UW School of Law > LTA Journal > Back Issues

Washington Journal of Law, Technology & Arts Issues

Volumes 1 - 5 were published under the journal name "Shidler Journal of Law, Commerce + Technology".

Volume 2

Issue 4 Spring 2006

ArticleTitleAuthor
15 Easy Come, Easy Go: Copyright Infringement and the DMCA's Notice and Takedown Provision in Light of Rossi v. MPAA

abstract   full article

Lawrence F. Rozsnyai
16 The Failures and Promises of Canada’s Alternative Compensation System for Private Reproduction of Copyrighted Recordings

abstract   full article

Evgenia Fkiaras
17 The SPY ACT: Ditching Damages as an Element of Liability for On-Line Conduct Between Private Parties?

abstract   full article

Andrew T. Braff
18 Applying the Wiretap Act to Online Communications after <em>United States v. Councilman

abstract   full article

Jessica Belskis
19 Compliance with California Privacy Laws: Federal Law Also Provides Guidance to Businesses Nationwide

Over the past several years, personal information has been lost or stolen as a result of a series of high profile security breaches. In January 2006, the U.S. Federal Trade Commission announced that ChoicePoint will be required to pay $15 million in fines and penalties for a high profile security breach that occurred in 2005. The ChoicePoint breach and similar events have spurred an explosion of state and federal privacy legislation. In particular, the State of California has taken the lead by enacting the strictest disclosure and security procedure requirements in the country. The implications of California’s new laws can be felt throughout the U.S. since they affect any business that collects personal information about California residents. This article will focus on a new California law, Assembly Bill 1950, which requires businesses to maintain “reasonable security standards” for personal information without further defining such standards. In particular, the article examines how businesses can comply with A.B. 1950 by performing a risk management analysis and borrowing security standards from the federal Gramm-Leach-Bliley and the Health Insurance Portability and Accountability Acts.

full article

Anthony D. Milewski Jr.

Issue 3 Autumn 2005

ArticleTitleAuthor
10 When Small Technology is a Big Deal: Legal Issues Arising From Business Use of RFID

abstract   full article

D. Zachary Hostetter
11 Wait! Don’t fire that blogger! What Limits Does Labor Law Impose on Employer Regulation of Employee Blogs?

abstract   full article

Carson Strege-Flora
12 The Fight to Save America’s Inbox: State Legislation and Litigation in the Wake of CAN-SPAM

abstract   full article

Emma Scanlan
13 Electronic Case Filing: Is Failure to Check Email Related to an Electronically Filed Case Malpractice?

abstract   full article

Jessica Belskis
14

American and French Perspectives on Trademark Keying: The Courts Leave Businesses Searching for Answers

abstract   full article

Terrance J. Keenan

Issue 2 Autumn 2005

ArticleTitleAuthor
5 The FACT Act of 2003: Securing Personal Information In an Age of Identity Theft

abstract   full article

Terrance J. Keenan
6 Liability Under the Americans with Disabilities Act for Private Web Site Operators

abstract   full article

Evgenia Fkiaras
7 Streamlined Sales and Use Tax Agreement: Is Your Business Ready for Compliance?

abstract   full article

Anthony D. Milewski Jr.
8 Proposed Federal Definition of "Internet Job Applicant" Suggests Need for Revised Human Resource Policies

abstract   full article

Strege-Flora
9 "I Didn't Know My Client Wasn't Complying!" The Heightened Obligation Lawyers Have to Ensure Clients Follow Court Orders in Litigation Matters

abstract   full article

Mafé Rajul

Issue 1 Summer 2005

ArticleTitleAuthor
1 Defining Spyware: Necessary or Dangerous

abstract   full article

Andrew T. Braff
2 TrademarkDilution.com: Nissan Motor Co. v. Nissan Computer Corp., and the Evolving Law of Trademark Dilution on the Internet

abstract   full article

Lawrence F. Rozsnyai
3 E-Discovery – Can the Producing Party Expect Cost-Shifting?: The New Trend and What Can Be Done to Reduce Production Costs

abstract   full article

Mafé Rajul
4 Bigger Fish, Deeper Pockets: Business Blogs, Defamation and the Communications Decency Act

abstract   full article

Emma Scanlan