Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Privacy Law

UIC School of Law

Journal

2017

Articles 1 - 4 of 4

Full-Text Articles in Law

Ignorance Of Technology A Pass For Violating Child Pornography Laws? – What’S The Cache?, 33 J. Marshall J. Info. Tech. & Privacy L. 47 (2017), Angela Lewosz Jan 2017

Ignorance Of Technology A Pass For Violating Child Pornography Laws? – What’S The Cache?, 33 J. Marshall J. Info. Tech. & Privacy L. 47 (2017), Angela Lewosz

UIC John Marshall Journal of Information Technology & Privacy Law

This comment explains how the cache works, discusses computer forensic examinations, and provides a history of child pornography laws. It next explores how the courts have interpreted the changing pornography laws with advances in technology. It then specifically assesses the different approaches the courts take when reconciling the mens rea (the mental element) of knowledge in accordance with possession. Finally, this comment analyzes the strengths and flaws in the courts’ arguments and suggests a proposal for how the courts should deal with the cache in relation to the criminalization of possession within the federal child pornography laws.


Exposure To Police Brutality Allows For Transparency And Accountability Of Law Enforcement, 33 J. Marshall J. Info. Tech. & Privacy L. 75 (2017), Kendal Harden Jan 2017

Exposure To Police Brutality Allows For Transparency And Accountability Of Law Enforcement, 33 J. Marshall J. Info. Tech. & Privacy L. 75 (2017), Kendal Harden

UIC John Marshall Journal of Information Technology & Privacy Law

Thanks to the advancements in technology and valor of citizens, the public is finally able to understand the true severity of police brutality within the United States. The following considerations aim to address the lack of accountability and transparency of police brutality in the United States today. Part III will show how advancements in technology brings police brutality to the forefront of our nation’s issues by creating an informed society. Part IV will describe how individual states control the use of private cameras and cell phones of citizens to capture occurrences of police brutality. States do this by employing anti-wiretapping …


Protecting Colleges & Universities Against Real Losses In A Virtual World, 33 J. Marshall J. Info. Tech. & Privacy L. 101 (2017), Gregory Demers, Seth Harrington, Mark Cianci, Nicholas Green Jan 2017

Protecting Colleges & Universities Against Real Losses In A Virtual World, 33 J. Marshall J. Info. Tech. & Privacy L. 101 (2017), Gregory Demers, Seth Harrington, Mark Cianci, Nicholas Green

UIC John Marshall Journal of Information Technology & Privacy Law

Colleges and universities are prime targets for cyberattacks. Authors Gregory L. Demers, Seth C. Harrington, Mark A. Cianci, and Nicholas R. Green explore emerging data security risks and litigation trends on college campuses, and offer ways to manage these risks through a comprehensive insurance plan. Given the increasing variety and complexity of plans available, it is incumbent upon universities to regularly reassess the coverage afforded by their existing policies.


Reviving The Fourth Amendment: Reasonable Expectation Of Privacy In A Cell Phone Age, 50 J. Marshall L. Rev. 555 (2017), Marisa Kay Jan 2017

Reviving The Fourth Amendment: Reasonable Expectation Of Privacy In A Cell Phone Age, 50 J. Marshall L. Rev. 555 (2017), Marisa Kay

UIC Law Review

No abstract provided.