Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 21 of 21

Full-Text Articles in Law

Protecting Your Personal Privacy: A Self-Help Guide For Judges And Their Families (2006), Chicago Bar Association’S Privacy Task Force, John Marshall Law School Center For Information Technology & Privacy Law, Leslie Ann Reis Oct 2006

Protecting Your Personal Privacy: A Self-Help Guide For Judges And Their Families (2006), Chicago Bar Association’S Privacy Task Force, John Marshall Law School Center For Information Technology & Privacy Law, Leslie Ann Reis

UIC Law White Papers

“I believe that the Internet is a brave new world in the matter of judicial security.” – Testimony of Joan H. Lefkow, United States District Judge, before the Judiciary Committee of the United States Senate (May 18, 2005).

Your personal information may be no farther away than a mouse-click... Your name, locations of your home and workplace, your phone number and email address, details of your family members, your political leanings and many more pieces of information are available through a wide array of public and private sources. But, this is nothing new. Some personal information about you has always …


Intellectual Property Rights In The Internet Era: The New Frontier, 5 J. Marshall Rev. Intell. Prop. L. 589 (2006), Lulin Gao Jan 2006

Intellectual Property Rights In The Internet Era: The New Frontier, 5 J. Marshall Rev. Intell. Prop. L. 589 (2006), Lulin Gao

UIC Review of Intellectual Property Law

With the rapid development of information and Internet technologies, how to protect intellectual property (IP) rights in the Internet era became a new frontier for IP practitioners and scholars internationally. This article highlights some important IP protection issues related to copyright, patent, trademark, and domain names, as well as the impact of technological advances on IP protection in the Internet era. The author believes that in order to solve these new emerging issues, the most important principle is keeping the balance between different sides with stakes in the IP right. Finally, international cooperation must be enhanced with more technical assistance …


Regulating Access To Databases Through Antitrust Law, 2006 Stan. Tech. L. Rev. 7 (2006), Daryl Lim Jan 2006

Regulating Access To Databases Through Antitrust Law, 2006 Stan. Tech. L. Rev. 7 (2006), Daryl Lim

UIC Law Open Access Faculty Scholarship

It is largely uncontroversial that the “creative” effort in a database will be protected by copyright. However, any effort to extend protection to purely factual databases creates difficulties in determining the proper method and scope of protection. This Paper argues that antitrust law can be used to supplement intellectual property law in maintaining the “access-incentive” balance with respect to databases. It starts from the premise that a trend toward “TRIPs-plus” rights in databases, whatever its form, is inevitable. The reason is a simple, but compelling one: business needs shape the law. Various means of database access regulation are explored and …


Domestic Surveillance And The Constitution, 24 J. Marshall J. Computer & Info. L. 177 (2006), Lawrence Friedman, René M. Landers Jan 2006

Domestic Surveillance And The Constitution, 24 J. Marshall J. Computer & Info. L. 177 (2006), Lawrence Friedman, René M. Landers

UIC John Marshall Journal of Information Technology & Privacy Law

This article argues that President Bush’s domestic electronic surveillance program is unconstitutional. The program allows the President to order the NSA to conduct surveillance of electronic communications, including communications involving United States citizens, without court order. The authors conclude that the President lacked the statutory or constitutional power to authorize such a program and that the program runs afoul to the letter and the spirit of the constitutional protection against unreasonable searches and seizures embraced by the Fourth Amendment of the United States Constitution. Congress and the President share overlapping constitutional authority in matters of foreign affairs and national security. …


The Protection Of Maps And Spatial Databases In Europe And The United States By Copyright And The Sui Generis Right, 24 J. Marshall J. Computer & Info. L. 195 (2006), Katleen Janssen, Jos Dumortier Jan 2006

The Protection Of Maps And Spatial Databases In Europe And The United States By Copyright And The Sui Generis Right, 24 J. Marshall J. Computer & Info. L. 195 (2006), Katleen Janssen, Jos Dumortier

UIC John Marshall Journal of Information Technology & Privacy Law

Spatial data and applications play an ever-increasing part in our economy and in our society in general, but the protection of spatial databases by intellectual property rights seems to be a challenge because the Internet and information technology have caused a considerable increase in the copying of data, maps, route descriptions, hiking trails, etc. The illegal copying of spatial data, however, has caused the data producers to turn to several means of protection, such as intellectual property legislation, unfair competition, confidentiality and privacy. This paper begins by determining what is meant by spatial data. Thereafter, the paper reflects on the …


Voip Goes The Bad Guy: Understanding The Legal Impact Of The Use Of Voice Over Ip Communications In Cases Of Nsa Warrantless Eavesdropping, 24 J. Marshall J. Computer & Info. L. 227 (2006), Eric Koester Jan 2006

Voip Goes The Bad Guy: Understanding The Legal Impact Of The Use Of Voice Over Ip Communications In Cases Of Nsa Warrantless Eavesdropping, 24 J. Marshall J. Computer & Info. L. 227 (2006), Eric Koester

UIC John Marshall Journal of Information Technology & Privacy Law

For purposes of national security, the Bush administration delegated authority to the National Security Administration (“NSA”) to conduct warrantless surveillance of Americans; and such surveillance defies tradition. At the same time, emerging communications technology, like Voice over Internet Protocol (“VoIP”), complicates the already controversial issue by generating uncertainty about how courts will analyze warrantless surveillance of such forums. The problem lies in outdated communications and surveillance regulations, which effectively address older communications forums, like the telephone, but encounter stifling ambiguity vis-à-vis VoIP and other new forums. VoIP is a relatively new technology, but it encompasses the large and ever-growing use …


The Federal Election Commission & Political Blogging: A Perfect Balance Or Just Not Enough?, 24 J. Marshall J. Computer & Info. L. 611 (2006), Niki Vlachos Jan 2006

The Federal Election Commission & Political Blogging: A Perfect Balance Or Just Not Enough?, 24 J. Marshall J. Computer & Info. L. 611 (2006), Niki Vlachos

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Cleaning Metadata On The World Wide Web: Suggestions For A Regulatory Approach, 24 J. Marshall J. Computer & Info. L. 531 (2006), Marcel Gordon Jan 2006

Cleaning Metadata On The World Wide Web: Suggestions For A Regulatory Approach, 24 J. Marshall J. Computer & Info. L. 531 (2006), Marcel Gordon

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Copyright Misuse Doctrine On Computer Software: A Redundant Doctrine Of U.S. Copyright Law Or A Necessary Addition To E.U. Copyright Law?, 24 J. Marshall J. Computer & Info. L. 571 (2006), Haris Apostolopoulos Jan 2006

The Copyright Misuse Doctrine On Computer Software: A Redundant Doctrine Of U.S. Copyright Law Or A Necessary Addition To E.U. Copyright Law?, 24 J. Marshall J. Computer & Info. L. 571 (2006), Haris Apostolopoulos

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Provisional Relief In Transnational Litigation In The Internet Era: What Is In The Us Best Interest?, 24 J. Marshall J. Computer & Info. L. 263 (2006), Panagiota Kelali Jan 2006

Provisional Relief In Transnational Litigation In The Internet Era: What Is In The Us Best Interest?, 24 J. Marshall J. Computer & Info. L. 263 (2006), Panagiota Kelali

UIC John Marshall Journal of Information Technology & Privacy Law

Using the hypothetical of a college student victimized by a fraudulent website, this comment addresses the issue of Internet fraud. In the example presented, the perpetrators are Greek nationals located in Greece. Focusing on the intangible and international nature of the Internet, the comment addresses the complications surrounding litigating an Internet fraud case. The issues discussed include a determination of the forum where the suit should be brought, preservation of the status quo pending determination of the dispute, and the status of a transnational cooperation on the issue of recognition and enforcement of judgments. The comment presents the options available …


Transsexuals And The Family Medical Leave Act, 24 J. Marshall J. Computer & Info. L. 315 (2006), Charles Thomas Little Jan 2006

Transsexuals And The Family Medical Leave Act, 24 J. Marshall J. Computer & Info. L. 315 (2006), Charles Thomas Little

UIC John Marshall Journal of Information Technology & Privacy Law

This article examines the implications for transsexuals seeking sexual reassignment surgery (“SRS”) under the Family Medical Leave Act (“FMLA”). Currently, the scant case law pertaining to the FMLA suggests that the statutes and regulations will likely fail to provide even minimal protection to transsexuals. If applied literally, the FMLA may present barriers to transsexuals seeking SRS in opposition to the true purpose behind the Act, which is to allow employees the opportunity to take reasonable leave from work by mandating more medical leave than the employers might otherwise be willing to grant for things such as the adoption or birth …


Borders Online, Llc V. State Board Of Equalization: It's Time For Congress To Weigh The Possibilities Of This California Decision, 24 J. Marshall J. Computer & Info. L. 641 (2006), Ronnie E. Webb Jan 2006

Borders Online, Llc V. State Board Of Equalization: It's Time For Congress To Weigh The Possibilities Of This California Decision, 24 J. Marshall J. Computer & Info. L. 641 (2006), Ronnie E. Webb

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Twenty-Fifth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 24 J. Marshall J. Computer & Info. L. 673 (2006), David E. Sorkin, Larisa V. Benitez-Morgan, J. Preston Carter, William P. Greubel Iii, Matthew Hector, Kellen Keaty, Lisa Rodriguez Jan 2006

The Twenty-Fifth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 24 J. Marshall J. Computer & Info. L. 673 (2006), David E. Sorkin, Larisa V. Benitez-Morgan, J. Preston Carter, William P. Greubel Iii, Matthew Hector, Kellen Keaty, Lisa Rodriguez

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Twenty-Fifth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 24 J. Marshall J. Computer & Info. L. 699 (2006), Chris Norris, Justin Sisemore, Anndi Queenan Jan 2006

The Twenty-Fifth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 24 J. Marshall J. Computer & Info. L. 699 (2006), Chris Norris, Justin Sisemore, Anndi Queenan

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Twenty-Fifth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 24 J. Marshall J. Computer & Info. L. 733 (2006), Timothy T. Hsieh, Jennifer Simmen Lewin, Jerome C. Pandell Jan 2006

The Twenty-Fifth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 24 J. Marshall J. Computer & Info. L. 733 (2006), Timothy T. Hsieh, Jennifer Simmen Lewin, Jerome C. Pandell

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Intellectual Property Rights At The Crossroad Between Monopolization And Abuse Of Dominant Position: American And European Approaches Compared, 24 J. Marshall J. Computer & Info. L. 455 (2006), Emanuela Arezzo Jan 2006

Intellectual Property Rights At The Crossroad Between Monopolization And Abuse Of Dominant Position: American And European Approaches Compared, 24 J. Marshall J. Computer & Info. L. 455 (2006), Emanuela Arezzo

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Gathering Twilight? Information Privacy On The Internet In The Post-Enlightenment Era, 24 J. Marshall J. Computer & Info. L. 353 (2006), Mark F. Kightlinger Jan 2006

The Gathering Twilight? Information Privacy On The Internet In The Post-Enlightenment Era, 24 J. Marshall J. Computer & Info. L. 353 (2006), Mark F. Kightlinger

UIC John Marshall Journal of Information Technology & Privacy Law

This Article provides a timely examination of U.S. law and policy concerning information privacy on the Internet, a subject that receives almost daily attention in the press. This Article constructs a new theoretical framework from the writings of Alasdair MacIntyre, a major contemporary philosopher and social theorist. Over the past 30 years, MacIntyre has examined the roots and continuing impact of the failure of post-Enlightenment thinkers to produce an account of human nature and action that could replace an older Aristotelian account and command the assent of all rational persons. In addition to extending MacIntyre’s examination of our post-Enlightenment situation, …


Contribution To The Understanding Of The Public Domain, 24 J. Marshall J. Computer & Info. L. 411 (2006), Vincenzo Vinciguerra Jan 2006

Contribution To The Understanding Of The Public Domain, 24 J. Marshall J. Computer & Info. L. 411 (2006), Vincenzo Vinciguerra

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


A Comedy Of Errors: Defining "Component" In A Global Information Technology Market - Accounting For Innovation By Penalizing The Innovators, 24 J. Marshall J. Computer & Info. L. 507 (2006), William Greubel Jan 2006

A Comedy Of Errors: Defining "Component" In A Global Information Technology Market - Accounting For Innovation By Penalizing The Innovators, 24 J. Marshall J. Computer & Info. L. 507 (2006), William Greubel

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Why Are Competitor's Advertising Links Displayed When I Google My Product? An Analysis Of Internet Search Engine Liability For Trademark Infringement, 5 J. Marshall Rev. Intell. Prop. L. 431 (2006), Isaiah A. Fishman Jan 2006

Why Are Competitor's Advertising Links Displayed When I Google My Product? An Analysis Of Internet Search Engine Liability For Trademark Infringement, 5 J. Marshall Rev. Intell. Prop. L. 431 (2006), Isaiah A. Fishman

UIC Review of Intellectual Property Law

Traditional federal trademark law is being challenged in the current case of Google v. AmericanBlind. When internet issues clash with trademark infringement, courts are often faced with the dangerous task of either refusing to stretch not specifically internet tailored trademark law to grant remedy to a perceived wrong or refusing to grant remedy because of the chilling effect the remedy may have on traditional trademark. By analyzing the history of trademark law in relation with internet issues, focusing on domain name cases, pop-up advertising cases, and search engine cases, it becomes clear that specific congressional action is the most viable …


The Wipo "Internet Treaties" The United States As The Driver: The United States As The Main Source Of Obstruction — As Seen By An Anti-Revolutionary Central European, 6 J. Marshall Rev. Intell. Prop. L. 17 (2006), Mihály Ficsor Jan 2006

The Wipo "Internet Treaties" The United States As The Driver: The United States As The Main Source Of Obstruction — As Seen By An Anti-Revolutionary Central European, 6 J. Marshall Rev. Intell. Prop. L. 17 (2006), Mihály Ficsor

UIC Review of Intellectual Property Law

The copyright policy of the United States developed from initial isolationism, through the 1891 Chase Act, various bilateral and inter-American agreements and the establishment of the Universal Copyright Convention, to active participation in the international copyright cooperation. This development was completed by the United States’ accession to the Berne Convention in 1988. Since then, the United States has played a leading role in this field, which was manifested both during the negotiations of the 1994 TRIPS Agreement and the preparatory work of the two 1996 WIPO “Internet Treaties”, the WCT and the WPPT. These WIPO Treaties, the preparation and adoption …