Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- UIC School of Law (21)
- Selected Works (13)
- Schulich School of Law, Dalhousie University (11)
- SelectedWorks (8)
- Pepperdine University (5)
-
- University of Maryland Francis King Carey School of Law (5)
- Maurer School of Law: Indiana University (4)
- Northwestern Pritzker School of Law (2)
- Seattle University School of Law (2)
- Chicago-Kent College of Law (1)
- Georgetown University Law Center (1)
- Pace University (1)
- Penn State Law (1)
- Touro University Jacob D. Fuchsberg Law Center (1)
- University of Pennsylvania Carey Law School (1)
- University of Pittsburgh School of Law (1)
- University of Richmond (1)
- Keyword
-
- Computer Law (9)
- Law and Technology (9)
- Privacy (8)
- Internet (6)
- Science and Technology (5)
-
- Communications Law (4)
- Constitutional Law (4)
- Intellectual Property Law (4)
- Risk (4)
- Computers (3)
- Consumer Protection Law (3)
- Contracts (3)
- First Amendment (3)
- Social Implications of ICT (3)
- Cloud computing (2)
- Commercial Law (2)
- Computer (2)
- Consumer Protection (2)
- Consumer protection (2)
- Copyright (2)
- Copyright Law (2)
- Cyber defense (2)
- Cybercrime (2)
- Cyberlaw (2)
- Cybersecurity (2)
- Discovery (2)
- E-commerce (2)
- E-discovery (2)
- ESI (2)
- Education Law (2)
- Publication
-
- UIC John Marshall Journal of Information Technology & Privacy Law (14)
- Canadian Journal of Law and Technology (11)
- Journal of Business & Technology Law (4)
- UIC Review of Intellectual Property Law (4)
- Journal of the National Association of Administrative Law Judiciary (3)
-
- Professor Katina Michael (3)
- Rodolfo C. Rivas (3)
- All Faculty Scholarship (2)
- Jonathan I. Ezor (2)
- Northwestern Journal of Technology and Intellectual Property (2)
- Pepperdine Law Review (2)
- UIC Law Review (2)
- Allyson Haynes Stuart (1)
- Articles (1)
- Articles by Maurer Faculty (1)
- Books & Book Chapters by Maurer Faculty (1)
- Curtis E.A. Karnow (1)
- Elisabeth Haub School of Law Faculty Publications (1)
- Eliza Mik (1)
- Erez Reuveni (1)
- Frank A. Pasquale (1)
- Georgetown Law Faculty Publications and Other Works (1)
- IP Theory (1)
- Indiana Law Journal (1)
- Jorge R Roig (1)
- Journal Articles (1)
- Lawrence J. Trautman Sr. (1)
- Leysser L. León (1)
- Lily M Strumwasser (1)
- Maryland Law Review (1)
- Publication Type
Articles 1 - 30 of 79
Full-Text Articles in Computer Law
Stymieing Controversy Over Generic Top-Level Domains (Gtlds) And Other Internet Governance Decisions With Content Neutrality, Nafees Uddin
Stymieing Controversy Over Generic Top-Level Domains (Gtlds) And Other Internet Governance Decisions With Content Neutrality, Nafees Uddin
Seattle Journal for Social Justice
No abstract provided.
Lo Que Siempre Quiso Saber Sobre... Nombres De Dominio Pero Nunca Se Atrevió A Preguntar, Rodolfo C. Rivas Rea Esq., Marco A. Vargas Iñiguez Esq.
Lo Que Siempre Quiso Saber Sobre... Nombres De Dominio Pero Nunca Se Atrevió A Preguntar, Rodolfo C. Rivas Rea Esq., Marco A. Vargas Iñiguez Esq.
Rodolfo C. Rivas
The authors provide a brief overview of the domain name system and its dispute resolution regulation. The authors then delve into the new gTLDs and tackle some of the questions brought forward by its imminent introduction. /////////////////////////////////////////////////////////////////////////////////////////////////////////////// Los autores ofrecen un panorama general del sistema de nombres de dominio y la regulación de sus procedimientos de solución de controversias. Posteriormente, los autores profundizan en los nuevos gTLDs y tratan de responder a algunas de las preguntas presentadas por su inminente introducción.
E-Commerce And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman
E-Commerce And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman
Lawrence J. Trautman Sr.
What are the major risks perceived by those engaged in e-commerce and electronic payment systems? What development risks, if they become reality, may cause substantial increases in operating costs or threaten the very survival of the enterprise? This article utilizes the relevant annual report disclosures from eBay (parent of PayPal), along with other eBay and PayPal documents, as a potentially powerful teaching device. Most of the descriptive language to follow is excerpted directly from eBay’s regulatory filings. My additions include weaving these materials into a logical presentation and providing supplemental sources for those who desire a deeper look (usually in …
Flawed Transparency: Shared Data Collection And Disclosure Challenges For Google Glass And Similar Technologies, Jonathan I. Ezor
Flawed Transparency: Shared Data Collection And Disclosure Challenges For Google Glass And Similar Technologies, Jonathan I. Ezor
Jonathan I. Ezor
Current privacy law and best practices assume that the party collecting the data is able to describe and disclose its practices to those from and about whom the data are collected. With emerging technologies such as Google Glass, the information being collected by the wearer may be automatically shared to one or more third parties whose use may be substantially different from that of the wearer. Often, the wearer may not even know what information is being uploaded, and how it may be used. This paper will analyze the current state of U.S. law and compliance regarding personal information collection …
A New Approach To Digital Reader Privacy; State Regulations And Their Protection Of Digital Book Data, Andrew A. Proia
A New Approach To Digital Reader Privacy; State Regulations And Their Protection Of Digital Book Data, Andrew A. Proia
Indiana Law Journal
No abstract provided.
Navigating Through The Fog Of Cloud Computing Contracts, T. Noble Foster
Navigating Through The Fog Of Cloud Computing Contracts, T. Noble Foster
T. Noble Foster
This paper explores legal issues associated with cloud computing, provides analysis and commentary on typical clauses found in contracts offered by well-known cloud service providers, and identifies strategies to mitigate the risk of exposure to cloud-based legal claims in the critical areas of data security, privacy, and confidentiality. While current research offers numerous case studies, viewpoints, and technical descriptions of cloud processes, our research provides a close examination of the language used in cloud contract terms. Analysis of these contract terms supports the finding that most standard cloud computing contracts are unevenly balanced in favor of the cloud service provider. …
International Cryptography Regulation And The Global Information Economy, Nathan Saper
International Cryptography Regulation And The Global Information Economy, Nathan Saper
Northwestern Journal of Technology and Intellectual Property
With the meteoric rise of the Internet and e-commerce in the 1990s came great attention to the problems and opportunities associated with cryptography. Throughout that decade, the United States and many foreign countries debated and experimented with various forms of cryptography regulation, and attempts were made at international harmonization. Since then, however, policy-making activity around cryptography has slowed, if not halted altogether, leaving individuals and companies to face a bewildering array of regulations—or, in many cases, to face regulations that are extraordinarily unclear and haphazardly applied.
This Note seeks to introduce the reader to the issue of international cryptography regulation …
The Collision Of Social Media And Social Unrest: Why Shutting Down Social Media Is The Wrong Response, Mirae Yang
The Collision Of Social Media And Social Unrest: Why Shutting Down Social Media Is The Wrong Response, Mirae Yang
Northwestern Journal of Technology and Intellectual Property
With the growing availability of Internet access across the globe, social media has transformed the traditional relationship between government authority and its citizens by providing the people with an innovative and powerful means to harmonize their efforts in expressing their political and social concerns. The importance of safeguarding Internet availability is more critical than ever before as access to the Internet is now the means by which the world communicates, stays informed, and engages in daily tasks. In the face of potential social unrest fueled by social media, the United States must take a preventative approach, one that matches our …
A Comprehensive Approach To Bridging The Gap Between Cyberbullying Rules And Regulations And The Protections Offered By The First Amendment For Off-Campus Student Speech, Vahagn Amirian
Vahagn Amirian
No abstract provided.
Rankings, Reductionism, And Responsibility , Frank Pasquale
Rankings, Reductionism, And Responsibility , Frank Pasquale
Frank A. Pasquale
After discussing how search engines operate in Part I below, and setting forth a normative basis for regulation of their results in Part II, this piece proposes (in Part III) some minor, non-intrusive legal remedies for those who claim that they are harmed by search engine results. Such harms include unwanted high-ranking results relating to them, or exclusion from a page they claim it is their “due” to appear on. In the first case (deemed “inclusion harm”), I propose a right not to suppress the results, but merely to add an asterisk to the hyperlink directing web users to them, …
Finding Privacy In A Sea Of Social Media And Other E-Discovery, Allyson Haynes Stuart
Finding Privacy In A Sea Of Social Media And Other E-Discovery, Allyson Haynes Stuart
Allyson Haynes Stuart
This article looks at the case law governing discovery of social media, and finds several problems. First, many courts are improperly requiring a threshold showing that relevant information exists in public portions of the user’s social media account before allowing such discovery. Second, they allow overbroad discovery, often requiring a litigant to turn over its username and password to the other party. At the same time, parties are seeking such information directly from social media sites, attempting an end-run around the relevancy requirement and increasing motion practice. The article argues that, instead, social media discovery should be treated like other …
Costing A Pretty Penny: Online Penny Auctions Revive The Pestilence Of Unregulated Lotteries, David R. Konkel
Costing A Pretty Penny: Online Penny Auctions Revive The Pestilence Of Unregulated Lotteries, David R. Konkel
Seattle University Law Review
Penny auctions, an online phenomenon imported from Europe, operate by the hundreds in the United States without meaningful oversight from consumer protection agencies. In a penny auction, consumers compete for items one penny at a time. To date, no significant inquiry, either academic or practical, into the legitimacy of the penny auction has occurred. Although marketed as auctions, online penny auctions may actually qualify as lotteries. Unlike the multifarious and confusing definitions of gambling, the long-accepted definition of a lottery consists of three elements: prize, consideration, and chance. If a penny auction satisfies this definition then, under well-established case law …
Migración A La Nube: ¿Está Segura Nuestra Información?, Rodolfo C. Rivas Rea Esq., Marco A. Vargas Iñiguez Esq.
Migración A La Nube: ¿Está Segura Nuestra Información?, Rodolfo C. Rivas Rea Esq., Marco A. Vargas Iñiguez Esq.
Rodolfo C. Rivas
The authors discuss the benefits and risks of moving your business data to the cloud through case studies and offer practical tips to protect business confidential information stored in the cloud. //////////////////////// Los autores estudian los beneficios y los riesgos de almacenar datos e información en la nube a través de casos de estudio y ofrecen consejos prácticos para proteger la información comercial confidencial almacenada en la nube.
Patent-Backed Securization For Innovation And Economic Growth In The Life Sciences: A Proposal For Incremental Securities Law Reform, Grace Sweeney
Patent-Backed Securization For Innovation And Economic Growth In The Life Sciences: A Proposal For Incremental Securities Law Reform, Grace Sweeney
Canadian Journal of Law and Technology
In this section, the historical balance struck by securities law between conservatism and innovation was considered in the context of a shifting economic landscape.
In Section II, the life sciences sector will be chosen to illustrate the current barriers impeding capital flow to high-value enterprise, resulting in decreased innovation and economic growth. These include the existence of “ever greening”, non-practicing entities, patent thickets, and onerous transaction costs on upstream patent holders with limited competency.
In Section III, the tool of intangible asset finance will be introduced as a means of harnessing the value of intellectual property assets, and leveraging them …
Proof And Progress: Coping With The Law Of Evidence In A Technological Age, David M. Paciocco
Proof And Progress: Coping With The Law Of Evidence In A Technological Age, David M. Paciocco
Canadian Journal of Law and Technology
This article outlines those rules of evidence that are most likely to be called upon to fit new technologies. It identifies some of the challenges that are presented, and identifies modest techniques or suggestions for coping. Those suggestions include taking the kind of relaxed view as to when expert evidence is being offered illustrated by the Ontario Court of Appeal in R. v. Hamilton; taking a functional approach to judicial notice; ensuring that authentication and the “best evidence” rule for electronic records are not applied in a highly technical fashion; understanding the law of hearsay and remaining familiar with …
Social Media: The Law Simply Stated, Steve Coughlan, Robert J. Currie
Social Media: The Law Simply Stated, Steve Coughlan, Robert J. Currie
Canadian Journal of Law and Technology
It is a challenge to simply state the law about social media, because there is no such thing as “social media law.” Rather, the law bumps up against social media in many ways. In some cases, existing law can be seamlessly applied to new technologies and means of interaction. In other cases, entirely new paradigms will likely need to be adopted to handle new challenges. Many other cases will fall somewhere in between.
Our goal in this Law Simply Stated is to provide some background on the nature of social media themselves, and then to state the basic law in …
Implementing Technology In The Justice Sector: A Canadian Perspective, Jane Bailey, Jacquelyn Burkell
Implementing Technology In The Justice Sector: A Canadian Perspective, Jane Bailey, Jacquelyn Burkell
Canadian Journal of Law and Technology
Despite the many technological advances that could benefit the court system, the use of computers and network technology to facilitate court procedures is still in its infancy, and court procedures largely remain attached to paper documents and to the physical presence of the parties at all stages. More and more research is focusing on the use of technology to make the legal system more efficient and to reduce excessive legal costs and delays. The goal of this exploratory research project is to examine the experience of justice sector technology implementation from the perspective of individuals involved first-hand in the implementation …
Regulatory Issues Concerning New Media Alternatives To Television, Michael Rimock
Regulatory Issues Concerning New Media Alternatives To Television, Michael Rimock
Canadian Journal of Law and Technology
This article will begin by discussing the significance of over-the-top (OTT) video services in Canada and briefly outline the CRTC’s recent efforts and findings in relation to new media trends. It will then describe the problems with the current regulatory framework and some of the proposed solutions. While some have argued that regulating OTT services like Netflix would level the playing field, I will argue that encouraging competition and decreasing some of the onerous regulations that are currently imposed on Canadian broadcasters would be the best solution since it would benefit both consumers and Canadian corporations.
In The Middle: Creating A Middle Road Between U.S. And Eu Data Protection Policies, Carolyn Hoang
In The Middle: Creating A Middle Road Between U.S. And Eu Data Protection Policies, Carolyn Hoang
Journal of the National Association of Administrative Law Judiciary
The first section of this paper examines the historical differences that have led to the American approach to privacy and the European approach to privacy. The second section will examine the current U.S. model, and the third section will examine the EU model. Next, the fourth section will compare and contrast the two models. Finally, the last section will argue that the U.S. should have a regulatory agency and describe how that should look and run.
Mistaken Identity, Identity Theft And Problems Of Remote Authentication In E-Commerce, Eliza Mik
Mistaken Identity, Identity Theft And Problems Of Remote Authentication In E-Commerce, Eliza Mik
Eliza Mik
The problem of mistaken identity in e-commerce transactions brings together seemingly unrelated issues: privacy, network security, digital signatures – and classic contract law. The technological characteristics of the Internet have a tendency to turn traditional legal doctrines on their head, or, at least expose flaws in existing legal arguments. Combining an academic exercise with the practical implications of the insecurity of the Internet, this paper draws some unexpected conclusions regarding cases of mistaken identity. The latter must be analysed afresh with a number of factors in mind: the more widespread use of fictitious identities in on-line transactions, the higher incidence …
Malas Leyes, Peores Reglamentos. Apuntes Críticos Sobre El Porvenir De La Tutela De La Persona Frente Al Tratamiento De Datos En El Perú, Leysser L. Leon
Malas Leyes, Peores Reglamentos. Apuntes Críticos Sobre El Porvenir De La Tutela De La Persona Frente Al Tratamiento De Datos En El Perú, Leysser L. Leon
Leysser L. León
Se comentan críticamente algunas de las más controvertidas disposiciones contenidas en el reciente Reglamento de la Ley peruana de Protección de Datos Personales. Se echa de menos, en especial, y atendiendo a la labor reglamentaria del Ministerio de Justicia reflejada en este dispositivo, una actitud consciente de los funcionarios acerca la importancia de la tutela de la autodeterminación informativa en los países que, como el Perú, siguen sin resolver graves males sociales, como la discriminación.
Copyright, Neuroscience, And Creativity, Erez Reuveni
Copyright, Neuroscience, And Creativity, Erez Reuveni
Erez Reuveni
It is said that copyright law’s primary purpose is to encourage creativity by providing economic incentives to create. Accepting this premise, the primary disagreement among copyright stakeholders today concerns to what extent strong copyrights in fact provide efficient economic incentives. This focus on economic incentives obscures what is perhaps copyright doctrine’s greatest weakness—although the primary purpose of copyright law is to encourage creativity, copyright doctrine lacks even a rudimentary understanding of how creativity functions on a neurobiological level. The absence of a cohesive understanding of the science of creativity means that much of copyright theory is premised on antiquated assumptions …
The Granting Clause And Intellectual Property Rights Management In Open-Source Software Licensing, Vikrant N. Vasudeva
The Granting Clause And Intellectual Property Rights Management In Open-Source Software Licensing, Vikrant N. Vasudeva
IP Theory
No abstract provided.
Pirates Of The Australian Election, Matthew Rimmer
Pirates Of The Australian Election, Matthew Rimmer
Matthew Rimmer
“Pirate parties” have proliferated across Europe and North America in the past decade, championing issues such as intellectual property (IP), freedom of speech, and the protection of privacy and anonymity.This year, the movement hit Australian shores: The Pirate Party Australia was officially registered by the Australian Electoral Commission in January 2013. (You can read its principles and platform here.)“More than ever before, there is a necessity in Australia for a party that holds empowerment, participation, free culture and openness as its central tenets”, Pirate Party founder Rodney Serkowski said in a press release announcing the group’s successful registration. Their first …
Net Neutrality: Preparing For The Future, Jennifer Wong
Net Neutrality: Preparing For The Future, Jennifer Wong
Journal of the National Association of Administrative Law Judiciary
No abstract provided.
Corresponding Evolution: International Law And The Emergence Of Cyber Warfare, Bradley Raboin
Corresponding Evolution: International Law And The Emergence Of Cyber Warfare, Bradley Raboin
Journal of the National Association of Administrative Law Judiciary
No abstract provided.
Protection Of Intellectual Property Rights In Computers And Computer Programs: Recent Developments , Alan C. Rose
Protection Of Intellectual Property Rights In Computers And Computer Programs: Recent Developments , Alan C. Rose
Pepperdine Law Review
The following article examines the protection offered to computers and computer programs, under the various applicable patent, copyright and trade secret laws. Concerning patent protection; the author discusses the history and current status of the patent laws, and analyzes in detail the landmark case of Diamond v. Diehr. Discussed also is an analysis of copyright protection for computer programs, offered by the 1980 amendments to section 117 of the 1976 Copyright Act; which paved the way for the increased protection.
Privacy, Transparency & Google's Blurred Glass, Jonathan I. Ezor
Privacy, Transparency & Google's Blurred Glass, Jonathan I. Ezor
Jonathan I. Ezor
No matter the context or jurisdiction, one concept underlies every view of the best practices in data privacy: transparency. The mandate to disclose what personal information is collected, how it is used, and with whom and for what purpose it is shared, is essential to enable informed consent to the collection, along with the other user rights that constitute privacy best practices. Google, which claims to support and offer transparency, is increasingly opaque about its many products and services and the information they collect for it, posing a significant privacy concern.
The Discovery And Use Of Computerized Information: An Examination Of Current Approaches, Richard M. Long
The Discovery And Use Of Computerized Information: An Examination Of Current Approaches, Richard M. Long
Pepperdine Law Review
In recent years, the legal profession has run head on into the increasing use of computers and computerized information. Discovery and evidentiary rules developed to deal with written documentation may not be flexible enough to adequately cover this relatively new method of storing information. This comment examines various methods by which courts have attempted to deal with discovery and evidentiary problems involving computerized information, and suggests certain areas that should be explored in supporting or attacking the credibility of such information.
Testing The Social Media Waters - First Amendment Entanglement Beyond The Schoolhouse Gates, Lily M. Strumwasser
Testing The Social Media Waters - First Amendment Entanglement Beyond The Schoolhouse Gates, Lily M. Strumwasser
Lily M Strumwasser
Dear Editor:
I am a third-year student at The John Marshall Law School in Chicago, Illinois, where I serve as the executive student publications editor of The John Marshall Law Review. In September 2013, I will work as an associate at Seyfarth Shaw in its labor and employment practice group. I am writing to submit my article, "Testing The Social Media Waters - First Amendment Entanglement Beyond The Schoolhouse Gates" My article considers the contours of student free speech rights within the context of public schools. I think and hope you will find it to be interesting and …