Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 23 of 23
Full-Text Articles in Privacy Law
Reviving The Fourth Amendment: Reasonable Expectation Of Privacy In A Cell Phone Age, 50 J. Marshall L. Rev. 555 (2017), Marisa Kay
UIC Law Review
No abstract provided.
Amending Rape Shield Laws: Outdated Statutes Fail To Protect Victims On Social Media, 48 J. Marshall L. Rev. 1087 (2015), Sydney Janzen
Amending Rape Shield Laws: Outdated Statutes Fail To Protect Victims On Social Media, 48 J. Marshall L. Rev. 1087 (2015), Sydney Janzen
UIC Law Review
This Comment will first discuss the discoverability and admissibility of social media evidence in criminal and/or civil sexual assault cases. Section II(A) provides a broad overview of both federal and state rape shield laws, including the legislative policies behind their enactments, as well as the modern expansion of social media in the context of the legal system. Section II(B) will address the modern utility of social media in the context of the legal system. Section III first analyzes how courts look at discoverability and admissibility of social media evidence generally, and then focuses on sexual assault cases specifically. Further, Section …
Can A One-Star Review Get You Sued? The Right To Anonymous Speech On The Internet And The Future Of Internet “Unmasking” Statutes, 48 J. Marshall L. Rev. 693 (2015), Jesse Lively
UIC Law Review
No abstract provided.
Voir Dire In The #Lol Society: Jury Selection Needs Drastic Updates To Remain Relevant In The Digital Age, 47 J. Marshall L. Rev. 459 (2013), Zachary Mesenbourg
Voir Dire In The #Lol Society: Jury Selection Needs Drastic Updates To Remain Relevant In The Digital Age, 47 J. Marshall L. Rev. 459 (2013), Zachary Mesenbourg
UIC Law Review
No abstract provided.
Cloudy With A Chance Of Waiver: How Cloud Computing Complicates The Attorney-Client Privilege, 46 J. Marshall L. Rev. 383 (2012), Timothy Peterson
Cloudy With A Chance Of Waiver: How Cloud Computing Complicates The Attorney-Client Privilege, 46 J. Marshall L. Rev. 383 (2012), Timothy Peterson
UIC Law Review
No abstract provided.
The Three Cs Versus The Dinosaur: Updating The Technologically Archaic Fdcpa To Provide Consumers, Collectors, And Courts Clarity, 44 J. Marshall L. Rev. 1033 (2011), Melissa Travis
UIC Law Review
No abstract provided.
Free Speech On The Battlefield: Protecting The Use Of Social Media By America's Soldiers, 44 J. Marshall L. Rev. 1085 (2011), David Johnsen
Free Speech On The Battlefield: Protecting The Use Of Social Media By America's Soldiers, 44 J. Marshall L. Rev. 1085 (2011), David Johnsen
UIC Law Review
No abstract provided.
School Discipline Of Cyber-Bullies: A Proposed Threshold That Respects Constitutional Rights, 45 J. Marshall L. Rev. 85 (2011), Laura Pavlik Raatjes
School Discipline Of Cyber-Bullies: A Proposed Threshold That Respects Constitutional Rights, 45 J. Marshall L. Rev. 85 (2011), Laura Pavlik Raatjes
UIC Law Review
No abstract provided.
Regulating Online Behavioral Advertising, 44 J. Marshall L. Rev. 899 (2011), Steven C. Bennett
Regulating Online Behavioral Advertising, 44 J. Marshall L. Rev. 899 (2011), Steven C. Bennett
UIC Law Review
No abstract provided.
Doninger's Wedge: Has Avery Doninger Bridged The Way For Internet Versions Of Matthew Fraser?, 43 J. Marshall L. Rev. 439 (2010), Adam Dauksas
UIC Law Review
No abstract provided.
David Doe V. Goliath, Inc.: Judicial Ferment In 2009 For Business Plaintiffs Seeking The Identities Of Anonymous Online Speakers, 43 J. Marshall L. Rev. 1 (2009), Clay Calvert, Kayla Gutierrez, Karla D. Kennedy, Kara Carnley Murrhee
David Doe V. Goliath, Inc.: Judicial Ferment In 2009 For Business Plaintiffs Seeking The Identities Of Anonymous Online Speakers, 43 J. Marshall L. Rev. 1 (2009), Clay Calvert, Kayla Gutierrez, Karla D. Kennedy, Kara Carnley Murrhee
UIC Law Review
No abstract provided.
Orwell Was An Optimist: The Evolution Of Privacy In The United States And Its De-Evolution For American Employees, 42 J. Marshall L. Rev. 83 (2008), Robert Sprague
UIC Law Review
No abstract provided.
Identity Theft: Plugging The Massive Data Leaks With A Stricter Nationwide Breach-Notification Law, 40 J. Marshall L. Rev. 681 (2007), Amanda Draper
Identity Theft: Plugging The Massive Data Leaks With A Stricter Nationwide Breach-Notification Law, 40 J. Marshall L. Rev. 681 (2007), Amanda Draper
UIC Law Review
No abstract provided.
Preventing "You've Got Mail"™ From Meaning "You've Been Served": How Service Of Process By E-Mail Does Not Meet Constitutional Procedure Due Process Requirements, 38 J. Marshall L. Rev. 1121 (2005), Matthew R. Schreck
UIC Law Review
No abstract provided.
Balancing Individual Privacy Rights And The Rights Of Trademark Owners In Access To The Whois, 38 J. Marshall L. Rev. 357 (2004), Jeffrey Stephen Sobek
Balancing Individual Privacy Rights And The Rights Of Trademark Owners In Access To The Whois, 38 J. Marshall L. Rev. 357 (2004), Jeffrey Stephen Sobek
UIC Law Review
No abstract provided.
The Impact Of Technology On The Notary Process, 31 J. Marshall L. Rev. 911 (1998), Glen-Peter Ahlers Sr.
The Impact Of Technology On The Notary Process, 31 J. Marshall L. Rev. 911 (1998), Glen-Peter Ahlers Sr.
UIC Law Review
No abstract provided.
Watch Your E-Mail - Employee E-Mail Monitoring And Privacy Law In The Age Of The Electronic Sweatshop, 28 J. Marshall L. Rev. 139 (1994), Laurie Thomas Lee
Watch Your E-Mail - Employee E-Mail Monitoring And Privacy Law In The Age Of The Electronic Sweatshop, 28 J. Marshall L. Rev. 139 (1994), Laurie Thomas Lee
UIC Law Review
No abstract provided.
Pc Peep Show: Computers, Privacy, And Child Pornography, 27 J. Marshall L. Rev. 989 (1994), John C. Scheller
Pc Peep Show: Computers, Privacy, And Child Pornography, 27 J. Marshall L. Rev. 989 (1994), John C. Scheller
UIC Law Review
No abstract provided.
The Electronic Communications And Privacy Act: Discriminatory Treatment For Similar Technology, Cutting The Cord Of Privacy, 23 J. Marshall L. Rev. 661 (1990), Timothy R. Rabel
The Electronic Communications And Privacy Act: Discriminatory Treatment For Similar Technology, Cutting The Cord Of Privacy, 23 J. Marshall L. Rev. 661 (1990), Timothy R. Rabel
UIC Law Review
No abstract provided.
Communications Technology: New Challenges To Privacy, 21 J. Marshall L. Rev. 735 (1988), Fred W. Weingarten
Communications Technology: New Challenges To Privacy, 21 J. Marshall L. Rev. 735 (1988), Fred W. Weingarten
UIC Law Review
No abstract provided.
Eavesdropping Regulation In Illinois, 21 J. Marshall L. Rev. 251 (1988), Scott O. Reed
Eavesdropping Regulation In Illinois, 21 J. Marshall L. Rev. 251 (1988), Scott O. Reed
UIC Law Review
No abstract provided.
Information Law Overview, 18 J. Marshall L. Rev. 815 (1985), George B. Trubow
Information Law Overview, 18 J. Marshall L. Rev. 815 (1985), George B. Trubow
UIC Law Review
No abstract provided.
Intrustions Upon Informational Seclusion In The Computer Age, 17 J. Marshall L. Rev. 831 (1984), John A. Mclaughlin
Intrustions Upon Informational Seclusion In The Computer Age, 17 J. Marshall L. Rev. 831 (1984), John A. Mclaughlin
UIC Law Review
No abstract provided.