Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Sexuality and the Law

UIC School of Law

UIC John Marshall Journal of Information Technology & Privacy Law

Articles 1 - 7 of 7

Full-Text Articles in Law

Carry That Weight: Victim Privacy Within The Military Sexual Assault Reporting Methods, 28 J. Marshall Computer & Info. L. 551 (2011), Emily Hansen Jan 2011

Carry That Weight: Victim Privacy Within The Military Sexual Assault Reporting Methods, 28 J. Marshall Computer & Info. L. 551 (2011), Emily Hansen

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Olympic Meddle: The International Olympic Committee's Intrusion Of Athletes' Privacy Through The Discriminatory Practice Of Gender Verification Testing, 28 J. Marshall J. Computer & Info. L. 49 (2010), Raheel Saleem Jan 2010

The Olympic Meddle: The International Olympic Committee's Intrusion Of Athletes' Privacy Through The Discriminatory Practice Of Gender Verification Testing, 28 J. Marshall J. Computer & Info. L. 49 (2010), Raheel Saleem

UIC John Marshall Journal of Information Technology & Privacy Law

The IOC and the IAAF act as governing bodies for athletes and, therefore, are innately responsible for their actions. However, the gender verification rule exemplifies that irresponsible actions by these governing agencies adversely effects its athletes. The gender verification rule empowers both the IOC and the IAAF to make life-changing decisions without any restriction, leaving athletes susceptible to the unfettered power and abuse of the rule. The legal foundation established by the international human rights declarations support the argument that gender verification testing must be abolished because of its embedded discrimination and intrusive nature. An application of the ICCPR provides …


Average Teenager Or Sex Offender? Solutions To The Legal Dilemma Caused By Sexting, 26 J. Marshall J. Computer & Info. L. 431 (2009), Shannon Shafron-Perez Jan 2009

Average Teenager Or Sex Offender? Solutions To The Legal Dilemma Caused By Sexting, 26 J. Marshall J. Computer & Info. L. 431 (2009), Shannon Shafron-Perez

UIC John Marshall Journal of Information Technology & Privacy Law

The Comment broadly considers the failure of the law to adapt to developments in technology and communication, untangles the different approaches taken by a sample of states, and considers which legal remedy is most appropriate. This discussion primarily focuses on the criminal aspects of: (1) minors who voluntarily create and disseminate nude text messages of themselves; and (2) minors who receive nude photographs of other minors. Part II traces the development of sexting. Part III describes the history and rationale behind prohibiting child pornography. In Part IV, the article examines the application of child pornography laws to sexting cases in …


Transsexuals And The Family Medical Leave Act, 24 J. Marshall J. Computer & Info. L. 315 (2006), Charles Thomas Little Jan 2006

Transsexuals And The Family Medical Leave Act, 24 J. Marshall J. Computer & Info. L. 315 (2006), Charles Thomas Little

UIC John Marshall Journal of Information Technology & Privacy Law

This article examines the implications for transsexuals seeking sexual reassignment surgery (“SRS”) under the Family Medical Leave Act (“FMLA”). Currently, the scant case law pertaining to the FMLA suggests that the statutes and regulations will likely fail to provide even minimal protection to transsexuals. If applied literally, the FMLA may present barriers to transsexuals seeking SRS in opposition to the true purpose behind the Act, which is to allow employees the opportunity to take reasonable leave from work by mandating more medical leave than the employers might otherwise be willing to grant for things such as the adoption or birth …


Pennsylvania And Pornography: Cdt V. Pappert Offers A New Approach To Criminal Liability, 23 J. Marshall J. Computer & Info. L. 411 (2005), John Spence Jan 2005

Pennsylvania And Pornography: Cdt V. Pappert Offers A New Approach To Criminal Liability, 23 J. Marshall J. Computer & Info. L. 411 (2005), John Spence

UIC John Marshall Journal of Information Technology & Privacy Law

The rapid expansion of information technology in the past few years has left states and the Federal government struggling desperately to keep up and many of the laws attempting to regulate the Internet and information technology show a lack of understanding how the affected technology actually works and could possibly the growth and distribution of new ideas and inventions even incapacitate the Internet. One area in particular that has been the subject of widespread concern and attention is online pornography, a business that few people only realize just how big it truly is. This article focuses on the recent District …


Megan's Law: Analysis On Whether It Is Constitutional To Notify The Public Of Sex Offenders Via The Internet, 17 J. Marshall J. Computer & Info. L. 1133 (1999), Susan Oakes Jan 1999

Megan's Law: Analysis On Whether It Is Constitutional To Notify The Public Of Sex Offenders Via The Internet, 17 J. Marshall J. Computer & Info. L. 1133 (1999), Susan Oakes

UIC John Marshall Journal of Information Technology & Privacy Law

Because of the public demand for stronger governmental action against those who commit violent and sexual offenses against children, Congress implemented "Megan's Law" which mandated that the registered information of criminal child sex offenders be unlimited in disclosure so long as the information released is necessary to protect the public. Megan's Law and the Internet (as useful medium for communicating information on sex offenders), fulfill a similar goal as criminal cases receiving media attention because both aid in protecting the public from potential crimes committed by dangerous sex offenders. Megan's Law is constitutional because it is not punitive and because …


The Use Of Computers In The Sexual Exploitation Of Children And Child Pornography, 7 Computer L.J. 383 (1987), Patricia N. Chock Jan 1987

The Use Of Computers In The Sexual Exploitation Of Children And Child Pornography, 7 Computer L.J. 383 (1987), Patricia N. Chock

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.