Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Law

Cover Letter, Catherine Meade Gray Jan 2015

Cover Letter, Catherine Meade Gray

Richmond Journal of Law & Technology

The Richmond Journal of Law and Technology is proud to present its third issue of the Twenty-First Volume, our Annual Survey. This issue is published in conjunction with JOLT’s Symposium, “Who’s Looking At Your Mobile Device? Data Security, Personal Privacy, and Information Governance in the Wireless World.” As one of the leading publications in the legal technology field, JOLT has the privilege of publishing articles that address topics at the forefront of the law. From the Journal’s inception in 1995, JOLT has strived to be a step ahead of these laws in an effort to help shape the …


An Uneasy Balance: Personal Information And Crowdfunding Under The Jobs Act, Brice Kindred Jan 2015

An Uneasy Balance: Personal Information And Crowdfunding Under The Jobs Act, Brice Kindred

Richmond Journal of Law & Technology

“Crowdfunding” is the raising of small amounts of money from many different sources for a particular purpose. Today, this usually takes place online.2 Crowdfunding has become a popular means of raising funds for a wide variety of projects, causes, and business ventures. Websites like Kickstarter, Indiegogo, and Crowdfunder allow people to create a profile for their project and solicit contributions from the general public in support.


Cover Letter, Laura M. Bedson Jan 2015

Cover Letter, Laura M. Bedson

Richmond Journal of Law & Technology

The Richmond Journal of Law and Technology is proud to present its second issue of the Twenty-First Volume. As one of the leading publications in the legal technology field, JOLT has the privilege of publishing articles that address topics at the forefront of the law. From the Journal’s inception in 1995, JOLT has strived to be a step ahead of these laws in an effort to help shape the emerging legal landscape. Additionally, JOLT recognizes the practical benefit that many of its articles have on legal professionals and we publish articles with this goal in mind. The following articles …


Kill The Dinosaurs, And Other Tips For Achieving Technical Competence In Your Law Practice, Antigone Peyton Jan 2015

Kill The Dinosaurs, And Other Tips For Achieving Technical Competence In Your Law Practice, Antigone Peyton

Richmond Journal of Law & Technology

It is a challenge to practice law in the digital age. This is particularly true when a practice involves significant e-Discovery, Intellectual Property, and technology law—areas in which technical issues merge with legal ones. One of the major challenges of bringing a law practice up to twenty-first-century standards relates to dinosaur thoughts, a.k.a. an “old ways are best” mentality.


Cover Letter, Laura M. Bedson Jan 2015

Cover Letter, Laura M. Bedson

Richmond Journal of Law & Technology

The Richmond Journal of Law and Technology is proud to present its fourth and final issue of the Twenty-First Volume. At its inception in 1995 JOLT became the first law review to be published exclusively online. From this moment on, the Journal has continued to set trends in the legal scholarship world. As one of the leading publications in the legal technology field, JOLT has the privilege of publishing articles that address topics at the forefront of the law. The articles in this fourth issue are no exception. Each of the following articles present exciting discussions on cutting-edge areas of …


Welcome To The Machine: Privacy And Workplace Implications Of Predictive Analytics, Robert Sprague Jan 2015

Welcome To The Machine: Privacy And Workplace Implications Of Predictive Analytics, Robert Sprague

Richmond Journal of Law & Technology

Privacy is not simply an absence of information about us in the minds of others; rather it is the control we have over information about ourselves. The volume of information that people create themselves—the full range of communications from voice calls, e-mails and texts to uploaded pictures, video, and music—pales in comparison to the amount of digital information created about them each day.


Commercial Drones And Privacy: Can We Trust States With ‘Drone Federalism’?, Robert H. Gruber Jan 2015

Commercial Drones And Privacy: Can We Trust States With ‘Drone Federalism’?, Robert H. Gruber

Richmond Journal of Law & Technology

Judge Andrew Napolitano said recently of unmanned aircraft systems (“UAS”), or “drones,” that “[t]he first American patriot that shoots down one of these drones that comes too close to his children in his backyard will be an American hero.”


Mlat Jiu-Jitsu And Tor: Mutual Legal Assistance Treaties In Surveillance, Sarah Cortes Jan 2015

Mlat Jiu-Jitsu And Tor: Mutual Legal Assistance Treaties In Surveillance, Sarah Cortes

Richmond Journal of Law & Technology

A corrupt Australian Law Enforcement Agency (LEA) wishes to track the communications of a journalist who has published leaked whistleblowing documents from a confidential source, revealing the Australian LEA's complicity in illegal narcotics activity. The target journalist lives in New York and is a U.S. citizen. She opens her laptop, goes online and fires up Tor Browser. She is communicating with her whistleblowing source in Australia, who faces death if his identity is uncovered. Her communication and network traffic passes through Tor relays in Canada, Finland, and Malaysia before arriving at her source in Australia.


The Big Data Collection Problem Of Little Mobile Devices, Michael Arnold, Dennis R. Kiker Jan 2015

The Big Data Collection Problem Of Little Mobile Devices, Michael Arnold, Dennis R. Kiker

Richmond Journal of Law & Technology

There should be little question that mobile device-based data are discoverable if relevant. However, as was the case with ordinary computer-based data a decade or more ago, there is a tendency to believe that there is only one way to collect such data—“forensically.”


Wherever You Go, There You Are (With Your Mobile Device): Privacy Risks And Legal Complexities Associated With International ‘Bring Your Own Device’ Programs, Melinda L. Mclellan, James A. Sherer, Emily R. Fedeles Jan 2015

Wherever You Go, There You Are (With Your Mobile Device): Privacy Risks And Legal Complexities Associated With International ‘Bring Your Own Device’ Programs, Melinda L. Mclellan, James A. Sherer, Emily R. Fedeles

Richmond Journal of Law & Technology

The cross-use of mobile devices for personal and professional purposes—commonly referred to as “Bring Your Own Device” or “BYOD” for short—has created a new backdrop for doing business that was scarcely imaginable even ten years ago.