Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Civil Rights and Discrimination (3)
- Computer Law (3)
- Consumer Protection Law (3)
- Food and Drug Law (3)
- Health Law and Policy (3)
-
- Law and Technology (3)
- Medical Jurisprudence (3)
- Science and Technology (3)
- Accounting (2)
- Administrative Law (2)
- Admiralty (2)
- Agency (2)
- Agriculture Law (2)
- Air and Space Law (2)
- Animal Law (2)
- Antitrust (2)
- Arts and Entertainment (2)
- Banking and Finance (2)
- Bankruptcy Law (2)
- Biography (2)
- Civil Law (2)
- Commercial Law (2)
- Communications Law (2)
- Comparative and Foreign Law (2)
- Conflict of Laws (2)
- Constitutional Law (2)
- Contracts (2)
- Corporations (2)
- Courts (2)
- Criminal Law and Procedure (2)
- Publication
- Publication Type
Articles 1 - 9 of 9
Full-Text Articles in Computer Law
Ley Federal Del Procedimiento Contencioso Administrativo., Bruno L. Costantini García
Ley Federal Del Procedimiento Contencioso Administrativo., Bruno L. Costantini García
Bruno L. Costantini García
Ponencia sobre la Ley Federal del Procedimiento Contencioso Administrativo, impartida por Bruno L. Costantini García.
A Complete Property Right Amendment, John H. Ryskamp
A Complete Property Right Amendment, John H. Ryskamp
ExpressO
The trend of the eminent domain reform and "Kelo plus" initiatives is toward a comprehensive Constitutional property right incorporating the elements of level of review, nature of government action, and extent of compensation. This article contains a draft amendment which reflects these concerns.
In Sickness, Health, And Cyberspace: Protecting The Security Of Electronic Private Health Information, Sharona Hoffman, Andy Podgurski
In Sickness, Health, And Cyberspace: Protecting The Security Of Electronic Private Health Information, Sharona Hoffman, Andy Podgurski
ExpressO
The electronic processing of health information provides considerable benefits to patients and health care providers at the same time that it creates serious risks to the confidentiality, integrity, and availability of the data. The Internet provides a conduit for rapid and uncontrolled dispersion and trafficking of illicitly-obtained private health information, with far-reaching consequences to the unsuspecting victims. In order to address such threats to electronic private health information, the U.S. Department of Health and Human Services enacted the HIPAA Security Rule, which thus far has received little attention in the legal literature. This article presents a critique of the Security …
Primer Congreso Nacional De Organismos Públicos Autónomos, Bruno L. Costantini García
Primer Congreso Nacional De Organismos Públicos Autónomos, Bruno L. Costantini García
Bruno L. Costantini García
Memorias del Primer Congreso Nacional de Organismos Públicos Autonomos
Bond Repudiation, Tax Codes, The Appropriations Process And Restitution Post-Eminent Domain Reform, John H. Ryskamp
Bond Repudiation, Tax Codes, The Appropriations Process And Restitution Post-Eminent Domain Reform, John H. Ryskamp
ExpressO
This brief comment suggests where the anti-eminent domain movement might be heading next.
Transsexuals And The Family Medical Leave Act, 24 J. Marshall J. Computer & Info. L. 315 (2006), Charles Thomas Little
Transsexuals And The Family Medical Leave Act, 24 J. Marshall J. Computer & Info. L. 315 (2006), Charles Thomas Little
UIC John Marshall Journal of Information Technology & Privacy Law
This article examines the implications for transsexuals seeking sexual reassignment surgery (“SRS”) under the Family Medical Leave Act (“FMLA”). Currently, the scant case law pertaining to the FMLA suggests that the statutes and regulations will likely fail to provide even minimal protection to transsexuals. If applied literally, the FMLA may present barriers to transsexuals seeking SRS in opposition to the true purpose behind the Act, which is to allow employees the opportunity to take reasonable leave from work by mandating more medical leave than the employers might otherwise be willing to grant for things such as the adoption or birth …
Data Mining And Substandard Medical Practice: The Difference Between Privacy, Secrets And Hidden Defects, Barry R. Furrow
Data Mining And Substandard Medical Practice: The Difference Between Privacy, Secrets And Hidden Defects, Barry R. Furrow
Villanova Law Review
No abstract provided.
Patients And Biobanks, Ellen Wright Clayton
Patients And Biobanks, Ellen Wright Clayton
Villanova Law Review
No abstract provided.
Can Systems Analysis Help Us To Understand C.O.B.R.A.?: A Challenge To Employment-Based Health Insurance, 39 J. Marshall L. Rev. 753 (2006), Alison Mcmorran Sulentic
Can Systems Analysis Help Us To Understand C.O.B.R.A.?: A Challenge To Employment-Based Health Insurance, 39 J. Marshall L. Rev. 753 (2006), Alison Mcmorran Sulentic
UIC Law Review
No abstract provided.