Open Access. Powered by Scholars. Published by Universities.®

State and Local Government Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 33

Full-Text Articles in State and Local Government Law

How An Acoustic Sensor Can Catch A Gunman, 32 J. Marshall J. Info. Tech. & Privacy L. 211 (2016), Amanda Busljeta Jan 2016

How An Acoustic Sensor Can Catch A Gunman, 32 J. Marshall J. Info. Tech. & Privacy L. 211 (2016), Amanda Busljeta

UIC John Marshall Journal of Information Technology & Privacy Law

Conversations said in public do not have an expectation of privacy, and therefore, the ShotSpotter does not violate the right to privacy. This comment will address the following: a) ShotSpotter technology is a necessity in all neighborhoods; b) ShotSpotter does not violate an individual’s expectation of privacy; c) the need for ShotSpotter outweighs the cost of the device; and e) regulations and economic solutions will allow cities to use ShotSpotter while still protecting the individual’s privacy rights.


Selected State Laws Governing The Safeguarding And Disposing Of Personal Information, 31 J. Marshall J. Info. Tech. & Privacy L. 487 (2015), Bruce Radke, Michael Waters Jan 2015

Selected State Laws Governing The Safeguarding And Disposing Of Personal Information, 31 J. Marshall J. Info. Tech. & Privacy L. 487 (2015), Bruce Radke, Michael Waters

UIC John Marshall Journal of Information Technology & Privacy Law

Numerous states have adopted laws mandating the protection and disposal of personal information. Under those laws, businesses are required to implement and maintain reasonable security procedures and practices appropriate to the nature of the information in order to protect the personal information from unauthorized access, destruction, use, modification, or disclosure. Although the definition of “personal information” varies from state to state, “personal information” is generally defined as an individual’s first name or initial and last name in combination with any one or more of the following data elements, when either the name or the data elements are not encrypted or …


California’S Eavesdropping Law Endangers Victims Of Domestic Violence, 31 J. Marshall J. Info. Tech. & Privacy L. 57 (2014), John E.B. Myers Jan 2014

California’S Eavesdropping Law Endangers Victims Of Domestic Violence, 31 J. Marshall J. Info. Tech. & Privacy L. 57 (2014), John E.B. Myers

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Clever Contraband: Why Illinois’ Lockstep With The U.S. Supreme Court Gives Police Authority To Search The Bowels Of Your Vehicle, 47 J. Marshall L. Rev. 425 (2013), Jason Cooper Jan 2013

Clever Contraband: Why Illinois’ Lockstep With The U.S. Supreme Court Gives Police Authority To Search The Bowels Of Your Vehicle, 47 J. Marshall L. Rev. 425 (2013), Jason Cooper

UIC Law Review

No abstract provided.


Where Art Thou, Privacy: Expanding Privacy Rights Of Minors In Regard To Consensual Sex: Statutory Rape Laws And The Need For A Romeo And Juliet Exception In Illinois, 46 J. Marshall L. Rev. 309 (2012), Jordan Franklin Jan 2012

Where Art Thou, Privacy: Expanding Privacy Rights Of Minors In Regard To Consensual Sex: Statutory Rape Laws And The Need For A Romeo And Juliet Exception In Illinois, 46 J. Marshall L. Rev. 309 (2012), Jordan Franklin

UIC Law Review

No abstract provided.


Is It Justice Or A Crime To Record The Police?: A Look At The Illinois Eavesdropping Statute And Its Application, 45 J. Marshall L. Rev. 485 (2012), Stephanie Claiborne Jan 2012

Is It Justice Or A Crime To Record The Police?: A Look At The Illinois Eavesdropping Statute And Its Application, 45 J. Marshall L. Rev. 485 (2012), Stephanie Claiborne

UIC Law Review

No abstract provided.


Photo Enforcement Programs: Are They Permissible Under The United States Constitution?, 43 J. Marshall L. Rev. 463 (2010), Paul Mcnaughton Jan 2010

Photo Enforcement Programs: Are They Permissible Under The United States Constitution?, 43 J. Marshall L. Rev. 463 (2010), Paul Mcnaughton

UIC Law Review

No abstract provided.


Yes, I Destroyed The Evidence - Sue Me? Intentional Spoliation Of Evidence In Illinois, 27 J. Marshall J. Computer & Info. L. 235 (2009), Michael A. Zuckerman Jan 2009

Yes, I Destroyed The Evidence - Sue Me? Intentional Spoliation Of Evidence In Illinois, 27 J. Marshall J. Computer & Info. L. 235 (2009), Michael A. Zuckerman

UIC John Marshall Journal of Information Technology & Privacy Law

Many Illinois litigators have encountered spoliation of evidence, which is the loss, destruction, or alteration of evidence. Examples of spoliation are seemingly endless and include the failure to preserve the scene of a train derailment, the accidental destruction of evidence on a lawyer’s desk by a janitor, the loss of a heater that exploded, the removal of wires from a car that caught on fire, the loss and alteration of medical equipment, and the intentional erasing of a computer image relevant to a copyright lawsuit. To combat spoliation, Illinois and many other states have developed common law and statutory methods …


Identity Theft: Plugging The Massive Data Leaks With A Stricter Nationwide Breach-Notification Law, 40 J. Marshall L. Rev. 681 (2007), Amanda Draper Jan 2007

Identity Theft: Plugging The Massive Data Leaks With A Stricter Nationwide Breach-Notification Law, 40 J. Marshall L. Rev. 681 (2007), Amanda Draper

UIC Law Review

No abstract provided.


Hitching A Ride: Every Time You Take A Drive, The Government Is Riding With You, 39 J. Marshall L. Rev. 1499 (2006), Benjamin Burnham Jan 2006

Hitching A Ride: Every Time You Take A Drive, The Government Is Riding With You, 39 J. Marshall L. Rev. 1499 (2006), Benjamin Burnham

UIC Law Review

No abstract provided.


American Courts Are Drowning In The "Gene Pool": Excavating The Slippery Slope Mechanisms Behind Judicial Endorsement Of Dna Databases, 39 J. Marshall L. Rev. 115 (2005), Meghan Riley Jan 2005

American Courts Are Drowning In The "Gene Pool": Excavating The Slippery Slope Mechanisms Behind Judicial Endorsement Of Dna Databases, 39 J. Marshall L. Rev. 115 (2005), Meghan Riley

UIC Law Review

No abstract provided.


Preventing "You've Got Mail"™ From Meaning "You've Been Served": How Service Of Process By E-Mail Does Not Meet Constitutional Procedure Due Process Requirements, 38 J. Marshall L. Rev. 1121 (2005), Matthew R. Schreck Jan 2005

Preventing "You've Got Mail"™ From Meaning "You've Been Served": How Service Of Process By E-Mail Does Not Meet Constitutional Procedure Due Process Requirements, 38 J. Marshall L. Rev. 1121 (2005), Matthew R. Schreck

UIC Law Review

No abstract provided.


The States And The Electronic Communications Privacy Act: The Need For Legal Processes That Keep Up With The Times, 22 J. Marshall J. Computer & Info. L. 695 (2004), Monique Mattei Ferraro Jan 2004

The States And The Electronic Communications Privacy Act: The Need For Legal Processes That Keep Up With The Times, 22 J. Marshall J. Computer & Info. L. 695 (2004), Monique Mattei Ferraro

UIC John Marshall Journal of Information Technology & Privacy Law

In criminal investigation when hours may mean the difference between successful resolution of a case or not, law enforcement must have an effective method of obtaining necessary information. The author offers an overview of the Electronic Communications Privacy Act (ECPA) and proceeds in a presentation of cybercrime investigations. The article further examines the differences and the occasional conflict existing between the federal and state law, traced into the variety and multitude of state and local laws and procedures regulating the obtaining of information but also into lack of state and local resources. Indeed state and local laws not only differ …


The Legislative Jurisdiction Of States Over Transactions In International Electronic Commerce, 18 J. Marshall J. Computer & Info. L. 689 (2000), Tapio Puurunen Jan 2000

The Legislative Jurisdiction Of States Over Transactions In International Electronic Commerce, 18 J. Marshall J. Computer & Info. L. 689 (2000), Tapio Puurunen

UIC John Marshall Journal of Information Technology & Privacy Law

With increasing growth and development of E-commerce and a rapid increase in the number of Internet Users, government assessment of current protections granted to consumers in their states is encouraged. The author's purpose is to examine national legislation on e-commerce regulation and its limits, to resolve jurisdictional conflict of laws associated with e-commerce, and to propose possible solutions to these emerging problems. This article covers market functions between business and consumer transactions. First, government should not ignore consumer e-commerce since e-commerce trade is significant on both national and international levels. Secondly, the author pushes for an extensive effort to unify …


Potential Liability Under The Illinois Electronic Commerce Security Act: Is It A Risk Worth Taking?, 17 J. Marshall J. Computer & Info. L. 909 (1999), Stephen G. Myers Jan 1999

Potential Liability Under The Illinois Electronic Commerce Security Act: Is It A Risk Worth Taking?, 17 J. Marshall J. Computer & Info. L. 909 (1999), Stephen G. Myers

UIC John Marshall Journal of Information Technology & Privacy Law

This Comment argues that the potential liability of digital signatures under the Act is too great and, therefore, is not an effective mode of communication. Part II of this Comment explains the purpose, the significance, and the traditional role of the handwritten signature. Furthermore, Part II establishes the basics of the digital signature process as it relates to each participant. The participants in a digital signature process consist of a subscriber, a recipient, and a certification authority. Part III of this Comment analyzes and argues why the use of digital signatures, under the Act, is too great of a liability …


Requiring A Thumbprint For Notarized Transactions: The Battle Against Document Fraud, 31 J. Marshall L. Rev. 803 (1998), Vincent J. Gnoffo Jan 1998

Requiring A Thumbprint For Notarized Transactions: The Battle Against Document Fraud, 31 J. Marshall L. Rev. 803 (1998), Vincent J. Gnoffo

UIC Law Review

No abstract provided.


The Impact Of Technology On The Notary Process, 31 J. Marshall L. Rev. 911 (1998), Glen-Peter Ahlers Sr. Jan 1998

The Impact Of Technology On The Notary Process, 31 J. Marshall L. Rev. 911 (1998), Glen-Peter Ahlers Sr.

UIC Law Review

No abstract provided.


Use Tax Collection On Internet Purchases: Should The Mail Order Industry Serve As A Model, 15 J. Marshall J. Computer & Info. L. 203 (1997), Steven J. Forte Jan 1997

Use Tax Collection On Internet Purchases: Should The Mail Order Industry Serve As A Model, 15 J. Marshall J. Computer & Info. L. 203 (1997), Steven J. Forte

UIC John Marshall Journal of Information Technology & Privacy Law

Federal intervention is necessary to grant states the authority to collect state sales and use tax from Internet vendors who sell goods within their boundaries but reside elsewhere. With such federal intervention, local retailers, who must charge state use and sales tax to their customers, can compete more fairly with Internet vendors. In addition, state governments can access a large and growing revenue source. Under the Commerce Clause of the United States Constitution, a vendor must have a physical presence on a state before a state can require the vendor to collect and remit sales and use tax. In addition, …


Doctors, Aids, And Confidentiality In The 1990s, 27 J. Marshall L. Rev. 331 (1994), Sheila Taub Jan 1995

Doctors, Aids, And Confidentiality In The 1990s, 27 J. Marshall L. Rev. 331 (1994), Sheila Taub

UIC Law Review

No abstract provided.


If I Tell You, Will You Treat Me, 27 J. Marshall L. Rev. 363 (1994), Mauro A. Montoya Jr. Jan 1995

If I Tell You, Will You Treat Me, 27 J. Marshall L. Rev. 363 (1994), Mauro A. Montoya Jr.

UIC Law Review

No abstract provided.


The Conflict Between Illinois Rule 1.6(B) And The Aids Confidentiality Act, 25 J. Marshall L. Rev. 727 (1992), Scott H. Isaacman Jan 1992

The Conflict Between Illinois Rule 1.6(B) And The Aids Confidentiality Act, 25 J. Marshall L. Rev. 727 (1992), Scott H. Isaacman

UIC Law Review

No abstract provided.


Florida Star V. B.J.F.: The Rape Of The Right To Privacy, 23 J. Marshall L. Rev. 731 (1990), Barbara Lynn Pedersen Jan 1990

Florida Star V. B.J.F.: The Rape Of The Right To Privacy, 23 J. Marshall L. Rev. 731 (1990), Barbara Lynn Pedersen

UIC Law Review

No abstract provided.


New York V. Sullivan: Shhh .... Don't Say The A Word - Another Outcome-Oriented Abortion Decision, 23 J. Marshall L. Rev. 753 (1990), Christopher C. Kendall Jan 1990

New York V. Sullivan: Shhh .... Don't Say The A Word - Another Outcome-Oriented Abortion Decision, 23 J. Marshall L. Rev. 753 (1990), Christopher C. Kendall

UIC Law Review

No abstract provided.


Lovgren V. Citizens First National Bank: Illinois Recognizes The False Light Invasion Of Privacy Tort, 22 J. Marshall L. Rev. 943 (1989), F. John Steffen Jan 1989

Lovgren V. Citizens First National Bank: Illinois Recognizes The False Light Invasion Of Privacy Tort, 22 J. Marshall L. Rev. 943 (1989), F. John Steffen

UIC Law Review

No abstract provided.


The Intentional Creation Of Fetal Tissue For Transplants: The Womb As A Fetus Farm, 21 J. Marshall L. Rev. 853 (1988), James David Roberts Jan 1988

The Intentional Creation Of Fetal Tissue For Transplants: The Womb As A Fetus Farm, 21 J. Marshall L. Rev. 853 (1988), James David Roberts

UIC Law Review

No abstract provided.


Eavesdropping Regulation In Illinois, 21 J. Marshall L. Rev. 251 (1988), Scott O. Reed Jan 1988

Eavesdropping Regulation In Illinois, 21 J. Marshall L. Rev. 251 (1988), Scott O. Reed

UIC Law Review

No abstract provided.


Griffin V. Wisconsin Warrantless Probation Searches - Do The State's Needs Warrant Such Strict Measures, 21 J. Marshall L. Rev. 921 (1988), William Blake Weiler Jan 1988

Griffin V. Wisconsin Warrantless Probation Searches - Do The State's Needs Warrant Such Strict Measures, 21 J. Marshall L. Rev. 921 (1988), William Blake Weiler

UIC Law Review

No abstract provided.


Aids: Testing Democracy - Irrational Responses To The Public Health Crisis And The Need For Privacy In Serologic Testing, 19 J. Marshall L. Rev. 835 (1986), Michael L. Closen, Susan Marie Connor, Howard L. Kaufman, Mark E. Wojcik Jan 1986

Aids: Testing Democracy - Irrational Responses To The Public Health Crisis And The Need For Privacy In Serologic Testing, 19 J. Marshall L. Rev. 835 (1986), Michael L. Closen, Susan Marie Connor, Howard L. Kaufman, Mark E. Wojcik

UIC Law Review

No abstract provided.


Douglass V. Hustler Magazine, Inc.: Anatomy Of Privacy For A Public Figure In Illinois, 19 J. Marshall L. Rev. 1053 (1986), Howard L. Teplinsky Jan 1986

Douglass V. Hustler Magazine, Inc.: Anatomy Of Privacy For A Public Figure In Illinois, 19 J. Marshall L. Rev. 1053 (1986), Howard L. Teplinsky

UIC Law Review

No abstract provided.


State V. Delaurier: Privacy Rights And Cordless Telephones - The Fourth Amendment Is Put On Hold, 19 J. Marshall L. Rev. 1087 (1986), Donald Battaglia Jan 1986

State V. Delaurier: Privacy Rights And Cordless Telephones - The Fourth Amendment Is Put On Hold, 19 J. Marshall L. Rev. 1087 (1986), Donald Battaglia

UIC Law Review

No abstract provided.