Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 14 of 14
Full-Text Articles in Privacy Law
In Need Of Transition: Transgender Inmate Access To Gender Affirming Healthcare In Prison, 55 Uic L. Rev. 773 (2022), Erin Murphy Fete
In Need Of Transition: Transgender Inmate Access To Gender Affirming Healthcare In Prison, 55 Uic L. Rev. 773 (2022), Erin Murphy Fete
UIC Law Review
No abstract provided.
Amending Rape Shield Laws: Outdated Statutes Fail To Protect Victims On Social Media, 48 J. Marshall L. Rev. 1087 (2015), Sydney Janzen
Amending Rape Shield Laws: Outdated Statutes Fail To Protect Victims On Social Media, 48 J. Marshall L. Rev. 1087 (2015), Sydney Janzen
UIC Law Review
This Comment will first discuss the discoverability and admissibility of social media evidence in criminal and/or civil sexual assault cases. Section II(A) provides a broad overview of both federal and state rape shield laws, including the legislative policies behind their enactments, as well as the modern expansion of social media in the context of the legal system. Section II(B) will address the modern utility of social media in the context of the legal system. Section III first analyzes how courts look at discoverability and admissibility of social media evidence generally, and then focuses on sexual assault cases specifically. Further, Section …
Where Art Thou, Privacy: Expanding Privacy Rights Of Minors In Regard To Consensual Sex: Statutory Rape Laws And The Need For A Romeo And Juliet Exception In Illinois, 46 J. Marshall L. Rev. 309 (2012), Jordan Franklin
UIC Law Review
No abstract provided.
Carry That Weight: Victim Privacy Within The Military Sexual Assault Reporting Methods, 28 J. Marshall Computer & Info. L. 551 (2011), Emily Hansen
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Olympic Meddle: The International Olympic Committee's Intrusion Of Athletes' Privacy Through The Discriminatory Practice Of Gender Verification Testing, 28 J. Marshall J. Computer & Info. L. 49 (2010), Raheel Saleem
UIC John Marshall Journal of Information Technology & Privacy Law
The IOC and the IAAF act as governing bodies for athletes and, therefore, are innately responsible for their actions. However, the gender verification rule exemplifies that irresponsible actions by these governing agencies adversely effects its athletes. The gender verification rule empowers both the IOC and the IAAF to make life-changing decisions without any restriction, leaving athletes susceptible to the unfettered power and abuse of the rule. The legal foundation established by the international human rights declarations support the argument that gender verification testing must be abolished because of its embedded discrimination and intrusive nature. An application of the ICCPR provides …
Average Teenager Or Sex Offender? Solutions To The Legal Dilemma Caused By Sexting, 26 J. Marshall J. Computer & Info. L. 431 (2009), Shannon Shafron-Perez
Average Teenager Or Sex Offender? Solutions To The Legal Dilemma Caused By Sexting, 26 J. Marshall J. Computer & Info. L. 431 (2009), Shannon Shafron-Perez
UIC John Marshall Journal of Information Technology & Privacy Law
The Comment broadly considers the failure of the law to adapt to developments in technology and communication, untangles the different approaches taken by a sample of states, and considers which legal remedy is most appropriate. This discussion primarily focuses on the criminal aspects of: (1) minors who voluntarily create and disseminate nude text messages of themselves; and (2) minors who receive nude photographs of other minors. Part II traces the development of sexting. Part III describes the history and rationale behind prohibiting child pornography. In Part IV, the article examines the application of child pornography laws to sexting cases in …
Transsexuals And The Family Medical Leave Act, 24 J. Marshall J. Computer & Info. L. 315 (2006), Charles Thomas Little
Transsexuals And The Family Medical Leave Act, 24 J. Marshall J. Computer & Info. L. 315 (2006), Charles Thomas Little
UIC John Marshall Journal of Information Technology & Privacy Law
This article examines the implications for transsexuals seeking sexual reassignment surgery (“SRS”) under the Family Medical Leave Act (“FMLA”). Currently, the scant case law pertaining to the FMLA suggests that the statutes and regulations will likely fail to provide even minimal protection to transsexuals. If applied literally, the FMLA may present barriers to transsexuals seeking SRS in opposition to the true purpose behind the Act, which is to allow employees the opportunity to take reasonable leave from work by mandating more medical leave than the employers might otherwise be willing to grant for things such as the adoption or birth …
If You Love Me Dear, Please Sign Here: Will The "Love Contract" Play A Role In Protecting Employers From Sexual Harassment Liability?, 40 J. Marshall L. Rev. 311 (2006), Jessica Lynn Mok O'Neill
If You Love Me Dear, Please Sign Here: Will The "Love Contract" Play A Role In Protecting Employers From Sexual Harassment Liability?, 40 J. Marshall L. Rev. 311 (2006), Jessica Lynn Mok O'Neill
UIC Law Review
No abstract provided.
Pennsylvania And Pornography: Cdt V. Pappert Offers A New Approach To Criminal Liability, 23 J. Marshall J. Computer & Info. L. 411 (2005), John Spence
UIC John Marshall Journal of Information Technology & Privacy Law
The rapid expansion of information technology in the past few years has left states and the Federal government struggling desperately to keep up and many of the laws attempting to regulate the Internet and information technology show a lack of understanding how the affected technology actually works and could possibly the growth and distribution of new ideas and inventions even incapacitate the Internet. One area in particular that has been the subject of widespread concern and attention is online pornography, a business that few people only realize just how big it truly is. This article focuses on the recent District …
Megan's Law: Analysis On Whether It Is Constitutional To Notify The Public Of Sex Offenders Via The Internet, 17 J. Marshall J. Computer & Info. L. 1133 (1999), Susan Oakes
UIC John Marshall Journal of Information Technology & Privacy Law
Because of the public demand for stronger governmental action against those who commit violent and sexual offenses against children, Congress implemented "Megan's Law" which mandated that the registered information of criminal child sex offenders be unlimited in disclosure so long as the information released is necessary to protect the public. Megan's Law and the Internet (as useful medium for communicating information on sex offenders), fulfill a similar goal as criminal cases receiving media attention because both aid in protecting the public from potential crimes committed by dangerous sex offenders. Megan's Law is constitutional because it is not punitive and because …
The Use Of Computers In The Sexual Exploitation Of Children And Child Pornography, 7 Computer L.J. 383 (1987), Patricia N. Chock
The Use Of Computers In The Sexual Exploitation Of Children And Child Pornography, 7 Computer L.J. 383 (1987), Patricia N. Chock
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Douglass V. Hustler Magazine, Inc.: Anatomy Of Privacy For A Public Figure In Illinois, 19 J. Marshall L. Rev. 1053 (1986), Howard L. Teplinsky
Douglass V. Hustler Magazine, Inc.: Anatomy Of Privacy For A Public Figure In Illinois, 19 J. Marshall L. Rev. 1053 (1986), Howard L. Teplinsky
UIC Law Review
No abstract provided.
Bowers V. Hardwick: The Constitutionality Of Georgia's Sodomy Statute, 20 J. Marshall L. Rev. 325 (1986), James J. Bromberek
Bowers V. Hardwick: The Constitutionality Of Georgia's Sodomy Statute, 20 J. Marshall L. Rev. 325 (1986), James J. Bromberek
UIC Law Review
No abstract provided.
Identifying The Rape Victim: A Constitutional Clash Between The First Amendment And The Right To Privacy, 18 J. Marshall L. Rev. 987 (1985), Ellen B. Fishbein
Identifying The Rape Victim: A Constitutional Clash Between The First Amendment And The Right To Privacy, 18 J. Marshall L. Rev. 987 (1985), Ellen B. Fishbein
UIC Law Review
No abstract provided.