Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 20 of 20

Full-Text Articles in Law

Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Francis C. Oroszlan Jan 2011

Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Francis C. Oroszlan

Richmond Journal of Law & Technology

The Richmond Journal of Law and Technology is proud to present its second issue of the 2010–2011 academic year.


The Admissibility Of Electronic Evidence Under The Federal Rules Of Evidence, Jonathan D. Frieden, Leigh M. Murray Jan 2011

The Admissibility Of Electronic Evidence Under The Federal Rules Of Evidence, Jonathan D. Frieden, Leigh M. Murray

Richmond Journal of Law & Technology

Following the December 2006 amendments to the Federal Rules of Civil Procedure, much has been written about the discovery of electronically-stored information.


Technology-Assisted Review In E-Discovery Can Be More Effective And More Efficient Than Exhaustive Manual Review, Maura R. Grossman, Gordon V. Cormack Jan 2011

Technology-Assisted Review In E-Discovery Can Be More Effective And More Efficient Than Exhaustive Manual Review, Maura R. Grossman, Gordon V. Cormack

Richmond Journal of Law & Technology

E-discovery processes that use automated tools to prioritize and select documents for review are typically regarded as potential cost-savers – but inferior alternatives – to exhaustive manual review, in which a cadre of reviewers assesses every document for responsiveness to a production request, and for privilege. This Article offers evidence that such technology-assisted processes, while indeed more efficient, can also yield results superior to those of exhaustive manual review, as measured by recall and precision, as well as F1, a summary measure combining both recall and precision. The evidence derives from an analysis of data collected from the TREC 2009 …


Rethinking Reasonable Expectations Of Privacy In Online Social Networks, Bryce Clayton Newell Jan 2011

Rethinking Reasonable Expectations Of Privacy In Online Social Networks, Bryce Clayton Newell

Richmond Journal of Law & Technology

In 1890, Warren and Brandeis “invented” the common law right to privacy in the United States. They declared the need for a right to privacy – “to be let alone” – because technological advancements (photography) and business methods (yellow journalism) enabled the media to bring previously private details to the attention of a much larger audience. Warren and Brandeis declared, “[i]nstantaneous photographs and newspaper enterprise have invaded the sacred precincts of private and domestic life; and numerous mechanical devices threaten to make good the prediction that ‘what is whispered in the closet shall be proclaimed from the house-tops.’” Because of …


Anything But Academic: How Copyright’S Work-For-Hire Doctrine Affects Professors, Graduate Students, And K-12 Teachers In The Information Age, Nathaniel S. Strauss Jan 2011

Anything But Academic: How Copyright’S Work-For-Hire Doctrine Affects Professors, Graduate Students, And K-12 Teachers In The Information Age, Nathaniel S. Strauss

Richmond Journal of Law & Technology

In 1938, the original designers of the Superman comic book figure assigned their ownership rights to DC Comics for $130. On January 1, 2013, their heirs plan to reclaim those rights in court. The impending Superman litigation will herald a wave of a new type of action, known as copyright termination. The Copyright Act of 1976 (“Copyright Act”) granted the original authors of creative works the right to recover rights assigned to publishers, media companies, and other parties, after a period of thirty-five years. Since the Copyright Act became effective on January 1, 1978, the original authors may first assert …


Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Stephen J. Rancourt Jan 2011

Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Stephen J. Rancourt

Richmond Journal of Law & Technology

The Richmond Journal of Law and Technology is proud to present its Annual Survey issue of the 2010–2011 academic year. The Journal strives to find interesting and contemporary topics that bisect technology and the law, and publish authors who provide in-depth and practical analysis of these topics to the legal community and beyond. To that end, this year’s Annual Survey is devoted exclusively to the topic of electronic discovery. In the two years since the Journal last published on this important issue, the availability of electronic information has increased exponentially, courts have continued to struggle with the 2006 Amendments to …


Federal Rule Of Evidence 502: Has It Lived Up To Its Potential?, Paul W. Grimm, Lisa Yurwit Bergstrom, Matthew P. Kraeuter Jan 2011

Federal Rule Of Evidence 502: Has It Lived Up To Its Potential?, Paul W. Grimm, Lisa Yurwit Bergstrom, Matthew P. Kraeuter

Richmond Journal of Law & Technology

Nothing causes litigators greater anxiety than the possibility of doing, or failing to do, something during a civil case that waives attorney– client privilege or work-product protection. Attend any seminar, webcast, podcast, or other continuing legal education course dealing with the discovery of electronically stored information (“ESI”) and you are sure to hear about this concern and how to mitigate it.


Teacher Cell Phone Searches In Light Of Ontario V. Quon, Joseph O. Oluwole Jan 2011

Teacher Cell Phone Searches In Light Of Ontario V. Quon, Joseph O. Oluwole

Richmond Journal of Law & Technology

Technological innovations permeate almost every inch of society. From the government and corporate workforce to family and social settings, technology seemingly knows no boundaries. Technology’s limitless reach has even crossed into the realm of public schools, where, according to teacher Lyn Newton, “[s]chool principals are witnessing more and more cell phone use by their teachers.” Teachers, like other cell phone users, use cell phones not only for making phone calls, but also for taking pictures and texting, which has landed some teachers in trouble for inappropriate communications. Indeed, the sexting wave has not eluded teachers.


Four Years Later: How The 2006 Amendments To The Federal Rules Have Reshaped The E-Discovery Landscape And Are Revitalizing The Civil Justice System, Bennett B. Borden, Monica Mccarroll, Brian C. Vick, Lauren M. Wheeling Jan 2011

Four Years Later: How The 2006 Amendments To The Federal Rules Have Reshaped The E-Discovery Landscape And Are Revitalizing The Civil Justice System, Bennett B. Borden, Monica Mccarroll, Brian C. Vick, Lauren M. Wheeling

Richmond Journal of Law & Technology

The 2006 amendments to the Federal Rules of Civil Procedure, which were enacted to address the potentially immense burden involved in the discovery of electronically-stored information (“ESI”), set in motion a process that is revitalizing the primary purpose of the Federal Rules of Civil Procedure adopted nearly seventy years earlier: “to secure the just, speedy, and inexpensive determination of every action and proceeding.” One of the principal means through which the Federal Rules of Civil Procedure achieve this purpose is by allowing for the discovery of “any nonprivileged matter that is relevant to any party’s claim or defense.” The reasoning …


Current And Emerging Transportation Technology: Final Nails In The Coffin Of The Dying Right Of Privacy?, James D. Phillips, Katharine E. Kohm Jan 2011

Current And Emerging Transportation Technology: Final Nails In The Coffin Of The Dying Right Of Privacy?, James D. Phillips, Katharine E. Kohm

Richmond Journal of Law & Technology

Transportation networks constitute “the circulatory system of our economy.” The distinct modes that constitute the American transportation system—air, rail, transit, highways, and waterways—impact the entire range of our daily activities. Just as the human body depends on its circulatory system for life and well being, the United States’ vitality would grind to a halting stop without a vibrant transportation system.


Spilling Secrets: Trade Secret Disclosure And Takings In Offshore Drilling Regulation, Michael A. Greene Jan 2011

Spilling Secrets: Trade Secret Disclosure And Takings In Offshore Drilling Regulation, Michael A. Greene

Richmond Journal of Law & Technology

This Article will explore whether the law may require the disclosure of adequate proprietary information to enable effective regulation. Part II will discuss the settled law regarding the property status of trade secrets, the regulatory takings doctrine, the applicability of the Takings Clause of the United States Constitution to proprietary data, and the exactions doctrine. Part III will explore the validity of the mandatory submission of proprietary health, safety, and environmental data to government regulators, with the guarantee that such data will be kept secret from competitors and the public. Part IV will then explore the validity of regulation mandating …


Do Not Track: Revising The Eu’S Data Protection Framework To Require Meaningful Consent For Behavioral Advertising, Matthew S. Kirsch Jan 2011

Do Not Track: Revising The Eu’S Data Protection Framework To Require Meaningful Consent For Behavioral Advertising, Matthew S. Kirsch

Richmond Journal of Law & Technology

The advertisements you see while browsing the Internet are rarely accidental. For instance, Alliance Data, one of many new companies in the booming data-marketing industry, can instantaneously recognize that a user visiting their client’s website is Joel Stein, a thirty-nine year-old, college educated male, who makes over $125,000 a year. Alliance Data also knows that Joel is likely to make purchases online, but only spends about $25 dollars a purchase. Using this information, and the specifics of over 100 of Joel’s past online purchases, Alliance Data creates advertisements specifically tailored to Joel and displays them as he continues to browse …


Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Francis C. Oroszlan Jan 2011

Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Francis C. Oroszlan

Richmond Journal of Law & Technology

The Richmond Journal of Law and Technology is proud to present the fourth issue of the 2010–2011 academic year. In this issue, we explore privacy law in the context of online social networking, online advertising and tort reform. Additionally, this issue examines mandatory disclosure of trade secrets as a component of offshore oil drilling regulation and evaluates certain criticisms levied against the Anti-Counterfeiting Trade Agreement.


Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Ian Lambeets Jan 2011

Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Ian Lambeets

Richmond Journal of Law & Technology

The Richmond Journal of Law and Technology is proud to present its first issue of the 2011-2012 academic year. The Journal strives to discuss new and emerging issues that fall squarely at the intersection of technology and the law. Another year goes by and technology continues to advance, and not surprisingly, further immerses itself into our daily lives. The Journal believes it is our mission to recognize the practical effects the growth of technology has on society and to promote a relevant and timely discussion on these topics.


Re-Mapping Privacy Law: How The Google Maps Scandal Requires Tort Law Reform, Lindsey A. Strachan Jan 2011

Re-Mapping Privacy Law: How The Google Maps Scandal Requires Tort Law Reform, Lindsey A. Strachan

Richmond Journal of Law & Technology

In the Internet savvy and technology dependent world of today, it is difficult to imagine life without Google Maps. The pioneer web- mapping platform provides users with a number of free services, ranging from simple directions to high-resolution imagery of terrain. The service has revolutionized travel, providing guidance and resources to more than just the directionally challenged. Contributing to this notoriety was Google’s addition of “Street View” to the array of mapping functions in May of 2007. As its name implies, the Street View function allows users to view enhanced, 360-degree snapshots of homes, streets and other public property. According …


A Critical Look At The Anti-Counterfeiting Trade Agreement, David M. Quinn Jan 2011

A Critical Look At The Anti-Counterfeiting Trade Agreement, David M. Quinn

Richmond Journal of Law & Technology

On October 23, 2007, the United States announced an initiative to strengthen intellectual property enforcement measures within the international community via the Anti-Counterfeiting Trade Agreement (“ACTA”). During the following years, eleven rounds of negotiations among as many parties culminated in a finalized text released on December 3, 2010. The dialogue occurred outside the purview of existing bodies such as the WIPO and WTO. The ACTA now awaits acceptance following the March 31, 2011 commencement of the ratification period. It will enter into force thirty days following the sixth formal approval.


The Limitations And Admissibility Of Using Historical Cellular Site Data To Track The Location Of A Cellular Phone, Aaron Blank Jan 2011

The Limitations And Admissibility Of Using Historical Cellular Site Data To Track The Location Of A Cellular Phone, Aaron Blank

Richmond Journal of Law & Technology

Imagine someone has just committed a crime. Shortly thereafter, law enforcement responds and quickly apprehends a suspect on the scene or close by. In order to prove guilt beyond a reasonable doubt, the time and place of apprehending the suspect, combined with witness testimony or physical evidence, may be enough for the prosecution to meet its burden of proof.


Law In The Age Of Exabytes: Some Further Thoughts On ‘Information Inflation’ And Current Issues In E-Discovery Search, Jason R. Baron Jan 2011

Law In The Age Of Exabytes: Some Further Thoughts On ‘Information Inflation’ And Current Issues In E-Discovery Search, Jason R. Baron

Richmond Journal of Law & Technology

In 2007, in the pages of this Journal, George L. Paul and I posed a question to the legal profession at large, to wit: can the legal system adapt to the new reality of an era of rapid inflation in the amount of electronically stored information (ESI) at issue in civil litigation? After surveying the history of technological innovation that led to an explosion of new data, we proceeded to discuss various legal strategies for success in our current inflationary epoch. These strategies included: consideration of new and emerging ways in which to think about search and information retrieval in …


Better Late Than Never: How The Online Advertising Industry’S Response To Proposed Privacy Legislation Eliminates The Need For Regulation, Catherine Schmierer Jan 2011

Better Late Than Never: How The Online Advertising Industry’S Response To Proposed Privacy Legislation Eliminates The Need For Regulation, Catherine Schmierer

Richmond Journal of Law & Technology

Although Julie Matlin liked the shoes she saw on Zappos.com, she ultimately left the site without purchasing them. However, it was not the last time she would see that pair of shoes. For the next several days, the shoes followed Ms. Matlin to numerous other websites. “It was as if Zappos had unleashed a persistent salesmen who wouldn’t take no for an answer.” Understandably, Ms. Matlin found this “online stalking” disturbing, but she was more troubled when ads for her online dieting service started following her as well. She stated, “They are still following me around, and it makes me …


Busting Blocks: Revisiting 47 U.S.C. § 230 To Address The Lack Of Effective Legal Recourse For Wrongful Inclusion In Spam Filters, Jonathan I. Ezor Jan 2011

Busting Blocks: Revisiting 47 U.S.C. § 230 To Address The Lack Of Effective Legal Recourse For Wrongful Inclusion In Spam Filters, Jonathan I. Ezor

Richmond Journal of Law & Technology

Consider a company that uses e-mail to conduct a majority of its business, including customer and vendor communication, marketing, and filing official documents. After conducting business in this manner for several years, one day the company discovers that its most recent e-mails were not delivered to recipients using a major Internet Service Provider (“ISP”) because the company was recently listed on an automated block list as a sender of unwanted bulk commercial e-mail (“spam”).