Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- UIC School of Law (59)
- Selected Works (15)
- University of Michigan Law School (11)
- University of Pennsylvania Carey Law School (9)
- SelectedWorks (8)
-
- Boston University School of Law (6)
- University of Colorado Law School (6)
- American University Washington College of Law (4)
- Brooklyn Law School (4)
- Maurer School of Law: Indiana University (4)
- University of Maryland Francis King Carey School of Law (4)
- Chicago-Kent College of Law (2)
- Pace University (2)
- Schulich School of Law, Dalhousie University (2)
- Vanderbilt University Law School (2)
- Columbia Law School (1)
- Cornell University Law School (1)
- Duke Law (1)
- Emory University School of Law (1)
- Penn State Law (1)
- Roger Williams University (1)
- Seattle University School of Law (1)
- Singapore Management University (1)
- University at Buffalo School of Law (1)
- University of Baltimore Law (1)
- University of New Hampshire (1)
- University of Pittsburgh School of Law (1)
- University of Richmond (1)
- University of San Diego (1)
- Villanova University Charles Widger School of Law (1)
- Keyword
-
- Cyberspace Law (7)
- Privacy (6)
- Civil rights (5)
- Surveillance (5)
- Technology (5)
-
- Cyber crime (4)
- ECR (4)
- Fourth Amendment (4)
- Internet (4)
- Skimming (4)
- Telecommunications (4)
- Web 2.0 (4)
- Zapper (4)
- Administrative Law (3)
- Antitrust (3)
- Climate change (3)
- Cyber law (3)
- Cyberspace (3)
- Global warming (3)
- Information Technology (3)
- Innovation (3)
- Intellectual Property (3)
- Negligence (3)
- Network economic effects (3)
- Open source (3)
- POS system (3)
- Phantom-ware (3)
- Tax fraud (3)
- Transaction costs (3)
- Cash register (2)
- Publication
-
- UIC John Marshall Journal of Information Technology & Privacy Law (30)
- UIC Review of Intellectual Property Law (29)
- Faculty Scholarship (15)
- All Faculty Scholarship (12)
- Danielle Keats Citron (7)
-
- Articles (5)
- Publications (5)
- Articles by Maurer Faculty (4)
- Articles, Book Chapters, & Popular Press (2)
- Elisabeth Haub School of Law Faculty Publications (2)
- Law Faculty Scholarship (2)
- Michigan Telecommunications & Technology Law Review (2)
- Susan Freiwald (2)
- Sustainable Development Law & Policy (2)
- Vanderbilt Journal of Entertainment & Technology Law (2)
- Articles in Law Reviews & Other Academic Journals (1)
- Bruno L. Costantini García (1)
- Buffalo Law Review (1)
- Carolina Altoé Velasco (1)
- Christopher Wadlow (1)
- Cornell Law Faculty Publications (1)
- David A. Bray (1)
- David S Caudill (1)
- Duke Law & Technology Review (1)
- Faculty Articles (1)
- Franck Dumortier (1)
- George H Baker (1)
- Horacio M. LYNCH (1)
- J. Jonas Anderson (1)
- Jason John Du Mont (1)
- Publication Type
- File Type
Articles 151 - 154 of 154
Full-Text Articles in Law
Fourth Amendment Protection For Stored E-Mail, Susan Freiwald, Patricia L. Bellia
Fourth Amendment Protection For Stored E-Mail, Susan Freiwald, Patricia L. Bellia
Susan Freiwald
The question of whether and how the Fourth Amendment regulates government access to stored e-mail remains open and pressing. A panel of the Sixth Circuit recently held in Warshak v. United States, 490 F.3d 455 (6th Cir. 2007), that users generally retain a reasonable expectation of privacy in the e-mails they store with their Internet Service Providers (ISPs), which implies that government agents must generally acquire a warrant before they may compel ISPs to disclose their users' stored e-mails. The Sixth Circuit, however, is reconsidering the case en banc. This Article examines the nature of stored e-mail surveillance and argues …
Electronic Surveillance At The Virtual Border, Susan Freiwald
Electronic Surveillance At The Virtual Border, Susan Freiwald
Susan Freiwald
A virtual border divides people into two groups: those subject to the Fourth Amendment’s protections when the U.S. government conducts surveillance of their communications and those who are not. The distinction derives from a separation in powers: inside the virtual border, U.S. citizens and others enjoy the extensive oversight of the judiciary of executive branch surveillance. Judges review such surveillance before, during, and after it transpires. Foreign persons subject to surveillance in foreign countries fall within the executive branch’s’ foreign affairs function. However, the virtual border does not exactly match the physical border of the United States. Some people inside …
Cascading Infrastructure Failures: Avoidance And Response, George H. Baker, Cheryl J. Elliott
Cascading Infrastructure Failures: Avoidance And Response, George H. Baker, Cheryl J. Elliott
George H Baker
No critical infrastructure is self-sufficient. The complexity inherent in the interdependent nature of infrastructure systems complicates planning and preparedness for system failures. Recent wide-scale disruption of infrastructure on the Gulf Coast due to weather, and in the Northeast due to electric power network failures, dramatically illustrate the problems associated with mitigating cascading effects and responding to cascading infrastructure failures once they have occurred.
The major challenge associated with preparedness for cascading failures is that they transcend system, corporate, and political boundaries and necessitate coordination among multiple, disparate experts and authorities. This symposium brought together concerned communities including government and industry …
‘Move On’ Orders As Fourth Amendment Seizures, Stephen E. Henderson
‘Move On’ Orders As Fourth Amendment Seizures, Stephen E. Henderson
Stephen E Henderson
If a police officer orders one to move on, must the recipient comply? This article analyzes whether there is a federal constitutional right to remain, and in particular whether a police command to move on constitutes a seizure of the person for purposes of the Fourth Amendment. Although it is a close question, I conclude that the Fourth Amendment typically does not restrict a move on (MO) order, and that substantive due process only prohibits the most egregious such orders. It is a question of broad significance given the many legitimate reasons police might order persons to move on, as …