Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 43 of 43

Full-Text Articles in Law

The Federal Government Giveth And Taketh Away: How Nsi's Domain Name Dispute Policy (Revision 02) Usurps A Domain Name Owner's Fifth Amendment Procedural Due Process, 15 J. Marshall J. Computer & Info. L. 547 (1997), Steven A. Mcauley Jan 1997

The Federal Government Giveth And Taketh Away: How Nsi's Domain Name Dispute Policy (Revision 02) Usurps A Domain Name Owner's Fifth Amendment Procedural Due Process, 15 J. Marshall J. Computer & Info. L. 547 (1997), Steven A. Mcauley

UIC John Marshall Journal of Information Technology & Privacy Law

The Internet, which links millions of computer networks together worldwide for the purpose of automated communication, is the forefront of communications technology. An Internet domain name, which functions as a computer user's "address" on the Internet, not only identifies individuals and organizations, but is an important commercial source designator for businesses. The Internet Network Information Center ("InterNIC") is a central resource center for Internet users that operates the Internet Domain Name System ("DNS"). InterNIC, which comprises NSI and AT&T, performs various Internet services, including NSI's Internet domain name coordination and registration. Along with the positive effects that the Internet has …


An Island In The Net: Domain Naming And English Administrative Law, 15 J. Marshall J. Computer & Info. L. 493 (1997), Mark Gould Jan 1997

An Island In The Net: Domain Naming And English Administrative Law, 15 J. Marshall J. Computer & Info. L. 493 (1997), Mark Gould

UIC John Marshall Journal of Information Technology & Privacy Law

The United Kingdom's system for assigning domain names is privately run and follows some Internet standard for assignments and revocations. However, there are some internal restrictions that reflect the policy of accommodating existing domains and avoiding DNS lock up, which might occur with badly configured domain name servers. Nominet does not easily fit into definitions of a private function since it does have some public characteristics. In addition, no British counterpart to the Internet Service OC exists. The policies followed by Nominet in allocating domain names reflects conventions established prior to its existence. These policies do not appear to take …


1996 John Marshall National Moot Court Competition In Information And Privacy Law: Brief For The Petitioner, 15 J. Marshall J. Computer & Info. L. 609 (1997), Donna Blevins, Kathy Partain, Jay Ray Jan 1997

1996 John Marshall National Moot Court Competition In Information And Privacy Law: Brief For The Petitioner, 15 J. Marshall J. Computer & Info. L. 609 (1997), Donna Blevins, Kathy Partain, Jay Ray

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Federal Trade Commission's Commitment To On-Line Consumer Protection, 15 J. Marshall J. Computer & Info. L. 679 (1997), Roscoe B. Starek Iii, Lynda M. Rozelle Jan 1997

The Federal Trade Commission's Commitment To On-Line Consumer Protection, 15 J. Marshall J. Computer & Info. L. 679 (1997), Roscoe B. Starek Iii, Lynda M. Rozelle

UIC John Marshall Journal of Information Technology & Privacy Law

This article deals with the Federal Trade Commission's (FTC) efforts to apply consumer protection statutes to on-line activity. The article describes the role of the FTC and explains how it operates. It also discusses the applicability of the Mail or Telephone Order Merchandise Rule, the Fair Credit Billing Act and the Electronic Fund Transfer Act to on-line commerce. Lastly, it describes and examines Section 5 of the FTC Act, which prohibits unfair and deceptive acts or practices in or affecting commerce. This article also examines recent cases that involved on-line crimes, as well as "sweeps" that the FTC regularly executes …


Perfecting A Security Interest In Computer Software Copyrights: Getting It Right, 15 J. Marshall J. Computer & Info. L. 855 (1997), Aimee A. Watterberg Jan 1997

Perfecting A Security Interest In Computer Software Copyrights: Getting It Right, 15 J. Marshall J. Computer & Info. L. 855 (1997), Aimee A. Watterberg

UIC John Marshall Journal of Information Technology & Privacy Law

The rapid development of computer technology has led software companies to seek financial support from various commercial lenders. Lenders are typically unaccustomed and unwilling to lend money on the security of intellectual property. The fear of lenders is well founded because lenders face a considerable risk in lending money on contemporary and intangible collateral. As a result of the unavailability of funds, technology based companies would be hindered in their efforts to promote new programs. The unclarity of laws with respect to obtaining a security interest has created obstacles for parties on both sides of the transaction -- the lender …


The West German Smorgasbord Approach To Intellectual Property Protection Of Computer Software, 15 J. Marshall J. Computer & Info. L. 883 (1997), Larry N. Woodard Jan 1997

The West German Smorgasbord Approach To Intellectual Property Protection Of Computer Software, 15 J. Marshall J. Computer & Info. L. 883 (1997), Larry N. Woodard

UIC John Marshall Journal of Information Technology & Privacy Law

There is a lack of efficient protection for intellectual property within the computer software medium. Intellectual property of computer software has traditionally been protected by copyrights and relatively recently has been afforded protection of its intellectual property via patents. The distinction between a computer's hardware and a computer's software is decreasing; likewise, the distinction for such protection, namely patents and copyrights, respectively, should be decreased or eliminated, as well. After a brief comparative analysis of patent and copyright protection for computer software, an alternative to the current system of protection for software intellectual property exists. The nature of the software …


1996 John Marshall National Moot Court Competition In Information And Privacy Law: Bench Memorandum, 15 J. Marshall J. Computer & Info. L. 587 (1997), David E. Sorkin Jan 1997

1996 John Marshall National Moot Court Competition In Information And Privacy Law: Bench Memorandum, 15 J. Marshall J. Computer & Info. L. 587 (1997), David E. Sorkin

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Notaries Public - Lost In Cyberspace, Or Key Business Professionals Of The Future?, 15 J. Marshall J. Computer & Info. L. 703 (1997), Michael L. Closen, R. Jason Richards Jan 1997

Notaries Public - Lost In Cyberspace, Or Key Business Professionals Of The Future?, 15 J. Marshall J. Computer & Info. L. 703 (1997), Michael L. Closen, R. Jason Richards

UIC John Marshall Journal of Information Technology & Privacy Law

This article examines past and future problems that notaries and cybernotaries face. The article discusses the lack of notaries' business worth because of their inadequate knowledge of their responsibilities and poor job performance. The authors explain the reasons for notaries' inadequate knowledge of their responsibilities, ranging from failure to test before commission renewal to failure to describe the duties of the office. In addition, the authors examine the reasons behind poor job performance, such as negligence, misunderstanding and even illegal conduct. The article discusses the procedure to become a notary, ranging from the qualifications to become a notary to the …


Personal Jurisdiction In Cyberspace: The Constitutional Boundary Of Minimum Contacts Limited To A Web Site, 15 J. Marshall J. Computer & Info. L. 819 (1997), David L. Stott Jan 1997

Personal Jurisdiction In Cyberspace: The Constitutional Boundary Of Minimum Contacts Limited To A Web Site, 15 J. Marshall J. Computer & Info. L. 819 (1997), David L. Stott

UIC John Marshall Journal of Information Technology & Privacy Law

This comment analyzes the limits of personal jurisdiction arising from cyberspace contacts through a discussion of the traditional framework of personal jurisdiction, including a minimum contacts analysis. It examines pertinent decisions wherein the courts apply the personal jurisdiction framework to contacts limited to the Internet, such as CompuServe v. Patterson, Zippo Manufacturing v. Zippo Dot Com, Bensusan v. King, and Hearst v. Goldberger. The comment further analogizes the minimum contacts involved in cyberspace transactions by using the narrow "stream of commerce" analysis adopted by Justice O'Connor in Asahi requiring additional activity within a jurisdiction for personal jurisdiction to exist within …


1996 John Marshall National Moot Court Competition In Information And Privacy Law: Brief For The Respondent, 15 J. Marshall J. Computer & Info. L. 645 (1997), Stacey Mckinley, Elizabeth Schmidt, Jeffrey Whitesell Jan 1997

1996 John Marshall National Moot Court Competition In Information And Privacy Law: Brief For The Respondent, 15 J. Marshall J. Computer & Info. L. 645 (1997), Stacey Mckinley, Elizabeth Schmidt, Jeffrey Whitesell

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Copyright Battle: Emerging International Rules And Roadblocks On The Global Information Infrastructure, 15 J. Marshall J. Computer & Info. L. 759 (1997), Stephen Fraser Jan 1997

The Copyright Battle: Emerging International Rules And Roadblocks On The Global Information Infrastructure, 15 J. Marshall J. Computer & Info. L. 759 (1997), Stephen Fraser

UIC John Marshall Journal of Information Technology & Privacy Law

This article discusses intellectual property rights on the Global Information Infrastructure (GII) as affected by the evolution of the Internet. It outlines the battle between the advocates of total copyright protection and the advocates of minimal copyright protection. The article examines all of the proposed national and international laws affecting copyright protection on the GII, beginning with the minimal protections outlined in the Berne Convention and the problems involved in its enforcement and continuing with its successors, the General Agreement on Tariffs and Trade (GATT)/World Trade Organization (WTO). The article reviews the history of international copyright protection and the different …


Computers And The Year 2000: Are You Ready, 30 J. Marshall L. Rev. 837 (1997), Robert G. Gerber Jan 1997

Computers And The Year 2000: Are You Ready, 30 J. Marshall L. Rev. 837 (1997), Robert G. Gerber

UIC Law Review

No abstract provided.


Notary Law And Practice For The 21st Century: Suggested Modifications For The Model Notary Act, 30 J. Marshall L. Rev. 1063 (1997), Vincent Gnoffo Jan 1997

Notary Law And Practice For The 21st Century: Suggested Modifications For The Model Notary Act, 30 J. Marshall L. Rev. 1063 (1997), Vincent Gnoffo

UIC Law Review

No abstract provided.