Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Privacy Law

The Board's Responsibility For Information Technology Governance, 28 J. Marshall J. Computer & Info. L. 313 (2011), Lawrence J. Trautman, Kara Altenbaumer-Price Jan 2011

The Board's Responsibility For Information Technology Governance, 28 J. Marshall J. Computer & Info. L. 313 (2011), Lawrence J. Trautman, Kara Altenbaumer-Price

UIC John Marshall Journal of Information Technology & Privacy Law

With accusations that boards of directors of financial institutions were asleep at the wheel while their companies engaged in risky behavior that erased millions of dollars of shareholder value and plunged the country into recession, increasing pressure is now being placed on public company boards to shoulder the burden of risk oversight for the companies they serve. This article provides an overview of some of the main considerations relative to every director’s duty to govern IT risk. In particular, this comment will address directors’ roles in the risk oversight of the corporations they serve, their role in governance of IT, …


The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, 28 J. Marshall Computer & Info. L. 523 (2011), Moonho Song, Carrie Leonetti Jan 2011

The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, 28 J. Marshall Computer & Info. L. 523 (2011), Moonho Song, Carrie Leonetti

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


My Teacher Sux! [Censored]: Protecting Students' Right To Free Speech On The Internet, 28 J. Marshall J. Computer & Info. L. 385 (2011), Katherine Hokenson Jan 2011

My Teacher Sux! [Censored]: Protecting Students' Right To Free Speech On The Internet, 28 J. Marshall J. Computer & Info. L. 385 (2011), Katherine Hokenson

UIC John Marshall Journal of Information Technology & Privacy Law

This comment will discusses the problem posed by student speech made on the Internet, how free speech issues are generally addressed by courts, the Supreme Court cases that have specifically addressed the First Amendment rights of students, and factors that courts dealing with student speech made on the Internet have attempted to use in their decisions. The comment will further look at how courts have analyzed online student speech cases in light of available Supreme Court precedent, and will propose that the Court adopt a hybrid of the Tinker test when addressing student speech made on the Internet, which will …


Schools: Where Fewer Rights Are Reasonable? Why The Reasonableness Standard Is Inappropriate To Measure The Use Of Rfid Tracking Devices On Students, 28 J. Marshall J. Computer & Info. L. 411 (2011), Alexandra C. Hirsch Jan 2011

Schools: Where Fewer Rights Are Reasonable? Why The Reasonableness Standard Is Inappropriate To Measure The Use Of Rfid Tracking Devices On Students, 28 J. Marshall J. Computer & Info. L. 411 (2011), Alexandra C. Hirsch

UIC John Marshall Journal of Information Technology & Privacy Law

In an unsuccessful attempt to heighten security, schools are implementing a technology that offers access to children’s personal information and minute-by-minute location. Although not entirely new, Radio Frequency Identification (RFID) technology use has recently been expanding within the school arena. Skeptics knowledgeable about the downfalls of the technology, however, have reason to be concerned. In order to understand the true urgency of this issue, this comment will explain the background of RFID technology, specifically what RFID tags are, how they are used, their purposes, and how they have become unsafe. Included will be an explanation of the reasons that schools …


Bugs For Sale: Legal And Ethical Proprieties Of The Market In Software Vulnerabilities, 28 J. Marshall J. Computer & Info. L. 451 (2011), Taiwo A. Oriola Jan 2011

Bugs For Sale: Legal And Ethical Proprieties Of The Market In Software Vulnerabilities, 28 J. Marshall J. Computer & Info. L. 451 (2011), Taiwo A. Oriola

UIC John Marshall Journal of Information Technology & Privacy Law

The pertinent questions therefore are: first, could software vulnerabilities be obviated simply by ameliorating factors responsible for market failure as canvassed by the literature on the economics of software security, drawing on the strength of the theory of information asymmetry, or are vulnerabilities inevitable irrespective of market dynamics and solutions? Second, to what extent is vulnerabilities research or the surreptitious exploitation of software vulnerabilities by hackers tantamount to trespass, and what are the legal implications, if any? Third, to what extent is the peddling of software vulnerabilities valid or enforceable in law? Fourth, what are the implications of software vulnerabilities …


Carry That Weight: Victim Privacy Within The Military Sexual Assault Reporting Methods, 28 J. Marshall Computer & Info. L. 551 (2011), Emily Hansen Jan 2011

Carry That Weight: Victim Privacy Within The Military Sexual Assault Reporting Methods, 28 J. Marshall Computer & Info. L. 551 (2011), Emily Hansen

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Need For Better Analysis Of High Capacity Services, 28 J. Marshall J. Computer & Info. L. 343 (2011), George S. Ford, Lawrence J. Spiwak Jan 2011

The Need For Better Analysis Of High Capacity Services, 28 J. Marshall J. Computer & Info. L. 343 (2011), George S. Ford, Lawrence J. Spiwak

UIC John Marshall Journal of Information Technology & Privacy Law

In 1999, the Federal Communications Commission (“FCC”) began to grant incumbent local exchange carriers (“LECs”) pricing flexibility on special access services in some Metropolitan Statistical Areas (“MSAs”) when specific evidence of competitive alternatives is present. The propriety of that deregulatory move by the FCC has been criticized by the purchasers of such services ever since. Proponents of special access price regulation rely on three central arguments to support a retreat to strict price regulation: (1) the market(s) for special access and similar services is unduly concentrated; (2) rates of return on special access services, computed using FCC ARMIS data, are …


The Thirtieth Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 29 J. Marshall J. Computer & Info. L. 75 (2011), Russell Bottom, Matthew T. Andris, Robin Ann Sowizrol Jan 2011

The Thirtieth Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 29 J. Marshall J. Computer & Info. L. 75 (2011), Russell Bottom, Matthew T. Andris, Robin Ann Sowizrol

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Stuxnet As Cyberwarfare: Applying The Law Of War To The Virtual Battlefield, 29 J. Marshall J. Computer & Info. L. 1 (2011), John Richardson Jan 2011

Stuxnet As Cyberwarfare: Applying The Law Of War To The Virtual Battlefield, 29 J. Marshall J. Computer & Info. L. 1 (2011), John Richardson

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Thirtieth Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 29 J. Marshall J. Computer & Info. L. 139 (2011), Elena Jacob, Steven Osit, Darya Zuravicky Jan 2011

The Thirtieth Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 29 J. Marshall J. Computer & Info. L. 139 (2011), Elena Jacob, Steven Osit, Darya Zuravicky

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Amended Eu Law On Eprivacy And Electronic Communications After Its 2011 Implentation; New Rules On Data Protection, Spam, Data Breaches And Protection Of Intellectual Property Rights, 29 J. Marshall J. Computer & Info. L. 29 (2011), Vagelis Papakonstantinou, Paul De Hert Jan 2011

The Amended Eu Law On Eprivacy And Electronic Communications After Its 2011 Implentation; New Rules On Data Protection, Spam, Data Breaches And Protection Of Intellectual Property Rights, 29 J. Marshall J. Computer & Info. L. 29 (2011), Vagelis Papakonstantinou, Paul De Hert

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Thirtieth Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 29 J. Marshall J. Computer & Info. L. 103 (2011), Nate Lindsey, Chris Omlid Jan 2011

The Thirtieth Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 29 J. Marshall J. Computer & Info. L. 103 (2011), Nate Lindsey, Chris Omlid

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.