Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Law

Messages From The Front: Hard Earned Lessons On Information Security From The Ip Wars, 16 Mich. St. J. Int'l L. 71 (2007), Doris E. Long Jan 2007

Messages From The Front: Hard Earned Lessons On Information Security From The Ip Wars, 16 Mich. St. J. Int'l L. 71 (2007), Doris E. Long

UIC Law Open Access Faculty Scholarship

Cyberspace is often a battlefield with a wide array of armies posed to challenge one another across the increasing array of rhetoric and technology that has made it such a potent arena for global digital commerce. Perry Barlow's infamous demand that cyberspace be left to its own devices because of its unique unregulated nature may have been answered by Larry Lessig's reply that code may in fact be used to regulate cyberspace, but the reality is that social norming demands, the evanescence of technological controls, and the perceived utility of illicit conduct utilizing the internet make any regulation problematic at …


Will Youtube Sail Into The Dmca's Safe Harbor Or Sink For Internet Piracy?, 6 J. Marshall Rev. Intell. Prop. L. 550 (2007), Michael Driscoll Jan 2007

Will Youtube Sail Into The Dmca's Safe Harbor Or Sink For Internet Piracy?, 6 J. Marshall Rev. Intell. Prop. L. 550 (2007), Michael Driscoll

UIC Review of Intellectual Property Law

Is YouTube, the popular video sharing website, a new revolution in information sharing or a profitable clearing-house for unauthorized distribution of copyrighted material? YouTube’s critics claim that it falls within the latter category, in line with Napster and Grokster. This comment, however, determines that YouTube is fundamentally different from past infringers in that it complies with statutory provisions concerning the removal of copyrighted materials. Furthermore, YouTube’s central server architecture distinguishes it from peer-to-peer file sharing websites. This comment concludes that any comparison to Napster or Grokster issuperficial, and overlooks the potential benefits of YouTube to copyright


Application Service Providing, Copyright, And Licensing, 25 J. Marshall J. Computer & Info. L. 79 (2007), Michael P. Widmer Jan 2007

Application Service Providing, Copyright, And Licensing, 25 J. Marshall J. Computer & Info. L. 79 (2007), Michael P. Widmer

UIC John Marshall Journal of Information Technology & Privacy Law

Application Service Providing ("ASP"), where a vendor hosts a software application on her server and grants customers access to the application over a network -- without the software application itself being installed on the user’s computer -- is used by many, e.g. in the form of Web based e-mail services, and grows ever more important. This article argues that although ASP mainly raises questions (i) that come up in the context of traditional use of computer programs; or (ii) that have been addressed in the context of online use of works other than software, ASP has significantly different copyright implications …


Ict And Employer-Employee Power Dynamics: A Comparative Perspective Of United States' And Netherlands' Workplace Privacy In Light Of Information And Computer Technology Monitoring And Positioning Of Employees, 25 J. Marshall J. Computer & Info. L. 37 (2007), Colette Cuijpers Jan 2007

Ict And Employer-Employee Power Dynamics: A Comparative Perspective Of United States' And Netherlands' Workplace Privacy In Light Of Information And Computer Technology Monitoring And Positioning Of Employees, 25 J. Marshall J. Computer & Info. L. 37 (2007), Colette Cuijpers

UIC John Marshall Journal of Information Technology & Privacy Law

Employees can cause harm to their employers through Information and Computer Technology (ICT) in employment relationships; for example, through surfing for adult material on the Internet or leaking company secrets via a mobile phone. Employers have responded to this development by introducing various surveillance systems. Besides well-known forms of Internet and e-mail surveillance, positioning systems are becoming a new trend. The influence these systems have on the employment relationship can be far-reaching, as they offer the employer an insight into the employee’s whereabouts, outside the company premises as well as outside company hours. As a consequence, the boundaries between the …


The Fda And The Future Of The Brain-Computer Interface: Adapting Fda Device Law To The Challenges Of Human-Machine Enhancement, 25 J. Marshall J. Computer & Info. L. 117 (2007), Eric Chan Jan 2007

The Fda And The Future Of The Brain-Computer Interface: Adapting Fda Device Law To The Challenges Of Human-Machine Enhancement, 25 J. Marshall J. Computer & Info. L. 117 (2007), Eric Chan

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Slingbox: Copyright, Fair Use, And Access To Television Programming Anywhere In The World, 25 J. Marshall J. Computer & Info. L. 187 (2007), Shekar Sathyanarayana Jan 2007

Slingbox: Copyright, Fair Use, And Access To Television Programming Anywhere In The World, 25 J. Marshall J. Computer & Info. L. 187 (2007), Shekar Sathyanarayana

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Angling For A Fair Standard: A Recommendation For A Narrowly Tailored Non-Profit Exemption To The Closed Captioning Requirements, 25 J. Marshall J. Computer & Info. L. 165 (2007), Joshua Pila Jan 2007

Angling For A Fair Standard: A Recommendation For A Narrowly Tailored Non-Profit Exemption To The Closed Captioning Requirements, 25 J. Marshall J. Computer & Info. L. 165 (2007), Joshua Pila

UIC John Marshall Journal of Information Technology & Privacy Law

In late 2006, the FCC’s Consumer and Government Affairs Bureau (“CGB”) issued the Anglers Order, providing a wholesale exemption for non-profit entities seeking to avoid the strictures of the Commission’s closed captioning rules. Disability advocates quickly criticized the Anglers Order on administrative law and communications law grounds. This paper avoids administrative law and communications law issues, but instead criticizes the Anglers Order on non-profit law and policy grounds. The paper then recommends and supports a post-application, narrowly-tailored financial test, automatically exempting A) non-profit organizations, with B) less than $25,000 in annual revenue, who C) receive no financial compensation for airing …


From Taylorism To The Omnipticon: Expanding Employee Surveillance Beyond The Workplace, 25 J. Marshall J. Computer & Info. L. 1 (2007), Robert D. Sprague Jan 2007

From Taylorism To The Omnipticon: Expanding Employee Surveillance Beyond The Workplace, 25 J. Marshall J. Computer & Info. L. 1 (2007), Robert D. Sprague

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


"Heads-I-Win, Tails-You-Lose": The Predicament Legitimate Small Entities Face Post Ebay And The Essential Role Of Willful Infringement In The Four-Factor Permanent Injunction Analysis, 41 J. Marshall L. Rev. 189 (2007), William R. Everding Jan 2007

"Heads-I-Win, Tails-You-Lose": The Predicament Legitimate Small Entities Face Post Ebay And The Essential Role Of Willful Infringement In The Four-Factor Permanent Injunction Analysis, 41 J. Marshall L. Rev. 189 (2007), William R. Everding

UIC Law Review

No abstract provided.


If You Prompt Them, They Will Rule: The Warranty Of Habitability Meets New Court Information Systems, 40 J. Marshall L. Rev. 425 (2007), Mary Marsh Zulack Jan 2007

If You Prompt Them, They Will Rule: The Warranty Of Habitability Meets New Court Information Systems, 40 J. Marshall L. Rev. 425 (2007), Mary Marsh Zulack

UIC Law Review

No abstract provided.


Gambling And The Law®: The International Law Of Remote Wagering, 40 J. Marshall L. Rev. 1159 (2007), I. Nelson Rose Jan 2007

Gambling And The Law®: The International Law Of Remote Wagering, 40 J. Marshall L. Rev. 1159 (2007), I. Nelson Rose

UIC Law Review

No abstract provided.


Identity Theft: Plugging The Massive Data Leaks With A Stricter Nationwide Breach-Notification Law, 40 J. Marshall L. Rev. 681 (2007), Amanda Draper Jan 2007

Identity Theft: Plugging The Massive Data Leaks With A Stricter Nationwide Breach-Notification Law, 40 J. Marshall L. Rev. 681 (2007), Amanda Draper

UIC Law Review

No abstract provided.


Remedying The Lose-Lose Game Of Compulsive Gambling: Voluntary Exclusions, Mandatory Exclusions, Or An Alternative Method?, 40 J. Marshall L. Rev. 1221 (2007), William N. Thompson, Robert W. Stocker Ii, Peter J. Kulick Jan 2007

Remedying The Lose-Lose Game Of Compulsive Gambling: Voluntary Exclusions, Mandatory Exclusions, Or An Alternative Method?, 40 J. Marshall L. Rev. 1221 (2007), William N. Thompson, Robert W. Stocker Ii, Peter J. Kulick

UIC Law Review

No abstract provided.