Monthly Archives March 2014

C-130j_hercules_model_arp

Blog: Trapping “Trappy”; the FAA’s Attempt to Regulate Model Aircrafts

by Laura Bedson, Associate Symposium and Survey Editor

Say it isn’t so!  The days of unregulated model airplane flying may well be behind us, particularly if the Federal Aviation Administration (FAA) has anything to say about it...

Read More

Blog: Will “Smart Guns” be Accepted as a Trailblazing Technology or Lead to Constitutional Issues?

by Taylor Linkous, Associate Technology and Public Relations Editor

            Gun control is one of the most controversial and divisive issues in America and with a slew of mass shootings in recent years, the debate seems to have only intensified...

Read More
cfaapic

Blog: The Overbroad Computer Fraud and Abuse Act: Its Implications and Why Its Scope Should be Narrowed

by Barry Gabay, Associate Staff

If you are at work and you are reading this, you may be subject to federal criminal sanctions.

The Computer Fraud and Abuse Act, the federal government’s key anti-hacking law, was originally enacted in 1986 to deter hackers from wrongfully obtaining confidential gover...

Read More
bitcoin

Blog: How Will the Government Deal with Bitcoin?

By: Associate Technology and Public Relations Editor, Taylor Linkous

            As bitcoin continues to rise in popularity and value and steadily establishes itself in the mainstream economy, it has simultaneously revealed its flaws and weaknesses...

Read More
snapchat

Blog: Snapchat – Defeating an Authenticity Objection in Court

by Danielle Bringard, Associate Survey and Symposium Editor       

             We’ve all done it.  We’ve all taken the “selfie...

Read More

Getting Serious: Why Companies Must Adopt Information Governance Measures to Prepare for the Upcoming Changes to the Federal Rules of Civil Procedure

pdf_iconDownloadPDF

Cite as: Philip J. Favro, Getting Serious: Why Companies Must Adopt Information Governance Measures to Prepare for the Upcoming Changes to the Federal Rules of Civil Procedure, 20 Rich. J.L. & Tech. 5 (2014), http://jolt.richmond.edu/v20i2/article5.pdf.

Philip J. Favro*

“[W]ithout a c...

Read More

Finding the Signal in the Noise: Information Governance, Analytics, and the Future of Legal Practice

pdf_iconDownloadPDF

Cite as: Bennett B. Borden & Jason R. Baron, Finding the Signal in the Noise: Information Governance, Analytics, and the Future of Legal Practice, 20 Rich. J.L. & Tech. 7 (2014), http://jolt.richmond.edu/v20i2/article7.pdf.

 

Bennett B. Borden* and Jason R. Baron**

 

Introduction

[1] ...

Read More

Understanding and Contextualizing Precedents in e-Discovery: The Illusion of Stare Decisis and Best Practices to Avoid Reliance on Outdated Guidance

pdf_iconDownloadPDF

Cite as: Jonathan M. Redgrave, Keltie Hays Peay, & Mathea K.E. Bulander, Understanding and Contextualizing Precedents in e-Discovery: The Illusion of Stare Decisis and Best Practices to Avoid Reliance on Outdated Guidance, 20 Rich. J.L. & Tech. 8 (2014), http://jolt.richmond...

Read More

Defensible Data Deletion: A Practical Approach to Reducing Cost and Managing Risk Associated with Expanding Enterprise Data

pdf_iconDownloadPDF

Cite as: Dennis R. Kiker, Defensible Data Deletion: A Practical Approach to Reducing Cost and Managing Risk Associated with Expanding Enterprise Data, 20 Rich. J.L. & Tech. 6 (2014), http://jolt.richmond.edu/v20i2/article6.pdf.

 

Dennis R. Kiker*

 

I.  Introduction

[1]        Modern...

Read More

The Compliance Case for Information Governance

pdf_iconDownloadPDF

Cite as: Peter Sloan, The Compliance Case for Information Governance, 20 Rich. J.L. & Tech. 4 (2014), http://jolt.richmond.edu/v20i2/article4.pdf.

By Peter Sloan*

I.  Introduction

[1]        In an increasingly convoluted information environment, organizations strive to manage infor...

Read More