Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 19 of 19
Full-Text Articles in Privacy Law
Setting Parental Controls: Do Parents Have A Duty To Supervise Their Children’S Use Of The Internet?, 31 J. Marshall J. Info. Tech. & Privacy L. 309 (2014), Alberto Bernabe
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
"Tinkering" With The First Amendment's Protection Of Student Speech On The Internet, 29 J. Marshall J. Computer & Info. L. 167 (2012), Steven M. Puiszis
"Tinkering" With The First Amendment's Protection Of Student Speech On The Internet, 29 J. Marshall J. Computer & Info. L. 167 (2012), Steven M. Puiszis
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Where Art Thou, Privacy: Expanding Privacy Rights Of Minors In Regard To Consensual Sex: Statutory Rape Laws And The Need For A Romeo And Juliet Exception In Illinois, 46 J. Marshall L. Rev. 309 (2012), Jordan Franklin
UIC Law Review
No abstract provided.
My Teacher Sux! [Censored]: Protecting Students' Right To Free Speech On The Internet, 28 J. Marshall J. Computer & Info. L. 385 (2011), Katherine Hokenson
My Teacher Sux! [Censored]: Protecting Students' Right To Free Speech On The Internet, 28 J. Marshall J. Computer & Info. L. 385 (2011), Katherine Hokenson
UIC John Marshall Journal of Information Technology & Privacy Law
This comment will discusses the problem posed by student speech made on the Internet, how free speech issues are generally addressed by courts, the Supreme Court cases that have specifically addressed the First Amendment rights of students, and factors that courts dealing with student speech made on the Internet have attempted to use in their decisions. The comment will further look at how courts have analyzed online student speech cases in light of available Supreme Court precedent, and will propose that the Court adopt a hybrid of the Tinker test when addressing student speech made on the Internet, which will …
School Discipline Of Cyber-Bullies: A Proposed Threshold That Respects Constitutional Rights, 45 J. Marshall L. Rev. 85 (2011), Laura Pavlik Raatjes
School Discipline Of Cyber-Bullies: A Proposed Threshold That Respects Constitutional Rights, 45 J. Marshall L. Rev. 85 (2011), Laura Pavlik Raatjes
UIC Law Review
No abstract provided.
Doninger's Wedge: Has Avery Doninger Bridged The Way For Internet Versions Of Matthew Fraser?, 43 J. Marshall L. Rev. 439 (2010), Adam Dauksas
UIC Law Review
No abstract provided.
Average Teenager Or Sex Offender? Solutions To The Legal Dilemma Caused By Sexting, 26 J. Marshall J. Computer & Info. L. 431 (2009), Shannon Shafron-Perez
Average Teenager Or Sex Offender? Solutions To The Legal Dilemma Caused By Sexting, 26 J. Marshall J. Computer & Info. L. 431 (2009), Shannon Shafron-Perez
UIC John Marshall Journal of Information Technology & Privacy Law
The Comment broadly considers the failure of the law to adapt to developments in technology and communication, untangles the different approaches taken by a sample of states, and considers which legal remedy is most appropriate. This discussion primarily focuses on the criminal aspects of: (1) minors who voluntarily create and disseminate nude text messages of themselves; and (2) minors who receive nude photographs of other minors. Part II traces the development of sexting. Part III describes the history and rationale behind prohibiting child pornography. In Part IV, the article examines the application of child pornography laws to sexting cases in …
Regulating Minors' Access To Pornography Via The Internet: What Options Do Congress Have Left?, 23 J. Marshall J. Computer & Info. L. 453 (2005), Jacob A. Sosnay
Regulating Minors' Access To Pornography Via The Internet: What Options Do Congress Have Left?, 23 J. Marshall J. Computer & Info. L. 453 (2005), Jacob A. Sosnay
UIC John Marshall Journal of Information Technology & Privacy Law
As with most innovations that have world-altering capabilities, the Internet is not without its very own dark side. This Internet's ugly side represented by are the thousands of Web sites devoted to the procurement and dissemination of pornographic material. Although, undoubtedly, in a free society, people are entitled to have access to such material if they so desire it is also generally accepted there is not only a great need, but an uncompromisable duty to protect minors from, and prevent access to, this potentially harmful imagery. This Comment discusses the several recent attempts made by Congress to regulate the accessibility …
Pennsylvania And Pornography: Cdt V. Pappert Offers A New Approach To Criminal Liability, 23 J. Marshall J. Computer & Info. L. 411 (2005), John Spence
UIC John Marshall Journal of Information Technology & Privacy Law
The rapid expansion of information technology in the past few years has left states and the Federal government struggling desperately to keep up and many of the laws attempting to regulate the Internet and information technology show a lack of understanding how the affected technology actually works and could possibly the growth and distribution of new ideas and inventions even incapacitate the Internet. One area in particular that has been the subject of widespread concern and attention is online pornography, a business that few people only realize just how big it truly is. This article focuses on the recent District …
The Truth About The Truth In Domain Names Act: Why This Recently Enacted Law Is Unconstitutional, 23 J. Marshall J. Computer & Info. L. 141 (2004), Michael Honig
UIC John Marshall Journal of Information Technology & Privacy Law
In April 2003 the Prosecutorial Remedies and other Tools to End the Exploitation of Children Today Act of 2003 (PROTECT Act) was enacted with the goal to protect children from abduction and abuse and achieve a more aggressive pursuit of the individuals committing crimes against the children. Although the AMBER Alert system is the most known portion of the legislation other provisions including the Truth in Domain Names Act (TDNA) making the use of a misleading Internet domain name to deceive a person to view pornography a criminal offense were also included. This comment first discusses the case of John …
The Concept Of "Harm" In Computer-Generated Images Of Child Pornography, 22 J. Marshall J. Computer & Info. L. 717 (2004), Jisuk Woo
UIC John Marshall Journal of Information Technology & Privacy Law
There has been a lot of controversy about the harm caused by computer-generated child pornography. This article examines the new ways in which technological development has created new concerns about child pornography especially in the context of challenging the concept of “harm” in the existing child pornography law. The author presents and discusses the existing child pornography laws and jurisprudence as well as the relevant arguments raised against it most of which are based on the “harm” caused by child pornography. This concept of “harm” and the different ways it is conceived and understood is analyzed and empirical evidence supporting …
Congress And The Courts Battle Over The First Amendment: Can The Law Really Protect Children From Pornography On The Internet?, 21 J. Marshall J. Computer & Info. L. 141 (2003), Mitchell P. Goldstein
Congress And The Courts Battle Over The First Amendment: Can The Law Really Protect Children From Pornography On The Internet?, 21 J. Marshall J. Computer & Info. L. 141 (2003), Mitchell P. Goldstein
UIC John Marshall Journal of Information Technology & Privacy Law
Litigation and court action have provided little in the way of providing solutions to anyone dealing with inappropriate content on the Internet. In Miller v. California, 413 U.S. 15 (1973). The court refused to establish a national standard and instead relied on community standards. Because the Internet has no geographic limitations, one cannot determine community standards because the Internet is so far reaching. Goldstein discusses in detail these Congressional enactments: Communications Decency Act of 1996, the Child Online Protection Act, and the Child Pornography Prevention Act of 1996, finding that none of them give children protection from pornography. The challenge …
The Best Of Both Worlds: Financing Software Filters For The Classroom And Avoiding First Amendment Liability, 16 J. Marshall J. Computer & Info. L. 659 (1998), Peter G. Drever Iii
The Best Of Both Worlds: Financing Software Filters For The Classroom And Avoiding First Amendment Liability, 16 J. Marshall J. Computer & Info. L. 659 (1998), Peter G. Drever Iii
UIC John Marshall Journal of Information Technology & Privacy Law
As the Internet expands, educational institutions have become interested in the medium for the purpose of expanding learning opportunities. Information that may be objectionable to some members of the community, however, would then be available to children in schools with Internet access. Attempts to regulate the content of the Internet have yet to pass a First Amendment challenge. Concern over what children will be exposed to when the Internet is introduced in the classroom is currently being addressed by educators and legislators alike. The Communications Decency Act was the first to attempt to address the issue of Internet access in …
The Constitutionality Of Congressional Efforts To Ban Computer-Generated Child Pornography: A First Amendment Assessment Of S. 1237, 14 J. Marshall J. Computer & Info. L. 483 (1996), Ronald W. Adelman
UIC John Marshall Journal of Information Technology & Privacy Law
This article addressed the constitutionality of the Child Pornography Prevention Act of 1995 (Hatch Bill) in regard to computer-generated child pornography. The Bill outlaws a visual depiction that is or appears to be of a minor engaging in sexually explicit conduct. The author claims the comments of David B. Johnson and John C. Scheller regarding the constitutionality of the Bill are analytically flawed because they focus on dicta from New York v. Ferber and Osborne v. Ohio. The author then engages in his own assessment of the Bill using a First Amendment approach and suggests what findings Congress should make …
Pc Peep Show: Computers, Privacy, And Child Pornography, 27 J. Marshall L. Rev. 989 (1994), John C. Scheller
Pc Peep Show: Computers, Privacy, And Child Pornography, 27 J. Marshall L. Rev. 989 (1994), John C. Scheller
UIC Law Review
No abstract provided.
The Intentional Creation Of Fetal Tissue For Transplants: The Womb As A Fetus Farm, 21 J. Marshall L. Rev. 853 (1988), James David Roberts
The Intentional Creation Of Fetal Tissue For Transplants: The Womb As A Fetus Farm, 21 J. Marshall L. Rev. 853 (1988), James David Roberts
UIC Law Review
No abstract provided.
The Use Of Computers In The Sexual Exploitation Of Children And Child Pornography, 7 Computer L.J. 383 (1987), Patricia N. Chock
The Use Of Computers In The Sexual Exploitation Of Children And Child Pornography, 7 Computer L.J. 383 (1987), Patricia N. Chock
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Computers: The Link To Missing Children, 7 Computer L.J. 73 (1986), Michelle M. Fujimoto
Computers: The Link To Missing Children, 7 Computer L.J. 73 (1986), Michelle M. Fujimoto
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Zbaraz V. Hartigan: Mandatory Twenty-Four Hour Waiting Period After Parental Notification Unconstitutionally Burdens A Minor's Abortion Decision, 19 J. Marshall L. Rev. 1071 (1986), Debra A. Harvey
UIC Law Review
No abstract provided.