Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

4,590 Full-Text Articles 4,395 Authors 3,876,593 Downloads 132 Institutions

All Articles in Computer Law

Faceted Search

4,590 full-text articles. Page 129 of 144.

Virtual Child Pornography Laws And The Constraints Imposed By The First Amendment, Paula Bird 2011 Barry University School of Law

Virtual Child Pornography Laws And The Constraints Imposed By The First Amendment, Paula Bird

Barry Law Review

This article seeks to navigate through the complexities involved with the uncertain future of virtual child pornography laws. First, this article sets forth a brief history of the legislative actions and court rulings regarding unprotected speech and virtual child pornography, and discusses the current standing of child pornography laws. Entailed in this discussion will be a vigorous inspection of the current statutes and how they simultaneously affect law enforcement, prosecutors, and defendants. Finally, the potential future of laws regarding virtual child pornography is analyzed, including addressing the issues of how the application and interpretation of the laws are changing and …


Collaborating With A Digital Forensics Expert: Ultimate Tag-Team Or Disastrous Duo?, Sean L. Harrington 2011 Attorney Client Privilege, LLC

Collaborating With A Digital Forensics Expert: Ultimate Tag-Team Or Disastrous Duo?, Sean L. Harrington

Sean L Harrington

No abstract provided.


Admissibility Of Electronic Documents, Curtis E.A. Karnow 2011 California Superior Court (San Francisco)

Admissibility Of Electronic Documents, Curtis E.A. Karnow

Curtis E.A. Karnow

A comprehensive inventory of issues involved in the introduction of electronic evidence, including practical alerts


Licensing As Digital Rights Management, From The Advent Of The Web To The Ipad, Reuven Ashtar 2011 University of Toronto, Faculty of Law

Licensing As Digital Rights Management, From The Advent Of The Web To The Ipad, Reuven Ashtar

Reuven Ashtar

This Article deals with the Digital Millennium Copyright Act’s anti-circumvention provision, Section 1201, and its relationship to licensing. It argues that not all digital locks and contractual notices qualify for legal protection under Section 1201, and attributes the courts’ indiscriminate protection of all Digital Rights Management (DRM) measures to the law’s incoherent formulation. The Article proposes a pair of filters that would enable courts to distinguish between those DRM measures that qualify for protection under Section 1201, and those that do not. The filters are shown to align with legislative intent and copyright precedent, as well as the approaches recently …


Both Giving And Taking: Should Misuse Of Atms And Electronic Payment Systems Be Theft, Fraud Or Neither?, Alex Steel 2011 University of New South Wales

Both Giving And Taking: Should Misuse Of Atms And Electronic Payment Systems Be Theft, Fraud Or Neither?, Alex Steel

Alex Steel

Although transactions via automatic teller machines and other computerised cash payment systems are now very widespread the criminal law relating to their misuse remains confused. Unauthorised withdrawals can be prosecuted as both theft and fraud. By contrast, similar behaviour involving interactions with human tellers is generally not criminal. The result is a deeply flawed and contradictory legal landscape. This article provides an analysis and critique of the case law and legislation that has led to this result and proposes an alternative statutory offence that better reflects the commercial and consumer realities of electronic transactions.


Rationales For And Against Fcc Involvement In Resolving Internet Service Provider Interconnection Disputes, Rob M. Frieden 2011 Penn State University

Rationales For And Against Fcc Involvement In Resolving Internet Service Provider Interconnection Disputes, Rob M. Frieden

Rob Frieden

Internet Service Providers (“ISPs”) provide end users with access to and from the Internet cloud. In addition to providing the first and last mile carriage of traffic, ISPs secure upstream access to sources of content via other ISPs typically on a paid (transit), or barter (peering) basis. Because a single ISP operates in two separate segments of traffic routing, both the terms and conditions of network interconnection and the degree of marketplace competition can vary greatly. In this double-sided market, ISPs typically have many transit and peering opportunities upstream to content providers, but downstream end users may have a limited …


Digital Exhaustion, Aaron K. Perzanowski, Jason M. Schultz 2011 Case Western Reserve University

Digital Exhaustion, Aaron K. Perzanowski, Jason M. Schultz

Aaron K. Perzanowski

As digital networks emerge as the dominant means of distributing copyrighted works, the first sale doctrine is increasingly marginalized. The limitations first sale places on the exclusive right of distribution are of little importance when the alienation and use of copies entails their reproduction. This fact of the modern copyright marketplace has led to calls for statutory clarification of digital first sale rights. Acknowledging the obstacles to legislative intervention, this Article argues that courts are equipped today to limit copyright exclusivity in order to enable copy owners to make traditionally lawful uses of their copies, including resale through secondary markets. …


Discovering Facebook: Social Network Subpoenas And The Stored Communications Act, Ryan A. Ward 2011 Harvard Law School

Discovering Facebook: Social Network Subpoenas And The Stored Communications Act, Ryan A. Ward

Ryan A Ward

The Stored Communications Act is an unnecessarily complicated statute. Originally designed to protect the privacy of Internet users as the Internet existed in 1986, courts have been made to “extract[] operating principles from [the SCA’s] tangled legal framework” and apply these to new Internet technologies. Social networks present one of the latest challenges in this regard. Courts have taken inconsistent approaches in applying the SCA to social network information and many of these cases have obvious flaws. Even the Crispin decision, which represents a step in the right direction, provides incomplete guidance in determining whether social networks should be protected …


An Innovation-Centric Approach Of Telecommunications Infrastructure Regulation, Konstantinos Stylianou 2011 University of Pennsylvania

An Innovation-Centric Approach Of Telecommunications Infrastructure Regulation, Konstantinos Stylianou

Konstantinos Stylianou

This paper considers the mechanics and role of innovation in telecommunications networks, and explains how regulation can be designed to maximize innovation. To better focus on the relationship between innovation and regulation an effort is made to distinguish innovation from competition, although the two concepts are closely related, and several reasons are presented on why the fast changing, networked and technical nature of telecommunications offers a very favorable environment for innovation to thrive, as well as why innovation benefits from a large number of actors. Moreover, the paper further explains that even small players are useful in the innovation process …


Rebooting Trademarks For The Twenty-First Century, 49 U. Louisville L. Rev. 517 (2011), Doris E. Long 2011 John Marshall Law School

Rebooting Trademarks For The Twenty-First Century, 49 U. Louisville L. Rev. 517 (2011), Doris E. Long

UIC Law Open Access Faculty Scholarship

Trademarks have long suffered from an "ugly stepsister" status in the realm of intellectual property. Quasi-market regulation tool, quasi-investment property; trademark's historical role as both consumer-information signifier and producer-investment asset has led to increasingly confusing dichotomous treatment under the Lanham Act. The potentially borderless markets of cyberspace, with their new marketing techniques and new competitive spaces, have only heightened this confusion. Stumbling attempts to extend protection for marks under the Lanham Act beyond traditional notions of trademark use and consumer confusion to encompass the investment protection side of trademarks, such as the development of federal dilution and anti-cybersquatting acts, only …


Right Of Publicity: Is Behavioral Targeting Violating The Right To Control Your Identity Online?, 10 J. Marshall Rev. Intell. Prop. L. 811 (2011), Andrea Stein Fuelleman 2011 UIC School of Law

Right Of Publicity: Is Behavioral Targeting Violating The Right To Control Your Identity Online?, 10 J. Marshall Rev. Intell. Prop. L. 811 (2011), Andrea Stein Fuelleman

UIC Review of Intellectual Property Law

Behavioral targeting (“BT”) is an advertising technique that receives a great deal of attention due in part to the balkanized self-regulatory policies that address consumer protection issues. The majority of the self-regulation policies, including the BT principles proposed by the Federal Trade Commission (“FTC”) focus on privacy issues but fail to discuss the impact BT may have on the right to control the commercial use of one’s identity. In discussing the right of publicity, many legal scholars agree that everyone has a right to control the commercial use of his or her identity, regardless of his or her status as …


Fifteen Years Of Fame: The Declining Relevance Of Domain Names In The Enduring Conflict Between Trademark And Free Speech Rights, 11 J. Marshall Rev. Intell. Prop. L. 1 (2011), Jude A. Thomas 2011 UIC School of Law

Fifteen Years Of Fame: The Declining Relevance Of Domain Names In The Enduring Conflict Between Trademark And Free Speech Rights, 11 J. Marshall Rev. Intell. Prop. L. 1 (2011), Jude A. Thomas

UIC Review of Intellectual Property Law

Domain name disputes have been the subject of substantial litigation, legislative action, and scholarly debate over the course of the past fifteen years. Much of the debate is the product of disagreement concerning whether trademark rights naturally extend into the domain name space and to what extent those rights are limited by principles of free speech. Gripe sites are paradigmatic examples of this debate. Society’s investment in defining these rights continues to grow, even as the relevance of domain names may be declining, due to: (1) changes in the way users locate content on the Internet; (2) the growth of …


Rights Versus Commerce: Balancing Online Trademark Policing With The Emerging Marketplace, 11 J. Marshall Rev. Intell. Prop. L. 217 (2011), Jessica L. Hilliard 2011 UIC School of Law

Rights Versus Commerce: Balancing Online Trademark Policing With The Emerging Marketplace, 11 J. Marshall Rev. Intell. Prop. L. 217 (2011), Jessica L. Hilliard

UIC Review of Intellectual Property Law

In 2008, jeweler Tiffany & Co. (“Tiffany”) commenced an action against eBay after discovering that a significant amount of counterfeit Tiffany jewelry was being sold on the online auction house. Tiffany had previously used eBay’s Verified Rights Owner program to report the infringement and pursued enforcement actions against individual sellers. Nevertheless, Tiffany sued eBay for various causes of action, including contributory trademark infringement. The Second Circuit held that online service providers like eBay are not liable for contributory trademark infringement unless they have specific knowledge of particular instances of infringement. Due to the ruling, Tiffany bears the burden for policing …


The Board's Responsibility For Information Technology Governance, 28 J. Marshall J. Computer & Info. L. 313 (2011), Lawrence J. Trautman, Kara Altenbaumer-Price 2011 UIC School of Law

The Board's Responsibility For Information Technology Governance, 28 J. Marshall J. Computer & Info. L. 313 (2011), Lawrence J. Trautman, Kara Altenbaumer-Price

UIC John Marshall Journal of Information Technology & Privacy Law

With accusations that boards of directors of financial institutions were asleep at the wheel while their companies engaged in risky behavior that erased millions of dollars of shareholder value and plunged the country into recession, increasing pressure is now being placed on public company boards to shoulder the burden of risk oversight for the companies they serve. This article provides an overview of some of the main considerations relative to every director’s duty to govern IT risk. In particular, this comment will address directors’ roles in the risk oversight of the corporations they serve, their role in governance of IT, …


The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, 28 J. Marshall Computer & Info. L. 523 (2011), Moonho Song, Carrie Leonetti 2011 UIC School of Law

The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, 28 J. Marshall Computer & Info. L. 523 (2011), Moonho Song, Carrie Leonetti

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


My Teacher Sux! [Censored]: Protecting Students' Right To Free Speech On The Internet, 28 J. Marshall J. Computer & Info. L. 385 (2011), Katherine Hokenson 2011 UIC School of Law

My Teacher Sux! [Censored]: Protecting Students' Right To Free Speech On The Internet, 28 J. Marshall J. Computer & Info. L. 385 (2011), Katherine Hokenson

UIC John Marshall Journal of Information Technology & Privacy Law

This comment will discusses the problem posed by student speech made on the Internet, how free speech issues are generally addressed by courts, the Supreme Court cases that have specifically addressed the First Amendment rights of students, and factors that courts dealing with student speech made on the Internet have attempted to use in their decisions. The comment will further look at how courts have analyzed online student speech cases in light of available Supreme Court precedent, and will propose that the Court adopt a hybrid of the Tinker test when addressing student speech made on the Internet, which will …


Schools: Where Fewer Rights Are Reasonable? Why The Reasonableness Standard Is Inappropriate To Measure The Use Of Rfid Tracking Devices On Students, 28 J. Marshall J. Computer & Info. L. 411 (2011), Alexandra C. Hirsch 2011 UIC School of Law

Schools: Where Fewer Rights Are Reasonable? Why The Reasonableness Standard Is Inappropriate To Measure The Use Of Rfid Tracking Devices On Students, 28 J. Marshall J. Computer & Info. L. 411 (2011), Alexandra C. Hirsch

UIC John Marshall Journal of Information Technology & Privacy Law

In an unsuccessful attempt to heighten security, schools are implementing a technology that offers access to children’s personal information and minute-by-minute location. Although not entirely new, Radio Frequency Identification (RFID) technology use has recently been expanding within the school arena. Skeptics knowledgeable about the downfalls of the technology, however, have reason to be concerned. In order to understand the true urgency of this issue, this comment will explain the background of RFID technology, specifically what RFID tags are, how they are used, their purposes, and how they have become unsafe. Included will be an explanation of the reasons that schools …


Bugs For Sale: Legal And Ethical Proprieties Of The Market In Software Vulnerabilities, 28 J. Marshall J. Computer & Info. L. 451 (2011), Taiwo A. Oriola 2011 UIC School of Law

Bugs For Sale: Legal And Ethical Proprieties Of The Market In Software Vulnerabilities, 28 J. Marshall J. Computer & Info. L. 451 (2011), Taiwo A. Oriola

UIC John Marshall Journal of Information Technology & Privacy Law

The pertinent questions therefore are: first, could software vulnerabilities be obviated simply by ameliorating factors responsible for market failure as canvassed by the literature on the economics of software security, drawing on the strength of the theory of information asymmetry, or are vulnerabilities inevitable irrespective of market dynamics and solutions? Second, to what extent is vulnerabilities research or the surreptitious exploitation of software vulnerabilities by hackers tantamount to trespass, and what are the legal implications, if any? Third, to what extent is the peddling of software vulnerabilities valid or enforceable in law? Fourth, what are the implications of software vulnerabilities …


Carry That Weight: Victim Privacy Within The Military Sexual Assault Reporting Methods, 28 J. Marshall Computer & Info. L. 551 (2011), Emily Hansen 2011 UIC School of Law

Carry That Weight: Victim Privacy Within The Military Sexual Assault Reporting Methods, 28 J. Marshall Computer & Info. L. 551 (2011), Emily Hansen

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Need For Better Analysis Of High Capacity Services, 28 J. Marshall J. Computer & Info. L. 343 (2011), George S. Ford, Lawrence J. Spiwak 2011 UIC School of Law

The Need For Better Analysis Of High Capacity Services, 28 J. Marshall J. Computer & Info. L. 343 (2011), George S. Ford, Lawrence J. Spiwak

UIC John Marshall Journal of Information Technology & Privacy Law

In 1999, the Federal Communications Commission (“FCC”) began to grant incumbent local exchange carriers (“LECs”) pricing flexibility on special access services in some Metropolitan Statistical Areas (“MSAs”) when specific evidence of competitive alternatives is present. The propriety of that deregulatory move by the FCC has been criticized by the purchasers of such services ever since. Proponents of special access price regulation rely on three central arguments to support a retreat to strict price regulation: (1) the market(s) for special access and similar services is unduly concentrated; (2) rates of return on special access services, computed using FCC ARMIS data, are …


Digital Commons powered by bepress