Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 25 of 25

Full-Text Articles in Law

Can A Person's "Slate" Ever Really Be "Cleaned"? The Modern-Day Implications Of Pennsylvania's Clean Slate Act, Kimberly E. Capuder Apr 2021

Can A Person's "Slate" Ever Really Be "Cleaned"? The Modern-Day Implications Of Pennsylvania's Clean Slate Act, Kimberly E. Capuder

St. John's Law Review

(Exceprt)

In 2006, Khalia was arrested for a “low-level counterfeiting charge.” While Khalia was innocent and never convicted for the charged offense, she still had a criminal record. Because she was concerned that future employers would “view her as a thief,” she never applied to any of her dream jobs. But once Khalia’s arrest record was automatically sealed, she finally had enough confidence to send in a job application to a prestigious consulting firm, and was offered the position. Khalia believes that her newly sealed criminal record “means a future without judgment.” And this future without judgment was made possible …


Protection Of Criminal Offences To Face New Ethical Legislation In Jordan And United Arab Emirates Mar 2021

Protection Of Criminal Offences To Face New Ethical Legislation In Jordan And United Arab Emirates

UAEU Law Journal

It is said that 'honor' is the most precious of all things to human, and that without it the life itself becomes undignified especially for societies who give too much of a weight to this matter such as the Islamic Arabian societies.

The world has recently witnessed massive changes in the way of life that has produced a variety of new crimes and criminal techniques which gravely scratches the person's honor. These had specific adverse consequences on the Arabic societies, since this part of the world has become easily connected to the rest of the liberal countries within the concept …


Formation And Development Of The Prosecutor's Supervision Over The Compliance Of Laws In Investigation Of Crimes In The Sphere Of Information Technologies, Atobek Ravshanovich Davronov, Atobek Davronov Feb 2021

Formation And Development Of The Prosecutor's Supervision Over The Compliance Of Laws In Investigation Of Crimes In The Sphere Of Information Technologies, Atobek Ravshanovich Davronov, Atobek Davronov

ProAcademy

The rapid growth of information technologies naturally determines the interest of researchers in them from various fields of science. Law, including criminal law, is no exception. Currently: a separate branch of law is being formed - information law. Despite this, until now in science unified approaches to the analysis of information and legal phenomena have not been developed. The article analyzes the formation and development of prosecutorial supervision over the execution of laws in the investigation of crimes in the field of information technology, and also studied the process of the emergence of information technology as a type of crime …


The Internet Never Forgets: A Federal Solution To The Dissemination Of Nonconsensual Pornography, Alexis Santiago Jan 2020

The Internet Never Forgets: A Federal Solution To The Dissemination Of Nonconsensual Pornography, Alexis Santiago

Seattle University Law Review

As technology evolves, new outlets for interpersonal conflict and crime evolve with it. The law is notorious for its inability to keep pace with this evolution. This Comment focuses on one area that the law urgently needs to regulate—the dissemination of “revenge porn,” otherwise known as nonconsensual pornography. Currently, no federal law exists in the U.S. that criminalizes the dissemination of nonconsensual pornography. Most U.S. states have criminalized the offense, but with vastly different degrees of severity, resulting in legal inconsistencies and jurisdictional conflicts. This Comment proposes a federal solution to the dissemination of nonconsensual pornography that carefully balances the …


Critical Reviews Of Flawed Research On Prostitution, Donna M. Hughes Nov 2019

Critical Reviews Of Flawed Research On Prostitution, Donna M. Hughes

Dignity: A Journal of Analysis of Exploitation and Violence

No abstract provided.


Web Of Lives: How Regulating The Dark Web Can Combat Online Human Trafficking, Christopher Campbell Jun 2019

Web Of Lives: How Regulating The Dark Web Can Combat Online Human Trafficking, Christopher Campbell

Journal of the National Association of Administrative Law Judiciary

This article argues that one of the ways to appropriately fight online human trafficking is through governmental regulation of the Dark Web. Specifically, this article argues that a new Attaching Criminal Dark Web Statute is the best method to combat human trafficking because it can incentivize prosecutors to use current human trafficking statutes to prosecute traffickers. This proposal can deter traffickers from enslaving people. Additionally, this article shows the evolution of online human trafficking laws, investigation, and prosecution (Section II); demonstrates why current and proposed laws do not effectively address the online human trafficking issue (Sections III and IV); introduces …


Amend The Communications Decency Act To Protect Victims Of Sexual Exploitation, Samantha Vardaman Jul 2017

Amend The Communications Decency Act To Protect Victims Of Sexual Exploitation, Samantha Vardaman

Dignity: A Journal of Analysis of Exploitation and Violence

No abstract provided.


The Freedom From Sexploitation Agenda: Policy And Legislative Recommendations To Curb Sexual Exploitation, Dawn Hawkins Jul 2017

The Freedom From Sexploitation Agenda: Policy And Legislative Recommendations To Curb Sexual Exploitation, Dawn Hawkins

Dignity: A Journal of Analysis of Exploitation and Violence

No abstract provided.


It Can't Wait: Exposing The Connections Between Forms Of Sexual Exploitation, Dawn Hawkins Jul 2017

It Can't Wait: Exposing The Connections Between Forms Of Sexual Exploitation, Dawn Hawkins

Dignity: A Journal of Analysis of Exploitation and Violence

No abstract provided.


Denial Of Harm: Sex Trafficking, Backpage, And Free Speech Absolutism, Jody Raphael Mar 2017

Denial Of Harm: Sex Trafficking, Backpage, And Free Speech Absolutism, Jody Raphael

Dignity: A Journal of Analysis of Exploitation and Violence

No abstract provided.


Fighting Back Against Revenge Porn: A Legislative Solution, Alex Jacobs Dec 2016

Fighting Back Against Revenge Porn: A Legislative Solution, Alex Jacobs

Northwestern Journal of Law & Social Policy

No abstract provided.


Prosecuting Online Threats After Elonis, Michael Pierce Jun 2016

Prosecuting Online Threats After Elonis, Michael Pierce

Northwestern University Law Review

In Elonis v. United States, decided last term, the Supreme Court vacated a conviction for online threats on the ground that the lower court erred in its instructions to the jury regarding mens rea. In doing so, however, the Court declined to articulate which mens rea standard would have sustained a conviction. It is thus currently uncertain which mens rea the government must prove when prosecuting online threats under 18 U.S.C. § 875(c). The Elonis Court discussed three potential mens rea standards; as universal standards for online threats, each leaves something to be desired. Fortunately, federal courts need not …


The Incitement Of Terrorism On The Internet: Legal Standards, Enforcement, And The Role Of The European Union, Ezekiel Rediker Apr 2015

The Incitement Of Terrorism On The Internet: Legal Standards, Enforcement, And The Role Of The European Union, Ezekiel Rediker

Michigan Journal of International Law

Consider this sentence: “The Shining Path is a heroic organization.” Over the past thirty years, the Shining Path has waged a violent guerilla war against the Peruvian government, prompting the European Union to designate the group as a terrorist organization. In certain European countries, speech inciting or glorifying terrorist organizations is criminalized. As a result, citizens risk prosecution if they do not carefully limit what they say about the Shining Path, or other terrorist organizations. But where does free speech end and incitement to terrorism begin? The debate over free speech and incitement to terrorism is actively being played out …


Let's Reinvent The Wheel: The Internet As A Means Of Interstate Commerce In United States V. Kieffer, Valeria G. Luster Jan 2015

Let's Reinvent The Wheel: The Internet As A Means Of Interstate Commerce In United States V. Kieffer, Valeria G. Luster

Oklahoma Law Review

No abstract provided.


The Communication Decency Act Gone Wild: A Case For Renewing The Presumption Against Preemption, Ryan J.P. Dyer Mar 2014

The Communication Decency Act Gone Wild: A Case For Renewing The Presumption Against Preemption, Ryan J.P. Dyer

Seattle University Law Review

Since its inception, the Internet has disseminated the most vital commodity known to man—information. But not all information is societally desirable. In fact, much of what the Internet serves to disseminate is demonstrably criminal. Nevertheless, in the effort to unbind the “vibrant and competitive free market” of ideas on the Internet, Congress enacted section 230 of the Communications Decency Act, which essentially grants immunity to interactive computer service providers from liability for information provided by a third party. This Comment suggests that, in certain contexts, courts applying section 230 immunity should reexamine the preemptive effect Congress intended section 230 to …


A Victimless Sex Crime: The Case For Decriminalizing Consensual Teen Sexting, Joanna R. Lampe Jan 2013

A Victimless Sex Crime: The Case For Decriminalizing Consensual Teen Sexting, Joanna R. Lampe

University of Michigan Journal of Law Reform

As teenagers' access to cellular phones and the internet has increased over the past two decades, so has their ability to harm themselves and others through misuse of new technology. One risky behavior that has become common among teenagers is "sexting"--the digital sharing of sexually suggestive images. To combat the dangers of teen sexting, many states have criminalized the act. Criminalization does not resolve the issue of teen sexting, however, and in many cases it may cause additional harm. This Note reviews existing state laws related to teen sexting, and critiques these laws on constitutional and policy grounds. It then …


Exploring The First Amendment Rights Of Teens In Relationship To Sexting And Censorship, Julia Halloran Mclaughlin Feb 2012

Exploring The First Amendment Rights Of Teens In Relationship To Sexting And Censorship, Julia Halloran Mclaughlin

University of Michigan Journal of Law Reform

This Article explores child pornography law in relation to teen sexting conduct. Recently, some teens who engaged in teen sexting have been convicted under child pornography laws and have been required to register as sexual predators. The criminalization of teens for developmentally typical behavior, mimicking the conduct of adults, can result in grave harm to most teens. Furthermore, the application of child pornography laws to teen sexting conduct demonstrates the constitutional overbreadth of the current definition of child pornography. Photographs have an emblematic role in society-capturing and celebrating youth. Moreover, the creation of teen sexting images accompanies a teen's developmental …


The Unified Sealed Theory: Updating Ohio's Record-Sealing Statute For The Twenty-First Century, Michael H. Jagunic Jan 2011

The Unified Sealed Theory: Updating Ohio's Record-Sealing Statute For The Twenty-First Century, Michael H. Jagunic

Cleveland State Law Review

This Note will argue that Ohio's record sealing statute is still a viable means to achieve this balance, but that it must be supplemented by additional laws in order to remain effective. Part II provides a short history of record sealing and expungement in the United States and explains how Ohio's record sealing statute effectively deals with some common criticisms of record sealing. Part III then briefly examines why sealing and expungement statutes are becoming increasingly ineffective due to the proliferation of electronic criminal records and the rise of the data-mining industry. Part IV critiques some of the proposed solutions …


Password Theft: Rethinking An Old Crime In A New Era, Daniel S. Shamah Oct 2006

Password Theft: Rethinking An Old Crime In A New Era, Daniel S. Shamah

Michigan Telecommunications & Technology Law Review

By putting themselves out in front as the victims, the Recording Industry Association of America (RIAA) helped reshape the governing norms of the times, and as a result, people viewed the act of file-sharing differently. By forcing people to see music downloading as a form of theft, the RIAA was quite successful in deterring it. In the process, they also proposed a radical view of theft that changes our basic economic understandings of the action[...] This paper argues that the RIAA's model for deterring music theft could be successfully used to deter many other forms of computer theft, and, specifically, …


Try, Try Again: Will Congress Ever Get It Right? A Summary Of Internet Pornography Laws Protecting Children And Possible Solutions, Susan Hanley Kosse May 2004

Try, Try Again: Will Congress Ever Get It Right? A Summary Of Internet Pornography Laws Protecting Children And Possible Solutions, Susan Hanley Kosse

University of Richmond Law Review

No abstract provided.


New Technology, Old Defenses: Internet Sting Operations And Attempt Liability, Audrey Rogers Jan 2004

New Technology, Old Defenses: Internet Sting Operations And Attempt Liability, Audrey Rogers

University of Richmond Law Review

No abstract provided.


United States V. Jarrett, Andres A. Munoz Jan 2004

United States V. Jarrett, Andres A. Munoz

NYLS Law Review

No abstract provided.


Verdugo In Cyberspace: Boundaries Of Fourth Amendment Rights For Foreign Nationals In Cybercrime Cases, Stewart M. Young Oct 2003

Verdugo In Cyberspace: Boundaries Of Fourth Amendment Rights For Foreign Nationals In Cybercrime Cases, Stewart M. Young

Michigan Telecommunications & Technology Law Review

This Comment examines the current legal framework governing Fourth Amendment rights for foreign nationals accused of committing crimes within the United States. Over the past three years, federal courts have tried several cases charging foreign nationals with committing crimes through the use of the Internet; these cases demonstrate a lack of clarity in the standard for warrant requirements regarding these searches. Utilizing these cases, this Comment creates a hypothetical case that presents the issues of Fourth Amendment rights for foreign nationals and seeks to determine how such a question should be answered. It advocates the clear application of United States …


Carnivore, The Fbi’S E-Mail Surveillance System: Devouring Criminals, Not Privacy, Griffin S. Dunham May 2002

Carnivore, The Fbi’S E-Mail Surveillance System: Devouring Criminals, Not Privacy, Griffin S. Dunham

Federal Communications Law Journal

On July 11, 2000, the FBI intorduced Carnivore, an Internet monitoring system. It was designed, and is used exclusively, to carry out court-ordered surveillance of electronic communications. It is a tangible, portable device, tantamount to a phone tap, that allows the FBI to intercept and collect criminal suspects' e-mail without their knowledge or consent. This Note addresses competing and parallel interests between the government and society to determine the legitimacy and necessity of Carnivore. The purpose of this Note is twofold: first, to demonstrate the need for Carnivore to enable law enforcement to keep up with criminals who utilize cyberspace …


Incitement To Violence On The World Wide Web: Can Web Publishers Seek First Amendment Refuge?, Lonn Weissblum Jun 2000

Incitement To Violence On The World Wide Web: Can Web Publishers Seek First Amendment Refuge?, Lonn Weissblum

Michigan Telecommunications & Technology Law Review

The purpose of this comment is to analyze the potential First Amendment implications of the appearance of bomb-making instructions on the Web in the United States. Moreover, this comment will ultimately consider the notion that "because Brandenburg allows consideration of all the unique characteristics of the Web, there is no reason to formulate new jurisprudence merely because of new technology." Part II examines the seminal cases in the area of speech action, including Schenck v. United States, Hess v. Indiana, and Brandenburg v. Ohio, and the adulations and criticisms that resulted from these cases. Part III discusses the civil cases …