Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 34

Full-Text Articles in Computer Law

Facebook, Twitter, And The Wild West Of Ip Enforcement On Social Media: Weighing The Merits Of A Uniform Dispute Resolution Policy, 49 J. Marshall L. Rev. 959 (2016), Daniel Doft Jan 2016

Facebook, Twitter, And The Wild West Of Ip Enforcement On Social Media: Weighing The Merits Of A Uniform Dispute Resolution Policy, 49 J. Marshall L. Rev. 959 (2016), Daniel Doft

UIC Law Review

In Part I, this comment will discuss the different types of intellectual property issues that can arise on social media websites. Part II will then discuss the three actions currently available to an infringed owner attempting to protect its intellectual property rights. Part III will discuss the Uniform Domain Name Dispute Resolution Policy (UDRP), a successful mechanism for resolving domain name disputes online. Finally, Part IV will discuss the possible creation of a USRP, which will be modeled after the UDRP, in which a private third-party arbitrator would resolve intellectual property disputes in the social media arena. This section will …


The Conflict Between An Athlete’S Right Of Publicity And The First Amendment, 15 J. Marshall Rev. Intell. Prop. L. 117 (2015), Edward Kuester Jan 2015

The Conflict Between An Athlete’S Right Of Publicity And The First Amendment, 15 J. Marshall Rev. Intell. Prop. L. 117 (2015), Edward Kuester

UIC Review of Intellectual Property Law

The recent rise of fantasy sports has created a conflict between an athlete’s right of publicity and the First Amendment of the Constitution. The legal question being discussed is whether athletes have a right of publicity in their identity, specifically their performance statistics and biographical information. If a right of publicity violation does exist, courts will have to determine whether a fantasy provider’s First Amendment privilege can prevail against an athlete’s publicity rights. This comment examines recent litigation surrounding athletes’ identities and the problems courts have in balancing the conflict between an athlete’s right of publicity and the First Amendment. …


Legal Problems In Data Management: It & Privacy At The Forefront: Drafting And Implementing Effective Social Media Policies In The Workplace, 31 J. Marshall J. Info. Tech. & Privacy L. 549 (2015) Jan 2015

Legal Problems In Data Management: It & Privacy At The Forefront: Drafting And Implementing Effective Social Media Policies In The Workplace, 31 J. Marshall J. Info. Tech. & Privacy L. 549 (2015)

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Now You See It, Now You Don’T . . . Or Do You?: Snapchat’S Deceptive Promotion Of Vanishing Messages Violates Federal Trade Commission Regulations, 30 J. Marshall J. Info. Tech. & Privacy L. 827 (2014), Danielle Young Jan 2014

Now You See It, Now You Don’T . . . Or Do You?: Snapchat’S Deceptive Promotion Of Vanishing Messages Violates Federal Trade Commission Regulations, 30 J. Marshall J. Info. Tech. & Privacy L. 827 (2014), Danielle Young

UIC John Marshall Journal of Information Technology & Privacy Law

This Comment will explore the recently popular application Snapchat, and discuss the ways in which the app's privacy policy has violated FTC regulations, responding to a recent complaint filed by The Electronic Privacy Center. Particularly, this Comment will focus on Snapchat's deceptive promotion of "disappearing" photographs and videos. Section II will illustrate the basic structure of Snapchat, detailing various illustrations of its use. Section II will also examine the regulations set forth by the FTC that Snapchat is required to follow. Section III will discuss possible methods that the average user can do in order to bypass the very thing …


The Thirty-Third Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 31 J. Marshall J. Computer & Info. L. 237 (2014), Adam Florek, Anisha Mehta, Danielle Young, Michael Greene Jan 2014

The Thirty-Third Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 31 J. Marshall J. Computer & Info. L. 237 (2014), Adam Florek, Anisha Mehta, Danielle Young, Michael Greene

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Thirty-Third Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 31 J. Marshall J. Computer & Info. L. 251 (2014), Amany Awad, Kelly O'Neill, Arlo Walsman Jan 2014

The Thirty-Third Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 31 J. Marshall J. Computer & Info. L. 251 (2014), Amany Awad, Kelly O'Neill, Arlo Walsman

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Navigating Cybersquatting Enforcement In The Expanding Internet, 13 J. Marshall Rev. Intell. Prop. L. 321 (2014), Jordan A. Arnot Jan 2014

Navigating Cybersquatting Enforcement In The Expanding Internet, 13 J. Marshall Rev. Intell. Prop. L. 321 (2014), Jordan A. Arnot

UIC Review of Intellectual Property Law

It has always been a considerable task to police something as vast at the Internet for trademark violations and abuse. As the Internet develops with the ongoing launch of hundreds of new generic Top-Level Domains, so does the host of enforcement options available to those seeking to protect the value of trademarks and other intellectual property. This article outlines seven criteria to consider when selecting a remedy, or combination of remedies. The traditional cease and desist letter is still a viable and effective option, and so, of course, is litigation. These tools were greatly enhanced in 1999 when the Internet …


Canada’S Anti-Spam Legislation: A Constitutional Analysis, 31 J. Marshall J. Info. Tech. & Privacy L. 1 (2014), Emir Crowne, Stephanie Provato Jan 2014

Canada’S Anti-Spam Legislation: A Constitutional Analysis, 31 J. Marshall J. Info. Tech. & Privacy L. 1 (2014), Emir Crowne, Stephanie Provato

UIC John Marshall Journal of Information Technology & Privacy Law

On December 15th, 2010, the Government of Canada agreed to Bill C-28, the Fighting Internet and Wireless Spam Act, with the intent to “deter the most damaging and deceptive forms of spam… from occurring in Canada and to help to drive out spammers.” Canada‟s Anti- Spam Legislation (“CASL”) was born. Although CASL has only been in force since July 1st, 2014, we argue that the Act may not survive constitutional scrutiny as it unduly restricts freedom of speech.


The Thirty-Third Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 31 J. Marshall J. Computer & Info. L. 285 (2014), Sara Schroeder, Austin Hoffman, Becky Fey Jan 2014

The Thirty-Third Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 31 J. Marshall J. Computer & Info. L. 285 (2014), Sara Schroeder, Austin Hoffman, Becky Fey

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Emerging Reality Of Social Media: Erosion Of Individual Privacy Through Cyber-Vetting And Law’S Inability To Catch Up, 12 J. Marshall Rev. Intell. Prop. L. 551 (2013), Saby Ghoshray Jan 2013

The Emerging Reality Of Social Media: Erosion Of Individual Privacy Through Cyber-Vetting And Law’S Inability To Catch Up, 12 J. Marshall Rev. Intell. Prop. L. 551 (2013), Saby Ghoshray

UIC Review of Intellectual Property Law

The rise of social media means that data about a large number of people is available in public and quasi-public digital locations. Employers, keen on taking advantage of this additional data to decrease the risk associated with an offer of employment, are engaging in “cyber-vetting”—non-consenting social media searches conducted by third parties or the employers themselves. To the extent that current law applies to this practice, the regulation it provides is weak and attacks only part of the problem. Left unchecked, cyber-vetting has the potential to fundamentally alter the scope of prospective employees’ rights. This article surveys the legal and …


Tweet Tweet: A First Amendment Wake Up Call Regarding Social Media In The Sports Arena, 30 J. Marshall J. Info. Tech. & Privacy L. 117 (2013), Samantha Levin Jan 2013

Tweet Tweet: A First Amendment Wake Up Call Regarding Social Media In The Sports Arena, 30 J. Marshall J. Info. Tech. & Privacy L. 117 (2013), Samantha Levin

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Putting A Price On Friendship: Examining The Ownership Battle Between A Business' Social Media Networks, And The Humans That Operate Them, 47 J. Marshall L. Rev. 745 (2013), Michael Furlong Jan 2013

Putting A Price On Friendship: Examining The Ownership Battle Between A Business' Social Media Networks, And The Humans That Operate Them, 47 J. Marshall L. Rev. 745 (2013), Michael Furlong

UIC Law Review

No abstract provided.


Mad Men Posing As Ordinary Consumers: The Essential Role Of Self-Regulation And Industry Ethics On Decreasing Deceptive Online Consumer Ratings And Reviews, 12 J. Marshall Rev. Intell. Prop. L. 462 (2013), Lucille M. Ponte Jan 2013

Mad Men Posing As Ordinary Consumers: The Essential Role Of Self-Regulation And Industry Ethics On Decreasing Deceptive Online Consumer Ratings And Reviews, 12 J. Marshall Rev. Intell. Prop. L. 462 (2013), Lucille M. Ponte

UIC Review of Intellectual Property Law

Technology provides consumers with new ways to avoid advertisements, such as fast forwarding through TV commercials and using filtering software to block pop-up ads. Accordingly brand sponsors and their advertising marketing firms have sought alternative methods to pierce through consumer resistance to ads. Social media offers an optimal platform to reach millions of consumers on a nearly daily basis who interact and often rely heavily on the reviews and rankings of fellow consumers. However, many of today’s branding campaigns now mask sponsored ads as ordinary consumer reviews or “Like” and “Don’t Like” responses to a service or product. Unbeknownst to …


Right To Information Identity, 29 J. Marshall J. Computer & Info. L. 539 (2012), Elad Oreg Jan 2012

Right To Information Identity, 29 J. Marshall J. Computer & Info. L. 539 (2012), Elad Oreg

UIC John Marshall Journal of Information Technology & Privacy Law

Inspired by the famous Warren and Brandeis conceptualization of the “right to privacy,” this article tries to answer a modern, conceptual lacuna and presents the argument for the need to conceptualize and recognize a new, independent legal principle of a “right to information identity.” This is the right of an individual to the functionality of the information platforms that enable others to identify and know him and to remember who and what he is. Changes in technology and social standards make the very notion of identity increasingly fluid, transforming the way it is treated and opening new and fascinating ways …


Free Speech On The Battlefield: Protecting The Use Of Social Media By America's Soldiers, 44 J. Marshall L. Rev. 1085 (2011), David Johnsen Jan 2011

Free Speech On The Battlefield: Protecting The Use Of Social Media By America's Soldiers, 44 J. Marshall L. Rev. 1085 (2011), David Johnsen

UIC Law Review

No abstract provided.


The Amended Eu Law On Eprivacy And Electronic Communications After Its 2011 Implentation; New Rules On Data Protection, Spam, Data Breaches And Protection Of Intellectual Property Rights, 29 J. Marshall J. Computer & Info. L. 29 (2011), Vagelis Papakonstantinou, Paul De Hert Jan 2011

The Amended Eu Law On Eprivacy And Electronic Communications After Its 2011 Implentation; New Rules On Data Protection, Spam, Data Breaches And Protection Of Intellectual Property Rights, 29 J. Marshall J. Computer & Info. L. 29 (2011), Vagelis Papakonstantinou, Paul De Hert

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Three Cs Versus The Dinosaur: Updating The Technologically Archaic Fdcpa To Provide Consumers, Collectors, And Courts Clarity, 44 J. Marshall L. Rev. 1033 (2011), Melissa Travis Jan 2011

The Three Cs Versus The Dinosaur: Updating The Technologically Archaic Fdcpa To Provide Consumers, Collectors, And Courts Clarity, 44 J. Marshall L. Rev. 1033 (2011), Melissa Travis

UIC Law Review

No abstract provided.


Right Of Publicity: Is Behavioral Targeting Violating The Right To Control Your Identity Online?, 10 J. Marshall Rev. Intell. Prop. L. 811 (2011), Andrea Stein Fuelleman Jan 2011

Right Of Publicity: Is Behavioral Targeting Violating The Right To Control Your Identity Online?, 10 J. Marshall Rev. Intell. Prop. L. 811 (2011), Andrea Stein Fuelleman

UIC Review of Intellectual Property Law

Behavioral targeting (“BT”) is an advertising technique that receives a great deal of attention due in part to the balkanized self-regulatory policies that address consumer protection issues. The majority of the self-regulation policies, including the BT principles proposed by the Federal Trade Commission (“FTC”) focus on privacy issues but fail to discuss the impact BT may have on the right to control the commercial use of one’s identity. In discussing the right of publicity, many legal scholars agree that everyone has a right to control the commercial use of his or her identity, regardless of his or her status as …


Fifteen Years Of Fame: The Declining Relevance Of Domain Names In The Enduring Conflict Between Trademark And Free Speech Rights, 11 J. Marshall Rev. Intell. Prop. L. 1 (2011), Jude A. Thomas Jan 2011

Fifteen Years Of Fame: The Declining Relevance Of Domain Names In The Enduring Conflict Between Trademark And Free Speech Rights, 11 J. Marshall Rev. Intell. Prop. L. 1 (2011), Jude A. Thomas

UIC Review of Intellectual Property Law

Domain name disputes have been the subject of substantial litigation, legislative action, and scholarly debate over the course of the past fifteen years. Much of the debate is the product of disagreement concerning whether trademark rights naturally extend into the domain name space and to what extent those rights are limited by principles of free speech. Gripe sites are paradigmatic examples of this debate. Society’s investment in defining these rights continues to grow, even as the relevance of domain names may be declining, due to: (1) changes in the way users locate content on the Internet; (2) the growth of …


Regulating Online Behavioral Advertising, 44 J. Marshall L. Rev. 899 (2011), Steven C. Bennett Jan 2011

Regulating Online Behavioral Advertising, 44 J. Marshall L. Rev. 899 (2011), Steven C. Bennett

UIC Law Review

No abstract provided.


Twitter: New Challenges To Copyright Law In The Internet Age, 10 J. Marshall Rev. Intell. Prop. L. 231 (2010), Rebecca Haas Jan 2010

Twitter: New Challenges To Copyright Law In The Internet Age, 10 J. Marshall Rev. Intell. Prop. L. 231 (2010), Rebecca Haas

UIC Review of Intellectual Property Law

Twitter is part of the new wave of internet communication. It is unique because messages sent via Twitter are limited to 140 characters. Many of these messages are about mundane details of daily life, but some are creative, even literary, and may qualify for copyright protection. The problem,then, is not necessarily whether a Tweet can qualify for copyright protection, but how that protection is enforced. Current infringement policies and procedures are not designed to effectively handle copyright infringement on the internet. Internet infringement is widespread and not easy to monitor or regulate, therefore there is a need for a regulatory …


Social Networking As A Communications Weapon To Harm Victims: Facebook, Myspace, And Twitter Demonstrate A Need To Amend Section 230 Of The Communications Decency Act, 26 J. Marshall J. Computer & Info. L. 415 (2009), Joshua N. Azriel Jan 2009

Social Networking As A Communications Weapon To Harm Victims: Facebook, Myspace, And Twitter Demonstrate A Need To Amend Section 230 Of The Communications Decency Act, 26 J. Marshall J. Computer & Info. L. 415 (2009), Joshua N. Azriel

UIC John Marshall Journal of Information Technology & Privacy Law

The article discusses how social networking sites can pose a danger to victims of online offensive content. Part II provides an overall analysis of the dangers the Internet, especially social networking, poses to victims. Part III reviews Section 230 of the CDA, including the “Good Samaritan” provisions for social networking websites such as Twitter and Facebook. Part IV analyzes three recent court cases that demonstrate how these social networking tools are used as weapons to harm victims. Part V concludes with a discussion of how the growing number of online incidents stem from social networking sites. It recommends that Congress …


Social Networking And Blogging: The New Legal Frontier, 9 J. Marshall Rev. Intell. Prop. L. 500 (2009), Robert Newman, Liisa Thomas Jan 2009

Social Networking And Blogging: The New Legal Frontier, 9 J. Marshall Rev. Intell. Prop. L. 500 (2009), Robert Newman, Liisa Thomas

UIC Review of Intellectual Property Law

Improvements in communication technology have effectively made the world a smaller place. As businesses attempt to exploit these new technological improvements to better communicate their messages to their clients, these same improvements continue to raise new and difficult legal issues related to fair trade practices, privacy, and freedom of speech. This article identifies current legal developments related to advertising in the online world and analyzes the actions taken to resolve these new and difficult legal issues within the framework of United States federal and state law and private industry-specific self-governance.


The Future Of Privacy Policies: A Privacy Nutrition Label Filled With Fair Information Practices, 26 J. Marshall J. Computer & Info. L. 1 (2008), Corey A. Ciocchetti Jan 2008

The Future Of Privacy Policies: A Privacy Nutrition Label Filled With Fair Information Practices, 26 J. Marshall J. Computer & Info. L. 1 (2008), Corey A. Ciocchetti

UIC John Marshall Journal of Information Technology & Privacy Law

The article looks at the threats accompanying online shopping, such as identity theft and aggregated data files. Such issues arise when companies carelessly lose laptops filled with unencrypted data or callously sell data on the open market with collected personally identifying information (PII). The article explains that although privacy policies are supposed to force companies to strengthen their privacy practices they are not always effective because companies often post inconspicuous, vague and legalese-filled policies. These ambiguous postings cause online shoppers to blindly submit PII and ignore privacy practices completely. The article proposes a solution to this problem through the standardization …


Gambling And The Law®: The International Law Of Remote Wagering, 40 J. Marshall L. Rev. 1159 (2007), I. Nelson Rose Jan 2007

Gambling And The Law®: The International Law Of Remote Wagering, 40 J. Marshall L. Rev. 1159 (2007), I. Nelson Rose

UIC Law Review

No abstract provided.


The Federal Election Commission & Political Blogging: A Perfect Balance Or Just Not Enough?, 24 J. Marshall J. Computer & Info. L. 611 (2006), Niki Vlachos Jan 2006

The Federal Election Commission & Political Blogging: A Perfect Balance Or Just Not Enough?, 24 J. Marshall J. Computer & Info. L. 611 (2006), Niki Vlachos

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Why Are Competitor's Advertising Links Displayed When I Google My Product? An Analysis Of Internet Search Engine Liability For Trademark Infringement, 5 J. Marshall Rev. Intell. Prop. L. 431 (2006), Isaiah A. Fishman Jan 2006

Why Are Competitor's Advertising Links Displayed When I Google My Product? An Analysis Of Internet Search Engine Liability For Trademark Infringement, 5 J. Marshall Rev. Intell. Prop. L. 431 (2006), Isaiah A. Fishman

UIC Review of Intellectual Property Law

Traditional federal trademark law is being challenged in the current case of Google v. AmericanBlind. When internet issues clash with trademark infringement, courts are often faced with the dangerous task of either refusing to stretch not specifically internet tailored trademark law to grant remedy to a perceived wrong or refusing to grant remedy because of the chilling effect the remedy may have on traditional trademark. By analyzing the history of trademark law in relation with internet issues, focusing on domain name cases, pop-up advertising cases, and search engine cases, it becomes clear that specific congressional action is the most viable …


Balancing Individual Privacy Rights And The Rights Of Trademark Owners In Access To The Whois, 38 J. Marshall L. Rev. 357 (2004), Jeffrey Stephen Sobek Jan 2004

Balancing Individual Privacy Rights And The Rights Of Trademark Owners In Access To The Whois, 38 J. Marshall L. Rev. 357 (2004), Jeffrey Stephen Sobek

UIC Law Review

No abstract provided.


"Don't Let The Sun Go Down On Me:" An In-Depth Look At Opportunistic Business Method Patent Licensing And A Proposed Solution To Allow Small-Defendant Business Method Users To Sing A Happier Tune, 37 J. Marshall L. Rev. 1359 (2004), Andrea Lynn Evensen Jan 2004

"Don't Let The Sun Go Down On Me:" An In-Depth Look At Opportunistic Business Method Patent Licensing And A Proposed Solution To Allow Small-Defendant Business Method Users To Sing A Happier Tune, 37 J. Marshall L. Rev. 1359 (2004), Andrea Lynn Evensen

UIC Law Review

No abstract provided.


Www.Yourname.Com: How Useful Is The Uniform Domain Name Dispute Resolution Policy ("Udrp") In Protecting Personal Names From Cybersquatters?, 22 J. Marshall J. Computer & Info. L. 535 (2004), Georgette H. Tarnow Jan 2004

Www.Yourname.Com: How Useful Is The Uniform Domain Name Dispute Resolution Policy ("Udrp") In Protecting Personal Names From Cybersquatters?, 22 J. Marshall J. Computer & Info. L. 535 (2004), Georgette H. Tarnow

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.