Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Evidence (13)
- Legal Writing and Research (6)
- Civil Law (3)
- Litigation (3)
- Social and Behavioral Sciences (3)
-
- State and Local Government Law (3)
- Civil Procedure (2)
- Civil Rights and Discrimination (2)
- Computer Law (2)
- Courts (2)
- Entertainment, Arts, and Sports Law (2)
- Internet Law (2)
- Legislation (2)
- Library and Information Science (2)
- Computer Engineering (1)
- Computer Sciences (1)
- Criminal Law (1)
- Electrical and Computer Engineering (1)
- Engineering (1)
- Forensic Science and Technology (1)
- Information Security (1)
- Law and Society (1)
- Legal Profession (1)
- Legal Studies (1)
- Physical Sciences and Mathematics (1)
- Privacy Law (1)
- Science and Technology Law (1)
- Secured Transactions (1)
- Securities Law (1)
- Institution
-
- Selected Works (3)
- University of Michigan Law School (3)
- George Washington University Law School (2)
- SelectedWorks (2)
- St. Mary's University (2)
-
- Touro University Jacob D. Fuchsberg Law Center (2)
- University of Florida Levin College of Law (2)
- Case Western Reserve University School of Law (1)
- Cleveland State University (1)
- Embry-Riddle Aeronautical University (1)
- Florida State University College of Law (1)
- Institute of Social Sciences, TOYO University (1)
- Maurer School of Law: Indiana University (1)
- Ministry of Higher and Secondary Specialized Education of the Republic of Uzbekistan (1)
- Roger Williams University (1)
- Seattle University School of Law (1)
- The Catholic University of America, Columbus School of Law (1)
- The University of San Francisco (1)
- University of Colorado Law School (1)
- University of Kentucky (1)
- University of Maryland Francis King Carey School of Law (1)
- University of Nebraska - Lincoln (1)
- Valparaiso University (1)
- Vanderbilt University Law School (1)
- Publication Year
- Publication
-
- Faculty Articles (2)
- GW Law Faculty Publications & Other Works (2)
- Michigan Law Review (2)
- UF Law Faculty Publications (2)
- Articles (1)
-
- Articles by Maurer Faculty (1)
- Catholic University Journal of Law and Technology (1)
- Claire Germain (1)
- Cleveland State Law Review (1)
- Colin Miller (1)
- Deseriee A. Kennedy (1)
- Faculty Publications (1)
- Ira P. Robbins (1)
- Japanese Society and Culture (1)
- Journal of Digital Forensics, Security and Law (1)
- Law Faculty Publications (1)
- Law Faculty Scholarly Articles (1)
- Life of the Law School (1993- ) (1)
- M. Anderson Berry (1)
- Marvin and Virginia Schmid Law Library (1)
- Publications (1)
- Review of law sciences (1)
- Scholarly Publications (1)
- Scholarly Works (1)
- Seattle University Law Review (1)
- Student Articles and Papers (1)
- Touro Law Review (1)
- University of San Francisco Law Review (1)
- Vanderbilt Journal of Entertainment & Technology Law (1)
- Publication Type
Articles 1 - 30 of 33
Full-Text Articles in Law
Authentication Of Cybernetic Avatars And Legal System Challenges; With A View To The Trial Concept Of New Dimensional Domain Jurisprudence (Ai, Robot, And Avatar Law), Fumio Shimpo
Japanese Society and Culture
This article aims to illustrate the basis for the development of authentication, which will be the foundation of future cybernetic-avatar (CA) infrastructures, enabling the safe and secure use of CA’s. This will be realised by the authentication of CA operators (User Authentication Technology), identification and authentication of CA’s (CA Authentication), and ensuring connectivity and existence between operators (User Entities) and the CA’s themselves (CA Notarisation). An ELSI (Ethical, Legal, Social Implications) research platform will be established, to develop a new dimension of the legal field, that is, AI, Robot, and Avatar Law to solve the social issues and realise an …
The Threat Of Deepfakes In Litigation: Raising The Authentication Bar To Combat Falsehood, Agnieszka Mcpeak
The Threat Of Deepfakes In Litigation: Raising The Authentication Bar To Combat Falsehood, Agnieszka Mcpeak
Vanderbilt Journal of Entertainment & Technology Law
Deepfakes are all over the internet—from shape-shifting comedians and incoherent politicians to disturbingly realistic fake pornography. Emerging technology makes it easier than ever to create a convincing deepfake. What used to take significant time and money to develop is now widely available, often for free, thanks to rapid advances in deepfake technology.
Deepfakes threaten individual rights and even democracy. But their impact on litigation should not be overlooked. The US adversarial system of justice is built on a foundation of seeking out the truth to arrive at a just result. The Federal Rules of Evidence serve as an important framework …
You Can't Trust Everything On The Internet: A Look Into Texas' And Maryland's Approach Of Social Media Authentication, Danielle Orr
You Can't Trust Everything On The Internet: A Look Into Texas' And Maryland's Approach Of Social Media Authentication, Danielle Orr
Catholic University Journal of Law and Technology
If unauthenticated evidence is admitted into the court's record, and makes a defendant’s charge more probable, that defendant’s Fifth and Fourteenth Amendment rights to life and liberty have been violated. Social media evidence, due to the ease of hacking and catfishing, can be unreliable, thus Maryland and Texas have led the way, with two respective approaches, on how to handle such evidence. Maryland, with its proscribed three authentication methods, has a less trusting view of social media, and realizes the dangers wrongfully entered evidence may have on a defendant’s due process. Alternatively, Texas has not heighten scrutiny on social media …
Civil Law Specifics Of Transactions In E-Commerce, A.A. Yakoenko
Civil Law Specifics Of Transactions In E-Commerce, A.A. Yakoenko
Review of law sciences
the essence and significance of transactions in electronic commerce are characterized, the features and the order of their conclusion are shown, problems and legal conflicts arising during electronic data exchange are revealed
Revenge Porn, Thomas Lonardo, Tricia P. Martland, Rhode Island Bar Journal
Revenge Porn, Thomas Lonardo, Tricia P. Martland, Rhode Island Bar Journal
Life of the Law School (1993- )
No abstract provided.
Legal Information Management In A Global And Digital Age: Revolution And Tradition, Claire M. Germain
Legal Information Management In A Global And Digital Age: Revolution And Tradition, Claire M. Germain
Claire Germain
This article presents an overview of the public policy issues surrounding digital libraries, and describes some current trends, such as Web 2.0, the social network. It discusses the impact of globalization and the Internet on international and foreign law information, the free access to law movement and open access scholarship, and mass digitization projects, then turns to some concerns, focusing on preservation and long term access to born digital legal information and authentication of official digital legal information. It finally discusses new roles for librarians, called upon to evaluate the quality of information teach legal research methodology and be advocates …
Authentication And Hearsay: Which Trumps?, Stephen A. Saltzburg
Authentication And Hearsay: Which Trumps?, Stephen A. Saltzburg
GW Law Faculty Publications & Other Works
This article addresses the relationship between two federal rules of evidence: Rules 104(a) and 104(b) and which standards a trial judge should apply in admitting hearsay evidence when its authentication is in question. Focusing on United States v. Harvey, 117 F.3d 1044 (7th Circ. 1997) and a simple hypothetical, the article concludes that evidence must be authenticated under Rule 104(b) as well as satisfying the hearsay rule and Rule 104(a).
Should The Ftc Kill The Password? The Case For Better Authentication, Daniel J. Solove, Woodrow Hartzog
Should The Ftc Kill The Password? The Case For Better Authentication, Daniel J. Solove, Woodrow Hartzog
GW Law Faculty Publications & Other Works
Data security breaches are occurring at an alarming frequency, and one of the main causes involves problems authenticating the identity of account holders. The most common approach to authentication is the use of passwords, but passwords are a severely flawed means of authentication. People are being asked to do a nearly impossible task – create unique, long, and complex passwords for each of the numerous accounts they hold, change them frequently, and remember them all. People do very poorly in following these practices, and even if they manage to do so, hackers and phishers can readily trick people into revealing …
Evidentiary Power And Propriety Of Digital Identifiers And The Impact On Privacy Rights In The United States, Michael Losavio, Deborah Keeling
Evidentiary Power And Propriety Of Digital Identifiers And The Impact On Privacy Rights In The United States, Michael Losavio, Deborah Keeling
Journal of Digital Forensics, Security and Law
Media and network systems capture and store data about electronic activity in new, sometimes unprecedented ways; computational systems make for new means of analysis and knowledge development. These new forms offer new, powerful tactical tools for investigations of electronic malfeasance under traditional legal regulation of state power, particular that of Fourth Amendment limitations on police searches and seizures under the U.S. Constitution. But autonomy, identity and authenticity concerns with electronic data raise issues of public policy, privacy and proper police oversight of civil society. We examine those issues and their implications for digital and computational forensics
Uelma - Another First For Colorado, Susan Nevelow Mart
Uelma - Another First For Colorado, Susan Nevelow Mart
Publications
No abstract provided.
Friends, Gangbangers, Custody Disputants, Lend Me Your Passwords, Aviva Orenstein
Friends, Gangbangers, Custody Disputants, Lend Me Your Passwords, Aviva Orenstein
Articles by Maurer Faculty
Whenever parties seek to introduce out-of-court statements, evidentiary issues of hearsay and authentication will arise. As methods of communication expand, the Rules of Evidence must necessarily keep pace. The rules remain essentially the same, but their application vary with new modes of communication. Evidence law has been very adaptable in some ways, and notoriously conservative, even stodgy, in others. Although statements on Facebook and other social media raise some interesting questions concerning the hearsay rule and its exceptions, there has been little concern about applying the hearsay doctrine to such forms of communication. By contrast, such new media have triggered …
Processing Civil Rights Summary Judgment And Consumer Discrimination Claims, Deseriee A. Kennedy
Processing Civil Rights Summary Judgment And Consumer Discrimination Claims, Deseriee A. Kennedy
Deseriee A. Kennedy
No abstract provided.
The Virtues Of Common Law Theories And Disclosure Requirements In The Market For Fine Art, Brian D. Tobin
The Virtues Of Common Law Theories And Disclosure Requirements In The Market For Fine Art, Brian D. Tobin
Student Articles and Papers
For centuries common law warranties and fraud theories have regulated misattribution and mistaken provenance in the market for fine art. Scholars have in recent decades proposed theories to supplement protection for unsophisticated buyers transacting with auction houses or dealers. Academia has also proposed the imposition of securities regulations upon auction houses for the purpose of protecting sellers—an argument that can be extended to protect buyers transacting with either auction houses or dealerships. In practice, the theories put forth to protect purchasers may not have an added benefit and will likely disrupt liquidity. The extension of regulations akin to the securities …
Writings On The Wall: The Need For An Authorship-Centric Approach To The Authentication Of Social-Networking Evidence, Ira P. Robbins
Writings On The Wall: The Need For An Authorship-Centric Approach To The Authentication Of Social-Networking Evidence, Ira P. Robbins
Ira P. Robbins
Legal Research In The Digital Age: Authentication And Preservation Of Primary Material, Matt Novak
Legal Research In The Digital Age: Authentication And Preservation Of Primary Material, Matt Novak
Marvin and Virginia Schmid Law Library
Most legal professionals have used free online resources to help in the legal research process. Whether it is an opinion downloaded from a court's Web site, a federal statute located using Cornell's Legal Information Institute (LII), an article on Wikipedia, or a post on someone's blawg, the quantity and variety of free online resources seems to grow on a daily basis. Some have even wondered if these resources can one day replace the need to subscribe to a computer-assisted legal research (CALR) service such as Westlaw or LexisNexis. Late last year, the "blogosphere" was abuzz with this question after Google …
Voodoo Information: Authenticating Web Pages In Federal Court, M. Anderson Berry, David Kiernan
Voodoo Information: Authenticating Web Pages In Federal Court, M. Anderson Berry, David Kiernan
M. Anderson Berry
For many litigators, one of the first things they do is see what is available about the opposing party, searching Google, social networking sites and the party’s websites. And during the life of the case, there will likely be other valuable information obtained from the Internet that will be used at deposition or trial. Commonly, the proponent of online evidence will present a “screen shot” of the webpage, which was either downloaded as a .pdf or printed directly from the website. If proper steps are not taken to admit the evidence, the value of this information may be lost.
As …
Should You Use It? Tips On Authenticating Online Legal Sources, Emily M. Janoski-Haehlen
Should You Use It? Tips On Authenticating Online Legal Sources, Emily M. Janoski-Haehlen
Law Faculty Publications
No abstract provided.
Even Better Than The Real Thing: How Courts Have Been Anything But Liberal In Finding Genuine Questions Raised As To The Authenticity Of Originals Under Rule 1003, Colin Miller
Colin Miller
In the common law days, parties seeking to prove the contents of documents were required to produce the original documents or account for their nonproduction. Pursuant to the Best Evidence Rule, if such parties neither produced the originals nor accounted for their nonproduction, courts prevented them from proving their contents through secondary evidence such as handwritten copies or testimony. With the invention of new technologies such as the process of xerography, however, states in the twentieth century began enacting exceptions to the Best Evidence Rule which allowed for the admission of duplicates created without manual transcription even when proponents could …
Legal Information Management In A Global And Digital Age: Revolution And Tradition, Claire M. Germain
Legal Information Management In A Global And Digital Age: Revolution And Tradition, Claire M. Germain
UF Law Faculty Publications
This article presents an overview of the public policy issues surrounding digital libraries, and describes some current trends, such as Web 2.0, the social network. It discusses the impact of globalization and the Internet on international and foreign law information, the free access to law movement and open access scholarship, and mass digitization projects, then turns to some concerns, focusing on preservation and long term access to born digital legal information and authentication of official digital legal information. It finally discusses new roles for librarians, called upon to evaluate the quality of information teach legal research methodology and be advocates …
Authentication And The Best And Secondary Evidence Rules, Miguel A. Mendez
Authentication And The Best And Secondary Evidence Rules, Miguel A. Mendez
University of San Francisco Law Review
This article examines the requirements to introduce writings into evidence: authentication, the best and secondary evidence rules, and the completeness doctrine. It also highlights the differences between the California rules and federal rules as they relate to authentication of writings.
Processing Civil Rights Summary Judgment And Consumer Discrimination Claims, Deseriee A. Kennedy
Processing Civil Rights Summary Judgment And Consumer Discrimination Claims, Deseriee A. Kennedy
Scholarly Works
No abstract provided.
Digital Legal Information: Ensuring Access To The "Official" Word Of The Law, Claire M. Germain
Digital Legal Information: Ensuring Access To The "Official" Word Of The Law, Claire M. Germain
UF Law Faculty Publications
In the United States today, digital versions of current decisions, bills, statutes, and regulations issued by federal and state entities are widely available on publicly accessible Internet Web sites. Worldwide, official legal information issued by international organizations and foreign governments is also becoming available on the Web. However, there are currently no standards for the production and authentication of digital documents. Moreover, the information is sometimes available only for a short time and then disappears from the site. Most of that digital information provides only a right of access, and no ownership, or control over the data, unless it is …
Diogenes Wanders The Superhighway: A Proposal For Authentication Of Publicly Disseminated Documents On The Internet, Kelly Kunsch
Diogenes Wanders The Superhighway: A Proposal For Authentication Of Publicly Disseminated Documents On The Internet, Kelly Kunsch
Seattle University Law Review
On the national level, there are proposals to make the Internet the primary, and even the exclusive, means of disseminating certain government information. Concurrently, corporations and other private organizations may adopt a similar approach for their reports and other documents. Intertwined with these official and quasi-official documents are innumerable others created by individuals around the world. With so many documents, there is potential for dissemination of false, biased, and even fraudulent information. This is the source of the authentication problem.
Rule 901: Requirement Of Authentication Or Identification
Rule 901: Requirement Of Authentication Or Identification
Touro Law Review
No abstract provided.
Conditional Probative Value And The Reconstruction Of The Federal Rules Of Evidence, Dale A. Nance
Conditional Probative Value And The Reconstruction Of The Federal Rules Of Evidence, Dale A. Nance
Michigan Law Review
In a recent article, Richard Friedman articulates a modified and generalized version of the doctrine of conditional relevance, which he calls "conditional probative value." This version comes in response to a substantial body of academic criticism of the traditional doctrine. As one of the critics to whom Professor Friedman responds, I offer this reply with two purposes in mind: (1) to clarify the relationship between Friedman's analysis and my earlier reinterpretation of the conditional relevance doctrine; and (2) to address Friedman's specific proposals with regard to the Federal Rules of Evidence. I conclude that Friedman's articulation helps clarify the logic …
Refining Conditional Probative Value, Richard D. Friedman
Refining Conditional Probative Value, Richard D. Friedman
Articles
The subject of conditional relevance, or what I think is better called "conditional probative value," must seem hopelessly ard to many. It continues to engage the attention of evidence scholars, however, because it forms part of the conceptual underpinnings of many parts of evidentiary law. Dale'Nance, one of the most astute evidence scholars of our time, has previously written at length on the subject' and has done so now more briefly in response to an article of mine. I offer an even briefer continuation of the discussion.
Scope Of The Uniform Commercial Code: Advances In Technology And Survey Of Computer Contracting Cases, Harold R. Weinberg, Ameila H. Boss, William J. Woodward Jr.
Scope Of The Uniform Commercial Code: Advances In Technology And Survey Of Computer Contracting Cases, Harold R. Weinberg, Ameila H. Boss, William J. Woodward Jr.
Law Faculty Scholarly Articles
Since the 1940s, the technology revolution has enabled people to communicate electronically. Sitting at a computer terminal connected to a modem and a telephone wire, it is possible to send a message anywhere in the country (or throughout the world)—to another computer, to a telecopy or telefax machine, even to a telephone. Paper is being replaced by electronic signals as a mode of communication. This revolution calls into question some of the fundamental rules upon which our contracts and the U.C.C. were built. On a broader scale, electronic communication raises issues that include the rights and responsibilities of providers and …
Authentication, Paul C. Giannelli
Evidence, David A. Schlueter
Evidence, David A. Schlueter
Faculty Articles
This article addresses some of the more significant evidence cases decided by the Fifth Circuit during the survey period.' Before turning to the cases themselves, it is important to note at the outset that like other federal courts, the Fifth Circuit is generally not inclined to reverse a case on an evidentiary error. It should not be surprising then that in most of the cases which follow, the court implicitly deferred to the decision of the trial judge in deciding whether a certain piece of evidence was admissible.
Evidence, Fifth Circuit Symposium, David A. Schlueter
Evidence, Fifth Circuit Symposium, David A. Schlueter
Faculty Articles
This article reviews decisions by the United States Court of Appeals for the Fifth Circuit on evidence issues and concludes that if an attorney has any hopes of obtaining appellate relief on an evidentiary issue, it is essential that the issues be presented concisely and completely to the trial court. The appellate courts will not reverse an evidentiary ruling of a trial court, even if the trial court has erred. This deference to the trial court is in recognition of the hundreds of rulings on evidence that the trial court must conduct within the course of a trial. In order …