Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 18 of 18

Full-Text Articles in Law

Debatable Premises In Telecom Policy, 31 J. Marshall J. Info. Tech. & Privacy L. 453 (2015), Justin (Gus) Hurwitz, Roslyn Layton Jan 2015

Debatable Premises In Telecom Policy, 31 J. Marshall J. Info. Tech. & Privacy L. 453 (2015), Justin (Gus) Hurwitz, Roslyn Layton

UIC John Marshall Journal of Information Technology & Privacy Law

The five premises that this paper considers are:

1. Everyone needs low-cost access to high speed broadband service

2. High-speed broadband is necessary for education, health, government, and other social services

3. Wireless can‟t compete with cable

4. An open Internet is necessary for innovation and necessarily benefits consumers

5. Telecommunications are better somewhere else.


The Law And 3d Printing, 31 J. Marshall J. Info. Tech. & Privacy L. 505 (2015), Jasper Tran Jan 2015

The Law And 3d Printing, 31 J. Marshall J. Info. Tech. & Privacy L. 505 (2015), Jasper Tran

UIC John Marshall Journal of Information Technology & Privacy Law

Recent years have seen extraordinary growth in the amount of legal scholarship and practice at the intersection of law and 3D printing. To help navigate this emerging field of 3D printing law, I created the accompanying Law and 3D Printing Bibliography. The published bibliography presented herein contains over 100 entries. The brief introductory comments to the published piece discuss the creation and contents of the bibliography, and provide suggestions for where one should begin their research in the area. The comments focus on (1) 3D printing‘s background, (2) historical growth pattern of law and 3D printing scholarship, (3) identification of …


Legal Problems In Data Management: It & Privacy At The Forefront: Opening Remarks, 31 J. Marshall J. Info. Tech. & Privacy L. 521 (2015) Jan 2015

Legal Problems In Data Management: It & Privacy At The Forefront: Opening Remarks, 31 J. Marshall J. Info. Tech. & Privacy L. 521 (2015)

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Selected State Laws Governing The Safeguarding And Disposing Of Personal Information, 31 J. Marshall J. Info. Tech. & Privacy L. 487 (2015), Bruce Radke, Michael Waters Jan 2015

Selected State Laws Governing The Safeguarding And Disposing Of Personal Information, 31 J. Marshall J. Info. Tech. & Privacy L. 487 (2015), Bruce Radke, Michael Waters

UIC John Marshall Journal of Information Technology & Privacy Law

Numerous states have adopted laws mandating the protection and disposal of personal information. Under those laws, businesses are required to implement and maintain reasonable security procedures and practices appropriate to the nature of the information in order to protect the personal information from unauthorized access, destruction, use, modification, or disclosure. Although the definition of “personal information” varies from state to state, “personal information” is generally defined as an individual’s first name or initial and last name in combination with any one or more of the following data elements, when either the name or the data elements are not encrypted or …


Legal Problems In Data Management: It & Privacy At The Forefront: Dual-Use Devices In The Workplace, 31 J. Marshall J. Info. Tech. & Privacy L. 527 (2015) Jan 2015

Legal Problems In Data Management: It & Privacy At The Forefront: Dual-Use Devices In The Workplace, 31 J. Marshall J. Info. Tech. & Privacy L. 527 (2015)

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Legal Problems In Data Management: It & Privacy At The Forefront: “Big Data”: Ownership, Copyright, And Protection, 31 J. Marshall J. Info. Tech. & Privacy L. 565 (2015) Jan 2015

Legal Problems In Data Management: It & Privacy At The Forefront: “Big Data”: Ownership, Copyright, And Protection, 31 J. Marshall J. Info. Tech. & Privacy L. 565 (2015)

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Legal Problems In Data Management: It & Privacy At The Forefront: Drafting And Implementing Effective Social Media Policies In The Workplace, 31 J. Marshall J. Info. Tech. & Privacy L. 549 (2015) Jan 2015

Legal Problems In Data Management: It & Privacy At The Forefront: Drafting And Implementing Effective Social Media Policies In The Workplace, 31 J. Marshall J. Info. Tech. & Privacy L. 549 (2015)

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Legal Problems In Data Management: Ethics Of Big Data Analytics And The Importance Of Disclosure, 31 J. Marshall J. Info. Tech. & Privacy L. 641 (2015) Jan 2015

Legal Problems In Data Management: Ethics Of Big Data Analytics And The Importance Of Disclosure, 31 J. Marshall J. Info. Tech. & Privacy L. 641 (2015)

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Japanese And American Privacy Laws, Comparative Analysis, 32 J. Marshall J. Info. Tech. & Privacy L. 1 (2015), Jane Kim Jan 2015

Japanese And American Privacy Laws, Comparative Analysis, 32 J. Marshall J. Info. Tech. & Privacy L. 1 (2015), Jane Kim

UIC John Marshall Journal of Information Technology & Privacy Law

To understand the laws of a foreign nation, one must first under-stand that nation’s culture. Its people and their customs will provide in-sight into the proper interpretation and application of such laws. For those reasons, this commentary commences with cursory background on Japanese people, followed by a brief comparative analysis of Health In-surance Portability and Accountability Act (“HIPAA”) (enacted in 1996) and its Japanese counterpart, the Act on the Protection of Personal In-formation (“APPI”) (enacted in 2003). The Japanese have borrowed a lot of American concepts of privacy laws. This paper will explore how these imported privacy concepts may not …


Legal Problems In Data Management: The Impact Of International Data Restriction Laws On U.S. Companies, 31 J. Marshall J. Info. Tech. & Privacy L. 609 (2015) Jan 2015

Legal Problems In Data Management: The Impact Of International Data Restriction Laws On U.S. Companies, 31 J. Marshall J. Info. Tech. & Privacy L. 609 (2015)

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Industry Self-Regulation Of Consumer Data Privacy And Security, 32 J. Marshall J. Info. Tech. & Privacy L. 15 (2015), Siona Listokin Jan 2015

Industry Self-Regulation Of Consumer Data Privacy And Security, 32 J. Marshall J. Info. Tech. & Privacy L. 15 (2015), Siona Listokin

UIC John Marshall Journal of Information Technology & Privacy Law

Industry self-regulation of consumer data privacy and security has been proposed as a flexible alternative and compliment to traditional government regulation. This study analyzes whether different types of existing industry-led standards improve online privacy and security. This paper examines which types of firms join voluntary standards and whether there is a difference in outcomes between trade association memberships (like the Digital Advertising Alliance) and certification programs (like TRUSTe). Results suggest that more trafficked websites are more likely to adopt standards, and that trade association member-ship does not have an effect on privacy and security performance. This article highlights the need …


Legal Problems In Data Management: It & Privacy At The Forefront: Developments In Cybersecurity Law And Best Practices, 31 J. Marshall J. Info. Tech. & Privacy L. 587 (2015) Jan 2015

Legal Problems In Data Management: It & Privacy At The Forefront: Developments In Cybersecurity Law And Best Practices, 31 J. Marshall J. Info. Tech. & Privacy L. 587 (2015)

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Legal Problems In Data Management: Global Approach To Data Privacy: Safe Harbor, 31 J. Marshall J. Info. Tech. & Privacy L. 633 (2015) Jan 2015

Legal Problems In Data Management: Global Approach To Data Privacy: Safe Harbor, 31 J. Marshall J. Info. Tech. & Privacy L. 633 (2015)

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


‘The Greatest Wealth Is Health’: Patient Protected Health Information In The Hands Of Hackers, 31 J. Marshall J. Info. Tech. & Privacy L. 657 (2015), Samantha Singer Jan 2015

‘The Greatest Wealth Is Health’: Patient Protected Health Information In The Hands Of Hackers, 31 J. Marshall J. Info. Tech. & Privacy L. 657 (2015), Samantha Singer

UIC John Marshall Journal of Information Technology & Privacy Law

This comment will analyze the specific requirements and stages that EPs/EHs must comply with in order to receive its Medicare and Medicaid incentives, how EHR technologies are being implemented, how EHR technologies are affecting patients' privacy with regard to hacking a patient‟s PHI, and what EHR technology vendors and EPs/EHs should be doing to improve patient privacy and security to prevent hacking and other breaches.

Part I of this comment will address hacking of PHI. Part II will analyze the security measures that EHR vendors must currently incorporate into EHR technology and how the lack of required security measures impacts …


The Truth Behind Data Collection And Analysis, 32 J. Marshall J. Info. Tech. & Privacy L. 33 (2015), Morgan Hochheiser Jan 2015

The Truth Behind Data Collection And Analysis, 32 J. Marshall J. Info. Tech. & Privacy L. 33 (2015), Morgan Hochheiser

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Amending Rape Shield Laws: Outdated Statutes Fail To Protect Victims On Social Media, 48 J. Marshall L. Rev. 1087 (2015), Sydney Janzen Jan 2015

Amending Rape Shield Laws: Outdated Statutes Fail To Protect Victims On Social Media, 48 J. Marshall L. Rev. 1087 (2015), Sydney Janzen

UIC Law Review

This Comment will first discuss the discoverability and admissibility of social media evidence in criminal and/or civil sexual assault cases. Section II(A) provides a broad overview of both federal and state rape shield laws, including the legislative policies behind their enactments, as well as the modern expansion of social media in the context of the legal system. Section II(B) will address the modern utility of social media in the context of the legal system. Section III first analyzes how courts look at discoverability and admissibility of social media evidence generally, and then focuses on sexual assault cases specifically. Further, Section …


Can A One-Star Review Get You Sued? The Right To Anonymous Speech On The Internet And The Future Of Internet “Unmasking” Statutes, 48 J. Marshall L. Rev. 693 (2015), Jesse Lively Jan 2015

Can A One-Star Review Get You Sued? The Right To Anonymous Speech On The Internet And The Future Of Internet “Unmasking” Statutes, 48 J. Marshall L. Rev. 693 (2015), Jesse Lively

UIC Law Review

No abstract provided.


Read, White, And Blue: Prosecutors Reading Inmate Emails And The Attorney-Client Privilege, 48 J. Marshall L. Rev. 1119 (2015), Danielle Burkhardt Jan 2015

Read, White, And Blue: Prosecutors Reading Inmate Emails And The Attorney-Client Privilege, 48 J. Marshall L. Rev. 1119 (2015), Danielle Burkhardt

UIC Law Review

This Comment addresses whether the attorney-client privilege should extend to emails exchanged between an inmate and his or her attorney over TRULINCS, the prison email system. Section II describes the history of the attorney-client privilege, and compares and contrasts the federal privilege with the New York state privilege in order to directly address Dr. Ahmed’s conflict. Section III juxtaposes other forms of privileged attorney-client contact with inmate emailing, and discusses the confidentiality agreement provided through the prison email system, TRULINCS. Finally, Section IV proposes a fiscally responsible, efficient, and convenient solution to the possible extension of the attorney-client privilege to …