Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

UIC School of Law

Torts

UIC John Marshall Journal of Information Technology & Privacy Law

Articles 1 - 10 of 10

Full-Text Articles in Law

Health Information And Data Security Safeguards, 32 J. Marshall J. Info. Tech. & Privacy L. 133 (2016), Jane Kim, David Zakson Jan 2016

Health Information And Data Security Safeguards, 32 J. Marshall J. Info. Tech. & Privacy L. 133 (2016), Jane Kim, David Zakson

UIC John Marshall Journal of Information Technology & Privacy Law

The healthcare industry possesses information coveted by cyber criminals. Unfortunately, healthcare providers are also among the most vulnerable and unprepared to deal with cyber attacks. The Introduction sets the background of this paper with cyber security statistics of the healthcare sector. Part A of this paper will discuss how new Russian law impacts global data security. Part B takes a broad look at data security safeguards. Part C focuses on U.S. attempts at safeguarding data through NIST and its Presidential Policy Directive. In Part D, the paper explores in greater detail causes that precipitate security breaches and specific security defenses …


Setting Parental Controls: Do Parents Have A Duty To Supervise Their Children’S Use Of The Internet?, 31 J. Marshall J. Info. Tech. & Privacy L. 309 (2014), Alberto Bernabe Jan 2014

Setting Parental Controls: Do Parents Have A Duty To Supervise Their Children’S Use Of The Internet?, 31 J. Marshall J. Info. Tech. & Privacy L. 309 (2014), Alberto Bernabe

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Giving Credit Where Credit Is Due: A Comment On The Theoretical Foundation And Historical Origin Of The Tort Remedy For Invasion Of Privacy, 29 J. Marshall J. Computer & Info. L. 493 (2012), Alberto Bernabe Jan 2012

Giving Credit Where Credit Is Due: A Comment On The Theoretical Foundation And Historical Origin Of The Tort Remedy For Invasion Of Privacy, 29 J. Marshall J. Computer & Info. L. 493 (2012), Alberto Bernabe

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Internet Filtering: The Ineffectiveness Of Wto Remedies And The Availability Of Alternative Tort Remedies, 28 J. Marshall J. Computer & Info. L. 273 (2010), Kristen A. Knapp Jan 2010

Internet Filtering: The Ineffectiveness Of Wto Remedies And The Availability Of Alternative Tort Remedies, 28 J. Marshall J. Computer & Info. L. 273 (2010), Kristen A. Knapp

UIC John Marshall Journal of Information Technology & Privacy Law

Empirical studies have shown that government Internet filtering is increasing worldwide. Internet Service Providers have progressively begun to take on filtering responsibility in a quasi-governmental capacity. As filtering has increased, some have begun to question whether Internet filtering might violate WTO commitments under the General Agreement on Trade in Services (“GATS Agreement”). This paper will provide technical background on how Internet filtering is accomplished in practice, and explain the GATS Agreement that was held to govern Internet filtering in the U.S.-Gambling Services decision. This paper will further survey the current range of U.S. filtering actions and detail why tort remedies …


Tort Liability For Software Developers: A Law & Economics Perspective, 27 J. Marshall J. Computer & Info. L. 199 (2009), T. Randolph Beard, George S. Ford, Thomas M. Koutsky, Lawrence J. Spiwak Jan 2009

Tort Liability For Software Developers: A Law & Economics Perspective, 27 J. Marshall J. Computer & Info. L. 199 (2009), T. Randolph Beard, George S. Ford, Thomas M. Koutsky, Lawrence J. Spiwak

UIC John Marshall Journal of Information Technology & Privacy Law

This article explores the economic rationale for applying product liability law to computer software. As demonstrated in the article, a well-designed liability regime must place liability upon all parties who economically control the risks of accidents. Accordingly, this article finds that strict liability may be appropriate for certain types of “intrinsic” software, but not for other types of software requiring that the customer be actively involved in the selection, operation and maintenance thereof. The authors show that for this type of “extrinsic” software, a strict liability rule is unlikely to be economically optimal and, therefore, choosing a generic liability regime …


Lessons For The Hague: Internet Jurisdiction In Contract And Tort Cases In The European Community And The United States, 23 J. Marshall J. Computer & Info. L. 1 (2004), Moritz Keller Jan 2004

Lessons For The Hague: Internet Jurisdiction In Contract And Tort Cases In The European Community And The United States, 23 J. Marshall J. Computer & Info. L. 1 (2004), Moritz Keller

UIC John Marshall Journal of Information Technology & Privacy Law

With the increasing use of the Internet, all on-line users, web site owners, e-commerce companies and consumers alike, feel the need to be able to rely on clear standards for a potential contract or tort lawsuit following the Internet presence that could lead to multinational litigation. This goal could be achieved if the negotiations of the Hague Convention on international jurisdiction and enforcement of foreign judgments in civil and commercial matters succeed in harmonizing the rules of the different legal systems around the globe, or at least create a minimum standard for legal cases which would benefit greatly e-commerce and …


The Doors Are Locked But The Thieves And Vandals Are Still Getting In: A Proposal In Tort To Alleviate Corporate America's Cyber-Crime Problem, 16 J. Marshall J. Computer & Info. L. 167 (1997), David L. Gripman Jan 1997

The Doors Are Locked But The Thieves And Vandals Are Still Getting In: A Proposal In Tort To Alleviate Corporate America's Cyber-Crime Problem, 16 J. Marshall J. Computer & Info. L. 167 (1997), David L. Gripman

UIC John Marshall Journal of Information Technology & Privacy Law

This article addresses the problem of computer hackers, breaking into the computer systems of businesses, and the third party injuries that are ultimately caused by such acts. This is a multimillion dollar problem for the business community. The article discusses the current methods companies use to protect against hackers, and then the author makes some suggestions for protection that include the latest technology available. However, the paper's main focus is on ways to put pressure on businesses to ensure that its computers are protected against hackers to avoid third party injuries. The author looks to tort law to do just …


The Scientological Defenestration Of Choice-Of-Law Doctrines For Publication Torts On The Internet, 15 J. Marshall J. Computer & Info. L. 361 (1997), Christopher P. Beall Jan 1997

The Scientological Defenestration Of Choice-Of-Law Doctrines For Publication Torts On The Internet, 15 J. Marshall J. Computer & Info. L. 361 (1997), Christopher P. Beall

UIC John Marshall Journal of Information Technology & Privacy Law

Two major doctrines exist for choosing which state's law applies to an interstate tort: the "lex loci deliciti" (the law of the place of the wrong) approach and the "most significant relationship" approach. In the context of the Internet, the "lex loci deliciti" approach has been criticized for its harshness. For example, it is possible for an e-mail posting to be non-actionable where written, but actionable where read. Likewise, the "most significant relationship" approach has been criticized for its indeterminacy and lack of predictability because the outcome as to the extent of liability for a publication tort on the Internet …


Restatement (Second) Of Torts Section 324a: An Innovative Theory Of Recovery For Patients Injured Through Use Or Misuse Of Health Care Information Services, 14 J. Marshall J. Computer & Info. L. 73 (1995), Lisa L. Dahm Jan 1995

Restatement (Second) Of Torts Section 324a: An Innovative Theory Of Recovery For Patients Injured Through Use Or Misuse Of Health Care Information Services, 14 J. Marshall J. Computer & Info. L. 73 (1995), Lisa L. Dahm

UIC John Marshall Journal of Information Technology & Privacy Law

The author in this comment discusses how developments in information technology and widespread utilization of technology and software in the patient care context raise the issue of clinical liability for health care information systems vendors. The comment discusses a theory of recovery of tort damages for the negligence of health care information systems vendors under section 324A of the Restatement (Second) of Torts. Section 324A provides in essence that "one who undertakes ... for consideration, to render services to another which he should recognize as necessary for the protection of a third person ... is subject to liability to the …


Tort Liability For Artificial Intelligence And Expert Systems, 10 Computer L.J. 127 (1990), George S. Cole Jan 1990

Tort Liability For Artificial Intelligence And Expert Systems, 10 Computer L.J. 127 (1990), George S. Cole

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.