Open Access. Powered by Scholars. Published by Universities.®
- Publication Year
Articles 1 - 30 of 33
Full-Text Articles in Privacy Law
How An Acoustic Sensor Can Catch A Gunman, 32 J. Marshall J. Info. Tech. & Privacy L. 211 (2016), Amanda Busljeta
How An Acoustic Sensor Can Catch A Gunman, 32 J. Marshall J. Info. Tech. & Privacy L. 211 (2016), Amanda Busljeta
UIC John Marshall Journal of Information Technology & Privacy Law
Conversations said in public do not have an expectation of privacy, and therefore, the ShotSpotter does not violate the right to privacy. This comment will address the following: a) ShotSpotter technology is a necessity in all neighborhoods; b) ShotSpotter does not violate an individual’s expectation of privacy; c) the need for ShotSpotter outweighs the cost of the device; and e) regulations and economic solutions will allow cities to use ShotSpotter while still protecting the individual’s privacy rights.
Selected State Laws Governing The Safeguarding And Disposing Of Personal Information, 31 J. Marshall J. Info. Tech. & Privacy L. 487 (2015), Bruce Radke, Michael Waters
Selected State Laws Governing The Safeguarding And Disposing Of Personal Information, 31 J. Marshall J. Info. Tech. & Privacy L. 487 (2015), Bruce Radke, Michael Waters
UIC John Marshall Journal of Information Technology & Privacy Law
Numerous states have adopted laws mandating the protection and disposal of personal information. Under those laws, businesses are required to implement and maintain reasonable security procedures and practices appropriate to the nature of the information in order to protect the personal information from unauthorized access, destruction, use, modification, or disclosure. Although the definition of “personal information” varies from state to state, “personal information” is generally defined as an individual’s first name or initial and last name in combination with any one or more of the following data elements, when either the name or the data elements are not encrypted or …
California’S Eavesdropping Law Endangers Victims Of Domestic Violence, 31 J. Marshall J. Info. Tech. & Privacy L. 57 (2014), John E.B. Myers
California’S Eavesdropping Law Endangers Victims Of Domestic Violence, 31 J. Marshall J. Info. Tech. & Privacy L. 57 (2014), John E.B. Myers
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Clever Contraband: Why Illinois’ Lockstep With The U.S. Supreme Court Gives Police Authority To Search The Bowels Of Your Vehicle, 47 J. Marshall L. Rev. 425 (2013), Jason Cooper
UIC Law Review
No abstract provided.
Where Art Thou, Privacy: Expanding Privacy Rights Of Minors In Regard To Consensual Sex: Statutory Rape Laws And The Need For A Romeo And Juliet Exception In Illinois, 46 J. Marshall L. Rev. 309 (2012), Jordan Franklin
UIC Law Review
No abstract provided.
Is It Justice Or A Crime To Record The Police?: A Look At The Illinois Eavesdropping Statute And Its Application, 45 J. Marshall L. Rev. 485 (2012), Stephanie Claiborne
Is It Justice Or A Crime To Record The Police?: A Look At The Illinois Eavesdropping Statute And Its Application, 45 J. Marshall L. Rev. 485 (2012), Stephanie Claiborne
UIC Law Review
No abstract provided.
Photo Enforcement Programs: Are They Permissible Under The United States Constitution?, 43 J. Marshall L. Rev. 463 (2010), Paul Mcnaughton
Photo Enforcement Programs: Are They Permissible Under The United States Constitution?, 43 J. Marshall L. Rev. 463 (2010), Paul Mcnaughton
UIC Law Review
No abstract provided.
Yes, I Destroyed The Evidence - Sue Me? Intentional Spoliation Of Evidence In Illinois, 27 J. Marshall J. Computer & Info. L. 235 (2009), Michael A. Zuckerman
Yes, I Destroyed The Evidence - Sue Me? Intentional Spoliation Of Evidence In Illinois, 27 J. Marshall J. Computer & Info. L. 235 (2009), Michael A. Zuckerman
UIC John Marshall Journal of Information Technology & Privacy Law
Many Illinois litigators have encountered spoliation of evidence, which is the loss, destruction, or alteration of evidence. Examples of spoliation are seemingly endless and include the failure to preserve the scene of a train derailment, the accidental destruction of evidence on a lawyer’s desk by a janitor, the loss of a heater that exploded, the removal of wires from a car that caught on fire, the loss and alteration of medical equipment, and the intentional erasing of a computer image relevant to a copyright lawsuit. To combat spoliation, Illinois and many other states have developed common law and statutory methods …
Identity Theft: Plugging The Massive Data Leaks With A Stricter Nationwide Breach-Notification Law, 40 J. Marshall L. Rev. 681 (2007), Amanda Draper
Identity Theft: Plugging The Massive Data Leaks With A Stricter Nationwide Breach-Notification Law, 40 J. Marshall L. Rev. 681 (2007), Amanda Draper
UIC Law Review
No abstract provided.
Hitching A Ride: Every Time You Take A Drive, The Government Is Riding With You, 39 J. Marshall L. Rev. 1499 (2006), Benjamin Burnham
Hitching A Ride: Every Time You Take A Drive, The Government Is Riding With You, 39 J. Marshall L. Rev. 1499 (2006), Benjamin Burnham
UIC Law Review
No abstract provided.
American Courts Are Drowning In The "Gene Pool": Excavating The Slippery Slope Mechanisms Behind Judicial Endorsement Of Dna Databases, 39 J. Marshall L. Rev. 115 (2005), Meghan Riley
UIC Law Review
No abstract provided.
Preventing "You've Got Mail"™ From Meaning "You've Been Served": How Service Of Process By E-Mail Does Not Meet Constitutional Procedure Due Process Requirements, 38 J. Marshall L. Rev. 1121 (2005), Matthew R. Schreck
UIC Law Review
No abstract provided.
The States And The Electronic Communications Privacy Act: The Need For Legal Processes That Keep Up With The Times, 22 J. Marshall J. Computer & Info. L. 695 (2004), Monique Mattei Ferraro
The States And The Electronic Communications Privacy Act: The Need For Legal Processes That Keep Up With The Times, 22 J. Marshall J. Computer & Info. L. 695 (2004), Monique Mattei Ferraro
UIC John Marshall Journal of Information Technology & Privacy Law
In criminal investigation when hours may mean the difference between successful resolution of a case or not, law enforcement must have an effective method of obtaining necessary information. The author offers an overview of the Electronic Communications Privacy Act (ECPA) and proceeds in a presentation of cybercrime investigations. The article further examines the differences and the occasional conflict existing between the federal and state law, traced into the variety and multitude of state and local laws and procedures regulating the obtaining of information but also into lack of state and local resources. Indeed state and local laws not only differ …
The Legislative Jurisdiction Of States Over Transactions In International Electronic Commerce, 18 J. Marshall J. Computer & Info. L. 689 (2000), Tapio Puurunen
The Legislative Jurisdiction Of States Over Transactions In International Electronic Commerce, 18 J. Marshall J. Computer & Info. L. 689 (2000), Tapio Puurunen
UIC John Marshall Journal of Information Technology & Privacy Law
With increasing growth and development of E-commerce and a rapid increase in the number of Internet Users, government assessment of current protections granted to consumers in their states is encouraged. The author's purpose is to examine national legislation on e-commerce regulation and its limits, to resolve jurisdictional conflict of laws associated with e-commerce, and to propose possible solutions to these emerging problems. This article covers market functions between business and consumer transactions. First, government should not ignore consumer e-commerce since e-commerce trade is significant on both national and international levels. Secondly, the author pushes for an extensive effort to unify …
Potential Liability Under The Illinois Electronic Commerce Security Act: Is It A Risk Worth Taking?, 17 J. Marshall J. Computer & Info. L. 909 (1999), Stephen G. Myers
Potential Liability Under The Illinois Electronic Commerce Security Act: Is It A Risk Worth Taking?, 17 J. Marshall J. Computer & Info. L. 909 (1999), Stephen G. Myers
UIC John Marshall Journal of Information Technology & Privacy Law
This Comment argues that the potential liability of digital signatures under the Act is too great and, therefore, is not an effective mode of communication. Part II of this Comment explains the purpose, the significance, and the traditional role of the handwritten signature. Furthermore, Part II establishes the basics of the digital signature process as it relates to each participant. The participants in a digital signature process consist of a subscriber, a recipient, and a certification authority. Part III of this Comment analyzes and argues why the use of digital signatures, under the Act, is too great of a liability …
Requiring A Thumbprint For Notarized Transactions: The Battle Against Document Fraud, 31 J. Marshall L. Rev. 803 (1998), Vincent J. Gnoffo
Requiring A Thumbprint For Notarized Transactions: The Battle Against Document Fraud, 31 J. Marshall L. Rev. 803 (1998), Vincent J. Gnoffo
UIC Law Review
No abstract provided.
The Impact Of Technology On The Notary Process, 31 J. Marshall L. Rev. 911 (1998), Glen-Peter Ahlers Sr.
The Impact Of Technology On The Notary Process, 31 J. Marshall L. Rev. 911 (1998), Glen-Peter Ahlers Sr.
UIC Law Review
No abstract provided.
Use Tax Collection On Internet Purchases: Should The Mail Order Industry Serve As A Model, 15 J. Marshall J. Computer & Info. L. 203 (1997), Steven J. Forte
Use Tax Collection On Internet Purchases: Should The Mail Order Industry Serve As A Model, 15 J. Marshall J. Computer & Info. L. 203 (1997), Steven J. Forte
UIC John Marshall Journal of Information Technology & Privacy Law
Federal intervention is necessary to grant states the authority to collect state sales and use tax from Internet vendors who sell goods within their boundaries but reside elsewhere. With such federal intervention, local retailers, who must charge state use and sales tax to their customers, can compete more fairly with Internet vendors. In addition, state governments can access a large and growing revenue source. Under the Commerce Clause of the United States Constitution, a vendor must have a physical presence on a state before a state can require the vendor to collect and remit sales and use tax. In addition, …
Doctors, Aids, And Confidentiality In The 1990s, 27 J. Marshall L. Rev. 331 (1994), Sheila Taub
Doctors, Aids, And Confidentiality In The 1990s, 27 J. Marshall L. Rev. 331 (1994), Sheila Taub
UIC Law Review
No abstract provided.
If I Tell You, Will You Treat Me, 27 J. Marshall L. Rev. 363 (1994), Mauro A. Montoya Jr.
If I Tell You, Will You Treat Me, 27 J. Marshall L. Rev. 363 (1994), Mauro A. Montoya Jr.
UIC Law Review
No abstract provided.
The Conflict Between Illinois Rule 1.6(B) And The Aids Confidentiality Act, 25 J. Marshall L. Rev. 727 (1992), Scott H. Isaacman
The Conflict Between Illinois Rule 1.6(B) And The Aids Confidentiality Act, 25 J. Marshall L. Rev. 727 (1992), Scott H. Isaacman
UIC Law Review
No abstract provided.
Florida Star V. B.J.F.: The Rape Of The Right To Privacy, 23 J. Marshall L. Rev. 731 (1990), Barbara Lynn Pedersen
Florida Star V. B.J.F.: The Rape Of The Right To Privacy, 23 J. Marshall L. Rev. 731 (1990), Barbara Lynn Pedersen
UIC Law Review
No abstract provided.
New York V. Sullivan: Shhh .... Don't Say The A Word - Another Outcome-Oriented Abortion Decision, 23 J. Marshall L. Rev. 753 (1990), Christopher C. Kendall
New York V. Sullivan: Shhh .... Don't Say The A Word - Another Outcome-Oriented Abortion Decision, 23 J. Marshall L. Rev. 753 (1990), Christopher C. Kendall
UIC Law Review
No abstract provided.
Lovgren V. Citizens First National Bank: Illinois Recognizes The False Light Invasion Of Privacy Tort, 22 J. Marshall L. Rev. 943 (1989), F. John Steffen
Lovgren V. Citizens First National Bank: Illinois Recognizes The False Light Invasion Of Privacy Tort, 22 J. Marshall L. Rev. 943 (1989), F. John Steffen
UIC Law Review
No abstract provided.
The Intentional Creation Of Fetal Tissue For Transplants: The Womb As A Fetus Farm, 21 J. Marshall L. Rev. 853 (1988), James David Roberts
The Intentional Creation Of Fetal Tissue For Transplants: The Womb As A Fetus Farm, 21 J. Marshall L. Rev. 853 (1988), James David Roberts
UIC Law Review
No abstract provided.
Eavesdropping Regulation In Illinois, 21 J. Marshall L. Rev. 251 (1988), Scott O. Reed
Eavesdropping Regulation In Illinois, 21 J. Marshall L. Rev. 251 (1988), Scott O. Reed
UIC Law Review
No abstract provided.
Griffin V. Wisconsin Warrantless Probation Searches - Do The State's Needs Warrant Such Strict Measures, 21 J. Marshall L. Rev. 921 (1988), William Blake Weiler
Griffin V. Wisconsin Warrantless Probation Searches - Do The State's Needs Warrant Such Strict Measures, 21 J. Marshall L. Rev. 921 (1988), William Blake Weiler
UIC Law Review
No abstract provided.
Aids: Testing Democracy - Irrational Responses To The Public Health Crisis And The Need For Privacy In Serologic Testing, 19 J. Marshall L. Rev. 835 (1986), Michael L. Closen, Susan Marie Connor, Howard L. Kaufman, Mark E. Wojcik
Aids: Testing Democracy - Irrational Responses To The Public Health Crisis And The Need For Privacy In Serologic Testing, 19 J. Marshall L. Rev. 835 (1986), Michael L. Closen, Susan Marie Connor, Howard L. Kaufman, Mark E. Wojcik
UIC Law Review
No abstract provided.
State V. Delaurier: Privacy Rights And Cordless Telephones - The Fourth Amendment Is Put On Hold, 19 J. Marshall L. Rev. 1087 (1986), Donald Battaglia
State V. Delaurier: Privacy Rights And Cordless Telephones - The Fourth Amendment Is Put On Hold, 19 J. Marshall L. Rev. 1087 (1986), Donald Battaglia
UIC Law Review
No abstract provided.
Douglass V. Hustler Magazine, Inc.: Anatomy Of Privacy For A Public Figure In Illinois, 19 J. Marshall L. Rev. 1053 (1986), Howard L. Teplinsky
Douglass V. Hustler Magazine, Inc.: Anatomy Of Privacy For A Public Figure In Illinois, 19 J. Marshall L. Rev. 1053 (1986), Howard L. Teplinsky
UIC Law Review
No abstract provided.