Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Computer Law (7)
- Consumer Protection Law (7)
- Science and Technology (7)
- Law and Technology (6)
- Commercial Law (4)
-
- Comparative and Foreign Law (4)
- General Law (4)
- Intellectual Property Law (4)
- International Law (4)
- Law and Society (4)
- Administrative Law (3)
- Antitrust (3)
- Civil Rights and Discrimination (3)
- Communications Law (3)
- Contracts (3)
- Corporations (3)
- Courts (3)
- Criminal Law and Procedure (3)
- Economics (3)
- Food and Drug Law (3)
- Health Law and Policy (3)
- International Trade (3)
- Law and Economics (3)
- Legislation (3)
- Medical Jurisprudence (3)
- Public Law and Legal Theory (3)
- Accounting (2)
- Admiralty (2)
- Agency (2)
- Agriculture Law (2)
- Publication
- Publication Type
Articles 1 - 12 of 12
Full-Text Articles in Computer Law
Ley Federal Del Procedimiento Contencioso Administrativo., Bruno L. Costantini García
Ley Federal Del Procedimiento Contencioso Administrativo., Bruno L. Costantini García
Bruno L. Costantini García
Ponencia sobre la Ley Federal del Procedimiento Contencioso Administrativo, impartida por Bruno L. Costantini García.
A Complete Property Right Amendment, John H. Ryskamp
A Complete Property Right Amendment, John H. Ryskamp
ExpressO
The trend of the eminent domain reform and "Kelo plus" initiatives is toward a comprehensive Constitutional property right incorporating the elements of level of review, nature of government action, and extent of compensation. This article contains a draft amendment which reflects these concerns.
Unwarranted Fears Mask The Benefits Of Network Diversity: An Argument Against Mandating Network Neutrality, Elvis Stumbergs
Unwarranted Fears Mask The Benefits Of Network Diversity: An Argument Against Mandating Network Neutrality, Elvis Stumbergs
ExpressO
The rapid development of the Internet has necessitated an update to Federal telecommunications laws. Recent Congressional efforts to enact such an update, however, have spawned a fiery debate over a somewhat nebulous concept: network neutrality. The debate concerns the way that Internet access providers handle the data traffic being sent over their networks. These providers would like the option to offer some of their customers, web site hosting companies and similar entities, additional services that would essentially result in these customers’ content loading faster, more reliably, or more securely than others not receiving such priority treatment. Yet, this proposed “diversity” …
Data Privacy, Data Piracy: Can India Provide Adequate Protection For Electronically Transferred Data?, Vinita Bali
Data Privacy, Data Piracy: Can India Provide Adequate Protection For Electronically Transferred Data?, Vinita Bali
ExpressO
As the wave of outsourcing to India swells, there is growing concern about the inadequacies of the India legal system in protecting data being transferred to it from other nations for the purpose of processing. India has a smattering of laws that scantily address the issue of data privacy. Under pressure from the business processing industry in India, as well as from the European Union and other nations, it is but a matter of time before India adopts a slate of laws that address the issue of data protection. Once these laws are enacted, the main issue that remains is …
Technoconsen(T)Sus, Andrea M. Matwyshyn
Technoconsen(T)Sus, Andrea M. Matwyshyn
ExpressO
Law is contributing to an information security paradox. Consumers are regularly “consenting” to the installation of computer code that makes them more vulnerable to harms such as identity theft. In particular, digital rights management technology accompanying digital music has recently left a wake of compromised user machines. Using the case study of security-invasive digital rights management technology, this article argues that a fundamental tension exists among intellectual property law, computer intrusion law and contract law regarding meaningful consumer consent in digital contexts. This article proposes to ease the noise in consent doctrine through creating an objective “reasonable digital consumer” standard …
In Sickness, Health, And Cyberspace: Protecting The Security Of Electronic Private Health Information, Sharona Hoffman, Andy Podgurski
In Sickness, Health, And Cyberspace: Protecting The Security Of Electronic Private Health Information, Sharona Hoffman, Andy Podgurski
ExpressO
The electronic processing of health information provides considerable benefits to patients and health care providers at the same time that it creates serious risks to the confidentiality, integrity, and availability of the data. The Internet provides a conduit for rapid and uncontrolled dispersion and trafficking of illicitly-obtained private health information, with far-reaching consequences to the unsuspecting victims. In order to address such threats to electronic private health information, the U.S. Department of Health and Human Services enacted the HIPAA Security Rule, which thus far has received little attention in the legal literature. This article presents a critique of the Security …
Primer Congreso Nacional De Organismos Públicos Autónomos, Bruno L. Costantini García
Primer Congreso Nacional De Organismos Públicos Autónomos, Bruno L. Costantini García
Bruno L. Costantini García
Memorias del Primer Congreso Nacional de Organismos Públicos Autonomos
Bond Repudiation, Tax Codes, The Appropriations Process And Restitution Post-Eminent Domain Reform, John H. Ryskamp
Bond Repudiation, Tax Codes, The Appropriations Process And Restitution Post-Eminent Domain Reform, John H. Ryskamp
ExpressO
This brief comment suggests where the anti-eminent domain movement might be heading next.
Identity Theft And Consumer Protection: Finding Sensible Approaches To Safeguard Personal Data In The United States And Canada, Kamaal Zaidi
Identity Theft And Consumer Protection: Finding Sensible Approaches To Safeguard Personal Data In The United States And Canada, Kamaal Zaidi
ExpressO
This paper examines identity theft in both the United States and Canada. Various examples of commercial fraud and scams are discussed in the context of a growing trend of identity thieves assuming identities of innocent consumers. As such, various pieces of legislation and consumer initiatives (involving online consumer complaint mechanisms)in U.S. and Canadian jurisdictions are highlighted to demonstrate the pursuit towards broader consumer protection of personal data used in daily commercial transactions. The author argues that these modern efforts to safeguard consumers from identity theft is a progressive measure that will continue to afford increasing protections for consumer personal data, …
Online Boilerplate: Would Mandatory Website Disclosure Of E-Standard Terms Backfire?, Robert A. Hillman
Online Boilerplate: Would Mandatory Website Disclosure Of E-Standard Terms Backfire?, Robert A. Hillman
Cornell Law Faculty Publications
No abstract provided.
Rankings, Reductionism, And Responsibility , Frank Pasquale
Rankings, Reductionism, And Responsibility , Frank Pasquale
Cleveland State Law Review
After discussing how search engines operate in Part I below, and setting forth a normative basis for regulation of their results in Part II, this piece proposes (in Part III) some minor, non-intrusive legal remedies for those who claim that they are harmed by search engine results. Such harms include unwanted high-ranking results relating to them, or exclusion from a page they claim it is their “due” to appear on. In the first case (deemed “inclusion harm”), I propose a right not to suppress the results, but merely to add an asterisk to the hyperlink directing web users to them, …
Can Systems Analysis Help Us To Understand C.O.B.R.A.?: A Challenge To Employment-Based Health Insurance, 39 J. Marshall L. Rev. 753 (2006), Alison Mcmorran Sulentic
Can Systems Analysis Help Us To Understand C.O.B.R.A.?: A Challenge To Employment-Based Health Insurance, 39 J. Marshall L. Rev. 753 (2006), Alison Mcmorran Sulentic
UIC Law Review
No abstract provided.