Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 7 of 7
Full-Text Articles in Law
Protecting Colleges & Universities Against Real Losses In A Virtual World, 33 J. Marshall J. Info. Tech. & Privacy L. 101 (2017), Gregory Demers, Seth Harrington, Mark Cianci, Nicholas Green
Protecting Colleges & Universities Against Real Losses In A Virtual World, 33 J. Marshall J. Info. Tech. & Privacy L. 101 (2017), Gregory Demers, Seth Harrington, Mark Cianci, Nicholas Green
UIC John Marshall Journal of Information Technology & Privacy Law
Colleges and universities are prime targets for cyberattacks. Authors Gregory L. Demers, Seth C. Harrington, Mark A. Cianci, and Nicholas R. Green explore emerging data security risks and litigation trends on college campuses, and offer ways to manage these risks through a comprehensive insurance plan. Given the increasing variety and complexity of plans available, it is incumbent upon universities to regularly reassess the coverage afforded by their existing policies.
Cloud Computing, Regulatory Compliance, And Student Privacy: A Guide For School Administrators And Legal Counsel, 30 J. Marshall J. Info. Tech. & Privacy L. 511 (2014), Steve Mutkoski
UIC John Marshall Journal of Information Technology & Privacy Law
Rapid change in the technology landscape has resulted in the introduction of a range of new technologies into the classroom. But unlike the past use of technology in schools, many of these new products and services introduce two new dynamics that school counsel (and the teachers and administrators they support) need to understand fully. First, many of these new products and services are run “in the cloud” by a third party service provider as opposed to on servers operated by the school’s information technology (IT) staff. This third party operation and control can raise important new regulatory compliance issues, including …
"Tinkering" With The First Amendment's Protection Of Student Speech On The Internet, 29 J. Marshall J. Computer & Info. L. 167 (2012), Steven M. Puiszis
"Tinkering" With The First Amendment's Protection Of Student Speech On The Internet, 29 J. Marshall J. Computer & Info. L. 167 (2012), Steven M. Puiszis
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
My Teacher Sux! [Censored]: Protecting Students' Right To Free Speech On The Internet, 28 J. Marshall J. Computer & Info. L. 385 (2011), Katherine Hokenson
My Teacher Sux! [Censored]: Protecting Students' Right To Free Speech On The Internet, 28 J. Marshall J. Computer & Info. L. 385 (2011), Katherine Hokenson
UIC John Marshall Journal of Information Technology & Privacy Law
This comment will discusses the problem posed by student speech made on the Internet, how free speech issues are generally addressed by courts, the Supreme Court cases that have specifically addressed the First Amendment rights of students, and factors that courts dealing with student speech made on the Internet have attempted to use in their decisions. The comment will further look at how courts have analyzed online student speech cases in light of available Supreme Court precedent, and will propose that the Court adopt a hybrid of the Tinker test when addressing student speech made on the Internet, which will …
Schools: Where Fewer Rights Are Reasonable? Why The Reasonableness Standard Is Inappropriate To Measure The Use Of Rfid Tracking Devices On Students, 28 J. Marshall J. Computer & Info. L. 411 (2011), Alexandra C. Hirsch
UIC John Marshall Journal of Information Technology & Privacy Law
In an unsuccessful attempt to heighten security, schools are implementing a technology that offers access to children’s personal information and minute-by-minute location. Although not entirely new, Radio Frequency Identification (RFID) technology use has recently been expanding within the school arena. Skeptics knowledgeable about the downfalls of the technology, however, have reason to be concerned. In order to understand the true urgency of this issue, this comment will explain the background of RFID technology, specifically what RFID tags are, how they are used, their purposes, and how they have become unsafe. Included will be an explanation of the reasons that schools …
University Research Under Siege: How The War On Terror Has Placed Academic Freedom Under Fire, 26 J. Marshall J. Computer & Info. L. 547 (2009), James Templin
UIC John Marshall Journal of Information Technology & Privacy Law
The Comment analyzes the proposed revisions to United States export regulations contained in the Deemed Export Advisory Committee’s 2007 report. While the Advisory Committee’s work was much needed and its recommendations laudable, this comment discusses why its recommendations must be narrowly tailored in order to preserve the competitiveness of U.S. businesses and universities in the globalizing world and to advance national security. Part II explains the regulations that govern U.S. exports, including the deemed export regulatory regime and how those rules implement a range of national obligations and interests. This Part also discusses the events that threatened to significantly burden …
The Best Of Both Worlds: Financing Software Filters For The Classroom And Avoiding First Amendment Liability, 16 J. Marshall J. Computer & Info. L. 659 (1998), Peter G. Drever Iii
The Best Of Both Worlds: Financing Software Filters For The Classroom And Avoiding First Amendment Liability, 16 J. Marshall J. Computer & Info. L. 659 (1998), Peter G. Drever Iii
UIC John Marshall Journal of Information Technology & Privacy Law
As the Internet expands, educational institutions have become interested in the medium for the purpose of expanding learning opportunities. Information that may be objectionable to some members of the community, however, would then be available to children in schools with Internet access. Attempts to regulate the content of the Internet have yet to pass a First Amendment challenge. Concern over what children will be exposed to when the Internet is introduced in the classroom is currently being addressed by educators and legislators alike. The Communications Decency Act was the first to attempt to address the issue of Internet access in …