Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Law

Forward Progress: A New Pattern Criminal Jury Instruction For Impeachment With Prior Inconsistent Statements Will Ease The Court’S Burden By Emphasizing The Prosecutor’S, 84 Fordham L. Rev. 1455 (2016), Hugh Mundy Jan 2016

Forward Progress: A New Pattern Criminal Jury Instruction For Impeachment With Prior Inconsistent Statements Will Ease The Court’S Burden By Emphasizing The Prosecutor’S, 84 Fordham L. Rev. 1455 (2016), Hugh Mundy

UIC Law Open Access Faculty Scholarship

Due in part to the “difficult-to-follow” instruction, the Advisory Committee on the Federal Rules of Evidence (“the Advisory Committee” or “the Committee”) is now contemplating the expansion of Rule 801(d)(1)(A) to allow for the substantive admissibility of all prior inconsistent statements. While a revised rule would obviate the need for a limiting instruction, the change would enable federal prosecutors to offer out-of-court statements of tenuous reliability as proof against criminal defendants. A more just approach lies in a recrafted jury instruction—one which frames the admissibility of prior inconsistent statements in terms of the prosecutor’s burden of proof.

In this Article, …


From Tragedy To Triumph In The Pursuit Of Looted Art: Altmann, Benningson, Portrait Of Wally, Von Saher And Their Progeny, 15 J. Marshall Rev. Intell. Prop. L. 394 (2016), Donald Burris Jan 2016

From Tragedy To Triumph In The Pursuit Of Looted Art: Altmann, Benningson, Portrait Of Wally, Von Saher And Their Progeny, 15 J. Marshall Rev. Intell. Prop. L. 394 (2016), Donald Burris

UIC Review of Intellectual Property Law

This article is a broad and approachable overview of American law regarding the potential repatriation of Nazi-looted art—an area which the author and his now-retired partner, Randy Schoenberg, helped develop from the ground up starting with the development of the Altmann case, decided by the U.S. Supreme Court in 2004, and continuing on through a number of fascinating looted-art cases of a more recent vintage. Parts of the article read as much like a detective story as a summary of cases and Mr. Burris has been kind enough to share both his approach to these cases and his prognosis for …


The Destruction Of Cultural Heritage: A Crime Against Property Or A Crime Against People?, 15 J. Marshall Rev. Intell. Prop. L. 336 (2016), Patty Gerstenblith Jan 2016

The Destruction Of Cultural Heritage: A Crime Against Property Or A Crime Against People?, 15 J. Marshall Rev. Intell. Prop. L. 336 (2016), Patty Gerstenblith

UIC Review of Intellectual Property Law

The destruction of cultural heritage has played a prominent role in the ongoing conflicts in Syria and Iraq and in the recent conflict in Mali. This destruction has displayed the failure of international law to effectively deter these actions. This article reviews existing international law in light of this destruction and the challenges posed by the issues of non-international armed conflict, non-state actors and the military necessity exception. By examining recent developments in applicable international law, the article proposes that customary international law has evolved to interpret existing legal instruments and doctrines concerning cultural heritage in light of the principles …


Where Are We And Where Are We Going: Legal Developments In Cultural Property And Nazi Art Looting, 15 J. Marshall Rev. Intell. Prop. L. 435 (2016), Thomas Kline Jan 2016

Where Are We And Where Are We Going: Legal Developments In Cultural Property And Nazi Art Looting, 15 J. Marshall Rev. Intell. Prop. L. 435 (2016), Thomas Kline

UIC Review of Intellectual Property Law

No abstract provided.


Cultural Plunder And Restitution And Human Identity, 15 J. Marshall Rev. Intell. Prop. L. 460 (2016), Ori Soltes Jan 2016

Cultural Plunder And Restitution And Human Identity, 15 J. Marshall Rev. Intell. Prop. L. 460 (2016), Ori Soltes

UIC Review of Intellectual Property Law

No abstract provided.


Cash Is King: How Market-Based Strategies Have Corrupted Classrooms And Criminal Courts In Post-Katrina New Orleans, 39 Seattle U. L. Rev. 1199 (2016), Olympia Duhart, Hugh Mundy Jan 2016

Cash Is King: How Market-Based Strategies Have Corrupted Classrooms And Criminal Courts In Post-Katrina New Orleans, 39 Seattle U. L. Rev. 1199 (2016), Olympia Duhart, Hugh Mundy

UIC Law Open Access Faculty Scholarship


On many accounts, it is a tale of two cities. The headlines and marketing machines tout to the world that “The Big Easy is Back.” But beyond the celebrations and parades, the story for poor Katrina survivors is very different. While many residents and businesses are enjoying a resurgence a decade after Katrina stormed through, others in post-Katrina New Orleans have a different experience. More than ten years after Hurricane Katrina, the city still struggles with systemic failures. These problem areas include housing, health care, mental health treatment, employment, education, and the criminal justice system. All of these challenges are …


The Icc And The Security Council: How Much Support Is There For Ending Impunity?, 26 Ind. Int'l & Comp. L. Rev. 33 (2016), Stuart Ford Jan 2016

The Icc And The Security Council: How Much Support Is There For Ending Impunity?, 26 Ind. Int'l & Comp. L. Rev. 33 (2016), Stuart Ford

UIC Law Open Access Faculty Scholarship

No abstract provided.


Health Information And Data Security Safeguards, 32 J. Marshall J. Info. Tech. & Privacy L. 133 (2016), Jane Kim, David Zakson Jan 2016

Health Information And Data Security Safeguards, 32 J. Marshall J. Info. Tech. & Privacy L. 133 (2016), Jane Kim, David Zakson

UIC John Marshall Journal of Information Technology & Privacy Law

The healthcare industry possesses information coveted by cyber criminals. Unfortunately, healthcare providers are also among the most vulnerable and unprepared to deal with cyber attacks. The Introduction sets the background of this paper with cyber security statistics of the healthcare sector. Part A of this paper will discuss how new Russian law impacts global data security. Part B takes a broad look at data security safeguards. Part C focuses on U.S. attempts at safeguarding data through NIST and its Presidential Policy Directive. In Part D, the paper explores in greater detail causes that precipitate security breaches and specific security defenses …


Following In The European Union’S Footsteps: Why The United States Should Adopt Its Own “Right To Be Forgotten” Law For Crime Victims, 32 J. Marshall J. Info. Tech. & Privacy L. 185 (2016), Erin Cooper Jan 2016

Following In The European Union’S Footsteps: Why The United States Should Adopt Its Own “Right To Be Forgotten” Law For Crime Victims, 32 J. Marshall J. Info. Tech. & Privacy L. 185 (2016), Erin Cooper

UIC John Marshall Journal of Information Technology & Privacy Law

This comment aims to look at this intersection between Google search results, their lack of removal options in the United States, and the potential harm this can cause crime victims. The comment will begin by assessing Google’s method for delivering search results, and its general removal process for most non-European nations. Then, this comment will continue by looking at the European Union and its “right to be forgotten” ruling that allows people in certain circumstances to remove their personal information from the Internet, and what the United States can learn from its implementation. Moreover, we will then contrast the European …


Digital Love: Where Does The Marital Communications Privilege Fit In The World Of Social Media Communications, 32 J. Marshall J. Info. Tech. & Privacy L. 105 (2016), Nicole Scott Jan 2016

Digital Love: Where Does The Marital Communications Privilege Fit In The World Of Social Media Communications, 32 J. Marshall J. Info. Tech. & Privacy L. 105 (2016), Nicole Scott

UIC John Marshall Journal of Information Technology & Privacy Law

This comment explores the impact of recent developments in communication on the applicability of the marital communications privilege. Particularly, this article explores the role social media communication plays, focusing on whether a change is necessary for the privilege to adhere to the recent changes in marriage and communication. Part II of this article discusses the history of the marital privilege, the evolution of marriage, and the history of social media. Part III proposes the need to extend the marital privilege to include private communications on social media. I will advocate for this by comparing the Privilege to other communication privileges, …


How An Acoustic Sensor Can Catch A Gunman, 32 J. Marshall J. Info. Tech. & Privacy L. 211 (2016), Amanda Busljeta Jan 2016

How An Acoustic Sensor Can Catch A Gunman, 32 J. Marshall J. Info. Tech. & Privacy L. 211 (2016), Amanda Busljeta

UIC John Marshall Journal of Information Technology & Privacy Law

Conversations said in public do not have an expectation of privacy, and therefore, the ShotSpotter does not violate the right to privacy. This comment will address the following: a) ShotSpotter technology is a necessity in all neighborhoods; b) ShotSpotter does not violate an individual’s expectation of privacy; c) the need for ShotSpotter outweighs the cost of the device; and e) regulations and economic solutions will allow cities to use ShotSpotter while still protecting the individual’s privacy rights.


Think Twice Before Posting Online: Criminalizing Threats Under 18 U.S.C. § 875(C) After Elonis, 50 J. Marshall L. Rev. 167 (2016), Georgette Geha Jan 2016

Think Twice Before Posting Online: Criminalizing Threats Under 18 U.S.C. § 875(C) After Elonis, 50 J. Marshall L. Rev. 167 (2016), Georgette Geha

UIC Law Review

No abstract provided.


When One Spouse Has It: Dementia And The Permissibility Of Marital Sex Under Criminal Statute, 49 J. Marshall L. Rev. 1225 (2016), James Cook Jan 2016

When One Spouse Has It: Dementia And The Permissibility Of Marital Sex Under Criminal Statute, 49 J. Marshall L. Rev. 1225 (2016), James Cook

UIC Law Review

The purpose of this article is to explore defining the acceptable parameters of marital sexual behavior, in situations where only one spouse has dementia, through criminal statute.