Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- UIC School of Law (27)
- University of Richmond (18)
- Duke Law (6)
- Maurer School of Law: Indiana University (2)
- Northwestern Pritzker School of Law (2)
-
- Seattle University School of Law (2)
- Selected Works (2)
- University of Baltimore Law (2)
- University of Washington School of Law (2)
- Boston University School of Law (1)
- Brigham Young University Law School (1)
- Chicago-Kent College of Law (1)
- Columbia Law School (1)
- Florida International University College of Law (1)
- Schulich School of Law, Dalhousie University (1)
- The Catholic University of America, Columbus School of Law (1)
- University of Florida Levin College of Law (1)
- University of Kentucky (1)
- University of Michigan Law School (1)
- University of Pennsylvania Carey Law School (1)
- University of San Diego (1)
- University of Tulsa College of Law (1)
- Keyword
-
- UCITA (13)
- CyberCrime (6)
- Uniform Computer Information Transactions Act (6)
- Internet (5)
- Cyberspace (4)
-
- NCCUSL (4)
- Uniform Commercial Code (4)
- Copyright Act (3)
- UCC (3)
- UETA (3)
- Antitrust (2)
- Computer Information (2)
- E-Commerce (2)
- E-commerce (2)
- JCOTS (2)
- Jurisdiction (2)
- Law and Technology (2)
- Microsoft (2)
- Monopoly (2)
- National Conference of Commissioners on Uniform State Laws (2)
- ABA (1)
- AHCPR (1)
- ALI (1)
- ARPANET (1)
- Agency for Health Care Policy & Research (1)
- Alumni Advisory Board (1)
- American Bar Association (1)
- American Law Institute (1)
- Andresen v. Maryland (1)
- Antitrust Law (1)
- Publication
-
- UIC John Marshall Journal of Information Technology & Privacy Law (20)
- Richmond Journal of Law & Technology (18)
- Duke Law & Technology Review (6)
- All Faculty Scholarship (4)
- UIC Law Review (4)
-
- Articles (3)
- UIC Law Open Access Faculty Scholarship (3)
- Articles by Maurer Faculty (2)
- Faculty Scholarship (2)
- Northwestern Journal of International Law & Business (2)
- Seattle University Law Review (2)
- Alfred C. Yen (1)
- Articles, Chapters in Books and Other Contributions to Scholarly Works (1)
- BYU Law Review (1)
- Canadian Journal of Law and Technology (1)
- Continuing Legal Education Materials (1)
- Faculty Publications (1)
- Ivo Teixeira Gico Jr. (1)
- San Diego Law Review (1)
- Scholarly Articles (1)
- UF Law Faculty Publications (1)
- Publication Type
Articles 1 - 30 of 76
Full-Text Articles in Law
Policing Online Pharmacies: Bioterrorism Meets The War On Drugs, Mark Sweet
Policing Online Pharmacies: Bioterrorism Meets The War On Drugs, Mark Sweet
Duke Law & Technology Review
In light of the recent terrorists attacks and the increasing threat of bioterrorism, many U.S. citizens have turned to the Internet in an attempt to gather the supplies needed to protect them and their loved ones. Central to the effort is the increased purchasing of prescription drugs over the Internet. This iBrief explores the benefits and risks to consumers from buying drugs online, and examines recent initiatives to police the online pharmacy industry.
Why Are We So Reluctant To "Execute" Microsoft?, Robert H. Lande
Why Are We So Reluctant To "Execute" Microsoft?, Robert H. Lande
All Faculty Scholarship
On June 28, 2001, the D.C. Court of Appeals held that Microsoft has violated the antitrust laws repeatedly, relentlessly, and over a multi-year period. The court ruled eight separate times that Microsoft engaged in conduct that illegally maintained its monopoly in PC operating systems. Despite these strongly worded conclusions concerning Microsoft’s liability, the court was extremely cautious when it considered whether to break up the company. It held that divestiture was a “radical” remedy that should be imposed with “great caution.”
Liberty For Security, Morgan Streetman
Liberty For Security, Morgan Streetman
Duke Law & Technology Review
On 11 September 2001, we collectively endured the worst tragedy to touch American soil since the Civil War. In the wake of this horrible event, a national hysteria erupted. People are anxious to restore the lost security; but at what cost? Many Americans seem not to care about the costs, and national polls show that now, more than ever, Americans are willing to trade their precious civil liberties in an attempt to restore security. As the ACLU has stated these are difficult days. Not only are they difficult, they will define the future of America. This iBrief explores the reactions …
The Perfect Caper?: Private Damages And The Microsoft Case, Robert H. Lande, James Langenfeld
The Perfect Caper?: Private Damages And The Microsoft Case, Robert H. Lande, James Langenfeld
All Faculty Scholarship
As readers of crime novels know, there are many definitions of the perfect caper. Under most, the perpetrator gets to keep its ill-gotten gains and goes unpunished. Even if the perpetrator is arrested and brought to trial, he or she still typically escapes punishment completely due to a variety of unusual circumstances. This is essentially what Professors John E. Lopatka and William H. Page are arguing about Microsoft's actions. They assert that even though Microsoft has violated the antitrust laws, it will not be made to pay for its anticompetitive conduct, at least not by private plaintiffs.
Tax Competition And E-Commerce, Reuven S. Avi-Yonah
Tax Competition And E-Commerce, Reuven S. Avi-Yonah
Articles
In the last four years, there has been increasing concern by developed countries about the potential erosion of the corporate income tax base by "harmful tax competition" (in the European Union since 1997, in the OECD since 1998). However, the data on tax competition available to date present a mixed and somewhat puzzling picture. On the one hand, there is considerable evidence that effective corporate income tax rates in many countries have been declining, and that the worldwide effective tax rates on multinational enterprises (MNEs) have been going down as well. On the other hand, macroeconomic data from developed countries …
Protecting Against International Infringements In The Digital Age Using United States Copyright Law: A Critical Analysis Of The Current State Of The Law, Brandon Dalling
Protecting Against International Infringements In The Digital Age Using United States Copyright Law: A Critical Analysis Of The Current State Of The Law, Brandon Dalling
BYU Law Review
No abstract provided.
Carnivore: Will It Devour Your Privacy?, Joseph Goodman, Angela Murphy, Morgan Streetman, Mark Sweet
Carnivore: Will It Devour Your Privacy?, Joseph Goodman, Angela Murphy, Morgan Streetman, Mark Sweet
Duke Law & Technology Review
Perhaps you have written an e-mail that looks something like this:
Virtual Las Vegas: Regulate Or Prohibit?, Cara Franklin
Virtual Las Vegas: Regulate Or Prohibit?, Cara Franklin
Duke Law & Technology Review
With online gambling becoming increasingly accessible and popular, state and federal politicians are asking themselves how to make the prohibition on online gambling effective. Nevertheless, questions still linger as to whether outright prohibition is truly the right answer.
Trusting And Non-Trusting On The Internet Symposium: Trust Relationships, Tamar Frankel
Trusting And Non-Trusting On The Internet Symposium: Trust Relationships, Tamar Frankel
Faculty Scholarship
The Puzzle: The Internet is a wonderful innovation, allowing people around the world to communicate, trade, and obtain services. Convenient and rich in choices and opportunities, the Internet is tremendously attractive to buyers. Naturally, businesses are flocking to the Internet. The warning has been sounded that those who do not stake a claim in this incredible new communication medium will be left behind to perish. Yet, with all the enthusiasm, many buyers hesitate to take a serious plunge. Businesses are told repeatedly that they must obtain their customers' trust, yet find it more difficult to gain this trust in cyberspace …
Internet Regulation And Consumer Welfare: Innovation, Speculation, And Cable Bundling, John E. Lopatka, William H. Page
Internet Regulation And Consumer Welfare: Innovation, Speculation, And Cable Bundling, John E. Lopatka, William H. Page
UF Law Faculty Publications
The goal of telecommunications policy has shifted from the control of natural monopoly to the promotion of competition. But the question remains how extensive and persistent the government's regulatory role should be in the operation of communications markets. One might think that regulators could find the answer to this question in antitrust law. But antitrust has itself been torn between interventionist and laissez-faire tendencies. Over the past two decades, the dominant Chicago School approach to antitrust has focused on economic efficiency, a standard that has led to the abandonment or contraction of some categories of liability. More recently, however, post-Chicago …
Can You Yahoo!? The Internet’S Digital Fences, Brendon Fowler, Cara Franklin, Bob Hyde
Can You Yahoo!? The Internet’S Digital Fences, Brendon Fowler, Cara Franklin, Bob Hyde
Duke Law & Technology Review
The Yahoo! auction case illustrates the problems inherent in the lack of a common Internet jurisdictional structure. This iBrief argues that the application of local law allowed France to win a victory against domestic hate groups, but dealt a blow to free speech everywhere.
3rd Annual Computer & Technology Law Institute, Office Of Continuing Legal Education At The University Of Kentucky College Of Law
3rd Annual Computer & Technology Law Institute, Office Of Continuing Legal Education At The University Of Kentucky College Of Law
Continuing Legal Education Materials
Materials from the 3rd Annual Computer & Technology Law Institute held by UK/CLE in March 2001.
Internet Securities Fraud: Old Trick, New Medium, Brendon Fowler, Cara Franklin, Robert Hyde
Internet Securities Fraud: Old Trick, New Medium, Brendon Fowler, Cara Franklin, Robert Hyde
Duke Law & Technology Review
Billions of securities are traded every day in public and private markets around the world. This practice is hundreds of years old and as long as securities have been traded, someone has tried to defraud the system to make a quick buck. With the advent of the Internet, new securities fraud schemes have appeared.
Juries And Technology: Equipping Jurors For The Twenty-First Century (Symposium), Nancy S. Marder
Juries And Technology: Equipping Jurors For The Twenty-First Century (Symposium), Nancy S. Marder
All Faculty Scholarship
No abstract provided.
An Overview Of The Virginia Ucita, Carlyle C. Ring Jr.
An Overview Of The Virginia Ucita, Carlyle C. Ring Jr.
Richmond Journal of Law & Technology
Virginia has taken a strong and important leadership in establishing rules for the Information Highway through the Joint Committee on Technology and Science (JCOTS) and Delegate Joe T. May. Without the Uniform Computer Information Transactions Act (UCITA) no established rules exist in common law for the Information Highway, which means that each judge must create the rules in each case as it arises. Every judge will make his own rules for the particular case. This results in great inconsistency and uncertainty adversely affecting the realization of the full potential of the Information Age economy. Governor Gilmore states: In 2000, Virginia …
Remarks On Technology Growth In Virginia: How Ucita Will Help, Terry Riley
Remarks On Technology Growth In Virginia: How Ucita Will Help, Terry Riley
Richmond Journal of Law & Technology
I'm Terry Riley from the Hampton Roads Technology Council, and technology councils represent business. But predominantly we represent small business, and predominantly we represent users of software, not developers and sellers of software. In the case of my own technology council down [in the] southeastern part of the state, 85 percent of our members have 25 or fewer employees. Less than 5 percent of our members are developers, sellers, or licensors of software. So to a very substantial extent my views and my representations of the interests of my membership have to do with their concerns or their rights as …
State Cybercrime Legislation In The United States Of America: A Survey, Susan W. Brenner
State Cybercrime Legislation In The United States Of America: A Survey, Susan W. Brenner
Richmond Journal of Law & Technology
In the United States, cybercrimes are the focus of legislation adopted at both the state and federal levels. The U.S. Constitution allocates lawmaking authority between the two levels according to certain principles, one of which is that even when federal jurisdiction to legislate exists, federal legislation is appropriate only when federal intervention is required. And while federal legislative authority can pre-empt the states' ability to legislate in a given area, it rarely does, so it is not unusual for federal criminal laws to overlap with state prohibitions that address essentially the same issues.
United States V. Keystone Sanitation Company: E-Mail And The Attorney-Client Privilege, Karen M. Coon
United States V. Keystone Sanitation Company: E-Mail And The Attorney-Client Privilege, Karen M. Coon
Richmond Journal of Law & Technology
The rapid growth and sophistication of technology have changed the way people communicate. E-mail and the Internet have begun to affect the way attorneys communicate with their clients. E-mail is fast and convenient, but it is not without risks. The risk of illegal interception and the risk of inadvertent disclosure are serious issues that attorneys need to be aware of and try to prevent so that the attorney-client privilege is protected as much as possible. Although communicating with a client by e-mail may be risky, the risks posed by e-mail are no different from those posed by communicating by postal …
Internet Jurisdiction Today, Adria Allen
Internet Jurisdiction Today, Adria Allen
Northwestern Journal of International Law & Business
This paper will use the Yahoo case to illustrate the unique jurisdictional dilemma posed by the Internet as countries try to enforce their laws in an era when laws may be broken, through the use of the Internet, from other countries with conflicting laws.' Part I of this paper will address the Yahoo case and its importance to Internet jurisdiction. Part II will explore traditional jurisdiction and apply it to the Yahoo case. Part III will identify twopotential theories of Internet jurisdiction and investigate whether they are feasible solutions to the problem posed by the Yahoo case. Part IV will …
A Roundtable Discussion With Lawrence Lessig, David G. Post & Jeffrey Rosen, Thomas E. Baker
A Roundtable Discussion With Lawrence Lessig, David G. Post & Jeffrey Rosen, Thomas E. Baker
Faculty Publications
This article is a transcript of a discussion between Lawrence Lessig, David G. Post and Jeffrey Rosen on a variety of issues surrounding law, technology and the Internet. The moderator was Thomas E. Baker and the discussion was part of a Drake University Law School symposium in February of 2001.
Judicial Review Of Icann Domain Name Dispute Decisions, 18 Santa Clara Computer & High Tech. L.J. 35 (2001), David E. Sorkin
Judicial Review Of Icann Domain Name Dispute Decisions, 18 Santa Clara Computer & High Tech. L.J. 35 (2001), David E. Sorkin
UIC Law Open Access Faculty Scholarship
No abstract provided.
Payment Methods For Consumer-To-Consumer Online Transactions, 35 Akron L. Rev. 1 (2001), David E. Sorkin
Payment Methods For Consumer-To-Consumer Online Transactions, 35 Akron L. Rev. 1 (2001), David E. Sorkin
UIC Law Open Access Faculty Scholarship
No abstract provided.
Technical And Legal Approaches To Unsolicited Electronic Mail, 35 U.S.F. L. Rev. 325 (2001), David E. Sorkin
Technical And Legal Approaches To Unsolicited Electronic Mail, 35 U.S.F. L. Rev. 325 (2001), David E. Sorkin
UIC Law Open Access Faculty Scholarship
No abstract provided.
Internet Web Site Jurisdiction, 20 J. Marshall J. Computer & Info. L. 21 (2001), Richard A. Bales, Suzanne Van Wert
Internet Web Site Jurisdiction, 20 J. Marshall J. Computer & Info. L. 21 (2001), Richard A. Bales, Suzanne Van Wert
UIC John Marshall Journal of Information Technology & Privacy Law
The Internet is here to stay. Consequently, disputes in this cyberspace are heard in courts nationwide, and one of the most fundamental litigation questions is the personal jurisdiction. In this article, the authors discuss the difficulties courts have in defining the degree of interaction between the Web site operator and online users. The authors first discuss the background of how courts tackle the personal jurisdiction issue. Then, as the society leaps into the cyberspace, authors analyze how this great development in technology and communications creates challenges to courts in grounding personal jurisdictional issues. By going through case analyses, authors show …
Self-Prescribing Medication: Regulating Prescription Drug Sales On The Internet, 20 J. Marshall J. Computer & Info. L. 57 (2001), Kristin Yoo
UIC John Marshall Journal of Information Technology & Privacy Law
"Online pharmacies, your friendly neighborhood drugstores." The Internet is not only a great telecommunication medium but also a low-cost and convenient commercial marketplace. It is no exception that online pharmacies flourished as a result, but the consequences of such development pose grave danger to the public and great challenges to regulations. The author discusses the benefits and risk of online pharmacies, the different types of online pharmacies, state governments' involvement in regulating online prescriptions and federal involvements. Despite both state and federal legislations and regulations, proliferation of online pharmacies, established inside and outside of the US, proves to be a …
The Electronic Communications Privacy Act: Does The Answer To The Internet Information Privacy Problem Lie In A Fifteen Year Old Federal Statute? A Detailed Analysis, 20 J. Marshall J. Computer & Info. L. 1 (2001), Henry M. Cooper
UIC John Marshall Journal of Information Technology & Privacy Law
In 1986, Congress enacted the Electronic Communications Privacy Act ("ECPA") to update and clarify federal privacy protections and standards in light of changes in new technologies. Since, then, however, the Internet has grown immensely and this article discusses whether a new federal legislation is needed to meet the challenge. The author starts his analysis by defining what is "information privacy right." Then, he discusses how this right is been used and misused on the Internet. Following such definition, he discussed the ECPA Title II in detail. He analyses provisions of the ECPA, including section 2701, the definition of "access," sections …
2001 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 20 J. Marshall J. Computer & Info. L. 91 (2001), Ryan Alexander, Robert S. Gurwin, Dominick Lanzito, Nicole D. Milos, Bridget O'Neill
2001 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 20 J. Marshall J. Computer & Info. L. 91 (2001), Ryan Alexander, Robert S. Gurwin, Dominick Lanzito, Nicole D. Milos, Bridget O'Neill
UIC John Marshall Journal of Information Technology & Privacy Law
In this bench memo, the Supreme Court of the state of Marshall is asked to decide whether the actions of defendant, Marshall Manatees, evidence a theory of false light invasion of privacy as defined by the Restatement (Second) of Torts and whether defendant's actions of comparing the digital photographic images collected at the Marshall Center to their database and ultimately posting plaintiff's photo on its billboard constituted an actionable claim for misappropriation. Plaintiff, Allen Sanders, attended a professional basketball game where the Marshall Manatees were hosting an opposing team at the Marshall Center. He purchased the ticket online and received …
2001 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 20 J. Marshall J. Computer & Info. L. 109 (2001), Gregory Brady, Steven Brooks, Christian Sullivan
2001 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 20 J. Marshall J. Computer & Info. L. 109 (2001), Gregory Brady, Steven Brooks, Christian Sullivan
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
2001 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 20 J. Marshall J. Computer & Info. L. 151 (2001), Courtney Scantlin, Mekisha Walker, Warren Clint Wells
2001 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 20 J. Marshall J. Computer & Info. L. 151 (2001), Courtney Scantlin, Mekisha Walker, Warren Clint Wells
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Consequential Damages Exclusions Under Ucita, 19 J. Marshall J. Computer & Info. L. 295 (2001), Douglas E. Phillips
Consequential Damages Exclusions Under Ucita, 19 J. Marshall J. Computer & Info. L. 295 (2001), Douglas E. Phillips
UIC John Marshall Journal of Information Technology & Privacy Law
The Uniform Computer Information Transactions Act ("UCITA") elicits both love and hate, but decision time is here. Two states have enacted UCITA, several others are considering it, and UCITA choice-of-law clauses are already beginning to appear in software license agreements and other computer information contracts. This article focuses on how UCITA affects a pivotal issue: enforceability of contract clauses that exclude consequential damages. Losses from software development gone awry often far exceed the customer's investment and the developer's return. Under the Uniform Commercial Code, questions remain about the enforceability in certain circumstances of consequential damages exclusions. UCITA answers these questions …