaj

UIC John Marshall Journal of Information Technology & Privacy Law

India has one of the fastest growing demographics of personal computer and Internet usage, following the U.S. and the U.K. In the light of this progress, there is no doubt that India has benefited from the worldwide process of outsourcing. On the same note, the service offered by India has rendered her indispensible to countries around the world, including the U.S. and the U.K. However, where convenience, speed, and accessibility are taken for granted in this digital era, this paradigm shift has consequently resulted in changes in its management and control, safeguard measures, and a surge of unprecedented threats and …


An Evolutionary Study Of Cloud Computing Services Privacy Terms, 27 J. Marshall J. Computer & Info. L. 593 (2010), Konstantinos K. Stylianou Jan 2010

An Evolutionary Study Of Cloud Computing Services Privacy Terms, 27 J. Marshall J. Computer & Info. L. 593 (2010), Konstantinos K. Stylianou

UIC John Marshall Journal of Information Technology & Privacy Law

This paper examines the evolution of a number of cloud computing services’ terms of use with the aim to discern whether they offer less or more (or equal) privacy safeguards. To better highlight the changes cloud computing has brought about, I focus on those privacy terms that relate to the special modus operandi of cloud services. This paper proceeds in three parts. Part I identifies the special ways by which cloud computing challenges privacy. Part II discusses a series of privacy terms commonly found in the sampled cloud computing services and follows their evolution by comparing previous versions where available. …


Firearm Transaction Disclosure In The Digital Age: Should The Government Know What Is In Your Home?, 27 J. Marshall J. Computer & Info. L. 497 (2010), Elaine Vullmahn Jan 2010

Firearm Transaction Disclosure In The Digital Age: Should The Government Know What Is In Your Home?, 27 J. Marshall J. Computer & Info. L. 497 (2010), Elaine Vullmahn

UIC John Marshall Journal of Information Technology & Privacy Law

This comment examines the primary arguments for continuing to prohibit the federal government from establishing a federal firearm registry. The Background section of this comment surveys the development of laws restricting firearm sales and requiring federal firearm licensed dealers to maintain pertinent records. This section also describes how, if enacted, the Blair Holt’s Firearm Licensing and Registration Act of 2009, known as H.R. 45, would, through the creation of federal firearm registry, expose electronic records of private citizens’ firearm purchases and ownership to possible government abuse. The Analysis section examines why H.R. 45 is not the correct means for achieving …


Increasing Access To Startup Financing Through Intellectual Property Securitization, 27 J. Marshall J. Computer & Info. L. 613 (2010), Kyle Tondo-Kramer Jan 2010

Increasing Access To Startup Financing Through Intellectual Property Securitization, 27 J. Marshall J. Computer & Info. L. 613 (2010), Kyle Tondo-Kramer

UIC John Marshall Journal of Information Technology & Privacy Law

This paper will discuss how a private company running a single, nationwide database for filing financing agreements can ease the burden on creditors and pave the way for more creditors to enter this market. Part two offers a brief overview of how intellectual property securitization works and some of the impediments to using this type of securitization. Part three proposes a possible solution to the problem creditors face regarding the filing of a financing statement when attempting to securitize intellectual property, and provides an in depth analysis as to why the suggestion that a private company runs a single, nationwide …


The Cathedral And The Bizarre: An Examination Of The "Viral" Aspects Of The Gpl, 27 J. Marshall J. Computer & Info. L. 349 (2010), Michael F. Morgan Jan 2010

The Cathedral And The Bizarre: An Examination Of The "Viral" Aspects Of The Gpl, 27 J. Marshall J. Computer & Info. L. 349 (2010), Michael F. Morgan

UIC John Marshall Journal of Information Technology & Privacy Law

While there is a growing body of literature dealing with the General Public License (“GPL”), the potential viral effects of the GPL do not appear to have been analyzed in a detailed technical manner. This paper will attempt to demonstrate that a proper legal analysis of the viral effects of the GPL is dependent on a detailed technical understanding of the specific mechanisms used for each type of program-to-program interaction. Once these technical mechanisms are properly understood it will then be possible to identify the applicable copyright law needed to assess the viral effects of the GPL.


The Twenty-Ninth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 28 J. Marshall J. Computer & Info. L. 81 (2010), Erin Murphy-Hillstrom, Whitney Hutchinson, Efthymios Katsarelis, Amber Lynn Wagner, Panagiota Kelali Jan 2010

The Twenty-Ninth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 28 J. Marshall J. Computer & Info. L. 81 (2010), Erin Murphy-Hillstrom, Whitney Hutchinson, Efthymios Katsarelis, Amber Lynn Wagner, Panagiota Kelali

UIC John Marshall Journal of Information Technology & Privacy Law

Petitioner, Aaron Murphy, appeals to the Marshall Supreme Court from a decision affirming the grant of summary judgment in favor of Respondent, MarshCODE, on his claims of defamation, false light invasion of privacy, and breach of contract. Thus, there are now three issues before the Marshall Supreme Court. The first two issues concern whether an individual can maintain an action of defamation and false light invasion of privacy when the false statement arose because of a computer malfunction. The last issue concerns whether the unilateral modification of a privacy agreement constitutes a breach of contract when assent to the modification …


The Olympic Meddle: The International Olympic Committee's Intrusion Of Athletes' Privacy Through The Discriminatory Practice Of Gender Verification Testing, 28 J. Marshall J. Computer & Info. L. 49 (2010), Raheel Saleem Jan 2010

The Olympic Meddle: The International Olympic Committee's Intrusion Of Athletes' Privacy Through The Discriminatory Practice Of Gender Verification Testing, 28 J. Marshall J. Computer & Info. L. 49 (2010), Raheel Saleem

UIC John Marshall Journal of Information Technology & Privacy Law

The IOC and the IAAF act as governing bodies for athletes and, therefore, are innately responsible for their actions. However, the gender verification rule exemplifies that irresponsible actions by these governing agencies adversely effects its athletes. The gender verification rule empowers both the IOC and the IAAF to make life-changing decisions without any restriction, leaving athletes susceptible to the unfettered power and abuse of the rule. The legal foundation established by the international human rights declarations support the argument that gender verification testing must be abolished because of its embedded discrimination and intrusive nature. An application of the ICCPR provides …


300 Years Of Copyright Law? A Not So Modest Proposal For Reform, 28 J. Marshall J. Computer & Info. L. 1 (2010), James Gh Griffin Jan 2010

300 Years Of Copyright Law? A Not So Modest Proposal For Reform, 28 J. Marshall J. Computer & Info. L. 1 (2010), James Gh Griffin

UIC John Marshall Journal of Information Technology & Privacy Law

2010 sees the three hundredth anniversary of the U.K.'s Statute of Anne 1710. This paper suggests that with the increased ability of content recipients to re-use works, there is a need to readdress the concerns of stakeholders, namely authors, publishers and content recipients. The paper sets out in detail how this should be achieved. To do so, it utilises the notion of creativity as the benchmark by which to balance the interests of stakeholders. This has been used in early eighteenth century case law in the U.K., and there are also other historical and theoretical justifications. The paper then proceeds …


The Twenty-Ninth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For Petitioner, 28 J. Marshall J. Computer & Info. L. 119 (2010), Kelly Foss, Vince Lombardozzi, Jared Palmer Jan 2010

The Twenty-Ninth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For Petitioner, 28 J. Marshall J. Computer & Info. L. 119 (2010), Kelly Foss, Vince Lombardozzi, Jared Palmer

UIC John Marshall Journal of Information Technology & Privacy Law

The circuit court erred when it granted summary judgment in favor of MarshCODE because Mr. Murphy has demonstrated facts to support the elements of the (1) defamation, (2) false light invasion of privacy, and (3) breach of contract claims. First, Mr. Murphy has provided facts to support the defamation claim. MarshCODE made a false and defamatory statement about Mr. Murphy when it told Ms. Who that he was her father. Because this matter concerns Mr. Murphy's private life, a negligence standard applies rather than the First Amendment's actual malice standard. Mr. Murphy has demonstrated that MarshCODE acted either negligently or …


Protecting Consumers From Spyware: A Proposed Consumer Digital Trespass Act, 28 J. Marshall J. Computer & Info. L. 185 (2010), Richard G. Kunkel Jan 2010

Protecting Consumers From Spyware: A Proposed Consumer Digital Trespass Act, 28 J. Marshall J. Computer & Info. L. 185 (2010), Richard G. Kunkel

UIC John Marshall Journal of Information Technology & Privacy Law

“Spyware” is a broad term used to describe software that resides on a user’s computer and monitors the user’s online behavior. Though spyware may be helpful or benign, it can also be used for malicious purposes, commonly classified as “malware”. Consumers, who lack sophistication to avoid unintentionally downloading spyware, are especially vulnerable to the threat of malware. In lieu of this threat, it is important to understand the nature and scope of spyware problems affecting consumers. The paper will discuss how common law tort theories of trespass and trespass to chattel are difficult to apply to spyware, and how a …


The Twenty-Ninth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For Respondent, 28 J. Marshall J. Computer & Info. L. 151 (2010), Kimberly Hodgman, Jody Rodenberg, Erin Tyler Jan 2010

The Twenty-Ninth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For Respondent, 28 J. Marshall J. Computer & Info. L. 151 (2010), Kimberly Hodgman, Jody Rodenberg, Erin Tyler

UIC John Marshall Journal of Information Technology & Privacy Law

The First District Court of Appeals properly affirmed summary judgment on behalf of MarshCODE because Appellant failed to raise a genuine issue of material fact on his defamation claim. First, MarshCODE's accidental disclosure of information, which implied that Appellant participated in premarital sex or had a homosexual child, was not defamatory because an average person would not lower his estimation or be deterred from associating with Appellant based on such a statement. Second, no publication was made because MarshCODE did not act with negligence and was unaware of the program malfunction that resulted in the release of the information. Third, …


Internet Filtering: The Ineffectiveness Of Wto Remedies And The Availability Of Alternative Tort Remedies, 28 J. Marshall J. Computer & Info. L. 273 (2010), Kristen A. Knapp Jan 2010

Internet Filtering: The Ineffectiveness Of Wto Remedies And The Availability Of Alternative Tort Remedies, 28 J. Marshall J. Computer & Info. L. 273 (2010), Kristen A. Knapp

UIC John Marshall Journal of Information Technology & Privacy Law

Empirical studies have shown that government Internet filtering is increasing worldwide. Internet Service Providers have progressively begun to take on filtering responsibility in a quasi-governmental capacity. As filtering has increased, some have begun to question whether Internet filtering might violate WTO commitments under the General Agreement on Trade in Services (“GATS Agreement”). This paper will provide technical background on how Internet filtering is accomplished in practice, and explain the GATS Agreement that was held to govern Internet filtering in the U.S.-Gambling Services decision. This paper will further survey the current range of U.S. filtering actions and detail why tort remedies …


Interpretation & The Internet, 28 J. Marshall J. Computer & Info. L. 251 (2010), Cameron Hutchison Jan 2010

Interpretation & The Internet, 28 J. Marshall J. Computer & Info. L. 251 (2010), Cameron Hutchison

UIC John Marshall Journal of Information Technology & Privacy Law

Twenty years after the advent of the Internet, the revolutionary nature of the technology can no longer be in doubt. In spite of the ‘differentness” of the Internet, courts have proven adept at adapting extant law to the features and demands of this new technology. This paper will chronicle the differences between the Internet and other technologies which might, depending on the legal issue, justify the exclusion of the Internet from established rules on the basis of analogical reasoning. Two approaches to legal interpretation – literalism and purposivism—will be discussed in light of this new technology, with an explanation as …


Safeguarding "The Precious": Counsel On Law Journal Publication Agreements In Digital Times, 28 J. Marshall J. Computer & Info. L. 217 (2010), Michael N. Widener Jan 2010

Safeguarding "The Precious": Counsel On Law Journal Publication Agreements In Digital Times, 28 J. Marshall J. Computer & Info. L. 217 (2010), Michael N. Widener

UIC John Marshall Journal of Information Technology & Privacy Law

Heaping scholarship fills the academic print and online press about where legal scholars should publish and how to have one’s paper accepted for publication. But there is scarce writing about the contractual relationship between the law journal and the author of an accepted paper. This may be due in part to broadly misconstrued or ignored publication agrees, or perhaps that the business relationship is unworthy of scholarly attention. Regardless, this paper introduces a pragmatist’s perspective on evaluating and revising publication agreements, and informs student editors how publication agreements accomplish a journal’s objectives, based on current copyright law. Finally, this paper …


Cyber-Apocalypse Now: Securing The Internet Against Cyberterrorism And Using Universal Jurisdiction As A Deterrent, Kelly A. Gable Jan 2010

Cyber-Apocalypse Now: Securing The Internet Against Cyberterrorism And Using Universal Jurisdiction As A Deterrent, Kelly A. Gable

Vanderbilt Journal of Transnational Law

Cyberterrorism has become one of the most significant threats to the national and international security of the modern state, and cyberattacks are occurring with increased frequency. The Internet not only makes it easier for terrorists to communicate, organize terrorist cells, share information, plan attacks, and recruit others but also is increasingly being used to commit cyberterrorist acts. It is clear that the international community may only ignore cyberterrorism at its peril.

The primary security threat posed by the Internet is caused by an inherent weakness in the TCP/IP Protocol, which is the technology underlying the structure of the Internet and …


Doninger's Wedge: Has Avery Doninger Bridged The Way For Internet Versions Of Matthew Fraser?, 43 J. Marshall L. Rev. 439 (2010), Adam Dauksas Jan 2010

Doninger's Wedge: Has Avery Doninger Bridged The Way For Internet Versions Of Matthew Fraser?, 43 J. Marshall L. Rev. 439 (2010), Adam Dauksas

UIC Law Review

No abstract provided.


The Patentability Of Electromagnetic And Acoustic Signals In Canada, Natalie Raffoul Jan 2010

The Patentability Of Electromagnetic And Acoustic Signals In Canada, Natalie Raffoul

Canadian Journal of Law and Technology

The issue of the patentability of electromagnetic and acoustic signals has not been litigated in Canada. If, however, the issue does come forward for litigation, Canadian courts may decide differently than their American colleagues did. The Supreme Court of Canada’s ‘Harvard Mouse’ decision shows that the Canadian law on patentable subject matter differs from American law. Under the Canadian definition of manufacture, electromagnetic and acoustic signals could constitute patentable subject matter.


Book Review: E-Discovery In Canada, Robert J. Currie Jan 2010

Book Review: E-Discovery In Canada, Robert J. Currie

Canadian Journal of Law and Technology

It is not hyperbolic to say that the proliferation of electronically stored information (ESI) is probably the most prominent change-harbinger and potential havoc-wreaker in civil litigation today — second only, perhaps, to the spiralling costs of litigation itself. Indeed, the practical and legal difficulties associated with the storage, gathering, preservation, disclosure and evidentiary use of ESI have the potential to act as a Trojan Horse, causing what would previously have been ordinary cases to implode under their weight. Increasing recognition of this is evident; electronic discovery (e-discovery) cases have begun to emerge in the reports, a successful co-operative effort by …


A New Approach To Data Security Breaches, Gideon Emcee Christian Jan 2010

A New Approach To Data Security Breaches, Gideon Emcee Christian

Canadian Journal of Law and Technology

This article examines the problems associated with data security breaches from two different, but not mutually exclusive, perspectives. The first part of the article examines the need for notification in the event of a data security breach and proposes an amendment of the Personal Information Protection and Electronic Document Act (PIPEDA) to create a legal, or statutory, obligation in Canada to compel disclosure or notification of data security breaches. My recommendations are based on the examination of legislation from other legal jurisdictions, highlighting, where necessary, the shortcomings of the legislation, which ought to be taken into consideration in amending PIPEDA …


Information Privacy In Public Space: Location Data, Data Protection And The Reasonable Expectation Of Privacy, Teresa Scassa Jan 2010

Information Privacy In Public Space: Location Data, Data Protection And The Reasonable Expectation Of Privacy, Teresa Scassa

Canadian Journal of Law and Technology

This article considers whether the permissive disclosure provisions of the Personal Information Protection and Electronic Documents Act (PIPEDA) and its substantially similar counterparts mean that law enforcement agents have ready access to information about our movements and activities, or whether s. 8 of the Charter plays a role in limiting the circumstances in which disclosure without notice or consent may take place.


Fessing Up To Facebook: Recent Trends In The Use Of Social Network Websites For Civil Litigation, Pamela D. Pengelley Jan 2010

Fessing Up To Facebook: Recent Trends In The Use Of Social Network Websites For Civil Litigation, Pamela D. Pengelley

Canadian Journal of Law and Technology

For professional “fact-gatherers” such as lawyers, insurance adjusters, claims handlers and private investigators, the vast wealth of information that people volunteer on Facebook can be a goldmine or a smoking gun, depending on your perspective. The personal information contained in a Facebook profile may be highly relevant to matters at issue in litigation; when dealing with claims, particularly in the personal injury context, the information contained on a Facebook page can make or break a case. It is, therefore, crucial that legal and insurance professionals stay informed of new developments in this emerging area of law. This article, written with …


Groundwork For Assessing The Legal Risks Of Cyberjustice, François Senécal, Karim Benyekhlef Jan 2010

Groundwork For Assessing The Legal Risks Of Cyberjustice, François Senécal, Karim Benyekhlef

Canadian Journal of Law and Technology

It is clear that the use of information technology is quickly becoming a necessity for the justice system. In civil cases, delays and costs are causing individuals to abandon the courts, and cases that make it to trial are of ever-increasing complexity. Moreover, public security is weakened by the inefficient and cumbersome conditions by which criminal justice information circulates among the various stakeholders, such as the police, prosecutors, the courts, penitentiaries and parole boards, to name only a few. It becomes apparent that information technology has much to offer individuals involved in court cases and the justice system as a …


Google Adwords And Canadian Trademark Law, Reed W. Taubner Jan 2010

Google Adwords And Canadian Trademark Law, Reed W. Taubner

Canadian Journal of Law and Technology

This article aims to answer two questions: should business competitors be allowed to use each other’s goodwill in this way and, if so, can trademark law police the program without stifling competition? Part I examines the technical aspects of the AdWords program. Part II explores the underlying rationales of trademark law to start developing a normative position. Part III reviews the American jurisprudence and commentary to hone that normative position and to identify a compatible legal framework. Part IV compares that framework against Canadian law.

This article endorses the work of Misha Gregory Macaw who, unlike some trademark expansionists, argues …


A Hole In The Need Of Mending: Copyright And The Individual Marking Of Advertisements Published In Collective Works, Randy Gordon Jan 2010

A Hole In The Need Of Mending: Copyright And The Individual Marking Of Advertisements Published In Collective Works, Randy Gordon

SMU Science and Technology Law Review

No abstract provided.


Downloading Personhood: A Hegelian Theory Of Copyright Law, Karla M. O'Regan Jan 2010

Downloading Personhood: A Hegelian Theory Of Copyright Law, Karla M. O'Regan

Canadian Journal of Law and Technology

This article will examine these responses, identifying the competing interests at work in both traditional copyright schemes and contemporary Internet-based criticisms, and put forth a theory of copyright law capable of ad- dressing the needs of these rival interests in an advanced technological era.

Part I delineates some of the more prominent theories copyright scholars have offered in response to the “IP-IT crisis.” Part II attempts to identify the source of these problems by first examining conventional justifications for copyright and the competing interests inherently at work in its conception. Part III identifies three specific factors I argue are particularly …


Strong Medicine: Patents, Market, And Policy Challenges For Managing Neglected Diseases And Affordable Prescription Drugs, Taiwo A. Oriola Jan 2010

Strong Medicine: Patents, Market, And Policy Challenges For Managing Neglected Diseases And Affordable Prescription Drugs, Taiwo A. Oriola

Canadian Journal of Law and Technology

The article is divided into six parts. Part one deals with the introduction, part two discusses the evolution of modern medicine and the socio-economic dynamics that shape the current prescription drug economics, part three discusses the pharmaceutical costs conundrum, part four analyses neglected diseases and the scale of the problem, part five discusses the role of patents on the pharmaceuticals costs trajectory and reviews literature on possible alternatives to promoting incentives for pharmaceuticals R&D, and part six sums up the discourse and reiterates the solutions to the problems identified.


The Canadian Public Domain: What, Where, And To What End?, Carys J. Craig Jan 2010

The Canadian Public Domain: What, Where, And To What End?, Carys J. Craig

Canadian Journal of Law and Technology

In this article, I explore the important body of scholarship that has emerged over this time on the substance, nature, and role of the public domain. I offer some concrete definitions of the public domain in the copyright context, identify some ongoing sources of debate in the literature, and highlight some particularly significant voices in public domain discourse. In doing so, my aim is twofold: first, I mean to present a fairly comprehensive, but concise, review of this academic movement that has been directed towards substantiating and politicizing the concept of the public domain; and second, I hope to re-situate …


Web 2.0 Regulation: A Risk Management Process, Pierre Trudel Jan 2010

Web 2.0 Regulation: A Risk Management Process, Pierre Trudel

Canadian Journal of Law and Technology

In order to describe the law relating to Web 2.0, we have to look at the normativity that really operates there. Effective norms engender strong enough risks for stakeholders that they find it in their interest to comply. State legislation is not the only thing that governs Internet activities; the normativity that governs the resources associated with Web 2.0 flows from what the technology permits and prohibits, and also largely from stakeholder practices. Configurations and practices create risk or shift risk onto others. However, state regulators may consider that the risks arising out of Internet activities are worrisome enough that …