Rutgers Computer & Technology Law Journal
-
E-mail security risks: taking hacks at the attorney-client privilege.
-
FIFTY-FOURTH SELECTED BIBLIOGRAPHY ON COMPUTERS, TECHNOLOGY AND THE LAW: (January 2022 through December 2022).
-
Forty-fourth selected bibliography on computers, technology, and the law.
-
Forty-third selected bibliography on computers, technology and the law (January 2011 through December 2011).
-
Regulatory financial reform: impact of Dodd-Frank Act on it compliance.
-
The USA PATRIOT Act and telecommunications: privacy under attack.
-
USING TECHNOLOGY TO DISCOVER MORE ABOUT THE JUSTICE SYSTEM.
-
Creating representations of justice in the third millennium: legal poetics in digital times.
-
The "dirt" on digital "sanitizing": droit moral, artistic integrity and the Directors Guild of America v. CleanFlicks et al.
-
Delivery drones: will Amazon Air see the national airspace?
-
Separated by a common language? An examination of the transatlantic dialogue on data privacy law and policy in the fight against terrorism.
-
Fan websites' use of trademarks in their domain names: fair or foul?
-
The legal Web of wireless transactions.
-
SECTION 10 Forbearance and the FCC's New Era of Internet Regulation.
-
Lawyer and law firm web pages as advertising: proposed guidelines.
-
Technology due diligence: the need for and benefits of technology assessment in connection with investment in high-tech companies.
-
Forty-third selected bibliography on computers, technology and the law (January 2011 through December 2011).
-
DOES THE VIDEO PRIVACY PROTECTION ACT PROTECT USERS OF FREE CELL PHONE APPLICATIONS?
-
Balance of privacy vs. security: a historical perspective of the USA PATRIOT Act.
-
Encryption, key recovery, and commercial trade secret assets: a proposed legislative model.
-
Why-spy? An analysis of privacy and geolocation in the wake of the 2010 Google 'Wi-Spy' controversy.
-
Gambling on the Internet: the states risk playing economic roulette as the Internet gambling industry spins onward.
-
Privacy, the First Amendment and Hulk Hogan's $140.1 million jury verdict.
-
"TEMPORARY" CONCEPTUAL ART: PROPERTY AND COPYRIGHT, HOPES AND PRAYERS.
-
Let's keep it on the download: why the educational use factor of the fair use exception should shield rap music from infringement claims.
-
Google book search: fair use or fairly useful infringement?
-
Dismantling the Internet mafia: RICO's applicability to cyber crime.
-
Privacy in the private sector: use of the automotive industry's "event data recorder" and cable industry's "interactive television" in collecting personal data.
-
The path of E-law: liberty, property, and democracy from the colonies to the Republic of Cyberia.
-
FIFTIETH SELECTED BIBLIOGRAPHY ON COMPUTERS, TECHNOLOGY, AND THE LAW.
-
Democracy's backlog: the Electronic Freedom of Information Act ten years later.
-
Straightening your heir: on the constitutionality of regulating the use of preimplantation technologies to select preembryos or modify the genetic profile thereof based on expected sexual orientation.
-
The European Union Directive on Waste Electrical and Electronic Equipment: a study in Trans-Atlantic Zealotry.
-
Personalized genomics: a need for a fiduciary duty remains.
-
Going where no taxman has gone before: preliminary conclusions and recommendations drawn from a decade of debate on the international taxation of e-commerce.
-
Forty-fifth selected bibliography on computers, technology, and the law.
-
State and local taxation of electronic commerce: the forging of cyberspace tax policy.
-
Using distance learning to enhance cross-listed interdisciplinary law school courses.
-
Reviving the world wonder: why rooftop gardens should cover urban landscapes.
-
Forty-third selected bibliography on computers, technology and the law (January 2011 through December 2011).
-
INTERNET OF INFRINGING THINGS: THE EFFECT OF COMPUTER INTERFACE COPYRIGHTS ON TECHNOLOGY STANDARDS.
-
Universal health identifier: invasion of privacy or medical advancement?
-
What do pizza delivery and information services have in common? Lessons from recent judicial and regulatory struggles with convergence.
-
Mainstream Loudoun and the future of internet filtering for America's public libraries.
-
Thirty-fifth selected Bibliography on computers, technology and the law (January 2002 through December 2002).
-
Computer search and seizure issues in Internet crimes against children cases.
-
Electronic discovery: 2006 amendments to the Federal Rules of Civil Procedure.
-
Errata.
-
FIFTY-FIRST SELECTED BIBLIOGRAPHY ON COMPUTERS, TECHNOLOGY AND THE LAW: January 2019 Through December 2019.
-
Cyberspace: a new frontier for fighting words.
-
Must the children be sacrificed: the tension between emerging imaging technology, free speech and protecting children.
-
And the shirt off your back: Universal City Studios, DECSS, and the Digital Millennium Copyright Act.
-
Missing the mark in cyberspace: misapplying trademark law to invisible and attenuated uses.
-
Legal understanding and issues with electronic signatures - an empirical study of large businesses.
-
A "lengthy, uncertain, and expensive process": a comparison of types of expungement from DNA databases of arrestees.
-
The realities of the MP3 madness: Are record companies simply crying wolf?
-
ENHANCED PRIVACY DUTIES FOR DOMINANT TECHNOLOGY COMPANIES.
-
Food nanotechnology - in search of a regulatory framework.
-
Ethical risks from the use of technology.
-
Thirty-third selected bibliography on computers, technology and the law: (January 2000 through December 2000).
-
Software patent applications directed to business and mathematical processing applications highlight the tension between State Street and Benson.
-
Tinkering with students' free speech beyond the schoolhouse gate during the digital age.
-
Toward a criminal law for cyberspace: a new model of law enforcement?
-
Dialing for dollars: should the FCC regulate Internet telephony?
-
Minnesota passes the nation's first Internet privacy law.
-
Whistleblower? More like cybercriminal: the Computer Fraud and Abuse Act as applied to Sarbanes-Oxley whistleblowers.
-
Les Fleurs du mal: a critique of the legal transplant in Chinese Internet copyright protection.
-
Do as I say, not as I do - is Star Wars inevitable? Exploring the future of international space regime in the context of the 2006 U.S. National Space Policy.
-
Flawed but fixable: section 230 of the Communications Decency Act at 20.
-
Beyond the neighborhood drugstore: U.S. regulation of online prescription drug sales by foreign businesses.
-
The computational complexity of automated redistricing: is automation the answer?
-
Seeds of hope: how new genetic technologies may increase value to farmers, seed companies, and the developing world.
-
The proliferation of electronic commerce patents: don't blame the PTO.
-
Thirty-fourth selected biography on computers, technology and the law (January 2001 through December 2001).
-
Aereo, the public performance right, and the future of broadcasting.
-
The warrantless interception of e-mail: Fourth Amendment search or free rein for the police?
-
The concept of sepulchral rights in Canada and the U.S. in the age of genomics: hints from Iceland.
-
Some math is hard, some not: rules for patentable subject matter of software.
-
Elonis v. United States: at the crossroads of First Amendment and criminal jurisprudence in the digital age.
-
Mobile data terminals and random license plate checks: the need for uniform guidelines and a reasonable suspicion requirement.
-
Authenticity of archived websites: the need to lower the evidentiary hurdle is imminent.
-
Teleradiology: images of an improved standard of medical care?
-
Back to the future: crime and punishment in second life.
-
Forty-fifth selected bibliography on computers, technology, and the law.
-
Evidence at the electronic frontier: introducing e-mail at trial in commercial litigation.
-
FIFTY-SECOND SELECTED BIBLIOGRAPHY ON COMPUTERS, TECHNOLOGY AND THE LAW: (January 2020 Through December 2020).
-
B2Bs, e-commerce & the all-or-nothing deal.
-
The First Amendment Implications of Regulating Political Deepfakes.
-
Change necessary: electronic discovery under the Manual for Courts-Martial.
-
Not yet released and already a critical disappointment: still in committee, the proposed "Family Movie Act of 2004" garners few accolades.
-
Cyberspace: the newest challenge for traditional legal doctrine.
-
Free access and the future of copyright.
-
Secondary liability for third parties' copyright infringement upheld by the Supreme Court: MGM Studios, Inc. v. Grokster, Ltd.
-
Identity theft: myths, methods, and new law.
-
The Electronic Freedom of Information Act Amendments: a minor upgrade to public access law.
-
FORTY- EIGHTH SELECTED BIBLIOGRAPHY ON COMPUTERS, TECHNOLOGY, AND THE LAW.
-
I can do bad all by myself: a proposal for streamlining the claim construction process in patent litigation.
-
The blame game: can Internet service providers escape liability for semantic attacks? .
-
THE PATENT ACT AND THE CONSTITUTIONALITY OF STATE PHARMACEUTICAL REGULATION.
-
Cybercommunity versus geographical community standard for online pornography: a technological hierarchy in judging cyberspace obscenity.
-
Notice of errata.
-
The problem of the parody-satire distinction: fair use in Machinima and other fan created works.
-
YOU WANT TO TWEET ABOUT IT BUT YOU PROBABLY CAN'T: HOW SOCIAL MEDIA PLATFORMS FLAGRANTLY VIOLATE THE FIRST AMENDMENT.
-
Trade secrets - the new risks to trade secrets posed by computerization.
-
Pornography, community and the Internet - freedom of speech and obscenity on the Internet.
-
The prodigal "son" returns: an assessment of current "son of Sam" laws and the reality of the online murderabilia marketplace.
-
Harmonizing fair use and self-help copyright protection of digital music.
-
The 140-character campaign: regulating social media usage in campaign advertising.
-
RFID and privacy: living in perfect harmony.
-
Discontinuance in the face of destruction: the future of telecommunications law after Superstorm Sandy.
-
"OUR IDENTITY IS OFTEN WHAT'S TRIGGERING SURVEILLANCE": HOW GOVERNMENT SURVEILLANCE OF #BLACKLIVESMATTER VIOLATES THE FIRST AMENDMENT FREEDOM OF ASSOCIATION.
-
A tale of two phones: a discussion of law enforcement's use of the All Writs Act to force Apple to open private iPhones.
-
THE IMPLICIT BAN ON FREE AND OPEN SOURCE SOFTWARE AND STATUTORY OVERREACH IN THE FCC'S REVISED RF DEVICE AUTHORIZATION RULES.
-
Who pays the price of computer software failure?
-
Get ready for the return! How to make filing tax returns more efficient: applying the state of California Franchise Tax Board's ReadyReturn to the federal tax system.
-
Child pornography and the Internet in Hong Kong.
-
'Can you see me now?' Bringing technology to the world of pro bono.
-
The Digital Millennium Copyright Act: disabusing the notion of a constitutional moment.
-
Forty-sixth selected bibliography on computers, technology and the law: January 2014 through December 2014.
-
The European Union Commission and recent trends in European information law.
-
Forty-sixth selected bibliography on computers, technology and the law: January 2014 through December 2014.
-
Aereo, the public performance right, and the future of broadcasting.
-
Virtually possible - using the Internet to facilitate custody and parenting beyond relocation.
-
THE METAVERSE: A VIRTUAL WORLD WITH REAL WORLD LEGAL CONSEQUENCES.
-
Forty-fourth selected bibliography on computers, technology, and the law.
-
CLOUD COMPUTING AND CROSS-BORDER TRANSFER PRICING: IMPLICATIONS OF RECENT OECD AND AUSTRALIAN TRANSFER PRICING LAWS ON CLOUD RELATED MULTINATIONAL ENTERPRISES AND POSSIBLE SOLUTIONS.
-
Equine considerations and computer law - reflections forty years on: the story of the founding of the world's first academic law journal on the subject of computers and law.
-
BIOMETRIC DATA COLLECTION AND USE IN THE AGE OF SOCIAL MEDIA: THE INCREASING NEED FOR COPPA UPDATES GIVEN THE DECREASING AGE OF INTERNET USERS.
-
Copyright law tackles yet another challenge: the electronic frontier of the World Wide Web.
-
Thirty-second selected bibliography on computers, technology and the law.
-
The New Jersey Supreme Court's treatment of the wireless communications industry pursuant to New Jersey municipal land use law and the Telecommunications Act of 1996.
-
Universal service and the digital revolution: beyond the Telecommunications Act of 1996.
-
Forty-sixth selected bibliography on computers, technology and the law: January 2014 through December 2014.
-
Taxing e-commerce: an abundance of constraints.
-
Forty-first selected bibliography on computers, technology and the law.
-
Software patent developments: a programmer's perspective.
-
Good Samaritans in cyberspace.
-
FORTY-SEVENTH SELECTED BIBLIOGRAPHY ON COMPUTERS, TECHNOLOGY AND THE LAW: (January 2015 through December 2015).
-
"What's really going on?" A study of lawyer and scientist inter-disciplinary discourse.
-
ONE-TO-ONE OR SLIM TO NONE: NEW JERSEY'S CHANCES OF AFFORDING A ONE-TO-ONE EDUCATIONAL INITIATIVE.
-
Firearm microstamp technology: failing Daubert and Federal Rules of Evidence 702.
-
Means-plus-function clauses in patent claims: a tortuous path.
-
2013 National Lawyers Convention International: cybersecurity - the policy and politics of a leading national security threat.
-
Who owns your friends? PhoneDog v. Kravitz and business claims of trade secret in social media information.
-
Forty-fourth selected bibliography on computers, technology, and the law.
-
Medics, markets, and Medicare.
-
Internet hate speech and the First Amendment, revisited.
-
Let's get physical: loss of use of tangible property as coverage in cyber insurance.
-
ICOS, CRYPTOS, BLOCKCHAIN, OH MY! A PRIMER ON ICOs.
-
Development of net neutrality rules: is the third time a charm?
-
Online shareholder meetings: corporate law anomalies or the future of governance?
-
UNHARMONIOUS COEXISTENCE: HOW AMERICA'S MILITARY OBSESSION HAS DEMONSTRATED THE INCOMPATIBILITY OF WEAPONIZED DRONES AND SOVEREIGNTY.
-
One claim, one statutory class of invention: how the machine-or-transformation test impacts indefinite analysis.
-
Thirty-sixth selected Bibliography on computers, technology and the law (January 2003 through December 2003).
-
Pop-up advertising online: slaying the hydra.
-
Korea's road toward respecting intellectual property rights.
-
Employment & social media privacy: employer justifications for access to "private" material.
-
Thirty-ninth selected bibliography on computers, technology, and the law: (January 2007 through December 2007).
-
A crusade in the public domain: the Dastar decision.
-
Open-source software and the demise of copyright.
-
Notes on the United Nations Convention on the use of Electronic Communications in International Contracts and its effects on the United Nations Convention on Contracts for the International Sale of Goods.
-
Password protection and self-incrimination: applying the Fifth Amendment privilege in the technological era.
-
Upgrading the national power grid: electric companies need an economic incentive to invest in new technology.
-
Robin Hood versus the bullies: software piracy and developing countries.
-
Thirty-ninth selected bibliography on computers, technology, and the law: (January 2006 through December 2006).
-
Honeypots: a sticky legal landscape?
-
Applying the U.S. Postal Service statutes to e-mail transmissions.
-
FIFTY-FOURTH SELECTED BIBLIOGRAPHY ON COMPUTERS, TECHNOLOGY AND THE LAW: (January 2022 through December 2022).
-
AN ANALOGICAL-REASONING APPROACH FOR DETERMINING EXPECTATIONS OF PRIVACY IN TEXT MESSAGE CONTENT.
-
PUNTING THE PRIVATE SEARCH DOCTRINE: How THE GOOD FAITH EXCEPTION IMPEDES FOURTH AMENDMENT JURISPRUDENCE.
-
Building the ethical cyber commander and the law of armed conflict.
-
Clouded computing: the foggy application of the Fourth Amendment in technology.
-
Computerized IEP generators: the promise and the peril.
-
AUTONOMOUS DRIVING - REALITY OR WISHFUL THINKING? AN INTERDISCIPLINARY POSTCARD FROM GERMANY: AN INTERDISCIPLINARY PERSPECTIVE ON THE FUTURE OF THE AUTOMOBILE.
-
REGULATING SOCIAL NETWORKING SITES: FACEBOOK, ONLINE BEHAVIORAL ADVERTISING, DATA PROTECTION LAWS AND POWER.
-
ON THE OBSOLESCENCE OF EMPIRICAL KNOWLEDGE IN DEFINING THE RISK/RIGHTS-BASED APPROACH TO AI REGULATION IN THE EUROPEAN UNION.
-
Google, Inc. v. American Blind & Wallpaper Factory, Inc.: a justification for the use of trademarks as keywords to trigger paid advertising placements in Internet search engine results.
-
Using the Internet to attract clients and the attorney-client privilege.
-
THE LAW OF NUCLEAR POWER IN THE WARMTH OF THE ANTHROPOCENE.
-
Symposium: ethical issues in e-discovery, social media, and the cloud.
-
UNDERSTANDING THE COMPLEXITIES OF CIVIL DISOBEDIENCE FOR CYBERSPACE PROTESTS IN THE CASE OF AARON SWARTZ.
-
Forty-third selected bibliography on computers, technology and the law (January 2011 through December 2011).
-
DEFINING IRS' TREATMENT OF CRYPTOCURRENCIES AND ITS IMPACT ON THEIR PRACTICAL APPLICATION.
-
WAS DIEHR A FLOOK IN THE SYSTEM? A SYSTEMS ANALYSIS FOR TWO LANDMARK PATENT ELIGIBILITY SUPREME COURT DECISIONS.
-
(UN)SUSTAINABILITY OF BITCOIN MINING.
-
How to pry with maps: the Fourth Amendment privacy implications of governmental wetland Geographic Information Systems (GIS).
-
Teleradiology: the perks, pitfalls and patients who ultimately pay.
-
DATA PORTABILITY: A GUIDE AND A ROADMAP.
-
Cybersurgery: the cutting edge.
-
Forty-fifth selected bibliography on computers, technology, and the law.
-
VIDEOGAME STREAMING AND EMULATORS - A SLIPPI SLOPE FOR FAIR USE?
-
TRANSPARENCY REPORTS AND THEIR RELATIONSHIP WITH THE ESPIONAGE ACT.
-
Gun detector technology and the special needs exception.
-
Look before you leap into predictive coding: an argument for a cautious approach to utilizing predictive coding.
-
Toward true equality of educational opportunity: unlocking the potential of assistive technology through professional development.
-
E-Verify, a piece of the puzzle not a brick in the wall: why all U.S. employers should be made to use E-Verify, just not yet.
-
The new "problem" of business method patents: the convergence of national patent laws and International Internet transactions.
-
Cable television franchise agreements: is local, state or federal regulation preferable?
-
Personal jurisdiction and the World-Wide Web: bits (and bytes) of minimum contracts.
-
Adapting contract law to accommodate electronic contracts: overview and suggestions.