Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 18 of 18
Full-Text Articles in Privacy Law
Health Information And Data Security Safeguards, 32 J. Marshall J. Info. Tech. & Privacy L. 133 (2016), Jane Kim, David Zakson
Health Information And Data Security Safeguards, 32 J. Marshall J. Info. Tech. & Privacy L. 133 (2016), Jane Kim, David Zakson
UIC John Marshall Journal of Information Technology & Privacy Law
The healthcare industry possesses information coveted by cyber criminals. Unfortunately, healthcare providers are also among the most vulnerable and unprepared to deal with cyber attacks. The Introduction sets the background of this paper with cyber security statistics of the healthcare sector. Part A of this paper will discuss how new Russian law impacts global data security. Part B takes a broad look at data security safeguards. Part C focuses on U.S. attempts at safeguarding data through NIST and its Presidential Policy Directive. In Part D, the paper explores in greater detail causes that precipitate security breaches and specific security defenses …
Setting Parental Controls: Do Parents Have A Duty To Supervise Their Children’S Use Of The Internet?, 31 J. Marshall J. Info. Tech. & Privacy L. 309 (2014), Alberto Bernabe
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Giving Credit Where Credit Is Due: A Comment On The Theoretical Foundation And Historical Origin Of The Tort Remedy For Invasion Of Privacy, 29 J. Marshall J. Computer & Info. L. 493 (2012), Alberto Bernabe
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Tort Liability For Software Developers: A Law & Economics Perspective, 27 J. Marshall J. Computer & Info. L. 199 (2009), T. Randolph Beard, George S. Ford, Thomas M. Koutsky, Lawrence J. Spiwak
Tort Liability For Software Developers: A Law & Economics Perspective, 27 J. Marshall J. Computer & Info. L. 199 (2009), T. Randolph Beard, George S. Ford, Thomas M. Koutsky, Lawrence J. Spiwak
UIC John Marshall Journal of Information Technology & Privacy Law
This article explores the economic rationale for applying product liability law to computer software. As demonstrated in the article, a well-designed liability regime must place liability upon all parties who economically control the risks of accidents. Accordingly, this article finds that strict liability may be appropriate for certain types of “intrinsic” software, but not for other types of software requiring that the customer be actively involved in the selection, operation and maintenance thereof. The authors show that for this type of “extrinsic” software, a strict liability rule is unlikely to be economically optimal and, therefore, choosing a generic liability regime …
Lessons For The Hague: Internet Jurisdiction In Contract And Tort Cases In The European Community And The United States, 23 J. Marshall J. Computer & Info. L. 1 (2004), Moritz Keller
UIC John Marshall Journal of Information Technology & Privacy Law
With the increasing use of the Internet, all on-line users, web site owners, e-commerce companies and consumers alike, feel the need to be able to rely on clear standards for a potential contract or tort lawsuit following the Internet presence that could lead to multinational litigation. This goal could be achieved if the negotiations of the Hague Convention on international jurisdiction and enforcement of foreign judgments in civil and commercial matters succeed in harmonizing the rules of the different legal systems around the globe, or at least create a minimum standard for legal cases which would benefit greatly e-commerce and …
The Doors Are Locked But The Thieves And Vandals Are Still Getting In: A Proposal In Tort To Alleviate Corporate America's Cyber-Crime Problem, 16 J. Marshall J. Computer & Info. L. 167 (1997), David L. Gripman
UIC John Marshall Journal of Information Technology & Privacy Law
This article addresses the problem of computer hackers, breaking into the computer systems of businesses, and the third party injuries that are ultimately caused by such acts. This is a multimillion dollar problem for the business community. The article discusses the current methods companies use to protect against hackers, and then the author makes some suggestions for protection that include the latest technology available. However, the paper's main focus is on ways to put pressure on businesses to ensure that its computers are protected against hackers to avoid third party injuries. The author looks to tort law to do just …
The Scientological Defenestration Of Choice-Of-Law Doctrines For Publication Torts On The Internet, 15 J. Marshall J. Computer & Info. L. 361 (1997), Christopher P. Beall
The Scientological Defenestration Of Choice-Of-Law Doctrines For Publication Torts On The Internet, 15 J. Marshall J. Computer & Info. L. 361 (1997), Christopher P. Beall
UIC John Marshall Journal of Information Technology & Privacy Law
Two major doctrines exist for choosing which state's law applies to an interstate tort: the "lex loci deliciti" (the law of the place of the wrong) approach and the "most significant relationship" approach. In the context of the Internet, the "lex loci deliciti" approach has been criticized for its harshness. For example, it is possible for an e-mail posting to be non-actionable where written, but actionable where read. Likewise, the "most significant relationship" approach has been criticized for its indeterminacy and lack of predictability because the outcome as to the extent of liability for a publication tort on the Internet …
Restatement (Second) Of Torts Section 324a: An Innovative Theory Of Recovery For Patients Injured Through Use Or Misuse Of Health Care Information Services, 14 J. Marshall J. Computer & Info. L. 73 (1995), Lisa L. Dahm
UIC John Marshall Journal of Information Technology & Privacy Law
The author in this comment discusses how developments in information technology and widespread utilization of technology and software in the patient care context raise the issue of clinical liability for health care information systems vendors. The comment discusses a theory of recovery of tort damages for the negligence of health care information systems vendors under section 324A of the Restatement (Second) of Torts. Section 324A provides in essence that "one who undertakes ... for consideration, to render services to another which he should recognize as necessary for the protection of a third person ... is subject to liability to the …
Obligations Of Hiv-Infected Health Professionals To Inform Patients Of Their Serological Status: Evolving Theories Of Liability, 27 J. Marshall L. Rev. 317 (1994), Theodore R. Leblang
Obligations Of Hiv-Infected Health Professionals To Inform Patients Of Their Serological Status: Evolving Theories Of Liability, 27 J. Marshall L. Rev. 317 (1994), Theodore R. Leblang
UIC Law Review
No abstract provided.
Tort Liability For Artificial Intelligence And Expert Systems, 10 Computer L.J. 127 (1990), George S. Cole
Tort Liability For Artificial Intelligence And Expert Systems, 10 Computer L.J. 127 (1990), George S. Cole
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Florida Star V. B.J.F.: The Rape Of The Right To Privacy, 23 J. Marshall L. Rev. 731 (1990), Barbara Lynn Pedersen
Florida Star V. B.J.F.: The Rape Of The Right To Privacy, 23 J. Marshall L. Rev. 731 (1990), Barbara Lynn Pedersen
UIC Law Review
No abstract provided.
Lovgren V. Citizens First National Bank: Illinois Recognizes The False Light Invasion Of Privacy Tort, 22 J. Marshall L. Rev. 943 (1989), F. John Steffen
Lovgren V. Citizens First National Bank: Illinois Recognizes The False Light Invasion Of Privacy Tort, 22 J. Marshall L. Rev. 943 (1989), F. John Steffen
UIC Law Review
No abstract provided.
Rethinking The Rule Against Corporate Privacy Rights: Some Conceptual Quandries For The Common Law, 20 J. Marshall L. Rev. 607 (1987), Anita L. Allen
Rethinking The Rule Against Corporate Privacy Rights: Some Conceptual Quandries For The Common Law, 20 J. Marshall L. Rev. 607 (1987), Anita L. Allen
UIC Law Review
No abstract provided.
Adolescent Confidentiality And Family Privacy, 20 J. Marshall L. Rev. 641 (1987), Ferdinand Schoeman
Adolescent Confidentiality And Family Privacy, 20 J. Marshall L. Rev. 641 (1987), Ferdinand Schoeman
UIC Law Review
No abstract provided.
Aids: Testing Democracy - Irrational Responses To The Public Health Crisis And The Need For Privacy In Serologic Testing, 19 J. Marshall L. Rev. 835 (1986), Michael L. Closen, Susan Marie Connor, Howard L. Kaufman, Mark E. Wojcik
Aids: Testing Democracy - Irrational Responses To The Public Health Crisis And The Need For Privacy In Serologic Testing, 19 J. Marshall L. Rev. 835 (1986), Michael L. Closen, Susan Marie Connor, Howard L. Kaufman, Mark E. Wojcik
UIC Law Review
No abstract provided.
Douglass V. Hustler Magazine, Inc.: Anatomy Of Privacy For A Public Figure In Illinois, 19 J. Marshall L. Rev. 1053 (1986), Howard L. Teplinsky
Douglass V. Hustler Magazine, Inc.: Anatomy Of Privacy For A Public Figure In Illinois, 19 J. Marshall L. Rev. 1053 (1986), Howard L. Teplinsky
UIC Law Review
No abstract provided.
Preface, 18 J. Marshall L. Rev. 811 (1985)
Information Law Overview, 18 J. Marshall L. Rev. 815 (1985), George B. Trubow
Information Law Overview, 18 J. Marshall L. Rev. 815 (1985), George B. Trubow
UIC Law Review
No abstract provided.