Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Law
Rethinking The Process Of Service Of Process, Mary K. Bonilla
Rethinking The Process Of Service Of Process, Mary K. Bonilla
St. Mary's Law Journal
Even as technology evolves, the Federal Rules of Civil Procedure, specifically Federal Rule 4, remains stagnate without a mechanism directly providing for electronic service of process in federal courts. Rule 4(e)(1) allows service through the use of state law—consequently permitting any state-approved electronic service methods—so long as the federal court where proceedings will occur, or the place where service is made, is located within the state supplying the law. Accordingly, this Comment explains that Rule 4 indirectly permits electronic service of process in some states, but not others, despite all 50 states utilizing the same federal court system. With states …
Hearsay In The Smiley Face: Analyzing The Use Of Emojis As Evidence, Erin Janssen
Hearsay In The Smiley Face: Analyzing The Use Of Emojis As Evidence, Erin Janssen
St. Mary's Law Journal
Abstract forthcoming
Network Investigation Techniques: Government Hacking And The Need For Adjustment In The Third-Party Doctrine, Eduardo R. Mendoza
Network Investigation Techniques: Government Hacking And The Need For Adjustment In The Third-Party Doctrine, Eduardo R. Mendoza
St. Mary's Law Journal
Modern society is largely dependent on technology, and legal discovery is no longer limited to hard-copy, tangible documents. The clash of technology and the law is an exciting, yet dangerous phenomena; dangerous because our justice system desperately needs technological progress. The clash between scientific advancement and the search for truth has recently taken an interesting form—government hacking. The United States Government has increasingly used Network Investigation Techniques (NITs) to target suspects in criminal investigations. NITs operate by identifying suspects who have taken affirmative steps to conceal their identity while browsing the Internet. The hacking technique has become especially useful to …