Blog: The Overbroad Computer Fraud and Abuse Act: Its Implications and Why Its Scope Should be Narrowed

cfaapic

by Barry Gabay, Associate Staff If you are at work and you are reading this, you may be subject to federal criminal sanctions. The Computer Fraud and Abuse Act, the federal government’s key anti-hacking law, was originally enacted in 1986 to deter hackers from wrongfully obtaining confidential governmental and financial …

Continue reading

Blog: Snapchat – Defeating an Authenticity Objection in Court

snapchat

by Danielle Bringard, Associate Survey and Symposium Editor                     We’ve all done it.  We’ve all taken the “selfie.”  Facebook, Twitter, Tinder, Instagram, and Snapchat are just a few of these social media applications that allow users to transmit photos and videos to each other from various electronic devices.  However, unlike most …

Continue reading

Getting Serious: Why Companies Must Adopt Information Governance Measures to Prepare for the Upcoming Changes to the Federal Rules of Civil Procedure

DownloadPDF Cite as: Philip J. Favro, Getting Serious: Why Companies Must Adopt Information Governance Measures to Prepare for the Upcoming Changes to the Federal Rules of Civil Procedure, 20 Rich. J.L. & Tech. 5 (2014), http://jolt.richmond.edu/v20i2/article5.pdf. Philip J. Favro* “[W]ithout a corresponding change in discovery culture by courts, counsel and clients …

Continue reading

Finding the Signal in the Noise: Information Governance, Analytics, and the Future of Legal Practice

DownloadPDF Cite as: Bennett B. Borden & Jason R. Baron, Finding the Signal in the Noise: Information Governance, Analytics, and the Future of Legal Practice, 20 Rich. J.L. & Tech. 7 (2014), http://jolt.richmond.edu/v20i2/article7.pdf.   Bennett B. Borden* and Jason R. Baron**   Introduction [1]        In the watershed year of 2012, the …

Continue reading

Defensible Data Deletion: A Practical Approach to Reducing Cost and Managing Risk Associated with Expanding Enterprise Data

DownloadPDF Cite as: Dennis R. Kiker, Defensible Data Deletion: A Practical Approach to Reducing Cost and Managing Risk Associated with Expanding Enterprise Data, 20 Rich. J.L. & Tech. 6 (2014), http://jolt.richmond.edu/v20i2/article6.pdf.   Dennis R. Kiker*   I.  Introduction [1]        Modern businesses are hosts to steadily increasing volumes of data, creating significant …

Continue reading

Blog: Facebook’s Continuing Privacy Policy Battle: Parents Concerned Over the Use of Children’s Information in Advertisements

facebook privacy

By: Jasmine McKinney, Associate Manuscripts Editor    By now, most of us probably know that Facebook is no stranger to lawsuits.  Just a mere two years ago, Facebook was involved in a class-action lawsuit where the social networking giant was found to have used members’ images without their permission in …

Continue reading